in the last few days I have received a ton of alerts using "Threat Intel Indicator match"
it is matching specific ports with specific Ip addresses.
however, after researching, I have found these alerts are being generated from a server running azure ad connect. it is matching the source.ip to 127.0.0.1 and soure.ports are between the ranges of 49152 - 65535 which also happens to be the ports that rpc uses during password sync...every 15 minutes.
my question is I am trying to create a exception that looks like this
source.ip is 127.0.0.1 and host.name is "server.name" source.port is one of 49152 - 65535
the problem I am having is how do I create a range of ports in exceptions?
sadly not for this particular rule, it is alerting when source ip and source.port match. I'll look into maybe trying to figure out how to disable that particular rule.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.