Dragnet User Guide
1. Introduction2. Use Cases3. Quick Start
4. Tokens
5. Notification Groups6. IP Suppression Groups7. Billing

Use Cases

Identify Spear Phishing

Everyday many people lose control of their email accounts. Weak passwords, password reuse, and falling for scams are the common ways email accounts are compromised.

If an email account is compromised, an attractively baited email, such as one with fake bank website login credentials, will attract a threat actor during their reconnaissance phase. When the email is accessed, your security team will be notified and you can deactivate the account and change the password before any real damage is done.

Application and Database Servers

Threat actors look for ways to escalate their access. If they've gained access to a server, their next move will be to escalate their privileges and to gain access to sensitive data. A Word or PDF file placed on the server titled, "Admin credentials for this database," or something to that effect, is irresistible. When the document is opened, you'll know that server is under attack. If your server is in a Windows environment, you can even determine which account was compromised to gain access to the server.

Sensitive Data and Insider Threat

Insiders can pose a significant risk to an organization. If you want to know who your nosey and potentially risky employees are, you can create a fake payroll document on the network and embed that document in a Windows folder with a security token. Bury the folder deep in the network so that it would only be accessed by someone through a deliberate search. If it is accessed, the Windows folder will tell you the identity, and the document token will tell you they opened the file.