2021 StealthINTERCEPT® Admin Console User Guide StealthINTERCEPT®

TOC

StealthINTERCEPT Admin Console Overview 14

Understanding StealthINTERCEPT Components 14

Policies 17 Policy Templates 18

StealthINTERCEPT Agent Information 19

Solution Overview 24

StealthINTERCEPT for 25 StealthINTERCEPT for Enterprise Password Enforcement 26 StealthINTERCEPT for Exchange 27 StealthINTERCEPT for 28 StealthINTERCEPT for LDAP 29

Getting Started with StealthINTERCEPT 29

Navigation & Configuration of the SI Admin Console 33

Menu Windows 39

Collection Manager Window 40 Preconfigured Collections 41 List of Collections Window 44 Dynamic Collections 52 Database Maintenance Window 58 Archive Data 62 Configure Database Maintenance 63 Enable Database Maintenance 67 Schedule Database Maintenance 68 Database Partitioning Window 69 EPE Settings Window 74 Event Database Configuration Window 86 Event Filtering Configuration Window 87 Export Policies and Templates Window 94 Doc_ID 371 2

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

File Monitor Settings Windows 96 Select Accounts to Exclude from Collections 97 Select Local Processes for Exclusion 98 Import Window 99 Password Safe Configuration Window 101 Profiles Tab 101 Scripts Tab 103 SI System Alerting Window 104 Email Tab 106 Configure SMTP Host Information 108 Create Message Profiles 109 Event Log Tab 114 SIEM Tab 115 Configure SIEM 116 Adding a Custom SIEM Mapping File 119 StealthDEFEND Configuration Windows 121 Event Sink Tab 122 Honey Token Tab 123 Forged PAC Tab 125 Users and Roles Window 126 Add SI Users 129 Modify SI User Assigned Rights 131 Users and Roles Window 133

Policy Center 137

Agents Interface 154

Deploy Agents Window 159 Enter Credentials Window 160 Select Computers Window 161 Set Options Window 164 Credential Verification Window 167

Doc_ID 371 3

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Status Window 167 Agents Interface Right-Click Menu 168 SI Agent Right-Click Menu Configurations 170 Install SI Agents 171 Uninstall SI Agent 173 Upgrade Agent 173 Update Agent Settings 175 Start Agent 175 Stop Agent 176 Start Pending Modules 177 Harden Agent 177 Soften Agent 178 Remove Server from List 179 Clear SQLite Agent Queue 179 Log Level Configuration Window 180 Access SI Agent Log Files 182 Access the Enterprise Manager & Administration Console Log Files 183 SI Agent Safe Mode 185 How To Enable Agent Started in AD Monitor Pending Mode Email Alert 186 Agent Installer Update Window 187 Configure Auto Deploy Window 188

Alerts Interface 190

Policy Comparison Window 195

Analytics Interface 196

Investigate Interface 198

Filtered Investigate Views 206 EPE & LDAP Summary Folders 207

Policies Interface 210

Policies Node Right-Click Menu 212 Protect Policies 213

Doc_ID 371 4

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Protect Objects 215

Templates Interface 218

Template Node Right-Click Menu 220 TAGS Node 220

Policy & Template Configuration 222

Policy & Template Configuration 222

Actions Tab 223 File Actions 226 .NET Script Actions 229 StealthINTERCEPT Script Editor Tools 232 PowerShell 4.0 Actions 233 Event Type Tab 236 StealthINTERCEPT for Active Directory Solution Event Types 239 Active Directory Changes Event Type 240 Active Directory Lockdown Event Type 241 Active Directory Read Monitoring Event Type 241 AD Replication Lockdown Event Type 242 AD Replication Monitoring Event Type 243 Authentication Event Type 244 Authentication Lockdown Event Type 245 Effective Group Membership Event Type 245 GPO Setting Changes Event Type 246 GPO Setting Lockdown Event Type 246 LSASS Guardian – Monitor Event Type 246 LSASS Guardian – Protect Event Type 247 StealthINTERCEPT for Enterprise Password Enforcement Solution Event Type 247 Password Enforcement Event Type 247 StealthINTERCEPT for Exchange Solution Event Types 249 Exchange Changes Event Type 249

Doc_ID 371 5

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Exchange Lockdown Event Type 250 StealthINTERCEPT for File System Solution Event Types 250 File System Changes Event Type 251 Monitor NAS Devices 252 File System Lockdown Event Type 253 File System StealthAUDIT Event Type 254 FSMO Role Monitoring 254 StealthINTERCEPT for LDAP Solution Event Type 255 LDAP Lockdown Event Type 255 LDAP Monitoring Event Type 256 Configure LDAP Monitoring for StealthDEFEND 256 General Tab 257 Recent Events Tab 262 Window 267 Event Tracker Window 269 Execute PS Script 269 Reports Tab 270 Link Reports to Policy/Template 271

Event Filters Overview 274

Selecting an SI Agent for a Browser Window 274

Browser Window Modes 275

Event Filter Tabs 277

Selection Windows 277 Add IP Address Window 277 Attribute List Window 277 Class List Window 278 Select Active Directory Context Window 279 Select Active Directory Objects Window 280 Select Active Directory Objects Window 281 Select Active Directory Perpetrators Window 282

Doc_ID 371 6

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Select Active Directory Trustees Window 283 Select AD Groups Windows 284 Select Computer Window 285 Select Domains and Servers Window 286 Select Exchange Objects from Active Directory Window 287 Select File System Objects Window 288 Test Passwords Window 289 Window 291 AD Account Filter 291 AD Attributes Filter 292 AD Classes and Attributes Filter 294 AD Classes Filter 294 AD Context Filter 295 AD Event Filter 296 AD Group Policy Object Changes Filter 297 AD Group Policy Object Filter 298 AD Groups Filter 298 AD Objects and Containers Filter 299 AD Objects Filter 301 AD Perpetrator Filter for Lockdown 301 AD Perpetrator Filter for Monitoring 302 Additional Agents Filter 303 Advanced Filter 304 Authentication Protocol Filter 306 Authentication Policy Differences Between v7.0 and per-v7.0 307 Domains/Servers Filter 308 Exchange Event Filter for Lockdown 309 Exchange Event Filter for Monitoring 310 Exchange Mailbox Objects and Containers Filter 311 Exchange Perpetrators Filter 312 Exchange Trustees Filter 313

Doc_ID 371 7

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

File System Agents Filter 314 File System Filter for Lockdown 315 File System Filter for Monitoring 316 File System Paths Filter 318 File System StealthAUDIT Filter 319 FSMO Roles Filter 320 Hosts (from) Filter for Lockdown 321 Hosts (from) Filter for Monitoring 322 Hosts (to) Filter for Lockdown 322 Hosts (to) Filter for Monitoring 323 IP Addresses (from) Filter 324 IP Addresses (to) Filter 324 LDAP Query Filter for Lockdown 325 LDAP Query Filter for Monitoring 326 LDAP Attributes Filter 327 LDAP Result Filter 327 LDAP Runtime Filter 328 LDAP Filter 329 Open Flags Filter 330 Password Rules Filter 330 Permissions Filter 336 Perpetrators to Exclude Filter 337 Processes and Configuration Filter 337 Processes Filter for Lockdown 338 Processes Filter for Monitoring 339 Rule Preview Filter 339 Success Filter 340 User Account Control Filter 341

Policy Templates 342

Import SI Pre-Created Policy Templates 342

Doc_ID 371 8

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Folder Structure for Pre-Created Policy Templates 343

Using Templates to Create Policies 395

Report Templates 397

StealthINTERCEPT Analytics Guide 415

Analytics 425

Bad User ID (by Source Host) Analytic Type 425 Configure Bad User ID (by Source Host) Analytic Policy 426 Bad User ID (by Source Host) Analytic Data Grid 428 Bad User ID (by User) Analytic Type 430 Configure Bad User ID (by User) Analytic Policy 430 Bad User ID (by User) Analytic Data Grid 433 Breached Password Analytic Type 434 Configure Breached Password Analytic Policy 435 Breached Password Analytic Data Grid 437 Brute Force Attacks Analytic Type 439 Configure Brute Force Attacks Analytic Policy 440 Brute Force Attacks Analytic Data Grid 442 Concurrent Logins Analytic Type 444 Configure Concurrent Logins Analytic Policy 444 Concurrent Logins Analytic Data Grid 447 File System Attacks (by User) Analytic Type 449 Configure File System Attacks (by User) Analytic Policy 449 File System Attacks (by User) Analytic Data Grid 452 Forged PAC Analytic Type 455 Configure Forged PAC Analytic Policy 455 Forged PAC Analytic Data Grid 458 Golden Ticket Analytic Type 459 Configure Golden Tickets Analytic Policy 459 Golden Tickets Analytic Data Grid 462 Horizontal Movement Attacks Analytic Type 463

Doc_ID 371 9

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Configure Horizontal Movement Attacks Analytic Policy 463 Horizontal Movement Attacks Analytic Data Grid 466 Impersonation Logins Analytic Type 468 Configure Impersonation Logins Analytic Policy 468 Impersonation Logins Analytic Data Grid 471 Kerberos Weak Encryption Analytic Type 473 Configure Kerberos Weak Encryption Analytic Policy 473 Kerberos Weak Encryption Analytic Data Grid 474 User Account Hacking Analytic Type 475 Configure User Account Hacking Analytic Policy 476 User Account Hacking Analytic Data Grid 479

LDAP Operations Center 482

Create & Configure an LDAP Policy 483

Troubleshooting within the SI Admin Console 489

LSASS Process Terminated 490

How To Enable LSASS Process Terminated Email Alert 491

SI Agent Not Communicating with the Enterprise Manager 492

Bind To 493

Exchange Lockdown Considerations 493

Delegations through Outlook 493

Best Practices for StealthINTERCEPT Users 496

Best Practice #1 – Collect What You Need, NOT Everything 496

Best Practice #2 – Database Maintenance? Use It! 496

Best Practice #3 – Analytics? Turn on One at a Time & Tune 496

Best Practice #4 – Monitor before Blocking 497

Best Practice #5 – File System ‘Read’ Monitoring, in Moderation 497

Doc_ID 371 10

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

More Information 498

StealthINTERCEPT Appendices 499

Appendix: Release Notes 499

StealthINTERCEPT v7.3 New & Improved Features 499 StealthINTERCEPT v7.2 New & Improved Features 500 StealthINTERCEPT v7.1 New & Improved Features 501 StealthINTERCEPT v7.0 New & Improved Features 503 StealthINTERCEPT v6.1 New & Improved Features 505 StealthINTERCEPT v6.0 New & Improved Features 506 StealthINTERCEPT v5.2 New & Improved Features 508 StealthINTERCEPT v5.1 New & Improved Features 509 StealthINTERCEPT v5.0 New & Improved Features 511 StealthINTERCEPT v4.1 New & Improved Features 514 StealthINTERCEPT v4.0 New & Improved Features 516 StealthINTERCEPT v3.4 Service Pack 2 New & Improved Features 518 StealthINTERCEPT v3.4 Service Pack 1 New & Improved Features 521 StealthINTERCEPT v3.4 New & Improved Features 522 StealthINTERCEPT v3.3 Service Pack 2 New & Improved Features 523 StealthINTERCEPT v3.3 Service Pack 1 New & Improved Features 524 StealthINTERCEPT v3.3 New & Improved Features 524 StealthINTERCEPT v3.1 New & Improved Features 525 StealthINTERCEPT v3.0 New & Improved Features 525 StealthINTERCEPT v2.6 New & Improved Features 528 StealthINTERCEPT v2.5 New & Improved Features 528

Appendix: QIDmap Information for QRadar SIEM Integration 528

Appendix: StealthINTERCEPT Stored Procedures 535

Appendix: PowerShell API Integration 539

Load the SI PowerShell Module 541 Enable or Disable a Policy 542 Delete a Policy 542

Doc_ID 371 11

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Add or Modify Policies 542 Export Policy to an XML File 542 Import Policy from an XML File 543 Get Collections 544 Remove a Collection 544 Add or Modify Collections 544 Export Collections to an XML File 544 Import Collections from an XML File 545 Enterprise Password Enforcer (EPE) 546 Password Validation Test Against EPE Rules 546 Import Character Substitutions 547 Export Character Substitutions 547 Import Character Substitution Words 547 Export Character Substitution Words 548 Import Passwords Dictionary 548 Export Passwords Dictionary 548 Set the Pwned Database 549 StealthDEFEND Event Sink Tab 549 Set StealthDEFEND Configuration 549 Get StealthDEFEND Configuration 550 LDAP Deception for StealthDEFEND 550 Get LDAP Deception 550 Set LDAP Deception 550 Not an SI Policy XML Expert 551 Remote PowerShell Connection 551

Appendix: Default Custom Scripts 552

Default Visual Basic Script 552 Default C# Script 557 Default PowerShell 4.0 Script 563

Appendix: Action Template Custom Scripts 566

Doc_ID 371 12

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Account Enablement 566 Password Never Expires 570 and/or Unlock Account 574 Password Changes 577 Password Rejection 581

Doc_ID 371 13

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® StealthINTERCEPT Admin Console Overview StealthINTERCEPT provides inspection, alerting, and policy enforcement, closing back doors and providing administrators and auditors detailed records of every change, access, and authentication activity. It is the ultimate security enhancement for those seeking to both protect sensitive assets and eliminate downtime from careless error.

StealthINTERCEPT protects business critical systems and sensitive data from threats such as Malware and Ransomware. When a suspicious pattern of activity is identified an appropriate alert is issued along with immediate remediation; the compromised user account is blocked from further authentications as well as being blocked from accessing files. Protect > Detect > Alert > Remediate.

Organizations looking to tighten their security and compliance posture, automate administration, reduce helpdesk traffic, and proactively prevent unauthorized changes can finally obtain the functionality they have needed for years but could never previously achieve due to limitations in native Windows® logging and security controls.

StealthINTERCEPT seamlessly integrates with SIEM, sending rich and context laden data in real- time, removing the need for native logs. By sending SIEM reliable and insightful data, an organization will realize the true potential of the investment while securing its business critical systems and data.

With a FIPS 104-2 compliant architecture, StealthINTERCEPT has been built specifically for the modern security landscape.

Understanding StealthINTERCEPT Components StealthINTERCEPT (SI) monitors events in real-time, gathers and processes event data, then outputs that data in usable ways. StealthINTERCEPT components allow users to create and configure policies to control what is monitored, where and when. Users can also create and control responses to event data via reports, alert notifications, analytic triggers, as well as take actions with scripts.

SI is comprised of the following:

l Software Components

l Analytics

l Policies & Policy Templates

l Database Components

Doc_ID 371 14

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Software Components

StealthINTERCEPT consists of a number of components which work together to monitor and report on activity on a network:

l StealthINTERCEPT Enterprise Manager

l StealthINTERCEPT Win Console (SI Admin Console)

l StealthINTERCEPT Web Reports (SI Reporting Console)

l StealthINTERCEPT Agents deployed across the environment

StealthINTERCEPT Architecture

StealthINTERCEPT Enterprise Manager

The StealthINTERCEPT Enterprise Manager stores and maintains policies and policy templates, as well as receives and processes all captured events. Only one Enterprise Manager is needed for any environment.

StealthINTERCEPT Administration Console

The StealthINTERCEPT Administration Console is used to configure StealthINTERCEPT by creating and managing policies and their associated alerts and actions. It can be installed on more than one computer and executed by multiple users on a computer, but only one instance of the SI Admin Console can be open per user at a time. A notification message will appear across open consoles when configuration changes are made by another user.

StealthINTERCEPT Reporting Console

Doc_ID 371 15

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The StealthINTERCEPT Reporting Console provides a way to and to generate reports for the event data that is collected by agents and stored in the event database. Reports can be generated manually and/or scheduled to generate as needed. See the StealthINTERCEPT Reporting Console User Guide for additional information.

StealthINTERCEPT Agents

The StealthINTERCEPT Agents retrieve configuration data from the Enterprise Manager, monitor network activity, and report events to the Enterprise Manager. The events collected by an agent are those specified by the policies which are currently active in the system. There must be an agent deployed on every server being monitored. See the StealthINTERCEPT Agent Information section for information on where to deploy SI Agents and supported platforms. See the Agents Interface section for deployment procedures.

Analytics

StealthINTERCEPT’s Analytics engine identifies patterns based upon observed activities that may indicate a security incident is in process or being attempted. For example, the frequency of an event over a particular time period or a combination of events with one or more correlating attribute could indicate a security risk incident is in process. See the StealthINTERCEPT Analytics Guide section for additional information.

Policies & Policy Templates

In order for StealthINTERCEPT to monitor activity on a network, it must be configured to monitor the desired activity. Most of this configuration is done with StealthINTERCEPT Policies.

At a high level, a policy is a definition describing the types of event data to monitor. As events occur, if all the described filters are met, the event data is captured and sent through to the reporting database. Policies can also be defined to block events where all filters are met, and information about the attempted change is sent to the reporting database.

A StealthINTERCEPT Policy is a specification, configured in the SI Admin Console, for events that provide evidence of a high-level policy violation. For example, if there is an

Doc_ID 371 16

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

organizational policy stating only members of the Administrators group can create user accounts, then an SI Policy can be configured to detect when a user account is created by someone other than a member of the Administrators group.

Policies A StealthINTERCEPT Policy has many attributes which define the activities and objects it monitors, where on a network that policy applies, and when it is active. These policy attributes are organized into the following major policy components:

General

General components include the name and description of the policy, policy creation and modification information, policy schedule, whether or not the policy is sending alerts, and whether or not the policy is enabled.

The schedule controls when the policy is active. For example, if it is desired that certain activity be more closely monitored outside of regular business hours, then a policy can be created and scheduled to be active only outside of regular business hours.

Event Type

Event Type components indicate what kind of events are to be monitored or blocked by the policy. A single policy can contain multiple event types, including from different event sources. For example, a policy might monitor the creation of user accounts in Active Directory.

Each event type has an optional set of filters associated with it. The available filters vary depending on the event source.

Actions

Actions components are used to process and respond to events once they have been captured. A policy can include one or more actions (or event consumers). It can also have no actions, but this is not recommended. Actions are policy specific and cannot be shared between policies. However, they can be exported with a policy.

An SI Policy can also be associated with specific report templates, for use in the SI Reporting Console. See the Policy & Template Configuration section for additional information.

Doc_ID 371 17

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Policy Templates A policy template is an inactive policy specification that can be used to create active policies. Policy templates contain one or more event types that match a set of related events.

Some settings in a policy template are necessarily generic. For example, the filters associated with the event types of a template may need to be refined to refer to a particular local domain, container, or group.

There are usually no actions associated with a policy template because these are typically customized for a particular installation, e.g. the name of a text file, the connection information for a local SMTP server, etc.

See the Policy Templates section for additional information.

Database Components

StealthINTERCEPT needs to store event data and configuration information for several components. The following SQL Server® databases are used to store this information:

l NVMonitorConfig database

l NVMonitorData database

NVMonitorConfig Database

This database contains configuration information for the StealthINTERCEPT product. The StealthINTERCEPT Enterprise Manager maintains and shares this information with the SI Agents, primarily policy configuration information. It is created during the installation process of the StealthINTERCEPT Enterprise Manager. See the Installation Process of the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

NVMonitorData Database

This database contains the event activity data captured by SI policies. SI Agents capture these events, as defined by policies, and send them to the StealthINTERCEPT Enterprise Manager. The manager receives, processes, and stores the data in the events database. The SI Reporting Console reads event data and uses it to build reports. It is created during the

Doc_ID 371 18

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

installation process of the StealthINTERCEPT Enterprise Manager. See the Installation Process of the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

StealthINTERCEPT Agent Information StealthINTERCEPT Agents perform real-time monitoring of the events occurring across supported systems and applications. The available modules to be installed during the SI Agents deployment are associated with the StealthINTERCEPT solutions:

l StealthINTERCEPT for Active Directory

l Monitoring and blocking Active Directory and Group Policy Objects (GPO), monitors and blocks Authentication

l Deploy SI Agents on all Domain Controllers with the Windows AD Events module

l For GPO monitoring and blocking, the SI Agent on all Domain Controllers must also have the Windows File System module

l StealthINTERCEPT for Enterprise Password Enforcement

l Blocking creation of passwords which do not meet requirements

l Deploy SI Agents on all Domain Controllers with the Windows AD Events module

l StealthINTERCEPT for Exchange

l Monitoring and blocking Exchange environments

l Deploy SI Agents on all HUB, CAS, and Mailbox Exchange Servers with the Exchange Server Monitoring module

l Must also deploy SI Agents on one Active Directory Domain Controller with the Windows AD Events module

l StealthINTERCEPT for File System

l Monitoring Windows and NAS file systems

l Blocking Windows file systems

l (For Windows file systems) Deploy SI Agents on Windows file servers with the Windows File System module

Doc_ID 371 19

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l (For NAS file systems) Deploy SI Agents on the Windows server acting as a proxy server for NAS activity (where the Stealthbits Activity Monitor activity agent is deployed) with the Windows File System module

l StealthINTERCEPT for LDAP

l Monitoring LDAP searches and reporting on LDAP query execution times and number of objects returned

l Deploy SI Agents on all Domain Controllers with the Windows AD Events module

In order to perform centralized SI Agent maintenance from the SI Console server, WMI must be enabled on the machine where the SI Agent is installed. When executing any of these right-click commands (with the exception of Remove Server from list), the SI Admin Console uses WMI to remotely query the registry on the target agent machine(s) to understand where the SI Agent configuration files are located (install path).

Next, WMI is used to stop the StealthINTERCEPT Agent service, modify the configuration files, and restart the SI Agent. The Credentials used to execute these commands must have enough rights to query information about shares on the target machine. A local administrator account on the targeted machine should have access to the system shares. See the Agents Interface Right- Click Menu section for additional information.

Remember to check StealthINTERCEPT Infrastructure Server Requirements before deploying an SI Agent, including the SI Agent Compatibility with Non-Stealthbits Security Products list. Domain Controllers

This SI Agent tracks all events occurring in Active Directory in real-time. The SI Agent must be installed on all domain controllers within the domains to be monitored.

Supported Platforms for ® Active Directory®

l Windows Server 2019

l Windows Server 2016

l Windows Server 2012 R2

l Windows Server 2012

Stealthbits Activity Monitor Integration

Both the Stealthbits Activity Monitor and StealthINTERCEPT (SI) can monitor the same Domain Controller. Deploy agents from both products to the server. The Activity Monitor identifies the Windows host as being “Managed by StealthINTERCEPT” on the Monitored

Doc_ID 371 20

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Hosts tab when it detects an SI Agent on the server. That host configuration cannot be modified within the Activity Monitor Console. StealthINTERCEPT policies control the configuration for that monitored host. However, the Activity Monitor can be configured to provide multiple outputs for a host, e.g. for StealthAUDIT, StealthDEFEND, or SIEM products. Add a new output for the same host to the Monitored Host tab in the Activity Monitor Console to be used by the other product. See the Active Directory Configuration Guide for additional information.

Exchange Servers

This SI Agent tracks all Owner and Non-Owner information on Exchange Servers in real- time. The SI Agent must be installed on all Exchange Servers running the Information Store service within the domains to be monitored.

To gather Exchange event data that is stored in Active Directory, the SI Agent must also be installed on all domain controllers within the domains to be monitored.

If only gathering Exchange event data for mailbox permission changes and mailbox logins, then the SI Agent must also be installed on one domain controller, which can be read only.

Supported Platforms for Microsoft® Exchange®

l Exchange Server 2019 (Up through Cumulative Update 9, through .NET Framework 4.8)

l SI Agents v7.2.0.239+ (Up through Cumulative Update 9)

l SI Agents v7.1.0.410+ (Up through Cumulative Update 9)

l Exchange Server 2016 (Up through Cumulative Update 20, through .NET Framework 4.8, except 4.7.0)

l SI Agents v7.2.0.239+ (Up through Cumulative Update 20)

l SI Agents v7.1.0.410+ (Up through Cumulative Update 20)

l Exchange Server 2013 (Up through Cumulative Update 23, through .NET Framework 4.8, except 4.7.0)

l SI Agents v7.2.0 (Up through Cumulative Update 23)

l SI Agents v7.1.0 (Up through Cumulative Update 23)

l Exchange Server 2010 (Up through Service Pack 3 Roll Up 27, through .NET Framework 4.5)

Doc_ID 371 21

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l SI Agents v7.2.0 (Up through Roll Up 27)

l SI Agents v7.1.0 (Up through Roll Up 27)

The Exchange Server Monitoring module option is not enabled for an SI Agent if newer updates are detected, and a corresponding message displays in the SI Agent log file and the Agents interface.

Windows File Servers

This SI Agent monitors all events occurring in File System in real-time. The SI Agent must be installed on all Windows Files Servers within the domains to be monitored.

Supported Platforms for Stealthbits Activity Monitor Agent & SI Agent Deployment

l Windows Server 2019

l Windows Server 2016

l Windows Server 2012 R2

l Windows Server 2012

Stealthbits Activity Monitor Integration

Both the Stealthbits Activity Monitor and StealthINTERCEPT (SI) can monitor the same Windows server. Deploy agents from both products to the server. The Stealthbits Activity Monitor Console identifies the Windows host as being “Managed by StealthINTERCEPT” on the Monitored Hosts tab when it detects an SI Agent on the server. That host configuration cannot be modified within the Stealthbits Activity Monitor Console. StealthINTERCEPT polices control the configuration for that monitored host. However, the Stealthbits Activity Monitor can be configured to provide multiple outputs for a host, e.g. for StealthAUDIT, StealthDEFEND, or SIEM products. Add a new output for the same host to the Monitored Host tab in the Stealthbits Activity Monitor Console to be used by the other product. See the Windows File System Server Configuration Guide for additional information.

NAS Device & Proxy Servers for NAS File Activity Monitoring

Doc_ID 371 22

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

For Network-Attached Storage (NAS) device support, no SI Agents are deployed on the NAS device. Instead, StealthINTERCEPT employs the Stealthbits Activity Monitor, which deploys its own activity agents to Windows servers acting as proxy servers for NAS activity monitoring. The SI Agent must be installed on the Windows server where the Stealthbits Activity Monitor’s activity agent resides. See the Stealthbits Activity Monitor Installation & Console User Guide for additional information.

The Stealthbits Activity Monitor activity agent configuration dictates what file system activity is being monitored. The activity agent writes activity log files on the proxy server. The SI Agent monitors the activity log files as the data is written and sends events to the StealthINTERCEPT event database according to the enabled policy configuration.

Supported Platforms for Stealthbits Activity Monitor Agent & SI Agent Deployment

l Windows Server 2019

l Windows Server 2016

l Windows Server 2012 R2

l Windows Server 2012

Supported NAS Devices to Monitor

l NetApp® Data ONTAP®:

l 7-Mode 7.3+

l Cluster-Mode 8.2+

l EMC® Celerra® 6.0+

l EMC® VNX®:

l VNX 7.1

l VNX 8.1

l Dell EMC Unity™

l EMC® Isilon® 7.0+

l Hitachi® 11.2+

l Nasuni® 8.0+

l Panzura® 8.1

Doc_ID 371 23

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

See the following configuration guides for additional information on configuration and integration between StealthINTERCEPT and the Stealthbits Activity Monitor:

l EMC Celerra or VNX Device Configuration Guide

l Dell EMC Unity Device Configuration Guide

l EMC Isilon Device Configuration Guide

l Hitachi Device Configuration Guide

l Nasuni Edge Appliance Configuration Guide

l NetApp Data ONTAP7-Mode Device Configuration Guide

l NetApp Data ONTAP Cluster-Mode Device Configuration Guide

l Panzura Device Configuration Guide

Solution Overview StealthINTERCEPT has the following pre-defined solutions available for protecting different aspects of the IT environment. The solutions and associated Licensed Modules are:

l StealthINTERCEPT for Active Directory

l Active Directory Changes

l Includes AD Replication Monitoring

l Includes Authentication Monitoring

l Includes Effective Group Membership

l Includes LSASS Guardian –Monitor

l Active Directory Lockdown

l Includes AD Replication Lockdown

l Includes Authentication Lockdown

l Includes LSASS Guardian – Protect

l Active Directory Read Monitoring

Doc_ID 371 24

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l GPO Lockdown

l GPO Setting Changes

l StealthINTERCEPT for Enterprise Password Enforcement

l Password Enforcement

l StealthINTERCEPT for Exchange

l Exchange Events

l Exchange Lockdown

l StealthINTERCEPT for File System

l File System

l Includes both Monitoring & Lockdown for Windows file system

l Includes Monitoring for supported NAS devices

l Includes Monitoring file system for integration with StealthAUDIT

l FSMO Role Monitoring

l StealthINTERCEPT for LDAP

l LDAP Monitoring

l Includes both Monitoring & Lockdown for LDAP Event Policies

l Includes LDAP Operations Center Policies

l Includes Monitoring file system for integration with StealthAUDIT

From within the SI Admin Console, the only difference between solutions is in the Policy Templates and Policy Event Types available for use.

StealthINTERCEPT for Active Directory StealthINTERCEPT for Active Directory is a real-time change monitoring and security threat detection solution, designed to detect, protect, mitigate, and generate security intelligence without any reliance on native logging. From individual objects and attributes to Group Policies, StealthINTERCEPT for Active Directory not only produces a complete audit trail of all change and access activities, but adds an additional security layer on top of native controls to proactively block undesired changes and guard against malicious attempts to comprise directory services. Through real-time analysis of all AD authentication traffic, StealthINTERCEPT also detects

Doc_ID 371 25

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

patterns of activity indicative of account compromise or impending breach, empowering security professionals with the information they need to protect their systems, data, and organization’s reputation.

Some of the important events StealthINTERCEPT captures are:

l Changes

l Account Lockouts

l Password Resets

l Comprised and weak password use

l Group Policy Object (GPO) Modifications

l Object Moves/Adds/Deletes

l Permission Modifications

l Groups Membership

l DNS Changes

l LSASS Modifications

l AD Replication

l Replication impersonations

l Active Directory Read Monitoring

l Authentication (Kerberos & NTLM)

l Authentication-based Attacks (e.g. Horizontal/Lateral Movement, Brute Force Attacks, User Account Hacking, Breached Passwords, Golden Tickets, and more)

l Privileged Account Authentications

StealthINTERCEPT for Enterprise Password Enforcement Attackers often use dictionaries of previously breached passwords or knowledge of well-known passwords to compromise accounts. To mitigate this risk and the likelihood of generic or known passwords used within organizations, StealthINTERCEPT Enterprise Password Enforcer proactively prevents their usage when passwords are set – regardless of whether or not they meet complexity requirements – further enforcing password hygiene and reducing the opportunity for attackers to crack or guess passwords in automated or manual fashions.

Doc_ID 371 26

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

With StealthINTERCEPT v7.0+, the optional EPE User Feedback Module is packaged with the zip file for StealthINTERCEPT installation. It provides end user feedback at the Windows login screen for why their pending password change was rejected. The module lists the failed complexity requirements set up in the Password Rules policy. The user can use this information to create a new password that passes the complexity requirements of the organization.

This module does not change the behavior of EPE. It provides additional user feedback when deployed to end user computers. The method of deployment is up to the user. Logon scripts are a suggested way to deploy this zero configuration msi. Prior to deploying the EPE User Feedback Module, the user must select the Enable EPE User Feedback Module integration checkbox in the EPE Settings Window.

See the EPE User Feedback Module section of the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

StealthINTERCEPT for Exchange StealthINTERCEPT for Exchange provides increased security, regulatory compliance fulfillment, reduced risk of downtime through careless error, and peace of mind by significantly enhancing Microsoft® Exchange native security.

StealthINTERCEPT for Exchange owners reduce outage risk caused by bad configuration changes and achieve compliance through enhanced security and detailed auditing. For business owners, enhanced mailbox security capabilities ensure their most sensitive mailboxes are protected against rogue administrator or compromised account access. StealthINTERCEPT for Exchange is simply the ultimate security enhancement for Microsoft Exchange.

Understand who accessed a mailbox and what occurred once in the mailbox. Was a sensitive email read, modified, deleted, or forwarded? All are critical to achieving a compliant Exchange infrastructure.

Some of the important events StealthINTERCEPT captures are:

l Non-Owner Mailbox Access Events

l Access rights Changes

l Mailbox

l Folder

l Manipulated Attachments

Doc_ID 371 27

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Message Item Level Auditing:

l Creation

l Deletion

l Modification

l Read

l Send/Forward

l Open

StealthINTERCEPT for File System StealthINTERCEPT for File System provides organizations with real-time visibility into and control over changes and access activities occurring within Windows file systems. It also provides real- time visibility into file access and change activities occurring on their NAS devices. StealthINTERCEPT authoritatively records a complete audit trail of events for security, compliance, and forensic investigation, and alerts on critical activities in real-time without reliance on native logging facilities or impacting system performance. StealthINTERCEPT also optionally blocks changes and access events from occurring at the share, folder, or file level of Windows file systems, enabling complete control over critical data regardless of natively supplied access rights.

Some of the important events StealthINTERCEPT captures within a Windows file system are:

l File Access Events (Reads, Moves, Copies, Deletes)

l Permission Changes

l Attribute Changes

l Audit Changes

l Owner Changes

l FSMO Role Changes

Some of the important events StealthINTERCEPT captures within a NAS file system are:

l File Access Events (Create, Copy, Delete, Rename, Read, Update)

l Permission Changes

NOTE: For NAS monitoring, StealthINTERCEPT employs the Stealthbits Activity Monitor. See the Stealthbits File Activity Monitor User Guide for additional information.

Doc_ID 371 28

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

StealthINTERCEPT for LDAP StealthINTERCEPT for LDAP provides real-time monitoring of Active Directory LDAP queries without any reliance on native logging. From individual objects to specific query requests or results, StealthINTERCEPT for LDAP produces a complete audit trail of specific queries executed against Active Directory that could indicate potential security issues or operational inefficiencies.

Getting Started with StealthINTERCEPT Once StealthINTERCEPT is installed, the following workflow quickly enables users to begin monitoring an organization’s environment.

First Launch

The first time StealthINTERCEPT is launched after installation, the first SI user (by default an SI Administrator) is given a license key warning and then asked two questions:

The license key warning provides the SI Administrator with easy access to the machine ID which is needed by the Stealthbits Representative in order to provide the organization’s license key.

This warning always displays when the organization’s license is within 14 days of expiring.

Doc_ID 371 29

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Import Templates?

l Templates Interface are pre-configured for the most common monitoring policy types. These provide SI users with a quick resource for configuring a policy.

l If this option is selected, it takes a few moments to import the templates into the SI Admin Console. Once complete, the templates are available to all SI users.

l If this option is declined, the Import Templates window appears asking, “Do you want to be prompted again next time this application loads?”

The policy templates can always be Import SI Pre-Created Policy Templates at a later time.

l Install SI Agents?

l SI Agents are responsible for monitoring the events as configured in policies. It is necessary for SI Agents to be deployed on all of the servers where these events occur. The SI Agent deployment is enacted and managed through the SI Admin Console.

l If this option is selected, this option opens the Agents Interface.

l If this option is declined, navigate to the Agents Interface to manage and deploy SI Agents.

Initial Configuration

There are three components of StealthINTERCEPT configuration which need to occur during the first launch. In addition to deploying SI Agents, the first SI user is responsible for:

Doc_ID 371 30

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Configuring Additional SI Users

l From the point of first launch, the user responsible for installation is the only user who can access the SI Admin Console and the SI Reporting Console. Additional users must be added and assigned roles which impacts what they have access to. This can only be done by an SI Administrator. Navigate to the Users and Roles Window to configure SI users.

l Configure Alerts

l (Optional) However, Email and SIEM alerts require configuration before they can be enabled. This can only be done by an SI Administrator. This can only be done by an SI Administrator. Navigate to the SI System Alerting Window to enable these alerts and to select SI System Alert Notifications.

l Configure Collections

l (Optional) Collections are reusable lists of stored policy filter settings. However, if the plan is to use policy templates to create new policies, Collections need to be configured. Several of the templates are configured using collections as a policy filter. If the Collection is empty, then the policy does not monitor what it was designed to monitor. This can only be done by an SI Administrator. Navigate to the Collection Manager Window to configure Collections.

Create, Configure, & Enable Policies

Now that SI Agents are deployed and the initial configuration of StealthINTERCEPT is complete, it is time to create, configure, and enable policies to begin monitoring the organization’s environment. Either use a Policy Templates to create a policy or create a new Policy & Template Configuration. When the policy configuration is enabled and saved, the SI Agents are automatically sent the necessary information to begin monitoring.

CAUTION: Use extreme caution when enabling lockdown policies to ensure no unintended events get blocked.

RECOMMENDED: Start with monitoring the environment before choosing to lockdown policies. For example:

First configure a monitoring policy for the events to be blocked. Watch the captured events to ensure the filters are returning the expected events. Once assured the filters are monitoring the desired events, create the lockdown policy to block those events.

View Event Result Data

StealthINTERCEPT provides three interfaces for viewing result data.

Doc_ID 371 31

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

RECOMMENDED: After configuring a new policy, navigate to either the Recent Events Tab in the policy's configuration or to the Investigate Interface to confirm the events being monitored are intended. Navigate to the preferred location, and Refresh the data to view recent events being monitored.

Finally, launch the SI Reporting Console to generate reports. See the StealthINTERCEPT Reporting Console User Guide for additional information.

Doc_ID 371 32

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® Navigation & Configuration of the SI Admin Console The StealthINTERCEPT (SI) Administration Console is used to create and configure policies and policy templates, configure analytics, deploy and manage SI Agents, import and export SI policies and policy templates, and configure alerts. Policies control the real-time event monitoring/blocking of files and directories, users, groups, Active Directory objects, and Microsoft Exchange objects. These policies enable SI to detect and report changes as well as send notification when changes occur.

This chapter provides an introduction to the primary components of the SI Admin Console, and it explains the console configuration options.

The SI Admin Console is comprised of the following components:

l Menu

l Policy Center

l LDAP Operations Center

l Status Bar

There are also right-click commands available within different sections of the Policy Center.

Doc_ID 371 33

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

See the LDAP Operations Center section for information the LDAP Operations Center.

If at any time, the SI Admin Console user interface or windows do not display completely, see the Troubleshooting within the SI Admin Console section for information. Icon Key

Icon Represents

Add

Remove

Agents Node

Alerts Node

Investigates Node**

Filtered Investigates View

Analytics Node**

Analytic Policy/Investigate Report

Doc_ID 371 34

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Icon Represents

Policies Node/Policy**

Templates Node/Template**

Folder (Policies/Templates)

Refresh

Clear

Export Data

Save

Reset Filters

Configure

*See the individual sections for information on other icons.

**Double-click with the left mouse button to expand and collapse content

Doc_ID 371 35

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Menu

The Menu contains the following selections:

Menu Item Option Description

File New Create new policies (Ctrl+P), new templates (Ctrl+T), or new folders (Ctrl+F) in the selected location of the Policy Center

Rename Opens a textbox to rename the selected policy, template, or folder in the Policy Center

Remove Remove the selected policy, template, or folder from the Policy Center

Exit Exit the SI Admin Console

Tools Export … Export (Alt+X) all collections and event consumers/alerts to an XML file through the Export Policies and Templates Window

Import … Import (Alt+I) policies/templates, collections, and event consumers/alerts from an exported file through the Import Window

Configuration Alerts Configure and manage all email,

Doc_ID 371 36

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Menu Item Option Description

event log, and SEIM alerts in the SI System Alerting Window

Users A security feature for configuring access to the SI Admin Console and the SI Reporting Console. SI users are added and assigned rights through the Users and Roles Window.

Database > Server Manage the events database in the Event Database Configuration Window

Database > Maintenance Database maintenance can be used to automatically groom the database to optimize performance by archiving and/or deleting data aged beyond a specified threshold. This can be configured to run by Event Type, Analytic, or Policy. It is configured in the Database Maintenance Window.

Database > Partitioning Partition the SI data within the Microsoft SQL Server database to greatly improve performance on queries in the Database Partitioning Window

Collections Manage all Microsoft Collections in the Collection Manager Window

Event Filtering Filters Active Directory events to remove “noise” from collected event data and/or exclude logins from

Doc_ID 371 37

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Menu Item Option Description

machine accounts. Both settings are ON by default. It also allows authentication events from selected hosts or from selected accounts to be excluded, which require configuration before being enabled. A latency threshold can be set to generate alerts when the delivery of AD Events are delayed beyond the threshold. These options are configured in the Event Filtering Configuration Window.

StealthDEFEND Event Enables the integration between Sink StealthINTERCEPT and StealthDEFEND in a global setting. The StealthDEFEND URI is set in the StealthDEFEND Configuration Windows. Choose policies through the Policy checkboxes in this window or the Actions tab of each policy for sending event data to StealthDEFEND. Honey Tokens

File Monitor Settings Manages the log retention, inherited permissions filtering, disables office file filtering, and the ability to exclude AD accounts and processes for StealthINTERCEPT file monitoring and blocking policies in a global setting. These options are set in the File Monitor Settings Windows.

EPE Settings Window Manages the Have I Been Pwned

Doc_ID 371 38

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Menu Item Option Description

password hash database configuration and update options as well as global Password Rules filter configurations. These options are configured in the EPE Settings Window.

Help Administration Console Open the internal help Help documentation

License Manager Opens the StealthINTERCEPT License Manager window where Customer, License, and Licensed Modules are displayed

About StealthINTERCEPT Opens the StealthINTERCEPT Administration Console Administration Console window where the SI version, copyright, and the Stealthbits website link are displayed

Status Bar

The Status Bar is located in the lower-left corner of the SI Admin Console.

It displays the Current User account logged into StealthINTERCEPT.

Menu Windows

Doc_ID 371 39

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Collection Manager Window The Collection Manager window is for managing all Microsoft Collections. This window is opened through the Menu’s Configuration > Collections option.

This window is only available to SI Administrators.

Collections are reusable lists of stored policy configuration filter settings which help streamline the task of associating filters with event types on the Event Type Tab during Policy & Template Configuration. They are configured globally and can be used in multiple policies in place of or in conjunction with individual filters. When a collection is modified, the modifications affect all policies referencing the collection. At least one SI Agent must be deployed to populate Collections.

The collections are organized into the following categories for Microsoft Collections:

l Domains & Servers – Any domain or server (by name)

l Contexts – Any context (e.g. Containers and Organizational Units) within Active Directory

l Objects – Any Active Directory object

l Exchange Objects – Any user accounts or distribution lists which are -enabled

l Lockdown Objects – Any Active Directory object, used for lockdown purposes

Doc_ID 371 40

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Exchange Trustees – Any account which has been given permission to another account’s mailbox or folder

l Perpetrators – Any security principal which is making a change, used for monitoring purposes

l Lockdown Perpetrators – Any security principal which is making a change, used for lockdown purposes

l Exchange Perpetrators – Any security principal which is making a change in an Exchange environment, used for both monitoring and lockdown purposes

l Classes – Any class within Active Directory

l Attributes – Any attribute within Active Directory

l IP Addresses – Any client address

l Hosts – Any computer (by NetBIOS, DNS, and IP Address)

l File Paths – List of file paths for Windows file systems to be used with multiple agents

Select a collection category and click Manage… in the lower-left corner to open the List of Collections window.

Preconfigured Collections StealthINTERCEPT has the following pre-configured Collections:

Collection Type Name

Domains and Servers SBServers

Objects Administrator Accounts

Objects Administrator Groups

Objects Sensitive Groups

Objects Service Accounts

Perpetrators Administrative Accounts

Perpetrators Domain Administrators

Doc_ID 371 41

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Collection Type Name

Perpetrators Failed Authentications

Perpetrators Service Accounts

Perpetrators Successful Authentications

Perpetrators Successful HIPPAA PHI Account Authentications

Perpetrators System Accounts

Lockdown Perpetrators Allow Perpetrators

Lockdown Perpetrators Critical GPO - Allow Perpetrators

Lockdown Perpetrators DNS Records - Allow Perpetrators

Lockdown Perpetrators GPOs - Allow Perpetrators

Lockdown Perpetrators Group Lockdown - Allow Perpetrators

Lockdown Perpetrators Group User OU Object Delete and Move - Allow Perpetrators

Lockdown Perpetrators Object Permissions - Allow Perpetrators

Lockdown Perpetrators OU Structure - Allow Perpetrators

Lockdown Perpetrators Root Object - Allow Perpetrators

Doc_ID 371 42

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Collection Type Name

Lockdown Perpetrators User Lockdown - Allow Perpetrators

Classes Exclude Classes

Attributes Exclude Attributes

Attributes Exclude User Attributes

Attributes Property Set: DNS-Host- Name-Attributes

Attributes Property Set: Domain- Other-Parameters

Attributes Property Set: Domain- Password

Attributes Property Set: General- Information

Attributes Property Set: Membership

Attributes Property Set: Personal- Information

Attributes Property Set: Private- Information

Attributes Property Set: Public- Information

Attributes Property Set: RAS- Information

Attributes Property Set: Terminal-

Doc_ID 371 43

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Collection Type Name

Server-License-Server

Attributes Property Set: User- Account-Restrictions

Attributes Property Set: User-Login

Attributes Property Set: Web- Information

Hosts Domain Controllers

Hosts Exchanges Servers

File Paths Folders with Sensitive Data

File Paths Open Shares

List of Collections Window The List of Collections window is where selected collections can be created or edited. This window is opened through the List of Collections Window Manage... button.

Doc_ID 371 44

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

At the top of the window, the Collection Category are identified. Each item in the list displays:

l Name – Name of the collection

l Item Count – Number of items in the collection

l Dependency Count – Number of policies or policy templates referencing the collection

At the bottom of the windows are buttons for Add…, Edit…, Remove, and Dependencies… that can be used to modify the collection. Add New Collection Window

Clicking Add... on the List of Collections window opens the Add New Collections window.

Doc_ID 371 45

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Provide a unique, descriptive Name for the collection. Then optionally provide a detailed Description. The Created By, Created On, Modified By, and Modified On textboxes are automatically edited by StealthINTERCEPT when collections are created or changed. Use the Add (+) button to search for Items that match the selected Collection Category.

Doc_ID 371 46

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Example Select… Window

The Select… window opens. Select the desired Agent from the drop-down menu and click Connect. Expand the domain tree in the Navigation pane. Select an item in the Results pane on the right and click OK. See the Event Filters Overview section for specific information on each browser window.

Use the Remove (x) button to remove Items from the list on the Add New Collections window.

Some collection can be configured to be dynamic collections. See the List of Collections Window section for additional information. The Perpetrators and Lockdown Perpetrators collections also have the option to expand group membership. See the Expand Group Option for Perpetrators & Objects Collection section for additional information.

When the configuration is set as desired, click OK to save the collection.

Edit Collection Window

Clicking Edit... on the List of Collections Window opens the Edit Collections window.

Doc_ID 371 47

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Name, Description, and Items can be modified through this window. See the Add New Collection Window section for additional information on these settings. The Created By, Created On, Modified By, and Modified On textboxes are automatically edited by StealthINTERCEPT when collections are created or changed.

Use the Add (+) button to search for Items that match the selected Collection Category. The Select… window opens with available items to choose from.

Use the Remove (x) button to remove Items from the list.

When the configuration is set as desired, click OK to save the information.

Remove Collection

To delete a collection, select it from the list and click Remove on the List of Collections Window.

Doc_ID 371 48

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

A collection cannot be deleted if it is assigned to an active policy, as indicated in the Collection Dependencies Window Count column. A collection would need to be removed from all policies it has been assigned to before it can be removed.

Doc_ID 371 49

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Confirm the decision by clicking Yes on the Confirm Removal window. The selected collection is now removed from the list.

Collection Dependencies Window

Clicking Dependencies... on the List of Collections Window opens the Collection Dependencies window for the selected collection.

This window displays a list of all policies the selected collection is assigned to.

Doc_ID 371 50

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Expand Group Option for Perpetrators & Objects Collection

The Expand Groups options in the lower-center portion of the Add New Collections window is only available for the following collections:

l Perpetrators

l Lockdown Perpetrators

l Objects

l Lockdown Objects

Perpetrators

If checked, the groups and nested-groups are expanded out to monitor effective group membership at the user level. This means the SI Agent monitors/blocks based on the user’s token instead of the group’s token. The impact specifically for Lockdown Perpetrators collections is that this option allows for the immediate blocking of a currently logged in user who has had a group membership change while logged in.

Objects

If checked, when a group object is added, then the groups and nested-groups are expanded out to monitor effective group membership at the user level. This means the SI Agent monitors/blocks based on the user’s token instead of the group’s token. The impact specifically for Lockdown Objects collections is that this option allows for the immediate blocking of a currently logged in user who has had a group membership change while logged in.

The Expanded Groups option does NOT apply to other object types.

There is a maximum cap of 1000 users/objects which can be expanded. If the total number of users or objects of the all groups added to a single collection exceeds 1000 users/objects, then the SI Agent defaults to monitoring/blocking based on the groups’ tokens.

Doc_ID 371 51

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

If group membership cannot be resolved, then the SI Agent defaults to monitoring/blocking based on the groups’ tokens.

Dynamic Collections There are options in the upper-left corner of the Add New Collections window which are only enabled for the following collection categories:

l Domains & Servers – Dynamic Domains & Servers Collection Table Requirements

l Objects – Dynamic Objects Collection Table Requirements

l Perpetrators and Lockdown Perpetrators – Dynamic Perpetrators Collections Table Requirements

l IP Addresses – Dynamic IP Addresses Collection Table Requirements

l Hosts – Dynamic Hosts Collection Table Requirements

l File Paths – Dynamic File Paths Collection Table Requirements

The I will provide a list radio button enables the default setting for a static collection:

l I will provide a list option – When selected, follow the general directions to manually Dynamic Collections.

The I want a list to come from the database table radio button enables a dynamic collection:

Doc_ID 371 52

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l I want a list to come from database table – When selected, enter the table name in the textbox which appears or select it from the drop-down menu.

The dynamic collection tables can be populated manually or with a third-party product as long as they meet the table requirements for the intended collection category. See the intended collection category table requirement sections for additional information.

Any SI policy which has been assigned a dynamic collection uses the current table’s data for the policy filter, resulting in a dynamic policy.

Any changes to the selected table’s data are recognized by an active policy when the SI Agent communicates with the StealthINTERCEPT Enterprise Manager. This may result in a delay of no more than five minutes between a change in the table and the SI Agent refresh. Dynamic Domains & Servers Collection Table Requirements

When using a dynamic Domains & Servers collection, the table to be referenced must meet the following requirements:

l Table Location – Must be in the NVMonitorConfig database

l Table Naming Convention – Must have a prefix of ‘dc_domain_server_’

l StealthINTERCEPT creates an empty table with the required prefix and schema if the [Table name] entered does not exist in the NVMonitorConfig database

l Table – Must have the following column:

Column Name Column Type Column Description

DomainServerName NVARCHAR Name of the domain or server. Cannot (1024) be null.

Example table entry for domain:

ExampleDomain

Example table entry for server:

ExampleServer

Doc_ID 371 53

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Dynamic Objects Collection Table Requirements

When using a dynamic Object collection, the table to be referenced must meet the following requirements:

l Table Location – Must be in the NVMonitorConfig database

l Table Naming Convention – Must have a prefix of ‘dc_ad_objects_’

l StealthINTERCEPT creates an empty table with the required prefix and schema if the [Table name] entered does not exist in the NVMonitorConfig database

l Table Schema – Must have the following column:

Column Name Column Type Column Description

AdObject NVARCHAR Distinguished name of the Active Directory (1024) object. Cannot be null.

Example table entry:

CN=User,DC=Domain,DC=Local

Dynamic Perpetrators Collections Table Requirements

When using a dynamic Perpetrators or Lockdown Perpetrators collection, the table to be referenced must meet the following requirements:

l Table Location – Must be in the NVMonitorConfig database

l Table Naming Convention – Must have a prefix of ‘dc_perpetrators_’

l StealthINTERCEPT creates an empty table with the required prefix and schema if the [Table name] entered does not exist in the NVMonitorConfig database

l Table Schema – Must have the following columns:

Column Name Column Type Column Description

AccountName NVARCHAR Distinguished name of the account. Cannot

Doc_ID 371 54

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Column Name Column Type Column Description

(1024) be null.

AccountSid NVARCHAR (184) SDDL form of the account Security ID. Cannot be null.

AccountType INT Account type using the following values:

l 0 = none

l 1 = user

l 2 = group

l 3 = context

l 4 = orgRole

l 5 = sidtype

l 6 = other

l 7 = dynamic

l 8 = dynamic_group

Cannot be null.

IncludeSubtree INT Indicates if child containers should be used:

l 0 = Child containers NOT included

l 1 = Child containers included

Cannot be null.

Example table entry:

CN=User,DC=Domain,DC=Local | S-1-5-21-1004336348-1177238915-682003330-500 | 3 | 0

Dynamic IP Addresses Collection Table Requirements

Doc_ID 371 55

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When using a dynamic IP Addresses collection, the table to be referenced must meet the following requirements:

l Table Location – Must be in the NVMonitorConfig database

l Table Naming Convention – Must have a prefix of 'dc_ip_addresses_'

l StealthINTERCEPT creates an empty table with the required prefix and schema if the [Table name] entered does not exist in the NVMonitorConfig database

l Table Schema – Must have the following column:

Column Name Column Type Column Description

IpAddress NVARCHAR Address of the host. Cannot be null. (1024)

Example table entry:

192.168.1.3

Dynamic Hosts Collection Table Requirements

When using a dynamic Hosts collection, the table to be referenced must meet the following requirements:

l Table Location – Must be in the NVMonitorConfig database

l Table Naming Convention – Must have a prefix of ‘dc_hosts_’

l StealthINTERCEPT creates an empty table with the required prefix and schema if the [Table name] entered does not exist in the NVMonitorConfig database

l Table Schema – Must have the following columns:

Column Name Column Type Column Description

NetbiosHostName NVARCHAR Name of the host (1024)

DnsHostName NVARCHAR Domain Name System (DNS) name of the

Doc_ID 371 56

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Column Name Column Type Column Description

(1024) host

IpAddress NVARCHAR IP v4 Address of the host (1024)

IpV6Address NVARCHAR IP v6 Address of the host (1024)

**At least one column cannot be null.

Example table entry with all fields populated:

host | host.dc.com | 10.0.10.19 | fe80::4d72:80e9:72cf:425f%10

Example table entry which excludes IP v6 Address:

host | host.dc.com | 10.0.10.19 | [null]

Example table entry which excludes IP v4 Address:

host | host.dc.com | [null] | fe80::4d72:80e9:72cf:425f%10

Dynamic File Paths Collection Table Requirements

When using a dynamic File Paths collection, the table to be referenced must meet the following requirements:

l Table Location – Must be in the NVMonitorConfig database

l Table Naming Convention – Must have a prefix of 'dc_file_path_'

l StealthINTERCEPT creates an empty table with the required prefix and schema if the [Table name] entered does not exist in the NVMonitorConfig database

l Table Schema – Must have the following columns:

Doc_ID 371 57

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Column Name Column Type Column Description

Path NVARCHAR File path to the desired folder. Cannot be (1024) null.

IncludeSubtree INT Indicates whether or not subfolders are processed:

l 0 = Not Included

l 1 = Included

TargetAgent NVARCHAR Agent which monitors the target server. (1024) Cannot be null.

Example table entry:

c:\Windows | 0 | ExampleFSserver

Two tables are created during the installation/upgrade process for the File Path collections:

l Folders with Sensitive Data Collection – dc_file_path_SensitiveDataFolders table

l Open Shares Collection – dc_file_path_OpenShares table

Database Maintenance Window The database maintenance feature is used to automatically groom the NVMonitorData database to optimize performance. It automatically deletes or archives data aged beyond a specified threshold. The threshold can be set per Event Type, per Analytics, and/or per Policy. While all three options can be enabled with different operations and retention periods, it is necessary to remember that the Event Type maintenance settings take precedence over Policy maintenance settings where the selected policy employs that event type.

Remember, it is necessary for either the SQL Server account supplied during the installation of StealthINTERCEPT or the Windows account configured to run the Enterprise Manager (for Windows Authentication to the SQL Server) to have enough rights to execute the Database

Doc_ID 371 58

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Maintenance feature. See the Database Maintenance Permission details in the SQL Server Requirements for the StealthINTERCEPT Database section of the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

See Appendix: StealthINTERCEPT Stored Procedures for additional information on stored procedures StealthINTERCEPT uses on its SQL Server databases.

The Database Maintenance window is opened through the Menu’s Configuration > Database > Maintenance option.

This window is only available to SI Administrators.

This feature is only available if the SQL Server Agent service is running on the SQL Server host. A warning message displays instead of the Database Maintenance window if this service is not running.

SQL Server Agent Stopped SQL Server Agent Running

To enable this feature, open the Start > Administrative Tools > Services interface and start the SQL Server Agent (MSSQLSERVER).

Doc_ID 371 59

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When the SQL Server Agent service is running, the Database Maintenance window opens. At the top of the window is an information section which includes the following:

l Database Information:

l Server – SQL Server where database maintenance is performed

l Database – Name of the database

l Database size – Current size of the database

l Oldest data – Date of the oldest data within the database

l Job Information:

l Last run – Date timestamp when the last database maintenance job was executed

l Status – Status of the job

l Running Step – During job execution this field populates with the step being executed

l Elapsed Time – Overall elapsed time of job execution

The Refresh button in the upper-right corner refreshes this information section with current database and job information.

Doc_ID 371 60

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

On the Event Type, Analytics, and/or Policy tabs, chose to enable maintenance for all or some of the options. See the Configure Database Maintenance section for additional information. On the Schedule tab set the frequency and time when the database maintenance job runs. See the Schedule Database Maintenance section for additional information. If choosing to use the Move operation, then the information on the Archive DB tab must be configured. See the Archive Data section for additional information.

The user account logged into the SI Admin Console when scheduling the database maintenance needs to have access to the msdb database (in System Databases) and have the SQLAgentOperator role. When all of the prerequisites have been met and the database maintenance job has been scheduled, all enabled tasks at the time when the job runs are executed.

This scheduled job can be viewed through the Microsoft SQL Server Management Studio within the SQL Server Agent > Jobs folder (SiDbMainJob).

Doc_ID 371 61

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

RECOMMENDED: The SQL Server databases should be configured to use 'Simple Recovery Mode' in the SQL Server Requirements. This configuration has a direct impact on the size of the transaction log during database maintenance delete tasks. If Simple Recovery Mode is not configured on the databases, the transaction log may get quite large during delete tasks.

Archive Data Configure where the archived data is sent in order to use the Move operation. Follow the steps to configure archived data.

Step 1 – Navigate to the Archive DB tab of the Database Maintenance window.

Step 2 – Enter the following information:

l Server – SQL Server where the archive database is located

l Port – Instance port number, by default this is set to 0

l Database – Name of the archive database

l Authentication

l For Windows Authentication – Check the Use Windows Authentication box

l For SQL Authentication – Enter the User Name and Password credentials

Doc_ID 371 62

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Remember, do not forget to Save the configurations before closing the Database Maintenance window.

To query archived event data, use the SI Admin Console Investigate interface. See the Investigate Interface section for additional information.

Configure Database Maintenance Database maintenance can be configured for all event types, analytics, and/or policies or only specified ones. It can be configured for any combination of event type data, analytic data, and policy data.

Remember, the Event Type maintenance settings take precedence over Policy maintenance settings where the selected policy employs that event type.

Navigate to the Event Type, Analytics, or Policy tab of the Database Maintenance window to configure database maintenance.

Event Type Tab

Doc_ID 371 63

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Check the Enabled box at the top to set database maintenance by event type. The table contains the following information:

l Enable – Checked box indicates database maintenance is enabled for the event type

l Event Type – Data is grouped by the following event types:

l Active Directory – Configure maintenance for all event data collected by the Active Directory Changes, Active Directory Lockdown, Effective Group Membership, GPO Lockdown, and GPO Setting Changes Event Types

l Authentications – Configure maintenance for all event data collected by the Authentication and Authentication Lockdown Event Types. This does not apply to Analytics policy data

l Exchange – Configure maintenance for all event data collected by the Exchange Changes and Exchange Lockdown Event

l File System – Configure maintenance for all event data collected by the File System Changes, File System Lockdown, and File System StealthAUDIT Event Types

l LDAP – Configure maintenance for all event data collected by the LDAP Monitoring Event Type

l Operation – Indicates operation set for the event type: Move (for Archiving) or Delete

l Retention Period – Indicates age of data to be retained when the database maintenance job is executed for the event type

Analytics Tab

Doc_ID 371 64

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Check the Enabled box at the top to set database maintenance by analytic. The table contains the following information:

l Enable – Checked box indicates database maintenance is enabled for the analytic

l Analytic Name – Name of each analytic

l Operation – Indicates operation set for the analytic: Move (for Archiving) or Delete

l Retention Period – Indicates age of data to be retained when the database maintenance job is executed for the analytic

l Incident Count – Indicates number of incidents recorded in the database for each analytic

l Event Count – Indicates number of events for the recorded incidents in the database for each analytic

Above the table is a cumulative count of:

l Total Incidents – Indicates number of incidents recorded in the database for all analytics

l Total Events – Indicates number of events for the recorded incidents in the database for all analytics

The rows in the table can be sorted alphanumerically by the Analytic Name, Incident Count, or Event Count column.

Doc_ID 371 65

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Policy Tab

Check the Enabled box at the top to set database maintenance by policy. The table contains the following information:

l Enable – Checked box indicates database maintenance is enabled for the policy

l Policy – Name of each policy. Policies are listed in alphanumeric order, first live policies (whether or not they are enabled) and then the deleted policies are listed

l Operation – Indicates operation set for the policy: Move (for Archiving) or Delete

l Retention Period – Indicates age of data to be retained when the database maintenance job is executed for the policy

l Event Count – Indicates number of events for the recorded incidents in the database for each policy

Above the table is a cumulative count of:

l Total Events – Indicates number of events for the recorded incidents in the database for all policy

The rows in the table can be sorted alphanumerically by the Policy or Event Count column. Deleted policies are always listed after all other policies.

Doc_ID 371 66

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Enable Database Maintenance Follow the steps to enable database maintenance and assign an operation and retention period.

Step 1 – Select the desired tab (Event Type, Analytics, or Policy) and check the Enabled box in the upper-left corner.

Step 2 – Select the desired maintenance task (Event Type, Analytic, or Policy). To set the same operation and retention period for multiple tasks, and use the (ctrl-left click) command.

Step 3 – At the bottom select either Move or Delete from the Operation drop-down menu.

l The Move operation requires the Archive DB tab to be configured. See the Enable Database Maintenance section for additional information.

Step 4 – Set the Retention Period value and unit (Day, Week, or Month). This value indicates the age of the data to be kept when the database maintenance job is run. Older data is deleted or moved/archived as indicated by the selected Operation. Then click Set.

Step 5 – Check the Enable box to indicate which tasks are included in the next database maintenance job. Only those event types, analytics, and/or policies with the corresponding Enabled checkbox selected are included in the job execution.

Step 6 – Save the configurations before close the Database Maintenance window.

Doc_ID 371 67

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The configured maintenance schedule displays in the Operation and Retention Period columns of the table.

In the example, the File System Event Type data older than 2 Weeks is deleted when the database maintenance job runs, but the Exchange Event Type data remains untouched, though it is configured to archive data older than 1 Month when enabled.

Disabling a previously enabled database maintenance task does not remove the configured settings, only prevent that task from being executed during the next running of the database maintenance job.

Schedule Database Maintenance The database maintenance job must be scheduled, which runs the specified Operation on each of the enabled event type data, analytic data, and/or policy data older than the specified Retention Period. This job can be run once now; it can be scheduled to run once at a later time; or it can be scheduled to run on a regular rotation.

The user account logged into the SI Admin Console when scheduling the database maintenance needs to have access to the msdb database (in System Databases) and have the SQLAgentOperator role.

Follow the steps to configure a Schedule.

Doc_ID 371 68

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 1 – Check the Enabled box.

Step 2 – Select the Frequency:

l One Time: Run now – Runs the database maintenance job once when the configurations on the Database Maintenance window are saved

l One Time: Run later – Runs the database maintenance job once according to the Start Date and Start Time set

l Daily – Runs the database maintenance job once a day according to the Start Date and Start Time set

l Weekly – Runs the database maintenance job once a week according to the Day Of Week, Start Date, and Start Time set

l Monthly – Runs the database maintenance job once a month according to the Day of Month, Start Date, and Start Time set

Step 3 – Set the When for the selected Frequency.

l Start Date

l Start Time

l Day of Week (if applicable)

l Day of Month (if applicable)

Step 4 – Save the configurations before close the Database Maintenance window.

The Database Maintenance Job is now scheduled to run at the configured time and day.

Database Partitioning Window The database partitioning feature partitions the SI data, providing greatly improved performance on queries, especially beneficial to SI Reporting. It requires a Microsoft SQL Server Enterprise Edition. To take advantage of this feature, the prerequisites explained here must be met. Then run the Database Partitioning action once. The database will then be automatically partitioned according to the configuration parameters.

This window is only available to SI Administrators.

Follow the steps to partition a database.

Step 1 – Open the Database Partitioning window through the Menu’s Configuration >Database > Partitioning option. The Database Partitioning window opens.

Doc_ID 371 69

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

There are three prerequisites needed to enable database partitioning:

l SQL Server/Version Supported

l DBO Credentials

l Tables ready for partitioning

Doc_ID 371 70

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 2 – Click the Verify Prerequisites link to have StealthINTERCEPT verify the requirements. Symbols display next to each item in the window indicating if partitioning is supported. A green checkmark indicates the prerequisite has been met. A warning symbol indicates it has not been met.

Step 3 – Select the DBO Credentials link to open the Database Connection Properties window.

The database was created while installing the SI Enterprise Manager Package. See the StealthINTERCEPT Infrastructure Installation section of the StealthINTERCEPT Installation & Upgrade User Guide for additional information. The information grayed-out at the top displays the database location.

l If using Windows Authentication to modify the database for partitioning, check the box. This applies the credentials used to log into the SI Admin Console server.

Doc_ID 371 71

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l If using SQL Authentication, provide the user name and password to be used. The credentials assigned must have rights to make SQL create and update the and read/write to the database.

Step 4 – Once the prerequisites have been confirmed, click Enable Partitioning. This begins the Database Partitioning action that prepares the database for partitioning. The Warning: You are about to enable partitioning window displays.

CAUTION: The Database Partitioning action cannot be disabled, so a warning message confirms the decision to enable partitioning. Click Yes. The interface closes and the Database Partitioning action is executed.

Doc_ID 371 72

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Opening the Database Partitioning window after partitioning is enabled displays a grayed-out window with the message Partitioning is already enabled superimposed over the window.

Doc_ID 371 73

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 5 – Navigate to the Databases > NVMonitorData > Tables folder within Microsoft SQL Server Management Studio.

Step 6 – Select the dbo.AttributeValue table and open the Table Properties window. It displays Partitions not compressed under the Compression section.

This is the only indicator within the Microsoft SQL Server interface that partitioning is enabled.

EPE Settings Window The EPE Settings window displays global and unique settings for the Enterprise Password Enforcement event type. These options are set through the Menu’s Configuration > EPE Settings option. This window is only available to SI Administrators.

The window displays the following options:

Doc_ID 371 74

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Current hash database information

l Check for update options

l Passwords Hash Database Folder

l User Feedback Module

l Enable EPE User Feedback Module

l Use Custom Messages

l Password Rules Global Settings

l Modify Passwords Dictionary

l Modify List of Words for Character Substitution

l Modify Character Substitution Mapping Obtaining the Pwned Database

The Pwned database must be initially deployed to the Enterprise Manager. Once its stored, SI Agent(s) can be configured to obtain and use a local copy of the Pwned database. In order to give SI Agent(s) a local copy of the database, the Use local Pwned hash DB option on the Agents Interface Set Options section when deploying an SI Agent.

Password hashes can be authenticated against the stored Pwned database in the following places across the environment:

l Only the Enterprise Manager

l All or selected SI Agent(s)

l Mix of the Enterprise Manager and SI Agent(s)

Having the Pwned database copied to one location over another may alter functionality and whether or not authentication requires internet connection. See the Considerations When Deploying the Pwned Database section for additional information.

Follow the steps to obtain the Pwned Database content and prepare it for use by StealthINTERCEPT:

Step 1 – In the EPE Settings window, use the Password Hash Database Folder textbox enter the path to the folder where the Pwned hash database should be stored.

Step 2 – In the Update From section, choose between Link and File.

Doc_ID 371 75

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l If Link is selected, proceed to Step 3. This option requires internet connection in order to automatically download the hash file from the Have I Been Pwned website.

l If File is selected, use the Select File button to browse to a copy of the hash file that has been manually downloaded from the Have I Been Pwned website. Follow the steps to manually download the hash file:

l Open up an internet browser and navigate to https://haveibeenpwned.com/. On the top navigation bar, select Passwords. The Pwned Passwords page displays.

l On the Pwned Passwords page, scroll down to the Downloading the Pwned Passwords list section and download the NTLM Version 5 (ordered by hash) torrent or cloudflare file. By default, the file is saved to Downloads. CAUTION: Once uncompressed, the NTLM Version 5 (ordered by hash) file becomes at least a 20G file. Ensure the SI Agent and/or Enterprise Manager has space to store the expanded Pwned database.

l Unzip and extract the NTLM Versions 5 (ordered by hash) file.

l Ensure the unzipped hash file is placed at the location defined in the Hash File path on the server. RECOMMENDED: Ensure the initial update of the database occurs during non-office hours. Due to the size of the hash file, this download takes up a significant amount of CPU and download time.

Step 3 – On the EPE Settings page, select Update to download the content of the hash file to the Password Hash Database folder location.

The Enterprise Manager is ready to use the Have I Been Pwned content derived from the hash file once the update is completed. Next, the policy or policies need to be configured to block password hashes that match the Pwned database content.

Step 4 – Navigate to the Password Rules filter for the desired Password Enforcement event types. Ensure that the policy is enabled and the Block if password hash is in Pwned DB checkbox is selected.

Step 5 – Review the Considerations When Deploying the Pwned Database to determine if it is best for your environment to deploy copies of the Pwned database to individual SI Agents.

Step 6 – (Optional) If desired, deploy SI Agent(s) with the Use local Pwned hash DB option on the Agents Interface Set Options page to supply a local copy of the Pwned database on the specified server. Repeat this step as necessary.

Doc_ID 371 76

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Pwned database is successfully deployed to the Enterprise Manager and any desired SI Agent(s) in the environment.

Considerations When Deploying the Pwned Database

Prior to deploying the Pwned database, consider the pros and cons when choosing its deployment location. It can be deployed on the SI Agent and/or Enterprise Manager. Remember, there can be a mix of SI Agent and Enterprise Manager in one environment.

If the Pwned database is copied to and stored on the SI Agent:

l The Pwned database takes up more space on the SI Agent then would on the Enterprise Manager

l No internet connection is required to check passwords against the Pwned database

l The pending password candidate is checked against the archived hash file at the local Agent level. The results are sent to the Enterprise Manager.

l If a password hash is matched, the pending password change is rejected.

l The Enterprise Manager periodically compares its Pwned database version against the SI Agent(s) local copy. If the Enterprise Manager has a newer copy, it updates the SI Agent copy.

If the Pwned database is kept only on the Enterprise Manager:

l The Pwned database takes up less space on the Enterprise Manager then would on the SI Agent

l Requires internet connection to check:

l The pending password candidate from the SI Agent

l For and obtain updates to the Pwned database

l Agent(s) send(s) the candidate hash value to the Enterprise Manager to compare against the Enterprise Manager’s copy of the Pwned database.

l The advantage of this approach is that the Pwned database space is not required on the Domain Controllers. The disadvantage is at the time of a password change, if the Enterprise Manager is not available, the Agent must assume the hash is okay.

l When the Enterprise Manager loses internet connection, the User must copy the Pwned database to the path specified by the Archive Hash File setting

Doc_ID 371 77

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Passwords Hash Database

Within the EPE Settings window, there are global settings for updating the Have I Been Pwned compromised password hashes database. StealthINTERCEPT utilizes this database to check if users’ new and pending password (i.e. during a password reset) matches the hash of a compromised password from a data breach.

CAUTION: Ensure the initial update of the database occurs during non-office hours. Due to the size of the hash file, this download takes up a significant amount of CPU and download time.

A first time configuration of this window requires the Pwned database to be downloaded from the Have I Been Pwned website using Update in order to use the update settings on this page. See the Obtaining the Pwned Database section for additional information.

The EPE Settings window has the following options:

l Check for update options

l Check update every [number] [unit of time] – Select how often the Have I Been Pwned website is checked for a newer version of the passwords database.

l Check for new version – Creates an alert in the Alerts interface grid when a new version of the Pwned passwords database is available on the Have I Been Pwned website.

Doc_ID 371 78

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

NOTE: This checkbox does not automatically download the new Pwned database version for the user.

l Update pwned DB on new version– Downloads the latest version of the password database from the website. NOTE: This checkbox does not automatically download the new Pwned database version for the user.

After making selections, select the Apply button to make the selections active.

l Check current version – Checks the Have I Been Pwned website for the latest password hash file details and compares the SHA-1 to the local hash file to determine if the website has a newer version of the database

l Passwords Hash Database Folder – Central location of the Pwned database on the Enterprise Manager. The default path is:

…Stealthbits\StealthINTERCEPT\SIEnterpriseManager\PwnedS tore

l Update from Link or File

l Link – Automatically downloads the hash file for the Pwned database. This option requires internet connection to function.

l File – Use Select File to browse to a copy of the hash file that was manually downloaded from the Have I Been Pwned website.

l Progress – Use Update to automatically or manually download the Pwned database to the location specified in the Passwords Hash Database path.

User Feedback Module

The optional EPE User Feedback Module provides feedback to end users listing the reasons the Enterprise Password Enforcer (EPE) event type has rejected a candidate password. In order to enable integration with the User Feedback Module (also known as the Credential Provider), the Enable EPE User Feedback Module checkbox must be selected.

Remember, the module must be deployed by the user to any desired end user computers. See the EPE User Feedback Module section of the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

Doc_ID 371 79

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

There are two checkboxes in the User Feedback Module group:

l Enable EPE User Feedback Module

l User Custom Messages

The User Feedback Module option enables integration between an optional EPE User Feedback module and the SI Agent(s) on a Domain Controller. Selecting the checkbox enables the integration between the module and the SI Agent(s). Press Update to apply the current state of the checkbox to the module.

Open Custom Messages Editor window by selecting Modify Messages in the User Feedback Module group. This window allows users to customize EPE User Feedback Module password rejection messages.

Doc_ID 371 80

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

To edit, double-click the row in the Custom Message column and enter a unique message. Once customizations are complete, click OK to save changes or Cancel to discard them. Select Reset to revert all customized messages back to their defaults.

The string "{0}" is a placeholder populated at run time with specific values leading to the password being rejected. The string "{0}" must be included in all custom messages where the user wants the run time generated information to display.

Password Rules Filter Global Settings

The following windows are global settings for the EPE Password Rules filter within the EPE Settings window. Whatever is configured in these windows is applied across all EPE Password Rules filter(s) in the StealthINTERCEPT console.

Doc_ID 371 81

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The dialogues monitor or block an event with these global settings:

l Password Dictionary – Requires an exact match between the user entered password and the password in the dictionary

l Words List Dictionary – Global list of character substitutions found in passwords. Uses the Substitution Editors map to check all permutations of a pending password

l Substitutions Editor – Create a character substitution map used to create password permutations for the Words List dictionary Password Dictionary Window

The Password Dictionary window is a global setting used across all EPE policies. It contains the centralized copy of the dictionary.dat file. This modifiable file contains all compromised passwords in the textbox. Type in the textbox or use Windows copy and paste functionality to add, remove, and modify passwords in the textbox.

Remember, in order for the password to be rejected, the user pending password must match exactly to a listed password in the Password Dictionary list.

Doc_ID 371 82

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The buttons on the right have the following functions:

l Add From File – Uploads passwords (one password per line) from a .txt file

l Save To File – Opens up a Save As window to save the current configuration to a .txt file at any desired location

l Sort and Distinct – Automatically removes duplicates and sorts passwords in alphanumeric order

l Find – Use the textbox to search for a password

l Default List – Resets the password values to the original list provided during installation. Any previous modifications are discarded.

l Remove All – Deletes all passwords from the window

Doc_ID 371 83

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Select OK to push list modifications out to all Active SI Agents. Inactive SI Agents get the updated list when they reconnect to the Enterprise Manager. Select Cancel to close the window and lose any changes made.

Words List Dictionary Window

The Words List Dictionary window is a global setting used across all EPE policies. It contains a user provided global list of character substitutions found in passwords. This feature uses the entries in the Substitutions Editor to check all permutations of a user entered password. If the password matches a substitution rule, it is blocked.

Doc_ID 371 84

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Type in the textbox or use Windows copy and paste functionality to add, remove, and modify passwords in the textbox. The buttons on the right have the following functions:

l Add From File – Uploads character substitutions (one password per line) from a .txt file

l Save To File – Opens up a Save As window to save the current configuration to a .txt file at any desired location

l Sort and Distinct – Automatically removes duplicates and sorts character substitutions passwords in alphanumeric order

l Find – Use the textbox to search for a password

l Remove All – Deletes all character substituted passwords from the window

Select OK to push list modifications out to all Active SI Agents. Inactive SI Agents get the updated list when they reconnect to the Enterprise Manager. Select Cancel to close the window and lose any changes made.

Substitutions Editor Window

The Substitutions Editor window is a global setting used across all EPE policies. Character substitutions and their associated replacements are stored in this editor as rules (i.e. A = @). The Words List Dictionary applies these rules when checking all permutations of a user entered password.

NOTE: All entries in the sequence column must be unique.

For example: If “Goal” is added to the Word List Dictionary and A=@ and O=0 are added to the substitutions editor, then the pending passwords of “Go@l” and “G0al” are going to be blocked.

Doc_ID 371 85

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Substitutions Editor has the following options:

l Import – Imports a full set of the character substitutions from a user specified file

l Export –Saves the current set of character substitutions to a user specified file

l Reset to default – Resets the character substitutions to the original list provided during installation. Any previous modifications are discarded.

l Insert – Displays a custom row for the user to enter in Sequence and Replacement values NOTE: The new row is inserted underneath the current highlighted row.

l Delete –Removes a single row from the Substitutions Editor list. Only one row can be deleted at one time.

Select OK to save changes and close the window.

Event Database Configuration Window The Events Database Configuration window manages the NVMonitorData database, also known as the Events Database. This window is opened through the Menu's Configuration > Database > Server option.

Doc_ID 371 86

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

This window is only available to SI Administrators.

The Events Database is originally configured when installing the SI Enterprise Manager Package. See the Installation Process of the StealthINTERCEPT Installation & Upgrade User Guide for additional information. This window displays the current connection settings for the Event Database.

To change the credentials and/or SQL Server host information, see the SI DB Connection Manager application in the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

Event Filtering Configuration Window The Event Filtering options are for excluding specific Active Directory and Authentication events from being monitored. A latency threshold can be set and generate alerts for AD Events. These features are set in the Menu’s Configuration > Event Filtering option.

This window is only available to SI Administrators.

Doc_ID 371 87

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The filter options are grouped by AD Global Pre Filters, Authentication Global Pre Filters, and Alerts. Check the boxes to activate the filters. To disable for diagnostic purposes, simply uncheck the option(s) and click Save. All Authentication Global Pre Filters options require configuration before they can be enabled.

RECOMMENDED: Enable all of the AD Global Pre Filters options as well as the Exclude Logins from Machine Accounts option in the Authentication Global Pre Filters section.

When activated, the SI Agent(s) filters out the event data according to configuration defined in the filters.json file located in the installation directory of the Enterprise Manager.

Doc_ID 371 88

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The ‘Help’ icon (?) opens a window which explains the type of “noise” events being filtered. Exclude ‘Noise’ Events Option

This option is enabled by default to filter out login and internal low level attributes which can be considered ‘noise’ events, resulting in a bloating of the database. This option can be scoped to include any combination to the following ‘noise’ events:

l Successful AD User Logins – Excludes events with the following attributes where ‘objectClass’ does not equal computer:

l logonCount

l lastLogon

l badPwdCount

l lastLogonTimestamp

l AD User Logins with Bad Password – Excludes events with the following set of attributes where ‘objectClass’ does not equal computer:

l badPwdCount

l badPasswordTime

Doc_ID 371 89

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l AD Computer Logins – Excludes events with the following set of attributes where ‘objectClass’ equals computer:

l logonCount

l lastLogon

l badPwdCount

l lastLogonTimestamp

l badPasswordTime

l badPwdCount

l Low Level Attributes – Excludes the following attributes from event:

l ImPwdHistory

l dBCSPwd

l ntPwdHistory NOTE: Pre-4.2 SI Agents skip the objectClass-based filter sub-condition of the filter options above

Exclude AD DNS Events Option

This option is enabled by default to filter out DNS events. These events can result in a bloating of the database. They must meet both of the following conditions to be excluded:

l objectClass = ‘dnsNode’ or ‘dnsZone’

l Contains the ‘dnsRecord’ or ‘dNSTombstoned’ attribute NOTE: Pre-4.2 SI Agents ignore this filter.

When the DNS checkbox is unchecked, DNS record events display in a human-readable format within the Recent Events data grid of the Active Directory policy. In order to search these results, the Affected Object: Class can be set to equals dnsNode for the dnsRecord attribute to display.

Exclude Logins from Machine Accounts Option

This option is enabled by default to filter out machine logins. These events can result in a bloating of the database. Click the configure link to open the Edit Collection window.

Doc_ID 371 90

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Exclude Logins from Machine Accounts collection is only accessible for configuration through the Event Filtering Configuration window. Use the Add (+) button to open the Select Active Directory Perpetrators Window to browse for machine accounts or type in the textbox.

Only perpetrators with accounts ending in “$” are considered for this filter. Wild cards (*) can be used for partial matches to account names.

All machine accounts in the textbox are either included or excluded from event data monitoring by the SI Agent. Machine accounts not in the list have the unselected property applied.

Choose one of the following radio buttons to be applied to the list of account names:

l Pass to agent on match – Included and passed to the agent for event data monitoring. Machine accounts not in the list are excluded and ignored by the agent.

l Remove on match – Excluded and ignored by the agent. Machine accounts not in the list are included and sent to the agent for event data monitoring.

Repeat the process until all machine accounts to be included or excluded from Authentication event data have been entered in the list. Then click OK.

Usage Tip

Doc_ID 371 91

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Windows Server 2012 introduced gMSA (Group Managed Service Accounts). The account names for gMSA accounts include “$” in their names so by default authentication traffic generated by these accounts is filtered out by SI because they ‘look’ like machine accounts which prior to Server 2012 were the only account names ending in “$”. The ability in SI to now add a list of filter strings to the “Exclude Logins from Machine Accounts” global filter provides a means to capture activity by gMSA type accounts as this activity is typically of interest where as true ‘machine accounts’ is not. By supplying either an explicit list of gMSA account names, or if a naming convention has been adopted, a set of wild card strings such as “gMSA*” or “svc*”, allows capturing authentication activity from such accounts while ignoring the noisy ‘machine accounts’.

Exclude Authentication Events from Selected Hosts Option

This option is disabled by default as it requires configuration before it can be enabled. Click the selected hosts link to open the Edit Collection window.

The Exclude authentication events from hosts collection is only accessible for configuration through the Event Filtering Configuration window. All three methods of identification for a host (IP Address, NETBIOS host name, or DNS host name) must be known in order to effectively exclude authentication from the host. Identify the host to be excluded in the textbox of the IP Address column and hit Enter or select the next row on the grid. StealthINTERCEPT attempts to discover the NETBIOS host name and the DNS host name associated with the supplied IP Address. If the host identification is not resolved or is inaccurate, manually type the information.

Repeat the process until all hosts for which Authentication event data will not be collected have been entered in the list. Then click OK. The Edit Collection window closes, and the Exclude Authentication Events from selected hosts option can be enabled.

Exclude Authentication Events from Selected Accounts Option

This option is disabled by default as it requires configuration before it can be enabled. Click the selected accounts link to open the Edit Collection window.

Doc_ID 371 92

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Exclude authentication events from accounts collection is only accessible for configuration through the Event Filtering Configuration window. Use the Add (+) button to open the Select Active Directory Perpetrators Window to browse for the desired accounts. Account names [domain name\account] can also be typed in the textbox. Wild cards (*) can be used as part of either the domain name or account. An asterisk (*) appearing anywhere other than as the first character or the last character are treated as a literal character instead of as a wild card. For example: *\Service1 would exclude all Service1 accounts whether it is a domain or local account, and Example\Service* would exclude all accounts that start with “Service” for the Example domain.

Repeat the process until all accounts to be excluded from Authentication event data have been entered in the list. Then click OK. The Edit Collection window closes, and the Exclude Authentication Events from selected accounts option can be enabled.

AD Events Latency Threshold Option

This option is disabled by default. It is used to generate alerts if the time delay between when an AD Event occurs and the time the Enterprise Manager receives it exceeds the specified latency threshold. This option is helpful for troubleshooting when experiencing slow connection in the environment. These events can result in a bloating of the database especially if the latency threshold is set too low.

Doc_ID 371 93

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Select Send Latency Alerts to enable this option. Use the arrows, or type into the textbox, to set the number of minutes latency between the event and the agent receiving the event. When events exceed the timeframe, alerts display in the Alerts Interface. Email or SIEM alerts can be generated by selecting the Agent Latency checkbox in the SI System Alerting Window dialogue in the Operations tab.

Export Policies and Templates Window The Export Policies and Templates window is for configuring what is exported to the XML file. If opened through the Menu’s Tools > Export… option, then everything is exported. If opened via the keyboard shortcut (Alt+X) while within the Policies Interface or Templates Interface, it exports only what is within the selection. To export only a single policy or template, use the Policies Interface or the Template Node Right-Click Menu options.

Doc_ID 371 94

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Export Policies and Templates window includes the following options for customization.

l Collections:

l Export Collections – Check the box to activate the radio buttons:

l Export All Collections

l Export Only Collections Used in Policies and Templates

l Do Not Include Collection Items checkbox – Excludes collection items from the Collection export

Doc_ID 371 95

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Event Consumers and Alerts:

l Export All Event Consumers and Alerts – Exports all event consumers (actions) and alerts

l Export Only Event Consumers and Alerts Used in Policies and Templates – Exports only event consumers and alerts configured on the Actions Tab of enabled policies

l Options:

l Notes – Enter any information to be saved with the XML file

l Encrypt Sensitive Fields – When active, it provides a Password and Verify Password to be used as the encryption key

When the options are set as desired, click Export.

File Monitor Settings Windows The File Monitor Settings window is a global setting for managing log retention, the ability to disable office file filtering, inherited permissions for parent object changes, and AD accounts and file system activity processes for StealthINTERCEPT file monitoring and blocking policies. This window is set through the Menu’s Configuration > File Monitor Settings option.

This window is only available to SI Administrators.

The File Monitor Settings window as the following options:

l Logs retention period, days – Log retention period for activity logs (TSV files) created by the StealthINTERCEPT Agent for Windows servers or by the Stealthbits Activity Monitor Agent for NAS devices and then read by the StealthINTERCEPT Agent. This does not affect File System

Doc_ID 371 96

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

StealthAUDIT Event Types. StealthINTERCEPT Agents read logs in real time and retain the original logs for a set number of days before the logs are automatically deleted. This setting configures the log retention period for all enabled policies using the File System Changes and/or File System Lockdown event types. By default, it is set to 10 days.

l Microsoft Office temporary files filtering – Global setting that is selected by default. If checked, the temporary files associated with Microsoft office operations, such as copy, paste, etc., are not monitored. When unchecked, all the temporary files associated with Microsoft office operations are monitored.

l The FS inherited permissions – Reports separate events for the parent object and each child object. When checked, it reports an event only for the parent object.

l Exclude selected accounts – Deselected by default. When checked, the list of AD user and group names as well as well-known SIDs for built in users/groups are excluded from file system monitoring and blocking policies at a global level.

l Exclude Selected processes – Deselected by default. When checked, the user-supplied list of processes are excluded from the file system monitoring and blocking policies at a global level.

l Include Folder list / read operations – Deselected by default. When checked, all list/read folder operations are included in file system monitoring and blocking policies reporting at a global level.

Select Accounts to Exclude from Collections Follow the steps to select accounts to exclude from collections:

Step 1 – Navigate to the File Monitor Settings window through Menu's Configuration > File Monitor Settings option.

Step 2 – Check Exclude selected accounts checkbox and then select accounts. The Edit Collection window displays.

Doc_ID 371 97

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 3 – Use the Add (+) button to open the Select Active Directory Perpetrators window to browse for AD accounts. Select OK to accept modifications.

Any accounts added to the list are excluded globally for file system activity.

The Exclude selected processes option is deselected by default. When checked, any file activity generated by the processes added will have their file system activity ignored.

Select Local Processes for Exclusion Follow the steps to select local processes for exclusion:

Step 1 – Navigate to the File Monitor Settings window through Menu's Configuration > File Monitor Settings option.

Step 2 – Check Exclude selected processes checkbox and then select processes. The Edit Collection window displays.

Doc_ID 371 98

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 3 – Use the textbox to enter process names. Select OK to accept modifications.

Any processes added to the list will not have their file activity reported.

Import Window The Import window is for selecting the exported XML file to be imported and configuring the import settings. This window is opened through the Menu’s Tools > Import… option or via the keyboard shortcut (Alt+I).

Doc_ID 371 99

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Import window includes options for customization and filters to handle duplicate items.

In the Select Import File section, use the ellipsis (…) to browse for the XML file to be imported. Once selected, the Import File Details displays statistical information on what will be imported and notes from the exported file.

In the Destination Folders section, use the radio button to choose one of the following:

Doc_ID 371 100

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Place in Folders from Which They Were Exported

l Place in Specific Folders – Choose between the radio buttons:

l Place All in This Single Folder

l Maintain Folder Hierarchy from Which They Were Exported

l Then select the Folder Destination for Policies/Templates by using the appropriate ellipsis (…) to browse for the folder location within the Policy Center.

NOTE: This does not create new folder locations.

In the Collections section, use the radio button to choose one of the following:

l Create Collection with All Imported Items

l Create Empty Collection

At the bottom of the Import window is an option to Append Import Details to Modified Entries. If checked, this option appends the import information to a pre-existing item instead of overwriting it.

When the options are set as desired, click Import.

Password Safe Configuration Window The Password Safe Configuration window is a global setting for configuring multiple profiles with the appropriate credentials for accessing a third-party password safe such as Beyond Trust. The account checked out from a password safe must have rights on the machines targeted for the Agent actions. A Password Safe profile can be used within the Agents Interface for a number of Agent actions instead of entering in credentials directly. This window is set through the Menu’s Configuration > Password Safe option.

This window is only available to SI Administrators.

Profiles Tab The Profiles tab is where a Password Safe profile is configured. These profiles are the integration point between StealthINTERCEPT and a third-party password safe.

Doc_ID 371 101

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Follow the steps to configure a password safe profile:

NOTE: Multiple profiles are supported.

Step 1 – Navigate to the Password Safe Configuration window by selecting the Menu's Configuration > Password Safe option. The Password Safe Configuration window opens.

Step 2 – On the Password Safe Configuration window, select the green plus button (+) on the Profiles tab or edit an existing profile by selecting it from the list. The Settings to the right are activated for configuration.

Step 3 – In the Settings group, configure the following:

l Profile Name – Name displayed in the Password Safe drop-down menus in the Agents Interface

l Public – When deselected, only the current user has access to the profile. When selected, the profile becomes available to all SI Administrators of the Console.

l Server URL – Enter the URL to connect to the third-party password safe

l API Key – Obtained from the third-party password safe application, such as Beyond Trust. This is how SI secures the connection between the application and console.

Doc_ID 371 102

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Ask on Action checkboxes – StealthINTERCEPT prompts the user at the time of a selected action (i.e. deploying an Agent) for profile and credential selection.

l Password Safe Account – The account used to access the password safe

l Login

l Password

l AD Admin Account to Check-out – The account being checked out of the password safe to be used with Agent actions

l Check-out Time – Requested time to check out and use the password safe credentials

l Auto Check-in – Returns credentials to the password safe after the Agent action is completed

l Take Ownership – Another SI Administrator can take control of a profile created by another user

Step 4 – Select Ok to save the profile or Cancel to discard pending changes.

A new or edited profile now displays in the list in the Profiles list.

Scripts Tab The Scripts tab is where the Retrieve Password, Check-out, and Check-in functions are configured for integration with a third-party password vault.

Doc_ID 371 103

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

For Beyond Trust integration, these functions are pre-populated and added to the ...Stealthbits\StealthINTERCEPT\SIEnterpriseManager\Scripts folder as its default path. Advanced users can create their own PowerShell scripts tailored to their environment.

SI System Alerting Window The SI System Alerting window is for configuring and managing all alerting avenues. This window is opened through the Menu’s Configuration > Alerts option, and is only available to SI Administrators.

Doc_ID 371 104

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Alerts can be sent to recipients via email, to Windows Event Log, and to SIEM products. These alerts can be configured to send notification of SI Security events, SI Operations events, SI Configuration events, Analytic incidents, and Policy events. Email and SIEM alert notifications of policy events can be enabled either through this window or from the Actions Tab of a policy’s configuration. However, in order to enable email and SIEM alert notifications, configuration must first be set through this window. From within the Policy Center, the Alerts Interface allows SI users to quickly view recent alerts in a centralized location.

Email and SIEM alert notifications for Analytic incidents can be configured within this window to send Ongoing Attack Alerts. When checked, SI sends periodic reminders of an ongoing attack if it continues after the initial notification has been sent.

Below are some considerations:

l Occasionally a Microsoft Security Bulletin impacting LSASS can interfere with the SI Agent instrumentation resulting in LSASS shutting down. The SI Agents are confused to monitor for an LSASS process termination shortly after a server reboot. The LSASS process terminated SI Operations Alert is triggered in this event and the SI Agent is stopped. If this occurs, it requires the SI Administrator to take action as all monitoring/blocking by that SI Agent will be stopped. RECOMMENDED: Activate an Email Notification for this alert.

See the LSASS Process Terminated section for additional information.

Doc_ID 371 105

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l In addition to the LSASS process termination check, the SI Agent can be configured for a Safe Mode. When enabled, the SI Agent records the version of all DLLs it hooks into in LSASS during installation. When an SI Agent is restarted, it compares the DLL versions with the recorded list. If the versions do not match, the Windows AD Events monitoring module is not loaded. The agent’s Status in the Agents interface changes to Active (Modules Pending), and all Active Directory monitoring/blocking by that SI Agent will be stopped. If this occurs, it requires the SI Administrator to take action. The Agent Started in AD Monitor pending mode SI Operations Alert is triggered in this event. RECOMMENDED: Activate an Email Notification for this alert.

See the How To Enable Agent Started in AD Monitor Pending Mode Email Alert and the SI Agent Safe Mode sections for additional information.

Email Tab Alert notification via email sends messages through an SMTP Gateway. Alerts are designed to send email notifications to individuals or groups who need the same information. When the Message Profile is modified for an alert, all policies referencing the alert uses the updated information. Follow the steps to configure the Email tab of the SI System Alerting window:

Step 1 – Configure the following prior to enabling email alerting:

l Configure SMTP Host Information – Configuration of this section is required before the following actions can be preformed:

l Exporting data from the data grid within the SI Admin Console

l Export reports within the SI Reporting Console

l Schedule reports within the SI Reporting Console

l Create Message Profiles – Use the Configure section of the Email tab to configure a message profile in either a plain text or HTML format.

Step 2 – Once configured, navigate to the Events section of the Email tab. Decide what events receive notifications and assign one or more profiles to the event.

Doc_ID 371 106

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 3 – Click the button [1] in front of Disabled to toggle the setting to Enabled.

Step 4 – Select the event category [2] (Security, Operations, Configuration, Analytics, Policies) from the list on the left.

Step 5 – Check the desired event/incident/policy [3] that triggers email notifications from the center list.

Step 6 – Assign the desired Message Profile from the list [4] provided in the drop-down menu to the right of the selected event.

l For Policies, multiple Message Profiles can be assigned by either checking the desired profile(s) or (Select All).

There is no limit to how many events a Message Profile can be assigned.

l For Analytics, choose whether or not to enable Ongoing Attack Alerts.

Step 7 – Click OK in the drop-down menu to confirm the selection.

Step 8 – Repeat Steps 2-5 as desired. Then click OK at the bottom of the SI System Alerting window to save the assignment of profiles. The SI System Alerting window closes.

Doc_ID 371 107

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The SI Admin Console now sends email notifications for the selected events/incident/policies to the recipients of the selected Message Profiles.

Configure SMTP Host Information Follow the steps to configure the SMTP Host information for email alerting.

Remember, this only needs to be done once in order to enable email alerts for both the SI Admin Console and the SI Reporting Console.

Step 1 – On the Email tab, select Configure.

Step 2 – In the Server box, provide the SMTP Host as either the IP Address or the hostname of the SMTP gateway.

l Example: 192.168.189.56 or SIM1.Stealthbits.com

Step 3 – For the Port box provide the appropriate port number.

Step 4 – The Enable SSL checkbox provides the option to use SSL communications for email. Check the box to enable this option.

Doc_ID 371 108

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 5 – For the From box provide the email address to be used as the sender for the email.

l Example: [email protected]

Step 6 – If the SMTP Gateway requires authentication, check the Requires Authentication checkbox and provide a Login and Password with the appropriate level of credentials in the textboxes that appear.

Step 7 – Click OK on the SI System Alerting window to save the configured SMTP Host information.

Once the window closes, create the Message Profile(s).

Create Message Profiles Message Profiles are associated with events for email alerting. Follow the steps to create a Message Profile.

Doc_ID 371 109

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 1 – On the Email tab, select Configure.

Step 2 – In the Message Profiles box, click the Add (+) button to create a New Email Notification Profile. The default profile name (New Email Notification) displays.

RECOMMENDED: Provide a unique and descriptive name for this new email notification profile.

Doc_ID 371 110

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Plain Text Format HTML Format

Step 3 – Configure the following for the Message Profiles section:

l To – Provide an email address for each recipient of the email alert. This can be individuals, distribution lists, or a combination. To send alerts to multiple recipients, separate the addresses with either a comma (,) or a semi-colon (;)

l Example: [email protected]; [email protected]

l Send Test Email – Use to send a test email. It sends an unformatted sample message to all recipients. StealthINTERCEPT tells the SI user if the message is successfully sent, but is not able to tell if it was received.

l Subject – Keep the default email subject or provide a descriptive one that fits the alerts these recipients receive.

The default email subject is: Stealthbits StealthINTERCEPT Event Notification.

l Format – Choose between Plain Text and HTML email options. Changing the message template provides the option to load the default message template. The Email Template window displays when selecting either radio button.

Doc_ID 371 111

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Changing the message template provides the option to load the default message template. Choose between:

l Yes – Loads the default message template for the selected format. This overwrites the current message template.

l No – Leads the current message Body

CAUTION: The tokens used within the message Body, the information between and including the % symbols (e.g. %TIME_STAMP%), must be present to retrieve that event data from the database. Tokens can be removed, but partial tokens do not retrieve data from the database.

Step 4 – The Body box contains the default message, which includes all event data types available for notification. To customize for the specific alerts, simply remove the Event Data Fields not desired. Customization can also include reformatting the message as desired. The default message is:

l Plain Text – An event has occurred in which you are on the notification list.

l HTML – The following Event has occurred at %TIME_STAMP% for which you requested notification:

The available Event Data Fields and their associated tokens are;

Event Data Field Token

Time Stamp %TIME_STAMP%

Event Source Type %EVENT_SOURCE_TYPE%

Domain Name %EVENT_SOURCE_NAME%

Policy Name %SETTING_NAME%

Event Name %EVENT_NAME%

Doc_ID 371 112

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Event Data Field Token

Event Name Translated %EVENTNAMETRANSLATED%

Originating Server % ORIGINATING_SERVER%

Originating Server IP %ORIGINATING_SERVERIP%

Target Host %TARGETHOST%

Target Host IP %TARGETHOSTIP%

Class Name %CLASS_NAME%

DN %DN%

Affected Object SID %AFFECTED_OBJECT_SID%

Affected Object Account Name %AFFECTED_OBJECT_ACCOUNT_NAME%

Operation Successful %SUCCESS%

Operation Status %STATUS%

Blocked Event %BLOCKED_EVENT%

Perpetrator %PERPETRATOR%

Perpetrator Name %PERPETRATOR_NAME%

Perpetrator Sid %PERPETRATOR_SID%

Originating Client %ORIGINATING_CLIENT%

Originating Client Host %ORIGINATINGCLIENTHOST%

Originating Client IP %ORIGINATINGCLIENTIP%

Doc_ID 371 113

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Event Data Field Token

Originating Client Protocol %ORIGINATINGCLIENTPROTOCOL%

Originating Client MAC %ORIGINATINGCLIENTMAC%

Events Count %EVENTS_COUNT%

Attribute Values %ATTRIBUTE_VALUE%

Old Attribute Values %OLD_ATTRIBUTE_VALUE%

Attribute Operations %OPERATION%

Repeat this process to create as many Message Profiles as desired.

Step 5 – Click OK on the SI System Alerting window to close and save Message Profile settings. Now that at least one Message Profile has been configured, it can be assigned to an event either through the SI System Altering window’s Email Tab or assigned to a policy on the Actions Tab of the Policy Configuration.

Event Log Tab Alert notification via Event Log sends event notifications to the Windows Event Log. Follow the steps to enable Event Log Alerting.

Doc_ID 371 114

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 1 – Click the button [1] in front of Disabled to toggle the setting to Enabled.

Step 2 – Select the event category [2] (Security, Operations, Configuration) from the list on the left.

Step 3 – Check the desired event(s) [3] that trigger Windows Event Log notifications from the list in the center.

Step 4 – Then click OK at the bottom of the SI System Alerting window to save the configuration. The SI System Alerting window closes.

The Windows Event Log now receives alert notifications for the checked events.

SIEM Tab Alert notification via SIEM sends event notifications to a SIEM product using UDP or TCP protocol. Before SIEM alerting can be enabled, the SIEM server must be configured. Follow the steps to set up what events receive notifications.

Step 1 – Navigate to the Configure section of the SIEM tab and Configure SIEM Server.

Step 2 – Once configured, navigate to the Events section of the SIEM tab.

Doc_ID 371 115

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 3 – Click the button [1] in front of Disabled to toggle the setting to Enabled.

Step 4 – Select the event category [2] (Security, Operations, Configuration, Analytics, Policies) from the list on the left.

The Configure SIEM Server options allows SI Administrators to set a SIEM Mapping File for each type of event category.

Step 5 – Check the event/incident/policy [3] that triggers SIEM notifications from the center list.

Step 6 – Select the desired SIEM profile [4] to send alerts to.

l For Analytics, choose whether or not to enable Ongoing Attack Alerts.

The SI Admin Console now sends SIEM notifications for the selected events/incidents/policies.

Configure SIEM Server Multiple profiles can be created across SIEM servers to serve different alerting functionalities. Follow the steps to configure one or more SIEM servers for alerting.

Doc_ID 371 116

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

UDP Protocol TCP Protocol

Step 1 – On the SIEM tab, select Configure.

Step 2 – (Optional) In the SIEM Profiles section, select the Add (+) button to create a New SIEM Profile. To rename the default text, select the name string and enter the new profile name.

RECOMMENDED: For each profile, use a unique name for easy identification.

Step 3 – For the Protocol box, use the drop-down menu to select either protocol:

l UDP

l TCP – If selected, the option Require SSL/TLS activates. If desired, check this box and ensure the certificate is saved in the certificate store.

Step 4 – For the Host Address box provide either an IP Address or server name for the SIEM server.

Step 5 – For the Port box provide the appropriate port number to communicate with the SIEM server.

Doc_ID 371 117

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 6 – For the Mapping File for Events box, use the drop-down menu to select the SIEM product which will be receiving policy event notifications. The gear icon to the right of the drop- down arrow allows SI Administrators to import a custom mapping file. These mapping file formats are specifically designed for policy events.

Step 7 – For the Mapping File for System Alerts box, use the drop-down menu to select the SIEM product which will be receiving SI Security, SI Operations, and SI Configuration event alerts.

The gear icon to the right of the drop-down arrow allows SI Administrators to import a custom mapping file. These mapping file formats are specifically designed for SI system events.

Step 8 – For the Mapping File for Authentication Analytics box, use the drop-down menu to select the SIEM product which will be receiving Authentication Analytics incident alerts.

The gear icon to the right of the drop-down arrow allows SI Administrators to import a custom mapping file. These mapping file formats are specifically designed for Analytics incidents.

Step 9 – (Optional) Use the Test button to confirm the configuration settings.

Once a SIEM server is configured, assign events to send alerts through the SI System Alerting window’s Email Tab or assigned to a policy on the Actions Tab of the Policy Configuration.

IBM® QRadar® Integration

Stealthbits has created a custom app for integration between StealthINTERCEPT and QRadar. See the Stealthbits Active Directory App for QRadar User Guide for information on downloading this app from the IBM X-Force Exchange, installing this app into an organization’s QRadar, and using the dashboards. See also the Stealthbits File Activity Monitor App for QRadar User Guide. See Appendix A for QRadar Mapping File information.

Splunk® Integration

Doc_ID 371 118

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Stealthbits has created custom apps for integration between StealthINTERCEPT and Splunk. See the Stealthbits Active Directory App for Splunk User Guide and the Stealthbits Threat Hunting App for Splunk User Guide for information on downloading this app from the Splunkbase, installing this app into an organization’s Splunk, and using the dashboards. See also the Stealthbits File Activity Monitor App for Splunk User Guide.

Adding a Custom SIEM Mapping File Custom SIEM mapping files can be added. First create the mapping file, and then save it in an accessible location to the SI Admin Console. The default mapping files are stored in the following folder: …\Stealthbits\StealthINTERCEPT\SIWinConsole\SIEMTemplates

Follow the steps to add a custom SIEM Mapping File.

Step 1 – Click the gear icon next for the alert type to be configured in order to open the SIEM Templates window. The new mapping file is only made available for the alert type selected.

Doc_ID 371 119

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 2 – Click the Add (+) icon to open the Import SIEM Mapping File window.

Step 3 – Navigate to the desired mapping file and click Open. The SIEM Mapping File window closes.

Doc_ID 371 120

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

SIEM Template Window Mapping File Drop-down Menu

Step 4 – The new mapping file appears in the SIEM Templates window and is now available in the drop-down menu. Click Close.

The new mapping file can now be selected from the drop-down menu for the selected alert type. Repeat Steps 1-4 to add the new mapping file to other alert types.

StealthDEFEND Configuration Windows The StealthDEFEND Configuration window is a global setting for enabling the integration between StealthINTERCEPT and StealthDEFEND. This window is only available to SI Administrators.

The features of this window were not introduced in a single release of StealthINTERCEPT and StealthDEFEND. Refer to the list below for the minimum versions required for the specified configuration feature and its tab to display in the SI Console.

l Event Sink Tab – Released with StealthINTERCEPT v6.0 and StealthDEFEND v2.0

l Honey Token Tab – Released with StealthINTERCEPT v7.1 and StealthDEFEND v2.5

l Forged PAC Tab – Released with StealthINTERCEPT v7.3 and StealthDEFEND v2.6

The StealthDEFEND App Token authenticates connection between StealthINTERCEPT and StealthDEFEND. The StealthDEFEND App Token is generated within StealthDEFEND:

l Navigate to the Configuration > App Tokens page

l Generate a new app token

l Copy the Token

Doc_ID 371 121

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

See the App Token section of the StealthDEFEND User Guide for additional information on setting up StealthINTERCEPT integration.

Event Sink Tab The StealthDEFEND Event Sink tab connects StealthINTERCEPT to StealthDEFEND through a uniform resource identifier and the StealthDEFEND App Token. Policy event data is sent to StealthDEFEND through this window.

Follow the steps to configure StealthINTERCEPT to send event data to StealthDEFEND.

Step 1 – Generate the StealthDEFEND App Token in StealthDEFEND.

Step 2 – Within StealthINTERCEPT, navigate to Menu > Configuration and select the StealthDEFEND Event Sink option. The StealthDEFEND Event Sink window opens.

Step 3 – On the StealthDEFEND Event Sink window, configure:

CAUTION: Do not use localhost for the hostname or 127.0.0.1 for the IP address.

Doc_ID 371 122

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l StealthDEFEND URI – Enter the StealthDEFEND hostname or IP address and port in the following format. The default port for StealthDEFEND is 10001.

l amqp://[HOSTNAME | IPADDRESS]:[PORT]

l For an example with the host name – amqp://ExampleHost:10001

l For an example with the host address – amqp://192.168.9.52:10001

l App Token – App Token generated on the App Tokens page in StealthDEFEND

l Policies – Shows all Policies that exist in the Policies Interface.

l Send – Selected enabled Policies send their event data to StealthDEFEND directly from the SI Agents. This option can also be set by the Send to StealthDEFEND checkbox on the Actions Tab.

l State – Displays whether or not the policy is enabled or disabled The State column does not control the state of the checked Policy. These policies can be enabled or disabled either at the Policies Interface or through the Policies Node Right-Click Menu.

l Name –Shows the display name of the Policy as written in the Policies Interface.

l Path – Displays the path of the Policy within the structure of the Policies Interface.

Step 4 – Click Save.

All real-time event data from the selected StealthINTERCEPT policies are now being sent to StealthDEFEND.

The StealthDEFEND URI configuration can also be used to send SI policy data to the Stealthbits Activity Monitor host and port (example: localhost:4498). StealthINTERCEPT can only send to either StealthDEFEND or the Stealthbits Activity Monitor. See the Active Directory Configuration Guide for additional information.

Honey Token Tab The Honey Token tab specifies which samAccountName is substituted with the samAccountName defined in the Honey Token tab. The information on this tab is sent to the SI Agent. If the agent sees an LDAP query using information from the Honey Token of fake accounts, it alters the LDAP query results to return the Replacement samAccountName. This ensures the account looks like a real privileged account to lure the perpetrator to it.

Doc_ID 371 123

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Follow the steps to send the Honey Token to StealthDEFEND for an LDAP Deception trap.

Step 1 – Configure the Source samAccountName and Replacement samAccountName in a StealthDEFEND Honey Token threat.

See the StealthDEFEND User Guide for additional information.

Step 2 – Ensure the Event Sink tab is properly set up to send event data to StealthDEFEND.

Step 3 – Select the Enable LDAP substitution checkbox to enable the options.

Step 4 – Enter the exact match of settings configured for the StealthDEFEND Honey Token threat for the following options:

l Exact Match or Substring

l Source samAccountName

l Replacement samAccountName

Step 5 – Click Save to close the window.

The Honey Token is now enabled and ready and integrated with StealthDEFEND.

Doc_ID 371 124

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

See the Configure LDAP Monitoring for StealthDEFEND section to configure an SI policy accurately for Honey Token LDAP Monitoring.

Forged PAC Tab The Forged PAC tab provides the option to include Forged PAC information in the event(s) StealthINTERCEPT sends to StealthDEFEND.

Follow the steps to include the Forged PAC information in events:

Step 1 – Under the Analytics node in the Policy Center, select theForged PAC analytic.

Step 2 – On the Forged PAC analytics window, select the gear icon on the upper-right hand corner of the window to open up the Configure Analytics window.

Step 3 – Add or remove the desired RIDs groups on the Settings tab. When adding, the Select Active Directory Groups window opens. Connect and browse for the desired RID groups that will, once selected, be added to the group for this analytic.

Step 4 – On the Policy tab, configure the following:

Doc_ID 371 125

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l General Tab – Use the toggle to Enable the policy

l Event Type Tab – Keep the default settings or set as desired for the Authentication event filters

l Actions Tab – Select Send to StealthDEFEND

Step 5 – Click Save once configurations are set. The Configure Analytics window closes.

Step 6 – Navigate to the Configuration menu and in the drop-down, select StealthDEFEND Configuration. The StealthDEFEND Configuration window opens.

Step 7 – On the StealthDEFEND Configuration window, set the desired StealthDEFEND URI and App Token if not done so already. Then navigate to the Forged PAC tab and select Include Forged PAC information in event. Click Save.

When a Forged PAC analytic is triggered in StealthINTERCEPT, the event data will now be sent to StealthDEFEND.

Users and Roles Window The Menu’s Configuration > Users option opens the Users and Roles window.

This window is only available to SI Administrators.

Doc_ID 371 126

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

This is a security feature for controlling access to the SI Admin Console and the SI Reporting Console. The user account which ran the installation is automatically set as an SI user with the role of Administrator. This is the only active SI user until more are added. With this security feature, no unauthorized accounts can open the SI Admin Console or the SI Reporting Console.

There are three roles which can be applied to an SI user:

l Administrator – Includes Console Operator and Report User functionality

l Console Operator – Includes Report User functionality

l Report User – Access to the SI Reporting Console only

SI Reporting Console Rights

Doc_ID 371 127

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Console Administrator Report User Operator

Log into the SI Reporting Console ü ü ü

Create Reports ü ü ü

Edit or Delete Reports ü Only If Owned Only If Owned

Save Changed Report Parameters ü* Only If Owned Only If Owned

Schedule Reports ü ü ü

Receive Scheduled Reports ü ü ü

Access Admin Menu (to upload ü û û report template files)

*If an Administrator changes report ownership of a report they do not own, a System Alert is generated.

SI Admin Console Rights

Console Administrator Report User Operator

Log into the SI Admin Console ü ü û

Create Policies and Policy ü ü û Templates

View, Edit, or Delete Unprotected ü ü û Policies

View, Edit, or Delete Protected According to According to û Policies Folder Folder Permissions Permissions

Doc_ID 371 128

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Console Administrator Report User Operator

Protect Policies at the Folder ü ü û

Change Protected Folder ü* û û Permissions

Set or Modify SI Admin Console ü û û Configuration Settings

SI Agent deployment & ü û û management

Add or Remove SI Users ü û û

Modify SI User Access Rights ü û û

LDAP Operations Center ü û û

*If an Administrator changes permissions on protected policies they do not own, a System Alert is generated.

See the Policies Interface section for information on protected and unprotected policies.

It is necessary for the SI user to have the following minimum of permissions on the SQL Server databases, both the NVMonitorConfig and NVMonitorData databases, according to the assigned role:

l Administrator Role

l Read/Write data

l If using Database Maintenance Window – SA rights are required

l If using Database Partitioning Window – Create partitioning schema, partition functions, and modify schema

l Console Operator Role

l Read/Write data

Add SI Users

Doc_ID 371 129

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Follow the steps to add SI user and assign access rights.

Step 1 – Navigate to the Menu's Configuration > Users to open the Users and Roles window.

Step 2 – Click the Add (+) button in the upper-right corner and the Select Users or Groups window opens. Browse for the user in Active Directory. Then click OK. The Select Users or Groups window closes and the new SI user is added to the Windows User or Group list.

Doc_ID 371 130

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 3 – At the bottom of the Users and Roles window, assign the access rights by selecting the desired checkbox. Any included right(s) are automatically checked.

l For example, Checking Console Operator automatically checks Report User role as well.

Step 4 – (Optional) Repeat this action as many times as desired before selecting Ok. None of the role changes are acknowledged until the settings have been saved.

Step 5 – Click Ok to finalize any changes on the Users and Roles window.

The SI User(s) now have the appropriate access rights applied.

Modify SI User Assigned Rights Follow the steps to modify an SI user’s assigned rights.

Doc_ID 371 131

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 1 – Navigate to the Menu's Configuration > Users to open the Users and Roles window.

Doc_ID 371 132

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 2 – Select the SI user whose assigned rights are to be modified. Grant a higher right by checking the desired level. Limit the rights by checking the desired level twice. The first click deselects all checkmarks; the second click assigns the new right. Alternatively, deselect undesired right(s).

Step 3 – (Optional) Repeat this action as many times as desired before selecting Ok. None of the role changes are acknowledged until the settings have been saved.

Step 4 – Click Ok to finalize any changes on the Users and Roles window.

The SI User(s) now have the appropriate access rights updated.

Users and Roles Window The Menu’s Configuration > Users option opens the Users and Roles window.

This window is only available to SI Administrators.

Doc_ID 371 133

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

This is a security feature for controlling access to the SI Admin Console and the SI Reporting Console. The user account which ran the installation is automatically set as an SI user with the role of Administrator. This is the only active SI user until more are added. With this security feature, no unauthorized accounts can open the SI Admin Console or the SI Reporting Console.

There are three roles which can be applied to an SI user:

l Administrator – Includes Console Operator and Report User functionality

l Console Operator – Includes Report User functionality

l Report User – Access to the SI Reporting Console only

SI Reporting Console Rights

Doc_ID 371 134

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Console Administrator Report User Operator

Log into the SI Reporting Console ü ü ü

Create Reports ü ü ü

Edit or Delete Reports ü Only If Owned Only If Owned

Save Changed Report Parameters ü* Only If Owned Only If Owned

Schedule Reports ü ü ü

Receive Scheduled Reports ü ü ü

Access Admin Menu (to upload ü û û report template files)

*If an Administrator changes report ownership of a report they do not own, a System Alert is generated.

SI Admin Console Rights

Console Administrator Report User Operator

Log into the SI Admin Console ü ü û

Create Policies and Policy ü ü û Templates

View, Edit, or Delete Unprotected ü ü û Policies

View, Edit, or Delete Protected According to According to û Policies Folder Folder Permissions Permissions

Doc_ID 371 135

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Console Administrator Report User Operator

Protect Policies at the Folder ü ü û

Change Protected Folder ü* û û Permissions

Set or Modify SI Admin Console ü û û Configuration Settings

SI Agent deployment & ü û û management

Add or Remove SI Users ü û û

Modify SI User Access Rights ü û û

LDAP Operations Center ü û û

*If an Administrator changes permissions on protected policies they do not own, a System Alert is generated.

See the Policies Interface section for information on protected and unprotected policies.

It is necessary for the SI user to have the following minimum of permissions on the SQL Server databases, both the NVMonitorConfig and NVMonitorData databases, according to the assigned role:

l Administrator Role

l Read/Write data

l If using Database Maintenance Window – SA rights are required

l If using Database Partitioning Window – Create partitioning schema, partition functions, and modify schema

l Console Operator Role

l Read/Write data

Doc_ID 371 136

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® Policy Center The Policy Center is the primary interface of the SI Admin Console. It is divided into two sections: the Navigation pane and the Display area.

The Navigation pane provides interface options and the Display area displays the selected interface. The following interface options are available:

l Agents Interface

l Alerts Interface

l Investigate Interface

l Analytics Interface

l Policies Interface

l Templates Interface

l TAGS Node

Doc_ID 371 137

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Remember, the Investigate, Analytics, Policies, Templates, and TAGS nodes in the Navigation pane can be expanded and collapsed by double-clicking the left mouse button.

Agents

The Agents interface provides data about the SI Agents within the environment. This includes what domain the agent is in, what machine it is deployed on, its current status, and other details. This interface also indicates if a domain controller does NOT have an SI Agent deployed on it. Through this interface, SI Agents can be deployed, updated, and managed; logging levels can be configured; logs can be accessed; and agent information can be exported.

Alerts

The Alerts interface provides information on the SI Security events, SI Operations events, and SI Configuration events. All events are displayed by default. However, they can be filtered, sorted, and searched.

Investigate

The Investigate interface is a reporting tool for the SI Admin Console. It provides information on recent events monitored or blocked by any enabled policy. By default, all events recently monitored or blocked are available. However, the events can be filtered to particular policies, perpetrators, time frames, domains, servers, computers, events, etc.

Analytics

The Analytics interface is a front-line warning tool for detecting incidents in real-time based on patterns within collected event data indicative of potential security risk. It provides information on incidents identified by the analytic policies.

Policies

The Policies interface provides a central location for creating and configuring all policies. The policies are listed in the Display area when the Policy node is selected. Within the Navigation pane the policies are organized into folders. By default, the folder structure is comprised of but not limited to three folders: Auditing, Blocking, and Notifications. These are the three most common types of policies enabled by SI users. Policies can be configured to monitor or block Windows Active Directory Events, Windows Exchange Server 2010, 2013, and 2016 Events, Windows File System Events, NetApp File System Events, EMC File System Events, and Group Policy Objects Events.

Doc_ID 371 138

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

A folder can be protected which controls access to any policy within the folder. A protected policy cannot be viewed, edited, or deleted by other SI users without explicit permissions being granted.

Templates

The Templates interface provides a central location for creating and configuring all policy templates. Like the Policies interface, a list of all policy templates available is displayed in the Display area when the Templates node is selected. Policy templates must also be stored within a folder. There are SI pre-created policy templates which can be imported.

TAGS

The TAGS node provides an organizational feature for templates. Many preconfigured templates have tags which enable users to quickly find a desired template though various groupings. Tags do not create a duplicate template, but rather display the template in different folders under the TAGS node.

Within these interfaces are several right-click menus and additional features designed to improve the SI user’s experience. Navigation Pane Right-Click Commands

The Policies node, Templates node, folders, policies, and templates have different right- click commands available within the Navigation pane.

From the Agents node, the right-click menu can be used to install SI Agents:

Right-Click Command Description

Install Agent Opens the Deploy Agents window

Doc_ID 371 139

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

From the node of a saved ‘Filtered Investigate’ view, the right-click menu can be used to delete the saved view:

Right-Click Command Description

Delete Delete the selected, saved ‘Filtered Investigate’ view

From the Policies and Templates nodes, the right-click menu is limited to adding new folders to the selected section:

Right-Click Command Description

New — Folder (Crtl+F) Create a new folder in the selected location

From the Folder node, the right-click menu contains the following commands:

Doc_ID 371 140

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Right-Click Command Description

New — Policy (Crtl+P) Create a new policy in the selected location. Only available for folders under the Policies node.

New — Template Create a new template in the selected location. Only available (Crtl+T) for folders under the Templates node.

New — Folder (Crtl+F) Create a new folder in the selected location

Rename Opens a textbox to rename the selected folder

Remove Delete the selected folder

Paste Pastes a copied policy/template into the selected folder

NOTE: If the current SI user does not have Manage Policies permissions for a protected policy, these options are grayed-out. See the Policies Interface section for additional information on protection.

From the Policies and Templates nodes, the right-click menu contains the following commands:

Doc_ID 371 141

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Right-Click Command Description

Rename Opens a textbox to rename the selected policy/template

Remove Delete selected policy/template

Enable Enable the selected policy. Only available for policies.

Disable Disable the selected policy. Only available for policies.

Copy Copies the selected policy/template

Cut Copies the selected policy/template. Then it deletes the selected policy/template when the copy is pasted to a new folder.

NOTE: If the current SI user does not have Manage Policies permissions for a protected policy, these options are grayed-out. See the Policies Interface section for additional information on protection.

From the Tags node, the right-click menu contains the following commands:

Doc_ID 371 142

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Right-Click Command Description

Refresh Refresh tag folders to display new tags or templates newly associated with an existing tag

From the template within a folder under the Tags node, the right-click menu contains the following commands:

Right-Click Command Description

Copy Copies the selected template

Data Grid Functionality

Result data provided through several interfaces within the SI Admin Console employ a data grid view with features for sorting, filtering, searching, and more.

Doc_ID 371 143

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Above the data grid there is the Group by Box [1] ribbon that impacts how much data is displayed. Additionally, the Refresh [2] button populates the data grid with the current information according to the selections. Columns can be reordered as desired as well as removed from the data grid. Removed columns can be added back through the Customization window. See the Data Grid Right-Click Menu section for additional information.

Many data grids also contain an Export [3] button. This provides different export options according to what interface the button is associated with. See the Export Data section for additional information.

The Search [4] icon opens up the Enter text to search… textbox where all matching columns to the search display as highlighted text in the data grid. The Auto Filter Row [5] uses comparison operators to filter the grid against a single attribute. Data Grid Right-Click Menu

There is also a right-click menu within the data grid accessed from the column headers.

Doc_ID 371 144

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

It contains the following selections:

Right-Click Command Description

Full Expand Expands all sections within the data grid. Only available from a grouped column header.

Full Collapse Collapses all sections within the data grid. Only available from a grouped column header.

Sort Ascending Sorts data by selected column in alphanumeric order (A-Z)

Sort Descending Sorts data by selected column in alphanumeric order (Z-A)

Clear Sorting / Clear All Removes sorting from selected column or removes Sorting sorting from all columns

Sort by Summary (Count by Sort ‘grouped’ data by severity count in ascending [column] – Sort or descending order. Only available from a Ascending/Descending) grouped column header.

Doc_ID 371 145

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Right-Click Command Description

Group by This Column / Groups data or clears grouping of data by selected UnGroup/Clear Grouping column

Hide/Show Group by Box Hides or shows the Group By Box where headers can be dragged-and-dropped to group the data

Group Interval If grouped by the Time column, use the menu to group by time intervals (Day, Month, Year, Smart). Only available from a grouped column header.

Hide This Column Hides selected column from the data grid. Hidden columns can be returned to the data grid through the Column Chooser option.

Column Chooser Opens the Customization window (see explanation of window below)

Best Fit Changes column width to fit the data within the selected column

Best Fit (all columns) Changes column width for all columns to fit the data

Filter Editor Opens the Filter Editor window (see the Filter Data section)

Show / Hide Find Panel Shows or hides the Find Panel which is the search feature (see the Searching Data section)

Hide / Show Auto Filter Hides or shows the Auto Filter Row between the Row column headers and the first row of event data

Doc_ID 371 146

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Column Chooser Window

Within the right-click menu, select Column Chooser to open the Customization window used to customize the data grid to only display specific columns. This window lists column(s) that were removed from the data grid display. Remove columns by either dragging it off the screen or by dropping it into this window.

A column not currently displayed can be returned to the data grid by double-clicking on it in this window or by dragging-and-dropping it from this window onto the header row.

Sort Data

The data can be grouped by columns using the Group by Box ribbon above the data grid.

Doc_ID 371 147

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Drag a column header into the Group by Box area to. Grouping can be for a single header or for tiered headers.

The data can also be sorted alphanumerically ascending or descending by clicking on a column header. An arrow displays in the right corner of the column header indicating the type of sorting.

Filter Data

Doc_ID 371 148

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

There are a few methods available for filtering data within data grids. There can only be one active filter per column.

l Auto Filter Row [A] – Uses the comparison operator to filter the grid against a single attribute

l Filter Statement Bar [B] – Displays enabled filter statements at the bottom of the Display area

l Filter Editor [C] – Build complex filter statements with multiple operators and column filters

l Pin Icon [D] – Opens a filtration dialogue that provides the user with multiple types of filtration options such as column values, text filters, and date filters associated with the column data

The Auto Filter Row is located between the header row and the first event of the data grid. Typing a single attribute in any of these boxes or selecting an attribute from a dropdown menu filters the data grid for matches within that column and the selected comparison operator.

The Alerts grid does not display the Auto Filter Row by default. It must be selected through the grid’s Show Auto Filter Row option from the right-click menu.

Doc_ID 371 149

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When a filter is enabled, the filter statement bar displays at the bottom of the Display area. The X to the far left of the bar clears the filter. The checkbox for the filter on the left affects the scoping of the filter.

On the right side of the filter statement bar is an option to Edit Filter. Clicking this option opens the Filter Editor window, which allows the SI user to build complex filter statements. It can employ multiple comparison operators and/or multiple column filters.

Doc_ID 371 150

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

A small pin icon displays in the upper-right corner while hovering over a column header or if an Auto Filter Row filter is enabled. Click the pin icon to open additional filtration options in a filter dialogue. Depending on the column selected, one or two of the following filtration options display in the filter dialogue:

Example of a Values Filter Custom Filter

l Values – Displays for every column in the selected data grid. Multiple values can be selected.

l Text/Numeric – This display is linked to the Auto filter Row filter with the addition of three new filtration options including a custom filter option

l Date – Calendars with date timestamps display this filter with an array of scoping options including a custom filter

l Custom Filter – Found within Text filters, this filter creates an AND or OR statement between two filtered comparison values

Searching Data

The Find Panel is the feature that enables the option to search for data. It displays on the right side of the data grid with a magnifying glass icon. It can also be accessed through the Data Grid Right-Click Menu to Show Find Panel.

Doc_ID 371 151

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Find Panel Icon Find Panel Search Bar

This feature allows SI users to search the data in the grid for matches to the search text and filters the data grid to only display the matches. The drop-down arrow in the textbox provides a history of recent searches for quick reference.

Type the search criteria and click Find. The data grid filters to events where the search criteria is matched, highlighting the match.

Click Clear to clear both the search criteria and the filtered view. The X at the far left of the panel closes the Find Panel.

Export Data

The data grids provide an option to export data.

Doc_ID 371 152

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Data grids on the Agents interface and an Analytic data grid exports all available data from the selected data grid to a CSV file. Clicking the Export button from these interfaces opens a Save As window.

l Clicking the Export button from the Alerts interface opens the Alerts Export window. See the Alerts Interface section for additional information on this window.

l Clicking the Export button from the Investigate interface or the Recent Events tab of a policy opens the Export window.

NOTE: Ensure that all desired filters are set on the data grid before clicking export.

Doc_ID 371 153

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Export window provides options for what is exported and what action(s) to take. In the Export options section, choose between two radio buttons for the Columns and Rows subsections.

For Columns, the exported data can show Visible Columns Only or All Columns. For Rows, the exported data can show All Rows or Filtered Only. See the Customization window information in the Data Grid Right-Click Menu section for details on selecting what columns are visible in a data grid.

In the Export Actions section select how it will be exported. Check the boxes for Save File Locally and/or Email to and populate the corresponding fields. For the Save File Locally action, provide a path and file name for the CSV file or use the Browse button to open a Save As window. For the Email to action, provide an email address for each recipient, which can be individuals, distribution lists, or a combination and separating multiple recipients with either a comma (,) or a semi-colon (;).

NOTE: The Email to action requires the SMTP Host Information to be configured. This can only be done by an SI Administrator through the SI System Alerting window on the SI System Alerting Window.

When the settings are configured as desired, click Export to complete the action(s). Remember, this window is opened on the Investigate interface and/or the Recent Events tab of a policy.

Agents Interface The Agents interface allows SI users to quickly view, deploy, and manage all SI Agents from a centralized location to the targeted domain controllers in a domain. SI Agents must be deployed on all domain controllers that the SI user wants to receive event data for. Once one or more SI Agent(s) are deployed to a domain, it becomes known as a targeted domain.

The Agents data grid includes a list of information on each targeted domain where an SI Agent is deployed to a domain controller.

Doc_ID 371 154

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

In the upper-right corner of the data grid is the SI Agent tally, indicating the number of Active agents as well as the Total number of deployed agents.

The data grid for the Agents interface includes the following information for each SI Agent:

l Domain – Targeted Active Directory domain

l Machine – Server where the SI Agent is deployed. Hover over data in this column to view the following date/time stamps:

l Last Agent to Manager Communication – Last change event sent from the SI Agent to the Enterprise Manager

l Last Agent Heartbeat – Last time the Enterprise Manager received a heartbeat from the deployed SI Agent

l AD Event Latency – Time difference between when the event occurred and the Enterprise Manager receives it

When the Send Latency Alerts option is enabled in the Event Filtering Configuration Window, a warning symbol displays to indicate excessive latency.

l – Version of the Windows operating system for the machine where the SI Agent is deployed, including service pack information

Doc_ID 371 155

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Status – Indication of the SI Agent’s current status

l Active (green) – SI Agent is actively monitoring/blocking events and communicating with the Enterprise Manager

l Active (Modules Pending) – SI Agent is active, but the Windows AD Events module has not been loaded due to Safe Mode. See the SI Agent Safe Mode section for additional information.

l Stopped (orange) – SI Agent has been stopped and is not monitoring/blocking events

l Lost Connection (red) – SI Agent is not actively communicating with the Enterprise Manager

l No Agent (gray) – a domain controller has been found within the targeted domain and an SI Agent is not yet deployed

l Address – IP Address location of the SI Agent, hover over data in this column to view the IP Address with port (default port for the SI Agent is 3136)

l Version String – SI Agent build version

l If the SI Agent’s version is older than the current version available to the SI Admin Console, it is highlighted. This indicates an upgrade is recommended.

l Hover over data in this column to view a listing of the agent’s configured settings. This information includes identification of which modules are running and which are pending (for Safe Mode).

l UTC Offset – Local server time zone relationship to the Universal Time (UTC)

l Last Events – Number of events reported by the SI Agent in that last notification to the Enterprise Manager

l Events In Queue – Count of events the SI Agent is waiting to send to the Enterprise Manager

Doc_ID 371 156

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l AD Agent – Indicates if the SI Agent is running in Normal Mode or Safe Mode. Unknown for older agents.

l Is Signed – Indicates if the SI Agent is Signed or Unsigned. Unknown for older agents.

l Free Space – Amount of free space on the drive StealthINTERCEPT is installed on. This column reports for v7.0+ Agents and displays as an unknown for all previous Agent versions.

l Agent Last Stopped – Date timestamp for when the SI Agent was last stopped

l Build Time Stamp – Date timestamp for when the SI Agent version was created

l Features – Features available for the SI Agent and its configured modules

l FQDN – Fully-qualified domain name of the machine where the SI Agent is deployed

l Last Heartbeat – Date timestamp for the last time the SI Agent communicated with the Enterprise Manager. This should occur every five minutes.

l Modules – Event sources loaded and running on the SI Agent

l Platform – Operating system platform for the machine where the SI Agent is deployed

The data grid has several options that impact the displayed information. See the Data Grid Functionality section for additional features available within the grid view.

Above the data grid are actions that can be taken from within the Agents interface:

Icon Label Action

Saves the information to an XML file for export Export Agent List…

Refreshes the SI Agent information Refresh Agent List…

Configures the Log Levels for the SI Agent(s). It Update Logging Levels… opens the Log Level Configuration Window.

Accesses SI Agent log files. See the Access SI Get Agent Log… Agent Log Files section for additional information.

Check with Stealthbits for a newer version of the Update Agent Installer SI Agent Installer according to the version in use

Doc_ID 371 157

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Icon Label Action

(signed or unsigned). It opens the Agent Installer Update Window.

If enabled, an SI Agent automatically deploys to all domain controllers without an SI Agent. This feature requires at least one SI Agent to be Configure Auto Deploy present in the domain in order to detect additional domain controllers. It opens the Configure Auto Deploy Window.

Deploys SI Agents to selected servers. It opens Install Agent the Deploy Agents Window.

Below are some considerations:

l Occasionally a Microsoft Security Bulletin impacting LSASS can interfere with the SI Agent instrumentation resulting in LSASS shutting down. The SI Agents are confused to monitor for an LSASS process termination shortly after a server reboot. The LSASS process terminated SI Operations Alert is triggered in this event and the SI Agent is stopped. If this occurs, it requires the SI Administrator to take action as all monitoring/blocking by that SI Agent will be stopped. RECOMMENDED: Activate an Email Notification for this alert.

See the LSASS Process Terminated section for additional information.

l In addition to the LSASS process termination check, the SI Agent can be configured for a Safe Mode. When enabled, the SI Agent records the version of all DLLs it hooks into in LSASS during installation. When an SI Agent is restarted, it compares the DLL versions with the recorded list. If the versions do not match, the Windows AD Events monitoring module is not loaded. The agent’s Status in the Agents interface changes to Active (Modules Pending), and all Active Directory monitoring/blocking by that SI Agent will be stopped. If this occurs, it requires the SI Administrator to take action. The Agent Started in AD Monitor pending mode SI Operations Alert is triggered in this event. RECOMMENDED: Activate an Email Notification for this alert.

See the How To Enable Agent Started in AD Monitor Pending Mode Email Alert and the SI Agent Safe Mode sections for additional information.

Doc_ID 371 158

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Deploy Agents Window The Deploy Agents window incorporates a mixture of the following sub-windows that are used to complete the Agents Interface Right-Click Menu actions. Depending on the right-click menu action being performed, certain windows are used.

The list and links below outline the window configuration options and their purposes.

l Enter Credentials Window – Certain right-click menu options only use this window when performing actions

l Select Computers Window – Select the Host and/or IP Addresses of the targeted machines

l Set Options Window – Configure the properties of the SI Agent being deployed or modified

l Credential Verification Window – Verifies credentials or initiates a prerequisite check for Agents NOTE: This window changes names depending on the type of action being performed.

l Status Window – Performs the action and displays whether or not the action performed successfully. See the section for additional information. NOTE: This window changes names depending on the type of action being performed.

For steps on how to complete the right-click menu options, see the Agents Interface Right-Click Menu section for additional information.

Computers targeted for SI Agent deployment must minimum .NET Framework version needed by yhe SI Agent already installed or the deployment fails. Remember to check server requirements before deploying an SI Agent, including compatibility with other security products. See the SI Agent Compatibility with Non-Stealthbits Security Products section of the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

The SI Admin Console can be installed with a signed or un-signed installation package. If the SI Admin Console is installed with a:

l Signed installation package, then the agent being deployed also employs a signed installation package.

l Un-signed installation package, then the agent being deployed also employs an un-signed installation package.

The SI Agent installation package can be replaced to use the alternative version. See the Replace SI Agent Installation Package section of the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

Doc_ID 371 159

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

NOTE: This window does not block access to the SI Admin Console, so while it is open a link is visible on the Agents Interface. Click the link to bring this window to the front.

With the release of StealthINTERCEPT v7.0, the API used for Enterprise Manager communications between the SI Agents has changed from .NET Remoting to gRPC. This new certificate based encryption and authentication API means that after an upgrade from pre-v7.0 to v7.0, all SI Agents must be upgraded to v7.0, then managed by the v7.0 Console.

NOTE: Although the v7.0 Console displays the pre-v7.0 Agents on its interface, it cannot manage them. Instead, the new console can only uninstall or upgrade them.

See the Upgrade Procedure section of the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

Configurable features in the Deploy Agents window are outlined in the sections below. For steps on how to execute the right-click menu options, see the Agents Interface Right-Click Menu section for additional information.

Enter Credentials Window The Enter Credentials window opens for several of the Agent interface right-click menu items. In order to perform centralized SI Agent maintenance from the SI Console server, WMI must be enabled on the machine where the SI Agent is installed.

The Credentials used to execute these commands must have enough rights to query information about shares on the target machine. The Enter Credentials window has the following options:

l Login

l Password

l User Password Safe – If the Password Safe Configuration Window is configured, check the box and select the desired profile from the drop-down menu.

See the Agents Interface Right-Click Menu section for additional information on these requirements.

Doc_ID 371 160

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

NOTE: Closing the SI Admin Console while this action is in process causes problems with data collection.

Select Computers Window The Deploy Agents window's Select Computer window provides three methods for selecting computers where SI Agent(s) can be deployed:

l Add Single Host

l Add from AD

l Add from File

Any combination of these three methods can be used to select computers.

l Add Single Host – Manually enter and select the Host name or IP Address. Use the double- arrow button to add it to the deployment list.

Doc_ID 371 161

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Add from AD – Browse the domain's computer objects (Domains and Computers).

l Domain to Browse – Displays the domain in which the Enterprise Manager resides. If unpopulated, type the desired domain in the textbox.

l List of Hosts/IP Addresses – Populates with computers found in Active Directory

l Add to Deployment List (>>) button – Adds the desired computer(s) to the deployment list

NOTE: Multiple computers can be selected and moved to the deployment list. Checking a top- level node automatically selects all child objects.

Doc_ID 371 162

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Add from File – Imports a CSV with comma-separated values or text file with the list of computers

l Text File to Read – Displays the path to the file. The text file should be a list of computer names or IP Addresses with carriage returns.

l Open – Displays a used to navigate to the desired file

l List of Hosts/IP Addresses – Populates with computers from the read text/CSV file

The computers added to the Deploy Agents to These Computers box are now pending SI Agent deployment. Once the wizard completes, the credentials used will either allow or deny an SI Agent to be deployed on the machine(s). Once the list in the Deploy Agents to These Computers box is complete, you can continue through the wizard to deploy SI Agents.

Doc_ID 371 163

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

NOTE: The Deploy Agents window does not block access to the SI Admin Console and can be minimized while actions are in progress. If this window is hidden by clicking outside of the dialogue box, a flashing blue link displays on the upper right-hand corner of the interface with the action name displaying. Clicking this link brings back the focus of the Deploy Agents window.

CAUTION: Closing the SI Admin Console while this action is in process causes problems with data collection.

If the server where the SI Agent is deployed has multiple network adapters (multi-homed), then it is necessary to bind the SI Agent to an adapter that can communicate with the Enterprise Manager. See the Troubleshooting within the SI Admin Console section for additional information.

Set Options Window The Set Options Window is used during SI Agent deployment and during update procedures to configure SI Agent properties and functionality once deployed or re-deployed.

The SI Agent is configured to “Enable DNS Host Name Resolutions” by default during deployment. Depending on the event type, the SI Agent may see some but not all of the following information:

l NetBIOS name

l Fully Qualified Domain Name

l IP Address

The Additional Options have the following options and functionality.

When the Enable DNS Host Name Resolutions option is enabled, the SI Agent looks up the missing data. This provides more uniform data, but may have a performance impact on the machine where the SI Agent is deployed, especially if name resolution is not handled locally by that machine.

The Set Options window provides the opportunity to modify SI Agent settings after deployment. Use this option to modify credentials, Enterprise Manager information, modules, DNS host name resolution, and/or safe mode for the selected SI Agent(s).

The Keep Existing Settings box is checked by default. When unchecked, the Set Options window does not show current configurations, as multiple SI Agents could have been selected to be updated; rather the items checked or cleared represent the state to which the selected agents are set. The current state and configured options can be viewed within the hover over tool tip on the Version String column of the Agents interface data grid. The AD Agent column in the Agents interface data grid indicates the agent’s mode.

Doc_ID 371 164

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

If this window is opened through the Agents Interface Right-Click Menu, the list is auto-populated with the computer(s) selected on the Agents interface.

The Set Options page provides the following options:

l Use These Credentials – Credentials to be used for deployment on the selected computers.

l Username – Must be in the DOMAIN\Username format

l Password – Username password

l Use Password Safe – Choose and use the Password Safe account credentials. See the Password Safe Configuration Window section for additional information.

l Enterprise Manager – IP Address/Name and Port where the Enterprise Manager is located

l Modules to Install – Identifies additional modules for the identified computers that will be installed:

l Windows AD Events – Installs the StealthINTERCEPT for Active Directory Solution & StealthINTERCEPT for LDAP Solution

l Windows File System – Installs the StealthINTERCEPT for File System Solution

Doc_ID 371 165

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Exchange Server Monitoring – Installs the StealthINTERCEPT for Exchange Solution

l Windows Event Logs – Deprecated functionality for v7.0+ SI Agents

l Agent Upgrade

l Upgrade Installed Agent – If the identified computers already have an SI Agent deployed, this option upgrades Agents for an older version

l Preserve Agent Settings – Upgrades the Agent version without changing settings

l Agent Service

l Safe Mode – SI Agent checks LSASS versions upon start up. Any changes in LSASS since the previous start prevents the monitoring modules from loading. See the SI Agent Safe Mode section for additional information.

l Use local Pwned hash DB – A local copy of the Pwned hash database is sent to the Agent after installation from the Enterprise Manager. Any updates to the database are sent from the Enterprise Manager to the Agent(s) as long as the Agent service is enabled.

l Start Agent Service – Starts the StealthINTERCEPT Agent service on host after installation NOTE: If the Agent Service is not started at the time of deployment, the SI Agent requires a manual start or will be started automatically after a server reboot. Until the SI Agent is started, no activity is monitored or blocked.

l Firewall Rules

l Create Rules – Creates firewall rules on the identified computers for Agent communication

l Installation Location

l Install to default location – Install the SI Agent on the machine to the default location or a specified location.

If checked, the SI Agent is installed in the default location: ...\Stealthbits\StealthINTERCEPT\SIWindowsAgent.

If unchecked, specify the desired installation location, e.g. d:\myagent.

Doc_ID 371 166

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The selected installation location is applied to all computers where SI Agents are being deployed in this session (as specified on the Select Computers page of the Deploy Agents window). Once these settings are configured as desired, the SI Agent is ready for deployment on the selected machines.

Remember, the selected machines are configured through the Select Computers Window.

Credential Verification Window On the Credential Verification window, StealthINTERCEPT checks to ensure the credentials provided successfully allow deployment after right-click menu actions are performed. This window changes names depending on the action being performed.

After the action is run, the status registers as either Success or Fail. Select a host to view the full Message in the box at the bottom of the window. In addition to confirming access, StealthINTERCEPT also verifies the target machine has the minimum .NET Framework version needed by yhe SI Agent already installed or the deployment fails.

Status Window

Doc_ID 371 167

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Status Window performs the desired action and displays a successful or failed status. This window changes names depending on the type of action being performed.

It displays the working and completed status of the action. Depending on whether the Host is deployed successfully, the Message column displays a failed message with additional text or a successful message if the Agent is deployed correctly.

Agents Interface Right-Click Menu There is also a right-click menu for each row within the data grid. Any options unavailable for the selected SI Agent are grayed-out.

Doc_ID 371 168

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Agents Interface Right-Click menu contains the following selections. The links provided below bring the user to the step by step instructions for that menu option action. See the Deploy Agents Window section for information on the individual window options.

Right-Click Command Description

Install Agent See the Install SI Agents section for additional information on deploying an SI Agent.

Uninstall Agent See the Uninstall SI Agent section for additional information on uninstalling an SI Agent.

Upgrade Agent See the Upgrade Agent section for additional information on upgrading an existing deployed SI Agent.

Update Agent Settings See the Agent Installer Update Window and the Update Agent Settings sections for additional information on updating a deployed SI Agent's settings.

Start Agent See the Start Agent section for additional information on starting a previously stopped SI Agent.

Stop Agent See the Stop Agent sections for additional information on

Doc_ID 371 169

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Right-Click Command Description

stopping an Active SI Agent.

Start Pending Modules See the SI Agent Safe Mode and the Start Pending Modules sections for additional information.

Harden Agent See the Harden Agent section for additional information.

Soften Agent See the Soften Agent section for additional information to soften a previously hardened SI Agent.

Remove Server from List See the Remove Server from List section for additional information on removing an SI Agent from the Agents Interface list.

Clear SQLite Agent Queue CAUTION: These events are permanently deleted and are not processed by the Enterprise Manager upon reconnection. This option is for diagnostic and troubleshooting purposes only.

See the Clear SQLite Agent Queue section for additional information on clearing the SQLite SI Agent Queue.

In order to perform centralized SI Agent maintenance from the SI Console server, WMI must be enabled on the machine where the SI Agent is installed. When executing any of these right-click commands (with the exception of Remove Server from list), the SI Admin Console uses WMI to remotely query the registry on the target agent machine(s) to understand where the SI Agent configuration files are located (install path). Next, WMI is used to stop the StealthINTERCEPT Agent service, modify the configuration files, and restart the SI Agent.

The Credentials used to execute these commands must have enough rights to query information about shares on the target machine. A local administrator account on the targeted machine should have access to the system shares.

See the Open Firewall Port Information section of the StealthINTERCEPT Installation & Upgrade User Guide for the default ports required for WMI communication.

SI Agent Right-Click Menu Configurations

Doc_ID 371 170

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

For certain actions, multiple SI Agents listed in the data grid can be selected for one action. The appropriate right-click menu options won't be grayed out if multi-selection is available for the desired action. SI Agents must be in the same state in order to complete a multi-select action. (i.e. all selected Agents must be stopped to use the Start action).

On the Agents Interface, the following actions are available via these right-click menu options:

l Install SI Agents – Deploys SI Agent(s) to the desired machines

l Uninstall SI Agent – Removes a previously deployed SI Agent

l Upgrade Agent – Upgrades the selected SI Agent to a newer version

l Update Agent Settings – Updates SI Agent settings, such as the modules or Enterprise Manager address. On the Set Options page, the option to disable DNS Host Name Resolution is no longer grayed out and can be checked if desired.

l Start Agent– Starts SI Agent on selected machine(s)

l Stop Agent – Stops SI Agent on selected machine(s)

l Start Pending Modules – Starts SI Agent monitoring modules which were not started with the agent due to a change in LSASS (only available on SI Agents configured to use Safe Mode)

l Harden Agent – Protects the SI Agent from being altered, stopped, or started from within the local

l Soften Agent – Unlocks the SI Agent so it can be controlled from within the local Service Control Manager

l Remove Server from List – Removes a server from the Agent data grid. If the server has a deployed SI Agent, it will be added back to the list the next time the agent sends information to the Enterprise Manager. CAUTION: These events are permanently deleted and are not processed by the Enterprise Manager upon reconnection. This option is for diagnostic and troubleshooting purposes only.

l Clear SQLite Agent Queue – When the SI Agents are unable to communicate with the Enterprise Manager, SI Agent events queue up in the Agents local SQLite database until the Enterprise Manager is available to accept events. This option dumps the queue and all pending events are lost.

Install SI Agents Follow the steps to deploy an SI Agent to a new or existing machine.

Doc_ID 371 171

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 1 – On the Agents Interface, select the Install Agent (+) button on the right-hand corner of the interface. For a previously uninstalled Agent that needs to be re-installed, select the Install Agent right-click menu option on that machine in the grid. The Select Computers window opens.

Step 2 – On the Select Computers window, add the hosts to the Deploy Agents to These Computers box using one of the three tab methods. See the Select Computers Window section for additional information. Click Next.

If this window is opened through the Agents Interface Right-Click Menu right-click menu action, the list is auto-populated with the computer(s) selected on the Agents interface.

Step 3 – On Set Options page, enter the Username and Password of the credentials required to deploy the SI Agent on the selected machine(s) or select a Password Safe. Review the Enterprise Manager IP Address/Name and Port for accuracy and select the desired modules to install on this Agent.

See the Set Options Window section for additional information.

Step 4 – Once configurations are set, click Next.

NOTE: The Deploy Agents window does not block access to the SI Admin Console and can be minimized while actions are in progress. If this window is hidden by clicking outside of the dialogue box, a flashing blue link displays on the upper right-hand corner of the interface with the action name displaying. Clicking this link brings back the focus of the Deploy Agents window.

Step 5 – On the Access Verification page, the credentials provided on the Set Options window either succeed or fail during a prerequisites or verification check.

l Failed – Read the failure messages and either click Back to provide new credentials or click Finish to close the window and ensure any error messages are taken care of prior to next attempt

l Completed – Click Next to begin installing the SI Agent

l If some but not all items Fail, it is possible to click Next to continue the action on those where access verification was Successful.

NOTE: Closing the SI Admin Console while this action is in process causes problems with data collection.

Step 6 – The Status page tracks the deployment process. To stop the deployment process on any machines that have not yet started deployment, click Cancel. The Close button changes to a Finish button once all SI Agents are deployed.

Step 7 – When the task is successfully completed, click Finish to close the window.

The SI Agents' status displays as Active when the deployment installation is completed.

Doc_ID 371 172

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Uninstall SI Agent Follow the steps to uninstall a deployed SI Agent through the Agents Interface:

Step 1 – On the Agents Interface, right-click the desired SI Agent to uninstall.

Step 2 – From the right-click menu, select Uninstall Agent. The Enter Credentials window opens.

Step 3 – On the Enter Credentials window, enter the login and password credentials. If the Password Safe Configuration Window is configured, check the box and select the desired profile from the drop-down menu. Click OK.

NOTE: The Deploy Agents window does not block access to the SI Admin Console and can be minimized while actions are in progress. If this window is hidden by clicking outside of the dialogue box, a flashing blue link displays on the upper right-hand corner of the interface with the action name displaying. Clicking this link brings back the focus of the Deploy Agents window.

Step 4 – On the Access Verification page, the credentials provided on the Set Options window either succeed or fail during a prerequisites or verification check.

l Failed – Read the failure messages and either click Back to provide new credentials or click Finish to close the window and ensure any error messages are taken care of prior to next attempt

l Completed – Click Next to begin uninstalling the SI Agent

l If some but not all items Fail, it is possible to click Next to continue the action on those where access verification was Successful.

NOTE: Closing the SI Admin Console while this action is in process causes problems with data collection.

Step 5 – The Status page (Uninstall Agent) displays whether or not the right-click menu action was successful or failed.

Step 6 – When the task is successfully completed, click Finish to close the window.

The SI Agents' status displays as uninstalled. At any point, the Install Agent menu option can be used to restart the SI Agent on that machine.

Upgrade Agent Follow the steps to upgrade a deployed SI Agent through the Agents Interface:

Step 1 – On the Agent's Interface, select the desired SI Agent and on the top toolbar, select Update Agent Installer. The Agent Installer Update window opens. See the Agent Installer Update Window for additional information.

Doc_ID 371 173

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 2 – On the Agent Installer Update window, select Check for Newer Version of the SI Agent Installer button. The green bar indicates the progress of checking the SI Agent for a newer version. The Agent Installer displays the Agent Installer update version required. Click Apply Update.

Remember, when an SI Agent is out-of-date, the Version String column number has an orange background.

Step 3 – Right-click the desired out-of-date SI Agent to upgrade.

Step 4 – From the right-click menu, select Upgrade Agent. The Enter Credentials window opens.

Step 5 – On the Enter Credentials window, enter the login and password credentials. If the Password Safe Configuration Window is configured, check the box and select the desired profile from the drop-down menu. Click OK.

NOTE: The Deploy Agents window does not block access to the SI Admin Console and can be minimized while actions are in progress. If this window is hidden by clicking outside of the dialogue box, a flashing blue link displays on the upper right-hand corner of the interface with the action name displaying. Clicking this link brings back the focus of the Deploy Agents window.

Step 6 – On the Access Verification page, the credentials provided on the Set Options window either succeed or fail during a prerequisites or verification check.

l Change Settings – Upgrade an SI Agent with the existing settings. Use this button to alter settings in addition to upgrading the SI Agent. Opens the Set Options Window when selected.

l Failed – Read the failure messages and either click Back to provide new credentials or click Finish to close the window and ensure any error messages are taken care of prior to next attempt

l Completed – Click Next to begin upgrading the SI Agent

l If some but not all items Fail, it is possible to click Next to continue the action on those where access verification was Successful.

NOTE: Closing the SI Admin Console while this action is in process causes problems with data collection.

Step 7 – On the Status page, the old SI Agent will be uninstalled and the newer version of the SI Agent installed. One of two status messages display:

l Failed – Read the failure messages and either click Back to provide new credentials or click Finish to close the window and ensure any error messages are taken care of prior to next attempt

l Completed – Click Next to begin updating the SI Agent on the Updating settings window

Doc_ID 371 174

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 8 – When the task is successfully completed, click Finish to close the window.

The Agents' status displays as Upgraded.

Update Agent Settings Follow the steps to Update Agent Settings to a deployed SI Agent through the Agents Interface:

Step 1 – From the right-click menu, select Update Agent Settings. The Select Computers window opens.

Step 2 – On the Select Computers window, the SI Agent is automatically added to the Update Agent settings on These Computers box. Click Next. The Set Options window opens.

Step 3 – On the Set Options window, ensure the proper credentials, modules, and Enterprise Manager location are accurate alongside additional options. To make changes to the window settings, uncheck the Keep Existing Settings box. Make necessary updates as needed.

See the Set Options Window section for additional information.

NOTE: The Deploy Agents window does not block access to the SI Admin Console and can be minimized while actions are in progress. If this window is hidden by clicking outside of the dialogue box, a flashing blue link displays on the upper right-hand corner of the interface with the action name displaying. Clicking this link brings back the focus of the Deploy Agents window.

Step 4 – On the Access Verification page, the credentials provided on the Set Options window either succeed or fail during a prerequisites or verification check. Click Next.

Step 5 – On the Status page, the Agent will be stopped and restarted. One of two status messages display:

l Failed – Read the failure messages and either click Back to provide new credentials or click Finish to close the window and ensure any error messages are taken care of prior to next attempt

l Completed – Click Next to begin updating the SI Agent on the Updating settings window

Step 6 – When the task is successfully completed, click Finish to close the window.

The SI Agents' status displays as Update Settings either completed or failed.

Start Agent Follow the steps to Start a stopped SI Agent, that had been previously deployed, through the Agents Interface:

Step 1 – On the Agent's Interface, right-click the desired SI Agent to start.

Doc_ID 371 175

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 2 – From the right-click menu, select Start Agent. The Enter Credentials window opens.

Step 3 – On the Enter Credentials window, enter the login and password credentials. If the Password Safe Configuration Window is configured, check the box and select the desired profile from the drop-down menu. Click OK.

NOTE: The Deploy Agents window does not block access to the SI Admin Console and can be minimized while actions are in progress. If this window is hidden by clicking outside of the dialogue box, a flashing blue link displays on the upper right-hand corner of the interface with the action name displaying. Clicking this link brings back the focus of the Deploy Agents window.

Step 4 – On the Status page, the Agent will be started from its previous state of being stopped. One of two status messages display:

l Failed – Read the failure messages and either click Back to provide new credentials or click Finish to close the window and ensure any error messages are taken care of prior to next attempt

l Completed – Click Next to begin restarting the SI Agent

The SI Agents' status displays as Start Completed.

Stop Agent Follow the steps to Stop a deployed SI Agent through the Agents Interface:

Step 1 – On the Agent's Interface, right-click the desired SI Agent to stop.

Step 2 – From the right-click menu, select Stop Agent. The Enter Credentials window opens.

Step 3 – On the Enter Credentials window, enter the login and password credentials. If the Password Safe Configuration Window is configured, check the box and select the desired profile from the drop-down menu. Click OK.

NOTE: The Deploy Agents window does not block access to the SI Admin Console and can be minimized while actions are in progress. If this window is hidden by clicking outside of the dialogue box, a flashing blue link displays on the upper right-hand corner of the interface with the action name displaying. Clicking this link brings back the focus of the Deploy Agents window.

Step 4 – On the Status page, the Agent will be stopped and restarted. One of two status messages display:

l Failed – Read the failure messages and either click Back to provide new credentials or click Finish to close the window and ensure any error messages are taken care of prior to next attempt

l Completed – Click Next to begin stopping the SI Agent

Doc_ID 371 176

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The SI Agent's status displays as Stop Completed.

Start Pending Modules If an SI Agent was deployed using the Safe Mode option, then it could enter a Start Pending Modules state. This requires the SI Administrator to approve starting of the Active Directory module due to a change in the DLL versions.

RECOMMENDED: If multiple DCs are in the Start Pending Modules state, this means one of the monitored system DLLs was changed from when the SI Agent was last run. This could impact the operation of the SI Agent. It is recommended to enable the pending modules on one DC initially and verify StealthINTERCEPT is collecting events as expected from this specific DC and that the DC appears to be stable before starting the pending modules on additional DCs.

Follow the steps to Start Pending Modules.

Step 1 – On the Agent's Interface, right-click the desired SI Agent to Start Pending Modules for. The SI Agent will have Active (Modules Pending) as a Status when there are pending modules.

Step 2 – From the right-click menu, select Start Pending Modules.

Step 3 – The Starting window displays.

Step 4 – Once the pending modules are installed, the status displays as Active.

The pending modules are now started.

Harden Agent Follow the steps to Harden a deployed SI Agent through the Agents Interface:

Step 1 – On the Agent's Interface, right-click the desired SI Agent to harden.

Step 2 – From the right-click menu, select Harden Agent. The Enter Credentials window opens.

Step 3 – On the Enter Credentials window, enter the login and password credentials. If the Password Safe Configuration Window is configured, check the box and select the desired profile from the drop-down menu. Click OK.

NOTE: The Deploy Agents window does not block access to the SI Admin Console and can be minimized while actions are in progress. If this window is hidden by clicking outside of the dialogue box, a flashing blue link displays on the upper right-hand corner of the interface with the action name displaying. Clicking this link brings back the focus of the Deploy Agents window.

Step 4 – On the Access Verification page, the credentials provided on the Enter Credentials window either succeed or fail during a prerequisites or verification check.

Doc_ID 371 177

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Failed – Read the failure messages and select Cancel to close the window and ensure any error messages are taken care of prior to the next attempt.

l Completed – Click Next to begin hardening the SI Agent

l If some but not all items Fail, it is possible to click Next to continue the action on those where access verification was Successful.

NOTE: Closing the SI Admin Console while this action is in process causes problems with data collection.

Step 5 – On the Status page, one of two status messages display:

l Failed – Read the failure messages and select Cancel.

l Completed

Step 6 – When the task is successfully completed, click Finish to close the window.

The SI Agent's status displays as Harden Completed.

Soften Agent Follow the steps to Soften a deployed SI Agent that has been previously hardened through the Agents Interface:

Step 1 – On the Agent's Interface, right-click the desired SI Agent to soften a previously hardened the SI Agent.

Step 2 – From the right-click menu, select Soften Agent. The Enter Credentials window opens.

Step 3 – On the Enter Credentials window, enter the login and password credentials. If the Password Safe Configuration Window is configured, check the box and select the desired profile from the drop-down menu. Click OK.

NOTE: The Deploy Agents window does not block access to the SI Admin Console and can be minimized while actions are in progress. If this window is hidden by clicking outside of the dialogue box, a flashing blue link displays on the upper right-hand corner of the interface with the action name displaying. Clicking this link brings back the focus of the Deploy Agents window.

Step 4 – On the Access Verification page, the credentials provided on the Enter Credentials window either succeed or fail during a prerequisites or verification check.

l Failed – Read the failure messages and select Cancel to close the window and ensure any error messages are taken care of prior to the next attempt.

l Completed – Click Next to begin softening the SI Agent

Doc_ID 371 178

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l If some but not all items Fail, it is possible to click Next to continue the action on those where access verification was Successful.

NOTE: Closing the SI Admin Console while this action is in process causes problems with data collection.

Step 5 – On the Status page, one of two status messages display:

l Failed – Read the failure messages and either click Back to provide new credentials or click Finish to close the window and ensure any error messages are taken care of prior to next attempt

l Completed

Step 6 – When the task is successfully completed, click Finish to close the window.

The SI Agent's status displays as Soften Completed.

Remove Server from List Follow the steps to Remove Server from List through the Agents Interface:

Step 1 – On the Agent's Interface, right-click the desired SI Agent to remove from the server list.

Step 2 – From the right-click menu, select Remove Server from List.

The SI Agent is automatically removed from the list.

Clear SQLite Agent Queue Follow the steps to Clear SQLite Agent Queue for a deployed SI Agent through the Agents Interface:

CAUTION: These events are permanently deleted and are not processed by the Enterprise Manager upon reconnection. This option is for diagnostic and troubleshooting purposes only.

Step 1 – On the Agent's Interface, right-click the desired SI Agent to clear the SQLite agent queue from.

Step 2 – From the right-click menu, select Clear SQLite Agent Queue. The Enter Credentials window opens.

Step 3 – On the Enter Credentials window, enter the login and password credentials. If the Password Safe Configuration Window is configured, check the box and select the desired profile from the drop-down menu. Click OK.

Doc_ID 371 179

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

NOTE: The Deploy Agents window does not block access to the SI Admin Console and can be minimized while actions are in progress. If this window is hidden by clicking outside of the dialogue box, a flashing blue link displays on the upper right-hand corner of the interface with the action name displaying. Clicking this link brings back the focus of the Deploy Agents window.

Step 4 – On the Access Verification page, the credentials provided on the Set Options window either succeed or fail during a prerequisites or verification check.

l Failed – Read the failure messages and either click Back to provide new credentials or click Finish to close the window and ensure any error messages are taken care of prior to next attempt

l Completed – Click Next to begin clearing the SQLite Agent Queue

l If some but not all items Fail, it is possible to click Next to continue the action on those where access verification was Successful.

NOTE: Closing the SI Admin Console while this action is in process causes problems with data collection.

Step 5 – On the Status page, one of two status messages display:

l Failed – Read the failure messages and either click Back to provide new credentials or click Finish to close the window and ensure any error messages are taken care of prior to next attempt

l Completed

Step 6 – When the task is successfully completed, click Finish to close the window.

The SQLite Agent Queue is automatically cleared.

Log Level Configuration Window The Log Level Configuration window displays the current log levels and allows the SI user to set new SI Agent, Enterprise Manager, and Administration Console log levels. Select Update Logging Levels… on the Agents top menu bar to access this window.

Doc_ID 371 180

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Configure the following options on the page to update the logging level:

l Active Agent List – Below is the data grid displaying active SI Agents data in these columns:

l Platform

l Domain

l Machine Name

l Agent Address

l Version

l New Agent Log Level – Choose between the file log levels:

l Debug – Records everything that happens, most verbose level of logging

l Info – Records information on the steps that occur, in addition to warnings and errors

Doc_ID 371 181

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Warn – Records all warnings that occur, in addition to errors

l Error – Records all errors that occur

l Fatal – Records only when catastrophic system failures/crashes occur No matter what log level is selected, the logs have a maximum cap size of 55 MB. When a log file reaches 50 MB, it is closed and a new file is started. No more than ten closed files (50 MB) are kept. When the eleventh file reaches 50 MB, the oldest closed file is overwritten.

l Enterprise Manager Log Level and Administration Console Log Level sections have the following information:

l Current Level

l New Level – Use the dropdown menu to select the new log level

l Build

l Time Stamp

Whenever changes are made in this window, click Update Log Levels to save the configuration settings and enable the new log levels at the specific locations.

Access SI Agent Log Files Follow the steps to access the SI Agent Log files.

Step 1 – From within the Agents interface, select the desired agent and click Get Agent Log… .

Doc_ID 371 182

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 2 – The Save As window opens with the selected SI Agent’s log already selected from its original location. Select the new location and click Save.

A copy of the log file can now be viewed without navigating to its location on the server where the SI Agent is deployed.

Access the Enterprise Manager & Administration Console Log Files The Enterprise Manager and Administration Console log files are stored on the SI Enterprise Console server (where the SI infrastructure was installed). These files are stored in the following locations:

Enterprise Manager Log Files

Doc_ID 371 183

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The default location is: …\Stealthbits\StealthINTERCEPT\SIEnterpriseManager\logs

Administration Console Log Files

The default location is: …\Stealthbits\StealthINTERCEPT\SIWinConsole\logs

Doc_ID 371 184

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

SI Agent Safe Mode In order for the SI Agent to collect real-time activity data, it hooks into (intercepts) specific Microsoft API’s in the LSASS process. Below are some considerations:

l Occasionally a Microsoft Security Bulletin impacting LSASS can interfere with the SI Agent instrumentation resulting in LSASS shutting down. The SI Agents are confused to monitor for an LSASS process termination shortly after a server reboot. The LSASS process terminated SI Operations Alert is triggered in this event and the SI Agent is stopped. If this occurs, it requires the SI Administrator to take action as all monitoring/blocking by that SI Agent will be stopped. RECOMMENDED: Activate an Email Notification for this alert.

See the LSASS Process Terminated section for additional information.

l In addition to the LSASS process termination check, the SI Agent can be configured for a Safe Mode. When enabled, the SI Agent records the version of all DLLs it hooks into in LSASS during installation. When an SI Agent is restarted, it compares the DLL versions with the recorded list. If the versions do not match, the Windows AD Events monitoring module is not loaded. The agent’s Status in the Agents interface changes to Active (Modules Pending), and all Active Directory monitoring/blocking by that SI Agent will be stopped. If this occurs, it requires the SI Administrator to take action. The Agent Started in AD Monitor pending mode SI Operations Alert is triggered in this event. RECOMMENDED: Activate an Email Notification for this alert.

See the How To Enable Agent Started in AD Monitor Pending Mode Email Alert and the SI Agent Safe Mode sections for additional information.

NOTE: Most Microsoft Security Bulletins that alter LSASS will not interfere with SI Agent instrumentation.

Active Directory monitoring/blocking will not resume until the pending modules are started. To determine if the LSASS changes will conflict with the SI Agent instrumentation, start the pending modules on one domain controller using the right-click menu Start Pending Modules option. If there are no issues after five minutes, it is unlikely that the changes are conflicting with the SI Agent instrumentation. If there are any concerns about the changes, reach out to Stealthbits Support for more information. Stealthbits tests Microsoft Security Bulletins affecting LSASS prior to their becoming public and sends notifications to SI users when an issue is identified.

When the pending modules are started, the recorded versions of all DLLS the agent hooks into in LSASS are overwritten with the current versions.

Doc_ID 371 185

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

CAUTION: While enabling Safe Mode on an SI agent will ensure the LSASS process will not be terminated by StealthINTERCEPT, it will prevent the Active Directory monitoring/blocking module from loading EVERY TIME key LSASS DLLs are changed until the SI Administrator starts the pending modules.

How To Enable Agent Started in AD Monitor Pending Mode Email Alert Follow the steps to enable email notifications of the Agent Started in AD Monitor pending mode SI Operations Alert.

NOTE: These steps require the StealthINTERCEPT Administrator user role. They also assume that the SI System Alerting Window has been configured and Email alerts have been enabled.

Step 1 – Navigate to the Menu's Configuration > Alerts. The SI System Alerting window opens.

Step 2 – On the SI System Alerting window's Email tab, select Configure.

Step 3 – Create a Message Profile for the safe mode notification with the recipient(s) to be notified when the AD modules are pending. See the SI System Alerting Window section for additional information.

Doc_ID 371 186

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 4 – Select Events, and then Operations on the left. Check the Agent Started in AD Monitor pending mode event alert and assign (select from drop-down menu) the Message Profile created in Step 2. See the SI System Alerting Window section for additional information.

Step 5 – Ensure that the Email alerts are Enabled and click OK.

When the Agent Started in AD Monitor pending mode event alert is triggered, an email notification is sent to the assigned (Step 2) recipient(s).

Agent Installer Update Window Stealthbits periodically releases updated SI Agent installation packages, both signed and unsigned. Typically these updates are associated with Microsoft KB’s (hot-fixes) which alter the LSASS components interfering with the SI Agent instrumentation. See the StealthINTERCEPT Agent Information section of the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

This feature requires an internet connection from the SI Admin Console server. It may be necessary to allow the following URL in the browser security settings:

l For SI 7.3 (standard SI Agent Installer) – https://downloads.Stealthbits.com/access/files/StealthINTERCEPT/7.2.0/Agents/SI Agent.exe

l For SI 7.3 (signed SI Agent Installer) – https://downloads.Stealthbits.com/access/files/StealthINTERCEPT/7.2.0/Agents/SI Agent (signed).exe

The Update Agent Installer option in the Agents interface opens the Agent Installer Update window.

Doc_ID 371 187

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Choose between checking for the latest version of the type of SI Agent installer currently in use and checking for the other type of SI Agent, signed or unsigned. Check the Switch to Signed Installer box or the Switch to Unsigned Installer to switch the type of agent installer used by the SI Admin Console.

Click Check for Newer Version of the SI Agent Installer. StealthINTERCEPT downloads the SI Agent from a static URL where Stealthbits stores the latest SI Agent installation package. After download, the SI Agent installer currently in use is compared to the installer downloaded.

l If the versions are the same, the message specifies Agent Installer is up-to-date… and displays the SI Agent version number. Click Close and the Agent Installer Update window closes.

l If the downloaded version is newer, the message displays both version numbers and provides an option to apply the update. Click Apply Update and the Agent Installer Update window closes.

NOTE: The installer used by SI is replaced with a newer version, and all agents’ versions in the Agents interface are highlighted to indicate they are not the current version. Agents should then be updated to the new version, using the right-click menu Upgrade Agent option.

Configure Auto Deploy Window

Doc_ID 371 188

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Configure Auto Deploy window opens from the Configure Auto Deploy button in the Agents interface. It enables users to automatically deploy SI Agents to discovered domain controllers in a domain where at least one SI Agent has already been deployed.

The Enable Auto Deploy checkbox enables the following sections:

l Agent Install Package Source – Select the radio button to indicate where the SI Agent installation package to be used is located:

l Default – Uses the SI Agent installation package included with the SI Admin Console

l Textbox – Enter the path to the desired SI Agent installation package or use the ellipsis (…) to browse for the path

l Credentials – Provide the credentials to be used for deployment on all discovered domain controllers

l Login – Must be in Domain\User format

l Password

Doc_ID 371 189

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Agent Deploy Destination Options – Configure the following settings:

l Installation Location – Select the radio button to indicate the installation directory on the target domain controllers

l Default – Uses the default installation directory

l Textbox – Enter the desired installation location, e.g. d:\myagent

l Safe Mode – If selected, the SI Agent checks LSASS versions upon start up. Any changes in LSASS since the previous start prevents the monitoring modules from loading. See the SI Agent Safe Mode section for additional information.

l EM IP Address/Name – Ensure the Enterprise Manager is properly identified with the IP Address

l Port – Ensure the Enterprise Manager is properly identified with the port

Click Apply to enable the auto deploy feature. When domain controllers are discovered which do not already have an SI Agent installed, this feature automatically deploys SI Agents with all applicable modules (Windows AD Events module, Windows File System module, and/or Exchange Server Monitoring module) to the domain controllers.

Alerts Interface The Alerts interface allows SI users to quickly view in a centralized location recent SI Security events, SI Operations events, and SI Configuration events, all of which are known as alerts.

Doc_ID 371 190

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Alerts interface has the following options on the top toolbar:

l Recent [number] Alerts radio button – Populates the data grid with the most recent alerts. Use the textbox to change the default number of 1000.

l Alerts for Last [number] Hours radio button – Populates the data grid with hourly alert data. Use the textbox to change the default number of three hours.

l Refresh button – Repopulates the data grid with the current information for the selected radio button option

l Alerts Cleanup icon – Delete, save, and schedule cleanups for alert and analytics data

l Alerts Export Data icon – Export Alerts data from this grid to a local CSV file

Below is an example of how to use the Alerts for Last [number] Hours option:

The number of hours set is based on UTC and is adjusted for the time zones of the SI Admin Console server and the SI Agents monitoring events. For example, the SI Admin Console server is in New York, USA (UTC -5), the option is set to display Events for Last 4 Hours, and the SI Agent monitoring events is in London, UK (UTC +0).

Doc_ID 371 191

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

If the Refresh button is pressed at noon New York time, then the events displayed would have been monitored between 8 A.M. and 12 P.M. New York time, or between 1 P.M. and 5 P.M. London time.

On the header of this interface, there is the Clear and Export Data options on the right hand side.

The Export Data button provides options for exporting the alert data to a CSV file in the Alerts Export window. When selected, the Alerts Export window opens.

RECOMMENDED: Export alert data before using the Clear option.

Export options include:

l All – Exports all alert data

l Currently Displayed – Exports alert data according to the filters set in the data grid

l Data Range – Exports alert data within the specified From and To dates

Click OK and the Save As window opens. Specify the file name and location, then click Save.

Doc_ID 371 192

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Next to the Export Data option is the Clear button. When selected, the Alerts Cleanup window opens with these options:

l Delete – Removes alert data from the database. Choose between deleting All alert data or only the alert data Older than a specific number of days.

l Log Level – Deletes Log Levels that are checked. The log levels are equivalent to the alert severity levels in the data grid.

l Save deleted to File – Save alert data to a CSV file before it is deleted from the database. The file is saved as “Alerts_Backup_[date]_[timestamp]” by default. When Start is selected, a Save As window displays. Specify the file name and location, then click Save.

l Start – Runs the Alerts Cleanup with the applied settings

l Analytics Alerts – Choose to display StealthINTERCEPT analytics alerts in the database and/or show them in the Alerts interface data grid

l Cleanup Scheduling – Deletes alerts after a specific number of days if the severity level is selected from the list. Set the start time for when the cleanup begins.

The database clears alert data according to these configurations. It generates a new alert. This new alert specifies that the alert data is cleared, identifies the SI user who cleared the alerts, a date time stamp, and what options were configured for the Clear operation.

The data grid for the Alerts interface includes the following information for each event:

l Time (UTC) – Timestamp for when the SI system event occurred, the specified time is UTC time. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

Doc_ID 371 193

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Severity – Classification of the significance of the event:

l Critical – Might include data loss or other unexpected conditions events

l Warning – Indicates change events which affect the global operations of StealthINTERCEPT

l Info – Covers all other SI system events that have occurred

l Component – Indication of the type of SI system event

l SI Security events

l SI Operations events

l SI Configuration events

l Machine – Server where the event originated

l Alert – Event name

l User – Security principal that caused the event

l Message – Description and details about the event

All information for the selected event in the data grid is displayed at the bottom of the Alters interface.

In addition to the data grid information, there is also a list of Notifications which have been sent for the selected event.See the Navigation Pane Right-Click Commands section for additional features available within the grid view.

Below are some considerations:

l Occasionally a Microsoft Security Bulletin impacting LSASS can interfere with the SI Agent instrumentation resulting in LSASS shutting down. The SI Agents are confused to monitor for an LSASS process termination shortly after a server reboot. The LSASS process terminated SI Operations Alert is triggered in this event and the SI Agent is stopped. If this occurs, it requires the SI Administrator to take action as all monitoring/blocking by that SI Agent will be stopped. RECOMMENDED: Activate an Email Notification for this alert.

See the LSASS Process Terminated section for additional information.

Doc_ID 371 194

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l In addition to the LSASS process termination check, the SI Agent can be configured for a Safe Mode. When enabled, the SI Agent records the version of all DLLs it hooks into in LSASS during installation. When an SI Agent is restarted, it compares the DLL versions with the recorded list. If the versions do not match, the Windows AD Events monitoring module is not loaded. The agent’s Status in the Agents interface changes to Active (Modules Pending), and all Active Directory monitoring/blocking by that SI Agent will be stopped. If this occurs, it requires the SI Administrator to take action. The Agent Started in AD Monitor pending mode SI Operations Alert is triggered in this event. RECOMMENDED: Activate an Email Notification for this alert.

See the How To Enable Agent Started in AD Monitor Pending Mode Email Alert and the SI Agent Safe Mode sections for additional information.

Policy Comparison Window When a Policy is edited by an SI User, the change creates an alert in the Alerts interface. This feature compares the new against the old xml for the selected event. The Policy Comparison feature requires a third party comparison tool provided by the user in order to function.

The Policy Comparison window is accessible through selecting on the Policy updated on server Changeset #[number] hyperlink in the Message column. The Policy Comparison window displays.

The Policy Comparison window has the following features:

Doc_ID 371 195

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Copy to Clipboard

l Save

l Run Difference Tool – Runs the compare using the third party comparison tool

l Configure (gear icon) – Opens the File Comparison Tool window where the path to the comparison tool is entered. By default, Fc.exe is used but its recommended to replace this with a path to a Windows based comparison tool such as Beyond Compare for best results.

Follow the steps to run a comparison:

Step 1 – Navigate to the StealthINTERCEPT Alerts Interface.

Step 2 – Find a Policy that has been updated and select the Policy updated on server. Changeset # hyperlink. The Policy Comparison window opens.

l In this interface, the old xml displays on the left and the modified xml on the right.

Step 3 – (Optional) Select Configure. The File Comparison Tool window displays. In the Specify Compare textbox, provide the path to the file comparison tool location in quotations. Next, add %1 %2 after the quoted location path. Select OK to close the window.

Step 4 – On the Policy Comparison page, select Run Difference Tool to run the specified compare command.

A window displays with the results of the Policy compare displays.

Analytics Interface The Analytics interface is comprised of a few levels. Select the Analytics node.

Doc_ID 371 196

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

At the top of the interface is a graphical display of incidents monitored by SI. The color key on the left side allows SI users to toggle off and on results for desired analytics. In the upper-right corner, set the number of days’ worth of incidents the graphs display. Use the Refresh button in the graphics area to repopulate the graphs.

There are two graphs:

l Pie graph – Graphical representation of the percentage of incidents are for which analytic type

l Line graph – Graphical representation of a timeline of incidents for each analytic

In the middle of the interface is a list of the analytic types, number of attacks identified in the last 24 hours per type, the ability to enable or disable monitoring, access to the analytic configuration, and a tool tip with a brief summary of the analytic.

RECOMMENDED: For most analytics, configure at least one filter before enabling an analytic type.

The Refresh button on the Analytics ribbon repopulates both the graphical display and the analytic list.

The Permissions section at the bottom of the interface allows SI users to protect Analytic policies at the Analytics node. Once an SI user is assigned permission, all analytic policies, configurations, and data are protected from any SI user not included in the Permissions list. See the Policies Interface section for instructions on how to protect analytic policies.

Doc_ID 371 197

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Directly under the Analytics node are the individual analytics nodes for accessing information on the incidents that have been recently monitored and configuring the analytic type:

l Brute Force Attacks – Reports on failed attempts from a single host to access a given host. It can be triggered by different user accounts with bad passwords or invalid account names.

l User Account Hacking – Reports on multiple bad passwords provided for a given valid user account

l Horizontal Movement Attacks – Reports on security principals that are accessing more than the threshold of resources during the specified time interval. This may be indicative of a person trying to obtain information from as many servers as possible which they normally would not be accessing.

l Bad User ID (by user) – Reports on pre-authentication failures due to using account names that cannot be found within Active Directory. These incidents are grouped per account name.

l Bad User ID (by source host) – Reports on pre-authentication failures due to using account names that cannot be found within Active Directory. These incidents are grouped per source host.

l Breached Password – Reports on multiple failed authentications followed by a successful authentication in the specified time frame

l Concurrent Logins – Reports on logins from multiple locations within the specified time frame

l Impersonation Logins – Reports on multiple authenticated accounts from a single system within the specified time frame

l Golden Ticket – Reports on Kerberos tickets that exceed the specified maximum lifetimes for a user ticket or maximum lifetimes for a user ticket renewal

l File System Attacks (by user) – Reports on significant number of file changes made by an account in a short time period

l Kerberos Weak Encryption – Reports on Kerberos tickets with RC4_HMAC_MD5 encryption

l Forged PAC – Reports on Kerberos tickets with modified PAC

In addition to the Navigation Pane Right-Click Commands section features available within the grid views of the individual analytic policy, there is also a gear icon for opening the analytic configuration. See the StealthINTERCEPT Analytics Guide section for additional information.

Investigate Interface

Doc_ID 371 198

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Investigate interface allows SI users to quickly view recent events in a centralized location. SI users can investigate either Production events or Archive events. The data is limited by any protection applied at the Policy folder-level. See the Policies Interface section for additional information on the protection feature.

The top section of the Display area provides filtering options. The recent events are displayed in the bottom section. Next to the Investigate title, choose between LDAP Policies and All Other Policies to be shown in the data grid after it is refreshed. Deleted policies are shown when Show Deleted Policies is selected.

Doc_ID 371 199

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

There are six filter categories that can be applied to the recent events available in the data grid. By default, there are no filters placed on the data. All enabled unprotected policies and any protected policies the current SI user has rights to view are selected, and the other filter categories are blank. Filters can be applied through any combination of the filter categories. Use the Refresh button to repopulate the data grid with the current information for the selected filter (s).

Policy Filter Category

To filter by Policy, only have the desired policies checked. Protected policies the current SI user does not have rights to view are grayed-out.

l All policies – Toggles on or off all available policies

l Show Deleted Policies – Displays previously deleted policies in the Policy filter category. They are included in the filter. By default, event data from deleted policies are not included with the investigation results.

Who Filter Category

To filter by Who, check the Perpetrator box to filter for a particular security principal committing the change and/or check the Affected Object box to filter for a particular object being affected by a change.

For the Perpetrator option, select the radio button for either:

Doc_ID 371 200

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Name – Identify a Perpetrator by name

l SID – Identify a Perpetrator by the Security Identifier Then enter the who in the textbox or use the ellipsis (…) to open the Available Perpetrators window which displays perpetrators currently known within the database.

For the Affected Object option, select the radio button for either:

l DN / File Path – Identify an object by the distinguished name or file path

l Account – Identify an object by the SAM account name Then enter the who in the textbox. Filter criteria can be a partial match.

When Filter Category

Filtering by When encompasses several options, including the option between using Local Time or UTC time.

l To filter from a specified date and time to the present, check the Between box and set the start time

l To filter for everything from before a specified date time, check the And box and set the end time

l To filter for a specific time frame, check both boxes and set the start and end times

l To filter for Events for Last [number] Hours, check this box and set the number of hours to be used as the filter

Where Filter Category

To filter by Where, check the box(es) for the desired filter type(s):

l In this Domain – Enter the [domain name] in the textbox or use the ellipsis (…) to open the Available Domains window which displays domains currently known within the database.

l Detected on Server – Select the radio button for either Name or IP and then enter the server in the textbox. The ellipsis (…) can be used to open the Available Servers window which displays servers currently known within the database.

l From This Computer – Select the radio button for either Name or IP and then enter the computer in the textbox

l To This Computer – Select the radio button for either Name or IP and then enter the computer in the textbox Filter criteria can be a partial match

Doc_ID 371 201

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

What Filter Category

To filter by What, check the box(es) for the desired filter type(s):

l Event – Select the radio button for either Success or Fail

l Action Type – Select the radio button for either Blocked or Not Blocked

Other Filter Category

To filter by Other, check the box(es) for the desired filter type(s):

l Class

l Event Source

l Event Name

l Attribute Name

l Attribute Value – Select the radio button for either Old Value or New Value

Filter criteria can be a partial match.

CAUTION: The Full Text Search is not driven by indexes. Unless other indexed criteria are selected, the full text search could result in a scan of the entire SQL database which could be very slow for large databases.

l Full Text Search – Queries the entire SQL database for the entered attribute. If the attribute displays anywhere in the event, it displays in the data grid.

Each filter category section can be collapsed/expanded by clicking the arrow on the right side of the header ribbon. All filters can be cleared by clicking the Reset Filters button on the ribbon between the filter categories and the data grid. Filtered views can also be saved. See the Investigate Interface section for additional information.

Doc_ID 371 202

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The grid view can be expanded by either collapsing the individual filter category sections or by using the arrow between the filter categories and the grid view to collapse the entire filter category section.

Choose between investigating events in the Production database or the Archive database by selecting the desired radio button. The archive database is an option of the Database Maintenance feature of SI. The archive database can only be queried from the SI Admin Console. See the Database Maintenance Window section for additional information.

Set how many events can be displayed by changing the Get Top [number] Events value. If checked, the For Each Policy checkbox applies the specified number of events displayed on a per policy basis. If unchecked, the specified number of events displayed are solely based on the time the event was logged. Use the Refresh button to repopulate the data grid with the current information for the selected option. The Show All Columns link automatically adds any columns to the data grid that are currently hidden from view. When column placement or visibility is changed, the settings are saved.

The data grid columns for the Investigate interface each have a prefix identifying the type of information displayed. Double-click a populated grid column to access the Recent Events Tab with more detailed information on the event. The columns display the following information for each event:

Doc_ID 371 203

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Event: Policy – Policy which monitored or blocked the event

l Event: Time Logged – Timestamp for when the event was monitored/blocked by the SI Agent, the specified time is the local time for the server where the SI Agent is deployed. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Event: UTC Time Logged – UTC Timestamp for when the event was monitored/blocked by the SI Agent. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Event: Type – Identifies the type of monitoring/blocking, e.g. Active Directory, File System, Exchange

l Event: Name – Type of event monitored/blocked

l Event: Count – Number of identical events which occurred within one minute

l Event: Success – Indicates the event completed successfully

l Event: Blocked – Indicates SI blocked the event from occurring

l Event: Message – Result of the attempted operation

l Event: Raw Name – Short description of the monitored operation

l Agent: Domain – Domain where the SI Agent which monitored/blocked the event is deployed

l Agent: Computer – Server where the event was recorded (where the SI Agent is deployed)

l Agent: IP Address – IP Address of the server where the event was recorded (where the SI Agent is deployed)

l Affected Object: Path – Name of the object according to the type of monitoring/blocking

l Active Directory monitoring/blocking – Active Directory distinguished name for the affected object

l Effective Group Membership monitoring – Active Directory distinguished name for the affected group. A double asterisk (**) at the beginning indicates that the path is to the nested group where the actual membership change occurred.

l File System monitoring/blocking – Path of the affected file or folder

l Exchange monitoring/blocking – Name of the affected Exchange Mailbox

l Affected Object: Account Name – Domain\user name of the affected account

Doc_ID 371 204

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Affected Object: Class – Active Directory class (only applies to Active Directory monitoring/blocking, it is blank for other types)

l Affected Object: IP Address – IP Address of the host the security principal is trying to access

l Affected Object: Host – Name of the host the security principal is trying to access

l Perpetrator: Name – Name associated with the SID for the security principal who attempted the monitored operation

l Perpetrator: Host – Originating host name for the monitored operation

l Perpetrator: Protocol – Protocol used for the monitored operation

l File System monitoring/blocking – Name of the share used where the operation was monitored/blocked (is blank if affected host has an operating system older than Windows 2008 R2)

l Perpetrator: IP Address – Originating host IP Address for the monitored operation

l File System monitoring/blocking – This field is blank if affected host has an operating system older than Windows 2008 R2

l Perpetrator: Access URL – Raw data, the combination of the protocol, IP Address, and the Port used as part of the event

l LSASS Guardian monitoring/blocking – Process name which is modifying or attempting to modify LSASS

l Perpetrator: DN – Identification of the perpetrator according to the type of event

l Active Directory monitoring/blocking – Active Directory distinguished name for the perpetrator

l File System monitoring/blocking – Domain\user name for the perpetrator

l Exchange monitoring/blocking – Domain\user name for the perpetrator

l Perpetrator: MAC Address – Network adapter identifier

l Perpetrator: SID – Security Identifier of the security principal which attempted the monitored operation

At the bottom of the Investigate interface, additional information is displayed for selected events in the data grid.

Doc_ID 371 205

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Attribute Name, Operation, Old Value, and New Value for the logged event (as applicable to the event) are displayed.

See the Data Grid Functionality section for additional features available within the grid view.

Filtered Investigate Views Filters settings can be saved. Follow the steps to save a filtered view.

Step 1 – Set the filter [1] as desired, Refresh the data grid [2], and click Save View [3]. The Filter Set Name window opens.

Doc_ID 371 206

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 2 – Type a name for this filtered view and click OK.

The saved filtered view becomes a node in the Navigation pane under the Investigate node. Select the node to return to the saved filtered Investigate view.

EPE & LDAP Summary Folders The EPE and LDAP Summary folders are pre-defined reports that allow SI users to view consolidated recent event activity for EPE or LDAP which spans all EPE or LDAP policies. The reports include default grouping(s) that best show the consolidated data.

Doc_ID 371 207

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The investigate summary folders filters include:

l EPE Summary

l Last 10,000 Failed passwords by Policy and Rule

l Number of Failed passwords by Policy Name

l Number of Failed passwords by Rule Name

l Number of Failed passwords by Policy and Rule

l LDAP Summary

l Top 10,000 Most frequently run queries by User Accounts

l Top 10,000 Most frequently run queries by Computer Accounts

l Top 10,000 Most frequently run queries by IP

l Most frequently run queries by Account for TOP 5 User Accounts

l Most frequently run queries by Account for TOP 5 Computer Accounts

l Most frequently run queries by IP for TOP 5 IPs

l Run Time by Account

l Run Time by IP

Doc_ID 371 208

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Run Time by Domain Controller

l Number of Searches by Domain Controller

The grid view displays columns associated with the scope of the report. By default, the data grid is blank. Select Refresh to display results on the data grid. If there is no data available, the grid does not populate but the columns display on the grid. Below the report name are the Refresh, Configure, and Export buttons.

The buttons have these functions:

l Refresh – Repopulates the data grid with the current information for the selected report

l Configure – Opens the Parameters window. Set the optional time range as well as the type of policies.

l Export – Export the selected report into an Excel, PDF, HTML, RTF, or CSV output. The Save As window displays when an export option is selected. Provide a unique name for the report and save to a specified location.

The Parameters window displays the following information:

l Range From/To –If left unchecked, the report displays all policy data. When enabled, set a data range for the grid using the To and From dropdown calendars. By default, the displays todays date. Click OK to set the date and time.

For faster navigation on the calendar, select the month (i.e. October 2019) to display all twelve months to choose from. Once showing the months, select the year (i.e. 2019) to display a range of years to choose from.

Doc_ID 371 209

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Policies – Choose between All Policies or Enabled Only policies to display on the data grid

l Events – Select Blocking and/or Monitoring event(s) to display in the data grid

.

Policies Interface The Policies interface is comprised of several levels.

The list of policies can be sorted alphanumerically ascending or descending by clicking on a column header. An arrow appears in the right corner of the column header indicating the type of sorting. There is also a right-click menu within the Display area.

Selecting the Policies node provides a list of all policies in the Display area. The columns are (left to right):

l Policy State – Indicates whether or not the policy is enabled (green) or disabled (gray) NOTE: This only displays the state of the policy. It does not change its state.

l Customized Schedule Icon – A clock symbol displays when the policy has been customized

l Name – Name of the policy

l Path – Folder and sub-folder structure location of the policy within the Navigation pane

l Description – Matches the description used on the General tab of the policy

Directly under the Policies node are the folders used to organize the policies. Folders can be created at the top level or as sub-folders. SI supports unlimited levels for organizing policies. It is through a folder node that protection can be applied by an SI user with Administrator rights. Select a folder in the Policies node list to view the two types of protection available for that folder. The protection types are:

Doc_ID 371 210

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Permissions – Control the ability of SI users to View Data or Manage Policies within the selected folder. Set the SI User to one or both settings:

l View Data Permission checkbox – Affects the ability to see events data for these policies in the policy’s Recent Events Tab, the Investigate Interface, or the SI Reporting Console. Only SI users granted the View Data Permission on the folder where the object has been identified for protection are able to view any results of events that include the object. See the Policies Interface section for instructions on protecting policies or objects.

l Manage Policies Permission checkbox – Affects the ability to change policy configuration settings. See the Policies Interface section for instructions on protecting policies or objects.

l Protected Objects – Monitors the selected Select Active Directory Context Window within the policy folder

l Protected objects are hidden from the following types of data no matter what policy monitored/blocked it:

l Recent Events Tab data

l Investigate Interface data

l StealthINTERCEPT Reporting Console data

Within the folders, the individual policy nodes provide access to policy configuration and recent event data in the Display area. Policies can be moved from one folder to another by dragging- and-dropping, unless restricted by policy protections. Templates can also be dragged from a template folder and dropped into a policy folder, which copies the template into a policy. See the Templates Interface section for additional information.

An enabled policy is quickly identifiable within the Navigation pane by the green dot over the policy icon.

See the Policy & Template Configuration section for additional information on creating policies.

Doc_ID 371 211

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Policies Node Right-Click Menu The list of all policies in the Display area of the Policies node also has a right-click menu. Select a policy and right-click to open this menu.

It contains the following selections:

Right-Click Command Description

Enable Enables disabled policies. No action is taken if selected for a policy already enabled.

Disable Disables enabled policies. No action is taken if selected for a policy already disabled.

Export Export the selected policy’s configuration to an XML file through the Export Policies and Templates window (unique to the Policies and Templates interfaces, see explanation of window below)

Remove Deletes the selected policy

NOTE: If the selected policy is protected and the current SI user does not have Manage Policies permissions for it, these options are be grayed-out. See the Policies Node Right-Click Menu section for additional information on protection.

The Export Policies and Templates window, opened from the Policies and Templates interfaces, is for exporting selected policies’ configuration from the list on the Policies node or selected

Doc_ID 371 212

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

templates’ configuration from the list on the Templates Interface node. The export generates an XML file. This window is opened through the Policies Node Right-Click Menu or the Template Node Right-Click Menu Export option.

In the Notes textbox:

l Enter any information to be saved with the XML file

The Encrypt Sensitive Fields can be toggled on or off.

l If on, provide a Password and Verify Password to be used as the encryption key

When the export is configured as desired, click Export.

Protect Policies Policies can be protected at the folder node of the Policies interface. Once an SI user is assigned permission on a folder, all policies and subfolders within that folder are protected from any SI user not included in the Permissions list.

Follow the steps to protect policies.

Doc_ID 371 213

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 1 – Select a folder under the Policies node in the Navigation pane. On the right displays the Policies interface for folders.

Step 2 – In the Permissions ribbon, click the Add (+) icon.

The Remove (x) button deletes the selected SI user from the Permissions list.

Doc_ID 371 214

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 3 – A window opens with a list of SI users. Select the SI user to be granted permission on this folder and the policies within it.

Only SI user with rights as assigned in the Users and Roles Window are available in the list.

Step 4 – The window closes and the user is now in the Permissions list with the default of View Data permission. To add the Manage Policies permission, check the box for that user.

Only those SI users specifically granted permission to this folder can view event data or configure the policies within this folder or its subfolders once permissions have been assigned.

Step 5 – Click Save when the permissions are set as desired.

Protect Objects In addition to protecting policies, objects being monitored or blocked can also be protected. This feature ensures regulatory compliance. Any object granted protection is protected across all policies and reports, including its child objects. That means if a policy from another folder monitors or blocks a change affecting the protected object, the resulting event is not included in

Doc_ID 371 215

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

any result data. Only SI users granted permissions on the folder where the object is protected are able to view event data for that object. This protection applies to a policy’s Recent Events tab, the Investigate interface, and the SI Reporting Console.

Follow the steps to protect objects.

Step 1 – Select a folder under the Policies node in the Navigation pane.

Step 2 – In the Protected Objects ribbon, click the Add (+) icon.

The Remove (x) button deletes the selected object from the Protected Objects list.

Doc_ID 371 216

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 3 – The Select Active Directory Contexts window opens. Select the desired Agent from the drop-down menu and click Connect. Expand the domain tree in the Navigation pane. Select an item in the Results pane on the right and click OK. See the Select Active Directory Context Window section for additional information.

Doc_ID 371 217

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The window closes and the object is now in the Protected Objects list. Only those SI users specifically granted permission to this folder can view event data for the protected object or its children.

Step 4 – Click Save when the permissions are set as desired.

Protected objects have now been added to the Policies Interface.

Templates Interface The Templates interface is comprised of several levels.

Doc_ID 371 218

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Selecting the Templates node provides a list of all policy templates in the Display area. The list includes:

l Name

l Path – Location within the Navigation pane

l Description

The list of templates can be sorted alphanumerically ascending or descending by clicking on a column header. An arrow appears in the right corner of the column header indicating the type of sorting. There is also a right-click menu within the Display area.

Directly under the Templates node are the folders used to organize the policy templates. Folders can be created at the top level or as sub-folders since SI supports unlimited levels for organizing templates. The SI pre-created policy templates are organized into the following top-level folders: Best Practices, HIPAA, Microsoft, and SIEM. See the Policy Templates section for additional information on these pre-created templates.

Within the folders, the individual template nodes provide access to policy template configuration in the Display area. Templates can be moved from one folder to another by dragging-and- dropping. The drag-and-drop feature from one template folder to another is a Move action. However, templates can also be dragged into a Policy folder. This would be a Copy action, and converts the template into a policy.

Doc_ID 371 219

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

See the Policy & Template Configuration section for additional information on creating policy templates.

Template Node Right-Click Menu The list of all templates in the Display area of the Templates node also has a right-click menu. Select a template and right-click to open this menu.

It contains the following selections:

Right-Click Command Description

Enable (grayed-out) [Does not apply to templates]

Disable (grayed-out) [Does not apply to templates]

Export Export the selected template’s configuration to an XML file through the Policy & Template Configuration (unique to the Policies and Templates interfaces, see explanation of window below)

Remove Deletes the selected template

TAGS Node

Doc_ID 371 220

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Tags can be added to policy templates as an organizational tool. Tags display as folders under the TAGS node. Several preconfigured templates include tags, which display after those templates have been imported into the console. A template can have multiple tags added, and the template displays in the folder for each tag. If a new tag is added, Refresh the TAGS node to view the associated folder.

Adding tags to a template does not create a duplicate template, but rather multiple places from which to access the template. A modification made to a template within a folder under the TAGS node is a modification to that template no matter where it is accessed after that, i.e. from under the Templates node or from another folder under the TAGS node.

Doc_ID 371 221

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® Policy & Template Configuration A StealthINTERCEPT (SI) policy or policy template has many elements that define the objects and events it monitors or blocks, where in networks it looks, and when it is active. These policy attributes are organized into the following major components:

l General Tab

l Event Type Tab

l Actions Tab (Event Consumers)

Each major component has its own tabbed view within the policy/template configuration. A policy requires at least the General tab and Event Type tab to be configured before it properly functions. The Actions tab is optional.

The Reports Tab is where reports are linked to the selected policy/template from within the SI Admin Console. The Recent Events Tab provides information on the events that have been recently monitored or blocked by the selected policy. These events are also available through the Investigate Interface and the SI Reporting Console. See the Investigations Tab section of the StealthINTERCEPT Reporting Console User Guide for additional information.

This chapter provides the necessary information and available options for configuring a policy or a policy template. The following sections provide an in-depth look at each configuration tab. When the policy/template configuration is set as desired, click Save to complete the process.

Through a PowerShell API integration, it is possible to create, edit, delete, and enable SI Policies without opening the SI Admin Console. See the Appendix: PowerShell API Integration for additional information.

Policy & Template Configuration A StealthINTERCEPT (SI) policy or policy template has many elements that define the objects and events it monitors or blocks, where in networks it looks, and when it is active. These policy attributes are organized into the following major components:

l General Tab

l Event Type Tab

l Actions Tab (Event Consumers)

Each major component has its own tabbed view within the policy/template configuration. A policy requires at least the General tab and Event Type tab to be configured before it properly functions. The Actions tab is optional.

Doc_ID 371 222

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Reports Tab is where reports are linked to the selected policy/template from within the SI Admin Console. The Recent Events Tab provides information on the events that have been recently monitored or blocked by the selected policy. These events are also available through the Investigate Interface and the SI Reporting Console. See the Investigations Tab section of the StealthINTERCEPT Reporting Console User Guide for additional information.

This chapter provides the necessary information and available options for configuring a policy or a policy template. The following sections provide an in-depth look at each configuration tab. When the policy/template configuration is set as desired, click Save to complete the process.

Through a PowerShell API integration, it is possible to create, edit, delete, and enable SI Policies without opening the SI Admin Console. See the Appendix: PowerShell API Integration for additional information.

Actions Tab The Actions tab is for configuring various responses, or event consumers, to the event data a policy captures. The following types of actions are available:

l Send to Events DB – Logs events to the event database for use by StealthINTERCEPT Reporting using the built-in database event consumer. This is the primary action and is enabled by default in new policies.

l Send to SIEM – Sends formatted messages to a SIEM server as configured in a profile. To enable this feature the server must first be configured by an SI Administrator, which is done through the SI System Alerting Window.

l Send to StealthDEFEND – Sends data for this policy to StealthDEFEND. To enable this feature, the Web Request Action Module (StealthDEFEND URI) must be created and configured by an SI Administrator. This is configured through the Event Sink Tab on the StealthDEFEND Configuration window.

l Email Notifications – Sends formatted email notifications to the selected Message Profile. To enable this feature the SMTP Gateway must first be configured and Message Profiles created by an SI Administrator, which is done through the SI System Alerting Window.

l File Actions – Records the events to a log (text) file in XML or Comma Delimited (CSV) format. This is configured through the File Actions.

l .NET Script Actions – Runs a user-supplied script which implements an automated action in response to the event. Scripts can be written in Visual Basic or C#. This is configured through the .NET Script Actions. Optionally, custom scripts can be provided through a Stealthbits Statement of Work.

Doc_ID 371 223

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l PowerShell 4.0 Actions – Runs a user-supplied PowerShell script which implements an automated action in response to the event. This is configured through the PowerShell 4.0 Actions. Optionally, custom scripts can be provided through a Stealthbits Statement of Work.

Multiple event consumers can be configured for a single policy, even multiple event consumers of the same type. However, only one database event consumer can be added per policy.

Actions are configured to run on a separate thread from the policy’s event processing thread. Incoming events have a dedicated thread/queue for processing. Email notification has a dedicated thread/queue for processing. Custom Script actions has a dedicated thread/queue for processing. This allows the action to process without blocking new events from going into the database while the action completes.

At the top of the tab, assigned actions are listed. The list includes:

l Enabled, Type, Name, and Description for all assigned File, .NET Script, or PowerShell 4.0 actions. See the File Actions, .NET Script Actions, and PowerShell 4.0 Actions sections for steps on adding actions to a policy.

Actions can be enabled or disabled on the Actions tab of the policy/template configuration by checking or unchecking the Enabled checkbox in the Action Configurations list. This can also be done through the Add Action window.

Doc_ID 371 224

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Send to Events DB

This action is checked by default and saves the event data a policy monitors and captures to the NVMonitorData database. Typically this option is only unchecked by Stealthbits Support during a troubleshooting session or when the only desired output is a file for an alert. SI Reporting uses the events database to access and create reports.

Send to SIEM

This action is added by selecting the desired SIEM Profile to be the recipient of the SIEM notifications from the drop-down menu. Prior to activating this option, it is necessary to establish a connection with the SIEM server and configure the mapping file. All SIEM Profiles created are available to be selected. Configuration is done by an SI Administrator through the SI System Alerting Window, and this action can also be assigned within that window.

Send to StealthDEFEND

This action can be checked to send event data for the policy to StealthDEFEND. Prior to activating this option, it is necessary to configure the connection with StealthDEFEND. This is done by an SI Administrator through the StealthDEFEND Configuration Windows window.

Email Notifications

Doc_ID 371 225

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

This action is added by selecting the desired Message Profile to be recipient of the email notifications from the drop-down menu. Prior to activating this option, it is necessary to configure the SMTP Gateway and create Message Profiles. All Message Profiles created are available to be selected. Setup is done by an SI Administrator through the SI System Alerting Window, and this action can also be assigned within that window.

Once Email Notifications are enabled, select a Message Profile and then choose to enable the Prevent Repeat Emails by option. If enabled:

l Select the radio button for either:

l Policy – Prevents email notifications for the same policy

l Subject – Prevents email notifications with the same Subject line, as configured within the Message Profile

l Set the duration (in minutes or hours) that repeat emails are prevented

Select Add (+) to open the Add Action window. Choose to add a File Actions, .NET Script Actions, and PowerShell 4.0 Actions action sections. Use the Remove (x) button to delete file or script actions from a policy.

All changes made to a policy or a template must be saved before leaving the configuration interface.

File Actions

Doc_ID 371 226

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

A File action can output the event data collected by a policy to a log file. This action is assigned to a policy through the Add Action window. Follow the steps to add a File action to a policy/template.

Step 1 – On a policy or template Actions tab, click Add (+) to open the Add Action window.

Step 2 – In the left pane, select the radio button for File.

Step 3 – Configure the File action:

Doc_ID 371 227

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Name – Provide a unique, descriptive name for this File action

l Check the box for Enabled to allow the policy to send the event data to the file

l Description – Provide a clear and detailed description for this File action. This is optional but recommended.

l File Name – Provide a name for the file. The file extension is added automatically

l The default location is: …\Stealthbits\StealthINTERCEPT\SIEnterpriseManager\output\file

l The name can include a full UNC path to place the file at a desired location.

l Select the radio button for the desired File Output Format:

l XML

l Comma Delimited (CSV)

l Adjust the File Size Limit and Minimum disk space required for reporting values as desired NOTE: Set thresholds for file event consumers to maximize performance and minimize individual file sizes. When a file reaches its maximum size, it continues to record data but the oldest data in the file is deleted to make room for the newest. The default file size settings are the following:

l File Size Limit: 5 MB

l Minimum disk space required for reporting: 1 MB

Step 4 – Click Save to apply changes and close the Add Action window.

Doc_ID 371 228

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Action tab now displays the configuration settings for the specified File action. The action configuration can be directly edited through this display as well.

.NET Script Actions A Visual Basic or C# script can be written and assigned to a policy by SI users or a Stealthbits Engineer via engaging Stealthbits Professional Services. The script will be invoked by the Enterprise Manager for an enabled policy. The .NET Script action is assigned to a policy through the Add Action window.

Follow the steps to add a .NET Script action to a policy/template.

Step 1 – On a policy or template Actions tab, click Add (+) to open the Add Action window.

Doc_ID 371 229

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 2 – In the left pane, select the radio button for .NET Script.

Step 3 – Configure the .NET Script action:

l Name – Provide a unique, descriptive name for this .NET Script action

l Check the box for Enabled to allow the policy to launch the script

l Description – Provide a clear and detailed description for this .NET Script action. This is optional but recommended.

l Select the radio button for the script language being used:

l Visual Basic

l C#

l Click Edit… to open the StealthINTERCEPT Script Editor window and provide the script

Doc_ID 371 230

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 4 – Create or copy and paste the custom script in the StealthINTERCEPT Script Editor. See the StealthINTERCEPT Script Editor Tools section for additional information, i.e. Run for testing and Encrypt functionality. See Appendix: Default Custom Scripts for default custom scripts. Save and close.

Doc_ID 371 231

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 5 – At the bottom of the Add Action window, the new script is visible in the Script Preview section. Choose whether or not to Enable compiler error logging; if enabled, SI logs information about the compiling of scripts.

Step 6 – Click Save to close the Add Action window and apply changes.

The Action tab now displays the configuration settings for the specified .NET Script action. The action configuration can be directly edited through this display as well.

StealthINTERCEPT Script Editor Tools On the Add Action window, the Edit... button opens the StealthINTERCEPT Script Editor. The top bar includes the Tools dropdown menu which provides several Tools to aid the SI user.

Doc_ID 371 232

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Tools item in the menu contains the following options:

l Assembly Manager – Applies to Visual Basic and C# scripts only, list of assemblies that support exposing SI data in the VB or C# runtime environments

l Compile (Ctrl+F6) – Applies to Visual Basic and C# scripts only, compiles the script to find and fix syntax errors

l Run (F5) – Executes the script on the machine where the SI Admin Console is installed

l Reset to Default Script – Replaces the existing script with the default script which is shipped with StealthINTERCEPT

l Encrypt – Encrypts selected portions of the script to an encrypted string with a decrypt command for run time. See note below explaining why only a plain text string, information in the script between quote marks (“), should be encrypted.

The Tools > Run option is used to launch the script from the SI Admin Console, allowing the SI user to test the script. If running a .NET Script Action, there are no prerequisites.

Remember, if the SI Admin Console server meets this requirement but the Enterprise Manager server does not, the script does not work in an enabled policy.

CAUTION: The Tools > Encrypt option is used to obfuscate plain text strings, e.g. credentials, within the script. Encrypting functions or other commands result in the script not working. Only a literal string should be encrypted, between the quote marks (“). The quote marks themselves should not be included in the encryption.

PowerShell 4.0 Actions A PowerShell 4.0 script can be written and assigned to a policy by SI users or a Stealthbits Engineer via engaging Stealthbits Professional Services. The script will be invoked by the Enterprise Manager for an enabled policy.

The PowerShell 4.0 action is assigned to a policy through the Add Action window. Follow the steps to add a PowerShell 4.0 action to a policy/template.

Doc_ID 371 233

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 1 – On a policy or template Actions tab, click Add (+) to open the Add Action window.

Step 2 – Configure the PowerShell 4.0 Script action:

l Name – Provide a unique, descriptive name for this PowerShell 4.0 action

l Check the box for Enabled to allow the policy to launch the script

l Description – Provide a clear and detailed description for this PowerShell 4.0 action. This is optional but recommended.

l Click Edit… to view the sample script. The StealthINTERCEPT Script Editor opens

Doc_ID 371 234

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 3 – Create or copy and paste the custom script in the StealthINTERCEPT Script Editor. See the StealthINTERCEPT Script Editor Tools section for additional information, i.e. Run for testing and Encrypt functionality. See Appendix: Default Custom Scripts for default custom scripts.

Step 4 – Save and close.

Doc_ID 371 235

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 5 – At the bottom of the Add Action window, the new script is visible in the Script Preview section. Choose whether or not to Enable compiler error logging; if enabled, SI logs information about the compiling of scripts.

Step 6 – Click Save to close the Add Action window and apply changes.

The Action tab now displays the configuration settings for the specified PowerShell 4.0 action. The action configuration can be directly edited through this display as well.

.

Event Type Tab The Event Type tab view is where the objects and events SI monitors/blocks are defined.

Doc_ID 371 236

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Each Event Type represents what is monitored or blocked. Event filters are used to either narrow or broaden the scope of the monitoring/blocking as desired. Click Add (+) to open the Event Selection window. The Solution Overview and modules licensed by the organization determine what Event Types are available. Event Types which are not available or not licensed are grayed- out but visible in the Event Selection window.

Doc_ID 371 237

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Doc_ID 371 238

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Check the box for the desired Event Type and click OK. The corresponding Event Filters show at the bottom of the Event Type tab. Multiple Event Types can be assigned to a single policy.

RECOMMENDED: Create different policies for different event types for reporting purposes. Otherwise, one report will have a mix of different types of data. There are a few exceptions to this feature.

Once the Event Type to be monitored by the policy is selected, the filters scope the policy.

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

The following sections highlight the Event Filters associated with each Event Type. See the Event Filters Overview section for in-depth information on each filter tab.

All changes made to a policy or a template must be saved before leaving the configuration interface.

StealthINTERCEPT for Active Directory Solution Event Types The following Event Types are available for the Solution Overview:

l Active Directory Changes Event Type

l Active Directory Lockdown Event Type

l Active Directory Read Monitoring Event Type

l AD Replication Monitoring Event Type

l AD Replication Lockdown Event Type

l Authentication Event Type

l Authentication Lockdown Event Type

l Effective Group Membership Event Type

l GPO Setting Changes Event Type

l GPO Setting Lockdown Event Type

l LSASS Guardian – Monitor Event Type

l LSASS Guardian – Protect Event Type

These event types are available through the following Licensed Modules:

Doc_ID 371 239

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Licensed Module Available Event Type

Active Directory Changes Module Active Directory Changes Event Type

Active Directory Read Monitoring

AD Replication Monitoring

Authentication Event Type

Effective Group Membership Event Type

LSASS Guardian – Monitor

Active Directory Lockdown Module Active Directory Lockdown Event Type

*Requires Active Directory Changes Module AD Replication Lockdown

Authentication Lockdown Event Type

LSASS Guardian – Protect

GPO Lockdown Module GPO Setting Lockdown Event Type

*Requires Active Directory Changes Module

**Requires File System Module

GPO Setting Changes Module GPO Setting Changes Event Type

*Requires Active Directory Changes Module

**Requires File System Module

Active Directory Changes Event Type The Event Filters for the Active Directory Changes Event Type are:

l AD Event Filter

l Domains/Servers Filter

l AD Context Filter

l AD Classes Filter

l AD Attributes Filter

l AD Objects Filter

Doc_ID 371 240

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l AD Perpetrator Filter for Monitoring)

l IP Addresses (from) Filter

l Hosts (from) Filter for Monitoring

l Success Filter

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

Active Directory Lockdown Event Type The Event Filters for the Active Directory Lockdown Event Type are:

l AD Event Filter

l AD Objects and Containers Filter

l Domains/Servers – Not supported for this lockdown event type

l AD Event Filter

l AD Perpetrator Filter for Lockdown

l Hosts (from) Filter for Lockdown

l User Account Control Filter

l Rule Preview Filter

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

CAUTION: Lockdown/blocking policies with blank filters result in everything being locked down or blocked.

Active Directory Read Monitoring Event Type The Event Filters for the Active Directory Read Monitoring Event Type are:

l Domains/Servers Filter

l AD Classes Filter

l AD Objects Filter

l AD Context Filter

l AD Perpetrator Filter for Monitoring

l AD Attributes Filter

Doc_ID 371 241

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Hosts (from) Filter for Monitoring

l Rule Preview Filter

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

CAUTION: This event type monitors all specified domain controller Read events. Use this event type with significant filters or else it can adversely impact overall system performance and significantly increase the size of the SI Event Database. Limit the policy to specific attributes in order to avoid overwhelming the database with a high volume of unnecessary events.

This Event Type reports on user's accessing or reading specific security related AD Attributes. Active Directory processes a high volume of Read requests. It is not recommended or designed to capture all or the majority of Read activity.

AD Replication Lockdown Event Type The Event Filters for the AD Replication Lockdown Event Type are:

l AD Perpetrator Filter for Lockdown

l Permissions Filter

l Domains/Servers Filter

l Hosts (from) Filter for Lockdown

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

CAUTION: Lockdown/blocking policies with blank filters result in everything being locked down or blocked.

This event type locks down domain controller syncing/replication. Since Windows cannot detect if a sync request is coming from a legitimate domain controller, this event type is designed to block requests from computers which are not ‘allowed’ by the policy.

Legitimate domain controllers must be identified in the event filters. This can be done through one of the following methods:

l AD Perpetrator filter

l Use this filter for a dynamic list of domain controllers

l Set filter to "Allow"

l Add the Users OU > Domain Controllers group

Doc_ID 371 242

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Add any other groups containing domain controllers. This triggers an error message reminding the user that only domain controllers should be allowed.

l Any domain controller not included in these groups are blocked from syncing /replication

l Domains/Servers filter

l Use this filter for a static list of domain controllers

l Add domain controllers to the Exclude list

l Any domain controller not excluded is blocked from syncing /replication

CAUTION: Not allowing ALL domain controllers to sync has negative impacts on Active Directory.

If no filters are applied, saving the policy configuration displays a warning message.

NOTE: AD Replication Lockdown Event Type internally looks for use of the GetNCChanges() API and blocks the API call when it is invoked by a machine outside the scope of the policy filters.

AD Replication Monitoring Event Type The Event Filters for the AD Replication Monitoring Event Type are:

l AD Perpetrator Filter for Monitoring

l Permissions Filter

l Domains/Servers Filter

l Hosts (from) Filter for Monitoring

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

This event type monitors domain controller syncing/replication. Since Windows cannot detect if a sync request is coming from a legitimate domain controller, this event type is designed to monitor requests from computers which are not ‘excluded’ by the policy. Therefore, legitimate domain controllers should be identified in the event filters. This can be done through one of the following methods:

l AD Perpetrator filter

l Use this filter for a dynamic list of domain controllers

l Add domain controllers to the Exclude list(s)

l Add the Users OU > Domain Controllers group

Doc_ID 371 243

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Add any other groups containing domain controllers. It triggers an error message reminding the user that only domain controllers should be excluded

l Any domain controller not included in the groups are monitored for syncing/replication requests

l Domains/Servers filter

l Use this filter for a static list of domain controllers

l Add domain controllers to the Exclude list

l Any domain controller not excluded are monitored for syncing/replication requests

The StealthDEFEND DC Sync threat is sourced by a StealthINTERCEPT AD Replication Monitoring policy. It is necessary for the policy to be configured to exclude domain controllers on the Host (From) filter.

If no filters are applied, saving the policy configuration displays a warning message.

NOTE: AD Replication Monitoring Event Type internally looks for use of the GetNCChanges() API and reports an event when this API is invoked by a machine outside the scope of the policy filters.

Authentication Event Type The Event Filters for the Authentication Event Type are:

l Authentication Protocol Filter

l Domains/Servers Filter

l Success Filter

l AD Perpetrator Filter for Monitoring

l IP Addresses (from) Filter

l IP Addresses (to) Filter

l Hosts (from) Filter for Monitoring

l Hosts (to) Filter for Monitoring

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

NOTE: When the Authentication Event Type is assigned to a policy outside of the Analytic policies, then all collected authentication event data is stored in the database, not in memory as it is for the Analytic policies. However, it does consolidate the authentication events which occur every minute, resulting in up to a one minute delay between the event and the reporting of the event.

Doc_ID 371 244

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Authentication Lockdown Event Type The Event Filters for the Authentication Lockdown Event Type are:

l AD Perpetrator Filter for Lockdown

l Hosts (from) Filter for Lockdown

l Hosts (to) Filter for Lockdown

l Rule Preview Filter

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

CAUTION: Lockdown/blocking policies with blank filters result in everything being locked down or blocked.

This event type blocks authentication requests made through Kerberos and NTLM. These requests are used to access resources such as remote shares, establish RDP sessions, interactive logons, etc.

Due to the method used by Windows to establish an RDP session to a computer with the less secure mode, “Allow connections from computers running any version of Remote Desktop (less secure)” option in the System Properties of the target host, StealthINTERCEPT cannot see the ‘from host’ information to block. Therefore, if the target host is configured with the less secure mode, the Hosts (from) filter does not block authentications for these RDP sessions. Since the perpetrator and host to information is available to StealthINTERCEPT with this mode of RDP session, the AD Perpetrator for lockdown filter and Hosts (to) filter will block authentications.

NOTE: When the Authentication Lockdown Event Type is assigned to a policy outside of the Analytic policies, then all collected authentication event data is stored in the database, not in memory as it is for the Analytic policies. However, it does consolidate the authentication events which occur every minute, resulting in up to a one minute delay between the event and the reporting of the event.

Effective Group Membership Event Type The Event Filters for the Effective Group Membership Event Type are:

l AD Groups Filter

l AD Perpetrator Filter for Monitoring

l Success Filter

Doc_ID 371 245

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

GPO Setting Changes Event Type The Event Filters for the GPO Setting Changes Event Type are:

l AD Group Policy Object Changes Filter

l AD Perpetrator Filter for Monitoring

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

GPO Setting Lockdown Event Type The Event Filters for the GPO Setting Lockdown Event Type are:

l AD Group Policy Object Filter

l Domains/Servers Filter

l AD Perpetrator Filter for Lockdown

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

If setting a filter to ‘“EXCLUDE” a domain from this blocking policy, this setting overrides any ”BLOCK” user filters. That means in order to block a user, it is necessary to not “EXCLUDE” the domain from which that user is a member.

CAUTION: Lockdown/blocking policies with blank filters result in everything being locked down or blocked.

LSASS Guardian – Monitor Event Type The Event Filters for the LSASS Guardian – Monitor Event Type are:

l AD Perpetrator Filter for Monitoring

l Domains/Servers Filter

l Processes Filter for Monitoring

l Open Process Flags Filter

Doc_ID 371 246

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

RECOMMENDED: Add exclusion process filters for legitimate processes which make changes to LSASS, e.g. third-party malware applications.

LSASS Guardian – Protect Event Type The Event Filters for the LSASS Guardian – Protect Event Type are:

l AD Perpetrator Filter for Lockdown

l Domains/Servers Filter

l Processes Filter for Lockdown

l Open Process Flags Filter

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

CAUTION: Lockdown/blocking policies with blank filters result in everything being locked down or blocked.

RECOMMENDED: Add exclusion process filters for legitimate processes which make changes to LSASS, e.g. third-party malware applications.

StealthINTERCEPT for Enterprise Password Enforcement Solution Event Type The following Event Type is available for the Solution Overview Solution:

l Password Enforcement Event Type

This event type is available through the following Licensed Module:

Licensed Module Available Event Type

Password Enforcement Module Password Enforcement Event Type

Password Enforcement Event Type The Event Filters for the Password Enforcement Event Type are:

Doc_ID 371 247

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Domains/Servers Filter

l AD Account Filter

l AD Perpetrator Filter for Lockdown

l Hosts (from) Filter for Lockdown

l Password Rules Filter

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

CAUTION: Lockdown/blocking policies with blank filters result in everything being locked down or blocked.

This Event Type locks down or monitors password creation/modification so that known, compromised passwords are not accepted. First Windows checks against an organization’s password policies. Passwords which pass the Windows check are then further validated by this SI policy. SI contains a dictionary of known compromised passwords and the ability to define additional rules for the content of the password. If the password matches any in the dictionary or matches a configured rule, the user is given the same Windows error message they would have received if the password had not been approved by the Windows check.

There is an option to capture the value of a password rejected by SI within the event data on the Password Rules filter. If rejected password values are captured, then the values appear in the Attributes field of the data grid.

There are always two accounts associated with this type of event:

l AD Account – Security principal for which the password is being changed

l Perpetrator – Security principal making the password change on the AD account

This event type can be added multiple times to a policy or multiple policies can be created to allow defining different sets of password rules. For different sets of Active Directory accounts and/or Active Directory Perpetrators.

Example

The goal to create a password enforcement policy for the organization’s users. However, senior executives require a different or stronger set of password rules. This is done by creating a single policy with the Password Enforcement event type added twice.

Configure one event type with the desired password rules for all users.

l Identify the senior executives on the AD Account filter tab using the Allow option

l The users selected are not held to the password rules configured

Doc_ID 371 248

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Configure the other event type with the desired password rules for the senior executives.

l Identify the senior executives on the AD Account filter tab using the Block option

l The users selected are held to these password rules

With the v7.0+ StealthINTERCEPT release, a client-side module is provided in the installer to provide end user feedback for why their password does not meet the complexity requirements of the Password Rules policy. This feature is inactive by default but can be installed on the Domain Controller to be implemented across the environment. See the EPE User Feedback Module section of the StealthINTERCEPT Installation & Upgrade User Guide for additional information

StealthINTERCEPT for Exchange Solution Event Types The following Event Types are available for the Solution Overview:

l Exchange Changes Event Type

l Exchange Lockdown Event Type

These event types are available through the following Licensed Modules:

Licensed Module Available Event Type

Exchange Events Module Exchange Changes Event Type

Exchange Lockdown Module Exchange Lockdown Event Type

*Requires Exchange Events Module

Exchange Changes Event Type The Event Filters for the Exchange Changes Event Type are:

l Exchange Event Filter for Monitoring

l Exchange Mailbox Objects and Containers Filter

l Exchange Trustees Filter

l Exchange Perpetrators Filter

l Rule Preview Filter

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

Doc_ID 371 249

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Exchange Lockdown Event Type The Event Filters for the Exchange Lockdown Event Type are:

l Rule Preview Filter

l Exchange Mailbox Objects and Containers Filter

l Exchange Trustees Filter

l Exchange Perpetrators Filter

l Rule Preview Filter

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

CAUTION: Lockdown/blocking policies with blank filters result in everything being locked down or blocked.

After enabling an Exchange login blocking policy, mail clients with existing connections to Outlook, OWA, PowerShell, EWS, ECP, and ActiveSync will not be blocked while the existing connection remains. See the Troubleshooting within the SI Admin Console section for information on resolving this.

NOTE: There are additional factors to consider in order to block delegations through Outlook. See the Troubleshooting within the SI Admin Console section for additional information.

StealthINTERCEPT for File System Solution Event Types The following Event Types are available for the Solution Overview:

l File System Changes Event Type (Windows and/or NAS)

l File System Lockdown Event Type(Windows only)

l File System StealthAUDIT Event Type (Windows only)

l FSMO Role Monitoring

The File System Changes Event Type and File System Lockdown Event Type only generate event monitoring and blocking data for StealthINTERCEPT. The File System StealthAUDIT Event Type only generates event monitoring data for the StealthAUDIT Management Platform. To generate the same data to be accessible for both products, it is necessary to create a single policy with both Event Types assigned. See the File System StealthAUDIT Event Type section for further information.

These event types are available through the following Licensed Modules:

Doc_ID 371 250

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Licensed Module Available Event Type

File System Module File System Changes Event Type

File System Lockdown Event Type

File System StealthAUDIT Event Type

File System Changes Event Type The Event Filters for the File System Changes Event Type are:

l File System Filter for Monitoring

l File System Paths Filter

l File System Paths Filter

l AD Perpetrator Filter for Monitoring

l Success Filter

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

It is necessary to select paths/collections to be included or excluded on the Paths filter within the target File System. The policy monitors the path/collection from the SI Agent used to select it for the filter which is indicated in the parenthesis after the path/collection. The path/collection can be monitored by other SI Agents by selecting them on the Additional Agents filter.

NOTE: Any files or folders to be excluded need to be a subset of a folder identified in the Include Paths section.

If no path is provided, an error message displays when the analytic policy is enabled: The policy must have at least one path to monitor defined.

Example:

l Paths filter – Paths identified:

l C:\Documents and Settings (EXAMPLE\server1)

l C:\Users\All Users (EXAMPLE\server2)

The above configuration in a policy results in the SI Agent on server1 monitoring only the C:\Documents and Settings folder and the SI Agent on server2 monitoring only the C:\Users\All Users folder.

Doc_ID 371 251

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Paths filter – Paths identified:

l C:\Documents and Settings (EXAMPLE\server1)

l C:\Users\All Users (EXAMPLE\server2)

l Additional Agents filter – Agents selected:

l EXAMPLE\server1

l EXAMPLE\server3

By adding the SI Agents on server1 and server3 in the Additional Agents filter, then server1 and server3 monitor both folder paths, but server2 still only monitors the C:\Users\All Users folder.

Event data collected by the policies with this Event Type are also available for consumption by StealthAUDIT if the File System StealthAUDIT Event Type is used by the same enabled policy.

Monitor NAS Devices Monitoring a NAS device first requires the Stealthbits Activity Monitor to have a deployed activity agent configured to monitor the device. An SI Agent must be deployed on the same Windows server hosting the activity agent configured to monitor the NAS device. Once monitoring has been started, Follow the steps to configure an SI policy to monitor file system changes.

NOTE: This does not change what the Stealthbits Activity Monitor agent is monitoring. It reads information collected by the Stealthbits Activity Monitor and applies any additional filters defined in the SI policy. Therefore, it is necessary for the Stealthbits Activity Monitor agent to be configured to monitor the desired activity.

Step 1 – On the Event Type tab of the policy, add the File System Changes Event Type.

Step 2 – In the Event Filters section, select the File System Paths Filter filter tab and select the Add Paths button to open the Select File System Objects Window.

Remember, any files or folders to be excluded need to be a subset of a folder identified in the Include Paths section.

Step 3 – Connect to the SI Agent deployed to a Windows server hosting the activity agent. The local drives of the Windows server and all NAS devices being monitored by the activity agent are listed in the Navigation pane.

Step 4 – Select the NAS device in the Navigation pane, and type the path(s) to be monitored by this policy in the Results pane, one path per row. The paths entered can be file or folder names.

For example, type C:\HR\NewHireProcess.doc for a NAS device with the IP Address of 192.168.16.188, and it displays in the paths list as C:\HR\NewHireProcess.doc (\192.168.16.188)

Doc_ID 371 252

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Unlike Windows path, NAS paths are not validated by StealthINTERCEPT. It is up to the user to accurately enter the path of the file or folder to be monitored. The format of the paths needs to match the data in the .tsv files produced by the Stealthbits Activity Monitor agent. The Search feature within the Stealthbits Activity Monitor can be used to validate path formats. See the Stealthbits Activity Monitor Installation & Console User Guide for additional information.

Step 5 – Click OK to close the Select File System Objects window.

The NAS paths are now added to the list of paths to be monitored.

File System Lockdown Event Type The Event Filters for the File System Lockdown Event Type are:

l File System Filter for Lockdown

l File System Filter for Lockdown

l AD Perpetrator Filter for Lockdown

l AD Perpetrator Filter for Lockdown

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

It is necessary to select paths/collections to be locked down on the File System filter. The policy will lockdown the path/collection from the SI Agent used to select it for the filter which is indicated in the parenthesis after the path/collection. The path/collection can be locked down by other SI Agents by selecting them on the Additional Agents filter.

If no path is provided, an error message displays when the analytic policy is enabled: The policy must have at least one path to monitor defined.

Example:

l File System filter – Paths identified:

l C:\Documents and Settings (EXAMPLE\server1)

l C:\Users\All Users (EXAMPLE\server2)

The above configuration in a policy results in the SI Agent on server1 locking down only C:\Documents and Settings folder and the SI Agent on server2 locking down only C:\Users\All Users folder.

Doc_ID 371 253

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l File System filter – Paths identified:

l C:\Documents and Settings (EXAMPLE\server1)

l C:\Users\All Users (EXAMPLE\server2)

l Additional Agents filter – Agents selected:

l EXAMPLE\server1

l EXAMPLE\server3

By adding the SI Agents on server1 and server3 in the Additional Agents filter, then server1 and server3 lockdown both folder paths, but server2 will only lockdown the C:\Users\All Users folder.

Event data collected by the policies with this Event Type are also available for consumption by StealthAUDIT if the File System StealthAUDIT Event Type is used by the same enabled policy.

CAUTION: Lockdown/blocking policies with blank filters result in everything being locked down or blocked.

File System StealthAUDIT Event Type The Event Filters for the File System StealthAUDIT Event Type are:

l AD Perpetrator Filter for Lockdown

l File System Agents Filter

l Processes and Configuration Filter

l Perpetrators to Exclude Filter

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

This Event Type is specifically designed to capture Windows file system activity events for consumption by StealthAUDIT.

These events are not captured in the StealthINTERCEPT database, but are collected in a data file which can be read by the File System Activity Auditing collection component. See the StealthAUDIT File System Solution Admin Guide for information on this collection component.

Event data collected by the policies with this Event Type are also available for consumption by StealthAUDIT if the File System StealthAUDIT Event Type is used by the same enabled policy.

FSMO Role Monitoring The Event Filters for the FSMO Role Monitoring Event Type are:

Doc_ID 371 254

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l FSMO Roles Filter

l Domains/Servers Filter

l AD Perpetrator Filter for Monitoring

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

StealthINTERCEPT for LDAP Solution Event Type The following Event Type is available for the Solution Overview:

l LDAP Lockdown Event Type

l LDAP Monitoring Event Type

This event type is available through the following Licensed Modules:

Licensed Module Available Event Type

LDAP Monitoring Module LDAP Lockdown Event Type

*Requires Active Directory Changes Module LDAP Monitoring Event Type

LDAP Operations Center

LDAP Lockdown Event Type The Event Filters for the LDAP Lockdown Event Type are:

l LDAP Filter

l Domains/Servers Filter

l AD Perpetrator Filter for Lockdown

l LDAP Query Filter for Lockdown

l LDAP Result Filter

l Rule Preview Filter

l Hosts (from) Filter for Lockdown

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

Doc_ID 371 255

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

This event type cannot be used in a policy with any other event type. It must be the only event type assigned to the policy.

LDAP Monitoring Event Type The Event Filters for the LDAP Monitoring Event Type are:

l LDAP Filter

l LDAP Runtime Filter

l Domains/Servers Filter

l Success Filter

l AD Perpetrator Filter for Monitoring

l LDAP Query Filter for Monitoring

l LDAP Result Filter

l LDAP Attributes Filter

l Hosts (from) Filter for Monitoring

l Rule Preview Filter

Each filter tab acts like an "AND" statement for the filter. Any filter tab left blank is treated like an "ALL" for that filter set.

NOTE: The LDAP Monitoring Event Type is specifically used to create LDAP Event policies. Use the LDAP Operations Center to create LDAP Operations policies.

This event type cannot be used in a policy with any other event type. It must be the only event type assigned to the policy.

Configure LDAP Monitoring for StealthDEFEND Follow the steps to configure LDAP monitoring for StealthDEFEND.

Step 1 – In the StealthINTERCEPT Administration Console, find and select the “StealthDEFEND for AD LDAP” policy template. If none is deployed, see the Import SI Pre-Created Policy Templates section.

Step 2 – Select the Event Type tab.

Doc_ID 371 256

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 3 – Under Event Filters select LDAP Query. If the Include LDAP Queries list is empty, select the other LDAP Monitoring event type in the list above.

Step 4 – Scroll to the bottom of the Include LDAP Queries list.

Step 5 – Select the line below the last existing query filter and paste the string copied form StealthDEFEND. For example:

Remember, the Honeytoken tab of the SStealthDEFEND Configuration window must be configured in order to successfully send LDAP Monitoring data to StealthDEFEND.

General Tab The General tab is for editing the basic attributes of the policy. It is also the only tab where policy configuration differs from template configuration. A policy’s General tab includes the policy status which indicates whether or not the policy is enabled. This does not apply to a template and is therefore not on a template’s General tab.

Doc_ID 371 257

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Policy General Tab Template General Tab

Policy Status

It indicates whether or not the policy is enabled. Click the button in front of the policy status to toggle between Disabled and Enabled. This setting is indicated for each policy within the list available on the Policies node of the Policies Interface, where Enabled is represented with a green dot and Disabled is represented with a gray dot.

Name

The policy/template name should be unique and descriptive. This information is visible for each policy within the list available on the Policies node of the Policies Interface and for each template within the list available on the Templates node of the Templates Interface.

Description

The policy/template description is optional but recommended. Since each policy can be configured to be as broad or narrow as desired, the name combined with the description should clearly explain what objects and events it monitors/blocks, where in the network it looks, and when it is active. This information is visible for each policy within the list available on the Policies node of the Policies Interface and for each template within the list available on the Templates node of the Templates Interface.

Tags

Tags are enabled as an organizational tool for templates only. Many preconfigured templates have tags which enable users to quickly find a desired template though various groupings. Tags do not create a duplicate template, but rather display the template in different folders under the

Doc_ID 371 258

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

TAGS node. Multiple tags can be identified for a template with a comma-separated list. New tags can be created which create a new folder under the TAGS node. Use the right-click Refresh option on the TAGS node in the Navigation pane to display new tags and/or display template-tag modifications. See the Policy Templates section for additional information.

History

The center section of this tab is automatically populated after a policy/template is created or modified.

It contains read-only historical information on who added the policy/template (Added by), when the policy/template was added (Added on), who made the latest modification (Modified by), and when the latest modification occurred (Modified on).

Schedule

The policy/template schedule is for setting the time period for policy monitoring/blocking.

Icon Label Represents

Indicates the policy is active at all times when Always Active enabled. This is the default setting

Doc_ID 371 259

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Icon Label Represents

Indicates the policy is active only at the specified times when enabled. There are two options for setting the specified times: Active at Specified l Local Server Time – Schedule is set according to Times the local server’s time

l UTC Time – Schedule is set according to the Universal Time (UTC)

Any new policies created from templates automatically apply the template’s setting, which can then be modified as desired. This information is visible for each policy within the list available on the Policies node of the Policies Interface and for each template within the list available on the Templates node of the Templates Interface. Active at Specified Times is represented by a clock icon, and Always Active is represented with no icon, or blank.

Weekly Calendar

The weekly calendar at the bottom of the schedule section is where the specified times for the policy schedule is set.

Doc_ID 371 260

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When the schedule is set to Always Active, the weekly calendar is grayed-out.

Doc_ID 371 261

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When the schedule is set to Active at Specified Times, the weekly calendar is enabled. Each block of time on the calendar represents a 30-minute period.

l Blue blocks – Active times for the policy

l White blocks– Inactive times for the policy

The schedule can be set or modified by:

l Click an individual time-block to toggle between active and inactive for a single 30-minute period.

l Click a time-block in the All row to toggle between active and inactive for an entire column of blocks for all days of the week.

l Click a day block in the first column to toggle between active and inactive for an entire row of blocks for a full day.

All changes made to a policy or a template must be saved before leaving the configuration interface.

Recent Events Tab The Recent Events tab provides information on the events that have been recently monitored or blocked by the selected policy. See the Investigate Interface for recent events monitored or blocked by all policies.

Doc_ID 371 262

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Recent Events tab has the following options on the top toolbar:

l Recent [number] Events – Populates the data grid with the most recent events from the active policy. Use the textbox to change the default number of 100.

l Events for Last [number] Hours – Populates the data grid with hourly events. Use the textbox to change the default number of three hours.

l Range From/To – Displays only the events that occurred within the given timeframe

l Refresh button – Updates grid with any new events

l Show All Columns – Resets hidden columns to their default location on the data grid

l Export Data– Opens the Export window with export actions and options

Below is an example of how to use the Recent Events data grid Events for Last [number] Hours option:

The number of hours set is based on UTC and is adjusted for the time zones of the SI Admin Console server and the SI Agents monitoring events. For example, the SI Admin Console server is in New York, USA (UTC -5), the option is set to display Events for Last 4 Hours, and the SI Agent

Doc_ID 371 263

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

monitoring events is in London, UK (UTC +0). If the Refresh button is pressed at noon New York time, then the events displayed would have been monitored between 8 A.M. and 12 P.M. New York time, or between 1 P.M. and 5 P.M. London time.

The data grid can be filtered according to the Event Tracker Status:

l All

l New

l Reviewed

See the Event Tracker Window section for additional information.

The data grid for the Recent Events tab includes the following information for each event, listed below in the default order of the data grid columns:

l Event: Time Logged – Timestamp for when the event was monitored/blocked by the SI Agent, the specified time is the local time for the server where the SI Agent is deployed. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Event: UTC Time Logged – UTC Timestamp for when the event was monitored/blocked by the SI Agent. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Affected Object: Path – Name of the object according to the type of monitoring/blocking

l Active Directory monitoring/blocking – Active Directory distinguished name for the affected object

l Effective Group Membership monitoring – Active Directory distinguished name for the affected group. A double asterisk (**) at the beginning indicates that the path is to the nested group where the actual membership change occurred.

l File System monitoring/blocking – Path of the affected file or folder

l Exchange monitoring/blocking – Name of the affected Exchange Mailbox

l Agent: Domain – Domain where the SI Agent which monitored/blocked the event is deployed

l Affected Object: Class – Active Directory class (only applies to Active Directory monitoring/blocking, it is blank for other types)

l Event: Type – Identifies the type of monitoring/blocking, e.g. Active Directory, File System, Exchange

l Event: Raw Name – Short description of the monitored operation

Doc_ID 371 264

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Perpetrator: DN – Identification of the perpetrator according to the type of event

l Active Directory monitoring/blocking – Active Directory distinguished name for the perpetrator

l File System monitoring/blocking – Domain\user name for the perpetrator

l Exchange monitoring/blocking – Domain\user name for the perpetrator

l Agent: Computer – Server where the event was recorded (where the SI Agent is deployed)

l Agent: IP Address – IP Address of the server where the event was recorded (where the SI Agent is deployed)

l Perpetrator: Access URL – Raw data, the combination of the protocol, IP Address, and the Port used as part of the event

l LSASS Guardian monitoring/blocking – Process name which is modifying or attempting to modify LSASS

l Event: Success – Indicates the event completed successfully

l Event: Blocked – Indicates SI blocked the event from occurring

l Affected Object: SID – Security Identifier of the affected security principal

l Affected Object: Account Name – Domain\user name of the affected account

l Affected Object: GUID – Event object GUID

l Event: Name – Type of event monitored/blocked

l Perpetrator: Name – Name associated with the SID for the security principal who attempted the monitored operation

l Perpetrator: SID – Security Identifier of the security principal which attempted the monitored operation

l Perpetrator: Protocol – Protocol used for the monitored operation

l File System monitoring/blocking – Name of the share used where the operation was monitored/blocked (is blank if affected host has an operating system older than Windows 2008 R2)

l Perpetrator: IP Address – Originating host IP Address for the monitored operation

l File System monitoring/blocking – This field is blank if affected host has an operating system older than Windows 2008 R2

l Perpetrator: MAC Address – Network adapter identifier

Doc_ID 371 265

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Perpetrator: Host – Originating host name for the monitored operation

l Affected Object: IP Address – IP Address of the host the security principal is trying to access

l Affected Object: Host – Name of the host the security principal is trying to access

l Event: Message – Result of the attempted operation

l Event: Count – Number of identical events which occurred within one minute

At the bottom of the Recent Events tab view, additional information is displayed for selected events in the data grid.

The Attribute Name, Operation, Old Value, and New Value for the logged event (as applicable to the event) are displayed.

See the Data Grid Functionality section for additional features available within the grid view. The Recent Events tab has an additional feature through a right-click menu accessible through any data row within the grid.

l Copy – Copies the selected data cell to clipboard

l Event Viewer Window – Opens the Event Viewer window for the selected event, data row.

l Event Tracker Window – Opens the Event Tracker window for the selected event, data row.

l Execute PS Script – Opens a Windows Explorer window to the scripts folder. Enables users to run a PowerShell script against the select event, data row.

Doc_ID 371 266

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Event Viewer Window The Event Viewer window, accessible through the right-click menu on a data row or by double- clicking on a data row, displays a pivot view of the data.

Doc_ID 371 267

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Event Viewer window displays all of the details for one event at a time, and only includes those columns visible within the data grid. The arrow buttons at the bottom of the window allow for navigation through the events currently displayed within the data grid.

Doc_ID 371 268

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Event Tracker Window The Event Tracker window, accessible through the right-click menu on a data row, allows users to annotate events and incident as reviewed. Reviewers can change the state and add comments.

Events and Incidents have a State of New when they are first generated. When the event has been reviewed, the State can be changed to Reviewed or back to New. On the data grid, the filters display the following:

l All – All events/incidents

l New – Events/incidents which have not been reviewed

l Reviewed – Events/Incidents which have been reviewed

Reviewers can type remarks in the Comments box regarding the review of the event. Each time the review is saved with a change of State and/or an edited comment, the Last Updated user and date timestamp are replaced. The bottom of the window displays the user and time of the last change.

.

Execute PS Script The Execute PS script right-click option in the Recent Events tab opens a Windows Explorer window to the scripts folder within the StealthINTERCEPT installation directory: …\Stealthbits\StealthINTERCEPT\SIWinConsole\scripts

Doc_ID 371 269

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Windows PowerShell scripts stored in this folder can be executed against the selected event in the Recent Events tab of a policy. Select the desired script to execute it against the selected event.

An example script has been placed in this folder. The example PowerShell script creates or appends the si_eventdata.txt file on the C:\ drive. The example script also contains all of the parameters needed for working with the selected event data.

NOTE: In order for a PowerShell script to reference the selected event data, it is necessary to use the $helper.[class] with the data parameter. This is StealthINTERCEPT specific. For example: $sw.WriteLine(("EventName: " + $helper.EventName))

See the Default PowerShell 4.0 Script in Appendix D for the full example script.

Reports Tab The Reports tab is where report template(s) are assigned to a policy. Report templates can be selected from a list of All Reports, linked to new policies/templates, and enabled. Pre-configured templates contain a list of appropriate/related reports that can be enabled, if not already enabled by default.

Doc_ID 371 270

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

There are hundreds of report templates available. To simplify report selection, the All Reports list has been grouped into the following folders:

l Common

l Common – AD

l AD Authentication

l AD Changes

l AD Effective Group Membership Changes

l AD Lockdown

l AD Replication

l Analytics

l DNS Record Reports

l Exchange Changes

l Exchange Configuration

l Exchange Lockdown

l File System Changes

l File System Lockdown

l GPO Lockdown

l GPO Setting Changes

l GPO Usage Monitoring

l LDAP Monitoring

l LDAP Operations

l LSASS Guardian – Monitor

l LSASS Guardian – Protect

l Password Enforcement Monitoring

l Security Event Log

See the Report Templates section for additional information on the report templates available.

All changes made to a policy or a template must be saved before leaving the configuration interface.

Link Reports to Policy/Template

Doc_ID 371 271

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Even if reports have been linked to a template, additional reports can be linked to a policy/template through both the SI Admin Console and the SI Reporting Console. See the Reports Interface section of the StealthINTERCEPT Reporting Console User Guide for additional information.

Follow the steps to link a report to either a new or existing policy/template from within the SI Admin Console.

Step 1 – On the Report tab for the policy/template configuration, click Add (+). The Select Reports for Policy window opens.

Step 2 – In the Available Reports pane the All Reports folder provides a list of sub-folders with reports grouped by context.

Continue the steps to link as many reports to the policy/template as desired.

Doc_ID 371 272

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Step 3 – Expand the desired folder to view available and related reports.

Step 4 – Select a report and select Add (+). The selection displays in the Selected Reports pane with the report Name and Description.

Step 5 – (Optional) Repeat these steps for each report to be linked to this policy/template.

Step 6 – Click OK to close the Select Reports for Policy window.

NOTE: There is also a Remove (x) button available for unlinking reports.

The linked reports are now be visible on the Reports tab.

Step 7 – On the Reports tab of the Policy, use the Add (+) and Remove (x) buttons to link and unlink reports to the policy/template.

All changes made to a policy or a template must be saved before leaving the configuration interface.

Doc_ID 371 273

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® Event Filters Overview Policies are scoped using the Event Filters tabs ascribed to the policy by the event type selected on the Event Type Tab of a policy or policy template.

The filters appear at the bottom of the Event Type tab after an event type is selected. Each filter tab acts like an “AND” statement for the filter.

Any filter tab left blank is treated like an All for that filter set.

The purpose of this chapter is to provide in-depth information on each Event Filters tab. The filter tabs are listed here in alphabetical order.

Several filters allow for both an Include and an Exclude list to be set together. The Exclude list takes precedence over the Include list. Therefore, if an item happens to be part of both lists, when an event comes through with that item it is excluded.

When using a Lockdown Event Type, it is necessary to decide between Block or Allow for the filter.

l Block – This selection blocks all items added to the list, or if the list is left blank it blocks all items for that filter category

l Allow – This selection only allows items added to the list and blocks all others. If the list is left blank, it allows all items for that filter category.

Selecting an SI Agent for a Browser Window Several of the Select… windows require an SI Agent to be selected. This is because each browser window available through an Event Filters tab presents live information provided by the selected SI Agent. Therefore, if no agent is found, the browse window does not open.

The following rules can aid in selecting the correct SI Agent for the Select… window when configuring solution related policies:

l Active Directory – Select any SI Agent on any domain controller within the domain of interest.

l Exchange – Select any SI Agent on any of the Exchange servers.

Doc_ID 371 274

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Windows File System –Select the SI Agent on the target machine where the files to be monitored reside.

l NAS File System – Select the SI Agent on the Windows server acting as a proxy server for NAS activity.

The SI Agent selected can then provide the live information within the browser window.

Within the browsing window, basic windows commands can be used to make multiple selections.

Browser Window Modes Several of the Select… windows provide the option of choosing one of two modes for selecting filters from Active Directory:

l Browse Mode – Allows for navigation through the domain tree

l Search Mode – Allows for scoped searching within any part of the domain tree selected

Browse Mode

Doc_ID 371 275

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Select the desired Agent from the drop-down menu and click Connect. Click the radio button for Browse Mode. Expand the domain tree in the Navigation pane to select the desired container. The Results pane populates with available items.

Search Mode

Select the desired Agent from the drop-down menu and click Connect. Click the radio button for Search Mode. Expand the domain tree in the Navigation pane to select the starting point for the search, which auto-populates the Start in field. Use the following scoping options:

l Scope all – Includes all sub-containers in the search

l Attribute – Scope to the ‘objectClass’, name, or SAMAccountName attribute

l Condition – Set the scoping condition to:

l Starts with

l Contains

l Exact Match (this is the only condition available for objectClass)

l Value – Search string

Doc_ID 371 276

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When the scoping is configured as desired, click Search Now. The Results pane begins to populate with matching results. Choose between Show [value] AD objects and set the desired limit or Show all. Already selected objects for this filter which match the search are visible but grayed-out.

Check the desired item(s) in the Results pane on the right and click OK. The selection(s) appear in the appropriate box of the filter tab used to open the Select… window.

Event Filter Tabs

Selection Windows

Add IP Address Window The Add IP Address window provides a textbox to enter the IP Address to be included or excluded.

Entered IP Addresses are added to the appropriate box based on the Add (+) button used to open this window from the IP Addresses (from) Filter tab or the IP Addresses (to) Filter tab.

Attribute List Window The Attribute List browser window provides a list of available attributes to either include or exclude. Selected objects are added to the appropriate filter based on the Add (+) button used to open this window.

Doc_ID 371 277

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Select the desired Tree/Server from the drop-down menu. Use the Filter by Selected Classes checkbox to filter the list based on any AD Classes Filter already set for the policy. The Refresh button refreshes the list. Select the desired item(s) and click OK. The selection appears in the appropriate box of the AD Attributes Filter tab or the AD Classes and Attributes Filter tab.

Class List Window The Class List browser window provides a list of available classes to either include or exclude. Selected objects are added to the appropriate filter based on the Add (+) button used to open this window.

Doc_ID 371 278

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Select the desired Tree/Server from the drop-down menu. The Refresh button refreshes the list. Select the desired item(s) and click OK. The selection displays in the appropriate box of the AD Classes Filter tab or the AD Classes and Attributes Filter tab.

Select Active Directory Context Window The Select Active Directory Contexts browser window provides a list of available contexts to either include or exclude. Checked objects are added to the appropriate filter based on the Add (+) button used to open this window.

Doc_ID 371 279

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Selecting an SI Agent for a Browser Window from the drop-down menu and click Connect. Then choose the Event Filters Overview. Navigate through the domain tree and check the desired item (s) in the Results pane on the right. Then click OK, and the selection displays in the appropriate box of the AD Context Filter tab.

Select Active Directory Group Policy Objects Window The Select Active Directory Group Policy Objects browser window provides a list of available GPOs. Checked objects are added to the appropriate filter based on the Add (+) button used to open this window.

Doc_ID 371 280

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Selecting an SI Agent for a Browser Window from the drop-down menu and click Connect. Navigate through the domain tree and check the desired item(s) in the Results pane on the right. Then click OK, and the selection displays in the appropriate box of the AD Group Policy Object Filter tab or the AD Group Policy Object Changes Filter tab.

Select Active Directory Objects Window

The Select Active Directory Objects browser window provides a list of available AD objects. Checked objects are added to the appropriate filter based on the Add (+) button used to open this window.

Doc_ID 371 281

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Selecting an SI Agent for a Browser Window from the drop-down menu and click Connect. Then choose the Event Filters Overview. Navigate through the domain tree and check the desired item (s) in the Results pane on the right. Then click OK, and the selection displays in the appropriate box of the AD Objects Filter tab, the AD Objects and Containers Filter tab, the LDAP Query Filter for Monitoring filter, the LDAP Query Filter for Lockdown, or the LDAP Result Filter tab.

Select Active Directory Perpetrators Window The Select Active Directory Perpetrators browser window provides a list of available AD users and groups. Checked objects are added to the appropriate filter based on the Add (+) button used to open this window.

Doc_ID 371 282

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Selecting an SI Agent for a Browser Window from the drop-down menu and click Connect. Then choose the Event Filters Overview. Navigate through the domain tree and check the desired item (s) in the Results pane on the right. Then click OK, and the selection appears in the appropriate box of the AD Account Filter tab, the AD Perpetrator Filter for Monitoring tab, the AD Perpetrator Filter for Lockdown tab, the Exchange Perpetrators Filter tab, or the Perpetrators to Exclude Filter tab.

Select Active Directory Trustees Window The Select Active Directory Trustees browser window provides a list of available Exchange trustees to either include or exclude. Checked objects are added to the appropriate filter based on the Add (+) button used to open this window. Trustees are the objects that rights are assigned to, e.g. Exchange Mailboxes or Exchange Distribution Lists.

Doc_ID 371 283

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Selecting an SI Agent for a Browser Window from the drop-down menu and click Connect. Then choose the Event Filters Overview Navigate through the domain tree and check the desired item (s) in the Results pane on the right. Then click OK, and the selection displays in the appropriate box of the Exchange Trustees Filter tab.

Select AD Groups Windows The Select AD Groups browser window provides a list of available Active Directory groups. Checked objects are added to the appropriate filter based on the Add (+) button used to open this window.

Doc_ID 371 284

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Selecting an SI Agent for a Browser Window from the drop-down menu and click Connect. Then choose the browser window mode. Navigate through the domain tree and check the desired item(s) in the Results pane on the right. Then click OK, and the selection displays in the appropriate box of the AD Groups Filter tab.

Select Computer Window The Select Computer browser window provides a list of available computers. Checked objects are added to the appropriate filter based on the Add (+) button used to open this window.

Doc_ID 371 285

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Selecting an SI Agent for a Browser Window from the drop-down menu and click Connect. Then choose the Event Filters Overview. Navigate through the domain tree and check the desired item (s) in the Results pane on the right. Then click OK, and the selection displays in the appropriate box of the Hosts (from) Filter for Monitoring tab, the Hosts (from) Filter for Lockdown tab, the Hosts (to) Filter for Monitoring tab, or the Hosts (to) Filter for Lockdown tab.

NOTE: If the selected SI Agent is not configured to "Enable DNS Host Name Resolutions," then the Results pane may not include the DNS Name or IP Address for computer identification purposes.

Select Domains and Servers Window The Select Domains And Servers browser window provides a list of available domains and servers to either include or exclude. Objects in the Included Domains And Servers list are added to the appropriate filter based on the Add (+) button used to open this window.

Doc_ID 371 286

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Before Selection After Selection

Select the domain or server from a list on the left and click the Include (>>) button. The selection displays in the Included Domains And Servers list on the right and disappears from the list on the left. Add as many domains and/or servers to the list as desired. Use the Remove (<<) button to return the selected item to the list on the left. When the Included Domains And Servers list is complete, click OK. The selection displays in the appropriate box of the Domains/Servers Filter tab.

Select Exchange Objects from Active Directory Window The Select Exchange Objects from Active Directory browser window provides a list of Active Directory Users that have mailboxes configured to either include or exclude. Checked objects are added to the appropriate filter based on the Add (+) button used to open this window.

Doc_ID 371 287

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Selecting an SI Agent for a Browser Window from the drop-down menu and click Connect. Navigate through the domain tree and check the desired item(s) in the Results pane on the right. Then click OK, and the selection appears in the appropriate box of the Exchange Mailbox Objects and Containers Filter tab.

Select File System Objects Window The Select File System Objects browser window provides a list of available file system paths. Checked objects are added to the appropriate filter based on the Add (+) button used to open this window.

Doc_ID 371 288

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Selecting an SI Agent for a Browser Window from the drop-down menu and click Connect. Navigate through the domain tree and check the desired item(s) in the Results pane on the right. Then click OK, and the selection displays in the appropriate box of the File System Filter for Monitoring tab, File System Filter for Lockdown tab, or the File System StealthAUDIT Filter tab.

For NAS monitoring, the SI Agent selected needs to be deployed to a Windows server acting as a proxy server for NAS activity. If the correct SI Agent is selected, the IP Address(es) of the NAS device(s) display in the Navigation pane. Type the path(s), one per row in the Results pane. Click OK and the NAS paths are added to the list of paths to be monitored.

The paths entered can be file or folder names. For example, type c:\HR\NewHireProcess.doc for a NAS device with the IP Address of 192.168.16.188, and it displays in the paths list as c:\HR\NewHireProcess.doc (\192.168.16.188).

Test Passwords Window

Doc_ID 371 289

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Test Password window enables users to test the password complexity requirements set in the Password Rules filter against a pending password. This window does not change a user’s password but allows pending user passwords to be tested in the domain.

This window has the following options:

l (Optional) Username – Provide the username of the user

l Password – Enter the password that will be tested

l Test on Selected Agent – Checks password complexity requirements against the selected Agent from the Available Agents grid

l Available Agents – Lists the available SI Agents in the domain and their version in a dropdown menu

Successful Password Test Failed Password Test

Doc_ID 371 290

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Results – Displays whether or not the tested password failed or passed the complexity requirements enabled within the Password Rules Filter

User Account Control Window The User Account Control (UAC) window is where specific UAC settings can be selected to be monitored by the policy.

The User Account Control window is accessible if the userAccountControl attribute is included or excluded in the policy. Select the Any Value dropdown arrow under the Operation column to open the User Account Control window.

The User Account Control window displays a list of UAC flags for additional scoping. Choose specific userAccountControl flags from the list using the Attribute Set and/or Attribute Clear checkboxes. When the selected attribute is either added or removed in Active Directory, an event is created.

AD Account Filter

Doc_ID 371 291

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The AD Account filter is where Active Directory accounts and organizational units (containers) are selected to have passwords validated by the policy.

Select the radio button for either Block or Allow, and then edit the list:

l Allow – The list will not have new passwords validated by this policy

l Block – The list will have new passwords validated by this policy

CAUTION: Choosing Block with no Accounts, Groups, or Containers selected applies the filter rule to all accounts, groups, or organizational units in the environment.

Use the appropriate buttons beside the Accounts, Account Collections, Containers, and Groups columns to edit the lists. For the Containers section, all user objects in the selected organizational unit(s) are subject to the applied rule.

The following windows display when the Add (+) button is selected for the appropriate list:

l Accounts – Opens the Select Active Directory Perpetrators Window

l Account Collections – Opens the Collection Manager Window to the appropriate Collection Category

l Containers – Opens the Select Active Directory Context Window

l Groups – Opens the Select AD Groups Windows

The Remove (x) button deletes the selected item(s) from the box.

AD Attributes Filter

Doc_ID 371 292

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The AD Attributes filter is where the policy can be scoped to monitor or exclude specific attributes within Active Directory. Further scoping of attributes can enable the policy to only capture events based on the new value.

Use the appropriate buttons beside the Include Attributes, Include Collections, Exclude Attributes, and Exclude Collections columns to edit the lists. The Add (+) buttons open the Attribute List Window. The Collection Box buttons open the List of Collections Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that box.

After an Attribute is selected from the Attribute List window, it is added to the filter with the Operation of Any Value. Scoping the filter captures events when the new value matches with the supplied value. To scope the filter, use the Operation drop-down menu:

l Any Value – No scoping applied for this attribute

l (empty value) – Blank attribute values

l Equal – Attribute values that are identical to the Value field

l Not Equal – Attribute values that do not match the Value field

l Less Than – Attribute values below the supplied numeric value or before alphabetically

l Greater Than – Attribute values above the supplied numeric value or after alphabetically

l Contains – Attribute values includes the user supplied string (numbers are treated as strings)

l Not Contain – Attribute values do not include the user supplied string (numbers are treated as strings)

l Starts with – Attribute values start with the user supplied string

Doc_ID 371 293

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Select the desired Operation and type the desired value(s) in the textbox. Values supplied may include alphanumeric characters, string type, or dates. The Value field is not case sensitive. All attributes are treated as an “OR” statement. If any event matches any of the attribute filters, then the event data includes all attributes in the list.

When the userAccountControl attribute is included or excluded in the filter, selecting the Any Value dropdown opens the User Account Control window with additional UAC flags to add to the filter. See the User Account Control Window for additional information.

AD Classes and Attributes Filter The AD Classes and Attributes filter is where the policy can be scoped to only block or allow events to a specific class or attribute within Active Directory.

At the top of each column, select the radio button for either Block or Allow to identify how the lockdown policy behaves. Use the appropriate buttons above the Classes and Attributes columns to edit the lists. The Add (+) button above the Classes column opens the Class List Window. The Add (+) button above the Attributes column opens the Attribute List Window. The Collection Box buttons open the List of Collections Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that column.

AD Classes Filter The AD Classes filter is where the policy can be scoped to only monitor specific classes within Active Directory or to exclude specific classes from being monitored.

Doc_ID 371 294

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Use the appropriate buttons above the Include and Exclude columns to edit the lists. The Add (+) buttons open the Class List Window. The Collection Box buttons open the List of Collections Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item (s) from that column.

AD Context Filter The AD Context filter is where the policy can be scoped to only monitor specific contexts (e.g. Containers and Organizational Units) within Active Directory or to exclude specific contexts from being monitored.

Doc_ID 371 295

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Use the appropriate buttons above the Include Contexts, Include Collections, Exclude Contexts, and Exclude Collections boxes to edit the lists. The Add (+) buttons open the Select Active Directory Context Window. The Collection Box buttons open the List of Collections Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that box.

When contexts are added to either the Include or Exclude boxes, a Sub-Tree checkbox appears. If checked, the filter is applied to the parent and all child contexts. If unchecked, the filter is only applied to the listed context.

AD Event Filter The AD Event filter is where Active Directory events are selected to be monitored or locked down by the policy.

Doc_ID 371 296

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Check the box at the top of the tab to monitor or lockdown All AD Event Types or select specific event types:

l Object Added – The policy monitors for objects being added to Active Directory.

l Object Deleted – The policy monitors for objects being deleted from Active Directory.

l Object Modified – The policy monitors for objects being modified within Active Directory.

l Object Moved or Renamed – The policy monitors for objects being moved or renamed within Active Directory

If being applied to a Lockdown Event Type, this selection causes the policy to both monitor for and lockdown the objects.

AD Group Policy Object Changes Filter The AD Group Policy Object Changes filter is where the policy can be scoped to monitor specific GPOs.

In the Operations section at the top, check the box at the left to monitor All Operations or select specific operations:

l Create

l Delete

l Modify

Doc_ID 371 297

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

In the Group Policy Objects section at the bottom, check the box to Watch All Group Policy Objects or use the appropriate buttons to edit the list. The Add (+) button opens the Select Active Directory Objects Window. The Remove (x) button deletes the selected item(s) from the list.

AD Group Policy Object Filter The AD Group Policy Object filter is where the policy can be scoped to lockdown specific GPOs.

In the GPO File Operations box at the top, check the box at the left to lockdown All GPO File Operations or select specific operations:

l Create File

l Delete File

l Modify File

In the Group Policy Objects section at the bottom, check the box to Apply to All Group Policy Objects or use the appropriate buttons to edit the list. The Add (+) button opens the Select Active Directory Group Policy Objects window. The Remove (x) button deletes the selected item (s) from the list.

AD Groups Filter

Doc_ID 371 298

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The AD Groups filter is where the policy can be scoped to a parent group for effective group membership change monitoring. Effective group membership refers to the membership of the parent group including membership of all nested groups. Selecting a group in this filter scopes the policy to monitor membership of the specified group as well as all nested groups of the specified group.

Use the appropriate buttons to Include Active Directory groups in the list. The Add (+) buttons open the Select AD Groups Windows. The Remove (x) buttons delete the selected item(s) from that column.

AD Objects and Containers Filter The AD Objects and Containers filter is where the policy can be scoped to only block or allow events to a specific object or container within Active Directory.

Doc_ID 371 299

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

At the top, select the radio button for either Block or Allow to identify how the lockdown policy behaves. Use the appropriate buttons above the Objects and Containers, Collections of Objects and Containers, and GUIDs boxes to edit the lists. To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic Objects Collection. See the Dynamic Collections section for additional information.

The following windows display when the Add (+) button is selected for the appropriate list:

l Objects and Containers – Opens the Select Active Directory Context Window

l Collection of Objects and Containers – Opens the List of Collections Window to the appropriate Collection Category

l GUIDs – Opens the Select Active Directory Context Window

The Remove (x) buttons delete the selected item(s) from that box.

Doc_ID 371 300

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When objects and containers are added to the list, a Sub-Tree checkbox displays. If checked, the filter is applied to the parent and child objects/containers. If unchecked, the filter only applies to the listed object/container.

AD Objects Filter The AD Objects filter is where the policy can be scoped to only monitor specific objects within Active Directory or to exclude specific objects from being monitored.

Use the appropriate buttons above the Include and Exclude columns to edit the lists. The Add (+) buttons open the Select Active Directory Objects Window. The Collection Box buttons open the List of Collections Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that column.

NOTE: To enable a Dynamic Policy, use the Collection box button to select the desired Dynamic Objects Collection. See the Dynamic Collections section for additional information.

AD Perpetrator Filter for Lockdown The AD Perpetrator filter for lockdown is where the policy can be scoped to lockdown specific security principals. If the filter is applied to an Event Type Tab, a Event Type Tab, Event Type Tab, or an Event Type Tab, then it can be scoped to either block or allow specific security principals from committing changes within Active Directory. If the filter is applied to an Event Type Tab, then it can only be scoped to block specific security principals from authenticating with Active Directory.

Doc_ID 371 301

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Select the radio button for either Block or Allow, and then edit the list. For the Password Enforcement Event Type, selecting Allow means the list of accounts do not have new passwords validated by this policy. Selecting Block means the list of accounts have new passwords validated by this policy.

NOTE: This filter for the Authentication Lockdown Event Type blocks authentication from the identified perpetrator(s)

Use the appropriate buttons above the Perpetrators and Collections of Perpetrators boxes to edit the lists. The Add (+) button opens the Select Active Directory Perpetrators Window. The Collection Box button opens the List of Collections Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that box.

NOTE: To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic Lockdown Perpetrators Collection. See the Dynamic Collections section for additional information.

AD Perpetrator Filter for Monitoring The AD Perpetrator filter for monitoring is where the policy can be scoped to only monitor specific security principals committing changes within Active Directory or to exclude specific users committing changes from being monitored.

Doc_ID 371 302

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Use the appropriate buttons above the Include Perpetrators, Include Collections, Exclude Perpetrators, and Exclude Collections boxes to edit the lists. The Add (+) button opens the Select Active Directory Perpetrators Window. The Collection Box button opens the List of Collections Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item (s) from that box.

NOTE: To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic Lockdown Perpetrators Collection. See the Dynamic Collections section for additional information.

For Active Directory, when perpetrators are added to either the Include or Exclude boxes, a Sub- Tree checkbox appears for the appropriate types. If checked, the filter is applied to all objects underneath the specified context.

Additional Agents Filter

Doc_ID 371 303

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Additional Agents filter is where additional SI Agents and/or Domains are selected to monitor file system events for the identified paths on the File System Filter for Monitoring tab and File System Filter for Lockdown tab. If Domain is selected, then all machines with SI Agents in the targeted Domain receive this policy.

The Agents/Domains list on the left displays available SI Agents and Domains. Use the Refresh button to update the list. Move individual SI Agents/Domains, to the Selected Agents/Domains list on the right with the Include (>) button or move all of them with the Include All (>>) button. Add as many SI Agents and Domains to the list as desired. Use the Remove (<) or Remove All (<<) buttons to return the selected SI Agent(s) and/or Domain(s) to the list on the left.

There is no impact if a selected path does not exist on the server where an SI Agent resides.

When a domain is added to the Selected Agents\Domains list, all SI Agents located within that domain are monitored. If a Domain is specified, then any Agents later installed in that domain also receive this policy.

Advanced Filter The Advanced Filter is where attribute conditions can be included or excluded for GPO setting changes.

Doc_ID 371 304

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Scope the policy through the Visual Filter builder for both include and exclude conditions. The filter uses pre-defined logical and comparison operators to create filter criteria for the scan. Conditions can be singular or grouped by a logical operator.

Logical Operator

The logical operator displays as left aligned red text. To apply more filters to the set or start a new group of filters, select the Add (+) icon. The logical operator can be changed by clicking on it to open a menu with the following options:

l And

l Or

l Not And

l Not Or

l Add Condition

l Add Group

l Remove Group

Column Selection

The selected column displays in blue text. It can be changed by clicking on it to open a menu with all available column for the GPO Setting Changes Recent Events data grid.

Comparison Operator

Doc_ID 371 305

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The comparison operator displays in green text. It can be changed by clicking on it to open a menu with options that associate with the data in the GPO Setting Changes Recent Events data grid.

Filter Criteria

The filter criteria can be inserted into the textbox.

Authentication Protocol Filter The Authentication Protocol filter is where authentication protocols to be monitored are selected for the policy.

Check the box to select the authentication protocol(s) to be monitored in the Monitor These Protocols section:

l All

l Kerberos

l TGT

l TGS

l NTLM

CAUTION: Saving all TGT and/or TGS authentication data results in the bloating of the StealthINTERCEPT database. Use Database Maintenance and configure policy filters while monitoring these protocols to retain the necessary timeframe of data.

RECOMMENDED: Save only a few days' worth of TGT and TGS data at a time.

The Login Type options apply only to Domain Controllers. These options provide the choice to monitor Local and/or Remote logins to the selected Domain Controllers.

The Exclude failed authentications with ‘N-2’ passwords option, if enabled, allows the Authentication policy or Analytic policy to ignore failed authentications that failed due to use of a previously valid, but now expired, password.

Doc_ID 371 306

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

It is necessary for a GPO within the organization be configured to Enforce password history with a setting of a minimum of 3 passwords remembered in order for the SI policy to exclude failed authentications for N-2.

This policy is located within a GPO > Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy (shown in the example GPO > Default DomainPolicy).

When enabled, the Exclude failed authentications with expired passwords option allows the Authentication or Analytic policy to ignore failed authentications with a newly expired password that has not been reset by the user yet. This functionality removes events that clutter up the database.

Authentication Policy Differences Between v7.0 and per-v7.0 After an upgrade from v6.1 to v7.0, the functionality of the Authentication policy has changed. Consider the following when configuring this policy:

l StealthINTERCEPT v6.1 functionality

l Authentication policies reported only failed TGT events

l All successful TGT and Kerberos pre-authentication activity is deleted by the SI Agent and not reported on

Doc_ID 371 307

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l StealthINTERCEPT v7.0+ functionality

l All TGT events are collected that results in a lot more data being collected

l TGT includes Kerberos pre0authentication events

l Improves Brute Force and Password Spray attack detection analytics

l TGT and TGS events can be sent to StealthDEFEND which will be able to reconcile all TGT and TGS requests for ticket validation

l Improves Forged Ticket detection (i.e. Golden Tickets)

(Optional) Follow the steps to make StealthINTERCEPT v7.0 Authentication policy function like v6.1 Authentication policy where it will not monitor Kerberos pre-authentication events:

Step 1 – Create a new policy or update an existing policy.

Step 2 – In the Event Selection window, ensure the policy has the two instances of the Authentication Monitoring Event Type.

Step 3 – On the first event type, configure:

l Authentication Protocol filter – Only TGS is selected

l Success filter – Both Success and Failed are selected

Step 4 – On the second event type, configure: l Authentication Protocol filter – Only TGT is selected l Success filter – Only Failure is selected

Step 5 – Enable the Policy.

The policy now reports on only failed TGT events and all TGS events.

Domains/Servers Filter The Domains/Servers filter is where the domains and/or servers to be included or excluded are added to the policy.

Doc_ID 371 308

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Use the appropriate buttons above the Include and Exclude columns to edit the lists. The Add (+) buttons open the Select Domains and Servers Window. The Collection Box buttons open the List of Collections Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that column.

NOTE: To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic Domains & Servers Collection. See the Dynamic Collections section for additional information.

Exchange Event Filter for Lockdown The Exchange Event filter for lockdown is where Exchange events are selected to be blocked or allowed by the policy.

Doc_ID 371 309

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Check the box at the top of the tab to lockdown All Exchange Event Types or select specific event types:

Operation event types include:

l Logons – Exchange logon events

Changes in permissions event types include:

l Permissions: All – All mailbox and folder permission events

l Mailbox Permissions – Changes to mailbox permissions

l Folder Permissions – Changes to folder permissions

Whether these events are blocked or allowed is dependent upon the other filters applied to the policy.

Exchange Event Filter for Monitoring The Exchange Event filter for monitoring is where Exchange events are selected to be monitored by the policy.

Check the box at the top of the tab to monitor or lockdown All Exchange Event Types or select specific event types.

Operation event types include:

l Operations All – All operation events listed

l Logons – Exchange logon events

Doc_ID 371 310

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Attachments – Attachments added to an Exchange message

l Create Message – Creation of an Exchange message

l Delete Message – Deletion of an Exchange message

l Modify Message – Modification to the body of a received Exchange message

l Read Message – Read event of an Exchange message

l Send Message – Send event of an Exchange message

Changes in permissions event types include:

l Permissions: All – All mailbox and folder permission events

l Mailbox Permissions – Changes to mailbox permissions

l Folder Permissions – Changes to folder permissions

Exchange Mailbox Objects and Containers Filter The Exchange Mailbox Objects and Containers filter is where Exchange objects are selected to be monitored or locked down by the policy.

If monitoring, select the radio button for either Include or Exclude, and then edit the list. If locking down, select the radio button for either Block or Allow, and then edit the list. The Add (+) button opens the Select Exchange Objects from Active Directory Window. The Collection Box button opens the Select Exchange Objects from Active Directory Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from the list.

Doc_ID 371 311

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Exchange Perpetrators Filter The Exchange Perpetrator filter is where the policy can be scoped to only monitor specific security principals committing changes or to exclude specific users committing changes from being monitored.

At the top Logged on As section, check the box or boxes for: Delegate, Administrator, and/or Owner. These items monitor or block user access to mailboxes based on the assigned roles.

l Delegate – User who is not the owner of the mailbox being accessed

l Administrator – User who is not the owner of the mailbox being accessed but has administrative privileges

l Owner – User who is the owner of the mailbox being accessed

Select the option to be applied to the checked options. If monitoring, select the radio button for either Include or Exclude, and then edit the list. If locking down, select the radio button for either Block or Allow, and then edit the list.

In the next Logged on As section, select the radio button for the scoping option: AND or OR Perpetrators Must Be Met.

l AND Perpetrators Must be Met – Both the Logged On As selection AND the Perpetrator must be met before the event passes the filter

l For example, if the Administrator is selected for the Logged on As section and JoeSmith is included in the Perpetrator list, then the filter will only be True if the event is triggered by Joe Smith AND Joe Smith is an administrator of the effected mailbox.

l OR Perpetrators Must Be Met – Either the Logged On As selection OR the Perpetrator is met, the filter is set to True

Doc_ID 371 312

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l For example, if Administrator is selected for the Logged On As section and Joe smith is included in the Perpetrator list, then the filter will be True if the event is triggered when Joe Smith made changes to the mailbox OR when an administrator made a change to the mailbox.

In the bottom half of the tab, select the option to be applied to the perpetrators lists and edit the lists. If monitoring, select the radio button for either Include or Exclude, and then edit the list. If locking down, select the radio button for either Block or Allow, and then edit the list. The Add (+) button opens the Select Active Directory Perpetrators Window. The Collection Box button opens the List of Collections Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that box.

Exchange Trustees Filter The Exchange Trustees filter is where the policy can be scoped to only monitor or lockdown specific Exchange trustees. Trustees are the accounts receiving permissions. For example, if an administrator grants Joe Smith access to Bob Jones’ mailbox, Joe Smith is the Trustee that is being granted permissions.

If monitoring, select the radio button for either Include or Exclude. If locking down, select the radio button for either Block or Allow.

In the upper-right corner select the radio button for either the Trustee OR Perpetrator Must Be Met option or the Trustee AND Perpetrator Must Be Met option. These options dictate how the Exchange Trustees Filter tab and the Exchange Perpetrators Filter tab relate to each other.

Doc_ID 371 313

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Trustee OR Perpetrator Must Be Met – Either the Trustee selection OR the Perpetrator selection is met, the filter will be set to True

l For example, if this policy is protecting a CEO mailbox, the Trustee list includes Brad for Allow, and Administrator is included in the Perpetrator allow list, then Brad can be added as the mailbox trustee by anyone AND Administrator can add anyone else as the mailbox trustee

l Trustee AND Perpetrator Must Be Met – Both the Trustee selection AND the Perpetrator selection must be met

l For example, if this policy is protecting a CEO mailbox, the Trustee list includes Brad for Allow, the Administrator is included in the Perpetrator allow list, then Administrator can ONLY add Brad as the mailbox trustee.

Then edit the list. The Add (+) button opens the Select Active Directory Trustees Window. The Collection Box button opens the List of Collections Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from the list.

File System Agents Filter The File System Agents filter is where SI Agents and/or Domains are selected to monitor file system events for StealthAUDIT integration. If Domain is selected, then all machines with SI Agents in the targeted Domain receive this policy.

Doc_ID 371 314

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Agents list on the left displays available SI Agents and Domains. Use the Refresh button to update the list. Move individual SI Agents to the Selected Agents/Domains list on the right with the Include (>) button or move all of them with the Include All (>>) button. Add as many SI Agents and/or Domains to the list as desired. Use the Remove (<) or Remove All (<<) buttons to return the selected SI Agent(s) and/or Domain(s) to the list on the left.

NOTE: There must be at least one SI Agent in the Selected Agents/Domains list for policies using the File System StealthAUDIT Event Type.

File System Filter for Lockdown The File System filter for lockdown is where file system events are selected to be blocked by the policy.

In the Access Operations box in the upper-left corner, check the box at the top to lockdown All File System: Access Operation or select specific operations:

l Create

l Read

l Write (this will implicitly select Rename)

l Delete

l Rename

In the Permissions box at the top-center, select this option to block changes to the ACL or DACL:

Doc_ID 371 315

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Security Descriptor

In the I/O Type box in the upper-right corner, check the box at the top to lockdown All types or select specific types:

l Native File System – For blocking NTFS and NAS native activity

l Applies to all Access Operations

l (VSS) – For blocking Shadow Copy (A.K.A. Volume Snapshot Service, Volume Shadow Copy Service, or VSS)

l Only applies to Read and Create Access Operations

In the Paths section at the bottom, the appropriate buttons above the Paths and Path Collections boxes to edit the lists. The Add (+) button opens the Select File System Objects Window. The Collection Box buttons open the List of Collections window to the appropriate Collection Category. The Remove (x) button deletes the selected item(s) from the list.

NOTE: To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic File Paths Collection. See the Collection Manager Window section for additional information.

When paths are added to the list, a Sub-Folder checkbox displays. If checked, the filter is applied to the parent and all child content (files and folders). If unchecked, the filter is only applied to the listed folder and its first-level contents.

File System Filter for Monitoring The File System filter for monitoring is where file system events are selected to be monitored by the policy.

Doc_ID 371 316

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

In the Access Operations box, select the checkbox at the top to monitor All Access Operations or selectthe checkboxes for specific operations:

l Create

l Read

l Write

l Delete

l Rename

In the Property Operations box,select the checkbox(es) at the top to monitor Property Operations or select the checkboxes for specific operations:

l Attribute

l Permission (DACL)

l Audit (SACL)

l Owner

In the Shares Operations box, select the checkbox at the top to monitor All Share Operations or select the checkboxes for specific operations:

l Add

l Delete

l Update

l Permission change

Doc_ID 371 317

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

In the I/O Type box, select the checkbox at the top to monitor All I/O types or select the checkboxes for specific types:

l Native File System – For monitoring NTFS and NAS native activity

l Applies to all Access Operations

l Shadow Copy (VSS) – For monitoring Shadow Copy (A.K.A. Volume Snapshot Service, Volume Shadow Copy Service, or VSS)

l Only applies to Read and Create Access Operations

The Wildcards boxes in the upper-right corner are to scope the policy using an asterisk (*) or question mark (?) as the wildcard. Files that match the wildcard in the include box are monitored. Files that match the wildcard in the exclude box are ignored. Remember, adding an include filter scopes the policy to monitor only matching files, and adding an exclude filter scopes the policy to monitor all files that do not match. If both include and exclude filters are applied to a single policy, the exclude filter takes precedence. If the boxes are left blank, all files are monitored according to the other policy filter selections.

Adding a wildcard to the policy allows the policy to use the Enable Automatic Lockdown option. When checked, perpetrators of this policy are locked down, i.e. denied access to files and folders monitored by this policy. When this option is checked, no other event types can be added to the policy. If other event types were previously assigned to the policy, the option is grayed-out.

When the policy is saved, the File System Lockdown Event Type is added to the policy. The perpetrator of the monitored event is added to the File System Lockdown Event Type’s AD Perpetrator Filter for Lockdown as a blocked security principal. If the perpetrator should be granted access to files and folders monitored by this policy, remove them from the blocked perpetrators list on the File System Lockdown Event Type’s AD Perpetrator Filter for Lockdown and add the perpetrator to the Exclude Perpetrator’s list on the File System Changes Event Type’s AD Perpetrator Filter for Monitoring.

File System Paths Filter The Paths filter is where the policy is scoped to include or exclude specific files and paths within the target File System. Use Include Paths section to define the top level folder or individual files for monitoring. Use the Exclude Paths section to refine and remove any child items from being monitored.

Remember, any files or folders to be excluded need to be a subset of a folder identified in the Include Paths section.

Doc_ID 371 318

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Use the appropriate buttons above the Include Paths, Include Collections, Exclude Paths, and Exclude Collections boxes to edit the lists. The Add (+) buttons open the Select File System Objects Window. This is also where the NAS device paths are added. The Collection Box buttons open the Collection Manager Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that box.

NOTE: To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic File Paths Collection. See the Collection Manager Window section for additional information.

When folder paths are added to the list, a Sub-Tree checkbox displays. If checked, the filter is applied to the parent and child folder paths. If unchecked, the filter only applies to the listed folder path.

File System StealthAUDIT Filter The filter is where file system activity events to be made available for consumption by the StealthAUDIT Management Platform are selected to be monitored by the policy.

Doc_ID 371 319

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Use the appropriate buttons above the Include Paths, Include Path Collections, and Exclude Paths, Exclude Path Collections boxes to edit the lists. The Add (+) buttons open the Select File System Objects Window. The Collection Path buttons open the Collection Manager Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that box.

FSMO Roles Filter The FSMO Roles filter specifies which FSMO (Flexible Single-Master Operation) role assignments will result in an event when assigned to a Domain Controller.

Doc_ID 371 320

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The following are the FSMO roles that can be selected:

l Forest Roles:

l Schema Master

l Domain naming master

l Domain Roles:

l RID master

l PDC emulator

l Infrastructure master

See the What Are FSMO Roles in Active Directory article for additional information.

Hosts (from) Filter for Lockdown The Hosts (from) filter for lockdown is where the policy can be scoped to only block or allow specific hosts as originators of an event.

Active Directory, Authentication, Password AD Replication Enforcement, & LDAP

Select the radio button for either Block or Allow, and then edit the list. For the Password Enforcement Event Type, selecting Allow means the list of accounts will not have new passwords validated by this policy. Selecting Block means the list of accounts will have new passwords validated by this policy.

NOTE: This filter for the Authentication Lockdown Event Type blocks authentication from the identified host(s).

For Active Directory, Authentication, Password Enforcement, or LDAP, use the buttons above the Include Hosts box to edit the list. For AD Replication, use the buttons above the Include Hosts and Include Collections boxes to edit the lists of machines to be blocked. The Add (+) buttons

Doc_ID 371 321

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

open the Select Computer Window. The Collection Box button opens the Collection Manager Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s).

Hosts (from) Filter for Monitoring The Hosts (from) filter for monitoring is where the policy can be scoped to only monitor specific hosts as originators of an authentication event or to exclude specific hosts from being monitored for authentication events.

Use the appropriate buttons above the Include Hosts, Include Collections, Exclude Hosts, and Exclude Collections boxes to edit the lists. The Add (+) buttons open the Select Computer Window. The Collection Box buttons open the Collection Manager Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that column.

NOTE: To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic Hosts Collection. See the Collection Manager Window section for additional information.

Hosts (to) Filter for Lockdown The Hosts (to) filter for lockdown is where the policy can be scoped to only block specific hosts as target hosts of an authentication event.

Doc_ID 371 322

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Use the buttons above the Include Hosts box to edit the list. The Add (+) buttons open the Select Computer Window. The Remove (x) buttons delete the selected item(s).

Hosts (to) Filter for Monitoring The Hosts (to) filter for monitoring is where the policy can be scoped to only monitor specific hosts as target hosts of an authentication event or to exclude specific hosts from being monitored as targets of authentication events.

Use the appropriate buttons above the Include Hosts, Include Collections, Exclude Hosts, and Exclude Collections boxes to edit the lists. The Add (+) buttons open the Select Computer Window. The Collection Box buttons open the Collection Manager Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that column.

NOTE: To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic Hosts Collection. See the Collection Manager Window section for additional information.

Doc_ID 371 323

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

IP Addresses (from) Filter The IP Addresses (from) filter is where the policy can be scoped to only monitor specific IP Addresses as originators of an authentication event or to exclude specific IP Addresses from being monitored for authentication events.

Use the appropriate buttons above the Include IP Addresses, Include Collections, Exclude IP Addresses, and Exclude Collections boxes to edit the lists. The Add (+) buttons open the Add IP Address Window. The Collection Box buttons open the Collection Manager Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that box.

NOTE: To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic IP Addresses Collection. See the Collection Manager Window section for additional information.

IP Addresses (to) Filter The IP Addresses (to) filter is where the policy can be scoped to only monitor specific IP Addresses as target hosts of an authentication event or to exclude specific IP Addresses from being monitored as targets of authentication events.

Doc_ID 371 324

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Use the appropriate buttons above the Include IP Addresses, Include Collections, Exclude IP Addresses, and Exclude Collections boxes to edit the lists. The Add (+) buttons open the Add IP Address Window. The Collection Box buttons open the Collection Manager Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that box.

NOTE: To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic IP Addresses Collection. See the Collection Manager Window section for additional information.

LDAP Query Filter for Lockdown The LDAP Query (for Lockdown) filter is where the policy can be scoped to block or allow LDAP queries which contain one of the user-supplied strings as a substring.

Select the radio button for either Block or Allow, and then edit the list.

Doc_ID 371 325

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Allow – List of strings which if at least one is found as substring in candidate LDAP query will result in the query being allowed to execute

l Block – List of strings which if at least one is found as substring in candidate LDAP query will result in the query being blocked

CAUTION: Users should fully understand the blocking rule summary displayed in the Rule Preview tab in order to understand the scope of what will be blocked. It is very easy to block more than intended and adversely impact the LDAP environment.

Use the appropriate buttons beside the LDAP Queries column to edit the lists. The following window displays when the Add (+) button is selected for the LDAP Queries list:

l Opens the Select Active Directory Objects Window where objects are selected to be added to the list of strings

Remove (x) button deletes the selected item(s) from the box.

LDAP Query Filter for Monitoring The LDAP Query filter is where the policy can be scoped to those LDAP queries which contain one of the user-supplied string as a substring.

Use the appropriate buttons above the Include LDAP Queries and/or Exclude LDAP Queries boxes to edit the lists. Type the string and/or use the Add (+) button to browse Select Active Directory Objects Window to be added to the list of strings. The Remove (x) buttons delete the selected row(s) from the list.

Doc_ID 371 326

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

LDAP Attributes Filter The LDAP Attributes filter is where the policy can scope the LDAP Activity Monitor to return events based on specifically included or excluded attributes being part of the data returned by the query.

Use the appropriate buttons above the Include Attributes and Exclude Attributes buttons to edit the lists. The Add (+) buttons open the Attribute List Window. The Remove (x) buttons delete the selected items from the category.

LDAP Result Filter The LDAP Result filter is where the policy can be scoped both by the number of objects returned and to those LDAP query results which contain one of the user-supplied string as a substring.

Doc_ID 371 327

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

In the Filter by objects returned section, select the checkbox to enable and set the Minimum and Maximum number of objects to be returned.

Provide the user-supplied string in the textbox. Type the string and/or use the Add (+) button to browse Select Active Directory Objects Window to be added to the list of strings. The Remove (x) buttons delete the selected row(s) from the list.

LDAP Runtime Filter The LDAP Runtime filter is where the policy can be scoped to capture events based on query execution times.

Identical LDAP queries occurring within a ten second aggregation window are reported as a single event with a count indicating the number of occurrences within that ten second window. The single reported event also has a minimum, maximum, and average runtime reflecting the individual events that occurred during the ten second window.

Check the desired options and set the range for the LDAP event collection threshold:

l Minimum runtime – Save event if minimum runtime is within the minimum and maximum range specified by the user in milliseconds

l Average runtime – Save event if average runtime is within the minimum and maximum range specified by the user in milliseconds

l Maximum runtime – Save event if maximum runtime is within the minimum and maximum range specified by the user in milliseconds

Doc_ID 371 328

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

LDAP Filter The LDAP filter is where the policy can be scoped to include one or more communication security types. The search scope option further filters based on a match to the selected scope of the LDAP query.

In the secure configurations section at the top, check the box to monitor All or select specific operations: .

l SSL

l StartTLS

l Signed

l Signed and Sealed

l None

In the Search scopes section, check the box to monitor All or select specific scoping levels:

l Base

l One level

l Subtree

Only LDAP queries using the selected security options and search scope levels will have events reported by the SI Agent.

Doc_ID 371 329

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Open Process Flags Filter The Open Process Flags filter is where the policy can be scoped for requested handles which would maliciously impact LSASS from being monitored.

Check the box to select the process flag(s) to be monitored:

l PROCESS_VM_WRITE (write to memory in a process)

l PROCESS_CREATE_THREAD (create a thread)

RECOMMENDED: Do not deselect these options.

When this filter is in a lockdown policy, it does not block the create handle request, i.e. the requested access. Instead it strips these flags from the handle that gets created, i.e. the granted access.

Password Rules Filter The Password Rules filter is used to specify additional checking of user entered passwords to either block or report password values that do not match the filter rules. These rules apply to the account, configured in the AD Account Filter policy filter, whose password is being changed.

These Password Rules are only applied to passwords that pass any Windows password policies. Password values that fail to meet the Windows complexity checks are rejected by Windows before StealthINTERCEPT Enterprise Password Enforcer can evaluate them.

Doc_ID 371 330

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Select the radio button to either Monitor or Block the event when a password fails any of the checked criteria of the Password Rules filter.

l Monitoring – Only reports the password that failed the criteria check

l Blocking – Blocks the failed password from being used

Test pending passwords against the set Password Rules filters using the Test password rules option. See the Test Passwords Window for additional information. Password Section

These settings authenticate passwords against a default dictionary.dat file of known weak and/or compromised passwords. Additional passwords can be manually added or uploaded via .txt file.

In order for the password to be rejected, the pending user password must match exactly to a listed password in the Password Dictionary list.

l Capture Rejected Password – Collects the password value which triggered the event. Rejected password values are included as an “Attribute” in the event data.

l Manage Passwords – Opens the Password Dictionary window. See the Password Dictionary Window section for additional information.

Doc_ID 371 331

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Pwned DB Section

This setting authenticates pending user password hashes when a password is changed against the Have I Been Pwned? database of compromised password hashes from world- wide data breaches.

l Block if password hash in Pwned DB – If the pending password matches a password hash from the Pwned database, the user is blocked from using the password

Remember, the Pwned database must be initially deployed to the Enterprise Manager. Once it is stored, SI Agent(s) can be configured as desired to obtain and use a local copy of the Pwned database. See the EPE Settings Window section for additional information.

Characters Substitutions Section

These settings prevent the use of character substitutions in passwords. They ignore or monitor/block certain types of characters substitutions from being included in a password string. Additional scoping can be enabled:

l Block if exact match substituted password – Contains a substituted character in a password string listed within the Words List Dictionary. Remember, the substitutions themselves are kept in the Character Substitution list.

l Manage list of words – Opens the Words List Dictionary Window.

l Case sensitive – Differentiates between lowercase and capital text

l Reversed text also – Password patterns typed in backwards is blocked

Username in Password Section

These settings ignore or monitor/block certain types of usernames from being included in a password string. If the corresponding string value is less than the number chosen in the “ignore values less than” control, then the values in that string are not prevented from use in the password.

Check the box(es) to enable the feature(s) and set the control to the minimum string length for which this control will be active.

l Pre-Windows 2000 Logon Name

l User Principle Name (UPN)

Doc_ID 371 332

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l First Name

l Last Name

For Example: If the first name field is set to three but an employee named Ed uses Ed392 as a password, it is ignored because “Ed” is less than three characters long.

When a username format is chosen, additional scoping options are available:

l Case sensitive – Differentiates between lowercase and capital text

l Reversed name also – First name, last name, Pre-Windows 2000 Logon Name and User Principle Name (UPN) typed in backwards are blocked

Repeating Patterns Section

These settings prevent individual repeating character patterns. Any passwords that contain repeating patterns equal or exceeding the chosen minimum pattern length are blocked. Additional scoping can be enabled:

l Block if password contains repeating pattern – Contains individual repeating sequences

l For Example: If the minimum pattern length is three, then “ArcArc” is blocked, “Arc” is allowed.

l Minimum pattern length – Type or use the arrows to choose the minimum pattern length. The default is set to a pattern of three characters.

l Case sensitive – Differentiates between lowercase and capital text

l Reversed text also – Password patterns typed in backwards is blocked

Sequential Characters Section

These settings prevent passwords with numbers or characters that follow each other in sequence. Any sequence that equals or exceeds the number chosen in the minimum sequence size textbox is blocked. Additional scoping can be enabled:

l Block if contains sequential characters – Numbers or letter strings that follow the order of numerals or the letters of the alphabet

l For Example: If the minimum sequence size is three, then “ABC” and “123” are blocked, “ABD” and “124” are allowed.

Doc_ID 371 333

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Minimum sequence size – Type or use the arrows to choose the minimum sequence length. The default is set to a pattern three sequential characters.

l Case sensitive – Differentiates between lowercase and capital text

l Descending order – Standard order is blocked if reversed, e.g. “321” and “CBA” are blocked

Defined Text Section

These settings block passwords that contain the text box entry within them. For multiple search criteria, add one entry per line.

NOTE: This filter blocks passwords that contain the text box content anywhere within the password length. The Manage Passwords list in the Password Dictionary Window blocks the entire password as entered or uploaded.

Additional scoping can be enabled:

l Block if contains defined text – Manually enter the desired text for a sub string search

l For Example: If “day” is entered, then “M0nday47” is be blocked, “M0n47” is allowed

l Case sensitive – Differentiates between lowercase and capital text

l Reverse order also – Blocks the reversed order of characters typed in the text box, e.g. “74yadn0M”

Keyboard Layout Sequence Section

These settings prevent passwords that align with the order of keys on a keyboard. Any sequence that equals or exceeds the number chosen in the minimum pattern length textbox is blocked. Additional scoping can be enabled:

l Block if contains characters in keyboard layout sequence – A string of characters that align with the order on a keyboard

l For Example: “QWERTY” is blocked, “ADGJL” is allowed

l Minimum sequence size – Type or use the arrows to choose the number of characters the filter will count up until. The default is three.

Doc_ID 371 334

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Reverse order also – Standard order is reversed and blocked in accordance to the minimum sequence size.

Character Rules Section

These settings work independently of one another. This filter looks for specific rules or characteristics within a password to be blocked or allowed. Additional scoping can be enabled:

l Start with Alpha

l Disallow last character as number (0-9) – Blocks passwords ending in a number character

l Require specific character(s) – Enter one or more desired character(s) in the text box. The logic applies an OR statement to multiple characters. Passwords not including at least one of these specified characters will be blocked.

l For Example: If “!@” is typed into the textbox,

l “Pass!word” is blocked

l “P@ssword” is blocked

l “Passw@!rd” is allowed

l Disallow specific character(s) – Enter one or more desired character(s) in the text box. The logic applies an OR statement to multiple characters. Passwords including at least one of these specified characters will be blocked.

l For Example: If “% or @” is typed into the textbox:

l “Pas@sw0rd” is blocked

l “7Password%” is blocked

l “Pa$$word9” is allowed

The following options can be set to a minimum and/or maximum threshold. If the password fails to meet the range requirements, it is blocked.

l Password length – Type or use the arrows to choose the minimum characters required within a password. The default is set to eight characters.

l Alpha chars

l Numeric chars

Doc_ID 371 335

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Alphanumeric chars

l Unique chars

l Upper Case chars

l Lower Case chars

l Symbol chars

l Special Unicode chars

Permissions Filter The Permissions filter is where the policy can be scoped to scan for the records of three extended rights and/or control access rights in Active Directory that are used in to dump password hashes as a fake Domain Controller in a DCSync/ Replication attack.

The Permissions filter has two sections:

l Match condition – Capture the event if the Replication request has either the exact permissions specified or has any of the permissions specified.

l Permissions – Permission level associated with the replication request:

l DS-REPLICATION-GET-CHANGES – Base permission and is required to use RPC and LDAP DIRSYNC replication mechanisms.

l DS-REPLICATION-GET-CHANGES-ALL – Permission required for replication of credentials and secret data.

Doc_ID 371 336

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l DS-REPLICATION-GET-CHANGES-IN-FILTERED-SET – Replicates attributes protected by filtered attribute sets (FAS). Read-only Domain Controllers (RODCs) should not have this permission.

Perpetrators to Exclude Filter The Perpetrators to Exclude filter is where the policy can be configured to exclude specific users and collections committing changes from being monitored.

Use the appropriate buttons above the Exclude Perpetrators and Exclude Collections boxes to edit the lists. The Add (+) button opens the Select Active Directory Perpetrators Window. The Collection Box button opens the Collection Manager Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from the that box.

Processes and Configuration Filter The Processes and Configuration filter is where the policy can be configured to ignore read operations, configure the number of days the log is retained, as well as to exclude specific processes from being monitored.

Doc_ID 371 337

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

At the top is the Record Read Operations option. This is checked by default. To configure the policy to ignore read operations, uncheck this option.

The next setting is to configure the number of Days to Retain Log. Set the number to indicate the number of days the logs remain before SI deletes them.

At the bottom, specify any processes that should be excluded from being monitored by this policy. Type the processes in the textbox. For example, to exclude the Windows Explorer actions like opening and closing of files, enter ‘explorer.exe’ in the textbox.

Processes Filter for Lockdown The Processes filter for lockdown is where legitimate processes which make changes to LSASS, e.g. third-party malware applications, can be allowed, not blocked, by the policy.

Doc_ID 371 338

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Select the radio button for either Block or Allow, and then edit the list.

Use the buttons above the box to edit the list. The Add (+) button opens a textbox within the list box. Remove (x) button deletes the selected item(s) from the box.

CAUTION: While a processes block is a filter option, it is not recommended for locking down LSASS. Adding a process block filter will limit the policy to only block that process. Unknown malicious processes would not be blocked by the policy.

CAUTION: While a process allow is a filter option, it is possible that a malicious process could be renamed to the same as an “allowed” process. Therefore, the malicious process would not be blocked.

Processes Filter for Monitoring The Processes filter for monitoring is where legitimate processes which make changes to LSASS, e.g. third-party malware applications, can be excluded from being monitored by the policy.

Use the appropriate buttons above the Include Process and Exclude Process boxes to edit the lists. The Add (+) buttons open a textbox within the list box. Remove (x) buttons delete the selected item(s) from that box.

NOTE: While a processes inclusion is a filter option, it is not RECOMMENDED for monitoring LSASS. Adding a process inclusion filter limits the policy to only monitor that process. Unknown malicious processes would not be monitored by the policy.

Rule Preview Filter

Doc_ID 371 339

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Rule Preview filter displays a summary of the selected filter options. This is primarily used for troubleshooting.

The text displayed represents the internal rules created based on the policy’s selected filters. Each row is a selected filter. In the upper-right corner is a checkbox for Word Wrap. If checked, a filter statement may cover multiple rows so that all of it is visible.

Success Filter The Success filter is where monitoring is set to only monitor successful events, failed events, or both.

Select the radio button for the desired monitoring filter:

Doc_ID 371 340

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Success – Only monitors successful events

l Failure – Only monitors failed events

l Both Success and Failure – Monitors all events that are within the scope of the corresponding filters

User Account Control Filter The User Account Control (UAC) filter is where specific UAC settings can be blocked by the policy.

The User Account Control filter displays a list of UAC flags for additional scoping. Choose specific userAccountControl flags from the list using the Attribute Set and/or Attribute Clear checkboxes. If an attribute is added or removed in Active Directory, it is blocked based on the filter set.

Doc_ID 371 341

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® Policy Templates StealthINTERCEPT comes with several policy templates that cover a wide range of event monitoring and lockdown. Pre-created policy templates are provided as part of the initial StealthINTERCEPT installation process. New policy templates can be created from scratch or from existing policies.

When StealthINTERCEPT is upgraded, new and updated policy templates are available for import. They are not automatically imported during the installation of the latest version. Updates can be made to upgrade existing templates for a new release. See the Upgrade Policy Templates section of the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

When the SI Admin Console is launched for the first time, the SI Administrator is asked if to import pre-created policy templates. However, if this is not done at this time, they can be imported later. See the Import SI Pre-Created Policy Templates section for steps. Once the templates are imported, they are available through an organized folder structure.

This chapter provides the instructions for importing the pre-created templates, summarizes the templates which are available and where they are located, and highlights what areas of policy configuration need to be customized when using a template to create a policy.

Import SI Pre-Created Policy Templates The pre-created policy templates are stored in the SI_Templates_All.xml file. If they were not imported when the SI Admin Console is first launched, the templates can be imported by following these steps.

Open the Tools Menu item and select Import. The Import Window opens.

In the Select Import File section, click the ellipsis (…) to open the browser window. The location of the default templates is: …\Stealthbits\StealthINTERCEPT\SIWinConsole

Import all of the available StealthINTERCEPT policy templates, select the SI_Templates_ All.xml file. Click Open.

Doc_ID 371 342

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Import window auto-fills with the import file details. Do not change the defaults settings. Click Import.

NOTE: The import process can take a few minutes to complete as there are several hundred templates to import and configure.

When the operation is complete, click OK.

The templates are now available in the Templates Interface of the Policy Center.

Template Folder Structure for Pre-Created Policy Templates

Doc_ID 371 343

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The pre-created policy templates are organized in an easy-to-navigate folder structure in the Templates Interface of the Policy Center.

The Actions folder contains several pre-configured PowerShell scripts that can be used as response actions to alerts.

The templates which Stealthbits Engineers have deemed most useful are located within subfolders in the Best Practices folder:

l Active Directory

l Exchange

l File System

l Object Lockdown

The Domain Persistence folder contains templates of policies which detect an attackers attempt to gain persistent administrative access to Active Directory.

The templates which are focused on monitoring for HIPAA regulations are located within subfolders in the HIPAA folder:

l 164.306 – Security Standards

l 164.308 (a)(1)(i) – Security Management Process

l 164.308 (a)(1)(ii) – Implementation Specifications

l 164.308 (a)(3)(i) – Workforce Security

l 164.308 (a)(3)(ii) – Authorization and Supervision

l 164.308 (a)(4) – Information Access Management

l 164.308 (a)(5)(ii)(C) – Log-In Monitoring

l 164.308 (a)(5)(ii)(D) – Password Management

l 164.312 (a)(1) – Access Control

l 164.312 (b) – Audit Controls

l 164.312 (c) – Integrity

l 164.312 (d) – Authentication

The LDAP folder contains templates of policies which monitor LDAP queries.

The templates which are focused on monitoring and locking down events in a Microsoft environment are located within subfolders in the Microsoft folder:

Doc_ID 371 344

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Active Directory

l DNS

l Exchange

l File System

l Group Policy Objects

l LSASS

The Privilege Escalation folder contains templates of policies which detect an attackers attempt to escalate the privileges of a compromised user to gain Domain Admin rights in Active Directory.

The Ransomware folder contains templates of policies which detect the creation of files known to be associated with a Ransomware attack.

The Schema and Configuration folder contains templates of policies which audit changes that happen to data stored in the schema or configuration container, such as site creation or attributes being indexed.

The Reconnaissance folder contains templates of policies which detect an attackers attempt to perform to discover useful resources to escalate permissions, gain Domain Amin persistence, or exfiltrate information.

The SIEM folder contains templates of policies which monitor the most common events sent to SIEM products.

The StealthDEFEND folder contains templates for policies used by StealthDEFEND to perform threat detection. Actions Folder Templates

The Actions folder contains the following templates:

Template Description TAGS

AD Changes: Notify Notify Admin about group l NEW 6.0 Admin about membership changes for sensitive TEMPLATES sensitive group accounts. membership changes for sensitive accounts

Doc_ID 371 345

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

AD Changes: Notify Notify Admin about sensitive group l NEW 6.0 Admin about membership changes TEMPLATES sensitive group membership changes

AD Changes: Notify Notify Admin that account is now l NEW 5.2 Admin that account enabled TEMPLATES is now enabled

AD Changes: Notify Notify Admin that account now has l NEW 5.2 Admin that account Password Never Expires TEMPLATES now has Password Never Expires

AD Changes: Notify Notify user about his group l NEW 6.0 user about his group membership changes TEMPLATES membership changes

AD Changes: Notify Notify user that his account was l NEW 5.2 user that his account locked/unlocked TEMPLATES was locked/unlocked

AD Changes: Notify Notify User that his password l NEW 5.2 User that his changed TEMPLATES password changed

EPE: Notify Notify Perpetrator that password l NEW 5.2 Perpetrator that was rejected by EPE policy TEMPLATES password was rejected

See Appendix E for the full scripts used in these policy templates.

Doc_ID 371 346

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Best Practices Folder Templates

The Best Practices folder contains the following templates:

Active Directory Folder

Template Description TAGS

All AD Changes Gathers all AD changes. None

Utilizes the built-in “Exclude Class” – Classes Collection and “Exclude Attribute” – Attributes Collection to restrict unwanted events. Add classes and attributes which will NOT be monitored to these collections

All GPO Setting Changes No customizations required None to monitor all GPO setting changes

Exchange Folder

CAUTION: Use cation with all Lockdown/Blocking Templates! Blank filters result in everything being locked down or blocked!

Template Description TAGS

Non-Owner Logon USE CAUTION WITH ALL None Lockdown LOCKDOWN TEMPLATES

Specify the Exchange Mailboxes and Containers

Doc_ID 371 347

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

to lockdown. Optionally, add Exchange Perpetrators to be allowed or denied.

File System Folder

Template Description TAGS

File Owner Changes Specify the files and/or None folders to be monitored. Optionally, add any AD Perpetrators to be included or excluded.

File System Monitoring Specify the files and/or None folders to be monitored. Optionally, add any AD Perpetrators to be included or excluded. Reads are left out due to the potential high volume of data that could be gathered; recommended only for highly sensitive content.

Object Lockdown Folder

CAUTION: Use cation with all Lockdown/Blocking Templates! Blank filters result in everything being locked down or blocked!

Doc_ID 371 348

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

AD Object Permissions USE CAUTION WITH ALL None Lockdown LOCKDOWN TEMPLATES

Utilizes the built-in “Object Permissions - Allow Perpetrators” – Lockdown Perpetrators Collection.

Change the AD Perpetrator tab to ALLOW instead of BLOCK, fill in the built-in collection, and add the desired Objects to protect.

AD Root Object Lockdown USE CAUTION WITH ALL None LOCKDOWN TEMPLATES

Utilizes the built-in “Root Object - Allow Perpetrators” – Lockdown Perpetrators Collection.

Change the AD Perpetrator tab to ALLOW instead of BLOCK, fill in the built-in collection, and add the desired Objects to protect.

Critical GPO Lockdown USE CAUTION WITH ALL None LOCKDOWN TEMPLATES

Utilizes the built-in “Critical GPO - Allow Perpetrators” – Lockdown Perpetrators Collection.

Change the AD Perpetrator tab to ALLOW instead of

Doc_ID 371 349

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

BLOCK, fill in the built-in collection, and add the desired GPOs to protect.

DNS Record Lockdown USE CAUTION WITH ALL None LOCKDOWN TEMPLATES

Utilizes the built-in “DNS Records - Allow Perpetrators” – Lockdown Perpetrators Collection.

Change the AD Perpetrator tab to ALLOW instead of BLOCK, and fill in the built- in collection.

Group Lockdown of Delete, USE CAUTION WITH ALL None Move, Rename, and LOCKDOWN TEMPLATES Membership Events Utilizes the built-in “Group Lockdown - Allow Perpetrators” – Lockdown Perpetrators Collection.

Change the AD Perpetrator tab to ALLOW instead of BLOCK, fill in the built-in collection, and add the desired Groups to protect.

Group, User, and OU USE CAUTION WITH ALL None Lockdown of Delete, Move, LOCKDOWN TEMPLATES and Rename Events Utilizes the built-in “Group User OU Object Delete and Move - Allow Perpetrators”

Doc_ID 371 350

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

– Lockdown Perpetrators Collection.

Change the AD Perpetrator tab to ALLOW instead of BLOCK, fill in the built-in collection, and add the desired Objects to protect.

OU Structure Lockdown USE CAUTION WITH ALL None LOCKDOWN TEMPLATES

Utilizes the built-in “OU Structure - Allow Perpetrators” – Lockdown Perpetrators Collection.

Change the AD Perpetrator tab to ALLOW instead of BLOCK, fill in the built-in collection, and add the desired OUs to protect.

User Lockdown of Delete, USE CAUTION WITH ALL None Move, Rename and Modify LOCKDOWN TEMPLATES Events Utilizes the built-in “User Lockdown - Allow Perpetrators” – Lockdown Perpetrators Collection.

Change the AD Perpetrator tab to ALLOW instead of BLOCK, and fill in the built- in Allow Lockdown Perpetrator Collection, and add the desired Users to protect.

Doc_ID 371 351

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Domain Persistence Folder Templates

The Domain Persistence folder contains the following templates:

Template Description TAGS

AD: AdminSDHolder is an object located in the l NEW 5.1 AdminSDHolder System Partition in Active Directory TEMPLATES Monitoring (cn=adminsdholder,cn=system,dc=domain,dc= l Domain com) and is used as a security template for Persistence objects that are members of certain privileged groups. Objects in these groups are l Privileged enumerated and any objects with security Accounts

descriptors that don’t match the l Privilege AdminSDHolder ACL are flagged for updating. Escalation The Security Descriptor propagator (SDProp) l AD Security process runs every 60 minutes on the PDC Emulator and re-stamps the object Access l Unauthorized Control List (ACL) with the security permissions changes set on the AdminSDHolder. Altering AdminSDHolder is an effective method for an attacker to persist granting the ability to modify the most privileged groups in Active Directory by leveraging a key security component. Even if the permissions are changed on a protected group.

AD: Group Use this policy to specify a list of AD Group l NEW 5.1 Policy Objects Policy Objects to be monitored. Optionally, add TEMPLATES Security any AD Perpetrators to be included or l GPO Security Monitoring excluded. Specify the list of AD Group Policy Objects to be monitored. Optionally, add any l AD Security

AD Perpetrators to be included or excluded. l Unauthorized changes

DCShadow This policy will detect when a non-DC adds a l NEW 5.1 detection SPN value to any computer starting with GC/ TEMPLATES for the global catalog service.

Doc_ID 371 352

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

HIPAA Folder Templates

The HIPAA folder contains the following templates:

164.306 – Security Standards Folder

Template Description TAGS

HIPAA: AD Computer No customizations required None Object Modifications

HIPAA: AD Group Type No customizations required None Modifications

HIPAA: GPO Creations No customizations required None

164.308 (a)(1)(i) – Security Management Process Folder

Template Description TAGS

HIPAA: AD Computer No customizations required None Object Creations

HIPAA: AD Computer No customizations required None Object Deletions

HIPAA: AD Group No customizations required None Creations

HIPAA: AD Group No customizations required None Deletions

HIPAA: AD User Creations No customizations required None

HIPAA: GPO Creations No customizations required None

Doc_ID 371 353

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

HIPAA: GPO Deletions No customizations required None

HIPAA: OU Creations No customizations required None

HIPPA: OU Deletions No customizations required None

164.308 (a)(1)(ii) – Implementation Specifications Folder

Template Description TAGS

HIPAA: AD Group No customizations required None Membership Changes

HIPAA: GPO Link Changes No customizations required None

HIPAA: OU Moves or No customizations required None Renames

HIPAA: OU Security No customizations required None Modifications

164.308 (a)(3)(i) – Workforce Security Folder

Template Description TAGS

HIPAA: AD Computer No customizations required None Object Creations

HIPAA: AD Group Creations No customizations required None

Doc_ID 371 354

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

HIPAA: AD Group No customizations required None Membership Changes

HIPAA: AD User Creations No customizations required None

164.308 (a)(3)(ii) – Authorization and Supervision Folder

Template Description TAGS

HIPAA: WinFS PHI Audit Specify the files and/or None Modifications folders to be monitored

HIPAA: WinFS PHI Owner Specify the files and/or None Modifications folders to be monitored

HIPAA: WinFS PHI Specify the files and/or None Permission Modifications folders to be monitored

164.308 (a)(4) – Information Access Management Folder

Template Description TAGS

HIPAA: WinFS PHI Creates Specify the files and/or None folders to be monitored

HIPAA: WinFS PHI Deletes Specify the files and/or None folders to be monitored

HIPAA: WinFS PHI Reads USE CAUTION WITH THIS None TEMPLATE

Doc_ID 371 355

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

Specify the files and/or folders to be monitored

HIPAA: WinFS PHI Specify the files and/or None Renames folders to be monitored

HIPAA: WinFS PHI Writes Specify the files and/or None folders to be monitored

164.308 (a)(5)(ii)(C) – Log-In Monitoring Folder

Template Description TAGS

HIPAA: AD Account Logons No customizations None required. Make sure the Configuration > Event Filtering > Exclude 'Noise' Events option is Off for this policy

HIPAA: Successful Account Gathers successful AD None Authentications authentications.

Utilizes built-In “Successful Authentications” – Include Perpetrators Collection to define which accounts will be monitored for successful authentications. Add accounts to be monitored to this collection

Doc_ID 371 356

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

164.308 (a)(5)(ii)(D) – Password Management Folder

Template Description TAGS

HIPAA: AD User Account No customizations required None Password Set

164.312 (a)(1) – Access Control Folder

Template Description TAGS

HIPAA: AD Group No customizations required None Membership Changes

HIPAA: WinFS PHI Owner Specify the files and/or None Modifications folders to be monitored

HIPAA: WinFS PHI Specify the files and/or None Permission Modifications folders to be monitored

164.312 (b) – Audit Controls Folder

Template Description TAGS

HIPAA: WinFS PHI Audit Specify the files and/or None Modifications folders to be monitored

164.312 (c) – Integrity Folder

Doc_ID 371 357

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

HIPAA: WinFS PHI Creates Specify the files and/or None folders to be monitored

HIPAA: WinFS PHI Deletes Specify the files and/or None folders to be monitored

HIPAA: WinFS PHI Specify the files and/or None Renames folders to be monitored

164.312 (d) – Authentication Folder

Template Description TAGS

HIPAA: AD PHI User No customizations None Account Logons required. Make sure the Configuration > Event Filtering > Exclude 'Noise' Events option is Off for this policy

HIPAA: Successful AD PHI Gathers Successful AD None Account Authentications Authentications.

Utilizes built-In “Successful HIPAA PHI Account Authentications” – Include Perpetrators Collection to define which accounts will be monitored for successful authentications. Add accounts to be monitored to this collection

Doc_ID 371 358

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

LDAP Folder Templates

The LDAP folder contains the following templates:

Template Description TAGS

LDAP: Sensitive Accounts This policy will detect LDAP None queries targeting sensitive accounts, such as Administrator. Add to and delete from this list of accounts in the LDAP Query filter as per specific requirements

LDAP: Sensitive Containers This policy will detect LDAP None queries targeting sensitive containers, such as Domain Controllers. Add to and delete from this list of containers in the LDAP Query filter per specific requirements

LDAP: Sensitive Groups This policy will detect LDAP None queries targeting sensitive groups, such as Domain Admins, Enterprise Admins, and Schema Admins. Add to and delete from this list of groups in the LDAP Query filter per specific requirements

LDAP: Sensitive SPNs This policy will detect LDAP None queries targeting sensitive Service Principal Names, such as Exchange and SQL

Doc_ID 371 359

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

Servers. Add to and delete from this list of SPNs in the LDAP Query filter per specific requirements

LDAP: Service Principal Detects attempts to obtain None Names a list of SPN values

Microsoft > Active Directory Folder Templates

The Microsoft > Active Directory folder contains the following templates:

Authentication Folder

Subfolder Template Description TAGS

AD: Failed Account Gathers Failed AD None Authentications Authentications.

Utilizes built-In “Failed Authentications” – Include Perpetrators Collection to define which accounts will be monitored for failed authentications. Add accounts to be monitored to this collection

AD: Successful Gathers Successful AD None Account Authentications. Authentications Utilizes built-In “Successful Authentications” – Include Perpetrators Collection to

Doc_ID 371 360

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

define which accounts will be monitored for successful authentications. Add accounts to be monitored to this collection

AD: Successful No customizations required. None Account Logons Most common modification: specify a list of users (AD Objects) to be included or excluded. Make sure the Configuration > Event Filtering > Exclude 'Noise' Events option is Off for this policy

Administrative AD: Domain Gathers logon events of None Accounts Administrators Domain Administrator Logons to Non accounts to non-domain Domain Controllers controller computes.

Utilizes built-In “Domain Administrators” – Include Perpetrators Collection to define which accounts will be monitored for logons. Add accounts which have domain administrator rights to be monitored to this collection. Also utilizes built-In “Domain Controllers” – Hosts Collection to define which hosts will NOT be monitored for logons. Add domain controllers to be ignored to

Doc_ID 371 361

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

this collection

Administrative AD: Failed AD: Failed Administrator None Accounts Administrator Account Authentications. Account Utilizes built-In Authentications “Administrative Accounts” – Include Perpetrators Collection to define which administrative accounts will be monitored for failed authentications

Administrative AD: Successful Gathers Successful AD None Accounts Administrator Authentications for Account administrators. Authentications Utilizes built-In “Administrative Accounts” – Include Perpetrators Collection to define which administrative accounts will be monitored for successful authentications. Add accounts with administrative rights to be monitored to this collection

Administrative AD: Successful Utilizes the built-in None Accounts Administrator “Administrator Accounts” – Account Logons Objects Collection. Add accounts with administrator rights to be monitored to this collection. Make sure the Configuration > Event Filtering > Exclude 'Noise'

Doc_ID 371 362

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Events option is Off for this policy

Service Accounts AD: Failed Service Gathers Failed AD None Account Authentications for service Authentications accounts.

Utilizes built-In “Service Accounts” – Include Perpetrators Collection to define which service accounts will be monitored for failed authentications. Add service accounts to be monitored to this collection

Service Accounts AD: Successful Gathers Successful AD None Service Account Authentications for service Authentications accounts.

Utilizes built-In “Service Accounts” – Include Perpetrators Collection to define which service accounts will be monitored for successful authentications. Add service accounts to be monitored to this collection

Service Accounts AD: Successful Utilizes the built-in “Service None Service Account Accounts” –Objects Logons Collection. Add service accounts to be monitored to this collection. Make sure the Configuration > Event

Doc_ID 371 363

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Filtering > Exclude 'Noise' Events option is Off for this policy

Groups Folder

Subfolder Template Description TAGS

AD Group No customizations required. None Creations Most common modifications: specify AD Perpetrator to be included or excluded

AD Group No customizations required. None Deletions Most common modifications: specify AD Perpetrator to be included or excluded

AD: Group No customizations required. None Membership Most common modifications: Changes specify AD Objects and/or AD Perpetrator to be included or excluded

AD: Group Moves No customizations required. None or Renames Most common modifications: specify AD Perpetrator to be included or excluded

AD Group Type No customizations required. Modifications Most common modifications: specify AD Objects and/or AD

Doc_ID 371 364

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Perpetrator to be included or excluded

Administrative AD: Group Utilizes the built-in None Accounts Deletions by “Administrative Accounts” – Administrators Perpetrator Collection. Add accounts with administrative rights to be monitored to this collection

Administrative AD: Group Utilizes the built-in None Accounts Deletions by Non- “Administrative Accounts” – Administrators Perpetrator Collection. Add accounts with administrative account to NOT be monitored to this collection

Administrative AD: Group Utilizes the built-in None Accounts Membership “Administrative Accounts” – Changes by Perpetrator Collection. Add Administrators accounts with administrative rights to be monitored to this collection

Administrative AD Group Utilizes the built-in None Accounts Membership “Administrative Accounts” – Changes by Non- Perpetrator Collection. Add Administrators accounts with administrative account to NOT be monitored to this collection

Administrative AD: Group Moves Utilizes the built-in None Accounts or Renames by “Administrative Accounts” – Administrators Perpetrator Collection. Add accounts with administrative

Doc_ID 371 365

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

rights to be monitored to this collection

Administrative AD: Group Moves Utilizes the built-in None Accounts or Renames by “Administrative Accounts” – Non- Perpetrator Collection. Add Administrators accounts with administrative account to NOT be monitored to this collection

Administrative AD: Deletions of Utilizes the built-in None Groups Administrator “Administrator Groups” – Groups Objects Collection. Add administrator groups to be monitored to this collection

Administrative AD: Group Utilizes the built-in None Groups Membership “Administrator Groups” – Changes to Objects Collection. Add Administrator administrator groups to be Groups monitored to this collection

Administrative AD: Moves or Utilizes the built-in None Groups Renames of “Administrator Groups” – Administrator Objects Collection. Add Groups administrator groups to be monitored to this collection

Lockdown Folder

CAUTION: Use cation with all Lockdown/Blocking Templates! Blank filters result in everything being locked down or blocked!

Doc_ID 371 366

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

AD Generic Lockdown USE CAUTION WITH ALL None LOCKDOWN TEMPLATES

Set the appropriate AD Event type(s) to be blocked. Then select the desired AD Objects and Containers, AD Classes and Attributes, and AD Perpetrators to be allowed or denied

Auth Generic Lockdown USE CAUTION WITH ALL None LOCKDOWN TEMPLATES

Set the appropriate AD Perpetrator(s) and/or Host (s) to be blocked

Organizational Unit Folder

Template Description TAGS

AD OU Creations No customizations None required. Most common modifications: specify AD Perpetrator to be included or excluded

AD OU Deletions No customizations None required. Most common modifications: specify AD Perpetrator to be included

Doc_ID 371 367

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

or excluded

AD OU Modifications No customizations None required. Most common modifications: specify AD Perpetrator to be included or excluded

AD OU Moves or Renames No customizations None required. Most common modifications: specify AD Perpetrator to be included or excluded

AD OU Security No customizations None Modifications required. Most common modifications: specify AD Perpetrator to be included or excluded

Password Enforcement Folder

Template Description TAGS

Password Enforcement No customizations None Monitoring required. Prevents users from changing a password to any value in the StealthINTERCEPT dictionary of known compromised passwords

Doc_ID 371 368

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Replication Folder

Template Description TAGS

AD Replication Lockdown USE CAUTION WITH ALL None LOCKDOWN TEMPLATES

Prevent requests from non- domain controller for Active Directory synchronization data using RPC call IDL_ DRSGetNCChanges. Add legitimate domain controllers to not be blocked in one of the following ways:

l Allow Perpetrators List – Add the Users OU > Domain Controllers group and any other groups with domain controllers for a dynamic list of domain controllers

l Exclude Domains/Servers – Add specific domain controllers for a static list of domain controllers

See the Event Type Tab section for additional information

AD Replication Monitoring Utilizes the built-in “Domain None Controllers” – Hosts Collection. Add domain controllers to not be monitored.

Doc_ID 371 369

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

Alternatively, add legitimate domain controllers to be ignored in one of the following ways:

l Exclude Perpetrators List – Add the Users OU > Domain Controllers group and any other groups with domain controllers for a dynamic list of domain controllers

l Exclude Domains/Servers – Add specific domain controllers for a static list of domain controllers

See the Event Type Tab section for additional information

Server-Workstation Folder

Template Description TAGS

AD: Computer Account No customizations None Creations required. Most common modifications: specify AD Perpetrator to be included or excluded.

AD: Computer Account No customizations None Deletions required. Most common

Doc_ID 371 370

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

modifications: specify AD Perpetrator to be included or excluded.

AD: Computer Account No customizations None Modifications required. Most common modifications: specify AD Perpetrator to be included or excluded.

Users Folder

Subfolder Template Description TAGS

AD: User Account No customizations required. None Creations Most common modifications: specify AD Perpetrator to be included or excluded

AD: User Account No customizations required. None Deletions Most common modifications: specify AD Objects and/or AD Perpetrator to be included or excluded

AD: User Account No customizations required. None Lockouts Most common modifications: specify AD Objects to be included or excluded

AD: User Account No customizations required. None Modifications Most common modifications:

Doc_ID 371 371

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

specify AD Objects and/or AD Perpetrator to be included or excluded

AD: User Moves No customizations required. None and Renames Most common modifications: specify AD Objects and/or AD Perpetrator to be included or excluded

AD: User Account No customizations required. None Password Set Most common modifications: specify AD Objects and/or AD Perpetrator to be included or excluded

Administrative AD: Deletions of Utilizes the built-in None Accounts Administrator “Administrator Accounts” – Accounts Objects Collection. Add accounts with administrator rights to be monitored to this collection

Administrative AD: Modifications Utilizes the built-in None Accounts of Administrator “Administrator Accounts” – Accounts Objects Collection. Add accounts with administrator rights to be monitored to this collection

Administrative AD: Moves and Utilizes the built-in None Accounts Renames of “Administrator Accounts” – Administrator Objects Collection. Add Accounts accounts with administrator rights to be monitored to this

Doc_ID 371 372

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

collection

Administrative AD: Password Set Utilizes the built-in None Accounts on Administrator “Administrator Accounts” – Accounts Objects Collection. Add accounts with administrator rights to be monitored to this collection

Administrative AD: User Utilizes the built-in None Accounts Creations by “Administrative Accounts” – Administrators Perpetrator Collection. Add accounts with administrative rights to be monitored to this collection

Administrative AD: User Utilizes the built-in None Accounts Creations NOT by “Administrative Accounts” – Administrators Perpetrator Collection. Add accounts with administrative rights to NOT be monitored to this collection

Administrative AD: User Utilizes the built-in None Accounts Deletions by “Administrative Accounts” – Administrators Perpetrator Collection. Add accounts with administrative rights to be monitored to this collection

Administrative AD: User Utilizes the built-in None Accounts Deletions NOT by “Administrative Accounts” – Administrators Perpetrator Collection. Add accounts with administrative rights to NOT be monitored to

Doc_ID 371 373

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

this collection

Administrative AD: User Utilizes the built-in None Accounts Modifications by “Administrative Accounts” – Administrators Perpetrator Collection. Add accounts with administrative rights to be monitored to this collection

Administrative AD: User Utilizes the built-in None Accounts Modifications “Administrative Accounts” – NOT by Perpetrator Collection. Add Administrators accounts with administrative rights to NOT be monitored to this collection

Administrative AD: User Moves Utilizes the built-in None Accounts and Renames by “Administrative Accounts” – Administrators Perpetrator Collection. Add accounts with administrative rights to be monitored to this collection

Administrative AD: User Moves Utilizes the built-in None Accounts and Renames NOT “Administrative Accounts” – by Administrators Perpetrator Collection. Add accounts with administrative rights to NOT be monitored to this collection

Service Accounts AD: Deletions of Utilizes the built-in “Service None Service Accounts Accounts” – Objects Collection. Add service accounts to be monitored to this collection

Doc_ID 371 374

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Service Accounts AD: Modifications Utilizes the built-in “Service None of Service Accounts” – Objects Accounts Collection. Add service accounts to be monitored to this collection

Service Accounts AD: Moves and Utilizes the built-in “Service None Renames of Accounts” – Objects Service Accounts Collection. Add service accounts to be monitored to this collection

Service Accounts AD: Password Set Utilizes the built-in “Service None on Service Accounts” – Objects Accounts Collection. Add service accounts to be monitored to this collection

Microsoft > DNS Folder Templates

The Microsoft > DNS folder contains the following template:

Template Description TAGS

DNS Record Changes No customizations required None

Microsoft > Exchange Folder Templates

The Microsoft > Exchange folder contains the following templates:

Managed Folders Folder

Doc_ID 371 375

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

EX: Managed Content No customizations required None Settings Configuration Changes

EX: Managed Folder No customizations required None Configuration Changes

EX: Managed Folder No customizations required None Mailbox Policies Configuration Changes

Organization Folder

Subfolder Template Description TAGS

Client Access EX: ActiveSync Mailbox No customizations required None Policy Configuration Changes

Hub EX: Accepted Domain No customizations required None Transport Configuration Changes

Hub EX: Email Address No customizations required None Transport Policy Configuration Changes

Hub EX: Remote Domain No customizations required None Transport Configuration Changes

Hub EX: Send Connector No customizations required None Transport Configuration Changes

Doc_ID 371 376

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Hub EX: Transport and No customizations required None Transport Journal Rule Configuration Changes

Hub EX: Transport Settings No customizations required None Transport Configuration Changes

Mailbox EX: Address List No customizations required None Configuration Changes

Mailbox EX: Database No customizations required None Availability Group Changes

Mailbox EX: Database No customizations required None Management Changes

Mailbox EX: Offline Address No customizations required None Book Configuration Changes

Mailbox EX: Retention Policy Tag No customizations required None Changes

Mailbox EX: Sharing Policy No customizations required None Changes

Recipient Folder

Subfolder Template Description TAGS

Distribution EX: Distribution Group No customizations required None

Doc_ID 371 377

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Group Configuration Changes

Distribution EX: Dynamic No customizations required None Group Distribution Group Configuration Changes

Mail Contact EX: Mail Contact No customizations required None Configuration Changes

Mail Contact EX: Mail User No customizations required None Configuration Changes

Mailbox EX: Mailbox No customizations required None Configuration Changes

Role Based Access Control Folder

Template Description TAGS

EX: Administrative Role No customizations required None Configuration Changes

Server Folder

Subfolder Template Description TAGS

EX: Outlook Anywhere No customizations required None Configuration Changes

EX: Server Property No customizations required None

Doc_ID 371 378

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Changes

Client Access EX: ActiveSync No customizations required None Configuration Changes

Client Access EX: Exchange Control No customizations required None Panel Changes

Client Access EX: Offline Address No customizations required None Book Distribution Configuration Changes

Client Access EX: Outlook Web Access No customizations required None Configuration Changes

Client Access EX: POP3 and IMAP4 No customizations required None Configuration Changes

Hub EX: Receive Connector No customizations required None Transport Configuration Changes

Microsoft > File System Folder Templates

The Microsoft > File System folder contains the following templates:

CAUTION: ‘Reads’ are left out due to the potential high volume of data that could be gathered; recommended only for highly sensitive content.

Subfolder Template Description TAGS

WinFS: Specify the files and/or folders to None BitTorrent File be monitored. Optionally, add any Access AD Perpetrators to be included or excluded

Doc_ID 371 379

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

WinFS: Specify the files and/or folders to None Executable File be monitored. Optionally, add any Access AD Perpetrators to be included or excluded

WinFS: File and Specify the files and/or folders to None Folder Access be monitored. Optionally, add any ‘Wildcards’ and/or AD Perpetrators to be included or excluded

WinFS: File and Specify the files and/or folders to None Folder Access be monitored. Optionally, add any and Property ‘Wildcards’ and/or AD Monitoring Perpetrators to be included or excluded

WinFS: File and Specify the files and/or folders to None Folder Property be monitored. Optionally, add any Modifications ‘Wildcards’ and/or AD Perpetrators to be included or excluded

WinFS: Graphic Specify the files and/or folders to None File Access be monitored. Optionally, add any AD Perpetrators to be included or excluded

WinFS: Music Specify the files and/or folders to None File Access be monitored. Optionally, add any AD Perpetrators to be included or excluded

WinFS: Setting Specify the files and/or folders to None and be monitored. Optionally, add any

Doc_ID 371 380

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Configuration AD Perpetrators to be included or File Access excluded

WinFS: Video Specify the files and/or folders to None File Access be monitored. Optionally, add any AD Perpetrators to be included or excluded

Access WinFS Access: Specify the files and/or folders to None Creates be monitored. Optionally, add any ‘Wildcards’ and/or AD Perpetrators to be included or excluded

Access WinFS Access: Specify the files and/or folders to None Deletes be monitored. Optionally, add any ‘Wildcards’ and/or AD Perpetrators to be included or excluded

Access WinFS Access: USE CAUTION WITH THIS None Reads TEMPLATE

Specify the files and/or folders to be monitored. Optionally, add any ‘Wildcards’ and/or AD Perpetrators to be included or excluded

Access WinFS Access: Specify the files and/or folders to None Renames be monitored. Optionally, add any ‘Wildcards’ and/or AD Perpetrators to be included or excluded

Doc_ID 371 381

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Access WinFS Access: Specify the files and/or folders to None Writes be monitored. Optionally, add any ‘Wildcards’ and/or AD Perpetrators to be included or excluded

Properties WinFS Property: Specify the files and/or folders to None Attribute be monitored. Optionally, add any Modifications ‘Wildcards’ and/or AD Perpetrators to be included or excluded

Properties WinFS Property: Specify the files and/or folders to None Audit be monitored. Optionally, add any Modifications ‘Wildcards’ and/or AD Perpetrators to be included or excluded

Properties WinFS Property: Specify the files and/or folders to None Owner be monitored. Optionally, add any Modifications ‘Wildcards’ and/or AD Perpetrators to be included or excluded

Properties WinFS Property: Specify the files and/or folders to None Permission be monitored. Optionally, add any Modifications ‘Wildcards’ and/or AD Perpetrators to be included or excluded

Microsoft > Group Policy Objects Folder Templates

The Microsoft > Group Policy Objects folder contains the following templates:

Doc_ID 371 382

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

CAUTION: Use cation with all Lockdown/Blocking Templates! Blank filters result in everything being locked down or blocked!

Subfolder Template Description TAGS

Lockdown GPO: Lockdown USE CAUTION WITH ALL LOCKDOWN None TEMPLATES

Specify the list of AD Group Policy Objects to be protected and AD Events to be locked down. Optionally, add any AD Attributes and/or AD Perpetrators to be allowed or denied

Settings GPO: Setting Specify the list of AD Group Policy None Changes Objects to be monitored. Optionally, add any AD Perpetrators to be included or excluded

Usage GPO: Creations No customizations required. Most None common modifications: specify AD Perpetrator to be included or excluded

Usage GPO: Deletions No customizations required. Most None common modifications: specify AD Perpetrator to be included or excluded

Usage GPO: Link No customizations required. Most None Changes common modifications: specify AD Context and/or AD Perpetrator to be included or excluded

Usage GPO: No customizations required. Most None Monitoring common modifications: specify AD Applications of Context and/or AD Perpetrator to be

Doc_ID 371 383

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

GPOs included or excluded

Microsoft > LSASS Folder Templates

The Microsoft > LSASS folder contains the following templates:

Template Description TAGS

LSASS Guardian - No customizations required. Detect None Monitor attempts by other processes to alter the LSASS process

LSASS Guardian - No customizations required. Prevent None Protect attempts by other processes to alter the LSASS process

Privilege Escalation Folder Templates

The Privilege Escalation folder contains the following templates:

Template Description TAGS

AD: Administrator Indicates that an unprivileged l NEW 5.1 TEMPLATES Escalation account has had its ACLs changed to l Privileged Accounts a value that allows it to obtain administrative privileges (directly or l Privilege Escalation

transitively). l AD Security

l Unauthorized changes

AD: Modifications Utilizes the built-in Administrator l NEW 5.1 TEMPLATES of Administrator Accounts – Objects Collection.

Doc_ID 371 384

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

Accounts Add accounts with administrative l Privileged Accounts rights to be monitored to this l Privilege Escalation collection l AD Security

l Unauthorized changes

AD: SID History SID History is an attribute that l NEW 5.1 TEMPLATES Tampering supports migration scenarios. Every l Privileged Accounts user account has an associated Security Identifier (SID) which is l Privilege Escalation

used to track the security principal l Persistence and the access the account has l AD Security when connecting to resources. SID History enables access for another l Unauthorized account to effectively be cloned to changes another. This is extremely useful to ensure users retain access when moved (migrated) from one domain to another. Since the user’s SID changes when the new account is created, the old SID needs to map to the new one. When a user in Domain A is migrated to Domain B, a new user account is created in DomainB and DomainA user’s SID is added to DomainB’s user account’s SID History attribute. This ensures that DomainB user can still access resources in DomainA.

To detect SID History account escalation this policy monitors users with data in the SID History attribute and flag the ones which

Doc_ID 371 385

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

include SIDs in the same domain that have changed

Ntds.dit File Protects users from stealing l NEW 5.2 TEMPLATES Hijacking Ntds.dit file which contains the l Privileged Accounts Active Directory database. Attackers can use Volume Shadow Copy to l Privilege Escalation

copy this file, but this will prevent l Persistence and log any activity based on l AD Security configuration. l Unauthorized changes

Ransomware Folder Templates

The Ransomware folder contains the following templates:

Template Description TAGS

Ransomware Ransomware is a type of malware None Extensions that systematically encrypts files on a user’s system, and forces payment to get the data back. This policy is meant to detect the creation of files related to the actual encrypting of the data during a Ransomware attack, and trigger an alert

Ransomware Ransomware is a type of malware None Instructions that systematically encrypts files on a user’s system, and forces payment to get the data back. This policy is meant to detect the creation of

Doc_ID 371 386

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

warning file created by a Ransomware attack, and trigger an alert

Reconnaissance Folder Templates

The Reconnaissance folder contains the following templates:

Template Description TAGS

BloodHound BloodHound is a tool that is used to reveal l NEW 5.1 Detection hidden and often unintended relationships TEMPLATES within an Active Directory environment. l Reconnaissance Attackers can use BloodHound to easily identify highly complex attack paths that l Bloodhound

would otherwise be impossible to quickly l LDAP identify. https://github.com/BloodHoundAD/BloodHo und

This policy will detect the latest BloodHound/Sharphound and Ingestor generated queries in your environment

Directory Read: This secret should only be retrieved by l NEW 7.1 Malicious DPAPI NTAuthority System on a domain controller TEMPLATES Secret Reveal thus any activity by a user or computer l DPAPI should be considered a threat.

LDAP: Account This is the recommended policy for detecting l NEW 7.1 Reconnaissance signature queries of LDAP reconnaissance TEMPLATES tools. l LDAP

l Reconnaissance

Doc_ID 371 387

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

LDAP: Admin This Policy will detect LDAP queries targeting l NEW 5.1 Accounts sensitive accounts, such as Administrator. TEMPLATES You can add and delete to this list under the l LDAP LDAP Query tab as per your specific requirements l Reconnaissance

l Privileged Accounts

LDAP: GMSA Detects when the password for a Group l NEW 7.1 Password Managed Service Account is read TEMPLATES

* This policy should exclude the computer l GMSA accounts used that are allowed to retrieve l Password the password

LDAP: LAPS Microsoft’s LAPS is a useful tool for l NEW 5.1 Security & automatically managing Windows computer TEMPLATES Active Directory local Administrator passwords. Since LAPS l LAPS LAPS requires the computer attributes to be Configuration present, attackers can check to see if LAPS is l Reconnaissance Recon “installed” in Active Directory by checking for the presence of the LAPS attributes in AD. This policy will identify attempts to query AD for attributes that associated with the presence of LAPS

LDAP: Managed This policy can be configured to detect l NEW 5.1 Service attempts to discover managed service TEMPLATES Accounts Recon accounts. It looks for LDAP queries of l LDAP cn=msDS-ManagedServiceAccount l Reconnaissance

l Privileged Accounts

l Managed Service

Doc_ID 371 388

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

Accounts

LDAP: Service If intruders attack a service that uses a highly l NEW 5.1 Accounts Recon privileged System account, they might be TEMPLATES able to conduct further exploits under that l LDAP account's context. Many organizations use common cosmetic naming conventions to l Reconnaissance

denote service accounts or maintain a list of l Service service accounts. This policy can be Accounts configured to detect attempts to discover service accounts.

Schema and Configuration Folder Templates

The Schema and Configuration folder contains the following templates:

Subfolder Template Description TAGS

Attribute Added to When the GC flag for an l NEW 7.0.1 the Global Catalog attribute is changed TEMPLATES

Extended Rights When a new extended l NEW 7.0.1 Added right is added. Extended TEMPLATES rights grant permissions to carry an operation such as change/reset password or send/receive as is it not an individual attribute rather an operation.

Global Catalog DC is promoted to a l NEW 7.0.1 Server Added global catalog server. TEMPLATES

Doc_ID 371 389

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Global Catalog DC is no longer a global l NEW 7.0.1 Server Removed catalog server. TEMPLATES

Naming Context When a domain or l NEW 7.0.1 Added application partition is TEMPLATES added

Naming Context When a domain or l NEW 7.0.1 Removed application partition is TEMPLATES removed

Property Set Added When a new property set l NEW 7.0.1 is added. Personal or TEMPLATES Private information is a property set that contains multiple attributes

UPN Suffix Added or When suffixes are added l NEW 7.0.1 Removed or removed for a user TEMPLATES principle name like @domain.com as part of the logon name

Schema Schema Attribute When a schema attribute l NEW 7.0.1 Changes Disabled is disabled TEMPLATES

Schema Schema Attribute When a schema attribute l NEW 7.0.1 Changes Enabled is enabled TEMPLATES

Schema Schema Extension – When a new attribute is l NEW 7.0.1 Changes Attribute Added added to the schema TEMPLATES

Schema Schema Extension – When a new class is l NEW 7.0.1 Changes Object Class Added added to the schema TEMPLATES

Doc_ID 371 390

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Schema Schema object class When a schema class is l NEW 7.0.1 Changes is enabled enabled TEMPLATES

Schema Schema Object When a schema object is l NEW 7.0.1 Changes Disabled disabled TEMPLATES

Schema Schema Version When the schema l NEW 7.0.1 Changes Changed version number changes. TEMPLATES This usually occurs during an upgrade where new objects or attributes are added

Sites and New Server Domain controller added l NEW 7.0.1 Services Added/Removed or removed from an AD TEMPLATES from a Site in AD site.

Sites and Site Site added or removed l NEW 7.0.1 Services Added/Removed from an existing site link. TEMPLATES from Site Link

Sites and Site Site added or removed l NEW 7.0.1 Services Added/Removed from a site link bridge. TEMPLATES from Site Link Bridge

Sites and Site Subnet added or l NEW 7.0.1 Services Added/Removed removed from a site. TEMPLATES from Subnet

Sites and Site Link Added Detect the creation of a l NEW 7.0.1 Services new site link. TEMPLATES

Sites and Site Link Bridge Detect the creation of a l NEW 7.0.1 Services Added new site link bridge. TEMPLATES

Doc_ID 371 391

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Subfolder Template Description TAGS

Sites and Site Link Bridge Site link bridge deleted. l NEW 7.0.1 Services Removed TEMPLATES

Sites and Site Link Cost Cost on a site link l NEW 7.0.1 Services Changed changed. TEMPLATES

Sites and Site Link Replication Replication interval for l NEW 7.0.1 Services Interval Modified link changed. TEMPLATES

Sites and Site Link Schedule Site link schedule l NEW 7.0.1 Services Modified changed. TEMPLATES

Sites and Subnet Added New subnet added. l NEW 7.0.1 Services TEMPLATES

Sites and Subnet Removed Subnet removed. l NEW 7.0.1 Services TEMPLATES

SIEM Folder Templates

The SIEM folder contains the following templates:

Template Description TAGS

Domain Admin Activity Monitors for all activity performed by None objects that have Domain Admin privileges.

Utilizes the built-in “Domain Administrators” – Perpetrator Collection. Add accounts with domain administrator rights to be monitored to this collection

Doc_ID 371 392

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

Enabled and Disabled Monitors when accounts are enabled None Accounts or disabled.

No customizations required

Failed Authentications Monitors for all Failed None Authentications.

No customizations required

GPO Setting Changes Monitors all GPO setting changes. None

No customizations required

OU Moved or Renamed Monitors for all OU moves or None renames.

No customizations required

Password Changes Monitors for password changes. None

No customizations required

Sensitive Group Gathers Successful AD None Modifications Authentications.

Utilizes built-In “Successful Authentications” – Include Perpetrators Collection to define which accounts will be monitored for successful authentications. Add desired accounts to be monitored to this collection

Successful Logons To minimize database growth, this None policy is not set to send events to the reporting database, IT ONLY SENDS its information to SIEM. Make sure

Doc_ID 371 393

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

the Configuration > Event Filtering > Exclude 'Noise' Events option is Off for this policy. No customizations required.

SYSVOL Tampering Monitors for changes to critical files None under SYSVOL.

Specify the SYSVOL folders for all the servers to be monitored.

User Lockouts Monitors for user lockouts. None

No customizations required.

StealthDEFEND Folder Templates

The StealthDEFEND folder contains the following templates:

Template Description TAGS

StealthDEFEND for AD This is the recommended policy l StealthDEFEND for sending AD Events captured by l NEW v6.1 StealthINTERCEPT to TEMPLATES StealthDEFEND. This policy includes: Authentication Monitoring, Active Directory Changes, AD Replication Monitoring, and LSASS Guardian - Monitor.

StealthDEFEND for AD This is the recommended policy l StealthDEFEND LDAP for sending LDAP events captured l NEW v7.1 by StealthINTERCEPT to TEMPLATES

Doc_ID 371 394

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Template Description TAGS

StealthDEFEND for detecting signature queries of LDAP reconnaissance tools.

Policy 1: Suspicious Queries

Policy 2: Suspicious Attributes Returned

Using Templates to Create Policies Move the template under the Policies node in the Navigation pane in the Policy Center. From under the Templates node, templates can be moved to the Policies node via drag-and-drop or with the right-click Copy and Paste options. From under the Tags node, templates can be moved to the Policies node via the right-click Copy and Paste options. The policy will be disabled but will contain all of the preconfigured settings.

Follow the steps to customize a policy that was created from a template.

If desired, on the General Tab set the policy to be Active At Specified Times, and then set the schedule.

CAUTION: Use caution with all lockdown/blocking templates. Blank filters result in everything being locked down or blocked!

On the Event Type Tab, configure the Event Filters which are specific to each environment. See the Event Filters Overview section for additional information.

Remember, any filter left blank is considered an ALL.

CAUTION: Email notifications should not be used on highly active policies. Please reserve this feature for policies where immediate notification of an event is needed.

If desired, on the Actions Tab assign any actions to be a part of this policy.

On the Reports Tab, review the appropriate/related reports for this policy and decide which should be enabled. The original template may have already enabled a report by default.

Doc_ID 371 395

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Return to the General Tab and check the Enabled box to activate the policy. Click Save at the bottom of the Display area.

When the last step is completed, this policy is sent, real-time, to the individual SI Agents and becomes active.

Doc_ID 371 396

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® Report Templates A report template defines the content and format of a report. The SI Reporting Console uses the report template to generate the reports. Report Templates can be associated to a specific policy within the SI Admin Console or selected within the SI Reporting Console when configuring a report.

This chapter summarizes available report templates and where they are located. The available report templates are organized in event related folders under the All Reports node of the Reports Tab in the SI Admin Console and under the Report Templates folder in the SI Reporting Console. Common Folder Report Templates

The Common folder contains the following report templates:

Report Template Description

StealthINTERCEPT Report - 24 Hour Clock StealthINTERCEPT Report - 24 Hour Clock

StealthINTERCEPT Report - Failed Changes StealthINTERCEPT Report - Failed Changes

StealthINTERCEPT Report - Filters StealthINTERCEPT Report with Filters

StealthINTERCEPT Report By Event StealthINTERCEPT Report by Event

StealthINTERCEPT Report By Object StealthINTERCEPT Report by Object

StealthINTERCEPT Report By Perpetrator - StealthINTERCEPT Report by perpetrator Top X - Top X

StealthINTERCEPT Report StealthINTERCEPT Report

Common – AD Folder Report Templates

The Common – AD folder contains the following report templates:

Doc_ID 371 397

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

AD Activity By Event - Filters Activity by Event with Filters

AD Activity By Event Activity by Event

AD Activity By Object - Filters Activity by Object with Filters

AD Activity By Object Activity by Object

AD Authentication Folder Report Templates

The AD Authentication folder contains the following report template:

Report Template Description

AD Authentications - Top 10 By Date AD Authentications Top 10 By Date

AD Authentications - Top 10 By Percent AD Authentications Top 10 By Percent

AD Authentications Blocking AD Authentications Blocking

AD Authentications AD Authentications

AD Failed Authentications AD Failed Authentications

Authentication - Filters AD Authentications with Filters

Authentication Weak Encryption Authentication Weak Encryption

AD Changes Folder Report Templates

The AD Changes folder contains the following report templates:

Doc_ID 371 398

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

AD Account Expiration - Filters AD Account Expirations with Filters

AD Account Logons - Top 10 By Date Account Logons Top 10 by Date

AD Account Logons - Top 10 By Percent Account Logons Top 10 by Percentage

AD Account Logons Account Logons

AD Accounts Disable - Filters AD Disabled Accounts with Filters

AD Accounts Enable - Filters AD Enabled Accounts with Filters

AD Account Lockouts Account Lockouts

AD Accounts UnLocked Unlocked Accounts

AD All User Modifications AD User Modifications Including Membership Changes

AD Computer Creations Computer Creations

AD Computer Deletions Computer Deletions

AD Computer Moves Computer Moves

AD Computer Renames Computer Renames

AD Domain Controller Creation AD Domain Controller Creation

AD Failed Account Logons Failed Account Logons

AD Failed Group Membership Changes Failed Group Membership Changes

AD Failed Object Creations Failed Object Creations

Doc_ID 371 399

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

AD Failed Object Deletions Failed Object Deletions

AD Failed Object Moves Failed Object Moves

AD Failed Object Renames Failed Object Renames

AD Group Creations Group Creations

AD Group Deletions Group Deletions

AD Group Membership Changes - Filters Group Membership Changes with Filters

AD Group Membership Changes By Group Group Membership Changes by Group - Filters with Filters

AD Group Membership Changes By Group Group Membership Changes by Adds and Member Adds and Removes - Filters Removes with Filters

AD Group Membership Changes By Group Group Membership Changes by Adds and Member Adds and Removes with Chart Removes with Chart

AD Group Membership Changes By Group Group Membership Changes by Adds and Member Adds and Removes with Chart- Removes with Chart and Filters Filters

AD Group Membership Changes By Group Group Membership Changes by Adds and Member Adds and Removes Removes

AD Group Membership Changes By Group Group Membership Changes by Group

AD Group Membership Changes By Group Membership Changes by Perpetrator with Chart - Filters Perpetrator with Chart and Filters

AD Group Membership Changes By Group Membership Changes by Perpetrator with Chart Perpetrator with Chart

Doc_ID 371 400

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

AD Group Membership Changes By Group Membership Changes by Perpetrator Perpetrator

AD Group Membership Changes By Group Membership Changes by Perpetrator-Filters Perpetrator with Filters

AD Group Membership Changes By User Group Membership Changes by User - Group Adds and Removes - Filters Filters

AD Group Membership Changes By User AD Group Membership Changes By User Group Adds and Removes

AD Group Membership Changes Group Membership Changes

AD Group Moves Group Moves

AD Group Renames Group Renames

AD Object Creations Object Creations

AD Object Deletions Object Deletions

AD Object Modifications Object Modifications

AD Object Moves Object Moves

AD Object Renames Object Renames

AD OU Creations OU Creations

AD OU Deletions OU Deletions

AD OU Modified OU Modifications

Doc_ID 371 401

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

AD OU Moves OU Moves

AD OU Renames OU Renames

AD Password Changes Password Sets

AD Password Changes-SelfExcluded Password Sets - Self Changes Excluded

AD Password Changes-WithDetails Password Sets with Details

AD Permission Changes AD Permission Changes

AD User Creations User Creations

AD User Deletions User Deletions

AD User Modifications User Modifications

AD User Moves User Moves

AD User Renames User Renames

AD Effective Group Membership Changes Folder Report Templates

The AD Effective Group Membership Changes folder contains the following report templates:

Report Template Description

Effective Group Membership Changes By Effective Group Membership Changes by Group Member Adds and Removes Adds and Removes

Effective Group Membership Changes By Effective Group Membership Changes by

Doc_ID 371 402

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

Group Group

Effective Group Membership Changes By Effective Group Membership Changes by Perpetrator Perpetrator

Effective Group Membership Changes Effective Group Membership Changes

AD Lockdown Folder Report Templates

The AD Lockdown folder contains the following report templates:

Report Template Description

AD Lockdown Events - Filters AD Lockdown, Blocked Event Information With Filters

AD Lockdown Events By Address AD Lockdown, Blocked Event Information By Address

AD Lockdown Events By Event AD Lockdown, Blocked Event Information By Event

AD Lockdown Events By Perpetrator AD Lockdown, Blocked Event Information By Perpetrator

AD Lockdown Events AD Lockdown, Blocked Event Information

AD Replication Folder Report Templates

The AD Replication folder contains the following report templates:

Doc_ID 371 403

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

AD Replication Lockdown AD Replication Lockdown

AD Replication Monitoring AD Replication Monitoring

Analytics Folder Report Templates

The Analytics folder contains the following report templates:

Report Template Description

StealthINTERCEPT Analytics Report - Bad StealthINTERCEPT Analytics Report - Bad User ID (by source host) User ID (by source host)

StealthINTERCEPT Analytics Report - Bad StealthINTERCEPT Analytics Report - Bad User ID (by user) User ID (by user)

StealthINTERCEPT Analytics Report - StealthINTERCEPT Analytics Report - Breached Password Breached Password

StealthINTERCEPT Analytics Report - Brute StealthINTERCEPT Analytics Report - Force Attacks Brute Force Attacks

StealthINTERCEPT Analytics Report - StealthINTERCEPT Analytics Report - Concurrent Logins Concurrent Logins

StealthINTERCEPT Analytics Report - File StealthINTERCEPT Analytics Report - File System Attacks (by user) System Attacks (by user)

StealthINTERCEPT Analytics Report - StealthINTERCEPT Analytics Report - Golden Tickets Golden Tickets

StealthINTERCEPT Analytics Report – StealthINTERCEPT Analytics Report – Forged PAC Forged PAC

Doc_ID 371 404

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

StealthINTERCEPT Analytics Report - StealthINTERCEPT Analytics Report - Horizontal Movement Attacks Horizontal Movement Attacks

StealthINTERCEPT Analytics Report - StealthINTERCEPT Analytics Report - Impersonation Logins Impersonation Logins

StealthINTERCEPT Analytics Report – StealthINTERCEPT Analytics Report – Kerberos Weak Encryption Kerberos Weak Encryption

StealthINTERCEPT Analytics Report - User StealthINTERCEPT Analytics Report - User Account Hacking Account Hacking

DNS Record Reports Folder Report Templates

The DNS Record Reports folder contains the following report templates:

Report Template Description

AD DNS Record Changes by Timelogged DNS Record Changes by Timelogged

AD DNS Record Changes DNS Record Changes

Exchange Changes Folder Report Templates

The Exchange Changes folder contains the following report templates:

Report Template Description

EX Activity Download Attachment EX Activity Download Attachment

EX Activity Message Create Exchange Mailbox Message Create

Doc_ID 371 405

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

EX Activity Message Delete Exchange Mailbox Message Delete

EX Activity Message General EX Activity Message General

EX Activity Message Hard Delete by non- EX Activity Message Hard Delete By Non- owner Owner

EX Activity Message Modify by non-owner EX Activity Message Modify by non- owner

EX Activity Message Read Exchange MailboxMessage Read

EX Activity Message Send by non-owner EX Activity Message Send By Non-Owner

EX Activity Message Send Outside EX Activity Message Send Outside Organization Organization

EX Activity Message Send with file EX Activity Message Send with file attachment attached

EX Activity Message Send with EX Activity Message Send with Sendonbehalf SendOnBehalf

EX Activity Message Send Exchange Mailbox Message Send

EX Folder Permission Changes Folder Permission Changes

EX Folder Permission Deltas Folder Permission Deltas

EX Logons Exchange Mailbox Logons

EX Mailbox Permission Changes Mailbox Permission Changes

EX Mailbox Permission Deltas Mailbox Permission Deltas

Doc_ID 371 406

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Exchange Configuration Folder Report Templates

The Exchange Configuration folder contains the following report templates:

Report Template Description

EX Accepted Domain Changes Accepted Domain Configuration Changes

EX ActiveSync Changes ActiveSync Changes

EX ActiveSync Mailbox Policy Changes ActiveSync Mailbox Policy Configuration Changes

EX Address List Changes Address List Configuration Changes

EX Administrative Role Changes Exchange Administrative Role Configuration Changes

EX Contact Changes Mail Contact Changes

EX Database Availability Groups Database Availability Groups

EX Database Management Changes Database Management Changes

EX Distribution Group Changes Distribution Group Changes

EX Dynamic Distribution Group Changes Dynamic Distribution Group Changes

EX Email Address Policy Changes Email Address Policy Configuration Changes

EX Exchange Changes Exchange Control Panel Changes

EX Mail User Changes Mail User Changes

EX Mailbox Changes Mailbox Changes

Doc_ID 371 407

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

EX Managed Content Settings Changes Managed Content Settings Changes

EX Managed Folder Changes Managed Default and Custom Folder Changes

EX Managed Folder Mailbox Policy Managed Folder Mailbox Policy Changes Changes

EX Offline Address Book Changes Offline Address Book Changes

EX Offline Address Book Distribution Offline Address Book Distribution Changes Changes

EX Outlook Anywhere Changes Outlook Anywhere Changes

EX Outlook Web Access Changes Outlook Web Access Changes

EX POP3 and IMAP4 Changes POP3 and IMAP4 Changes

EX Receive Connector Changes Receive Connector Changes

EX Remote Domain Changes Remote Domain Configuration Changes

EX Retention Policy Tag Changes Retention Policy Tag Changes

EX Send Connector Changes Send Connector Configuration Changes

EX Server Configuration Changes Server Configuration Changes

EX Sharing Policy Changes Sharing Policy Changes

EX Transport Rule Changes Transport and Journal Rule Configuration Changes

Doc_ID 371 408

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

EX Transport Settings Changes Transport Settings Configuration Changes

EX WebDAV Changes WebDAV Changes

Exchange Lockdown Folder Report Templates

The Exchange Lockdown folder contains the following report templates:

Report Template Description

EX Folder Permission Lockdown Exchange 2010 Folder Permission Lockdown

EX Logon Lockdown Exchange 2010 Logon Lockdown

EX Mailbox Permission Lockdown Exchange 2010 Mailbox Permission Lockdown

File System Changes Folder Report Templates

The File System Changes folder contains the following report templates:

Report Template Description

File System Activity - Drill Down File System Activity - Drill Down

File System Activity File System Activity

File System Audit Changes File System Audit Changes

File System Permission Changes File System Permission Changes

Doc_ID 371 409

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

NOTE: These reports can be applied to both Windows file system and NAS device event data.

File System Lockdown Folder Report Templates

The File System Lockdown folder contains the following report templates:

Report Template Description

File System Lockdown - By Event File Lockdown by Event

File System Lockdown - By Perpetrator File Lockdown by Perpetrator

File System Lockdown - Filters File Lockdown with Filters

File System Lockdown File Lockdown Activity

GPO Lockdown Folder Report Templates

The GPO Lockdown folder contains the following report templates:

Report Template Description

GPO File Lockdown GPO File Lockdown, Blocked Activity

GPO Lockdown - Filters GPO Lockdown, Blocked Activity With Filters

GPO Lockdown By Event GPO Lockdown, Blocked Activity By Event

GPO Lockdown By Perpetrator GPO Lockdown, Blocked Activity By Perpetrator

GPO Lockdown GPO Lockdown, Blocked Activity

Doc_ID 371 410

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

GPO Setting Changes Folder Report Templates

The GPO Setting Changes folder contains the following report templates:

Report Template Description

GPO Setting Changes By GPO GPO Setting Changes By GPO

GPO Setting Changes By Perpetrator GPO Setting Changes by Perpetrator

GPO Setting Changes By Policy GPO Setting Changes By Policy

GPO Setting Changes GPO Setting Changes

GPO Usage Monitoring Folder Report Templates

The GPO Usage Monitoring folder contains the following report templates:

Report Template Description

GPO Usage Creations GPO Creations

GPO Usage Monitoring - Filters GPO Usage Monitoring With Filters

GPO Usage Monitoring By Address GPO Usage Monitoring By Address

GPO Usage Monitoring By Event GPO Usage Monitoring By Event

GPO Usage Monitoring By Perpetrator GPO Usage Monitoring By Perpetrator

GPO Usage Monitoring GPO Usage Monitoring

LDAP Monitoring Folder Report Templates

Doc_ID 371 411

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The LDAP Monitoring folder contains the following report templates which report on LDAP Event policies:

Report Template Description

LDAP Activity by Base DN Name LDAP Activity by Base DN Name

LDAP Activity by Perpetrator Host LDAP Activity by Perpetrator Host

LDAP Activity by Perpetrator LDAP Activity by Perpetrator

LDAP Activity by Secure LDAP Activity by Secure

LDAP Activity by Source LDAP Activity by Source

LDAP Number of Non-Secure Queries From LDAP Number of Non-Secure Queries Computer Accounts From Computer Accounts

LDAP Number of Non-Secure Queries From LDAP Number of Non-Secure Queries User Accounts From User Accounts

LDAP Operations Folder Report Templates

The LDAP Operations folder contains the following report templates which report on LDAP Operations policies:

Report Template Description

StealthINTERCEPT LDAP Client Totals LDAP Query Totals By Client

StealthINTERCEPT LDAP Object Totals LDAP Query Totals By Object

StealthINTERCEPT LDAP Query Avg Run LDAP Queries By Average Run Time Time

StealthINTERCEPT LDAP Query Number Of LDAP Queries By Number Of Objects

Doc_ID 371 412

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Report Template Description

Object Returned Returned

StealthINTERCEPT LDAP Query Totals By LDAP Queries By Time Time

StealthINTERCEPT LDAP Query Totals LDAP Queries Run Per Domain

StealthINTERCEPT LDAP Sample Totals LDAP Query Totals By Sample

StealthINTERCEPT LDAP Server Totals LDAP Query Totals By Server

StealthINTERCEPT LDAP Totals LDAP Query Totals

LSASS Guardian - Monitor Folder Report Templates

The LSASS Guardian - Monitor folder contains the following report template:

Report Template Description

LSASS Guardian - Monitor LSASS Guardian - Monitor

LSASS Guardian - Protect Folder Report Templates

The LSASS Guardian - Protect folder contains the following report template:

Report Template Description

LSASS Guardian - Protect LSASS Guardian - Protect

Password Enforcement Monitoring Folder Report Templates

Doc_ID 371 413

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Password Enforcement Monitoring folder contains the following report template:

Report Template Description

Password Enforcement Monitoring Password Enforcement Monitoring

Security Event Log Folder Report Templates

The Security Event Log folder contains the following report templates:

Report Template Description

SEL Logon Failed Security Event Log Failed Logons

SEL Logon with Explicit Credentials Security Event Log Logons with Explicit Credentials

SEL Successful Network Logon Security Event Log Successful Network Logons

Doc_ID 371 414

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® StealthINTERCEPT Analytics Guide StealthINTERCEPT provides organizations with the ability to capture and analyze authentication traffic occurring within their Active Directory environments in real-time to detect patterns of behavior and scenarios relating to attacks and attempts to compromise security. The tables below outline the authentication analytics StealthINTERCEPT provides out-of-the box, along with definitions and examples to better understand each analytic.

The Event Filtering options within the Event Filtering Configuration window allow events from selected hosts or selected accounts to be filtered out from being monitored. See the Event Filtering Configuration Window section for additional information on these options.

This chapter provides a quick reference guide of definitions and examples of StealthINTERCEPT Authentication Analytics Features. It also provides information on configuring the analytic policies and the data grid views for each policy. Brute Force Attacks Analytic

Brute Force Attacks

Definition Repeated failed authentications against systems and other network assets in a specified time range

Example Malware or a “bad actor” on the network is attempting to gain access to a system, application, or data resource such as a file share by sequentially leveraging multiple User Accounts and their credentials until they gain access

Trigger X failed logins from a single host against a single host in Y minutes

Recommended Settings Configure this analytic to trigger a hit if StealthINTERCEPT monitors at least 40 failed logins from a single host against a single host in 3 minutes.

*See the Brute Force Attacks Analytic Type section for additional information.

User Account Hacking Analytic

Doc_ID 371 415

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

User Account Hacking

Definition Repeated failed logins below lockout thresholds and/or over extended periods

Example Malware or a “bad actor” on the network is attempting to compromise an account by guessing the account’s password repeatedly until access is granted. To circumvent built-in lockout policies in Active Directory, the malware or bad actor will only guess so many times before backing off, making sure not to lockout the account. After a period of time has expired, it will continue its routine until the password is guessed correctly. This type of attack is easily automated using a script. The quiet nature of this type of attack often results in the attack going undetected.

*The Enterprise Admin account (SID ending in -500) in Active Directory cannot be locked out making it vulnerable to hacking and eventual breach. While Active Directory will show the account is locked out on the object itself, as soon as the correct password is supplied, the account will be automatically unlocked, giving the perpetrator “God-rights” to the enterprise.

Trigger (X1 failed login attempts from an individual user account in Y1 minutes) OR (X2 failed login attempts from an individual user account in Y3 minutes) OR …

Recommended Settings Set the number of attempts 1 or 2 increments below the organization’s Active Directory lockout policy settings.

*See the User Account Hacking Analytic Type section for additional information.

Horizontal Movement Attacks Analytic

Doc_ID 371 416

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Horizontal Movement Attacks

Definition User account authentications across multiple network assets in a specified time period

Example Malware uses several techniques to spread its payload during the initial phase of an attack including Pass the Hash, Impersonation, and current session logged on credentials. Regardless of the method, authentication takes place against other targets on the network, triggering a StealthINTERCEPT horizontal movement alert.

Trigger Successful or failed authentications of a given account across X number of resources in Y minutes

Recommended Settings Configure this analytic to trigger a hit if StealthINTERCEPT monitors successful or failed authentications of a given account across 10 resources in 3 minutes.

*See the User Account Hacking Analytic Type section for additional information.

Bad User ID (by user) Analytic

Bad User ID (by user)

Definition Pre-Authentication failures using one or more non- existing user IDs

Example Malware or a bad-actor is attempting to obtain access by guessing a user ID and password but has provided a user ID that does not exist. Most operating systems and devices have default administrative accounts such as

Doc_ID 371 417

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Bad User ID (by user)

“administrator” or “admin.” Because the account name is known, if left unchanged, the account becomes vulnerable to attack. To prevent this, most organizations change the name of these accounts. In the case where the account has been renamed, a perpetrator attempting to hack a well-known account will actually be attempting to authenticate against an account that does not exist and will be detected by this analytic. This analytic looks for attacks, regardless of source, against non-existing accounts.

Trigger Any number of failed authentication attempts made by a non-existing account

Recommended Settings Bad User ID (by user) groups attacks by account name where every new non-existing account will generate an analytic hit. The user-configurable parameter is based on time, where time is used to visualize how often an attempt is made to authenticate using the same non- existing account name.

Stealthbits recommends setting the default value to 30 days. If an attempt to use that same non-existing account name occurs after the 30 day time period, a new analytic hit will be produced rather than incrementing the previous hit count.

*See the Bad User ID (by User) Analytic Type section for additional information.

Bad User ID (by source host) Analytic

Doc_ID 371 418

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Bad User ID (by source host)

Definition Pre-Authentication failures using one or more non- existing user IDs

Example Similar to the “Bad User ID (by User)” analytic type, this analytic looks for multiple failed authentications against non-existing accounts, but from a single source host. This analytic identifies a perpetrator that hunts for accounts from a single source computer.

Trigger Any number of failed authentication attempts using non- existing accounts made from a specific host

Recommended Settings Bad User ID (by source host) groups attacks by where failed authentication attempts by non-existing accounts are coming from to trigger analytic hits. The user- configurable parameter is based on time, where time is used to visualize how often an attempt is made to authenticate using a non-existing account from an individual system.

Stealthbits recommends setting the default value to 30 days. If a failed authentication attempt using a non- existing account is made from the same host occurs after the 30 day time period, a new analytic hit will be produced rather than incrementing the previous hit count.

*See the Bad User ID (by Source Host) Analytic Type section for additional information.

Breached Password Analytic

Doc_ID 371 419

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Breached Password

Definition Multiple failed authentications followed by a successful authentication

Example This analytic alert may follow one or more alerts identifying repeated failed authentications against an account. This alert is of special importance as it signals that an attacked account may have been breached and a successful login occurred. This could also identify a scenario where an attacker has attempted multiple authentications with a user’s account but has failed, and then subsequent to that, the real user logs in and authenticates successfully.

Trigger X failed authentication attempts from the same account followed by a successful authentication in Y hours

Recommended Settings Stealthbits recommends configuring this analytic to trigger a hit if StealthINTERCEPT monitors at least 30 failed authentication attempts from the same account followed by a successful authentication in 4 hours.

*See the Breached Password Analytic Type section for additional information.

Concurrent Logins Analytic

Concurrent Logins

Definition Logins from multiple locations simultaneously

Example A user does not normally login from multiple locations simultaneously within a short time window. If one or more accounts has been compromised by malware, or in the event of an insider attack, one might see a compromised account authenticating from many

Doc_ID 371 420

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Concurrent Logins

systems in parallel and a corresponding analytic alert identifying the account and the authenticating systems.

Trigger Successful and failed authentications using the same account from at least X hosts in Y minutes

Recommended Settings Stealthbits recommends configuring this analytic to trigger a hit if StealthINTERCEPT monitors either successful or failed authentications using the same account from at least 3 hosts in 1 hour.

*See the Concurrent Logins Analytic Type section for additional information.

Impersonation Logins Analytic

Impersonation Logins

Definition Multiple authenticated accounts from a single system

Example A perpetrator may wish to mask his activities by authenticating using alternate credentials. While logged in using their primary user ID, the perpetrator will authenticate against a network resource using an alternate ID; this is known as impersonation. Impersonation is often used by administrators, but not normally used by end-users. An attacker will often use impersonation to obtain increased rights to remote systems. This analytic identifies hosts that are using impersonated authentications.

Trigger X different authenticated accounts from a single system in Y hours

Recommended Settings Stealthbits recommends configuring this analytic to

Doc_ID 371 421

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Impersonation Logins

trigger a hit if StealthINTERCEPT monitors 3 different authenticated accounts from a single system in 2 hours.

*See the Impersonation Logins Analytic Type section for additional information.

Golden Tickets Analytic

Golden Tickets

Definition Kerberos tickets with modified maximum lifetimes for a user ticket and maximum lifetimes for a user ticket renewal

Example Kerberos tickets are used as a sort of “pass card” to obtain access to resources. Once a domain controller authenticates a user, a TGT (ticket granting ticket) is granted with a limited lifespan. This is then used to obtain TGS (ticket granting service) and the TGS is what identifies a user to a resource on the network. On TGT expiry, the user account is checked for validity (password, enabled/disabled, group memberships, etc.) and a new TGT is granted. A known vulnerability exists where a domain admin could forge the TGT renewal time, creating an indefinite “golden” ticket. This could be accomplished, and then the underlying account removed allowing the user to obtain admin access forever with an account that no longer exists. If a user on the network were to attempt to use such a ticket, this analytic would detect the altered ticket and generate an alert.

Trigger Maximum lifetime for a user ticket > than X hours

OR

Maximum lifetime for a user ticket renewal > Y days

Doc_ID 371 422

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Golden Tickets

Recommended Settings Stealthbits recommends configuring this analytic to trigger a hit if the maximum lifetime for a user ticket is greater than 24 hours or the maximum lifetime for a user ticket renewal is greater than 30 days.

*See the Golden Ticket Analytic Type section for additional information.

File System Attacks (by user) Analytic

File System Attacks (by user)

Definition Significant number of file changes made by an account in a short time period. Optionally block the perpetrator which triggers an incident by selecting the Enable Automatic Lockdown option.

Example Malware or a bad actor is attempting to delete/modify (such as encrypt) or copy large numbers of files residing locally or on the network, in order to prevent access to or steal file system data. In the case of a ransomware attack, end user files are typically targeted (such as documents, spreadsheets, presentations, etc.), which is followed by a warning to pay a ransom or the files will be erased. This analytic will identify unusual/abnormally high levels of file activity in a short timeframe, and trigger a file system attack alert as a result.

Trigger X number of files changed by an account in Y minutes

Recommended Settings Stealthbits recommends configuring this analytic to trigger a hit if StealthINTERCEPT monitors 500 files affected in 3 minutes.

Doc_ID 371 423

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

*See the File System Attacks (by User) Analytic Type section for additional information.

Kerberos Weak Encryption Analytic

Kerberos Weak Encryption

Definition Kerberos tickets with RC4_HMAC_MD5 encryption.

Example Kerberos tickets are used as a sort of “pass card” to obtain access to resources. Once a domain controller authenticates a user, a TGT (ticket granting ticket) is granted with a limited lifespan. This is then used to obtain TGT (ticket granting service) and the TGS is what identifies a user to a resource on the network. If RC4_ HMAC_MD5 encryption is used then it makes possible to obtain password value using Kerberoasting attack. If a user on the network were to attempt to use such a ticket, this analytic would detect this ticket and generate an alert.

Trigger Ticket uses RC4_HMAC_MD5 encryption.

Recommended Settings No additional configuration is needed.

*See the Kerberos Weak Encryption Analytic Type section for additional information.

Forged PAC Analytic

Forged PAC

Definition Kerberos tickets with modified Privilege Account Certificate (PAC)

Example Kerberos tickets are used as a sort of “pass card” to

Doc_ID 371 424

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Forged PAC

obtain access to resources. Once a domain controller authenticates a user, a TGT (ticket granting ticket) is granted with a limited lifespan. This is then used to obtain TGS (ticket granting service) and the TGS is what identifies a user to a resource on the network. A known vulnerability exists where PAC part of ticket can be modified to include groups which the user is not a member of. If a user on the network were to attempt to use such a ticket, this analytic would detect the altered ticket and generate an alert.

Trigger PAC of the ticket contains RIDs which are not TokenGroups attribute.

Recommended Settings No additional configuration needed.

*See the Forged PAC Analytic Type section for additional information.

Analytics

Bad User ID (by Source Host) Analytic Type The Bad User ID (by source host) analytic type identifies pre-authentication failures due to using account names that cannot be found within Active Directory. These incidents are grouped per source host. Every time a previously unseen machine is the source of a failed login due to bad user name, an incident is stored in the database. The count for the number of attempts is incremented each time that same machine attempts to authenticate with a bad user name until the specified day limit expires. After the time expires, any additional attempt will generate a new incident. This allows for a report on the number of times a particular host used bad user accounts to try to login during the time frame.

RECOMMENDED: Configure the day limit to 30 days.

Doc_ID 371 425

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

First configure and then enable this analytic policy to monitor for Bad user ID (by source host). Finally, enable alerting on incidents through the Navigation & Configuration of the SI Admin Console.

See the Bad User ID (by Source Host) Analytic Data Grid section for information on event data collected per incident.

Configure Bad User ID (by Source Host) Analytic Policy Open the Bad User ID (by source host) Analytic Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the Bad User ID (by source host) node.

The Settings tab is where the analytic trigger is defined.

The Policy tab is where filters can be added, additional actions configured, a custom schedule set, and the policy enabled.

Settings Tab

Doc_ID 371 426

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Set the Number of Days for which repeated authentication attempts by a machine using a bad user account will be tallied. An incident will be triggered for every previously unseen host that has a bad user account attempt login. Each additional attempt for the same host will be added to the total number of attempts through the limit of days set here, e.g. 30 days. After this number of days has elapsed from the first attempt, a new incident will be triggered for any additional attempt with a new count.

Policy Tab

The Policy tab for configuring analytics consists of three sub-tabs:

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

Doc_ID 371 427

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Event Type tab – Configured the same way a regular policy’s Policy & Template Configuration is configured. The only exception is that the Event Type Tab is hard coded, the Success Filter cannot be modified, and there is no AD Perpetrator (for Monitoring) filter.

l Optional: Scope the protocol to be monitored on the Authentication Protocol Filter. If enabling the analytic on a domain controller, also scope the login type. NOTE: The Exclude failed authentications with ‘N-2’ passwords option does not apply to this analytic and has been removed from the filter.

l Optional: Scope the domains to be included in or excluded from monitoring on the Domains/Servers Filter.

l Optional: Scope the servers to be included in or excluded from monitoring on the IP Addresses (from) Filter, the IP Addresses (to) Filter, the Hosts (from) Filter for Monitoring, or the Hosts (to) Filter for Monitoring. NOTE: Some authentication events may return only a host name (NetBIOS or FQDN), others may return only an IP Address. It is recommended to take this into account when entering filter values.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

Bad User ID (by Source Host) Analytic Data Grid The data grid on the Bad User ID (by source host) node lists one row per incident identified. These incidences are grouped per unique source machine.

Doc_ID 371 428

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

It includes the following information for each incident:

l Attacking Host – Name of the host from which a bad user account attempted to login

l Attacking Host IP Address – IP Address of the originating host

l Last Attempt – Date timestamp of the last event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Number of Accounts – Number of unique bad user accounts that attempted to login from this host

l Protocols – Protocol(s) used for the monitored operation

l Number of Attempts – Number of attempts monitored during the specified interval matching this rule

l Number of Hosts – Number of hosts accessed during the specified interval matching this rule

Information on the events which triggered the selected incident in the top data grid is displayed at the bottom:

Doc_ID 371 429

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Account Name – Name of the bad user account which attempted to login

l To Host – Name of the target host

l To Host IP Address – IP Address of the target host

l Protocol – Protocol used for the monitored operation

l Access Type – Type of authentication, e.g. RDP, CIFS, etc.

l Status – Detailed information on the error generated by the event

l Date/Time – Date and time of the monitored event. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Detected on DC – Fully-qualified name of the domain controller which detected the event

l Events Count – Number of identical events that occurred in one minute

This Analytic data grid employs features for sorting, filtering, searching, and more. See the Data Grid Functionality section for additional information.

Bad User ID (by User) Analytic Type The Bad User ID (by user) analytic type identifies pre-authentication failures due to using account names that cannot be found within Active Directory. These incidents are grouped per account name. Every time a previously unseen user that does not exist attempts to login within the specified day limit, an incident is stored in the database. The count for the number of attempts is incremented each time that same bad user account attempts to login until the specified day limit expires. After the time expires, any additional attempt will generate a new incident. This allows for a report on the number of times a particular bad user account tried to login during the time frame.

RECOMMENDED: Configure the day limit to 30 days.

First configure and then enable this analytic policy to monitor for Bad User ID (by user). Finally, enable alerting on incidents through the SI System Alerting Window.

See the Bad User ID (by User) Analytic Data Grid section for information on event data collected per incident.

Configure Bad User ID (by User) Analytic Policy Open the Bad User ID (by user) Analytic Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the Bad User ID (by user) node.

Doc_ID 371 430

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Settings tab is where the analytic trigger is defined.

The Policy tab is where filters can be added, additional actions configured, a custom schedule set, and the policy enabled.

Settings Tab

Set the Number of Days for which repeated use of the same bad user account will be tallied. An incident will be triggered for every previously unseen bad user account that attempts login. Each additional attempt for the same bad user account will be added to the total number of attempts through the limit of days set here, e.g. 30 days. After this number of days has elapsed from the first attempt, a new incident will be triggered for any additional attempt with a new count.

Policy Tab

Doc_ID 371 431

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Policy tab for configuring analytics consists of three sub-tabs:

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

l Event Type tab – Configured the same way a regular policy’s Event Type Tab is configured. The only exception is that the Event Type Tab is hard coded, the Success Filter cannot be modified, and there is no AD Perpetrator (for Monitoring) filter.

l Optional: Scope the protocol to be monitored on the Authentication Protocol Filter. If enabling the analytic on a domain controller, also scope the login type. NOTE: The Exclude failed authentications with ‘N-2’ passwords option does not apply to this analytic and has been removed from the filter.

l Optional: Scope the domains to be included in or excluded from monitoring on the Domains/Servers Filter.

Doc_ID 371 432

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Optional: Scope the servers to be included in or excluded from monitoring on the IP Addresses (from) Filter, the IP Addresses (to) Filter, the Hosts (from) Filter for Monitoring, or the Hosts (to) Filter for Monitoring. NOTE: Some authentication events may return only a host name (NetBIOS or FQDN), others may return only an IP Address. It is recommended to take this into account when entering filter values.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

Bad User ID (by User) Analytic Data Grid The data grid on the Bad User ID (by user) node lists one row per incident identified. These incidences are grouped per unique bad user name.

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

Doc_ID 371 433

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

It includes the following information for each incident:

l Account Name – Name of the bad user account which attempted to login

l Last Attempt – Date timestamp of the last event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Protocols – Protocol(s) used for the monitored operation

l Number of Attempts – Number of attempts monitored during the specified interval matching this rule

l Number of Hosts – Number of hosts accessed during the specified interval matching this rule

Information on the events which triggered the selected incident in the top data grid is displayed at the bottom:

l From Host – Name of the originating host

l From Host IP Address – IP Address of the originating host

l To Host – Name of the target host

l To Host IP Address – IP Address of the target host

l Protocol – Protocol used for the monitored operation

l Access Type – Type of authentication, e.g. RDP, CIFS, etc.

l Status – Detailed information on the error generated by the event

l Date/Time – Date and time of the monitored event. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Detected on DC – Fully-qualified name of the domain controller which detected the event

l Events Count – Number of identical events that occurred in one minute

This Analytic data grid employs features for sorting, filtering, searching, and more. See the Data Grid Functionality section for additional information.

Breached Password Analytic Type The Breached Password analytic type identifies multiple failed authentications followed by a successful authentication in the specified time frame.

Doc_ID 371 434

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

First configure and then enable this analytic policy to monitor for Breached Password. Finally, enable alerting on incidents through the SI System Alerting Window.

See the Breached Password Analytic Data Grid section for information on event data collected per incident.

Configure Breached Password Analytic Policy Open the Breached Password Analytic Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the Breached Password node.

The Settings tab is where the analytic trigger is defined.

The Policy tab is where filters can be added, additional actions configured, a custom schedule set, and the policy enabled.

Settings Tab

Doc_ID 371 435

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Set the Number of Failed Attempts preceding a successful login and the Interval Duration which will trigger the incident. The Interval Duration is set for (Hours:Minutes) and is capped at 23:59. When the specified number of failed login attempts for an individual user account precede a successful login within the specified interval duration, it will trigger an incident record.

By default authentication event data is cached in memory for 24 hours. When an incident is triggered, an incident record is saved to the database, and the associated events which triggered the incident are also saved to the database. Raw authentication event data that did not contribute to an incident are purged from memory once they are more than 24 hours old.

Policy Tab

The Policy tab for configuring analytics consists of three sub-tabs:

Doc_ID 371 436

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

l Event Type tab – Configured the same way a regular policy’s Event Type Tab is configured. The only exception is that the Event Type Tab is hard coded, and the Success Filter cannot be modified.

l Optional: Scope the protocol to be monitored on the Authentication Protocol Filter. If enabling the analytic on a domain controller, also scope the login type. NOTE: The Exclude failed authentications with ‘N-2’ passwords option requires a GPO within the organization be configured to ‘Enforce password history’ with a setting of a minimum of ‘3 passwords remembered’ or it will not have an effect. See the Authentication Protocol Filter section for additional information.

l Optional: Scope the domains to be included in or excluded from monitoring on the Domains/Servers Filter.

l Optional: Identify accounts to include in or exclude from being monitored on the AD Perpetrator Filter for Monitoring.

l Optional: Scope the servers to be included in or excluded from monitoring on the IP Addresses (from) Filter, the IP Addresses (to) Filter, the Hosts (from) Filter for Monitoring, or the Hosts (to) Filter for Monitoring. NOTE: Some authentication events may return only a host name (NetBIOS or FQDN), others may return only an IP Address. It is recommended to take this into account when entering filter values.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

Breached Password Analytic Data Grid The data grid on the Breached Password node lists one row per incident identified.

Doc_ID 371 437

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

It includes the following information for each incident:

l Attacking Account Name – Name of the account used the event which triggered the incident NOTE: The name will be red if the attacking account is the Administrator account

l Attacking Account SID – Security Identifier of the account used in the event which triggered the incident

l First Failed Attempt – Date timestamp of the first failed event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Last Failed Attempt – Date timestamp of the last failed event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Breach Date – Date timestamp of the first successful event for the triggered incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

Doc_ID 371 438

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Breach Source Host – Name of the originating host for the successful event

l Breach Source Host IP Address – IP Address of the originating host for the successful event

l Protocols – Protocol(s) used for the monitored operation

l Number of Attempts – Number of attempts monitored during the specified interval matching this rule

l Number of Hosts – Number of hosts accessed during the specified interval matching this rule

Information on the events which triggered the selected incident in the top data grid is displayed at the bottom:

l From Host – Name of the originating host

l From Host IP Address – IP Address of the originating host

l To Host – Name of the target host

l To Host IP Address – IP Address of the target host

l Protocol – Protocol used for the monitored operation

l Access Type – Type of authentication, e.g. RDP, CIFS, etc.

l Status – Detailed information on the error generated by the event

l Date/Time – Date and time of the monitored event. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Detected on DC – Fully-qualified name of the domain controller which detected the event

l Events Count – Number of identical events that occurred in one minute

This Analytic data grid employs features for sorting, filtering, searching, and more. See the Data Grid Functionality section for additional information.

Brute Force Attacks Analytic Type The Brute Force Attacks analytic type identifies failed attempts from a single host to access a given host.

RECOMMENDED: Configure a subset of servers to be monitored in order to avoid the excessive volume of event activity from monitoring all servers.

Doc_ID 371 439

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

First configure and then enable this analytic policy to monitor for Brute Force Attacks. Finally, enable alerting on incidents through the SI System Alerting Window.

See the Brute Force Attacks Analytic Data Grid section for information on event data collected per incident.

Configure Brute Force Attacks Analytic Policy Open the Brute Force Attacks Analytic Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the Brute Force Attacks node.

The Settings tab is where the analytic trigger is defined.

The Policy tab is where filters can be added, additional actions configured, a custom schedule set, and the policy enabled.

Settings Tab

Doc_ID 371 440

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Set the Number of Failed Logins and the Interval Duration which will trigger the incident. The Interval Duration is set for (Hours:Minutes) and is capped at 23:59. When the specified number of failed logins have occurred from a single host against a single host within the specified interval duration, it will trigger an incident record.

By default authentication event data is cached in memory for 24 hours. When an incident is triggered, an incident record is saved to the database, and the associated events which triggered the incident are also saved to the database. Raw authentication event data that did not contribute to an incident are purged from memory once they are more than 24 hours old.

The Configure Hosts link will redirect the window to the Policy > Event Type > Hosts (to) filter.

If checked, the Ignore failed logins for unresolved user names option will exclude bad user IDs from contributing to Brute Force Attacks incidents.

Policy Tab

The Policy tab for configuring analytics consists of three sub-tabs:

Doc_ID 371 441

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

l Event Type tab – Configured the same way a regular policy’s Event Type Tab is configured. The only exception is that the Event Type Tab is hard coded, and the Success Filter cannot be modified.

l Identify servers to include in or exclude from being monitored on the IP Addresses (from) Filter, the IP Addresses (to) Filter, the Hosts (from) Filter for Monitoring, or the Hosts (to) Filter for Monitoring. Alternatively, identify domains to include in or exclude from being monitored on the Domains/Servers Filter. NOTE: Some authentication events may return only a host name (NetBIOS or FQDN), others may return only an IP Address. It is recommended to take this into account when entering filter values.

l Optional: Scope the protocol to be monitored on the Authentication Protocol Filter. If enabling the analytic on a domain controller, also scope the login type. NOTE: The Exclude failed authentications with ‘N-2’ passwords option requires a GPO within the organization be configured to ‘Enforce password history’ with a setting of a minimum of ‘3 passwords remembered’ or it will not have an effect. See the Authentication Protocol Filter section for additional information.

l Optional: Scope the AD Perpetrators to be included in or excluded from monitoring on the AD Perpetrator Filter for Monitoring.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

Brute Force Attacks Analytic Data Grid The data grid on the Brute Force Attacks node lists one row per incident identified.

Doc_ID 371 442

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

It includes the following information for each incident:

l Attacking Host – Name of the host from which a bad user account attempted to login

l Attacking Host IP Address – IP Address of the originating host

l Attacking Host – Name of the originating host

l Attacking Host IP Address – IP Address of the originating host

l First Attempt – Date timestamp of the first event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Last Attempt – Date timestamp of the last event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Number of Attempts – Number of attempts monitored during the specified interval matching this rule

l Protocols – Protocol(s) used for the monitored operation

Doc_ID 371 443

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Information on the events which triggered the selected incident in the top data grid is displayed at the bottom:

l Account – Account name used for the attempted login

l Account SID – Security Identifier of the account used for the attempted login

l Date/Time – Date and time of the monitored event. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Protocol – Protocol used for the monitored operation

l Access Type – Type of authentication, e.g. RDP, CIFS, etc.

l Status – Detailed information on the error generated by the event

l Detected on DC – Fully-qualified name of the domain controller which detected the event

l Events Count – Number of identical events that occurred in one minute

This Analytic data grid employs features for sorting, filtering, searching, and more. See the Data Grid Functionality section for additional information.

Concurrent Logins Analytic Type The Concurrent Logins analytic type identifies logins from multiple locations within the specified time frame.

RECOMMENDED: Configure a subset of accounts and/or servers to be monitored in order to avoid the excessive volume of event activity from monitoring all.

First configure and then enable this analytic policy to monitor for Concurrent Logins. Finally, enable alerting on incidents through the SI System Alerting Window.

See the Concurrent Logins Analytic Data Grid section for information on event data collected per incident.

Configure Concurrent Logins Analytic Policy Open the Concurrent Logins Analytic Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the Concurrent Logins node.

The Settings tab is where the analytic trigger is defined.

The Policy tab is where filters can be added, additional actions configured, a custom schedule set, and the policy enabled.

Doc_ID 371 444

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Settings Tab

Set the Number of Hosts and the Interval Duration which will trigger the incident. The Interval Duration is set for (Hours:Minutes) and is capped at 23:59. When the specified number of hosts have successful logins by the same individual user account within the specified interval duration, it will trigger an incident record.

By default authentication event data is cached in memory for 24 hours. When an incident is triggered, an incident record is saved to the database, and the associated events which triggered the incident are also saved to the database. Raw authentication event data that did not contribute to an incident are purged from memory once they are more than 24 hours old.

Policy Tab

Doc_ID 371 445

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Policy tab for configuring analytics consists of three sub-tabs:

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

l Event Type tab – Configured the same way a regular policy’s Event Type Tab is configured. The only exception is that the Event Type Tab is hard coded, and the Success Filter cannot be modified.

l Optional: Scope the protocol to be monitored on the Authentication Protocol Filter. If enabling the analytic on a domain controller, also scope the login type. NOTE: The Exclude failed authentications with ‘N-2’ passwords option requires a GPO within the organization be configured to ‘Enforce password history’ with a setting of a minimum of ‘3 passwords remembered’ or it will not have an effect. See the Authentication Protocol Filter section for additional information.

Doc_ID 371 446

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Optional: Scope the domains to be included in or excluded from monitoring on the Domains/Servers Filter.

l Optional: Identify accounts to include in or exclude from being monitored on the AD Perpetrator Filter for Monitoring.

l Optional: Scope the servers to be included in or excluded from monitoring on the IP Addresses (from) Filter, the IP Addresses (to) Filter, the Hosts (from) Filter for Monitoring, or the Hosts (to) Filter for Monitoring. NOTE: Some authentication events may return only a host name (NetBIOS or FQDN), others may return only an IP Address. It is recommended to take this into account when entering filter values.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

Concurrent Logins Analytic Data Grid The data grid on the Concurrent Logins node lists one row per incident identified.

Doc_ID 371 447

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

It includes the following information for each incident:

l Attacking Account Name – Name of the account used the event which triggered the incident NOTE: The name will be red if the attacking account is the Administrator account

l Attacking Account SID – Security Identifier of the account used in the event which triggered the incident

l Number of Attacking Hosts – Number of hosts the account used to trigger the incident is logged into during the specified interval matching this rule

l First Attempt – Date timestamp of the first event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Last Attempt – Date timestamp of the last event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Protocols – Protocol(s) used for the monitored operation

l Number of Attempts – Number of attempts monitored during the specified interval matching this rule

Information on the events which triggered the selected incident in the top data grid is displayed at the bottom:

l From Host – Name of the originating host

l From Host IP Address – IP Address of the originating host

l To Host – Name of the target host

l To Host IP Address – IP Address of the target host

l Protocol – Protocol used for the monitored operation

l Access Type – Type of authentication, e.g. RDP, CIFS, etc.

l Status – Detailed information on the error generated by the event

l Date/Time – Date and time of the monitored event. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Detected on DC – Fully-qualified name of the domain controller which detected the event

Doc_ID 371 448

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Events Count – Number of identical events that occurred in one minute

This Analytic data grid employs features for sorting, filtering, searching, and more. See the Data Grid Functionality section for additional information.

File System Attacks (by User) Analytic Type The File System Attacks (by user) analytic type identifies when a significant number of file changes made by an account occurred in a short time period. Only paths selected by the user will be monitored. It is REQUIRED to configure at least one path in order enable this analytic. Selected paths are specific to the server for which they were selected.

If desired, the analytic can be configured to lockdown the monitored file system resource from ‘perpetrators’ who trigger an incident. This feature is only available on Windows file systems.

First configure and then enable this analytic policy to monitor for File System Attacks. Finally, enable alerting on incidents through the SI System Alerting Window.

See the File System Attacks (by User) Analytic Data Grid section for information on event data collected per incident.

Configure File System Attacks (by User) Analytic Policy Open the File System Attacks (by user) Analytic Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the File System Attacks (by user) node.

The Settings tab is where the analytic trigger is defined.

The Policy tab is where filters can be added, additional actions configured, a custom schedule set, and the policy enabled.

Settings Tab

Doc_ID 371 449

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Set the Number of Accessed Files and the Interval Duration which will trigger the incident. The Interval Duration is set for (Hours:Minutes) and is capped at 1:00. When a particular user causes the specified number of file changes to occur within the specified interval duration, it will trigger an incident record.

By default file event data is cached in memory for 1 hour. When an incident is triggered, an incident record is saved to the database, and the associated events which triggered the incident are also saved to the database. Raw file event data that did not contribute to an incident are purged from memory once they are more than 1 hour old.

Each event after an incident has been triggered will reset the interval timer. The event data will continue to be added to the incident until the incident is closed. An incident is only closed once no additional file event data arrives within the specified timeframe.

The File System Attacks (by user) Analytic Policy can be configured to enable automatic blocking of perpetrators who trigger an incident. Check the Enable Automatic Lockdown box and click Save. This will add the File System Lockdown Event Type to the analytic policy. After this feature has been enabled, the Modify Lockdown Perpetrators link will redirect the window to the Policy

Doc_ID 371 450

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

> Event Type: File System Lockdown > AD Perpetrator (for Lockdown) filter. As incidents occur, perpetrators of the triggering events will be added to the AD Perpetrators (for Lockdown) filter list and blocked from initiating future events.

Policy Tab for Monitoring Only

The Policy tab for configuring analytics consists of the following sub-tabs:

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

l Event Type tab – Configured the same way a regular policy’s Event Type Tab is configured. The only exception is that the Event Type Tab is hard coded.

l Optional: Scope the operations being monitored on the File System Filter for Monitoring. The default is to monitor Write and Rename operations. NOTE: We do not recommend scoping to include Read operations due to the quantity of files read within an organization.

l Optional: – Scope the AD Perpetrators to be included in or excluded from monitoring on the AD Perpetrator Filter for Monitoring.

l Required: Configure the Paths tab for Paths and Path Collections. This analytic requires at least one path be provided for file system location monitoring. Multiple paths and/or collections can be included and excluded, along with the option to monitor sub-folders. Remember, if no path is provided, an error message displays when the analytic policy is enabled: The “File System Analytic” policy must have at least one path to monitor defined.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

Policy Tab > Event Type for Lockdown

Doc_ID 371 451

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When the Enable Automatic Lockdown option is selected on the Settings tab, the Policy tab > Event Type tab includes the Event Type Tab. Like the File System Changes Event Type, this is hard coded, but can be removed by unchecking the Enable Automatic Lockdown box on the Settings tab.

l The File System Filter for Monitoring is hard coded to mirror the configuration of the File System Changes Event Type settings for the analytic.

l The AD Perpetrator Filter for Lockdown will auto-populate with perpetrators of the triggering events. The list is hard coded to be a ‘blocking’ list, not an ‘allow’ list.

l Optional – Scope the AD Perpetrators to block additional perpetrators.

l Optional – Perpetrators can also be removed from this list. NOTE: Perpetrators manually removed from the list may be automatically re-added if they triggered another incident.

File System Attacks (by User) Analytic Data Grid The data grid on the File System Attacks (by user) node lists one row per incident identified.

Doc_ID 371 452

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

It includes the following information for each incident:

l Attacking Account Name – Name of the account used the event which triggered the incident (the name will be red if the attacking account is the Administrator account)

l Attacking Account SID – Security Identifier of the account used in the event which triggered the incident

l First Attempt – Date timestamp of the first event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Last Attempt – Date timestamp of the last event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Number of Files – Number of affected files monitored, sum of both the events which triggered the incident and the events that have occurred before the incident closes

l Number of Events – Number of events monitored, sum of both the events which triggered the incident and the events that have occurred before the incident closes

Doc_ID 371 453

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Attacked Host Count – Number of affected hosts monitored, sum of both the events which triggered the incident and the events that have occurred before the incident closes

l Attacked Share Count – Number of affected shares monitored, sum of both the events which triggered the incident and the events that have occurred before the incident closes

l Primary Attacked Host – Name of the affected host with the highest number of events at the time that the incident was triggered (does not update after incident is triggered)

l Primary Attacked Share – Name of the affected share on the primary attacked host with the highest number of events at the time that the incident was triggered (does not update after incident is triggered)

l Primary Attacked Folder – Name of the affected folder on the primary attacked share with the highest number of events at the time that the incident was triggered (does not update after incident is triggered)

Information on the events which triggered the selected incident in the top data grid is displayed at the bottom:

l Date/Time – Date timestamp for when the event was monitored by the SI Agent, the specified time is the local time for the server where the SI Agent is deployed. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Agent: Domain – Domain where the SI Agent that monitored the event is deployed

l Affected Object: Host – Name of the host the security principal is trying to access

l Affected Object: IP Address – IP Address of the host the security principal is trying to access

l Affected Object: Class – Indicates if the event occurred against a file or folder

l Affected Object: Path – Original path of the affected file or folder

l Affected Object: New Path – New path of the affected file or folder

l Event: Name – Type of event monitored (the event name will be red if the event was blocked by the auto-blocking feature)

l Perpetrator: Process Name – Identifies remotely accessed objects with “system” or the name of process for locally accessed objects

l Perpetrator: Host – Originating host name for the monitored operation

l Perpetrator: IP Address – Originating host IP Address for the monitored operation (will be blank if affected host has an operating system older than 2008 R2)

l Perpetrator: Protocol – Name of the share used where the operation was monitored (will be blank if affected host has an operating system older than 2008 R2)

Doc_ID 371 454

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

This Analytic data grid employs features for sorting, filtering, searching, and more. See the Data Grid Functionality section for additional information.

Forged PAC Analytic Type The Forged Privilege Account Certificate (PAC) analytic type identifies Kerberos tickets with a modified PAC. By manipulating the PAC, a field in the Kerberos ticket that contains a user’s authorization data (in Active Directory this is group membership), an attacker is able to grant themselves additional elevated privileges.

First configure and then enable this analytic policy to monitor for Forged PAC. Finally, enable alerting on incidents through the SI System Alerting Window.

See the Forged PAC Analytic Data Grid section for information on event data collected per incident.

Configure Forged PAC Analytic Policy Open the Forged PAC Analytic Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the Forged PAC node.

The Settings tab is where the analytic trigger is defined.

The Policy tab is where filters can be added, additional actions configured, a custom schedule set, and the policy enabled.

Settings Tab

Doc_ID 371 455

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Remember, the Forged PAC analytic is monitoring for when the user is not a member of a group that is listed in the PAC section of the user’s Kerberos ticket. This analytic can be scoped to monitor specific groups. To reduce the number of false positives, StealthINTERCEPT only checks for a mismatch of sensitive groups as selected in the policy Settings tab.

Use this functionality to select specific RIDs that StealthINTERCEPT compares against the PAC and user’s for a mismatch to trigger the incident. Use the Add (+) button, which opens the Select AD Groups Windows, to select the desired Active Directory Group(s). After selection, the associated RID of that group is monitored for modifications. Remove (x) button removes the selected item(s) from the incident criteria.

Policy Tab

Doc_ID 371 456

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Policy tab for configuring analytics consists of three sub-tabs:

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

l Event Type tab – Configured the same way a regular policy’s Event Type Tab is configured. The only exception is that the Event Type Tab is hard coded, the Success Filter, and the Authentication Protocol Filter is hard coded to monitor only Kerberos protocol. These cannot be modified.

l Identify servers to include in or exclude from being monitored on the IP Addresses (from) Filter, the IP Addresses (to) Filter, the Hosts (from) Filter for Monitoring, or the Hosts (to) Filter for Monitoring. Alternatively, identify domains to include in or exclude from being monitored on the Domains/Servers Filter. NOTE: Some authentication events may return only a host name (NetBIOS or FQDN), others may return only an IP Address. It is recommended to take this into account when entering filter values.

Doc_ID 371 457

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Optional: If enabling the analytic on a domain controller, scope the login type to be monitored on the Authentication Protocol Filter. NOTE: The Exclude failed authentications with ‘N-2’ passwords option requires a GPO within the organization be configured to ‘Enforce password history’ with a setting of a minimum of ‘3 passwords remembered’ or it will not have an effect. See the Authentication Protocol Filter section for additional information.

l Optional: Scope the AD Perpetrators to be included in or excluded from monitoring on the AD Perpetrator Filter for Monitoring.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

Forged PAC Analytic Data Grid The data grid on the Forged PAC node lists one row per incident identified.

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

It includes the following information for each incident:

l From Host – Name of the originating host

l From Host IP Address – IP Address of the originating host

Doc_ID 371 458

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l To Host – Name of the target host

l To Host IP Address – IP Address of the target host

l Account Name – Name of the account that triggered an incident

l Account SID – Security Identifier of the account used in the event which triggered the incident

l Access Type – Type of authentication encryption, e.g. TGS: cifs/ enc:23/18, TGS: krbtgt/ enc: 23/18, etc.

l Status – Indication of whether or not the authentication was successful

l Date/Time – Date timestamp of the monitored event. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Detected on DC – Fully-qualified name of the domain controller which detected the incident

l PAC Delta – RID for group to which the account does not have access

Golden Ticket Analytic Type The Golden Tickets analytic type identifies Kerberos tickets that exceed the specified maximum lifetimes for a user ticket or maximum lifetimes for a user ticket renewal. Every time an account authenticates, the ‘ticket’ is checked against the maximum ticket lifetime and maximum renewals configured within this analytic type. Any ticket that exceeds either ‘maximum’ will trigger an incident.

First configure and then enable this analytic policy to monitor for Golden Tickets. Finally, enable alerting on incidents through the SI System Alerting Window.

See the Golden Tickets Analytic Data Grid section for information on event data collected per incident.

Configure Golden Tickets Analytic Policy Open the Golden Tickets Analytic Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the Golden Tickets node.

The Settings tab is where the analytic trigger is defined.

The Policy tab is where filters can be added, additional actions configured, a custom schedule set, and the policy enabled.

Settings Tab

Doc_ID 371 459

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Set the Maximum Lifetime for User Ticket [value] Hours and the Maximum Lifetime for User Ticket Renewal [value] Days which will trigger the incident. The default lifetime for user tickets is ten hours, and the renewal period is seven days. This analytic policy will check each ticket that requests authentication against the values set within this analytic policy. Any time a ticket exceeds either of these values, an incident is triggered.

Policy Tab

Doc_ID 371 460

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Policy tab for configuring analytics consists of three sub-tabs:

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

l Event Type tab – Configured the same way a regular policy’s Event Type Tab is configured. The only exception is that the Event Type Tab is hard coded, and the Success Filter cannot be modified. RECOMMENDED: Do not to configure any filters for this analytic type.

l Optional: If enabling the analytic on a domain controller, scope the login type to be monitored on the Authentication Protocol Filter. NOTE: The Exclude failed authentications with ‘N-2’ passwords option does not apply to this analytic and has been removed from the filter.

Doc_ID 371 461

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Optional: Scope the domains to be included in or excluded from monitoring on the Domains/Servers Filter.

l Optional: Identify accounts to include in or exclude from being monitored on the AD Perpetrator Filter for Monitoring.

l Optional: Scope the servers to be included in or excluded from monitoring on the IP Addresses (from) Filter, the IP Addresses (to) Filter, the Hosts (from) Filter for Monitoring, or the Hosts (to) Filter for Monitoring. NOTE: Some authentication events may return only a host name (NetBIOS or FQDN), others may return only an IP Address. It is recommended to take this into account when entering filter values.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

Golden Tickets Analytic Data Grid The data grid on the Golden Tickets node lists one row per incident identified.

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

It includes the following information for each incident:

Doc_ID 371 462

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l From Host – Name of the originating host

l From Host IP Address – IP Address of the originating host

l To Host – Name of the target host

l To Host IP Address – IP Address of the target host

l Account Name – Name of the account using a ticket that triggered an incident

l Account SID – Security Identifier of the account used in the event which triggered the incident

l Access Type – Type of authentication, e.g. RDP, CIFS, etc.

l Status – Indication of whether or not the authentication was successful

l Date/Time – Date timestamp of the ticket was checked and identified as exceeding the maximum ticket lifetime and maximum renewals. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Detected on DC – Fully-qualified name of the domain controller which detected the incident

l TGT StartTime – Date timestamp for the start time of the ticket, the specified time is the local time for the server where the SI Agent is deployed

l TGT EndTime – Date timestamp for the expiration time of the ticket, the specified time is the local time for the server where the SI Agent is deployed

l TGT MaxRenew – Date timestamp for the maximum renewal date of the ticket, the specified time is the local time for the server where the SI Agent is deployed

This Analytic data grid employs features for sorting, filtering, searching, and more. See the Data Grid Functionality section for additional information.

Horizontal Movement Attacks Analytic Type The Horizontal Movement Attacks analytic type identifies security principals that are accessing more than the threshold of resources during the specified time interval.

RECOMMENDED: Configure a subset of accounts and/or servers to be monitored in order to avoid the excessive volume of event activity from monitoring all.

First configure and then enable this analytic policy to monitor for Horizontal Movement Attacks. Finally, enable alerting on incidents through the SI System Alerting Window.

See the Horizontal Movement Attacks Analytic Data Grid section for information on event data collected per incident.

Configure Horizontal Movement Attacks Analytic Policy

Doc_ID 371 463

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Open the Horizontal Movement Attacks Analytic Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the Horizontal Movement Attacks node.

The Settings tab is where the analytic trigger is defined.

The Policy tab is where filters can be added, additional actions configured, a custom schedule set, and the policy enabled.

Settings Tab

Set the Number of Hosts and the Interval Duration which will trigger the incident. The Interval Duration is set for (Hours:Minutes) and is capped at 23:59. When successful or failed authentications of a given account across the specified number of hosts within the specified interval duration, it will trigger an incident record.

Doc_ID 371 464

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

By default authentication event data is cached in memory for 24 hours. When an incident is triggered, an incident record is saved to the database, and the associated events which triggered the incident are also saved to the database. Raw authentication event data that did not contribute to an incident are purged from memory once they are more than 24 hours old.

If checked, the Ignore failed logins for unresolved user names option will exclude bad user IDs from contributing to Horizontal Movement Attacks incidents.

Policy Tab

The Policy tab for configuring analytics consists of three sub-tabs:

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

Doc_ID 371 465

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Event Type tab – Configured the same way a regular policy’s Event Type Tab is configured. The only exception is that the Event Type Tab is hard coded, and the Success Filter cannot be modified.

l Identify accounts to include in or exclude from being monitored on the AD Perpetrator Filter for Monitoring.

l Optional: Scope the protocol to be monitored on the Authentication Protocol Filter. If enabling the analytic on a domain controller, also scope the login type. NOTE: The Exclude failed authentications with ‘N-2’ passwords option requires a GPO within the organization be configured to ‘Enforce password history’ with a setting of a minimum of ‘3 passwords remembered’ or it will not have an effect. See the Authentication Protocol Filter section for additional information.

l Optional: Scope the domains to be included in or excluded from monitoring on the Domains/Servers Filter.

l Optional: Scope the servers to be included in or excluded from monitoring on the IP Addresses (from) Filter, the IP Addresses (to) Filter, the Hosts (from) Filter for Monitoring, or the Hosts (to) Filter for Monitoring. NOTE: Some authentication events may return only a host name (NetBIOS or FQDN), others may return only an IP Address. It is recommended to take this into account when entering filter values.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

Horizontal Movement Attacks Analytic Data Grid The data grid on the Horizontal Movement Attacks node lists one row per incident identified.

Doc_ID 371 466

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

It includes the following information for each incident:

l Attacking Account Name – Name of the account used the event which triggered the incident (the name will be red if the attacking account is the Administrator account)

l Attacking Account SID – Security Identifier of the account used in the event which triggered the incident

l First Attempt – Date timestamp of the first event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Last Attempt – Date timestamp of the last event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Protocol – Protocol(s) used for the monitored operation

l Number of Attempts – Number of attempts monitored during the specified interval matching this rule

l Number of Hosts – Number of hosts accessed during the specified interval matching this rule

Doc_ID 371 467

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Information on the events which triggered the selected incident in the top data grid is displayed at the bottom:

l From Host – Name of the originating host

l From Host IP Address – IP Address of the originating host

l To Host – Name of the target host

l To Host IP Address – IP Address of the target host

l Protocol – Protocol used for the monitored operation

l Access Type – Type of authentication, e.g. RDP, CIFS, etc.

l Status – Detailed information on the error generated by the event

l Date/Time – Date timestamp of the monitored event. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Detected on DC – Fully-qualified name of the domain controller which detected the event

l Events Count – Number of identical events that occurred in one minute

This Analytic data grid employs features for sorting, filtering, searching, and more. See the Data Grid Functionality section for additional information.

Impersonation Logins Analytic Type The Impersonation Logins analytic type identifies multiple authenticated accounts from a single system within the specified time frame.

RECOMMENDED: Configure a subset of accounts and/or servers to be monitored in order to avoid the excessive volume of event activity from monitoring all.

First configure and then enable this analytic policy to monitor for Impersonation Logins. Finally, enable alerting on incidents through the SI System Alerting Window.

See the Impersonation Logins Analytic Data Grid section for information on event data collected per incident.

Configure Impersonation Logins Analytic Policy Open the Impersonation Logins Analytic Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the Impersonation Logins node.

The Settings tab is where the analytic trigger is defined.

Doc_ID 371 468

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Policy tab is where filters can be added, additional actions configured, a custom schedule set, and the policy enabled.

Settings Tab

Set the Number of Accounts and the Interval Duration which will trigger the incident. The Interval Duration is set for (Hours:Minutes) and is capped at 23:59. When the specified number of account credentials different from those used to log into the originating host have accessed services, applications, remote connections, etc. within the specified interval duration, it will trigger an incident record.

By default authentication event data is cached in memory for 24 hours. When an incident is triggered, an incident record is saved to the database, and the associated events which triggered the incident are also saved to the database. Raw authentication event data that did not contribute to an incident are purged from memory once they are more than 24 hours old.

Policy Tab

Doc_ID 371 469

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Policy tab for configuring analytics consists of three sub-tabs:

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

l Event Type tab – Configured the same way a regular policy’s Event Type Tab is configured. The only exception is that the Event Type Tab is hard coded, and the Success Filter cannot be modified.

l Optional: Scope the protocol to be monitored on the Authentication Protocol Filter. NOTE: The Exclude failed authentications with ‘N-2’ passwords option requires a GPO within the organization be configured to ‘Enforce password history’ with a setting of a minimum of ‘3 passwords remembered’ or it will not have an effect. See the Authentication Protocol Filter section for additional information.

Doc_ID 371 470

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Optional: – Scope the domains to be included in or excluded from monitoring on the Domains/Servers Filter.

l Optional: – Identify accounts to include in or exclude from being monitored on the AD Perpetrator Filter for Monitoring.

l Optional: – Scope the servers to be included in or excluded from monitoring on the IP Addresses (from) Filter, the IP Addresses (to) Filter, the Hosts (from) Filter for Monitoring, or the Hosts (to) Filter for Monitoring. NOTE: Some authentication events may return only a host name (NetBIOS or FQDN), others may return only an IP Address. It is recommended to take this into account when entering filter values.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

Impersonation Logins Analytic Data Grid The data grid on the Impersonation Logins node lists one row per incident identified.

Doc_ID 371 471

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

It includes the following information for each incident:

l Attacking Host – Name of the originating host from which a user account logged in

l Attacking Host IPAddress – IP Address of the originating host

l Number of Accounts – Number of user accounts that logged in from this host

l Accounts – Account name(s) used for the attempted impersonation

l First Attempt – Date timestamp of the first event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Last Attempt – Date timestamp of the last event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Protocols – Protocol(s) used for the monitored operation

l Number of Attempts – Number of attempts monitored during the specified interval matching this rule

Information on the events which triggered the selected incident in the top data grid is displayed at the bottom:

l Account Name – Account name used for the attempted impersonation

l Account SID – Security Identifier of the account used for the attempted impersonation

l To Host – Name of the target host

l To Host IP Address – IP Address of the target host

l Protocol – Protocol used for the monitored operation

l Access Type – Type of authentication, e.g. RDP, CIFS, etc.

l Status – Detailed information on the error generated by the event

l Date/Time – Date timestamp of the monitored event. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Detected on DC – Fully-qualified name of the domain controller which detected the event

l Events Count – Number of identical events that occurred in one minute

This Analytic data grid employs features for sorting, filtering, searching, and more. See the Data Grid Functionality section for additional information.

Doc_ID 371 472

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Kerberos Weak Encryption Analytic Type The Kerberos Weak Encryption analytic type identifies Kerberos tickets with RC4_HMAC_MD5 encryption by detecting the use of weak encryption. Various attack methods utilize weak Kerberos encryption cyphers, including Overpass-the-Hash.

First configure and then enable this analytic policy to monitor for Kerberos Weak Encryption. Finally, enable alerting on incidents through the SI System Alerting Window.

See the Kerberos Weak Encryption Analytic Data Grid section for information on event data collected per incident.

Configure Kerberos Weak Encryption Analytic Policy Open the Kerberos Weak Encryption Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the Kerberos Weak Encryption node.

The Policy tab for configuring analytics consists of three sub-tabs:

Doc_ID 371 473

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

l Event Type tab – Configured the same way a regular policy’s Event Type Tab is configured. The only exception is that the Event Type Tab is hard coded, the Success Filter, and the Authentication Protocol Filter is hard coded to monitor only Kerberos protocol. These cannot be modified.

l Identify servers to include in or exclude from being monitored on the IP Addresses (from) Filter, the IP Addresses (to) Filter, the Hosts (from) Filter for Monitoring, or the Hosts (to) Filter for Monitoring. Alternatively, identify domains to include in or exclude from being monitored on the Domains/Servers Filter. NOTE: Some authentication events may return only a host name (NetBIOS or FQDN), others may return only an IP Address. It is recommended to take this into account when entering filter values.

l Optional – If enabling the analytic on a domain controller, scope the login type to be monitored on the Authentication Protocol Filter. NOTE: The Exclude failed authentications with ‘N-2’ passwords option requires a GPO within the organization be configured to ‘Enforce password history’ with a setting of a minimum of ‘3 passwords remembered’ or it will not have an effect. See the Authentication Protocol Filter section for additional information.

l Optional – Scope the AD Perpetrators to be included in or excluded from monitoring on the AD Perpetrator Filter for Monitoring.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

Kerberos Weak Encryption Analytic Data Grid The data grid on the Kerberos Weak Encryption node lists one row per incident identified.

Doc_ID 371 474

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

It includes the following information for each incident:

l Date/Time – Date timestamp of the monitored event. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l From Host – Name of the originating host

l From Host IP Address – IP Address of the originating host

l To Host – Name of the target host

l To Host IP Address – IP Address of the target host

l Account Name – Name of the account that triggered an incident

l Account SID – Security Identifier of the account used in the event which triggered the incident

l Access Type – Type of authentication encryption, e.g. TGS: cifs/ enc:23/18, TGS: krbtgt/ enc: 23/18, etc.

l Status – Indication of whether or not the authentication was successful

l Detected on DC – Fully-qualified name of the domain controller which detected the incident

l Encryption Type – Type of encryption identified as weak which triggered the incident

User Account Hacking Analytic Type The User Account Hacking analytic type identifies multiple bad passwords provided for a given valid user account in the specified time interval.

Doc_ID 371 475

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

RECOMMENDED: Configure a subset of accounts to be monitored in order to avoid the excessive volume of event activity from monitoring all accounts.

First configure and then enable this analytic policy to monitor for User Account Hacking. Finally, enable alerting on incidents through the SI System Alerting Window.

See the User Account Hacking Analytic Data Grid section for information on event data collected per incident.

Configure User Account Hacking Analytic Policy Open the User Account Hacking Analytic Policy with either the associated gear icon on the Analytics interface or from the gear icon available at the User Account Hacking node.

The Settings tab is where the analytic trigger is defined.

The Policy tab is where filters can be added, additional actions configured, a custom schedule set, and the policy enabled.

Settings Tab

Doc_ID 371 476

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Set the Number of Failed Logins and the Interval Duration which will trigger the incident. The Interval Duration is set for (Hours:Minutes) and is capped at 23:59. When the specified number of failed logins have occurred for an individual user account within the specified interval duration, it will trigger an incident record.

By default authentication event data is cached in memory for 24 hours. When an incident is triggered, an incident record is saved to the database, and the associated events which triggered the incident are also saved to the database. Raw authentication event data that did not contribute to an incident are purged from memory once they are more than 24 hours old.

Use the Add (+) button to include additional triggers conditions. If any of the specified conditions are met, it will trigger an incident. For example, one trigger condition can be set to generate an incident if there are 5 Failed Logins during an interval of 1 minutes, and another trigger condition can be set to generate an incident if there are 10 Failed Logins during an interval of 30 minutes. If either condition is met, an incident is triggered. Use the Remove (x) button to remove trigger conditions.

The Configure Accounts link will redirect the window to the Policy > Event Type > AD Perpetrator filter.

If checked, the Ignore failed logins for unresolved user names option will exclude bad user IDs from contributing to User Account Hacking incidents.

Policy Tab

Doc_ID 371 477

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Policy tab for configuring analytics consists of three sub-tabs:

l General tab – Configured the same way a regular policy’s General Tab is configured. The only exception is that the Name and Description are hard coded, and cannot be modified. The Tags field is disabled for analytics.

l Event Type tab – Configured the same way a regular policy’s Event Type Tab is configured. The only exception is that the Event Type Tab is hard coded, and the Success Filter cannot be modified.

l Identify accounts to include in or exclude from being monitored on the AD Perpetrator Filter for Monitoring.

l Optional: Scope the protocol to be monitored on the Authentication Protocol Filter. If enabling the analytic on a domain controller, also scope the login type.

Doc_ID 371 478

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

NOTE: The Exclude failed authentications with ‘N-2’ passwords option requires a GPO within the organization be configured to ‘Enforce password history’ with a setting of a minimum of ‘3 passwords remembered’ or it will not have an effect. See the Authentication Protocol Filter section for additional information.

l Optional: Scope the domains to be included in or excluded from monitoring on the Domains/Servers Filter.

l Optional: Scope the servers to be included in or excluded from monitoring on the IP Addresses (from) Filter, the IP Addresses (to) Filter, the Hosts (from) Filter for Monitoring, or the Hosts (to) Filter for Monitoring. NOTE: Some authentication events may return only a host name (NetBIOS or FQDN), others may return only an IP Address. It is recommended to take this into account when entering filter values.

l Actions tab – Configured the same way a regular policy’s Actions Tab is configured. The only exceptions are that the “Send to Event DB” and “Email Notifications” options are disabled. The event data collected by analytic policies are only stored in memory until an incident is triggered. For the “Send Raw Data to SIEM” option, use caution, as this will send all raw data not the triggered incident, which could be a large volume of data. To send notifications on incidents, use the SI System Alerting Window to configure Email and SIEM alerts.

User Account Hacking Analytic Data Grid The data grid on the User Account Hacking node lists one row per incident identified.

Doc_ID 371 479

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The data grid can be filtered according to the Event Tracker Status: All, New, Reviewed. See the Recent Events Tab section for additional information.

It includes the following information for each incident:

l Attacked Account Name – Name of the account used the event which triggered the incident (the name will be red if the attacking account is the Administrator account)

l Attacked Account SID – Security Identifier of the account used in the event which triggered the incident

l First Attempt – Date timestamp of the first event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Last Attempt – Date timestamp of the last event which triggered the incident. Hover over data in this column to view Local time (of the Enterprise Manager) and UTC time simultaneously.

l Number of Attempts – Number of attempts monitored during the specified interval matching this rule

Doc_ID 371 480

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Information on the events which triggered the selected incident in the top data grid is displayed at the bottom:

l From Host – Name of the originating host

l From Host IP Address – IP Address of the originating host

l Protocol – Protocol used for the monitored operation

l Access Type – Type of authentication, e.g. RDP, CIFS, etc.

l Date/Time – Date timestamp of the monitored event. Hover over data in this column to view Agent time, Local time (of the Enterprise Manager), and UTC time simultaneously.

l Status – Detailed information on the error generated by the event

l Detected on DC – Fully-qualified name of the domain controller which detected the event

l Events Count – Number of identical events that occurred in one minute

This Analytic data grid employs features for sorting, filtering, searching, and more. See the Data Grid Functionality section for additional information.

Doc_ID 371 481

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® LDAP Operations Center The LDAP Operations Center within the SI Admin Console is responsible for reporting on LDAP query execution times and number of objects returned, LDAP operations. This is accomplished through data collection tasks which monitor LDAP queries occurring during a specific interval of time, or a sample. The task can be configured to gather multiple samples consecutively with flexible filtering options including the ability to monitor or ignore queries for specific OUs or from specific perpetrators.

The LDAP Operations policy within the SI Admin Console is different from all event and authentication policies. The SI event and authentication policies are designed to monitor or block activity across an organization’s network either continuously or during a specified schedule. The SI LDAP Operations policy is a one-time data collection task which ‘counts’ the number of queries matching the specified filters that LDAP receives during a sampling.

This chapter provides the necessary information and available options for configuring an LDAP Operations policy. Remember, the LDAP Operations Center is only accessible by users with Administrator role.

Click the LDAP Operations Center button at the bottom of the Navigation pane below the Policy Center to open the LDAP interface.

Only one LDAP Operations policy can be running at any time, there cannot be overlapping data collection tasks which monitor LDAP queries. The UI enforces this behavior.

Doc_ID 371 482

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® Create & Configure an LDAP Policy Follow the steps to create and configure a new LDAP Operations policy.

File > New > Policy Add (+)

Use either the Menu’s File > New > Policy option or the Add (+) button to create a new LDAP Operations policy.

NOTE: The Remove (x) button deletes the selected policy from the list.

In the Display area provide a unique descriptive Policy Name in the textbox. By default the policy is Enabled.

In the Reports Configuration section, use the Add (+) button to open the Reports Tab and assign report templates from the LDAP Monitoring Folder Report Templates.

Doc_ID 371 483

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The information requested on the Polling Configuration and LDAP Agents tabs are required for all LDAP Policies. The Polling Configuration tab is divided into two sections. The LDAP Data Sampling Configuration section is required, and the Use Threshold Filters section is optional. Provide the following information:

LDAP Data Sampling Configuration section – REQUIRED

l Start Time – Enter the date and time for when this data sampling begins. The drop-down arrow opens a calendar view for selecting the date. By default the Date and Time display when Step 1 is complete.

l Date/Time format – [MM/DD/YYYY H:MM:SS AM/PM]

l Adjust to Agent Time Zone – This option indicates if the SI Agents assigned to this task collect data simultaneously or according to the SI Agent’s physical location

Doc_ID 371 484

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Unchecked – Simultaneous sampling starts at the specified time according to the SI Admin Console’s time zone.

l For example, uncheck this option to collect samplings for a specific block of time no matter where the SI Agent is located.

l Checked – Sampling starts at the specified time according to the time zone of the SI Agent’s physical location.

l For example, check this option to collect samplings for corresponding blocks of time like the start of the work day.

l Number of Samples – Type or use the arrows to indicate how many samples this data collection task includes. These samples are taken consecutively.

l Duration of Samples – Type or use the arrows to indicate the time interval for each sample.

l Sampling Measure – Use the drop-down menu to select the time interval’s units:

l Minutes

l Hours

l Days

l Weeks

Use Threshold Filters section – OPTIONAL

The Threshold Filters narrow the samplings to only include LDAP Queries that meet the Minimum Query Execution Time and/or the Minimum Object Result Count set at the bottom of the Polling Configuration tab. Follow these remaining steps to configure the Threshold Filters.

l Check the Use Threshold Filters box to activate the section.

l Toggle to the desired comparison operator (“AND” or “OR”) in the filter statement by clicking on it

l Filter by: Execution Time “AND” Object Result Count – Samplings only include LDAP queries that meet both minimums.

Doc_ID 371 485

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Filter by: Execution Time “OR” Object Result Count – Samplings include and LDAP queries that meet either minimum.

l Minimum Execution Time – The minimum amount of time an LDAP query takes to process for it to be included in these samplings.

l Minimum Object Result Count – The minimum number of objects an LDAP query returns for it to be included in these samplings.

Select the LDAP Agents tab, which is required for all LDAP Policies. Select the SI Agent(s) that are collecting the samples by either checking the box for the desired agent or checking the Select All box at the top of the LDAP Agents tab. There is a Refresh button that ensures all available SI Agents are listed.

NOTE: If deciding whether or not to use the Adjust to Agent Time Zone option on the Polling Configuration tab, the LDAP Agents list includes the UTC Offset to indicate the time zones where the SI Agents are physically located.

At least one SI Agent must be assigned. A warning message appears as a reminder if the policy is Saved without having an SI Agent assigned.

The AD Objects and Containers and AD Classes tabs are OPTIONAL filters that can be set on the samplings. The filters can be set to either Include or Exclude the selections.

l See the AD Objects and Containers Filter section for instructions on adding a filter in the AD Objects and Containers tab.

l See the AD Classes Filter section for instructions on adding filters to the AD Classes tab.

Doc_ID 371 486

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Client IP Address tab is an OPTIONAL filter that can be set on the samplings. The filter can either Include or Exclude specified machines making LDAP queries. Client Addresses can be manually entered at the top (wild cards are accepted, as shown in the example). The Collection Box button opens the Collection Manager Window to the appropriate Collection Category. The Remove (x) buttons delete the selected item(s) from that box.

NOTE: To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic IP Addresses Collection. See the Collection Manager Window section for additional information.

The AD Perpetrator tab is an OPTIONAL filter that can be set on the samplings. The filter can be set to either Include or Exclude the selections. See the AD Perpetrator Filter for Monitoring section for instructions on adding filters to the AD Perpetrator tab.

NOTE: To enable a Dynamic Policy, use the Collection Box button to select the desired Dynamic Perpetrators Collection. See the Collection Manager Window section for additional information.

Doc_ID 371 487

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Click Save to set desired configurations.

The new LDAP Operations policy shows at the top of the LDAP Monitor list and is queued to run at its scheduled time.

Doc_ID 371 488

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® Troubleshooting within the SI Admin Console The following information provides basic troubleshooting techniques and frequently asked questions (FAQs) for SI Admin Console users.

FAQ: Microsoft just released a security bulletin that impacts LSASS. How do I know if the Microsoft KB will affect the SI Agent instrumentation?

The SI Agent has been configured to monitor LSASS after a reboot (triggered by the Microsoft KB). If LSASS stops shortly after a reboot (default within five minutes), then the SI Agent will be stopped and service will be changed to manual start.

RECOMMENDED: Reach out to Stealthbits Support prior to restarting the SI Agent, as a hotfix may exist which will prevent future issues with that Microsoft Security Bulletin.

There is an SI Operations Alert which is sent when the LSASS process stops shortly after a reboot: LSASS process terminated. If this occurs, it requires the SI Administrator to take action as all monitoring/blocking by that SI Agent will be stopped.

RECOMMENDED: Enable Email notification for this alert. See the Troubleshooting within the SI Admin Console section for additional information.

FAQ: The user interface is not displaying correctly and windows are cut off:

If any of the dialogs in the SI Admin Console have buttons or other user interface (UI) elements hidden or partially hidden, then the SI user is advised to reduce their Windows font size. For example some high resolution laptops may have their system font size set to a default of “Medium”. In such cases it may be necessary to change this to “Small” in order for all dialogs in the SI console to be displayed fully.

FAQ: How are Active Directory and Authentication raw events handled by StealthINTERCEPT?

There are two streams of data with their own memory buffers: one for Active Directory and Authentication traffic. This allows the Active Directory event data to flow without interruption even if there is a flood of Authentication traffic. A flood in Authentication traffic could result in a loss of Authentication event data. However, this will not impact Active Directory event data.

FAQ: How can I prevent flooding my memory with authentication traffic?

The options in the Navigation & Configuration of the SI Admin Console provide SI Administrators with a method of filtering out authentication event data from selected hosts and/or accounts. These options can be configured to not collect authentication traffic from sources known to be safe. This affects what gets sent to the SI Agent. It will have a direct impact on scalability for the organization’s environment.

Doc_ID 371 489

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® LSASS Process Terminated In order for the SI Agent to collect real-time activity data, it hooks into (intercepts) specific Microsoft API’s in the LSASS process. Occasionally Microsoft issues KB’s (hot-fixes) which alter the LSASS components. Most of these hot-fixes do not alter the API’s in terms of the number or type parameters passed into them or values returned which are monitored by the SI Agent, and therefore do not impact operation of the SI Agent. Infrequently Microsoft issues a KB which changes one of these API’s in a way that can result in interfering with the SI Agent instrumentation. This in turn can result in an exception which causes the LSASS process to terminate. Historically, an update resulting in this type of exception is released less than once a year. When it does occur, such a conflict is typically manifested within a minute of boot up, often before the GINA allowing interactive login is initialized. When the Windows operating system (OS) detects such a situation, it will initiate a reboot of the OS. The end result can be an OS reboot loop which is resolved by either applying a ‘counter’ patch from Stealthbits to adapt to the Microsoft change or by setting the StealthINTERCEPT Agent service from its default ‘automatic start’ to ‘disabled’ or ‘manual start’ so that on the next reboot the SI hooks are not deployed.

Starting with StealthINTERCEPT v4.0, the SI Agent was updated to detect if the LSASS process has terminated. If an LSASS termination is observed within the first five minutes from last reboot, then the SI Agent assumes it is due to the above situation and will take the following two actions well before the OS shuts down for the first time:

l First, it sends an alert to the Enterprise Manager, “LSASS shutdown detected”

l Second, it sets itself to “manual start” so that upon reboot the SI instrumentation is not loaded

While this does result in a suspension of further SI event monitoring and/or blocking on the affected domain controller, it ensures the domain controller continues to operate normally. Once the counter patch provided by Stealthbits is deployed, the SI user can then restart the SI Agent from the SI Admin Console. When started from the console, the console will first check to see if the SI Agent is currently set to ‘manual start’ mode. If this is the case, then the StealthINTERCEPT Agent service is set back to ‘automatic start’ mode and restarted, restoring normal operation.

It is necessary for Stealthbits to have both a primary and a secondary technical contact registered to receive the notifications relating to Microsoft-issued KBs affecting LSASS and the counter patch (if one is needed) available throughout the lifetime of SI usage. Contact the organization’s Stealthbits Sales Representative or Stealthbits Support to ensure that these contacts have been registered. Stealthbits will issue notifications to these registered technical contacts.

Doc_ID 371 490

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Prior to Microsoft releasing a KB which alters the LSASS components in a manner that causes a conflict with the SI agent, Stealthbits will first send a notification informing the registered technical contact(s) of the release along with detailed instructions on how to obtain and apply the relevant SI Agent counter patch. Counter patches are typically made available via these notifications 24 hours or more prior to Microsoft issuing the incompatible KB.

Since this requires the SI Administrator to take action, there is an SI Operations alert specific to this event.

RECOMMENDED: Enable the LSASS process terminated SI Operations Alert. The following instructions will explain how to configure email notification for this alert.

Starting with StealthINTERCEPT v5.0, the SI Agent can be enabled with a safe mode which would prevent the Active Directory monitoring module of an agent from loading if any LSASS change is detected. See the Agents Interface section for additional information.

How To Enable LSASS Process Terminated Email Alert Follow the steps to enable email notifications of the LSASS process terminated SI Operations Alert.

NOTE: These steps require the StealthINTERCEPT Administrator user role. They also assume that the SMTP host information has been configured and Email alerts have been enabled. See the SI System Alerting Window section for additional information

Open the SI System Alerting Window (Configuration > Alerts). On the Email tab, select Configure.

Create a Message Profile for the LSASS notification with the recipient(s) to be notified when the LSASS process terminates. See the SI System Alerting Window section for additional information.

Doc_ID 371 491

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Select Events, and then select Operations on the left. Check the LSASS process terminated event alert and assign (select from drop-down menu) the Message Profile created in Step 2. See the SI System Alerting Window section for additional information.

Ensure that the Email alerts are Enabled and click OK.

When the LSASS process terminated event alert is triggered, an email notification is sent to the assigned (Step 2) recipient(s).

SI Agent Not Communicating with the Enterprise Manager If the SI Agent is not communicating with the Enterprise Manager, the following questions should be addressed:

l Is there a firewall blocking communication?

l If yes, ensure the Windows Firewall has an ‘inbound’ rule to open port 3136 and an ‘outbound’ rule to open port 3136.

Doc_ID 371 492

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Alternatively, have an ‘inbound’ rule to ‘allow connection’ (General tab) for the SI Agent, (typically …\StealthINTERCEPT\SIWindowsAgent\SIWindowsAgent.exe) specified on Program and Services tab along with selecting the This Program radio button.

l Is the server where the SI Agent has been deployed has multiple network adapters (multi- homed)?

l If yes, then the SI Agent is likely trying to communicate with the Enterprise Manager through the wrong network. See the Bind To section for instructions on resolving this issue.

Please contact Stealthbits Support if these recommendations do not resolve the issue.

Bind To For the SI Agent to communicate in a multiple network card environment the ‘… bindTo …’ line in the SIWindowsAgent.exe.config file needs to be uncommented set to the IP Address associated with the desired local (to agent) network adapter or the Name of the desired network adapter that is to be used to communicate with the Enterprise Manager. The installer will attempt to configure this setting if the installer detects multiple NICs. If the setting chosen does not work in the environment, it may need to be set manually.

The default location of the SIWindowsAgent.exe.config file is: …\Stealthbits\StealthINTERCEPT\SIWindowsAgent

Exchange Lockdown Considerations When an Exchange Lockdown policy is first enabled, operations that are expected to be locked down by the policy may not be blocked due to existing connections. It is necessary to ensure the users are logged off before testing the blocking behavior of the policy. The safest way to resolve existing connections and ensure events to be blocked are being blocked is to:

l For Outlook – Restart the MSExchangeRPC service

l For w3wp clients (e.g. OWA, PowerShell, EWS, ECP, ActiveSync) – Restart IIS

Delegations through Outlook In 2010, delegation through Outlook actually performs three operations.

Doc_ID 371 493

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The three operations are:

l The delegate acquires Send on Behalf of permission for the user’s mailbox

l Outlook updates the ACLs for individual mailbox folders with the permissions that were set for the delegate on the Delegates tab

l Outlook creates a hidden rule in the user’s Inbox to forward incoming meeting and task requests and responses to the delegate

The first option does not use an Exchange API. Therefore, this action cannot be blocked by an Event Type Tab policy. However, it is possible to achieve the desired blocking effect by creating a corresponding Event Type Tab policy to block any Send on Behalf of permission changes.

Stealthbits recommends using the following Event Filters on the corresponding Active Directory Lockdown policy:

On the AD Event Filter tab:

l Operations – All (Object Add, Object Deleted, Object Modified, and Object Moved or Renamed)

l On the AD Classes and Attributes Filter tab:

l Block Attributes – publicDelegates

Doc_ID 371 494

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When both the Exchange Lockdown policy and the Active Directory Lockdown policy are enabled, performing delegation or folder permission changes will result in warnings.

The Active Directory Lockdown policy will block the Send on Behalf of permission changes.

The Exchange Lockdown policy blocks the folder permission changes.

With both lockdown policies working together, it is possible to block changes to existing connections.

Doc_ID 371 495

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® Best Practices for StealthINTERCEPT Users The following information provides general best practices that all SI users should take into consideration when using the SI Admin Console.

Best Practice #1 – Collect What You Need, NOT Everything While StealthINTERCEPT is capable of collecting many events, it is recommended to carefully scope policies, e.g. admin group membership, finance data access, or VIP mailbox non-owner logons. Excessive data events accumulating from monitoring everything can overwhelm the SI user with ‘noise,’ fill the StealthINTERCEPT databases prematurely, and adversely impact performance on the agent server (domain controller, file server, or Exchange server).

For best results, target the at-risk, sensitive, and suspect objects and activities for auditing and blocking:

l Financial data

l Research and development data

l Administrative accounts

l C-Level accounts and mailboxes

l Users and data which may be used or accessed suspiciously, or may be compromised

Best Practice #2 – Database Maintenance? Use It! The Database Maintenance Window feature automatically grooms the database to optimize performance. Whether choosing to archive or delete, this is always a good feature to enable.

Best Practice #3 – Analytics? Turn on One at a Time & Tune Analytics provide organizations with the ability to capture and analyze authentication or file system traffic. The best way to employ analytics is to turn on one at a time and then ‘tune’ it to the targeted environment before turning on another. Each environment generates unique authentication or file system ‘noise’ which can be filtered out by adjusting triggers and filters. Once the analytic is in tune with the environment, move to the next one desired.

Doc_ID 371 496

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® Best Practice #4 – Monitor before Blocking The lockdown event types are used to block events. When configuring a blocking policy, it is always a best practice to configure and enable a monitoring policy with the desired filters first as a trial run. This will allow the SI user to ensure the filters set will block events the way they were intended. Once the desired filters are confirmed, then the blocking policy is good-to-go.

Best Practice #5 – File System ‘Read’ Monitoring, in Moderation It is recommended to limit the use of monitoring Read events within a file system to those files containing very sensitive data (e.g. super-secret blends of herbs and spices, launch codes, etc.). The volume of Read events in most environments can fill the StealthINTERCEPT databases prematurely.

Doc_ID 371 497

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® More Information Identify threats. Secure data. Reduce risk.

Stealthbits, now part of Netwrix is a data security software company focused on protecting an organization’s credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.

For information on our products and solution lines, check out our website at www.stealthbits.com or send an email to our information center at [email protected].

If you would like to speak with a Stealthbits Sales Representative, please contact us at +1.201.447.9300 or via email at [email protected].

Have questions? Check out our online Documentation or our Training Videos (requires login): https://www.stealthbits.com/documentation. To speak to a Stealthbits Representative: please contact Stealthbits Support at +1.201.447.9359 or via email at [email protected].

Need formal training on how to use a product more effectively in your organization? Stealthbits is proud to offer FREE online training to all customers and prospects! For schedule information, visit: https://www.stealthbits.com/on-demand-training.

Doc_ID 371 498

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT® StealthINTERCEPT Appendices See the following appendices for additional information:

l Appendix: Release Notes

l Appendix: QIDmap Information for QRadar SIEM Integration

l Appendix: StealthINTERCEPT Stored Procedures

l Appendix: PowerShell API Integration

l Appendix: Default Custom Scripts

l Appendix: Action Template Custom Scripts

Appendix: Release Notes The following information highlights the new and improved features introduced over the past StealthINTERCEPT builds.

StealthINTERCEPT v7.3 New & Improved Features The new and improved features introduced in StealthINTERCEPT v7.3 released in June 2021 include:

l NEW Forged PAC Tab on the StealthDEFEND Configuration window

l Ability to integrate Forged PAC analytic data with StealthDEFEND

l Improvements– Appendix: PowerShell API Integration

l Added additional StealthDEFEND APIs that dictate where the event data is sent to

l Improvements – Get-SIAgentStatus Cmdlet Enhancement

l StealthINTERCEPT PowerShell cmdlet Get-SIAgentStatus returns improved data regarding the current SI Agent Status to the rows seen in the Agents Interface data grid

l Improvements – Schema Updates

l Event GUID added to the event data used to better correlate data between StealthINTERCEPT and StealthDEFEND databases. UTCTimesRow has been added to the event data.

Doc_ID 371 499

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Improvements – StealthDEFEND Configuration Window's Event Sink Tab

l Event Sink Tab in the StealthDEFEND Configuration Window uses Protobuf as the default protocol to align with StealthDEFEND 2.7 and the Stealthbits Activity Monitor 6.0

l Improvements – Updated SQLite Versions

l #define SQLITE_VERSION "3.7.17" -> #define SQLITE_VERSION "3.35.4"

l System.Data.SQLite.Core.1.0.109.2 -> Stub.System.Data.SQLite.Core.NetFramework 1.0.113.3

l Improvements – Database Encryption

l Improved encryption of data connection string (AESCrypto with ID) so each deployment has unique keys

l Improvements – AffectedObjectGUID Enhancement

l AffectedObjectGUID added as a data field to SMTP, Syslog, and the right-click PowerShell script

l Improvements – Enhanced Authentication Lockdown Policy

l Added support to block Local, Remote or both authentication activity to Domain Controllers (provides ability to support tiered access model). Changed error messages for blocked local/rdp logins. When login blocked see error: "Your account is configured to prevent you from using the PC. Please try another PC."

StealthINTERCEPT v7.2 New & Improved Features The new and improved features introduced in StealthINTERCEPTv7.2 released in December 2020 include:

l NEW Password Safe Configuration Window

l Configure profiles for Agent Interface actions with appropriate credentials to access a third party password safe (such as Beyond Trust)

l NEW Panzura Support

l Added Panzura support for NAS File Activity Monitoring

l Improvements – Internal architecture change

l ADSI calls have been replaced with DirRead in ADMon for internal architectural updates which improves both performance and stability

l Improvements – Improved product integration

Doc_ID 371 500

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l StealthDEFEND and StealthRECOVER integration has been improved integration enhancements

l Improvements – EPE Settings Window

l New Custom Messages Editor window for defining custom User Feedback Module messages

l Improvements– File System Filter for Monitoring

l Monitors local shares operations such as add, remove, modifications, and permissions changes

l Improvements – File Monitor Settings Windows

l Global setting added to include Folder "list / read" operations for File System events

l Improvements – Event Viewer Window and Recent Events Tab

l Affected Object GUID event details

StealthINTERCEPT v7.1 New & Improved Features The new and improved features introduced in StealthINTERCEPT v7.1 released in August 2020 include:

l NEW Event Type Tab

l Monitors on User's accessing or reading specific security related AD Attributes

l NEW Event Type Tab

l Ability to scope for FSMO Roles on Domains and Servers with a specified AD Perpetrator

l New Event Type filters:

l FSMO Roles Filter – Monitors changes in FSMO role assignments on Domain Controllers

l NEW LDAP Attributes Filter

l Filters LDAP activity for user specified LDAP Attributes

l NEW Honey Token Tab on the StealthDEFEND Configuration window

l Ability to integrate with StealthDEFEND in order to successfully lay an LDAP Deception trap using StealthDEFEND Honey Token configuration

l NEW SI Database Connection Manager

l See the SI Database Connection Manager section in the StealthINTERCEPT Installation & Upgrade User Guide for additional information

Doc_ID 371 501

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Improvements– Appendix: PowerShell API Integration

l Added informative, Enterprise Password Enforcement (EPE), and LDAP Deception for StealthDEFEND APIs as well as new collection commands

l Improvements – Event Type Tab

l Monitors successful, failed, or both types of events with the added Success filter

l Improvements – LDAP Query Filter for Monitoring

l Ability to set a maximum and minimum number for objects returned by the filter

l Improvements – LDAP Filter

l Scope the policy to include one or more communication security types to further filter the LDAP query properties

l AP filter is where the policy can be scoped to include one or more communication security types. The search scope option further filters based on a match to the selected scope of the LDAP query. security configuration methods.

l Improvements – Perpetrators to Exclude Filter

l New scoping option added for Perpetrators Collection

l Improvements – Event Database Configuration Window

l Displays current connection settings for the NVMonitorData database (events) database

l To change the credentials and/or SQL Server host information, see the SI DB Connection Manager program in the StealthINTERCEPT Installation & Upgrade User Guide for additional information.

l Improvements– Additional New Policy Templates

l Directory Read: Malicious DPAPI Secret Reveal

l LDAP: Account Reconnaissance

l LDAP: GMSA Password

l StealthDEFEND for AD LDAP

l Improvements – Modified TAGS Node

l DPAPI

l GMSA

l Password

l NEW 7.1 TEMPLATES

Doc_ID 371 502

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

StealthINTERCEPT v7.0 New & Improved Features The new and improved features introduced in StealthINTERCEPT v7.0 released January 2020 include:

l NEW Infrastructure Communication Change from .NET Remoting to gRPC

l See the Upgrade Instructions section in the StealthINTERCEPT Installation & Upgrade User Guide for additional information

l NEW EPE Settings Window

l Passwords Hash Database Folder settings and update options

l Global Rules filters for the EPE Event Type:

l Modify Passwords Dictionary

l Modify List of Words for Character Substitution

l Modify Character Substitution Mapping

l NEW EPE User Feedback Module

l See the EPE User Feedback Module section in the StealthINTERCEPT Installation & Upgrade User Guide for additional information

l NEW Event Type Tab

l Scope and Lockdown specific changes to LDAP

l New Event Type filters:

l LDAP Query Filter for Lockdown

l NEW Permissions Filter

l Scopes the data that is going to be transferred based on partial or exact matches on permission types

l NEW Advanced Filter

l Scope the GPO Setting Changes event type with a visual filter builder to either include or exclude attribute conditions for collection

l Improvements – Filter Data

l Auto filter row dropdown displays underneath the column name for all data grids

l Improvements – Investigate Interface

l Investigate Interface for additional investigation reports

l Full text search queries the SQL database for all matches to the search criteria provided

Doc_ID 371 503

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Improvements – User Account Control filters for User Account Control Window and User Account Control Filter

l Set User Account Control attribute flags on AD Attributes

l Improvements – Agents Interface

l Free Space column

l Deploy an SI Agent with the Agents Interface option enabled to create a local copy of the Passwords Hash database on the SI Agent

l Improvements – Alerts Interface

l Alerts Interface uses a third party comparison tool to highlight the xml changes made to a Policy

l Alerts Cleanup window added analytics and cleanup scheduling options

l Improvements – StealthDEFEND Configuration Windows

l Choose which policies send their event data to StealthDEFEND from this window. This option is linked to the Send to StealthDEFEND checkbox within the Actions tab of the policy.

l Improvements – Password Rules Filter

l The Test Passwords window allows users to test the password complexity requirements set in the Password Rules filter against a pending password

l Improvements – Authentication Protocol Filter

l Added TGT monitoring for Kerberos pre-authentication events

l Improvements – List of Collections’ Collection Manager Window

l Contains a new list of pre-defined property sets for AD attribute collections

l Improvements – AD Objects and Containers Filter

l New scoping option added for GUIDs

l Improvements – AD Account Filter

l New scoping option added for Account Collections and Groups

l Improvements –Event Filtering Configuration Window

l DNS records display in the Recent Events tab in human readable format for Active Directory policies when AD DNS Events are captured

l Improvements – Appendix: StealthINTERCEPT Stored Procedures

l New procedures have been added. Old ones removed.

Doc_ID 371 504

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Improvements – Appendix: PowerShell API Integration

l Renaming of Policy commands and additions of new collection commands

l Improvements – Additional New Policy Templates

l Schema and Configuration Templates Folder

l Improvements – Modified TAGS Node

l NEW 7.0 TEMPLATES TAG – Added to new policy templates

NOTE: With the release of StealthINTERCEPT v7.0, the officially supported operating system for the Enterprise Manager, SI Admin Console, and SI Reporting Console server is Windows Server 2012 or newer.

StealthINTERCEPT v6.1 New & Improved Features The new and improved features introduced in StealthINTERCEPT v6.1, released June 2019 include:

l NEW LDAP Event Filter

l Scopes the policy based on security configuration methods selected

l NEW LDAP Runtime Event Filter

l Capture LDAP query runtime events (in milliseconds) based on query execution times

l NEW File Monitor Settings

l The FS inherited permissions filtering global setting reports a single event only for the parent object when selected

l Exclusions added for AD accounts for users/groups and file system activity for local processes

l NEW Agents Interface Right Click Menu option

l The Clear SQLite Agent Queue option is for troubleshooting purposes only. It dumps the Agent queue and all pending events are permanently lost.

l NEW Platform Support

l Windows 2019 for Stealthbits Activity Monitor Agent & SI Agent deployment

Doc_ID 371 505

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Improvements – Password Rules Filter

l Monitoring or blocking mode is now available

l Username in Password section added Pre-Windows 2000 Logon Name and User Principle. Can now ignore values less than a chosen number.

l Improvements – LDAP Query Filter

l Added ability to Exclude LDAP Queries

l Improvements – Investigate Interface

l Double-click a populated grid row in the Investigate Interface to bring up the Event Viewer window with further detail on the event

l Improvements – Additional New Policy Templates

l StealthDEFEND for AD

l StealthDEFEND for AD LDAP

l Improvements – Modified TAGS

l StealthDEFEND

l NEW 6.1 TEMPLATES

StealthINTERCEPT v6.0 New & Improved Features The new and improved features introduced in StealthINTERCEPT v6.0, released February 2019 include:

l NEW StealthDEFEND Event Sink

l This global setting enables integration between StealthINTERCEPT and StealthDEFEND

l NEW Actions

l New option to Send to StealthDEFEND checkbox for each policy

l NEWEvent Filtering Configuration Window option

l New option to trigger alerts based on a set AD Events Latency Threshold

l NEW PowerShell API Integration

l SI Console Admins can create, edit, delete, and enable policies through a PowerShell session

Doc_ID 371 506

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l NEW Platform Support

l Windows 2019 for domain controllers and file servers

l Exchange 2019

l Improvements – File System Paths Event Filter and File System Attacks (by User) Analytic

l Filter can be scoped to include or exclude specific files and paths for StealthINTERCEPT monitoring policies

l Improvements – File Monitor Settings

l This global setting can now disable office file filtering for all StealthINTERCEPT file monitoring and blocking policies

l Improvements – SI SIEM Alerts

l New option to configure multiple profiles across SIEM servers for alerting

l Improvements – Forged PAC Analytic Configuration

l New Settings tab option to include specific RIDs that will trigger an incident

l Improvements – File System Event Filter For Monitoring

l New scoping option to exclude wildcards

l Improvements – File System Solution Event Types

l Additional Agents filter and the File System Agents filter support Domains as a selection to monitor file system events and file system events for StealthAUDIT integration

l Improvements – Authentication Protocol Filter

l Added ability to exclude failed authentications with expired passwords option

l Improvements – Additional New Policy Templates

l AD Changes: Notify Admin about sensitive group membership changes for sensitive accounts policy template in the Actions folder

l AD Changes: Notify Admin about sensitive group membership changes policy template in the Actions folder

l AD Changes: Notify user about his group membership changes policy template in the Actions folder

l Improvements – Modified TAGS

l NEW 6.0 TEMPLATES TAG – Added to new policy templates

l Improvements – Additional New Report Templates

l LDAP Activity by Secure report template in the LDAP Monitoring folder

Doc_ID 371 507

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

StealthINTERCEPT v5.2 New & Improved Features The new and improved features introduced in StealthINTERCEPT v5.2, released August 2018 include:

l Improvements – Password Enforcement Event Type

l Additional rules and criteria added to the Password Rules filter for additional scoping on rejected passwords:

l Passwords

l Username in Password

l Repeating Patterns

l Sequential Characters

l Defined Text

l Keyboard Layout Sequence

l Character Rules

l NEW Action Scripts

l The following custom scripts send email notifications to recipients when the associated event type is triggered (see Appendix E):

l Account Enablement

l Password Never Expires

l Lock and/or Unlock Account

l Password Changes

l Password Rejection

l The following policy templates have been created using these action scripts:

l AD Changes: Notify Admin that account is now enabled policy template in the Actions Template folder

l AD Changes: Notify Admin that account now has Password Never Expires policy template in the Actions Template folder

l AD Changes: Notify user that his account was locked/unlocked policy template in the Actions Template folder

l AD Changes: Notify User that his password changed policy template in the Actions Template folder

Doc_ID 371 508

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l EPE: Notify Perpetrator that password was rejected policy template in the Actions Template folder

l NEW File Monitor Settings Window

l This global setting manages the log retention time (in days) for StealthINTERCEPT file monitoring and blocking policies

l Improvements – Event Filtering Configuration Window

l The Exclude Logins from Machine Accounts filter option can now be configured to use collections or filter based on user-supplied strings.

l Improvements – Additional New Policy Templates

l Ntds.dit File Hijacking policy template in the Privilege Escalation folder

l Improvements – Modified TAGS

l NEW 5.2 TEMPLATES TAG – Added to new policy templates

StealthINTERCEPT v5.1 New & Improved Features The new and improved features introduced in StealthINTERCEPT v5.1, released June 2018 include:

l NEW Platform Support

l Nasuni file system monitoring (through integration with the Stealthbits Activity Monitor)

l NEW Kerberos Weak Encryption Analytic

l New Report Template:

l StealthINTERCEPT Analytics Report - Kerberos Weak report template in the Analytics folder

l NEW Forged PAC Analytic

l New Report Template:

l StealthINTERCEPT Analytics Report - Forged PAC report template in the Analytics folder

l NEW Automatically Deploy SI Agents to Newly Discovered Domain Controllers

l NEW Collection Type – File Paths

l Create collection of file paths for Windows file systems and NAS file systems

l Includes dynamic collection feature, with 2 preconfigured dynamic collection tables created during install/upgrade:

Doc_ID 371 509

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Folders with Sensitive Data Collection - dc_file_path_SensitiveDataFolders table

l Open Shares Collection – dc_file_path_OpenShares table

l NEW AD Attributes Filter Scoping

l Filter can be scoped to capture events based on the new attribute value by setting the Operation and Value fields for an attribute

l Policies created prior to StealthINTERCEPT v5.1 will have the attribute value filter set to Any Value to maintain backwards compatibility

l NEW TAGS

l TAGS node under Templates node houses folders where templates can be regrouped for quick access

l Several preconfigured Tags were added to templates, including the “NEW 5.1 Templates” tag

l NEW Alerts

l Configuration Alert: Error compiling filters.json

l Configuration Alert: Event Filtering Configuration

l Improvements – File System Changes Event Type and File System Lockdown Event Type new filter

l Additional Agents filter, replaced File System Agents filter for File System Changes Event Type, added to the File System Lockdown Event Type

l Works in collaboration with the Paths/Agent set on the File System filter

l Improvements – Database Maintenance window now displays Incident and Event Counts for Analytics and Policies

l Improvements – Enable Encryption for the SI Reporting Console through the Install wizard

l Improvements – New Columns in the Agents interface data grid

l AD Agent

l Is Signed

l Improvements – Password Enforcement Event Type

l The dictionary.dat file is centrally controlled

l Modifications to the list of passwords to reject can be made on the Password Values filter

Doc_ID 371 510

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Improvements – Date timestamps within data grids have a hover over popup which displays Agent time (when applicable), Local time (of the Enterprise Manager), and UTC time simultaneously

l Improvements – Event Filtering option to Exclude authentication events from accounts Collection can use wild cards (*) for beginning or end of Account Name

l Improvements – Additional New Policy Templates

l AD: Administrator Escalation policy template in the Privilege Escalation folder

l AD: AdminSDHolder Monitoring policy template in the Domain Persistence folder

l AD: Group Policy Objects Security Monitoring policy template in the Domain Persistence folder

l DCShadow detection policy template in the Domain Persistence folder

l AD: Modifications of Administrator Accounts policy template in the Privilege Escalation folder

l AD: SID History Tampering policy template in the Privilege Escalation folder

l BloodHound Detection policy template in the Reconnaissance folder

l LDAP: Admin Accounts policy template in the Reconnaissance folder

l LDAP: LAPS Security & Active Directory LAPS Configuration Recon policy template in the Reconnaissance folder

l LDAP: Managed Service Accounts Recon policy template in the Reconnaissance folder

l LDAP: Service Accounts Recon policy template in the Reconnaissance folder

l Improvements – Additional New Report Templates

l LDAP Activity by Base DN Name report template in the LDAP Monitoring folder

l LDAP Activity by Perpetrator Host report template in the LDAP Monitoring folder

StealthINTERCEPT v5.0 New & Improved Features The new and improved features introduced in StealthINTERCEPT v5.0, released January 2018 include:

Doc_ID 371 511

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l NEW LSASS Guardian – Monitor Event Type

l Monitor changes to LSASS

l New Event Type filters:

l Open Process Flags filter

l Processes filter (for Monitoring)

l New Policy Template:

l LSASS Guardian - Monitor policy template in the Microsoft > LSASS folder

l New Report Template:

l LSASS Guardian - Monitor report template in the LSASS Guardian - Monitor folder

l NEW LSASS Guardian – Protect Event Type

l Block changes to LSASS

l New Event Type filters:

l Open Process Flags filter

l Processes filter (for Lockdown)

l New Policy Template:

l LSASS Guardian - Protect policy template in the Microsoft > LSASS folder

l New Report Template:

l LSASS Guardian - Protect report template in the LSASS Guardian - Protect folder

l NEW AD Replication Monitoring Event Type

l Monitor domain controller syncing requests from non-domain controllers

l New Policy Template:

l AD Replication Monitoring policy template in the Microsoft > Active Directory > Replication folder

l New Report Template:

l AD Replication Monitoring report template in the AD Replication folder

Doc_ID 371 512

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l NEW AD Replication Lockdown Event Type

l Block domain controller syncing requests from non-domain controllers

l New Policy Template:

l AD Replication Lockdown policy template in the Microsoft > Active Directory > Replication folder

l New Report Template:

l AD Replication Lockdown report template in the AD Replication folder

l NEW Password Enforcement Event Type

l Prevent the use of known, bad passwords during account password rest operations

l New Event Type filters:

l AD Account filter

l Password Values filter

l New Policy Template:

l Password Enforcement Monitoring policy template in the Microsoft > Active Directory > Password Enforcement folder

l New Report Template:

l Password Enforcement Monitoring report template in the Password Enforcement Monitoring folder

l NEW Event Tracker feature

l New Event Tracker window used to set a Reviewed State and leave a comment

l Recent Event and Analytic data grids can be filtered by the Event Tracker State

l Improvements – Get latest SI Agent installer package

l New Agent Installer Update window opens from the Agents interface

l Improvements – Execute PowerShell script against an event from the Recent Events data grid

l Improvements – File System Changes Event Type has new filter option

l A path selected to be monitored for a particular agent on the File System filter (for Monitoring) can be monitored by all selected agents on the File System Agents filter

l Improvements – File System Changes Event Type can lockdown perpetrators

l New option to Enable Automatic Lockdown for associated wildcards on the File System filter (for Monitoring)

l Improvements – Email Alerts can be sent as Plain Text or in HTML format

Doc_ID 371 513

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Improvements – Analytics interface has graphical display of all monitored incidents

l Improvements – Investigate the Archive database from within the SI Admin Console

l Improvements – Alerts interface as new clear options for database clean-up

l Improvements – Additional New Policy Templates

l AD: Domain Administrators Logons to Non Domain Controllers policy template in the Microsoft > Active Directory > Authentication > Administrative Accounts folder

StealthINTERCEPT v4.1 New & Improved Features The new and improved features introduced in StealthINTERCEPT v4.1, released March 2017 include:

l NEW Support for Windows Server 2016

l NEW Support for Exchange 2016

l NEW LDAP Monitoring Event Type

l Monitor LDAP activity

l New Event Type filters:

l LDAP Query filter

l LDAP Result filter

l New Policy Template:

l LDAP Folder

l LDAP Events policy templates:

l LDAP: Sensitive Accounts template

l LDAP: Sensitive Containers template

l LDAP: Sensitive Groups template

l LDAP: Sensitive SPNs template

l New Report Templates & Categories:

l LDAP Monitoring Folder

l LDAP Activity by Perpetrator report template

l LDAP Activity by Source report template

l NEW TCP Protocol with optional SSL Support for SIEM Integration

Doc_ID 371 514

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l NEW Agent Tally at the top of the Agents interface data grid

l NEW PowerShell 4.0 Action option for Policies, Templates, and Analytics

l NEW Event: UTC Time Logged column added to event and incident data grids

l NEW VSS monitoring and blocking

l File System Filter for Monitoring – I/O Type options

l File System Filter for Lockdown – I/O Type options

l NEW Event Viewer on Recent Events tab

l Improvements – Database Maintenance Enhancements

l Schedule both Move (Archive) and Delete database maintenance tasks

l Enable database maintenance tasks by Event Type and/or by Analytic

l Save configuration settings while choosing not to enable for the next database maintenance task execution

l Improvements – Authentication Protocol filter options

l Login Type (Local or Remote) for domain controllers

l Exclude failed authentications with ‘N-2’ passwords available for both Policies and Analytics

l Improvements – File System (for monitoring) filter, Wildcard textboxes extended

l Improvements – Investigation filter for Affected Object now includes filtering by File Path

l Improvements – Agent upgrade process for hardened agents built into Agent Upgrade execution

l Improvements – Export event data from the Investigate interface or Recent Events tab of policy configuration in the SI Admin Console

l Choose to export all columns or only visible columns

l Choose to send via email and/or save as

l Improvements – Export Report in the SI Reporting Console

l Choose to export as PDF or Excel

l Choose to export to a locally-accessible location

l Improvements – Export to CSV option from the Investigations data grid in the SI Reporting Console

l Choose to export All Columns or Visible Columns Only

l Choose to export to a locally-accessible location and/or send in an email

Doc_ID 371 515

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Improvements – Additional SIEM Mapping File added for Splunk v2.0

l Improvements – Additional Policy Templates

l Microsoft > Active Directory > Lockdown > Auth: Generic Lockdown template

NOTE: As of v4.1, Windows Server 2003 is no longer a supported platform for SI Agents. Only SI Agents v4.0 or older can be deployed on a Windows Server 2003 machine.

StealthINTERCEPT v4.0 New & Improved Features The new and improved features introduced in StealthINTERCEPT v4.0, released October 2016, include:

l NEW Authentication Lockdown Event Type

l Authentication blocking for NTLM and Kerberos filtered by user (perpetrator), source, or target computer

l NEW Exchange Object Level Monitoring

l Monitor Exchange attachments, create message, delete message, modify message, read message, and send message operations

l NEW Effective Group Membership Event Type

l Monitor effective group membership changes of parent group including membership of all nested groups

l NEWEnable Automatic Lockdown of File System Attacks by Users

l Automatically block perpetrators when a File System Attack (by user) Analytic incident is triggered.

l NEW Search Active Directory Option

l On the Select… windows, choose between Browse Mode and Search Mode when adding Active Directory filters to a policy

l NEW Filters for Active Directory Monitoring and Lockdown Policies

l Active Directory Changes Event Type

l IP Addresses (from) filter

l Hosts (from) filter

l Active Directory Lockdown Event Type

l Hosts (from) filter

Doc_ID 371 516

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l NEW Collection for Hosts

l NEW SIEM Integration for AlienVault

l NEW SI Operations Alert

l LSASS Process Terminated alert

l NEW Single MSI Installer for the SI server

l Prerequisites, Enterprise Manager, Administration Console, and Web Reporting Console installation packages have been combined into the StealthINTERCEPT Server installation package

l NEW Exchange 2016 Support

l NEW StealthDEFEND Integration

l NEW Report Templates

l AD Authentication Folder

l AD Authentications Blocking report template

l AD Failed Authentications report template

l Exchange Changes Folder

l EX Activity Download Attachment report template

l EX Activity Message Create report template

l EX Activity Message Delete report template

l EX Activity Message Hard Delete by Non-Owner report template

l EX Activity Message Modify by non-owner report template

l EX Activity Message Read report template

l EX Activity Message Send by non-owner report template

l EX Activity Message Send Outside Organization report template

l EX Activity Message Send with file attachment report template

l EX Activity Message Send with Sendonbehalf report template

l EX Activity Message Send report template

l NEW FIPS 140-2 Compliance Support

Doc_ID 371 517

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Improvements – Dynamic Collections now include:

l Dynamic Domains & Servers Collections

l Dynamic Objects Collections

l Dynamic IP Addresses Collections

l Dynamic Hosts Collections

l Improvements – Investigations Filter Options

l Filter for “Who” by Affected Object Distinguished Name or Account Name

l Filter for “Other” by Attribute Name and/or Value(s)

l Improvements – Ransomware Folder Policy Templates

l Updated with latest file patterns

l Two (2) new policy templates:

l Ransomware Extensions policy template

l Ransomware Instructions policy template

l Improvements – Auto-creation of Windows Firewall Rules during Installation

l StealthINTERCEPT Infrastructure Installation now has the option to “Create Windows Firewall Rules” on the Enterprise Manager Location Information page of the StealthINTERCEPT Setup Wizard

l SI Agent Deployment now has the option to “Create Windows Firewall Rules” on the Set Options page

l Improvements – Account Locked and Account Unlocked events differentiation

l Improvements – Save column layout settings within the SI Admin Console for all data grids

l Other Changes – Removed requirements for Microsoft C++ Runtime Libraries (Managed APIs)

l Other Changes – Added product version and operating system to server and agent logs

StealthINTERCEPT v3.4 Service Pack 2 New & Improved Features The new and improved features introduced in StealthINTERCEPT v3.4 Service Pack 2, released May 2016, include:

l Other Changes – StealthINTERCEPT for Windows File System, StealthINTERCEPT for NetApp, and StealthINTERCEPT for EMC solutions merged into StealthINTERCEPT for File System Solution

Doc_ID 371 518

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

NOTE: :Upgrading to V3.4 Service Pack 2 will add several new indexes to the SI database (NVMonitorData). These are required to ensure the consoles remain responsive with large data sets. If upgrading from V3.4.0 or earlier to V3.4 Service Pack 2 (V3.4.2), the NVMonitorData database may more than double in size. Analytic data is the biggest contributor to these index changes. Having more analytics events will result in more database growth.

Therefore, it is important prior to starting the upgrade to ensure the SQL Server has free disk space equal to at least 180% of the current NVMonitorData databases size. For example, if the current NVMonitorData databases is 200 MB, then the available free disk space must be at least 360 MB before starting the upgrade process.

RECOMMENDED: Use the Database Maintenance feature to purge the database of unneeded, old event data prior to the upgrade process.

Since most of the index changes were introduced in V3.4 Service Pack 1 (V3.4.1), upgrading from V3.4.1 to V3.4.2 results in minimal database growth. See the following table for an example of pre-upgrade to post-upgrade database size information.

Database & Index Sizing Examples

This example illustrates how an upgrade from V3.4.0 to V3.4.1 or to V3.4.2 impacts database size relative to a fixed number of events in the database. The database used in this example contained 2.4 million events, 2.7 million event attributes, and 1.2 million analytics login events. Having proportionally fewer analytics events will result in less database growth than this example. Having proportionally more analytics events will result in more database growth than this example.

StealthINTERCEPT V3.4.0.x V3.4.1.x (SP 1) V3.4.2.x (SP 2)

Total DB Size 6.86 GB 17.96 GB 19.86 GB

Indexes Size (4.00 GB) (9.30 GB) (9.80 GB)

Update Execution - 10 min 43 sec 2 min 08 sec Time

NVMonitorData_ 1,271,267,328 6,426,656,768 7,776,305,152 1.LDF bytes bytes

NVMonitorData.mdf 5,303,959,552 11,247,288,320 bytes 11,783,110,656 bytes bytes

Doc_ID 371 519

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

StealthINTERCEPT V3.4.0.x V3.4.1.x (SP 1) V3.4.2.x (SP 2)

NVMonitorConfig_ 45,023,232 45,023,232 bytes 45,023,232 1.LDF bytes bytes

NVMonitorConfig.mdf 241,434,624 241,434,624 bytes 241,434,624 bytes bytes

Index Information - Removed: Added:

A_ IX_A_Login_ HorizontalMovementAttack UtcTimeLogged s_AttackedHosts, IX_A_ A_ConcurrentLogins_ Login2Policy_ AttackingHosts policyGuid

A_ImpersonationLogins_ IX_A_FS_ Accounts UtcTimeLogged

A_Notifications IX_A_FS2Policy_ policyGuid V_A_ HorizontalMovementAttack IX_A_Login_BFA s_AttackedHosts IX_A_Login_ V_A_ConcurrentLogins_ AccountSid AttackingHosts IX_A_Login_ V_A_ImpersonationLogins_ AccountName Accounts IX_A_Login_ V_A_Notifications AccountName_ isUserExist

IX_A_Login_ Added: FromHost_ A_FS isUserExist

A_FS2Policy IX_A_FS_ AR_FilesPerUser AccountSid

IX_AR_FilesPerUser

V_A_FS2Policy

Doc_ID 371 520

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

StealthINTERCEPT V3.4.0.x V3.4.1.x (SP 1) V3.4.2.x (SP 2)

V_AR_FilesPerUser

V_EventsView

PK_eventId

policyConfigIdIndex

policyPolicyIndex

utcTimeLoggedDescIndex

IX_A_Login_UtcTimeLogged

IX_A_FS_UtcTimeLogged

IX_A_FS2Policy_policyGuid

IX_A_Login_BFA

IX_A_Login_AccountSid

IX_A_Login_AccountName

IX_A_Login_AccountName_ isUserExist

IX_A_Login_FromHost_ isUserExist

IX_A_FS_AccountSid

StealthINTERCEPT v3.4 Service Pack 1 New & Improved Features The new and improved features introduced in StealthINTERCEPT v3.4 Service Pack 1, released February 2016, include:

l NEW Analytic

l File System Attacks (by user) – Significant number of file changes made by a user account within a short time period

l New Report template: StealthINTERCEPT Analytics Report – File System Attacks (by user)

Doc_ID 371 521

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l NEW Policy Template

l Ransomware Detection – Ransomware is a type of malware that systematically encrypts files on a user’s system and forces payment to get the data back. This policy is meant to detect the creation of files known to be associated with a Ransomware attack and trigger an alert.

l Improvements – Analytic Data Grid Feature Enhancement

l Analytic event data can be scoped to display the top specified value of details

l Improvements – File System Policy Event Data

l Perpetrator Protocol contains the name of the share

l Event data includes IP Address and Share used to access the file for the perpetrator

l Improvements – SI SIEM Alerts

l Mapping File for Analytics option has been renamed to Mapping File for Authentication Analytics

l New Mapping File for File Analytics option

l Improvements – Perpetrator Collections

l Option to Expand Groups within a collection to monitoring/blocking effective group membership at the user level. The option is available on the Perpetrator and Lockdown Perpetrators collections.

l Other Changes – License Expiration Warning

l When launching the SI Admin Console within 14 days of license expiration, a pop-up window will appear with information on coming license key expiration

StealthINTERCEPT v3.4 New & Improved Features The new and improved features introduced in StealthINTERCEPT v3.4, released November 2015, include:

l NEW Analytics

l Bad User ID (by user)

l Bad User ID (by source host)

l Breached Password

l Concurrent Logins

Doc_ID 371 522

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Golden Ticket

l Impersonation Logins

l NEW Windows File System Lockdown Event Type

l ‘File System’ Event Type changed to ‘File System Changes’ Event Type

l Event Type filter: File System filter for lockdown and File System filter for monitoring

l New Report Templates & Categories: File System Changes and File System Lockdown Report Templates

l NEW Support for Exchange 2013

l Improvements – GPO Lockdown Event Type has ability to filter by Domain/Server

l Improvements – GPO Setting Changes Event Type

l Extended support for specific GPOs

l Improved feature that allows for the translation of setting changes in GPOs, including:

l User Configuration\Preferences\Control Panel Settings

l Computer Configuration\Policies\Administrative Templates\Printers\Printer Browsing

l Improvements – SI Email Alerts can now be assigned multiple Message Profiles

l Other Changes – Installation Package delivery changed from InstallShield to WiX

l Other Changes – SI Agents will require .NET Framework 4.0+ instead of .NET Framework 2.0/3.5

l Other Changes – Windows 2003 no longer supported

StealthINTERCEPT v3.3 Service Pack 2 New & Improved Features The new and improved features introduced in StealthINTERCEPT v3.3 Service Pack 2, released September 2015, include:

l New Network-Attached Storage (NAS) device support:

l StealthINTERCEPT for NetApp Solution

l StealthINTERCEPT for EMC Solution

l New Policy Templates

l New Report Templates

l Bug fixes

Doc_ID 371 523

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

StealthINTERCEPT v3.3 Service Pack 1 New & Improved Features The new and improved features introduced in StealthINTERCEPT v3.3 Service Pack 1, released April 2015, include:

l Improvements – Independent buffers for Active Directory and Authentication traffic

l Improvements – Filter raw event data (Event Filtering) before it reaches the database for:

l Exclude Authentication Events from selected hosts

l Exclude Authentication Events from selected accounts

l Improvements – Better support for installation of the SI Reporting Console on Windows Server 2012

l Improvements – Support publishing of scheduled reports to a folder or share

l Improvements – Database column for password increased in size

l Improvements – SI Agent executable now has a description for

l Improvements – Installer allows continuous installation even if selected user (for Windows Authentication) does not have rights to access SQL Server

l Bug fixes

StealthINTERCEPT v3.3 New & Improved Features The new and improved features introduced in StealthINTERCEPT v3.3, released February 2015, include:

l New Analytics – Trigger incidents according to specified conditions indicative of potential:

l Brute Force Attacks

l User Account Hacking

l Horizontal Movement Attacks

l New Policy Event Type: Authentication

l Dynamic Policy

l Controlled with Dynamic Perpetrators Collections

l Driven by database table, populated by third party product

l SIEM Alerting Configuration Improvements

l New Configuration option for AD Event Filtering

Doc_ID 371 524

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Investigate Improvements

l Save Filtered Investigates Views

l Investigations tab in the SI Reporting Console

StealthINTERCEPT v3.1 New & Improved Features The new and improved features introduced in StealthINTERCEPT v3.1, released August 2014, include:

l Improved SIEM integration – SIEM Tab

l Changes to event types and details that are sent to SIEM/SysLog

l Internal performance and scalability improvements

l Bug fixes

StealthINTERCEPT v3.0 New & Improved Features The new and improved features introduced in StealthINTERCEPT v3.0, released June 2014, include:

l Improved Layout & Reorganization of the SI Admin Console – Navigation and Policy Center

l New Security Model

l Leverages AD users and groups to grant access to SI Admin Console and Web Reporting Console – Users and Roles

l Optional ability to further secure data access such as required by Luxemburg Bank regulations

l Access controls per policy folder – Policies Protection

l Ability to limit access to data from selected AD OU’s/containers (protected objects) – Object Protection

l Preceding options limit who can see/change policy settings AND the data collected by these policies. Applies both to data in the SI Admin Console and the Web Reporting Console.

l Agents Interface in the Policy Center – Agents interface

l Provides at a glance a list of deployed agents, operational status, and version

l Auto discovery of DCs in the SI managed domain that do not have an SI Agent

Doc_ID 371 525

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Options to manage and deploy agents directly from the SI Admin Console including:

l Install/Uninstall SI Agent

l Start/Stop SI Agent

l Harden/Soften SI Agent

l Remove Server from SI Agents list

l Machines can be added to deployment list via:

l Obtaining list of DC’s from AD for selected domain

l Add from .CSV file

l Manual entry

l Upgrade existing SI Agents with option to replace or preserve settings

l Reconfigure deployed SI Agents with options to:

l Update address of Enterprise Manager to which the SI Agent will report

l Update port used to communicate with the Enterprise Manager

l Change enabled modules (Active Directory, Exchange, File System)

l System Alerts – Alerts interface

l Provides history of over 50 different product related operational events ranging from SI Agent and Enterprise Manager start/stop to user interactions such as console login, changing of policies, security settings, etc.

l Stored in SQL database with per alert options to send emails and record in event log

l Organized into Security, Operations, and Configuration event types

l Console display of recent Alerts by time of count with options to manage and export data

l Alert Configuration UI Simplification (complete reorganization) – SI System Alerting window

l One common UI to select and configure alerts

l Per policy alerts

l Operational alerts

l SIEM server settings

l Same UI to select destination for alerts

Doc_ID 371 526

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Email

l Windows Event Log

l SIEM/SysLog

l SIEM/Syslog Integration – SIEM tab

l Configuration unified with other alerting (per above)

l Configuration simplified with pick list for out-of-box integration with:

l IBM QRadar SIEM

l Splunk SIEM

l HP ArcSight SIEM

l McAfee Nitro SIEM

l LogRhythm SIEM

l Investigate Interface – Investigate interface

l Console display of recent events across multiple policies

l Quick selection by Who, When, Where, and What

l Simple, fast, ad hoc view into collected data without leaving the SI Admin Console

l Recent Events – Recent Events tab

l New tab associated with each policy definition

l Simple way to see that a policy is collecting data

l Show most recent ‘n’ events or most recent ‘x’ hours of event data

l New Database Management Features

l Enable SQL database partitioning for improved performance and scalability when working with large data sets (Requires Enterprise edition of MS SQL Server) – Database Partitioning

l Ability to schedule periodic moving or deletion of event data older than ‘x’ days – useful in managing DB size and maintaining Web Reporting performance (MS SQL Agent to schedule/run scheduled tasks created by SI) – Database Maintenance

l Simultaneous File System Activity data collection for StealthINTERCEPT® and the StealthAUDIT® Management Platform

l New File System StealthAUDIT Event Type – StealthINTERCEPT for Windows File System Solution Event Types

l UI to configure StealthAUDIT data collection rules – File System StealthAUDIT Event Type

l Significant Web App refactoring to improve stability / longevity

Doc_ID 371 527

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

StealthINTERCEPT v2.6 New & Improved Features The new and improved features introduced in StealthINTERCEPT v2.6, released November 2013, include:

l SEIM Integration

l Policies can now be configured to send their event data to a Syslog server

l The Primary focus is QRADAR integration

l A default QRADAR LEEF format template is automatically set up for the Syslog Configuration options

l Users can import their own Syslog templates if they choose to write to a different Syslog server

l Additional index added to the Reporting DB that GREATLY improves report performance

StealthINTERCEPT v2.5 New & Improved Features The new and improved features introduced in StealthINTERCEPT v2.5, released September 2013, include:

l LDAP Monitoring

l Server 2012 Support for the SI Windows Agent.

l Updated File System Driver for monitoring Real-Time File System activity on Windows file systems

l The current File Driver only monitors for changes. Does not support lockdown or blocking

l The Web Reporting Application now supports Silverlight 5

l Module Based Licensing.

l StealthINTERCEPT now has module based licensing built-in

l License Keys now end in a .key extension. Previous licenses that end in .txt will no longer import.

l Additional index added to the Reporting DB that GREATLY improves report performance

Appendix: QIDmap Information for QRadar SIEM Integration

Doc_ID 371 528

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Vendors have the ability to create what is called a QIDmap. The purpose of the mapping file is to create a listing of the events that the vendor can provide. It also creates a mapping that IBM consumes, producing a DSM. Once the DSM is in place, QRadar can take SI events and categorize them.

The built-in low-level categories have two levels:

l IBM will look to see if it can match the EventID field AND the Event Category field. If a match is found, the data will be displayed using the Event Name SI supplied in the QIDmap. The data will be linked to the defined Low Level Category.

l If no EventID field match is found, IBM will default back to just the Event Category field. The fallback ID of 19001 is IBM’s collection of general auditing information.

Low Level EventID Event Category Event Name Category

general auditing information Object Added 19001 Active Directory Object Created

Active Object Added 3041 Active Directory DirectorycomputerObject Computer Creation AddedFalseTrue Blocked by StealthINTERCEPT

Active Object Added 3041 Active Directory DirectorycomputerObject Computer Created AddedTrueFalse

Active DirectorygroupObject Object Added 3038 Active Directory AddedFalseTrue Group Creation Blocked by StealthINTERCEPT

Active DirectorygroupObject Object Added 3038 Active Directory AddedTrueFalse Group Created

Active DirectoryuserObject Object Added 3031 Active Directory AddedFalseTrue User Creation Blocked by StealthINTERCEPT

Doc_ID 371 529

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Low Level EventID Event Category Event Name Category

Active DirectoryuserObject Object Added 3031 Active Directory AddedFalseTrue User Created

general auditing information Object Deleted 19001 Active Directory Object Deleted

Active Object Deleted 3043 Active Directory DirectorycomputerObject Computer Deletion DeletedFalseTrue Blocked by StealthINTERCEPT

Active Object Deleted 3043 Active Directory DirectorycomputerObject Computer Deleted DeletedFalseTrue

Active DirectorygroupObject Object Deleted 3040 Active Directory DeletedFalseTrue Group Deletion Blocked by StealthINTERCEPT

Active DirectorygroupObject Object Deleted 3040 Active Directory DeletedFalseTrue Group Deleted

Active DirectoryuserObject Object Deleted 3035 Active Directory DeletedFalseTrue User Deletion Blocked by StealthINTERCEPT

Active DirectoryuserObject Object Deleted 3035 Active Directory DeletedFalseTrue User Deleted

general auditing information Object Modified 19001 Active Directory Object Modified

Active Object Modified 3042 Active Directory

Doc_ID 371 530

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Low Level EventID Event Category Event Name Category

DirectorycomputerObject Computer ModifiedFalseTrue Modification Blocked by StealthINTERCEPT

Active Object Modified 3042 Active Directory DirectorycomputerObject Computer Modified ModifiedFalseTrue

Active DirectorygroupObject Object Modified 3039 Active Directory ModifiedFalseTrue Group Modification Blocked by StealthINTERCEPT

Active DirectorygroupObject Object Modified 3039 Active Directory ModifiedFalseTrue Group Modified

Active DirectoryuserObject Object Modified 3032 Active Directory ModifiedFalseTrue User Modification Blocked by StealthINTERCEPT

Active DirectoryuserObject Object Modified 3032 Active Directory ModifiedFalseTrue User Modified

general auditing information Object 19001 Active Directory Moved/Renamed Object Moved or Renamed

Active Object 3042 Active Directory DirectorycomputerObject Moved/Renamed Computer Move or Moved/RenamedFalseTrue Rename Blocked by StealthINTERCEPT

Active Object 3042 Active Directory

Doc_ID 371 531

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Low Level EventID Event Category Event Name Category

DirectorycomputerObject Moved/Renamed Computer Moved or Moved/RenamedFalseTrue Renamed

Active DirectorygroupObject Object 3039 Active Directory Moved/RenamedFalseTrue Moved/Renamed Group Move or Rename Blocked by StealthINTERCEPT

Active DirectorygroupObject Object 3039 Active Directory Moved/RenamedFalseTrue Moved/Renamed Group Moved or Renamed

Active DirectoryuserObject Object 3032 Active Directory Moved/RenamedFalseTrue Moved/Renamed User Move or Rename Blocked by StealthINTERCEPT

Active DirectoryuserObject Object 3032 Active Directory Moved/RenamedFalseTrue Moved/Renamed User Moved or Renamed

GPO LockdownAddFalseTrue Add 3030 GPO Setting Modification Blocked by StealthINTERCEPT

GPO Delete 3030 GPO Setting LockdownDeleteFalseTrue Modification Blocked by StealthINTERCEPT

SI Events LogGPO GPO Added 3030 Active Directory AddedTrueFalse Group Policy Object Setting Defined

Doc_ID 371 532

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Low Level EventID Event Category Event Name Category

SI Events LogGPO GPO Deleted 3030 Active Directory DeletedTrueFalse Group Policy Object Setting Undefined

SI Events LogGPO GPO Modified 3030 Active Directory ModifiedTrueFalse Group Policy Object Modified

SI Events LogGPO GPO Renamed 3030 Active Directory RenamedTrueFalse Group Policy Object Modified

SI Events LogGPO GPO Untranslated 3030 Active Directory UntranslatedTrueFalse Group Policy Object Modified

Windows File SystemAccess Access Rights 8014 Windows File Rights ChangeTrueFalse Change System Folder or File Access Rights Change

Windows Change 8014 Windows File SystemAttribute System Folder or ChangeTrueFalse File Attribute Change

Windows File SystemAudit Audit Config 8014 Windows File Config ChangeTrueFalse Change System Folder or File Config Change

Windows File Create 8028 Windows File SystemCreateTrueFalse System Folder or File Create

Windows File Delete 8033 Windows File

Doc_ID 371 533

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Low Level EventID Event Category Event Name Category

SystemDeleteTrueFalse System Folder or File Delete

Windows File Owner 8014 Windows File SystemOwnerTrueFalse System Folder or File Owner Changed

Windows File Read 8014 Windows File SystemReadTrueFalse System Folder or File Read

Windows File Rename 8014 Windows File SystemRenameTrueFalse System Folder or File Rename

Windows File Update 8014 Windows File SystemUpdateTrueFalse System Folder or File Update

Workstation Lock 3004 Workstation Locked EventsLockTrueFalse

Workstation EventsLog Log Off 3004 Workstation Log Off OffTrueFalse

Workstation EventsLog Log On 3004 Workstation Log On OnTrueFalse

Workstation EventsScreen Screen Saver Start 3004 Workstation Screen Saver StartTrueFalse Saver Start

Workstation EventsScreen Screen Saver Stop 3004 Workstation Screen Saver StopTrueFalse Saver Stop

Workstation Unlock 3004 Workstation

Doc_ID 371 534

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Low Level EventID Event Category Event Name Category

EventsUnlockTrueFalse Unlocked

Appendix: StealthINTERCEPT Stored Procedures The table contains a list of the stored procedures StealthINTERCEPT uses on its SQL Server databases.

When SI Uses the Name What the Stored Procedure Does Procedure

DeleteAuthAnalytics Called from the This stored procedure deletes “old” SQLAgent job if the data from the database in the “Delete” operation following tables: is selected for l A_Login Database Maintenance for l A_Login2Policy

Authentication l AR_BruteForceAttacks Analytics l AR_UserAccountHackingAttacks

l AR_HorizontalMovementAttacks

l AR_BadUserIdByUser

l AR_BadUserIdByHost

l AR_BreachedPassword

l AR_ConcurrentLogins

l AR_DiamondPAC

l AR_EventTracker

l AR_ImpersonationLogins

l AR_GoldenTickets

l AR_KerberosWeakEncryption

Doc_ID 371 535

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When SI Uses the Name What the Stored Procedure Does Procedure

DeleteByPolicy Called from the This stored procedure deletes “old” SQLAgent job if data from the database in the “Delete” operation following tables: is selected for l NvEvent Database Maintenance for l NvEvent_EventTracker

selected policies l AttributeValue

l OldAttributeValue

l EventPolicy

l E_LDAP

l E_LDAP_EventTracker

l E_LDAP2Policy

DeleteFSAnalytics Called from the This stored procedure deletes “old” SQLAgent job if data from the database in the “Delete” operation following tables: is selected for l A_FS Database Maintenance File l A_FS2Policy

System Analytics l AR_FilesPerUser

l AR_EventTracker

Delete LDAP Called from the This stored procedure deletes “old” SQL Agent if data from the database in the “Delete” operation following tables: is selected in the l E_LDAP Database Maintenance for l E_LDAP_EventTracker

the LDAP Event l E_LDAP2Policy Type

DeleteNvEventByEventType Called from the This stored procedure deletes “old” data from the database in the

Doc_ID 371 536

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When SI Uses the Name What the Stored Procedure Does Procedure

SQL Agent job if following tables: “Delete” operation l NvEvent is selected in the Database l NvEvent_EventTracker

Maintenance l AttributeValue Window for all l OldAttributeValue Event Types except LDAP l EventPolicy

MoveAuthAnalytics Called from the This stored procedure moves “old” SQLAgent job if the data from one database to another “Move” operation in the following tables: is selected for l A_Login Database Maintenance for l A_Login2Policy

Authentication l AR_BruteForceAttacks Analytics l AR_UserAccountHackingAttacks

l AR_HorizontalMovementAttacks

l AR_BadUserIdByUser

l AR_BadUserIdByHost

l AR_BreachedPassword

l AR_ConcurrentLogins

l AR_DiamondPAC

l AR_EventTracker

l AR_ImpersonationLogins

l AR_GoldenTickets

l AR_KerberosWeakEncryption

MoveByPolicy Called from the This stored procedure moves “old” SQLAgent job if the database from one database to “Move” operation another in the following tables:

Doc_ID 371 537

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When SI Uses the Name What the Stored Procedure Does Procedure

is selected for l NvEvent Database l NvEvent_EventTracker Maintenance for selected Policies l AttributeValue

l OldAttributeValue

l EventPolicy

l E_LDAP

l E_LDAP_EventTracker

l E_LDAP2Policy

MoveFSAnalytics Called from the This stored procedure moves “old” SQLAgent job if the data from one database into “Move” operation another in the following tables: is selected for l A_FS Database Maintenance for l A_FS2Policy

File System l AR_FilesPerUser Analytics l AR_EventTracker

Move LDAP Called from the This stored procedure moves “old” SQLAgent job if the data from one database into “Move” operation another in the following tables: is selected for l E_LDAP Database Maintenance for l E_LDAP_EventTracker

LDAP Event Type l E_LDAP2Policy

MoveNvEventsByEventType Called from the This stored procedure moves “old” SQLAgent job if the data from one database to another “Move” operation in the following tables: is selected for l NvEvent Database Maintenance for all l NvEvent_EventTracker

Doc_ID 371 538

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

When SI Uses the Name What the Stored Procedure Does Procedure

Event Types except l AttributeValue LDAP l OldAttributeValue

l EventPolicy

RdbPolicyCopy Called from the This stored procedure creates a SQLAgent job if the copy of the RdbPolicy table in the “Move” operation target database. is selected for Database Maintenance

Appendix: PowerShell API Integration Using PowerShell, SI users can obtain information on or manipulate specific policy, collection, and StealthDEFEND integration configurations in the StealthINTERCEPT Admin Console without having it open. This can be done on the same machine or from a remote server where the Enterprise Manager is not located. The following PowerShell APIs can be used:

l Initial Configuration:

l Connect-SIEnterpriseManager

l Informative APIs NOTE: These APIs do not require any additional configuration. They display Agent Status from the Agents grid columns and a list of available PowerShell APIs the user can utilize.

l Get-SIAgentStatus – Displays Agent status from the Agent grid columns

l Get-SI Help – Lists available PowerShell APIs for StealthINTERCEPT

l Get-SIHelp [API Name] – Displays detailed information about the PowerShell API

l Policies and Collections:

l Get-SIPolicy

l Enable-SIPolicy

Doc_ID 371 539

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Remove-SIPolicy

l Export-SIPolicy

l Import-SIPolicy

l Get-SICollection

l Remove-SICollection

l Export-SICollection

l Import-SICollection

l Enterprise Password Enforcement (EPE):

l Test-ValidatePassword

l Export-SICharacterSubstitution

l Import-SICharacterSubstitution

l Export-SICharacterSubstitutionWords

l Import-SICharacterSubstitutionWords

l Export-SIPasswordsDictionary

l Import-SIPasswordsDictionary

l Set-SIPwnedDB

l StealthDEFEND Event Sink Tab

l Get-SIDefendConfig

l Set-SIDefendConfig

l LDAP Deception for StealthDEFEND:

l Get-SILdapDeception

l Set-SILdapDeception

In order to use this integration, the PowerShell service account must be an Active Directory account with the SI Administrator role assigned to it. The role is assigned through the Users and Roles Window within the SI Admin Console.

Prior to each use of this feature, the SI PowerShell module (SI.SIMonitor.PowerShell.dll) needs to be loaded into PowerShell. It is stored in the installation directory within the Enterprise Manager folder: …\Stealthbits\StealthINTERCEPT\SIEnterpriseManager\

To disallow the use of SI PowerShell module, remove the module from the Enterprise Manager folder.

Doc_ID 371 540

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

PowerShell commands are executed through a PowerShell Console on either the Enterprise Manager server or on a remote server. When PowerShell is used on a remote server without the Enterprise Manager installed, see the Remote PowerShell Connection section for requirements.

Load the SI PowerShell Module The following steps are to load the SI PowerShell module. These steps are required with each PowerShell session before running the available APIs.

The command below assumes the installation directory is in the C drive on the server where the PowerShell console resides. However, the installation directory can be set to a custom location during SI installation.

Step 1 – Run the following command to load the module into PowerShell. The highlighted section of the command assumes the default installation directory (highlighted below), but a custom path can be used. Import-Module “C:\\STEALTHbits\StealthINTERCEPT\SIEnterpriseManger\S I.SIMonitor.PowerShell.dll”

Step 2 – Connect to the Enterprise Manager using the Connect-SIEnterpriseManager command. The following parameters may be used:

If PowerShell is running on a separate machine to the SI Enterprise Manager, at least the address is required.

l Address [String] – Enterprise Manager IP address, default is 127.0.0.1

l Port [String] – Enterprise Manager Port, default is 3740

l Reconnect [Bool] – Reset connection and make a new one

Example of Connect-SIEnterpriseManager without any parameters (PS and EM are on the same server): Connect-SIEnterpriseManager

Example of Connect-SIEnterpriseManager using two of the above parameters: Connect-SIEnterpriseManager -A 192.168.189.57 -R 1

Step 3 – Then use the Get-SIPolicy command to return a list of policy names, the GUID, and their associated policy ID numbers.

PowerShell is now ready to create, edit, delete, and enable SI Policies.

Doc_ID 371 541

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Enable or Disable a Policy The Enable-SIPolicy command is used to enable or disable a policy using the policy ID retrieved in Step 3 of the SI PowerShell Initial Setup section. The following parameters are both required:

l PolicyID [uint32] – Policy ID

l Enable [Bool]

l 1 to enable

l 0 to disable

Example of an enable policy command: Enable-SIPolicy -PolicyID "255" –Enable 1

Example of a disable policy command. Enable-SIPolicy -PolicyID "255" -Enable 0

Delete a Policy The Remove-SIPolicy command is used to delete a policy using the policy ID retrieved in Step 3 of the Load the SI PowerShell Module section. The following parameter is required:

l PolicyID [uint32] – Policy ID

Example of a delete policy command: Remove-SIPolicy -PolicyID "255"

Add or Modify Policies The Export-SIPolicy and Import-SIPolicy commands can be used to export and edit the XML file of an existing SI policy, and then import (add or replace) the edited policy. See the Not an SI Policy XML Expert section to familiarize yourself with SI Policy layout and how to start making changes to the XML.

Export Policy to an XML File

Doc_ID 371 542

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Export-SIPolicy command retrieves the specified policy or policies as an XML file from SI into PowerShell or a specified location if you use PowerShell file redirection. The data produced by this command is identical in format to that produced by the SI Console export function.

The following parameter(s) are required:

l PolicyIDs [String] – List of comma separated policy IDs

Example of multiple policy exports that display in the PowerShell Console: Export-SIPolicy -PolicyIDs "111,222,33,555"

Example of a one policy export redirected to a file: Export-SIPolicy -PolicyIDs "255" >>c:\Import\ExampleExport1.xml

Import Policy from an XML File The Import-SIPolicy command imports a policy into the SI Enterprise Manager from an external XML file. This command is used to replace an existing policy or create a new one. The data produced by this command is identical in format to that produced by the SI Console import function.

During the import process, the Import-SIPolicy checks existing SI policy GUIDs against the GUID in the XML file. One of the following actions occur:

l XML file GUID matches existing policy – Updates the existing SI policy to match the new XML settings and fields

l XML file GUID does not match any existing policies – New policy is created according to the XML parameters. This new policy is created with an SI system generated GUID and Policy ID; the system discards the GUID and Policy ID from the source XML. NOTE: If an existing policy and a new policy in the pending XML import file share the same policy name, an error will display. The existing policy within SI remains unchanged.

RECOMMENDED: Provide a unique, descriptive name for any new policies.

The following parameter is required:

l FileName [String] – Path to file with valid XML content

Policies exported from the Policies interface in the SI Console have the option to be password protected. When importing these policies, the following parameter is required along with the FileName.

Doc_ID 371 543

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Pwd [String] – Password if importing policy exported by console with password

Example of adding an import XML file: Import-SIPolicy -FileName "c:\Import\ExampleImport2.xml"

The API returns as output the PolicyID, GUID, and Policy Name of the policy that has been updated or created. If a new policy was created, it is up to the user to capture the Policy ID and Policy GUID assigned by SI in order to later access that policy.

Remember, the Policy ID and Policy GUID is not the same as those in the source XML file. Alternatively, the user can use the Get-SIPolicy API call, and then find the newly created policy and its associated GUID and Policy ID by the name.

Get Collections The Get-SICollection command is used to return a SI Collections list of global stored policy configuration filter settings. These collections are managed by the Collection Manager window and can be accessed through specific policy filters that are associated with the type of collection.

Remove a Collection The Remove-SICollection command is used to delete a collection using the collection ID retrieved in the Get-SICollection command. The following parameter is required:

l CollectionID

Example of a remove collection command: Remove-SICollection –CollectionID “222”

Add or Modify Collections The Export-SICollection and Import-SICollection commands can be used to export and edit the XML file of an existing SI collection, and then import (add or replace) the edited collection. See the Not an SI Policy XML Expert section to familiarize yourself with SI Policy layout and how to start making changes to the XML.

Export Collections to an XML File

Doc_ID 371 544

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Export-SICollection command retrieves the specified collection or collections as an XML file from SI into PowerShell or a specified location if using PowerShell file redirection. The data produced by this command is identical in format to that produced by the SI Console export function.

The following parameter(s) are required:

l CollectionIDs [String] – List of comma separated Collection IDs

Example of multiple collection exports that display in the PowerShell Console: Export-SICollection –CollectionIDs “222,131,44”

Example of a single collection export to a file: Export-SICollection –CollectionIDs “222” >>c:\Import\ExampleExport1.xml

Import Collections from an XML File The Import-SICollection command imports a collection into the Collection Manager settings from an external XML file. This command is used to replace/modify an existing collection or create a new one. The data produced by this command is identical to that produced by the SI Console import function.

During the import process, the Import-SICollection command imports a collection into the SI Enterprise Manager from an external XML file. One of the following actions occur:

l XML file GUID matches existing collection – Updates the existing collection to match the new XML settings and fields

l XML file GUID does not match any existing collections – New collection is created according to the XML parameters. This new collection is created with an SI system generated GUID and Collection ID; the system discards the GUID and Collection ID from the source XML.

If an existing collection and a new collection in the pending XML import file share the same collection name, an error displays. The existing collection within SI remains unchanged.

RECOMMENDED: Provide a unique, descriptive name for any new collections.

The following parameter is required:

l FileName [String] – Path to file with valid XML content

Example of adding an import XML file:

Doc_ID 371 545

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Import-SICollection –FileName “c:\Import\ExampleImport2.xml”

The API returns as output the CollectionID, GUID, and Collection Name of the collection that has been updated or created. If a new collection was created, it is up to the user to capture the Collection ID and Collection GUID assigned by StealthINTERCEPT in order to later access that collection.

Remember, the Collection ID and Collection GUID are not the same as those in the source XML file. The Get-SICollection API call can find the newly created collection and its associated GUID and Collection ID by name.

Enterprise Password Enforcer (EPE) APIs The following content is specific to APIs related to StealthINTERCEPT's Enterprise Password Enforcer (EPE) Solution's Password Rules filter and Menu's EPE Settings Window window.

l Password Validation Test Against EPE Rules

l Export-SICharacterSubstitution

l Import-SICharacterSubstitution

l Export-SICharacterSubstitutionWords

l Import-SICharacterSubstitutionWords

l Export-SIPasswordsDictionary

l Import-SIPasswordsDictionary

l Set-SIPwnedDB

Password Validation Test Against EPE Rules The Test-ValidatePassword command checks if a user supplied password passes the Enterprise Manager Enforcer (EPE) rules configured in the Password Rules event filter and the global settings in the EPE Settings window.

The following parameters are required:

l Server –Domain Controller with SI Agent which will be used to check Password value. Supply the server in one of the three following formats:

Doc_ID 371 546

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l Domain\ServerName

l ServerName

l IP Address

l User – The user account testing the password

l Password – Password value to be validated

Example of a password validation command: Test-ValidatePassword –Server “domain\server” –User “Username” –Password “Passwordvalue”

Import Character Substitutions The Import-SICharacterSubstitution command imports the EPE Character Substitution Dictionary to the Enterprise Manager. Imported file content displays in the global Substitutions Editor Window accessed through the EPE Settings configuration window.

The following parameter is required:

l FileName [string] – Path to valid XML content

Example of adding an import xml file: Import-SICharacterSubstitution -FileName "c:\Import\CharacterSubstitution.txt"

Export Character Substitutions The Export-SICharacterSubstitution command exports the character substitution data currently being used by the Enterprise Manager. This is the same content displayed in the Substitution Editor window.

Example: Export-SICharacterSubstitution

Import Character Substitution Words

Doc_ID 371 547

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Import-SICharacterSubstitutionWords command imports the EPE words subject to character substitution to the Enterprise Manager. Imported file content is added to the global Words List Dictionary Window accessed through the EPE Settings configuration window.

The following parameter is required:

l FileName [string] – Path to valid XML content

Example of adding an import xml file: Import-SICharacterSubstitutionWords -FileName "C:\Import\CharacterSubstitutionWords.xml"

Export Character Substitution Words The Export-SICharacterSubstitutionWords command exports the EPE Words subject to character substitution currently being used by the Enterprise Manager. This is the same content displayed in the Words List Dictionary window.

Example: Export-SICharacterSubstitutionWords

Import Passwords Dictionary The Import-SIPasswordsDictionary command imports the EPE Password Dictionary to the Enterprise Manager from the specified file. This is the same content displayed in the Passwords Dictionary window

The following parameter is required:

l FileName [string] – Path to valid XML content

Export Passwords Dictionary The Export-SIPasswordsDictionary command exports the EPE Password Dictionary currently being used by the Enterprise Manager. This is the same content displayed in the Passwords Dictionary window.

Example: Export-SIPasswordsDictionary

Doc_ID 371 548

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Set the Pwned Database The Set-SIPwnedDB command converts the single specified hash file to the internal files used by the Enterprise Manager and/or SI Agents.

The following parameter is required:

l FileName [string] – Path to hash file

Example of adding an import xml file: Set-SIPwnedDB -FileName "c:\pwned_db.txt"

StealthDEFEND Event Sink Tab The following are APIs related to where StealthINTERCEPT sends the event data to and how to retrieve current information on the previously configured settings.

l Set-SIDefendConfig

l Get-SIDefendConfig

Set StealthDEFEND Configuration The Set-SIDefendConfig command tells StealthINTERCEPT where to send the event data from all tab settings on the StealthDEFEND Configuration Windows. There are three methods available for data output:

l StealthDEFEND AMQP (URI/Port) – Sends event data directly to StealthDEFEND

l File on an Agent – Sends event data to a specified file. The server must have a deployed Agent.

l Stealthbits Activity Monitor – Sends event data either directly to a Stealthbits Activity Monitor (SAM) port or a file SAM will then access on a domain controller where both the SI Agent and Activity Monitor are located. Then SAM must be configured to send the data to StealthDEFEND. See the Stealthbits Activity Monitor User Guides v6.0 for additional information.

Remember, the port number for SAM is 4498.

The following parameter(s) are required:

Doc_ID 371 549

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l AppToken – String generated on the App Tokens page of StealthDEFEND Configuration Menu

l URI – StealthDEFEND hostname or IP address

l Protocol – Specifies the behavior of the string as AMQP or File path

l Path – File path to the Agent location where StealthINTERCEPT event data is sent. This parameter is required in when the protocol is set to File.

l Port – StealthDEFEND port. The default is 10001.

Example using URI and AppToken to connect to StealthDEFEND: Set-SIDefendConfig -URI "amqp://192.168.9.52:10001" -AppToken "egJhbGciOiJIi8of71eg0Ulwk5o2nm5p..."

Example using an output file on an Agent: Set-SIDefendConfig -Path "C:\TestOutput" -Protocol "File"

Example using SAM to send to StealthDEFEND: Set-SIDefendConfig -Protocol "amqp" -ComputerName "LocalHost" -Port "4498"

Get StealthDEFEND Configuration The Get-SIDefendConfig command is used to return all Event Sink window settings currently configured in the StealthDEFEND Configuration window.

LDAP Deception for StealthDEFEND The following content is specific to APIs related to the LDAP Deception trap options on the Honey Token Tab of the StealthDEFEND Configuration window.

Get LDAP Deception The Get-SILdapDeception command provides the current information configured in the Honey Token tab of the StealthDEFEND Configuration window.

Set LDAP Deception

Doc_ID 371 550

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

The Set-SILdapDeception command changes the Honey Token tab settings in the SI Console.

Remember, these settings must be an exact match to the configuration set up in the StealthDEFEND Honey Token threat.

The following parameter(s) are required:

l Enable [Bool]

l 1 to enable

l 0 to disable

l ReplacementSamAccountName

l SourceSamAccountName

l SubstitutionType

l 1 for exact match

l 2 for a substring

Example of LDAP Deception parameters: Set-SILdapDeception -E "1" -S "SamAccountName" -R "NameToReplace" -T "1"

Not an SI Policy XML Expert Not Sure How to Create or Edit a Policy XML? Follow the steps to compare two XML files as exported from SI.

Step 1 – Craft the desired policy in the SI Administration Console and Export as a XML file.

Step 2 – In the SI Administration Console, edit the same policy settings and filters through the Event Type tab. Export as a second XML file with a different name.

Step 3 – Open both XML files and compare the XML to see how policies are altered.

Once you identify how SI modifies XML files, you can apply that to the Add or Modify Policies instructions.

Remote PowerShell Connection

Doc_ID 371 551

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

These instructions are for users who want to use the PowerShell StealthINTERCEPT APIs from a remote server, where the Enterprise Manager is not located. On the remote server, create a folder with the following set of libraries:

l CertsInfo\root.dat

l BouncyCastle.Crypto.dll

l Google.Protobuf.dll

l Grpc.Common.dll

l Grpc.Core.dll

l Grpc.Core.Api.dll

l Grpc.Messages.Security.dll

l grpc_csharp_ext.x64.dll

l grpc_csharp_ext.x86.dll

l SI.Common.Util.dll

l SI.SIMonitor.ConsoleMessages.dll

l SI.SIMonitor.PowerShell.dll

l System.Memory.dll

l System.Runtime.CompilerServices.Unsafe.dll

From PowerShell, execute the Import-Module command specifying the path to SI.Monitor.PowerShell.dll and continue from Step 2 of the Load the SI PowerShell Module section to use PowerShell APIs.

Appendix: Default Custom Scripts The following default sample Default Visual Basic Script , Default C# Script, and Default PowerShell 4.0 Script are the default custom scripts shipped with StealthINTERCEPT. These scripts can be found in the Add Action window when adding either a .Net Script Action or a PowerShell 4.0 Action.

Default Visual Basic Script The following Visual Basic script is configured as a default action. It will either create the c:\nveventdata.txt file or append to it the event data.

Doc_ID 371 552

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Imports Microsoft.VisualBasic Imports System Imports System.Collections Imports System.IO Imports System.Text Imports SI.Common.Messages Imports SI.SIMonitor.ConsoleMessages.Helpers

Namespace ScriptNamespace

Public Class ScriptClass

Private helper As EventConsumerHelper = Nothing

'''Required class constructor Public Sub New(ByVal ecHelper As EventConsumerHelper) MyBase.New Me.helper = ecHelper End Sub

'Public Read-Only Properties of EventConsumerHelper are as follows: ' public DateTime TimeLogged ' public DateTime TimeLoggedUtc ' public string EventSourceType ' public string EventSourceName ' public string SettingName ' public string EventName ' public string DN ' public string ClassName ' public string Perpetrator ' public string OriginatingServer ' public string OriginatingClient ' public string Success ' public string Status ' public Hashtable NewAttributes ' public Hashtable OldAttributes ' public Hashtable Operations ' public string BlockedEvent ' public string EventsCount ' public string OriginatingClientProtocol ' public string FromHost

Doc_ID 371 553

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

' public string FromHostIp ' public string ToHost ' public string ToHostIp ' public string LoginType ' public string AffectedObjectSid ' public string OriginatingServerIp ' public string PerpetratorName ' public string PerpetratorSid ' public string EventNameTranslated 'Enter code in method ScriptMain below: ' new attributes ' old attributes ' operations Public Overridable Sub ScriptMain()

Dim sw As System.IO.StreamWriter = Nothing Try sw = New System.IO.StreamWriter("c:\si_ eventdata.txt", true) sw.WriteLine ("======") sw.WriteLine(("TimeLogged: " + helper.TimeLogged.ToString)) sw.WriteLine(("TimeLoggedUtc: " + helper.TimeLoggedUtc.ToString)) sw.WriteLine(("EventSourceType: " + helper.EventSourceType)) sw.WriteLine(("EventSourceName: " + helper.EventSourceName)) sw.WriteLine(("SettingName: " + helper.SettingName)) sw.WriteLine(("EventName: " + helper.EventName)) sw.WriteLine(("DN: " + helper.DN.ToString)) sw.WriteLine(("ClassName: " + helper.ClassName)) sw.WriteLine(("Perpetrator: " + helper.Perpetrator)) sw.WriteLine(("OriginatingServer: " + helper.OriginatingServer)) sw.WriteLine(("OriginatingClient: " + helper.OriginatingClient)) sw.WriteLine(("Success: " + helper.Success.ToString)) sw.WriteLine(("Status: " + helper.Status))

Doc_ID 371 554

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

sw.WriteLine(("BlockedEvent: " + helper.BlockedEvent.ToString)) sw.WriteLine(("EventsCount: " + helper.EventsCount.ToString)) sw.WriteLine(("OriginatingClientProtocol: " + helper.OriginatingClientProtocol)) sw.WriteLine(("FromHost: " + helper.FromHost)) sw.WriteLine(("FromHostIp: " + helper.FromHostIp)) sw.WriteLine(("ToHost: " + helper.ToHost)) sw.WriteLine(("ToHostIp: " + helper.ToHostIp)) sw.WriteLine(("LoginType: " + helper.LoginType.ToString)) sw.WriteLine(("AffectedObjectSid: " + helper.AffectedObjectSid)) sw.WriteLine(("OriginatingServerIp: " + helper.OriginatingServerIp)) sw.WriteLine(("PerpetratorName: " + helper.PerpetratorName)) sw.WriteLine(("PerpetratorSid: " + helper.PerpetratorSid)) sw.WriteLine(("EventNameTranslated: " + helper.EventNameTranslated))

sw.WriteLine("") sw.WriteLine("New Attributes:") sw.WriteLine("------") sw.WriteLine(Me.GetAttributes(helper.NewAttributes))

sw.WriteLine("") sw.WriteLine("Old Attributes:") sw.WriteLine("------") sw.WriteLine(Me.GetAttributes(helper.OldAttributes))

sw.WriteLine("") sw.WriteLine("Operations:") sw.WriteLine("------") sw.WriteLine(Me.GetAttributes(helper.Operations)) sw.WriteLine ("======") sw.WriteLine("") sw.Flush

Doc_ID 371 555

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Catch e As System.Exception Finally sw.Close End Try End Sub

Private Function GetAttributes(ByVal attributes As System.Collections.Hashtable) As String Dim sb As System.Text.StringBuilder = New System.Text.StringBuilder() Dim enumerator As System.Collections.IEnumerator = attributes.GetEnumerator

Do While enumerator.MoveNext Dim attrName As String = Nothing Dim de As System.Collections.DictionaryEntry = CType (enumerator.Current,System.Collections.DictionaryE ntry) If (de.Key <> Nothing) Then attrName = de.Key.ToString Else attrName = "" End If sb.Append(attrName) sb.Append(": ") If Not (de.Value Is Nothing) Then If (de.Value.GetType Is GetType (SI.Common.Messages.NvMessageArray)) Then Dim values As SI.Common.Messages.NvMessageArray = CType (de.Value,SI.Common.Messages.NvMessageArray) If (values.Count > 0) Then Dim valueCount As Integer = values.Count Dim valueEnumerator As System.Collections.IEnumerator = values.GetEnumerator Do While valueEnumerator.MoveNext Dim o As Object = valueEnumerator.Current If (o <> Nothing) Then sb.Append(o.ToString) valueCount = (valueCount - 1)

Doc_ID 371 556

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

If (valueCount > 0) Then sb.Append(", ") Else sb.Append (""&Global.Microsoft.VisualBasic.C hrW (13)&Global.Microsoft.VisualBasic. ChrW(10)) End If End If

Loop End If Else sb.Append(de.Value.ToString) sb.Append(""&Global.Microsoft.VisualBasic.ChrW (13)&Global.Microsoft.VisualBasic.ChrW(10)) End If End If

Loop Return sb.ToString End Function End Class End Namespace

Default C# Script The following C# script is configured as a default action. It will either create the c:\nveventdata.txt file or append to it the event data. namespace ScriptNamespace { using System; using System.Collections; using System.IO; using System.Text; using SI.Common.Messages; using SI.SIMonitor.ConsoleMessages.Helpers;

public class ScriptClass

Doc_ID 371 557

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

{

private EventConsumerHelper helper = null;

/// Required class constructor public ScriptClass(EventConsumerHelper ecHelper) { this.helper = ecHelper; }

// Public Read-Only Properties of EventConsumerHelper are as follows: // public DateTime TimeLogged // public DateTime TimeLoggedUtc // public string EventSourceType // public string EventSourceName // public string SettingName // public string EventName // public string DN // public string ClassName // public string Perpetrator // public string OriginatingServer // public string OriginatingClient // public string Success // public string Status // public Hashtable NewAttributes // public Hashtable OldAttributes // public Hashtable Operations // public string BlockedEvent // public string EventsCount // public string OriginatingClientProtocol // public string FromHost // public string FromHostIp // public string ToHost // public string ToHostIp // public string LoginType // public string AffectedObjectSid // public string OriginatingServerIp // public string PerpetratorName // public string PerpetratorSid // public string EventNameTranslated // Enter code in method ScriptMain below:

Doc_ID 371 558

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

// new attributes // old attributes // operations public virtual void ScriptMain() {

System.IO.StreamWriter sw = null; try { sw = new System.IO.StreamWriter("c:\\si_ eventdata.txt", true); sw.WriteLine ("======"); sw.WriteLine(("TimeLogged: " + helper.TimeLogged.ToString())); sw.WriteLine(("TimeLoggedUtc: " + helper.TimeLoggedUtc.ToString())); sw.WriteLine(("EventSourceType: " + helper.EventSourceType)); sw.WriteLine(("EventSourceName: " + helper.EventSourceName)); sw.WriteLine(("SettingName: " + helper.SettingName)); sw.WriteLine(("EventName: " + helper.EventName)); sw.WriteLine(("DN: " + helper.DN.ToString())); sw.WriteLine(("ClassName: " + helper.ClassName)); sw.WriteLine(("Perpetrator: " + helper.Perpetrator)); sw.WriteLine(("OriginatingServer: " + helper.OriginatingServer)); sw.WriteLine(("OriginatingClient: " + helper.OriginatingClient)); sw.WriteLine(("Success: " + helper.Success.ToString())); sw.WriteLine(("Status: " + helper.Status)); sw.WriteLine(("BlockedEvent: " + helper.BlockedEvent.ToString())); sw.WriteLine(("EventsCount: " + helper.EventsCount.ToString()));

Doc_ID 371 559

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

sw.WriteLine(("OriginatingClientProtocol: " + helper.OriginatingClientProtocol)); sw.WriteLine(("FromHost: " + helper.FromHost)); sw.WriteLine(("FromHostIp: " + helper.FromHostIp)); sw.WriteLine(("ToHost: " + helper.ToHost)); sw.WriteLine(("ToHostIp: " + helper.ToHostIp)); sw.WriteLine(("LoginType: " + helper.LoginType.ToString())); sw.WriteLine(("AffectedObjectSid: " + helper.AffectedObjectSid)); sw.WriteLine(("OriginatingServerIp: " + helper.OriginatingServerIp)); sw.WriteLine(("PerpetratorName: " + helper.PerpetratorName)); sw.WriteLine(("PerpetratorSid: " + helper.PerpetratorSid)); sw.WriteLine(("EventNameTranslated: " + helper.EventNameTranslated));

sw.WriteLine(""); sw.WriteLine("New Attributes:"); sw.WriteLine("------"); sw.WriteLine(this.GetAttributes (helper.NewAttributes));

sw.WriteLine(""); sw.WriteLine("Old Attributes:"); sw.WriteLine("------"); sw.WriteLine(this.GetAttributes (helper.OldAttributes));

sw.WriteLine(""); sw.WriteLine("Operations:"); sw.WriteLine("------"); sw.WriteLine(this.GetAttributes (helper.Operations)); sw.WriteLine ("======"); sw.WriteLine("");

Doc_ID 371 560

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

sw.Flush(); } catch (System.Exception e) { } finally { sw.Close(); } }

private string GetAttributes (System.Collections.Hashtable attributes) { System.Text.StringBuilder sb = new System.Text.StringBuilder(); System.Collections.IEnumerator enumerator = attributes.GetEnumerator(); for ( ; enumerator.MoveNext(); ) { string attrName = null; System.Collections.DictionaryEntry de = ((System.Collections.DictionaryEntry) (enumerator.Current)); if ((de.Key != null)) { attrName = de.Key.ToString(); } else { attrName = ""; } sb.Append(attrName); sb.Append(": "); if ((de.Value != null)) { if ((de.Value.GetType() == typeof (SI.Common.Messages.NvMessageArray))) {

Doc_ID 371 561

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

SI.Common.Messages.NvMessageArray values = ((SI.Common.Messages.NvMessageArray) (de.Value)); if ((values.Count > 0)) { int valueCount = values.Count; System.Collections.IEnumerator valueEnumerator = values.GetEnumerator(); for ( ; valueEnumerator.MoveNext(); ) { object o = valueEnumerator.Current; if ((o != null)) { sb.Append(o.ToString()); valueCount = (valueCount - 1); if ((valueCount > 0)) { sb.Append(", "); } else { sb.Append("\r\n"); } } } } } else { sb.Append(de.Value.ToString()); sb.Append("\r\n"); } } } return sb.ToString(); } } }

Doc_ID 371 562

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Default PowerShell 4.0 Script The following PowerShell 4.0 script is configured as a default action. It will either create the c:\nveventdata.txt file or append to it the event data. # Note: Powershell 4.0 or later is required for # Integration with StealthINTERCEPT variables

# input parameters # $event, $helper function Write-Attributes () { Param([System.IO.StreamWriter] $sw, [system.collections.hashtable] $attributes) foreach ($key in $attributes.Keys) { $s = $key + ": " $v = $attributes[$key] # echo $v.GetType()

if($v.GetType().FullName -eq 'SI.Common.Messages.NvMessageArray') { $sv = "" $index = 0 $values = $v;

foreach ($value in $values) { if ($index -gt 0) { $sv = $sv + ", " }

$sv = $sv + $value $index = $index + 1 }

$s = $s + $sv } else {

Doc_ID 371 563

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

$s = $s + $v }

$sw.WriteLine($s)

} }

[System.IO.StreamWriter] $sw = $null Try { $sw = New-Object System.IO.StreamWriter ("C:\si_ eventdata.txt", $true) $sw.WriteLine("======") $sw.WriteLine(("TimeLogged: " + $helper.TimeLogged.ToString ())) $sw.Flush() $sw.WriteLine(("TimeLoggedUtc: " + $helper.TimeLoggedUtc.ToString())) $sw.Flush() $sw.WriteLine(("EventSourceType: " + $helper.EventSourceType)) $sw.Flush() $sw.WriteLine(("EventSourceName: " + $helper.EventSourceName)) $sw.Flush() $sw.WriteLine(("SettingName: " + $helper.SettingName)) $sw.WriteLine(("EventName: " + $helper.EventName)) $sw.WriteLine(("DN: " + $helper.DN.ToString())) $sw.WriteLine(("ClassName: " + $helper.ClassName)) $sw.WriteLine(("Perpetrator: " + $helper.Perpetrator)) $sw.WriteLine(("OriginatingServer: " + $helper.OriginatingServer)) $sw.WriteLine(("OriginatingClient: " + $helper.OriginatingClient)) $sw.WriteLine(("Success: " + $helper.Success.ToString())) $sw.WriteLine(("Status: " + $helper.Status)) $sw.WriteLine(("BlockedEvent: " + $helper.BlockedEvent.ToString())) $sw.WriteLine(("EventsCount: " + $helper.EventsCount.ToString()))

Doc_ID 371 564

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

$sw.WriteLine(("OriginatingClientProtocol: " + $helper.OriginatingClientProtocol)) $sw.WriteLine(("FromHost: " + $helper.FromHost)) $sw.WriteLine(("FromHostIp: " + $helper.FromHostIp)) $sw.WriteLine(("ToHost: " + $helper.ToHost)) $sw.WriteLine(("ToHostIp: " + $helper.ToHostIp)) $sw.WriteLine(("LoginType: " + $helper.LoginType.ToString ())) $sw.WriteLine(("AffectedObjectSid: " + $helper.AffectedObjectSid)) $sw.WriteLine(("OriginatingServerIp: " + $helper.OriginatingServerIp)) $sw.WriteLine(("PerpetratorName: " + $helper.PerpetratorName)) $sw.WriteLine(("PerpetratorSid: " + $helper.PerpetratorSid)) $sw.WriteLine(("EventNameTranslated: " + $helper.EventNameTranslated)) $sw.Flush()

$sw.WriteLine("") $sw.WriteLine("New Attributes:") $sw.WriteLine("------") Write-Attributes -sw $sw -attributes $helper.NewAttributes

$sw.WriteLine("") $sw.WriteLine("Old Attributes:") $sw.WriteLine("------") Write-Attributes -sw $sw -attributes $helper.OldAttributes

$sw.WriteLine("") $sw.WriteLine("Operations:") $sw.WriteLine("------") Write-Attributes -sw $sw -attributes $helper.Operations $sw.WriteLine("======") $sw.WriteLine("")

$sw.Flush() $sw.Close() } Catch { echo $_.Exception.GetType().FullName, $_.Exception.Message

Doc_ID 371 565

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

if($sw) { $sw.WriteLine("Exception") $sw.WriteLine($_.Exception.GetType().FullName, $_.Exception.Message)

$sw.Flush() $sw.Close() } }

Appendix: Action Template Custom Scripts These are custom scripts created by Stealthbits Engineers which execute the following notification emails:

l Account Enablement

l Password Never Expires

l Lock and/or Unlock Account

l Password Changes

l Password Rejection

All of the actions above are used in templates found within the Actions Policy Templates folder. See the Actions Folder Templates section for additional information.

Account Enablement The following C# script sends an email notification to the specified Administrator when an Active Directory account is enabled.

The following environmental variables must be added to the script prior to execution:

l SMTPHOST – Name of the organization’s SMTP server

l SMTPPORT – Port used by the organization’s SMTP server

l SMTPENABLESSL – Indicates whether SSL is enabled or disabled on the SMTP server

l False = Do not use SSL

l True = Use SSL

Doc_ID 371 566

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l SMTPFROM – Valid email account sending the email to the recipient

l SMTPID – Valid username for SMTP server within the users environment

l SMTPPwD – Valid password for the username above

In the Actions Template folder, the AD Changes: Notify Admin that account is now enabled template is preconfigured to use this action script. namespace ScriptNamespace { using System; using System.Collections; using System.IO; using System.Text; using SI.Common.Messages; using SI.SIMonitor.ConsoleMessages.Helpers; using System.Net.Mail; using System.DirectoryServices;

public class ScriptClass { private const string SMTPHOST = "mail.MyDomain.com" private const int SMTPPORT = 25; private const bool SMTPENABLESSL = false; private const bool SMTPUSEDEFAULTCREDENTIALS = true; private const bool SMTPHTML = true; private const string SMTPFROM = "[email protected]"; private const string SMTPID = "username"; private const string SMTPPWD = "password"; private EventConsumerHelper help = null; private const string kEmailAttribute = "mail";

/// Required class constructor public ScriptClass (EventConsumerHelper ecHelper) { this.helper = ecHelper; }

public virtual void ScriptMain() { string SMTPTO = GetStringAttribute (helper.Perpetrator,kEmailAttribute); if (string.IsNullOrEmpty(SMTPTO))

Doc_ID 371 567

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

throw new Exception("AD attribute 'email' is empty"); if (string.IsNullOrEmpty(helper.EventNameTranslated)) return; if (!helper.EventNameTranslated.ToLower().Equals ("account enabled")) return;

MailMessage msg = new MailMessage(); msg.From = new MailAddress(SMTPFROM); msg.To.Add(SMTPTO); msg.Priority = MailPriority.High; msg.Subject = helper.EventNameTranslated;

StringBuilder sb = new StringBuilder(); sb.AppendLine(""); sb.AppendLine(""); sb.AppendLine(String.Format("EventName: {0}
", helper.EventName)); sb.AppendLine(String.Format("EventNameTranslated: {0}
", helper.EventNameTranslated)); sb.AppendLine(String.Format("TimeLoggedUtc: {0}
", helper.TimeLoggedUtc.ToString("MMMM d, yyyy h:mm:ss tt"))); sb.AppendLine(String.Format("Account: {0}
", helper.DN)); sb.AppendLine(String.Format("Perpetrator: {0}
", helper.PerpetratorName)); sb.AppendLine(""); sb.AppendLine(""); string body = sb.ToString(); msg.Body = body; msg.IsBodyHtml = SMTPHTML; SmtpClient client = new SmtpClient(); client.Host = SMTPHOST; client.Port = SMTPPORT; client.EnableSsl = SMTPENABLESSL; client.UseDefaultCredentials = SMTPUSEDEFAULTCREDENTIALS; if (!SMTPUSEDEFAULTCREDENTIALS) {

Doc_ID 371 568

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

client.Credentials = new System.Net.NetworkCredential(SMTPID, SMTPPWD); } client.DeliveryMethod = SmtpDeliveryMethod.Network; client.Send(msg); } private string GetStringAttribute(string dn, string AttributeName) { string result = string.Empty; try { DirectoryEntry root = new DirectoryEntry(); using (DirectorySearcher searcher = new DirectorySearcher(root)) { searcher.Filter = "(distinguishedName=" + dn + ")"; searcher.PropertiesToLoad.Clear(); searcher.ReferralChasing = ReferralChasingOption.All; searcher.PropertiesToLoad.Add(AttributeName); searcher.ClientTimeout = new TimeSpan(0, 0, 10);

var searchResult = searcher.FindOne(); if (searchResult != null) { if (searchResult.Properties.Contains (AttributeName)) { result = searchResult.Properties[AttributeName] [0] as string; } } } } catch { } return result; } } }

Doc_ID 371 569

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

Password Never Expires The following C# script sends an email notification to the specified Administrator when an Active Directory account is set to have its password never expire.

The following environmental variables must be added to the script prior to execution:

l SMTPHOST – Name of the organization’s SMTP server

l SMTPPORT – Port used by the organization’s SMTP server

l SMTPENABLESSL – Indicates whether SSL is enabled or disabled on the SMTP server

l False = Do not use SSL

l True = Use SSL

l SMTPFROM – Valid email account sending the email to the recipient

l SMTPID – Valid username for SMTP server within the users environment

l SMTPPwD – Valid password for the username above

In the Actions Template folder, the ADChanges: Notify Admin that account now has Password Never Exp template is preconfigured to use this action script. namespace ScriptNamespace { using System; using System.Collections; using System.IO; using System.Text; using SI.Common.Messages; using SI.SIMonitor.ConsoleMessages.Helpers; using System.Net.Mail; using System.DirectoryServices;

public class ScriptClass { private const string SMTPHOST = "mail.MyDomain.com"; private const int SMTPPORT = 25; private const bool SMTPENABLESSL = false; private const bool SMTPUSEDEFAULTCREDENTIALS = true; private const bool SMTPHTML = true; private const string SMTPFROM = "[email protected]"; private const string SMTPID = "username"; private const string SMTPPWD = "password"; private EventConsumerHelper helper = null;

Doc_ID 371 570

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

private const string kEmailAttribute = "mail"; private const string kAccountExpiresAttr = "accountExpires"; private const string kAccountExpiresValue = "account never expires";

/// Required class constructor public ScriptClass (EventConsumerHelper ecHelper) { this.helper = exHelper; }

public virtual void ScriptMain() { string SMTPTO = GetStringAttribute (helper.Perpetrator,kEmailAttribute); if (strong.IsNullOrEmpty(SMTPTO)) throw new Exception ("AD attribute 'email' is empty);

string oldAttValue =GetAttributeFromHash (helper.OldAttributes,kAccountExpiresAttr); if (!string.IsNullOrEmpty(oldAttValue)) if (oldAttValue.ToLower().Equals (kAccountExpiresValue)) return;

string newAttValue = GetAttributeFromHash (helper.NewAttributes,kAccountExpiresAttr); if (string.IsNullOrEmpty(newAttValue)) return;

if (!newAttValue.ToLower().Equals (kAccountExpiresValue)) Return

MailMessage msg = new MailMessage(); msg.From = new MailAddress(SMTPFROM); msg.To.Add(SMTPTO); msg.Priority = MailPriority.High; msg.Subject = helper.EventNameTranslated;

Doc_ID 371 571

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

StringBuilder sb = new StringBuilder(); sb.AppendLine(""); sb.AppendLine(""); sb.AppendLine(String.Format("EventName: {0}
", helper.EventName)); sb.AppendLine(String.Format("TimeLoggedUtc: {0}
", helper.TimeLoggedUtc.ToString("MMMM d, yyyy h:mm:ss tt"))); sb.AppendLine(String.Format("Account: {0} now has 'Password Never Expires' option
", helper.DN)); sb.AppendLine(String.Format("Perpetrator: {0}
", helper.PerpetratorName)); sb.AppendLine(""); sb.AppendLine(""); string body = sb.ToString(); msg.Body = body; msg.IsBodyHtml = SMTPHTML; SmtpClient client = new SmtpClient(); client.Host = SMTPHOST; client.Port = SMTPPORT; client.EnableSsl = SMTPENABLESSL; client.UseDefaultCredentials = SMTPUSEDEFAULTCREDENTIALS; if (!SMTPUSEDEFAULTCREDENTIALS) { client.Credentials = new System.Net.NetworkCredential(SMTPID, SMTPPWD); } client.DeliveryMethod = SmtpDeliveryMethod.Network; client.Send(msg); }

private string GetStringAttribute(string dn, string AttributeName) { string result = string.Empty; try {

Doc_ID 371 572

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

DirectoryEntry root = new DirectoryEntry(); using (DirectorySearcher searcher = new DirectorySearcher(root)) { searcher.Filter = "(distinguishedName=" + dn + ")"; searcher.PropertiesToLoad.Clear(); searcher.ReferralChasing = ReferralChasingOption.All; searcher.PropertiesToLoad.Add(AttributeName); searcher.ClientTimeout = new TimeSpan(0, 0, 10); var searchResult = searcher.FindOne(); if (searchResult != null) { if (searchResult.Properties.Contains (AttributeName)) { result = searchResult.Properties [AttributeName][0] as string; } } } } catch { } return result; } private string GetAttributeFromHash (System.Collections.Hashtable attributes, string attributename) { foreach (var att in attributes) { System.Collections.DictionaryEntry de = ((System.Collections.DictionaryEntry)(att)); if ((de.Key != null)) { string attrName = de.Key.ToString(); if (!string.IsNullOrEmpty(attrName)) { if (attrName.Equals(attributename)) {

Doc_ID 371 573

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

if (de.Value == null) return string.Empty; else return de.Value.ToString(); } } } } return string.Empty; } } }

Lock and/or Unlock Account The following C# script sends an email notification to the specified User when an Active Directory account is locked and/or unlocked.

The following environmental variables must be added to the script prior to execution:

l SMTPHOST – Name of the organization’s SMTP server

l SMTPPORT – Port used by the organization’s SMTP server

l SMTPENABLESSL – Indicates whether SSL is enabled or disabled on the SMTP server

l False = Do not use SSL

l True = Use SSL

l SMTPFROM – Valid email account sending the email to the recipient

l SMTPID – Valid username for SMTP server within the users environment

l SMTPPwD – Valid password for the username above

In the Actions Template folder, the AD Changes: Notify Admin that account was locked/unlocked template is preconfigured to use this action script. namespace ScriptNamespace { using System; using System.Collections; using System.IO; using System.Text; using SI.Common.Messages; using SI.SIMonitor.ConsoleMessages.Helpers;

Doc_ID 371 574

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

using System.Net.Mail; using System.DirectoryServices;

public class ScriptClass { private const string SMTPHOST ="mail.MyDomain.com"; private const int SMTPPORT = 25"; private const book SMTPENABLESSL = false; private const bool SMTPUSEDEFAULTCREDENTIALS = true; private const bool SMTPHTML = true; private const SMTPFROM ="[email protected]"; private const string SMTPID ="username"; private const string SMTPPWD = "password"; private EventConsumerHelper helper = null; private const string kEmailAttribute = "mail"

/// Required class constructor public ScriptClass(EventConsumerHelper ecHelper) { this.helper = ecHelper; }

public virtual void ScriptMain() { string SMTPTO = GetStringAttribute(helper.DN, kEmailAttribute); if (string.IsNullOrEmpty(SMTPTO)) throw new Exception("AD attribute 'email' is empty");

if (string.IsNullOrEmpty(helper.EventNameTranslated)) return;

if (!helper.EventNameTranslated.ToLower().Equals ("account unlocked") && !helper.EventNameTranslated.ToLower().Equals("account locked")) return;

MailMessage msg = new MailMessage(); msg.From = new MailAddress(SMTPFROM); msg.To.Add(SMTPTO); msg.Priority = MailPriority.High;

Doc_ID 371 575

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

msg.Subject = helper.EventNameTranslated;

StringBuilder sb = new StringBuilder(); sb.AppendLine(""); sb.AppendLine(""); sb.AppendLine(String.Format("EventName: {0}
", helper.EventName)); sb.AppendLine(String.Format("EventNameTranslated: {0}
", helper.EventNameTranslated)); sb.AppendLine(String.Format("TimeLoggedUtc: {0}
", helper.TimeLoggedUtc.ToString("MMMM d, yyyy h:mm:ss tt"))); sb.AppendLine(String.Format("DN: {0}
", helper.DN)); sb.AppendLine(String.Format("Perpetrator: {0}
", helper.PerpetratorName)); sb.AppendLine(""); sb.AppendLine(""); string body = sb.ToString(); msg.Body = body; msg.IsBodyHtml = SMTPHTML; SmtpClient client = new SmtpClient(); client.Host = SMTPHOST; client.Port = SMTPPORT; client.EnableSsl = SMTPENABLESSL; client.UseDefaultCredentials = SMTPUSEDEFAULTCREDENTIALS; if (!SMTPUSEDEFAULTCREDENTIALS) { client.Credentials = new System.Net.NetworkCredential(SMTPID, SMTPPWD); } client.DeliveryMethod = SmtpDeliveryMethod.Network; client.Send(msg); }

private string GetStringAttribute(string dn, string AttributeName) { string result = string.Empty; try { DirectoryEntry root = new DirectoryEntry();

Doc_ID 371 576

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

using (DirectorySearcher searcher = new DirectorySearcher(root)) { searcher.Filter = "(distinguishedName=" + dn + ")"; searcher.PropertiesToLoad.Clear(); searcher.ReferralChasing = ReferralChasingOption.All; searcher.PropertiesToLoad.Add(AttributeName); searcher.ClientTimeout = new TimeSpan(0, 0, 10);

var searchResult = searcher.FindOne(); if (searchResult != null) { if (searchResult.Properties.Contains (AttributeName)) { result = searchResult.Properties [AttributeName][0] as string; } } } } catch { } return result; } } }

Password Changes The following C# script sends an email notification to the specified User when their Active Directory password has changed.

The following environmental variables must be added to the script prior to execution:

l SMTPHOST – Name of the organization’s SMTP server

l SMTPPORT – Port used by the organization’s SMTP server

Doc_ID 371 577

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

l SMTPENABLESSL – Indicates whether SSL is enabled or disabled on the SMTP server

l False = Do not use SSL

l True = Use SSL

l SMTPFROM – Valid email account sending the email to the recipient

l SMTPID – Valid username for SMTP server within the users environment

l SMTPPwD – Valid password for the username above

In the Actions Template folder, the AD Changes: Notify user that his password changed template is preconfigured to use this action script. namespace ScriptNamespace { using System; using System.Collections; using System.IO; using System.Text; using SI.Common.Messages; using SI.SIMonitor.ConsoleMessages.Helpers; using System.Net.Mail; using System.DirectoryServices;

public class ScriptClass { private const string SMTPHOST = "mail.MyDomain.com"; private const int SMTPPORT = 25; private const bool SMTPENABLESSL = false; private const bool SMTPUSEDEFAULTCREDENTIALS = true; private const bool SMTPHTML = true; private const string SMTPFROM = "[email protected]"; private const string SMTPSUBJECT = "Account password was changed"; private const string SMTPID = "username"; private const string SMTPPWD = "password"; private EventConsumerHelper helper = null; private const string kUnicodePwdAttribute = "unicodepwd"; private const string kEmailAttribute = "mail";

/// Required class constructor public ScriptClass(EventConsumerHelper ecHelper) { this.helper = ecHelper;

Doc_ID 371 578

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

}

public virtual void ScriptMain() { if (!helper.EventNameTranslated.ToLower().Equals ("password changed")) return; if (!AttributeExists(helper.NewAttributes, kUnicodePwdAttribute)) return;

string SMTPTO = GetStringAttribute(helper.DN, kEmailAttribute); if (string.IsNullOrEmpty(SMTPTO)) throw new Exception("AD attribute 'email' is empty");

MailMessage msg = new MailMessage(); msg.From = new MailAddress(SMTPFROM); msg.To.Add(SMTPTO); msg.Priority = MailPriority.High; msg.Subject = SMTPSUBJECT;

StringBuilder sb = new StringBuilder(); sb.AppendLine(""); sb.AppendLine(""); sb.AppendLine(String.Format("EventName: {0}
", helper.EventName)); sb.AppendLine(String.Format("EventNameTranslated: {0}
", helper.EventNameTranslated)); sb.AppendLine(String.Format("TimeLoggedUtc: {0}
", helper.TimeLoggedUtc.ToString("MMMM d, yyyy h:mm:ss tt"))); sb.AppendLine(String.Format("DN: {0}
", helper.DN)); sb.AppendLine(String.Format("Perpetrator: {0}
", helper.PerpetratorName)); sb.AppendLine(""); sb.AppendLine(""); string body = sb.ToString(); msg.Body = body; msg.IsBodyHtml = SMTPHTML; SmtpClient client = new SmtpClient(); client.Host = SMTPHOST;

Doc_ID 371 579

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

client.Port = SMTPPORT; client.EnableSsl = SMTPENABLESSL; client.UseDefaultCredentials = SMTPUSEDEFAULTCREDENTIALS; if (!SMTPUSEDEFAULTCREDENTIALS) { client.Credentials = new System.Net.NetworkCredential(SMTPID, SMTPPWD); } client.DeliveryMethod = SmtpDeliveryMethod.Network; client.Send(msg); }

private bool AttributeExists(System.Collections.Hashtable attributes, string attributename) { foreach (var att in attributes) { System.Collections.DictionaryEntry de = ((System.Collections.DictionaryEntry)(att)); if ((de.Key != null)) { string attrName = de.Key.ToString(); if (attrName.ToLower().Equals("")) return true; } } return false; } private string GetStringAttribute(string dn, string AttributeName) { string result = string.Empty; try { DirectoryEntry root = new DirectoryEntry(); using (DirectorySearcher searcher = new DirectorySearcher(root)) { searcher.Filter = "(distinguishedName=" + dn + ")"; searcher.PropertiesToLoad.Clear();

Doc_ID 371 580

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

searcher.ReferralChasing = ReferralChasingOption.All; searcher.PropertiesToLoad.Add(AttributeName); searcher.ClientTimeout = new TimeSpan(0, 0, 10);

var searchResult = searcher.FindOne(); if (searchResult != null) { if (searchResult.Properties.Contains (AttributeName)) { result = searchResult.Properties [AttributeName][0] as string; } } } } catch { } return result; } } }

Password Rejection The following C# script sends an email notification to the specified Perpetrator when their Active Directory password is rejected by the active Password Rules event filter criteria.

The following environmental variables must be added to the script prior to execution:

l SMTPHOST – Name of the organization’s SMTP server

l SMTPPORT – Port used by the organization’s SMTP server

l SMTPENABLESSL – Indicates whether SSL is enabled or disabled on the SMTP server

l False = Do not use SSL

l True = Use SSL

l SMTPFROM – Valid email account sending the email to the recipient

l SMTPID – Valid username for SMTP server within the users environment

l SMTPPwD – Valid password for the username above

Doc_ID 371 581

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

In the Actions Template folder, the EPE: Notify Perpetrator that password was rejected template is preconfigured to use this action script. namespace ScriptNamespace { using System; using System.Collections; using System.IO; using System.Text; using SI.Common.Messages; using SI.SIMonitor.ConsoleMessages.Helpers; using System.Net.Mail; using System.DirectoryServices;

public class ScriptClass { private const string SMTPHOST = "mail.MyDomain.com"; private const int SMTPPORT = 25; private const bool SMTPENABLESSL = false; private const bool SMTPUSEDEFAULTCREDENTIALS = true; private const bool SMTPHTML = true; private const string SMTPFROM = "[email protected]"; private const string SMTPSUBJECT = "Password was rejected by EPE policy"; private const string SMTPID = "username"; private const string SMTPPWD = "password"; private const string EmailAttribute = "mail"; private EventConsumerHelper helper = null;

/// Required class constructor public ScriptClass(EventConsumerHelper ecHelper) { this.helper = ecHelper; }

public virtual void ScriptMain() { string SMTPTO = GetStringAttribute(helper.Perpetrator, EmailAttribute); if (string.IsNullOrEmpty(SMTPTO)) throw new Exception("AD attribute 'email' is empty");

Doc_ID 371 582

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

MailMessage msg = new MailMessage(); msg.From = new MailAddress(SMTPFROM); msg.To.Add(SMTPTO); msg.Priority = MailPriority.High; msg.Subject = SMTPSUBJECT;

StringBuilder sb = new StringBuilder(); sb.AppendLine(""); sb.AppendLine(""); sb.AppendLine(String.Format("EventName: {0}
", helper.EventName)); sb.AppendLine(String.Format("EventNameTranslated: {0}
", helper.EventNameTranslated)); sb.AppendLine(String.Format("TimeLoggedUtc: {0}
", helper.TimeLoggedUtc.ToString("MMMM d, yyyy h:mm:ss tt"))); sb.AppendLine(String.Format("DN: {0}
", helper.Perpetrator)); sb.AppendLine(String.Format("Perpetrator: {0}
", helper.PerpetratorName)); sb.AppendLine(""); sb.AppendLine(""); string body = sb.ToString(); msg.Body = body; msg.IsBodyHtml = SMTPHTML; SmtpClient client = new SmtpClient(); client.Host = SMTPHOST; client.Port = SMTPPORT; client.EnableSsl = SMTPENABLESSL; client.UseDefaultCredentials = SMTPUSEDEFAULTCREDENTIALS; if (!SMTPUSEDEFAULTCREDENTIALS) { client.Credentials = new System.Net.NetworkCredential(SMTPID, SMTPPWD); } client.DeliveryMethod = SmtpDeliveryMethod.Network; client.Send(msg); } private string GetStringAttribute(string dn, string AttributeName)

Doc_ID 371 583

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED StealthINTERCEPT®

{ string result = string.Empty; try { DirectoryEntry root = new DirectoryEntry(); using (DirectorySearcher searcher = new DirectorySearcher(root)) { searcher.Filter = "(distinguishedName=" + dn + ")"; searcher.PropertiesToLoad.Clear(); searcher.ReferralChasing = ReferralChasingOption.All; searcher.PropertiesToLoad.Add(AttributeName); searcher.ClientTimeout = new TimeSpan(0, 0, 10);

var searchResult = searcher.FindOne(); if (searchResult != null) { if (searchResult.Properties.Contains (AttributeName)) { result = searchResult.Properties [AttributeName][0] as string; } } } } catch { } return result; } } }

Doc_ID 371 584

Copyright 2021 STEALTHBITS TECHNOLOGIES, INC. ALL RIGHTS RESERVED