Group Policy Management

Genian Insights E provides group-specific event collection, detection, response and agent policy settings. To add a new policy, you can create a new policy group through the Add Policy button in Policy > Group Policy Management.

Default

All Endpoints connecting to Genian Insights E servers are initially subject to DefaultPolicy. Policy consists of Policy for Collection, Detection, Response, Agent Settings, and Advanced Settings. The policy group applied by the agent can be changed through Policy Settings in Management, Groups.

collect

Events to be collected

Item collection event
Basic Collect important events such as process execution, execution/document/compressed file creation, etc.
Designation Collection of selected items among file, module, network, and registry events
All Collect all collectable events

file collection list

Policy Description
Collect the list of executables Collect a list of executable files. The list of collected files can be checked in the FileList index.
Index specified file list The file information defined in the 'designated extension' is indexed and stored on the PC.
file crawling Collect file information when PC is idle

Document/Compressed File: Collects document/compressed file information by checking the signature of all files.
Specified file: Collects file information defined in 'specified extension'.
Quick Collection: Aggressive use of System resources to gather information quickly.
Executable File: Collects the list of executables by checking the signatures of all files.
Collect lock screen: Crawl while on lock screen.
Time to wait for action: Starts crawling if there is no user input during Settings time.
Crawling Run cycle: Sets the cycle to rerun after crawling is completed.
Exception Path Setting: Sets the file crawl exception path.

Collect Windows Events (ETW)

Windows Event provides various shutdown events that are important for security. Insights E provides a function that allows users to collect and search for window events when they register a desired window event.

Policy Settings
windowsEvent Collection List Collection of event information recorded in Windows Event Viewer, XBA linkage Settings
Collect description Collect event data in natural language form
Collect eventdata Collect event data in json format

The set window event is saved in the winevt index and can be searched in integrated search.

Detect

Detection engine

Engine Description
Indicators of Compromise (IOC) When detecting known threats such as the minimum confidence level of 10%, IOC, YARA, etc., the Settings function is provided to detect only when the confidence level is higher than the set confidence level.
Machine Learning (ML) It applies machine learning detection to files sent by the agent and provides detection information in the Discovery and Endpoints detailed menus when detecting threats.
Abnormal behavior (XBA) XBA Rule Sets Settings feature.

Response

Warning

If the agent distribution method is single version, NAC linkage is not supported.

The corresponding settings are as follows.

Policy Settings
Response to known malware Response when detecting dangerous processes registered in YARA and IOC DB Settings
NAC Interworking Tags to be assigned to the node when the agent detects Threats Settings
Response to unknown malware Response Settings in case of detection by machine learning
Malicious IP Response when a connection is detected with a malicious IP registered in the IOC DB Settings

You can set the corresponding policy settings according to the policy, such as displaying agent notifications, forcibly ending processes, and deleting files.

Agent

Default Settings

Policy Settings
Connection Server IP In case of multi-server configuration, enter the server IP or domain from which the agent will connect and download the policy for server load balancing.
User notification pop-up Whether or not to display a notification pop-up on Endpoints when Management responds to Force process termination or File deletion after malware detection Settings
Display tray icon show agent tray icon
(Disabled for NAC and agent icon integration)
Display Notification message Write an alarm message text that occurs in Endpoints when network isolation and release
Quarantine Message: The text in the pop-up window displayed in Endpoints when the user performs the Network Quarantine command to Endpoints in the Web Console.
Release Message: The text of the popup displayed in Endpoints when the user performs the command to disable Network Quarantine on Endpoints from the Web Console.
Allowed IPs IP settings to allow for network isolation
(Genian NAC and Genian Insights E server IP can communicate without separate settings)

Block network access

Policy Description
Network Block IP and Port Enter the IP and Port to block access regardless of the network isolation policy. (TCP port)
Servers associated with Genian Insights E server operations are not blocked.

Backup

Policy Description
Windows VSS Backup Backup all hard disk files using Windows VSS in preparation for ransomware attack.
To prevent snapshots from being deleted by ransomware when using the VSS function, you need to Policy > XBA Rule Management > XBA Rule Sets > Default screen and set the 'Auto Response' setting of the "Document Extension Rename Threshold Exceeded" and "delete ShadowCopy" Rules.

Etc

Policy Description
Using API Hooking Hooking the API to monitor various events.
Conflict with other software may occur, so it needs to be applied after stability test, and PC reboot is required when Settings ON/OFF.