General Rule
General Rule
General Rule
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
5 in 5 minutes
1 in 2 minutes
1 in 5 minutes
10 in 3 minutes
1 in 1 minutes
20 in 2 minutes
2 in 3 minutes
30 in 2 minutes
200 in 1 minute
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
5 in 1 Minute
1 in 1 second
10 Matches in 2 Minutes
1 in 1 second
1 in 1 second
1 in 1 second
1 in 1 minutes
1 in 1 minutes
1 in 1 minutes
500 in 10 seconds
10 in 15 minutes
1 in 2 minutes
5 in 5 minutes
1 in 2 minutes
1 in 1 minutes
5 in 1 minutes
10 in 5 minutes
3 in 2 minutes
5 in 2 Minutes
5 in 5 minutes
20 in 2 minutes
5 in 3 minutes
10 in 2 minutes
40 in 1 minute
40 in 1 minute
5 in 5 minutes
10 in 1 minute
2000 in 1 minute
30 in 2 minutes
200 in 1 minute
1 in 2 minutes
1 in 2 minutes
1 in 1 minutes
5 in 10 minutes
100 in 30 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
100 in 5 minutes
100 in 5 minutes
5 in 15 minutes
100 in 30 minutes
1 in 2 minutes
3 in 5 minutes
3 in 5 minutes
1 in 2 minutes
1 in 2 Minutes
1 in 2 minutes
1 in 1 minutes
10 in 5 minutes
5 in 2 Minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 Minutes
10 in 2 Minutes
1 in 2 minutes
30 in 1 hour
150 in 1 minute
20 in 5 Minutes
1 in 2 minutes
2 in 5 minutes
1 in 2 minutes
10 in 2 Minutes
5 in 2 Minutes
1 in 2 minutes
10 in 5 minutes
5 in 2 Minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
1 in 2 minutes
Applicable Event
S. No. Sub Category Sources
1 Change Management/Configuration Violations Windows
2 Change Management/Configuration Violations Windows
3 Change Management/Configuration Violations Windows
4 Change Management/Configuration Violations Windows
5 Change Management/Configuration Violations Windows
Login attempt from differnt desktops for the same user account 2 in 10 minutes
Insider Threat - Deleted User Account Access Attempt 1 in 1 minute
User connecting with two different user names 2 in 5 minutes
Interactive or RDP Login using SERVICE ACCOUNT detected 1 in 2 minutes
A logon attempt was made by a user who is not allowed to log on
to this computer
SUDO Privilege escalation Failed
Direct login using root user id 1 in 1 minute
Firewall access from non-admin IPs 1 in 1 minute
Access to database from unauthorized terminals
New destination accounts or payees that have recently been used by many
“customers” over a short period of time. The destination accounts are
potential mule accounts
Logins/transactions from different cities in short period 2 in 1 Hrs
Multiple low value transactions in short period 3 in 2 hours
User Changed password or mobile No followed by transaction 1 in 10 minutes
Top 10 money transfers (Daily report) Report
Top 10 payees by value (Daily report) Report
Top 10 payees by count (Daily report Report
Same ATM card being used for transactions in geographically dispersed
ATMs within a short time
ATM hood opening during odd hours.
ATM cash chest opening during odd hours.