Skip to main content

File System Threats

The following threats are monitored for File System:

High Risk Permissions

High Risk Permissions are those which grant unrestricted access to a file or folder. When high risk permissions are added or increased on a folder or file, a threat is created.

High Risk Permissions
DefinitionThe High Risk Permissions threat creates a threat when a high risk trustee (Domain Users, Anonymous Logon, Authenticated Users, and Everyone) is added to the ACL on a folder or file. These permissions are high risk because they grant unrestricted access to a resource.
ExampleDomain Users are given Read access to a folder. Everyone is given Full Control on a folder which already had Domain Users with Read Access.
TriggerA threat is created when a user adds a high risk trustee (defined above) to a folder or file, which increases the amount of open access. This threat is updated with the total number of folders or files affected due to the inherited permissions.

NTDS.dit File Access

Unauthorized file system interaction with the NTDS.dit file stored on Active Directory Domain Controllers will be detected as a threat.

NTDS.dit File Access
DefinitionBy accessing the NTDS.dit file, Active Directory's database, an attacker can extract a copy of every user's password hash and subsequently act as any user in the domain. Threat Manager audits all activity related to the NTDS file and VSS copy to notify when an attacker could be accessing the information for an offline attack.
TriggerPerform File or VSS activity against the NTDS.DIT file.

Ransomware

When a user creates or renames at least 100 files with a known ransomware extension or a name that resembles common ransom notes, a threat is created for each rename action.

Ransomware
DefinitionDetects file activity that involves a file with a known ransomware extension or a file with a name that resembles common ransom notes.
ExampleA user created a ".locky" file, and created and renamed more than 100 files with common ransomware extensions.
TriggerUsing a pre-defined library of known ransomware extensions, Threat Manager alerts on file create/rename activity with known extensions.

Unusual Processes

If a user runs a process on a monitored server for the first time, a threat is created.

Unusual Processes
DefinitionThe Unusual Processes threat detects if previously unseen processes are launched on critical file servers.
ExampleA user launches a "python.exe" process that has never been launched by anyone else in the environment.
TriggerThreat Manager records the name of the processes associated with file access activities. Over a learning period (e.g. 30 days), Threat Manager profiles which processes are normal by aggregating data across all file servers. After that, if a new process is identified that has not been seen on any other file servers, a threat will be created. NOTE: This threat is only applicable on Windows file servers when the activity is performed locally.