EDR: Live Response 'execfg' Commands Error with 0x80070005
search cancel

EDR: Live Response 'execfg' Commands Error with 0x80070005

book

Article ID: 285249

calendar_today

Updated On:

Products

Carbon Black EDR (formerly Cb Response)

Issue/Introduction

During a Live Response session 'execfg' commands result in 'Remote error HRESULT 0x80070005'.

Environment

  • EDR Server:  7.4+
  • EDR Windows Sensor:  7.2.0+
  • App Control Agent:  7.+

Cause

Two possible causes:
  1. App Control is installed with a policy  "Carbon Black EDR Tamper Protection" Rapid config and EDR Tamper Protection is set to Protect.
  2. App Control is installed without a policy "Carbon Black EDR Tamper Protection" Rapid config and EDR Tamper Protection is set to Protect.

Resolution

  1. Disable the App Control "Carbon Black EDR Tamper Protection" Rapid config after Carbon Black EDR Tamper Protection enforcement is in place.
  2. If #1 solution does not work, then implement the App Control rule that ignores executes by process cb.exe on path c:\windows\carbonblack\cbmarshal.exe.
    Rule Type: Execution Control
    Execute Action: Allow
    Path or file:
    <windows>\carbonblack\cbmarshal.exe
    Process:
    <windows>\carbonblack\cb.exe
    User or Group: Local System

Additional Information

  • App Control "Carbon Black EDR Tamper Protection" Rapid config was necessary to protect EDR software prior to EDR's Tamper Protection release.
  • Enabling Tamper Protection on both App Control and Carbon Black EDR does not provide extra protection. We recommend that you disable the App Control "Carbon Black EDR Tamper Protection" Rapid config after Carbon Black EDR Tamper Protection enforcement is in place. 

  • Requirements for EDR Windows Tamper Protection:
    • Minimum OS Versions of Windows 10 v1703 (Desktop) or Windows Server v1709 (Windows build 15163)
    • Minimum Carbon Black EDR versions of v7.2.0 Windows EDR sensor and
    • v7.4.0 Carbon Black EDR Server
  • Any Windows sensor in a sensor group that has Tamper Protection applied and that does not meet the minimum OS requirements will default to Tamper Detection. VMware Carbon Black App Control Tamper Protection is recommended in these cases. We recommend that you update the tamper rule settings for Carbon Black App Control to the latest Carbon Black EDR Tamper Protection Rapid Config.