Threat Hunting with VMware Carbon Black Enterprise EDR

preview_player
Показать описание

00:09 Overview
00:49 User guide
01:20 Attack stages
02:20 TestDrive exprience
02:47 Phishing email import
03:28 Sneak Peek at attacker infrastructure (Command and Control)
03:53 Darkside Ransomware attack
04:25 Carbon Black Alert
05:49 Carbon Black Investigate
06:53 VirusTotal integration
07:21 Carbon Black Reveal feature
Рекомендации по теме
Комментарии
Автор

This isn't so much a Threat Hunt but rather it is Incident Response. A Threat Hunt would be proactively querying for anomalies and IoCs that are not tied to an alert/incident rather than reacting to an alert. For instance, Threat Hunting might look like querying your whole EDR tenant forthings like accounts with 500 in the SID that have attempting remote connections, events with hidden powershell windows, downloaded files from powershell, msi installers from the web, plain text passwords in the registery, startup folder additions etc.

AndrewH-dj
Автор

Great video, thanks. how do i get a test drive code to perform the tests myself?

damyj