blackberry optics administration guide

66
BlackBerry Optics Overview and Administration Guide 3.0

Upload: others

Post on 18-Feb-2022

15 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BlackBerry Optics Administration Guide

BlackBerry OpticsOverview and Administration Guide

3.0

Page 2: BlackBerry Optics Administration Guide

2021-08-25Z

 |  | 2

Page 3: BlackBerry Optics Administration Guide

Contents

What is BlackBerry Optics?............................................................................... 5Architecture: BlackBerry Optics.............................................................................................................................5

Steps to set up BlackBerry Optics.....................................................................7BlackBerry Optics requirements............................................................................................................................7

Configuration requirements for macOS Big Sur devices.......................................................................12Install the BlackBerry Optics agent on devices................................................................................................. 15

OS commands for the Optics agent....................................................................................................... 15Manage updates for the Optics agent............................................................................................................... 17Enable and configure Optics............................................................................................................................... 18

Optics sensors.......................................................................................................................................... 18Data structures that Optics uses to identify threats..............................................................................21

Analyzing data collected by Optics................................................................. 31View devices that are enabled for Optics.......................................................................................................... 31Using InstaQuery to analyze artifact data..........................................................................................................31

Create an InstaQuery................................................................................................................................ 32View focus data....................................................................................................................................................35View and download files that Optics has retrieved...........................................................................................36

Detecting and responding to events................................................................37Create a detection rule set..................................................................................................................................37

Event responses........................................................................................................................................38View and manage detections..............................................................................................................................38Creating custom detection rules.........................................................................................................................39

Sample detection rule...............................................................................................................................40Create and manage detection rules and exclusions..............................................................................42

Create a detection exception.............................................................................................................................. 57Deploy a package to collect data from devices................................................................................................ 57Create a package playbook to respond to events.............................................................................................58Lock a device........................................................................................................................................................59Sending actions to a device................................................................................................................................59

Start a remote response session............................................................................................................ 60Reserved commands for remote response............................................................................................ 60

Troubleshooting BlackBerry Optics................................................................. 61View Optics information in the audit log........................................................................................................... 61

Optics audit log information.................................................................................................................... 61Troubleshooting issues with the Optics agent on Linux...................................................................................63Removing the Optics agent from a device........................................................................................................ 63

Troubleshooting: Removing the Optics agent from a macOS device...................................................63

 |  | iii

Page 4: BlackBerry Optics Administration Guide

Legal notice.................................................................................................... 65

 |  | iv

Page 5: BlackBerry Optics Administration Guide

What is BlackBerry Optics?BlackBerry Optics is an endpoint detection and response solution that collects and analyzes forensic data fromdevices to identify and resolve threats before they impact your organization’s users and data.

You enable a Windows, macOS, or Linux device for Optics by installing the Optics agent alongside the ProtectDesktop agent. The Optics agent deploys sensors into the OS at various levels and subsystems to monitor andcollect a diverse set of data that is aggregated and stored in the Optics cloud database. You can leverage Opticsdata in several ways to protect your organization’s environment:

• You can query device data to investigate security incidents and discover indicators of compromise.• You can view visual representations of device data to analyze a chain of events.• You can enable detection rules to specify the events that you want Optics to monitor and how you want Optics

to respond to those events when they are detected.

Optics also offers features that enhance your ability to respond to potential threats. You can deploy packages thatremotely and securely run processes to collect and store desired data, you can lock down devices temporarily toprevent the spread of malware, and you can use remote response sessions to execute device commands.

Optics is the ideal complement to your organization’s existing security processes, giving you the tools that youneed to efficiently detect, investigate, and resolve device-based threats.

Architecture: BlackBerry Optics

Component Description

Optics agent You install the Optics agent on Windows, macOS, and Linux devices. Theagent deploys sensors to the device OS to monitor and collect data thatis used to identify threats and trigger automated responses.

 | What is BlackBerry Optics? | 5

Page 6: BlackBerry Optics Administration Guide

Component Description

Optics cloud services The Optics agent sends the device data that it collects to the Opticscloud services. The data is aggregated and stored in the secureOptics cloud database. The Optics data analytics services offerrich interpretations of device data that you can access using themanagement console.

For devices with the Optics agent version 2.x and earlier, the Opticsdatabase is stored locally on the device. Version 3.0 and laterautomatically aggregates, stores, compresses, and sends the data to theOptics cloud database at regular intervals.

Management console You can use the management console to connect to the Optics cloudservices for any of the following actions:

• Enable and configure how Optics works on devices.• View and manage Optics devices.• Query Optics data to investigate security incidents.• View focus data to analyze a chain of events.• Create and apply detection rules to customize what Optics monitors

and how it responds to events.• Execute actions in response to threats. For example, you can deploy a

package to collect data, lock down a device to contain a threat, or usea remote response session to execute device commands.

 | What is BlackBerry Optics? | 6

Page 7: BlackBerry Optics Administration Guide

Steps to set up BlackBerry OpticsStep Action

Review the BlackBerry Optics requirements.

Install the BlackBerry Optics agent on devices.

Manage updates for the Optics agent.

Enable and configure Optics.

BlackBerry Optics requirementsAgents

Agent Requirements

Protect agent • You must install the Protect agent on a device before you install the Opticsagent. If you want to use a combined installer for both agents, see the ProtectDesktop Installation Guide.

• BlackBerry recommends installing the latest available version of the Protectagent. The Optics agent requires the following minimum versions of theProtect agent:

• Windows: 2.1.1570.x• macOS: 2.1.1590.512 or later• Linux: 2.1.1570.x or 2.1.1580.x (due to a known issue, Protect agent

2.1.1574.x is not supported for use with the Optics agent for Linux.)

 | Steps to set up BlackBerry Optics | 7

Page 8: BlackBerry Optics Administration Guide

Agent Requirements

Optics agent • BlackBerry recommends installing the latest available version of the Opticsagent on each device.

• Optics agent version 3.0 or later is required to support automatically storingcollected data in the Optics cloud database. Earlier versions of the agent storeOptics data in a local database on the device.

• In Optics agent 3.0 and later, the data that is collected by the Optics sensorsis cached locally before it is sent to the Optics cloud database. If the device isoffline, the data is cached until the device can connect to the cloud database.A maximum of 1 GB of data can be stored locally. If more than 1 GB of data isstored before it can be uploaded, the lowest priority data will be deleted so thathigher priority data can be cached.

• When you upgrade from version 2.x to 3.0 or later, the full contents of theOptics local database are uploaded to the cloud database in batches.

• After you upgrade to version 3.0 or later, you cannot downgrade the agent toversion 2.x. If you want to install version 2.x, you must uninstall version 3.0,then install version 2.x.

Device OS

OS Requirements Required updates or configuration

Windows 10 (32-bit, 64-bit) • 21H1• 20H2• 20H1• 19H2• v1903 (Redstone 6) and earlier

Windows 8.1 (32-bit, 64-bit) See this Microsoft article for additionaldependencies for .NetCore support.

Windows Desktop

Windows 7 SP1 (32-bit, 64-bit) • You must apply the Dec. 12, 2017security update. For more information,see Microsoft KB4054518.

• See this Microsoft article for additionaldependencies for .NetCore support.

Windows Server 2019 (64-bit) —

Windows Server 2016 (64-bit) —

Windows Server 2012 R2 (64-bit)

Windows Server 2012 (64-bit)

Windows Server

Windows Server 2008 R2 (64-bit) You must apply the Dec. 12, 2017 securityupdate. For more information, seeMicrosoft KB4054518.

 | Steps to set up BlackBerry Optics | 8

Page 9: BlackBerry Optics Administration Guide

OS Requirements Required updates or configuration

macOS Big Sur (11.x) Enable full disk access. For moreinformation, see KB 66427.

See Configuration requirements formacOS Big Sur devices.

macOS Catalina (10.15) Enable full disk access. For moreinformation, see KB 66427.

macOS Mojave (10.14) Enable full disk access. For moreinformation, see KB 66427.

macOS

macOS High Sierra (10.13) —

RHEL/CentOS 8.0 to 8.3

RHEL/CentOS 7.0 to 7.9

Ubuntu 18.04

Ubuntu 16.04.03 to 16.04.06

Linux

SUSE Enterprise Linux 12 SP2, SP3, SP4

• kernel-headers and kernel-devel arerequired. The version depends on thekernel installed. This is handled by thepackage manager during installation.

• libelf (ELF library) is required. Thisis handled by the package managerduring installation.

• Firewalld must be enabled to supportthe lockdown device feature. Firewalldis available by default with RHEL/CentOS and must be installed manuallyfor Ubuntu and Amazon Linux.

Device hardware and software

Item Requirements

CPU In general use, as as low as 1% additional CPU.

For heavy sustained workloads, additional 5% to 25% CPU bursts can be required,depending on the workload.

Memory 0.2 to 1.0 GB of additional memory, depending on the workload.

Disk space • Minimum 1 GB• For Optics agent 2.x and earlier, 1 GB minimum is required for the local

database.• For Optics agent 3.0 and later, 1 GB minimum is recommended for caching

Optics sensor data before the device can upload the data to the Optics clouddatabase when it is online.

 | Steps to set up BlackBerry Optics | 9

Page 10: BlackBerry Optics Administration Guide

Administration

Item Requirements

Supported browsers forthe management console

Latest version of:

• Google Chrome (recommended)• Mozilla Firefox• Microsoft Edge

Administrator roles • Administrators have global permissions and can see all threats, devices, andzones.

• Users and zone managers have access only to the zones that they are assignedto. This applies to devices assigned to the zone, threats found on thosedevices, and the associated information on the dashboard.

• Read-only users cannot access Optics features in the management console.• If you want administrators to use a custom role to manage Optics, you must

enable Optics page access for that role.

Virtual machines If you use Optics on a virtual machine, BlackBerry recommends disabling the WMIenhance introspection sensor to reduce the number of recorded events.

Firewall Port 443 (HTTPS) must be open for the Protect and Optics agents tocommunicate with the management console.

 | Steps to set up BlackBerry Optics | 10

Page 11: BlackBerry Optics Administration Guide

Item Requirements

Proxy • The Optics agent is proxy aware and will query the .NET framework to identifyand use the available proxy settings. The agent will try to communicate first asthe Local System, then as the currently logged in user.

• Alternatively, you can configure the device registry to specify proxy settingsthat will be used by both the Protect agent and the Optics agent for outboundcommunication to BlackBerry servers. The proxy must accept unauthorizedrequests. In the Registry Editor, navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Cylance\Desktop and create String Value REG_SZ:

• Value Name = ProxyServer• Value Data = <proxyIP:port> (for example, http://123.45.67.89:8080)

• If you configure the Optics agent to use a proxy and the agent cannotcommunicate with the cloud services, the agent will attempt to bypass theproxy to make a direct connection. On Windows devices, you can disablethis proxy bypass. Before you install the Optics agent on a device, in HKLM\SOFTWARE\Cylance\Optics\, create String Value REG_SZ:

• Value Name = DisableProxyBypass• Value Data = True

• To configure the Optics agent on a Linux machine to use a proxy, use theinstructions from the Protect Desktop Installation Guide, Set an authenticatedproxy server for Linux or Set an unauthenticated proxy server for Linux, with thefollowing changes:

• Replace all instances of "cylancesvc" with "cyoptics".• The Optics agent requires the https_proxy variable. Duplicate each

http_proxy line and replace "http_proxy" with "https_proxy". In most caseshttps_proxy will use the same value as http_proxy because HTTPS trafficis tunneled using TCP Connect, but if your organization uses an HTTPStermination proxy server, specify the appropriate value for https_proxy.

Communication withOCSP server

When Optics creates a detection event that involves a signed file as an artifact, ituses a command from the Windows API to validate the signature or certificate.The command sends a validation request to an OCSP server. The OCSP serveraddress is determined by Windows.

If your proxy server reports attempts to send external traffic to an OCSP server,update the proxy settings on devices to allow connections with the OCSP server.

Network

Optics communicates over secure websockets (WSS) and must be able to establish this connection directly.Configure your organization's network to allow connections to the following domains.

Note: The management console is hosted by AWS and does not have fixed IP addresses. You can allow HTTPStraffic to *.cylance.com. For the cylance-optics-files-use1.s3.amazonaws.com host (and similar hosts for otherregions), it is recommended to allow that specific host. It is not recommended to allow *.amazonaws.combecause it is not specific to the Optics host and can open your network to other hosts.

 | Steps to set up BlackBerry Optics | 11

Page 12: BlackBerry Optics Administration Guide

Region Domains

Asia-Pacific Northwest • cement-apne1.cylance.com• cylance-optics-files-apne1.s3.amazonaws.com• opticspolicy-apne1.cylance.com• content-apne1.cylance.com• rrws-apne1.cylance.com• collector-apne1.cylance.com

Asia-Pacific Southeast • cement-apse2.cylance.com• cylance-optics-files-apse2.s3.amazonaws.com• opticspolicy-au.cylance.com• content-apse2.cylance.com• rrws-apse2.cylance.com• collector-apse2.cylance.com

Europe Central • cement-euc1.cylance.com• cylance-optics-files-euc1.s3.amazonaws.com• opticspolicy-euc1.cylance.com• content-euc1.cylance.com• rrws-euc1.cylance.com• collector-euc1.cylance.com

North America • cement.cylance.com• cylance-optics-files-use1.s3.amazonaws.com• opticspolicy.cylance.com• content.cylance.com• rrws-use1.cylance.com• collector.cylance.com

South America • cement-sae1.cylance.com• cylance-optics-files-sae1.s3.amazonaws.com• opticspolicy-sae1.cylance.com• content-sae1.cylance.com• rrws-sae1.cylance.com• collector-sae1.cylance.com

Configuration requirements for macOS Big Sur devicesTo install Optics agent version 3.0 or later on macOS Big Sur (11.x) devices, note the following configurationrequirements. The requirements depend on whether devices are managed by an MDM solution (for example, JamfPro).

MDM managed devices

The information below uses Jamf Pro as the MDM solution, but it is applicable to other MDM solutions.

 | Steps to set up BlackBerry Optics | 12

Page 13: BlackBerry Optics Administration Guide

Requirement Steps

Enable full disk accessfor Optics

Create a configuration profile and configure the following privacy preferences:

• Identifier: com.cylance.Optics• Identifier Type: Bundle ID• Code Requirement:

identifier "com.cylance.Optics" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "6ENJ69K633"

• SystemPolicyAllFiles service: Allow

Enable the Optics systemextension

Create a configuration profile and configure the following privacy preferences:

• Display Name: Cylance EndpointSecurity Optics System Extension• System Extension Types: Allowed System Extensions• Team Identifier: 6ENJ69K633• Allowed System Extensions: com.cylance.CyOpticsESF.extension

Enable the Optics systemextension full diskaccess

Create a configuration profile and configure the following privacy preferences:

• Identifier: com.cylance.CyOpticsESF.extension• Identifier Type: Bundle ID• Code Requirement:

anchor apple generic and identifier "com.cylance.CyOpticsESF.extension" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "6ENJ69K633")

• SystemPolicyAllFiles service: Allow

 | Steps to set up BlackBerry Optics | 13

Page 14: BlackBerry Optics Administration Guide

Requirement Steps

Enable the Opticsnetwork extension

Create a configuration profile and configure the following content filter settings:

• Filter Name: com.cylance.CyOpticsESF.extension• Identifier: com.cylance.CyOpticsESF.extension• Socket Filter Bundle Identifier: com.cylance.CyOpticsESF.extension• Socket Filter Designated Requirement:

anchor apple generic and identifier "com.cylance.CyOpticsESF.extension" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "6ENJ69K633")

• Network Filter Bundle Identifier: com.cylance.CyOpticsESF.extension• Network Filter Designated Requirement:

anchor apple generic and identifier "com.cylance.CyOpticsESF.extension" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "6ENJ69K633")

Restart after installation After you complete the configuration steps above and install the Optics agent,restart the device.

Devices that are not MDM managed

After you install the Optics agent:

1. Restart the device.2. Go to the Security & Privacy settings and approve CyOpticsESFLoader.3. When prompted, allow the Optics network filter.4. If System Integrity Protection (SIP) is enabled on the device, on the Privacy tab, click Full Disk Access and

verify that CyOpticsESFLoader is selected. If CyOpticsESFLoader is not in the list, click +, navigate to /Library/Application Support/Cylance/Optics, and select CyOptics.

5. Restart the device again.

To verify that the system extension is loaded:

1. Run $ systemextensionsctl list and confirm that the output includescom.cylance.CyOpticsESF.extension.

2. Run $ ps aux | grep -i extension | grep -i Cylance and confirm that the output includescom.cylance.CyOpticsESF.extension.systemextension.

 | Steps to set up BlackBerry Optics | 14

Page 15: BlackBerry Optics Administration Guide

Install the BlackBerry Optics agent on devicesTo enable a device for Optics, you must install the Optics agent on the device. You download the Optics agentinstaller from the management console, then run it on devices using your organization’s preferred method. Forexample, you can have IT administrators pre-install the agent on devices before providing them to users, or youcan push the installation using a trusted software distribution process.

Before you begin:

• Review the Optics software requirements.• You must install the Protect agent on devices before you install the Optics agent. If you want to use the

combined installer for Protect and Optics, see the BlackBerry Protect Desktop Installation Guide.• To view and download the Optics agent installation files in the console, in Settings > Update > Production, set

the Agent option to Do Not Update.

1. In the management console, on the menu bar, click Settings > Application.2. In the Installer > CylanceOPTICS section, click the desired OS platform to download the installation file.

Note: For macOS:

• It is a best practice to use the .pkg file. The .dmg file is a disk image of the .pkg file that can be used when adisk image must be mounted for installation.

• Before you deploy the agent to devices, see KB article 66578: Agent Installation - macOS High Sierra orHigher - Secure Kernel Extension Loading.

3. Using your organization’s preferred software distribution method, deploy and run the installation file ondevices.If you want to install the Optics agent on Windows or macOS devices using OS commands, or if you areinstalling on Linux, see OS commands for the Optics agent.

After you finish:

• For more information about managing upgrades of the Optics agent, see Manage updates for the Optics agent.• Enable and configure Optics in a device policy and assign the policy to one or more zones.

OS commands for the Optics agentThe Optics agent installer supports the following OS commands.

Windows

Actions Commands

Specify the installationdirectory

INSTALLFOLDER=<path>

Specify the directory forthe local Optics datastore

OPTICSROOTDATAFOLDER=<path>

 | Steps to set up BlackBerry Optics | 15

Page 16: BlackBerry Optics Administration Guide

Actions Commands

Perform a silentinstallation with no useraction required

Any of the following:

• -q

• -quiet

• -s

• -silent

Create an installation logfile

Any of the following:

• -l <path_for_log>

• -log <path_for_log>

Uninstall the Opticsagent

<Optics_program_directory>\CyOpticsUninstaller.exe

For example: C:\Program Files\Cylance\Optics\CyOpticsUninstaller.exe

To perform a silent uninstall that doesn't require user interaction, add the followingcommands: --use_cli -t v20

For example: C:\Program Files\Cylance\Optics\CyOpticsUninstaller.exe --use_cli -t v20

macOS

Action Commands

Install the Optics agent sudo installer -pkg CylanceOPTICS.pkg -target /

Install the Optics agentand create an installationlog file

sudo installer -verboseR -dumplog -pkg CylanceOPTICS.pkg -target /

Start the Optics service sudo launchctl load /Library/LaunchDaemons/com.cylance.cyoptics_service.plist

Stop the Optics service sudo launchctl unload /Library/LaunchDaemons/com.cylance.cyoptics_service.plist

Uninstall the Opticsagent

sudo /Applications/Cylance/Optics/Uninstall\CylanceOPTICS.app/Contents/MacOS/Uninstall\ CylanceOPTICS

Uninstall the Opticsagent with no UI

sudo /Applications/Cylance/Optics/Uninstall\CylanceOPTICS.app/Contents/MacOS/Uninstall\ CylanceOPTICS -noui

If you want to use this command, additional actions are required on macOS 11.xdevices. For more information, see Troubleshooting: Removing the Optics agentfrom a macOS device.

 | Steps to set up BlackBerry Optics | 16

Page 17: BlackBerry Optics Administration Guide

Linux

Action Commands

Install the Optics agenton RHEL/CentOS, SUSE,or Amazon Linux 2

yum install CylanceOPTICS-<version>.rpm, where <version> is theversion of the .rpm file.

Install the Optics agenton Ubuntu

dpkg -i cylance-optics_<version>_amd64.deb, where <version> is theversion of the .deb file.

Start the Optics service systemctl start cyoptics.service

Stop the Optics service systemctl stop cyoptics.service

Uninstall the Opticsagent on RHEL/CentOS,SUSE, or Amazon Linux 2

rpm -e CylanceOPTICS

Uninstall the Opticsagent on Ubuntu

dpkg -P cylance-optics

Manage updates for the Optics agentYou can use update zones to manage updates of the Protect and Optics agents on devices. Test, Pilot, andProduction update zones are available for this purpose. You can configure Optics to automatically push updatesto a specific version or the latest available version, or you can turn off automatic updates so that you can managethe software distribution using your organization’s preferred method (see Install the BlackBerry Optics agent ondevices).

BlackBerry recommends that you test agent updates using the Test and Pilot update zones first, with devicesreserved for testing and evaluation purposes, before managing updates for the Production update zone.

Before you begin: Create zones with devices reserved for testing Protect and Optics agent updates. For moreinformation about creating zones, see the Protect Desktop Administration Guide. You will associate these zoneswith the Test and Pilot update zones. The Production zone applies to all devices that do not belong to otherupdate zones.

1. In the management console, on the menu bar, click Settings > Update.2. Click the Test zone.3. Expand Zones and select the zones that you want to assign to this update zone.4. Expand Agent and select the version of the Protect agent that you want to push to devices in this zone.

For more information about the version of the Protect agent that is required for the Optics agent, see theBlackBerry Optics requirements.

5. Expand CylanceOPTICS and do one of the following:

• To push updates for a specific version of the Optics agent, select the agent version.• To automatically push updates for the latest available version, select Auto-Update.• To turn off updates, select Do Not Update.

6. Repeat steps 2 to 5 for the Pilot zone.

 | Steps to set up BlackBerry Optics | 17

Page 18: BlackBerry Optics Administration Guide

7. Repeat steps 2 to 5 for the Production zone. You don’t assign zones to the Production update zone because itapplies to all devices that are not in the other update zones.

Enable and configure OpticsWhen you enable Optics in a device policy and assign that policy to devices and zones, the Optics agent on eachdevice collects events and stores data in the Optics database. The agent does not collect data until you enableOptics.

Before you begin: Verify that the Protect Desktop application control feature is not enabled. Application controlis designed for fixed function devices that do not change after setup (for example, point-of-sales machines).If application control is enabled, the Optics agent will not function as expected. For more information, seeApplication Control in the Protect Desktop Administration Guide.

1. In the management console, on the menu bar, click Settings > Device Policy.2. Create a new policy or click an existing policy.3. On the CylanceOPTICS Settings tab, select the CylanceOPTICS check box.4. If you want to enable the automatic upload of threat-related focus data from the Optics database to the

console, in the Threats section, select the Auto Upload check box.If you do not select this option, you must use the console to request focus data for devices.

5. If you want to enable the automatic upload of memory-related focus data from the Optics database to theconsole, in the Memory Protection section, select the Auto Upload check box.If you do not select this option, you must use the console to request focus data for devices.

6. In the Configurable Sensors section, select the optional Optics sensors that you want to enable. Note that theoptional sensors are supported for 64-bit operating systems only.

7. In the Set maximum device storage field, specify the maximum amount of storage, in MB, that the Opticsagent can access on each device. The default value is 1000 MB.

8. If you want to allow the Optics agent to provide OS notifications to the user on Windows or macOS devices,select the Enable CylanceOPTICS Desktop Notifications check box.

9. If you want to associate a detection rule set with the device policy, in the Select Detection Set drop-down list,click a rule set.

10.Click Save.If you want to save the current settings as a new device policy, click Save As instead.

After you finish: Assign the policy to devices or zones.

Optics sensorsYou can enable any of the following Optics sensors to collect additional data beyond standard process, file,network, registry, and thread events. Enabling optional sensors can impact performance and resource usage ondevices, as well as the amount of data stored in the Optics database. BlackBerry recommends enabling optionalsensors on a small number of devices initially to assess the impact.

The optional sensors are supported for 64-bit operating systems only.

 | Steps to set up BlackBerry Optics | 18

Page 19: BlackBerry Optics Administration Guide

Sensor Description Details Best practices Notes

AdvancedScriptingVisibility

The Optics agentrecords commands,arguments, scripts,and content fromJScript, PowerShell(console andintegrated scriptingenvironment),VBScript, andVBA macro scriptexecution.

Signal to noiseratio: High

Potential dataretention andperformanceimpact: Low tomoderate

Recommendedfor:

• Desktops• Laptops• Servers

Notrecommendedfor:

• Exchange andemail servers

• Tools provided byMicrosoft or other third-party solutions may relyheavily on PowerShell toconduct operations.

• To allow for increaseddata retention, BlackBerryrecommends that youconfigure detectionexceptions for trustedtools that make heavy useof PowerShell.

AdvancedWMIVisibility

The Optics agentrecords additionalWMI attributes andparameters.

Signal to noiseratio: High

Potential dataretention andperformanceimpact: Low

Recommendedfor:

• Desktops• Laptops• Servers

• Some Windowsbackground andmaintenance processesuse WMI to scheduletasks or executecommands, which canresult in bursts of highWMI activity.

• BlackBerry recommendsanalyzing yourenvironment’s WMI usagebefore you enable thissensor.

CryptojackingDetection

The Optics agentprocesses IntelCPU activity usinghardware registers forpotential cryptominingand cryptohackingactivity.

Signal to noiseratio: Moderate

Potential dataretention andperformanceimpact: Low

Supported for:

• Windows 10x64

• Intel Gen 6and newerCPUs

Not supported for virtualmachines.

DNSVisibility

The Optics agentrecords DNS requests,responses, andassociated data fieldssuch as DomainName, ResolvedAddresses, andRecord Type.

Signal to noiseratio: Moderate

Potential dataretention andperformanceimpact:Moderate

Recommendedfor:

• Desktops• Laptops

Notrecommendedfor:

• DNS servers

• Note that this sensorcan gather a significantamount of data, but canalso provide visibility intodata that other tools havedifficulty recording.

• To allow for increaseddata retention, BlackBerryrecommends that youconfigure detectionexceptions for trustedtools that make heavy useof cloud-based services.

 | Steps to set up BlackBerry Optics | 19

Page 20: BlackBerry Optics Administration Guide

Sensor Description Details Best practices Notes

EnhancedFile ReadVisibility

The Optics agentmonitors file readswithin an identifiedset of directories.

Signal to noiseratio: Moderate

Potential dataretention andperformanceimpact: Low

Recommendedfor:

• Desktops• Laptops• Servers

• Some third-party securitytools may use theWindows APIs that thissensor collects data from.In some cases, Opticsmight record irrelevant ortrusted data.

• To allow for increaseddata retention anda higher signal tonoise ratio, BlackBerryrecommends that youconfigure detectionexceptions for trustedsecurity tools.

EnhancedPortableExecutableParsing

The Optics agentrecords data fieldsassociated withportable executablefiles, such as fileversion, importfunctions, and packertypes.

Signal to noiseratio: Moderate

Potential dataretention andperformanceimpact: Low

Recommendedfor:

• Desktops• Laptops• Servers

• The data gathered by thissensor is passed into theContext Analysis Engineto aid with advancedexecutable file analysisand is not stored in theOptics database.

• Enabling this sensor willhave little to no impact onOptics data retention.

EnhancedProcessandHookingVisibility

The Optics agentrecords processinformation from theWin32 API and KernelAudit messagesto detect forms ofprocess hooking andinjection.

Signal to noiseratio: Moderate

Potential dataretention andperformanceimpact: Low

Recommendedfor:

• Desktops• Laptops• Servers

• Some third-party securitytools may use theWindows APIs that thissensor collects data from.In some cases, Opticsmight record irrelevant ortrusted data.

• To allow for increaseddata retention anda higher signal tonoise ratio, BlackBerryrecommends that youconfigure detectionexceptions for trustedsecurity tools.

 | Steps to set up BlackBerry Optics | 20

Page 21: BlackBerry Optics Administration Guide

Sensor Description Details Best practices Notes

PrivateNetworkAddressVisibility

The Optics agentrecords networkconnections withinthe RFC 1918 and RFC4193 address spaces.

Signal to noiseratio: Low

Potential dataretention andperformanceimpact: High

Recommendedfor:

• Desktops

Notrecommendedfor:

• DNS servers• Low or under

resourcedsystems

• Systems thatuse RDP orother remoteaccesssoftware

• This sensor gathers asignificant amount of dataand can impact the lengthof time that data is storedin the Optics database.

• BlackBerry recommendsthat you enablethis sensor only inenvironments wherefull visibility into privatenetwork addresscommunication is arequirement.

WindowsAdvancedAuditVisibility

The Optics agentmonitors additionalWindows event typesand categories.

Signal to noiseratio: Moderate

Potential dataretention andperformanceimpact: Low

— • This sensor enablesmonitoring of thefollowing event IDs:

• 4769 kerberos ticketrequest

• 4662 operation onactive directory object

• 4624 successful logon• 4702 scheduled task

creation

WindowsEvent LogVisibility

The Optics agentrecords Windowssecurity events andtheir associatedattributes.

Signal to noiseratio: Moderate

Potential dataretention andperformanceimpact:Moderate

Recommendedfor:

• Desktops• Laptops• Servers

Notrecommendedfor:

• Domaincontrollers

• Exchange andemail servers

• The Windows eventlogs that this sensorcollects data from willbe generated frequentlyduring normal systemusage.

• To reduce duplicate dataand to allow for increaseddata retention, determineif your organizationalready has tools in placethat collect data fromWindows event logs.

Data structures that Optics uses to identify threatsEvents, artifacts, and facets are the three primary data structures that Optics uses to analyze, record, andinvestigate activities that occur on devices. Optics features rely on these data structures, including InstaQuery,focus data, and the Context Analysis Engine (CAE).

 | Steps to set up BlackBerry Optics | 21

Page 22: BlackBerry Optics Administration Guide

This section provides more information about how Optics interprets and interacts with activities on devices, tohelp you better understand and make use of detections, queries, and focus data.

Data sources by OS

The Optics agent uses the following data sources:

OS Data sources

Windows • CyOpticsDrv kernel driver• Event tracking• Security audit log

macOS CyOpticsDrvOSX kernel driver

Linux ZeroMQ

Events

Events are the components that result in an observable change or action on a device. Events consist of twoprimary artifacts: the instigating artifact that initiates an action, and the target artifact that is acted on.

The following tables provide details about the types of events that Optics can detect and interact with.

Event: Any

• Device policy option to enable: CylanceOPTICS check box• Artifact type: Process, User• Platform: Windows, macOS, Linux

Event type Description

Any All events record the process that generated them and the user that is associated withthe action.

Event: Application

• Device policy option to enable: Advanced WMI Visibility• Artifact type: WMI trace• Platform: Windows

Event type Description

Create filter –consumer binding

A process used WMI persistence.

Create temporaryconsumer

A process subscribed to WMI events.

Execute operation A process performed a WMI operation.

• Device policy option to enable: Enhanced Process and Hooking Visibility

 | Steps to set up BlackBerry Optics | 22

Page 23: BlackBerry Optics Administration Guide

• Artifact type: Windows event• Platform: Windows

Event type Description

CBT The SetWindowsHookEx API installed a hook to receive notifications that are useful to aCBT application.

DebugProc The SetWindowsHookEx API installed a hook to debug other hook procedures.

Get async key state A process called the Win32 GetAsyncKeyState API.

JournalPlayback The SetWindowsHookEx API installed a hook to monitor messages previously recordedby a WH_JOURNALRECORD hook procedure.

JournalRecord The SetWindowsHookEx API installed a hook to monitor input messages posted to thesystem message queue.

Keyboard The SetWindowsHookEx API installed a hook to monitor keystroke messages.

LowLevel keyboard The SetWindowsHookEx API installed a hook to monitor low-level keyboard inputevents.

LowLevel mouse The SetWindowsHookEx API installed a hook to monitor low-level mouse input events.

Message The SetWindowsHookEx API installed a hook to monitor messages posted to amessage queue.

Mouse The SetWindowsHookEx API installed a hook to monitor mouse messages.

Register raw inputdevices

A process called the Win32 RegisterRawInputDevices API.

Set Windows eventhook

A process called the Win32 SetWinEventHook API.

Set Windows hook The SetWindowsHookEx API installed an unlisted hook type value.

ShellProc The SetWindowsHookEx API installed a hook to receive notifications that are useful toshell applications.

SysMsg The SetWindowsHookEx API installed a hook to monitor messages that are generatedas a result of an input event in a dialog box, message box, or scroll bar.

WindowProc The SetWindowsHookEx API installed a hook to monitor Windows procedure messages.

Event: Device

• Device policy option to enable: CylanceOPTICS check box• Artifact type: File• Platform: macOS, Linux

 | Steps to set up BlackBerry Optics | 23

Page 24: BlackBerry Optics Administration Guide

Event type Description

Mount The device is connected to a machine or folders are mounted to specific networklocations.

Event: File

• Device policy option to enable: CylanceOPTICS check box• Artifact type: File• Platform: Windows, macOS, Linux

Event type Description

Create A file was created.

Delete A file was deleted.

Overwrite A file was overwritten.

Rename A file was renamed.

Write A file was modified.

• Device policy option to enable: Enhanced File Read Visibility• Artifact type: File• Platform: Windows

Event type Description

Open A file was opened.

Event: Memory

• Device policy option to enable: CylanceOPTICS check box• Artifact type: Process• Platform: macOS, Linux

Event type Description

Mmap A region of memory was mapped for a specific purpose, typically allocated for aprocess.

MProtect The metadata was changed for a region of memory, typically to change its status (forexample, to make it executable).

Event: Network

• Device policy option to enable: CylanceOPTICS check box• Artifact type: Network• Platform: Windows, macOS

 | Steps to set up BlackBerry Optics | 24

Page 25: BlackBerry Optics Administration Guide

Event type Description

Connect A network connection was opened. By default, local traffic is not collected.

• Device policy option to enable: Private Network Address Visibility• Artifact type: Network• Platform: Windows

Event type Description

Connect Connect events include local traffic.

• Device policy option to enable: DNS Visibility• Artifact type: DNS request• Platform: Windows

Event type Description

Request A process made a network DNS request that was not cached.

Response A process received a DNS response.

Event: Process

• Device policy option to enable: CylanceOPTICS check box• Artifact type: Process

Event type Platform Description

Abnormal exit macOS

Linux

Monitored by the preselect sensor, a process exited withoutcompleting (for example, an exception caused a process to exit).

Exit Windows

macOS

Linux

A process exited.

Forced exit macOS

Linux

Monitored by the preselect sensor, a process was forced to exitby another process.

PTrace macOS

Linux

This is a Unix system tool that allows one process to monitor andcontrol another process.

Start Windows

macOS

Linux

A process started.

Suspend Linux Monitored by the preselect sensor, a process was suspended.

 | Steps to set up BlackBerry Optics | 25

Page 26: BlackBerry Optics Administration Guide

Event type Platform Description

Unknown Linuxprocess event

macOS

Linux

Monitored by the preselect sensor, an unknown event occurredwith the process as a target. This can be a sign of malicioussoftware masking its activity.

• Device policy option to enable: Enhanced Process and Hooking Visibility• Artifact type: Process• Platform: Windows

Event type Description

SetThreadContext A process called the SetThreadContext API.

Terminate An instigating process terminated another target process.

Event: Registry

• Device policy option to enable: CylanceOPTICS check box• Artifact type: Registry, File (if the registry key references a specific file)• Platform: Windows

Event type Description

Key created A registry key was created.

Key deleted A registry key was deleted.

Value created A registry key value was created.

Value deleted A registry key value was deleted.

Value modified A registry key value was changed.

Event: Scripting

• Device policy option to enable: Advanced Scripting Visibility• Artifact type: File, Powershell Trace (Prevent script is Powershell trace only)• Platform: Windows

Event type Description

Execute command Windows PowerShell executed a command. The parameters are unknown.

Execute script An AMSI ScanBuffer result indicated that a script was executed.

Execute ScriptBlock Windows PowerShell executed a script block.

Invoke command Windows PowerShell invoked a command with bound parameters.

 | Steps to set up BlackBerry Optics | 26

Page 27: BlackBerry Optics Administration Guide

Event type Description

Prevent script An AMSI ScanBuffer result indicated that a script was detected or blocked by anadministrator.

Event: User

• Device policy option to enable: Advanced Scripting Visibility• Artifact type: Windows event• Platform: Windows

Event type Description

Batch logoff The following Windows event ID occurred: 4634 (type 4).

Batch logon The following Windows event ID occurred: 4624 (type 4).

CacheInteractivelogoff

The following Windows event ID occurred: 4634 (type 11).

CacheInteractivelogon

The following Windows event ID occurred: 4624 (type 11).

Interactive logoff The following Windows event ID occurred: 4634 (type 2).

Interactive logon The following Windows event ID occurred: 4624 (type 2).

Network logoff The following Windows event ID occurred: 4634 (type 3).

Network logon The following Windows event ID occurred: 4624 (type 3).

NetworkClearTextlogoff

The following Windows event ID occurred: 4634 (type 8).

NetworkClearTextlogon

The following Windows event ID occurred: 4624 (type 8).

NewCredentialslogoff

The following Windows event ID occurred: 4634 (type 9).

NewCredentialslogon

The following Windows event ID occurred: 4624 (type 9).

RemoteInteractionlogoff

The following Windows event ID occurred: 4634 (type 10).

RemoteInteractionlogon

The following Windows event ID occurred: 4624 (type 10).

Service logoff The following Windows event ID occurred: 4634 (type 5).

Service logon The following Windows event ID occurred: 4624 (type 5).

 | Steps to set up BlackBerry Optics | 27

Page 28: BlackBerry Optics Administration Guide

Event type Description

Unlock logoff The following Windows event ID occurred: 4634 (type 7).

Unlock logon The following Windows event ID occurred: 4624 (type 7).

User logoff The following Windows event ID occurred: 4634 (unlisted type value).

User logon The following Windows event ID occurred: 4624 (unlisted type value).

Artifacts and facets

Artifacts are complex pieces of information that Optics can use. The Context Analysis Engine (CAE) can identifyartifacts on devices and use them to trigger automatic incident response and remediation actions. InstaQueriesuse artifacts as the foundation of a query.

Facets are the attributes of an artifact that can be used to identify the traits of an artifact that is associatedwith an event. Facets are correlated and combined during analysis to identify potentially malicious activity. Forexample, a file named "explorer.exe" may not be inherently suspicious, but if the file is not signed by Microsoft,and resides in a temporary directory, it may be identified as suspicious in some environments.

Optics uses the following artifacts and facets:

Artifact Facets

DNS • Connection• IsRecursionDesired• IsUnsolicitedResponse• Opcode• RequestId• Resolution• ResponseOriginatedFromThisDevice• Questions

Event • Occurrence time• Registration time

File • Executable file record (binaries only)• File creation time (reported by OS)• File path• File signature (binaries only)• File size• Last modified time (reported by OS)• md5 hash (binaries only)• Recent write location• sha256 hash (binaries only)• Suspected file type• User

 | Steps to set up BlackBerry Optics | 28

Page 29: BlackBerry Optics Administration Guide

Artifact Facets

Network • Local address• Local port• Protocol• Remote address• Remote port

PowerShell trace • EventId• Payload• PayloadAnalysis• ScriptBlockText• ScriptBlockTextAnalysis

Process • Command line• File the executable was run from• Parent process• Process ID• Start time• User

Registry • If the value references a file on the system• Registry path• Value

 | Steps to set up BlackBerry Optics | 29

Page 30: BlackBerry Optics Administration Guide

Artifact Facets

Users • Domain• OS-specific identifier (for example, SID)• Username

User artifacts can contain any of the following values; however, the data is not availableon most devices:

• AccountType• BadPasswordCount• Comment• CountryCode• FullName• HasPasswordExpired• HomeDirectory• IsAccountDisabled• IsLocalAccount• IsLockedOut• IsPasswordRequired• LanguageCodePage• LogonServer• PasswordAge• PasswordDoesNotExpire• ProfilePath• ScriptPath• UserPrivilege• Workstations

Windows event • Class• Event ID• Provider

WMI trace • ConsumerText• ConsumerTextAnalysis• EventId• Namespace• Operation• OperationAnalysis• OriginatingMachineName

 | Steps to set up BlackBerry Optics | 30

Page 31: BlackBerry Optics Administration Guide

Analyzing data collected by OpticsThis section provides information about how you can view, analyze, and use the data collected by Optics.

View devices that are enabled for OpticsYou can view details and status information for all devices that are enabled for Optics, including the Optics agentversion installed on the device, the device IP address, and assigned zones. You can use the device view to takeaction to manage potential threats.

If a device is offline for 90 days or more, it does not do not display in the console.

1. In the management console, on the menu bar, click CylanceOptics > Devices.2. Click to filter the results to find a specific device or group of devices.3. Do any of the following:

Task Steps

View summary details for adevice.

Click the device name.

View full details for a device andchange device properties andassignments.

a. Under the Details column, click View.b. Under Edit Device Properties, you can change the device name,

assigned device policy, assigned zones, Optics agent log level, andprotection level. Click Save.

c. In the Threats & Activities section, you can view details for thethreats that the Optics agent has detected.

Lock down a device temporarily. See Lock a device.

Deploy a package to collect datafrom the device.

a. Click the device name.b. In the Select Action drop-down list, click Package Deploy.c. Follow the steps in Deploy a package to collect data from devices.

Start a remote response sessionto send commands to the device.

a. Click the device name.b. In the Select Action drop-down list, click Remote Response.c. Enter commands into the remote response session window.

For more information, see Sending actions to a device.

Export a .csv file of all devices. Click the Export icon.

Using InstaQuery to analyze artifact dataInstaQuery is an Optics feature that allows you to analyze artifact data to discover indicators of compromise andto determine their prevalence on your organization’s devices. The results of a query will not tell you about howor when an artifact was used, but they will indicate whether an artifact has ever been observed in a forensicallysignificant way that can signal a threat to your organization’s devices and data.

 | Analyzing data collected by Optics | 31

Page 32: BlackBerry Optics Administration Guide

InstaQuery allows you to interrogate a set of devices about a specific type of forensic artifact, and allows you todetermine whether an artifact exists on devices and how common that artifact is.

After you install and enable the Optics agent on a device, the agent collects artifacts and stores them in the Opticsdatabase. With Optics agent 2.x and earlier, the database is stored locally on the device. With Optics agent 3.0and later, the agent automatically uploads and stores data in the Optics cloud database. When you create a query,forensically significant data is retrieved from the Optics database. You can view and explore the results in themanagement console.

For devices with Optics agent 2.x and earlier, a query can complete successfully only when a device is online. Fordevices with agent 3.0 and later, the device does not need to be online because the query will use the latest dataavailable in the Optics cloud database.

A single query will display and retain a maximum of 10,000 results. The results of a query are retained for 60 days.

Note the following details about specific artifacts that you can query:

Artifact Details

Files You can query specific files that were created, modified, or deleted after the Opticsagent was installed on the device. Optics focuses on files that can be used toexecute content (for example, executable files, Microsoft Office documents, PDFs,and so on).

Network connections You can perform queries against both IPv4 and IPv6 destination IP addresses.Optics discards private, non-routable, multicast, link-local, and loopback networktraffic.

Processes All processes are indexed in the Optics database, with the following restrictions:

• Command lines are limited to 1 KiB of data• Process names are limited to 256 characters• Process image file paths are limited to 512 characters• Command lines that are altered after the process has started are not monitored

Registry keys Optics monitors only persistence points and file deletion points. They are areastypically exploited by malware.

Create an InstaQuery1. In the management console, on the menu bar, click CylanceOPTICS > InstaQuery.2. Do one of the following:

 | Analyzing data collected by Optics | 32

Page 33: BlackBerry Optics Administration Guide

Task Steps

Create a newInstaQuery

If you want to clone a previous query, expand the Previous Queries section, find thequery, and click Clone Query.

a. In the Search Term field, type a value that you want to search for (for example, afile name, hash, process, registry value, and so on). If you want to search for anexact match, select the Exact Matching check box.

b. In the Artifact drop-down list, click an artifact type.c. In the Facet drop-down list, click the appropriate facet.d. In the Zone drop-down list, select one or more zones.e. Type a name and description for the query.f. Click Submit Query.g. The current status of the query is displayed in the Previous Queries section. When

the query is complete, click View Results.

View a previousInstaQuery

a. Expand the Previous Queries section.b. For the query that you want to view, click View Results.

3. In the InstaQuery Results section, you can expand the Actions menu to access the available actions for eachresult. Depending on the type of result, this can include:

• Request and view focus data.• Globally quarantine a file. The file is displayed in Settings > Global List > Global Quarantine, in Protection >

Threats, in the Threats section of the device details.• Request and download a file. If path information is available for files associated with other artifact types,

you can also download those files. The file is compressed and password-protected to ensure that it is notaccidentally executed. The password is “infected”.

The size limit for file retrieval is 50 MB. Artifacts and files are retained by Optics for 30 days (this period canbe increased based on your organization's licensing).

4. To view the InstaQuery facet breakdown, in the InstaQuery Results section, click the facet breakdown icon.

Using the InstaQuery facet breakdown

The InstaQuery facet breakdown provides an interactive visual display of the different facets involved in aquery so that you can identify and follow their relational paths.

The sunburst model of the facet breakdown is useful for identifying suspicious activity in a given dataset. Forexample, if you try to find suspicious network connections across an environment or multiple zones, data patternsand anomalies can be difficult to pinpoint because of the volume and complexity of the data. The followingimages demonstrate how you can view and filter data in the facet breakdown to quickly locate suspicious activity.

The following images were generated by creating an InstaQuery to search for connections to a specific IPaddress. The results of the query were visualized into a sunburst diagram with these facets: device, primary imagepath, destination port, and destination address.

 | Analyzing data collected by Optics | 33

Page 34: BlackBerry Optics Administration Guide

You can hover over any of the facets to display their associated values. In the following image, the administratorselected the outermost facet to view the name of the device, the path to the file that initiated the networkconnection, the port number used for the connection, and the IP address of the remote system.

When you hover over a facet, the associated parent facets are also highlighted to help you draw a visualrelationship between the data points. In the example above, you can see that one device and one parent processwere responsible for most connections to the IP address. The diagram also illustrates that many different networkports were used to connect to this IP address from the associated host, something that differs from the other twohost facets in the diagram.

 | Analyzing data collected by Optics | 34

Page 35: BlackBerry Optics Administration Guide

You can also obtain useful information from the refine results menus. Each of the facet menus contains theunique values and the number of occurrences for each facet. In the example below, you can see that there are twoprocesses that were responsible for connections to this IP address: Google Chrome and Wscript.

When you click a facet value in the refine results menu, the diagram will change to display the facets that aredirectly related. This feature is useful to filter out irrelevant data and allow for a more focused analysis.

View focus dataFocus data allows you to visualize and analyze the chain of events, and the associated artifacts and facets ofthose events, that resulted in a piece of malware or another security threat on a device. Focus data is retained for30 days.

For devices with Optics agent 2.x and earlier, the console can retrieve focus data only from devices that areonline. For devices with agent 3.0 and later, devices do not need to be online because the console can retrieve thelatest data available in the Optics cloud database.

Before you begin: If you want to enable the automatic upload of focus data for devices to the console, turn onthese options in the device policy (see Enable and configure Optics). If you do not select this option, you must usethe console to manually request focus data.

Do any of the following:

Task Steps

View focus data from devicedetails.

a. In the management console, on the menu bar, click Devices.b. Click a device and review the Threats & Activities section.c. If you did not enable the automatic upload of focus data, for a threat or

event, click Request Data.d. Click View Data.

 | Analyzing data collected by Optics | 35

Page 36: BlackBerry Optics Administration Guide

Task Steps

View focus data from anInstaQuery.

To create a new InstaQuery, see Create an InstaQuery.

a. In the management console, on the menu bar, click CylanceOPTICS >InstaQuery > Previous Queries.

b. For an InstaQuery, click View Results.c. For a result, click Actions > Request Focus Data.d. Click View Focus Data.

View focus data from amaster list.

a. In the management console, on the menu bar, click CylanceOPTICS >Focus Data.

The list includes the focus data that was previously requested by anadministrator or automatically uploaded to the console.

b. For an artifact or event, click View Focus.

After you finish:

• Some artifacts or facets in the focus data may include a Create InstaQuery option to retrieve moreinformation. This is known as a pivot query. The artifact or facet properties are prepopulated, you only need tospecify the appropriate zones. The pivot query results are then available with the associated focus data.

• If you want to export focus data to a .csv file, click the table view icon, then click the Export icon.

View and download files that Optics has retrievedWhen Optics identifies a file as a potential threat, you can retrieve the file from the device (for example, when youreview detection details or InstaQuery results). You can view a list of all of the files that Optics has retrieved, andyou can download files from this view for further analysis.

1. In the management console, on the menu bar, click CylanceOPTICS > Action History.2. Hover over Action History on the top menu bar and click File Download History.3. If you want to filter the results, click .4. If you want to download a file, click Download File. Review the warning and click Confirm Download.

 | Analyzing data collected by Optics | 36

Page 37: BlackBerry Optics Administration Guide

Detecting and responding to eventsOptics uses the Context Analysis Engine (CAE) to analyze and correlate events as they occur on devices innear real-time. The CAE logic is stored locally on the device, which allows the Optics agent to monitor andtrack malicious or suspicious activity even if the device is not connected to the Optics cloud services. Youcan configure Optics to take automated response actions when the CAE identifies certain artifacts of interest,providing an additional layer of threat detection and prevention to complement the capabilities of ProtectDesktop.

You can customize the detection capabilities of Optics to suit the needs of your organization. You can createdetection rule sets with your desired configuration of detection rules and responses, you can clone and modifyexisting detection rules or create your own custom rules, and you can create detection exceptions to excludespecific artifacts from detection.

Create a detection rule setCreate and apply a detection rule set to configure the types of events that you want Optics to detect and how youwant Optics to respond to those events. A default detection rule set is available to help you test and evaluate howyou want to use detection rules. In the default rule set, all detection rules are turned on and automated responsesand user notifications are turned off.

When you create a detection rule set, it is a best practice initially to turn on the desired detection rules withoutresponse actions and desktop notifications. After you evaluate the detections data, you can configure theappropriate response actions and user notifications for each rule.

Before you begin: For more information about the optional Optics rules that you can import for yourorganization’s environment, see KB76816.

1. In the management console, on the menu bar, click CylanceOPTICS > Configurations.2. Hover over Configurations on the top menu bar and click Detection Rule Sets.3. Click Create New.4. Type a name and description.5. If you want the Optics agent to display a message when a rule is triggered on the device, in the Detection

Notification Message field, type the message.6. Review the available rules. For each rule, you can hover over the information icon to view a description. Click

ON to enable an entire rule group or a specific rule.7. If you want to display a desktop notification when a rule is trigged on a device, select the Display Detection

Notification on Device check box for the rule.8. If you want the Optics agent to execute a response action when a rule is triggered on a device, in the Response

drop-down list for the rule, select one or more actions. You can hover over the information icon for each actionto view a description.

9. In the Device Policy drop-down list, click one or more device policies that you want to assign the detection ruleset to.You can also assign a detection rule set to a device policy when you create or change a device policy.

10.Click Confirm. Review the summary then click Confirm again.

After you finish: After you assign the detection rule set to a device policy, you can view and manage detections.You can also do any of the following optional tasks:

• To reduce false positives or duplicate events, you can create detection exceptions.• Create custom detection rules.

 | Detecting and responding to events | 37

Page 38: BlackBerry Optics Administration Guide

• Create a package playbook to respond to events.

Event responsesThe Optics agent can execute the following response actions when a detection event is triggered:

Response Description

Application Log The agent logs detection events to the Windows application log.

Delete Files The agent permanently deletes any file artifacts that are identified as an artifact ofinterest (AOI).

Delete Registry Keys The agent permanently deletes the entire registry key of any AOI that are identifiedas registry artifacts.

Delete Registry Values The agent permanently deletes the registry value of any AOI that are identified asregistry artifacts.

Log Off All Users The agent logs off all users that are currently logged into the system.

Log Off Inactive Users The agent logs off all users that currently have an inactive session on the system.

Log Off Remote Users The agent logs off all users that currently have a remote session established onthe system.

Notification Window The agent displays a notification window with the detection notification messagethat you specified, using the native OS notification box instead of the Protectagent.

Suspend Processes The agent suspends any process artifacts that are identified as an AOI.

Suspend Process Tree The agent suspends the entire process tree of any process artifacts that areidentified as an AOI. The AOI is treated as the root of the tree.

Terminate Processes The agent terminates any process artifacts that are identified as an AOI.

Terminate Process Tree The agent terminates the entire process tree of any process artifacts that areidentified as an AOI. The AOI is treated as the root of the tree.

View and manage detectionsYou can use the management console to view and analyze the events detected by the CAE. From the detectionsdashboard you can see trends in events over varying timeframes, the severity of different detections, and you canaccess detailed information for each detection.

Before you begin: Create a detection rule set.

1. In the management console, on the menu bar, click CylanceOPTICS > Detections.2. Do any of the following:

 | Detecting and responding to events | 38

Page 39: BlackBerry Optics Administration Guide

Task Steps

Change the scope of thedetections data.

Click the Detections Over Time drop-down list and select the desired scope.

Include or excludedetections of differentpriority levels.

The graph provides a count of informational, low, medium, and high priorityevents. Click any of the counts to exclude those events from the detectionsdata. Click the same item again to include it in the data.

View the details andartifacts of interest for adetection.

Click View.

Depending on the artifacts associated with the detection, you may be able toselect different actions (for example, you can download a file, quarantine a file,view focus data, create a detection exception, and so on). You can click theDetection Notes section to add notes relevant to your analysis.

Lock down the deviceassociated with adetection.

a. Click View.b. In the Actions drop-down list, click Lockdown Device.c. Select a lockdown period.d. Click Confirm Lockdown.

For more information, see Lock a device.

Export detection detailsto a JSON file.

a. Click View.b. In the Actions drop-down list, click Export Data.

Set the status of adetection event.

Do any of the following:

• Click the Status drop-down list for a detection and select the appropriatestatus.

If you select False Positive, you are prompted for how you want to handleduplicate detections. Select the appropriate option and click Save.

• Select one or more detections and click Select Action > Change Status.Select the appropriate status and click Confirm.

Delete one or moredetections.

Select the detections and click Select Action > Delete Detection. Click ConfirmDelete.

Creating custom detection rulesTo meet your organization's security needs and requirements, you can use the Optics rule editor to clone andmodify the detection rules that are available in the management console, or you can create your own customdetection rules. You can use the flexibility and logic of the Context Analysis Engine (CAE) to detect suspiciousor malicious activity, including monitoring for broad behavior characteristics (for example, files that use certainnaming patterns) or a targeted series of events (for example, a process with a certain file signature thumbprintthat creates files and initiates network connections). Custom detection rules use the same workflow as thedetection rules offered by BlackBerry, and you can configure automated response actions, user notifications, andpackage playbooks for your custom rules.

The rule editor uses JSON and provides built-in validation tools. When you validate a rule, the editor will check thesyntax to identify any issues. If the rule passes the syntax check, Optics will then use a CAE service to verify that

 | Detecting and responding to events | 39

Page 40: BlackBerry Optics Administration Guide

the rule will compile and run on a device. If either validation process discovers an issue, it will provide informationabout the errors that you must correct. After a rule passes both validation checks, you can publish the rule andadd it to detection rule sets.

This section provides guidance and reference information for building your own CAE rules. CAE rules support thefollowing data and filters:

Item Description

States States define the flow of a CAE rule, allowing Optics to statefully observe a seriesof events that can occur on a device. States represent a "1, then 2, then 3" scenariothat might occur.

Functions Functions define the logic that is required to successfully fulfill a state. This logicapplies directly to the defined field operators and represents the attributes of anevent that occurs on a device (for example, “A, and B, and C” or “A, and B, but notC”).

Field operators Field operators define how operands (facet value extractors) are evaluated. Fieldoperators include actions like equals, contains, and is true.

Operands (facet valueextractors)

Operands are the values that Optics compares. Operands allow for the extractionof specific pieces of data about an event (for example, file paths, file hashes,and process names) and compares those with literal values (for example, string,decimal, boolean, and integer).

Artifacts of interest Artifacts of interest define the artifacts that Optics can target when itexecutes automated response actions (for example, terminating processes,logging off users, or deleting files).

Paths Paths define how the CAE interprets the flow of multiple state objects within arule.

Filters Filters narrow or expand the scope of a state with a smaller or larger number ofevents to analyze.

To address performance issues in environments that generate abnormally high numbers of events (for example,server systems or software engineering systems), the CAE supports exclusion rules that you can use to excludecertain events from the Optics data pipeline. Optics does not analyze or record excluded events. You can usepreconfigured exclusion rules that are available in the management console, or you can use the rule editor tocreate your own exclusion rules using the same JSON structure as detection rules. The goal of an exclusion rule isto satisfy the rule based on processes that you want to exclude.

After you publish an exclusion rule, you can associate it with the whitelist process response action in a detectionrule set. With this response action, the CAE will automatically exclude any events and processes that match theassociated rule logic. Use caution when you use exclusion rules, because they have the potential to reduce theoverall security of Optics devices.

Sample detection ruleSee the following topics to understand the format and options for CAE rules:

• States• Functions• Field operators

 | Detecting and responding to events | 40

Page 41: BlackBerry Optics Administration Guide

• Operands (facet value extractors)• Artifacts of interest• Paths• Filters

{ "States": [ { "Name": "TestFile", "Scope": "Global", "Function": "(a)", "FieldOperators": { "a": { "Type": "Contains", "Operands": [ { "Source": "TargetFile", "Data": "Path" }, { "Source": "Literal", "Data": "my_test_file" } ], "OperandType": "String" } }, "ActivationTimeLimit": "-0:00:00.001", "Actions": [ { "Type": "AOI", "ItemName": "InstigatingProcess", "Position": "PostActivation" }, { "Type": "AOI", "ItemName": "TargetProcess", "Position": "PostActivation" }, { "Type": "AOI", "ItemName": "TargetFile", "Position": "PostActivation" } ], "HarvestContributingEvent": true, "Filters": [ { "Type": "Event", "Data": { "Category": "File", "SubCategory": "", "Type": "Create" } } ] } ], "Paths": [ {

 | Detecting and responding to events | 41

Page 42: BlackBerry Optics Administration Guide

"StateNames": [ "NewSuspiciousFile", "CertUtilDecode" ] } ], "Tags": [ "CylanceOPTICS" ]}

Create and manage detection rules and exclusionsBefore you begin: If you want to clone and modify an existing detection rule, or create your own custom rule,review the following topics and the sample detection rule to understand the format and options for CAE rules:

• States• Functions• Field operators• Operands (facet value extractors)• Artifacts of interest• Paths• Filters

1. In the management console, on the menu, click CylanceOPTICS > Configurations.2. Hover over Configurations on the top menu bar and click Detection Rules.

You can sort and filter the available detection rules and view information for each rule.3. Do any of the following:

Task Steps

Export a rule to a .json file You can export detection rules from any of the following rulecategories: Custom, Cylance Experimental, Cylance Exclusion, CylancemacOS Official, Cylance Windows Official.

Click the export icon for a rule.

Import a custom detection rulefrom a .json file

a. Click Import Rule.b. Browse to and select or drag and drop the .json file. Click Import.c. Change the rule configuration and syntax as required.d. Click Validate.e. Click Publish.

To edit a custom rule after it has been published, click the edit icon forthe rule.

Clone and modify a detection rule You can clone detection rules from any of the following rulecategories: Custom, Cylance Experimental, Cylance Exclusion, CylancemacOS Official, Cylance Windows Official.

a. Click the clone icon for a rule.b. Change the rule configuration and syntax as required.c. Click Validate.d. Click Publish.

 | Detecting and responding to events | 42

Page 43: BlackBerry Optics Administration Guide

Task Steps

Delete a custom rule You can delete rules from the Custom category only.

a. Click the delete icon for a rule.b. Click Confirm Delete.

States

States are the highest logic level of a CAE rule and have a larger number of required fields.

Field name Description

Actions This field contains a list of the objects that are used to define artifacts of interestwithin a state. For more information, see Artifacts of interest.

ActivationTimeLimit This field defines how long Optics will wait for events to trigger the event. Therecommended default value is -0:00:00:001.

FieldOperators This field contains the field operators and operands that should be inspectedto fulfill the function that is defined in the state. For more information, see Fieldoperators.

Filters This field defines which event categories, subcategories, and types that Opticsshould inspect when trying to fulfill a state. For more information, see Filters.

Function This field contains the logic function that Optics must observe to consider a stateto be satisfied. For more information, see Functions.

HarvestContributingEvents This field defines whether Optics should record the events that satisfy a state. Therecommended value is true.

Name This field defines the name of the state that will be displayed in the UI if the rule issatisfied.

Scope This field defines the scope in which Optics looks for relevant events. In mostcases, the recommended value is global.

States This field contains a list of one or more state objects. These objects can bechained.

Functions

Functions define the logic that is required to fulfill a state for a CAE rule. This logic applies directly to the definedfield operators and is used to represent "A and B and C" or "A and B but not C" attributes of an event that occurson a device. This logic applies directly to the defined field operators within a state.

Function Description Example

AND - & Two or more field operators must be matched to satisfy the state. a & b & c

 | Detecting and responding to events | 43

Page 44: BlackBerry Optics Administration Guide

Function Description Example

OR - | One of two or more field operators must be matched to satisfy the state. a | b | c

NOT - ! A defined field operator must be false or not matched to satisfy thestate.

a & b & !c

GROUP - () Field operators are grouped together to fulfill more complex logicrequirements.

(a & b) | (c & !d)

Field operators

Field operators are the logical pieces of a rule that allow Optics to compare two values. If there are two or moreoperands, and they match the comparison criteria, Optics considers that portion of the defined function to becomplete. When all pieces of the function are complete, the state is satisfied.

The field operators field is an object that consists of one or more conditional objects. These conditional objectscan be set to any value; however, they must match the same conditional values that are referenced in the functionfield. BlackBerry recommends that these names are kept to simple and logical values, such as numbers or letters.

Field operator Description

ContainsAll This field operator determines if the specified operand contains all of theoperands from a set.

Positive: "hello, I am a string" contains all from ("ello", "ng")

Negative: "hello, I am a string" does not contain all from ("hi", "ng")

ContainsAllWords This field operator determines if the specified operand contains all of theoperands from a set, where each set operand must appear as a whole wordsurrounded by white space, punctuation, or end or beginning string markers.

Positive: "hello, I am a string" contains all words from ("hello", "a", "string")

Negative: "hello, I am a string" does not contain all words from ("ello", "ng")

Contains This field operator determines if the specified operand contains any of theoperands from a set.

Positive: "hello, I am a string" contains any from ("ello", "banana")

Negative: "hello, I am a string" does not contain any from ("hi", "banana")

ContainsWord This field operator determines if the specified operand contains any of theoperands from a set, where each set operand would have to appear as a wholeword surrounded by white space, punctuation, or end or beginning string markers.

Positive: "hello, I am a string" contains any words from ("hello", "banana")

Negative: "hello, I am a string" does not contain any words from ("ello", "ng")

 | Detecting and responding to events | 44

Page 45: BlackBerry Optics Administration Guide

Field operator Description

EndsWith This field operator determines if the specified left operand ends with the specifiedright operand.

Positive: "hello, I am a string" ends with "ring"

Negative: "hello, I am a string" does not end with "bring"

Equals This field operator determines if the specified operand equals exactly any of theoperands from a set, where each set operand would have to appear as a numberor a whole word surrounded by white space, punctuation, or end or beginningstring markers.

Positive: 10 equals any from (10, 20, 30)

Positive: "hello" equals any from ("hello", "banana")

Negative: 100 does not equal any from (10, 20, 30)

Negative: "hello" does not equal any from ("ello", "ng")

GreaterThan This field operator determines if the specified left operand is greater than thespecified right operand.

Positive: 14.4 is greater than 10.1

Negative: 1 is not greater than 1000

GreaterThanOrEquals This field operator determines if the specified left operand is greater than or equalto the specified right operand.

Positive: 14.4 is greater than or equal to 10.1

Negative: 1 is not greater than or equal to 1000

InRange This field operator determines if the specified middle operand is between the leftand right operands.

Positive: 10 is between 1 and 20

Positive: 5.3 is between 5.3 and 20.1 (inclusive)

Negative: 4 is not between 5 and 10

Negative: 20 is not between 20 and 40 (exclusive)

 | Detecting and responding to events | 45

Page 46: BlackBerry Optics Administration Guide

Field operator Description

IpIsInRange This field operator determines if the TargetNetworkConnection address(SourceAddress, DestinationAddress) is within the specified "min" and "max"options.

Allowed Operands are:

{ "Source": "TargetNetworkConnection", "Data": "SourceAddress"}

And:

{ "Source": "TargetNetworkConnection", "Data": "DestinationAddress"}

Example:

"FieldOperators": { "a": { "Type": "IpIsInRange", "OperandType": "IPAddres", "Options": { "min": "123.45.67.89", "max": "123.45.67.255" }, "Operands": [ { "Source": "TargetNetworkConnection", "Data": "DestAddr" } ] }}

Include the following filters object with the above example to output the networktraffic:

"Filters": [ { "Type": "Event", "Data": { "Category": "Network", "SubCategory": "*", "Type": "Connect" } }]

 | Detecting and responding to events | 46

Page 47: BlackBerry Optics Administration Guide

Field operator Description

IsHomoglyph This field operator determines if the left operand is a homoglyph of the rightoperand. For example, a US Latin 1 "e" and a French "e" appear to be the samecharacter and have the same meaning, but they have different values.

Positive: "3xplor3" is a homoglyph of "explore" with 100% certainty

Positive: "3xplord" is a homoglyph of "explore" with 90% certainty

Negative: "temp" is not a homoglyph of "temp" because these are the same string

Negative: "431" is not a homoglyph of "big" because these share no transitivecharacteristics

IsNullOrEmpty This field operator determines if the specified operand is null or empty.

Positive: <null> is null or empty

Positive: "" is null or empty

Positive: " " is null or empty

Negative: "Hello" is not null or empty

IsPopulated This field operator determines if the specified operand is not null or empty.

Positive: "Hello" is not null or empty

Negative: <null> is null or empty

Negative: "" is null or empty

Negative: " " is null or empty

IsTrue This field operator determines if the specified value is true.

Positive: TriState.True

Negative: TriState.False

Negative: TriState.Unknown

LessThan This field operator determines if the specified left operand is less than thespecified right operand.

Positive: 4.4 is less than 10.1

Negative: 1000 is not less than 1

LessThanOrEquals This field operator determines if the specified left operand is less than or equal tothe specified right operand.

Positive: 4.4 is less than or equal to 10.1

Positive: 14 is less than or equal to 14

Negative: 1000 is not less than or equal to 1

 | Detecting and responding to events | 47

Page 48: BlackBerry Optics Administration Guide

Field operator Description

LevenshteinDistance This field operator determines if the distance, the number of changes needed toturn one operand into another operand, is within an acceptable range.

Positive: "cat" is within a Levenshtein Distance of 1 from "bat"

Positive: "hello" is within a Levenshtein Distance of 3 from "bell"

Negative: "cart" is not within a Levenshtein Distance of 1 from "act"

RegexMatches This field operator determines if the specified operand conforms to a regularexpression.

Positive: "hello, I am a string" conforms to "^hello, [Ii] am [aA] string$"

Negative: "hello, I am a string" does not conform to "^[hi|hey], I am a string$"

StartsWith This field operator determines if the specified left operand starts with thespecified right operand.

Positive: "hello, I am a string" starts with "hello, I"

Negative: "hello, I am a string" does not start with "help"

Operands (facet value extractors)

The Optics CAE uses facet value extractors to identify an individual property (facet) of a single artifact that isassociated with an event that Optics observed. While facet value extractors are narrowly scoped by themselves,they can be strung together in a logical way to analyze complex behaviors that are occurring on a device, and totrigger a detection event.

Extractor name Description Supported facets

InstigatingProcess This extractor extracts afacet from the instigatingprocess of an event,and is commonly usedto inspect the name orcommand line argumentsof a process that isinitiating an action (forexample, starting anotherprocess, initiating anetwork connection, orwriting a file).

Name (as String)

CommandLine (as String)

 | Detecting and responding to events | 48

Page 49: BlackBerry Optics Administration Guide

Extractor name Description Supported facets

InstigatingProcessImageFile This extractor extracts afacet from the image filethat is associated withthe instigating process ofan event. It is commonlyused to inspect variousattributes of the image file(for example, name, path,hash, signature status).

Path (as String)

Size (as Integer)

Md5Hash (asString)

Sha256Hash (asString)

IsHidden (asBoolean)

IsReadOnly (asBoolean)

Directory (as String)

SuspectedFileType(as String)

SignatureStatus (asString)

IsSelfSigned (asBoolean)

LeafDNSString (asString)

LeafThumbprint (asString)

LeafSignatureAlgorithm(as String)

LeafCN (as String)

LeafDN (as String)

LeafOU (as String)

LeafO (as String)

LeafL (as String)

LeafC (as String)

IssuerDNString (asString)

IssuerThumbprint (asString)

IssuerSignatureAlgorithm(as String)

IssuerCN (as String)

IssuerDN (as String)

IssuerOU (as String)

IssuerO (as String)

IssuerL (as String)

IssuerC (as String)

RootDNString (asString)

RootThumbprint (asString)

RootSignatureAlgorithm(as String)

RootCN (as String)

RootDN (as String)

RootOU (as String)

RootO (as String)

RootL (as String)

RootC (as String)

InstigatingProcessOwner This extractor extracts afacet from the ownerassociated with theinstigating process ofan event. It is commonlyused to inspect the userwho owns the process.

Name (as String)

Domain (as String)

 | Detecting and responding to events | 49

Page 50: BlackBerry Optics Administration Guide

Extractor name Description Supported facets

TargetFile This extractor extracts afacet from a file on whichan event occurred. It iscommonly used to inspectvarious attributes of thefile (for example, name,path, hash, or signaturestatus).

See InstigatingProcessImageFile above.

TargetFileOwner This extractor extractsa facet from the ownerthat is associated withthe file on which an eventoccurred. It is commonlyused to inspect the userwho owns the file.

See InstigatingProcessOwner above.

TargetNetworkConnection This extractor extracts afacet from the networkconnection on whichan event occurred. It iscommonly used to inspectthe network IP address orthe port that is acted on.

SourceAddress (as IPAddress)

SourcePort (as Integer)

DestinationAddress (as IPAddress)

DestinationPort (as Integer)

TargetProcess This extractor extracts afacet from the processon which an eventoccurred. It is commonlyused to inspect thename or command linearguments of a processthat is acted on.

See InstigatingProcess above.

TargetProcessImageFile This extractor extracts afacet from the imagefile that is associatedwith a process on whichan event occurred. It iscommonly used to inspectthe attributes of the imagefile (for example, name,path, hash, or signaturestatus).

See InstigatingProcessImageFile above.

 | Detecting and responding to events | 50

Page 51: BlackBerry Optics Administration Guide

Extractor name Description Supported facets

TargetProcessOwner This extractor extracts afacet from the ownerthat is associated witha process on which anevent occurred. It iscommonly used to inspectthe user who owns theprocess that is acted on.

See InstigatingProcessOwner above.

TargetRegistryKey This extractor extracts afacet from the registrykey on which an eventoccurred. It is commonlyused to inspect theregistry key or value thatis acted on.

Path (as String)

ValueName (as String)

Path value extractors

Extractor name Description

EnvVar EnvVar extracts an environment variable from the OS.

LiteralWithEnvVar LiteralWithEnvVar expands a path that contains an environment variable.

Literal Literal represents a literal value and is the most common extractor and operand.

Artifacts of interest

You can use the artifacts of interest (AOI) in the actions field to define a list of artifacts that Optics can performautomated response actions on. The AOI follow the same syntax as operands. Any artifact that is associatedwith an event or set of events that satisfy a state can be marked as an AOI. AOI do not need to be defined as anoperand to be considered an AOI.

If a filter is applied to a state, note that some AOI will not be available to take automatic response actions against.For example, if a file create filter is applied to a state, file and process related AOI would be available but wouldnot have registry or network-related AOI. If an irrelevant AOI is provided in a state, the Optics agent will gracefullyhandle its exclusion. The table below outlines the applicable filter to AOI relationships.

Category Subcategory Type Applicable AOI

File — Create InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetFile

TargetFileOwner

 | Detecting and responding to events | 51

Page 52: BlackBerry Optics Administration Guide

Category Subcategory Type Applicable AOI

File — Delete InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetFile

TargetFileOwner

File — Rename InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetFile

TargetFileOwner

File — Write InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetFile

TargetFileOwner

Network IPv4 Connect InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetNetworkConnection

Network IPv6 Connect InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetNetworkConnection

Network TCP Connect InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetNetworkConnection

Network UDP Connect InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetNetworkConnection

 | Detecting and responding to events | 52

Page 53: BlackBerry Optics Administration Guide

Category Subcategory Type Applicable AOI

Process — Exit InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetProcess

TargetProcessImageFile

TargetProcessOwner

Process — Start InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetProcess

TargetProcessImageFile

TargetProcessOwner

Process CylancePROTECT AbnormalExit TargetProcess

TargetProcessImageFile

TargetProcessOwner

Registry — PersistencePoint:

KeyCreating

InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetRegistryKey

Registry — PersistencePoint:

KeyCreated

InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetRegistryKey

Registry — PersistencePoint:

KeyDeleting

InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetRegistryKey

Registry — PersistencePoint:

KeyDeleted

InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetRegistryKey

 | Detecting and responding to events | 53

Page 54: BlackBerry Optics Administration Guide

Category Subcategory Type Applicable AOI

Registry — PersistencePoint:

KeyRenaming

InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetRegistryKey

Registry — PersistencePoint:

KeyRenamed

InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetRegistryKey

Registry — PersistencePoint:

ValueChanging

InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetRegistryKey

Registry — PersistencePoint:

ValueChanged

InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetRegistryKey

Registry — PersistencePoint:

ValueDeleting

InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetRegistryKey

Registry — PersistencePoint:

ValueDeleted

InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetRegistryKey

Thread — Create InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetProcess

TargetProcessImageFile

TargetProcessOwner

 | Detecting and responding to events | 54

Page 55: BlackBerry Optics Administration Guide

Category Subcategory Type Applicable AOI

Thread — Inject InstigatingProcess

InstigatingProcessImageFile

InstigatingProcessOwner

TargetProcess

TargetProcessImageFile

TargetProcessOwner

Example:

"Actions": [ { "Type": "AOI", "ItemName": "InstigatingProcess", "Position": "PostActivation" }, { "Type": "AOI", "ItemName": "TargetProcess", "Position": "PostActivation" }, { "Type": "AOI", "ItemName": "InstigatingProcessOwner", "Position": "PostActivation" }],

Paths

Paths define how the CAE interprets the flow of multiple state objects within a rule. You use paths when a ruleconsists of multiple state objects (also known as a multistate rule). States define the flow of a CAE rule andallow Optics to statefully observe a series of events that occur on a device. These represent a "1, then 2, then 3"scenario that might occur.

If a rule has one state object only, you don't need to use a paths object. Rules consist of a single state objectand do not explicitly require the use of the paths object. Rules that do utilize the paths object do so for explicitdefinition only (not for rule functionality).

In the following examples, two state objects are used, NewSuspiciousFile and CertUtilDecode. Each state has itsown set of logic.

Example 1: In the following configuration, the CAE will look for an event that satisfies the NewSuspiciousFilestate. When that state is satisfied, the CAE will look for an event that satisfies the CertUtilDecode state.

"Paths": [ { "StateNames": [ "NewSuspiciousFile", "CertUtilDecode" ] }

 | Detecting and responding to events | 55

Page 56: BlackBerry Optics Administration Guide

],

Example 2: In the following configuration, the CAE will look for an event that satisfies the CertUtilDecode state,then the NewSuspiciousFile state.

"Paths": [ { "StateNames": [ "CertUtilDecode", "NewSuspiciousFile" ] }],

Example 3: In the following configuration, the CAE will look for an event that satisfies the NewSuspiciousFilestate or the CertUtilDecode state. This is helpful when states have different filter object sets. In this example,NewSuspiciousFile uses a File Write filter and CertUtilDecode uses a process Start filter.

"Paths": [ { "StateNames": [ "CertUtilDecode" ] }, { "StateNames": [ "NewSuspiciousFile" ] }],

Filters

You can use filters to narrow or expand the scope of a state to account for a smaller or larger number of events toanalyze. Event filters use the same event categories, subcategories, and types that are outlined in Data structuresthat Optics uses to identify threats.

Example 1: The following example limits inspected events to process start events.

"Filters": [ { "Type": "Event", "Data": { "Category": "Process", "SubCategory": "", "Type": "Start" } }]

Example 2: The following example inspects all types of file events (create, write, delete).

"Filters": [ { "Type": "Event", "Data": { "Category": "File", "SubCategory": "",

 | Detecting and responding to events | 56

Page 57: BlackBerry Optics Administration Guide

"Type": "*" } }]

Create a detection exceptionTo reduce false positives or duplicate events in your detection results, you can create exceptions for detectionrules. When you create a detection exception, the specified processes will not be evaluated by the Opticsdetection engine. Use caution when you create detection exceptions, because they have the potential to reducethe overall security of devices.

1. In the management console, on the menu bar, click CylanceOPTICS > Configurations.2. Hover over Configurations on the top menu bar and click Detection Exceptions.3. Click Create Exception.4. Type a name for the detection exception.5. In the Conditions section, configure exception conditions. Click Add Another Condition to configure additional

exceptions.In a detection exception, an AND statement is applied to all conditions. All conditions must be met for theexception to be true. When you specify a value for a condition, it is treated as an ANY statement. When two ormore values are added, if any of the values exist, the condition is true.

6. Click Save.

After you finish: On the menu bar, click CylanceOPTICS > Configurations, then hover over Configurations on thetop menu bar and click Detection Rule Sets. Edit a detection rule set and assign the detection exception to thedesired rules. Click Confirm.

Deploy a package to collect data from devicesYou can use the Optics package deploy feature to remotely and securely run a process (for example, a Pythonscript) on Optics devices to collect and store desired data in a specified location for further analysis by securityadministrators. For example, you can run a process to collect browser data. You can use the Optics datacollection packages that are available in the management console or you can create your own.

When you deploy a package to devices that are offline, the deployment will wait for those devices to come onlinefor a specified period.

Before you begin:

• If desired, create a package that will execute on a device, collect specific data points, and output that data to alocal or server location that you will specify in the steps below. For more information about creating a custompackage, visit support.blackberry.com/community to read article 66563.

• If you create your own package, you must upload it to the management console. In the console, go toCylanceOPTICS > Configurations > Packages and click Upload file.

1. In the management console, on the menu bar, click CylanceOPTICS > Packages.2. Click Deploy Packages.3. In the Packages drop-down list, click the package that you want to send to devices. Click Add Another

Package to add additional packages.4. In the Collection Type drop-down list, click the location where you want to store the data that the package will

collect.

 | Detecting and responding to events | 57

Page 58: BlackBerry Optics Administration Guide

• Local saves the data at the indicated path on the device.• If you select SFTP, SMB, or S3, specify the required information.

5. Click Next.6. Select Device or Zone and select the devices or zones that you want to deliver the package to.7. If you want to specify a timeout period and priority for the package deploy, click Show advanced options and

do any of the following:

• In the Valid for drop-down list, click the desired timeout period. If a device is not online within this period,the package deploy is cancelled for that device.

• Adjust the Priority slider to set a higher or lower priority. The priority is taken into account when otherOptics jobs are queued for the same device.

8. Specify a name and description for the package deploy.9. Click Deploy.

After you finish:

• Navigate to CylanceOPTICS > Packages to view the current status and progress of the package deploy.• You can click a package deploy status to view details about the deploy. You can expand the Targets section to

view the individual status of each device. If you want to stop a package deploy that is in progress, in the SelectAction drop-down list, click Stop Job.

Create a package playbook to respond to eventsWhen a security incident occurs on a device, you can minimize your response time by creating a packageplaybook. A package playbook allows you to automate the execution of refract packages when an event triggers aContext Analysis Engine (CAE) rule that you have configured in a detection rule set.

Package playbooks support Python refract packages only. You can use out-of-the-box refract packages thatare available in the management console, or you can add your own custom refract packages. The contents of apackage playbook are stored on the device, so they can be executed even if the device is offline. You can create amaximum of 100 package playbooks.

Before you begin:

• Create a detection rule set.• If desired, create a Python refract package that can execute on a device when a detection rule is triggered. For

more information about creating a custom package, visit support.blackberry.com/community to read article66563.

• If you create your own package, you must upload it to the management console. In the console, go toCylanceOPTICS > Configurations > Packages and click Upload file.

1. In the management console, on the menu bar, click CylanceOPTICS > Configurations.2. Hover over Configurations on the top menu bar and click Package Playbooks.3. Click Create Playbook.

If you want to clone an existing package playbook, filer the list of playbooks to the desired playbook and clickthe Clone icon.

4. Type a name and description.5. In the Collection Type drop-down list, click the location where you want to store the data that the package will

collect.

• Local saves the data at the indicated path on the device.• If you select SFTP, SMB, or S3, specify the required information.

 | Detecting and responding to events | 58

Page 59: BlackBerry Optics Administration Guide

6. Click Next.7. In the Package drop-down list, click a package that you want to include in the package playbook. If necessary,

specify optional command line arguments.8. Click Add Another Package to add additional packages. You can add a maximum of 20 packages to a package

playbook.9. Click Save.

After you finish: On the menu bar, click CylanceOPTICS > Configurations, then hover over Configurations on thetop menu bar and click Detection Rule Sets. Edit a detection rule set and assign the package playbook to thedesired rules. Click Confirm. You can associate up to 10 package playbooks to each detection rule.

Lock a deviceYou can temporarily lock an infected or potentially infected device, disabling its LAN and Wi-Fi networkcapabilities to stop command and control activity, the exfiltration of data, or the lateral movement of malware.You can lock a device for up to 96 hours. You can retrieve an unlock key from the console to unlock a devicebefore the end of the lockdown period.

The lockdown feature is currently supported for Windows and macOS devices only.

1. In the management console, on the menu bar, click CylanceOPTICS > Devices.2. Find the device.3. Click Actions > Lockdown Device.

This option is not available if the device is offline.4. Select a lockdown period.5. Click Confirm Lockdown.6. If you want to unlock a device before the end of the specified lockdown period, click Actions > Show Unlock

Key. Copy the unique unlock key and run the following commands on the device:

OS Commands

Windows a. Navigate to the Optics executable folder (by default, C:\Program Files\Cylance\Optics).

b. Run CyOptics.exe control --password <unlock_key> unlock -a

macOS a. Run cd /Library/Application\ Supprt/Cylance/Optics/CyOptics.app/Contents/ Resources

b. Run sudo ../MacOS/CyOptics control --password<unlock_key> unlock -net

Sending actions to a deviceYou can use the remote response feature to securely execute scripts and run commands on any Optics-enableddevice directly from the management console, using a familiar command line interface.

When you start a remote response session, the Optics agent creates an instance of the device’s native shell (cmdfor Windows, bash for macOS and Linux) and handles the transfer of commands to and from the shell. As a result,

 | Detecting and responding to events | 59

Page 60: BlackBerry Optics Administration Guide

you have access to the functions of the native shell and the apps and scripts that are available on the device.Optics also provides some reserved commands that you can use to transfer files to and from the device.

A remote response session can be initiated only with a device that is online and will time out after 25 minutes ofinactivity. Multiple sessions can be open for the same device at the same time, to a maximum of 50.

Remote response provides a high level of access to a device, so use caution when you issue commands andcomply with your organization’s security policies. When you use remote response, the details of the session,including the commands that are sent, information about file transfers, and the responses that are received, arerecorded in the device log that you can access from the management console. The log file is retained for 30 days.

Start a remote response session1. In the management console, on the menu bar, click CylanceOPTICS > Devices.2. Find the device and click the device name.3. In the Select Action drop-down list, click Remote Response.4. Enter commands in the remote response session window.

For more information about reserved commands for Optics, see Reserved commands for remote response.

After you finish: If you want to download the device log with the record of the remote response session, on themenu bar, click CylanceOPTICS > Action History. Find the device and click Download Log.

Reserved commands for remote responseThe following reserved commands, which are common across the supported OS platforms, do not interact directlywith the native shell on the device.

Item Description

rr-clear This command clears the remote response terminal window.

rr-get <absolute_path_to_file> This command copies the specified file (which must include thefile name) from the device and uploads it to your web browser soyou can save it to your local system. If the file is larger than 70MB, the command will fail with an error.

Example: rr-get C:\Program Files\Cylance\Desktop\2021-03-26.log

rr-help This command displays a list of the reserved commands.

rr-put <destination_directory> This command opens a file browser window that allows youto select a file from your local system that will be sent tothe specified directory on the device (for example, the user’sdownloads folder). If the file is larger than 70 MB, the commandwill fail with an error.

Example: rr-put C:\Users\username\Downloads

rr-quit This command ends the remote response session. The terminalwindow remains open so you can view the session history, butcommands are no longer sent or received.

 | Detecting and responding to events | 60

Page 61: BlackBerry Optics Administration Guide

Troubleshooting BlackBerry OpticsThis section provides information to help you troubleshoot and resolve issues with Optics.

View Optics information in the audit logYou can view and export details for Optics administrative actions in the management console’s audit log. Formore information about what is added to the audit log for Optics actions, see Optics audit log information.

1.In the management console, click > Audit Log.

2. In the filter fields, specify the criteria that you want to use to filter the audit log information.3.

To export the results to a .csv file, click . Select the scope of the export and click Export.

Optics audit log informationThe following table lists the information that is added to the audit log for Optics administrative actions. You canuse the filtering options available in the console to filter the audit log results to the desired actions.

Category Action Details

Detections Change Status Detection: <detection label>; Detection ID: <detection id>; Device:<device name>; Previous Status: <previous detection status>; NewStatus: <new detection status>

Detections Remove Detection: <detection label>; Detection ID: <detection id>; Device:<device name>

DetectionException

Add Name: <name>

DetectionException

Edit Name: <name>

DetectionException

Remove Name: <name>

Detection Rule Add Name: <name>; Description: <description>; Severity: <severity>;OS: <OS list>

Detection Rule Edit Name: <name>; Description: <description>; Severity: <severity>;OS: <OS list>

Detection Rule Remove Name: <name>; Description: <description>; Severity: <severity>;OS: <OS list>

Detection Rule Set Add Name: <name>; Description: <description>; Device Policy: <devicepolicy name>

 | Troubleshooting BlackBerry Optics | 61

Page 62: BlackBerry Optics Administration Guide

Category Action Details

Detection Rule Set Edit Name: <name>; Description: <description>; Device Policy: <devicepolicy name>

Detection Rule Set Remove Name: <name>; Description: <description>; Device Policy: <devicepolicy name>

Device File Download Device: <device name>; File: <file path and name>

Device Lock Device: <device name>; Lockdown Period: <lockdown period>

Device Show Unlock Key Device: <device name>

Focus Data Add Device: <device name>; Type: <focus view type>; Artifact: <focusview artifact>

InstaQuery Add Name: <IQ name>, Artifact: <IQ artifact>, Facet: <IQ facet>, Term:<IQ term>

InstaQuery Remove Name: <IQ name>, Artifact: <IQ artifact>, Facet: <IQ facet>, Term:<IQ term>

Job Service Stop Name: <name>; Service: <parent service type>

Package Deploy Add Name: <name>; Packages: <packages>

Package Deploy Remove Name: <name>

Package PlayBook Add Name: <name>; Packages: <packages>

Package PlayBook Edit Name: <name>; Packages: <packages>

Package PlayBook Remove Name: <name>; Packages: <packages>

PlayBook Result Remove Device: <device name>; Playbook Name: <playbook name>;Detection ID: <detection id>; Status: <status>

Remote Response Connect Device: <device name>

Remote Response Disconnect Device: <device name>

 | Troubleshooting BlackBerry Optics | 62

Page 63: BlackBerry Optics Administration Guide

Troubleshooting issues with the Optics agent on Linux

Problem Possible solution

The kernel-header and kernel-devel packages do not matchthe kernel.

Use yum update kernel and restart the device.

If a restart is not possible, use one of the following commands:

• RHEL/CentOS or Amazon Linux 2: yum install kernel-headers-`uname -r` kernel-devel-`uname -r`

• Ubuntu: sudo apt-get install linux-headers -$(uname -r)

If you enable debuglogging, a “Corroboratorfound a match for PID…”message occurs in logs.

This message is expected and does not indicate a bug or other issue.

Removing the Optics agent from a deviceWhen you uninstall the Optics agent from a device, any local data that was stored by Optics and log files are alsoremoved. You must uninstall the Optics agent before you uninstall the Protect agent.

To uninstall the agent, use the standard uninstall options available on the OS (for example, Add/RemovePrograms on Windows or uninstall from Finder > Applications on macOS), or uninstall the Optics agent using OScommands.

For Windows, if you want to uninstall the agent using OS commands, the user must take ownership of the filesand directories owned by the local system.

It is a best practice to restart the device after you uninstall the agent.

Troubleshooting: Removing the Optics agent from a macOS device

Verify that the Optics agent has been removed

Run the following command:

kextstat | grep -i cyoptic

For macOS Big Sur (11.x), run the following command as well:

systemextensionsctl list | grep -i cyoptics

The commands should return no output.

Confirm that the following paths and files are no longer present on the system:

• /Library/Application Support/Cylance/Optics• /Library/Application Support/OpticsUninstall• /Applications/Cylance/Optics• /Library/LaunchDaemons/com.cylance.cyoptics_service.plist• /Library/LaunchDaemons/com.cylance.optics.postuninstall.plist

 | Troubleshooting BlackBerry Optics | 63

Page 64: BlackBerry Optics Administration Guide

• /Library/LaunchDaemons/com.cylance.cyopticsesfservice.plist

On a macOS Big Sur (11.x) device, after using an ssh session to silently uninstall the Optics agent, /Applications/Cylance/Optics/CyOpticsESFLoader.app remains and the system extension is still active

This issue occurs because Apple has no mechanism to silently uninstall system extensions without explicitconfirmation by the end user.

To resolve, use the finder to locate CyOpticsESFLoader.app and drag it to the trashcan, then confirm the UIprompt to deactivate and remove the system extension.

If you get a permissions error when you drag the file to the trashcan, run the following command to temporarilydisable Protect Desktop:

sudo launchctl unload /Library/LaunchDaemons/com.cylance.agent_service.plist

After you run the command, you can drag the file to the trashcan and confirm the UI prompt. If you want ProtectDesktop to remain active, restart the device.

Note: You must remove CyOpticsESFLoader.app in this way before removing the Protect Desktop agent from thedevice. If you remove the Protect Desktop agent before completing this task, /Applications/Cylance is removedfrom the device, including CyOpticsESFLoader.app, so you will not be able to manually delete it and deactivate thesystem extension.

 | Troubleshooting BlackBerry Optics | 64

Page 65: BlackBerry Optics Administration Guide

Legal notice ©2021 BlackBerry Limited. Trademarks, including but not limited to BLACKBERRY, BBM, BES, EMBLEM Design,ATHOC, CYLANCE and SECUSMART are the trademarks or registered trademarks of BlackBerry Limited, itssubsidiaries and/or affiliates, used under license, and the exclusive rights to such trademarks are expresslyreserved. All other trademarks are the property of their respective owners. 

 This documentation including all documentation incorporated by reference herein such as documentationprovided or made available on the BlackBerry website provided or made accessible "AS IS" and "AS AVAILABLE"and without condition, endorsement, guarantee, representation, or warranty of any kind by BlackBerry Limited andits affiliated companies ("BlackBerry") and BlackBerry assumes no responsibility for any typographical, technical,or other inaccuracies, errors, or omissions in this documentation. In order to protect BlackBerry proprietary andconfidential information and/or trade secrets, this documentation may describe some aspects of BlackBerrytechnology in generalized terms. BlackBerry reserves the right to periodically change information that is containedin this documentation; however, BlackBerry makes no commitment to provide any such changes, updates,enhancements, or other additions to this documentation to you in a timely manner or at all. 

This documentation might contain references to third-party sources of information, hardware or software,products or services including components and content such as content protected by copyright and/or third-party websites (collectively the "Third Party Products and Services"). BlackBerry does not control, and is notresponsible for, any Third Party Products and Services including, without limitation the content, accuracy,copyright compliance, compatibility, performance, trustworthiness, legality, decency, links, or any other aspectof Third Party Products and Services. The inclusion of a reference to Third Party Products and Services in thisdocumentation does not imply endorsement by BlackBerry of the Third Party Products and Services or the thirdparty in any way.

EXCEPT TO THE EXTENT SPECIFICALLY PROHIBITED BY APPLICABLE LAW IN YOUR JURISDICTION, ALLCONDITIONS, ENDORSEMENTS, GUARANTEES, REPRESENTATIONS, OR WARRANTIES OF ANY KIND, EXPRESSOR IMPLIED, INCLUDING WITHOUT LIMITATION, ANY CONDITIONS, ENDORSEMENTS, GUARANTEES,REPRESENTATIONS OR WARRANTIES OF DURABILITY, FITNESS FOR A PARTICULAR PURPOSE OR USE,MERCHANTABILITY, MERCHANTABLE QUALITY, NON-INFRINGEMENT, SATISFACTORY QUALITY, OR TITLE, ORARISING FROM A STATUTE OR CUSTOM OR A COURSE OF DEALING OR USAGE OF TRADE, OR RELATED TO THEDOCUMENTATION OR ITS USE, OR PERFORMANCE OR NON-PERFORMANCE OF ANY SOFTWARE, HARDWARE,SERVICE, OR ANY THIRD PARTY PRODUCTS AND SERVICES REFERENCED HEREIN, ARE HEREBY EXCLUDED.YOU MAY ALSO HAVE OTHER RIGHTS THAT VARY BY STATE OR PROVINCE. SOME JURISDICTIONS MAYNOT ALLOW THE EXCLUSION OR LIMITATION OF IMPLIED WARRANTIES AND CONDITIONS. TO THE EXTENTPERMITTED BY LAW, ANY IMPLIED WARRANTIES OR CONDITIONS RELATING TO THE DOCUMENTATION TOTHE EXTENT THEY CANNOT BE EXCLUDED AS SET OUT ABOVE, BUT CAN BE LIMITED, ARE HEREBY LIMITED TONINETY (90) DAYS FROM THE DATE YOU FIRST ACQUIRED THE DOCUMENTATION OR THE ITEM THAT IS THESUBJECT OF THE CLAIM.

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW IN YOUR JURISDICTION, IN NO EVENT SHALLBLACKBERRY BE LIABLE FOR ANY TYPE OF DAMAGES RELATED TO THIS DOCUMENTATION OR ITS USE,OR PERFORMANCE OR NON-PERFORMANCE OF ANY SOFTWARE, HARDWARE, SERVICE, OR ANY THIRDPARTY PRODUCTS AND SERVICES REFERENCED HEREIN INCLUDING WITHOUT LIMITATION ANY OF THEFOLLOWING DAMAGES: DIRECT, CONSEQUENTIAL, EXEMPLARY, INCIDENTAL, INDIRECT, SPECIAL, PUNITIVE,OR AGGRAVATED DAMAGES, DAMAGES FOR LOSS OF PROFITS OR REVENUES, FAILURE TO REALIZE ANYEXPECTED SAVINGS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, LOSS OF BUSINESSOPPORTUNITY, OR CORRUPTION OR LOSS OF DATA, FAILURES TO TRANSMIT OR RECEIVE ANY DATA,PROBLEMS ASSOCIATED WITH ANY APPLICATIONS USED IN CONJUNCTION WITH BLACKBERRY PRODUCTS ORSERVICES, DOWNTIME COSTS, LOSS OF THE USE OF BLACKBERRY PRODUCTS OR SERVICES OR ANY PORTIONTHEREOF OR OF ANY AIRTIME SERVICES, COST OF SUBSTITUTE GOODS, COSTS OF COVER, FACILITIES ORSERVICES, COST OF CAPITAL, OR OTHER SIMILAR PECUNIARY LOSSES, WHETHER OR NOT SUCH DAMAGES

 | Legal notice | 65

Page 66: BlackBerry Optics Administration Guide

WERE FORESEEN OR UNFORESEEN, AND EVEN IF BLACKBERRY HAS BEEN ADVISED OF THE POSSIBILITY OFSUCH DAMAGES.

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW IN YOUR JURISDICTION, BLACKBERRY SHALLHAVE NO OTHER OBLIGATION, DUTY, OR LIABILITY WHATSOEVER IN CONTRACT, TORT, OR OTHERWISE TOYOU INCLUDING ANY LIABILITY FOR NEGLIGENCE OR STRICT LIABILITY.

THE LIMITATIONS, EXCLUSIONS, AND DISCLAIMERS HEREIN SHALL APPLY: (A) IRRESPECTIVE OF THE NATUREOF THE CAUSE OF ACTION, DEMAND, OR ACTION BY YOU INCLUDING BUT NOT LIMITED TO BREACH OFCONTRACT, NEGLIGENCE, TORT, STRICT LIABILITY OR ANY OTHER LEGAL THEORY AND SHALL SURVIVE AFUNDAMENTAL BREACH OR BREACHES OR THE FAILURE OF THE ESSENTIAL PURPOSE OF THIS AGREEMENTOR OF ANY REMEDY CONTAINED HEREIN; AND (B) TO BLACKBERRY AND ITS AFFILIATED COMPANIES, THEIRSUCCESSORS, ASSIGNS, AGENTS, SUPPLIERS (INCLUDING AIRTIME SERVICE PROVIDERS), AUTHORIZEDBLACKBERRY DISTRIBUTORS (ALSO INCLUDING AIRTIME SERVICE PROVIDERS) AND THEIR RESPECTIVEDIRECTORS, EMPLOYEES, AND INDEPENDENT CONTRACTORS.

IN ADDITION TO THE LIMITATIONS AND EXCLUSIONS SET OUT ABOVE, IN NO EVENT SHALL ANY DIRECTOR,EMPLOYEE, AGENT, DISTRIBUTOR, SUPPLIER, INDEPENDENT CONTRACTOR OF BLACKBERRY OR ANYAFFILIATES OF BLACKBERRY HAVE ANY LIABILITY ARISING FROM OR RELATED TO THE DOCUMENTATION.

Prior to subscribing for, installing, or using any Third Party Products and Services, it is your responsibility toensure that your airtime service provider has agreed to support all of their features. Some airtime serviceproviders might not offer Internet browsing functionality with a subscription to the BlackBerry® Internet Service.Check with your service provider for availability, roaming arrangements, service plans and features. Installationor use of Third Party Products and Services with BlackBerry's products and services may require one or morepatent, trademark, copyright, or other licenses in order to avoid infringement or violation of third party rights. Youare solely responsible for determining whether to use Third Party Products and Services and if any third partylicenses are required to do so. If required you are responsible for acquiring them. You should not install or useThird Party Products and Services until all necessary licenses have been acquired. Any Third Party Products andServices that are provided with BlackBerry's products and services are provided as a convenience to you and areprovided "AS IS" with no express or implied conditions, endorsements, guarantees, representations, or warrantiesof any kind by BlackBerry and BlackBerry assumes no liability whatsoever, in relation thereto. Your use of ThirdParty Products and Services shall be governed by and subject to you agreeing to the terms of separate licensesand other agreements applicable thereto with third parties, except to the extent expressly covered by a license orother agreement with BlackBerry.

The terms of use of any BlackBerry product or service are set out in a separate license or other agreement withBlackBerry applicable thereto. NOTHING IN THIS DOCUMENTATION IS INTENDED TO SUPERSEDE ANY EXPRESSWRITTEN AGREEMENTS OR WARRANTIES PROVIDED BY BLACKBERRY FOR PORTIONS OF ANY BLACKBERRYPRODUCT OR SERVICE OTHER THAN THIS DOCUMENTATION.

BlackBerry Enterprise Software incorporates certain third-party software. The license and copyright informationassociated with this software is available at http://worldwide.blackberry.com/legal/thirdpartysoftware.jsp.

BlackBerry Limited2200 University Avenue EastWaterloo, OntarioCanada N2K 0A7

BlackBerry UK LimitedGround Floor, The Pearce Building, West Street,Maidenhead, Berkshire SL6 1RLUnited Kingdom

Published in Canada

 | Legal notice | 66