A system crash without blue screen or a CLI crash occurs after placing Application and Change Control in modes other than Disabled
Last Modified: 12/19/2023
Affected Products
Languages:
This article is available in the following languages:
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
After December 1, 2024, please log in to the Thrive Portal for support, knowledge articles, tools, and downloads. For information about using the Thrive Portal, view the Trellix Thrive Portal User Guide.
A system crash without blue screen or a CLI crash occurs after placing Application and Change Control in modes other than Disabled
Technical Articles ID:
KB91225
Last Modified: 12/19/2023 Environment
Application and Change Control (ACC) 8.x Microsoft Windows 8, 10 Microsoft Server 2012, 2016, 2019, 2022 Problem
Systems can experience the following issues after ACC has been installed and placed in enabled, update, or observe modes:
Cause
The injection mechanism detects when a process is loading a library (dll). Detection requires knowledge of the Relative Virtual Address (RVA) for the DisableDeviceGuardCompat enabled ("DisableDeviceGuardCompat=1"), the RVA that MACC is looking for is “LdrLoadDll” but in the NTDLL.dll. SolutionIf you're experiencing CLI crashes, perform the following steps:
To validate that the client task has run, perform the following steps:
If this solution or workaround does not resolve your issue, log on to the ServicePortal and create a Service Request. Include this article number in the Problem Description field.
Related InformationAddress space
A NOTE: Changing the If you want to explicitly bypass injection into a particular process, you can add an With rebasing defined, changing the
If " Our injection mechanism detects when a process is loading a library (DLL). This detection is achieved by knowing the RVA of the Affected ProductsLanguages:This article is available in the following languages: |
|