Skip to main content

Scenarios Examples

Explore ready-to-use scenarios. Get inspired and see what's possible!

Detect Suspicious LNK Files

· 2 min read
Contextal Team
Contextal Platform Creators

The Windows shortcut (LNK) files are frequently used for malicious purposes by threat actors. In this article we are going to cover an example scenario, which takes a couple of characteristics into account to block potentially malicious shortcut files.

Alert on CRLF Injection

· 2 min read
Contextal Team
Contextal Platform Creators

A Carriage Return Line Feed (CRLF) Injection is a type of web security vulnerability where an attacker manipulates how web applications interpret input containing carriage return (\r) and line feed (\n) characters.

Alert on XLM Macros

· One min read
Contextal Team
Contextal Platform Creators

Excel 4.0 macros (also known as XLM macros) are frequently used for malicious purposes, and while Microsoft now by default limits their usage, they could still pose a threat in some environments.

Contextual Whitelisting

· 2 min read
Contextal Team
Contextal Platform Creators

False positives are a common challenge in cybersecurity. Often, some detections are too generic and when broadly applied, could have a tendency to block more things than necessary. Users are sometimes forced to disable entire detections to avoid these issues - but with Contextal Platform, you can handle these cases with precision, see how!

Block Known Malware

· 2 min read
Contextal Team
Contextal Platform Creators

While Contextal Platform collects information from malware scanners, it does not, by default, take any direct actions on infected objects. Instead, it leaves the decision to users on how to handle detected malware. In this article, we will demonstrate an example scenario that can be deployed to block malicious objects.