Access Protection in McAfee VirusScan Enterprise and Host Intrusion Prevention
|
|
|
- Arline Wilcox
- 10 years ago
- Views:
Transcription
1 Access Protection in McAfee VirusScan Enterprise and Host Intrusion Prevention Public release edition Ben Andrew MCSE Senior Product Manager
2 Access Protection in VirusScan Enterprise 3 Extending Access Protection with McAfee 3 Access Protection Rules in VirusScan Enterprise 4 Purpose and application of rules 4 Processing Access Protection rules 4 Self Protection 5 Anti-spyware Standard Protection 6 Anti-spyware Maximum Protection 6 Anti-virus Standard Protection 7 Anti-virus Maximum Protection 10 Anti-virus Outbreak Control 11 Common Standard Protection 12 Common Maximum Protection 14 Virtual Machine Protection 17 User-defined Rules 18 Targeting Rules at New, Known Threats 18 Preventing infection 19 Preventing distribution and damage 19 Targeting Rules at Unknown Future Threats 21 Preventing infection 21 Preventing distribution and damage 22 Port Blocking 22 Port blocking rules 22 File/Folder Protection 23 File/Folder protection rules 23 Registry Blocking 23 Registry-blocking rules 23 Summary 24
3 McAfee VirusScan Enterprise (VSE) 8.7i, the leading enterprise-class anti-virus software solution, uses true on-access scanning to identify, proactively block, and safely eliminate viruses and potentiy unwanted programs (PUPs) for optimal business availability. Centry managed with McAfee epolicy Orchestrator (epo ) and scalable for businesses of any size, VSE enhances the security of your company s computing systems by protecting them from programs that may be watching, recording, and externy transmitting sensitive company information. Securing networks against a wide range of threats viruses, spyware, worms, rootkits, and Trojans is more chenging than ever. Whether you are a global enterprise or a sm or medium-sized business that has a full-time security staff, VSE ensures that your endpoint servers, desktops, and laptops remain malware free. VSE proactively stops and removes threats, extends coverage for new security risks, and reduces the cost of managing outbreak responses. It even stops zero-day threats and mitigates your window of vulnerability without an update. Access Protection in VirusScan Enterprise A key component of VSE, Access Protection gives you flexibility to limit potential outbreak damage, even before a.dat file is issued. You can also close ports, monitor applications and engines, block files and directories, and trace and block infection sources. Access Protection prevents unwanted changes to your computer by restricting access to specified ports, files and folders, shares, and registry keys and values. It prevents users from stopping McAfee processes and services, which are critical before and during outbreaks. Access Protection for VSE uses predefined and user-defined rules to strengthen systems against virus attacks. For instance, rules are used to specify which items can and cannot be accessed. Each rule can be configured to block and/or report access violations when they occur, and rules can also be disabled. The goal of this white paper is to provide an in-depth look at Access Protection and the importance and detail of the rules, which are organized into categories based on their function. The paper will explain the advantages and risks for Access Protection features, enabling you to determine which settings are optimal for your environment. Extending Access Protection with McAfee The November 2008 content release for McAfee (Host IPS) included new signatures that effectively duplicate the functionality of VSE s Access Protection rules. For greater control and flexibility, many customers have asked for the ability to manage these protections within Host IPS. The new signatures are disabled by default and set to log only in Host IPS to prevent accidental changes in your security posture and preferences. This white paper describes which Host IPS signatures map to VSE rules where applicable. 3
4 Access Protection Rules in VirusScan Enterprise In the past, virus-scanning software depended primarily on the release of updated virus definition (.DAT) files that instructed the software how to detect and defend against new virus attacks. The use of.dat files is still inherent in VSE; however, administrators now also have the ability to create rules that strengthen systems against further infection and provide a layer of intrusion prevention. In VSE, predefined rule definitions are stored in the file vscan.bof. This file is digity signed and is updatable by the AutoUpdate process. The new rule-definition language used in vscan.bof ows a single rule to protect multiple objects of different types (file, registry, port, and process). The new rule language also ows inclusion and exclusion lists for the objects being protected. For example, a rule can block access to c:\*.exe and c:\temp/*.exe except for **/notepad.exe. Purpose and application of rules Rules should be created with one or more of the following purposes in mind: To prevent malicious code from running To identify which computers have malicious code running To prevent malicious code from spreading to other computers To prevent a payload from damaging the local computer Rules can be created to target a specific, newly discovered threat, or they can be predefined to provide generic protection against future threats. For example, a rule might be used during the brief time between a virus outbreak and the release of a new.dat file by McAfee Avert Labs. During this time, it is important to stop the exploit from affecting the targeted systems and prevent it from spreading. In many cases, VSE can facilitate a new.dat update and apply operating system patches without owing the infection to spread. The rules are therefore not being used in place of virus definition files they are used to compliment them. Processing Access Protection rules Access Protection rules can be located in two different files, as well as the registry, and rules can be processed in various ways based on the following conditions: Vscan.bof (located in the VirusScan directory) is the default Access Protection and buffer overflow protection content file. This file is read first. In an outbreak, Avert Labs may release an extra.rul before a new vscan.bof is available. If an extra.rul is present, (located in the VirusScan directory), it is appended. User-defined rules are read from the registry and appended. 4
5 Self Protection Many malicious programs have attempted to disable VirusScan by stopping services and processes and leaving the system vulnerable to attack. Self Protection is an important feature of VSE that prevents malicious programs from disabling VirusScan, or any of its services or processes. Prevent McAfee services from being stopped Self Protection begins with the check box in the lower left corner on the main Properties screen, and includes the following additional rules (listed throughout this document): Prevent modification of McAfee files and settings Prevent modification of McAfee Common Management Agent files and settings Prevent modification of McAfee Scan Engine files and settings Prevent termination of McAfee processes Intention: When the Prevent McAfee services from being stopped check box is selected under Access Protection, VSE will prevent anyone except the SYSTEM account from terminating McAfee services. This protects VirusScan from being disabled by malicious programs that seek to circumvent virus protection programs by terminating their services. Note: This feature is currently not supported on 64-bit operating systems. 5
6 Anti-spyware Standard Protection This group of rules only applies if you have the AntiSpyware Enterprise Module insted. The rules for VSE begin in the section titled Anti-virus Standard Protection. Protect Internet Explorer favorites and settings Intention: This rule is designed to prevent modification of Microsoft Internet Explorer configurations and files by any process not listed in the rule s exclusion list. A common tactic of malware is to change the browser s start page, and inst favorites. This rule protects against certain start page Trojans, adware, and spyware that modify browser settings. Risks: There rey aren t any drawbacks to enabling this rule, as it simply blocks processes from making changes to favorites and settings in Microsoft Internet Explorer. ID and Name in Host IPS: 3890, Access Protection Protect Internet Explorer favorites and settings. Anti-spyware Maximum Protection Prevent instation of new CLSIDs, APPIDs, and TYPELIBs Intention: This rule prevents the instation or registration of new COM servers. Some adware and spyware programs can inst themselves as a COM add-on in Microsoft Internet Explorer or Microsoft Office applications. Risks: If you have an application that needs to inst a COM add-on that isn t already listed in the exclusion list, it will be blocked. The instation of some common applications, like Macromedia Flash, registers COM add-ons and may be blocked by this rule. ID and Name in Host IPS: 3891, Access Protection Prevent instation of new CLSIDs, APPIDs, and TYPELIBs. Prevent programs from running files from the Temp folder This rule will block any executable from running from the Temp directory; however, this rule is much more restrictive in that it stops nearly processes from launching in the Temp folder. This provides the most protection, but also has a higher chance of blocking a legitimate application from being insted. Intention: Most viruses need to be run once by a person before infecting a computer. This can be done in many ways, such as opening an executable attachment in an , downloading a program from the Internet, etc. For example, < An executable needs to exist on the disk before Windows can run it. A common way for applications to achieve this is to save the file in the user s or system s Temp directory and then run it. One purpose of this rule is to enforce advice that is frequently given to people: don t open attachments from . The other purpose of this rule is to close security holes introduced by application bugs. Older versions of Outlook and Internet Explorer are notorious for automaticy executing code without the user needing to do anything but preview an or view a website. Risks: All applications that are protected by these rules offer alternatives to running executables, such as saving them somewhere else on the disk and running from there. So the downside of the rules is that users may need to learn a few extra steps before doing things they can do more quickly now. Note: Enabling this rule may prevent some applications from functioning outright. ID and Name in Host IPS: 3905, Access Protection Prevent programs from running files from the Temp folder. 6
7 Prevent execution of scripts from the Temp folder Intention: This rule prevents the Windows scripting host from running VBScript and JavaScript scripts from the Temp directory. This would protect against a large number of Trojans and questionable web instation mechanisms that are used by many adware and spyware applications. This rule may also block legitimate third-party applications from being insted. Risks: Since the client downloads the script and then launches a legitimate Windows program (cscript or wscript) to process the script, this rule cannot distinguish between scripts that have been saved from a malicious and those that have a legitimate reason for existing in the Temp directory. This rule may therefore prevent some legitimate scripts from running. ID and Name in Host IPS: 3893, Access Protection Prevent execution of scripts from the Temp folder. Anti-virus Standard Protection Prevent Registry Editor and Task Manager from being disabled Intention: This rule protects some Windows registry entries to prevent the disabling of the registry editor and Task Manager. In the event of an infection, an administrator needs to have the ability to make changes to the registry, or open Task Manager to stop active processes. Risk: Preventing the registry editor and Task Manager from running can make the manual removal of malicious code more difficult. ID and Name in Host IPS: 3883, Access Protection Prevent Registry Editor and Task Manager from being disabled. Prevent user rights policies from being altered Intention: Many worms attempt to locate accounts on network systems that have administrative rights. Enabling this rule prevents malicious code from modifying the rights of users. This rule protects registry values containing important Windows security information. For example, some viruses remove important privileges from the administrator account; this rule blocks those changes. insters ID and Name in Host IPS: 3884, Access Protection Prevent user rights policies from being altered. Prevent remote creation/modification of executable and configuration files Enabling this rule will prevent other computers from making a connection and altering executables, files in the Windows directories, etc. Intention: This rule forms a very cut-down version of the make shares read-only rule. First, the extension list is reduced to file types that viruses usuy infect. Second, the blocked action is just write, which prevents infection but also ows new files to be created. This protects against fast spreading worms or viruses, which traverse a network through open or administrative shares. Risk: While there are reasons to copy executables around using Windows shares there are fewer, if any, reasons to modify executables on remote systems. This is usuy indicative of attack behavior. These four rules are much less likely to false alarm than the broad make shares read-only rule but are also less secure. ID and Name in Host IPS: There is no corresponding signature in Host IPS. 7
8 Prevent remote creation of autorun files Intention: Autorun files are used to automaticy launch program files, typicy setup files from CDs. Preventing other computers from making a connection and creating or altering autorun.inf files can prevent spyware and adware from being executed. There are a lot of spyware and virus programs distributed on CDs. Microsoft has disabled autorun in Windows XP Service Pack 2. system:remote none ID and Name in Host IPS: There is no corresponding signature in Host IPS. Prevent hijacking of.exe and other executable extensions Intention: This rule protects the.exe and other keys under HKEY_CLASSES_ROOT. Some viruses alter these keys to ensure that the virus is run when any other executable runs. Enabling this rule will prevent spyware and malware from modifying important operating system and executable files. insters ID and Name in Host IPS: 3887, Access Protection Prevent hijacking of.exe and other executable extensions. Prevent Windows Process spoofing Intention: Many viruses and Trojans run use the name of a Windows process. This rule prevents files from being created or executed with the most commonly spoofed names. The authentic Windows file is excluded. Risks: None none 3888, Access Protection Prevent Windows Process spoofing. 8
9 Prevent mass mailing worms from sending mail Intention: Many viruses and worms find addresses on the infected system and send themselves to these addresses. They do this by connecting directly to the servers whose names they have harvested from the local system. This rule prevents any process from talking to a foreign server using SMTP. By blocking this communication, a machine may become infected with a new mass-mailing virus, but that virus will be unable to spread further by . It prevents outbound access to SMTP ports 25 and 587 on programs except known clients listed as an exclusion. Risks: Our list of exclusions cannot be complete there are many third-party applications that send . These will stop working until their process names are added to the list of exclusions. To add a process to the list of exclusions, highlight the rule, click Edit, and add the process name to the list of processes to exclude. common browsers and clients ID, Name in Host IPS: There is no corresponding signature in Host IPS. Prevent IRC communication Internet Relay Chat (IRC) is the preferred communication method used by botnet herders and remoteaccess Trojans to control botnets (a set of scripts or an independent program that connects to IRC). IRC ows an attacker to control infected machines that are sitting behind network address translation (NAT), and the bot can be configured to connect back to the command and control server listening on any port. Intention: Many backdoor Trojans connect to IRC servers and receive commands from their authors. For example, By blocking this communication, even if a system becomes infected with a new Trojan, it will be unable to communicate with the person or entity controlling it. Risks: If IRC is used within a company, or if these ports are used for some other purpose, then the rule will block them until the processes using the ports are added to the exclusion list. none Blocked inbound ports: TCP/UDP Blocked outbound ports: TCP/UDP There is no corresponding signature in Host IPS. Prevent use of tftp.exe Trivial File Transfer Protocol (TFTP) provides basic file transfer with no user authentication. Many Trojans use TFTP because it is a rudimentary method to download additional code. Enabling this rule will prevent anything except Windows Update from using it to download other malicious code to the system. Intention: Some viruses spread by exploiting buffer overflows in vulnerable applications. Code is injected into the process and then run. This code downloads the rest of the virus from the computer that just injected the download code. Often, the download code uses the Windows TFTP client (tftp.exe) to perform the download. Therefore, even if a system becomes infected with part of a new virus, it cannot become fully infected because it cannot download the rest of the code. 9
10 Risk: The most reported case where Windows needs access to tftp.exe is when insting a Windows service pack. When the service pack inster cannot upgrade tftp.exe, the inst fails, it is genery advised to enable this rule, but disable it during the period when patches and service packs are being insted. Windows Update 3889, Access Protection Prevent use of tftp.exe. Anti-virus Maximum Protection Intention: Anti-virus Maximum Protection provides common rules that protect most critical settings and files from being modified. This level provides more protection, but may prevent the instation of legitimate software. If you cannot inst software, we recommend that you disable Access Protection Maximum Protection first, and then enable it again after instation. Risk: Maximum Protection rules should be used with caution as they can block common activities such as instation or execution of certain applications or processes. It is recommended that Maximum Protection rules be initiy enabled for report only in order to determine if exclusions will be required. Prevent svchost executing non-windows executables Intention: Svchost.exe is a system process belonging to the Microsoft Windows operating system, which handles processes executed from.dlls. This program is important for the stable and secure running of your computer and should not be terminated. Because this is a key component of Windows, attackers attempt to use this process to register their own.dlls that are not part of Windows. This rule makes svchost.exe only load Windows service.dlls. svchost.exe none 3894, Access Protection Prevent svchost executing non-windows executables. Protect phonebook files from password and address stealers Intention: This rule prevents malicious code from reading the list of the user s contacts, which are stored in rasphone.pbk files in the user s profile directories. typical processes that access the address book 3895 (2), Access Protection Protect phonebook files from password and address stealers. Prevent alteration of file extension registrations Intention: This is a stricter version of the Anti-virus Standard Protection: Prevent hijacking of.exe and other executable extensions rule. Instead of just protecting.exe,.bat, etc., it protects the extension options under HKEY_CLASSES_ROOT. 10
11 Systems running Microsoft Windows operating systems use a three- or four-letter identifier added to file names after a period (.) to identify a file type. When a file is opened, the file extension is used to decide what program should be used to open the file, or if the file is a program that should be run. Malware can modify the file extension registrations in such a way that execution of the malicious code is silent. This rule prevents malware from modifying the shell extension by modifying the shell extension for.txt and executing every time you open a.txt file. This rule prevents extension options by protecting the registry keys where the file extensions are registered. Risks: If system administrators enable this rule, they will need to make sure to disable the rule when insting valid applications that will modify the file extension registrations in the registry. explorer 3896, Access Protection Prevent alteration of file extension registrations. Protect cached files from password and address stealers Intention: Some viruses look through the Internet Explorer cache for addresses and website passwords. This rule prevents access to anything in the Internet Explorer cache except by Internet Explorer. Risk: Any process that uses the WinInet library or hosts an Internet Explorer control in a window can access the cache; therefore, you may need to add process to this rule if it is enabled. Internet Explorer; McAfee processes 3897, Access Protection Protect cached files from password and address stealers. Anti-virus Outbreak Control Make shares read-only Intention: Many viruses spread by copying themselves to open shares on the network or by infecting files on open shares, for example, While shares can be protected by access control lists (ACLs), the ACL on the admin shares (C$, D$, Admin$, etc) cannot be edited and are read/write to administrators. If an administrator s system becomes infected, that infection can rapidly spread across a network. VSE s share blocking does not treat administrators differently write access is blocked. If there is a policy of making shares read only, this rule reinforces that policy by closing the administrative shares. Risks: This is a very powerful rule. It is a good idea to assess the roles of the systems that will use this rule. In a typical environment, it is likely that this rule will be suitable for workstations and unsuitable for servers. The rule is intended to block viruses that will severely limit use of the computer or network, and it is only useful when computers are actively under attack. In addition to potentiy affecting the day-to-day use of computers, these rules can also affect the way they are managed. If computers are managed by pushing files to them, this rule will prevent updates or patches from being insted. The management functions of McAfee epo will not be affected if this rule is enabled. There is no corresponding signature in Host IPS. 11
12 Block read and write access to shares Intention: This rule is intended for use when a share-hopping worm is known to be in the wild and actively spreading. In environments that prohibit file sharing, these rules can enforce that policy as it will prevent write access, or access, from remote computers to the protected one. Risks: This is a very powerful rule. System roles need to be assessed before the rule is enabled. In a typical environment, it is likely that this rule will be suitable for workstations and unsuitable for servers. It is intended to block viruses that will severely limit the use of the computer or network, and it is only useful when computers are actively under attack. In addition to potentiy affecting the day-to-day use of computers, these rules can also affect the way that they are managed. If computers are managed by pushing files to them, this rule will prevent updates or patches from being insted. There is no corresponding signature in Host IPS. Common Standard Protection The rules in this category are intended to block viruses, adware, spyware, etc., with rules that shouldn t need much modification. Prevent modification of McAfee files and settings Intention: Many viruses and Trojans attack anti-virus products. This rule, in addition to VSE s selfprotection features, protects VirusScan registry values and processes from being altered or deleted by malicious code. Risks: This rule protects the McAfee security product from modification by any process not listed in the policy s exclusion list. Many Trojans and viruses will attempt to terminate or even delete security products. If you use custom or third-party deployment and update tools to inst or update VSE, add the process, which alters McAfee settings to the exclusion list. Not doing so may cause the instation or update to fail. It is recommended that you utilize McAfee epo to deploy and update VSE. Insters, McAfee processes 3898, Access Protection Prevent modification of McAfee files and settings. Prevent modification of McAfee Agent files and settings Intention: This rule provides the same coverage as the above rule, except that it specificy protects the McAfee Agent that is deployed by McAfee epo. 3899, Access Protection Prevent modification of McAfee Agent files and settings. Prevent modification of McAfee Scan Engine files and settings Intention: Similar to the above two rules, this is another self-protection rule designed to protect the scanning engine against tampering. 3900, Access Protection Prevent modification of McAfee Scan Engine files and settings. 12
13 Protect Mozilla FireFox files and settings Intention: A common tactic of malware is to change the browser s start page, and inst favorites. This rule is designed to prevent modification of Mozilla FireFox configurations and files by any process not listed in the rule s exclusion list. The rule protects against certain start-page Trojans, adware, and spyware which modify browser settings. There aren t any drawbacks to enabling this rule, as it simply blocks processes from making changes to favorites and settings in Mozilla Firefox browsers. 3901, Access Protection Protect Mozilla FireFox files and settings. Protect Internet Explorer settings Intention: Similar to the previous rule, this is designed to prevent modification of Microsoft Internet Explorer settings by any process not listed in the rule s exclusion list. A common tactic of malware is to change the browser s start page. This rule protects against certain start-page Trojans, adware, and spyware, which modify browser settings. There rey aren t any drawbacks to enabling this rule, as it simply blocks processes from making changes to settings in Microsoft Internet Explorer. 3902, Access Protection Protect Internet Explorer settings. Prevent instation of Browser Helper Objects and shell extensions Intention: This rule prevents adware, spyware, and some Trojans that inst as Browser Helper Objects from insting on to the host computer. This is an extremely popular method for adware and spyware instations. However, this rule could stop the legitimate instation of these objects. Risks: If you have custom or third-party applications that need to inst these objects, make sure that you ve listed them in this rule s exclusion list. After instation, the rule can be re-enabled since this rule does not prevent insted Browser Helper Objects from working. This rule, along with the rules above for Internet Explorer and FireFox, are more general purpose than some listed in the anti-virus and anti-spyware sections. They protect things like home pages, search pages, and toolbars in the Internet Explorer and Mozilla FireFox browsers, as well as preventing instation of Browser Helper Objects and other shell extensions. 3903, Access Protection Prevent instation of Browser Helper Objects and Shell Extensions. Protect network settings Intention: Modifying network settings is a common tactic used to redirect traffic and transmit network activity or data. This rule protects a system s network settings from being modified by processes not listed in the exclusion list. It is designed to protect against Layered Service Providers that transmit data like your browsing behavior by capturing network traffic and sending it to third-party sites. Programs like Adware-CommonName and Adware-NDotNet f into this Layered Service Provider category. Risks: If you have legitimate processes that need to change the network settings, make sure that they are listed in the rule s exclusion list or disable the rule while changes are made. Insters, Windows 3904, Access Protection Protect network settings. 13
14 Prevent common programs from running files from the Temp folder Intention: This rule prevents attachments and executables from running on web pages. It is designed to block applications from insting software from the browser or from the client, and it is effective in stopping worms. It monitors your browser and client and prevents them from running software from the Temp directory. This stops most adware, spyware, Trojans, and viruses that use executables in or browser links to inst. Well-behaved insters do not usuy use the system Temp directory to hold insters; however, a custom or third-party application may be prevented from insting after this rule is enabled. Risks: If you need to inst an application that uses the Temp folder, make sure that instation process is listed in the exclusion list. Common browsers and clients None 3905, Access Protection Prevent programs from running files from the Temp folder. Prevent termination of McAfee processes Intention: When the Prevent termination of McAfee processes rule is enabled, VSE will prevent any non-mcafee processes and those specificy excluded from terminating the process or service. This protects VirusScan processes from being disabled by malicious programs that seek to circumvent virus protection programs by killing their processes. If this is set then no one (except excluded processes) can terminate a McAfee process using Task Manager, etc. ( Terminate means forcing the process to end right now. The victim process has no say in the matter). Risks: If this rule is enabled, manual methods to update.dat files for VSE will not work. The recommended method of updating with the use of epo tasks will continue to function with this rule enabled. ID, Name in Host IPS: There is no corresponding signature in Host IPS. Common Maximum Protection The rules in this category are intended to block viruses, adware, and spyware with much stricter rules that may be inappropriate for some computers and may need some customization before they can be enabled. These rules are often used temporarily or in extreme cases of lock down. Prevent programs registering to autorun Intention: Most adware, spyware, Trojans, and viruses attempt to register themselves in such a way that they get loaded every time the system is booted. This rule is designed to prevent any process not on the excluded list from registering processes that execute on every reboot. Risks: Legitimate applications may also do this; these should be listed in the exclusions list or insted before this rule is enabled. 3906, Access Protection Prevent programs registering to autorun. 14
15 Prevent programs registering as a service Intention: This rule protects the registry keys and directories that viruses, spyware, etc., can use to load when a user logs on or when the computer restarts. It prevents the instation of any new service by processes not listed in the exclusions list. This is common practice with applications such as keyloggers, and Layered Service Providers like Adware-SAHAgent. This also provides some limited protection against instation of new kernel mode rootkits. Risks: Enabling this rule may also block legitimate instations from registering themselves as services. It may also block instation of device drivers for new hardware. McAfee recommends that you either inst that application prior to setting this rule to block or list the instation process in the exclusions list. All Insters, Windows update 3907, Access Protection Prevent programs registering as a service. Prevent creation of new executable files in the Windows folder A common hiding tactic for adware, spyware, Trojans, and viruses, is to place their files in the Windows directory. You should add processes that have a legitimate need to place files in the Windows directory to the exclusions list. This rule will stop the addition of executable files to the Windows folder. Intention: Viruses and Trojans often copy themselves to the Windows directory, hoping to hide among the list of files there with odd names. These rules prevent files being created by any process, not just from over the network. This rule prevents creation of.exe and.dll files in the Windows directory. Risk: These rules will disable many software insters. Insters, Windows update 3908, Access Protection Prevent creation of new executable files in the Windows folder. Prevent creation of new executable files in the Program Files folder Intention: This rule prevents creation of.exe and.dll files from adware and spyware insting new executable files in the Program Files directory. It can stop new software instations if not launched from one of the excluded processes. Risk: McAfee recommends that you either inst applications prior to enabling this rule, or place the blocked processes in the exclusion list. 3909, Access Protection Prevent creation of new executable files in the Program Files folder. 15
16 Prevent launching of files from the Downloaded Program Files folder A common distribution method for adware and spyware is to have the user download an executable file and run it automaticy from the Downloaded Program Files folder. This rule is specific to Microsoft Internet Explorer and prevents software instations through the web browser. It might also block the instation of legitimate software, so either inst the application before enabling this rule or add the instation process to the exclusion list. Intention: Internet Explorer runs code from the Downloaded Program Files directory, notably ActiveX controls. Some vulnerabilities in Internet Explorer and viruses place a.exe file into this directory and run it. For example, This rule closes that attack vector. Risks: Downloaded Program Files is much more legitimate than Temp, so this rule can disable nonmalicious applications. Two known programs disabled by this rule are Microsoft s transfer manager (transfermgr.exe) and the Apple QuickTime inster (QuickTimeInster.exe). You can permit these functions by adding them to the list of processes to exclude. Internet Explorer none 3910, Access Protection Prevent launching of files from the Downloaded Program Files folder. Prevent FTP communication This rule is designed to block FTP (port 21) traffic from any process not listed in the exclusion list. FTP communication is frequently used by adware, spyware, Trojans, and viruses to receive or transmit data. It is also sometimes used by buffer overflow exploits to retrieve additional components. However, many third-party applications have a legitimate need to use FTP traffic, so they need to be listed in the exclusions list. Intention: Viruses and Trojans may attempt to download malicious code, spyware may attempt to upload personal information, and adware may attempt to download advertisements. These rules prevent anything but the authorized processes from communicating via FTP. Risks: FTP is a widely used protocol. If this rule is enabled on an FTP server, it will stop working until the server process is added to the exclusion list. While we have put popular FTP clients into the exclusions list, there may be many programs that could be added based on your particular environment. common browsers, clients and FTP clients There is no corresponding signature in Host IPS. 16
17 Prevent HTTP communication Many spyware, adware, and Trojan programs use port 80 for software downloads, bundled components, or updates. This rule will prevent any service (using svchost.exe) from communicating over port 80. This would stop common spyware and adware delivery mechanisms. Some server software uses port 80, although this isn t common in desktops. This rule will block HTTP communication for processes not in the exclusions list. Like FTP traffic, HTTP traffic is used by many applications to retrieve or transmit data. Spyware, adware, and Trojans also commonly use HTTP communication for software downloads of third-party components or updates. There are also many legitimate reasons for processes to communicate via HTTP. Many applications use a registration or self-update procedure that communicates over HTTP. Without the process being listed in the exclusions list, the traffic would be blocked; therefore, McAfee strongly recommends a thorough test and review cycle before enabling this rule. Intention: Many Trojans download scripts or other Trojans from websites controlled by the Trojan s author. For example, By blocking this communication, even if a system becomes infected with a new unknown Trojan it will be unable to download further malicious code. Risks: HTTP is a very widely used protocol. While we have included popular web browsers in the exclusion list, there may be many programs you may need to add based on your particular environment. There is no corresponding signature in Host IPS. Virtual Machine Protection The rules in this category are intended to block viruses, adware, spyware, etc., with strict rules that may be inappropriate for some computers, and may need some customization before they can be enabled. These rules are often used temporarily or in extreme cases of lock down. Prevent Termination of VMware Processes Intention: When the Prevent termination of VMware processes rule is enabled, VSE will prevent processes except VMware processes and those specificy excluded from terminating the process or service. This protects VMware processes from being disabled by malicious programs that seek to circumvent virus protection programs by killing their processes. If this rule is set, no one (except excluded processes) can terminate a VMware process using Task Manager, etc. ( Terminate means forcing the process to end right now. The victim process has no say in the matter). Risks: There are no drawbacks to enabling this rule, as it simply prevents processes from terminating VMware processes or services. Prevent modification of VMware Workstation files and settings Intention: This rule protects VMware Workstation registry values and processes from alteration or deletion by malicious code. Risks: This rule protects the VMware Workstation product from modification by any process not listed in the policy s exclusion list. 17
18 Prevent modification of VMware Server files and settings Intention: This rule protects VMware Server registry values and processes from alteration or deletion by malicious code. Risks: This rule protects the VMware Server product from modification by any process not listed in the policy s exclusion list. Prevent modification of VMware virtual machine files Intention: This rule protects VMware virtual machine files from alteration or deletion by malicious code. Risks: This rule protects the VMware virtual machine files from modification by any process not listed in the policy s exclusion list. User-defined Rules There are three purposes a rule can have: Prevent malicious code running in the first place If malicious code is running, prevent it from spreading to other computers If malicious code is running, prevent a payload from damaging the local computer And for each of those categories there are two sub-divisions: Target the rule at a known, newly discovered threat Target the rule at unknown future threats of a particular type In cases we are assuming that the regular virus detection is unable to detect the code probably because we are in the sm window after the worm goes wild and before.dats are released and distributed. Targeting Rules at New, Known Threats Introduction The first reference for these will be the VIL entry for the newly discovered threat. For example, if W32/Bagle.ab@MM has just been discovered, then the VIL page will exist but the.dats will not have been released yet. The first priority will be to create one or more rules that prevent virus from infecting your computers. However, because the virus is known to be in the wild, you can assume that some of your computers are infected. Therefore, the second priority is to create rules that help identify those computers, and prevent the virus from spreading and causing damage. 18
19 Preventing infection When the virus runs, it copies itself to: %windir%/system32/drvdll.exe %windir%/system32/drvddll.exeopen %windir%/system32/drvddll.exeopenopen %windir%/cplstub.exe Since Windows does not use these filenames, creating rules that prevent these files from being created should prevent the virus from infecting a machine with no side effects. For example: Process: * Wildcard: %windir%/system32/drv*.exe Prevent: Create Process: * Wildcard: %windir%/cplstub.exe Prevent: Create Similar rules will be sufficient for many new viruses. The default rules that block creation of executables in Windows directories may have side effects and might not be suitable for use in some environments. In order of security 1. As many threats use random filenames, use the broad prevent any executable from being created rule the time. 2. If that causes too many problems, use the broad prevent any executable from being created rule for the duration of the outbreak. 3. If even that causes problems, then use the virus-specific rules we derived above. Preventing distribution and damage If you suspect that a virus has already infected your computers, you need to identify which one and stop the virus spreading further. Since this virus W32/Bagel.ab@MM has known filenames then using the User Defined Detection feature of VSE found in the Unwanted Programs Policy is a very good way of detecting the virus. The Access Protection rules can help as well. If we change the above rules slightly to read: Process: * Wildcard: %windir%/system32/drv*.exe Prevent: Create, write, read, execute Process: * Wildcard: %windir%/cplstub.exe Prevent: Create, write, read, execute 19
20 The rules will trigger when a user logs on and the virus tries to run. This will also identify computers where the virus is already insted and prevent the virus from running again. Again, rules of this form will be effective against many new viruses when they have known filenames. The VIL article also says that W32/Bagel.AB@MM will mail itself using SMTP, it listens on port 2535 for instructions from its author and it downloads scripts from websites. All of this behavior can be blocked using the following port-blocking rules: Port: 25 Direction: Outgoing Exclusion list: Any SMTP clients that are owed to run Port: 2535 Direction: Incoming Exclusion list: None Port: 80 Direction: Outgoing Exclusion list: Any web browsers that are owed to run The first and last of these are included by default in VSE. If they cannot be enabled the time, enable them for the duration of the outbreak if possible. The last thing that the virus does is Files are created in folders that contain the phrase shar. There is a long list of filenames that the virus uses so it is not practical to make a separate rule for each file. A broader rule, which prevents any.exe files being created in a directory that contains shar would look like: Process: * Wildcard: **/*shar*/**/*.exe Prevent: create The W32/Bagel.ab@MM virus doesn t contain a destructive payload. If we look instead at W32/Shodi.c@MM the VIL says it delivers a destructive payload, deleting C:\NTDETECT.COM. Therefore, a rule such as: Process: * Wildcard: c:\ntdetect.com Prevent: delete will prevent this virus from rendering the computer unbootable. Since ntdetect.com is a Windows file, preventing access to it may affect the application of Microsoft hot fixes or service packs. 20
21 Targeting Rules at Unknown Future Threats Introduction It is difficult to know how to combat unknown future threats. Very few viruses are innovative, so using historical information you can implement general, broad rules. All of the VSE default rules, described below, are aimed at stopping new threats that behave like recent widespread threats. The problem with broad rules that are aimed at preventing the general behavior of viruses is that they can block legitimate file access. Some of the problems include: 1) Blocking well-known ports can disable existing software. For example, VSE has rules, which selectively block ports 25 (SMTP), 20 and 21 (FTP), and 80 (HTTP). Well-known ports are used by many legitimate programs. Before applying the rule, run it in report mode for a while to verify that no programs need to use the ports that are blocked. 2) Blocking access to Windows files and directories prevents parts of Windows from functioning. For example, we have rules to prevent access to tftp.exe or write access to Windows executables. The tftp rule can trigger as a false alarm when applications such as Explorer or Windows File Protection try to access files for read access. The write-prevention rules will block the instation of service packs and hot fixes. 3) Blocking access to Windows or Program Files files and directories. Doing this will block the instation of legitimate as well as malicious software. Preventing infection Rules to prevent infection can, in decreasing order of security: Stop the malicious code from getting to the system Allow it to get to the system but prevent it from being executed Allow it to get to the system and execute but prevent it from insting itself For example, two common types of viruses are mass mailers and share-hoppers. With mass mailers, there is nothing the Access Protection rules can do to prevent code from arriving on the computer, especiy if it is buried within an . However, using knowledge of how the clients work, it is possible to prevent casual execution of the code. With share-hoppers, it is possible to prevent the malicious files from arriving on the system by restricting incoming network connections from write access. In both cases, if the code exists and runs, the first thing the virus does is ensure that it will continue to run. Once the virus is owed to run, its options are much greater than when it is relying on the user, or other software, to launch it. It is therefore much harder to design good rules to stop it. One common thing that viruses do is copy themselves to the Windows directory and set some value in the registry to have the virus started on logon or when a particular application starts. The virus will run once and may do things other than insting itself, but after a reboot the virus should be disabled. 21
22 Preventing distribution and damage As with the Prevent instation case above, the virus is already running and the aim of these rules is to slow or stop it spreading further, or to stop it from causing damage. Since the virus code is running, there is no limit to what it can try to do and it is impossible to write rules to stop everything. Again, we can look at what existing, successful viruses do and assume that the next one is going to try something similar. The rule to Prevent mass-mailing worms from sending mail is the best way to stop mass mailers from spreading themselves. Viruses tend not to contain payloads designed to delete or corrupt the files on the computer they are running on. Instead, they are designed to stay hidden on the computer and attack other computers, for example by sending spam or participating in denial-of-service attacks. They can either be coded to do some particular task, to download and run code from somewhere else, or to receive orders directly from their masters. Port blocking rules target these last two cases. Of course, some viruses still do attempt to delete files. Critical files either those that are needed to keep the computer running or those that contain irreplaceable data can be protected with rules such as Process: * Wildcard: c:\data\ordersdatabase.db Prevent: Delete Port Blocking Port blocking rules ow you to block incoming or outgoing traffic on specified ports and choose to log entries when attempts are made to access blocked ports. When you block a port, both Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) accesses are blocked. You can block ports by creating rules to specify which port numbers to block and whether to restrict access to inbound or outbound processes. You can also exclude processes from the rule if you want a specific process, or list of processes, to be owed access to the otherwise blocked port. This can be very advantageous in an instance when a known virus accesses the system using specified ports. However, use caution as legitimate applications may also need to access the system on those same ports. To help counter a situation where a legitimate application needs access but protection is required for unknown applications, an exclusion list may be used. Port blocking rules To create user-defined port blocking rules, provide the following: Rule name Type the name for this rule. Processes to include Restrict access to the specified ports. Processes to exclude Allow access to the specified ports. Starting port Specify the first port number. This can be a single port or the starting number of a range of ports. Ending port Specify the last port number in a range of ports. Inbound Prevent systems on the network from accessing the specified ports. Outbound Prevent local processes from accessing the specified ports on the network. Note: If you block access to a port that is used by the epolicy Orchestrator agent, or the McAfee Host Intrusion Prevention agent, the agent s processes are trusted and are owed to communicate with the blocked port. All other traffic not related to these agent processes is blocked. 22
23 File/Folder Protection File/Folder protection rules ow you to prevent read access, write access, file execution, and creation or deletion of files and folders. This feature can be very powerful in preventing intrusions, as well as stopping viruses from spreading during an outbreak. Once you restrict access to a file or folder, the restriction remains in place until the administrator removes it. File/Folder protection rules To create user-defined File/Folder protection rules, provide the following: Rule name Type the name for this rule. Processes to include Processes to include in this rule. Wildcards are owed. Processes to exclude Processes to exclude from this rule. Wildcards are owed. File or folder name to block Block access to the specified file or folder. Complete path to the folder, or file this rule will affect. Partial folder/file names with wildcards can protect multiple, similar folders/files with a single rule. Examples: C:\Folder, C:\Fol*, C:\Folder/*.exe ºº Browse file Navigate to the file. ºº Browse folder Navigate to the folder. File actions to prevent Specify which action or actions you wish to block for the selected folder/file, with this rule; Read access, write access, file execution, file creation, file deletion, or any combination of these options. ºº Read access to files Block read access to the specified files. ºº Write access to files Block write access to the specified files. ºº Files being executed Block files from being executed in the specified folder. ºº New files being created Block new files from being created in the specified folder. ºº Files being deleted Block files from being deleted from the specified folder. Registry Blocking Block users or processes from taking action on specified registry keys or values. Registry-blocking protection rules prevent unauthorized programs from altering, creating, or deleting registry keys and values that they shouldn t. Registry-blocking rules To create user-defined registry-blocking rules, provide the following: Rule name Specify the name for this rule. Processes to include Restrict these processes from access. Wildcards are owed. Processes to exclude Allow access to these processes. Wildcards are owed. Registry key or value to protect Protect this registry key or value: ºº Select a root key or value from the drop-down list. ºº Type a key or value in the text box. Note: Selecting the root key or value from the drop-down list is optional. Use either of these methods to specify the key or value: ºº Select the root key or value from the drop-down list, then type the remaining path to the key or value in the text box. ºº Type the full path to the key or value in the text box. 23
24 Rule type Select the type of rule: ºº Key This rule protects the specified key. ºº Value this rule protects the specified value. Registry actions to block Select the actions you want the rule to block: read key/value, write key/value, create key/value, delete key/value, or any combination of actions. ºº Read from key or value Block reading from the specified key or value. ºº Write to key or value Block writing to the specified key or value. ºº Create key or value Block creating the specified key or value. ºº Delete key or value Block deleting the specified key or value. Summary Access Protection, available in either McAfee VirusScan Enterprise or McAfee, proactively stops and removes threats, extends coverage for new security risks, and reduces the cost of managing outbreak responses. Even without an update, it stops zero-day threats and mitigates your window of vulnerability. Enabling Access Protection rules gives you the flexibility to limit potential outbreak damage, even before.dat file is issued. You can also close ports, monitor applications and engines, block files and directories, and trace and block infection sources. Access Protection prevents unwanted changes to your computer by restricting access to specified ports, files and folders, shares, and registry keys and values. It also protects McAfee processes and services by preventing users from stopping them. This protection is critical before and during outbreaks. McAfee, Inc Freedom Circle Santa Clara, CA McAfee, Avert, epolicy Orchestrator, epo, and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc., and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Any other non-mcafee related products, registered and/or unregistered trademarks contained herein is only by reference and are the sole property of their respective owners McAfee, Inc. All rights reserved. 5345wp_tops_vse-hips_access-protection_0109
McAfee VirusScan Enterprise 8.8 software Product Guide
McAfee VirusScan Enterprise 8.8 software Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Integrated Protection for Systems. João Batista [email protected] Territory Manager
Integrated Protection for Systems João Batista [email protected] Territory Manager 2 McAfee Overview Proven Expertise And what it means to you Proof of Expertise Impact of Expertise 1 17 100 300
Desktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Best Practices for Deploying Behavior Monitoring and Device Control
Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Spyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
Introduction to Computer Security Table of Contents
Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
Xerox Next Generation Security: Partnering with McAfee White Paper
Xerox Next Generation Security: Partnering with McAfee White Paper 1 Background Today s MFPs are complex embedded systems. They contain, among other things, full scale operating systems, embedded web servers,
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Sophos Endpoint Security and Control Help. Product version: 11
Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
Spyware. Summary. Overview of Spyware. Who Is Spying?
Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it
How Spyware and Anti-Spyware Work
22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade
How to easily clean an infected computer (Malware Removal Guide)
How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
ViRobot Desktop 5.5. User s Guide
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Product Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Product Guide. McAfee Endpoint Security 10
Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document
ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against
Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices
350 PIERS Proceedings, Cambridge, USA, July 5 8, 2010 Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices Dung Vu Pham 1, Malka N. Halgamuge 2, Ali Syed 1, and Priyan
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010
OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010 What is Trend Micro OfficeScan? Trend Micro OfficeScan Corporate Edition protects campus networks from viruses, Trojans, worms, Web-based
Sophos Enterprise Console policy setup guide. Product version: 5.2
Sophos Enterprise Console policy setup guide Product version: 5.2 Document date: September 2014 Contents 1 About this guide...4 2 General policy recommendations...5 3 Setting up an updating policy...6
ANTIVIRUS BEST PRACTICES
ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject
G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy
For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006
Adjusting Prevention Policy Options Based on Prevention Events Version 1.0 July 2006 Table of Contents 1. WHO SHOULD READ THIS DOCUMENT... 4 2. WHERE TO GET MORE INFORMATION... 4 3. VERIFYING THE OPERATION
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
Sage HRMS 2014 Sage Employee Self Service
Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights
F-Secure Client Security. Administrator's Guide
F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Anti-Spyware Enterprise Module software
Anti-Spyware Enterprise Module software version 8.0 Guide What is the Anti-Spyware Enterprise Module? The McAfee Anti-Spyware Enterprise Module is an add-on to the VirusScan Enterprise 8.0i product that
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
NOD32 Antivirus 3.0. User Guide. Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware. we protect your digital worlds
NOD32 Antivirus 3.0 Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware User Guide we protect your digital worlds contents 1. ESET NOD32 Antivirus 3.0...4 1.1 What s new... 4 1.2 System
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
McAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
Infinity Acute Care System monitoring system
Infinity Acute Care System monitoring system Workstation security in a networked architecture Introduction The benefits of networked medical devices for healthcare facilities are compelling. However, the
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Managing a Malware Outbreak
Sality A Case Study Authors: Mike Andrews Senior Principal Consultant Jerry Pierce Principal Consultant Shawn Baker Senior Consultant Table of Contents Managing a Malware Outbreak... 1 Sality A Case Study...
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
STANDARD ON CONTROLS AGAINST MALICIOUS CODE
EUROPEAN COMMISSION DIRECTORATE-GENERAL HUMAN RESOURCES AND SECURITY Directorate HR.DS - Security Informatics Security Brussels, 21/06/2011 HR.DS5/GV/ac ARES (2011) 663475 SEC20.10.05/04 - Standards European
Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender
Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them
Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Symantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used
ESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
ESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
Using McAfee VirusScan Enterprise 8.7i Jocelyn Kasamoto
WIN1049 October 2009 Using McAfee VirusScan Enterprise 8.7i Jocelyn Kasamoto Introduction Introduction... 1 Product Overview... 2 System Requirements... 3 Where to Get the Software... 4 Installation Instructions...
WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com
SMALL BUSINESS NETWORK SECURITY GUIDE WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION AUGUST 2004 SMALL BUSINESS NETWORK SECURITY GUIDE: WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
Application Firewalls
Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Sophos Enterprise Console Help
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
