Trend Micro Vision One Endpoint Security alert: Suspicious file detected

This rule is part of a beta feature. To learn more, contact Support.

Goal

Identify incidents where a suspicious file is detected on an endpoint.

Strategy

Monitor events for instances where a suspicious file is detected on an endpoint. This scenario suggests potential threats or unauthorized activities, indicating a need for further investigation to determine if the file poses a security risk or indicates a compromise. Correlate these events with file details such as type, path, and actions taken to assess the potential threat. Evaluate whether the suspicious file indicates unauthorized activity or is part of a broader compromise requiring immediate investigation.

Triage and Response

  1. Identify the affected endpoint using its name ({{@source_host_name}}) and IP address ({{@endpoint_ip}}).
  2. Review the file type ({{@file_type}}) and file path ({{@file_path}}`) to understand the nature and location of the suspicious file.
  3. Determine the action taken on the file to assess any immediate impacts or threats.
  4. Isolate the endpoint to prevent further potential issues related to the suspicious file.
  5. Remove or quarantine the suspicious file and perform a scan to ensure no additional threats are present.