{"id":5344,"date":"2023-05-24T15:26:06","date_gmt":"2023-05-24T13:26:06","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=5344"},"modified":"2023-05-25T10:27:44","modified_gmt":"2023-05-25T08:27:44","slug":"ako-vytazit-maximum-z-xdr-nastroja-eset-inspect","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/","title":{"rendered":"Ako vy\u0165a\u017ei\u0165 maximum z XDR n\u00e1stroja ESET Inspect?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-1-1024x536.jpg\" alt=\"BVF XDR nahladovy obrazok\" class=\"wp-image-5345\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-1-1024x536.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-1-300x157.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-1-768x402.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-1-370x194.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-1-760x398.jpg 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-1.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>Prev\u00e1dzkovanie konzoly ur\u010denej na roz\u0161\u00edren\u00fa detekciu a reakciu si vy\u017eaduje akt\u00edvny pr\u00edstup IT administr\u00e1torov k hrozb\u00e1m. <\/em><\/p>\n\n\n\n<p>Pou\u017e\u00edvanie n\u00e1stroja roz\u0161\u00edrenej detekcie a reakcie (XDR), ako je napr\u00edklad&nbsp;<a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/xdr-rozsirena-detekcia-a-reakcia\/\" target=\"_blank\" rel=\"noreferrer noopener\">ESET Inspect<\/a>, je v\u00fdznamn\u00fdm krokom vpred pri&nbsp;vylep\u0161ovan\u00ed IT&nbsp;zabezpe\u010denia. Ak pri&nbsp;pou\u017e\u00edvan\u00ed bezpe\u010dnostn\u00fdch produktov pova\u017eujete za&nbsp;dostato\u010dn\u00fd v\u00fdstup len inform\u00e1cie o&nbsp;tom, \u017ee do\u0161lo k&nbsp;detekci\u00e1m, zablokovaniu hrozieb a&nbsp;odstr\u00e1neniu \u0161kodliv\u00fdch s\u00faborov, potom je v\u00e1\u0161 postoj k&nbsp;zabezpe\u010deniu zv\u00e4\u010d\u0161a pas\u00edvny. Tak\u00fdto pr\u00edstup nie je ide\u00e1lny, no d\u00e1 sa ch\u00e1pa\u0165, ak IT&nbsp;pracovn\u00edci organiz\u00e1cie nemaj\u00fa \u010das alebo dostato\u010dn\u00e9 technick\u00e9 zru\u010dnosti na&nbsp;to, aby sa akt\u00edvnej\u0161ie podie\u013eali na&nbsp;spr\u00e1ve zabezpe\u010denia.<\/p>\n\n\n\n<p>Rozhodnutie investova\u0165 do&nbsp;rie\u0161enia roz\u0161\u00edrenej detekcie a reakcie v\u0161ak nazna\u010duje racion\u00e1lny z\u00e1ujem o&nbsp;podrobnej\u0161ie inform\u00e1cie t\u00fdkaj\u00face sa ochrany. Produkt na&nbsp;detekciu a&nbsp;reakciu poskytuje IT&nbsp;spr\u00e1vcom preh\u013ead o&nbsp;udalostiach na&nbsp;po\u010d\u00edta\u010di, ako s\u00fa spusten\u00e9 skripty a&nbsp;pr\u00edkazy, po\u017eiadavky HTTP(S), pripojenia TCP\/IP, po\u017eiadavky DNS, \u00fapravy registra, oper\u00e1cie so&nbsp;s\u00fabormi, zmeny procesov a&nbsp;podobne.<\/p>\n\n\n\n<p>Obr\u00e1zok \u010d.&nbsp;1 zobrazuje \u010das\u0165 komplexn\u00e9ho zoznamu udalost\u00ed, ktor\u00e9 ESET Inspect zaznamen\u00e1va.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large has-lightbox\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"572\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-1-ESET-Inspect-keeps-track-of-a-comprehensive-list-of-events-1024x572.png\" alt=\"\" class=\"wp-image-5357\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-1-ESET-Inspect-keeps-track-of-a-comprehensive-list-of-events-1024x572.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-1-ESET-Inspect-keeps-track-of-a-comprehensive-list-of-events-300x168.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-1-ESET-Inspect-keeps-track-of-a-comprehensive-list-of-events-768x429.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-1-ESET-Inspect-keeps-track-of-a-comprehensive-list-of-events-1536x858.png 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-1-ESET-Inspect-keeps-track-of-a-comprehensive-list-of-events-2048x1145.png 2048w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-1-ESET-Inspect-keeps-track-of-a-comprehensive-list-of-events-370x207.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-1-ESET-Inspect-keeps-track-of-a-comprehensive-list-of-events-760x425.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-1-ESET-Inspect-keeps-track-of-a-comprehensive-list-of-events-270x152.png 270w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d. 1 ESET Inspect sleduje komplexn\u00fd zoznam udalost\u00ed.<\/em><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Aby sa vo&nbsp;v\u0161etk\u00fdch t\u00fdchto d\u00e1tach dalo zorientova\u0165, s\u00fa\u010das\u0165ou produktu na&nbsp;detekciu a&nbsp;reakciu s\u00fa aj&nbsp;pravidl\u00e1 na&nbsp;ur\u010denie konkr\u00e9tnych udalost\u00ed alebo sekvenci\u00ed udalost\u00ed, ktor\u00e9 s\u00fa podozriv\u00e9 alebo ktor\u00e9 je potrebn\u00e9 monitorova\u0165. Ke\u010f\u017ee sa na\u0161e rie\u0161enie XDR dok\u00e1\u017ee pripoji\u0165 k&nbsp;syst\u00e9mu <a href=\"https:\/\/help.eset.com\/glossary\/sk-SK\/technology_livegrid.html\" target=\"_blank\" rel=\"noreferrer noopener\">ESET LiveGrid<\/a>, bezpe\u010dnostn\u00ed technici spolo\u010dnosti ESET vyladili pravidl\u00e1 ESET Inspect tak, aby v&nbsp;relevantn\u00fdch pr\u00edpadoch zoh\u013ead\u0148ovali reput\u00e1ciu a&nbsp;popularitu spustite\u013en\u00fdch s\u00faborov.<\/p>\n\n\n\n<p>Obr\u00e1zok \u010d.&nbsp;2 ukazuje, ako pravidl\u00e1 ur\u010duj\u00fa prioritu udalost\u00ed, ktor\u00e9 vid\u00ed IT&nbsp;spr\u00e1vca pracuj\u00faci s&nbsp;konzolou ESET Inspect.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large has-lightbox\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-2-ESET-Inspect_corrected_defenders-1024x564.png\" alt=\"\" class=\"wp-image-5358\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-2-ESET-Inspect_corrected_defenders-1024x564.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-2-ESET-Inspect_corrected_defenders-300x165.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-2-ESET-Inspect_corrected_defenders-768x423.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-2-ESET-Inspect_corrected_defenders-1536x846.png 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-2-ESET-Inspect_corrected_defenders-370x204.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-2-ESET-Inspect_corrected_defenders-760x418.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-2-ESET-Inspect_corrected_defenders.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d. 2 Pravidl\u00e1 v&nbsp;konzole ESET Inspect vyvol\u00e1vaj\u00fa detekcie pre&nbsp;udalosti, ktor\u00e9 by nemali ujs\u0165 pozornosti bezpe\u010dnostn\u00fdch pracovn\u00edkov.<\/em><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Po&nbsp;po\u010diato\u010dnom nasaden\u00ed, a\u017e k\u00fdm sa rie\u0161enie XDR neoptimalizuje, bude pravdepodobne ve\u013ea detekci\u00ed vyvol\u00e1van\u00fdch ne\u0161kodn\u00fdmi udalos\u0165ami. V&nbsp;nasleduj\u00facich riadkoch budeme odkazova\u0165 na&nbsp;rie\u0161enie XDR od&nbsp;spolo\u010dnosti ESET, ak neuvedieme inak.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Optimaliz\u00e1cia detekcie a reakcie pre va\u0161e prostredie<\/h3>\n\n\n\n<p>Po\u010d\u00edta\u010de v&nbsp;sie\u0165ach ka\u017edej organiz\u00e1cie be\u017ene vytv\u00e1raj\u00fa aj&nbsp;ne\u0161kodn\u00e9 udalosti. Prvou \u00falohou IT&nbsp;spr\u00e1vcu je teda presk\u00fama\u0165 jednotliv\u00e9 detekcie a&nbsp;zisti\u0165, \u010do je pre&nbsp;dan\u00fa firmu v&nbsp;medziach norm\u00e1lnosti.<\/p>\n\n\n\n<p>Obr\u00e1zok \u010d.&nbsp;3 napr\u00edklad zobrazuje detekcie vyvolan\u00e9 pravidlom na&nbsp;reportovanie <a href=\"https:\/\/attack.mitre.org\/techniques\/T1016\/\" target=\"_blank\" rel=\"noreferrer noopener\">pokusov o&nbsp;zistenie podrobnost\u00ed o&nbsp;konfigur\u00e1cii siete v&nbsp;r\u00e1mci syst\u00e9mu<\/a>, \u010do je technika be\u017ene pou\u017e\u00edvan\u00e1 kybernetick\u00fdm \u0161pion\u00e1\u017enym malv\u00e9rom \u010di ransomv\u00e9rom, no a&nbsp;v&nbsp;tomto pr\u00edpade slu\u017ebou Lenovo Vantage.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large has-lightbox\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-3-correctedESET-Inspect-rule-1024x564.png\" alt=\"\" class=\"wp-image-5359\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-3-correctedESET-Inspect-rule-1024x564.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-3-correctedESET-Inspect-rule-300x165.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-3-correctedESET-Inspect-rule-768x423.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-3-correctedESET-Inspect-rule-1536x846.png 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-3-correctedESET-Inspect-rule-370x204.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-3-correctedESET-Inspect-rule-760x418.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-3-correctedESET-Inspect-rule.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d. 3 Detekcia slu\u017eby Lenovo Vantage na&nbsp;z\u00e1klade pravidla v&nbsp;ESET Inspect.<\/em><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Ak organiz\u00e1cia povo\u013euje pou\u017e\u00edvanie aplik\u00e1cie Lenovo Vantage, IT&nbsp;spr\u00e1vca m\u00f4\u017ee pre&nbsp;t\u00fato aktivitu vytvori\u0165 vyl\u00fa\u010denie, ako je zn\u00e1zornen\u00e9 na&nbsp;obr\u00e1zku \u010d.&nbsp;4. V&nbsp;pr\u00edpade, \u017ee sa vo&nbsp;firme nepou\u017e\u00edvaj\u00fa \u017eiadne zariadenia Lenovo alebo sa t\u00e1to aktivita vyskytla na&nbsp;inom zariaden\u00ed ako Lenovo, ide pravdepodobne o&nbsp;podozriv\u00fa udalos\u0165.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large has-lightbox\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-4-ESET-Inspect-exclusion-Lenovo-Vantage-Service-1024x564.png\" alt=\"\" class=\"wp-image-5361\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-4-ESET-Inspect-exclusion-Lenovo-Vantage-Service-1024x564.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-4-ESET-Inspect-exclusion-Lenovo-Vantage-Service-300x165.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-4-ESET-Inspect-exclusion-Lenovo-Vantage-Service-768x423.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-4-ESET-Inspect-exclusion-Lenovo-Vantage-Service-1536x846.png 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-4-ESET-Inspect-exclusion-Lenovo-Vantage-Service-370x204.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-4-ESET-Inspect-exclusion-Lenovo-Vantage-Service-760x418.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-4-ESET-Inspect-exclusion-Lenovo-Vantage-Service.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d. 4 Vytv\u00e1ranie vyl\u00fa\u010denia v&nbsp;ESET Inspect pre&nbsp;slu\u017ebu Lenovo Vantage.<\/em><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Na&nbsp;obr\u00e1zku m\u00f4\u017eete vidie\u0165 vyl\u00fa\u010denie vz\u0165ahuj\u00face sa len na&nbsp;verziu 3.13.14.0 slu\u017eby Lenovo Vantage, ale ak chcete vyl\u00fa\u010di\u0165 v\u0161etky verzie, z&nbsp;cesty procesu vyma\u017ete cel\u00e9 \u010d\u00edslo verzie. Pri vytv\u00e1ran\u00ed vyl\u00fa\u010denia je potrebn\u00e9 n\u00e1js\u0165 rovnov\u00e1hu medzi rizikom nezachytenia probl\u00e9mu a&nbsp;mno\u017estvom hl\u00e1sen\u00fdch udalost\u00ed. S&nbsp;podobnou vo\u013ebou sa budete stret\u00e1va\u0165 opakovane pri&nbsp;pou\u017e\u00edvan\u00ed akejko\u013evek konzoly XDR.<\/p>\n\n\n\n<p>Vytvorenie v\u0161etk\u00fdch vyl\u00fa\u010den\u00ed pre&nbsp;z\u00e1kladn\u00fd s\u00fabor o\u010dak\u00e1van\u00fdch udalost\u00ed v&nbsp;r\u00e1mci va\u0161ej organiz\u00e1cie si vy\u017eaduje \u010das. Hoci by IT&nbsp;spr\u00e1vcovia mali dba\u0165 na&nbsp;obozn\u00e1menie sa so&nbsp;sie\u0165ou svojej organiz\u00e1cie prostredn\u00edctvom manu\u00e1lnej kontroly detekci\u00ed a&nbsp;pr\u00edpadn\u00e9ho vytvorenia ich vyl\u00fa\u010den\u00ed, ESET Inspect pon\u00faka <a href=\"https:\/\/help.eset.com\/ei_navigate\/1.7\/en-US\/login.html#:~:text=up%20rules%20later.-,Rule%20learning%20mode,-Learning%20mode%20automatically\" target=\"_blank\" rel=\"noreferrer noopener\">u\u010diaci sa re\u017eim<\/a>, ktor\u00fd automatizuje vytv\u00e1ranie vyl\u00fa\u010den\u00ed a&nbsp;dokonca obsahuje predpripraven\u00e9 vyl\u00fa\u010denia, ktor\u00e9 mo\u017eno povoli\u0165. V\u0161etky automaticky vytvoren\u00e9 vyl\u00fa\u010denia by v\u0161ak mali by\u0165 dodato\u010dne skontrolovan\u00e9 IT&nbsp;spr\u00e1vcom.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Maximaliz\u00e1cia \u00fa\u017eitku v\u010faka vlastn\u00fdm pravidl\u00e1m<\/h3>\n\n\n\n<p>Hoci nov\u00e9 verzie ESET Inspect zvy\u010dajne prin\u00e1\u0161aj\u00fa aj nov\u00e9 pravidl\u00e1, IT&nbsp;spr\u00e1vcovia nemusia \u010daka\u0165 a&nbsp;m\u00f4\u017eu si kedyko\u013evek vytvori\u0165 vlastn\u00e9. ESET Inspect pom\u00e1ha bezpe\u010dnostn\u00fdm pracovn\u00edkom t\u00fdm, \u017ee im poskytuje podrobn\u00fd preh\u013ead o&nbsp;udalostiach a&nbsp;z\u00e1rove\u0148 im na&nbsp;z\u00e1klade vlastn\u00fdch pravidiel a&nbsp;vyl\u00fa\u010den\u00ed umo\u017e\u0148uje rozhodova\u0165 o&nbsp;tom, \u010do je potrebn\u00e9 monitorova\u0165. Spr\u00e1vcovia m\u00f4\u017eu dokonca vyladi\u0165 predvolen\u00e9 a&nbsp;vlastn\u00e9 pravidl\u00e1 pomocou akci\u00ed s&nbsp;vysokou \u00farov\u0148ou pr\u00edsnosti, medzi ktor\u00e9 patr\u00ed ukon\u010denie procesov, zablokovanie procesov pod\u013ea hodnoty hash a&nbsp;izolovanie po\u010d\u00edta\u010dov od&nbsp;siete.<\/p>\n\n\n\n<p>Pr\u00e1ve takto organiz\u00e1cie najviac profituj\u00fa z&nbsp;invest\u00edcie do&nbsp;<a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/xdr-rozsirena-detekcia-a-reakcia\/\" target=\"_blank\" rel=\"noreferrer noopener\">ESET Inspect<\/a>: p\u00edsan\u00edm pravidiel, ktor\u00e9 pokryj\u00fa pre&nbsp;ne najd\u00f4le\u017eitej\u0161ie oblasti riz\u00edk. Uk\u00e1\u017eeme si to na&nbsp;nov\u00fdch pravidl\u00e1ch, ktor\u00e9 poch\u00e1dzaj\u00fa z&nbsp;dielne bezpe\u010dnostn\u00fdch technikov spolo\u010dnosti ESET.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Nov\u00e9 pravidl\u00e1 ESET Inspect pre&nbsp;s\u00fabory LNK v&nbsp;pripojen\u00fdch obrazoch disku (ISO)<\/h3>\n\n\n\n<p>V&nbsp;apr\u00edli 2022 spolo\u010dnos\u0165 ESET odhalila, \u017ee malv\u00e9r Emotet <a href=\"https:\/\/www.welivesecurity.com\/2022\/06\/16\/how-emotet-is-changing-tactics-microsoft-tightening-office-macro-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">experimentuje s&nbsp;technikou na&nbsp;ob\u00eddenie tzv.&nbsp;zna\u010dky webu (MOTW)<\/a> prostredn\u00edctvom zasielania s\u00faborov odkazu (LNK) v&nbsp;e\u2011mailov\u00fdch pr\u00edloh\u00e1ch. So&nbsp;s\u00fabormi LNK, ale v&nbsp;obrazoch ISO, experimentovali aj&nbsp;in\u00e9 druhy \u0161kodliv\u00fdch k\u00f3dov, napr\u00edklad BumbleBee, Qbot a&nbsp;BazarLoader.<\/p>\n\n\n\n<p>Ke\u010f\u017ee ESET Inspect dok\u00e1\u017ee monitorova\u0165 s\u00fabory typu LNK a&nbsp;detegova\u0165 pripojen\u00e9 obrazy disku vo&nbsp;form\u00e1te ISO (pod&nbsp;premenn\u00fdmi prostredia %CDROM% a&nbsp;%RemovableDrive%), ide o&nbsp;skvel\u00fa pr\u00edle\u017eitos\u0165 na&nbsp;nap\u00edsanie nov\u00fdch pravidiel, ktor\u00e9 dok\u00e1\u017eu odsledova\u0165 t\u00fato techniku. Prejdime si \u0161tyri nov\u00e9 pravidl\u00e1, ktor\u00e9 prin\u00e1\u0161a ESET Inspect vo&nbsp;verzii 1.9.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. Mo\u017en\u00e9 zneu\u017eitie s\u00faboru LNK z&nbsp;obrazu ISO \u2013 Side-loading kni\u017enice DLL [D0451]<\/h4>\n\n\n\n<p>Toto pravidlo monitoruje na\u010d\u00edtavanie podozrivej kni\u017enice DLL d\u00f4veryhodn\u00fdm procesom spusten\u00fdm z&nbsp;vymenite\u013enej jednotky alebo CD\u2011ROM jednotky (vr\u00e1tane pripojen\u00e9ho obrazu ISO), pri\u010dom jemu nadraden\u00fd proces bol spusten\u00fd s\u00faborom LNK na&nbsp;vymenite\u013enej jednotke alebo CD\u2011ROM jednotke.<\/p>\n\n\n\n<p>Obr\u00e1zok \u010d.&nbsp;5 zobrazuje testovanie tohto pravidla na&nbsp;<a href=\"https:\/\/unit42.paloaltonetworks.com\/brute-ratel-c4-tool\/\">mechanizme zav\u00e1dzania \u0161kodliv\u00e9ho <\/a><a href=\"https:\/\/unit42.paloaltonetworks.com\/brute-ratel-c4-tool\/\" target=\"_blank\" rel=\"noreferrer noopener\">k\u00f3du<\/a><a href=\"https:\/\/unit42.paloaltonetworks.com\/brute-ratel-c4-tool\/\"> Brute Ratel C4<\/a>. K&nbsp;detekcii d\u00f4jde po&nbsp;spusten\u00ed re\u0165azca udalost\u00ed dvojit\u00fdm kliknut\u00edm na&nbsp;s\u00fabor&nbsp;LNK v&nbsp;pripojenom obraze ISO, ktor\u00fd obsahuje tri d\u00f4le\u017eit\u00e9 komponenty:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li>Roshan-Bandara_CV_Dialog.lnk<\/li>\n\n\n\n<li>onedriveupdater.exe<\/li>\n\n\n\n<li>DLL \u2013 version.dll<\/li>\n<\/ol>\n\n\n\n<p>V&nbsp;tomto pr\u00edpade je pravidlo vyvolan\u00e9 z&nbsp;d\u00f4vodu, \u017ee podozriv\u00fd s\u00fabor version.dll je na\u010d\u00edtan\u00fd d\u00f4veryhodn\u00fdm procesom spustite\u013en\u00e9ho s\u00faboru onedriveupdater.exe. K&nbsp;jeho spusteniu d\u00f4jde na&nbsp;z\u00e1klade procesu cmd.exe, ktor\u00fd obe\u0165 spustila dvojit\u00fdm kliknut\u00edm na&nbsp;s\u00fabor Roshan-Bandara_CV_Dialog.lnk.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large has-lightbox\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-5-Possible_LNK_Abuse_from_ISO_-_Side-Loading_DLL__D0451__-_Brute_Ratel_C4-1024x564.png\" alt=\"\" class=\"wp-image-5362\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-5-Possible_LNK_Abuse_from_ISO_-_Side-Loading_DLL__D0451__-_Brute_Ratel_C4-1024x564.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-5-Possible_LNK_Abuse_from_ISO_-_Side-Loading_DLL__D0451__-_Brute_Ratel_C4-300x165.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-5-Possible_LNK_Abuse_from_ISO_-_Side-Loading_DLL__D0451__-_Brute_Ratel_C4-768x423.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-5-Possible_LNK_Abuse_from_ISO_-_Side-Loading_DLL__D0451__-_Brute_Ratel_C4-1536x846.png 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-5-Possible_LNK_Abuse_from_ISO_-_Side-Loading_DLL__D0451__-_Brute_Ratel_C4-370x204.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-5-Possible_LNK_Abuse_from_ISO_-_Side-Loading_DLL__D0451__-_Brute_Ratel_C4-760x418.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-5-Possible_LNK_Abuse_from_ISO_-_Side-Loading_DLL__D0451__-_Brute_Ratel_C4.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d. 5 ESET Inspect deteguje dvojit\u00e9 kliknutie na&nbsp;s\u00fabor LNK v&nbsp;pripojenom obraze ISO, ktor\u00e9ho v\u00fdsledkom je zavedenie malv\u00e9ru Brute Ratel C4 (detegovan\u00e9ho ako Generik.FJSHEHD).<\/em><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>T\u00fdmto pravidlom sa zis\u0165uje <a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/002\/\" target=\"_blank\" rel=\"noreferrer noopener\">tzv.&nbsp;side\u2011loading kni\u017enice DLL<\/a>, technika, pri&nbsp;ktorej \u00fato\u010dn\u00edk spust\u00ed legit\u00edmny spustite\u013en\u00fd s\u00fabor a&nbsp;zneu\u017eije jeho po\u017eiadavku na&nbsp;na\u010d\u00edtanie konkr\u00e9tneho s\u00faboru DLL t\u00fdm, \u017ee umiestni \u0161kodliv\u00fd s\u00fabor DLL s&nbsp;po\u017eadovan\u00fdm n\u00e1zvom do&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/dlls\/dynamic-link-library-search-order?redirectedfrom=MSDN\" target=\"_blank\" rel=\"noreferrer noopener\">predp\u00edsan\u00e9ho poradia na\u010d\u00edtania<\/a> sk\u00f4r ako legit\u00edmny s\u00fabor DLL. V&nbsp;tomto pr\u00edpade bol \u0161kodliv\u00fd s\u00fabor DLL umiestnen\u00fd do&nbsp;rovnak\u00e9ho adres\u00e1ra ako spustite\u013en\u00fd s\u00fabor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2. Mo\u017en\u00e9 zneu\u017eitie s\u00faboru LNK z&nbsp;obrazu ISO \u2013 Syst\u00e9mov\u00e9 bin\u00e1rne s\u00fabory ako prostriedok sp\u00fa\u0161\u0165ania [D0452]<\/h4>\n\n\n\n<p>Toto pravidlo monitoruje podozriv\u00fa kni\u017enicu DLL sp\u00fa\u0161\u0165an\u00fa syst\u00e9mov\u00fdm bin\u00e1rnym s\u00faborom rundll32.exe, regsvr32.exe alebo odbcconf.exe, ktor\u00fd bol na&nbsp;za\u010diatku spusten\u00fd dvojit\u00fdm kliknut\u00edm na&nbsp;s\u00fabor LNK, pri\u010dom s\u00fabor LNK aj kni\u017enica DLL sa nach\u00e1dzaj\u00fa na&nbsp;vymenite\u013enej jednotke alebo CD\u2011ROM jednotke.<\/p>\n\n\n\n<p>Obr\u00e1zok \u010d.&nbsp;6 zobrazuje testovanie tohto pravidla na&nbsp;<a href=\"https:\/\/www.securonix.com\/blog\/securonix-threat-labs-initial-coverage-advisory-analysis-and-detection-of-bumblebee-loader-using-securonix\/\" target=\"_blank\" rel=\"noreferrer noopener\">mechanizme zav\u00e1dzania \u0161kodliv\u00e9ho k\u00f3du BumbleBee<\/a>. K&nbsp;detekcii d\u00f4jde po&nbsp;spusten\u00ed re\u0165azca udalost\u00ed dvojit\u00fdm kliknut\u00edm na&nbsp;s\u00fabor&nbsp;LNK v&nbsp;pripojenom obraze ISO, ktor\u00fd obsahuje dva d\u00f4le\u017eit\u00e9 komponenty:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li>S\u00fabor LNK \u2013 project requirements.lnk<\/li>\n\n\n\n<li>DLL \u2013 start.dll<\/li>\n<\/ol>\n\n\n\n<p>V&nbsp;tomto pr\u00edpade je pravidlo vyvolan\u00e9 z&nbsp;d\u00f4vodu, \u017ee podozriv\u00fd s\u00fabor start.dll sa spust\u00ed na&nbsp;z\u00e1klade procesu spustite\u013en\u00e9ho s\u00faboru odbcconf.exe, ktor\u00fd obe\u0165 spustila dvojit\u00fdm kliknut\u00edm na&nbsp;s\u00fabor project requirements.lnk. S\u00fabory LNK aj&nbsp;DLL sa nach\u00e1dzaj\u00fa v&nbsp;pripojenom obraze disku (ISO).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large has-lightbox\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"462\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-6-Possible_LNK_Abuse_from_ISO_-_System_Binary_Proxy_Execution__D0452__-_BumbleBee-1024x462.png\" alt=\"\" class=\"wp-image-5363\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-6-Possible_LNK_Abuse_from_ISO_-_System_Binary_Proxy_Execution__D0452__-_BumbleBee-1024x462.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-6-Possible_LNK_Abuse_from_ISO_-_System_Binary_Proxy_Execution__D0452__-_BumbleBee-300x135.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-6-Possible_LNK_Abuse_from_ISO_-_System_Binary_Proxy_Execution__D0452__-_BumbleBee-768x346.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-6-Possible_LNK_Abuse_from_ISO_-_System_Binary_Proxy_Execution__D0452__-_BumbleBee-1536x693.png 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-6-Possible_LNK_Abuse_from_ISO_-_System_Binary_Proxy_Execution__D0452__-_BumbleBee-370x167.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-6-Possible_LNK_Abuse_from_ISO_-_System_Binary_Proxy_Execution__D0452__-_BumbleBee-760x343.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-6-Possible_LNK_Abuse_from_ISO_-_System_Binary_Proxy_Execution__D0452__-_BumbleBee.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d. 6 ESET Inspect deteguje dvojit\u00e9 kliknutie na&nbsp;s\u00fabor LNK v&nbsp;pripojenom obraze ISO, ktor\u00e9ho v\u00fdsledkom je zavedenie malv\u00e9ru BumbleBee (detegovan\u00e9ho ako Win64\/Kryptik.DFD).<\/em><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>T\u00fdmto pravidlom sa zis\u0165uje zneu\u017eitie d\u00f4veryhodn\u00fdch syst\u00e9mov\u00fdch bin\u00e1rnych s\u00faborov ako prostriedku na&nbsp;sp\u00fa\u0161\u0165anie \u0161kodliv\u00fdch s\u00faborov DLL.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3. Mo\u017en\u00e9 zneu\u017eitie s\u00faboru LNK z&nbsp;obrazu ISO \u2013 Bin\u00e1rny s\u00fabor LOLBin [D0453]<\/h4>\n\n\n\n<p>Toto pravidlo monitoruje proces so&nbsp;spusten\u00fdm bin\u00e1rnym s\u00faborom <a href=\"https:\/\/github.com\/LOLBAS-Project\/LOLBAS\" target=\"_blank\" rel=\"noreferrer noopener\">LOLBin (Living Off the Land Binary)<\/a>, pri\u010dom jemu nadraden\u00fd proces bol spusten\u00fd s\u00faborom LNK na&nbsp;vymenite\u013enej jednotke alebo CD\u2011ROM jednotke.<\/p>\n\n\n\n<p>Obr\u00e1zok \u010d.&nbsp;7 zobrazuje testovanie tohto pravidla na&nbsp;<a href=\"https:\/\/twitter.com\/pr0xylife\/status\/1546607135089430532?s=20&amp;t=LiHT3eMH2YzE-ezeM20_Yg\" target=\"_blank\" rel=\"noreferrer noopener\">mechanizme zav\u00e1dzania \u0161kodliv\u00e9ho k\u00f3du Qbot<\/a>. K&nbsp;detekcii d\u00f4jde po&nbsp;spusten\u00ed re\u0165azca udalost\u00ed dvojit\u00fdm kliknut\u00edm na&nbsp;s\u00fabor&nbsp;LNK v&nbsp;pripojenom obraze ISO, ktor\u00fd spust\u00ed pr\u00edkazov\u00fd riadok a&nbsp;vedie k&nbsp;zneu\u017eitiu dvoch bin\u00e1rnych s\u00faborov LOLBin: regsvr32.exe a&nbsp;explorer.exe.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large has-lightbox\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-7-Possible_LNK_Abuse_from_ISO_-_Living_Off_The_Land_Binary__D0453__-_Qbot-1024x564.png\" alt=\"\" class=\"wp-image-5364\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-7-Possible_LNK_Abuse_from_ISO_-_Living_Off_The_Land_Binary__D0453__-_Qbot-1024x564.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-7-Possible_LNK_Abuse_from_ISO_-_Living_Off_The_Land_Binary__D0453__-_Qbot-300x165.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-7-Possible_LNK_Abuse_from_ISO_-_Living_Off_The_Land_Binary__D0453__-_Qbot-768x423.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-7-Possible_LNK_Abuse_from_ISO_-_Living_Off_The_Land_Binary__D0453__-_Qbot-1536x846.png 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-7-Possible_LNK_Abuse_from_ISO_-_Living_Off_The_Land_Binary__D0453__-_Qbot-370x204.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-7-Possible_LNK_Abuse_from_ISO_-_Living_Off_The_Land_Binary__D0453__-_Qbot-760x418.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-7-Possible_LNK_Abuse_from_ISO_-_Living_Off_The_Land_Binary__D0453__-_Qbot.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d. 7 ESET Inspect deteguje dvojit\u00e9 kliknutie na&nbsp;s\u00fabor LNK v&nbsp;pripojenom obraze ISO, ktor\u00e9ho v\u00fdsledkom je zavedenie malv\u00e9ru Qbot (detegovan\u00e9ho ako Win32\/Qbot.DM).<\/em><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>T\u00fdmto pravidlom sa zis\u0165uje zneu\u017eitie s\u00faborov LOLBin (Living Off the Land Binaries), teda vstavan\u00fdch n\u00e1strojov alebo bin\u00e1rnych s\u00faborov v&nbsp;r\u00e1mci opera\u010dn\u00e9ho syst\u00e9mu, v\u010faka ktor\u00e9mu sa \u00fato\u010dn\u00edci vyh\u00fdbaj\u00fa odhaleniu.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">4. Mo\u017en\u00e9 zneu\u017eitie s\u00faboru LNK z&nbsp;obrazu ISO \u2013 Spustenie pr\u00edkazu [D0455]<\/h4>\n\n\n\n<p>Toto pravidlo monitoruje proces, v&nbsp;r\u00e1mci ktor\u00e9ho je spusten\u00fd jeden z&nbsp;10&nbsp;bin\u00e1rnych s\u00faborov, napr\u00edklad cmd.exe, powershell.exe a&nbsp;rundll32.exe, pri\u010dom dan\u00fd proces bol spusten\u00fd s\u00faborom LNK na&nbsp;vymenite\u013enej jednotke alebo CD\u2011ROM jednotke.<\/p>\n\n\n\n<p>Obr\u00e1zok \u010d.&nbsp;8 zobrazuje testovanie tohto pravidla na&nbsp;<a href=\"https:\/\/www.trendmicro.com\/fr_fr\/research\/21\/k\/bazarloader-adds-compromised-installers-iso-to-arrival-delivery-vectors.html\" target=\"_blank\" rel=\"noreferrer noopener\">mechanizme zav\u00e1dzania \u0161kodliv\u00e9ho k\u00f3du BazarLoader<\/a>. K&nbsp;detekcii d\u00f4jde po&nbsp;za\u010dat\u00ed procesu spustite\u013en\u00e9ho s\u00faboru rundll32.exe vyvolan\u00e9ho dvojit\u00fdm kliknut\u00edm na&nbsp;s\u00fabor&nbsp;LNK v&nbsp;pripojenom obraze ISO.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large has-lightbox\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"462\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-8-Possible_LNK_Abuse_from_ISO_-_Command_Execution__D0455__-_BazarLoader-1024x462.png\" alt=\"\" class=\"wp-image-5365\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-8-Possible_LNK_Abuse_from_ISO_-_Command_Execution__D0455__-_BazarLoader-1024x462.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-8-Possible_LNK_Abuse_from_ISO_-_Command_Execution__D0455__-_BazarLoader-300x135.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-8-Possible_LNK_Abuse_from_ISO_-_Command_Execution__D0455__-_BazarLoader-768x346.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-8-Possible_LNK_Abuse_from_ISO_-_Command_Execution__D0455__-_BazarLoader-1536x693.png 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-8-Possible_LNK_Abuse_from_ISO_-_Command_Execution__D0455__-_BazarLoader-370x167.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-8-Possible_LNK_Abuse_from_ISO_-_Command_Execution__D0455__-_BazarLoader-760x343.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/Figure-8-Possible_LNK_Abuse_from_ISO_-_Command_Execution__D0455__-_BazarLoader.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok \u010d. 8 ESET Inspect deteguje dvojit\u00e9 kliknutie na&nbsp;s\u00fabor LNK v&nbsp;pripojenom obraze ISO, ktor\u00e9ho v\u00fdsledkom je zavedenie malv\u00e9ru BazarLoader (detegovan\u00e9ho ako Win64\/Kryptik.CRF).<\/em><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>T\u00fdmto pravidlom sa zis\u0165uje zneu\u017eitie s\u00faboru LNK v&nbsp;pripojenom obraze ISO na&nbsp;<a href=\"https:\/\/attack.mitre.org\/techniques\/T1553\/005\/\" target=\"_blank\" rel=\"noreferrer noopener\">ob\u00eddenie zna\u010dky webu (MOTW)<\/a> a&nbsp;spustenie pr\u00edkazu prostredn\u00edctvom d\u00f4veryhodn\u00fdch bin\u00e1rnych s\u00faborov.<\/p>\n\n\n\n<p>IT&nbsp;spr\u00e1vcovia m\u00f4\u017eu tieto \u0161tyri pravidl\u00e1 posilni\u0165 zahrnut\u00edm akcie na&nbsp;ukon\u010denie kompromitovan\u00e9ho procesu (\u010do bude v&nbsp;konzole ESET Inspect vo&nbsp;verzii 1.10 u\u017e predvolen\u00e1 akcia). Zaist\u00ed sa tak ochrana pred nov\u00fdm alebo nezn\u00e1mym typom malv\u00e9ru, ktor\u00fd e\u0161te bezpe\u010dnostn\u00fd produkt pre&nbsp;koncov\u00e9 zariadenia neodhalil.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Zop\u00e1r my\u0161lienok na z\u00e1ver<\/h3>\n\n\n\n<p>Ak bud\u00fa IT&nbsp;spr\u00e1vcovia pozorne sledova\u0165 nov\u00e9 a&nbsp;\u010doraz akt\u00edvnej\u0161ie \u0161kodliv\u00e9 techniky a&nbsp;prilo\u017eia ruku k&nbsp;dielu pri&nbsp;tvorbe pravidiel na&nbsp;ich detekciu, m\u00f4\u017eu prispie\u0165 k&nbsp;tomu, aby ich organiz\u00e1cia vyu\u017e\u00edvala invest\u00edciu do&nbsp;rie\u0161enia ESET Inspect na&nbsp;maximum. <\/p>\n\n\n\n<p>Ak sa nevenuje dodato\u010dn\u00fd \u010das vytv\u00e1raniu v\u00fdnimiek a&nbsp;p\u00edsaniu nov\u00fdch pravidiel, cel\u00fd potenci\u00e1l a&nbsp;v\u00fdhody rie\u0161enia z&nbsp;poh\u013eadu obrany nebud\u00fa naplno vyu\u017eit\u00e9. ESET Inspect je najsilnej\u0161\u00ed v&nbsp;ruk\u00e1ch akt\u00edvnych a&nbsp;usilovn\u00fdch bezpe\u010dnostn\u00fdch pracovn\u00edkov sna\u017eiacich sa dozvedie\u0165 \u010do najviac o&nbsp;sie\u0165ach, ktor\u00e9 maj\u00fa chr\u00e1ni\u0165, a&nbsp;dostato\u010dne \u0161ikovn\u00fdch na&nbsp;to, aby sa s&nbsp;najnov\u0161\u00edmi hrozbami popasovali priamo.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/protect-mdr\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_card_300_MDR.png\" alt=\"\" class=\"wp-image-4273\" width=\"299\" height=\"197\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>Nem\u00e1te \u0161pecialistov na obsluhovanie XDR? <\/strong><br><br>Na\u0161i experti sa postaraj\u00fa o v\u0161etko &#8211; in\u0161tal\u00e1ciu, konfigur\u00e1ciu, proakt\u00edvne vyh\u013ead\u00e1vanie hrozieb aj spr\u00e1vu \u0161pi\u010dkov\u00e9ho bezpe\u010dnostn\u00e9ho rie\u0161enia XDR. <\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/protect-mdr\/\" target=\"_blank\" rel=\"noreferrer noopener\">Viac o ESET PROTECT MDR<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Pre\u010d\u00edtajte si, ako vy\u0165a\u017ei\u0165 maximum z pokro\u010dil\u00e9ho rie\u0161enia roz\u0161\u00edrenej detekcie a reakcie ESET Inspect. <\/p>\n","protected":false},"author":8,"featured_media":5355,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[143],"tags":[],"class_list":["post-5344","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eset-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ako vy\u0165a\u017ei\u0165 maximum z XDR n\u00e1stroja ESET Inspect? | ESET<\/title>\n<meta name=\"description\" content=\"Prev\u00e1dzkovanie XDR konzoly ur\u010denej na roz\u0161\u00edren\u00fa detekciu a reakciu si vy\u017eaduje akt\u00edvny pr\u00edstup IT administr\u00e1torov k hrozb\u00e1m.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ako vy\u0165a\u017ei\u0165 maximum z XDR n\u00e1stroja ESET Inspect? | ESET\" \/>\n<meta property=\"og:description\" content=\"Prev\u00e1dzkovanie XDR konzoly ur\u010denej na roz\u0161\u00edren\u00fa detekciu a reakciu si vy\u017eaduje akt\u00edvny pr\u00edstup IT administr\u00e1torov k hrozb\u00e1m.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-24T13:26:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-25T08:27:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Ako vy\u0165a\u017ei\u0165 maximum z XDR n\u00e1stroja ESET Inspect?\",\"datePublished\":\"2023-05-24T13:26:06+00:00\",\"dateModified\":\"2023-05-25T08:27:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/\"},\"wordCount\":2386,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/inspect-product-blog-1200x628-2.jpg\",\"articleSection\":[\"ESET Blog\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/\",\"name\":\"Ako vy\u0165a\u017ei\u0165 maximum z XDR n\u00e1stroja ESET Inspect? | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/inspect-product-blog-1200x628-2.jpg\",\"datePublished\":\"2023-05-24T13:26:06+00:00\",\"dateModified\":\"2023-05-25T08:27:44+00:00\",\"description\":\"Prev\u00e1dzkovanie XDR konzoly ur\u010denej na roz\u0161\u00edren\u00fa detekciu a reakciu si vy\u017eaduje akt\u00edvny pr\u00edstup IT administr\u00e1torov k hrozb\u00e1m.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/inspect-product-blog-1200x628-2.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/inspect-product-blog-1200x628-2.jpg\",\"width\":1200,\"height\":628,\"caption\":\"BVF XDR ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ako vy\u0165a\u017ei\u0165 maximum z XDR n\u00e1stroja ESET Inspect?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ako vy\u0165a\u017ei\u0165 maximum z XDR n\u00e1stroja ESET Inspect? | ESET","description":"Prev\u00e1dzkovanie XDR konzoly ur\u010denej na roz\u0161\u00edren\u00fa detekciu a reakciu si vy\u017eaduje akt\u00edvny pr\u00edstup IT administr\u00e1torov k hrozb\u00e1m.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/","og_locale":"sk_SK","og_type":"article","og_title":"Ako vy\u0165a\u017ei\u0165 maximum z XDR n\u00e1stroja ESET Inspect? | ESET","og_description":"Prev\u00e1dzkovanie XDR konzoly ur\u010denej na roz\u0161\u00edren\u00fa detekciu a reakciu si vy\u017eaduje akt\u00edvny pr\u00edstup IT administr\u00e1torov k hrozb\u00e1m.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2023-05-24T13:26:06+00:00","article_modified_time":"2023-05-25T08:27:44+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-2.jpg","type":"image\/jpeg"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"11 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Ako vy\u0165a\u017ei\u0165 maximum z XDR n\u00e1stroja ESET Inspect?","datePublished":"2023-05-24T13:26:06+00:00","dateModified":"2023-05-25T08:27:44+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/"},"wordCount":2386,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-2.jpg","articleSection":["ESET Blog"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/","name":"Ako vy\u0165a\u017ei\u0165 maximum z XDR n\u00e1stroja ESET Inspect? | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-2.jpg","datePublished":"2023-05-24T13:26:06+00:00","dateModified":"2023-05-25T08:27:44+00:00","description":"Prev\u00e1dzkovanie XDR konzoly ur\u010denej na roz\u0161\u00edren\u00fa detekciu a reakciu si vy\u017eaduje akt\u00edvny pr\u00edstup IT administr\u00e1torov k hrozb\u00e1m.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-2.jpg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/05\/inspect-product-blog-1200x628-2.jpg","width":1200,"height":628,"caption":"BVF XDR ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-vytazit-maximum-z-xdr-nastroja-eset-inspect\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Ako vy\u0165a\u017ei\u0165 maximum z XDR n\u00e1stroja ESET Inspect?"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=5344"}],"version-history":[{"count":4,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5344\/revisions"}],"predecessor-version":[{"id":5369,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5344\/revisions\/5369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/5355"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=5344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=5344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=5344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}