Rogue DHCP Server
Low
False Positive
ALR-00090 · 2026-04-08T05:44:55Z
Description
Rogue DHCP server detected on VLAN 10 from WS-PC-003. Offering IPs in unexpected range. Network IDS quarantined the device.
Alert Metadata
Endpoint Information
MITRE ATT&CK Mapping
Investigation Timeline
05:44:55
Event ingested by SOC365 Engine
05:44:56
EmilyAI triage started — correlation enrichment
05:45:07
EmilyAI confidence: 89% — escalated to human analyst
05:45:30
Alert assigned to analyst: EmilyAI (auto)
05:46:20
Investigation started — querying SIEM and threat intelligence
05:48:57
Containment action taken — endpoint isolated
06:01:33
Alert resolved — remediation complete
Related Alerts
| ID | Time | Alert | Severity | Status | Host |
|---|---|---|---|---|---|
| ALR-00235 | 2h ago | Suspicious Scheduled Task | High | Open | WS-PC-003 |
| ALR-00408 | 4h ago | Tor Exit Node Connection | Informational | Escalated | WS-PC-003 |
| ALR-00103 | 5h ago | Data Exfiltration Attempt | Low | Open | WS-PC-003 |
| ALR-00214 | 19h ago | Rogue DHCP Server | Low | Resolved | SRV-DC-01 |
| ALR-00160 | 1d ago | DecoyPulse Honeypot Triggered | Low | Escalated | WS-PC-003 |