Several changes have been made to the Threat Detection Content in Live. For added detection you need to deploy/download and subscribe to the content via Live. For retired content, you must manually remove those items.
For detailed configuration procedures to setup RSA NetWitness Platform, see the Content Quick Start Guide.
Available Options:
"Overwrite Service": default value false
Default behavior is that if another parser has identified a session with service other than SSL, then this parser will not overwrite the service meta.
If this option is enabled, the parser identifies all sessions containing SSL as SSL even if a session has been identified by another parser as another service.
"Ports Only": default value false
Default behavior is port-agnostic: that is, the parser looks for all SSL/TLS sessions regardless of which ports a session uses. This allows identification of encrypted sessions on unexpected and non-standard ports.
If this option is enabled, the parser only searches for SSL/TLS sessions using the configured ports. Ports on other sessions will not be identified as SSL/TLS. This may improve performance, at a cost of possibly decreased visibility.
Note that a session on a configured port that is not SSL/TLS will still not be identified as SSL/TLS. In other words, the parser does not assume that all sessions on configured ports are SSL/TLS.
Read more about https://community.rsa.com/community/products/netwitness/blog/2016/08/30/ssl-and-netwitness
More information about Packet Parsers: https://community.rsa.com/docs/DOC-43422
This rule addresses MITRE’s ATT&CK™ tactic – Persistence; Technique - Registry Run Keys / Startup Folder
This rule addresses MITRE’s ATT&CK™ tactic – Execution, Defense Evasion; Technique - rundll32
This rule addresses MITRE’s ATT&CK™ tactic – Discovery, Command and Control; Techniques - System Network Configuration Discovery, Commonly Used Port, Standard Application Layer Protocol
For more information about NetWitness 11.4 New Features and Alerting: ESA Rule Types
Read more about https://community.rsa.com/community/products/netwitness/blog/2018/05/02/lua-mapping-mac-to-vendor-logsnetflow-and-endpoint
More content has been tagged with MITRE ATT&CK™ metadata for better coverage and improve detection.
For detailed information about MITRE ATT&CK™:
RSA Threat Content mapping with MITRE ATT&CK™
We strive to provide timely and accurate detection of threats as well as traits that can help analysts hunt through network and log data. Occasionally this means retiring content that provides little-to-no value.
List of Discontinued Content
For additional documentation, downloads, and more, visit the RSA NetWitness Platform page on RSA Link.
RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the Product Version Life Cycle for additional details.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.