And Then There Were None (More False Positives): Writing Better EDR Detections | Cyber Defense Forum
Is it possible for any security product to work properly out of the box? My experience is that a newly-deployed security tool will bury analysts in false positive alerts, leaving them with the task of either whitelisting them (which can leave the org open to false negatives), or tuning them for fidelity. Endpoint Detection Response (EDR) tools such as Carbon Black, Crowdstrike, and Symantec EDR are no exception. This problem is exacerbated in organizations with large populations of system admins and developers. Both these groups perform daily activities that trip alarms designed to find malicious activity. For example, encoded Powershell is often seen as an IOC, but system admins love it. I'll go over several cases, and demonstrate how to use parent processes, child processes, command-line options, and other techniques to raise the fidelity of your alerts.
Speaker: Dan Banker, Threat Response Team Lead, Motorola Solutions
View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at http://www.sans.org/u/195g