Tanium Trace User Guide
Total Page:16
File Type:pdf, Size:1020Kb
Tanium Trace™ User Guide Version 2.0.5 April 26, 2017 The information in this document is subject to change without notice. Further, the information provided in this document is provided “as is” and is believed to be accurate, but is presented without any warranty of any kind, express or implied, except as provided in Tanium’s customer sales terms and conditions. Unless so otherwise provided, Tanium assumes no liability whatsoever, and in no event shall Tanium or its suppliers be liable for any indirect, special, consequential, or incidental damages, including without limitation, lost profits or loss or damage to data arising out of the use or inability to use this document, even if Tanium Inc. has been advised of the possibility of such damages. Any IP addresses used in this document are not intended to be actual addresses. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Please visit https://docs.tanium.com for the most current Tanium product documentation. Tanium is a trademark of Tanium, Inc. in the U.S. and other countries. Third-party trademarks mentioned are the property of their respective owners. © 2017 Tanium Inc. All rights reserved. © 2017 Tanium Inc. All Rights Reserved Page 2 Table of contents Tanium Trace overview 8 About the Trace Event Recorder 8 Types of recorded events 8 Sources of Event Recorder data 9 Integration with other Tanium products 9 Tanium Connect™ 10 Tanium Incident Response™ 10 Tanium IOC Detect™ 10 Tanium Protect™ 10 Tanium Trends™ 10 Getting started with Trace 12 Requirements 13 Tanium dependencies 13 Endpoint hardware and software requirements 13 Tanium Module Server computer resources 14 Third-party software 14 Host and network security requirements 14 Ports 14 Security exclusions 15 Console roles and privileges 15 Installing Trace 16 Set up Trace 16 Import the Trace Module 16 © 2017 Tanium Inc. All Rights Reserved Page 3 Add Computer Groups to Trace Setup Action Group 17 Install Trace on endpoints 17 Configure Sysmon 17 Configure Endpoint Database settings 18 Initialize endpoints 19 Configure access control 20 Upgrade the Trace version 20 Connecting to Live Endpoints and taking Snapshots 22 Connect to a live endpoint 22 Add a Live Endpoint 22 Capture a Snapshot 23 Close the connection 23 Manage Snapshots 23 Export a Snapshot from an endpoint 23 Upload a Snapshot 24 Delete a Snapshot 25 Exploring endpoint processes and events 26 Search for events 26 View Event Distribution 27 Filter the Events Grid 27 View Process and Event Details 28 View Process timeline 30 View Process tree 31 How reputation data works with Trace 32 Saving evidence for analysis 34 © 2017 Tanium Inc. All Rights Reserved Page 4 Save files 34 Download a file 35 View file properties and values 35 Delete a file 35 Save events 36 Create Protect Rules 36 Delete an event 36 Manage Trace IOCs 37 Generate an IOC 37 Edit an IOC 38 Delete a Trace IOC 38 Suggested reading 38 Searching across the enterprise 39 Ask an enterprise-wide Question 39 Hunt across the enterprise 40 Trace use cases 43 Example 1: Scan the enterprise and drill down 43 Example 2: Pivot from the endpoint to enterprise-wide 43 Example 3: Trace evidence and other Tanium Solutions 44 Troubleshooting Trace 45 Update the Trace Service URL 45 Change the Module Server address 45 Prioritize the Endpoint Event Database configuration 45 Resolve live endpoint connection problems 46 Collect a troubleshooting package 48 © 2017 Tanium Inc. All Rights Reserved Page 5 Manually back up and restore Trace configurations 48 Remove Trace Tools 49 Uninstall Trace 49 Reference: Setting up the Trace Zone Proxy Service 51 Trace Zone Proxy Service connections and certificates 51 Separate Tanium Server and the Tanium Module Server with split DNS 52 Installation 52 Install the TZ Hub 52 Generate TZ Hub certificates 52 Install the TZ Proxy 53 Generate TZ Proxy certificates 53 Copy certificates 54 Configuration 55 Configure the TZ Proxy 55 Configure the TZ Hub 56 Manage the TZ Proxy and TZ Hub services 57 Configure endpoints to connect to TZ Proxies 58 Upgrade the Trace Zone Proxy Service 59 Upgrade the Hub 59 Upgrade the TZ Proxy on each Zone Server 60 Troubleshoot the Trace Zone Proxy Service 60 Check the connection information 60 Check the zone_servers.json file 60 Check the TZ Hub log entries 61 Reference: Trace Sensors 62 © 2017 Tanium Inc. All Rights Reserved Page 6 Trace Sensors 62 Trace Executed Processes 62 Trace File Operations 63 Trace Logon Events 64 Trace Network Connections 65 Trace Registry Keys or Values 66 Trace Loaded Drivers 67 Trace Executed Process Trees 68 Trace Diagnostic Sensors 69 © 2017 Tanium Inc. All Rights Reserved Page 7 Tanium Trace overview With Tanium Trace™ (Trace), you can directly investigate key forensic and security events on Linux and Windows endpoints across the network. Trace provides a live and historical view of critical events including process execution, logon history, network connections, and file and registry changes. The Trace solution is comprised of three parts: l The Trace Event Recorder that monitors event data on the endpoint. l The Trace interface where you can explore and manage endpoint Trace data. l The Sensors for issuing searches across the entire enterprise for Trace data. About the Trace Event Recorder The Trace Event Recorder (Event Recorder) is responsible for continuously saving key forensic evidence on each endpoint. The Event Recorder works by monitoring the endpoint kernel and other low-level subsystems to capture a variety of events. Because data can accumulate quickly, even when a system is idle, Trace intelligently collates similar events and efficiently stores them in a local database. With these optimizations, the default configuration can retain up to several months of historical data. You can customize the amount of local storage that is consumed by Trace, and filter the types of recorded evidence. Traditional disk and memory forensics techniques can successfully reconstruct fragments of endpoint activity, but are limited to the evidence that is natively preserved by the underlying operating system. This type of evidence from a period of interest can rapidly degrade as time elapses. Trace maintains a complete, easy-to-interpret history of events so you can replay recent system events. Types of recorded events Trace records a broad range of events, that include additional context and metadata, as well as UTC timestamps. Recorded event examples include: process execution, file system activity, registry changes, network connections, driver loads, and user authentication. All process events are recorded; however, you can specify which registry, network, file, and security events are recorded. Tip: For more meaningful databases and to retain data for longer periods, consider excluding events that reoccur in high numbers; for example, file write operations. © 2017 Tanium Inc. All Rights Reserved Page 8 Event filtering is based on the following types. Table 1: Event filtering types Event Description type File File system events, such as files copied to directory locations on the endpoint. The associated process and user context are included. An example is a malware file copied to a location that is used by Windows Update. Network Network connection events, such as an HTTP request to an Internet location, including the associated process and user context. Events are recorded for all inbound and outbound connections. l Outbound: Connections, attempts, successes, disconnects, and failures are logged. l Inbound: Only accepted connections and disconnects are logged. Process Process create, child process create, and process exit events. The full command line, hash, parent process metadata, and user context are included. Process events are always gathered, you cannot filter them out. Registry [Windows only] Changes to the Registry including the creation or alteration of registry keys and settings. The associated process and user context are included. Security Security events include authentication, privilege escalation, and more. This event type includes logon events, even if logs have rolled. Sources of Event Recorder data The Event Recorder gathers data from multiple sources into a single, local database on the endpoint. Kernel events are gathered from Linux and Windows tools. The optional Microsoft Sysmon configuration provides additional information about the executed processes on Windows endpoints. Integration with other Tanium products Trace is a powerful product on its own; however, when coupled with other Tanium products it provides the ability to apply the findings from your investigation as you investigate or at any time after. The findings from an investigation are essential inputs to short and long-term remediation plans, and they can be developed in parallel to the investigation from the start. © 2017 Tanium Inc. All Rights Reserved Page 9 Tanium Connect™ Trace ingests data from Tanium Connect™ (Connect) to elaborate on process hash events. The source data colors these events for an at-a-glance reputation status assessment from multiple threat intelligence providers. Tanium Incident Response™ Trace works with Tanium Incident Response™ (Incident Response) to provide Enterprise Hunting at scale. Using Sensors from either solution, you can search across endpoints by operating system or intrusion lifecycle phase, and for specific types of evidence. For example, you could use the Autorun Program Details Sensor to search for all persistent binaries in your environment. Some Sensors also include common use buttons that fill parameter fields, such as the Trace Executed Processes PowerShell Suspicious Command Line Arguments search on Windows endpoints. The results from all endpoints are presented as an actionable Interact grid within Trace. Tanium IOC Detect™ Use Trace evidence from a single endpoint to create Tanium IOC Detect™ (IOC Detect) indicators of compromise (IOCs) to scan endpoints across the network.