Detections
ESET Inspect On-Prem includes a rule-based detection engine for Indicators of Attack.
Rules identify suspicious, malicious behavior trigger detections with defined severity. The Detection section displays each triggered detection, identifying its location (Computer) and the executable and specific process that triggered it. It is accompanied by severity information defined in the rule and assigns a priority to each detection (later available as a filter). Detections are also 1:1 shown in the ESET PROTECT On-Prem Detections section under the ESET Inspect log type. When a detection is resolved in either ESET Inspect On-Prem or ESET PROTECT On-Prem, it is resolved in both systems.
The Detections view allows advanced grouping and filtering by any column. You can save filter sets by user preference. You can explore each detection's details and find further information, including the next steps. Select the executable's Details, Processes and Rules from the Detections view to continue your investigation. The detection detail layout is similar to ESET PROTECT On-Prem.
When a high number of detections occur, the Rule is temporarily muted on the triggered computer for 24 hours, this notification is shown in the Notifications tab. |
Preview panel
Click a detection to display the preview panel. Here, you will find important information about the selected detection. Some items are interactive.
Filtering, Tags and Table options
Use filters at the top of the screen to refine the displayed items. Tags are powerful when searching for a specific computer, detection, incident, executable or script. Click the gear
icon for table options to manage the main table.
Detection types
Click the detection type to display comprehensive details.
Shows detections triggered by ESET Endpoint Security, for example, if a Firewall rule was triggered |
Shows detections triggered by ESET Endpoint Security when HIPS protection detects an intrusion. |
Shows detections triggered by ESET Endpoint Security if the website is on a blacklist (PUA, Internal or anti-phishing). |
Shows detections triggered by ESET Endpoint Security after a scan or real-time detection. |
Filters triggered detections based on rules. |
Shows detections triggered by matching the Blocked hashes listed in the More section. |
Detection Groups
Ungrouped |
Displays each detection separately when you first open the Detections tab. This is the default view. |
|---|---|
Types |
Groups detections by type, whether the trigger was a rule or a blocked file based on a hash. |
Computers |
Groups by computers where detections occurred. |
Rules |
Groups by rules that raised detections. |
Processes |
Groups by processes that raised detections. |
Executables |
Groups by executables that raised detections. |
Priority (filter icons)
Shows items with a specific priority. There are four types: No priority and Priority I–III. All icons are deactivated by default, and items with all priorities are displayed. Click the priority icon to activate the filter and show items with the selected priority.
Severity
Shows the detection's severity: Threat
, Warning
or Info![]()
Suspicious Network Detection
A silent firewall detection is an event from an endpoint that does not trigger an alert. ESET Inspect On-Prem shows these events as Suspicious Network Detection.
In the list below you can find silent firewall detections that will not trigger in ESET PROTECT On-Prem, and therefore cannot be excluded:
Detection name |
MITRE ATT&CK® |
Note |
|---|---|---|
Win32/RiskWare.Meterpreter.N |
|
TLS1.2 (Win10) Cobalt Strike beacons |
WinPE/Agent.DNSoHTTP |
|
Designed, but not limited to Brute Ratel beacons. Includes access to doh.opendns.com, cloudflare-dns.com only |
SMB/Hacktool.DCenum |
|
DC enumeration via DCERPC (Brute Ratel) |
SMB/Hacktool.SCquery |
|
Remote SC manager QueryServiceConfigW (Brute Ratel) |
LDAP/Hacktool.GetGPO |
|
Group policy evaluation (Brute Ratel) |
SMB/Hacktool.ServicePathModify |
|
Service path alteration via remote SC manager (Brute Ratel) |
LDAP/Hacktool.GetDCGroups |
|
Enumerate DC groups (Brute Ratel) |
HTTP/ArchiveUpload |
|
RAR & ZIP to public IP |
TCP/ArchiveUpload |
|
RAR to public IP |
TLS/Pastebin |
|
TLS access to pastebin.com other than browsers (by process name), except virtual machines |
TLS/4shared |
|
TLS access to upload.4shared.com, api.4shared.com other than browsers (by process name), except virtual machines |
SMB/RiskWare.Impacket.Encrypted |
Incoming SMB traffic with python Impacket flavour |
|
SMB/Impacket.Server |
SMB traffic to a server with python Impacket flavour |
|
Win32/RiskWare.Meterpreter.AX |
|
Sliver c2 via WireGuard protocol |
DCERPC/DCShadow |
Active Directory Rouge Domain Controller (Mimikatz) |
|
DCERPC/DCSync |
Active Directory OS Credential dumping (Mimikatz) |
|
SMB/Hacktool.lsadump |
Remote lsadump::backupkeys (Mimikatz) |
|
SMB/NTLMAUTHtoSuspIP |
Possible SMB NTLM hash leak - authorization to server with fingerprint of that of a responder https://github.com/SpiderLabs/Responder |
|
SMB/LMHashDowngrade |
Server forcing an old SMB1 dialect. Known switch of the responder https://github.com/SpiderLabs/Responder |
|
SMB/LMHashDowngrade.A |
Server instructed to connect to a third party with SMB2 and using old NTLMv1 https://github.com/3lp4tr0n/RemoteMonologue + Responder |
|
SMB/Hacktool.Netexec.Encrypted |
Any suspected SMB command from the NetExec tool (formerly CrackMapExec), uses impacket |
|
LDAP/Hacktool.Netexec.Generik |
Any suspected LDAP command from the NetExec tool (formerly CrackMapExec); not LDAPS |
|
NFS/Hacktool.Netexec.Generik |
Any suspected NFS command from the NetExec tool (formerly CrackMapExec) |
|
WINRM/Hacktool.Netexec.Generik |
Any suspected WINRM command from the NetExec tool (formerly CrackMapExec) |
|
VNC/Hacktool.Netexec.Generik |
Any suspected VNC connection from the NetExec tool (formerly CrackMapExec) |
|
MSSQL/Hacktool.Netexec.Generik |
Any suspected MSSQL command from the NetExec tool (formerly CrackMapExec) |
|
SSH/Hacktool.Netexec.Generik |
Any suspected SSH connection from the NetExec tool (formerly CrackMapExec) |
|
SMB/Agent.PSEXESVCtoAdminShare |
|
Write open admin share with filename PSEXESVC.exe |
SMB/Agent.SuspEXEtoAdminShare |
|
Write open admin share with suspect .exe filename (from telemetry: DOC001.exe, IMG001.exe, VID001.exe) |
RDP/RestrictedAdmin.Handshake |
|
Client sent RDP handshake with Restricted Admin flag |
RDP/Riskware.OpenSSL.Client |
|
A remote client other than mstsc.exe is initiating a RDP connection, for example FreeRDP |
SMB/lsadump.SAM |
Raw registry hive of HKLM\SAM (dumped by a tool such as reg.exe) read via SMB (Mimikatz), write via SMB |
|
SMB/lsadump.SECURITY |
|
Raw registry hive of HKLM\SECURITY (dumped by a tool such as reg.exe) read via SMB (Mimikatz), write via SMB |
SMB/lsadump.SYSTEM |
Raw registry hive of HKLM\SYSTEM (dumped by a tool such as reg.exe) read via SMB (Mimikatz), write via SMB |
|
DCERPC/StartService |
Generic remote start system service (the service name itself is encrypted on modern systems) |
|
IPV6/SLAAC |
|
IPv6 Router Announcement detailed in the following article |
SMB/Winreg.HKLM.dump |
|
HKLM accessed via SMB for potentially dumping or querying some keys (for example: SAM, SYSTEM, SECURITY or any other sub-key) |
LDAP/Hacktool.GetSPN |
|
Get whole subtree of servicePrincipleName - Impacket GetUserSPNs |
Click a detection to take further action:
Computer Details |
Go to the Computer details tab. |
|---|---|
Toggle Group |
Expand or contract the group; not available if ungrouped is selected. |
Mark as Resolved |
Mark the detection as Resolved. |
Mark as not Resolved |
Mark the detection as Unresolved. |
Create Exclusion |
Create an exclusion task for selected rules. You are redirected to the Create Rule Exclusion. |
Edit Rule |
Redirects you to the Edit Rule section if a rule raised the detection. |
Edit User Actions |
Opens the Edit User Actions window and shows edit user actions for the selected detection rule. |
Priority |
Mark the detection as No priority/Priority I/Priority II/Priority III. |
Add Comment |
Add a comment. |
Open |
Open Computer—Opens Computer details for the computer that triggered the detection. Open Process—If a Rule triggers the detection, opens the Process details of the process that caused the detection. Open Parent Process—If the detection has a parent process, opens the parent Process details. |
Tags |
Assign a detection tags from the existing list or create custom tags. |
Audit log |
Go to the Audit log tab. |
Incident |
oCreate an incident report oAdd to a current incident oAdd to recent incident, which shows the last three incidents oSelect incident to add to |
Filter |
Show quick filters on the column where you activated the context menu (Show only this, Hide this). |