Skip to main content
All CollectionsTroubleshooting and How-ToHow-To Articles
Rule Example: How to detect and block suspicious network activities
Rule Example: How to detect and block suspicious network activities
Written by Arick Disilva
Updated over a week ago

Detecting and Responding to Network Activities Using the Network Activity Rules

By using Network Activity rules you can detect and respond to network activities using criteria such as the applications using the network, byte sent/received, remote host etc. The sample rule below shows how you can use a shared list to block blacklisted IPs and certain ports:

  1. Create an Activity rule.

  2. Select Network under the types of activities.

  3. Select the users the rule will apply to.

  4. Specify the detection conditions for the Remote Host. In this example, we used a Shared List called Blacklisted IPs as input for the condition. This list contains some network addresses (IPs) that we want to block.

  5. Add another condition, Remote Port and assign it a port value. In this example, we used the port 50.

  6. Select an action to take when the rule is violated. In this example, we selected a Block action.

Detecting Network Anomalies Using the Anomaly Rules (On-Premise)

You can use the Anomaly Rules to detect network anomalies like network connections going above certain threshold, network data out anomaly for certain user compared to their departmental baseline etc. The sample Anomaly Rule below will notify an admin if the threshold count for network connections (no-http) goes above certain level:

Did this answer your question?