Sophos Central - High-risk endpoint verification

Entities: Host name Log type: Sophos Firewall

Playbook Description

This playbook retrieves the impacted endpoint ID from Sophos Central to fetch recent events and file hashes, which are then added to the blocklist. It then assesses if the endpoint is of high-risk and not on the user-defined critical server list to proceed with isolation. If the endpoint is critical, the playbook automatically alerts the user via email.

MITRE ATT&CK mapping

Tactics Techniques Sub-techniques
Defense Evasion (TA0005) Impair Defenses (T1562) Disable or Modify Tools (T1562.001)

MITRE D3FEND mapping

Tactics Techniques Sub-techniques
Process Eviction (D3-Evict) D3-PE Process Termination (D3-PT), Host Shutdown (D3-HS)

Playbook input type

Alert

Prerequisites

API access with below scopes: Token

Playbook creation input

  • protectedEndpointGroupName - Name of the endpoint group that is protected
  • sophosConnection - Name of the Sophos Central connection
  • tenantId - Unique identifier of the tenant within the Sophos environment.
  • recipientEmail - Email address where notifications will be sent
  • dataRegion - Region where the tenant's data is stored or processed

Dependencies

Extensions - Sophos Central

  • sophoscentral_listEndpoint
  • sophoscentral_getEvents
  • sophoscentral_addBlockedItem
  • sophoscentral_addIsolationEndpoint

Utility functions

  • utility_filterAndMatchEvents
  • utility_extractFieldFromList
  • sendMail
  • utility_validateResponses

Connections

  • Sophos Central connection - Need to connect sophos central using OAuth 2.0 connection with clientId and client secret.

Execution workflow

Investigation:

  • Gets the Sophos Central endpoint ID using the endpoint name and IP address.
  • Fetches the last 1000 events from Sophos Central.
  • Filters the events by endpoint ID and checks for malicious event types from the user-editable list.
  • Extracts the file hash from the event data if a malicious event is found.
  • Checks the endpoint health status in Sophos Central.

Decision logic:

  • Proceeds to remediation if malicious events are detected.
  • Proceeds to isolation and notification if the endpoint health status is bad and malicious events are detected.
  • Skips remediation if no malicious events are found and the endpoint health status is normal.

Remediation:

  • Adds the identified malicious file hash(es) to the Sophos Central blocklist.
  • Isolates the endpoint from the network if the health status is bad and malicious activity is confirmed.
  • Sends an email notification to the user informing them about the isolation action taken.
Execution Workflow
Figure: Execution workflow of the playbook

Post execution procedure

  • Monitor for re-enroll attempts: Set alerts for repeated MFA enrollments, especially after recent suspicious activity.
  • Audit account recovery settings: Ensure recovery options (email, SMS, etc.) are secure and not abused for bypass.
  • Review all enrolled factors post-incident: Validate all MFA methods linked to the affected user to ensure no unauthorized factors remain.
  • Handling false positives: If this alert is confirmed as a false positive, revert all associated remediation steps.
    • Unblock non malicious IPs.
    • Notify the user to enroll the required factor.