Skip to main content

PHASR

PHASR (Proactive Hardening and Attack Surface Reduction) analyzes user and system behavior to reduce an organization’s internal attack surface. Its learning phase lasts a minimum of 30 days and can extend up to 60 days depending on the rule, but recommendations may also be generated instantly if sufficient EDR historical data is available. Based on observed behavior per user-device pair, PHASR delivers targeted hardening recommendations to mitigate risks such as Living off the Land Binaries, Crypto miners, piracy tools, Tampering tools, and Remote admin utilities based on observed behavior per user-device pair.

Note

Although the learning phase has the same overall duration for all endpoints, it may complete at different times on individual devices. This variation occurs because some endpoints may be offline, lack internet connectivity, or have no historical EDR data available.

Components

For the PHASR feature to operate on an endpoint, the following prerequisites need to be met:

  • GravityZone Control Center

  • Bitdefender Endpoint Security Tools installed on Windows endpoints

  • EDR module installed and enabled

  • The following features are enabled in the policy: EDR and Risk Management

Feature compatibility

PHASR can be deployed only on Windows 10 and later versions.

Install and configure PHASR

There are three possible scenarios for installing this feature on your endpoints:

Managing PHASR recommendations

Recommendations in PHASR are security actions suggested based on observed user and device behavior. They indicate whether access to certain tool categories should be restricted or allowed, helping reduce attack surface while adapting dynamically if user behavior changes.

After PHASR is activated and the module is installed on endpoints, the learning phase begins. This phase lasts a minimum of 30 days and can extend up to 60 days, depending on rule severity. During this period, PHASR builds behavioral profiles by analyzing user and device activity, and gradually starts generating recommendations. When no usage is detected for certain tools, PHASR generates Restrict access recommendations to limit the attack surface.

Note

PHASR has the capability to leverage historical EDR data to reduce the duration of the learning phase, depending on the volume of the historical data at its disposal, meaning that the learning phase can be reduced to several days or get recommendations immediately.

After the initial learning phase is completed and recommendations are generated, PHASR continues learning in the background, continually adapting to changes in user behavior.

When PHASR detects that user behavior has changed for a user which currently has access to certain assets, it will generate a Restrict access recommendation. Once this recommendation is generated you can review the behavioral profiles for which it was generated and allow the recommendation to be applied.

To view the generated recommendations and reduce the attack surface by applying them, go to the PHASR recommendations page.

Managing monitored rules

Monitored rules are mechanisms used by PHASR to identify possible attack vectors and allows the user to reduce the attack surface exposure. Each rule can produce multiple recommendations.

To view the rules that form the basis of recommendations, or to manually apply or remove restrictions, go to the PHASR monitored rules page.

Test out PHASR

To test out PHASR follow these steps:

  1. In the GravityZone console go to the PHASR monitored rules.

  2. Select a process that is available in one of the targeted activity type by PHASR, e.g. teamviewer.exe.

  3. Click the process name under the Rule name column. The Rule details side panel is displayed.

  4. Select Edit access.

  5. In the Edit access window, under the Behavioral profiles section, select the device for which you wish to restrict access.

  6. Select Edit access to apply your changes.

  7. On the selected device try to the access the earlier restricted process, e.g. teamviewer.exe.

When PHASR blocks a process on a specific endpoint, the restriction is visible in the Bitdefender Endpoint Security Tools interface. This information appears only if the process actually attempts to run or access resources, and it may take several seconds or even minutes for the change to synchronize.