Bypassing Security Controls

Bypassing Security Controls (Windows/Mac)

The following out-of-the-box alert rules are assigned to the (Windows/Mac) Category: BYPASSING SECURITY CONTROLS.

ALERT RULE

Description

Opening ObserveIT Agent folder

An alert is triggered upon opening the folder in which the ITM On-Prem (ObserveIT) Agent is installed, potentially for tampering or covering tracks.

Running TOR browser

An alert is triggered upon running TOR (The Onion Ring) browser in order to access the TOR network (the Dark Web). Such an operation could indicate that a user wants to hide his identity while performing illegal activity.

Adding Windows Firewall Rules

An alert is triggered upon opening the built-in Windows Add New Rule screen in Firewall settings to define a new rule.

Changing computer data or time

An alert is triggered upon opening the built-in Windows date and time settings screen potentially to change the time or data, in order to manipulate the documentation of user actions or to avoid expiration of time-limited software license.

Configuring Windows Firewall Status

An alert is triggered upon opening the built-in Windows Firewall settings screen, potentially to turn off the settings before performing incoming or outgoing networking that is usually blocked by Firewall.

Configuring Windows LAN or Proxy Settings

An alert is triggered upon opening the built-in Windows LAN/Proxy settings screen, potentially to configure internet access through a 3rd party in order to hide the IP or identity of the user.

Configuring Windows VPN Connection

An alert is triggered upon opening the built-in Windows VPN settings screen, potentially to configure access to a private network that would not be available otherwise.

Creating a new virtual machine instance

An alert is triggered upon creating a new virtual machine instance in one of the predefined virtualization solutions.

Logging in with local user account

An alert is triggered upon performing login with a domain name which is not included in predefined domains. Such a login is usually a local user login in which the domain name is the machine name (typical to laptops disconnected from an organization’s network).

Running VPN, Proxy or Tunneling tools

An alert is triggered upon running advanced networking tools either to enable access to private networks or to hide the user identity.

Changing Internet security settings

An alert is triggered upon customizing the security level in Internet Properties. The operation can indicate an early intent to bypass security controls in Internet and bring in dangers.

Running a partially monitored browser

This alert will be triggered upon using Opera browser, which is only partially monitored by ITM On-Prem (ObserveIT) (no URL capturing). This operation can indicate an early intent to hide information and cover tracks from the organization.

Browsing to website related to MIMIKATZ utility

An alert is triggered upon downloading a file related to the MIMIKATZ utility which allows playing with Windows security.

Downloading the MIMIKATZ utility

An alert is triggered upon browsing or searching website related to the MIMIKATZ utility which allows playing with Windows security.