7fe3831078
* [New] SOCKS Traffic from an Unusual Process This detection correlates FortiGate's application control SOCKS events with Elastic Defend network event to identify the source process performing SOCKS traffic. Adversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network communications to a command and control server to avoid direct connections to their infrastructure. * Update command_and_control_socks_fortigate_endpoint.toml * Update command_and_control_socks_fortigate_endpoint.toml * Update rules/cross-platform/command_and_control_socks_fortigate_endpoint.toml Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update command_and_control_socks_fortigate_endpoint.toml * add fortinet schema and manif * Update rules/cross-platform/command_and_control_socks_fortigate_endpoint.toml Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com> * Update rules/cross-platform/command_and_control_socks_fortigate_endpoint.toml Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com> * Update pyproject.toml --------- Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>