Isolate Machines

One of the more immediate response/remediation actions you can take to respond to a MalOp is to isolate a machine. Isolation stops communication from an infected machine to the rest the network (except the relevant Detection server) to ensure that the machine does not spread the threat. Once you isolate a machine, it remains isolated until you either remove the machine from isolation or remove the machine from the server.

For details on managing isolation rules via the API, see the Machine Isolation Rules API Reference section of the Cybereason API reference.

Machine isolation video

The following video describes machine isolation in the Cybereason platform:

Isolate a machine

You perform machine isolation from the Malop details screen (for all associated machines) or Investigation screen (for individual machines).

Method

Details

From the Malop details screen

  1. From the Malop details screen for the MalOp whose associated machine(s) you want to isolate, click Isolate in the upper right corner.

  2. If the MalOp is associated with more than one machine, Cybereason prompts you to confirm that you want to isolate all associated machines.

From the Investigation screen

  1. Use the query builder to search for the machine you want to isolate. If you want to isolate a machine associated with a specific MalOp, you can find information about the machine in the Malop details screen of the associated MalOp.

  2. From the Investigation screen results grid, double-click the machine that you want to isolate.

  3. Click Isolate.

Note

The Isolate button only appears if the machine is currently online and connected to the Cybereason platform.

Stop isolation on a machine

When you no longer need a machine isolated, you can stop isolation from the Malop details screen (for all associated machines) or Investigation screen (for individual machines).

Method

Details

From the Malop details screen

From the Malop details screen for the MalOp whose associated machine(s) you want to isolate, click Stop isolating in the upper right corner.

From the Investigation screen

  1. Use the query builder to search for the machine on which you want to stop isolate. If you want to stop isolating a machine associated with a specific MalOp, you can find information about the machine in the Malop details screen of the associated MalOp.

  2. From the Investigation screen results grid, double-click the machine that you want to stop isolating.

  3. Click Stop isolating.

Machine isolation exception rules

Machine isolation exception rules allow you to define IP addresses and/or ports through which you can communicate with isolated machines. Machine isolation exception rules are useful when you want to allow IT staff from outside your environment to access isolated machines to conduct deeper investigations and perform remediation actions.

Note

Since isolated machines are completely cut off from communication with all systems except for the Cybereason platform, isolation can hamper investigation of the machine if not used correctly.

Using machine isolation exception rules, you can allow machine communication according to the following:

  • Specific IP address

  • IP range

  • One or more ports

When you create an exception rule, you must select the direction of communication affected by the exception. If you select Incoming, the selected port refers to the port on the isolated machine. If you select Outgoing, the selected port refers to the destination port on the remote machine (for example, a server that the isolated machine is connecting to). For example, you could define that incoming communication is allowed to isolated machines from IP address 31.166.153.170 on port 8443 of the isolated machines.

If your environment has sensor grouping enabled, you can also specify the groups to which the isolation exception applies. Assigning the rule to a specific group limits access to the machines in the group to admins or analysts who have permission to access the sensors included in the specified group. Other analysts and admins without permission to access the group will not be able to access the machine, even with the isolation exception rule defined in the Cybereason platform.

Define isolation exception rules

You define machine isolation exception rules in the Machine isolation exceptions tab in the Security profile screen.

Machine Isolation Exceptions

To define a machine isolation exception rule, follow these steps:

  1. In the Machine isolation exceptions tab, click Create exception.

  2. Select one of the following communication options:

    • Incoming: communication is allowed for data arriving to the port and/or address or range specified.

    • Outgoing: communication is allowed for data sent to the port and/or address or range specified.

  3. Define one or more of the following:

    • IP Address/Range: Users can define a specific IP address or an IP range, which will include all the IPs within the defined range. You specify the ranges in 3rd and 4th bytes (for example, 1.2.3-5.5-6).

    • Port(s): To define multiple ports, separate each port with a comma “,”

    Note

    You must choose at least one port or IP address.

  4. If your environment has sensor grouping enabled, assign the group assignment permissions. You set the isolation exception rule to Assign globally (for all groups) or Assign to a specific/multiple groups.

    Specify a group for a machine isolation exception rule

    If you select the option to assign to a group, ensure you select the groups to which to assign the rule.

  5. Optionally, add a description for the rule.

  6. Click Add exception.

The Cybereason platform validates that the port(s) and both ends of the IP ranges are valid, and updates the IP exception list. The Cybereason platform applies the exception on all isolated machines within approximately eight minutes. If an isolated machine was disconnected while an exception rule was created, updated, or deleted, the rule takes effect within approximately one minute after a machine re-connects to the Cybereason platform.

Isolation exception rules persist as long as they are defined in the Cybereason platform.