Enabling Exploit Prevention rules 6212 and 6213 and using ZDK encryption software causes a dead-lock
Last Modified: 2022-03-09 17:13:55 Etc/GMT
Affected Products
Languages:
This article is available in the following languages:
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
After December 1, 2024, please log in to the Thrive Portal for support, knowledge articles, tools, and downloads. For information about using the Thrive Portal, view the Trellix Thrive Portal User Guide.
Enabling Exploit Prevention rules 6212 and 6213 and using ZDK encryption software causes a dead-lock
Technical Articles ID:
KB95315
Last Modified: 2022-03-09 17:13:55 Etc/GMT Environment
Endpoint Security (ENS) Threat Prevention 10.x ZDK encryption software Problem
Enabling Exploit Prevention rules 6212 and 6213 (disabled by default) and using a third-party encryption application can cause a dead-lock that is seemingly random. This issue has been observed only in the presence of ZDK encryption software. This article will be updated if we learn of other products that create the same conditions for the dead-lock to occur.
Solution
A future ENS update is expected to resolve this issue and allow enabling of these Exploit Prevention rules. These Exploit Prevention rules have been removed in Exploit Prevention content 12103 released on March 8, 2022. Equivalent Expert Rules for these signatures are available via the following links if you want to keep them in your environment: T1561 - MBR protection through DISK_REGION matching criteria T1561 - MBR protection through LBA matching criteria NOTE: These rules are more aggressive than the ones that were present in Exploit Prevention content. So, you need to tune them per your environment and needs. To receive email notification when this article is updated, click Subscribe on the right side of the page. You must be logged on to subscribe.
WorkaroundIf you have this issue, and are using Exploit Prevention content before release 12103, disable the following Exploit Prevention rules:
Affected ProductsLanguages:This article is available in the following languages: |
|