Atlassian Tor client activity detected
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。
Goal
Detect when Tor client activity is seen in Atlassian audit logs.
Strategy
This rule monitors Atlassian audit logs to determine when an activity had originated from a Tor client. Datadog enriches all ingested logs with expert-curated threat intelligence in real time. An attacker may use a Tor client to anonymize their true origin.
Triage and response
- Determine if the actions taken by the identity
{{@usr.email}}
are legitimate by looking at past activity and the type of logs occurring. - If the results of the triage indicate that
{{@usr.email}}
was not aware of this activity, begin your company’s incident response process, and start an investigation.