Carbon Black Cloud: What are the Carbon Black recommended best practices for various Microsoft applications?
search cancel

Carbon Black Cloud: What are the Carbon Black recommended best practices for various Microsoft applications?

book

Article ID: 291691

calendar_today

Updated On:

Products

Carbon Black Cloud Endpoint Standard (formerly Cb Defense) Carbon Black Cloud Enterprise EDR (formerly Cb Threathunter)

Issue/Introduction

What are the Carbon Black recommended best practices for various Microsoft applications?

Environment

  • Carbon Black Cloud Sensor: All Versions
  • Microsoft Windows: All Supported Versions

Resolution

Carbon Black recommends reviewing the available guidelines from Microsoft and implementing exclusions based on your security posture and performance requirements in a stair-step approach:
  1. Approve Certificate: Ensure properly signed and trusted applications have been whitelisted
  2. Approve Hash: For unsigned files that are trusted within the environment
  3. IT_Tool: Helpful for SCCM deployments
  4. Allow and Log: Helpful for GPO or login scripts applications where extra visibility is required
  5. Allow: Helpful for noisy applications that change hash frequently
  6. API Bypass: Helpful for applications performing multiple operations
  7. Full Bypass: Helpful for backup or performance monitoring applications that touch large amounts of files or generate higher-than-average resource consumption

Additional Information

Here are some resources from Microsoft / Technet: