Update pricing-features-table.yml (#14863)

This commit is contained in:
Mike McNeil 2023-11-01 11:58:47 -05:00 committed by GitHub
parent 8659155c98
commit 0aa953b602
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -35,7 +35,7 @@
# ╚═╗║ ╠╦╝║╠═╝ ║ ║╣ ╔╩╦╝║╣ ║ ║ ║ ║ ║║ ║║║║
# ╚═╝╚═╝╩╚═╩╩ ╩ ╚═╝╩ ╚═╚═╝╚═╝╚═╝ ╩ ╩╚═╝╝╚╝
- industryName: Script execution
fiendlyName: Safely execute custom scripts (macOS, Windows, and Linux)
friendlyName: Safely execute custom scripts (macOS, Windows, and Linux)
description: Deploy and execute custom scripts using a REST API, and manage your library of scripts in the UI or a git repo.
documentationUrl: https://fleetdm.com/docs/using-fleet/scripts
tier: Premium
@ -71,7 +71,7 @@
- description:
quote:
moreInfoUrl:
buzzwords: [Attack surface management (ASM),Endpoint hardening,Security posture,Cyber hygiene,Threat hunting]
buzzwords: [Attack surface management (ASM),Endpoint hardening,Security posture,Cyber hygiene,Anomaly detection,Configuration management]
waysToUse:
- description: Monitor devices that don't meet your organization's custom security policies
- description: Quickly report your posture and vulnerabilities to auditors, showing remediation status and timing.
@ -176,17 +176,22 @@
# ╔╦╗╔═╗╦ ╦ ╦╔═╗╦═╗╔═╗ ╔╦╗╔═╗╔╦╗╔═╗╔═╗╔╦╗╦╔═╗╔╗╔ ┌─╦ ╦╔═╗╦═╗╔═╗─┐
# ║║║╠═╣║ ║║║╠═╣╠╦╝║╣ ║║║╣ ║ ║╣ ║ ║ ║║ ║║║║ │ ╚╦╝╠═╣╠╦╝╠═╣ │
# ╩ ╩╩ ╩╩═╝╚╩╝╩ ╩╩╚═╚═╝ ═╩╝╚═╝ ╩ ╚═╝╚═╝ ╩ ╩╚═╝╝╚╝ └─ ╩ ╩ ╩╩╚═╩ ╩─┘
- industryName: Malware detection (YARA)
fiendlyName: Scan files for malware signatures
- industryName: Malware detection (YARA) # TODO: consider: technically more than YARA, consider generalizing this and including the concept of comparing known binary hashes (either via live query or in the data lake to compare threat intel feed)
friendlyName: Scan files for malware signatures
description: Report and trigger automations when malware or other unexpected files are detected on a host using YARA signatures.
documentationUrl: https://fleetdm.com/tables/yara
tier: Free
dri: mikermcneil
usualDepartment: Security
productCategories: [Endpoint operations,Vulnerability management]
buzzwords: [YARA scanning,Antivirus (AV),Endpoint protection platform (EPP),Signature-based malware detection,Malware scanning,Malware analysis,Anomaly detection]
buzzwords: [YARA scanning,Cyber Threat Intelligence (CTI),Indicators of compromise (IOCs),Antivirus (AV),Endpoint protection platform (EPP),Endpoint detection and response (EDR),Malware detection,Signature-based malware detection,Malware scanning,Malware analysis,Anomaly detection]
demos:
- description: A top media company used Fleet policies with YARA rules to continuously scan host filesystems for malware signatures provided by internal and external threat intelligence teams.
moreInfoUrl: # short demo video
waysToUse:
- description: Write YARA rules to continuously scan host filesystems for malware signatures using policies.
- description: Detect suspicious bytecode in JAR files
- description: Identify suspicious patterns in binaries using YARA signatures # (≈regular expressions for binary)
- description: Continuously scan host filesystems for malware signatures.
moreInfoUrl: https://yara.readthedocs.io/en/stable/writingrules.html
- description: Monitor for relevent filesystem changes (YARA events) and on-demand YARA signature scans.
moreInfoUrl: https://osquery.readthedocs.io/en/stable/deployment/yara/
@ -200,6 +205,68 @@
moreInfoUrl: https://osquery.readthedocs.io/en/stable/deployment/anomaly-detection/
- description: Run a targeted YARA scan with osquery as a lightweight approach to scan anything on a host filesystem, with minimal performance impact. Unlike full system YARA scans which consume considerable CPU resources, an equivalent YARA scan targeted in Fleet can be 8x cheaper (CPU %).
moreInfoUrl: https://www.tripwire.com/state-of-security/signature-socket-based-malware-detection-osquery-yara
- industryName: Detection engineering
friendlyName: # Ship logs to your data lake and comopare with known bad binary hashes or capture behavioral data and build custom detections (e.g. using a framework like MITRE)
description:
documentationUrl:
tier: Free
dri: mikermcneil
usualDepartment: Security
productCategories: [Endpoint operations]
buzzwords: [Security analytics,Behavioral analytics,MITRE ATT&CK,Tactics techniques and procedures (TTPs),Security information and event management (SIEM)]
demos:
- description:
moreInfoUrl:
waysToUse:
- description:
- industryName: Threat hunting
friendlyName: # TODO: live query
description:
documentationUrl:
tier: Free
dri: mikermcneil
usualDepartment: Security
productCategories: [Endpoint operations]
buzzwords: []
demos:
- description:
moreInfoUrl:
waysToUse:
- description:
- industryName: Incident response
friendlyName: # TODO: live query, triage, figuring out scope of impact, remediate using scripts, MDM commands (e.g. remote wipe), and quarantine or reimage using other systems and APIs (e.g. remove from network, decommission container)
description:
documentationUrl:
tier: Free
dri: mikermcneil
usualDepartment: Security
productCategories: [Endpoint operations]
buzzwords: []
demos:
- description:
moreInfoUrl:
waysToUse:
- description:
- industryName: Binary authorization
friendlyName: Restrict what programs can run, and what files running programs can access.
description:
documentationUrl:
tier: Free
dri: mikermcneil
usualDepartment: Security
productCategories: [Endpoint operations]
comingSoonOn: YYYY-MM-DD
buzzwords: [Mandatory Access Control (MAC),Privilege confinement,Binary authorization,Santa,Binary allowlisting,Binary whitelisting]
demos:
- description:
moreInfoUrl:
waysToUse:
- description: Confine programs to a limited set of resources.
- description: Report on AppArmor events
moreInfoUrl: https://fleetdm.com/tables/apparmor_events
- description: Confine programs according to a set of rules that specify which files a program can access.
moreInfoUrl: https://wiki.debian.org/AppArmor
- description: Proactively protect the system against both known and unknown vulnerabilities.
# ╔═╗╔═╗╔═╗╔╗╔╔╦╗ ╔═╗╦ ╦╔╦╗╔═╗ ╦ ╦╔═╗╔╦╗╔═╗╔╦╗╔═╗
# ╠═╣║ ╦║╣ ║║║ ║ ╠═╣║ ║ ║ ║ ║───║ ║╠═╝ ║║╠═╣ ║ ║╣
# ╩ ╩╚═╝╚═╝╝╚╝ ╩ ╩ ╩╚═╝ ╩ ╚═╝ ╚═╝╩ ═╩╝╩ ╩ ╩ ╚═╝