You notice multiple noisy Tamper Protection events for legit processes post upgrade to SEP 16, while with the old SEP 14 clients on the same machines lesser events are recorded.
Here a sample of log entries on the console:
8/3/2025 3:20:43 AM +03:00 Access to process restricted: Open process/thread handle Actor: C:\Windows\System32\conhost.exe Target: C:\Program Files\Broadcom\Endpoint Security Agent\Definitions\WebExtConnectorDefs\20250519.001\webextbridge.exe
8/3/2025 3:20:55 AM +03:00 Access to process restricted: Open process/thread handle Actor: C:\Windows\System32\Taskmgr.exe Target: C:\Program Files\Broadcom\Endpoint Security Agent\2.5.0.186\bin64\ccSvcHst.exe
8/3/2025 3:20:57 AM +03:00 Access to process restricted: Open process/thread handle Actor: C:\Windows\System32\Taskmgr.exe Target: C:\Program Files\Broadcom\Endpoint Security Agent\2.5.0.186\bin64\main_ui.exe
8/3/2025 3:20:57 AM +03:00 Access to process restricted: Open process/thread handle Actor: C:\Windows\System32\Taskmgr.exe Target: C:\Program Files\Broadcom\Endpoint Security Agent\Definitions\WebExtConnectorDefs\20250519.001\webextbridge.exe
8/3/2025 3:20:59 AM +03:00 Access to process restricted: Open process/thread handle Actor: C:\Windows\System32\Taskmgr.exe Target: C:\Program Files\Broadcom\Endpoint Security Agent\Definitions\SepServiceTdadDefs\20250425.002\SETDADCollector.exe
8/3/2025 3:21:00 AM +03:00 Access to process restricted: Open process/thread handle Actor: C:\Windows\System32\Taskmgr.exe Target: C:\Program Files\Broadcom\Endpoint Security Agent\Definitions\SeaBladeAppDiscoveryDefs\20250519.001\ADScan.exe
ESA client (SEP16)
Windows OS
ESA (SEP 16) Tamper Protection is more aggressive comparing to SEP14, due to the enhanced mechanism where we do record wider range of tamper attempts e..g:
1. OpenProcess
2. OpenThread
3. DuplicateProcess
4. DuplicateThreadHandle
And many more.
When an external process attempts to get a handle to a Symantec process or thread (e.g., via OpenProcess or OpenThread), Tamper Protection intercepts the request and removes high-risk access rights. This prevents actions such as:
By stripping these rights, Tamper Protection neutralizes a wide range of advanced attack vectors used to disable security software, including process hollowing.
1. Enhanced File and Registry Protection
Control over protected assets is now more granular and powerful.
2. Secure Process Launch Chain
To further combat process hollowing and other sophisticated injection techniques, Tamper Protection now enforces a secure launch chain. A Symantec process will only be considered authorized if it is launched by a trusted entity, such as:
This strategy ensures that even if an attacker finds a way to start a Symantec executable, it will not be granted authorized status if it was initiated by an untrusted process, rendering it inert.