mirror of
https://github.com/fleetdm/fleet
synced 2026-04-21 21:47:20 +00:00
* add file destination flag for convert command, add tests * add changes file * remove leftover debugging code, add comment explaing why sorting was necessary * update docs for fleetctl convert * Update cmd/fleetctl/convert_test.go Co-authored-by: Zach Wasserman <zach@fleetdm.com>
44 lines
1.7 KiB
Text
44 lines
1.7 KiB
Text
{
|
|
"queries": {
|
|
"launchd": {
|
|
"query" : "select * from launchd;",
|
|
"interval" : "3600",
|
|
"platform" : "darwin",
|
|
"version" : "1.4.5",
|
|
"description" : "Retrieves all the daemons that will run in the start of the target OSX system.",
|
|
"value" : "Identify malware that uses this persistence mechanism to launch at system boot"
|
|
},
|
|
"disk_encryption": {
|
|
"query" : "select * from disk_encryption;",
|
|
"interval" : "86400",
|
|
"platform": "posix",
|
|
"version" : "1.4.5",
|
|
"description" : "Retrieves the current disk encryption status for the target system.",
|
|
"value" : "Identifies a system potentially vulnerable to disk cloning."
|
|
},
|
|
"iptables": {
|
|
"query" : "select * from iptables;",
|
|
"interval" : "3600",
|
|
"platform" : "linux",
|
|
"version" : "1.4.5",
|
|
"description" : "Retrieves the current filters and chains per filter in the target system.",
|
|
"value" : "Verify firewall settings are as restrictive as you need. Identify unwanted firewall holes made by malware or humans"
|
|
},
|
|
"app_schemes": {
|
|
"query" : "select * from app_schemes;",
|
|
"interval" : "86400",
|
|
"platform" : "darwin",
|
|
"version" : "1.4.7",
|
|
"description" : "Retrieves the list of application scheme/protocol-based IPC handlers.",
|
|
"value" : "Post-priori hijack detection, detect potential sensitive information leakage."
|
|
},
|
|
"sandboxes": {
|
|
"query" : "select * from sandboxes;",
|
|
"interval" : "86400",
|
|
"platform" : "darwin",
|
|
"version" : "1.4.7",
|
|
"description" : "Lists the application bundle that owns a sandbox label.",
|
|
"value" : "Post-priori hijack detection, detect potential sensitive information leakage."
|
|
}
|
|
}
|
|
}
|