<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.netmon.asia/blogs/tag/edr/feed" rel="self" type="application/rss+xml"/><title>Netmon Information Systems Ltd. - Blog #EDR</title><description>Netmon Information Systems Ltd. - Blog #EDR</description><link>https://www.netmon.asia/blogs/tag/edr</link><lastBuildDate>Mon, 20 Apr 2026 08:44:25 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[What’s New in GravityZone Platform August 2024 (v 6.53)]]></title><link>https://www.netmon.asia/blogs/post/going-on-the-offense-a-primer-on-an-offensive-cybersecurity-strategy11</link><description><![CDATA[ On the 5th of August, Bitdefender rolled out new functionality in Bitdefender GravityZone, a comprehensive cybersecurity pl ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QAaVLTIYSm2weoZ9RXh69Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_cCyyZ7baReSKpRY8cCExOA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_TRAV76fURDW6XdMjq1x3_Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_kGAs66KVSveFXARzuNW1oA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;text-align:left;"> On the 5th of August, Bitdefender rolled out new functionality in Bitdefender GravityZone, a comprehensive cybersecurity platform that provides prevention, protection, detection, and response capabilities for organizations of all sizes. These features, consistent with our multi-layered security strategy, are intended to ease the workload of security analysts, administrators, and users. <br><img src="/GravityZone%20Platform%2001.jpg" style="width:589.5px !important;height:393px !important;max-width:100% !important;"><br></div>
<div style="color:inherit;text-align:left;"><div><span style="color:rgb(234, 119, 4);font-size:18px;">What’s new for Security Analysts</span><br></div>
</div><div style="color:inherit;text-align:left;"><span style="color:inherit;">In a dynamic cybersecurity landscape, security analysts are responsible for uncovering any signs of potential sophisticated attacks to make the invisible visible. This section describes new functionality designed to elevate the capabilities of analysts, offering enhanced tools for threat detection, investigation, and response.</span><br></div>
<div style="color:inherit;text-align:left;"><div><span style="font-size:18px;color:rgb(234, 119, 4);">Monitor Multiple Subnets with a Single Network Sensor</span><br></div>
</div><div style="color:inherit;text-align:left;"><span style="color:inherit;">Sensors in Bitdefender GravityZone actively monitors your IT infrastructure like devices, networks, cloud, identities, and productivity applications for potential threats, including ransomware attacks. Network Sensor specifically analyzes network traffic to detect and prevent lateral movement, data exfiltration, port scanning, and brute-force attacks, providing crucial insights into network-based threats.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">With the latest update, you can monitor multiple network subnets using a single Network Sensor Virtual Appliance. You can now configure multiple VLANs for monitoring, and by adding network router definitions for your networks, the sensor and correlation engine can better understand network topology and traffic flow. To prevent IP and MAC address conflicts caused by subnets with overlapping address spaces, you can define Group IDs to logically partition your network infrastructure, thereby ensuring that detections from such networks are differentiated and accurately marked.</span><br></div>
<div style="color:inherit;text-align:left;"><img src="/GravityZone%20Platform%2002.jpg" style="text-align:center;width:608.1px !important;height:264px !important;max-width:100% !important;"><br><span style="color:inherit;">This new functionality will be available automatically on your existing network sensors. However, to benefit from these improvements, existing customers will need to reconfigure their existing virtual appliances. All configuration steps are described in detail on our Bitdefender support center here.</span></div>
<div style="color:inherit;text-align:left;"><div><span style="font-size:18px;color:rgb(234, 119, 4);">What’s new for Administrators</span></div>
</div><div style="color:inherit;text-align:left;"><span style="color:inherit;">With administrators constantly juggling numerous tasks and responsibilities, tools designed to make their daily tasks easier are highly appreciated. This section describes new functionality designed to facilitate the management of features responsible for prevention, protection, and detection in a defense-in-depth security architecture.</span><br></div>
<div style="color:inherit;text-align:left;"><div><span style="color:rgb(234, 119, 4);font-weight:400;">Automatic Response for Custom Rules</span><br></div>
</div><div style="color:inherit;text-align:left;"><span style="color:inherit;">Until now, you could use custom detection rules to define rules that mark specific behavior (custom IoC) from your environment as a valid detection and generate corresponding incidents on the Incidents page.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">With the latest release you can assign automatic actions for custom detection rules. Depending on your license, you can set the following response actions:</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:rgb(234, 119, 4);">* Isolate</span><span style="color:inherit;"> – it isolates the endpoint where the detection occurred.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:rgb(234, 119, 4);"><span style="text-align:center;">*&nbsp;</span>Collect investigation package </span><span style="color:inherit;">– collects relevant data and logs from the system where detection occurred. The package will be stored locally on the endpoint side and can be downloaded using the retrieve file option in the Investigation section under the endpoint detail.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:rgb(234, 119, 4);"><span style="text-align:center;">*&nbsp;</span>Add to Sandbox</span><span style="color:inherit;"> – send the file that triggered the detection to Sandbox Analyzer.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:rgb(234, 119, 4);"><span style="text-align:center;">*&nbsp;</span>Kill Process</span><span style="color:inherit;"> – terminate the process that triggered the detection. You can choose to include parent process and child processes.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:rgb(234, 119, 4);"><span style="text-align:center;">*&nbsp;</span>Antimalware scan</span><span style="color:inherit;"> – run on-demand scan on the endpoint that triggered the detection. You can choose between a quick and full scan.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:rgb(234, 119, 4);"><span style="text-align:center;">*&nbsp;</span>Quarantine</span><span style="color:inherit;"> – quarantine the file or process that triggered the detection. You can choose to include parent process and files or child processes.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:rgb(234, 119, 4);"><span style="text-align:center;">*&nbsp;</span>Risk scan</span><span style="color:inherit;"> – run risk scan on the endpoint that triggered the detection.<br></span><img src="/GravityZone%20Platform%2003.jpg" style="width:639px !important;height:213px !important;max-width:100% !important;"><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">You can choose one or multiple actions and define their priority by dragging and dropping the automatic actions from top to bottom. This will determine the action execution order, with actions being executed sequentially one after another, without waiting for the results of the previous one. Actions will be executed during detection without any dependence on endpoint connectivity to GravityZone Cloud.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">For example, after reading our analysis about a coordinated ransomware attack on corporate networks made by the Cactus ransomware group, you can create your own custom detection rules based on the IoC provided in the article. By using C2 IP addresses, you can create a rule where, after detection, the compromised host will be isolated, an investigation package created, and antimalware and risk scans executed.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">All configurations are logged and available for review with full details in the User Activity section. All actions will be reported and displayed in GravityZone Incident section with complete details.</span><br></div>
<div style="color:inherit;text-align:left;"><div><span style="color:rgb(234, 119, 4);font-size:18px;">New Blocklist Rules</span><br></div>
</div><div style="color:inherit;text-align:left;"><span style="color:inherit;">Using GravityZone, you can block applications based on application control in the Content Control policy and block traffic based on the Firewall Policy. With an EDR subscription, you have the additional ability to block applications based on hash in the Blocklist section under Incidents.</span><br></div>
<div style="color:inherit;text-align:left;"><img src="/GravityZone%20Platform%2004.jpg" style="width:643.44px !important;height:173px !important;max-width:100% !important;"><br></div>
<div style="color:inherit;text-align:left;"> We have enhanced the Blocklist with the latest update by adding path-based application blocking and connection blocking. In addition to existing hash rules, you can now add blocks based on application paths. This feature works on Windows endpoints where both the Content Control and Application Blacklisting module are active within the Policy configuration. To configure new connection blocks with a deny action, the Firewall module must be installed and active on Windows endpoints. All the configuration changes are logged and available to review under the User Activity section. </div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">It is important to note that all Blocklist rules are applied before Policy settings such as Content Control or Firewall configuration. All endpoints meeting the requirements outlined in the previous paragraph will automatically begin applying these rules.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">You can also import local CSV files to easily add many rules at once or automate your task with the latest version of the API released for bulk rule creation.</span><br></div>
<div style="color:inherit;text-align:left;"><div><span style="font-size:18px;color:rgb(234, 119, 4);">Advanced Threat Control Enhancements</span><br></div>
</div><div style="color:inherit;text-align:left;"><span style="color:inherit;">Advanced Threat Control proactively and dynamically detects malicious behavior by continuously monitoring process activities in real-time.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">Sensitive Registry Protection, an existing component of ATC, has been enhanced to safeguard critical registry keys, including those associated with the Security Account Manager (SAM), from unauthorized access or exploitation via Windows Remote Registry Protocol (MS-RRP), which is used to remotely manage the Windows registry.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">To illustrate, let's imagine an unprotected machine with unauthorized access. The SAM registry stores hashed passwords for local user accounts. Attackers can use exploitation techniques like malicious registry key dumping to extract the SAM registry and then attempt to crack the hashed passwords. Armed with valid credentials, an attacker could try to connect to another remote machine using MS-RRP and retrieve its SAM keys. If ATC is active on the remote machine with the Kill Process action, it will terminate the process (svchost.exe) that attempts to access the registry.</span><br></div>
<div style="color:inherit;text-align:left;"><img src="/GravityZone%20Platform%2005.jpg" style="text-align:center;width:666.08px !important;height:405px !important;max-width:100% !important;"><br><span style="color:inherit;">You can configure either Kill Process or Report Only for each new or existing Policy under Antimalware &gt; On-Execute &gt; Advanced Threat Control configuration section.</span><br></div>
<div style="text-align:left;"><span style="font-size:18px;color:rgb(234, 119, 4);">New Sandbox Analyzer Submission Task</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">Sandbox Analyzer service analyzes suspicious files in depth by detonating payloads in a contained virtual environment hosted by Bitdefender, observing their behavior, reporting subtle system changes that indicate malicious intent, and providing actionable insight.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">With the latest release you can submit files to Sandbox Analyzer directly from Network section using Submit to Sandbox Analyzer Task.<br></span><img src="/GravityZone%20Platform%2006.jpg" style="width:663.65px !important;height:278px !important;max-width:100% !important;"><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">Specify the exact location of the file(s) you wish to detonate. You can select up to five files per attempt. For added control, you can choose to run specific commands to be executed when the detonation starts.<br></span><span style="color:inherit;"><img src="/GravityZone%20Platform%2007.jpg"></span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">All submission tasks are logged in the User Activity section with details such as who created the task, what paths were added, when it was created, and what commands (if any) were mentioned in the task. The sandbox analysis report is available only in the Sandbox Analyzer section.</span><br></div>
<div style="text-align:left;"><div><div><span style="font-size:18px;color:rgb(234, 119, 4);">Introducing the New Network Section in GravityZone</span><br></div>
</div></div><div style="color:inherit;text-align:left;"><span style="color:inherit;">Starting with the policy configuration redesign delivered last month, we are excited to introduce a new Network section in the GravityZone console interface. Once you enroll in the Early Access Program, you can find this redesigned section in the main GravityZone menu, labeled as EA Network. The previously used Network section will remain available to you during this transition period.</span><br></div>
<div style="color:inherit;text-align:left;"><img src="/GravityZone%20Platform%2008.jpg" style="width:680.77px !important;height:364px !important;max-width:100% !important;"><span style="color:inherit;"><br>With a new Network interface, you can efficiently monitor endpoint status, allocate resources, and resolve issues. This update features graphical elements such as icons representing companies, virtual and physical machines, containers as well as a redesigned tree view with new filters and search options. We have also created several default smart views based on specific filtering rules for device discovery.</span><br></div>
<div style="text-align:left;"><div><span style="font-size:18px;color:rgb(234, 119, 4);">Summary</span><br></div>
</div><div style="color:inherit;text-align:left;"><span style="color:inherit;">Bitdefender GravityZone platform stands out from the crowd, offering a one-stop solution for all your organization's security needs. As the digital landscape evolves, Bitdefender remains proactive, providing prevention, protection, detection, and response capabilities, ensuring the ongoing safety of organizations of all sizes worldwide.</span><br></div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">To learn more about the Bitdefender GravityZone platform, contact us for more information. You can also start a free trial by requesting a demo here.&nbsp;</span><br></div>
<div style="color:inherit;text-align:left;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><a href="https://forms.zohopublic.com/netmon/form/ContactUsNetMonInformationSystemsLtd1/formperma/wPk8L6y5DbNrdKFh0D9_CNZjwPkV6wvlkWOLAakl7nY" title="Request Demo" rel="">Request Demo</a></div>
</div></div></div><div style="color:inherit;text-align:left;"> Author: Grzegorz Nocoń, Technical Marketing Manager, Bitdefender </div>
<div style="color:inherit;text-align:left;"><span style="color:inherit;">Read More&nbsp;</span><br></div>
<div style="color:inherit;text-align:left;"><div style="color:inherit;"><span style="color:inherit;"><a href="https://www.bitdefender.com/blog/businessinsights/whats-new-in-gravityzone-platform-august-2024-v-653/" title="https://www.bitdefender.com/blog/businessinsights/whats-new-in-gravityzone-platform-august-2024-v-653/" rel="">https://www.bitdefender.com/blog/businessinsights/whats-new-in-gravityzone-platform-august-2024-v-653/</a></span><br></div>
</div><div style="color:inherit;text-align:left;"><span style="color:inherit;">#Bitdefender #Bitdefender GravityZone #cybersecurity #cybersecurity #Network Sensor #EDR #NetMon</span></div>
</div></div><div data-element-id="elm_gDI7vaCJQEml6FeRqdQWCA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 12 Aug 2024 04:17:00 +0000</pubDate></item></channel></rss>