Operate more efficiently, reduce complexity, improve EBIDTA, and much more with the purpose-built platform for MSPs.
Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.
Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.
Join fellow IT pros at ConnectWise industry & customer events!
Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.
Search our resource center for the latest MSP ebooks, white papers, infographics, webinars and more!
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
5/31/2022 | 2 Minute Read
Topics:
Every end user has at least one thing in common—they must log in to their devices. The high number of logins in any organization inherently makes the process vulnerable to cyberthreats. On top of that, you have to trust that every end user is being a responsible user. That’s a lot of moving parts and fine details to track.
MFA and role-based security (if set up correctly) are extremely valuable to protect credentials and decrease vulnerability, but outside of those protections, how can you identify potentially malicious behavior?
As a security-first company, we dedicate engineering resources to ensure top-notch security in our products, so you can deliver top-notch security to your customers’ systems. ConnectWise Control, the industry’s most powerful and top-rated remote support toolset, has two critical tools for next-level protection—audit logs and triggers.
Part of cyberthreat protection is seeing what’s happening during sessions, who is logging in from where, and attempted logins with incorrect passwords. That’s where audit logs come in, and they help in at least two ways: First, they can alert you to potential problems so you can proactively fix issues; and second, they are useful in finding the root cause and faster action when a threat actor inevitably sneaks into a system with compromised credentials. (Remember, with the increased activity in threat group activity, we are all in a “not if but when” situation.)
Control includes two basic categories of audit logs that you can easily access:
1. Basic auditing
2. Extended auditing
Accessing these details in a user-friendly, searchable way gives you high-level visibility that helps you spot out-of-the ordinary and potentially malicious activity and act faster when a breach occurs.
Audit logs can only track the processes and tools you already have in place, so it’s important to follow a few guidelines.
1. Be diligent with your security permission discipline. Giving access to areas to just those that need it will decrease the chance of compromise.
2. Monitor your audit logs regularly so you are familiar with your regular “volume” (especially commands run outside of a session). This way it’ll be easier to detect if additional actions are being taken in addition to your regular remote access activities.
3. Regularly review audit logs and watch for specific event details, which is key for securely using remote access tools. Watch for events such as:
As you know, triggers generate responses to corresponding events. For example, if a user changes their password, a trigger could automatically send an email, publish a web post to the internet, or add a session event. Dynamic triggers are built inside of extensions and can be used to create a special trigger for use with an extension.
Control provides a series of out-of-the-box triggers in two varieties: session triggers and security triggers.
Session triggers include:
Security triggers include:
These triggers will cover the basics, but we know they can’t cover everything. Your business likely caters to specific industries with specific compliance needs, so Control includes the ability to create custom triggers as well.
ConnectWise Control is a powerful tool in and of itself, but there are two parts of the ConnectWise ecosystem that can add even more power and, well, control. Two Control-compatible solutions are outlined below. To learn more about how they work together, watch our webinar “Secure, Connected, In Control Identify Potential Threats.”
Perch, a ConnectWise solution, is a co-managed network threat and detection response platform. When used with Control, Perch monitors the frequency and location of the triggers, which adds even more visibility into security issues and vulnerabilities across all your clients. The solution is supported by the ConnectWise SOC.
Working as an extension of your team, our certified security analysts, cutting-edge threat intelligence, and latest solutions will manage all your security monitoring, 24/7. Your clients will be more secure and you’ll have more resources to scale and grow your business.