Jump to content

ILoveESET

Members
  • Posts

    22
  • Joined

  • Last visited

Posts posted by ILoveESET

  1. Hello,

    As the title of this thread sounds, what configurations may result in bypass of the blocking of hashes set in EEI?

    I was able to successfully execute a ransomware without trigger from the antivirus through configuration of detection name exclusions. I could see the alarms coming into the EEI.

    I then configured blocking of that ransomware hash , and tried to execute in another machine. The execution was not blocked.

    And best part is that the "Blocked Hashes" entries under "Admin" still shows that it was blocked based on the timestamp displayed at "Blocked on" column.

    This is confusing because administrator will think it is blocked, but at the user side it was not. Could there be functions in ESMC/EEI that supercedes blocking of hashes? How can i verify if the blocking of hashes was indeed sent to the endpoints?

  2. Hello, 

    i was trying to create a rule which detects registry changes made by powershell that was generated from excel. Below is my rule sets. it passed the syntax check. The activity was re-produced by creating the registry HKCU:\Software\myEEIEx on endpoints with EEI agent installed.

    Detecting of registry key change worked, but when adding the logic of detecting process changes, it doesnt seem to trigger...

        <definition>
            <Process>
                <operator type="OR">
                    <Condition component="FileItem" condition="is" property="FileNameWithoutExtension" value="powershell" />
                    <Condition component="FileItem" condition="is" property="FileNameWithoutExtension" value="cscript" />
                    <Condition component="FileItem" condition="is" property="FileNameWithoutExtension" value="wscript" />
                    <Condition component="FileItem" condition="is" property="FileNameWithoutExtension" value="cmd" />
                </operator>
            </Process>
            <operations>
                <operation type="RegSetValue">
                    <operator type="OR">
                        <condition component="RegistryItem" condition="starts" property="Key" value="HKCU:\Software\myEEIEx" />
                    </operator>
                </operation>
            </operations>
        </definition>

  3. On 12/20/2019 at 3:28 PM, MichalJ said:

    Hello, EEI sends just the hashes, for verification. However ESET applications (in case Live Grid Feedback System is enabled) do send files for in-depth analysis / replication. However your assumption is incorrect - popularity is determined by how often the file is seen in LiveGrid, reputation is the result of the replication / file behavior. 

    thank you Michal, you are awesome as always!

  4. Hello my fellow comrades in ESET,

    May i know which component of LiveGrid is used in EEI to obtain reputation and popularity ratings for executables found in EEI console?

    For the reputation ratings, i deduce it should rightfully rely on LiveGrid Reputation system, which sends hashes of the executables for matching to database of hashes.

    But popularity ratings? Does it rely on LiveGrid Feedback system, where the actual executables are uploaded for further analysis ?

    Does EEI ever send the actual executables to LiveGrid , or just the hashes only?

  5. On 12/16/2019 at 3:42 PM, Marcos said:

    I hope it will be clearer from a description of your screen shot that shows:
    - 2 computers with 256 unresolved and 0 resolved alarms
    - 1 computer with 64 resolved and 0 with unresolved alarm
    - probably 2 computers (judging just from the size of the bubble) with 512 unresolved and 2 resolved alarms

     

    Thank you Marcos, but in this case, why does the 2 computer bubble show the value 512 for unresolved alarms, and 1 for resolved alarms? 

    Does this mean, we just ignore the value behind the ","? Or there is a meaning to those values ?

  6. On 12/13/2019 at 6:07 PM, Marcos said:

    The higher a circle is on the Y axis, the more machines in your LAN have particular files. The further a circle is on the X axis, the more ESET users have the file (ie. the more popular it is worldwide).  The bigger a circle is, the more such files you have.

    To illustrate it on a concrete example:
    The red-marked circle means that you have quite many files that exist only on 1 computer in your LAN but are quite popular among ESET users since the LG popularity is 7 (1-10 mil. of users):

    image.png

    Thank you Marcos, your explaination is very clear! How about the other graph about resolved and unresolved alarms?

  7. Hello friends,

    I was fiddling around with EEI, and i came across 2 graphs which i cant really comprehend, and seek a better explaination here:

    image.png.397115f385e565670e24d9d603490b1d.png

    Reference to the above image, what network popularity? Documentation from https://help.eset.com/eei/1.3/en-US/dashboard_executables.html?zoom_highlightsub=network+popularity states as "Hhe number of computers which have the module in the enterprise". What exactly does that mean ? How do i install network popularity modules at the endpoints?

     

    image.png.32ec99734f63c0babdd40dd2838b066f.png

    Reference to the above image, how can i actually understand the bubbles?https://help.eset.com/eei/1.3/en-US/dashboard_executables.html?dashboard_computers.html explaination doesn't help in understanding at all , or is it just me? :(

     

  8. On 5/21/2019 at 6:17 AM, noorigin said:

    You can also create a new "Software Uninstall" task in client tasks->all tasks->operating system tasks->software uninstall. Works well, I use it frequently

    this method allows you to uninstall ESET softwares or third party AV. I think he wanted to uninstall Google Chrome, hence the use of run parameters.

  9. Ahoj folks!

     

    I created a Software Install tasks on my ECA to install EES on my endpoint. The endpoint is running Win 7, and has internet connection.

    I pointed the task to download from (Chinese version i know) :

    https://download.eset.com/com/eset/apps/business/ees/windows/latest/ees_nt64_chs.msi

    But the task shown in ECA remains "Scheduled" after over 30 minutes ( see below screenshot). Is there a manual override I can do to trigger the task immediately?

    I verified that my Win 7 endpoint has ERAAgent.exe running.

     

    image.thumb.png.17632ddfbd6f8cb8b4684f401f43c724.png

×
×
  • Create New...