Shadow Architecture Transcript
Shadow Architecture Transcript
As its name suggests, the management server coordinates everything. It handles trap
deployment onto the endpoints. It talks to your Active Directory, DNS, mail servers, and
SIEM. And it receives information sent by the trap servers.
It queries your domain controllers or SIEM and looks for login failure attempts. When it
sees an attacker attempting to log in to organizational assets using a deceptive set of
credentials, it generates an alert. It also begins gathering forensics data to learn as
much as possible regarding the event, including where the connection originates from.
Then there are trap servers. Trap servers are essentially listening devices. Deceptions
that involve pathways lead attackers away from your assets and instead to a trap
server. Once an attacker connects to a trap server, the trap server records the
attacker’s actions and reads forensic data directly from the attacker’s source machine.
This information is sent to the management server.
Your configuration may also include a ransomware trap server. This is an optional
service. The server contains a large list of files and is designed to trick ransomware
software into thinking it found a shared file repository. As ransomware tries to encrypt
the files found on the ransomware server, the server sends a command to halt
encryption, stopping ransomware in its tracks.
If you have several distinct domains or network segments, you may also want to use
connectors. Connectors are optional and allow independent segments of a network to
communicate with the management server.
All alerts are compiled and prioritized on the management server. You access the alerts
and all relevant forensic data through the ITDR console. And because the management