Endpoint monitoring
Who is this article for?
Instructor, no.
Incydr Professional, Enterprise, Gov F2, and Horizon, no.
Incydr Basic, Advanced, and Gov F1, no.
CrashPlan Cloud, no.
Retired product plans, yes.
CrashPlan for Small Business, no.
Overview
Endpoint monitoring uses the Code42 app to capture file activity on each device in real time, helping you identify five types of potential data leaks or security problems:
- Removable media
- Personal cloud
- File upload (Windows devices only)
- Restore
- Pattern matching
Endpoint monitoring identifies most file activity anywhere on a user's device, not just within the user's backup file selection. Pattern matching, however, only applies to files included in the user's backup file selection.
Considerations
If Compliance Settings have been activated for an organization (version 5.4 and later), you cannot enable endpoint monitoring for the organization or child organizations that inherit settings. Parent and sibling organizations are not affected.
Endpoint monitoring types
Endpoint monitoring identifies five types of security-related activity on each Code42 app device.
Endpoint Monitoring Type | What Activity Is Identified | Example |
---|---|---|
Removable media | Users placing files on removable media, such as USB drives or SD cards. | A user plugs in a USB drive, copies a file to the drive, and removes the drive. |
Personal cloud |
Users syncing files using these cloud storage apps:
|
A user uploads a file to the Google Drive desktop app.*
|
File upload (Windows devices only) |
Users opening files in web browsers, such as attaching to a web-based email. |
A user attaches a file to a Gmail message. |
Restore |
File restores:
|
A user restores files from the Code42 app. |
Pattern matching | Existence of known malicious files or patterns of sensitive data based on YARA rules for text (non-binary) files included in the user's backup file selection. | A user saves a text file that contains Social Security numbers. |
*By default, Google Drive grants read access to only the logged-in user. The Code42 service runs as a system process by default, so you must grant read access to SYSTEM for the Google Drive folder on each device in order to monitor activity in that folder. See the Microsoft support site for how to add read access to a folder.
Before you begin
Ensure your Code42 environment meets all the requirements for endpoint monitoring:
Component Or Configuration | Requirements |
---|---|
Licensing | You must purchase a Code42 Security Center license in order to use endpoint monitoring. |
Authority server |
|
Storage server |
|
Code42 app |
|
Backup encryption key policy | Users' archives must use the Standard archive encryption key policy. Endpoint monitoring data cannot be collected for users with Archive key password or Custom key archive encryption. This means no data appear for these users in Security Center results. |
Code42 for Splunk (Legacy) app (Optional) |
With a subscription (or trial) for Splunk Enterprise, you can view the data collected by endpoint monitoring using version 2.1 or later of the Code42 for Splunk (Legacy) app. |
Enable endpoint monitoring
Step 1: Lock archive encryption key settings
Endpoint monitoring requires standard encryption. Before implementing endpoint monitoring in any organization in your Code42 environment, you must lock the encryption setting at its standard level. Locking this setting prevents users or administrators from changing the setting.
Option A: Lock encryption settings for all organizations
- Sign in to the Code42 console.
- Go to Settings > Device Backup.
- Click Security.
- Under Archive Encryption Key:
- Deselect Use default archive encryption key setting.
- Verify that Standard is selected.
- Click Lock to prevent users from changing this setting.
A confirmation prompt is displayed. - Select inheritance options as desired for your Code42 environment.
- Select I understand.
- Click Push and Lock.
- Click Save.
Option B: Lock encryption settings for a specific organization
- Sign in to your Code42 console.
- Go to Organizations.
- Select an organization to view its details.
- From the action menu, click Device Backup Defaults.
- Under General, deselect Use device defaults from parent.
- Click Security.
- Under Archive Encryption Key:
- Deselect Use default archive encryption key setting.
- Verify that Standard is selected.
- Click Lock to prevent users from changing this setting.
A confirmation prompt is displayed. - Select inheritance options as desired for child organizations of this organization.
- Select I understand.
- Click Push and Lock.
- Click Save.
Step 2: Enable endpoint monitoring for organizations
Enable endpoint monitoring for each organization in your Code42 environment using the Code42 console.
Option A: Enable endpoint monitoring for all organizations
To enable endpoint monitoring on all devices in your Code42 environment:
- Sign in to your Code42 console.
- Go to Settings > Endpoint Monitoring (labeled Detection in version 5.1.x).
- Select one or more detection types to enable them.
- Click Save to immediately apply your changes to all devices in your Code42 environment.
Option B: Enable endpoint monitoring for a specific organization
To enable endpoint monitoring on devices in a specific organization:
- Sign in to your Code42 console.
- Go to Organizations.
- Select an organization.
- From the action menu, choose Edit.
- Select Endpoint Monitoring (labeled Detection in version 5.1.x).
- Deselect Inherit settings from parent, if necessary.
- Select one or more detection types to enable them.
- Click Save to immediately apply your changes to all devices in this organization and all of its inheriting child organizations.
Step 3: Configure pattern matching (optional)
In order to use the pattern matching method of endpoint monitoring, you must manually deploy a file to each device you want to monitor for patterns. This file identifies dangerous, malicious, or sensitive files included in the user's backup file selection with a rule-based framework called YARA.
Perform these steps on each device:
- Create a folder named yr on the device in the Code42 app's cache directory.
Default cache directories on each operating system:- Windows Vista, 7, 8, 10, Server 2008, and Server 2012: C:\ProgramData\CrashPlan\cache
To view this hidden folder, open a file browser and paste the path in the address bar. If you installed per user, see the file and folder hierarchy for file locations. - Windows XP: C:\Documents and Settings\All Users\Application Data\CrashPlan\cache
To view this hidden folder, open a file browser and paste the path in the address bar. - OS X: /Library/Caches/CrashPlan
If you installed per user, see the file and folder hierarchy. - Linux: /usr/local/crashplan/cache
- Windows Vista, 7, 8, 10, Server 2008, and Server 2012: C:\ProgramData\CrashPlan\cache
- Create a YARA rule file using the instructions from the YARA project.
See below for an example YARA rule file. - Save the YARA rule with the name rules.yar to the yr folder.
- Restart the Code42 service on the device.
Pattern matching considerations
- You must manually deploy the YARA rule file to each device you want to monitor for patterns.
- Unlike the other types of endpoint monitoring, pattern matching only monitors files included in the user's backup file selection.
- The frequency of pattern matching scans is set by the Backup new version frequency setting. By default, this is every 15 minutes.
- Pattern matching only monitors files that are created or modified after a YARA rule is added. Files existing before a YARA rule is added are not scanned for that rule until the file changes.
- Pattern matching can scan for MD5 hash and filename matches on any file, but does not extract file contents of binary or compressed files. Practically speaking, this means pattern matching only searches the contents of plain text files, unless you create a rule targeting a specific binary string.
- After adding a new YARA rule, you must restart the CrashPlan service on each device.
Sample YARA rule file
The example rule file below includes two rules. Each rule contains instructions for identifying a pattern of data on users' devices, including:
- An MD5 hash for a specific file
- Text strings formatted as Social Security numbers
import "hash" rule md5Match { meta: meta_tag = "MD5 example" condition: hash.md5(0, filesize) == "5b110441c6eead0d1943211d6a3e704c" } rule ssnMatch { meta: meta_tag = "SSN example" strings: $re1 = /(\d{3})-(\d{2})-(\d{4})/ condition: $re1 }
Visualize data from endpoint monitoring
You can visualize the data collected by endpoint monitoring in two ways.
Security Center
Sign in to the Security Center to view basic information from endpoint monitoring in a web browser.
You must have the Org Security Viewer or All Org Security Viewer roles, or equivalent permissions in a custom role, to view the Security Center. The default local administrator with the SYSADMIN role cannot be used to view data in the Security Center if your backup data is stored in the Code42 cloud; however, any other account can be used if it has the Org Security Viewer or All Org Security Viewer roles.
- In a web browser, access the URL for the Security Center.
Example: https://authority-server.example.com:4285/security - Sign in using your administrative credentials.
- Review the basic information gathered by endpoint monitoring.
Code42 for Splunk (Legacy) app
Install the Code42 for Splunk (Legacy) app to visualize detailed endpoint monitoring data as part of a larger Splunk installation.
For more information on Splunk, including their free trial that can be used with the Code42 for Splunk (Legacy) app, see Splunk's documentation.