Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

...

Introduction

Easy heading
linkText4
linkText10
linkText3
linkText6
linkText5
relatedLinksLabels
linkText2
linkText1
headingTagsH1,H2,H3
sidebarMaxHeight450
linkType2Page
linkType3Page
linkType1Page
linkType10Page
sidebarTitleON THIS PAGE
linkUrl3
linkUrl4
linkUrl1
linkUrl2
linkUrl10
includedPageModeDisable_Included_Pages
linkText8
linkText7
relatedLinksOrderLabels_First
sidebarModeOpened
headingNumberingModeDisable_Numbering
linkText9
sidebarMarginRight20
relatedLinksTargetNew_Window
relatedLinksTitleRELATED LINKS
linkUrl9
linkUrl7
linkUrl8
numberedHeadingTagsH1,H2,H3
linkUrl5
linkUrl6
linkType8Page
linkType9Page
linkType6Page
headingLinkTextModeWrap
linkType7Page
linkType4Page
linkType5Page
sidebarWidth240
sidebarTop160
headingLinkExpandModeCollapse_All_By_Default
headingLinkIndent10

...

The GYTPOL team will setup the SaaS infrastructure and the tenant. The relevant license, including device count and modules, will be allocated as per the agreed terms between the parties involved.

Client Sensor Deployment and Execution:

  • Deploy the GYTPOL Client Sensor on each endpoint/server device.

  • The GYTPOL Client Sensor executes once daily, at randomly chosen times, following a predefined sequence of actions.

  • The scanning process typically completes within 5-7 minutes.

Data Collection during Scan:

  • The GYTPOL Client Sensor collects data on misconfigurations and unpatched zero-day vulnerabilities during its scanning routine.

  • For Microsoft devices, it also gathers Group Policy data (Resultant Set of Policy - RSOP) and Intune data

...

  • Subsequent to data collection, the GYTPOL Client Sensor compresses and encrypts the gathered data.

Data Transmission Attempt:

  • The GYTPOL Client Sensor creates a connection with the GYTPOL Server to transmit the encrypted and compressed data.

  • The data transmission is conducted using port 443 for communication. This approach ensures that the encrypted and compressed data collected by the GYTPOL Client Sensor is securely transferred to the GYTPOL application, enhancing data privacy and protection during transit.

  • Once data is received from a GYTPOL ClientSensor, the GYTPOL application undertakes an analysis using our exclusive GYTPOL Analyzer. This Analyzer not only examines the data thoroughly but also stores the results in a designated database. To ensure data privacy and security, customers are segregated within the database. This proactive approach ensures that you are promptly informed about any possible security threats, helping to keep you well-informed about potential risks.

  • After the GYTPOL Client Sensor completes its scan and data is transmitted to the GYTPOL application, the IT and Security teams access the findings through the Web User Interface (UI). This interface is compatible with Chromium-based web browsers such as Google Chrome or the new Microsoft Edge.

  • The GYTPOL application is equipped with several integrations to enhance its functionality and facilitate seamless operations:

    • It interfaces with various public APIs to support data exchange and integration with external systems.

    • Integration with Ticketing Systems like ServiceNow is established, streamlining the process of generating and managing tickets based on GYTPOL's findings.

    • Notably, the GYTPOL Server also integrates with Security Information and Event Management (SIEM) systems. Selected events and data are sent from GYTPOL to SIEM platforms, such as MS Sentinel, or Splunk. This integration enhances the security ecosystem by aggregating GYTPOL's insights into the broader context of security events and monitoring.

...

Sensor Server Communication

The interaction between the client Sensor and the server operates in a one-way manner: the client Sensor initiates its task either on a daily or hourly basis (the clientSensor's tasks are elaborated upon in the client Sensor section). Following the task execution, the gathered data is transmitted to the GYTPOL server, where it undergoes analysis and subsequently appears in the user interface for review.

Should a GYTPOL operator execute a remediation action or any other task from the console, the client Sensor conducts periodic checks for new tasks every hour through its hourly task execution. Upon initiating the task locally, the client Sensor provides feedback to the server regarding the outcome, indicating either success or failure.

...

Sensor

GYTPOL provides support for Windows, Linux, and macOS operating systems. For a comprehensive overview of the supported platforms, please refer to the client Sensor installation guide available at this link: GYTPOL Client Sensor Installation Guide

The GYTPOL Client Sensor operates on a daily basis for a brief duration. Within this operational window, it accumulates data related to misconfigurations, unattended zero-day vulnerabilities, and outdated third-party software. This information is collected during the run and subsequently processed for further analysis.

GYTPOL

...

Sensor for Windows

Language-Code: GYTPOL is developed using a combination of C# and signed PowerShell.

...

Communication Protocol: GYTPOL employs the latest Transport Layer Security (TLS) version supported by the device for secure communication. All communication occurs over HTTPS to ensure data privacy and integrity.

GYTPOL

...

Sensor for Linux/macOS

Language-Code: GYTPOL is implemented using the Go programming language (Go-lang).

...

From an end user's viewpoint, GYTPOL Validator is a role-based web application that simplifies cybersecurity management. Here's a walkthrough of how users navigate the UI and some notable visual notations and instructions provided in the corresponding documentation section:.

Navigation:

  • Users access GYTPOL through a role-based web interface tailored to their responsibilities.

  • The UI seamlessly guides users to different sections, tools, and insights.

...

GYTPOL provides a rapid solution to address misconfigurations, achieving this in a matter of minutes. For a comprehensive understanding of how to effectively manage misconfigurations, refer to the detailed guidance provided in the corresponding documentation section.

Anchor
_Toc148340585
_Toc148340585
CIS/NIST and other Security Compliance Benchmarks

...

For detailed guidance on utilizing the CIS/NIST Dashboards effectively, refer to the corresponding documentation section.

Anchor
_Toc136853571
_Toc136853571
Anchor
_Toc148340586
_Toc148340586
Active Directory / Group Policy Security

...

For a comprehensive understanding of how to effectively utilize the Active Directory / Group Policy Enhanced Security module, refer to the corresponding documentation section.

Anchor
_Toc148340587
_Toc148340587
AD / GPO Security and Maintenance

...

These recommendations empower you to proactively enhance the administration of AD and GPOs. For a comprehensive guide on effectively using the Maintenance features, consult the detailed instructions provided in the corresponding documentation section.

Anchor
_Toc148340588
_Toc148340588
Settings and Administration

...

For a comprehensive guide on navigating the Misconfigurations and Alerts section effectively, refer to the detailed instructions provided in the corresponding documentation sections.

Anchor
_Toc136853527
_Toc136853527
Anchor
_Toc148340591
_Toc148340591
Export

...

By selecting this option, you can request logs from GYTPOL's client Sensor on the device. This can be useful when further analysis of the device is required by GYTPOL to resolve a problem with GYTPOL's Agent on the device. The target agent will submit its logs, and when finished, a notification will appear in the System Notifications panel, under System Health. These logs can then be downloaded and submitted to GYTPOL for analysis.

...

For more comprehensive details and explanations about the user interface and its various features, please refer to the dedicated UI overview section within GYTPOL's documentation. This section will provide an in-depth understanding of how to navigate and utilize the interface effectively. It's a valuable resource to make the most of GYTPOL's capabilities and insights.

...

Anchor
_Toc136853542
_Toc136853542
Anchor
_Toc148340599
_Toc148340599
Verify that GYTPOL

...

Sensors were successfully deployed

You can confirm a successful GYTPOL client Sensor deployment in two ways:

Local Device Check: Verify on the device where the client Sensor is installed to ensure proper functioning. For more details, you can refer to the Client Sensor Installation Guide here: Client Installation Guide

...

  • Red (High): Represents high-severity misconfigurations that require immediate attention due to their critical impact on security.

  • Orange (Medium): Indicates medium-severity misconfigurations that should be addressed promptly to mitigate potential risks.

  • Yellow (Low): Denotes low-severity misconfigurations that may not pose an immediate threat but should still be resolved to enhance overall security posture.

  • Green (Complied): Signifies items that are in compliance and meet the expected security standards, resulting in no alerts generated.

...

  1. Defining Remediation Actions: Remediation Actions outline the corrective measures to be applied based on parameters like OU, Domain, or specified computer groups. The actions are grouped into topics, such as the SMB and Sharing topic including SMBv1 removal.

  2. Pending Status and Acknowledgment: After a GYTPOL admin initiates an action, it remains in a pending status until the client Sensor device checks in (hourly) and confirms the task for local application.

  3. Client Sensor Acknowledgment and Feedback: Once the client Sensor applies the task locally, it sends feedback to GYTPOL regarding the outcome. This feedback includes information on success, failure, and the reason for failure (e.g., timeout or access denial).

  4. Revert Capability: Numerous remediation actions can be reverted to the original state directly from the GYTPOL UI. This streamlines the process and eliminates the need for third-party tools or scripts. All reverts are executed on the device within an hour, maintaining consistency with the hourly check-in schedule.

...

  1. Identify the Finding: Start by identifying a particular misconfiguration or security finding that needs to be addressed.

  2. Choose the Target Group: Select the group of devices on which you want to apply the remediation action. This can include specific devices, a group based on OU, Domain, or custom computer groups.

  3. Initiate the Remediation Action: Define the specific action or fix that needs to be implemented to address the finding. This action can involve changes to configurations, settings, or other relevant parameters.

  4. Pending Status and Client Sensor Check-In: After initiating the action, it enters a pending status. The respective client Sensor devices periodically check in (hourly) to receive and acknowledge the action.

  5. Client Sensor Acknowledgment and Feedback: Once the client Sensor applies the action locally, it sends feedback to GYTPOL indicating the success or failure of the task, along with reasons for any failures.

  6. Revert Capability (if applicable): If the action supports reversion to the original state, GYTPOL allows you to revert changes directly from the UI.

...

Auto Re-apply: This option ensures that the same remediation is automatically applied to new GYTPOL clients Sensors reporting for the first time or meeting the defined criteria.

...

  • Refresh: Updates the console with the most recent information regarding the tasks that have been run.

  • Export: You have the ability to export key information related to the task (or all Tasks). This includes the results of the task (status and initiator), as well as the list of devices encompassed by the task's scope. This data can be exported to a CSV file, as detailed in the Export section of the GYTPOL Validator.

...

Anchor
_Toc136853560
_Toc136853560
Anchor
_Toc148340618
_Toc148340618
Activate / Restart / Deactivate Remediation Rule

...

  1. Create a Device Group: Begin by forming a group of devices within GYTPOL Validator. This group will serve as the initial target for remediation efforts.

  2. Initiate Remediation: Start by launching the remediation process, focusing solely on one-time remediation for the selected device group. This allows you to tackle the identified misconfigurations efficiently.

  3. Validate Impact: Monitor the devices in the group after the remediations have been applied. Ensure that there are no negative impacts on the devices' performance, functionality, or user experience. This validation step is crucial to confirm that the remediations indeed have the intended outcome.

  4. Expand Remediation: After confirming the success of the Quick-Win remediations on the initial group of devices, you can gradually expand the remediation efforts to larger groups or even across your entire environment. This approach allows you to implement changes incrementally while ensuring that any unforeseen issues are identified and addressed promptly.

  5. Continuous Monitoring: Even after applying Quick-Win remediations across your environment, continue to monitor the devices and their performance. GYTPOL's monitoring capabilities provide ongoing visibility into the status of devices and their compliance with the applied fixes.

Detailed information about Quick-Wins and the specific misconfiguration topics that fall under this category can be found in the dedicated section provided. By leveraging Quick-Wins, you can swiftly enhance the security posture of your environment while minimizing disruptions to devices.

...

This section showcases public data that can be queried from domain controllers using basic domain user access rights. The displayed information encompasses details like administrator groups, susceptible file paths within your GPOs, Security Identifiers (SIDs) with full control over Organizational Units (OUs), Service Principal Names (SPNs), Golden and Silver Tickets, and the ability to query custom group changes, among other elements.

...

Clicking on a Category within this interface provides a detailed list of the examined items. You can also navigate through a drill-down process from the specific topic to access more comprehensive insights into the data.

...

The Active Directory and Group Policy module offers recommendations for enhancing cleanliness and optimizing performance. These insights and suggestions are presented at the organizational level, highlighting areas where adjustments can be implemented to enhance the organization of your Group Policy Objects (GPOs) and Active Directory (AD).

...

By drilling down into a specific category, you can access a detailed list of identified items. Within the same topic, you'll encounter our "Know-How" feature represented by a hat icon. This resource provides comprehensive explanations about the findings and offers guidance on rectifying or modifying the identified issues, facilitating informed decision-making and proactive improvements.

...

The platform provides hardening recommendations aligned with the Center for Internet Security (CIS-8) and the National Institute of Standards and Technology (NIST 800-53) guidelines. The console will soon incorporate additional standards, including Cyber Essentials, in the upcoming months.

These recommendations are detailed in the overview.

Accessible from the homepage, you can access the corresponding dashboard on the left pane, by selecting the relevant standard. Once clicked, the CIS or NIST dashboard will be displayed, presenting the benchmark results. Here's a breakdown of the color codes used:

  • Green: Indicates that the settings within your organization are compliant.

  • Red: Denotes that the settings within your organization are not compliant.

  • Orange: Indicates that the settings are not managed in your organization, and there is no detectable Group Policy Object (GPO) containing the relevant setting.

These color-coded indicators offer a quick overview of compliance status and the need for corrective actions.

...

You can retrieve the list of computers to determine whether the specific setting you've chosen is applied or not. This allows you to quickly identify which computers are in compliance with the chosen setting and which ones are not.

...

This screen provides a comprehensive overview of reporting clients, including their status, the timestamp of their last successful scan, version information, operating systems, and the client scope (Endpoint, Server, or VDI).

Devices that are missing from reporting are color-coded as follows:

  • Light Blue: Devices reported within the last 24 hours.

  • Navy Blue: Devices that have not reported in the last 3 days.

  • Purple: Devices that have not reported in the last week.

  • Dark Blue: Devices that have not reported in 7-14 days.

...

Devices that have been removed from the organization or have missed reporting for over 14 days are moved to the "Missing over 14 days" section. If a device has not reported for over 30 days but was registered in Active Directory within the last 30 days, it will be moved to the "Never Reported" section. This helps to keep track of the reporting status of devices accurately.

...

The "What's New" section is a dedicated section that showcases the updates, enhancements, bug fixes, and new features introduced in various versions and releases of GYTPOL. This page serves as a valuable resource for users to stay informed about the changes that have been implemented in the software. It includes information about the addition of new functionalities, improvements to existing features, resolutions for known issues, deprecation of certain elements, and any security updates that have been applied.

By referring to the "What's New" page, users can quickly understand the evolution of GYTPOL and make the most of the latest enhancements.

...

The license page is a section that outlines the terms and conditions under which the software application or system is licensed to users. The page will include details such as the License type, Device Limitations and Utilization, the License Start and Expiration Dates, Available modules, Disclaimers or any applicable liabilities.

...

Information about the builds and versions for different system components. This data might be requested by the support team during troubleshooting or update processes.

...

If any findings or recommendations related to Active Directory, Group Policy, or CIS/NIST benchmarks have been muted from the user interface, they will be categorized and displayed under the respective filters. This allows users to easily identify the items that have been muted and provides the option to unmute them if needed.

Unmuting an item would mean that it will again appear in the regular alerts or recommendations list, ensuring that no critical issues are overlooked and that the organization's security posture remains strong.

...

  1. have the intended outcome.

  2. Expand Remediation: After confirming the success of the Quick-Win remediations on the initial group of devices, you can gradually expand the remediation efforts to larger groups or even across your entire environment. This approach allows you to implement changes incrementally while ensuring that any unforeseen issues are identified and addressed promptly.

  3. Continuous Monitoring: Even after applying Quick-Win remediations across your environment, continue to monitor the devices and their performance. GYTPOL's monitoring capabilities provide ongoing visibility into the status of devices and their compliance with the applied fixes.

Detailed information about Quick-Wins and the specific misconfiguration topics that fall under this category can be found in the dedicated section provided. By leveraging Quick-Wins, you can swiftly enhance the security posture of your environment while minimizing disruptions to devices.

Anchor
_Hlk138245852
_Hlk138245852
Anchor
_Toc148340623
_Toc148340623
Active Directory & Group Policy Security

This section showcases public data that can be queried from domain controllers using basic domain user access rights. The displayed information encompasses details like administrator groups, susceptible file paths within your GPOs, Security Identifiers (SIDs) with full control over Organizational Units (OUs), Service Principal Names (SPNs), Golden and Silver Tickets, and the ability to query custom group changes, among other elements.

...

Clicking on a Category within this interface provides a detailed list of the examined items. You can also navigate through a drill-down process from the specific topic to access more comprehensive insights into the data.

Anchor
_z94d04sz5p35
_z94d04sz5p35
Anchor
_Maintenance
_Maintenance
Anchor
_Toc136853572
_Toc136853572
Anchor
_Hlk138246117
_Hlk138246117
Anchor
_Toc148340624
_Toc148340624
Active Directory & Group Policy Maintenance

The Active Directory and Group Policy module offers recommendations for enhancing cleanliness and optimizing performance. These insights and suggestions are presented at the organizational level, highlighting areas where adjustments can be implemented to enhance the organization of your Group Policy Objects (GPOs) and Active Directory (AD).

...

By drilling down into a specific category, you can access a detailed list of identified items. Within the same topic, you'll encounter our "Know-How" feature represented by a hat icon. This resource provides comprehensive explanations about the findings and offers guidance on rectifying or modifying the identified issues, facilitating informed decision-making and proactive improvements.

Anchor
_CIS_/_NIST
_CIS_/_NIST
Anchor
_Toc136853573
_Toc136853573
Anchor
_Toc148340625
_Toc148340625
Security Complience

The platform provides hardening recommendations aligned with the Center for Internet Security (CIS-8) and the National Institute of Standards and Technology (NIST 800-53) guidelines. The console will soon incorporate additional standards, including Cyber Essentials, in the upcoming months.

These recommendations are detailed in the overview.

Accessible from the homepage, you can access the corresponding dashboard on the left pane, by selecting the relevant standard. Once clicked, the CIS or NIST dashboard will be displayed, presenting the benchmark results. Here's a breakdown of the color codes used:

  • Green: Indicates that the settings within your organization are compliant.

  • Red: Denotes that the settings within your organization are not compliant.

  • Orange: Indicates that the settings are not managed in your organization, and there is no detectable Group Policy Object (GPO) containing the relevant setting.

These color-coded indicators offer a quick overview of compliance status and the need for corrective actions.

...

You can retrieve the list of computers to determine whether the specific setting you've chosen is applied or not. This allows you to quickly identify which computers are in compliance with the chosen setting and which ones are not.

Anchor
_pbn2rg7obtur
_pbn2rg7obtur
Anchor
_mlwfnpxpmdj4
_mlwfnpxpmdj4
Anchor
_zfk6hv6l9q22
_zfk6hv6l9q22
Anchor
_Customization_and_Settings
_Customization_and_Settings
Anchor
_Toc136106143
_Toc136106143
Anchor
_Toc148340626
_Toc148340626
Customization and Settings

Anchor
_Health_screen
_Health_screen
Anchor
_Toc136106144
_Toc136106144
Anchor
_Toc148340627
_Toc148340627
System Health screen

This screen provides a comprehensive overview of reporting Sensors, including their status, the timestamp of their last successful scan, version information, operating systems, and the Sensor scope (Endpoint, Server, or VDI).

Devices that are missing from reporting are color-coded as follows:

  • Light Blue: Devices reported within the last 24 hours.

  • Navy Blue: Devices that have not reported in the last 3 days.

  • Purple: Devices that have not reported in the last week.

  • Dark Blue: Devices that have not reported in 7-14 days.

...

Devices that have been removed from the organization or have missed reporting for over 14 days are moved to the "Missing over 14 days" section. If a device has not reported for over 30 days but was registered in Active Directory within the last 30 days, it will be moved to the "Never Reported" section. This helps to keep track of the reporting status of devices accurately.

...

Anchor
_Toc136106145
_Toc136106145
Anchor
_Toc148340628
_Toc148340628
What’s new

The "What's New" section is a dedicated section that showcases the updates, enhancements, bug fixes, and new features introduced in various versions and releases of GYTPOL. This page serves as a valuable resource for users to stay informed about the changes that have been implemented in the software. It includes information about the addition of new functionalities, improvements to existing features, resolutions for known issues, deprecation of certain elements, and any security updates that have been applied.

By referring to the "What's New" page, users can quickly understand the evolution of GYTPOL and make the most of the latest enhancements.

...

Anchor
_Toc136106146
_Toc136106146
Anchor
_Toc148340629
_Toc148340629
License

The license page is a section that outlines the terms and conditions under which the software application or system is licensed to users. The page will include details such as the License type, Device Limitations and Utilization, the License Start and Expiration Dates, Available modules, Disclaimers or any applicable liabilities.

...

Anchor
_Managing_User_Accounts
_Managing_User_Accounts
Anchor
_Toc136106148
_Toc136106148
Anchor
_Toc148340632
_Toc148340632
Permissions: Managing User Accounts

...

Anchor
_Quick-Wins_1
_Quick-Wins_1
Anchor
_Toc148340635
_Toc148340635
Quick-Wins

...