User guide

User-Defined Event Contexts
101
Proventia Network IPS G and GX Appliance User Guide
Email_Sender
context
Use the Email_Sender context to monitor incoming or outgoing email from a particular
recipient.
Monitors
The Email_Sender context monitors the sender address part of the email header using
the SMTP, POP, IMAP protocols. When the appliance detects an event that matches a
signature using the Email_Sender context, you can examine the details of the event to
determine which protocol the email used.
Note: This context does not monitor email sent with the MAPI protocol.
Examples
Use the Email_Sender context to detect instances of social engineering or other
employee manipulation (inbound) or to detect information leaks from your company
(outbound).
Email_Subject
context
Use the Email_Subject context to monitor the subject line of email.
Monitors
The Email_Subject context monitors the subject line in the email header of messages
using the SMTP, POP, and IMAP protocols.
Note: This context does not monitor email sent with the MAPI protocol.
Examples
You can create signatures to detect information leaks by monitoring for important
project names or file names.
You can also use Email_Subject to detect viruses, such as the I LOVEYOU virus.
Tip: Because viruses and other attacks have developed programs that systematically
change the subject line, use the Email_Content context to track these virus types.
File_Name context Use the File_Name context to monitor who accesses sensitive files over the network in
your organization.
Monitors
The File_Name context detects when someone (or a program) attempts to remotely
read a file or write to a file with any of the following protocols:
TFTP
FTP
Windows file sharing (CIFS or Samba)
NFS
Note: NFS can open files without directly referencing the file name. Using this
context to monitor NFS access to a file may not be 100% effective.
Example
When the Explorer worm of 1999 propagated over a Windows network, it attempted
to write to certain files on remote Windows shares. With a worm like this, you can
monitor for attempts to access files and stop the worm from propagating locally.