Keystroke analytics templates
Templates for building policies based on user keystrokes.
|
|
To use this functionality, you must enable keystroke monitoring for Agents. For details, refer to the FortiDLP Administration Guide. |
New user typed on node
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows or macOS, Agent version 5.1.0 or later
Detects when a user's typing pattern deviates from the norm, indicating a different person is typing.
|
|
To use this functionality, you must enable keystroke monitoring for Agents. |
No default MITRE ATT&CK indicators. Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Potential keystroke injection attack detected
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows or macOS, Agent version 5.1.0 or later
Detects a non-human typing pattern, indicating a keystroke injection attack.
|
|
To use this functionality, you must enable keystroke monitoring for Agents. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0009 (Collection)
attack.mitre.org/tactics/TA0009/ |
T1119 (Automated Collection)
attack.mitre.org/techniques/T1119/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Unauthorized keyboard shortcut used
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows or macOS, Agent version 7.1.2 or later
Detects when a user presses an unauthorized keyboard shortcut.
|
|
To monitor a "Function" key on Windows, select one of the "F1-F12" keys in the "Prohibited key" parameter with no "Modifiers". To monitor a "Function" key on MacOS, select one of the "F1-F12" keys in the "Prohibited key" parameter along with the "Fn" modifier. All configured parameters must match for a detection to be generated. |
|
|
To use this functionality, you must enable keystroke monitoring for Agents. |
|
|
Subsequent detections and actions for the same process will not be generated until at least 10 seconds after the first detection/action. |
| Parameter | Type | Description |
|---|---|---|
| Process parameters | ||
| Binary names | Advanced asset list | A list of binary names (e.g. chrome.exe) where the keyboard shortcut is authorized or unauthorized. Case-insensitive matching is used. |
| Application window titles | Advanced asset list | A list of window titles for applications where the keyboard shortcut is authorized or unauthorized. Full regular expression (regex) grammar is supported, and case-insensitive matching is used. For example, entering "con(fidential|tent)" would match all window titles containing the words "confidential" or "content". |
| Keyboard shortcut parameters | ||
| Unauthorized key | String | Key in the keyboard shortcut. |
| Modifiers | String list | A list of modifiers for "Unauthorized key" in the keyboard shortcut. |
| Operating system parameters | ||
| Monitor key shortcut on Windows | Boolean | A toggle to enable/disable monitoring the specified keyboard shortcut on Windows platforms. |
| Monitor key shortcut on MacOS | Boolean | A toggle to enable/disable monitoring the specified keyboard shortcut on MacOS platforms. |
No default MITRE ATT&CK indicators. Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Disabled |
| Cluster by content | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Unauthorized text typed
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows or macOS, Agent version 8.4.0 or later
Detects when a user types an unauthorized keyword.
|
|
All configured parameters must match for a detection to be generated. |
|
|
To use this functionality, you must enable keystroke monitoring for Agents. |
| Parameter | Type | Description |
|---|---|---|
| Content inspection parameters | ||
| Unauthorized text patterns | Advanced asset list | A list of text patterns a user is unauthorized to type. Full regular expression (regex) grammar is supported, and case-insensitive matching is used. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. |
| Unauthorized keywords | Advanced asset list | A list of keywords a user is unauthorized to type. Case-insensitive matching is used. Note: A detection will not be generated if a user mistypes and corrects a keyword. |
| Match type | String | The match type applied to data identifiers (content inspection patterns and keywords/keyphrases). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document. |
| Match frequency | Integer | The minimum number of times each keyword or text pattern must be typed. |
| Process parameters | ||
| Application window titles | Advanced asset list | A list of window titles for applications where prohibited text is authorized or unauthorized to be typed. Full regular expression (regex) grammar is supported, and case-insensitive matching is used. For example, entering "con(fidential|tent)" would match all window titles containing the words "confidential" or "content". |
| Binary names | Advanced asset list | A list of binary names (e.g. chrome.exe) where users are authorized or unauthorized to type unauthorized keywords. Case-insensitive matching is used. |
No default MITRE ATT&CK indicators. Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Disabled |
| Cluster by content | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Unauthorized text typed into website
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows or macOS, Agent version 10.1.1 or later
Detects when a user types unauthorized text into a website.
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of SaaS apps on which users are authorized or unauthorized to type the specified text. Requires Agent 11.3.0+. |
| URL pattern list | Advanced asset list | A list of URL patterns for websites on which users are authorized or unauthorized to type the specified text. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| Content inspection parameters | ||
| Unauthorized text patterns | Advanced asset list | A list of text patterns a user is unauthorized to type. Full regular expression (regex) grammar is supported, and case-insensitive matching is used. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. |
| Unauthorized keywords | Advanced asset list | A list of keywords a user is unauthorized to type. Case-insensitive matching is used. Note: A detection will not be generated if a user mistypes and corrects a keyword. |
| Match type | String | The match type applied to data identifiers (content inspection patterns and keywords/keyphrases). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document. |
| Match frequency | Integer | The minimum number of times each keyword or text pattern must be typed. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/ |
T1567 (Exfiltration Over Web Service)
attack.mitre.org/techniques/T1567/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Disabled |
| Cluster by domain name | Disabled |
| Cluster by content | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot