What's on that laptop?

My employer has given me a new laptop to plug into my home network. Here's what I know is running on it (so far). These are rough notes, not a polished essay.

Arctic Wolf

Scans all sorts:

https://www.vlcm.com/arctic-wolf https://arcticwolf.com/uk/solutions/agent/

SentinelOne

SentinelOne conducts man-in-the-middle attacks against encryption by, for example, installing browser plugins that the user can't disable or remove. If you log into any server on a system running SentinelOne, you should assume that the company has the password. If you type in a credit card number or home banking credentials, you should assume the company has them.

https://www.sentinelone.com/wp-content/uploads/2017/06/SentinelOne_Deep_Visibility_Overview.pdf

S1 also logs vaguely-named things such as “behavioural indicators”, “cross process” (is this another name for IPC?) and command scripts, and can do a full disk scan. It claims to be able to detect malware that attackers have masked.

https://johntuckner.me/posts/sentinelone-deep-visibility-export https://www.sentinelone.com/wp-content/uploads/2022/04/SentinelOne-IR-Handbook.pdf (page 12)

A facility called Singularity Ranger (on page 36 of the manual) crawls all over your network and reports on every device it finds, whether it belongs to work, you, or anyone else. It can run either actively (by sending packets and seeing who responds) or passively (by just watching packets as they flow across your network), so its activity may not show up on a packet capture.

https://www.sentinelone.com/platform/singularity-ranger/

There's a script library that can gather even more information and perform remote code execution on a computer: see page 36 of the manual. Remote code execution is an obvious risk in the wrong hands, or if a compromised machine sends instructions to your laptop.

SentinelOne is planning to add the ability to retrieve a memory dump (again, see p.36 of the manual). This will enable it to see documents you've typed but never saved, text you've entered into Web forms but not submitted, and perhaps passwords saved in memory by poorly written programs.

SentinelOne is so intrusive that, when I build code, SentinelOne uses up the entire house's outgoing bandwidth, just reporting back on what I'm doing. In fact, it keeps sending data at line rate for several minutes after I stop building, because my domestic Internet connection can't keep up with the volume of data that SentinelOne sends.

FortiClient

This is the client to the work VPN, but it does a lot of surveillance as well.

Code42

Code42 offers a backup product and also a surveillance product called Incydr. I believe my laptop has only the backup product, but presumably some computers in other companies are running Incydr. (Someone must be buying it.)

Incydr is clearly designed to protect the company from its own employees. It seems to be mostly file-based: creation, modification, deletion, movement of files, as well as copying to removable media or transferring to email or the cloud.

https://www.code42.com/resources/white-papers/how-incydr-works-a-technical-overview-of-the-incydr-product-architecture