Sandfly Blog
Sandfly 5.3.0 features a major UI overhaul with our new Linux host forensics and data views. We’ve not only brought critical host data front and center for rapid incident investigation, but expanded threat coverage, added in Microsoft Sentinel support, and increased performance across the board.
A powerful feature of Sandfly is our ability to agentlessly collect a vast amount of Linux forensics and telemetry data on any system we monitor. Whether the system is a decade old, modern cloud, on-prem, or embedded, chances are very high that Sandfly can monitor it. With Sandfly 5.3 we are making this quality information visible with a new intuitive and fast host-centric view.
With host-centric views users can not only see alerts quickly, but other host operations such as processes running, users present, scheduled tasks, SSH keys, and more are also instantly available. Security teams investigating an incident now have immediate access to critical host details at their fingertips to make faster decisions about threats.
The new host view gives users a unified dashboard as seen below.
Here are some examples of the data available to users under the unified host view.
We have improved alert views by optimizing screen real estate and access to alert forensics.
Teams can immediately see every process running on a system, who owns it, and related details.
All listening network services are shown separately from the general process list to quickly spot potential threats running on a host.
All users, their login shells, password status, and more are instantly visible.
Active and inactive kernel modules can be reviewed instantly.
SSH keys, users with keys, and SSH Security Zone status is immediately visible. Views into key access allows fast and easy identification of who is accessing a host.
Identify persistence risks in crontab and systemd with simple and easy scrolling of what they are running.
See CPU and drive status of all systems, even those without traditional system performance monitoring solutions.
We now scan users authenticating to Linux systems using LDAP, Active Directory, and similar services. Users logging in without an account under traditional /etc/passwd will have their directories and data scanned as if they were a local user. This means that threats present in remotely mounted home directories will be found, and SSH key data to track access to systems will also be indexed.
Many speed increases have been made to our forensic engines and result ingestion pipelines. Speed increases of several hundreds of percent were achieved making result processing faster and on-host performance even lower impact than before.
We have added many detections to cover more Linux backdoors, rootkits, and suspicious process activity:
We have added Microsoft Sentinel integration so Sandfly alerts can be directly sent to the Sentinel platform. This capability goes alongside our existing support for Splunk, Elastic, and syslog for result replication in addition to our existing REST API methods.
Sandfly is able to access many more systems than traditional agents. The data we collect and export is extremely valuable and augments networks running agent-based solutions that often have large visibility gaps on Linux.
If you have not tried Sandfly, get your free license below:
All customers are encouraged to upgrade to see our expanded host view and get a better handle on what their systems are running.
We are here to help with any questions. Please see our documentation on the new features and capabilities:
Customers wishing to upgrade can follow the instructions here:
If you have any questions, please reach out to us.
Thank you for using Sandfly.