5.7.2.14. `Ransomware detect`
screen
5.7.2.14.1. Introduction
The `Ransomware detect`
screen enables to :
Activate the engine and show its state
Set the engine sensitivity
Investigate on the alerts and the detection threshold
Define the list of files not to be analyzed and therefore consider them to be healthy
This screen is only accessible to members of the operator group.
5.7.2.14.2. Links associated
5.7.2.14.3. Screen description
After pressing the `Ransomware detect`
command on the `Detection Strategy\Threat intel`
menu, the `Ransomware detect`
screen is displayed.
For administrator group members, the following message is displayed: `Error 403:Insufficient permissions`
.
Part |
Function |
---|---|
|
Engine settings |
|
Session activity |
|
Files that are defined in the list of ignored IP addresses are considered healthy. |
5.7.2.14.4. Part `Settings`
of the screen `Ransomware detect`
This part is used to :
Activate the engine
Show its state
Set the engine sensitivity
Define the list of files not to be analyzed and therefore consider them to be healthy
Item |
Name |
Function |
---|---|---|
1 |
|
Includes all engine settings |
2 |
|
Engine Activation Zone |
3 |
|
This selector activates or deactivates the engine in the selected GCaps |
4 |
|
This field displays the selected GCaps (default = all) |
5 |
|
Engine sensitivity adjustment area |
7 |
|
Sensitivity slider enables to adjust the sensitivity threshold to raise an alert |
6 |
|
Indicates the current state : training state or running
In training state:
- The following message is displayed :
`The engine is accumulating data before training (x%)` .- The engine is trained with legitimate data corresponding to the specific traffic (for further information, see the Analysing the Ransomware detect alerts)
- If this is the first training, the engine does not trigger alerts. Otherwise alerts are triggered with the previous settings.
In Running state:
- The following message is displayed :
`The engine is running` - The engine raises alerts according to the sensitivity
|
8 |
|
Button to cancel current changes |
9 |
|
Button to save current changes |
Level |
Definition |
---|---|
|
Sensitivity 1: the detection threshold is higher than the optimum value defined by the engine training.
Generates fewer alerts, including fewer false positives
|
|
Sensitivity 2 |
|
Sensitivity 3: default value.
The detection threshold is at the optimal value defined by the engine training.-
|
|
Sensitivity 4 |
|
Sensitivity 5: The detection threshold is lower than the optimum value defined by the engine training.
Generates more alerts, including more false positives
|
For example, if the user sets the maximum sensitivity level (5), the engine will issue level 1,2,3,4 and 5 alerts
If the user sets the sensitivity level to 3 (default), the engine will issue level 1, 2 and 3 alerts
If the user sets the sensitivity level to 1 (the least sensitive), the engine will only issue level 1 alerts
Important
In order to use the Ransomware detect engine correctly, GCaps must have:
SMB logging enabled
- SMB stream-depth parameter set to 100MB minimum.The default value when pairing a GCap is only 10MB on some profiles, a notification is then issued.
5.7.2.14.5. Part `Investigation`
of the screen `Ransomware detect`
This part is used to investigate on the alerts and the detection threshold.
Item |
Name |
Function |
---|---|---|
1 |
|
Display information about the score of the detected samples |
2 |
|
Allow to find a sample after entered the session_ID |
3 |
|
Samples with a score above the current threshold are counted as alerts |
4 |
Examples of samples defined as alerts |
These samples have values higher than the current threshold |
5.7.2.14.6. Part `Ignore list`
of the screen `Ransomware detect`
This part is used to define the list of files not to be analyzed and therefore consider them to be healthy
Item |
Name |
Function |
---|---|---|
1 |
|
Window to create the IP addresses to ignore |
2 |
|
Field displaying the most frequent source IP addresses detected |
3 |
|
Button to add a source IP address to ignore |
4 |
|
Field listing the IP addresses to ignore
It is possible to specify a time range
|