Introduction
UTMStack provides powerful incident response capabilities through its integrated console, allowing security teams to execute immediate containment and remediation actions across all managed endpoints. This guide covers the most critical commands for responding to security incidents in real-time.These commands can significantly impact system operations. Always verify the target system and parameters before execution. Actions may disrupt user workflows and should be executed with proper authorization.
Quick Actions Reference
Network Isolation
Immediately isolate compromised hosts from the network
User Management
Disable compromised accounts and sessions
Threat Blocking
Block malicious IPs and prevent further attacks
Process Control
Terminate malicious processes and services
1. Isolate Host (Disable Network)
Immediately disconnect a compromised system from the network to prevent lateral movement and data exfiltration.- Windows
- Linux (RHEL/CentOS)
- Linux (Debian/Ubuntu)
- Linux (OpenSUSE)
- macOS
PowerShell CommandWhat it does:
- Lists all network adapters on the system
- Disables each adapter without confirmation prompts
- Completely isolates the system from the network
This command disables ALL network adapters. The system will be completely isolated until adapters are manually re-enabled.
2. Disable User Account
Immediately disable a compromised or suspicious user account to prevent unauthorized access.- Windows
- Linux (RHEL/CentOS)
- Linux (Debian/Ubuntu)
- Linux (OpenSUSE)
- macOS
PowerShell CommandExample:
Replace [username] with the actual username. UTMStack can automatically substitute variables from alert context.
3. Block Adversary IP Address
Block incoming traffic from a malicious IP address to prevent further attacks.- Windows
- Linux (RHEL/CentOS)
- Linux (Debian/Ubuntu)
- Linux (OpenSUSE)
- macOS
PowerShell CommandExample:
This creates a permanent firewall rule that persists across reboots.
4. Kill Malicious Process
Terminate a suspicious or malicious process immediately.- Windows
- Linux (All Distributions)
- macOS
PowerShell CommandExample:Options:
- /F = Force termination
- /IM = Identifies process by image name
5. Stop Malicious Service
Stop a compromised or suspicious system service.- Windows
- Linux (All Distributions)
- macOS
PowerShell CommandExample:
The -Force parameter stops the service even if it has dependent services.
6. Delete Malicious File
Permanently remove a malicious file from the system.- Windows
- Linux (All Distributions)
- macOS
PowerShell CommandExample:Alternative (CMD):
7. Block Server Outbound Network Access
Prevent a compromised server from communicating with external malicious infrastructure.- Windows
- Linux (All Distributions)
- macOS
PowerShell CommandExample:
8. Block Server Inbound Network Access
Block incoming connections from a specific malicious IP address.- Windows
- Linux (RHEL/CentOS)
- Linux (Debian/Ubuntu)
- macOS
PowerShell Command
9. Uninstall Malicious Application
Remove a malicious or compromised application from the system.- Windows
- Linux (RHEL/CentOS)
- Linux (Debian/Ubuntu)
- Linux (OpenSUSE)
- macOS
PowerShell Command (searches and uninstalls silently)Example:
10. Remove All User Permissions
Strip all elevated permissions from a compromised user account.- Windows
- Linux (All Distributions)
- macOS
PowerShell CommandExample:
Removes the user from all groups except the base Users group.
11. Kill Session and Logout User
Forcefully terminate all active sessions of a compromised user account.- Windows
- Linux (All Distributions)
- macOS
CommandExample:
Terminates active sessions but does not prevent re-login. Combine with Disable User Account for complete containment.
Variable Substitution in UTMStack
UTMStack automatically substitutes context variables from alerts and incidents when executing commands.Common Variables
Target Variables (affected system/resource):$(target.user)- Username of affected account$(target.applicationname)- Name of target application$(target.hostname)- Hostname of affected system$(target.ip)- IP address of target system
$(adversary.ip)- Attacker IP address$(adversary.user)- Compromised username$(adversary.process)- Malicious process name/path$(adversary.service)- Suspicious service name$(adversary.windowsServiceDisplayName)- Windows service display name
$(log.winlogEventDataProcessName)- Windows process path from event log$(log.sourceIp)- Source IP from log entry$(log.username)- Username from log entry
Best Practices
Verify Before Execute
Always verify the target system and parameters before executing commands. Review alert context for accuracy.
Document Actions
Log all incident response actions including timestamps, commands executed, and outcomes for compliance.
Coordinate with Team
Communicate with your security team before taking disruptive actions. Monitor for unintended consequences.
Test in Lab First
When possible, test commands in a lab environment before deploying to production systems.
Have Rollback Plan
Know how to reverse each action if needed. Keep documentation for re-enabling services, users, or network access.
Follow Playbooks
Adhere to incident response playbooks and escalation procedures. Ensure proper authorization.
Command Impact Reference
| Action | Severity | User Impact | Reversibility | Requires Admin |
|---|---|---|---|---|
| Isolate Host | Critical | All users | Manual | Yes |
| Disable User | High | Target user | Easy | Yes |
| Block IP | High | Specific connections | Easy | Yes |
| Kill Process | Medium | App users | N/A | Sometimes |
| Stop Service | Medium | Service users | Easy | Yes |
| Uninstall App | High | App users | Difficult | Yes |
| Delete File | Critical | N/A | Impossible | Sometimes |
| Block Outbound | High | Specific connections | Easy | Yes |
| Block Inbound | Medium | External only | Easy | Yes |
| Remove Permissions | High | Target user | Manual | Yes |
| Kill Session | Medium | Target user | User can re-login | Yes |
Troubleshooting Common Issues
Permission Denied ErrorsEnsure the UTMStack agent is running with appropriate privileges:
- Linux/macOS: Verify sudo permissions
- Windows: Ensure administrative rights
- Check if remote execution is enabled on target system
Variable Substitution Not Working
- Verify the alert context contains required fields
- Check variable name spelling and case sensitivity
- Ensure execution is from UTMStack console, not manual
- Review alert data source configuration
Firewall Rules Not Persisting
- iptables: Save with
iptables-save > /etc/iptables/rules.v4 - firewall-cmd: Always use
--permanentflag and--reload - Windows: Rules created with netsh advfirewall persist automatically
- macOS: Add rules to
/etc/pf.conffor persistence
Service Won’t Stop
- Check for service dependencies
- Use force flags when available
- Kill the process directly if service does not respond
- Check service logs for errors
- Consider disabling:
systemctl disable [service-name]
Security Considerations
Critical Security Reminders
- Authorization Required - All actions must be authorized by appropriate security personnel
- Audit Trail - Every command execution is logged in UTMStack
- Change Management - Follow organization procedures, even during incidents
- Business Impact - Consider operations before isolating critical systems
- Evidence Preservation - Ensure evidence preservation before destructive actions
- Legal Compliance - Adhere to legal and regulatory requirements
UTMStack Integration Benefits
- All commands executed through UTMStack console are automatically logged
- Execution results are recorded in the incident timeline
- Failed commands trigger alerts for security team review
- Commands can be integrated into automated response playbooks
- Historical execution data available for compliance reporting