Common tooling for IOC-based blocking
In this section, we'll discuss and list out some of the common tooling we've used. While this book also endeavors to be vendor-agnostic and to not recommend specific EDR products, we'll also list out a few of those that are in common use and include the ability to block custom indicators of compromise.
File-based IOCs:
- Group Policy
- EDR tooling
Network-based IOCs:
- Firewalls (Cisco, Juniper, SonicWALL, Fortigate, and so on; host-based firewalls)
- DNS server configurations
- IPSec rules (inbound traffic – RDP, specifically)
- EDR tooling
- Group Policy
EDR tooling:
- CrowdStrike Falcon
- Microsoft Defender ATP
- VMWare Carbon Black
- Qualys Vulnerability Management Platform
- Many more…
Obviously, in authoring this book I have biases, and it is important to do one's due diligence and select the platform that is the best fit for the organization and...