Reputation and Permission Recommendations in VMware Carbon Black Cloud
Summary: When VMware Carbon Black Cloud is running, applications that are run on the endpoints may have requirements to have specific exclusions for anti-virus solutions. Below are the recommendations for Dell developed applications. ...
Instructions
- Products that are listed in the Affected Products may not be in an Active state. For up-to-date information about support for a product, reference Product Lifecycle (End of Support / End of Life) Policy for Dell Data Security. If you have any questions on alternative articles, either reach out to your sales team or contact endpointsecurity@dell.com.
- Reference Endpoint Security for additional information about current products.
Affected Products:
- VMware Carbon Black Cloud
- Dell Endpoint Security Suite Enterprise
- Dell Encryption
- Dell Security Management Server
- CrowdStrike
- Secureworks RedCloak
- Dell Command | Update
- Dell Update
Table of Contents:
- McAfee Endpoint Security
- CrowdStrike
- Dell Security Management Server
- CylancePROTECT
- Dell Encryption
- Windows Defender
- Secureworks Red Cloak Agent
- BitDefender
- Dell Update, Alienware Update, Dell Command Update, Dell Optimizer, and Dell Precision Optimizer
- Microsoft Client Applications
- Microsoft Application Servers
Below are the recommendations for Reputation and Permissions that can be entered with VMware Carbon Black Cloud to ensure proper functionality between VMware Carbon Black and the associated application.
- For information about adding Reputations into VMware Carbon Black Cloud, reference How to Add a Signing Certificate into the VMware Carbon Black Cloud Reputation List.
- For information about adding Permissions (Exclusions) into VMware Carbon Black Cloud, reference How to Create Exclusions or Inclusions for VMware Carbon Black Cloud.
- For additional information about required Permissions (Exclusions) for specific software, reference the vendor's documentation.
McAfee Endpoint Security
McAfee Permission Rules
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*:\Program Files\Common Files\McAfee\SystemCore\mfemms.exe *:\Program Files*\McAfee\Common Framework\x86\macompatsvc.exe *:\Program Files*\McAfee\Common Framework\macmnsvc.exe *:\Program Files\Common Files\McAfee\SystemCore\mfevtps.exe *:\Program Files\McAfee\Endpoint Security\Adaptive threat Protection\mfeatp.exe *:\Program Files*\McAfee\Common Framework\MCTRAY.exe *:\Program Files\Common Files\McAfee\AVSolution\MCSHIELD.exe *:\Program Files*\McAfee\Common Framework\UPDATERUI.exe *:\Program Files\Common Files\McAfee\SystemCore\MFECANARY.exe *:\Windows\system32\drivers\mfe* *:\Program Files*\McAfee\Endpoint Security\Threat Prevention\MFEENSPPL.exe *:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe *:\Program Files\Common Files\McAfee\SystemCore\MFEFIRE.exe *:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\MFEESP.exe *:\ProgramData\McAfee\** *:\Program Files*\McAfee\Endpoint Security\Endpoint Security Platform\MFECONSOLE.exe *:\Program Files\McAfee\Endpoint Security\Threat Prevention\MFETP.exe *:\Program Files*\McAfee\Common Framework\masvc.exe *:\Program Files\McAfee\Endpoint Security\Firewall\MFEFW.exe *:\ProgramData\McAfeeTmpInstall_Common\** *:\ProgramData\McAfeeTmpInstall_Common_Conflict\** *:\Windows\System32\mfe* *:\Program Files\Dell\Dell Data Protection\Threat Prevention\* *:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\ensmgmt.dll
McAfee Certificate Reputation List
The items below should be added in as reputations with the type of Certs within the Approved List.
Signed by: McAfee Inc.
Certificate Authority: VeriSign Class 3 Code Signing 2010 CA
Signed by: McAfee Inc.
Certificate Authority: Symantec Class 3 SHA256 Code Signing CA
Signed by: McAfee LLC
Certificate Authority: GlobalSign CodeSigning CA - G3
CrowdStrike
CrowdStrike Bypass List
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*:\Windows\System32\drivers\Crowdstrike\* *:\Program Files*\CrowdStrike\CSFalconContainer.exe
CrowdStrike Certificate List
The items below should be added in as reputations with the type of Certs within the Approved List.
Signed by: CrowdStrike Inc.
Certificate Authority: DigiCert Assured ID Code Signing CA-1
Signed by: CrowdStrike Inc.
Certificate Authority: DigiCert SHA2 Assured ID Code Signing CA
Dell Security Management Server
Dell Security Management Server Bypass Requirements
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*:\Program Files*\Dell\postgresql\*\bin\postgres*.exe *:\Program Files*\Dell\PostgreSQL\*\pgAdmin*\bin\pgAdmin*.exe *:\Program Files*\Dell\postgresql\postgresql*.exe *:\Program Files*\Dell\Enterprise Edition\** *:\Program Files\Dell\postgresql\**\pg_*.exe
Dell Security Management Server Certificate Reputation List Requirements
No reputation modifications are required.
CylancePROTECT
Cylance Bypass Rules
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*:\ProgramData\Cylance\Desktop\* *:\ProgramData\Cylance\Desktop\q\* *:\Program Files*\Cylance\Desktop\*
Cylance Certificate Reputation List
The items below should be added in as reputations with the type of Certs within the Approved List.
Signed by: Cylance Inc.
Certificate Authority: Thawte Code Signing CA - G2
Signed by: Cylance Inc.
Certificate Authority: thawte SHA256 Code Signing CA - G2
Signed by: Cylance Inc.
Certificate Authority: DigiCert High Assurance Code Signing CA-1
Dell Encryption
Dell Encryption Bypass Requirements
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*:\program files*\dell\dell data protection\encryption\** *:\programdata\dell\dell data protection\** *:\**\creddb*.cef *:\**\CEF*.TBD *:\**\CEF*.SOW *:\**\CEF*.TMP
Dell Encryption Certificate Reputation List Requirements
No reputation modifications are required.
Windows Defender
Windows Defender Bypass Requirements
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
**\ProgramData\Microsoft\Windows Defender\** **\Program Files*\Windows Defender Advanced Threat Protection\**
Secureworks Red Cloak Agent
Secureworks Red Cloak Bypass Requirements
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*:\Program Files*\Dell SecureWorks\Red Cloak\authtap* *:\Program Files*\Dell SecureWorks\Red Cloak\changeling* *:\Program Files*\Dell SecureWorks\Red Cloak\cyclorama* *:\Program Files*\Dell SecureWorks\Red Cloak\groundling* *:\Program Files*\Dell SecureWorks\Red Cloak\inspector* *:\Program Files*\Dell SecureWorks\Red Cloak\lacuna* *:\Program Files*\Dell SecureWorks\Red Cloak\procwall* *:\Program Files*\Dell SecureWorks\Red Cloak\redcloak.exe
BitDefender
BitDefender Bypass Requirements
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*:\Program Files\Bitdefender\Endpoint Security\** *:\ProgramData\Bitdefender\** *:\Windows\system32\drivers\bddci.sys *:\Windows\system32\drivers\bdfndisf6.sys
Dell Update, Alienware Update, Dell Command Update, Dell Optimizer, and Dell Precision Optimizer
Dell Update, Alienware Update, and Dell Command Update Bypass List
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*:\Windows\Temp\*\sierra_multipnp\** *:\Windows\Temp\*\idt_x3\** *:\Windows\Temp\*\wwan_5565_drvr\** *:\Windows\Temp\*\intel_lom\** *:\Windows\Temp\*\ddpa\** *:\Users\*\appdata\local\temp\*\supportassistinstaller.exe *:\program files\*\dell\updateservice\service\invcol.exe *:\Windows\temp\temp\btcache\install.exe *:\Windows\temp\*\intel\dch\fwupdatecmd.exe *:\Program Files*\Dell\SysMgt\dsia\bin\** *:\windows\temp\supportassistagent\launcherautoupdate\*
Microsoft Client Applications
Microsoft Teams
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*\Users\*\AppData\Local\Microsoft\Teams\current\teams.exe *:\Users\*\AppData\Local\Microsoft\Teams\update.exe *:\Users\*\AppData\Local\Microsoft\Teams\stage\squirrel.exe
Microsoft Application Servers
Exchange
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*:\Windows\System32\dsamain.exe *:\Windows\System32\inetinfo.exe *:\Program Files\Microsoft\Exchange Server\*\Bin\* *:\Program Files\Microsoft\Exchange Server\*\FIP-FS\Bin\* *:\Program Files\Microsoft\Exchange Server\*\TransportRoles\agents\Hygiene\* *:\Program Files\Microsoft\Exchange Server\*\FrontEnd\PopImap\* *:\Program Files\Microsoft\Exchange Server\*\FrontEnd\CallRouter\* *:\Program Files\Microsoft\Exchange Server\*\Bin\Search\Ceres\** *:\Program Files\Microsoft\Exchange Server\*\ClientAccess\Owa\Bin\DocumentViewing\*
SQL
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
**\*.mdf **\*.ldf **\*.ndf *:\Program Files*\Microsoft SQL Server\**
Active Directory
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*:\Windows\SoftwareDistribution\Datastore\*\tmp.edb *:\Windows\SoftwareDistribution\Datastore\*\Datastore.edb *:\Windows\NTDS\ntds.dit *:\Windows\NTDS\ntds.pat *:\Windows\NTDS\EDB*.log *:\Windows\NTDS\edb.chk *:\Windows\NTDS\Res*.log *:\Windows\NTDS\Ntds*.log *:\Windows\NTDS\TEMP.edb
Hyper-V
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
**\*.vhd **\*.vhdx **\*.avhd **\*.avhdx **\*.vhds **\*.vhdpmem **\*.iso **\*.rct **\*.vsv **\*.bin **\*.vmcx **\*.vmrs **\*.vmgs *:\ProgramData\Microsoft\Windows\Hyper-V\* *:\Users\Public\Documents\Hyper-V\Virtual Hard Disks\* *:\ProgramData\Microsoft\Windows\Hyper-V\Snapshots\* *:\Windows\System32\Vmms.exe *:\Windows\System32\Vmwp.exe *:\Windows\System32\Vmsp.exe *:\Windows\System32\Vmcompute.exe
All Windows Servers
The items below should be added in as permissions with the operation attempt of Performs any Operation with the action of Bypass.
*:\Windows\SoftwareDistribution\Datastore\*\tmp.edb *:\Windows\SoftwareDistribution\Datastore\*\Datastore.edb *:\Windows\SoftwareDistribution\Datastore\*\edb.chk *:\Windows\SoftwareDistribution\Datastore\*\edb\*.log *:\Windows\SoftwareDistribution\Datastore\*\Edb\*.jrs *:\Windows\SoftwareDistribution\Datastore\*\Res\*.log *:\Windows\Security\database\*.chk *:\Windows\Security\database\*.jrs *:\Windows\Security\database\*.edb *:\Windows\Security\database\*.log *:\Windows\Security\database\*.sdb *:\Windows\System32\GroupPolicy\Machine\registry.pol *:\Windows\System32\GroupPolicy\User\registry.pol *:\Windows\System32\ServerManager.exe *:\Windows\CCM\SCClient.exe
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.