Vulnerability ProtectionDeep Security enables you to create tags that you can use to identify and sort events. For example, you might use tags to separate events that are benign from those that require further investigation. You can use tags to create customized dashboards and reports.
Although you can use event tagging for a variety of purposes, it was designed to ease the burden of event management. After you have analyzed an event and determined that it is benign, you can look through the Event logs of the computer (and any other similarly configured and tasked computers) to find similar events and apply the same label to them, eliminating the need to analyze each event individually.
These are the ways that you can perform tagging:
To manually tag an event:
Looking at the Events list, you can see that the event has now been tagged.
Vulnerability ProtectionDeep Security Manager enables you to define rules that apply the same tag to similar events automatically. To view existing saved auto-tagging rules, click Auto-Tagging... in the menu bar on any Events page. You can run saved rules manually from this page.
To create an auto-tagging rule:
Looking at the Events list, you can see that your original event and all similar events have been tagged.
Once an auto-tagging Rule is created, you can assign it a Precedence value. If the auto-tagging rule has been configured to run on future events, the rule's precedence determines the order in which all auto-tagging rules are applied to incoming events. For example, you can have a rule with a precedence value of "1" that tags all "User Signed In" events as "suspicious", and a rule with a precedence value of "2" that removes the "suspicious" tag from all "User Signed In" events where the Target (User) is you. The precedence "1" rule will run first and apply the "suspicious" tag to all "User Signed In" events. The precedence "2" rule will run afterwards and remove the "suspicious" tag from all "User Signed In" events where the User was you. This will result in a "suspicious" tag being applied to all future "User Signed In" events where the User is not you.
To set the precedence for an auto-tagging rule:
The Integrity Monitoring module allows you to monitor system components and associated attributes on a computer for changes. ("Changes" include creation and deletion as well as edits.) Among the components that you can monitor for changes are files, directories, groups, installed software, listening ports, processes, registry keys, and so on.
Trusted Source Event Tagging is designed to reduce the number of events that need to be analyzed by automatically identifying events associated with authorized changes.
In addition to auto-tagging similar events, the Integrity Monitoring module allows you to tag events based on their similarity to events and data found on Trusted Sources. A Trusted Source can be either:
A Trusted Computer is a computer that will be used as a "model" computer that you know will only generate benign or harmless events. A "target" computer is a computer that you are monitoring for unauthorized or unexpected changes. The auto-tagging rule examines events on target computers and compares them to events from the trusted computer. If any events match, they are tagged with the tag defined in the auto-tagging rule.
You can establish auto-tagging rules that compare events on protected computers to events on a Trusted Computer. For example, a planned rollout of a patch can be applied to the Trusted Computer. The events associated with the application of the patch can be tagged as "Patch X". Similar events raised on other systems can be auto-tagged and identified as acceptable changes and filtered out to reduce the number of events that need to be evaluated.
Integrity Monitoring events contain information about transitions from one state to another. In other words, events contain before and after information. When comparing events, the auto-tagging engine will look for matching before and after states; if the two events share the same before and after states, the events are judged to be a match and a tag is applied to the second event. This also applies to creation and deletion events.
To tag events based on a Local Trusted Computer:
The Certified Safe Software Service is a whitelist of known-good file signatures maintained by Trend Micro. This type of Trusted Source tagging will monitor target computers for file-related Integrity Monitoring events. When an event has been recorded, the file's signature (after the change) is compared to Trend Micro's list of known good file signatures. If a match is found, the event is tagged.
To tag events based on the Trend Micro Certified Safe Software Service:
The Trusted Common Baseline method compares events within a group of computers. A group of computers is identified and a common baseline is generated based on the files and system states targeted by the Integrity Monitoring Rules in effect on the computers in the group. When an Integrity Monitoring event occurs on a computer within the group, the signature of the file after the change is compared to the common baseline. If the file's new signature has a match elsewhere in the common baseline, a tag is applied to the event. In Trusted Computer method, the before and after states of an Integrity Monitoring event are compared, but in the Trusted Common Baseline method, only the after state is compared.
To tag events based on a Trusted Common Baseline: