Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support
Search this website
Menu Close
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support

SanerNow CyberHygiene Platform

  • Platform Function Guides
  • Getting Started with SanerNow
  • How does SanerNow’s deployment architecture work?
  • Pre-requisites for SanerNow Deployment

Products

SanerNow AVM
  • What’s New in SanerNow?
  • Product User Guides
  • Overview of SanerNow Advanced Vulnerability Management
Vulnerability Management
  • SanerNow Vulnerability Management User Guide
Patch Management
  • SanerNow Patch Management User Guide
Compliance Management
  • SanerNow Compliance Management User Guide
Asset Exposure
  • SanerNow Asset Exposure User Guide
Endpoint Management
  • SanerNow Endpoint Management User Guide
Posture Anomaly Management
  • Data Points IT teams can Fetch from SanerNow Continuous Posture Anomaly Management
  • Posture Anomaly Computation Rules
  • SanerNow Continuous Posture Anomaly Management Tool Product Guide

Release Notes

  • Release Notes SanerNow 5.3.1
  • Release Notes SanerNow 5.3
  • Release Notes SanerNow 5.2
  • Release Notes SanerNow 5.1
  • Release Notes SanerNow 5.0
  • Release Notes SanerNow 4.8.0.0
  • Release Notes SanerNow 4.7.0.0
  • Release Notes SanerNow 4.6.0.0
  • Release Notes SanerNow 4.5.0.0
  • Release Notes SanerNow 4.4.0.0
  • Release Notes SanerNow 4.3.0.0
  • Release Notes SanerNow 4.2.2.1
  • Release Notes SanerNow 4.2.2.0
  • Release Notes SanerNow 4.2.1.0
  • Release Notes SanerNow 4.2.0.0
  • Release Notes SanerNow 4.1.1.0
  • Release Notes SanerNow 4.0.0.5

FAQs

  • Technical FAQs

Security Intelligence

  • List of IoA (Indicators of Attack) covered in SanerNow
  • List of Vulnerability to Exploit/Malware Mapping covered in SanerNow
  • Compliance Benchmark Coverage
  • Application and OS Remediation Coverage
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
  • Security Content Statistics
  • Overview of Security Content and Intelligence

Supported OSs and Platforms

  • Supported Third-party Applications for Patching
  • Operating Systems and Platforms Supported

How Tos

General
  • How to enable SSO authentication policy in SanerNow?
  • How to designate saner agent to perform network scan?
  • How to create new mail settings in SanerNow?
  • How to Co-Brand with your logo?
  • How to fetch the details of the mandatory fields from the Okta account?
  • How to create MFA policy for Okta?
  • How to fetch the details of the mandatory fields from the PingID account?
  • How to create MFA policy for PingID?
  • How to fetch the details of the mandatory fields from the PingOne account?
  • How to create MFA policy for PingOne?
  • How to download and install Saner agent in Mac?
  • How to download and install Saner agent in Linux?
  • How to download and install the Saner agent in Windows?
  • How to update the expiry date of an existing subscription?
  • How to manage users and their preferences using role-based access?
  • How to create a new user in SanerNow?
  • How to onboard a new organization?
  • How to uninstall the Saner agent through SecPod Saner deployer?
  • How to deploy the Saner agent through SecPod Saner deployer?
  • How to install a Saner agent through the command line?
  • How to uninstall the Saner agent through command line?
  • How to create a new account in SanerNow?
  • How to sign-up with SanerNow?
Vulnerability Management
  • How to remediate vulnerabilities from vulnerability management dashboard?
  • How to manage excluded vulnerabilities in SanerNow?
  • How to exclude vulnerabilities in SanerNow VM tool
  • How to automate and schedule vulnerability scans?
Patch Management
  • How to manage excluded patches in SanerNow?
  • How to exclude patches in SanerNow PM tool
  • How to automate patch management in SanerNow?
  • How to roll back patches in SanerNow?
  • How to fix firmware in SanerNow?
  • How to apply missing patches in SanerNow?
  • How to check the status of patching activity?
  • How to apply the most critical patches in SanerNow?
Compliance Management
  • How to run a compliance scan?
  • How to custom create a security policy?
  • How to align with PCI security compliance management?
  • How to align with NIST 800-171 security compliance management?
  • How to align with NIST 800-53 security compliance management?
  • How to align with HIPAA security compliance management?
Asset Exposure
  • How to run an asset scan?
  • How to manage asset licenses?
  • How to blacklist and whitelist applications in SanerNow?
Endpoint Management
  • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
  • How to collect operating systems information in Windows?
  • How to investigate disks running out of space (<100 MB) in Windows systems?
  • How to collect and investigate disk information on Windows systems?
  • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
  • How to check the status of Windows Update Server (WSUS/SCCM)?
  • How to collect all software patches that are hidden in the Windows Update server?
  • How to collect all installed patches in Windows systems?
  • How to collect all the important missing patches in Windows systems?
  • How to collect mounted disk information on Linux systems?
  • How to check wireless signal quality in Linux systems?
  • How to check wireless security in Linux systems?
  • How to check all firewall policies on Linux systems?
  • How to collect DNS information on Linux systems?
  • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
  • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
  • How to check wireless signal quality in Windows systems?
  • How to check wireless security in Windows systems?
  • How to collect all open ports in Windows systems?
  • How to collect all network interfaces in Windows systems?
  • How to investigate DNS cache on Windows systems?
  • How to check all firewall policies on Windows systems?
  • How to collect DNS information on Windows systems?
  • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
  • How to collect all the applications with an unknown publisher in Mac systems?
  • How to collect environment variables set in all operating systems?
  • How to collect all families of operating systems such as Windows, Unix, and macOS?
  • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
  • How to collect all software licenses in Mac systems?
  • How to collect all the applications with an unknown publisher in Windows systems?
  • How to collect a list of applications that are started when you boot your computer?
  • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
  • How to collect all software licenses in Windows systems?
  • How to collect all the applications with an unknown publisher in Linux systems?
  • How to perform system tuning?
  • How to enable/disable devices in SanerNow?
  • How to block blacklisted applications in SanerNow?
  • How to delete and quarantine a file?
  • How to deploy software in SanerNow?
  • How to enable and disable firewall settings in SanerNow?
  • How to start and stop the processes in SanerNow?
Continuous Posture Anomaly Management
  • How to create new response in PA tool?
  • How to build your own detection and response in PA tool?
  • How to whitelist an entire PA ID?
  • How to configure Posture Anomaly tool for custom detection?
  • How to fix Anomalies from PA dashboard?
  • How to fix anomalies from PA Summary page?
  • How to fix anomalies detected in your account from All Anomalies Page?
  • How to delete PA scan preferences?
  • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
  • How to launch Posture Anomaly scans?
Reports
  • How to schedule for the report back up?
  • How to create a custom report in SanerNow?
  • How to configure mail settings to email Report PDF?
  • Home
  • Docs
  • How Tos
  • Continuous Posture Anomaly Management
  • How to build your own detection and response in PA tool?

How to build your own detection and response in PA tool?

  1. Click on Custom Rules on the PA Dashboard to build your custom detection and response.

2. This will take you to the page where you can build your own Detection and Response.

3. You can use default queries provided by SanerNow or create your own queries.

  • Default Queries – The SanerNow solution provides default queries that can fetch information such as anti-virus information, hosts that have disabled the firewall, hosts that have disabled Bit locker protection, and more.
  • Custom Queries – Users can create custom queries.

4. To create a custom query, click the Detection or Response button. A query contains two options:

  • Add Rule – to select supported probes. Multiple rules can be selected with AND or OR operations.
  • Add Group – to join rules based on conditions. Multiple rules can be joined into one group.

5. The Run option displays the query results fetched from the database. The Edit and Delete buttons allow you to edit or delete the queries.

6. To create a custom query for threat detection:

  • Click Detection in the Build your own Detection and Response pane. The query building page is displayed with a drag and drop library of probes.
  • Filter the probes according to the operating system for which you want to write a query.

7. For example, to check for Locky using multiple rules, drag and drop Registry Key Effective Rights probes into the Action Box pane, as shown below. Drag and drop Hive and Key as the parameters. Add a file and the file path.

8. Select the devices and groups you want to query. Click the Deploy option at the top right corner. Select the devices and groups you want to query. Click the Deploy button at the top right corner.

9. Now, ‘DeployPackage’ window appears. Here, you can specify the package name, the number of times you want the query to run, and the intervals at which the query should be executed.

10. Specify when the query should be run – immediately, daily, weekly, monthly, or on a specific date. Specify the time and the corresponding days of the week, month, or date. And then assign the query a severity – low, medium, high, or critical.

11. And then click on the Create button.

12. Once the query is created or updated, the results are displayed in real-time. After the task is created, SanerNow searches the system reports’ local database. Click on Submit to retrieve the report. Clicking Submit sends the queries to the Saner Agent to fetch the current data.

Now you know how to build custom detection and response in PA tool.

What are your Feelings
Share This Article :
  • Twitter
  • LinkedIn
Updated on February 20, 2023
How to create new response in PA tool?How to whitelist an entire PA ID?
Copyright 2023 - SecPod. All Rights Reserved. Privacy Policy.