Overview
Threat hunting is a proactive approach to cybersecurity that involves actively searching for signs of malicious activity within an organization's network or systems. Rather than waiting for alerts or incidents to occur, threat hunting involves systematically looking for indicators of compromise (IOCs) that may indicate an ongoing or potential security threat.
The primary goal of threat hunting is to detect threats that may have evaded traditional security measures and minimize attackers' dwell time within the network. By identifying threats early, organizations can mitigate potential damage and respond more effectively to incidents.
Threat Hunting plays a crucial role in enhancing the overall cybersecurity posture of an organization by complementing traditional security measures with proactive detection and response capabilities.
Key Benefits
Malware IoC Search: Efficiently hunt for malware Indicators of Compromise (IoCs) within your VMware backups. Quickly identify and assess potential threats
Infection Scope and Timelines: Gain insights into the scope of the infection and timelines
Quarantine infected snapshots: Automatically quarantine infected VMware snapshots to prevent reinfection and further spread of malware
βImportant: Auto-quarantine and Quarantine features are not supported for AWS Workloads (EC2 and EBS Volume).
Rich Metadata: Use the rich metadata presented in Threat Hunting results to aid investigation and incident response workflows
Our Solution
Threat Hunting is a comprehensive security feature that empowers backup administrators and infosec professionals with advanced threat hunting capabilities with focus on backup data.
The following video provides an overview of the Threat Hunting feature.
With this capability, you can create and initiate an on-demand Threat Hunt for backed-up data to search for indicators of compromise (IOCs). It also allows auto-quarantining of the impacted snapshots.
βImportant: Threat Hunting is available with a Premium Security SKU license. Contact sales or support to procure the license.
Supported Workloads for Threat Hunting
Enterprise Workloads
VMware
Windows -
Microsoft Windows Server 2022
Microsoft Windows Server 2019
Microsoft Windows Server 2016
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012
Linux -
Red Hat Enterprise Linux (RHEL) 7.0 , 7.5
CentOS 7.0 , 7.5
Ubuntu 22.04, 20.04, 18.04, 16.04, 14.04
SUSE Linux Enterprise Server 12, 12 SP3
For supported VMware file types for Threat Hunting, see Disks, partitions and, files for File Level Restore (FLR)
EC2
Windows -
Microsoft Windows Server 2022
Microsoft Windows Server 2019
Microsoft Windows Server 2016
Linux -
Red Hat Enterprise Linux (RHEL) 9.4, 9.3, 8.10
CentOS 8.5
Ubuntu 24, 22, 20
SUSE Linux Enterprise Server 15.6
Amazon Linux 2023
Amazon Linux 2 - 5.1
Debian - 12
Oracle Linux - 8.10
Fedora - 38
EBS Volume Types:
gp3, gp2, io2, io1, sc1, st1
For more information, see Feature Support EC2.
Supported Partition Types and File Systems for AWS Workloads (EC2 and EBS Volume)
Partition Types
Primary
Extended
Logical Disk Manager (LDM)
Windows
Basic disk (Partition type: MBR/GPT)
Dynamic disk (Partition type: MBR. Partition can have simple or spanned volume)
Dynamic disk (Partition type: GPT. Partition can have all volume types)
Linux
MBR (Simple/Spanned/Mirror/Striped)
GPT (Simple/Spanned/Mirror/Striped)
File Systems
NTFS
FAT
FAT32
Ext 4/3/2
XFS
Btrfs
How to use Threat Hunting?
Prerequisites
Common prerequisites (Applicable to both VMware and AWS Workloads-EC2 and EBS Volume)
Ensure that the backup is successfully completed for the required resources on which you want to run the Threat Hunt job. After the successful backup, the data is prepared for threat-hunting.
At least one of the total resources must be Threat Hunt ready to create a Threat Hunt job for a specific workload.
Prerequisites for VMware Threat Hunting
For VMware resources Threat Hunting: The VMware backup proxy version installed must be 7.0.2 or higher.
For VMware resources Threat Hunting: For backup policies with CloudCache configured, only the data synced to the Druva cloud is available for Threat Hunting. Ensure the data is synced.
Prerequisites for AWS Workloads (EC2 and EBS Volume) Threat Hunting
For AWS Workloads (EC2 and EBS Volume), the Threat Hunting feature applies to air-gap backed-up AWS resources to Druva Cloud. For more information related to airgap data protection of AWS Workloads, see Airgap Data Protection of EC2 Resources.
It takes only 4 steps to get started with this feature:
Step 1: Create a new Threat Hunt to find backed-up suspicious or malicious data.
Step 2: Monitor Threat Hunt jobs from the Threat Hunting dashboard. Use the Download Report option to analyze the scan results reported in detail.
Step 3: Auto-quarantine impacted snapshots to isolate impacted snapshots by default to prevent accidental restores and reinfection.
βImportant: Auto-quarantine and Quarantine features are not supported for AWS workloads (EC2 and EBS Volume).
Step 4: View the Threat Hunt results using the Threat Hunting Dashboard page.
Related Keywords
threathunting
VMware
EC2