Overview
Code42 helps you identify insider risks and secures your data from threats by:
- Continuously monitoring endpoint and cloud file activity to detect risk
- Highlighting suspicious and anomalous behavior
- Capturing comprehensive file metadata as well as the file contents
This visibility into endpoint and cloud file activity helps you quickly detect and respond to both malicious and unintentional activity that threatens your intellectual property, sensitive data, and overall security.
This article provides best practices for detecting and responding to insider risks.
Considerations
Part 1: Capture file activity
Step 1: Confirm endpoint data collection settings
To ensure you capture file activity for all detection types, review your endpoint data collection settings:
- Sign in to the Code42 console.
- Select Administration > Environment > Organizations.
- Select the parent organization at the top of the hierarchy.
- Select the Insider Risk tab.
- Verify the organization does not inherit settings from the parent organization. If necessary, click Edit and deselect Inherit settings from parent organization.
- Verify all detection types (Removable media, Cloud sync applications, Browser and other application activity, and Printers) are selected.
- Click Save.
Step 2: Set up alerts to notify you about suspicious file activity
Alerts enable you to define specific file activity behaviors and thresholds that trigger an alert. Alerts can be sent as emails, appear on dashboards, or both. For example, you could create an alert that emails you every time a user transfers a certain number of files to removable media or to a cloud sync folder.
To customize alert criteria for your Code42 environment:
- Sign in to the Code42 console.
- Select Alerts > Manage Rules.
- Select Create rule.
- Define the rule criteria. For a detailed explanation of all options, see Create and manage alert rules.
Step 3: Monitor higher-risk employees
Watchlists provide comprehensive insight into file activity of employees you identify as a risk (for example, departing employees, users with elevated permissions, access to sensitive data, on a performance improvement plan, etc.). The User Activity > Watchlists section of the Code42 console enables you to:
- Quickly identify suspicious file activity of high-risk employees
- Assign employees to one or more watchlists to provide more context for investigations
- Assign customized alerts to each watchlist to be notified of activity you define as critical
- Easily review both endpoint and cloud sync file activity
To start monitoring higher-risk employees:
- Sign in to the Code42 console.
- Select User Activity > Watchlists.
- If no watchlists exist, create a watchlist. For more information about how to create a watchlist, see Manage watchlists.
- Click Add users to place users on an existing watchlist.
- Enter any pertinent information about the user such as departure or start dates.
- Click Save.
Step 4: Define trusted activity to reduce file event volume
Trusted activity settings enable you to define domains, Slack workspaces, cloud accounts, and Git repositories you trust, which helps focus your investigations on file activity that may be a higher risk. Trusted activity is excluded from dashboards, user profiles, and alerts, but is still searchable in Forensic Search.
To add trusted activity:
- Sign in to the Code42 console.
- Select Administration > Environment > Trusted activity.
- Click Add trusted activity to define domains, URLs, Slack workspaces, cloud accounts, and Git repositories you trust.
- (Optional) Select Administration > Environment > IP addresses to define your in-network IP addresses.
Step 5: Add cloud data connections to reduce file event volume
Adding data connections authorizes Code42 to collect information from cloud services (for example, Google Drive, Microsoft OneDrive, or Box). Additionally, Incydr uses these connections to identify file activity that occurs in any untrusted cloud destinations.
Once connected, all file activity in these sources is searchable in Forensic Search. However, only untrusted activity is shown on Incydr dashboards, user profiles, and alerts.
See Introduction to adding data connections for specific instructions for each data source.
Step 6: Define file backup policies
Backup agent only
File backup is an important part of insider risk detection and response because it enables you to easily review the actual file contents during investigations of suspicious activity. As long as a file is backed up, it's available for download any time, even if the device that backed up the file is offline. For detailed instructions on what to back up, see Considerations for defining your backup policies.
Step 7: Configure third-party integrations (optional)
Code42 offers a variety of tools to leverage our insider risk features and data in other systems, including:
- The Code42 API, Python SDK, and command-line interface (CLI)
- Third-party integrations with SOAR and SIEM security analytics tools, including Cortex XSOAR, IBM Resilient, LogRhythm, Sumo Logic, and Splunk.
For more details, see Code42 integrations resources.
Part 2: Review suspicious file activity
The Code42 console offers a wide variety of options to help you quickly identify suspicious or unexpected file activity. Not all options below apply in all situations, so pick the sections below applicable to your specific circumstances.
Watch the videos below to get an overview of how to use Code42 Incydr to review suspicious file activity. For more videos, visit the Code42 University.
Review dashboards
Incydr provides several dashboards to help you easily identify and respond to risks:
- The Exfiltration dashboard highlights where and how your data is moving so that you can quickly identify file events that need your attention.
- The Trends dashboard shows how risk in your organization changes over time. This data can help you identify where to focus controls, training, and engagement to improve your organization's risk profile.
- The Action Items dashboard displays items requiring attention, including open alerts, top users by critical activity, users departing this week, unwatched Instructor lessons, and open cases.
Review alerts
After you define the specific file activity behaviors and thresholds required to generate an alert, you can view existing alerts to quickly uncover possible insider risks.
Review watchlists
After creating a watchlist of your higher-risk employees, navigate to User Activity > Watchlists to review those users' file activity. This view shows users on the watchlist based on their critical file activity so that you can easily find risky file activity.
See Watchlists reference for more details.
Review All users list
Use the All users list, navigate to User Activity > All users to review all users across your Code42 environment for critical file activity. This view shows all users based on their critical file activity so that you can easily find risky file activity from users you may not have been closely monitoring.
See All Users reference for more information.
Review specific users
From User Activity > All users, search for specific users to easily review their file activity. Visit their User profile for more details.
See All Users reference for more information.
Perform ad-hoc file activity searches
Forensic Search provides detailed visibility about endpoint and cloud file activity and helps you to quickly answer questions such as:
- Does any file activity look suspicious?
- Is there evidence of covering up suspicious file activity?
- Does an individual have a specific file, or did the individual previously have it?
Forensic Search allows you to see a wide array of file events, including when a file is created, modified, renamed, moved, or deleted. Search results return file events for your entire Code42 environment. File event details provide extensive metadata about the file, and offer the option to download the actual file contents.
See Forensic Search use cases for specific use cases, or watch the video below for more details.
Part 3: Respond to insider risks
No single response is appropriate for all situations because risk varies greatly based on the files and users involved. Therefore, we focus on giving you the information you need to respond to insider risks quickly and appropriately, which may include automated action, corrective conversation, real-time blocking, training and education, legal action, engaging other stakeholders in your organization, or anything in-between.
Send the user a security training video
Code42 Instructor enables you to send training videos to help you educate users about risky behaviors and how to prevent them.
Download and review file contents
Incydr provides the ability to retrieve files involved in an investigation. Being able to definitively see what content is included in these files can help you determine an appropriate response. You can recover file contents in several ways:
- Download files from Forensic Search: In many cases, files are available for download from the search results. Links to download it appear in the File > Filename section of an event's details.
- Restore files from the Code42 console (backup agent only): Administrators can restore a user's backed up files from any web browser or restore files to any device running the Code42 agent.
- Collect files from a legal hold (backup agent only): If the user is already a custodian on legal hold, you can use the Code42 console to collect the files.
Apply preventative controls
Incydr's preventative controls enable you to restrict users from performing specific actions, including uploading and pasting content in a web browser, mounting removable media, and sharing files via cloud services. For more details, see Manage Incydr preventative control settings.
Search related risks
With Forensic Search, you can search your entire Code42 environment for other, related risks. For example, if you're responding to a non-sanctioned file share via a cloud service, you can identify other instances of the file in your environment to determine who else might be involved by searching for the file hash (MD5 or SHA256) or the filename.
Create a case to organize the investigation
Use Cases as an efficient way to compile, document, and share details about insider risks. This helps you make more informed decisions about how to respond, and also provides a permanent record of the file activity and users associated with the investigation.
Specifically, Cases enables you to:
- Assemble evidence related to an investigation
- Add file events from Forensic Search
- Add notes to provide additional context
- Summarize and share findings with others in your organization
See Manage cases for more details.
Leverage third-party integrations (optional)
If you have already configured third-party integrations, you may be able to use Code42-specific actions and workflows as part of your response. For example, you can use Slack to send a message to a user, IBM Resilient to download files from a user's backup, Splunk Phantom to quarantine a device, or Cortex XSOAR to block users.
For more details, see Code42 integrations resources.
View Insider Risk Trends in your organization
Additional help
Contact your Customer Success Manager (CSM) for assistance with:
- Licensing for specific features
- Configuring your Code42 environment to best identify insider risks
If you do not know your CSM, please contact our Technical Support Engineers. If you are a new customer, contact our sales team to get started.
Additional Code42 resources
External resources
- Gartner: Understanding Insider Threats
- U.S. Government: National Insider Threat Task Force
- FBI: An Introduction to Detecting and Deterring an Insider Spy