Bypassing Security Controls
Bypassing Security Controls (Windows/Mac)
The following out-of-the-box alert rules are assigned to the (Windows/Mac) Category: BYPASSING SECURITY CONTROLS.
ALERT RULE |
Description |
---|---|
Opening ObserveIT Agent folder |
An alert is triggered upon opening the folder in which the ITM On-Prem (ObserveIT) Agent is installed, potentially for tampering or covering tracks. |
Running TOR browser |
An alert is triggered upon running TOR (The Onion Ring) browser in order to access the TOR network (the Dark Web). Such an operation could indicate that a user wants to hide his identity while performing illegal activity. |
Adding Windows Firewall Rules |
An alert is triggered upon opening the built-in Windows Add New Rule screen in Firewall settings to define a new rule. |
Changing computer data or time |
An alert is triggered upon opening the built-in Windows date and time settings screen potentially to change the time or data, in order to manipulate the documentation of user actions or to avoid expiration of time-limited software license. |
Configuring Windows Firewall Status |
An alert is triggered upon opening the built-in Windows Firewall settings screen, potentially to turn off the settings before performing incoming or outgoing networking that is usually blocked by Firewall. |
Configuring Windows LAN or Proxy Settings |
An alert is triggered upon opening the built-in Windows LAN/Proxy settings screen, potentially to configure internet access through a 3rd party in order to hide the IP or identity of the user. |
Configuring Windows VPN Connection |
An alert is triggered upon opening the built-in Windows VPN settings screen, potentially to configure access to a private network that would not be available otherwise. |
Creating a new virtual machine instance |
An alert is triggered upon creating a new virtual machine instance in one of the predefined virtualization solutions. |
Logging in with local user account |
An alert is triggered upon performing login with a domain name which is not included in predefined domains. Such a login is usually a local user login in which the domain name is the machine name (typical to laptops disconnected from an organization’s network). |
Running VPN, Proxy or Tunneling tools |
An alert is triggered upon running advanced networking tools either to enable access to private networks or to hide the user identity. |
Changing Internet security settings |
An alert is triggered upon customizing the security level in Internet Properties. The operation can indicate an early intent to bypass security controls in Internet and bring in dangers. |
Running a partially monitored browser |
This alert will be triggered upon using Opera browser, which is only partially monitored by ITM On-Prem (ObserveIT) (no URL capturing). This operation can indicate an early intent to hide information and cover tracks from the organization. |
Browsing to website related to MIMIKATZ utility |
An alert is triggered upon downloading a file related to the MIMIKATZ utility which allows playing with Windows security. |
Downloading the MIMIKATZ utility |
An alert is triggered upon browsing or searching website related to the MIMIKATZ utility which allows playing with Windows security. |