Installing/Uninstalling Questionable Software
Installing/Uninstalling Questionable Software (Windows/Mac)
The following out-of-the-box alert rules are assigned to the (Windows/Mac) Category: INSTALLING/UNINSTALLING QUESTIONABLE SOFTWARE.
ALERT RULE |
Description |
---|---|
Accessing Programs and Features screen on Windows |
An alert is triggered upon opening Windows Programs and Features screen, potentially in order to uninstall a program. |
Installing advanced monitoring tools |
An alert is triggered upon running the installation file of a predefined advanced monitoring tool to reveal information that could be sensitive. |
Installing Dynamic-DNS tools |
An alert is triggered upon running the installation file of a predefined Dynamic-DNS tool to hide an identity. |
Installing file transfer applications |
An alert is triggered upon running the installation file of an FTP/SFTP desktop application that can be used to transfer files/folders. |
Installing hacking or spoofing tools |
An alert is triggered upon running the installation file of a predefined hacking or spoofing tool that can be used to gain access to a restricted area or cause damage to an organization’s assets. |
Installing non-standard software |
An alert is triggered upon running an installation file which is not included in the permitted software for installation. |
Installing P2P file sharing tools |
An alert is triggered upon running the installation file of a peer-to-peer (P2P) application that can be used to share/use content that might be copyrighted, insert malicious content, or steal sensitive information. |
Installing password cracking tools |
An alert is triggered upon running an installation file of a predefined password cracking tool, to try and break a password-protected file with potentially sensitive information. |
Installing Remote Access and Sharing Desktop tools |
An alert is triggered upon running an installation file of a remote PC access or other desktop sharing application that could be used to take control of a machine remotely or take control of another remote machine. |
Installing secured or encrypted email client |
An alert is triggered upon running an installation file of a secured or encrypted email client which could be used to transfer information that cannot be monitored. This action could indicate that the user has something to hide. |
Installing TOR (The Onion Router) tools |
An alert is triggered upon running an installation file of a predefined TOR tool such as TOR browser in order access the Dark Web. This action could indicate that a user wants to hide his identity while performing illegal activity. |
Installing unauthorized cloud backup applications |
An alert is triggered upon running an installation file of a not allowed cloud backup application that could be used to insert malicious software or steal sensitive information. |
Installing unauthorized cloud transfer applications |
An alert is triggered upon running an installation file of a blacklisted cloud transfer application that could be used to insert malicious software or steal sensitive information. |
Installing unauthorized email client or Instant Messenger |
An alert is triggered upon running an installation file of an email client or Instant Messaging application that is not authorized. |
Installing virtualization solution |
An alert is triggered upon running an installation file of various predefined virtualization solutions. This action could indicate that the user is trying to perform activity on a virtual machine that will be destroyed later leaving no traces. |
Installing VPN, Proxy or Tunneling tools |
An alert is triggered upon running an installation file of a predefined VPN/Proxy/Tunneling tool that can be used to gain access to a restricted area or hide the real identity of a user. |
Uninstalling a program on Windows Desktop |
An alert is triggered upon running the uninstallation of any software on a machine that functions as a desktop. |
Uninstalling a program on Windows Server |
An alert is triggered upon running the uninstallation of any software on a machine that functions as a server. |