Managing endpoints
You can monitor the processes, services, and connections that are active on endpoints in your environment. You can also download files from an endpoint, enable anti-ransomware detection, update policies on an endpoint, and isolate an endpoint from the network.
Monitoring an endpoint
You can monitor a specific endpoint to view the active processes, services, and connections to help investigation by providing updated information and context on what is happening on the endpoint in real time.
Procedure
- Click Endpoints.
- Click an endpoint in the endpoint list.
- Click .
- Click the + icon.
- To view a list of active processes on the endpoint, click show processes.
- To view a list of active services on the endpoint, click show services.
- To view a list of active connections on the endpoint, click show connections.
Downloading files from an endpoint
You can download files to help evaluate security incidents. You can use these files to collect malicious samples, for further manual analysis, or for working with other tools.
Before you begin
Downloading a file from a Microsoft Windows network share can result in credential leakage due to the NT LAN Manager (NTLM) authentication protocol. To minimize this risk, restrict NTLM traffic to local servers or within trusted domains when possible. Set the QRadar® EDR user role to follow the least privilege principle and allow file downloads only to a restricted set of users. For more information, see Managing users.
About this task
Procedure
Results
Deleting files from an endpoint
You can delete files from an endpoint as part of your response to a security incident. You can delete files from an endpoint to remove malicious artifacts such as code executables, configuration files, or service files.
About this task
Procedure
Results
Downloading forensic data from an endpoint
You can download a .zip archive that contains a forensic data package for an endpoint to help identify anomalous or malicious behavior on the endpoint across processes, services, and connections. The forensic data package provides a snapshot of key information of an endpoint's state, configuration, and past security events, helping you to collect all the relevant information to assess the state of an endpoint.
About this task
You can download a basic forensic data package, or an advanced forensic data package. It takes approximately 5 minutes to collect the data for the basic package, and approximately 15 minutes to collect the data for the advanced package. The package is available to download for 1 day.
The following table shows the forensic data that is available in the basic and advanced forensic data packages.
| Basic | Advanced |
|---|---|
| Processes running | All data from the basic package |
| Services | Missing updates |
| Network connections | Environment variables |
| AddressResolutionProtocolCache | Prefetch files |
| DNS cache | BitLocker information |
| System information | Named pipes |
| Installed programs | Samba sessions |
| Updates | FILE associations |
| Security event logs | Host file |
| Scheduled asks | Extended event logs |
| Users and groups | UAC settings |
| Shares | Audit policy |
| Proxy information | Firewall rules |
Procedure
- Click Endpoints.
- Click an endpoint in the endpoint list.
- Click .
- Enter a name for the .zip archive in the Description field.
- Set an Unzip Password to be used to extract the archive.
- Choose the Basic or Advanced package and click Collect.
- When the package is ready, click the Download link in the Forensic Data section of the Endpoint Details screen.
Exporting a list of endpoints
You can export a list of endpoints that you have permission to see in QRadar EDR Dashboard to get an overview of all of the endpoints on which QRadar EDR is installed.
Procedure
- Click Endpoints.
- If you want to export a subset of the endpoints that you have permission to see, click Advanced Filters and filter the endpoints as needed.
- Click Export as CSV.
Results
Updating policies on an endpoint
Policies define the malicious behaviors to be detected and for which alerts are generated and which are potentially blocked. You can view and manage the policies that are loaded on any specific endpoint.
Procedure
Results
Isolating an endpoint
Windows-only You can isolate a specific endpoint to stop all network access on the endpoint as part of your response to prevent network communications from the infected endpoint to other endpoints.
Procedure
- Click Endpoints.
- Click an endpoint in the endpoint list.
- Click .
Results
The endpoint is isolated from the network, but can still communicate with QRadar EDR Dashboard.
Uninstalling the QRadar EDR Agent from an endpoint remotely
Agents are uninstalled automatically if your license expires, or when your client is deleted. If necessary, you can also uninstall an agent for a specific endpoint from the dashboard.
Procedure
- Click Endpoints.
- Click an endpoint in the endpoint list.
- Click .
Results
Uninstalling the QRadar EDR Agent on a Linux endpoint locally
You might want to decommission an endpoint from QRadar EDR, or in some cases remove QRadar EDR as part of support procedures to help resolve issues.
About this task
Procedure
- Debian-based Linux
endpoints.
sudo dpkg -r keeperx - RPM-based Linux
endpoints.
sudo rpm -e keeperx
Uninstalling the QRadar EDR Agent on a Mac endpoint locally
You might want to decommission an endpoint from QRadar EDR, or in some cases remove QRadar EDR as part of support procedures to help resolve issues.
About this task
Procedure
Uninstalling the QRadar EDR Agent on a Windows endpoint locally when protected uninstallation is disabled
Windows-only You might want to decommission an endpoint from QRadar EDR, or in some cases remove QRadar EDR as part of support procedures to help resolve issues.
About this task
Procedure
"C:\Program Files\ReaQta\keeper.exe" uninstall
Results
- Bring the endpoint online so that it receives the updated status, then repeat this procedure.
- Enable protected uninstallation, and then follow the steps in Uninstalling the QRadar EDR Agent on a Windows endpoint locally when protected uninstallation is enabled.
- Follow the steps in Uninstalling the QRadar EDR Agent on a Windows endpoint locally in safe mode.
Uninstalling the QRadar EDR Agent on a Windows endpoint locally when protected uninstallation is enabled
Windows-only You might want to decommission an endpoint from QRadar EDR, or in some cases remove QRadar EDR as part of support procedures to help resolve issues.
About this task
Procedure
Results
If you can't generate a token because the QRadar EDR Dashboard is offline, follow the steps in Uninstalling the QRadar EDR Agent on a Windows endpoint locally in safe mode.
Uninstalling the QRadar EDR Agent on a Windows endpoint locally in safe mode
Windows-only If the standard QRadar EDR Agent uninstallation fails, you can uninstall the agent in safe mode.