PREVENTION POLICIES Flashcards
What is the default policy used for?
- The Default Policy is a fallback policy applied to hosts that don’t have an assigned policy.
What are best practices when configuring default policies?
– You should configure its policy options to be conservative “catch all” settings you’re comfortable applying to any host in your environment.
How to configure a detection- only policy?
Default Policy is detection only
- Configuration > Prevention Policies> create new policy>input platform, name, description> create policy> click a row of policy settings to manage individually or click enable all>save>confirm> enable> enable policy
What is machine learning on a “sensor” vs the “cloud”
-Sensor ML:
- Sensor Machine Learning is Online + Offline
- On sensor are detections that occur when a process runs
-Includes Sensor Anti Malware on all supported OS Platforms
-Adware/PUP on MacOS.
-Cloud ML:
- Cloud Machine Learning is online
- Cloud Based Machine Learning detections occur when a file is written to disk.
- Cloud Machine Learning – includes both Cloud Anti Malware and Adware/PUP.
**Critical Component of detection/prevention of known, emerging, and zero day malware/ransomware attacks.
-Cloud Machine Learning does NOT interfere with traditional AV tools
Explain best practice Phase 1: Initial Deployment
-Run Phase 1 for minimum time to allow most applications to execute while you triage detections/address any false positives as appropriate.
-Set ML settings to detect only so you can safely triage detections
-Enable behavior-based protections for ransomware and IOAs.
**has low probability for false positives, but give you immediate protection against dangerous exploits.
Define the NextGen AV Settings
-Cloud Based ML
-Sensor ML
-On Write (Files written to disk)
-Quarantine.
What do end user notifications do?
-Portrays message to end user when an action is in violation of policy assigned to end host.
How to assign a prevention policy to groups and hosts?
-Falcon menu> Endpoint Security>Configure> prevention policies> edit icon near policy you want config>assigned host groups tab>add groups to policy>select groups>Add groups to policy>Settings Tab>Enable
What does precedence do regarding prevention policies?
- Determines which policy’s configuration settings are applied to a host when the host is a member of one or more policies.
- Each host can belong to one or more host groups – host groups can be assigned one or more policies
- With dynamic groups, a newly installed sensor inherits relevant groups, and applies policy with highest precedence to the host. Provides host with its initial policy settings.
Explain best practice Phase 3: Optimal Protection
-Run phase 3 identical to recommended single phase settings and your ultimate policy goals.
-Some customers also like to start a representative set of non-production systems as a test
-Set ML Preventions to Aggressive if you’re confident that all needed exclusions have been applied
-Enable remaining recommended IOA based prevention policy settings
What are the 3 phases to describe policy best practices?
3 Phase Process:
-Phase 1: Initial Deployment
-Phase 2: Interim Protection
-Phase 3: Optimal Protection
Which best policy practice is used for a rapid deployment scenario & the customer has pre-existing antivirus or host intrusion prevention system (HIPS)?
-Phase 1: initial deployment
Which best policy practice is used once the customer’s AV is disabled or uninstalled?
Phase 2: Interim Protection
Explain best practice Phase 2: Interim Protection
**Disable or uninstall other 3rd party AV products now.
-Run phase 2 for minimum time required to allow most applications to execute while you continue to triage detections/address any false positives as appropriate.
-Set ML Detections to Aggressive and ML Preventions to Moderate
-Enable additional IOA – based prevention settings
Which best policy practice is used to establish a customer’s ultimate policy goals?
- Phase 3: Optimal Protection
What happens when you assign a host group to a policy?
The host group will no longer appear in list of available groups
How do end user notifications show up?
- Shows up as a pop-up notification to the end user when the Falcon sensor blocks, kills, or quarantines an unauthorized action
-Messages also show up in the Windows Event Viewer under Apps and Service Logs
Where on the Falcon Console can you configure Precedence?
Hosts > Host Groups > Policies Assigned > Precedence
What features does the Cloud ML provide?
-Cloud AntiMalware/Detection
-Cloud AntiMalware/Prevention
SensorAntiMalware/Detection/Prevention
-Detect on Write, Quarantine on Write, Quarantine & Security Center Registration, Cloud Adware
-PUP Detection/Prevention, Sensor Adware & PUP Detection/Prevention,
-Enable detection at a level above set for prevention
-Triage detection data/allowlist false positives. Once confident that majority of applications have executed, increase detection/prevention sliders, repeat triage, and allowlist. Repeat until you’ve reached recommended settings.
When does a host automatically get assigned to the default policy
-If a host is not a part of any groups, or the groups it belongs to has no policies assigned