EDR Lab Tutorial Supplement - V4
EDR Lab Tutorial Supplement - V4
Response (EDR)
Lab Tutorial Supplement
1
Table of Contents
2
EDR Activation and Setup
To successfully install and use Qualys EDR in your environment, the following
configuration steps are required:
1. Install the Qualys Cloud Agent on target host
2. Assign the target agent host to an EDR enabled Cloud Agent Configuration Profile
3. Activate EDR for the target agent host (If EDR is not enabled in the Cloud Agent
activation key)
When Asset Tags are strategically used for host assignment, step 2 (listed above) can
potentially be performed prior to agent installation (step 1).
3
Activate EDR Module
You can activate EDR on agent assets from the agent “Quick Actions” menu.
Simply select the “Activate for FIM or EDR or PM” option to enable EDR for a given
asset. Alternately you can also use Cloud Agent APIs to activate EDR in bulk across
multiple agent assets.
4
• Phishing Protection: Automatically block known phishing web pages to prevent
users from inadvertently disclosing private or confidential information to online
fraudsters.
Malware detection events captured on the agent host can be viewed and analyzed from
the Qualys Cloud Console, allowing customers to enrich malicious events with
contextual event data collected by Qualys EDR.
Configuration Profile
EDR host assets must belong to a Configuration Profile with the “EDR” module enabled.
Ensure the “Enable EDR module for this profile” switch is in the “ON” position.
Max event log size – EDR events are transmitted to the Qualys Cloud platform when the
EDR event log file reaches the maximum specified size. You can specify a file size
between 10 KB and 10240 KB. Default is 1024 KB. This value can be lower if the Payload
threshold time is lower.
Payload threshold time – EDR events are transmitted to the Qualys Cloud platform
when the EDR payload threshold time is hit, i.e., the specified seconds elapse after the
previous payload was sent to the Qualys Cloud Platform. You can specify a threshold
between 30 seconds and 1800 seconds. Default is 60 seconds. This value is lower the
better to prevent data loss on busy systems.
Maximum disk usage for EDR Data – This is the maximum size on disk available to a
Cloud Agent for caching EDR events to be sent to the Qualys Cloud Platform for
processing. If the maximum size is reached, the oldest events are deleted in order to
5
create space for newly generated events. You can specify a disk usage size between 100
MB and 2048 MB. Default is 1024 MB.
Navigate to the following URL to view the “EDR Activation and Setup” tutorial:
http://ior.ad/7fE0
Enable Malware Protection for this Profile – If your Qualys account has the Integrated
Malware Protection feature enabled, you can enable this feature in the Cloud Agent
profile to install Malware Protection on your agent host.
AV Profile
For agent hosts with the Malware Protection feature enabled in the configuration
profile, the EDR manifest is installed on the agent host with Qualys Malware
Protection’s integrated set of basic virus definitions. The Malware Protection module
starts updating the latest virus definitions as soon as it is installed. As the virus
definitions are downloaded on the endpoint, the Default antivirus configuration as
shown below is also downloaded on the endpoint asset.
You can view and edit the Default AV (anti-virus) Profile from under the
“CONFIGURATION” tab to enable required Malware Protection features for the agent
host. The agent will receive the changes through an updated EDR manifest.
Navigate to the following URL to view the “Malware Protection Activation and Setup”
tutorial:
https://ior.ad/7T0A
6
Upgrade Multiple Agent Activation Keys
Within the EDR application, you can upgrade multiple Cloud Agent Activation Keys to
use EDR. On the EDR welcome page, simply click “Configure Agents for EDR” and then
select one or more agent keys to upgrade. All the agents associated with the activation
key/keys will be upgraded and enabled for EDR.
Navigate to the following URL to view the “Upgrade Agent Activation Keys” tutorial:
http://ior.ad/7gh9
View Assets
The “Assets” section in the EDR application contains list of agent host assets with the
EDR and Malware Protection modules activated. Here you can get up-to-date views on a
selected asset's details, its events, and incidents in one place.
For agent hosts with the Malware Protection feature enabled in the agent configuration
profile, the AV status is updated to “Installed Functioning” after the module is installed
and the latest anti-virus definitions are downloaded on the host.
7
Investigate Events & Incidents
Qualys Cloud Agents collects file, process, mutex, network, and registry events from
their hosts. An incident may be comprised of multiple events associated with the
detected malware.
EDR Events
An “object” is an artifact on the system, without state information. The agent collects
data for 5 types of objects:
• File – Portable Executable (PE) and non-PE files (PDF, XLS, PPT, etc.) on local
attached disks (called “image”)
PE is a file format for executables, object code, DLLs and others used in 32-bit
and 64-bit versions of Windows operating systems. It is used for EXE,DLL,SYS
(device driver) and other file types. Agent collects data for both user files and
kernel files.
Actions and events on the object include state information. The agent collects data
about various objects and associated actions on the object in real-time. You can see
information about objects along with their state in the EDR application.
• Process
Running | Terminated
• Mutex
Running | Terminated
• Network
Established | Closed | Listening
8
• Registry
Created | Deleted
Hunting section
You can see information about objects along with their state in the EDR app under the
“Hunting” section.
You can filter and search for malicious file, process, mutex and network related events.
This way, you reduce potentially thousands of events, to the few that matter.
You can group events by event Type (file, process, mutex and network), Action (file
creation, network connection established or listening, process running or terminated,
etc.) and event Score and perform remediation actions.
Simply use the “Quick Actions” menu of an event, to select the “Event Details” option
9
The “Event Details” page displays details such as image path, associated user, process
ID, MD5/SHA256 hash value, etc. about the object (file/process/mutex/network
connection) and the object state (file created, process/mutex running or terminated,
network listening on a port, network connection established).
Event Score
The Qualys EDR detection and scoring engine natively correlates all event telemetry
data to commercial threat feed and research from Qualys Malware Labs and assigns
each event and asset, a score between 0 to 10. The scoring system is dependent on the
object type associated with the event and the threat perception.
An event with score 0 is a non-malicious event. An event with a score 1 indicates that a
remediation\corrective action was performed on the event, and it is no longer a threat.
Scores between 2 to 10 indicate malicious behavior related to file, process, or network
activity with varying confidence levels.
10
Event Relationship Tree
On the “Event Details” page, you can see the event relationship tree which helps you
visualize how a malicious object is tied to other objects on the asset which provides
better context for understanding the attack chain. As with all things hunting, context is
important, and we can often get more context by looking at the parent and children of
processes.
Ab event of “Process” type will show its parent and child processes along with the
mutex and network connection of the process.
For the event of Network type, you see network connection of a process and for the
event of Mutex type, mutex connection of a process.
This information is useful for proactive threat hunting and for analysis during a post-
breach investigation.
https://ior.ad/7EJN
EDR Incidents
An EDR Incident is comprised of one or more events that are related to one another, as
part of a detected malware infection or host compromise.
11
An Incident can consists of one of more File, Process, Mutex, Network, or Registry
events. The “Incidents” section contains the list of all active incidents in your
environment.
A summary of the total number of detected event types is provided at the top.
Using Qualys search and filter capabilities, you can investigate incidents by the Malware
category and by Malware family names.
You can click any Incident Description to view its list of events and other details.
Risk Score of a host incident is based on the highest single event score. If the risk score is
zero, then the incident is considered remediated or non-malicious.
https://ior.ad/7Jid
12
Hunt for Suspicious Activity
Adversaries, and cybercriminal organizations in particular, are building tools and using
techniques that are becoming so difficult to detect that organizations are having a hard
time knowing that intrusions are taking place.
Threat hunting is the proactive technique that’s focused on the pursuit of attacks and
the evidence that attackers leave behind when they’re conducting reconnaissance,
attacking with malware, or exfiltrating sensitive data.
Organizations need tools that not only detect and respond to threats, but can
proactively hunt them as well. Such tools can accelerate threat discovery to identify a
potential compromise before it’s too late.
Hunting Section
The Hunting section provides search and filter capabilities to quickly find all about your
incidents, events and assets in one place. You can search for incidents and assets in the
respective tabs in the similar way. You'll notice the Search box while viewing dynamic
lists of events, incidents, and assets. This is where you'll enter your search query. Enter
the value you want to match. As you start typing in the search box, you will see a
predefined list of query tokens that you can choose from.
EDR online help provides details on the search language and sample queries.
13
Once you have your search results you may want to organize them further into logical
groupings. Choose a group by option on the left side. You’ll see the number of events or
assets per grouping. Click on any grouping to update the search query and view the
matching events.
Tip - Use your queries to create dashboard widgets on the Dashboards tab.
You can download event search results to your local system you can easily manage
incidents or events outside of the Qualys platform and share them with other users. You
can export results in CSV format.
The following examples can be used to identify suspicious activity in your environment.
14
nothing is blocked and there are no warnings or prompts. Attackers can use this method
to launch PowerShell scripts and evade detection. The following query identifies such
PowerShell invocations:
type:PROCESS and process.name:powershell.exe and
process.arguments:"ExecutionPolicy Bypass"
15
EDR helps detect malicious behavior on the endpoint by evaluating the events in context
with MITRE ATT&CK. Having ATT&CK context also aids analysts when hunting for and
responding to incidents within their environment.
Currently, EDR includes the following list of rules as per the MITRE ATT&CK framework
to help analyze the events registered on the agents.
• T1053.005 Rule to detect the creation of scheduled task using different binaries
listed
• T1090.003 Rule to detect establishment of multi-hop proxy using TOR
• T1098.002 Rule to detect PowerShell process running with argument Add-
MailboxPermission
• T1115 Rule to detect PowerShell process running with argument Get-Clipboard
• T1127.001 Rule to detect events where msbuild.exe is running as a child process
under given parent process list
• T1201 Rule to detect discovery of password policy using net1.exe binary
• T1218.001 Rule to detect execution of hh.exe binary
• T1218.005 Rule to detect execution of mshta.exe binary
• T1218.009 Rule to detect execution of Regasm/Regsvcs binary
• T1218.011 Rule to detect execution of Rundll32 binary
• T1220 Rule to detect execution of MSXSL binary
• T1569.002 Rule to detect execution of system services using processes listed
With each release, Qualys continues to add more rules to help classify the events
appropriately.
You can use search tokens in the “Hunting” section to search for events by their tactic ID
and name and by the technique ID and name in context of MITRE detections.
The applied ATT&CK tactics and techniques are displayed for applicable events on the
Event Details page.
16
Tracking Threats via Dashboards
Dashboards help you visualize your assets, see your threat exposure, leverage saved
searches, and remediate priority of malicious/suspicious events quickly. You can use the
default EDR dashboard provided by Qualys or easily configure widgets to pull
information from other modules/applications and add them to your dashboard. You can
also configure widgets to track remediations and to find if a host is getting re-infected
over time. You can add as many dashboards as you like to customize your vulnerability
posture view.
Navigate to the following URL to view the “Hunt for Suspicious Activity” tutorial:
http://ior.ad/7gnT
17
Perform Remediation Action
After data that describes the threat has been collected, the business and technical
impact has been identified, and context data has been gathered — remediation can get
underway.
Remediation Actions
You can remediate malicious file events, using the following options:
• Quarantine File: Using this option, the file is encrypted and then moved to the
Quarantine folder (C:\ProgramData\Qualys\QualysAgent\Quarantine\) on your
agent host. The Quarantine folder is automatically created once you upgrade to
Cloud Agent version 4.0 for Windows and above.
You can undo this action and restore the file to its original position using the
UnQuarantine File action from the Responses section, under the User Activity
tab.
• Delete File: Using this option, the file is permanently deleted from your agent
host. You cannot undo this action.
• Kill Process: For process, mutex, and network events, we provide Kill Process
remediation action. When you perform the Kill Process action for mutex or
network events, it kills the corresponding parent process.
Remediation actions can be performed for File, Process, Network, and Mutex events
from the Hunting section and from the Event Details page. The remediation options are
available only for:
- Events in Active\Current View
- Events that score between 1 to 10
Navigate to the following URL to view the “Perform Remediation Action” tutorial:
http://ior.ad/7fLG
18
Configure Rule Based Alerts
Rule Based alerts provide ongoing detection even after you’ve completed your hunt,
automatically triggering alerts for similar malicious behaviour based on both historical
and real-time activity. This eliminates the need to manually search the same security
holes over and over by leveraging time-saving automation.
Under the “Responses” section, “Actions” tab you need to first configure a rule Action
that will be used with the rule configured in the subsequent step.
Currently, EDR supports three actions: Send Email (Via Qualys), Post to Stack and Send
to Pager Duty for alerts.
Next, under “Rule Manager”, you need to create a rule with trigger conditions and rule
actions for sending the alert. EDR will use the rule action settings to send you the alerts.
You can monitor alerts under the “Activity” tab.
You can also create rules directly from custom queries used for searching events or
threat hunting as illustrated above.
Navigate to the following URL to view the “Configure Rule Based Alerts” tutorial:
https://ior.ad/7gzK
19
Correlate Prevention Across Multiple
Vectors
Multi-vector attacks take advantage of common vulnerabilities, combining elements like
social engineering and ‘spear phishing’ e-mail messages with malicious attachments that
contains code that exploits known or unknown (zero-day) vulnerabilities on the target
system. While these attacks might rely on commodity malware, they are often
tailored to bypass most antivirus engines.
Qualys EDR creates a Single View of the Asset, showing threat hunting details unified
with other Qualys Cloud Apps for hardware and software inventory, vulnerability
posture, policy compliance controls, and file integrity monitoring change alerts for on-
premise servers, cloud instances, and off-net remote endpoints.
A single user interface significantly reduces the time required for incident responders
and security analysts to hunt, investigate, detect, and respond to threats before breach
or compromise can occur.
20
Identify Assets with EOL/EOS Software
Every product has a lifecycle. The lifecycle begins when a product is released and ends
when it’s no longer supported. When a software reaches end-of-life or EOL, it is no
longer sold or marketed by the vendor and it may not receive new feature updates. And
when a software hits the end-of-support (EOS) stage, it no longer receives maintenance
updates or upgrades from the vendor.
If cybercriminals discover a vulnerability in such EOL/EOS software, there is no
guarantee that this vulnerability will be patched by the vendor. Cybercriminals often
tend to weaponize such a vulnerability and use it to their advantage.
Timely response to security critical events becomes increasingly important if EOL/EOS
and vulnerable software is present within the enterprise environment.
CSAM provides the necessary visibility into the asset and software inventory and into
the corresponding lifecycle stages. CSAM also allows you to define software
authorization rules to determine what software is allowed or not allowed in your
environment, including specific software versions and update levels.
EDR can benefit from this visibility into the asset inventory and software lifecycle
information. Security teams benefit from this visibility and they can identify security
gaps on critical assets, allowing timely response to contain or eradicate threats and
prevent any breach\compromise from spreading across the enterprise infrastructure.
The following query in CSAM identifies Windows assets with EOL/EOS software:
operatingSystem:windows and
software:(lifecycle.stage:EOL/EOS)
Going further, you can identify Windows assets that are not enabled for EDR and which
have EOL/EOS software of the category “Network Application/ Internet Browser” using
the following query:
operatingSystem:windows and
software:((lifecycle.stage:EOL/EOS) and category:`Network
Application / Internet Browser`) and not
sensors.activatedForModules:EDR
21
The following is a sample query to find vulnerabilities linked to the TROJAN malware
category:
vulnerabilities: threatintel.malware = true and
vulnerabilities: threatintel.malware.malwarename=TROJ
From there, you can identify the assets with such vulnerabilities by simply switching the
search result to display asset information.
By correlating vulnerability information with threat intelligence and asset context, you
can quickly “zero in” on your highest risk vulnerabilities and quickly patch them.
The following is a sample query to look for assets with at least one vulnerability that is
considered wormable and is known to cause high data loss:
vulnerabilities.vulnerability.threatIntel:(wormable:"TRUE"
and highDataLoss:"TRUE")
22
your team would need to put in time to detect, investigate, again correlate and respond
to such incidents.
Combining this context with EDR provides for better threat investigation and assists in
fixing misconfiguration that may otherwise lead to malware infections in your
environment.
Navigate to the following URL to view the “Correlate Prevention Across Multiple
Vectors” tutorial:
https://ior.ad/7fUF
23