How do I exclude COMPATTELRUNNER.EXE from this type of alert
We have turned telemetry down to 0 on Windows 10 Enterprise
Threat Target Process Name:Threat Target File Path:Event Category:Event ID:Threat Severity:Threat Name:Threat Type:Action Taken:Threat Handled:Analyzer Detection Method:
|
Events received from managed systems |
Event Description:
|
Endpoint Security |
Module Name:Analyzer Content Creation Date:Analyzer Content Version:Analyzer Rule ID:Analyzer Rule Name:Source Description:Target Hash:Target Signed:Target Signer:Target Parent Process Signed:Target Parent Process Name:Target Parent Process Hash:Target Name:Target Path:Target File Size (Bytes):Target Modify Time:Target Access Time:Target Create Time:API Name:First Action Status:Second Action Status:Description:Attack Vector Type:
|
Solved! Go to Solution.
Hello Jadedby,
Thank you for writing, From the details shared, We are looking at the exploit prevent rule "6087 - Host intrusion buffer overflow" being violated.
Unfortunately, the event formed seems to be choppy, and could not exactly figure the details.
If we are looking at Target Parent Process Name: being "COMPATTELRUNNER.EXE", Please try the below exclusion and test it on 1 machine and see if that helps
ENS Exploit Prevention policy:
Exclusion Type: illegal API Use
Process: POWERSHELL.EXE
Caller: COMPATTELRUNNER.EXE
API: AtlComPtrAssign
Was my reply helpful?
If you find this post useful, please give it a Kudos! Also, please don't forget to select "Accept as a solution" if this reply resolves your query!
Hitesh
Hello Jadedby,
Thank you for writing, From the details shared, We are looking at the exploit prevent rule "6087 - Host intrusion buffer overflow" being violated.
Unfortunately, the event formed seems to be choppy, and could not exactly figure the details.
If we are looking at Target Parent Process Name: being "COMPATTELRUNNER.EXE", Please try the below exclusion and test it on 1 machine and see if that helps
ENS Exploit Prevention policy:
Exclusion Type: illegal API Use
Process: POWERSHELL.EXE
Caller: COMPATTELRUNNER.EXE
API: AtlComPtrAssign
Was my reply helpful?
If you find this post useful, please give it a Kudos! Also, please don't forget to select "Accept as a solution" if this reply resolves your query!
Hitesh
perfect thanks
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA