Endpoint Security and Behavior Analysis

  • Biggest security risk? The users and their devices

  • Behavior Analysis Solutions

    • HIDS, HIPS (Host based intrusion detection/prevention)

    • File Integrity Monitoring

      • Tripwire

    • EPP (Endpoint Protection Platforms)

      • Signature based

    • EDR (Endpoint Detection and Response)

      • Machine learning

    • UEBA (User and Entity Behavior Analysis)

      • What do users do, when, why, and how?

      • Splunk UEBA

      • Microsoft Advanced Threat Analytics

  • Low on budget? Here’s some things to look for:

    • Single idle and system PIDs

    • One wininit.exe

    • One services.exe others should be children of services.exe or svchost.exe (just a wrapper)

    • System services should be digitally signed

    • Services should be launched by either the SYSTEM, LOCAL SERVICE, or NETWORK SERVICE accounts

    • One lsass.exe

    • One winlogon.exe

    • Userinit.exe should not persist

    • Explorer.exe file manager and parent process

    • Sysinternals procmon

  • Found a suspicious process? Check the following:

    • Read/write file access

    • Launch location

    • Obfuscated/compressed

    • Parent process

    • Try killing it

    • Network traffic

    • Sysinternal Process Explorer

    • Tasklist command

    • Sysinternals Autoruns

Last updated