
(M1040 : Behavior Prevention on Endpoint)

This could include suspicious process, file, API call, etc.

Critical updates for system mechanic update#
Review and update content annually, or when significant enterprise changes occur that could impact this Safeguard. Conduct training at hire and, at a minimum, annually.
Critical updates for system mechanic how to#
The purpose of a security awareness program is to educate the enterprise’s workforce on how to interact with enterprise assets and data in a secure manner. O Safeguard 14.1: Establish and Maintain a Security Awareness Program: Establish and maintain a security awareness program. Remind all users not to visit untrusted websites or follow links/open files provided by unknown or untrusted sources.Conduct general computing activities, such as internet browsing, email, and productivity suite use, from the user’s primary, non-privileged account. O Safeguard 5.4: Restrict Administrator Privileges to Dedicated Administrator Accounts: Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Example implementations can include: disabling default accounts or making them unusable. O Safeguard 4.7: Manage Default Accounts on Enterprise Assets and Software: Manage default accounts on enterprise assets and software, such as root, administrator, and other pre-configured vendor accounts. Apply the Principle of Least Privilege to all systems and services, and run all software as a non-privileged user (one without administrative rights) to diminish the effects of a successful attack.O Safeguard 7.4: Perform Automated Application Patch Management: Perform application updates on enterprise assets through automated patch management on a monthly, or more frequent, basis. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard. O Safeguard 7.1: Establish and Maintain a Vulnerability Management Process: Establish and maintain a documented vulnerability management process for enterprise assets. Apply appropriate patches or appropriate mitigations provided by Microsoft to vulnerable systems immediately after appropriate testing.

We recommend the following actions be taken:
