Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
shantilalSuthar
Participant

Want to block some processes based on event ID

Hi Team,

I am using CP Harmony EDR & want to block some processes which has been reported by SOC to be malicious

Below detection method has been told by SOC team to implement in the EDR:

1.PowerShell script execution event ID: 4104 should be monitored for detecting any PowerShell script executions.
2.Network requests originating from unknown processes must be flagged and investigated by EDR/XDR.
3.Event ID: 4698 can be monitored in XDR to detect suspicious tasks being created.
4.Event ID: 9707 in Shell-Core/Operational logs can be monitored in XDR to detect newly executed processes using Run/RunOnce registry keys.
5.Monitor the user Startup directories for addition of new files with ‘.bat’ extension using XDR.
6.Perform file monitoring; files with known names but in unusual locations are suspect. Likewise, files that are modified outside of an update or patch are suspect.
7.Event ID 104 for System Logs, Event ID 1102 for Security logs, can be monitored in EDR to detect activity related to Windows event logs being cleared.
8.Monitor for deletion/modifications of Windows Registry keys and/or values related to services and startup programs that correspond to security tools such as HKLM:\SOFTWARE\WOW6432Node\AdvetNet\DesktopCentral\DCAgent & HKLM:\SOFTWARE\WOW6432Node\AdvetNet\ManageEngine\UESAgent.

Please help me to implement this in EDR. Thanks...

0 Kudos
0 Replies

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events