Kusto Query LanguageMicrosoft SentinelSECURESymantec Endpoint Protection

Suspicious Directory Traversal Detection Using KQL in Symantec Logs

This article focuses on how to detect suspicious directory traversal activities that Symantec Endpoint Protection logs but fails to block, using a Kusto Query Language (KQL) script in Microsoft Sentinel. The query identifies general directory traversal events with an emphasis on attacks detected but not prevented, providing insight into potential threats that evade traditional endpoint defenses.

Risk

Directory traversal is a critical attack vector where malicious users manipulate file paths to access directories and files outside the intended scope. When Symantec Endpoint Protection detects but does not block such attacks, it indicates potential gaps in the security controls, allowing threat actors to explore sensitive system areas. This exposure can lead to unauthorized data access, privilege escalation, and ultimately system compromise.

Query

Microsoft Sentinel

Kusto
SymantecEndpointProtection
| where LogType == "Agent Security Logs" or LogType == "Agent Risk Logs"
| where EventDescription contains "Audit: Generic Directory Traversal"
| where EventDescription contains "attack detected but not blocked"
| summarize Count=count() by UserName, LocalHostIpAddr, RemoteHostName, RemoteHostIpAddr, TrafficDirection, IntrusionUrl, EventDescription

This KQL script filters Symantec Endpoint Protection logs from Microsoft Sentinel to capture only those events categorized under “Agent Security Logs” or “Agent Risk Logs.” It focuses on entries with descriptions mentioning generic directory traversal audits that were detected but not blocked. The summary aggregates the number of occurrences by user and network identifiers, helping analysts pinpoint who and where these suspicious activities are happening.

References

Leave a Reply

Your email address will not be published. Required fields are marked *