Isolate Machines
One of the more immediate response/remediation actions you can take to respond to a MalOp is to isolate a machine. Isolation stops communication from an infected machine to the rest the network (except the relevant Detection server) to ensure that the machine does not spread the threat. Once you isolate a machine, it remains isolated until you either remove the machine from isolation or remove the machine from the server.
In this topic:
For details on managing isolation rules via the API, see the Machine Isolation Rules API Reference section of the Cybereason API reference.
Machine isolation video
The following video describes machine isolation in the Cybereason platform:
Isolate a machine
You perform machine isolation from the Malop details screen (for all associated machines) or Investigation screen (for individual machines).
Method |
Details |
---|---|
From the Malop details screen |
|
From the Investigation screen |
Note The Isolate button only appears if the machine is currently online and connected to the Cybereason platform. |
Stop isolation on a machine
When you no longer need a machine isolated, you can stop isolation from the Malop details screen (for all associated machines) or Investigation screen (for individual machines).
Method |
Details |
---|---|
From the Malop details screen |
From the Malop details screen for the MalOp whose associated machine(s) you want to isolate, click Stop isolating in the upper right corner. |
From the Investigation screen |
|
Machine isolation exception rules
Machine isolation exception rules allow you to define IP addresses and/or ports through which you can communicate with isolated machines. Machine isolation exception rules are useful when you want to allow IT staff from outside your environment to access isolated machines to conduct deeper investigations and perform remediation actions.
Note
Since isolated machines are completely cut off from communication with all systems except for the Cybereason platform, isolation can hamper investigation of the machine if not used correctly.
Using machine isolation exception rules, you can allow machine communication according to the following:
Specific IP address
IP range
One or more ports
When you create an exception rule, you must select the direction of communication affected by the exception. If you select Incoming, the selected port refers to the port on the isolated machine. If you select Outgoing, the selected port refers to the destination port on the remote machine (for example, a server that the isolated machine is connecting to). For example, you could define that incoming communication is allowed to isolated machines from IP address 31.166.153.170 on port 8443 of the isolated machines.
If your environment has sensor grouping enabled, you can also specify the groups to which the isolation exception applies. Assigning the rule to a specific group limits access to the machines in the group to admins or analysts who have permission to access the sensors included in the specified group. Other analysts and admins without permission to access the group will not be able to access the machine, even with the isolation exception rule defined in the Cybereason platform.
Define isolation exception rules
You define machine isolation exception rules in the Machine isolation exceptions tab in the Security profile screen.
To define a machine isolation exception rule, follow these steps:
In the Machine isolation exceptions tab, click Create exception.
Select one of the following communication options:
Incoming: communication is allowed for data arriving to the port and/or address or range specified.
Outgoing: communication is allowed for data sent to the port and/or address or range specified.
Define one or more of the following:
IP Address/Range: Users can define a specific IP address or an IP range, which will include all the IPs within the defined range. You specify the ranges in 3rd and 4th bytes (for example, 1.2.3-5.5-6).
Port(s): To define multiple ports, separate each port with a comma “,”
Note
You must choose at least one port or IP address.
If your environment has sensor grouping enabled, assign the group assignment permissions. You set the isolation exception rule to Assign globally (for all groups) or Assign to a specific/multiple groups.
If you select the option to assign to a group, ensure you select the groups to which to assign the rule.
Optionally, add a description for the rule.
Click Add exception.
The Cybereason platform validates that the port(s) and both ends of the IP ranges are valid, and updates the IP exception list. The Cybereason platform applies the exception on all isolated machines within approximately eight minutes. If an isolated machine was disconnected while an exception rule was created, updated, or deleted, the rule takes effect within approximately one minute after a machine re-connects to the Cybereason platform.
Isolation exception rules persist as long as they are defined in the Cybereason platform.