{"id":2714,"date":"2021-02-15T08:34:47","date_gmt":"2021-02-15T08:34:47","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=2714"},"modified":"2021-02-15T08:34:47","modified_gmt":"2021-02-15T08:34:47","slug":"getting-the-most-out-of-intercept-x-advanced-with-edr","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2021\/02\/products\/getting-the-most-out-of-intercept-x-advanced-with-edr\/","title":{"rendered":"Getting the most out of Intercept X Advanced with EDR"},"content":{"rendered":"<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">If there\u2019s one thing that the new normal (sorry, not sorry) has taught us in 2020, it\u2019s that employees working from home present several challenges when it comes to securing the estate. The industry has been raising awareness about the \u2018vanishing perimeter\u2019 for years. All it took was a global pandemic to pull the rug out from under the feet of so many businesses, and hey-presto the traditional perimeter has well and truly disappeared \u2013 end-user devices are the new perimeter.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">In this article, we\u2019re going to take a look at how Intercept X with Endpoint Detection and Response (EDR) can add value to your customers and allow them to take back control of their\u00a0new perimeters.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">EDR layers in tools that allow IT to investigate suspicious (but not 100% convicted malicious) behaviour without the need for experienced, highly skilled cyber threat-hunting expertise. We first released CIXAEDR a couple of years back, however it\u2019s fair to say that the uptake hasn\u2019t been as significant as we\u2019d have hoped.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">The unfortunate reality is that there is a large portion of customers out there who employ IT, generalists. They either can\u2019t afford to employ (or struggle to retain) cybersecurity experts who would benefit from EDR. There is also unfortunately still a culture with many customers who, in their ideal world, would prefer to \u2018set-and-forget&#8217; when it comes to endpoint security. For example, we\u2019ve seen instances where customers might go months (and in some cases even years!) without having logged into their Sophos Central dashboard.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">Needless to say, this is not best practice, and if you work for an MSP then you should be having conversations with these customers around how you can help them with the heavy lifting of managing their cybersecurity risk. If you can\u2019t offer your services to help, the good news is that Sophos have a Managed Threat Response (MTR) service &#8211; more on MTR later.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">Below is a roundup of the \u2018EDR Tips\u2019 that we\u2019ve covered in the monthly Sync with Sophos update series. <\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">*EVENT PLUG ALERT* If you\u2019re not currently registered to attend this recurring webinar, it is held on the first Friday of every month at 10 am (GMT).\u00a0Please register\u00a0<\/span><span lang=\"EN-GB\"><a href=\"https:\/\/sophos.zoom.us\/webinar\/register\/WN_RI3r17nYRkqC1JBQE1TriA\"><span style=\"color: #4a6ee0;\">here<\/span><\/a><span style=\"color: #0e101a;\">\u00a0\u2013 it would be great to see you there!<\/span><\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span lang=\"EN-GB\" style=\"color: #0e101a;\">Useful Tools for Malware Investigation and Remediation<\/span><\/strong><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">If you already investigate suspicious behaviour, you might be familiar with some of the tools discussed\u00a0<\/span><span lang=\"EN-GB\"><a href=\"https:\/\/community.sophos.com\/intercept-x-endpoint\/early-access-program\/f\/recommended-reads\/122523\/useful-tools-for-malware-investigation-and-remediation\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #4a6ee0;\">here<\/span><\/a><span style=\"color: #0e101a;\">. This article gives some really useful examples of how you can leverage EDR Live Discover and Live Response to make using these tools even easier.<\/span><\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span lang=\"EN-GB\" style=\"color: #0e101a;\">Hunt for Vulnerabilities and Indicators of Compromise (IoCs) Related to Specific Cyber Threats<\/span><\/strong><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">Intercept X Advanced with EDR provides the ability to answer some of the difficult questions that C level execs need to know the answers to. For example \u201cI read about this hack recently. What\u2019s our risk exposure here?\u201d or \u201cSophos is telling us that an issue has been dealt with. How did the threat end up in our system in the first place, and can we be sure it\u2019s been fully resolved?\u201d<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">You or your customers want to know if an estate is exposed to a particular exploit, for example, the SigRED Windows Server DNS wormable\u00a0<\/span><span lang=\"EN-GB\"><a href=\"https:\/\/nakedsecurity.sophos.com\/2020\/07\/15\/patch-now-sigred-the-wormable-hole-in-your-windows-servers\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #4a6ee0;\">vulnerability<\/span><\/a><span style=\"color: #0e101a;\">\u00a0from 2020, or perhaps you would like to see if the SHA256 hashes associated with the\u00a0<\/span><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/12\/14\/solarwinds-breach-how-to-identify-if-you-have-been-affected\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #4a6ee0;\">SolarWinds Orion hack<\/span><\/a><span style=\"color: #0e101a;\">\u00a0exist anywhere on your network.<\/span><\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">Going back to that vanished perimeter with more employees than ever working from home, CIXAEDR makes it easier to understand what\u2019s going on within your estate, regardless of where the machines are or whether they are connected to a VPN \/ behind the firewall. Currently, this is only available for online machines and \u2018query-able\u2019 by Central, however, an Early Access Program for our XDR DataLake technology has just opened. This will sync useful endpoint data with Sophos Central so that it can be queried even when the host is offline. You\u2019ll see some more info on XDR in future articles.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span lang=\"EN-GB\" style=\"color: #0e101a;\">Use the JOIN Function to Query Data Across Multiple Sources<\/span><\/strong><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">Between the proprietary Sophos EDR and the underlying OSQUERY schema data tables, there are approximately 300 tables of information available to query using Intercept X Advanced with EDR. The most effective queries will combine data from multiple tables.\u00a0Check out some useful videos that guide you through creating your own Live Discover EDR queries\u00a0<\/span><span lang=\"EN-GB\"><a href=\"https:\/\/vimeo.com\/showcase\/6972121\"><span style=\"color: #4a6ee0;\">here<\/span><\/a><span style=\"color: #0e101a;\">.<\/span><\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span lang=\"EN-GB\" style=\"color: #0e101a;\">Query Windows Events and Security Groups with Live Discover\u00a0<\/span><\/strong><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">This is pretty self-explanatory, however, any number of the following behaviours within a network could be indicative of some malicious activity:<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<ul>\n<li><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0New\/ Deleted Security Groups\u00a0<\/span><\/li>\n<li><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><span lang=\"EN-GB\" style=\"color: #0e101a;\">User Added \/ Removed from Security Group\u00a0<\/span><\/li>\n<li><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><span lang=\"EN-GB\" style=\"color: #0e101a;\">New \/ Locked \/ Disabled \/ enabled User Accounts\u00a0<\/span><\/li>\n<li><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><span lang=\"EN-GB\" style=\"color: #0e101a;\">Password Reset<\/span><\/li>\n<\/ul>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><span lang=\"EN-GB\" style=\"color: #0e101a;\">Note: Windows auditing of some of these events may be disabled by default.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">To get your hands on some examples of these Live Discover queries, take a look\u00a0<\/span><span lang=\"EN-GB\"><a href=\"https:\/\/community.sophos.com\/intercept-x-endpoint\/early-access-program\/b\/blog\/posts\/exploring-security-groups-with-live-discover\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #4a6ee0;\">here<\/span><\/a><span style=\"color: #0e101a;\">.<\/span><\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span lang=\"EN-GB\" style=\"color: #0e101a;\">EDR Live Discover API\u00a0<\/span><\/strong><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">Calling this recently released API, you can programmatically query an estate using your favourite queries, on a schedule. Get started with Live Discover\u00a0<\/span><span lang=\"EN-GB\"><a href=\"https:\/\/developer.sophos.com\/getting-started-with-live-discover\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #4a6ee0;\">here<\/span><\/a><span style=\"color: #0e101a;\">\u00a0and check\u00a0<\/span><a href=\"https:\/\/developer.sophos.com\/apis\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #4a6ee0;\">here<\/span><\/a><span style=\"color: #0e101a;\">\u00a0for more info on the Sophos APIs.<\/span><\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">Finally, I did say we\u2019d get back to our Managed Threat Response service. If EDR threat hunting sounds good, but ultimately a bit too difficult for you or your customer, then MTR is for you. Our highly skilled team of cybersecurity experts provide 24\/7 human-led threat hunting. They will investigate suspicious activity, not just detections, and where other vendors stop at notification our MTR team will take action. Take a look\u00a0<\/span><span lang=\"EN-GB\"><a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-threat-response\/rapid-response.aspx\"><span style=\"color: #4a6ee0;\">here<\/span><\/a><span style=\"color: #0e101a;\">\u00a0for more information regarding our MTR service and Rapid Response for when the proverbial has hit the fan!<\/span><\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span lang=\"EN-GB\" style=\"color: #0e101a;\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If there\u2019s one thing that the new normal (sorry, not sorry) has taught us in 2020, it\u2019s that employees working from home present several challenges when it comes to securing the estate. The industry has been raising awareness about the [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":1190,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[30,105,16],"coauthors":[54],"class_list":["post-2714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-intercept-x","tag-sophos-edr","tag-technical-news"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/04\/featured-image-UKI-tech-update-Partner-app-icon-1600x960-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/2714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=2714"}],"version-history":[{"count":2,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/2714\/revisions"}],"predecessor-version":[{"id":2716,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/2714\/revisions\/2716"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media\/1190"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=2714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=2714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=2714"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=2714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}