Atlassian Tor client activity detected

This rule is part of a beta feature. To learn more, contact Support.
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください

Goal

Detect when Tor client activity is seen in Atlassian audit logs.

Strategy

This rule monitors Atlassian audit logs to determine when an activity had originated from a Tor client. Datadog enriches all ingested logs with expert-curated threat intelligence in real time. An attacker may use a Tor client to anonymize their true origin.

Triage and response

  1. Determine if the actions taken by the identity {{@usr.email}} are legitimate by looking at past activity and the type of logs occurring.
  2. If the results of the triage indicate that {{@usr.email}} was not aware of this activity, begin your company’s incident response process, and start an investigation.