IMPORTANT ANNOUNCEMENT: On May 6, 2024, Carbon Black User eXchange (UeX) and Case Management will move to a new platform!
The Community will be in read-only mode starting April 19th, 7:00 AM PDT. Check out the blog post!
You will still be able to use the case portal to create and interact with your support cases until the transition, view more information here!

Audit and Remediation: How to Protect Against the WDigest Protocol Exploit

Audit and Remediation: How to Protect Against the WDigest Protocol Exploit

Environment

  • Carbon Black Cloud Console: All Versions
    • Audit & Remediation
  • Carbon Black Cloud Sensor: All Versions
  • Microsoft Windows: XP or Later

Objective

To identify devices that could be exploited using the WDigest Protocol

Resolution

  1. Login to the Carbon Black Cloud console
  2. Navigate to Live Query > New Query > Recommended tab
  3. Locate the query entitled, "Credential Theft Hardening - WDigest"
  4. Select "Run" to run it immediately against all endpoints.

Related Content


Was this article helpful? Yes No
No ratings
Article Information
Author:
Creation Date:
‎10-21-2021
Views:
371
Contributors