Cytool for Windows
Table of Contents
4.2 (EoS)
Expand all | Collapse all
Cytool for Windows
To manage Traps functions from the command line on Windows
endpoints, use Cytool.
Cytool is a command-line interface (CLI) that is integrated
into Traps and enables you to query and manage both basic and advanced
functions of Traps. Any changes you make using Cytool are active
until Traps receives the next heartbeat communication from the ESM
Server.
On Windows endpoints, you can access Cytool using a Microsoft
MS-DOS command prompt that you run as an administrator. Cytool is
located in the C:\Program Files\Palo Alto Networks\Traps folder
on the endpoint.
The following table displays the Cytool options available on
Windows endpoints.
Command Option | Description |
---|---|
enum | Enumerate protected processes. Usage: cytool enum For
example: C:\Program Files\Palo Alto Networks\Traps>cytool enum
Process ID Agent Version
6396 4.2.0.33808
6316 N/A
5788 4.2.0.33808
8576 4.2.0.33808
5532 4.2.0.33808
7244 4.2.0.33808
7160 4.2.0.33808
8596 4.2.0.33808
1064 4.2.0.33808
7820 4.2.0.33808
5156 4.2.0.33808
6904 4.2.0.33808 |
protect | Enable or disable a protection feature. Usage: cytool protect <action> <feature> where:
For
example: C:\Program Files\Palo Alto Networks\Traps>cytool protect disable process
Enter supervisor password:
Protection Mode State
Process Disabled Disabled
Registry Policy Enabled
File Policy Enabled
Service Policy Enabled |
startup | Enable, disable, or query the startup state
of Traps components. Usage: cytool startup <action> <component> where:
For example: C:\Program Files\Palo Alto Networks\Traps>cytool startup disable cyverak cyvrfsfd
Enter supervisor password:
Service Startup
cyverak Disabled
cyvrmtgn System
cyvrfsfd Disabled
cyserver Automatic
CyveraService Automatic
tlaservice Automatic
twdservice Automatic |
runtime | Stop or start product components. Usage: cytool runtime <action> <component> where:
For example: C:\Program Files\Palo Alto Networks\Traps> cytool runtime stop cyserver cyverak
Enter supervisor password:
Service State
cyverak Stopped
cyvrmtgn Running
cyvrfsfd Running
cyserver Stopped
CyveraService Stopped
tlaservice Stopped
twdservice Stopped |
policy | Query or compare the applied policy for
a process. Usage: cytool policy <action> <process> where:
For example,
to query the policy for future executions of notepad.exe: C:\Program Files\Palo Alto Networks\Traps>cytool policy query notepad.exe
Enter supervisor password:
Generic
Enable 0x00000001
LongHooks 0x00000000
StaticHooks 0x00000000
NoCallSplitting 0x00000000
InitSecurityCookie 0x00000000
DontInjectThinApp 0x00000001
LeanInjection 0x00000000
B01
Enable 0x00000000
BlockAPI 0x00000000
[...] For example, to compare the policy for future executions
of notepad.exe to the default policy: C:\Program Files\Palo Alto Networks\Traps>cytool policy compare notepad.exe default
Enter supervisorpassword:
Generic
Enable 0x00000001 0x00000001
LongHooks 0x00000000 0x00000000
StaticHooks 0x00000000 0x00000000
NoCallSplitting 0x00000000 0x00000000
InitSecurityCookie 0x00000000 0x00000000
DontInjectThinApp 0x00000001 0x00000001
LeanInjection 0x00000000 0x00000000
B01
Enable 0x00000000 0x00000000
BlockAPI 0x00000000 0x00000000
[...] |
log | Operate product log sessions. Usage: cytool log <action> where <action> is
one of the following:
Examples: CYTOOL log convert %ProgramData%\Cyvera\logs\traps_native_log.4.0.0.0.etl Converts the default log file (.etl) with log.tmf that is located in the same folder. CYTOOL log set cyvrtrap ERROR 0x5 Sets cyvrtrap's configuration to produce ERROR traces of first and third flags. CYTOOL log set all VERBOSE 0x7FFFFFFF Sets all components configuration to produce VERBOSE traces with all flags. |
quarantine | View and restore quarantined files. Usage:
|
stat | Query Traps statistics from a running process. Usage: cytool stat <pid> where <pid> is
the process ID (PID). For example, to display statistics about
the Chrome process identified by PID 4080: c:\Program Files\Palo Alto Networks\Traps> cytool stat 4080
DllSec Invocations: 0
DllSec Time: 00:00:00.0
G01 Invocations: 0
G01 Time: 00:00:00.0
G01 Thunk 00 Resolution: 0
G01 Thunk 01 Resolution: 0
G01 Thunk 02 Resolution: 0
G01 Thunk 03 Resolution: 0
G01 Thunk 04 Resolution: 0
G01 Thunk 05 Resolution: 0
G01 Thunk 06 Resolution: 0
G01 Thunk 07 Resolution: 0
G01 Thunk 08 Resolution: 0
G01 Thunk 09 Resolution: 0
G01 Thunk 10 Resolution: 0
G01 Thunk 11 Resolution: 0
G01 Thunk 12 Resolution: 0
G01 Thunk 13 Resolution: 0
G01 Thunk 14 Resolution: 0
G01 Thunk 15 Resolution: 0
G01 Stack Walk Resolution: 0
J01 Minimum Stack Depth: 166
J01 Checks: 25
J01 Stack Walk Checks: 0 |
tla | View the history of the Traps local analysis
module. Usage: cytool tla query For
example: C:\Program Files\Palo Alto Networks\Traps>cytool tla query
FileType: Executable
Build: 589
Timestamp: Sunday, February 11, 2018, 12:32:36
FileType: Dynamically Linked Library
Build: 585
Timestamp: Wednesday, January 10, 2018, 12:37:20
FileType: Visual Basic Application Macro
Build: 591
Timestamp: Monday, February 12, 2018, 11:11:04 |
info | Display general Traps information. Usage: cytool info [query] To
display the Traps version, run the cytool info command
without any additional arguments. To display additional details
about Traps, such as the version of the default policy and the specific
build number, add the query argument. For example: C:\Program Files\Palo Alto Networks\Traps>cytool info Traps (R) supervisor tool 4.2.0.33808 (c) Palo Alto Networks, Inc. All rights reserved General Traps information. USAGE: cytool info query C:\Program Files\Palo Alto Networks\Traps>cytool info query Content Type: 15 Content Build: 1997 Content Version: 15-1997 Event Log: 1 Quarantine Quota: 1048576 KB |
image | Display image information about a specific
PE file. Usage: cytool image <process_path> For
example: C:\Program Files\Palo Alto Networks\Traps>cytool image C:\Windows\system32\cmd.exe
cytool image C:\Windows\system32\cmd.exe
Image Information
Location: C:\Windows\system32\cmd.exe
Size: 267.50 KB (273920 bytes)
File SHA256: 9a7c58bd98d70631aa1473f7b57b426db367d72429a5455b433a05ee251f3236
Architecture: x86-64
Subsystem: Windows CUI
PE Size: 267.50 KB (273920 bytes) (same as file size) |
wf | WildFire operations. Usage: cytool wf query [<hash>] C:\Program Files\Palo Alto Networks\Traps>cytool wf query 6D712E38945275FC534042191B02A8B34AA1CCED82486C98C1CE8935DDCF
Enter supervisor password:
Hash,Verdict,Override,Local Verdict,Model Version,Size,Type,Path,Time Stamp,Publishers
6d712e38945275fc534042191b02a8b34aa1cced82486c98c1ce8935ddcf,
Unknown(2),No Override,Malware(1),593,55296,Executable(1),
"\\?\C:\Users\admin\AppData\Local\Packages\Microsoft.
MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\test-pe.exe",
"Monday, March 12, 2018, 20:14:07","",Root, |