Configure how Behavior Monitoring is applied to the policy.
ImportantBy default, Behavior Monitoring is disabled on all
versions of Windows Server platforms.
|
Before configuring Behavior Monitoring, you must enable the feature. Once enabled,
configure the following settings.
Monitoring Level
Monitoring level is the degree of vigilance and strictness applied when detecting
and responding to potential threats. Raising the level increases the sensitivity of
the sensor, which increases the number of detections and alerts. Higher levels allow
for more strict monitoring to help with situations like on-going threat investigations,
but might generate a large number of nonessential logs and impact endpoint performance.
Trend Micro recommends setting your monitoring level to 2 - Moderate to balance more
relevant data with minimal impact on your endpoints. Some components used by higher
monitoring levels are not available on all platforms.
Malware Behavior Blocking
Malware Behavior Blocking provides a necessary layer of
additional threat protection from programs that exhibit malicious behavior. It
observes system events over a period of time. As programs execute different
combinations or sequences of actions, Malware Behavior Blocking detects known
malicious behavior and blocks the associated programs. Use this feature to ensure
a
higher level of protection against new, unknown, and emerging threats.
Malware Behavior Monitoring provides the following
threat-level scanning options:
-
Known threats: Blocks behaviors associated with known malware threats
-
Known and potential threats: Blocks behavior associated with known threats and takes action on behavior that is potentially malicious
After blocking a program with notifications enabled, the Trend Vision One Endpoint Security agent
displays a notification on the endpoint.
Ransomware Protection
Ransomware Protection prevents the unauthorized modification
or encryption of files on agents by
ransomwarethreats. Ransomware is a type of malware which restricts access to files and demands payment to restore the affected files.
Apex One provides
the following methods to protect your environment from ransomware threats.
NoteTo reduce the chance of the Trend Vision One Endpoint Security agent detecting a
safe process as malicious, ensure that the agent has Internet access to perform additional
verification processes using Trend Micro
servers.
|
Option
|
Description
|
||||
Protect documents against unauthorized encryption or
modification
|
You can configure Behavior Monitoring to detect a specific
sequence of events that may indicate a ransomware attack. After Behavior Monitoring
matches all
of the following criteria, the Trend Vision One Endpoint Security agent terminates and attempts to quarantine malicious programs:
Additionally enable Automatically back up files changed by
suspicious programs to create copies of files being encrypted on
endpoints. After the encryption process completes and Apex One detects a
ransomware threat, Apex One prompts end users to restore the affected files without
suffering any loss of data.
|
||||
Block processes commonly associated with ransomware
|
Ransomware commonly distributes executable files in specific locations on endpoints
before attempting to hijack files. Blocking the processes started from these
locations can help prevent the ransomware from being able to hijack files.
|
||||
Enable program inspection to detect and block compromised
executable files
|
Program inspection monitors processes and performs API hooking to
determine if a program is behaving in an unexpected manner. Although this procedure
increases the overall detection ratio of compromised executable files, it may result
in decreased system performance.
|
Anti-Exploit Protection
Anti-exploit protection works in conjunction with program inspection to monitor the
behavior of programs and detect abnormal behavior that may indicate that an attacker
has
exploited a program vulnerability. Once detected, Behavior Monitoring terminates the
program
processes.
ImportantAnti-exploit Protection requires that you select Enable program
inspection to detect and block compromised executable files.
|
Newly Encountered Program Protection
Behavior Monitoring works in conjunction with Web Reputation Services and
Real-time Scan to verify the prevalence of files downloaded through web channels,
email
applications, or Microsoft Office macro scripts. After detecting a "newly encountered"
file,
administrators can choose to prompt users before executing the file. Trend Micro classifies a program as newly
encountered based on the number of file detections or historical age of the file as
determined
by the Smart Protection Network.
Behavior Monitoring scans the following file types for each channel:
-
Web (HTTP/HTTPS): Scans
.exe
files. -
Email applications: Scans
.exe
, and compressed.exe
files in unencrypted.zip
and.rar
files.
Note
|
Event Monitoring
Event Monitoring provides a more generic approach to
protecting against unauthorized software and malware attacks. It monitors system areas
for
certain events, allowing administrators to regulate programs that trigger such events.
Use Event
Monitoring if you have specific system protection requirements that are above and
beyond what is
provided by Malware Behavior Blocking.
The following table provides a list of monitored system
events.
Monitored System Events
Events
|
Description
|
Duplicated System File
|
Many malicious programs create copies of themselves or other
malicious programs using file names used by Windows system files. This is typically
done to
override or replace system files, avoid detection, or discourage users from deleting
the
malicious files.
|
Hosts File Modification
|
The Hosts file matches domain names with IP addresses. Many
malicious programs modify the Hosts file so that the web browser is redirected to
infected,
non-existent, or fake websites.
|
Suspicious Behavior
|
Suspicious behavior can be a specific action or a series of
actions that is rarely carried out by legitimate programs. Programs exhibiting suspicious
behavior should be used with caution.
|
New Internet Explorer Plugin
|
Spyware/grayware programs often install unwanted Internet
Explorer plugins, including toolbars and Browser Helper Objects.
|
Internet Explorer Setting Modification
|
Malware programs may change Internet Explorer settings,
including the home page, trusted websites, proxy server settings, and menu extensions.
|
Security Policy Modification
|
Modifications in Windows Security Policy can allow unwanted
applications to run and change system settings.
|
Program Library Injection
|
Many malicious programs configure Windows so that all applications
automatically load a program library (DLL). This allows the malicious routines in
the DLL to
run every time an application starts.
|
Shell Modification
|
Many malicious programs modify Windows shell settings to
associate themselves to certain file types. This routine allows malicious programs
to launch
automatically if users open the associated files in Windows Explorer. Changes to Windows
shell settings can also allow malicious programs to track the programs used and start
alongside legitimate applications.
|
New Service
|
Windows services are processes that have special functions and
typically run continuously in the background with full administrative access. Malicious
programs sometimes install themselves as services to stay hidden.
|
System File Modification
|
Certain Windows system files determine system behavior,
including startup programs and screen saver settings. Many malicious programs modify
system
files to launch automatically at startup and control system behavior.
|
Firewall Policy Modification
|
The Windows Firewall policy determines the applications that have
access to the network, the ports that are open for communication, and the IP addresses
that
can communicate with the computer. Many malicious programs modify the policy to allow
themselves to access to the network and the Internet.
|
System Process Modification
|
Many malicious programs perform various actions on built-in
Windows processes. These actions can include terminating or modifying running processes.
|
New Startup Program
|
Malicious applications usually add or modify autostart entries in the
Windows registry to automatically launch every time the computer starts.
|
When
Event Monitoring detects a monitored system event, it performs the action configured
for the
event.
The following table lists possible actions that
administrators can take on monitored system events.
Actions on Monitored System Events
Action
|
Description
|
||
Assess
|
The Trend Vision One Endpoint Security agent always allows programs associated with an event to run
and logs the event for assessment.
This is the default action for all monitored system
events.
|
||
Allow
|
The Trend Vision One Endpoint Security agent always allows programs associated with an event to
run.
|
||
Ask when necessary
|
The Trend Vision One Endpoint Security agent prompts users to allow or deny programs associated with
an event from running and adds the programs to the exception list
If the user does not respond within a certain time period, the
Trend Vision One Endpoint Security agent
automatically allows the program to run. The default time period is 30 seconds.
|
||
Deny
|
The Trend Vision One Endpoint Security agent always blocks programs associated with an event from
running and logs the event.
After blocking a program with notifications enabled, the Trend Vision One Endpoint Security agent
displays a notification on the endpoint.
|