Visão Geral
O Curso FireEye Helix, abrange o fluxo de trabalho do Helix, desde a triagem de alertas do Helix, criação e escopo de casos e uso de ferramentas Helix e Endpoint Security para conduzir pesquisas investigativas em toda a empresa.
Conteúdo Programatico
Helix Overview and Architecture
- Helix Web UI
- Helix workflow
- Helix Architecture
- 3rd party data sources
- FireEye technologies stack
- Cloud integrations
Helix Fundamentals
- Features and capabilities
- Searching and pivoting
- Event parsing
- Custom dashboards
Search and MQL (Mandiant Query Language)
- Searchable fields
- Anatomy of an MQL search
- MQL search, directories, and transform clauses
Deployment and IAM
- User Management
- Role-based Access
- Deployment scenarios
- Configuring 3rd party event collection
Rules & Lists
- Best practices for writing rules
- Creating and enabling rules
- Creating and using lists
- Using regular expression in rules
- Multi-stage rules
Initial Alerts
- Helix Alerts
- Guided Investigations
- Network Security Alerts
- MVX engine
- Endpoint Security Alerts
- Triage with Triage Summary
- Run searches across all hosts in the enterprise
FireEye iSight Intelligence Portal
- Intelligence Context in Helix
- Analysis Tools
Case Management
- Creating a case in Helix
- Adding events to a case
- Case workflow
Data Source Selection and the Mandiant Attack Lifecycle
- Data sources for detection and investigation
- Attack models to frame data source selection
- Using the Mandiant Attack Framework
- Mapping attacker activity to the stages of an APT attack
Knowing Your Operating System
- Common system processes and attributes
- Identifying malicious processes
- Windows Registry
- Services and Tasks
- Windows Event Logs
- Audit Viewer and Redline
Data Acquisitions
- Acquiring data using Endpoint Security
- Redline collections
- Other acquisition methods, such as PowerShell
- Locations of evidence as they map to the Mandiant Attack Lifecycle
Investigation Methodology
- Areas of Evidence
- MITRE ATT&CK
- Mapping evidence to Attacker Activity
Using Redline
- Access triage collections for hosts for offline analysis
- Navigate a data acquisition using Redline®
- Apply tags and comments
Using Audit Viewer
- Navigate a data acquisition using Audit Viewer
- Apply tags and comments
Endpoint Security: Extended Capabiities
- FireEye Market
- Open IOC Editor
- HXTool
- Endpoint Security REST API