Trellix-Defined Access Protection Rules Flashcards

1
Q

Browsers launching files from the Downloaded Program Files folder

A

Prevents software from installing through the web browser

Benefits: Prevents adware and spyware from installing and running executables from the downloads folder

Risks: Might block installation of legitimate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Changing any file extension registrations

A

Protects the registry keys under HKEY_CLASSES_ROOT where file extensions are registered.

Benefits: Prevents malware from changing the file extension registrations to allow malware to execute silently

Risks: Might block installation of legitimate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Changing user rights policies

A

Protects registry values that contain windows security information.

Benefit: Prevents worms from changing accounts that have administrator rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Creating new executable files in the Program Files folder

A

Benefit: Prevents adware and spyware from creating new .EXE and .DLL files and installing new executable files in the Program Files folder.

Risk: might block installation of legitimate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Creating new executable files in the Windows folder

A

Prevents the creation of files from any process, not just from over the network

Benefits: Prevents the creation of .EXE and .DLL files in the Windows folder

Risks: Might block legitimate software from creating these files in the Windows folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disabling Registry Editor and Task Manager

A

Protects Windows registry entries, preventing disabling the registry editor and Task Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Doppelganging attacks on processes

A

Prevents “Process Doppelganging” attacks from changing processes

Benefits: Prevents malware from loading and executing arbitrary code in the context of legitimate or trusted processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Executing Mimikatz malware

A

prevents executables named mimikatz from running, protecting against mimikatx malware by preventing it from executing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Executing Scripts by Windows script host (CScript.exe or Wscript.exe) from common user folders

A

Prevents the Windows scripting host from running VBScript and JavaScript scripts in any folder with “temp” in the folder name

Benefit: Protects against many trojans and questionable web installation mechanisms used by adware and spyware applicaitons

Risks: Might block legitimate scripts and third-party applications from being installed or run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Executing Windows Subsystem for Linux

A

Prevents an administrator user from running the Windows Subsystem for Linux

Benefit: Prevents malware designed for Linux Systems from attacking Windows computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hijacking .EXE or other executable extensions

A

Protects .EXE, .BAT, and other executable registry keys under HKEY_CLASSES_ROOT

Benefit: Prevents malware from changing registry keys to run the virus when another executable runs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Installing Browser Helper Objects or Shell Extensions

A

Prevents Browser Helper Objects from installing on the host computer(doesn’t prevent installed Browser Helper Objects from working)

Benefits: Prevents adware, spyware, and trojans from installing on systems

Risks: Might block legitimate applications from installing Browser Helper Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Installing new CLSIDs, APPIDs, and TYPELIBs

A

Prevents the installation or registration of new COM servers.

Benefits: Protects against adware and spyware programs that install themselves as a COM add-on internet explorer or Microsoft Office applications

Risk: Might block installation of some common applications, like Adobe Flash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Modifying core Windows processes

A

Prevents files from being created or executed with most commonly spoofed names. (excludes authentic windows files)

Prevents viruses and Trojans from running with the name of a Windows process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Modifying Internet Explorer Settings

A

Block processes from changing settings in Internet Explorer

Prevents start-page trojans, adware, and spyware from changing browser settings, such as changing the start page or installing favorites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Modifying network settings

A
17
Q

Registering of programs to autorun

A
18
Q

Remotely accessing local files or folders

A
19
Q

Remotely creating autorun files

A
20
Q

Remotely creating or modifying files or folders

A
21
Q

Remotely creating or modifying Portable Executable, .INI, .PIF file types, and core system locations

A
22
Q

Running files from common user folders

A