New Agent Monitoring policies in NTP v8

I have been testing out the new Agent Policies and I would like to see if you all can provide a tutorial on how to utilize these better? There isn’t much information in the help file and or in the new features. I have copied the template and asked for it to monitor. All I keep getting is Duplicate Handle, which continues to create events. Also, what makes these new Agent policies different than the Alerts–> Agent Operational alarms?

  • What version are you using? (OS, client, server, etc.)
    • I am using version 8 on Windows 2016
  • For the scenario you’re describing, what settings/configuration do you currently have in place?
    • I have been testing out the agent policies and have not been finding success in using them
  • What error messages or unexpected behavior are you seeing?
    • I’m getting too many alerts and want to make them more precise.
  • What have you tried so far?
    • I’ve tried copying the templates and made no changes, and continue to get overrun with alerts that are not that important. Would like a tutorial on how to utilize these policies better.

Hey Jay, would you be able to elaborate a bit? Specifically, which templates are you testing?

1 Like

Hey Kevin,

The policies that I’m talking about seem to be Process Guardian policies, specific to Agents.

I have implemented these policies to test, and haven’t made any adjustments to the template, and I’m getting a lot of data that is not helpful.

Got it, these are the new policies related to our extended LSASS Guardian capabilities applying to any process. In this case, it is monitoring the Agent process itself. You’re saying that you’re seeing Duplicate Handle events, are you willing to share some of the data from that event. I’m mostly interested in what account is duplicating the handle. Feel free to be vague so you’re not sharing specific account names.

‘Service Account for XYZ’, ‘The DC SYSTEM account’, etc.

I imagine it’s SYSTEM.

If not, it may be best to open a support ticket so we can see what you’re seeing and triage accordingly.

2 Likes

Here’s a screenshot of the duplicate handle I keep getting

I understand I can make a support ticket to research further, however, just wanted to check here before.

I do think that you all need to provide a tutorial on how to best utilize these new features for the Process Guardian. Seems like a powerful policy that can do a lot of damage if not used correctly. I’d like to see how you all recommend deploying these policies. As I mentioned, the documentation on this new policy type is not very helpful from what I’ve seen.

We’ll look into the out of the box configuration for the templates. It should only be looking at attempts to suspend or terminate the process:

This is to further monitor/prevent our agent from being tampered with beyond existing hardening capabilities. These same controls can be extended to any other service running on your domain controllers, such as an EDR process, etc.

These capabilities previously only existed for the LSASS process, but with 8.0 it’s been extended to any process.

Hi Jay - Sorry for any delay. Now that the team is done with March ‘Patch Tuesday’ updates we have time to look into this further.

2 Likes

Confirmed this is expected activity and the resolution is to add the LocalSystemSid (NT AUTHORITY\SYSTEM) to the policy AD Perp exclude perp list. We will add this to the templates but for an existing install you will need to manually add to the policy derived from the template.

1 Like

Thanks Tony and team, you guys are the best!

1 Like