Username: Evidence Muvindi



Download 333.16 Kb.
View original pdf
Page1/4
Date11.11.2022
Size333.16 Kb.
#59934
  1   2   3   4
edr test security assessment detailed report 2022 10 16 16 12


Security
Assessment
Detailed Report
Report Generated on
10/16/2022 - 04:56 pm (UTC)
Report Generated by username Evidence Muvindi email skieseve@gmail.com
REPORT:
EDR
ASSESSMENT:
EDR TEST

SECURITY ASSESSMENT REPORT
Assessment: EDR Test
EXECUTIVE SUMMARY
This is a general assessment report containing results from an assessment. The information starts at an executive summary level with overall scenario pass rates and then progresses to increasingly detailed information about individual scenarios, assets, and mitigation recommendations. DEFINITIONS Scenario a Scenario is a package of scripted behaviors to mimic attack activity or validate security controls. Asset a machine or device in your network on which the AttackIQ agent is installed. AttackIQ agents execute scenarios on their machines or devices. Result an instance of a scenario executed on a particular asset. Prevented when the execution of the intended behavior carried out by a Scenario is unsuccessful. This result is determined by the AttackIQ Agent and Scenario execution. Detected when an attack carried out by a Scenario has been observed in the logs of a Vendor Product / Security
Control in the customer environment. This result is determined by the Integrations Manager and the integrations that have been configured. OVERALL STATUS

2
UNIQUE SCENARIOS

2
TOTAL ASSETS

4
TOTAL RESULTS

2
PREVENTED

0
DETECTED
TEST OVERVIEW
Total tests (1)
TESTS
SCENARIOS
USER
PRIVILEGES*
ASSETS
TECHNOLOGIES
PREVENTION
DETECTION
New Test 0 2
SYSTEM
2
* User Privileges are SYSTEM for Linux and MacOS assets
Prevented
Not Prevented
Other
Detected
Not Detected
Other
No detections
50%
50%
100%

THREAT ASSESSMENT AMONG ALL ASSETS EXERCISED)
* Percentages are truncated
New Test 0 50% blocked (2)
50% not blocked (2)

TOP MITIGATION RECOMMENDATIONS SCENARIOS
Install or Verify Advanced Endpoint Security
Technologies
8
Persistence Through Windows Registry, Persistence
Through Startup Folder
Monitor and/or block anomalous registry changes
8
Persistence Through Windows Registry, Persistence
Through Startup Folder
Employ Registry Protection Techniques
2
Persistence Through Startup Folder
S CE NA RIOS OVERVIEW Based upon the pass rate of assets tested, these are scenarios you may want to watch closely.

Download 333.16 Kb.

Share with your friends:
  1   2   3   4




The database is protected by copyright ©ininet.org 2024
send message

    Main page