Carbon Black Cloud Endpoint Standard (formerly Cb Defense)
Issue/Introduction
Steps to take if a malware attack is observed taking place on endpoint(s) in the environment and it is believed that the associated malicious behavior should have been detected or prevented by Carbon Black Cloud Endpoint Standard.
If an affected device is wiped or re-imaged after logs are collected, it might not be possible to continue investigating the issue in case multiple iterations of diagnostic data are needed.
Check Security Advisories and Threat Research content to see if it’s a known type of attack; If so, check that the right measures to prevent were in place. If yes, please go to step 4.
The policy and policy rule(s) in place which were expected to block the attack
Any notable Alert IDs or Event IDs
Any known IOCs, malware hashes or ransomware extensions
Additional Information which may also be helpful (if possible):
How many endpoints were affected?
Approximate date and time the incident took place
Is the ingress point known?
Did any user report suspicious behavior, if so, what did they observe?
Were the affected endpoints accessible from the internet by design or unintentionally?
If SMB shares were involved, were they password protected?
Were the sensors remediated after quarantine? If so, what steps were taken?
Additional Information
Support may assist in determining if Endpoint Standard failed to identify or stop an attack in the event that the appropriate policy rules were in place, but is not able to provide detection or prevention recommendations outside of a Carbon Black product. Support is also unable to assist with complete analysis of a security incident, e.g. to identify exact source of an attack or to suggest full remediation steps (i.e. Incident Response)