F
FPT.EagleEye
First rule: Thu Mar 09 2017 01:00:00 GMT+0100 (Central European Standard Time)
0rules authored
1sole author
5co-authored
Rule Types
By Severity
critical
1
high
3
medium
1
low
0
informational
1
By Status
stable
1
test
5
experimental
0
deprecated
0
unsupported
0
0
Total Rules
0
Stable Rules
0
High / Critical
0
Log Source Types
Recent RulesAll rules →
Potential Powershell ReverseShell Connection
Wed Mar 03 2021 01:00:00 GMT+0100 (Central European Standard Time)
highDetection
Exchange PowerShell Snap-Ins Usage
Wed Mar 03 2021 01:00:00 GMT+0100 (Central European Standard Time)
highDetection
Potential Emotet Rundll32 Execution
Fri Dec 25 2020 01:00:00 GMT+0100 (Central European Standard Time)
criticalEmerging Threat
File Download Via Bitsadmin
Thu Mar 09 2017 01:00:00 GMT+0100 (Central European Standard Time)
mediumDetection
SOURGUM Actor Behaviours
Tue Jun 15 2021 02:00:00 GMT+0200 (Central European Summer Time)
highEmerging Threat
Windows Spooler Service Suspicious Binary Load
Tue Jun 29 2021 02:00:00 GMT+0200 (Central European Summer Time)
informationalEmerging Threat
Browse all 6 rules by FPT.EagleEye
Filter the full rule library to see only their contributions