Securing Windows with Workspace ONE Intelligence and Carbon Black

The following guide walks you through using the Workspace ONE Intelligence's Carbon Black setup for threat detection and automatic remediation.   


Before You Begin

Before you begin this walkthrough ensure you have the following:

  • A valid account in the VMware TestDrive environment, sign up here if you do not yet have an account.
  • A Windows 10 device enrolled into Enterprise - Corporate Owned Demo OG. 
    See enrollment here.
  • Reference the Workspace ONE Intelligence guide.


VMware Workspace ONE Intelligence with Carbon Black provides a modern, cloud-based enterprise security approach to secure users and endpoints.  To manage risks related to modern-day cyber threats, Workspace ONE Intelligence with Carbon Black combines insights from Workspace ONE, an intelligence-driven digital workspace platform, with Carbon Black to deliver predictive and automated security in the digital workspace.  Existing security tools provide IT with only limited visibility, focusing only on silos of security that provide legacy functionality. This results in a band-aid approach that impacts organizations with high-costs due to complexity and manual tasks involved in trying to secure a digital workspace.
Fortifying Intelligence, Carbon Black provides:
  • Single Agent, Cloud Platform - Carbon Black Defense is delivered through the CB Predictive Security Cloud, an endpoint protection platform that consolidates security in the cloud using a single agent, console and dataset.
  • Streaming Prevention with Minimal False Positives - Carbon Black Defense’s unique, data-driven prevention technology is certified to replace AV, using predictive modeling that identifies and stops more known and unknown threats including malware, fileless attacks, and ransomware. This technology eliminates the black magic typically associated with machine learning, minimizing misses and false positives.
  • Complete Endpoint Visibility - Carbon Black Defense gives you a clear, comprehensive picture of endpoint activity using unfiltered, tagged data that allows you to easily search and investigate endpoints, follow the stages of an attack, and identify root cause so you can close security gaps.
  • Improved Efficiency Between Security & IT Ops - Carbon Black Defense breaks down the walls between IT Operations and Security with simple workflows and built-in tools for live incident response, real-time investigations, and team collaboration. In addition, flexible policy configurations allow you to explicitly tailor your prevention, keeping users happy without compromising security. 

Navigating to Workspace ONE Intelligence in TestDrive

Navigate to Workspace ONE Intelligence through Workspace ONE UEM in TestDrive's ready to use environment.  

  1. Open a browser, then log in to the Workspace ONE User Portal using your TestDrive account.
  2. Launch the Workspace ONE UEM admin console web app.
  3. In the top right of the UEM console, username dropdown, verify your admin role is Intelligence & Tenant Administrator at TestDrive.
mceclip0.pngAfter the role is selected, the page will reload and you may see an admin error. This would happen if you were previously viewing a page that is unavailable with the new role. 
If you receive an error, simply navigate to Monitor > Intelligence.   Click Launch.




blobid1.png Carbon Black Dashboards

Workspace ONE UEM, Workspace ONE Intelligence, and Carbon Black are fully integrated products.  In TestDrive's Workspace ONE Intelligence setup, Carbon Black has a preconfigured dashboard and automation.
Filter your Intelligence dashboards view by entering "Carbon Black" to see the preconfigured dashboard STAGED Carbon Black Threats.

Click view to drill into the STAGED Carbon Black Threats dashboard and review the layout. 


blobid1.png Trigger Carbon Black Automation


The automation and workflow engine allows an administrator to take action directly on the data in real time across any of the data sources, as well as take action using Workspace ONE actions via an integration with the VMware Carbon Black Cloud.

A couple of automations are staged for Carbon Black, one is available to demonstrate and the other is set up to be illustrative in discussions. 

  • STAGED Carbon Black Terminate VPN  (Use for demonstration.)
  • STAGED Carbon Black Ransomware Threat Detected (Discussion only.) 

Automation in Action - STAGED CB Threat Remediation

Find the STAGED CB Threat Remediation automation and view it.


This enabled automation is set to remove a Per-app Tunnel VPN profile on a Windows 10 desktop after Carbon Black's detection of a specific threat.

For demonstration purposes, UISpy.exe, a benign app, has been pushed by Workspace ONE UEM on Windows.  It's also been set in Carbon Black as a banned app. 

Demo alert! Due to the nature of threat remediation, once performed, the demo cannot be quickly repeated.

On the enrolled Windows 10 machine, attempt to launch UISpy.exe from search.


...observe the instant Carbon Black Cloud Sensor notification in Windows.


Back in Workspace ONE Intelligence, on the STAGED Carbon Black Threats dashboardtop medium-risk threats widget, hover over the threat category "policy" (light blue) for the current date.  Note the triggered policy.


Drill through the "policy" category and view the threat type.    


A few moments later, in the Workspace ONE UEM console, check your device's details > profiles for the removal of the WWE - Windows - Demo VPN profile.


...and back on the device, the removal of the "Company VPN" profile (~ 2 min for remediation).

Before Intelligence's Carbon Black threat remediation:


After Intelligence's Carbon Black threat remediation, "Company VPN" profile will be removed.

While per-app VPN exposure to the device and a corporate network is greatly reduced, per-app VPN and may act as a conduit for a threat to enter enterprise systems.  Workspace ONE Intelligence with Carbon Black has removed the Per-app Tunnel profile from the device, eliminating the threat's chance to spread to internal systems. 

STAGED Carbon Black Ransomware Threat Detected (Discussion Only)

Select Automations on the left menu bar.  Find the "STAGED Carbon Black Ransomware Threat Detected" automation and view it.

This particular sample automation is set to push a profile to update controlled folder access policy, send email to the affected user(s), create a Service Now ticket and approve patch to remove the OS vulnerability.


Device Deployment

Workspace ONE UEM all but eliminates administrative overhead by installing the Carbon Black Cloud Sensor app (agent) on your Windows 10 device.  Devices enrolled in the Enterprise - Corporate Owned Demo OG will have the appropriate sensor app automatically installed by Workspace ONE UEM.

Log in to the console and change your admin role to Device Administrator at World Wide Enterprises.

Next, validate the Carbon Black Cloud Sensor app is successfully installed on the device.  Drill into your device and go to Apps.

  • Carbon Black Cloud Sensor (Windows 10) should look like this (version may be different).

If the Carbon Black Cloud Sensor is not installed, chances are that a system update or higher system process may have prevented it from initially installing.  You can push the installation from the UEM console again.

Workspace ONE Intelligence with Carbon Black Availability

VMware Workspace ONE Intelligence with Carbon Black capabilities is available to Workspace ONE customers who have Workspace ONE Intelligence.  Workspace Intelligence is available in Workspace ONE Enterprise, Workspace ONE Enterprise for VDI, and as an add-on to Workspace ONE on-premises editions.



Have more questions? Submit a request

Article is closed for comments.