Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Publisher | CyberArk Support |
| Support Tier | Partner |
| Support Link | https://www.cyberark.com/services-support/technical-support-contact/ |
| Categories | domains |
| Version | 3.0.1 |
| Author | CyberArk Business Development - business_development@cyberark.com |
| First Published | 2022-04-10 |
| Solution Folder | CyberArkEPM |
Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks.
This solution provides 1 data connector(s):
🔶 CLv1: This connector ingests into a table that uses the legacy Custom Log V1 schema format with type-suffixed column names (e.g.
_s,_d,_b,_t,_g). Note: identification is based on column name suffixes which are also permitted in CLv2, so this classification may not always be accurate.
This solution uses 1 table(s):
| Table | Used By Connectors | Used By Content |
|---|---|---|
CyberArkEPM_CL 🔶 |
CyberArkEPM | Analytics, Hunting, Workbooks |
🔶 CLv1: This table uses the legacy Custom Log V1 schema format with type-suffixed column names (e.g.
_s,_d,_b,_t,_g). Note: identification is based on column name suffixes which are also permitted in CLv2, so this classification may not always be accurate.
This solution includes 22 content item(s):
| Content Type | Count |
|---|---|
| Analytic Rules | 10 |
| Hunting Queries | 10 |
| Workbooks | 1 |
| Parsers | 1 |
| Name | Severity | Tactics | Tables Used |
|---|---|---|---|
| CyberArkEPM - Attack attempt not blocked | High | Execution | CyberArkEPM_CL |
| CyberArkEPM - MSBuild usage as LOLBin | Medium | DefenseEvasion | CyberArkEPM_CL |
| CyberArkEPM - Multiple attack types | High | Execution | CyberArkEPM_CL |
| CyberArkEPM - Possible execution of Powershell Empire | High | Execution | CyberArkEPM_CL |
| CyberArkEPM - Process started from different locations | Medium | Execution, DefenseEvasion | CyberArkEPM_CL |
| CyberArkEPM - Renamed Windows binary | High | Execution, DefenseEvasion | CyberArkEPM_CL |
| CyberArkEPM - Uncommon Windows process started from System folder | Medium | Execution, DefenseEvasion | CyberArkEPM_CL |
| CyberArkEPM - Uncommon process Internet access | High | Execution, DefenseEvasion, CommandAndControl | CyberArkEPM_CL |
| CyberArkEPM - Unexpected executable extension | Medium | Execution, DefenseEvasion | CyberArkEPM_CL |
| CyberArkEPM - Unexpected executable location | Medium | Execution, DefenseEvasion | CyberArkEPM_CL |
| Name | Tactics | Tables Used |
|---|---|---|
| CyberArkEPM - Elevation requests | Execution, PrivilegeEscalation | CyberArkEPM_CL |
| CyberArkEPM - Powershell downloads | Execution | CyberArkEPM_CL |
| CyberArkEPM - Powershell scripts execution parameters | Execution | CyberArkEPM_CL |
| CyberArkEPM - Process hash changed | DefenseEvasion | CyberArkEPM_CL |
| CyberArkEPM - Processes run as admin | Execution, PrivilegeEscalation | CyberArkEPM_CL |
| CyberArkEPM - Processes with Internet access attempts | CommandAndControl | CyberArkEPM_CL |
| CyberArkEPM - Rare process run by users | Execution | CyberArkEPM_CL |
| CyberArkEPM - Rare process vendors | Execution | CyberArkEPM_CL |
| CyberArkEPM - Scripts executed on hosts | Execution | CyberArkEPM_CL |
| CyberArkEPM - Suspicious activity attempts | Execution | CyberArkEPM_CL |
| Name | Tables Used |
|---|---|
| CyberArkEPM | CyberArkEPM_CL |
| Name | Description | Tables Used |
|---|---|---|
| CyberArkEPM | - | CyberArkEPM_CL (read) |
| Version | Date Modified (DD-MM-YYYY) | Change History |
|---|---|---|
| 3.0.0 | 27-07-2023 | Updated solution to fix deployment validations |
| 3.0.1 | 28-04-2025 | Updated deployment instructions to use Python 3.10 version |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊