Quantcast
Channel: Symantec Connect - Products - Articles
Viewing all articles
Browse latest Browse all 818

Detecting Cryptolocker activity with Symantec Endpoint Protection

$
0
0

1. Create an "Application and Device Control" rule.

"Apply this rule to the following processes:" *

5.JPG

Add "File and Folder Access Attempts"

1.1. "Properties" of File and Folder Access Attempts

1.JPG

Apply to the following files and folders:

decrypt all*.txt

decrypt_instruction*.txt

*.doc.???????

*.docx.???????

*.xls.???????

*.xlsx.???????

*.pdf.???????

*.rtf.???????

*.txt.???????

*.zip.???????

*.pst.???????

*.locky

*.crypted

*.encryptedRSA

do not apply the following files and folders:

*.???.???

*.partial

1.2. "Actions":

2.JPG

Under the "Launch Process Attempts":

properties:

6.JPG

Apply to the following processes:

new "cryptolocker" and "download.ponic" variants md5's

Actions:

7.jpg

Terminate process, Enable logging, severity - 0, Send e-mail alert.

2. Create a "Notification condition" under Monitors/Notifications:

4.JPG

Done.

When the malware makes an action (encrypts any files), SEPM generates a mail to system administrators.


Viewing all articles
Browse latest Browse all 818

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>