Installing/Uninstalling Questionable Software
Installing/Uninstalling Questionable Software (Windows/Mac)
The following out-of-the-box alert rules are assigned to the (Windows/Mac) Category: INSTALLING/UNINSTALLING QUESTIONABLE SOFTWARE.
| 
                                                         ALERT RULE  | 
                                                    
                                                         Description  | 
                                                
|---|---|
| Accessing Programs and Features screen on Windows | 
                                                         An alert is triggered upon opening Windows Programs and Features screen, potentially in order to uninstall a program.  | 
                                                
| Installing advanced monitoring tools | 
                                                         An alert is triggered upon running the installation file of a predefined advanced monitoring tool to reveal information that could be sensitive.  | 
                                                
| Installing Dynamic-DNS tools | 
                                                         An alert is triggered upon running the installation file of a predefined Dynamic-DNS tool to hide an identity.  | 
                                                
| Installing file transfer applications | 
                                                         An alert is triggered upon running the installation file of an FTP/SFTP desktop application that can be used to transfer files/folders.  | 
                                                
| Installing hacking or spoofing tools | 
                                                         An alert is triggered upon running the installation file of a predefined hacking or spoofing tool that can be used to gain access to a restricted area or cause damage to an organization’s assets.  | 
                                                
| Installing non-standard software | 
                                                         An alert is triggered upon running an installation file which is not included in the permitted software for installation.  | 
                                                
| Installing P2P file sharing tools | 
                                                         An alert is triggered upon running the installation file of a peer-to-peer (P2P) application that can be used to share/use content that might be copyrighted, insert malicious content, or steal sensitive information.  | 
                                                
| Installing password cracking tools | 
                                                         An alert is triggered upon running an installation file of a predefined password cracking tool, to try and break a password-protected file with potentially sensitive information.  | 
                                                
| Installing Remote Access and Sharing Desktop tools | 
                                                         An alert is triggered upon running an installation file of a remote PC access or other desktop sharing application that could be used to take control of a machine remotely or take control of another remote machine.  | 
                                                
| Installing secured or encrypted email client | 
                                                         An alert is triggered upon running an installation file of a secured or encrypted email client which could be used to transfer information that cannot be monitored. This action could indicate that the user has something to hide.  | 
                                                
| Installing TOR (The Onion Router) tools | 
                                                         An alert is triggered upon running an installation file of a predefined TOR tool such as TOR browser in order access the Dark Web. This action could indicate that a user wants to hide his identity while performing illegal activity.  | 
                                                
| Installing unauthorized cloud backup applications | 
                                                         An alert is triggered upon running an installation file of a not allowed cloud backup application that could be used to insert malicious software or steal sensitive information.  | 
                                                
| Installing unauthorized cloud transfer applications | 
                                                         An alert is triggered upon running an installation file of a blacklisted cloud transfer application that could be used to insert malicious software or steal sensitive information.  | 
                                                
| Installing unauthorized email client or Instant Messenger | 
                                                         An alert is triggered upon running an installation file of an email client or Instant Messaging application that is not authorized.  | 
                                                
| Installing virtualization solution | 
                                                         An alert is triggered upon running an installation file of various predefined virtualization solutions. This action could indicate that the user is trying to perform activity on a virtual machine that will be destroyed later leaving no traces.  | 
                                                
| Installing VPN, Proxy or Tunneling tools | 
                                                         An alert is triggered upon running an installation file of a predefined VPN/Proxy/Tunneling tool that can be used to gain access to a restricted area or hide the real identity of a user.  | 
                                                
| Uninstalling a program on Windows Desktop | 
                                                         An alert is triggered upon running the uninstallation of any software on a machine that functions as a desktop.  | 
                                                
| Uninstalling a program on Windows Server | 
                                                         An alert is triggered upon running the uninstallation of any software on a machine that functions as a server.  |