Skip to content

Commit f6b0fca

Browse files
authored
Merge pull request #250 from netwrix/upd-ka0Qk000000GEILIA4
Update Activity Monitor KB: Agent returns no results for Active Directory
2 parents c029407 + e54a9a2 commit f6b0fca

File tree

1 file changed

+19
-20
lines changed

1 file changed

+19
-20
lines changed

docs/kb/activitymonitor/agent-returns-no-results-for-active-directory.md

Lines changed: 19 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -16,40 +16,39 @@ products:
1616
- activitymonitor
1717
- threat-prevention
1818
sidebar_label: Agent Returns No Results for Active Directory
19-
tags: []
19+
tags: [Troubleshooting]
2020
title: "Agent Returns No Results for Active Directory"
2121
knowledge_article_id: kA04u000000LLO2CAO
2222
---
2323

2424
# Agent Returns No Results for Active Directory
2525

26-
## Symptom
26+
## Symptoms
2727

28-
You have encountered the following `Cannot Find Process` error in the Netwrix Threat Prevention logs:
28+
1. You encounter the following `Cannot Find Process` error in the Netwrix Threat Prevention logs:
2929

30-
```text
31-
Failed loading monitor dll:
32-
C:\Program Files\STEALTHbits\StealthINTERCEPT\SIWindowsAgent\SI.ActiveDirectoryMonitor.dll, status: CannotFindProcess
33-
```
30+
* `Failed loading monitor DLL: C:\Program Files\STEALTHbits\StealthINTERCEPT\SIWindowsAgent\SI.ActiveDirectoryMonitor.dll, status: CannotFindProcess`
3431

35-
When attempting to create a dump of `LSASS.exe` via Task Manager on the affected domain controller, it fails or creates a 0-kb file. If the dump creation succeeds, it does not indicate that `SIWindowsAgent.exe` is not blocked, only that `Taskmgr.exe` is allowed to access `LSASS.exe`.
32+
2. When inspecting `C:\Program Files\Netwrix\Netwrix Threat Prevention\SIWindowsAgent\ADMonitor_Logs`, if there is no recent `HookTrace<yyyy-mm-dd>.log` present, the agent is blocked from hooking `LSASS.exe` by a third party.
3633

37-
## Cause
34+
3. When attempting to create a dump of `LSASS.exe` via Task Manager on the affected domain controller, it fails or creates a 0-KB file. If the dump creation succeeds, it does not indicate that `SIWindowsAgent.exe` is not blocked, only that `Taskmgr.exe` is allowed to access `LSASS.exe`.
3835

39-
Endpoint protection is hiding the `LSASS.exe` process from `SIWindowsagent.exe` or otherwise blocking the hook into the LSASS API. Common EPP solutions include CarbonBlack, Cylance, and CrowdStrike.
36+
## Cause
4037

41-
## Resolution
38+
Endpoint protection is hiding the `LSASS.exe` process from `SIWindowsAgent.exe` or otherwise blocking the hook into the LSASS API. Common endpoint protection (EPP) solutions include Carbon Black, Cylance, and CrowdStrike.
4239

43-
In the endpoint protection configuration, allow `SIWindowsAgent.exe` and the contents of the SIAgent install directory access to `LSASS.exe`. Refer to the following default folder:
40+
> **NOTE:** Not all endpoint protection software properly logs when they block the attempted `LSASS.exe` hook.
4441
45-
```text
46-
C:\Program Files\STEALTHBits\StealthINTERCEPT\SIWindowsAgent
47-
```
42+
## Resolution
4843

49-
Refer to the following article for additional information on recommended exclusions for your antivirus and endpoint protection solutions: Installation — Antivirus Software Considerations · v7.3
50-
https://docs.netwrix.com/docs/threatprevention/7_5
44+
1. Refer to the following article for recommended exclusions for your antivirus and endpoint protection solutions: [Installation — Antivirus Software Considerations](https://docs.netwrix.com/docs/threatprevention/7_5/install/overview#antivirus-software-considerations).
45+
2. Inspect the following registry key:
46+
`HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa`
47+
3. If this location contains the value `RunAsPPL` of type `REG_DWORD` set to `1`, change it to **`0`** and reboot the machine.
48+
4. If this change allows `SIWindowsAgent.exe` to inject into `LSASS.exe` (i.e., no `processNotFound` error is returned), then you must add the file **`plsahlp.sys`** to the allowlist of the EDR/antivirus solution before setting the registry value back to `1`.
49+
5. If, after validating these exclusions and restarting the SIWindowsAgent, the hook to `LSASS.exe` still fails, contact your endpoint protection vendor's support for assistance with proper configuration.
5150

52-
## Related Article
51+
## Related Links
5352

54-
- Installation — Antivirus Software Considerations · v7.3
55-
https://docs.netwrix.com/docs/threatprevention/7_5
53+
* [Installation — Antivirus Software Considerations](https://docs.netwrix.com/docs/threatprevention/7_5/install/overview#antivirus-software-considerations)
54+
* [Configuring Additional LSA Protection](https://docs.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection)

0 commit comments

Comments
 (0)