sos5.0.0,
sos5.1.0
medium
This signature detects attempts to access a backdoor web
script installed by the Code Red II worm. The Code Red II
worm, like the original Code Red worm, allows attackers to
remotely access the server.
WORM:CODERED-2:CMD-BACKDOOR
sos5.0.0,
sos5.1.0
high
This signature detects attempts by the CodeRedII worm to
infect a host. The CodeRedII worm, also known as
CodeRed.F, exploits the same vulnerability as the original
CodeRed worm.
WORM:CODERED-2:INFECT-ATTEMPT
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to access a backdoor web
script installed by the Code Red II worm. The Code Red II
worm, like the original Code Red worm, allows attackers to
remotely access the server.
WORM:CODERED-2:ROOT-BACKDOOR
sos5.0.0,
sos5.1.0
medium
This signature detects the Bagle worm activity on a host.
After infecting a host, the Bagle worm attempts to contact
a Web server listening post. The Bagle worm, which affects
Microsoft Windows, copies itself to the system directory,
and edits the system registry. The worm uses an e-mail
attachment to propagate itself to other hosts, and has a
hard-coded expiration date (January 28). This signature
could be prone to false positives.
WORM:EMAIL:BAGLE-INFECTION
sos5.1.0
medium
This signature detects e-mail attachments containing the
W32.Sobig.E worm sent via SMTP.
WORM:EMAIL:W32.SOBIG.E
sos5.1.0
high
This signature detects the Mimail.A worm attachment in
SMTP traffic. After infecting a Windows-based host, Mimail
sends itself as an attachment to another target using its own
SMTP engine.
WORM:MIMAIL:MIMAIL.A
sos5.1.0
high
This signature detects the Mimail.L worm attachment in
SMTP traffic. After infecting a Windows-based host, Mimail
sends itself as an attachment to another target using its own
SMTP engine.
WORM:MIMAIL:MIMAIL.L
sos5.1.0
high
This signature detects the MoFei worm attempting to
propagate to another host. After infecting a host, the MoFei
worm propagates by depositing a copy of itself in a
vulnerable NetBIOS folder on another host. The MoFei worm
is known by several aliases, including W32.Mofei-B and
W32.Femot.D.
WORM:MOFEI:MOFEI-B-PROPAGATION
sos5.1.0
critical
This signature detects infection attempts of the Windows
RPC Locator Service by the B, C or D variants of the Nachi
worm. This signature only triggers on a successful connect
to an accessible victim. Follow up is strongly suggested.
WORM:NACHI:B-C-D-INFECT-ATTEMPT
sos5.0.0,
sos5.1.0
high
This signature detects WebDAV overflows, which can
indicate an infection attempt by the Nachi worm (D variant).
Nachi.D, a worm, typically attempts to infect the target host
by exploiting several vulnerabilities.
WORM:NACHI:D-WEBDAV-ATK
947
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...