2 Flashcards

(42 cards)

1
Q

Microsoft Defender for Endpoints technologies built into Windows

A

Endpoint behavioral sensors. Embedded in Windows 10, these sensors collect and process behavioral signals from the operating system. The sensors send the data to your private, isolated cloud instance of Microsoft Defender for Endpoint.

Cloud security analytics. Uses big data, machine learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.

Threat intelligence. Generated by Microsoft hunters and security teams, and augmented by threat intelligence provided by partners, threat intelligence enables Microsoft Defender for Endpoint to identify attacker tools, techniques, and procedures, and generate alerts when these tools are observed in collected sensor data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is required to deploy Microsoft Defender for Endpoint to Windows devices in your organization?

A

Subscription to the Microsoft Defender for Endpoint online service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Microsoft Defender for Endpoints required role

A

Security Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Microsoft Defender for Endpoints storage locatio, data retention, preview

A

Data storage location - determine where you want the primary hosted (US, EU, UK) you cant chnage the loacation after
Data retention - default is 6 months
Enable preview features - default is on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Microsoft Defender for Endpoints if enpoints use a proxy server to access internet

A

The Microsoft Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender for Endpoint service. The embedded Microsoft Defender for Endpoint sensor runs in the system context using the LocalSystem account. The sensor uses Microsoft Windows HTTP Services (WinHTTP) to enable communication with the Microsoft Defender for Endpoint cloud service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

General settings advanced features for endpoints

A

Automated investigation - take advantage of the automated investigation and remediation features of the service

Live response & Live response for servers - users with the appropriate permissions can start a live response session on devices

Always remediate PUA - Potentially unwanted applications

Restrict correlation to within scoped device groups - for scenarios where local SOC operations would like to limit alert correlations only to device groups that they can access

Enable EDR in block mode - in block mode works behind the scenes to remediate malicious artifacts that are detected post breach.

Add or block file - you need to Use Microsoft Defender Antivirus as the active antimalware solution
The cloud-based protection feature is enabled

Tamper protection - Tamper protection essentially locks Microsoft Defender Antivirus and prevents your security settings from being changed through apps and methods.

Microsoft Defender for Identity integration - By enabling this feature, you’ll enrich the device-based investigation capability by pivoting across the network from an identity point of view.

Office 365 Threat Intelligence connection - only available if you have an active Office 365 E5 or the Threat Intelligence add-on.

When you turn on this feature, you’ll be able to incorporate data from Microsoft Defender for Office 365 into Microsoft Defender XDR to conduct a comprehensive security investigation across Office 365 mailboxes and Windows devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack surface reduction rules target behaviors

A

Launching executable files and scripts that attempt to download or run files

Running obfuscated or otherwise suspicious scripts

Performing behaviors that apps don’t usually initiate during normal day-to-day work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attack surface reduction rule settings

A

Each Attack Surface Reduction rule contains one of four settings:

Not configured: Disable the attack surface reduction rule

Block: Enable the Attack Surface Reduction rule

Audit: Evaluate how the attack surface reduction rule would impact your organization if enabled

Warn: Enable the Attack Surface Reduction rule but allow the end user to bypass the block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does attack surface reduction rules in audit mode do?

A

to evaluate how attack surface reduction rules would impact your organization if they were enabled. It’s best to run all rules in audit mode first so you can understand their impact on your line-of-business applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where can you enable attack surface reduction rules?

A

Microsoft Intune
Mobile Device Management (MDM)
Microsoft Endpoint Configuration Manager
Group Policy
PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Device info Risk level, Exposure level, Health state, Ati virus status

A

Risk level - overall risk assessment of the device based on a combination of factors, including the types and severity of active alerts on the device

Exposure level - the current exposure of the device based on the cumulative impact of its pending security recommendations
if level syays “No data available” the device hasnt reported in 30 days, OS isnt suppored, or stale agent

Health state - Active (reporting), Inactive (no signal for 7 days), Misconfigured (impaired communications)

Antivirus status - Disabled (virus and threat detection turned off), Not reporting, Not updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Investigating a device (Response actions)

A

Manage tags

Isolate device

Restrict app execution

Run antivirus scan

Collect investigation package

Initiate Live Response Session

Initiate automated investigation

Consult a threat expert

Action center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Onboarding devices (modes of discovery)

A

Basic discovery: In this mode, endpoints passively collect events in your network and extract device information from them. Basic discovery uses the SenseNDR.exe binary for passive network data collection and no network traffic will be initiated. Endpoints extract data from every network traffic that is seen by an onboarded device. With basic discovery, you’ll only gain limited visibility of unmanaged endpoints in your network.

Standard discovery (recommended): This mode allows endpoints to actively find devices in your network to enrich collected data and discover more devices - helping you build a reliable and coherent device inventory. In addition to devices that were observed using the passive method, standard mode also uses common discovery protocols that use multicast queries in the network to find even more devices. Standard mode uses smart, active probing to discover additional information about observed devices to enrich existing device information. When Standard mode is enabled, minimal, and negligible network activity generated by the discovery sensor might be observed by network monitoring tools in your organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How should a security analyst react to discovering an interesting event?

A

a flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Device actions (containment actions)

A

Isolate Device

Restrict app execution

Run antivirus scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Device actions (Investigation actions)

A

Initiate Automated Investigation

Collect investigation package

Initiate Live Response Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can you see the actions performed on a device?

A

Action Center

18
Q

What kind of file is downloaded when trying to get an investigation package?

19
Q

Investigation Package material

A

Autoruns - files that each represent the content of the registry of a known auto start entry point (ASEP)

Installed Programs - .CSV list of installed programs

Network Connections -
ActiveNetConnections.txt – Displays protocol statistics and current TCP/IP network connections. It provides the ability to look for suspicious connectivity made by a process.

Arp.txt – Displays the current address resolution protocol (ARP) cache tables for all interfaces.

ARP cache can reveal other hosts on a network that have been compromised or suspicious systems on the network that might have been used to run an internal attack.

DnsCache.txt - Displays the contents of the DNS client resolver cache, which includes both entries preloaded from the local Hosts file and any recently obtained resource records for name queries resolved by the computer. This can help in identifying suspicious connections.

IpConfig.txt – Displays the full TCP/IP configuration for all adapters. Adapters can represent physical interfaces, such as installed network adapters, or logical interfaces, such as dial-up connections.

FirewallExecutionLog.txt and pfirewall.log

Prefetch files - Prefetch files are designed to speed up the application startup process. It can be used to track all the files recently used in the system and find traces for applications that might have been deleted but can still be found in the prefetch file list.

Process - .CSV listing the running processes, which provide the ability to identify current processes running on the device.

Schedualed tasks - .CSV listing the scheduled tasks

Security event log - login activity

Services - .CSV services and their state

Windows SMB sessions - Lists shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network

System informaiton - a SystemInformation.txt file that lists system information such as OS version and network cards

Temp directions - set of text files that lists the files located in %Temp% for every user in the system

Users & groups -

WdSupportLogs - Provides the MpCmdRunLog.txt and MPSupportFiles.cab.

CollectionSummaryReport.xls - summary of the investigation package collection, it contains the list of data points, the command used to extract the data, the execution status, and the error code if there’s failure

20
Q

Live response

A

user will need Manage Portal Settings permissions & the device needs an automation remediation level assigned

Run basic and advanced commands to do investigative work on a device.

Download files such as malware samples and outcomes of PowerShell scripts.

Download files in the background (new!).

Upload a PowerShell script or executable to the library and run it on a device from a tenant level.

Take or undo remediation actions.

21
Q

Live response output types

22
Q

Live response limitations

A

Live response sessions are limited to 10 live response sessions at a time.

Large-scale command execution isn’t supported.

Live response session inactive timeout value is 5 minutes.

A user can only initiate one session at a time.

A device can only be in one session at a time.

The following file size limits apply:

Getfile limit: 3 GB

Fileinfo limit: 10 GB

Library limit: 250 MB

23
Q

Investigating a File

A

Observed in orginization tab - specify a date range to see which devices have been observed with the file. This tab will show a maximum of 100 devices. To see all devices with the file, export the tab to a CSV file

Deep analysis tab - submit the file for deep analysis to uncover more details about the file’s behavior and its effect within your organizations
File needs to be a PE file (.exe or.dll)

24
Q

File response actions on top of file page

A

Stop and Quarantine File

Add Indicator

Download file

Action center

25
Investigating an IP address
IP worldwide Reverse DNS names Alerts related to this IP IP in organization Prevalence - displays how many devices have connected to this IP address and when the IP was first and last seen. You can filter the results of this section by time period; the default period is 30 days.
26
Investigating a domain
URL details, Contacts, Nameservers Alerts related to this URL URL in organization Most recent observed devices with URL
27
What information is provided by a deep file analysis?
Registry Modifications NOT Command history NOT Code change hostory
28
Advanced features page in the Settings/General area provides the following automation-related settings
Automated Investigation - Enables the automation capabilities for investigation and response. Enable EDR in block mode- When turned on, Microsoft Defender for Endpoint uses behavioral blocking and containment capabilities by blocking malicious artifacts or behaviors observed through post-breach endpoint detection and response (EDR) capabilities. This feature doesn't change how Microsoft Defender for Endpoint performs detection, alert generation, and incident correlation. Automatically resolve alerts - Resolves an alert if Automated investigation finds no threats or has successfully remediated all malicious artifacts. Allow or block file - Make sure that Windows Defender Antivirus is turned on and the cloud-based protection feature is enabled in your organization to use the allow or block file feature.
29
(Automation upload) What to enable to so that certain files and email attachments can automatically be uploaded to the cloud for more inspection in Automated investigation
File Content Analysis
30
(Automation upload) What to enable if you would like Microsoft Defender for Endpoint to automatically investigate memory content of processes?
Memory Content Analysis
31
Automated investigations Automation levels
Full - remediate threats automatically, can be viewed in the Action Center on the History tab Semi - require approval for any remediation,actions can be viewed and approved in the Action Center, on the Pending tab No automation -
32
Block at risk devices (required role)
Microsoft Defender portal - Security Admin, to manage advanced settings Microsoft Defender for Endpoints Admin role Intune - Security Admin with managment permissions Entra ID portal - Security Admin or Conditional Access admin
33
The Advanced features page in the General area of the Settings - Endpoints menu of the Microsoft Defender portal provides the following alert and detection-related settings
Live Response - Allows users with appropriate RBAC permissions to investigate devices that they're authorized to access, using a remote shell connection. Live Response unsigned script execution - Enables using unsigned scripts in Live Response. Custom network indicators - Configures devices to allow or block connections to IP addresses, domains, or URLs in your custom indicator lists.
34
Where to go for alert tuning
Microsoft Defender > Settings > Microsoft Defender XDR > Rules > Alert tuning
35
Manage IoC
Cloud detection engine - regularly scans collected data and tries to match the indicators you set Endpoint prevention engine - if Microsoft Defender AV is the primary AV configured, the matched indicators will be treated according to the settings Automated investigation and remediation engine - Supported actions -Allow, Alert only, Alert and block There's a limit of 15,000 indicators per tenant.
36
Create indicators for files
By creating an indicator through the settings page By creating a contextual indicator using the add indicator button from the file details page
37
Create indicators for IPs and URLs/domains
Defender for Endpoint can block what Microsoft deems as malicious IPs/URLs through Windows Defender SmartScreen for Microsoft browsers and through Network Protection for non-Microsoft browsers or calls made outside of a browser.
38
What file type can be used to upload IoC?
CSV
39
Vulnerability managment
uses the same agentless built-in Defender for Endpoint sensors to reduce cumbersome network scans and IT overhead
40
The Reports area in the Microsoft Defender portal has a Vulnerable devices report
Severity level graphs - Each device is counted only once according to the most severe vulnerability found on that device. Exploit availability graphs - Each device is counted only once based on the highest level of known exploit. Vulnerability age graphs - Each device is counted only once under the oldest vulnerability publication date. Older vulnerabilities have a higher chance of being exploited. Vulnerable devices by operating system platform graphs - The number of devices on each operating system that are exposed due to software vulnerabilities. Vulnerable devices by Windows version graphs - The number of devices on each Windows version that are exposed due to vulnerable applications or OS.
41
Which report lists the software vulnerabilities your devices are exposed to by listing the Common Vulnerabilities and Exposures (CVE) ID?
Weakness
42
Which report or dashboard provides a list of the most recently published threat reports?
threat analytics