Security
Your Level agents were blocked? Be grateful that you have a good EDR and tune it!
A few months ago an IT team contacted us (a bit frustrated) because their Endpoint Detection and Response (EDR) system had flagged and blocked Level as a potential security threat. Level is their primary tool for managing and securing their endpoints, and an absolute necessity in their daily work. Initially they were flustered and asked: "Why is Level being blocked by our security stack?"
A few weeks later, the same EDR detected and stopped an intrusion attempt from a malicious actor who was exploiting a vulnerability through a different RMM tool. This incident was a revelation for them. The attack specifically sought to use another RMM's extensive access and control features for malicious purposes. Attackers are using industry-trusted tools to bypass security stacks.
The event illustrates a critical lesson: the EDR’s action to block unauthorized RMM tools wasn't an inconvenience but a crucial protective measure. It highlights the importance of configuring the EDR to trust the organization's chosen RMM tool while maintaining a healthy suspicion of all others. This wasn't about hindering operations but about ensuring that the only remote control tool operating within their network was the only one they trusted.
EDRs represent a central component of our defense against cyber threats, employing advanced strategies to detect, investigate, and respond to potential security incidents at the endpoint level. Their role in the cybersecurity infrastructure is indisputable, offering unparalleled visibility and control over the activities transpiring within our networks. However, the rigorous scrutiny applied by EDRs can sometimes result in the unintentional blocking of legitimate tools, like Level, which is pivotal for IT teams in managing systems remotely.
Any RMM tool, designed to streamline the management of IT systems, can inadvertently be marked as malicious by EDRs. This is not without reason; the same capabilities that make RMMs invaluable to IT professionals also render them potent tools in the hands of adversaries, should they be compromised. It's a double-edged sword – the efficiency and control afforded by RMMs, if weaponized, can become a significant threat to organizational security.
The frustration that arises when EDRs block RMM tools is understandable. We rely on RMMs for a myriad of critical tasks, from routine maintenance to urgent incident responses. When access is impeded, the immediate reaction is often one of irritation towards the RMM, perceived as the root of the complication. However, this perspective misses the broader context of the EDR's function – to safeguard the endpoint ecosystem against any and all threats.
Acknowledging this, the path forward is not to question the vigilance of EDRs but to refine our approach to their configuration. The essence of the solution lies in tuning EDRs to recognize and allow the RMM tools employed by the IT team, ensuring their unimpeded operation. This strategy does not dilute the security posture but rather strengthens it by maintaining rigorous scrutiny over all other RMMs and remote access tools by subjecting them to the EDR's full analysis.
In EDRs, exceptions (also known as exclusions) are needed for ensuring that legitimate applications like RMM tools operate efficiently without being mistakenly identified as security risks. There are three primary types of exceptions that should be considered when configuring the EDR to accommodate tools like Level:
For Level, the specific signer identity to exclude is "LEVEL SOFTWARE, INC."
We strongly recommend using the certificate signature exclusion whenever possible. This method leverages the security and authenticity guaranteed by digital certificates, focusing on the identity of the software provider rather than just the location or characteristics of its files.
Crafting the right EDR exceptions is a crucial step toward ensuring that remote access tools like Level seamlessly integrate into your IT infrastructure without compromising security. By prioritizing certificate signature exclusions, IT teams can maintain operational efficiency and robust security measures simultaneously.
Guiding our clients through the nuances of EDR configurations, especially in creating specific exceptions for Level, is part of our commitment to providing a secure and efficient remote management experience.
Please let us know if you have further questions or comments about ensuring Level operates smoothly alongside your security tools!
At Level, we understand the modern challenges faced by IT professionals. That's why we've crafted a robust, browser-based Remote Monitoring and Management (RMM) platform that's as flexible as it is secure. Whether your team operates on Windows, Mac, or Linux, Level equips you with the tools to manage, monitor, and control your company's devices seamlessly from anywhere.
Ready to revolutionize how your IT team works? Experience the power of managing a thousand devices as effortlessly as one. Start with Level today—sign up for a free trial or book a demo to see Level in action.