Detection & Monitoring

Detection & Monitoring

Raspberry Pi OUI Detection

The Mandiant PoC used a Raspberry Pi 4 as the evil twin platform. Monitor for Raspberry Pi OUI prefixes appearing on enterprise SSIDs:

OUI Prefix Manufacturer

B8:27:EB

Raspberry Pi Foundation (older models)

DC:A6:32

Raspberry Pi Foundation (Pi 4)

E4:5F:01

Raspberry Pi Foundation (Pi 4 variant)

# Query ISE for endpoints matching Raspberry Pi OUI prefixes
netapi ise endpoint list --filter "mac.startswith=B8:27:EB" --format table
netapi ise endpoint list --filter "mac.startswith=DC:A6:32" --format table
netapi ise endpoint list --filter "mac.startswith=E4:5F:01" --format table

# Combined check — pipe through awk for consolidated output
for oui in B8:27:EB DC:A6:32 E4:5F:01; do
    netapi ise endpoint list --filter "mac.startswith=$oui" --format table
done

Any Raspberry Pi MAC appearing on CHLA_Staff or CHLA_Secure SSIDs warrants immediate investigation — these are not authorized endpoint types for enterprise wireless.

ISE Live Logs Daily Review

Checklist for daily ISE Live Logs review:

  • Failed Authentications — Review all failed auth events; investigate repeated failures from same MAC or username

  • Unknown MAC Addresses — New MACs not in endpoint database; check against authorized inventory

  • Policy Set Violations — Endpoints hitting unexpected policy sets (e.g., corporate device on guest SSID)

  • Posture Failures — Endpoints failing posture assessment; check for pattern (specific OS, location, time)

  • Authorization Changes — Endpoints receiving unexpected authorization profiles

  • Profiling Anomalies — Device profiled as one type but exhibiting different behavior

Weekly Reporting

Generate weekly security metrics from ISE:

Top Failed Authentications

# Top 10 failed authentications by username (last 7 days)
netapi ise logs failed --days 7 --group-by username --top 10 --format table

# Top 10 failed authentications by MAC address
netapi ise logs failed --days 7 --group-by mac --top 10 --format table

Posture Compliance Rate

Track week-over-week compliance trending:

  • Target: 95% overall compliance rate

  • Alert threshold: Any platform dropping below 90%

  • Escalation: Two consecutive weeks below target triggers investigation

Policy Set Usage

# Authentication summary by policy set
netapi ise logs summary --days 7 --group-by policy-set --format table

Review for unexpected patterns — endpoints hitting wrong policy sets may indicate misconfiguration or attempted bypass.

Anomalous MAC Detection Patterns

Watch for these indicators of compromise or policy bypass:

Pattern Description Action

MAC Spoofing

Known device MAC appearing from unexpected switch port or AP

Investigate — possible MAC clone attack

OUI Mismatch

Device profiled as Windows but OUI belongs to embedded/IoT vendor

Re-profile — possible spoofed endpoint

Rapid MAC Cycling

Same switch port authenticating multiple MACs in short period

Investigate — possible hub/bridge or attack tool

After-Hours Auth

Enterprise auth from endpoints during non-business hours in sensitive areas

Review — legitimate remote access or unauthorized physical access

Geographic Anomaly

Same username authenticating from distant APs within impossible travel time

Escalate — credential compromise indicator

Certificate Lifecycle Monitoring

Certificate-based authentication (EAP-TLS) requires active lifecycle management:

Certificate Type Validity Renewal

Machine Certificate

2 years

Auto-enrollment via AD GPO; monitor 60 days before expiry

User Certificate

1 year

Auto-enrollment via AD GPO; monitor 30 days before expiry

ISE System Certificate

2 years

Manual renewal; calendar reminder 90 days before expiry

ISE Admin Certificate

5 years

Manual renewal; calendar reminder 180 days before expiry

Auto-renewal target: certificates should renew 30 days before expiration. Monitor for:

  • Endpoints with certificates expiring within 30 days that have not renewed

  • Certificate enrollment failures in AD Certificate Services logs

  • ISE system certificate expiration (causes authentication outage if missed)