Skip to main content

Context ManagementContext Management Administration Guide

Pre-Built Detection Context Tables

icon-pre-built.png

The Context Management service includes a set of pre-built context tables used mainly to provide context for detection activities related to the New Scale Analytics engine, the Attack Surface Insights application, or to correlation rules. The data contained in these tables can be used to support various detection and enrichment rules that are part of specific use cases.

Follow the links below to view the different types of detection context tables available:

New-Scale Analytics Context Tables

This table shows which New-Scale Analytics context tables can be used to support detection or enrichment rules and which use cases are covered by each table.

Note

License Requirement

Currently, New-Scale Analytics context tables can only be accessed if you have the New-Scale Analytics license. Access to these tables will be available to other licenses in the near future.

Context Table

Used by Pre-Built New-Scale Analytics Detection Engine Rules

Used by Pre-Built Enrichment Rules

Use Cases

System Enumeration Processes

Yes

Malware, Privilege Escalation

Account Enumeration Processes

Yes

Malware, Privilege Escalation

Pentesting Processes

Yes

Malware, Compromised Credentials

Net Sniffer Processes

Yes

Malware, Compromised Credentials

Malicious Websites

Yes

Malware

Malicious Website Categories

Yes

Malware

Temporary Directories

Yes

Malware

Threat Windows Commands

Yes

Malware

Administrative Windows Privilege Constants

Yes

Privileged Activity

Source Code File Extensions

Yes

Compromised Credentials, Data Access

Competitor Company Names

Yes

Workforce Protection

Job Search Categories

Yes

Yes

Workforce Protection

Job Search Websites

Yes

Yes

Workforce Protection

File Storage Categories

Yes

Data Exfiltration

File Storage Websites

Yes

Data Exfiltration

Network Zones

Yes

Geo-location Based Detection

IOT Device Types

Future use case

Threat PowerShell Commands

Future use case

Per-User Windows Service Names

Future use case

Windows Control Panel Items

Future use case

Attack Surface Insights Context Tables

This table shows which Attack Surface Insights context tables can be used to support detection or enrichment rules and which use cases are covered by each table.

Note

License Requirement

Currently, Attack Surface Insights context tables can only be accessed if you have the New-Scale Analytics license. Access to these tables will be available to other licenses in the near future.

Context Table

Used by Pre-Built Attack Surface Insights Tagging Rules

Used by Pre-Built Enrichment Rules

Use Cases

Departing Employees

Yes

Workforce Protection

Used by the Departing Employees pre-built tagging rule

Internal Domains

Yes

Ignore external email domains when discovering user entities

Correlation Rules Context Tables

This table shows which correlation rules context tables are available for use.

Context Table

Context Types

Description

Vulnerability Scanners

Other

Populate this context table with IP addresses for authorized vulnerability scanners that are used for either internal or external assessments.