If thereâs one thing that the new normal (sorry, not sorry) has taught us in 2020, itâs that employees working from home present several challenges when it comes to securing the estate. The industry has been raising awareness about the âvanishing perimeterâ for years. All it took was a global pandemic to pull the rug out from under the feet of so many businesses, and hey-presto the traditional perimeter has well and truly disappeared â end-user devices are the new perimeter.
Â
In this article, weâre going to take a look at how Intercept X with Endpoint Detection and Response (EDR) can add value to your customers and allow them to take back control of their new perimeters.
Â
EDR layers in tools that allow IT to investigate suspicious (but not 100% convicted malicious) behaviour without the need for experienced, highly skilled cyber threat-hunting expertise. We first released CIXAEDR a couple of years back, however itâs fair to say that the uptake hasnât been as significant as weâd have hoped.
Â
The unfortunate reality is that there is a large portion of customers out there who employ IT, generalists. They either canât afford to employ (or struggle to retain) cybersecurity experts who would benefit from EDR. There is also unfortunately still a culture with many customers who, in their ideal world, would prefer to âset-and-forget’ when it comes to endpoint security. For example, weâve seen instances where customers might go months (and in some cases even years!) without having logged into their Sophos Central dashboard.
Â
Needless to say, this is not best practice, and if you work for an MSP then you should be having conversations with these customers around how you can help them with the heavy lifting of managing their cybersecurity risk. If you canât offer your services to help, the good news is that Sophos have a Managed Threat Response (MTR) service – more on MTR later.
Â
Below is a roundup of the âEDR Tipsâ that weâve covered in the monthly Sync with Sophos update series.
Â
*EVENT PLUG ALERT* If youâre not currently registered to attend this recurring webinar, it is held on the first Friday of every month at 10 am (GMT). Please register here â it would be great to see you there!
Â
Useful Tools for Malware Investigation and Remediation
Â
If you already investigate suspicious behaviour, you might be familiar with some of the tools discussed here. This article gives some really useful examples of how you can leverage EDR Live Discover and Live Response to make using these tools even easier.
Â
Hunt for Vulnerabilities and Indicators of Compromise (IoCs) Related to Specific Cyber Threats
Â
Intercept X Advanced with EDR provides the ability to answer some of the difficult questions that C level execs need to know the answers to. For example âI read about this hack recently. Whatâs our risk exposure here?â or âSophos is telling us that an issue has been dealt with. How did the threat end up in our system in the first place, and can we be sure itâs been fully resolved?â
Â
You or your customers want to know if an estate is exposed to a particular exploit, for example, the SigRED Windows Server DNS wormable vulnerability from 2020, or perhaps you would like to see if the SHA256 hashes associated with the SolarWinds Orion hack exist anywhere on your network.
Â
Going back to that vanished perimeter with more employees than ever working from home, CIXAEDR makes it easier to understand whatâs going on within your estate, regardless of where the machines are or whether they are connected to a VPN / behind the firewall. Currently, this is only available for online machines and âquery-ableâ by Central, however, an Early Access Program for our XDR DataLake technology has just opened. This will sync useful endpoint data with Sophos Central so that it can be queried even when the host is offline. Youâll see some more info on XDR in future articles.
Â
Use the JOIN Function to Query Data Across Multiple Sources
Â
Between the proprietary Sophos EDR and the underlying OSQUERY schema data tables, there are approximately 300 tables of information available to query using Intercept X Advanced with EDR. The most effective queries will combine data from multiple tables. Check out some useful videos that guide you through creating your own Live Discover EDR queries here.
Â
Query Windows Events and Security Groups with Live DiscoverÂ
Â
This is pretty self-explanatory, however, any number of the following behaviours within a network could be indicative of some malicious activity:
Â
- Â New/ Deleted Security GroupsÂ
- Â User Added / Removed from Security GroupÂ
- Â New / Locked / Disabled / enabled User AccountsÂ
- Â Password Reset
 Note: Windows auditing of some of these events may be disabled by default.
Â
To get your hands on some examples of these Live Discover queries, take a look here.
Â
EDR Live Discover APIÂ
Â
Calling this recently released API, you can programmatically query an estate using your favourite queries, on a schedule. Get started with Live Discover here and check here for more info on the Sophos APIs.
Â
Finally, I did say weâd get back to our Managed Threat Response service. If EDR threat hunting sounds good, but ultimately a bit too difficult for you or your customer, then MTR is for you. Our highly skilled team of cybersecurity experts provide 24/7 human-led threat hunting. They will investigate suspicious activity, not just detections, and where other vendors stop at notification our MTR team will take action. Take a look here for more information regarding our MTR service and Rapid Response for when the proverbial has hit the fan!
Â