Tor client IP address identified within Azure environment
Set up the azure integration.
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。
Goal
Detect when Tor client activity is seen in Azure logs.
Strategy
This rule monitors Azure logs to determine when an activity originated from a Tor client. Datadog enriches all ingested logs with expert-curated threat intelligence in real time. An attacker may use a Tor client to anonymize their true origin.
Triage and response
- Determine if the actions taken by the identity
{{@usr.id}}
are legitimate by looking at past activity and the type of API calls occurring. - If the results of the triage indicate that an attacker has taken the action, begin your company’s incident response process and an investigation.
Changelog
- 17 August 2023 - Updated query to replace attribute
@threat_intel.results.subcategory:tor
with @threat_intel.results.category:tor
.