<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Want to block some processes based on event ID in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Want-to-block-some-processes-based-on-event-ID/m-p/224939#M9219</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;I am using CP Harmony EDR &amp;amp; want to block some processes which has been reported by SOC to be malicious&lt;/P&gt;&lt;P&gt;Below detection method has been told by SOC team to implement in the EDR:&lt;/P&gt;&lt;P&gt;1.PowerShell script execution event ID: 4104 should be monitored for detecting any PowerShell script executions.&lt;BR /&gt;2.Network requests originating from unknown processes must be flagged and investigated by EDR/XDR.&lt;BR /&gt;3.Event ID: 4698 can be monitored in XDR to detect suspicious tasks being created.&lt;BR /&gt;4.Event ID: 9707 in Shell-Core/Operational logs can be monitored in XDR to detect newly executed processes using Run/RunOnce registry keys.&lt;BR /&gt;5.Monitor the user Startup directories for addition of new files with ‘.bat’ extension using XDR.&lt;BR /&gt;6.Perform file monitoring; files with known names but in unusual locations are suspect. Likewise, files that are modified outside of an update or patch are suspect.&lt;BR /&gt;7.Event ID 104 for System Logs, Event ID 1102 for Security logs, can be monitored in EDR to detect activity related to Windows event logs being cleared.&lt;BR /&gt;8.Monitor for deletion/modifications of Windows Registry keys and/or values related to services and startup programs that correspond to security tools such as HKLM:\SOFTWARE\WOW6432Node\AdvetNet\DesktopCentral\DCAgent &amp;amp; HKLM:\SOFTWARE\WOW6432Node\AdvetNet\ManageEngine\UESAgent.&lt;/P&gt;&lt;P&gt;Please help me to implement this in EDR. Thanks...&lt;/P&gt;</description>
    <pubDate>Thu, 29 Aug 2024 09:37:45 GMT</pubDate>
    <dc:creator>shantilalSuthar</dc:creator>
    <dc:date>2024-08-29T09:37:45Z</dc:date>
    <item>
      <title>Want to block some processes based on event ID</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Want-to-block-some-processes-based-on-event-ID/m-p/224939#M9219</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;I am using CP Harmony EDR &amp;amp; want to block some processes which has been reported by SOC to be malicious&lt;/P&gt;&lt;P&gt;Below detection method has been told by SOC team to implement in the EDR:&lt;/P&gt;&lt;P&gt;1.PowerShell script execution event ID: 4104 should be monitored for detecting any PowerShell script executions.&lt;BR /&gt;2.Network requests originating from unknown processes must be flagged and investigated by EDR/XDR.&lt;BR /&gt;3.Event ID: 4698 can be monitored in XDR to detect suspicious tasks being created.&lt;BR /&gt;4.Event ID: 9707 in Shell-Core/Operational logs can be monitored in XDR to detect newly executed processes using Run/RunOnce registry keys.&lt;BR /&gt;5.Monitor the user Startup directories for addition of new files with ‘.bat’ extension using XDR.&lt;BR /&gt;6.Perform file monitoring; files with known names but in unusual locations are suspect. Likewise, files that are modified outside of an update or patch are suspect.&lt;BR /&gt;7.Event ID 104 for System Logs, Event ID 1102 for Security logs, can be monitored in EDR to detect activity related to Windows event logs being cleared.&lt;BR /&gt;8.Monitor for deletion/modifications of Windows Registry keys and/or values related to services and startup programs that correspond to security tools such as HKLM:\SOFTWARE\WOW6432Node\AdvetNet\DesktopCentral\DCAgent &amp;amp; HKLM:\SOFTWARE\WOW6432Node\AdvetNet\ManageEngine\UESAgent.&lt;/P&gt;&lt;P&gt;Please help me to implement this in EDR. Thanks...&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 09:37:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Want-to-block-some-processes-based-on-event-ID/m-p/224939#M9219</guid>
      <dc:creator>shantilalSuthar</dc:creator>
      <dc:date>2024-08-29T09:37:45Z</dc:date>
    </item>
  </channel>
</rss>

