fwiw, MT
@Bot posted this reply in another thread:
Wazuh can be integrated with DeepInstinct, and it could complement its capabilities. Wazuh specializes in threat detection and response, file integrity monitoring, log analysis, and compliance. On the other hand, DeepInstinct is an advanced anti-malware software that uses deep learning to detect and prevent cyber threats. By integrating Wazuh and DeepInstinct, organizations can achieve a comprehensive security solution that includes both threat prevention and detection, with real-time monitoring and response capabilities. This can provide an additional layer of security and help organizations to identify and respond to advanced threats quickly.
An in-person IT tech I know mentioned Wazuh to me | I am not reccomending it, as I have zero experience with it. Wazuh was new to me yesterday. I've only looked at its webpage.
Wazuh is a free and open source security platform that unifies XDR and SIEM protection for endpoints and cloud workloads.
wazuh.com
fwiw2 on my Di VM I did the simplest "test" last night to get the feel of how Di responds. went to eicar website and tried to DL eicar file1 and the page was blocked by MS Defender SmartScreen (recall that Di is integrated with WSC, Defender off), ditto eicar file2, when I clicked on eicar file3 (eicar_com.zip) SmartScreen did not alert BUT Di popped up Threat Prevented Deep Static identified it as a trojan. Di block was immediate.
A peaceful Sunday, enjoying Di, going thru the admin guide (AG) 3.3 Dashboard. Di Behavior prevented a threat the other day as I opened an app Di had not seen me run before with a Reflective DLL Injection violation. I know this app to be good, and figured out how to add to allow list. what is (can be) tricky is some sub-windows have dropdowns not obvious (to me) until you do it. Main dashboard, select Prevention Events, opens new window listing events, each event is date stamped, given a unique ID number, double click that event, read all about it, upper right corner blue [Action] button with a few choices, I used "add process to allow list" this opens another window, where you select device (I have 2 now), select policy, and then the tricky part, | Select Behaviors and you see All + 4 other options, none of which matched my blocked event, until I realized MORE behaviors were listed as scrolling dropdowns. Then found the exact behavior: Reflective DLL Injection, [add] and that app now runs. Di nice interface IMO, obvious screen, to deeper screen, to deepest screen, to deeper than deepest, until you get to where you need to go, Granular nice, or I like it.
(only 280 pages to go -- but 3x redundant as it talks about windows, macOS and linux in same AG)(only putting Di on win10 for now)
A peaceful Sunday, enjoying Di, going thru the admin guide (AG) 3.3 Dashboard. Di Behavior prevented a threat the other day as I opened an app Di had not seen me run before with a Reflective DLL Injection violation.
Update: to add process to allow list progress report fwiw. Several days ago, CyF support emailed me howto allow Behavioral Analysis block, I think I understood and followed exactly..., but the problematic app I want to run is still blocked with the same Reflective DLL injection block.
The good news, the problematic app is not something I have to run. So it's a good project to figure this out, allowing this threat_prevented_behavioral_block. I was 99%+ sure I added it to allow list correctly, that is until it didn't run again...
Most likely user missed a nuance