EXCLUSIONS Flashcards

1
Q

How to write an effective file exclusion rule using glob syntax

A
  • When setting path, start with root folder in full path. Do not include drive letter, device, hard disk vol or leading asterisks or backslashes
  • Program Files (x86)\MySoftware*
    **Excludes everything in the folder but not subfolders
  • Program Files (x86)\MySoftware**
    **Excludes everything in the folder, including subfolders
  • Program Files (x86)\MySoftware\SampleSoftware.exe
    **Excludes SampleSoftware.exe if it’s in
  • ProgramFiles(x86)\MySoftware\Users*\Desktop\RunMe.exe **Excludes RunMe.exe within any user Desktop folders
  • **\RunMe.exe – (The exception) Globally excludes RunMe.exe in any location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you apply pattern exclusions to groups?

A

2 ways:

-Disable detection on a host

-Can set up a File Exclusion Pattern – prevents detections from appearing for specific file names, paths and extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to manage exclusion files?

A

Choose “all hosts” or “Groups of hosts”

Select Precedence
**Precedence of exclusion rules enacted on hosts/group of hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does using the Glob Syntax provide when creating exclusions?

A
  • Glob syntax allows you to create exclusion patterns to easily exclude files and folders. Glob syntax supports standard ASCII characters – all alphabetical characters are not case-sensitive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 Levels of Exclusion patterns?

A

3 levels of exclusion patterns:

-ML Exclusions

-IOA Exclusions

-Sensor Visibility Exclusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which exclusion pattern stops ML detections and preventions and/or uploads to CS for a trusted file path

A
  • ML Exclusions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which exclusion pattern stops seeing detections and allow activity for specified IOAs

A

-IOA Exclusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which exclusion pattern creates a sensor visibility exclusion to reduce performance issues in a trusted file path by stopping all sensor visibility for that path .

A

-Sensor Visibility Exclusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to enable exclusion rules?

A

To enable exclusion rule on host/groups of hosts
-Falcon console > Host Management > Prevention Policy assign to host name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When coming across a detection you know is legitimate, what needs to be done?

A

-Setup an allowlist or put it in an exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What file executables should be avoided for windows systems when configuring Sensor Visibility exclusions?

A

-cmd.exe
-command.exe
-PowerShell.exe
-C:\Windows\System32*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an indicator of attack (IOA)?

A

-A logical rule designed to identify and block malicious intent regardless of malware or exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to review any created exclusions?

A

-Falcon menu>endpoint security>configure>exclusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What 3 part process in Falcon needs to take place when deploy sensors to monitor your detections?

A

-Test a subset of hosts on the prevention policy

-Identify any applications that have produced a false positive

-Allowlist the false positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When doing any type of allowlisting what things need to be identified?

A

-Tactic

-Technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to allowlist a false positive?

A

Falcon main menu> endpoint security> monitor>endpoint detections>click on a detection that needs to be allowedlisted>scroll down on left side of screen and locate IOC management section> clikc IOC management icon>input description and filename>select host groups to apply or select all hosts> select platform type>select allow, do not detect from the action dropdown> click add hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How long does an allowlist take to be applied to an online machine?

A

-10-15 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How to allowlist a ML detection?

A

Falcon main menu> endpoint security> monitor>endpoint detections> select a tactic> select a technique>select group dropdown> select grouped by triggering file> select group by host in same dropdown (determines what may need to be excluded or helps narrow down false positives)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When should you apply ML exclusions?

A

-When there is a number of detections associated with a certain application or binary

20
Q

How to create a ML Exclusion?

A

Falcon main menu> endpoint security>monitor> endpoint detections>click the identified triggering file If not ther click the search bar and type triggering file & select the file you want to manage> select the grouping drop down and select Grouped by Hash> select grouped by command line in same dropdown (shows the triggering file path)>copy the file path>select grouped by host in same dropdown> contact host and see if there is an alternative file path that doesn’t trigger detections if NOT, then add to an exclusion

21
Q

What do machine learning exclusions prevent?

A

-Stops ML detections and preventions for the specified file path

falcon main menu>endpoint security>configure> exclusions>make sure your in machine learning exclusions tab>create exclusion>select all hosts or group of hosts>next> select detections and preventions checkbox under the excluded from section>paste file path in exclusion pattern text area> click test pattern to make sure its written/ pasted correctly>create exclusion>

22
Q

How to create an IOA exclusion

A

-Falcon menu>endpoint security>monitor>endpoint detections>click on a detection that needs to be allowlisted>make sure that the tactic and technique is NOT machine learning>determine that the program is a legit binary operating in your environment>scroll down left side of the screen and locate the command line and file path sections>scroll back up and click create IOA exclusion>click host groups and select groups to be targeted>input name and description>next>create exclusion>

23
Q

How can an IOA detection be identified?

A

-If the tactic and technique do NOT mention ML

24
Q

What’s ineligible for a self-Service IOA exclusion?

A

-Overwatch detections

-Custom IOA detections

-Small set of internal detection types

25
Q

What preventions should you reach out to customer support for?

A

-Forced ASLR bypass preventions

-forced DEP preventions

-Heap spray preallocation preventions

26
Q

What does an IOA exclusion use to suppress an IOA detection?

A

-Uses IOA name, image filename, and command line fields as methods to suppress an IOA detection

27
Q

What do sensor visibility Exclusions provide?

A

-Improves performance impact for excluded processes
**not an allowlisting tool

28
Q

Why is it important to keep exclusions minimal and narrow in scope?

A

-To minimize the loss of visibility and protection

29
Q

What are the characteristics of sensor visibility excursions?

A

-Supported on all platforms

-Reduce overhead by bypassing ALL detections and preventions

-Sensors skip the processing of most system activities triggered by the excluded processes or in paths

-Win and Mac hosts: process executions that match the SVE file exclusion criteria get reported via the syntheticprocessrollup2 event

30
Q

What is self- service allowlisting?

A

-Lets you decide which exclusions to setup for any false positives
*falcon admin and detections exception manager role required

31
Q

Identifying the type of tactic and technique used can help you in the selection of the appropriate self-service allowlisting option

A

-True

32
Q

Why should you take caution with Sensor vulnerability exclusions?

A

-Any processes that match file exclusion criteria will no longer generate the vast majority of events that would be seen otherwise

33
Q

What is machine learning (ML)?

A

-Real-time blocking against high-confidence known malware and unknown executables. Based on a combination of antivirus detection and file properties extracted at the time of execution.

34
Q

What is best practice for Sensor Visibility exclusions

A

-Should be narrow as possible

35
Q

What will no longer be captured if Sensor vulnerability exclusions are enabled?

A

-SHA 256 digest will no longer be captured

36
Q

What OS can an IOA exclusion be created for?

A

-Mac
-Windows
-Linux

37
Q

What file executables should be avoided for linux systems when configuring Sensor Visibility exclusions?

A

-Bash
-/sbin
-/bin
/usr/bin

38
Q

You can allowlist by hash via the IOC management page

A

-True

39
Q

What monitoring and triage detection features are only supported on Windows and Mac?

A

-Cloud ML and Cloud DoW- based detections

40
Q

What is the total number of hashes per OS platform?

A

-90,000

41
Q

When is an IOA alert generated?

A

-For a behavioral detection

42
Q

What monitoring and triage detection features are supported on all platforms?

A

-Cloud ML -based detections

-Sensor ML-based detections

-IOA-based detections

43
Q

Which exclusion should be used with extreme caution and only for performance-related concerns

A

-Sensor visibility exclusions (SVE)

44
Q

What monitoring and triage detection features are only supported on Windows only?

A

-On-sensor ML and on-sensor Dow-based detections

45
Q

What is an allowlist?

A

-A list of items that are allowed access to a system or protocol – a basic access control mechanism

46
Q

How to set up an allowlist?

A

-By hash via IOC management
-using file/path via Machine Learning Exclusions (MLE)