Views:
The Strict mode under the Detect or Enforce mode is used for stronger threat protection. Enabling Strict mode reduces the level of baseline fingerprint deviation allowed; in other words, it performs stricter comparison between the established baseline and currently-running operational behaviors.
Note
Note
In more dynamic processes where devices and access behaviors are more subject to change, this may generate more events. See Strict Mode - Use Case for information.
To enable Strict mode, set the Operations Behavior Anomaly Detection to Detect or Enforce mode, and then toggle on specifc pillars of protection for guarding separate vulnerability points or simply enable them all for maximum defense.
See below for more details on how the three pillars work in Strict mode.
Script Behaviors: In the Strict mode, the operation process and the monitored process or script must exactly match the approved full operation process stored in the baseline; otherwise, events will be generated or the process will be blocked.
See below as an example of how the Strict mode works for the Script Behaviors.
  1. When you select the Learn mode under the Operations Behavior Anomaly Detection, the following full operation process is learned:
    • explorer.execmd.exepowershell.exescript.ps1
  2. When you switch to the Detect or Enforce mode without turning on the Strict Mode, StellarProtect will not block recognized program calls with unidentified script; the following process is allowed:
    • explorer.execmd.exepowershell.exeNEWscript.ps1
      Note
      Note
      The NEWscript.ps1 does not count as an unrecognized script in the process when the Strict Mode is turned off.
  3. When the Strict Mode is turned on, no matter it's under the Detect or Enforce mode, the following process is not allowed:
    • explorer.execmd.exepowershell.exeNEWscript.ps1
      Note
      Note
      The NEWscript.ps1 is detected as an unrecognized script that will trigger alerts or be blocked when Strict Mode is enabled.
  4. In conclusion, when Strict Mode is turned on, only the exact process (the process learned in Step 1) is allowed:
    • explorer.execmd.exepowershell.exescript.ps1

Example: Script Behaviors - Strict Mode ON/OFF

 
Script Behaviors
Operations Behavior Anomaly Detection
Approved Operation
Monitored Process
Detect
Enforce
Detect
Enforce
Monitored Application
Script
Strict mode: OFF
Strict mode: ON
Process learned and stored in the baseline
explorer.execmd.exe
powershell.exe
script.ps1
Allowed
Operation process changed
cmd.exeexplorer.exe
powershell.exe
script.ps1
Events
Blocked
Events
Blocked
Monitored application changed explorer.execmd.exe
cscript.exe
script.ps1
Events
Blocked
Events
Blocked
Script changed
explorer.execmd.exe
powershell.exe
NEWscript.ps1
Allowed
Events
Blocked
User Login: In the Strict mode, the user accounts and the login activities must exactly match the approved user accounts stored in the baseline; otherwise, events will be generated.
Application Behavior: In the Strict mode, the application behaviors must exactly match the approved application behaviors stored in the baseline; otherwise, events will be generated.
See Strict Mode - Use Case for the description of how you can use the Strict mode to maximize its effectiveness.