Policy JSON view
The JSON view displays the policy as a JSON file. This is the same format used for the Policy API.
user_id
Your unique console ID. To get your user ID, do one of the following:
- Use theCylanceAPI (Get Users)
- In the console, go to User Management, view your user details, your user ID is at the end of the URL
checksum
Use an empty value. This is required when creating a policy.
device_control
Device control allows or blocks access to USB mass storage devices.
Item | Description |
---|---|
control_mode |
|
device_class | All device_class entries must be included in the request.
|
exclusion_list | The device control exclusion list that allows or blocks access to specific USB mass storage devices
|
Example |
|
file_exclusions
Adds file exclusions to the Policy Safe List, under File Actions. The policy safe list are file exclusions specific to the policy, and any devices assigned to the policy will allow the excluded files to run.
Item | Description |
---|---|
category_id | A list of categories to identify the type of file; this information is optional
|
file_hash | The SHA256 hash for the file; this information is optional |
file_name | The name of the file being excluded; this information is optional |
md5 | The MD5 hash for the file; this information is optional |
reason | The reason the file was excluded; this information is optional |
Example |
|
filetype_action
The auto-quarantine of unsafe (threat_files_) and abnormal (suspicious_files)
Item | Description |
---|---|
actions | Allows setting auto-quarantine and auto-upload to enabled or disabled
|
file_type | Only has "executable" as an option |
suspicious_files | These are abnormal files |
threat_files | These are unsafe files |
logpolicy
The agent log file settings.
Item | Description |
---|---|
log_upload |
|
maxlogsize | The maximum file size (in MB) for a single agent log file |
retentiondays | The number of days to save agent log files; log files older than the set number of days will be deleted |
memoryviolation_actions
The violation types for memory protection.
All memory_violations and memory_violations_ext must be included in the request.
Item | Description |
---|---|
Action |
|
memory_violations |
|
memory_violations_ext |
|
memory_exclusion_list | These are the executable files to exclude from memory protection. This must be a relative path to the excluded executable file. |
Example |
|
policy
Various policy settings are contained within this section. Some policy settings are enabled under the policy section and configured in a different section, like device_control and logpolicy.
Item | Description |
---|---|
auto_blocking | Enables or disables the Auto Quarantine setting for Unsafe and Abnormal files.
|
auto_delete | Setting to automatically delete quarantined files after a set number of days.
|
auto_uploading | Setting to automatically upload files that Cylance has not seen before. Cylance will perform an analysis on the file and provide details to assist in manual analysis and triage.
|
autoit_auto_uploading | The value is 0. |
custom_thumbprint | The vaule is null. |
days_until_deleted | Setting for the number of days to retain a quarantined file. Quarantined files older than the set number of days will be automatically deleted.
To use the days_until_deleted feature, the auto_delete setting must be enabled. |
device_control | Setting to enable or disable the device control feature. |
docx_auto_uploading | The value is 0. |
full_disc_scan | Setting to have Cylance analyze all executable files on disk to detect any dormant threats. This is the Background Threat Detection (BTD) setting.
|
kill_running_threats | Setting to kill processes and sub-processes regardless of the state when a threat is detected (exe or dll). |
logpolicy | The value is 0. |
low_confidence_threshold | Setting to adjust the score threshold between unsafe and abnormal files. The default is -600.
|
memory_exploit_detection | Setting to enable or disable the memory protection feature.
Also set the memoryviolation_actions (memory_violations, memory_violations_ext, and memory_exclusion_list). |
ole_auto_uploading | The value is 0. |
optics | Setting to enable or disable CylanceOPTICS .
Also set the other CylanceOPTICS settings (optics_). |
optics_application_control_auto_upload | Setting to allow the automatic uploading of application control related to focus data.
|
optics_malware_auto_upload | Setting to allow the automatic uploading of threat related focus data.
|
optics_memory_defense_auto_upload | Setting to allow the automatic uploading of memory protection related focus data.
|
optics_script_control_auto_upload | Setting to allow the automatic uploading of script control related focus data.
|
optics_sensors_advanced_executable_parsing | Setting to enable recording data fields associated with portable executable (PE) files, such as file version, import functions, and packer types. This is Enhanced Portable Executable Parsing in the policy settings.
|
optics_sensors_advanced_powershell_visibility | Setting to enable recording commands, arguments, scripts, and content entered directly into the Powershell console and the Powershell Integrated Script Environment (ISE).
|
optics_sensors_advanced_wmi_visibility | Setting to enable recording additional Windows Management Instrumentation (WMI) attributes and parameters.
|
optics_sensors_dns_visibility | Setting to enable recording commands and arguments of commands issued directly or indirectly to the Windows Management Instrumentation (WMI) interpreter.
|
optics_sensors_enhanced_process_hooking_visibility | Setting to enable recording process information from the Win32 API and Kernel Audit messages to detect forms of process hooking and injection.
|
optics_sensors_private_network_address_visibility | Setting to enable recording network connections within the RFC 1918 and RFC 3419 address spaces.
|
optics_sensors_windows_event_log_visibility | Setting to enable recording Windows Security Events and their associated attributes.
|
optics_sensors_intel_cryptomining_detection | Setting to enable recording CPU activity using hardware registers for potential cryptomining and cryptojacking activites.
|
optics_set_disk_usage_maximum_fixed | Setting the maximum amount of device storage reserved for use by CylanceOPTICS , in MB. The minimum value is 500 and the maximum value is 1000. |
optics_show_notifications | Setting to enable or disable desktop notifications on the device for CylanceOPTICS events.
|
pdf_auto_uploading | The value is 0. |
powershell_auto_uploading | The value is 0. |
prevent_service_shutdown | Setting that protects the Cylance service from being shutdown, either manually or by another process.
|
python_auto_uploading | The value is 0. |
sample_copy_path | Setting to copy all file samples to a network share (CIFS/SMB).
Example
|
scan_exception_list | Setting to exclude specific folders and subfolders from being scanned by full_disc_scan and watch_for_new_files. Set the value to the absolute path for the excluded files.
Example
|
scan_max_archive_size | Setting for the maximum archive file size (in MB) to be scanned.
|
script_control | Setting to enable or disable the script control feature.
|
show_notifications | Setting to enable or disable desktop notifications on the device for CylancePROTECT Desktop events.
|
threat_report_limit | The number of threats to upload to the console. |
trust_files_in_scan_exception_list | Setting to allow execution of files in the excluded folders. This is related to the scan_exception_list.
|
watch_for_new_files | Setting to analyze new or modified executable files for threats.
|
policy_name
This is the name of the policy. The name must be unique in your tenant.
script_control
These are the policy settings for script control.
script_control must be enabled (set to 1) under policy.
Item | Description |
---|---|
activescript_settings |
|
global_settings |
|
macro_settings |
|
powershell_settings |
|
About disabling script control
For agent version 1430 and later, you can disable script control for active script, Powershell, or macros. Disable script control allows the selected script type to run and does not send an alert to the console.
To disable script control for a specific script type, do not include the script type in the Create Policy API request.
Example
: Script control for macros is disabled
"script_control": { "powershell_settings: { "control_mode": "Block", "console_mode": "Block" }, "global_settings": { "control_mode": "Alert", "allowed_folders: [ "\\temp_scriptcontrol" ] }, "activescript_settings: { "control_mode": "Alert" } }