Previous CylanceMDR protection enhancements
CylanceMDR
protection enhancementsDue to some emerging threats,
CylanceMDR
has implemented the following CylanceOPTICS
rules for improved security and telemetry for analysts. These rules are already in effect and no further action is required from your organization. To see the newest CylanceMDR
rules, see CylanceMDR protection enhancements. Threat or vulnerability | Description |
---|---|
Updated rule for advanced detection of Standard RDP Port Modified |
|
Updated rule for advanced detection of GUARD: 8-character temp file created by Svchost |
|
Updated rule for advanced detection of CylancePROTECT suspicious exit |
|
Updated rule for advanced detection of CylancePROTECT suspicious exit via taskkill.exe |
|
Updated rule for advanced detection of Powershell scheduled task creation via Windows Script Host |
|
Updated rule for advanced detection of the execution of an 8-character temporary file created by svchost |
|
Updated rule for advanced detection of the execution of a Stager payload from PowerShell Empire |
|
Updated rule for advanced detection of the Csvde.exe export command |
|
Updated rule for advanced detection of local credential dump from NTDS, SAM or LSA using SecretsDump |
|
Updated rule for advanced detection of a remote credential dump from the registry hive |
|
Updated rule for enhanced investigation of system information discovery through service enumeration |
|
Updated rule for advanced detection of the extraction of the domain database (including password hashes) using ntdsutil.exe |
|
Updated rule for advanced detection of enumeration of browser bookmarks |
|
Updated rule for advanced detection of Windows Defender registry key modification |
|
Updated rule for enhanced investigation of account or group discovery via dscl |
|
Updated rule for enhanced investigation of file and directory discovery through the Windows command line |
|
Updated rule for advanced detection of the ScreenConnect authentication bypass vulnerability CVE-2024-1709 |
|
Updated rule for advanced detection of payload creation via compiled HTML (.chm) file |
|
Updated rule for advanced detection of payload execution from Appdata\Local\Temp Directory |
|
Updated rule for advanced detection of Windows Defender service shutdown via net.exe |
|
Updated rule for advanced detection of port forwarding SSH tunnel command execution |
|
Updated rule for advanced detection of Windows Defender Antivirus Engine restored to default settings |
|
Updated rule for advanced detection of obfuscated Bash History deletion |
|
Updated rule for advanced detection of Bash History modification and deletion |
|
Updated rule for advanced detection of critical Cylance binaries moved |
|
Updated rule for advanced detection of process execution via compiled HTML (.chm) file |
|
Updated rule for advanced detection of Svchost launching Rundll32 via scheduled task |
|
Updated rule for advanced detection of debugger registry value modification for accessibility features |
|
Updated rule for advanced detection of obfuscated Base64 decoding method executed via PowerShell |
|
Updated rule for advanced detection of UAC Bypass via fodhelper.exe activity |
|
Updated rule for advanced detection of payload creation via compiled HTML (CHM) file |
|