Intelligence Security Events

You can configure Intelligence to trigger an alert when specific events occur in your cloud or cluster network. You or other recipients receive this alert as an email or as a different type of notification, so that you can respond to the event almost immediately.

To receive alerts, you must set up a policy. The policy includes a ruleset with specific Intelligence alert definitions, which are applied to selected cloud environments (VPCs) or KubernetesClosed Kubernetes, often abbreviated as “K8s”, orchestrates containerized applications to run on a cluster of hosts. clusters. With this policy, you associate a notification that specifies where you want to receive the alerts. Intelligence includes a number of preconfigured, CloudGuard-managed rulesets and policies.

In the Intelligence menu, you can set up your rulesets and policies.

Benefits

  • Automatic and continuous monitoring of your cloud environments and clusters based on queries configured for your enterprise needs

  • Automatic generation of near real-time alerts based on specific events and thresholds, issued to user-configured notification targets

  • Built-in rulesets that cover many of the same enterprise needs, to apply to your environments and Kubernetes clusters out-of-the-box

Malicious IP Classification

For Intelligence rules that identify malicious IPs, CloudGuard uses the Check Point's ThreatCloud technology. The table below explains the meaning of each IP category.

Class

Description

Unclassified

The service could not classify the IP. There is not sufficient data about this resource.

Adware

The IP domains operate in the gray areas of the law, collecting private data on the users, and show unwanted content or a website that contains sub-application to download.

their

The IP domains contain malicious software, for example, hacking websites.

Benign

Legitimate IP that is not malicious.

CnC Server

Command and control of malware.

Compromised Server

Legitimate IP that was hacked and operates a malicious function.

Phishing

The IP domains attempts to get sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), frequently for malicious reasons, by masquerading as a trustworthy entity in electronic communication.

Infection Source

The IP domains can infect their visitors with malware.

Web Hosting

The IP domains allow you to rent out space for websites to have your business in.

File Hosting

The IP domains allow you to rent out space for storage to have your business in.

Parked

The IP domains permanently do not have content. Possibly, they contain advertising content on pages that have been registered but do not (at this time) have initial content.

Scanner

The IP is a known Internet scanner.

Anonymizer

The IP is a known Tor (The Onion Router) anonymity proxy server.

Cryptominer

The IP domains are used for crypto mining.

Spam

The IP domains are used for spam.

Compromised Host

The victim's IP.

Actions