Mar 24 2022 08:33 AM - edited Mar 24 2022 10:20 AM
We configured all ASR rules to "Audit mode" to see what would have been blocked in the last few days. The following rules stick out:
Mar 25 2022 08:45 AM
SolutionMar 25 2022 08:57 AM
Thank you, that blog post is indeed very insightful. We managed to boil it down to two rules, which we currently need in "Audit mode":
Block Office communication application from creating child processes: we are monitoring this one, and are quite optimistic to gather enough data to white list all applications, which are getting detected.
Block executable files from running unless they meet a prevalence, age, or trusted list criteria: This rules indeed can be very annoying. You cannot foresee what needs to be white listed. There might be an approach to white list a specific folder, which is allowed to execute *.exe, e.g. for installing new software, but that won't work if you want to trigger some other blocked application. It could work, if there was some sort of privilege or admin role which could be assigned temporary, where a user can install an application under the supervision of an admin. But for now this will stay in "Audit mode".
Mar 27 2022 11:47 PM
@Kiril, there are several solutions for elevated user sessions like that.
In your case, you could use Privileged Access Management to give your admins (temporary) local privileges, so they can guide the user. If you want the user to do this autonomously, you can check this post on my blog (https://threeisacloud.tech/power-to-the-user/) or, depending on your requirements, look for more compliant solutions than mine :).
Mar 28 2022 12:50 AM