Skip to the content.

Indicators of Compromise

These indicators help in detecting and responding to potential malicious activity on a network or a system.

Account Lockouts

Repeated failed login attempts resulting in accounts being locked.

Concurrent Session Utilization

Multiple sessions active from different locations for a single user account.

Blocked Content

Legitimate content being blocked by security mechanisms.

Impossible Travel

Logins from geographically distant locations within an impossible timeframe.

Resource Consumption

Excessive use of system resources like CPU, memory, or network bandwidth.

Resource Inaccessibility

Legitimate users unable to access system resources or services.

Out-of-Cycle Logging

Unexpected logging activity outside of normal operational hours.

Missing Logs

Absence of expected log entries indicating potential tampering.

Published or Documented Attacks

Known attack methods or vulnerabilities being actively exploited.