Protection against viruses, spyware, rootkits, and network vulnerabilities. Productivity-oriented default configuration



Similar documents
Owner of the content within this article is Written by Marc Grote

Microsoft Forefront Endpoint Protection 2010 Evaluation Guide

Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test

Spyware Doctor Enterprise Technical Data Sheet

Forefront Client Security. Ronald Beekelaar Beekelaar Consultancy

Symantec Endpoint Protection Small Business Edition Installation and Administration Guide

Host-based Intrusion Prevention System (HIPS)

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

VESZPROG ANTI-MALWARE TEST BATTERY

ESET Security Solutions for Your Business

Product Guide. McAfee Endpoint Security 10

BitDefender for Microsoft ISA Servers Standard Edition

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

Best Practice Configurations for OfficeScan (OSCE) 10.6

Symantec Endpoint Protection Small Business Edition Implementation Guide

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Maintaining, Updating, and Protecting Windows 7

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Hope is not a strategy. Jérôme Bei

Deep Security Vulnerability Protection Summary

avast! Business products 2012

Sophos Computer Security Scan startup guide

K7 Business Lite User Manual

for businesses with more than 25 seats

Microsoft Security Essentials Reviewers Guide

F-Secure Internet Security 2012

Forefront Endpoint Protection. Jack Cobben

Symantec Endpoint Protection

ESET SMART SECURITY 6

ESET NOD32 Antivirus. Table of contents

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

Insight. Security Response. Deployment Best Practices

Symantec Endpoint Protection Small Business Edition Getting Started Guide

ESET SMART SECURITY 9

Securing the endpoint and your data

avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business.

Windows Operating Systems. Basic Security

Trend Micro OfficeScan Best Practice Guide for Malware

Cisco IPS Tuning Overview

ESET NOD32 ANTIVIRUS 9

ESET NOD32 ANTIVIRUS 8

F-Secure Client Security. Administrator's Guide

Symantec Endpoint Protection Analyzer Report

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

How to Use Windows Firewall With User Account Control (UAC)

Veranderende bedreigingen Security in het virtuele datacenter

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

Symantec Endpoint Protection Getting Started Guide

S3 Control and System Call Indirection

Kaspersky Internet Security 6.0 vs Microsoft Windows Live OneCare. Comparative Analysis

McAfee Network Security Platform Administration Course

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

Windows 7. Qing Liu Michael Stevens

Advanced Endpoint Protection Overview

Best Practice Configurations for OfficeScan 10.0

Contents. McAfee Internet Security 3

Symantec Endpoint Protection

Zscaler Cloud Web Gateway Test

Malwarebytes Endpoint Security Quick Start Guide Version September 2015

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2.

For Businesses with more than 25 seats.

Novell. ZENworks Patch Management Design, Deployment and Best Practices. Allen McCurdy Sr. Technical Specialist

Understanding Anti-Malware Research and Response at Microsoft. An introduction to the Malware Protection Center

Symantec Endpoint Protection Getting Started Guide

Client Server Messaging Security 3.5 for Small and Medium Business. Administrator s Guide

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

BitDefender Client Security Workstation Security and Management

Anti-exploit tools: The next wave of enterprise security

Symantec Endpoint Protection

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO Version 8.0.

Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices

User Documentation Web Traffic Security. University of Stavanger

Total Defense Endpoint Premium r12

Cloud and Data Center Security

Proactive Rootkit Protection Comparison Test

Why The Security You Bought Yesterday, Won t Save You Today

What Do You Mean My Cloud Data Isn t Secure?

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Introduction. PCI DSS Overview

Getting Ahead of Malware

Get Started Guide - PC Tools Internet Security

SourceFireNext-Generation IPS

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Best Practices for Deploying Behavior Monitoring and Device Control

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Enabling Security Operations with RSA envision. August, 2009

Real World and Vulnerability Protection, Performance and Remediation Report

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Transcription:

Built on distribution infrastructure of Microsoft System Center Configuration Manager software Supports all System Center Configuration Manager topologies and enables enterprise-wide scalability Facilitates easy migration Able to deploy across various operating systems (including Microsoft Windows client and Microsoft Windows Server ) Protection against viruses, spyware, rootkits, and network vulnerabilities Productivity-oriented default configuration Integrated management of host firewall Backed by Microsoft Malware Protection Center Unified management interface for desktop administrators Timely and effective alerts Simple, operation-oriented policy administration Historical reporting for security administrators

Samples Customer machine Blocking threat infections Known malware: blocked. Some new malware blocked by generics. Signatures MMPC Neutralizing active threats Remaining new malware samples sent to MMPC for analysis. New signatures delivered to customers and active infections detected and neutralized. GOAL: Continue to provide high-quality protection & cover more attack vectors Real-time Protection Generics & Heuristics Browser Protection Network Vulnerability Shielding GOAL: Shrink customer window of vulnerability by discovering new threats and delivering signatures faster Anti-rootkit Behavior Monitoring Dynamic Signature Service Malware Response

Firewall & Configuration Management Antimalware Dynamic Signature Service Generics and Heuristics Behavior Monitoring Anti-Rootkit Network Vulnerability Shielding Browser Protection Malware Response MMPC

Firewall & Configuration Management Antimalware Dynamic Signature Service Generics and Heuristics Behavior Monitoring Anti-Rootkit Network Vulnerability Shielding Browser Protection Malware Response MMPC

Firewall & Configuration Management Antimalware Dynamic Signature Service Generics and Heuristics Behavior Monitoring Anti-Rootkit Network Vulnerability Shielding Browser Protection Malware Response MMPC

HANDLE hfile; hfile = CreateFile(L"NewVirus.exe", GENERIC_WRITE, 0, NULL, CREATE_NEW, FILE_ATTRIBUTE_HIDDEN, NULL);... push 40000000h push offset string L"NewVirus.exe call dword ptr [ imp CreateFileW@28] cmp esi,esp DT... push push call cmp 40000000h offset string L"NewVirus.exe dword ptr [DT_CreateFile] esi,esp

Firewall & Configuration Management Antimalware Dynamic Signature Service Generics and Heuristics Behavior Monitoring Anti-Rootkit Network Vulnerability Shielding Browser Protection Malware Response MMPC

1 2 3 4 5 Functions provided by user mode libraries syscalls RTP Notification Queue BM " Applications call library functions " Some of these library functions call a much smaller set of system calls " RTP logs calls to some of these system calls " Queues notifications " Consumed by Behavior Monitoring " RTP logs calls, BM makes sense of them. " It takes some practice to map high-level behaviors (1) to low-level notifications (4) when designing new detections

Filesystem FileCreate FileOpen FileModify FileDelete FileRename Registry RegistryKeyCreate RegistrySetValue RegistryKeyDelete RegistryValueDelete RegistryKeyRename Good for detecting IRC bots Network IRC Other Good for detecting droppers and file infectors Good for ASEPS and detecting tampering with software keys and configuration. Good for detecting process infectors and exploits Good for detecting rootkit installers ModuleLoad ProcessCreate OpenProcess ProcessTerminate DriverLoad BootSectorChange RemoteThreadInject RawWrite

FILTER for EVENTS: Ignore if the program the process is running has a clean file reputation (Or driver in the kernel tampering case.)

Firewall & Configuration Management Antimalware Dynamic Signature Service Generics and Heuristics Behavior Monitoring Anti-Rootkit Vulnerability Shielding Browser Protection Malware Response MMPC

Real-Time Signature Delivery Behavior Classifiers Reputation Researchers SpyNet Properties / Behavior Sample Request Sample Submit Real-time Signature Client

Behavior Monitoring + DSS Scenario: Running an Unknown Program User Launches an unknown program Program Starts Result State Threat Warning/Sample Request/None Customer Experience Protection Technology -RTP- Mini-filter Intercepts -Scanning- Loading Signatures Dynamic Translation -Scanning- Checking Against Local Reputation Cache -Performance- Adding to Reputation Cache -BM- Behavior Monitoring Telemetry Protection Services -SigPipe- Signatures Downloaded -SpyNet- Low-Fidelity Detection -SpyNet- Expensive File -SpyNet- Reputation Check -SpyNet- BM Detection -AVSubmit- Sample Submitted SpyNet Responses Include: - Sample Submission Request - Extended Report - Real-time Signature

Firewall & Configuration Management Antimalware Dynamic Signature Service Generics and Heuristics Behavior Monitoring Anti-Rootkit Microsoft Anti-Rootkit Test Results Source: AV-Test.org Network Vulnerability Shielding Browser Protection Malware Response MMPC Detection Rate 100% 80% 60% 40% 20% 0% Detect inactive Detect active Remove active 2007 83% 57% 33% 2009 100% 72% 60% 2010 100% 100% 86%

Firewall & Configuration Management Antimalware Dynamic Signature Service Generics and Heuristics Behavior Monitoring Anti-Rootkit Network Vulnerability Shielding Browser Protection Malware Response MMPC

Firewall & Configuration Management Antimalware Dynamic Signature Service Generics and Heuristics Behavior Monitoring Anti-Rootkit Network Vulnerability Shielding Browser Protection Malware Response MMPC NSS Labs

Firewall & Configuration Management Antimalware Dynamic Signature Service Generics and Heuristics Behavior Monitoring Anti-Rootkit Network Vulnerability Shielding www.microsoft.com/mmpc Browser Protection Malware Response MMPC

Real-time Protection Generics and Heuristics Browser Protection Network Vulnerability Shielding Anti-Rootkit Behavior Monitoring Dynamic Signature Service Malware Response

2012