This Application and Device Control rule will log any time any process tries to read, create, delete or write to the registry keys or folder locations listed. This has the potential of generating large volumes of logs whenever something touches a location that is being logged, particularly in C:\Windows and C:\Windows\System32.
Create an Application and Device Control rule to log activities in common loading points
- Log into the Symantec Endpoint Protection Manager (SEPM).
- Click Policies.
- Click Application and Device Control.
- Click Add an Application and Device Control Policy...
- Specify a name for the policy. Symantec recommends that policies be named to reflect what the policy is trying to accomplish to help administrators manage their SEP environments.
- Click Application Control.
- Click Add...
- Specify a name for the rule set.
- Ensure that Enable logging is checked.
- In Apply this rule to the following processes:, click Add...
- In the Process name to match field, enter *. This will cause any process that attempts to use a common loading point will be logged. It is important that you do this, as trying to filter at this level can cause threats to be missed.
- Click OK.
- Under Rules, click Add, then Add Condition, then Registry Access Attempts.
- Under Apply to the following registry keys:, click Add...
- Under Registry key, enter this data:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- Click OK.
- Repeat steps 14 to 16 for the following values:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
HKEY_CLASSES_ROOT\exefile\shell\open\command
HKEY_CLASSES_ROOT\comfile\shell\open\command
HKEY_CLASSES_ROOT\txtfile\shell\open\command
- Under Apply to the following registry keys:, click Add...
- Under Registry key, enter this data:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
- Under Registry value name, enter this data:
Local Page
- Click OK.
- Repeat these steps for the following values (Registry key and Registry value name separated by a hyphen below for easier reading):
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main - Search Page
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon - Userinit
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon - Shell
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon - VmApplet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows - AppInit_DLLs
- Click OK.
- Click Actions.
- Check both Enable logging boxes. If you check Send Email Alert, an email will be sent to the email listed in the SEPM for reports.
Note:
- The Severity level is merely a value that can be assigned by an administrator to help filter reports. This has no bearing on the traffic itself, and is only there to allow administrators to filter the data from the SEPM.
- If Notify user is checked, whenever that action (read attempt or create, delete, or write) occurs, the user will get a pop-up in the lower right corner of the screen showing whatever is in the text box. This is an extremely useful tool if doing limited testing. Symantec recommends putting very verbose information into these boxes if used (such as "Read attempt on blocked registry keys"), however, this will pop up on every machine who has the policy, assuming the event happens. As such, this should be used with care.
- Click Allow access for both Read Attempt as well as Create, Delete, or Write Attempt.
- Under Rules, click Add, then Add Condition, then File and Folder Access Attempts.
- Click File and Folder Access Attempts.
- Under Apply to the following files and folders:, click Add...
- Enter this value:
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
- Click OK.
- Repeat steps 29 to 31 for the following values:
C:\Windows
C:\Windows\System32
- Click Actions.
- Check both Enable logging boxes. If you check Send Email Alert, an email will be sent to the email listed in the SEPM for reports.
- Click OK.
- Change Test/Production to Production for your new rule. Because we're not blocking anything, there's no danger.
- Click OK. You will be prompted to assign the policy. You may do this if you wish from here, or you can assign the rule on your own.
View logs generated by this rule
To view the logs on the SEPM:
- Log into the SEPM.
- Click Monitors.
- Click Logs.
- Select Application and Device Control for Log Type.
- Select Application Control for the Log content.
- Modify the Time range, if needed.
- Click View Log.
Information found here can be broken down thusly:
- Time: When did the process attempt to run?
- Action: Did Application and Device Control allow it, or block it?
- Domain/Computer: Which Domain, and what's the host name of the computer?
- User: What account tried to run the program?
- Severity: This is where you can sort by severity...again, this is only to help administrators, and has no bearing on the functionality of SEP.
- Rule Name: Name of the Application and Device control rule that was matched by the action.
- Caller Process: What tried to perform an action?
- Target: What was the process trying to access?
To view the logs on the client:
- Open the SEP client.
- Click View logs.
- Under Client Management, click View Logs, then Control Log....
Information here can be broken down as follows:
- Date and time: When did the process attempt to run?
- Severity Level: This is where you can sort by severity...again, this is only to help administrators, and has no bearing on the functionality of SEP.
- Action: Did Application and Device Control allow it, or block it?
- Test/Production: Is this rule in Test/Production mode (and thus just testing), or is it in Production mode (and thus logging/blocking)?
- Description: This column isn't used by the rules themselves, and can be ignored.
- API Class: What happened? Was the process trying to read a file? Write a registry key?
- Rule: Name of the Application and Device control rule that was matched by the action.
- Caller Process: Which program was actually trying to do something?
- Parameter: What was the process trying to touch?
- User: What account tried to run the program?
- User Domain: What domain is the user running from?
- Location: What location is SEP currently in (if Location Awareness is being used)?