Endpoints are usually the most lucrative and feasible entry points for attackers. The geographically dispersed work environments combined with an ever increasing list of both procured and offered services by an organization, has resulted in systems becoming increasingly vulnerable. Attackers are creating advanced techniques to compromise the endpoints. Without appropriate endpoint security monitoring and response measures, the endpoints are considered to be the easiest targets. The need for enhanced endpoint security paved the way for a new breed of technology called EDR (Endpoint Detection and Response) and EPP (Endpoint Prevention Platform). EDR goes beyond traditional controls like IPS and Antivirus by providing a set of tools and features that ensures extended endpoint security.
FireEye Endpoint Security (HX) is one of the leading Endpoint Detection and Response platforms. The unique feature of FireEye HX is its endpoint visibility coupled with threat intelligence. This allows organizations to adjust their defenses in real-time. Now FireEye customers can use SIRP’s security orchestration and automation capabilities with FireEye HX to respond from a unified console.
Endpoints are among the most vulnerable and frequently targeted entities within a network. Usually every endpoint contains useful information (sensitive and nonsensitive data), therefore the protection of these endpoints is usually of utmost importance for the organizations. Even if an endpoint does not contain any sensitive information, it can still act as a hop for the attacker to reach to the final target. When a certain endpoint is compromised, it is usually either used to attack other endpoints or networks, to steal sensitive information, disrupt the services, or even hold the information they accessed as hostage to threaten the organization. Some of the key challenges with endpoint security are:
Security teams can create SIRP playbooks to automate their response to endpoint alerts by leveraging FireEye HX endpoint response functions. These playbooks help analysts enrich their investigative data, perform threat hunting activities, gather threat intelligence, and execute endpoint remedial actions.
Consider an example in which SIRP received an alert containing potentially malicious SHA-1 hash. Based on the predefined rules, SIRP automatically executes a playbook. The playbook fetches the hash reputation from VirusTotal.
After getting the Hash Analysis Report, the playbook is set to perform the following actions.
If the reported score of the hash is greater or equal to 10:
If the reported score of the hash is less than 10:
The entire execution and decision flow of the playbook looks something like this:
The actual playbook in SIRP is shown below:
Retroactive email alerts are fired in FireEye EX when it considers email to be malicious, but doesn’t perform any remedial or prevention actions. The open-ended nature of these alerts makes them important to be investigated and responded accordingly.
Let’s review the following playbook which is developed in SIRP to handle such retroactive alerts automatically.
The purpose of this well crafted playbook is to ingest retroactive alerts from FireEye EX, gather intelligence against the ingested data, and finally perform remedial actions automatically.
After automatically ingesting the retroactive alerts within SIRP, the playbook first checks if the alert is fired against a “domain” or a “hash”.
If the alert is fired against a domain, the playbook performs following actions:
If the alert is fired against a hash, the playbook performs following actions:
The entire execution and decision flow of the playbook looks something like this:
The key benefits that can be realized out of this integration are:
Automated page speed optimizations for fast site performance