LoFP LoFP / t1219

t1219

TitleTags
administrators may enable or disable this feature that may cause some false positive.
depending on the environment the rule might require some initial tuning before usage to avoid fp with third party applications
false positives can be found in environments using messagent for remote management, analysis should prioritize the grandparent process, messagent.exe, and scrutinize the resulting child processes triggered by any suspicious interactive commands directed at the target host.
false positives will be found. filter as needed and create higher fidelity analytics based off banned remote access software.
host connections not using host fqdn.
host connections to external legitimate domains.
host connections to valid domains, exclude these.
if the script being executed make use of any of the utilities mentioned in the detection then they should filtered out or allowed.
it is possible that legitimate remote access software is used within the environment. ensure that the lookup is reviewed and updated with any additional remote access software that is used within the environment. known false positives can be added to the remote_access_software_usage_exception.csv lookup to globally suppress these situations across all remote access content
known or approved applications used by the organization or usage of built-in functions. known false positives can be added to the remote_access_software_usage_exception.csv lookup to globally suppress these situations across all remote access content
legitimate activity of system administrators
legitimate atera agent installation
legitimate deployment of anydesk
legitimate incoming connections (e.g. sysadmin activity). most of the time i would expect outgoing connections (initiated locally).
legitimate piping of the password to anydesk
legitimate usage of the tool
legitimate use
legitimate use of anydesk from a non-standard folder
legitimate use of quick assist in the environment.
legitimate use of the tool
legitimate uses of teamviewer in an organisation
likelihood is related to how often the paths are used in the environment
likely with legitimate usage of \".rdp\" files
likely with other browser software. apply additional filters for any other browsers you might use.
some fp could occur with similar tools that uses the same command line '--set-password'
this module can be loaded by a third party application. filter is needed.
unknown binary names of teamviewer
unlikely
vnc connections may be made directly to linux cloud server instances but such connections are usually made only by engineers. vnc is less common than ssh or rdp but may be required by some work flows such as remote access and support for specialized software products or servers. such work-flows are usually known and not unexpected. usage that is unfamiliar to server or network owners can be unexpected and suspicious.
vnc connections may be received directly to linux cloud server instances but such connections are usually made only by engineers. vnc is less common than ssh or rdp but may be required by some work-flows such as remote access and support for specialized software products or servers. such work-flows are usually known and not unexpected. usage that is unfamiliar to server or network owners can be unexpected and suspicious.