Skip to main content

Cortex XDR - Possible External RDP Brute-Force

This Playbook is part of the Cortex XDR by Palo Alto Networks Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.8.0 and later.

This playbook investigates a “Possible External RDP Brute Force” XDR Alert by gathering user, IP, and hostname information, and investigating if the following suspicious elements exists:

  • "IP Reputation" - Dbot Score is 2-3
  • "Source geolocation" - RDP Connection made from rare geo-location
  • Related to campaign - IP address is related to campaign, based on TIM module
  • Hunting results - the hunt for indicators related to the source IP and the related campaign returned results
  • XDR Alert search - XDR Alerts that related to the same username and endpoint, and to the MITRE tactics that comes after "Credential Access", were found.
  • Risky User - The user that was identified in the attack was given a medium or high score by XDR's ITDR module.
  • Risky Host - The destination host that was identified in the attack was given a medium or high score by XDR's ITDR module.

Set verdict method:

  • Critical Element - The "Critical Element" input allows you to select a specific element that, if identified as suspicious, the investigation's final verdict will be deemed a "True Positive".

  • Final Verdict - Each suspicious element is being added to an array called "Suspicious Elements", which is used to count potential security threats. The array size will be compared to a final threshold. If the size is greater than or equal to the threshold, the investigation's final verdict will be deemed a "True Positive".

  • User Engagement - The "UserEngagementThreshold" input allows you to set the number of suspicious elements that trigger user engagement. When this threshold is met, an email will be sent to the user and their manager asking for authorization of RDP activity. If the RDP activity is not authorized by the user, the investigation's final verdict will be deemed a "True Positive".

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • User Investigation - Generic
  • Cortex XDR - Possible External RDP Brute-Force - Set Verdict
  • Threat Hunting - Generic
  • Account Enrichment - Generic v2.1
  • Block Indicators - Generic v3
  • Cortex XDR - Isolate Endpoint
  • TIM - Indicator Relationships Analysis
  • Cortex XDR - Get entity alerts by MITRE tactics
  • Endpoint Enrichment - Generic v2.1

Integrations#

  • XDR_iocs
  • CortexXDRIR
  • XQLQueryingEngine

Scripts#

  • IsIntegrationAvailable
  • Set

Commands#

  • setIncident
  • ip
  • ad-expire-password

Playbook Inputs#


NameDescriptionDefault ValueRequired
UsernameRDP connection username.Optional
ExternalIPSource external IP address.Optional
AutoRemediationSet this value to "true" to enable auto remediation (IP Block and User Block).falseOptional
FinalThresholdThe threshold number of suspicious elements required to determine a 'True Positive' verdict.3Optional
CriticalElementYou can select a specific element that, if identified as suspicious, will automatically set the final verdict as true positive. The following options are available:
IP Reputation
Related Campaign
Hunting Results
Related Alerts
Unusual Country
Risky User
Risky Host

NOTE: You can read about the meaning of every element in the playbook description.
Optional
UserEngagementThresholdThe threshold number of suspicious elements that will trigger a user engagement. Set to 0 to disable user engagement.

NOTICE: If this threshold is equal to or higher than "FinalThreshold", the final verdict will be deemed by the user response and not by the FinalThreshold calculation.
2Optional
HostnameRDP connection destination hostname.Optional
EndpointIDRDP connection destination endpoint ID.Optional
Alert_NameAlert name.Optional
AlertDescriptionAlert description.Optional
CountrySource external IP country.Optional
IsolateEndpointSet this value to "true" to enable endpoint isolation in case of a true positive.falseOptional
SOCEmailAddressThe SOC email address to use for the user engagement section.Optional
EarlyContainmentSet this value to "true" to allow early containment when the IP is known to be malicious.trueOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


Cortex XDR - Possible External RDP Brute-Force