LoFP LoFP / t1219

t1219

TitleTags
depending on the environment the rule might require some initial tuning before usage to avoid fp with third party applications
false positives will be found. filter as needed and create higher fidelity analytics based off banned remote access software.
host connections not using host fqdn.
host connections to external legitimate domains.
host connections to valid domains, exclude these.
if the script being executed make use of any of the utilities mentioned in the detection then they should filtered out or allowed.
it is possible that legitimate remote access software is used within the environment. ensure that the lookup is reviewed and updated with any additional remote access software that is used within the environment.
known or approved applications used by the organization or usage of built-in functions.
legitimate activity of system administrators
legitimate atera agent installation
legitimate deployment of anydesk
legitimate piping of the password to anydesk
legitimate usage of the tool
legitimate use
legitimate use of anydesk from a non-standard folder
legitimate use of the tool
legitimate uses of teamviewer in an organisation
likelihood is related to how often the paths are used in the environment
likely with legitimate usage of \".rdp\" files
likely with other browser software. apply additional filters for any other browsers you might use.
some fp could occur with similar tools that uses the same command line '--set-password'
this module can be loaded by a third party application. filter is needed.
unknown binary names of teamviewer
unlikely
vnc connections may be made directly to linux cloud server instances but such connections are usually made only by engineers. vnc is less common than ssh or rdp but may be required by some work flows such as remote access and support for specialized software products or servers. such work-flows are usually known and not unexpected. usage that is unfamiliar to server or network owners can be unexpected and suspicious.
vnc connections may be received directly to linux cloud server instances but such connections are usually made only by engineers. vnc is less common than ssh or rdp but may be required by some work-flows such as remote access and support for specialized software products or servers. such work-flows are usually known and not unexpected. usage that is unfamiliar to server or network owners can be unexpected and suspicious.