Alert for each time a usb device is plugged

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Alert for each time a usb device is plugged

L0 Member

Hello,

Is there any way to set up an alert for each time a USB device is plugged into a host?
Even if it's not malicious.

13 REPLIES 13

L3 Networker

Hi,

 

Are you looking for USB device plugin alert or alert on activity such as File operation, execution operation via removable media?

 

USB Device plugin alert may not be possible but definitely you should be able to create a BIOC rule for USB/RemovableMedia file operation, process operation activity with a low severity priority which will only trigger an alert in Alerts Table but not create an Incident.

 

Will be keen to know if someone has other idea.

Kind Regards
KS

L2 Linker

Hi JoaoSantos20,

 

In the Restrictions Profile you have the option to configure notifications for Removable Media for file executions launched from external drives attached to endpoints in your network. To configure:

  1. From Cortex XDR, select Endpoints > Policy Management > Prevention Profiles > + New Profile.
  2. Select the OS to which the profile applies and Restrictions as the profile type.
  3. Click Next.
  4. Enter a Profile Name to identify the profile and Description
  5. Uncheck Use Default
  6. Select which option best fits your use case
    Notify—Allow the file to execute but notify the user that the file is attempting to run from a suspicious location. The Cortex XDR agent also reports the event to Cortex XDR.
    Report—Allow the file to execute but report it to Cortex XDR.

**You may add files or folders to an allow list or block list as well.

jtalton_4-1648588304362.png 

Save and then apply the Restrictions profile to the Security Profiles to Endpoints.

If you already have a Restrictions Profile configured, you may edit and follow steps 5 - 8

 

You may also create an alert via a BIOC rule from an XQL Query for event logs for Windows and Linux system. For example, an XQL query for the Windows event ID 6416: A new external device was recognized by the system. To build the BIOC rule query through a specific entity:

 

Navigate to Detection Rules > BIOC > + Add BIOC > Select the  Event Log Icon

Enter EVENT_ID = 6416 (optional to enter other parameters), Save

jtalton_3-1648588232947.png

 

Select the Type, Severity, Optional select a MITRE Technique or Tactic to associate with the event, such as Technique - T1092 Removal Media and Tactic - TA0010 - Exfiltration. Enter a comment for tracking, then OK

jtalton_2-1648588193698.png

 

The rule will be displayed in the BIOC Rules table. Right-Click on the Rule to add it to the appropriate Restrictions Profile shown in the sub menu for the endpoints you would like monitored. 

jtalton_1-1648588139581.png

 

jtalton_0-1648588087333.png

 

 

 

Reference

Add a New Restrictions Security Profile (paloaltonetworks.com)

Create a BIOC Rule (paloaltonetworks.com)

Hi @jtalton 

Pretty cool way of monitoring of removable media activity, i think the only thing which will be required from the endpoint side will be enable event logging for Removable media?

 

Kind Regards
KS

Isnt it enabled in windows by default ? 

Really good and creative solution from Jtalton. 

That deserves likes, isnt it ? 

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!