What are "dual-use tool" detection rules?

NAVIGATION  Alerts

SECURITY   Datto EDR subscription with administrator or analyst-level platform access or Datto AV subscription with administrator or analyst-level platform access

IMPORTANT  Specific retention periods apply to all record types in Datto EDR and Datto AV. For more information, refer to Datto EDR and Datto AV data retention policies.

This article describes the purpose of the Dual-use tools detection rule and provides examples of business applications that may trigger the rule within a client's environment.

What are dual-use tools?

Dual-use tools are software applications that threat actors employ to facilitate their attacks. These programs are legitimate software applications capable of performing network, service, and process discovery, facilitating remote support sessions between a service desk and an endpoint, copying files, and carrying out many other remote activities. However, malicious individuals can employ these tools to perform reconnaissance of a target, breach its network, and carry out post-exploitation activities such as data exfiltration and malware deployment.

How does the detection rule work?

The Dual-use tools rule watches monitored endpoints for the execution of any processes known to be associated with dual-use applications. In their default configuration, these rules use observable behavior only; the Endpoint Security agent logs its observations of the process but does not raise alerts or deploy response actions. When using dual-use tool rules in your environment, we recommend reviewing the settings and enabling alerting and response actions as needed.

When transitioning a rule to an actionable stance, it's important to understand that the default response recommendations are aggressive and not intended for organizations that permit the use of these programs. Although the Endpoint Security platform categorizes the severity of dual-use tool activity as "medium," potential response actions include terminating the application's processes, quarantining its executable files, and isolating the endpoint from the network to prevent threat actors from engaging in post-exploitation activities.

Dual-use applications

The Endpoint Security solution includes detection rules that you can leverage to monitor for activity from the following dual-use tools:

Protecting your users

Implement strict controls over which dual-use tools are allowed in your environment, the purposes for which they may be used, and who can use them. Regularly audit and approve remote control applications. Employ the principle of least privilege to keep your users and infrastructure safe.