Demo of SentinelOne's Endpoint Protection Platform with Chris Bates
Вставка
- Опубліковано 16 вер 2024
- Principal Architect at SentinelOne, Chris Bates, shows us a demo of the Endpoint Protection Platform and pre-execution prevention using both reputation and machine learning.
Read more at bit.ly/2nv0BeX
See endpoint security with Chris Bates: • Endpoint security with...
Watch SentinelOne’s integrated EPP plus EDR strategy with Raj Rajamani: • SentinelOne’s integrat... .
Note: All our materials are strictly meant for educational purposes.
Great product. This presentation is awesome aside from the fact that the interviewer interrupts every 5 seconds with "wow, yep, mmhmm, okay, ohhhhh, wow, ahhh nice, wow". That part was annoying.
Thought the same ❤😅
2020 agrees with you
Wallpaper gets also restored with the rollback option 5:40
Everyone:
Interviewer: HEYYYYYYYYYYYYYYYYY! NICE THATS INCREDIBLE
Awesome demo, looks like a great product.
Nice, but the doubt is, to recover the files the shadow copies feature has to be enabled to capture the volume, what if it was not enabled on the machine.How do you recover with 1 shot.Could you please explain @SentinelOne
Wowo really it was a great prod
Hi sir, how do i get that malware for testing purpose ?
please share sir
Yeah ok. Mmm hmm wow isn’t adding anything here
it also blocks untouched legitimate windows apps and exe files!! they still got alot of work to do...its a anti exec software..
that'd be considered a false positive. most XDRs/EDRs have similar behavior however a bit of tweaking in the Detection policies should solve that. its always best to not trust until verified. #ZeroTrust
Pour information j'ai réussi a bypasser cet antivirus et prendre le contrôle d'un ordinateur windows 10 !
sound effects
not a bad product....it is like Kaspersky System Watcher on Steroid + visibility and rollback. but it is still not a perfect product as i managed to test it bypass it easily...it has a blindspot. Concept if nothing is detected, rollback will fail even when the system has been compromised. How? Windows built in tools will do the trick.
Hey Emmanuel. I'm going to eval this product soon. How did you by-pass it's detection? And what do you mean Windows built in tools do the trick?
@@mikemiller9891 for example:
VSS not activated, it's essential for rollback
@@ivanmartinezcaro7019 It's so essential that anything that messes with VSS is viewed as an immediate threat and gets shut down asap. Whether that always works is open for debate.
@@ivanmartinezcaro7019 you can run vss admin list shadows and create a script to alert if "application rollback" does not exist. that way you will know if rollback function is not working. aside that, you should be able to rollback upto 30 days using the copies created