Claroty+CTD+v5 1 0+User+Guide+19Dec2024
Claroty+CTD+v5 1 0+User+Guide+19Dec2024
December 2024
www.claroty.com | © 2024 Claroty Ltd. All rights reserved
Industrial
Table of Contents
1. About CTD ..................................................................................................................... 13
1.1. Key Benefits ........................................................................................................ 13
1.1.1. Visibility with Active and Passive Methods .............................................. 13
1.1.2. Root Cause Analytics and ML Algorithm ................................................. 14
1.2. Architecture ......................................................................................................... 15
1.3. Scalability ............................................................................................................ 16
1.4. CTD Server ......................................................................................................... 16
1.4.1. DPI Processing ........................................................................................ 16
1.4.2. Distributed Configuration ......................................................................... 17
1.5. Enterprise Management Console (EMC) ............................................................ 17
1.6. CTD Sensor ........................................................................................................ 18
1.7. CTD Sensor Lite ................................................................................................. 19
1.8. Claroty Edge ....................................................................................................... 19
4. Visibility .......................................................................................................................... 40
4.1. Visibility Overview ............................................................................................... 40
4.1.1. Visibility Overview .................................................................................... 40
4.1.2. Site Visibility Overview ............................................................................. 40
4.1.2.1. Site Visibility Widgets .................................................................... 42
4.1.3. EMC Visibility Overview ........................................................................... 43
4.1.3.1. EMC Visibility Widgets .................................................................. 45
4.2. About Assets and Views ..................................................................................... 46
4.2.1. Assets ...................................................................................................... 46
4.2.2. List View ................................................................................................... 46
4.2.3. Layered Topology View ............................................................................ 49
4.2.4. Network Topology View ............................................................................ 50
4.2.5. Asset Classes .......................................................................................... 50
4.2.6. Asset Types ............................................................................................. 51
4.2.7. Auto-Calculation of Subnets .................................................................... 53
4.3. Detailed Asset Page ........................................................................................... 54
4.3.1. Detailed Asset Page ................................................................................ 54
4.3.2. Physical Connections ............................................................................... 59
4.3.3. Changing Purdue Model Levels ............................................................... 60
4.3.4. Risk Score Widgets .................................................................................. 61
4.3.5. Network Communication Map .................................................................. 62
4.3.6. Cross Site Correlations ............................................................................ 63
4.4. Asset Actions ...................................................................................................... 64
4.4.1. Group By .................................................................................................. 64
4.4.2. Asset Color By ......................................................................................... 65
4.4.3. Showing Asset Neighbors ........................................................................ 66
4.4.4. Changing Asset Mode Manually .............................................................. 68
4.4.5. Merging Assets in the Assets Page ......................................................... 70
4.4.5.1. Asset Merge Principles ................................................................. 71
4.4.5.2. Merging Assets ............................................................................. 72
4.4.6. Showing Asset Related Items .................................................................. 74
1. About CTD
• SIEM systems
• Log management systems
• Asset management systems
• Ticketing systems.
The integration of CTD with existing security tools provides Security Operations Center (SOC)
teams with real-time alerts and threat hunting capabilities. Its visibility features improve network
segmentation. Security Operators monitor the industrial network and can identify network
vulnerabilities. This saves time and improves cyber resiliency.
In the active mode, CTD uses active querying for asset information. CTD scans and performs
queries of the assets. CTD’s Active solution is detailed in the CTD Reference Guide: Active
Detection.
When passively sniffing the network, mapping it, and gathering information, CTD identifies
and exposes security threats. CTD uses network behaviors (a “baseline”) by examining
network communication through a Switched Port Analyzer (SPAN) port. It separates valid
communication from security threats.
CTD closely inspects every network communication and collects all events to identify a possible
threat. All related events go into a single alert that notifies of a possible threat to the process,
such as an operational anomaly or a security attack. One alert per threat rather than one alert
per event avoids alert‐overload.
RCA reduces noise and presents the user with relevant data as alerts.
The ML algorithm distinguishes legitimate minor events from alerts that are a risk to the
environment. Every change is logged in the system and classified as an event, but only
the highest alerts are shown to the end-user. These alerts are enriched by Claroty’s Threat
Intelligence (CTI). Risk-based indicators and a proprietary scoring index prioritize these ML-
generated alerts within an end-user’s queue. Alerting sensitivity is customizable to assist
different organizations’ risk acceptance criteria.
1.2. Architecture
CTD’s scalable architecture supports a variety of hierarchies and use cases:
CTD can be configured as a simple standalone server or in a distributed model where lower
components are connected to an Enterprise Management Console (EMC). It can accommodate
widely geographically dispersed environments with a sizable number of assets across multiple
remote sites. It can also be configured to support installations in extreme environments across
isolated sites that have low network bandwidth or satellite connectivity.
The CTD solution is made of several components. A CTD Server is located at each site and
performs sniffing and Deep Packet Inspection (DPI). The CTD Server is connected through a
span port to sniff the network. Additionally, for isolated network segments, one or more CTD
Sensors may be used to collect and process network traffic and send it to the CTD Server
for incorporation into its database. Information from all CTD Servers are sent to the Enterprise
Management Console. The EMC gathers all the relevant information and displays the security
posture of all sites.
1.3. Scalability
CTD is designed with scalable architecture to support deployments in environments across
multiple remote sites – often in extreme environmental conditions.
CTD supports deployments in refineries, power generation, electric transmission grids, oil and
gas pipelines, and manufacturing. This unique architecture can be deployed at large, distributed
installations, monitoring thousands of devices.
• Sniffing
• Dissection
• Processing
• Correlation
• Visualization
CTD collects all the data in the network and builds the asset inventory. Based on what the
system learned, it creates security and integrity alerts like policy deviation.
It creates a risk assessment report with all the risks and analysis of the network, including:
• Unsecure protocols
• Unpatched vulnerabilities
• Open alerts
• Protocol distribution
The distributed configuration is useful for assets not accessible to a CTD Server, or to balance
the load on a single CTD Server.
It displays the:
• network diagram
• statistics
The EMC interface provides a global dashboard that consolidates data from multiple sites,
showing their:
• Assets
• Activities
• Alerts
• Access requests
The EMC also manages the CTD Servers, like upgrading the CTD application on the CTD
Servers and if present, their attached CTD Sensors.
• SIEM solutions
• Firewalls
• Active Directory
• SMTP servers
A CTD Sensor component performs sniffing, dissection, and part of the processing. To lower the
bandwidth required to the CTD server, the CTD sensor sends only anomalies, new assets, and
other types of metadata to the CTD server.
The CTD Sensor operates as a remote extension of the CTD Server. It is used in sites
with limited physical connectivity or across multiple remote sites with limited out-of-band
aggregation.
In addition to passive data monitoring, the CTD Sensor is also capable of performing all of the
active queries available in CTD through the normal connection between sensor and site. This
allows for active queries deeper in the environment, without needing complicated firewall or
routing rules between the site and sensor.
Windows data and nearby network devices, and then sends the output of this to the CTD server
for processing, correlation, and visualization.
These capabilities extend even to networks that are fully air-gapped, remote, composed of
outsourced infrastructure, operated by third-parties, and/or have other characteristics that have
rendered them incompatible with traditional industrial cybersecurity solutions.
2. CTD Interface
• extreme visibility
• continuous threat and vulnerability monitoring
• deep insights into ICS networks.
It was designed to ensure safe, secure, and reliable operations in large, complex industrial
networks – ensuring zero impact to the operational processes and improved cyber resiliency.
CTD:
It alerts you to
• network changes
• vulnerabilities
• threats.
The alerts the system generates provides the context you need to investigate and respond
quickly.
2.2. Login
You can log into CTD using either a username and password or SAML Authentication.
1. Enter the username and password provided by your Administrator, and click Log In:
2. If your Administrator enabled a SAML login for you, click the SAML AUTHENTICATION
button.
2.3. Dashboard
The CTD Dashboard provides an at-a-glance assessment of key information for the entire
enterprise or for an individual site. (When selecting a specific site from the EMC, the Dashboard
displayed is the same as when viewed from the CTD Site directly.)
The Dashboard appears by default when logging into the system, unless configured differently
in your environment. It can be accessed at any time by clicking Dashboard in the Main Menu.
The Dashboard consists of 7 widgets that emphasize real time characteristics for the entire
enterprise or an individual site for the last day, week, month, year, or selected date range.
Note
The Year option is not available for high-scale installations of 50 or more Sites.
The EMC Enterprise Overview offers overview information for each Site in the enterprise and
enables you to quickly dig deeper as needed. You can view enterprise-wide and site-specific
information, and search and filter for specific sites.
To access the Enterprise Overview, select Enterprise Overview in the main menu.
• Disconnected sites
2.4.2. Filter By
To show information for specific sites, the following options are available:
• Search - To search for a specific site in the enterprise, type part or all of the site name and
press <Enter>.
• Status - To filter the list for disconnected or connected sites, select Disconnected or
Connected in the drop-down list.
1. Site name - Click the link to open the site's Assets list.
2. Site IP address
3. CTD version number - Indicates the current version number of the Site and whether or not
it is aligned with the EMC.
• Aligned with the EMC -
• Not aligned with the EMC -
4. Training Mode indicator (does not appear when in Operational Mode)
5. Connection status - Indicates whether the Site is Connected or Disconnected from the
network.
6. Process Integrity - Total number of process integrity alerts. Click to open the site's Alerts
page, filtered for process integrity alerts.
7. Security Events - Total number of security alerts. Click to open the site's Alerts page,
filtered for security alerts.
8. Assets - Total number of assets. Click the link to open the site's Assets list.
9. Site Graphic - Each site in the Enterprise can be represented by a different graphic image.
To change this image, see Changing the Site Graphic.
For example, you might want each site in a manufacturing line or in a certain time zone to have
the same image. Or you might want each site to have a unique image.
Note
The change is made per Site.
2. If needed, use the Site Name box to search for the Site whose graphic you want to change.
3. In the Site's Actions column, click the camera icon .
4. Browse to the location of the graphic file and upload it.
A success message is displayed and the graphic appears in the Enterprise Overview.
• Dates are displayed in the format DD MMM YYYY; for example, 10 Dec 2020.
• Time is displayed in the 24-hour format; for example: 03:00, 15:00.
CTD is based on a hierarchical navigation system that supports finding and navigating to
specific information or configurations down to a desired page. Instead of needing to recall the
exact hierarchy of a page in the system, you can simply search for it.
This is especially helpful if your role and responsibilities require you to use different parts of
CTD at different times.
This navigation system, from which all CTD pages can be accessed, includes:
• A hierarchical menu, structured according to the core CTD focus areas: Threat Detection,
Risk and Vulnerability, Investigation, Visibility, and System Settings
• Quick page search and navigation
• A Navigation Path for clear indication of your location
• The option to show or hide the menu to save screen space for the main content
Note
When a new version of CTD becomes available, a banner appears at the top of the page
with a brief description of a new feature and the option to learn more by clicking a link.
Click the X on the banner to close it.
Click the three-line menu icon on the top left corner of the interface to hide the Main Menu
for the CTD Platform. Click again to show it.
Enterprise Overview – A high level overview for all multiple site deployments.
Relevant only for Admins. Available on the EMC only. See Enterprise Overview.
Dashboard – Provides an overview of the network with dynamic graphs and metrics;
see Dashboard.
Visibility – Gives comprehensive visibility of assets and their exposures.
Risk & Vulnerabilities –Identifies which aspects of the network can be fortified to
achieve a more robust network architecture and enhance protection of the system.
Threat Detection – Used to identify threats early in their process. Relying on
its in-depth knowledge of protocols, configuration, and communication flows, the
system identifies known threat attacks and zero-day attacks as well as ones with
sophisticated OT payloads.
Investigation –Used to investigate alerts or events in the network. Gives deeper
visibility and tools for understanding the network and its behavior.
Reports – Enables you to create rich graphical and textual reports that meet the
needs of multiple stakeholders in your enterprise. It also contains a large collection
of Claroty-created reports that can be used as-is or copied and then modified for
various needs. See About Reports.
(Settings) – Primarily used for Admins to set up and customize CTD features as
needed.
1. Hide/Show Main Menu – Click to hide or show the Main Menu and search window.
2. Site Selector – For sites connected to an EMC, enables you to view and perform CTD
functions on an individual site on all sites collectively.
3. Navigation Path – Indicates where in the CTD navigational hierarchy you are. Underlined
items in the path indicate a table.
(In the example, you are currently viewing the details of Event #1. Clicking Alerts in the
path brings you one level up to the entire Alerts list).
4. Site Syncing - When the site is syncing with the EMC, the Site Syncing indicator displays
on both the site and the EMC.
While the sync is occurring, you might notice temporary discrepancies between the site and
EMC data.
5. System Mode – (Site only) When the system is in Training Mode, the Training indicator
displays.
6. Logged-in User Menu – Opens a menu for viewing and performing functions related to the
logged-in user.
Note
This drop-down menu and search are only available when connected to an EMC.
• Change Password – Reset your password. The Change Password popup opens, and you
need to provide your correct current password and your new password:
You can set the time zone for the Site either according to the country/city in which it is located,
or by its GMT+offset. (GMT+offset is not affected by daylight saving time definitions).
This setting affects only the time zone you see in your browser. Each user can set a different
time zone, while the browser time zone is the Default.
Note
After changing the time zone, refresh your browser window to see the updated time.
Note
Internal page changes are not considered for back navigation.
4. Visibility
The Visibility widgets present the network topology showing the assets and the network
analytics. Network-based diagrams show the communication patterns and dataflows. They are
according to the Purdue model format, both line and plant level, depending on the deployment
architecture. Users can use them to identify all the details of the individual components,
as well as their operating systems, firmware, device classifications, and more. Potential
misconfiguration issues are flagged quickly. By automatically clustering assets and baselines
into virtual zones, users have the advantage of managing them more effectively.
• In the Main Menu, select the site from the Site Selector and click Visibility > Overview .
The Visibility Overview appears as follows:
1. Use the Time Frame Selector to display information based on the time period of your
preference (day/week/month/year/date range). All widgets described below represent the
results per the selected duration.
2. Visibility Info Bar – Displays the total assets, zones, IT/OT/IoT assets, new assets and
inactive assets.
3. Discovered Assets – Displays the breakdown of prominent assets discovered, subdivided
into asset types: OT, IT, External, Broadcast/Multicast, Ghosts, etc.
4. IT vs OT Policies – This widget presents bar graphs of IT vs. OT policies.
5. Asset Breakdown: Types – Pie chart showing each asset breakdown per asset Type.
6. OT Assets Distribution – The breakdown of the OT assets per type (e.g. PLC, HMI,
Engineering Station).
7. IT Assets Distribution – The breakdown of the IT assets per type (e.g. Endpoint, Printer,
Networking).
8. IoT Assets Distribution – The breakdown of the IoT assets per type (e.g. Camera, VOIP
Phone).
9. DNS Queries Over Time – A time graph of the number of DNS queries that have occurred.
10. Most Frequent DNS Queries– Provides a listing of the most frequent DNS Queries and
how often each has occurred.
11. Most Common Domain Names by Assets– Provides a listing of the most frequent DNS
Queries and how often each has occurred.
12. Network Analytics – Graph of bandwidth breakdown per most prevalent protocols.
13. Summary – A count of OT Assets, OT Operations, and Write and Execute type OT
Operations.
14. OT Operations by type – Breaks down the number of alerts for each type of OT operation.
15. Latest OT Operation – Lists the top 10 most recent OT asset alerts.
16. Top Assets by Process Value Requests – Lists the top 10 assets with the highest Read/
Publish or Write counts.
Note
These Visibility breakdown widgets are not affected by the timeframe. Clicking on any
portion of the pie chart leads you to the corresponding filtered list view of the Asset Page.
• In the Main Menu, select EMC from the Site Selector and click Visibility > Overview.
The EMC Visibility Overview appears as follows:
Use the Time Frame Selector to display information based on the time period of your
preference (day/week/month/year/date range). All widgets described below represent the results
per the selected duration.
1. Visibility Info Bar – Displays the total assets, IT/OT/IoT assets, new assets and inactive
assets across all sites.
2. Discovered Assets – Displays the breakdown of prominent assets discovered, subdivided
into asset types: OT, IT, External, Broadcast/Multicast, Ghosts, etc. across all sites.
3. Number of Assets – Shows the total number of assets per site.
4. Sites with the Largest Amount of Assets – Displays up to 10 sites with the largest
amount of assets, subdivided into asset types: OT, IT, External, Broadcast/Multicast,
Ghosts, etc. The vertical bar graphs are per site. A color legend is displayed for
distinguishing the most prominent types of assets in each site.
5. IT vs OT Policies – Shows horizontal bar graphs of IT vs. OT policies per site.
6. Asset Breakdown: Types – Pie chart showing each asset breakdown per asset Type per
site. Use the < > arrows to navigate to the < Previous or Next > sites.
7. Asset Breakdown: Zones – Pie chart showing each asset breakdown per asset Zone per
site. Use the arrows to navigate to the other sites.
8. Asset Breakdown: Subnets – Pie chart showing each asset breakdown per asset Subnet
per site. Use the arrows to navigate to the other sites.
Note
These Visibility breakdown widgets are not affected by the timeframe. Clicking on any
portion of the pie chart leads you to the corresponding filtered Asset Page.
9. OT Asset Distribution by Site - The breakdown of the OT assets per type (e.g. PLC, HMI,
Engineering Station).
10. IT Asset Distribution by Site – The breakdown of the IT assets per type (e.g. Endpoint,
Printer, Networking) per site.
11. IoT Asset Distribution by Site – The breakdown of the IoT assets per type (e.g. Camera,
VOIP Phone) per site.
12. Summary – A count of OT Assets, OT Operations, and Write and Execute type OT
Operations.
13. OT Operations by type – Breaks down the number of alerts for each type of OT operation.
14. Latest OT Operation – Lists the top 10 most recent OT asset alerts.
4.2.1. Assets
You can manage your asset inventory from the Assets page.
To access the Assets page, click Visibility > Assets from the Main Menu.
This page enables monitoring of network and asset information, activities, and statuses. You
can view operational statistics, baseline details, and your asset inventory. You can follow the
asset’s alerts, activities, and statuses.
Network The Network Topology View visualizes all assets that are currently filtered and
Topology positions them by the communication between them. Assets that communicate with
each other are shown closer together.
• Navigate to Visibility > Assets in the Main Menu. The List view is displayed as follows:
• First Seen – Date and time the asset was first detected
• Last Seen – Date and time the asset was last detected
• Seen by Edge ID - IDs of all Edge Hosts that discovered the asset
• Seen by Edge - If an Asset was seen by Edge or is the host, then Yes is displayed.
Otherwise, No is displayed.
• Last Seen by Edge - The most recent date/time that the asset was seen by Edge.
If the asset was discovered by different Edge methods, the date/time of the most recent
discovery is displayed.
• Installed Antivirus
• Interface Source - The interface from which the asset was viewed, displayed as interface
name (Site or Sensor name), for example, tunl0 (Site 1). For further details, see
Asset Interface Source.
1. In the Main Menu, click Visibility > Assets. The Asset View page opens.
2. Click the Layered Topology View icon.
This property can be used throughout the system to distinguish between various types of
assets, e.g. to create asset inventory filters, widgets, reports, and exports. CTD derives the
Class from the communications or protocols used.
• PLCs
• HMIs
• Remote I/Os
• Engineering Stations
• OPC-Servers
• OTs
• Gateways
Some additional asset types CTD identifies include networking assets, printer assets, and
endpoint assets. CTD determines an asset type to be a networking asset, extracted from the
protocol dissectors, according to the asset’s usage of the STP protocol. CTD determines the
Printer asset type according to the specific SNMP queries performed on this asset. When
no asset type can be readily identified, CTD classifies its asset type as an endpoint. CTD
categorizes each asset as a specific type, which can be edited.
Refer to the CTD Reference Guide: Supported Asset Types for the full list of Supported Asset
Types.
• Internal - Subnets that are in-scope for the system. This will automatically include all the
subnets the system discovered using the CTD software. By default, every subnet that we see
its Broadcast domain / Internal Subnets / OT traffic from or to it is classified as internal. In
addition, you will be able to manually add new subnets and classify them as Internal.
• External – Subnets that are external to the customer sites. Usually internet subnets or
subnets external to the plant network (e.g. Enterprise IT subnets). Those subnets are not part
of the client network and can be considered as external subnets. By default, any subnets that
will not be classified as Internal subnets will be classified as External. You can manually add
new subnets and classify them as External.
• Out-of-Scope –Subnets that are included in the environment but are not part of the Internal
or External network. Classifying subnets as Out-Of-Scope can only be done manually as
detailed in Configuration of Subnets.
While you are in Training mode, you can choose to Approve these subnets so they will be
validated after the system moves to Operational Mode.
• Ghost Assets – Displays “ghost assets”, i.e. assets that process assets attempted to
communicate with, seen on the SPAN, but the target asset did not respond. These assets
could be the result of a misconfiguration or indicate a security problem.
• Don’t Show Ghost Assets – This is the default.
• Only Show Ghost Assets – Display only ghost assets in the asset table
• Show Ghost Assets – Include ghost assets in the asset table
• ARP Baselines – This attribute is only relevant for graph views:
An example of a detailed asset page is shown as follows and contains the following tabs:
• Overview - Summary information about the asset such as device details, alert and risk
graphs, network analysis, and more.
• Device Information - More detailed information about the device such as installed programs,
physical connections, and correlated assets.
• Risk & Vulnerabilities - Risk analysis graphs and stats for the device and those it
communicates with, as well as the device's Insights and Vulnerabilities.
• Threat Detection - Alert data for the device.
• Network Analytics - Network communication details.
• Communication - Zone Rules and other communication information for the device.
1. In the Assets page, click the desired asset to open its detailed asset page.
2. Click the Device Information tab.
Figure 33. Asset Page: Physical Connections in the Device Information Tab
In this example, Asset LKPO-LAB.t82.co has Physical Connections. The table lists all the assets
physically connected to the asset.
Users can change the Purdue model level defined for a specific asset manually. Generally,
the Purdue model level for a specific asset is automatically determined based on the various
characteristics of the asset and its purpose. Sometimes the automatically determined level
needs to be adjusted to reflect the true asset behavior. This can be useful in cases where the
system has placed the asset in a level that does not properly describe its criticality. Note that
interim Purdue levels can also be applied, e.g. 1.5, 2.5, 3.5.
The network communication map displays, from left to right, a hierarchical presentation of the
communication which includes:
The system shows up to 10 connected assets or protocols with an option to click to load more.
There is an option to filter the assets that communicate by clicking To or From. You can also
filter by time frame.
The table can be accessed through the Device Information tab of the Asset View page.
4.4.1. Group By
All the assets are grouped by a selected attribute.
• Type
• Criticality
• Risk level
• Vendor
• Tag
• Subnet
• VLAN
• Zone
• Discovered By
You can choose to color assets by: Type, Criticality, Risk level, New assets, Zone, VLAN, or
Subnet.
You can use asset neighbors to understand communication patterns between groups of assets.
For example, you might want to see with which assets HMIs are communicating or see
the communication between assets with high criticality and their neighbors. You can even
identify with which assets a specific asset is communicating by searching for it and viewing its
neighbors.
2. Apply filters as needed. For example, from the Type filter, select HMI.
Figure 40. Assets - Layered Topology View, Filtered for Type HMI
Figure 41. Assets - Layered Topology View, Showing All Neighbors of HMIs
• Guest Mode - Archives all New Asset/Baseline alerts for an asset. The behavior is not
automatically learned by the system. These alerts continue to be archived while the asset
remains in this mode.
Sample Usage: You have an asset that you know will be changing configuration, and you
want that configuration to automatically be captured by the system - this could be because
you know you’re upgrading a large amount of equipment and you want CTD to automatically
capture all of the new configuration without generating any alerts.
• Maintenance Mode - Automatically archives all non-threat alerts (all alert types but Known
Threat), but does not place the asset into Training Mode. As a result, New Asset/Baseline
alerts still appear for a specific asset.
Sample Usage: You have an asset that you know will have a lot of alerts occurring because
of changing configuration, but you do NOT want CTD to automatically learn the new
configuration. For instance, you’re doing testing on an asset and playing with its configuration,
and you want to suppress alerts on that while you’re working on it, but you don’t want CTD to
automatically learn the new configuration.
• Training Mode - Resolves all alerts related to the selected assets and automatically
approves all New Asset/Baseline type alerts so that the behavior is automatically learned
by the system. It also places the selected asset(s) in Training Mode so that new alerts are
suppressed and learned for the duration of the training mode.
Sample Usage: You want to add a new asset into the system to perform tests/other temporary
types of work, but don’t want CTD to learn any of the behavior of that asset, or even that the
asset was in the network. This prevents alerts being generated by this asset, but will allow a
“guest” user to add into the network.
4. Select the Mode from the Change Assets Mode To: dropdown list.
5. If you want the assets to automatically return to their previous mode after a specific time
period, select the days and hours in the Set to Expire In: fields.
6. Click Approve to save changes or Reset Mode to cancel.
Most often, when asset duplication occurs and CTD identifies these assets as duplicated, a
Conflict Asset Alert is triggered. The alert can then be resolved.
• In Training Mode, these assets are merged and the alert is resolved automatically.
• In Operational Mode, you review the Alert and choose whether or not to merge the assets,
resolving the alert.
Another option is to merge the assets manually from the Assets page.
Note
To merge Assets, you must have Admin level privileges for Visibility.
Note
Assets will not merge if both the Source and Target the Asset contain more than 110
entities, or if one of the assets has a dynamic IP.
For example, in the Assets page you might want to view all assets with high criticality and then
navigate to the Alerts page to see the related alerts. From the Alerts page, you could then
navigate to the Zones page to discover zones related to a particular type of Alert.
For any individual Asset or group of Assets, you can view its related:
• Alerts
• Insights
• OT Audit
• Process Values
• Zone Rules
• Zones
1. Filter the list with the desired criteria. (See Using Basic Filters).
2. Select the asset or assets for which you want to display related items.
Important
• Up to 10,000 items can be selected. If more than 10,000 are in the list, the Show
Related icon will be disabled and a message instructing you to further filter your
selection will display.
• If you do not select specific items, Select All is assumed. This could be more than
10,000 items depending on the size of your enterprise.
3. In the toolbar, click the Show Related icon and select the desired related item from the
drop-down list.
Figure 45. Selecting "Show Related Alerts" For Assets Filtered for High Criticality
The related page opens, filtered for only those items related to at least one of the selected
assets. Because the filter mentions the page from which the Show Related command
came, context is maintained.
Figure 46. Alerts Related to the Selected Assets With High Criticality
4. If needed, drill down another level by again filtering the list and/or selecting items, clicking
Show Related and selecting the desired related item.
3. Choose the Types, Criticalities, Virtual Zones and/or Purdue Levels to modify for the
selected assets, and click Change:
Note
After changing the Criticality of all the assets through a bulk Criticality change, the system
will no longer attempt to automatically assign a Criticality value to these assets.
Use the basic filters to manipulate the assets in the various viewing modes. You can search for
a filter option in the dropdown lists:
Note
To search for a specific address, specify the address in quotation marks. Otherwise, the
results will be any asset that contains the entered value.
• Filter Name/Filter Value – The attribute by which you want to filter. For example,
Address, Baseline, Vendor, and so on.
Some filters allow you to specify items in a free text field. This enables you to exclude
a specific name, such as that of a certain vendor. Examples: Site, Virtual Zone,
Primary Asset, Non-Primary Asset
• Action – The type of action (include or exclude).
• Assets in CTD are classified into subnets of the following types:
• Address type – Multi-select address filter; select from the following: Broadcast,
External assets, Multicast, and/or Unicast.
• See Auto-Calculation of Subnets to learn more about how assets are classified into
subnets.
4. Click Add Filter to apply each filter and repeat the process for as many filters as
needed.
Note
Presets are deleted when a system reset is performed.
To create a Preset:
1. Set up your filters, search criteria and selected Advanced Options with the preferences that
you use frequently and want to save between sessions.
2. Click the Preset button in upper right corner of the screen:
filter names and whether to include or exclude selected data. To access the advanced graph
filter options, follow the steps below.
CTD offers the ability to add asset Custom Attributes for internal information that cannot be
detected directly from the network traffic.
The attributes are available for use throughout the system in the same manner as the built-in
fields, providing you with a tool for applying custom criteria to manage asset inventories more
effectively.
Custom attributes can be shared on multiple sites and can be viewed from the EMC or the Site
level.
The Admin sets up the Custom Attributes and can modify or remove them, as described in
Setting Up Custom Attributes
2. In the toolbar, click the More icon and then click Select Columns.
3. In the Select Columns dialog, select the custom attributes to be displayed in the table.
4. Click Apply. The columns with the custom attributes you chose are added to the right side
of the table.
3. Click the check mark next to the Custom Attributes heading to save your selection.
1. Select the relevant row/s of assets and click the Edit Assets icon in the toolbar.
2. In the Custom Attributes subsection of the dialog, click the Set custom attributes link
to open the custom attribute list.
3. Select a custom attribute from the drop-down list and enter a value for the custom attribute.
4. To apply another custom attribute to the selected asset(s), click +Set another custom
attribute and then set values.
5. To remove the custom attribute(s) just applied, click the X next to the attribute.
6. Click Change.
1. Select the relevant row/s of assets from which you want to remove a custom attribute. Then
click the Edit Assets icon in the toolbar.
2. In the Custom Attributes section of the dialog, click the Remove custom attributes link.
Important
All Custom Attributes with the same name are assumed to be identical.
1. Navigate to Settings > Management > General and click the Custom Attributes tab:
• Name ― Enter the name of the attribute you are adding (this is a mandatory field).
• Description ― Add a description for clarification. This description only appears the
Custom Attributes tab.
4. Click OK to save the new attribute or Cancel to revert to the prior setup.
After the Attribute is added to the system, a new row appears with its Name, Description (if
applied), and an Action column for editing the attribute.
5. Click Edit on the row of any Custom Attribute that you want to modify.
1. Navigate to Settings > Management > General and click the Custom Attributes tab:
• Name ― Enter the name of the attribute you are adding (this is a mandatory field).
• Description ― Add a description for clarification that is useful across multiple sites. This
description only appears in the Custom Attributes tab.
• Site – Select the sites to which the custom attribute should apply from the drop-down list.
• Automatically Include New Sites – Slide to the right to apply the custom attribute to
new sites added to the enterprise.
4. Click OK to save the new attribute or Cancel to revert to the prior setup.
4.6.5.3. Applying a Custom Attribute Created on One Site to Another Site via the
EMC
You might want to use a custom attribute created for one site on another site.
For example, you might create a Warranty Expiration Date custom attribute for Site 1 and later
decide to use it on Site 2 as well.
1. Click the Edit icon of the custom attribute you want to apply to another site.
2. In the Site drop-down list of the Add Custom Attribute Dialog, select the site to which you
want to apply the custom attribute.
3. Click OK.
Note
CTD recognizes that custom attributes with the same name from different sites are
identical, so the name will only appear once in the Site drop-down list.
1. Navigate to Settings > Management > Custom Attributes > Site tab.
2. Click Create New . The Add Custom Attribute dialog opens.
3. Enter the following:
• Name - Name of the custom attribute.
• Description - The purpose of the custom attribute.
Note
This is for management purposes and displays only in the Site Custom Attribute
tab.
4. Click OK to save the new attribute or Cancel to revert to the prior setup.
After the Attribute is added to the system, a new row appears with its Name, Description (if
applied), and an Action column for editing the attribute.
5. Click Edit on the row of any Custom Attribute that you want to modify.
For these custom attributes to display along with the built-in data, you must add a column to the
Site Management page table for each custom attribute to be used.
1. In the Main Menu, navigate to Settings > Management > Site Management.
2. In the toolbar, click the More icon and then click Select Columns.
3. In the Select Columns dialog, select the custom attributes to be displayed in the table.
4. Click Apply. The columns with the custom attributes you chose are added to the table.
Note
You can apply a Site Custom Attribute to up to 1000 Sites.
Tip
If the Site Management table does not already contain a column for each Site Custom
Attribute you want to apply, see Displaying Site Custom Attributes to add them to the
table.
1. In the Main Menu, navigate to Settings > Management > Site Management.
2. Select the sites to which you will apply the Site Custom Attribute.
3. In the toolbar, click Edit Sites . The Site Custom Attributes dialog opens.
4. Click the Set custom attributes link to open the custom attribute list.
5. Select a custom attribute from the drop-down list and enter a value for the custom attribute.
6. To apply another custom attribute to the selected site(s), click +Set another custom
attribute and then set values.
7. To remove the custom attribute(s) just applied, click the X next to the attribute.
8. Click Change.
The custom attributes and their values are added to the table.
Figure 70. Site Custom Attribute added to the Site Management table
For example, a "Region" Site Custom Attribute, could be used to display only Assets or Insights
from a specific region.
To filter the Assets and Insights pages using Site Custom Attributes:
1. In the Assets (Visibility > Assets) or Insights (Risk & Vulnerabilities > Insights) pages,
click the Advanced Options link to open the advanced filters.
2. In the Filter Name drop-down list, select the Site Custom Attribute by which to filter the
assets. (Site Custom Attributes have (Site Attribute) next to their names). Then type a value
in the Filter Value box and click Add Filter.
4.7. Zones
In Training Mode, the system automatically allocates discovered assets into Zones, based on
the assets’ type and communication patterns. The communication links between zones are
known as conduits. These zones and conduits are detailed in ISA/IEC-62443.
Zones can also be edited, modified, or created manually to match a specific network
segmentation defined by the end user.
By design, a Zone represents a group of assets that are similar or related in the type of function
they serve within the OT network such as a PLC, HMI, or Engineering Station Endpoint, the
other groups of assets they communicate with, and their profile of communication patterns.
CTD’s Zone Rules are based on Zone grouping and segmentation to define a security detection
policy system. With its firewall-like management page, Zone Rules allow the user to review,
modify, and validate system-generated policy rules. Zone Rules identify which traffic is allowed
within and between Zones and which traffic should create alerts.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 100
Industrial
CTD’s vast and growing range of firewall integrations enable users to enforce network
segmentation policy violations by identifying and restricting anomalous or non-compliant
communications across zones.
• The system calculates the optimal zones that will be used, and automatically creates them.
Learned or approved assets are assigned to the most appropriate virtual zone.
• The system automatically creates rules that define the allowed or alerted communication
within and between zones.
• You can modify the zone where the asset was assigned. (See Editing Assets).
There are two views to display the zones graphically: Layered Topology View and
• Open the Zone list by clicking Visibility > Zones from the main menu. Then click on either
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 101
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 102
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 103
Industrial
Communication Direction
In both the Layered Topology and Network Topology views, you can use Communication
Direction to dynamically display the direction of the communication in the zones and view
the dominant network communication at a glance:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 104
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 105
Industrial
Communication between a pair of virtual zones (a conduit) is represented by a segment with the
zone icon at each end.
Clicking on a zone leads you to more details. Each zone is assigned a zone Risk Level and a
zone Criticality.
• Create zone/s
• Generate automatic zones
• Rename zones
• Delete zones
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 106
Industrial
• All the columns are displayed by default: Name, Assets, Risk Level, Criticality, and Actions.
To show or hide columns, click More > Select Columns.
• Click Add .
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 107
Industrial
• After adding the new Zone, associate assets with it by editing the details on the Assets page.
• Select the relevant row and click Edit to rename it.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 108
Industrial
• To remove a Zone, select the checkbox next to each row to be deleted and clickDelete .
Customized Auto-Grouping allows you to choose which grouping method to group the zones
by, which attribute; you can choose to group them by the default algorithm, subnets, or custom
attributes.
1. Navigate to Settings > Management > General > Virtual Zones tab.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 109
Industrial
• Custom attribute - the user can define custom attributes for each asset, for example, the
custom attribute that represents a process in the factory. By grouping assets by custom
attribute, the user is able to create zones from these attributes.
• Default behavior & subnets/custom attributes - are combining the default algorithm with
subnets or custom attributes. It can be used if you want to create a zone of the default
algorithm and consider the subnet or custom attribute in the zone calculation as well.
3. Click Save.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 110
Industrial
• Overview
• Zone Information
• Risk & Vulnerabilities
• Threat Detection
• Network Statistics
• Communication
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 111
Industrial
5.1.1.2. Insights
CTD generates Insights that reveal particular exposures, empowering you to investigate both
operational (process) and security insights. This tool provides deep insights based on the
analysis of your entire security posture, producing a holistic picture and risk assessment across
your entire ICS network. These insights are collected from traffic by SPAN monitoring, ingesting
PCAP, Project Files, or Active query.
Key Insights show how to proactively enhance your CPS security posture, shedding light on
mission-critical assets and misconfigurations. Security and OT teams can easily use and act
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 112
Industrial
upon them. The system generates a summary score and detailed analysis of the weaknesses
in your CPS environment. Some insights expose a list of protocols and the assets using these
protocols. Others divulge assets that communicate with external assets, including assets that
are performing data acquisition write actions on PLCs and thus have potential for impacting the
process. Insights are calculated automatically and frequently. The Overview leads you to the full
Insights page. A listing of potential Insights is provided in the CTD Reference Guide: Insights.
CTD reports CVE matches for the devices in the network with a list of network hygiene and
other configuration issues that can potentially open an attack path. CTD regularly adds Incident
of Compromise (IOCs) that expand detection coverage even further to guard against CVEs that
have yet to be addressed. By applying CVE updates, users can uncover compromised devices.
Parameters for the vulnerabilities added to CTD using Threat Intelligence Updates include:
CVSS 9 and over or KEV ture (Actively exploited) or EPSS 0.5 and over + vulnerabilities whose
exploitation can lead to remote code execution.
In addition to CVE-related content, Threat Intelligence Updates include Snort and YARA rules
as well as information about assets that have reached end-of-life status.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 113
Industrial
the most prominent attack scenarios an attacker could use to propagate between assets and
zones in the network.
The Risk & Vulnerabilities Overview appears as follows for a CTD Site.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 114
Industrial
1. The Time Frame Selector to show information based on the time period of your choice
(day/week/month/other). All widgets described below represent the results per the selected
duration.
2. Hygiene Score - Current cumulative risk level posed to the system.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 115
Industrial
Note
There is an optional Just to Let You Know widget that lists Insights that highlight
potential issues that were investigated and do not exist in your system (e.g. SNMP
Querying Assets, Files Downloaded (clients)).
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 116
Industrial
1. Hygiene Score Bar - This widget shows the Hygiene Score for each site.
When there are more sites than those shown on a single line, click the arrow to view more.
2. Top Risky Sites by Insight Severity – Shows the volume of top enterprise vulnerable
assets, sorted per site and per Severity level (High, Medium, and Low).
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 117
Industrial
• The left widget - Calculates the number of Assets with Insights of any severity level.
Each asset is counted once.
• The right widget - Calculates each Asset with Insights once per severity level. So, for
example, an asset with 3 highs, 1 medium, and 2 lows would be counted 3 times - once
for each severity level.
As such, the number in the right widget will most likely be higher than that in the left widget.
3. Zones by Criticality – A pie chart widget of the distribution of the zones per Criticality
per site. Each pie chart represents a single site. Use the < > arrows to navigate to the
< Previous or Next > site. Clicking an area of the pie links to the associated Virtual Zones
page with the relevant risk filter. See Risk Calculation.
4. Top Insights – Shows the most significant Insights, sorted by importance. Slide the bar
on the right side downward to see the lower part of the list. Click Show More to open the
Insights page.
5. High Risk Assets by Criticality – Widget showing the distribution of high-risk assets per
criticality per site. Each site is represented with its own pie chart. Click an area of interest
in the pie chart to reach the Assets list with the appropriate filters (by both Risk and
Criticality).
Click the right arrow > to navigate to the next site.
6. Affected Assets by Vulnerability Relevance - A pie chart widget showing the distribution
of assets per Vulnerability Relevance of either Potentially Relevant or Confirmed. Click an
area of interest in the pie chart to reach the detailed Asset list filtered for those assets with
the selected Vulnerability Relevance.
Click the right arrow > to navigate to the next site.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 118
Industrial
The Risk calculation impacts the assets, zones, and the Hygiene Score of the site, and its level
is defined as High, Medium, or Low, based on the following parameters. Each parameter has its
own score and impacts the asset risk level as follows:
• Risk Algorithm for Assets – The Asset Risk Score is based on the asset's Vulnerabilities,
Insights, Alerts, Policies, Asset Criticality, and network locations.
• Risk Algorithm for Zones – The Zone Risk Score is based on an average of the asset
parameters and the asset criticality of the zone; the number of zones communicating with this
zone, and the number of zones that this zone is communicating with.
• Hygiene Score Algorithm – The Zone Risk has an impact on the Hygiene Score of all the
sites. The Hygiene Score decreases when more zones are at high risk. When you want to
improve the Hygiene Score, see Improving the Hygiene Score.
Assets are assigned Critical, High, Medium or Low risk scores. Each risk factor that Claroty
includes in the risk score calculation is weighted according to its significance relative to other
factors.
Each factor is assigned a point value from 0 to 100, with 0 being the safest value an asset could
be assigned and 100 being the most risky. Each factor then receives a multiplier that determines
its weight relative to the other factors. All weights add up to 100%.
• Vulnerability (30%) – This vector indicates how vulnerable the asset is. The more CVEs
an asset has, the more vulnerable it is to attack. The Claroty algorithm matches between
every asset and its unpatched CVEs and determines a vulnerability score according to the
number of CVEs and their corresponding severities. There are additional qualities that deter
vulnerability, such as the unsecured protocols the asset is using.
• Threat (20%) – This vector indicates whether the asset is already considered a threat. This
vector is based on unresolved alerts when the relevant asset is the Primary Asset. When
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 119
Industrial
there are many unresolved alerts, the asset behavior is suspicious and likely exposed to
threats, or will be a threat in the network.
• Criticality (20%) – This vector is based on how important the asset is in the network and
how much damage it could inflict. It is based on the asset’s qualities and its privileges (for
example, Write HMI PLC, Privileged operations).
Tip
The Criticality value can be edited in the Detailed Asset Page - Overview tab > Device
Information section.
• Accessibility (15%) – This vector indicates the accessibility score of an asset. The
accessibility score of an asset depends on the asset’s network location (its subnet), its
communication with dangerous assets and zones (which depends on its baselines and zone
policies), and the asset’s network behavior (for example, open ports, multiple interfaces,
talking with IT).
• Infection (15%) – This vector indicates the extent of the asset’s ability to spread malicious
content to other assets. This vector is based on the asset’s policies, baselines, privileges,
insights, and protocols.
A zone can receive Critical, High, Medium and Low risk scores. Each risk factor that Claroty
includes in the risk score calculation is weighted according to its significance relative to other
factors.
Each factor is assigned a point value from 0 to 100, with 0 being the safest value a zone could
be assigned and 100 being the most risky. Each factor then receives a multiplier that determines
its weight relative to the other factors. All weights add up to 100%.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 120
Industrial
The following five vectors determine the Risk score of a specific zone:
• Vulnerability (30%)– This vector indicates the vulnerability of a zone. The vulnerability rate of
a zone is impacted by its asset's vulnerabilities. This value is the average (or the maximum) of
all the asset vulnerability vector scores in the zone.
• Threat (20%) – The threat vector indicates whether the asset is already a threat. This vector
is the average (or the maximum) of all the asset threat scores in the zone.
• Criticality (20%) – This vector indicates criticality values that determine its importance. Every
zone has its own criticality values that determine its importance.
• Accessibility (15%) – This vector indicates to what extent the zone is exposed to risks by
its communication with other zones. This rate is influenced by the average accessibility vector
score of the zone’s assets, and by the number of zones that communicate with this zone.
• Infection (15%) – This vector indicates the extent of the zone’s ability to spread malicious
content. It is determined by the average infection rate of the zone’s assets and by the number
of zones that communicate with this zone.
By default, the Hygiene Score is based on the site Zone Risk Score. However, a disadvantage
of using the zone-based calculation is that it is less reliable since the Hygiene Score changes
according to the chosen zone algorithm.
Instead, the score can be modified to be based on the Asset Risk Score instead of the Zone
Risk Score. Contact Claroty Support to implement this change.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 121
Industrial
1. In Insights, identify the assets with high risk scores by checking the Top Risky Assets
insight and reviewing their number of vulnerabilities.
2. Filter for high risk zones.
3. Resolve all the risk and vulnerabilities:
• From the zones
• From the assets
• From the open alerts associated with those zones and assets. (See Resolving Alerts:
Assign/Approve All/Approve Selected/Archive)
5.4. Insights
Insights are derived from your entire security posture, producing a holistic picture and risk
assessment. This page provides a detailed analysis of the assets and communications
discovered on the industrial network. This analysis pinpoints exposed assets and uncovers
network configurations that could provide a pathway for attackers or impact critical processes.
CTD generates dozens of insights on how to enhance your ICS security posture, shedding
light on critical assets and misconfigurations. Security and OT teams then can easily use and
act upon these insights. Some insights expose a list of protocols and the assets using these
protocols. Other insights reveal assets that communicate with external assets, including assets
performing data acquisition write actions on PLCs.
Note
Insight calculations are continuously calculated in the background, but the results are not
shown in real time.
Insights are synchronized with the EMC, enabling users to view relevant insights from sites in
the EMC and perform operations on them.
The complete list of Insights is detailed in the CTD Reference Guide: Insights.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 122
Industrial
• From the Main Menu, select Risk & Vulnerabilities > Insights.
Note
For EMCs with 50 or more sites, Insights of Low severity are filtered out by default.
You can show them using the Insights Options filter, accessed from the Insight
Options>> link.
1. In the Main Menu, click Visibility > Assets. The Assets page opens.
2. Click a specific asset. The asset's Asset View page opens.
3. Click the Risk & Vulnerabilities tab and then navigate to the Insights section of the tab.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 123
Industrial
Comments can be applied to Insights, so the handling of the Insight could be managed per
need. For instance, this allows the user to keep track of the open vulnerabilities and their
remediation process.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 124
Industrial
OPEN
• OPEN is the default status and insights with this status will appear on the Insights page.
• OPEN means the insight still needs to be addressed, and as long as it is opened it negatively
affects the Hygiene Score.
HIDDEN
• After the user changes the insight status to HIDDEN, the insight will no longer be visible on
the Insights page. All hidden insights can be seen by applying the Insights Status > Hidden
filter.
• Changing the insight status to HIDDEN, will not improve the overall Hygiene Score or the Risk
Score of the involved assets.
COMPLETED
• After the user changes the insight status to COMPLETED, the insight will no longer be visible
on the Insights page. All completed insights can be seen by applying the Insight Status >
Completed filter.
• Changing the insight status to COMPLETED, will improve the overall Hygiene Score or the
Risk Score of the involved assets.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 125
Industrial
Note
Even after an Insight is marked as COMPLETED, if the same communication occurs
again, the Insight might reappear due to Insight recalculations.
The bundles enable the system to stay up to date with the latest threats without requiring a full
upgrade of the entire CTD software. For more information, see the CTD Administration Guide:
Applying Threat Intelligence Bundles.
For example, you might want to view the Zones related to the "Talking with Ghost Assets"
Insight.
• Assets
• Zones
Note
Related Zones cannot be shown from the EMC.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 126
Industrial
Figure 87. Selecting "Show Related Zones" for Insights Filtered for "Talking with Ghost Assets"
The related page opens, filtered for only those items related to at least one of the selected
Insights. Because the filter mentions the page from which the Show Related command
came, context is maintained.
Figure 88. Zones Related to the "Talking with Ghost Assets" Insight
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 127
Industrial
5.5. Vulnerabilities
CTD's vulnerability management feature matches known CVEs (vulnerabilities) to discovered
assets. Related metrics such as CVSS and EPSS scores, as well as CTD's proprietary analysis
help you prioritize and manage the patching operation for those assets.
Different views of the data are tailored to your role in the organization, enabling you to view the
data with a vulnerability or asset focus.
Constant OT-focused security updates include new CVEs, network traffic signatures, and Yara
signatures. In addition, Claroty’s best-in-class vulnerability research gives you early access to
zero-day vulnerabilities. These threat intelligence updates enable you to stay up to date without
a full upgrade of the entire CTD environment.
Note
Vulnerability calculations are continuously conducted in the background, but the results
are not shown in real time.
Vulnerabilities are synchronized with the EMC, enabling you to view important information from
Sites in the EMC and perform operations on them.
For information about applying Threat Intelligence Bundles, see Applying Threat Intel Bundles.
For each CVE, you can view scores that help you understand its severity and prioritize your
work in resolving it. You can also view information about the Assets affected by the vulnerability.
Like other pages in CTD, vulnerability information can be downloaded as a Table Report in .csv
format.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 128
Industrial
Tip
By default, only CVEs with affected Assets are displayed. To view all CVEs in the system,
remove the Only Show Affected Assets filter.
• CVE - The numerical identifier of the vulnerability according to the industry-standard CVE
(Common Vulnerabilities and Exposures) database.
Clicking a CVE opens its Vulnerability View page.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 129
Industrial
The following columns can be added to the Vulnerabilities table by clicking More in the
toolbar and then Select columns.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 130
Industrial
• You can filter the Vulnerabilities list using any of these filters:
• Class - Vulnerabilities that affect OT, IT, and/or IoT assets
• Affected Assets - Only vulnerabilities that have affected assets in CTD OR only
vulnerabilities that do not have affected assets in CTD
• Actively Exploited - Only vulnerabilities that have been exploited in the wild OR
vulnerabilities that have NOT been actively exploited in the wild
• Vulnerability Relevance - Vulnerabilities with assets that are potentially relevant and/or
confirmed
• Vulnerability Status - Vulnerabilities with any of these statuses:
• Open - Default status -Vulnerabilities with no action yet taken on them
• Irrelevant - Vulnerabilities with assets matched to them incorrectly - a false positive
• Accepted - Vulnerabilities with their inherent risk known and acknowledged
• Manually Fixed - Windows vulnerabilities that have been patched
• You can search for vulnerabilities by typing any part of the CVE number, advisory number, or
description in the Search by field and pressing <Enter>.
• You can sort the list by clicking any column heading except Description and Comment.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 131
Industrial
To search for a vulnerability that is not affecting assets in your environment, remove the
Affected Assets filter before searching instead of searching the CTD Knowledge Base.
Likewise, to browse the entire list of CVEs supported by CTD, remove the Affected Assets
filter.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 132
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 133
Industrial
1. Vulnerability Summary - Includes the CTD vulnerability type as well as the CVE number
and description.
2. Vulnerability Information - Includes the following details about the vulnerability:
• Vulnerability Type - Options include Application, OT, IoT, and Platform.
• Release Date - Date that the CVE was released in the NVD database.
• CVSS V3 Base Score - Severity of the vulnerability according to the industry-standard
Common Vulnerability Scoring System (CVSS) version 3 (V3). Severity levels include
Low, Medium, High, and Critical.
• CVSS V2 Base Score - Severity of the vulnerability according to the older industry-
standard Common Vulnerability Scoring System (CVSS) version 2 (V2). Severity levels
include Low, Medium, and High.
• EPSS Score -The likelihood of the vulnerability being exploited in the wild, based on the
Exploit Prediction Scoring System (EPSS) model.
• Affected Assets - Lists the number of assets affected by this vulnerability. Click the
number to open the Assets page filtered for all assets with this vulnerability.
• Actively Exploited - Indicates a Vulnerability that has been actively exploited in the wild,
based on the CISA Catalog of Known Exploited Vulnerabilities (KEV). "N/A" is displayed
if the vulnerability has not been exploited.
• Comment (Site only) - Click to add or edit free text such as reminders, statuses, or
action items.
• Last Modified - Most recent date the CVE was modified in the NVD database.
• Access Vector - The type of access required to exploit the vulnerability. Possible values:
Network, Unknown, Physical, Adjacent Network, or Local.
• NVD Link - Click the link to view the vulnerability in the NVD database.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 134
Industrial
Important
Claroty cannot ensure the validity of links to outside sources.
3. Affected Assets by Vulnerability Relevance - Pie chart that breaks down the assets
affected by the vulnerability
Statuses include:
• Confirmed - Number of Assets with vendor, model, and firmware versions that match the
CVE
Click the "pie piece" to open the Assets page filtered for these Assets.
• Potentially Relevant - Assets with vendor name and model only (known as Model match
prior to v5.1.0) and all Windows vulnerabilities
Click the "pie piece" to open the Assets page filtered for these Assets.
4. Affected Assets by Class - All assets affected by the vulnerability, broken down by asset
class of OT, IT, and IoT
Click the asset class to open the Assets page filtered for these Assets.
5. Affected Assets by Status - Bar chart that breaks down the statuses assigned to Assets
with the vulnerability. Statuses include:
• Open - (Default) No action taken yet.
• Irrelevant - The matching of the vulnerability with the asset is incorrect - a false positive.
• Accepted - The risk inherent in the vulnerability is known and acknowledged.
• Manually Fixed - The vulnerability was patched or another compensating control was
added.
Click a bar to open the Assets page filtered for assets with this status.
6. Affected Assets - This widget is a table that lists all the Assets affected by the vulnerability
and includes vulnerability-specific parameters such as Detection Date, Vulnerability
Relevance, and Risk Level.
You can search, sort, and filter the table as needed, and you can perform specific actions to
manage the assets.
To learn more about this widget, see Affected Assets.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 135
Industrial
The list can be filtered, searched, and sorted, and you can manage assets by changing their
status, adding a comment, and assigning them to another user.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 136
Industrial
• Model
• OS
• Firmware
• Detection Date - Date on which the Asset-Vulnerability pair was detected.
• Vulnerability Relevance Accuracy of the asset-vulnerability pairing:
• Confirmed - The vulnerability is relevant to the asset.
• Potentially Relevant - The vulnerability might be relevant to the asset, but there are not
enough details to confirm this.
• Status - One of the following statuses can be assigned to an Asset:
• Open - (Default) No action taken yet.
• Irrelevant - The matching of the vulnerability with the asset is incorrect - a false positive.
• Accepted - The risk inherent in the vulnerability is known and acknowledged.
• Manually Fixed - The vulnerability was patched or another compensating control was
added.
• Assigned To - User to whom the asset was assigned for further tracking.
• Comment - Click to add or edit free text such as reminders, statuses, or action items.
Note that because this comment is specific to the asset-vulnerability pair, there is no
connection between the comment added to the vulnerability in the Vulnerabilities page.
The following columns can be added to the Affected Assets table by clicking More in the
toolbar and then Select columns.
• Type - Type of vulnerability. Options include Application, OT, IoT, and Platform.
• MAC
• Class - Asset class. Options include IT, OT, and IoT
• Criticality - High, Medium, Low
• Risk Level – Calculation of how much risk the asset poses to the system - Critical, High,
Medium, Low
• Last Seen – Date and time the asset was last detected
• Updated By - User that updated the Status or added a Comment.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 137
Industrial
Individual Asset
To change the status of an individual asset affected by the vulnerability:
1. In the Status column of an asset, click the Update Status icon, which is
displayed when hovering over the current status.
2. In the Update Vulnerability Status window, select the status and click Save.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 138
Industrial
Multiple Assets
To change the status of multiple assets affected by the vulnerability:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 139
Industrial
Note
• Because the purpose of this comment is to add information about the vulnerability
as it relates to the selected assets, a comment added to the vulnerability in the
Vulnerabilities page is not reflected here.
• Saving a comment overwrites the previous one. Therefore, to append information,
press <Enter> after the existing comment.
Individual Asset
To add a comment to an asset affected by the vulnerability:
Multiple Assets
To add a comment to multiple assets affected by the vulnerability:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 140
Industrial
The list can be filtered, searched, and sorted, and you can manage vulnerabilities by changing
their status, adding a comment, and assigning them to another user.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 141
Industrial
• CVE - The numerical identifier of the vulnerability according to the industry-standard CVE
(Common Vulnerabilities and Exposures) database.
• Advisory - A group of CVEs that are generally remediated together.
• Type - Type of vulnerability. Options include Application, OT, IoT, and Platform.
• CVSS V3 Score - Severity of the vulnerability according to the industry-standard Common
Vulnerability Scoring System (CVSS) version 3 (V3). Severity levels include Low, Medium,
High, and Critical.
• EPSS Score -The likelihood of the vulnerability being exploited in the wild, based on the
Exploit Prediction Scoring System (EPSS) model.
• Description - CVE details about the vulnerability.
• Vulnerability Relevance - Vulnerabilities with assets that are potentially relevant and/or
confirmed
• Status - One of the following statuses can be assigned to an Asset:
• Open - (Default) No action taken yet.
• Irrelevant - The matching of the vulnerability with the asset is incorrect - a false positive.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 142
Industrial
The following columns can be added to the Vulnerabilities table by clicking More in the
toolbar and then Select columns.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 143
Industrial
• You can search for the asset's vulnerabilities by typing any part of the CVE number,
Advisory number, Description, CVSS score or EPSS score into the Search by box and
pressing <Enter>.
• You can sort the list by clicking any column heading except Description and Status.
Individual Vulnerability
To change the status of an individual vulnerability:
Multiple Vulnerabilities
To change the status of multiple vulnerabilities:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 144
Industrial
Note
• Because the purpose of this comment is to add information about the vulnerability as it
relates to the selected asset, a comment added to the vulnerability in the Vulnerabilities
page is not reflected here.
• Saving a comment overwrites the previous one. Therefore, to append information,
press <Enter> after the existing comment.
Individual Vulnerability
To add a comment to a single vulnerability:
Multiple Vulnerabilities
To add a comment to multiple vulnerabilities:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 145
Industrial
5.5.5.1. Status
Vulnerabilities that were previously Insights are assigned the following Statuses upon migration:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 146
Industrial
When migrating previous vulnerability-related Insights, the following relevance ratings are
assigned:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 147
Industrial
The results display the scenarios that could potentially compromise your critical assets
(especially OT assets), providing your security teams with the needed visibility to proactively
mitigate risk and prioritize activities. CTD leverages proprietary analytics to reveal the most
prominent attack scenarios an attacker could use to propagate between assets and zones in the
network.
This empowers users to quickly visualize and simulate likely attack vectors based on risks and
other security gaps. The system enables users to effectively mitigate and remediate against
these critical potential paths an attacker would leverage to penetrate the environment.
Note
Due to the sensitivity of this capability, its access is limited to only those users with
Administrator rights.
Note
Attack Vectors will not be calculated by default when using the Enterprise Management
Console (EMC).
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 148
Industrial
In the Main Menu, select Risk & Vulnerabilities > Attack Vectors.
• The default view represents the most threatened Attack Vector identified from all the potential
possibilities calculated, which is in the riskiest zone.
• You can choose other target zone/s from which additional attack vectors can be calculated
from the Target Zone dropdown.
• Internal asset communicating with external assets (except NTP, ghost assets)
• Same subnets - when an asset has a connection to an external network, the algorithm
assumes that all assets in the network also have a connection to the external network
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 149
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 150
Industrial
6. Threat Detection
CTD provides you with visibility to immediately focus on the network’s vital signs to allow a quick
response.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 151
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 152
Industrial
Use the Time Frame Selector to show information based on the time period of your preference
(day/week/month/year). All widgets described below represent the results of the selected
duration.
1. Threat Detection Bar – Displays the total numbers of open alert stories, open alerts, and
events for the selected time period. Click a number to display the full list of stories, alerts, or
events.
2. Alert Status – Displays a bar graph of the open alert stories and open alerts for the
selected time period. Click a bar in the graph to open a list.
3. Recent Alerts – A table highlighting the recent 10 alerts, displaying their Description,
Score, and Detection date, with a colored dot to indicate the alert’s severity level. Use the
scroll bar on the right edge to view earlier alerts. Click an alert to navigate to the full details
of its Alert page. Click Show More to display all alerts on the Alerts page.
4. Top Alerted Assets – Shows a table of the top 10 alerted assets, sorted by asset Names,
its asset Type, each listing the alerted asset’s Criticality level and the number of alert
instances in the given timeframe. Assets with no alerts are not displayed. Click on an
Alerted Asset to open its detailed Asset page.
5. Top Alerted Zones – This table shows virtual zones. Each virtual zone is grouped
according to the type of alert associated with the asset. The virtual zones are displayed
by criticality level. The top zones with open alerts are listed; zones that have no alerts are
not listed. Click a virtual zone to reach its zone page (if there is one); otherwise, it leads
to the Alerts page with the relevant zone filter. The zone page is a table of zones with
each row displaying the zone name, its criticality, and the number of alerts in the given
timeframe.
6. Alerts by Type – A pie chart widget showing the breakdown of alerts per type and the
number of instances of each type. The top three types are shown. Click on an alert type to
navigate to the Alert Page for detailed information.
7. Alerts by Severity – This widget displays a pie chart of the alert distribution for each
severity category in the given timeframe. Click on a portion of the pie chart to reach the
Alerts Page filtered by the specific severity and timeframe.
8. Alert Trend – This time graph shows the distribution and total new alerts based on their
alert types (with a line for each type) for the selected time period. Click on a line to navigate
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 153
Industrial
to the Alert page. The granularity of the alert groups displayed is relative to the selected
time frame (for example, the alerts are grouped by hour when the timeframe selected is a
day).
9. Recent High & Critical Alerts - Lists up to 25 of the most recent High and Critical alerts.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 154
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 155
Industrial
1. Threat Detection Bar – Displays the total numbers of open alert stories, open alerts, and
events in the enterprise for the selected time period. Click a number to display the full list of
stories, alerts, or events.
2. Top Alerted Sites - This widget contains two parts. The first shows the total number of
Critical open alerts throughout the enterprise and breaks it down graphically by alert family.
Each alert family is represented by a color, as described in the legend to the right.
The second is a bar graph that displays critical open Alerts for each Site broken down by
alert family. Each alert family is represented by a color (as described in the legend to the
right), and clicking the alert type opens the Alerts list filtered by that alert type.
3. Alert Status - A color-coded bar graph of Alert Stories and Alerts with a count of each
alert severity level. Clicking the graph opens the Alerts page filtered for the alert count and
severity in the graph.
4. Recent Alerts – A table highlighting the recent 10 alerts, displaying their Description,
Score, and Detection date, with a colored dot to indicate the alert’s severity level. Use the
scroll bar on the right edge to view earlier alerts. Click an alert to navigate to the full details
of its Alert page. Click Show More to display all alerts on the Alerts page.
5. Top Alerted Assets – Shows a table of the top 10 alerted assets, sorted by asset Names,
its asset Type, each listing the alerted asset’s Criticality level and the number of alert
instances in the given timeframe. Assets with no alerts are not displayed. Click on an
Alerted Asset to open its detailed Asset page.
6. Top Alerted Zones – This table shows virtual zones. Each virtual zone is grouped
according to the type of alert associated with the asset. The virtual zones are displayed
by criticality level. The top zones with open alerts are listed; zones that have no alerts are
not listed. Click a virtual zone to reach its zone page (if there is one); otherwise, it leads
to the Alerts page with the relevant zone filter. The zone page is a table of zones with
each row displaying the zone name, its criticality, and the number of alerts in the given
timeframe.
7. Alerts by Type – A pie chart widget showing the breakdown of alerts per type and the
number of instances of each type. The top three types are shown. Click on an alert type to
navigate to the Alert Page for detailed information.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 156
Industrial
8. Alerts by Severity – This widget displays a pie chart of the alert distribution for each
severity category in the given timeframe. Click on a portion of the pie chart to reach the
Alerts Page filtered by the specific severity and timeframe.
9. Alerts by Site - This bar graph displays the total number of alerts for each site.
10. Alert Trend – This time graph shows the distribution and total new alerts based on their
alert types (with a line for each type) for the selected time period. Click on a line to navigate
to the Alert page. The granularity of the alert groups displayed is relative to the selected
time frame (for example, the alerts are grouped by hour when the timeframe selected is a
day).
11. Recent High & Critical Alerts - Lists up to 25 of the most recent High and Critical alerts.
6.3. Alerts
Alerts appear in the Alerts page, which displays resolved and unresolved alerts and allows you
to manage them.
Note
To optimize system performance, Alerts are maintained in the CTD database for one year
from the date of occurrence.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 157
Industrial
Note
Certain features are available only when viewing the EMC or a Site as indicated below.
1. The top bar gives the total Process Integrity Alerts vs. Security Event Alerts.
2. By default, the alerts in the alert table are listed individually so that actions such as
Approving or Archiving can be performed on them. However, they can also be grouped
by Alert Story - a set of alerts that CTD correlates after it has determined that the events
are interrelated.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 158
Industrial
To view Alert stories, click Group Alerts by Story. To ungroup the alerts, click Ungroup
Alerts by Story.
3. Filter the Alerts page to display the alerts according to any of the following.
• (EMC only) - Use Site to select the Sites from which alerts should be shown.
• Use the Alert Status to differentiate alerts with an Unresolved status (by default) vs.
Resolved alerts.
• Select specific Alert Type/s of interest.
• Choose to identify alerts of the Category Integrity and/or Security.
• The Alert Severity level is based on the Alert score, which is determined based on the
matched Indicators that are evaluated against the asset information and communication.
• Use the Search by field to find particular assets you suspect may be involved in an alert.
You can search by Alert ID, any part of the alert description, or primary asset information.
This could include the primary asset name, type, IP, Hostname, MAC, OS, or Vendor.
• (EMC only) - Use ATT&CK® Techniques and ATT&CK® Tactics to filter alerts
according to MITRE ATT&CK for ICS® criteria.
• Set the alert Time range of interest.
• Click Reset Filters to clear applied filters.
• Click Advanced Filters to display more filtering options.
• Click Switch to Query View to show the filters in query view and edit as needed. (See
Constructing CQL Queries for more information.)
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 159
Industrial
6. Click an Alert description to open its Alert View page and examine its details.
Note
Occasionally, the Source/Destination IPs in an Alert description might be inaccurate
since they are calculated when the Alert is created and, in some cases, updated.
7. Use the Alert toolbar to access all alert actions. You can Approve and Archive alerts and
Assign them to other users. You can also view Assets, Events, Zone Rules, and Zones
related to the selected alerts.
Click More for other actions: Selecting the columns shown in the table, creating a widget
from the data, creating a scheduled report, and downloading a report.
Important
To Archive multiple alerts, they must all support this functionality AND be on the
same page. If you select alerts on separate pages, the Archive icon will not be
available.
Likewise, when selecting the Select All checkbox, if there is more than one page of
alerts, the Archive icon will not be available.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 160
Industrial
1. Name
2. Details
3. Related MITRE ATT&CK® Techniques/Tactics
4. Potential implications
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 161
Industrial
• The Significant Indicators are shown next to the alert score, with icons representing each of
the alert indicator types:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 162
Industrial
• A maximum of three Significant Indicators are displayed. Out of all the evidence detected,
these indicators are those most relevant for investigating the alert. Note these are not
necessarily the ones with the highest score.
• Additional indicators are provided to show more details about this alert. Each indicator is
assigned a different weight, representing its relative contribution to the total score points in
the alert.
• Clicking Show Indicators displays the full set of indicators. After the alert is seen
in context, it allows the user to view the alert score and severity level. This list of indicators
includes two types of indicators: static and event indicators. Static indicators consist of static
information that can potentially affect the score of an alert such as the asset type, subnet or
virtual zone group. Event indicators consist of dynamic information, such as related network
activity, that can potentially affect the score and provide context to the given alert.
• Toggle between Show Indicators and Hide Indicators as needed.
• Working Hours are defined as 08:00 to 20:00. To customize this for your enterprise, contact
Claroty Support.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 163
Industrial
Note
When the indicators reach a score over 100, the alert score is capped.
Other relevant information is provided by some of the indicators, even if they do not directly
contribute to the score.
Description: This alert has been repeated several times in the last 14 days with no rejection
from the user while the system is in training mode.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 164
Industrial
Supported alert types: Failed Login, Configuration Download, Configuration Upload, Monitor
Debug, Online Edit
Calculate Score
Users can prompt the system to calculate/recalculate using the Calculate Score button:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 165
Industrial
By default, the alert score is automatically calculated. When needed, press Calculate Score
to recalculate the alert score; this will also update the Indicators. A recalculated score
affects the overall score of the alert and will take the context of the previous alerts. For example,
an alert on a query to the PLC for the first time will appear as risky, but if it is supposed to repeat
every day, then you can recalculate the score and it will appear as less risky.
Root Cause Analysis is found on the Alert View page in the area underneath the Alert Score.
The following chain of events shows an example of a series of Known Threat Alerts:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 166
Industrial
Root Cause Analysis gives users a picture of a suspected attack. This ‘zoom out’ perspective
attempts to expose the overall attack path by highlighting related events that could enhance our
understanding of the suspicious activity.
The alert’s chain of events are those the system has identified, analyzed, and determined to
have influenced the alert and its score. With this detailed information, users can investigate the
attack, including actions that preceded the alert.
The timeline of the chain of events appears in descending order. An alert may include the chain
of events, whether or not the score is qualified.
Note
An alert with no relevant events does not have a chain of events.
1. Click Threat Detection > Alerts in the main menu. The Alerts page appears.
2. Click Group Alerts by Story.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 167
Industrial
This Alert Story example contains several types of Alerts: New Assets, Configuration Download,
and Configuration Download.
To learn more about Alerts, Alert Stories, and the Events on which they are based, see Events,
Alerts, and Stories
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 168
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 169
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 170
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 171
Industrial
Note
MITRE ATT&CK® for ICS is supported for the EMC, Sites viewed in the EMC, and
standalone Sites.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 172
Industrial
MITRE ATT&CK® for ICS is a framework used to describe the actions an adversary might
take to disrupt industrial control systems. It can be used to better characterize and describe
post-compromise adversary behavior.
The enrichment of CTD's extensive alerting capabilities with the knowledge provided by MITRE
ATT&CK® for ICS framework provides the context needed to better understand and manage the
implications of each alert.
The framework consists of a set of tactical goals, or Tactics, and methods for achieving those
goals, or Techniques.
All of CTD's alerts, with the exception of Baseline Rule Alert and Known Threat Alert, are
mapped to MITRE, and for each of these alerts, you can view its related Techniques and Tactics
in these places:
• The Alerts Page contains Technique and Tactic columns that list all the relevant techniques
and tactics for each Alert. You can also filter by technique or tactic.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 173
Industrial
• The Technique View Page provides in-depth information about a technique and its related
tactics and gives links to related information on the MITRE ATT&CK® for ICS website for
further reading.
Important
It might take up to 24 hours to calculate MITRE techniques for the existing alerts. After
this initial calculation, all subsequent information will calculate in real time.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 174
Industrial
The MITRE ATT&CK® Technique Page can be accessed from these locations:
• Alerts Page - Click the Technique name in the ATT&CK® Technique column.
• Alert View page - Click the Technique name in the Alert’s description.
The MITRE ATT&CK® Technique Page is divided into three sections: Technique info, Related
Alerts, and Mitigations.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 175
Industrial
Technique Info
This section provides the key information of the Technique, including a brief description,
Adversary Groups known for using the Technique, Software (especially malware) using the
Technique and potentially Impacted Devices.
Figure 113. Related Alerts section of the Mitre ATT&CK Technique page
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 176
Industrial
1. In the Main Menu, click Threat Detection > Alerts. The Alerts page appears.
2. Click on the desired alert. The Alert View page opens.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 177
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 178
Industrial
Admins control the sensitivity value to suit their environment. After an alert passes the defined
threshold, it is considered qualified. Until it has been approved or archived by the user, its score
can only be increased by new indicators. The alerts are provided, with a chain of events that
provide a rationale behind the alert mechanisms, to interpret network and asset behavior into
quantifiable risk factors.
The scoring provides a detailed and transparent method for assessing the real risk involved
with an alert. This enables CTD to significantly improve its ability to differentiate severe alerts
from notifications. The alert score is shown with static indicators and each of their specific
contributions to the overall alert score. An indicator is a result of a related network activity that
can potentially affect the score of an alert and provides context.
6.3.6.2. Sensitivity
CTD’s sensitivity value differentiates notifications from alerts. The possible sensitivity categories
range between 0 and 100, as Low, Medium, Normal, or High.
Severity Color
Critical Red
High Orange
Medium Yellow
Low Blue
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 179
Industrial
Most of the alerts will only be raised when the system is in Operational mode.
Tip
To resolve selected alerts in an Alert Story, click Ungroup Alerts by Story and
select the relevant Alerts.
Decide how to resolve the selected alert from the following options:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 180
Industrial
• Assign to – Click to delegate the alert to another user for investigation and resolution.
• Approve – Click when the activity that caused the alert is legal and valid communication,
such as a newly-installed asset. Approving an alert as a valid change validates only the
observed activity. In some cases, it is added to the baseline:
• Archive – Click to Archive the alert when the cause is not acceptable or is not a legitimate
network communication. The information is archived; it is not added to the baseline.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 181
Industrial
• Approve & Update Policy - This means you are approving communication behavior. You
are asked to approve the suggested rule(s) to be added to your policy (to prevent them from
raising alerts).
• Ignore - Choose this when the event reported by the alert was expected or accepted as a
one-time event that you are aware of. In this case, no change to the policy is required, and
resolving the alert is logged as ‘Alert Ignored’
• Acknowledge - This means the alert is signaling a real security event. You will want to
continue being alerted on such events in the future, so no change to the policy is required.
The result is the same as in the ‘Ignore’ case. However, in this case, the resolving of the alert
is logged as a true security event for auditing purposes.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 182
Industrial
Note
When approving a New Asset alert, you can uncheck all suggested rules and still
approve the alert. Doing so will result in the approval of the new asset itself, but without
any change to your policy, which can result in a future Policy Unmatched Violation alert
when the newly approved asset is communicating again.
For more information, refer to the CTD Reference Guide: Alerts Table
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 183
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 184
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 185
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 186
Industrial
Note
CTD supports the export of up to 1K alerts with the pdf format.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 187
Industrial
This packet capture file includes raw information of the current alert for investigation. This icon
only appears when there is an available PCAP file.
Note
Saving the PCAP file is configured by the Admin via the Save CAPs checkbox (refer to
the Admin Manual).
• If the PCAP file was not saved, this icon is greyed out and appears with a tooltip: ‘No capture
file was recorded.’
To understand which alerts have PCAP download available, refer to the Alerts Table.
1. If necessary, add the Resolved As column to the Alerts table by selecting More in
the toolbar and then selecting Select Columns > Resolved As.
2. Click the column header to sort the resolved alerts as follows, and click again to sort in
reverse order:
• Approved
• Archived
• Approved by CTD while in Training Mode
• Resolved by Auto Resolve Rule
• Ignored
• Acknowledged
• Approved by Auto Resolve Rule
• Archived by Auto Resolve Rule
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 188
Industrial
For example, in the Alerts page you might want to view all New Conflict Asset alerts and then
navigate to the Assets page see a comprehensive list of assets affected by that alert. From the
Assets page, you could then navigate to the Zones page to discover where those assets reside.
For individual Alerts or Alert Stories, you can view the related:
• Assets
• Baseline Rules
• Events
• Zones
• Zone Rules
Note
This option shows Zone Rules that trigger policy violation alerts.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 189
Industrial
Figure 125. Selecting "Show Related Assets" For New Conflict Asset Alerts
The related page opens, filtered for only those items related to at least one of the selected
Alerts or Alert Stories. Because the filter mentions the page from which the Show Related
command came, context is maintained.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 190
Industrial
3. If needed, drill down another level by again filtering the list and/or selecting items, clicking
Show Related and selecting the desired related item.
Important
• Up to 10,000 items can be selected. If more than 10,000 are in the list, the Show
Related icon will be disabled and a message instructing you to further filter your
selection will display.
• If you do not select specific items, Select All is assumed. This could be more than
10,000 items depending on the size of your enterprise.
6.4. Events
A log of all the events logged by CTD’s engines are displayed in the Events page, regardless of
whether they are considered alerts that might impose a risk.
The Status of each event can be risky (an Alert or an OT Alert) or not (a Non-Risky Change
or an OT Operation). Clicking a risky event opens an Alert View page, and clicking a non-risky
event opens a Master Event View page, where groups of interrelated events are displayed.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 191
Industrial
1. The Event Results shows the total number of events logged. It dynamically displays a
table of all events generated by CTD’s engines, regardless of whether they are considered
alerts that might impose a risk.
2. Each row of the table displays the event ID, the event Type detected (e.g. Configuration
Download, Login, Known Threat Alert), its Status, a high-level Description and its
detection timestamp.
3. To add the Site column to the table, click the More icon, select Selected Columns
from the menu, click Site and click Apply.
4. The Type filter allows multiple selections of the available Alert Types.
5. The Status filter lets you filter for Alerts, Non-Risky Changes, OT Alerts and OT
Operation events or a combination of them:
• Clicking an event’s ID leads to the Event view that displays information of any correlated
events:
• In the case of a risky event (Events with Alert or an OT Alert statuses), selecting the
event ID leads to the relevant Alert Page to access all the controls for managing and
investigating the alert.
• For events classified as having no risk (i.e. events Status of Not Risky Change or OT
Operation), selecting the event ID leads to the relevant Event for investigation.
6. Select a Time frame for the Event Results to display: During the past Hour/Day/Week/
Month or any user-defined period.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 192
Industrial
7. Use the Search by field to search for an event by part of its Description.
8. Use the Clear All and QueryView controls to adjust the display as needed.
9. Use the Page Controls to navigate through the pages of the Event table.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 193
Industrial
Continuous
Figure 129. Master Threat
Event Details Detection
for a New Asset (CTD) User Guide CTD 5.1.0 Page 194
Industrial
1. Name of the event and its description. Above is the timestamp of the event.
2. The Master Event header displays the following:
The system risk definition algorithm has classified these events as not risky
Note
This Event occurs when the sensitivity value that differentiates notifications from
alerts determines that the current event is not interesting or relevant enough to be
classified as an alert.
3. Click Export to generate a report for this event in PDF or CSV format, and choose to
include Events, Activities, and/or Baselines:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 195
Industrial
and risk, these details help users hunt for threats and resolve security events. For further
details, see Root Cause Analysis.
6. The Master Event Details provide metadata of the event, such as the primary asset
involved. The right side of the Master Event Details page shows the details of a secondary
asset/s involved in this event.
7. Click Event Details to view details of the Master Event. Each row of the table displayed
provides an event description, its ID, type and timestamp. A window is provided for text
searches of the event descriptions instead of browsing through the Event Details results.
8. When applicable, the Asset Communication area appears for the event. This section
provides a communication summary and details of any Virtual Zones impacted.
9. A section with all the Baseline Details for the event is populated when applicable. This
table features filters for all aspects of the event and each communication type.
Rule Description
Zone Rules These rules behave as a set of logical conditions for the detection of communication between
Zones in the system. If the conditions of the rule are met, the communication can either be
allowed or raise an alert. The implicit ‘Alert on Anything’ rule is matched by default (including
unvalidated rules).
Baseline Rules These rules can raise alerts based on changes to, or activities within, Baselines. Notably,
these rules can be triggered when a baseline is inactive for the specified period or upon its
appearance, upon user configuration. This alert needs to be manually configured by the admin
in the Baselines page (under the Investigation module), based on the baselines automatically
created by the system.
Network These network traffic rules allow users to disable or enable any existing network traffic
Signatures signatures, either provided out-of-the-box or user-generated. Network Rules are implemented
on the basis of the SNORT rules format.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 196
Industrial
Rule Description
Yara Rules These rules, based on YARA signatures, provide matching of patterns found on data blocks
extracted from network traffic. The YARA rules settings allow the user to manually disable or
enable any existing YARA signatures, either provided out-of-the-box, or user-generated.
Auto Resolve These rules enable users to automatically approve or archive alerts based on a plethora of
different parameters, such as alert types, assets, baselines, and more.
When transitioning into operational mode, zone rules are applied to the network traffic. At this
point, you can manage the rule list and customize it as needed. You can review, delete, validate,
or modify the out-of-the-box zone rules or create new ones based on specific needs.
You can:
Note
All the automatically created Zone Rules are zone-based and are mutually exclusive.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 197
Industrial
• Navigate to Threat Detection > Rules > Zone Rules in the main menu.
• Allow – When the conditions of the zone rule are met and the action is set to "Allow", the
system does not trigger an alert.
• Alert – When the conditions of the policy rule are met and the action is set to "Alert", the
system triggers a Policy Rule Match alert.
The policy includes an implicit default “Alert on anything” rule (not visible in the Policy Rule
list). In operational mode, if the detected communication did not match any of the existing rules,
the system matches the Alert on Anything rule, which will trigger a Policy Violation alert.
A Policy Violation alert is triggered when none or only some of the conditions set in the Policy
Rules do not match the parameters of the incoming network traffic.
Note
The action to be taken is configured by Administrators.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 198
Industrial
• Policy Rule Match – This occurs when the detected communication matches an explicit
policy rule defined with an ‘Alert’ action.
• Policy Unmatched Violation – This type of alert is triggered when the detected
communication was not matched to any rule with an ‘Allow’ action, and as a result, the implicit
“Alert on Anything” rule was hit. This means there was no pre-existing policy rule for such
communication.
In case the system detects a new asset, a New Asset alert will be triggered. If the new asset’s
communication is not already addressed in any existing policy rule, the system will suggest a
rule to be added to approve the new asset’s communication.
The system will suggest a zone for the new asset and a change in policy based on asset
communication.
By definition, when a Policy rule is created, it is in an invalidated state. Only Admins can
validate a rule.
(Active) Whether this Policy Rule has been enabled Green means the rule has been activated
Action * Whether this Policy Rule allows or will trigger an alert
Source Zone * The name of the source of this virtual zone
Destination Zone * The name of the destination of this virtual zone
Protocol The protocol/s used in the communication between the source and the destination zones (can
accept multiple protocols)
Port The port/s through which the communication flows for this rule (can accept multiple ports)
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 199
Industrial
This table describes the additional columns to display in the Zone Rules grid.
• To add additional columns to the Zone Rules table, click the More button in the toolbar
and click Select columns.
• Choose additional columns to display from the Select Columns window and click Apply:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 200
Industrial
1. Select the Create New+ button from the Zone Rules toolbar:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 201
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 202
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 203
Industrial
• Active – By default, the rule will be activated. Slide this button to the left if you prefer to
deactivate the rule.
• Action – By default, the rule is allowed. If otherwise, select the Alert button.
• Exact Match – By default, the rule does not require an exact match. If otherwise, select
Yes.
• Category – A drop down list of communication categories. You can choose multiple
categories, e.g. Diagnosis, Authentication, and Programming.
• Access Type – The type of access permitted for this communication. Select one of the
following: Read, Write, None, Publish, Execute
• Port – The communication port(s) specified by the rule. You may specify multiple ports if
required.
3. Click Add to commit the new policy rule.
The Edit Alert Policy popup appears, enabling editing of the rule parameters,
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 204
Industrial
Zone Rules, which regulate network communication, are created in an unvalidated state during
the system's Training Mode. After the system transitions to Operational Mode, the administrative
user may then validate these Zone Rules - individually or collectively.
Whenever a new Zone Rule is discovered in the system, a corresponding Policy Violation alert
is automatically triggered, awaiting approval from the administrative user. Every occurrence of a
new Zone Rule during Operational Mode inherently triggers a policy violation.
Notably, this Policy Violation alert is triggered in the absence of a corresponding rule within
CTD, regardless of whether the rules are in a validated or unvalidated state. Such an event
signifies a previously unlearned communication, thus pointing toward an anomaly in the
network's behavior.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 205
Industrial
Upon detection of a new Policy Violation alert, administrative users have the option to either
resolve or leave it unresolved via the Alert View page. Similarly, regarding Zone Rules on
the Zone Rules page, they can opt for validation or maintain the unvalidated status at their
discretion.
If you want your system to ignore the unvalidated rules (create Policy Violation alerts until the
Zone Rule is user-validated) please open a support case.
Baseline Rules can be viewed and edited from this page but are created in Baselines. See
Creating a Baseline Rule.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 206
Industrial
Note
Baseline Rules can only be created from existing baselines. They cannot be created
"from scratch."
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 207
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 208
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 209
Industrial
To define baseline rules using baseline values, see Baseline Rules Using Baseline Values
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 210
Industrial
Preconditions
Before using this feature, make sure you have ensured the following:
Steps
1. To define a baseline alert to be triggered on a certain value condition, follow the same
baseline rule creation steps as in Creating a Baseline Rule.
2. Then in Filter Type select Value and enter the desired condition:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 211
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 212
Industrial
Preconditions
Before using this feature, make sure you have ensured the following:
Steps
1. To define a baseline alert to be triggered on a certain value condition, follow the same
baseline rule creation steps as in Creating a Baseline Rule.
2. Then in Filter Type select Value and enter the desired condition:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 213
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 214
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 215
Industrial
Network signatures are useful for a variety of purposes, such as traffic analysis, network
forensics, and network troubleshooting. They can help to identify the root cause of network
issues and provide insights into network performance and utilization. By analyzing network
traffic and identifying patterns, network signatures can also be used to optimize network
performance and block malicious traffic.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 216
Industrial
Creating effective network signature rules requires a deep understanding of network protocols,
cyber threats, and security best practices. It is an ongoing process, as new threats are
constantly emerging and signature rules must be updated to keep pace.
Network Signatures are supplied and updated in CTD on a regular basis as threat bundles,
which contain publicly available signatures, as well as proprietary signatures created by
Claroty's award-winning research team. You also can upload additional signatures as needed.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 217
Industrial
To open the Network Signatures page, navigate to Threat Detection > Rules > Network
Signatures.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 218
Industrial
• Confidence - A score representing the probability that a communication event that triggers
the signature is a network threat.
Expressed on a scale of 1% to 100%, It is calculated using a combination of signature
parameters and Claroty research and does not apply to user-powered signatures.
• Tags - Attack types and other enriched signature information
• External Links - More information about publicly available signatures
• First Released - Date this revision of the signature was released
• Last Updated - Date this revision was last updated by its creator
• Updated in CTD - Date the signature was last updated in CTD
• Powered By - Creator and maintainer of the signature
Options include:
• Claroty - Signatures created by Team82 or by Claroty's data team
• Emerging Threats, Other - Publicly available signatures
• Username of the user who uploads a signature
• User - User-powered signatures created in a version earlier than v4.8.0
• Actions - For user-created signatures, click Edit to open the Edit Network Signature
window and edit the signature content
1. You can sort the list by Signature ID, Signature Name, Criticality, Confidence, Tags,
First Rev.Release, Last Rev. Update, and Updated in CTD by clicking the column header.
2. You can filter the list using the Status, Criticality, Tags, Powered By, and Updated in
CTD filters.
3. You can also search for signatures using the Search by field.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 219
Industrial
Important
• The file must have a .rules extension and be no larger than 1.5 KB.
• The file can contain multiple signatures. After upload, each signature will display as a
separate row in the Network Signatures list.
• Only "alert" actions are supported in CTD Network Signatures.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 220
Industrial
3. In the Upload Network Signature Rule area, drag and drop your signature file from your
computer into the box. Alternately, click Select File and browse to the file you want to
upload.
The content of the signature displays in the Create New Network Signatures window.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 221
Industrial
4. Click Create.
The signature is added to the Network Signatures list.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 222
Industrial
The Results grid displays the Yara rules, listed with the following default sortable columns:
1. Active button – The default value is Active . Click this button to Deactivate an
existing Yara rule.
2. Name – The name of this Yara rule
3. Time of Creation – The timestamp of when this rule originated
4. Rule Source – Whether the source of the rule is from the system (Claroty) or is user
created. System Rules can be disabled but you cannot edit or delete them.
5. Options – When a Yara rule is editable, the Edit icon appears in this column.
In addition:
6. The toolbar contains options for adding new Yara Rules and deleting selected ones.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 223
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 224
Industrial
1. Either select the row of the Yara Rule from the list of Results, or search for part of the string
of the Yara Rule name in the Search By field.
2. Click Delete on the toolbar to remove the Yara Rule/s.
3. Before deleting any rules, the system requests confirmation of the deletion.
When a rule is modified, the system shows a message on the lower right corner of the screen
indicating if it was deleted or not.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 225
Industrial
For example:
• You automatically Approve an alert when the cause is acceptable and/or the communication/
activity is a legitimate network communication. Alerts that meet specified criteria are approved
until the expiration date of the rule, if one is set.
Note
This is unlike Approving alerts manually, where all of the new policies associated with
the alert are added as valid, ensuring that the alert with the same policies is not
triggered in the future.
• You automatically Archive an alert when the changed information is not acceptable or is
not a legitimate network communication/activity. This action archives all the information, and
changed information is not added to the Asset.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 226
Industrial
Note
• When a New Asset alert is archived, the Asset and all its related information,
including Alerts and Events, is archived along with it.
• When an Auto Resolve archive rule has an expiration date, Alerts that meet the
specified criteria are archived until the expiration date of the rule, after which they
appear again for manual review.
When an Auto Resolve archive rule has no expiration date, it is effectively the same
as manually archiving an alert - its policy is not updated, but the alert is always
archived.
Hovering over this indication displays the name of the rule that resolved the alert as well as the
date and time on which it was resolved.
To optimize and streamline your organization's creation and use of Auto Resolve Rules, a rule
can be created on the EMC once and then applied to selected sites; it can also be customized
as required for a specific Site. Also, a rule created for an individual site can then be applied to
other sites.
There are several important guidelines for creating rules and applying them to other sites:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 227
Industrial
• A rule can be created on one site and applied to another, as long as all desired sites and the
EMC run the same version of CTD. (Rules created on any site can be viewed in the EMC
regardless of the site version).
• Rules can be created on either the EMC or site, but content can only be modified on a site.
• When a rule created in the EMC is applied to a site and then modified, it effectively becomes
a new rule and appears in the EMC as such.
1. In the EMC, navigate to Threat Detection > Rules > Auto Resolve.
The Auto Resolve Rules page opens:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 228
Industrial
Note
Auto Resolve rules can only be applied to Sites with a CTD version that is the same
as the EMC. Any Site that is not on the same version as the EMC does not appear
in the list.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 229
Industrial
5. In Alert Condition, configure the condition under which the alert should be automatically
resolved.
• Click +AND to add more conditions - up to 4.
• You can add one of each condition option - Category, Description, Severity, Type
Example: To specify New Asset alerts with low severity, select these options:
Type, New Asset +AND
Severity, Low
6. In Asset Condition, configure the condition under which the alert should be automatically
resolved.
Click +AND to add more conditions - up to 4.
Example: To specify a camera on IP 10.91.159.75, select these options:
Asset, Asset Type, Camera +AND
Asset, IP, 10.91.159.75 (type this value)
Note
• A Primary Asset is an asset that performs a communication that triggers the alert
creation process. It is the asset that, in most cases, will need to be investigated as
the potential threat source.
• A Non-Primary Asset is an asset that communicates with a Primary Asset.
Note
Wildcards can be used in the Host Name, Display Name, Domain/Workgroup,
and Domain Name filters. See Using Wildcards in Asset Condition Filters.
7. In Active Until, select the expiration date of the Auto Resolve rule. Select Forever if there
is no expiration date.
8. In Select Automatic Action, select the action to be taken when the Alert and Asset
conditions specified previously are met.
• Approve (Default)
• Archive
For an explanation of these options, see Resolving Alerts.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 230
Industrial
9. Click Create.
The Auto Resolve Rule window lists rule creation or failure for each Site selected in the
Sites dropdown list.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 231
Industrial
Optional: Click the icon to view the Sites to which the rule was applied.
Note
A rule created from the EMC is applied to all networks on a selected Site. To select
specific networks on a Site, either create the rule directly on the Site or customize the
rule on the Site.
For more information, see Creating an Auto Resolve Rule From a Site.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 232
Industrial
Examples:
• You could use *claroty.com* - to create a rule that automatically Approves all new assets
that contain the domain name "claroty.com".
• For hostnames following a specific naming convention, such as Location-Function-
UID (e.g., NYC-DB-01), you could apply a pattern such as NYC-DB-* to match any hostname
that starts with this sequence.
Tip
Rules created on a Site display in the EMC if the CTD versions of the Site and EMC
version are aligned. A copy of the rule can then be customized for other Sites as needed.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 233
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 234
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 235
Industrial
Severity, Low
6. In Asset Condition, configure the condition under which the alert should be automatically
resolved.
Click +AND to add more conditions - up to 4.
Example: To specify a camera on IP 10.91.159.75, select these options:
Asset, Asset Type, Camera +AND
Asset, IP, 10.91.159.75 (type this value)
Note
• A Primary Asset is an asset that performs a communication that triggers the alert
creation process. It is the asset that, in most cases, will need to be investigated as
the potential threat source.
• A Non-Primary Asset is an asset that communicated with the Primary Asset.
Note
Wildcards can be used in the Host Name, Display Name, Domain/Workgroup,
and Domain Name filters. See Using Wildcards in Asset Condition Filters.
7. In Active Until, select the date on which the Auto Resolve rule should no longer be
applied.
8. In Select Automatic Action, select the action to be taken when the Alert and Asset
conditions specified previously are met.
• Approve (Default)
• Archive
For an explanation of these options, see Resolving Alerts.
9. Click Create.
The Auto Resolve Rule is added to the list.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 236
Industrial
The rule displays in the EMC indicating that it was created on one site. Hovering over "1
site" displays the Site on which it was created.
• In the Site, the row of each alert rule displays the following columns: ID, Rule Name,
Condition, Action, Active Until, Resolved Alerts, Last Resolved, Created, Updated
Updated By, Actions.
• To export the Auto Resolve rules and their conditions, select the relevant row(s). Then, in
1. In the Site, navigate to Threat Detection > Rules > Auto Resolve.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 237
Industrial
Figure 160. Editing an Auto Resolve Rule That Originated in the EMC
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 238
Industrial
1. In the EMC, navigate to Threat Detection > Rules > Auto Resolve.
2. In the Actions column of the rule you want to change, click the Add or Remove Rule from
Sites icon.
The Auto Resolve window opens.
3. In the Sites dropdown list, select the Sites to which the rule should be added and deselect
the Sites to which the rule should be deleted.
4. Click Save.
The Auto Resolve Rule window lists success or failure for each Site.
1. In the EMC, navigate to Threat Detection > Rules > Auto Resolve.
2. In the Actions column of the rule you want to apply to other Sites, click the Add or
Remove Rule from Sites icon.
The Auto Resolve window opens with a message explaining that the rule was created on a
Site.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 239
Industrial
3. In the Sites dropdown list, select the Sites to which the rule should be applied.
The Site on which the rule originated is unavailable.
4. Click Save.
The Auto Resolve Rule window lists rule creation success or failure for each Site.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 240
Industrial
Note
Once the rule is applied to a new Site, if it is then modified, it becomes a new, separate
rule.
1. In the EMC or Site, navigate to Threat Detection > Rules > Auto Resolve.
2. Select the checkbox of the rule you want to delete and in the toolbar, click Delete Selected
.
• In the EMC, the Auto Resolve Rule window lists the success or failure of the deletion.
• In a Site, a message describes the success or failure of the deletion.
Note
• An Auto Resolve rule created on a Site can be deleted only from the Site.
• Deleting an Auto Resolve rule from a Site deletes it only from that Site, and not from
other Sites to which it was applied.
• Deleting an Auto Resolve rule from the EMC deletes it from all the Sites to which it was
applied.
The Auto Resolve Rules page contains 2 columns that together can give a good indication of a
rule's effectiveness.
• Resolved Alerts - Counts the number of alerts the rule automatically resolved.
• Last Resolved - Shows a timestamp for the last time an alert was automatically resolved by
the rule.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 241
Industrial
As an example, let's say the current date is 1 April and the rule last resolved a good number of
alerts on the previous 1 December. Because more than 4 months have passed since the rule
resolved an alert, it is a good candidate for either tweaking or deleting.
Click the number in the Resolved Alerts column to open the Alerts page filtered for all the alerts
resolved by the rule.
In the EMC, when an alert rule has been applied to several sites, you can click to open a
window that lists all the sites to which the rule has been applied. Both columns appear there.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 242
Industrial
Click the number in the Resolved Alerts column of any Site to open the Alerts page filtered for
all the alerts resolved by the rule.
To learn about editing and deleting Auto Resolve Rules, see Editing and Deleting Auto Resolve
Rules.
• The count in the Resolved Alerts does not include alerts deleted due to alert retention rules.
To learn more about retention rules for each alert type, see Alerts Table.
• The Last Resolved column displays the date/time of the most recent alert resolved by the rule
regardless of whether the alert was deleted.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 243
Industrial
• The number of resolved alerts includes qualified, unqualified, and deleted alerts. There might
be a discrepancy between the total number of alerts and the filtered alerts, which could
potentially result in an empty set of filtered alerts.
• The Resolved Alerts count starts from the moment that v4.9.1 or above of CTD is installed.
For rules that were migrated from previous versions, N/A displays.
• If the rule was created before v4.7.0, the rule might not be valid; it is recommended to open
the rule in the Site view and make sure that all the values in it are correct and valid.
Table 8. Migration
• Created
• This column is created during the upgrade to v4.8.0.
• If the value does not exist in the Updated column, the date will be the moment of the
migration (CREATED=UPDATED).
• Updated
• If the value does not exist in the DB, the date will be the moment of the migration
(CREATED=UPDATED).
• Updated by
• This column is created during the upgrade to v4.8.0.
• If the value does not exist in the DB, the value will be OTHER.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 244
Industrial
• Before upgrading (preferred) - In the Auto Resolve toolbar, click More > Download.
• After upgrading - download the file from this path: /var/lib/mysql/
alert_rules_<MIGRATION_TIMESTAMP>.csv
• Contact Claroty Support.
• Rules with invalid data typed as text - such as in the IP field, a comma typed accidentally
instead of a period.
These rules are migrated, but when you edit the rule, the invalid data is displayed in red fields
with tooltips on how to resolve the invalid value.
• Rules that contain a Vendor - This attribute is now supported by a list based on what is in
your network instead of as text.
Rules with vendor names that are supported by the new lists are migrated; rules that are not
in the lists are not migrated.
• Rules that contain multiple Alert Description conditions - Before v4.7.0, when a rule
contains multiple Alert Description conditions, they are treated as OR conditions in a single
rule. After migration, each condition is treated as a separate rule. All other conditions in the
rule are maintained as-is.
• Rules based on Policy Rule Match, Baseline Rule, or Policy Violation alerts - These
rules do not migrate.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 245
Industrial
• In the case of Auto Resolve rules containing Policy Rule Match alerts and Baseline Rule
alerts, these alerts are user configured. You can therefore delete the Zone Rules that create
Policy Rule Match alerts and Baseline Rules that create Baseline Rule alerts.
• In the case of rules containing Policy Violation alerts, these alerts can no longer be
resolved based on Baseline values, and are not migrated. All other conditions in the rule
are maintained as-is.
To recreate these rules in v4.7.0, in the Condition column of the spreadsheet, copy the
Protocol and Access Type of the Auto Resolve rule. Example: Protocol - MODBUS, Access
Type - Write
Then, in the Alert Condition section of the new Auto Resolve dialog, select Description
and then paste the copied text into the Type Description field, which is a text field.
• All other alert types are not connected directly to baseline conditions.
• Rules containing attributes that were not effectively supported pre-4.7.0 - Rules that
contain the following attributes will not migrate:
• Alert Condition : Alert family, Created (days ago), Non Primary Assets, Primary Asset,
Site, Story Severity, Status, Time of day, Type (Asset Down, Baseline Deviation, Baseline
Down, Baseline Volume Deviation, Invalid Session, Malformed Packet, Program Operation,
Protocol, Protocol Down, Threat)
• Asset condition: Network
• Baseline condition: Description, Destination Port, Protocol, Source Port, Access Type,
Category
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 246
Industrial
7. Investigation
The Investigation functions of CTD are used investigate alerts or events in the network.
They also give deeper visibility and tools for understanding the network and its behavior. For
example, DNS Queries can be used to investigate if an external domain is being used, or
to detect suspicious activities. They can also help to find configuration issues. The Network
Sessions screen analyzes network traffic, giving you more insight into how your network traffic
looks and your network health. Process Values enable you to investigate OT alerts and get
visibility into OT asset behavior in the network.
Investigation functions are valuable for investigation purposes and they can help with threat
hunting.
7.1. DNS
DNS enables threat hunting to investigate unexpected behavior on the network, previous issues
in the network, or alerts.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 247
Industrial
• ID
• DNS Server
• Domain
• DNS Client
• Status
• Response
• Record Type
• Hit Count
• First Seen
• Last Seen
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 248
Industrial
7.2. Baselines
Baselines display all the baselines from all your assets, enabling filtering capabilities. These
capabilities can be used during forensic processes done by Security Officers or operational
investigations done by OT Engineers.
For example, OT Engineers could use this view to filter all write data acquisition operations
performed in their environment. Security Officers or SOC operators could search for
communications within a specific timeframe.
Note
In the Enterprise Management Console (EMC), this page will include an additional Site
filter to view baselines from some or all sites.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 249
Industrial
Note
Baselines not active for more than a month in the system are removed automatically. This
affects all the system components like insights, assets, etc.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 250
Industrial
• Source Address – Address of the source of an identified asset. Note this field consists of the
IP or MAC address.
• Destination Address – Address of the destination of an identified asset. Note this field
consists of the IP or MAC address.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 251
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 252
Industrial
the numerical or textual value and incorporate it into the asset’s baseline. These values can
be viewed on the baselines page in a time-aggregated view, in a detailed view, or as a graph.
Baseline values can also construct a baseline rule to create a baseline alert (refer to Creating a
Baseline Rule.)
Note
Baseline values are currently supported for the DNP3, IEC101, IEC103, IEC104, VNET
(VHF), DPI (over PCCC).
Prior to working with baseline values, make sure the IEC-101 and IEC-104 protocols are
enabled (in the Protocols page, accessible from the Configuration Menu).
There are more protocols for the baseline values supported in the Process Values, see Process
Values.
1. Make sure that IEC-101 baselines are present in the table by using the Protocol filter, or by
manually searching for them in the table.
2. Click the arrow at the end of a table row to display a sub-table with baseline values.
The sub-table shows the count and the size seen for the specific baseline in each given
timeframe (between Start Time and End Time), as shown below:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 253
Industrial
1. Add the Show Values column to the table by clicking More >Select columns, choosing
Show Values, and clicking Apply.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 254
Industrial
Figure 171. Selecting Show Values from the Select Columns popup
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 255
Industrial
2. Click the arrow at the end of its table row to display the values for a given baseline.
The row expands downwards to display a sub-table with the count and size seen for the
specific baseline in each given timeframe (between Start Time and End Time).
In this example, there are two baseline values and each one has a count of 1.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 256
Industrial
3. Click the baseline’s Show link to see a detailed view of the baseline values.
A window displays the details of the baseline values.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 257
Industrial
The number of rows in the window reflect the counts of all the baseline values. In our
example, there were two baseline values with a count of 1 each. Therefore, the Baseline
Value window contains two rows.
7.3. OT Audit
The OT Audit page displays all the latest OT operations the system has detected. This page is
essential for Management of Change (MOC) in OT operations.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 258
Industrial
OT Audit Results
Each row in the OT Audit table provides the following OT event information:
• ID – The OT event ID; clicking it leads to the Event or Alert Page to access all the information
for investigating, controlling, and managing the alert.
• Type – The OT event/alert type.
• Description – The description of the OT event/alert.
• Date Detected – The timestamp of when this OT event/alert was detected.
• Network – The network in which the OT event/alert occurred.
OT Audit Menu
To hide duplicates (Distinct), download this OT audit as a .csv or .pdf file, or export/share/
schedule this report, click the menu button .
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 259
Industrial
The Process Values can be used to combat unexpected changes that can indicate risks to
process integrity and warn of an impending cyberattack.
This tool enables users to know the normal values and recognises when they are moving
towards a critical state, when they are abnormal or unexpected. You might find behaviors
related to a malware attack early in its kill chain or determine an operational reliability issue.
One example of Process Values is temperature on a controller and observing normal behavior
or any changes.
Note
This Process Values view is available by default, even before the user has selected any
tag tracking.
• Prior to working with Process Values, make sure that the IEC-101 or IEC-104 protocol is
enabled in Investigation > Protocols Summary.
If neither is enabled, refer to Protocols.
• Process Values are currently supported for the following protocols: CIP, Goose (IEC-61850),
IEC101, IEC104, MMS (IEC-61850/ICCP/TASE.2), Modbus, PCS7 WinCC (Historian),
S7Comm, DPI (over PCCC).
• Baselines values are still available from the baselines view and supported for DNP3, IEC101,
IEC103, IEC104, VNET (VHF), DPI (over PCCC).
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 260
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 261
Industrial
Note
When the following 3 fields are non-numeric, they will have no data:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 262
Industrial
A screen will open on the right with a detailed page. Click the arrow on the top right corner to
expand this view to the entire screen.
• Tag Information – Includes the Tag name, the Target asset associated with this tag, Protocol,
Write Count, Read Count, Publish Count and Tagging Mode as described above
• Source assets – The assets that communicated with the target asset and sent the read/write
requests. The parameters includes the source asset Name, IP address, MAC address, Class,
Type, Criticality, Risk Level, Vendor, Network, and Last Seen fields as described in Assets
List View. These assets are sorted by decreasing Risk Level.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 263
Industrial
Tracking Configuration in the toolbar, select the Tracking mode and Access Type.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 264
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 265
Industrial
• No Tracking – In this mode, there is no tracking whatsoever. The user obtains some data in
the Process values table
• Summary – In this intermediate level of tracking, Process Values are tracked at a high
level, including statistics and trends over time. If further information is needed, use Detailed
tracking. The statistics are summarized on an hourly basis.
• Detailed – This is the most extensive type of tracking. Every detail of the process values is
tracked and available for further investigation, yet it has less history than Summary tracking.
This mode provides continuous tracking information in real time.
• Detailed Write
• Detailed Read/Publish
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 266
Industrial
Note
We highly recommend that users track Write access types.
This timeline graph shows two aspects: a light blue block that shows the range of values, plus
an additional line graph superimposed above it:
When hovering over the graph, further details are displayed, and the corresponding table is
marked.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 267
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 268
Industrial
The following fields are displayed in Overview page for the process values:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 269
Industrial
• Process Values Title – The name of the Process Value being tracked
• First seen – The first time there was a read/write/publish action on this tag
• Last seen – The last time there was a read/write/publish action on this tag
• Tag Name – The tag name that is related to the asset. This tag has a value
• Target Asset –The target (affected) asset (e.g., a Controller)
• Protocol –The related protocol running on this asset
• Read/Write/Publish counts, the Last Read/Write/Publish value
• Last Function Code – How the read/write action was done
• Tracking Mode – No Tracking / Summary / Detailed
• The Site ID – Identifies the site in which the process values are being tracked (only visible
when investigating from the EMC)
• The Source Asset/s – The asset/s that communicated with the target asset and sent the
read/write requests.
• Min Value, Max Value, Average Value, Range: These entities are measured from the time
the system started to learn or after statistics reset.
Note
When a relevant value does not exist, the corresponding field is not displayed (for
example, an average is not relevant for a Boolean or a string).
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 270
Industrial
• Clicking on the cell of a source asset opens the Source Assets dialog with a table listing
each source asset and its corresponding request type
• Clicking the asset name opens the full Asset View page
• Requesting multiple request types for a single asset source, the request types are separated
by commas
• Sorting the table by the Request Type in the same manner as the main table
• General Information
• Tag Information
• Process Value Graph
• Value Information
• Source Assets
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 271
Industrial
These filters simplify search for something specific, such as Read Write access on a tag that
uses the Modbus protocol.
• Source Asset – The name of the asset performed the operation with a link to its Detailed
asset page
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 272
Industrial
Reset is used when the existing data is no longer relevant and there is a need to start over.
Reset can be performed on a single Process Value or on several ones at once.
• The Minimum and Maximum values that had previously been learned are now deleted
• The Counts are deleted
• The Averages are deleted
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 273
Industrial
The related Network Health graph shows retransmissions over time and the flow of data
between assets. You can view a specific asset and determine if it has network issues.
1. In Investigation > Network Sessions or Visibility > Assets in the Main Menu, click on an
asset.
2. Go to the Communication tab and scroll down to the Network Health graph.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 274
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 275
Industrial
The filters in the Protocol Summary are identical to those in Baselines, minus the Time filter.
To use these filters, see Baseline List Filters and Baseline Filters in Advanced Options.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 276
Industrial
8. Management Tools
CTD contain tools for viewing and managing system health and for maintaining and upgrading
the system.
Overviews can contain predefined widgets, as well as custom widgets with data important to
specific users or roles.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 277
Industrial
• Add widgets – For adding new widgets. For more details see Adding a
Predefined Widget and Creating a Custom Widget.
• Save – For saving the current overview as is presently set up, with the current
name. When pressing Save:
• If the “Default View” overview is currently displayed, only the Save As option
appears.
Note
A customized Overview can only be revised by the user that created it.
• Save As – For saving the existing overview with a new name. Use this option when
cloning the current overview as a base template for creating a new overview.
• Delete – For deleting custom overviews/widgets. This option is only displayed for a
custom-made overview.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 278
Industrial
To reduce the number of Overviews in the list, those that are of interest only to a specific user
can be designated as Private and display only when that user is logged on.
• When saving a new Custom Overview, select the Private Dashboard option in the Save
Dashboard window.
You can create a customized Overview by reorganizing the placement of the widgets as follows:
• The controls on the top right of each widget header are Edit mode controls , enabling
you to perform the following operations:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 279
Industrial
• Move – To reposition the selected widget on the dashboard by dragging the widget with
the mouse and releasing it at the target location.
By default, all available widgets are displayed, but the Predefined Widgets pane enables
you to filter them according to Visibility, Risk & Vulnerabilities, and Threat Detection
categories.
2. Scroll down to view the list of predefined widgets and click each widget to be added.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 280
Industrial
4. Reposition a widget as needed by clicking Move and moving it to the appropriate place.
1. Navigate to Baselines, Assets, or Alerts. Then, in the toolbar, click More > Create a
Widget.
The Create a Widget window opens.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 281
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 282
Industrial
2. In the General section, add a Widget Name and an optional Widget Description.
3. In the Visualization section, select how the data should be displayed visually by doing the
following:
a. In Chart Type, choose from the following:
Horizontal Bar
Line Chart
Pie Chart
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 283
Industrial
Vertical Bar
Vertical Bar
Stacked
Note
This widget displays data for up to 5 Sites. So depending on the number
of Sites in your enterprise, you might need to create several widgets.
For example, for an enterprise with 14 Sites, you would create 2 widgets
with 5 sites each and another widget with 4 sites.
b. In Group By, choose a category for how you want to group the results. You can group
the results according to any of the following categories (listed alphabetically):
• In Assets – Asset Criticality, Asset Type, Class, Default Gateway, Domain, Domain/
Workgroup, Firmware, First Seen (days ago), Host Name, Installed Antivirus, Last
Seen (days ago), Mode, Model, Name, Network, OS, Parsed Asset, Purdue Level,
Risk Level, Serial, Site (EMC only), Subnet, Type, Vendor, Virtual Zone
• In Alerts – Alert Description, Alert Family, Category, Created (days ago), Severity,
Site, Status, Type
• In Baselines – Access Type, Baseline Name, Communication Type, Destination
Port, First Seen (days ago), Frequency, Last Seen (days ago), Protocol, Site (EMC
only), Source Port, Transmission
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 284
Industrial
Chart Type and Group By selections are reflected in the Preview pane.
4. In the Filters section, specify which data should be displayed by doing any of the following:
• Apply filters as needed. Filter options vary, based on whether you are creating an Assets,
Alerts, or Baselines widget.
• Click the Switch to Query View link and use Claroty’s CTD Query Language (CQL)
to modify or add filtering. Already-active filters in the viewed page are automatically
translated into this query language. You can modify the query statement or rewrite it to
suit your requirements.
See CTD Query Language (CQL) for full instructions on using CQL.
5. Click Save.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 285
Industrial
The widget is added to the Custom Widgets section of the Create a Widget window and can
be added to any Report or Overview.
CQL Operators
= For entities where the value matches exactly. This cannot be used with text fields; see
the CONTAINS operator instead.
!= For entities where the value does not match exactly. To find entities where the value of a specified
field exactly matches multiple values, use multiple "=" statements with the ‘AND’ operator
IN Contained in the list of values separated by commas and enclosed in brackets
NOTIN Not contained in the list of values separated by commas and enclosed in brackets
~ Like
!~ Not like
~IN Like in
~NOTIN Not like in
AND Displays the result if ALL the conditions separated by the ‘AND‘ are met
OR Displays the result if EITHER of the conditions separated by the ‘OR‘ are met
BETWEEN Selects values within a given range. The values can be numbers, text, or dates. It is inclusive; i.e.
the begin and end values are included
NOT Displays the result if the conditions separated by the ‘AND’ are not met
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 286
Industrial
If the tooltip does not appear, move the mouse to an empty space on the graph until it appears.
Important
Deleting a widget from the widget catalog permanently removes it not only from the
catalog, but from all Reports and Overviews in which it was used.
To delete a widget:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 287
Industrial
3. Scroll through the right pane to find the widget you want to delete.
4. Click .
The widget is deleted from the catalog, and all Reports and Overviews in which it was used.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 288
Industrial
3. Click More > Create a Widget. The Create a Widget dialog opens with your filter:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 289
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 290
Industrial
Figure 198. Adjusting the Title, Chart Type and Group By Choices for a Widget
5. Click Save .
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 291
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 292
Industrial
2. Click in the upper right corner of the content area, click More > Set as home page.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 293
Industrial
The Activity Log records activities performed in CTD in the last year by users and by the
system. This list provides the activities that took place on the EMC and the Sites.
These activity logs also include data loaded into CTD from CSV import, Project Files, and Active
Queries.
Activity Logs can be transmitted to SIEM tools using Syslog. To learn more, see CEF Latest:
Activity Log.
The activities are listed in chronological order, with the newest items appearing at the top.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 294
Industrial
• Site - (EMC only) The name of the site on which the activity took place, or Central if on the
EMC
• Time - Date and time the activity took place
• User Name - Name of the user who performed the activity
• Category - Major areas of CTD, such as Alerts, Assets, and Zone Rules.
• Action - A brief description of the activity
• Description - A detailed explanation of the activity
• Action Status - Success, Failure, or Error
• Log Type - System or User log
Note
When the Log Type is System, the User Name is always N/A.
For a full list of Categories and their related Actions, see Supported Activities - Categories and
Actions.
• You can filter the Asset Retention Rules list using any of these filters:
• Site
• Category
• Action
• Action Status
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 295
Industrial
• Log Type
• You can search for Activities by typing any part of the activity description into the Search by
field and pressing <Enter>.
• You can sort the list by date by clicking the Time column heading.
In this example, the Activity Log is filtered by the Alert Assigned action. This displays all
activities where alerts were assigned to users to review.
Category Action
Active Detection Tasks
Task Created
Task Deleted
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 296
Industrial
Category Action
Task Stopped
Task Updated
Query Created
Query Deleted
Query Updated
Alert Alert
Alert Assigned
Alert Comment Added
Alert Comment Deleted
Alert Comment Updated
Alert Resolved
Alert Scoring Calculated
Assets Asset Cleaner
Asset Comment Added
Asset Deleted
CSV Imported
Asset Info Updated
Assets Merged
Asset Retention Asset Retention Rule Created
Asset Retention Rule Deleted
Asset Retention Rule Run
Asset Retention Rule Updated
Baselines Baseline Deleted
Remote Connection
Dashboard View Dashboard Created
Dashboard Deleted
Dashboard Updated
Widget Created
Widget Deleted
Data Sources Interface Configuration
Matcher
Matcher Created
Matcher Deleted
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 297
Industrial
Category Action
Matcher Updated
NAT Configuration Uploaded
Netflow Host Added
Netflow Host Updated
Netflow Host Deleted
Netflow Port Updated
Network
Network Created
Network Deleted
Network Renamed
Network Updated
PCAP Deleted
PCAP Uploaded
Play PCAP
Project Files Parser Configuration Added
Project Files Parser Configuration Deleted
Project Files Parser Configuration Updated
Project Files Parsing - One Time
Project File Parsing - Recurring
Recorded PCAP deletion
Email Notification Email Notifications
Enterprise Management Auto Upgrade Sites
Cloud Connection
Cloud Updates
Deployment Architecture
Site Image Deleted
Site Image Uploaded
Updates
Upgrade
Insights Insights Calculated
Insight Comment Added
Insights Comment Deleted
Insights Comment Updated
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 298
Industrial
Category Action
Insight Marked
Insight Status Updated
Integrations CrowdStrike
Integration Configuration
License License Expired
License Renewed
License Updated
Reports Report Created
Report Deleted
Reports
Report Scheduling Created
Report Scheduling Updated
Report Updated
Rules Auto Resolve Rule Created
Auto Resolve Rule Deleted
Baseline Rule Added
Baseline Rule Deleted
Baseline Rule Updated
Network Signatures
Network Signature Created
Network Signature Deleted
Network Signature Updated
Rule Added
Rule Deleted
Rule Updated
YARA Rule
YARA Rule Created
YARA Rule Deleted
YARA Rule Updated
Subnets CSV Imported
Subnet Added
Subnet Auto Learning
Subnet Deleted
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 299
Industrial
Category Action
Subnet Imported
Subnets Reclassified
Subnet Tag Added
Subnet Tag Deleted
Subnet Tag Updated
Subnet Updated
System Health Bootstrap
Communication
DB Cleaner
Site Communication Down
Site Communication Up
Site Down
Site Up
Site Synchronization
System Management Alert Capture File Settings Updated
Application Restart
Auto Change Mode
Backup
Changed to Operational Mode
Changed to Training Mode
Custom Attributes
Custom Attributes Created
Custom Attributes Deleted
Custom Attributes Updated
DB Passwords Updated
Site Custom Attributes Updated
Site/EMC Info Updated
Zone Grouping Method Updated
Zone Grouping Algorithm Updated
Threat Detection Settings Alert Sensitivity Updated
Threat Intel Bundle
Zones Zones
Zones Auto Generated
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 300
Industrial
Category Action
Zone Created
Zone Criticality Updated
Zone Deleted
Zone Description Updated
Zone Renamed
Zone Updated
Zone Rules Policy Added
Policy Deleted
Policy Invalidated
Policy Validated
Policy Updated
The Activity Log logs configuration operations (Add/Delete/Update) for Custom Attributes as
well as their usage. When a user changes the application or value of a Custom Attribute, the
system logs the corresponding asset name and its value, including the site and the network in
which the change occurred. When bulk actions are performed, they are listed per asset.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 301
Industrial
9. Reports
• Tables - Data from various tables such as Alerts, Assets, Insights, and others.
Table reports are especially suited to Analysts and SOC staff for investigating incidents
across a large dataset containing thousands of records via CSV export.
• Widgets - Widgets used in the Dashboard and various Overviews.
Widget reports are of interest to executives, who require a high-level data aggregation to
understand trends and security posture direction.
• Reports Editor - Use this flexible, feature-rich editor to create reports that contain graphic
representations of data, or widgets, from across CTD.
• Reports Library - The central hub of CTD reporting, the Reports Library contains both Claroty
and user-created table and widget reports. From here you can schedule, download, copy,
edit, and delete reports.
• Scheduled Reports - Used to manage advanced scheduling settings.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 302
Industrial
Note
There is no report creation sync between the EMC and sites. So while it is technically
possible to log directly onto an EMC-managed site and create a report, it will not appear
in the EMC. Likewise, reports created in the EMC do not appear in sites.
• Users with Admin permissions may view, schedule, and immediately download reports that
they create, Claroty-created reports, and those of all other users. They may edit only those
reports they create themselves.
• Users with Manage permissions may view, edit, schedule, and immediately download only
the reports they create themselves. They do not have access to reports created by other
users or to Claroty-created reports.
• Users with View permissions may view the reports they create themselves and schedule
the widget reports they create themselves. They may immediately download both table and
widget reports upon creation.
For Widget Reports, content access determines the content a user is permitted to see in the
Report Editor and send in the report. So if you have Admin reporting actions, but only Threat
Detection content access:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 303
Industrial
• When you view a report in the Reports Editor that has non-Threat Detection content, you will
see content only for the Threat Detection widgets. The other widgets in the report will contain
a message that you do not have proper permissions to view the content.
• When you send the report, the recipients will receive only the Threat Detection content, even
if they have access to other areas of CTD.
Important
You can download a report for up to 20,000 items (Assets, Alerts, etc.). For a larger
number of items, create a Scheduled Report instead.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 304
Industrial
To schedule a report:
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 305
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 306
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 307
Industrial
CTD contains an extensive set of widgets that graphically represent various system states
and activities. They are used throughout CTD in the Dashboard and Overviews, and you can
harness their power to create reports. The Report Editor is your tool for creating and editing
widget reports.
Note
For information about creating table reports, see Creating Table Reports.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 308
Industrial
• Navigate throughout your report. Click a heading to jump to that area of the report in the
Report Preview Pane.
• Add, delete, copy, and edit widget content
2. Filters - Specify the dataset of the report by Site and/or Time.
3. Report Preview Pane - Displays a preview of the report.
4. Create/Save/Download buttons - (Depends on whether the report is being created or
edited.)
• Create - Saves the report to the Reports Library after you specify recipients and
scheduling.
• Download - Runs and downloads the report immediately after the report is created.
• Save - Saves changes to the edited report.
• Save As - Saves the edited report as a new report.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 309
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 310
Industrial
To view the newly-created report in the Reports Library, click the link. Otherwise, click OK.
6. At this point, you can choose to:
• Run and download the report immediately by clicking .
• Continue adding widgets and either save the report by clicking Save, or save it as a new
report by clicking Save As.
• Edit the report name and description as needed:
a. At the top of the report content pane, click .
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 311
Industrial
b. Edit the Report Name and Description as needed. Then click Save.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 312
Industrial
Tip
If you do not see the data you expect, close this window and make sure you
specified the correct period in the Time Range filter.
2. Find and select Predefined (system) or Custom (CTD user-created) widgets to add to the
report by doing the following:
a. Find widgets in the left pane by doing the following:
i. Find predefined widgets by doing either of the following
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 313
Industrial
• Click the Predefined Widgets heading and scroll through the list
• Click the categories underneath the Predefined Widgets heading to filter the list
by the major sections of the widget catalog
ii. Find Custom widgets by clicking Custom Widgets in the left pane and scrolling
through the list.
b. In the right pane, click a widget to select it. Click again to deselect it.
As you select and deselect widgets, the Widgets Selected count changes.
3. After you finish selecting widgets, click Add Widgets.
The selected widgets are added to the:
• Report Preview pane
• Report Content pane, under the Widgets in Report heading
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 314
Industrial
• To add widgets, click any of the +Add Widget buttons and add widgets as described in
Adding Widgets to a Report.
• To delete widgets, in the Report Content pane, under the Widgets in Report heading,
do one of the following:
• To delete all widgets in the report, click the trash can icon next to the Widgets in
Report heading.
• To delete specific widgets:
a. Click the More menu of the widget to be removed.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 315
Industrial
Note
If, at any time during the editing process, you leave the Reports Editor without saving, a
confirmation message is displayed.
However, when you first create a report, you can change the time period that is applied to all
widgets. This is the global filter, and it affects the data displayed in the widgets in the Add
Widgets window.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 316
Industrial
Once you add widgets to your report, you can then edit the time filter for specific widgets. This
local filter overrides the time period specified in the global filter.
If you then change the global filter, you are prompted to choose whether to apply the change to
all widgets, including those with local filters, or only those widgets to which local filters were not
applied.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 317
Industrial
The vertical bar graphs are per site. A color legend is displayed to distinguish
the most prominent types of assets in each site.
IT vs OT Policies Shows horizontal bar graphs of IT vs. OT policies per site.
Asset Breakdown Pie chart showing each asset breakdown per asset Type, Zone, and Subnet
per site.
OT Asset Distribution The breakdown of the OT assets per type (e.g. PLC, HMI, Engineering
by Site Station).
IT Asset Distribution The breakdown of the IT assets per type (e.g. Endpoint, Printer, Networking)
by Site per site.
IoT Asset Distribution The breakdown of the IoT assets per type (e.g. Camera, VOIP Phone) per
by Site site.
Summary A count of OT Assets, OT Operations, and Write and Execute type OT
Operations.
OT Operation by type Breaks down the number of alerts for each type of OT operation.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 318
Industrial
Note
This widget is only available on standalone sites.
Top 10 Assets Lists the top 10 assets with the highest Read/Publish or Write counts.
by Process Values
Requests
Insights Summary Shows the Hygiene Score and top 3 Insights for the selected Sites.
Top Risky Sites by Shows the volume of top enterprise vulnerable assets, sorted per site and
Insight Severity per Severity level (High, Medium, and Low).
Zones By Criticality A pie chart widget of the distribution of the zones per Criticality per site.
Top 10 Insights Shows the top 10 most significant insights, sorted by importance.
Just to Let You Know List of Insights that highlight the potential issues that that were investigated
and do not exist in your system (e.g. Dangerous Protocols, Unpatched
Vulnerabilities).
High Risk Assets by Pie chart that shows the distribution of high-risk assets per criticality per site.
Criticality
Assets by Insights Bar chart that lists the number of assets, sorted per severity level.
Severity
Threat Threat Detection Displays the total numbers of open alert stories, open alerts, and events in
Detection Summary the enterprise for the selected time period.
Top Alerted Sites - Shows the total number of Critical open alerts throughout the enterprise and
Critical Open Alerts breaks it down graphically by alert family.
by Type
Alert Status A color-coded bar graph of Alert Stories and Alerts with a count of each alert
severity level.
Top 10 Recent Alerts A table highlighting the recent top 10 alerts, displaying their Description,
Score, and Detection date, with a colored dot to indicate the alert’s severity
level.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 319
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 320
Industrial
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 321
Industrial
risk assessment across your entire ICS network. These insights are collected from traffic by
SPAN monitoring and ingesting PCAP, Project File, or Active Query data.
This Overview provides a summary of the entire asset inventory and all communications
discovered on the industrial network, pinpointing vulnerable assets and resolutions, while
revealing network configuration and other “network hygiene” issues that can provide attackers
with a means for interfering in critical processes.
• Threat Detection Overview Report - CTD closely inspects every network communication
and collects all events to identify a possible threat. All related events go into a single alert
that notifies of a possible threat to the process, such as an operational anomaly or a security
attack.
The Threat Detection Overview Report displays CTD’s cyber and OT threat detection and
policy violations
• Risk Assessment Report - A combination widget and table report that begins with an overall
network summary and then progresses to the details.
For further information about this report, see About the Risk Assessment Report.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 322
Industrial
• - (Custom report only) Permanently delete the report from the system.
• You can filter the Report Library using any of these filters:
• Report Source - Whether the report is a Claroty or Custom (user-created) report.
Since only Custom reports can be edited or deleted, this filter is useful for displaying only
those reports on which you can take action.
• Scheduled - Whether or not the report has been scheduled.
This filter is useful for displaying only reports that have not yet been scheduled.
• Created By - (Admin only) Lists the users that created reports.
• Alternately, click Switch to Query View to add Claroty Query Language queries.
• You can search for reports by typing any part of the report name or description in the Search
by field and pressing <Enter>.
• You can sort the list by Report Source, Report Name, Created, Created By, Last Sent, and
Scheduled by clicking these column headings.
1. For the report whose settings you want to change, click Schedule Report in its
Actions column.
The Edit Report window opens.
2. Scroll down to the Recurrence section, click the Click to enable Scheduling Settings
link, and make changes as needed. Then click Update.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 323
Industrial
To create a copy of a report, click , change the report details as needed in the Copy
Widget Report window, and click Copy.
A success or failure message is displayed, and the copy is added to the library.
Note
You can make a copy of any report except the Risk Assessment Report.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 324
Industrial
Note
To edit a Claroty-created widget report, make a copy first and then edit the copy.
Note
Predefined (Claroty-created) reports cannot be deleted.
The Risk Assessment Report starts with an overall network summary and then progresses
to the details. These include the various control process devices, demonstrating how
they communicate within and across the network. It provides specific visibility into your
communication paths and associated devices.
This report provides a Network Hygiene score, which indicates the cumulative risk level that the
alerts, insights, and assets pose to the system. A low value means that your system is more
vulnerable to attacks. This score is calculated based on the critical security insights, CVEs,
and anomalies detected, as well as how many critical assets were identified. When assets with
severe vulnerabilities and alerts affecting them are used along with weak protocols, the score
decreases.
The hygiene score appears together with a list of actionable insights that can help improve
network hygiene, assets, and network statistics. This report can be used as a Key Process
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 325
Industrial
Indicator (KPI) to track progress as part of a security program, as an executive brief, and as a
list of recommended changes.
Since the hygiene score is consolidated into a single score, it can be used to track progress in
reducing the risk and attack surface.
When producing the report on the Enterprise Management Console (EMC) for all sites, be
aware that the data shown is an aggregation of the data from all the sites belonging to that
EMC. As such, the Top Communicators and Protocol Distributions graphs are not displayed
in the report since this particular information does not apply when viewed from the EMC.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 326
Industrial
Report Description
CTD Alerts Ignored/Acknowledged from Activities of alerts marked as ignored or acknowledged from the last week
the last week
CTD Assets Changed IP in the last month Activities about assets that changed their IP in the last month
CTD Assets discovered in the last week All assets discovered in the last week
CTD Assets from the Enterprise Security Assets from the enterprise network (Purdue level 4 and level 5)
Zone
CTD Assets from the Industrial Security Assets in the industrial security zone (Purdue level 3)
Zone
CTD Assets performed Data Acquisition All assets that performed data acquisition write. These assets should be
Write (Operated PLCs) considered as potential assets that can change the process by changing
values.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 327
Industrial
Report Description
CTD Assets that talk with external IPs Unicast and remote assets that are talking with external assets. External
IPs, coupled with respective network interfaces, expose the asset to
users outside of the company's perimeter, enabling attackers to enter the
OT network.
CTD Assets using remote connection All assets using remote connections
CTD Assets with unpatched CVEs All assets with unpatched vulnerabilities that have Full Match CVEs.
These assets, which run vulnerable software versions, can be leveraged
by attackers for various malicious purposes such as, remote code
execution, DDOS, etc.
CTD Assets with unsecured protocols All assets using unsecured protocols. Assets with unsecured protocols
contain security weaknesses that attackers can leverage to compromise
the network's security.
CTD Completed Insights All Insights marked as completed, include vulnerabilities.
CTD Inactive assets from the last week Unicast assets that did not communicate in the last week
CTD Insights Report All open Insights (severity: High, Medium, Low)
CTD Insights with High Criticality -
CTD New Alerts from the last week Critical and High alerts created in the last week and their statuses
CTD Parsed Assets All assets that were discovered as parsed assets via Project Files
Resolved alerts from the last week Activities report for alerts that resolved in the last week
CTD Site connectivity from the last week Site connectivity status from the last week (site up or down)
CTD Top Risky Assets Top 10 most risky assets
• You can filter the Report Library using any of these filters:
• Report Source - Whether the report is a Claroty or Custom (user-created) report.
Since only Custom reports can be edited or deleted, this filter is useful for displaying only
those reports on which you can take action.
• Scheduled - Whether or not the report has been scheduled.
This filter is useful for displaying only reports that have not yet been scheduled.
• Created By - (Admin only) Lists the users that created reports.
• Alternately, click Switch to Query View to add Claroty Query Language queries.
• You can search for reports by typing any part of the report name or description in the Search
by field and pressing <Enter>.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 328
Industrial
• You can sort the list by Report Source, Report Name, Created, Created By, Last Sent, and
Scheduled by clicking these column headings.
In these cases and others, you can make multiple copies of a report and then tailor the format,
recipients, and scheduling settings to various audiences.
Scheduling settings are copied from the source report and can be edited if needed.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 329
Industrial
Note
Predefined (Claroty-created) reports cannot be deleted.
1. For the report whose settings you want to change, click Schedule Report in its
Actions column.
The Edit Report window opens.
2. Scroll down to the Recurrence section, click the Click to enable Scheduling Settings
link, and make changes as needed. Then click Update.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 330
Industrial
• Report Type - Options include Table Report or Widget Report. Click the column header to
sort the list.
• Report Name
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 331
Industrial
Note
When you delete a report's scheduling settings, it is removed from the Scheduled
Reports page. However, the report is not deleted from the system and can be
rescheduled from the Report Library.
• You can filter the Scheduled Reports list using any of these filters:
• Report Type - Options include Table Report and Widget Report.
• Alternately, click Switch to Query View to add Claroty Query Language queries.
• You can search for scheduled reports by typing any part of the report name in the Search by
field and pressing <Enter>.
• You can sort the list by Report Type, Report Name, Report Format, Scheduled By, Last Sent,
and Status by clicking these column headings.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 332
Industrial
1. For the report whose settings you want to change, click Schedule Report in its
Actions column.
The Edit Report window opens.
2. Scroll down to the Recurrence section, click the Click to enable Scheduling Settings
link, and make changes as needed. Then click Update.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 333
Industrial
10. Terminology
10.1. Terminology
Table 14. CTD Terminology
Term Meaning
ACS Assertion Consumer Service
Actionable Objects in the system related to an alert.
AD Active Directory
Alert An event that may cause a threat or a risk to the security of the network and
requires attention and investigation.
Alert Indicator A predefined characteristic of an alert that affects the alert score.
Alert Score A number representing the overall alert importance, resulting from the collection of
observed indicators and network activities.
App DB Application Database
ARP Address Resolution Protocol. A communication protocol used for discovering the
link layer address associated with a given IPv4 address, a critical function in the
Internet protocol suite. Used for mapping a network address such as an IPv4
address, to a physical address, such as a MAC address.
Asset Any distinguishable network entity.
Attack Vector A path or means by which a hacker can gain access to a computer or network
server to deliver a payload or a malicious outcome. Attack vectors enable hackers
to exploit system vulnerabilities.
Baseline The CTD collection of valid network behaviors. An individual baseline represents a
command or an instance of communication between two assets.
Baseline Deviation During training mode, the system learns the existing asset communication and
defines a baseline for how a normal asset (or group of assets) behaves on the
network in terms of its communication patterns. A baseline deviation occurs when
a communication occurs that has not been defined yet. During operational mode,
baselines can be changed or further defined by auto-generated virtual zones and
user approved alerts.
BPF Berkeley Packet Filter. A mechanism to write/read packets to/from the network
interface.
CSR Certificate Signing Request
CAM Content Addressable Memory table. Used to record a station’s MAC address and
its corresponding switch port location. Common in Layer 2 switching.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 334
Industrial
Term Meaning
CDP Cisco Discovery Protocol. A proprietary Data Link Layer protocol developed by
Cisco Systems. Used to share information about other directly connected Cisco
equipment, such as the operating system version and IP address.
CEF Common Event Format. A proprietary syslog-based event format that can be used
by other vendors.
Chain of Events A series of alerts/events that are correlated with each other and generated an alert
and require investigation as group.
CIDR Classless Inter-Domain Routing. IP Address syntax that uses IPv4 address space
and prefix aggregation, known as route summarization or super-netting.
CIP Common Industrial Protocol. Industrial protocol for industrial automation
applications.
ClarotyOS A hardened, purposely built Linux OS, ready for use for CTD out-of-the-box. Every
Claroty Appliance is delivered pre-installed with ClarotyOS for quick deployment.
CMDB Configuration Management Database. A data repository that acts as a data
warehouse or inventory for information technology (IT) installations. It holds data
relating to a collection of IT assets, the relationships between assets and enables
understanding the composition of critical assets such as information systems. Also
help organizations track the configuration of components in the system.
Community Group of CTD devices that are interconnected with the same EMC.
CQL CTD Query Language. Provided for users to build swift SQL-like query statements
for filtering data in the system.
CSV Comma-separated values. A delimited text file that uses a comma to separate
values. A CSV file stores tabular data (numbers and text) in plain text. Each line of
the file is a data record. Each record consists of one or more fields, separated by
commas. The use of the comma as a field separator is the source of the name for
this file format.
CTD Continuous Threat Detection. The anomaly detection product within the Claroty
Platform for ICS networks, providing rapid and concrete situational awareness
through real-time alerting. Constantly monitors ICS network traffic and generates
alerts for anomalous network behavior that indicates a malicious presence and for
changes that have the potential for disrupting the industrial processes.
CTI Claroty Threat Intelligence. A highly curated, multi-source and tailored feed that
enriches Claroty’s RCA with proprietary research and analysis of OT zero-day
vulnerabilities and ICS-specific Indicators of compromise (IoC) linked to adversary
tactics, techniques and procedures (TTP). CTI’s YARA rules, for example, run on
OT asset configuration changes and code sections, not just IT artifacts. CTI equips
threat hunters and incident responders with the relevant context needed to detect
and prevent targeted attacks early in the kill chain and mitigate the consequences
of malware infections.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 335
Industrial
Term Meaning
CVE Common Vulnerabilities and Exposures. A catalog of known security threats.
The threats are classified as vulnerabilities or exposures. The CVEs originate in
software or firmware, and are identified, standardized and cataloged into a free
“dictionary” for organizations to improve their security.
CVSS Common Vulnerability Scoring System. A standardized method to indicate how
critical a specific CVE is.
DCP Discovery and Basic Configuration Protocol. A protocol definition within the
PROFINET context. A link layer-based protocol to configure station names and
IP addresses. It is restricted to one subnet and mainly used in small and medium
applications without an installed DHCP server.
DDoS Distributed Denial-of-Service. An attempt to make an online service unavailable by
overwhelming it with traffic from multiple sources. In this type of attack, multiple
compromised computer systems attack a target, such as a server, website or other
network resource, and cause a denial of service for users of the targeted resource.
DHCP Dynamic Host Configuration Protocol. A network protocol that enables a server to
automatically assign an IP address to a computer from a defined range of numbers
configured for a given network.
DN Distinguished Name. The fully qualified name of a domain or network device.
DNP Distributed Network Protocol. A set of communication protocols used between
components in process automation systems.
DNS Domain Name System. A hierarchical decentralized naming system for computers,
services, or other resources connected to the Internet or a private network.
DoS Denial-of-Service (attack). Also known as DDoS (Distributed Denial of Service)
DPI Deep Packet Inspection. A form of computer network packet filtering that examines
the header and data part of a packet as it passes an inspection point, searching
for protocol non-compliance, viruses, spam, intrusions, or defined criteria. This
method is used for identifying specific assets in the ICS network, lines of asset
communication, communication timing, protocol communication between assets,
types of commands and registers used, and the values of valid responses.
EMC Enterprise Management Console, i.e. the Central Appliance at operation
headquarters.
ENIP Ethernet Industrial Protocol (Ethernet/IP)
EPSS Score The likelihood of the vulnerability being exploited in the wild, based on the Exploit
Prediction Scoring System (EPSS) model.
Event A single network event that CTD has collected using Deep Packet Inspection (DPI).
Event Indicator See Indicator
EWS Engineering WorkStation. A high-end very reliable computing platform designed
for configuration, maintenance and diagnostics of control system applications and
other control system equipment.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 336
Industrial
Term Meaning
FQDN Fully Qualified Domain Name
FW Firewall
GDPR General Data Protection Regulation. A European Union regulation that specifies
standards for data protection and electronic privacy in the European Economic
Area, and the rights of European citizens to control the processing and distribution
of personally identifiable information. Aims primarily to give control to individuals
over their personal data and to simplify the regulatory environment for international
business by unifying the regulation within the EU.
HDD Hard Disk Drive
HMI Human-Machine Interface. A software application that presents information to an
operator about the state of a process and accepts and implements the operator’s
control instructions.
HTTP Hypertext Transfer Protocol. An application protocol for distributed, collaborative,
and hypermedia information systems. HTTP is the foundation for data
communication on the web.
Hygiene Score CTD widget displaying the current cumulative risk level posed to the system by the
insights. This score comprises the critical security insights, CVEs and anomalies
that were detected, as well as how many critical assets were identified. A low
hygiene score indicates that the system is highly vulnerable to attacks.
ICMP Internet Control Message Protocol. A supporting protocol in the Internet protocol
suite used by network devices.
ICS Industrial Control Systems. Control systems used in industrial production, including
supervisory control and data acquisition (SCADA) systems.
IdP Identity Provider. A system entity that creates, maintains, and manages identity
information for principals while providing authentication services to relying
applications within a federation or distributed network
IED Intelligent Electronic Devices
IoC Indicators of Compromise
Incident An instance of invalid network activity (network failure, malicious attack, user error,
etc.)
Indicator • Static Indicator – Static information that con potentially affect the score of an
alert.
For example: The asset type, subnet, and virtual zone group.
• Event Indicator – An observed related network activity that can potentially affect
the score of an alert and provides context to the given alert.
For example: Whether an asset has performed write operations, or whether an
asset has communicated using SMBv1.
Insight Knowledge mined from CTD about the system or about one of the entities in the
system.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 337
Industrial
Term Meaning
IoT Internet of Things. A system of interrelated computing devices, machines or objects
that transfer data over a network. CTD’s proprietary framework swiftly incorporates
and processing these devices and provides micro-segmentation in the same
manner as it does for IT and OT assets, with unified visibility, security monitoring
and risk assessment. By automatically discovering and classifying IoT devices
in the network, CTD correlates them with known vulnerabilities and continuously
monitors them.
IoT Matcher Simple code section in JSON format describing the retrieval of information from
an IoT device. These Active HTTP and Telnet queries made to the assets obtain
important device information (such as vendor, model, type, OS version, role).
IP Internet Protocol. A numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. It provides
identification of the host or network interface and the device’s location address.
IT Information Technology
JSON A lightweight format for storing and transporting data, usually used when data is
sent from a server to a web page. It is "self-describing" and easy to understand.
Known Threats CTD uses a sophisticated signatures-based database to enhance its capability for
identifying known attacks.
KEV Known Exploited Vulnerabilities. A compilation by CISA of documented security
vulnerabilities that have been successfully exploited in the wild. Used in
determining the Actively Exploited parameter in Vulnerabilities.
KPI Key Process Indicator. A quantifiable measure used to evaluate the success of an
organization, employee, etc., in meeting performance objectives.
MAC Media Access Control address. This device address is a unique identifier assigned
to a network interface for communication at the data link layer of a network
segment.
Master Event An event whose sensitivity value determines that it is not interesting or relevant
enough to be classified as an alert.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 338
Industrial
Term Meaning
Operator A person in charge of operating CTD.
Operational mode System mode in which the system raises alerts about new assets, baselines, and
abnormal communication, having already learned the necessary information about
the network communications in the site from Training mode
OS Operating System
OT Operational Technology. Hardware and software that detect or cause a change
through the direct monitoring and/or control of physical devices, processes and
events in the enterprise.
PCAP Packet Capture. By using PCAPs to records events, CTD can display which
information was changed during a particular action/activity.
PCS 7 SIMATIC PCS 7 Process Control System.
Ping Sweep AKA an Internet Control Message Protocol (ICMP) sweep. A supporting protocol in
the Internet protocol suite used by network devices, including routers, to send error
messages and operational information indicating, for example, that a requested
service is not available or that a host or router could not be reached. Whereas a
single ping will tell you whether one specified host computer exists on the network,
a ping sweep consists of ICMP ECHO requests sent to multiple hosts; if a given
address is live, it will return an ICMP ECHO reply.
PLC Programmable Logic Controller. An industrial digital computer that has been
ruggedized and adapted for the control of manufacturing processes.
Policy Rule An expression that differentiates between communication that is considered a
corporate policy violation and that which is allowed.
Policy Violation Type of alert triggered when the detected communication did not match any explicit
‘Allow’ or ‘Alert’ policy rule
PsExec A lightweight telnet-replacement that lets you execute processes on other systems,
complete with full interactivity for console applications, without having to manually
install client software.
RCA Root Cause Analytics. This CTD feature provides visibility into the chain of events
leading up to every single alert, which is particularly important for OT security
alerts. RCA enables fast and easy triage of alerts, as well as proactive threat
hunting. By providing the context surrounding the associated threat and risk, RCA
helps users hunt for threats and resolve security events.
RTU Remote Terminal Unit. A multipurpose device used for remote monitoring and
control of various devices and systems for automation. It is typically deployed in
an industrial environment and serves a similar purpose to PLCs but to a higher
degree.
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 339
Industrial
Term Meaning
SAML Security Assertion Markup Language. An open standard for exchanging
authentication and authorization data between parties, in particular, between an
identity provider (IdP) and a service provider SP. SAML is an XML-based markup
language for security assertions (statements that service providers use to make
access-control decisions).
S7Comm Siemens proprietary protocol that runs between PLCs of the Siemens S7-300/400
family
SCADA Supervisory Control And Data Acquisition
Sensitivity Entity that controls the level to be used when correlating between associated alerts.
For example, high sensitivity is in effect when the user trusts the communication
between zones.
Events that cross a sensitivity threshold are considered "qualified" and become
alerts.
SIEM Security Information and Event Management
SMB Server Message Block. SMB operates as an application-layer network protocol
mainly used for providing shared access to files, printers, and serial ports and
miscellaneous communications between nodes on a network. It also provides an
authenticated inter-process communication mechanism.
SMTP Simple Mail Transfer Protocol. An Internet standard for electronic mail (email)
transmission.
SNMP Simple Network Management Protocol
SOC Security Operations Center. A centralized unit dealing with security issues on an
organizational and technical level.
SP Service Provider. A system entity that receives and accepts authentication
assertions
SPAN Switched Port Analyzer. Used to monitor network traffic. With port mirroring
enabled, the SPAN switch sends a copy of all network packets seen on one port (or
an entire VLAN) to another port, where the packet can be analyzed.
SSH Secure Shell. Cryptographic network protocol for operating network services
securely over an unsecured network. Provides administrators with a secure way
to access a remote computer. This encryption and protocol technology is used to
connect two computers to lock out eavesdroppers by encrypting the connection and
scrambling the transmitted data so it is meaningless to anyone outside of the two
computers.
SSL Secure Sockets Layer. Standard security technology for establishing an encrypted
link between a web server and a browser. This link ensures that all data passed
between the web server and browsers remain private and integral.
Story See Chain of Events
Subnet A group of IPs. Used to segregate the internet
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 340
Industrial
Term Meaning
SYN A type of Distributed Denial of Service (DDoS) attack that exploits part of the
normal TCP three-way handshake to consume resources on the targeted server
and render it unresponsive.
TCP Transmission Control Protocol
Training mode Learning mode in which CTD dynamically profiles the site’s normal process
behavior, assembling a baseline by observing all network traffic and registering
it as valid. Alerts are triggered for critical changes and security risks, and newly
discovered assets and communication patterns are recorded in the baseline as
shown on the System Management page.
UDP User Datagram Protocol
UEFI Unified Extensible Firmware Interface. A specification for a software program that
connects a computer's firmware to its operating system (OS). UEFI is expected to
eventually replace BIOS. Like BIOS, UEFI is installed at the time of manufacturing
and is the first program that runs when a computer is turned on.
UI User Interface
UPS Uninterruptible Power Supply
User A person using the CTD web interface.
UUID Unique User Identification.
Virtual Zones Capability for grouping related assets in a logical view. Virtual Zones allow definition
of a Baseline Deviation alert policy for each Virtual Zone or communication
between Virtual Zones.
VM Virtual Machine
WMI Windows Management Instrumentation. The infrastructure for management data
and operations on Windows-based operating systems.
Zones See Virtual Zones
Continuous Threat Detection (CTD) User Guide CTD 5.1.0 Page 341