Security
Assessment
Detailed Report
Report
Generated on 10/16/2022 - 04:56 pm (UTC)
Report Generated by username Evidence Muvindi email skieseve@gmail.com
REPORT:
EDR
ASSESSMENT:
EDR TEST
SECURITY ASSESSMENT REPORT
Assessment: EDR Test
EXECUTIVE SUMMARY
This is a general assessment report containing results from an assessment. The information starts at an executive summary level with overall scenario pass rates and then progresses to increasingly detailed information
about individual scenarios, assets, and mitigation recommendations. DEFINITIONS Scenario a Scenario is a package of scripted behaviors to mimic attack activity or validate security controls. Asset a machine or device in your network on which the AttackIQ agent is installed. AttackIQ agents execute scenarios on their machines or devices. Result an instance of a scenario executed on a particular asset. Prevented when the execution of the intended behavior carried out by a Scenario is unsuccessful. This result is determined by the AttackIQ Agent and Scenario execution. Detected when an attack carried out by a Scenario has been observed in the logs of a Vendor Product / Security
Control in the customer environment. This result is determined by the Integrations Manager and the integrations that have been configured. OVERALL STATUS
2
UNIQUE
SCENARIOS
2
TOTAL ASSETS
4
TOTAL RESULTS
2
PREVENTED
0
DETECTED
TEST OVERVIEW
Total tests (1)
TESTSSCENARIOSUSERPRIVILEGES*ASSETSTECHNOLOGIESPREVENTIONDETECTIONNew Test 0 2
SYSTEM
2
* User Privileges are SYSTEM for Linux and MacOS assetsPreventedNot Prevented
Other
Detected
Not Detected
Other
No detections50%
50%
100%
THREAT ASSESSMENT AMONG ALL ASSETS EXERCISED)
* Percentages are truncatedNew Test 0 50% blocked (2)
50% not blocked (2)
TOP MITIGATION RECOMMENDATIONS SCENARIOS
Install or Verify Advanced Endpoint Security
Technologies
8
Persistence
Through Windows Registry, Persistence
Through
Startup FolderMonitor and/or block
anomalous registry changes8
Persistence Through Windows Registry, Persistence
Through Startup Folder
Employ Registry Protection Techniques
2
Persistence Through Startup Folder
S CE NA RIOS OVERVIEW Based upon
the pass rate of assets tested, these are scenarios you may want to watch closely.