Symantec Endpoint Protection Analyzer Report



Similar documents
Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection Small Business Edition Installation and Administration Guide

UP L13: Leveraging the full protection of SEP 12.1.x

Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines. Regional Product Management Team Endpoint Security

Securing the endpoint and your data

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

System Management. What are my options for deploying System Management on remote computers?

Getting Started with Symantec Endpoint Protection

Symantec Endpoint Protection

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

Symantec Endpoint Protection Small Business Edition Implementation Guide

Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:

Host-based Intrusion Prevention System (HIPS)

Release Notes for Websense Security v7.2

Contents. McAfee Internet Security 3

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

BitDefender Client Security Workstation Security and Management

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support

AVeS Cloud Security powered by SYMANTEC TM

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Symantec Mobile Security

Symantec Endpoint Protection Getting Started Guide

End to End Security do Endpoint ao Datacenter

W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers

Symantec Endpoint Protection Small Business Edition Getting Started Guide

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Proven LANDesk Solutions

Migrating from Legacy to New Business Solutions

Symantec Protection for SharePoint Servers Implementation Guide

Security Consultant Scenario INFO Term Project. Brad S. Brady. Drexel University

Symantec Endpoint Protection (SEP) Technical Consultancy Services

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2.

Home Use Installation Guide For Symantec Endpoint Protection (SEP) 11 For Mac

Symantec Endpoint Protection

Comodo Endpoint Security Manager SME Software Version 2.1

Symantec Endpoint Protection

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

Anti-Virus/Malware Policy

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Nessus and Antivirus. January 31, 2014 (Revision 4)

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Best Practices & Deployment SurfControl Mobile Filter v

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Countermeasures against Bots

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

IBM QRadar Security Intelligence April 2013

Best Practice Configurations for OfficeScan (OSCE) 10.6

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

End-user Security Analytics Strengthens Protection with ArcSight

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection

Did you know your security solution can help with PCI compliance too?

Insight. Security Response. Deployment Best Practices

Find the needle in the security haystack

Symantec Endpoint Protection Datasheet

11.0. Symantec Endpoint Protection 11.0 Reviewer s Guide

Sophos for Microsoft SharePoint startup guide

Devising a Server Protection Strategy with Trend Micro

2012 Endpoint Security Best Practices Survey

Symantec Endpoint Protection and Symantec Network Access Control Client Guide

PC Security and Maintenance

Core Protection for Virtual Machines 1

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Symantec Protection Center Enterprise 3.0. Release Notes

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Devising a Server Protection Strategy with Trend Micro

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Windows Operating Systems. Basic Security

Best Practices for Deploying Behavior Monitoring and Device Control

Symantec Endpoint Protection Sizing and Scalability Best Practices White Paper

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

Symantec Mail Security for Domino

Airtel PC Secure Trouble Shooting Guide

Trend Micro OfficeScan Best Practice Guide for Malware

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

THE OPEN UNIVERSITY OF TANZANIA

Configuration Information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Ovation Security Center Data Sheet

Protecting the Infrastructure: Symantec Web Gateway

Managed Service Plans

2. Installation and System requirements

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Ovation Security Center Data Sheet

SANS Top 20 Critical Controls for Effective Cyber Defense

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

OfficeScan Corporate Edition 6.5

Symantec Endpoint Protection

Transcription:

Symantec Endpoint Protection Analyzer Report For Symantec Customer

Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview... 5 2.2 Client/Server Distribution... 6 2.3 Client Versions... 7 3. Protection Overview... 8 3.1 Antivirus and Antispyware... 8 3.2 Firewall... 9 3.3 IPS... 10 3.4 SONAR... 11 3.5 Download Insight... 12 4. Threat Detection Summary... 13 4.1 Infected Clients... 14 4.2 Top Infections... 15 4.3 Infections by Client... 16 4.4 Detections by Scan Type... 17 4.5 Top Actions Taken... 18 5. Detailed Findings... 19 4.1 SEP Manager is not running latest version... 19 4.2 SEP Manager is a vulnerable version... 19 4.3 Windows 2000 SEP Clients detected... 20 4.4 LiveUpdate Frequency... 20 4.5 SEPM Content Revisions are not Best Practice... 21 4.6 Client IPS installation below 90%... 21 2

Statement of Confidentiality Symantec provides this report on an "as-is" basis, as a courtesy to a Symantec Customer. The deployment metrics provided within this report (e.g. client count, versions, etc.) are generally deemed to be directionally accurate but are non-official and should not be used for license audit purposes. Please engage the Symantec Global License Compliance team if a precise measurement of these items is desired. 3

1. Introduction Thank you for participating in the Symantec Endpoint Protection (SEP) Analyzer process. We have analyzed key metrics from the Symantec Customer SEP environment and the results are provided within this report. This report includes a high level summary of each category examined by SEP Analyzer, and reviews each topic, providing charts for each key metric along with details of how to interpret the data. The full set of data used to complete this analysis can be provided upon request. 4

2. Environmental Analysis Overview Collection Date 2013-06-27 13:57:36.260 Collection Server SEPM SQL Server Address localhost Database Type Adaptive Server Anywhere 12.0.1.3554 Number of SEP Clients 523 Clients Number of threat detections (last 30 days) 343 Threats 2.1 Findings Overview Issue Are vulnerable SEP or SEPM Versions installed? Is SEPM running the latest version? Are there Windows 2000 clients in the environment? Is LiveUpdate Configured to update Multiple times per day? Is the SEPM Manager storing recommended content levels? Are Database Backups enabled in the environment? Are Database Maintenance tasks enabled and scheduled? Are there more than 10% of clients with out-ofdate AV Definitions? Is Intrusion Prevention System (IPS) deployed and running in the Environment? Are there infected clients which require attention? Result Review Review OK OK Review OK OK OK Review OK For detailed information on the findings, please review Section 4. 5

2.2 Client/Server Distribution Site Server Clients A SEP Site SEPM 523 6

2.3 Client Versions Version Clients 11.0.4202.75 3 11.0.7101.1056 31 12.1.2015.2015 489 7

3. Protection Overview 3.1 Antivirus and Antispyware Antivirus and Antispyware is a fundamental component of SEP responsible for scanning and monitoring the file system for malicious files. All clients in your environment should be running Antivirus. The following graph outlines how Antivirus is currently deployed in your environment: Value Amount Installed 509 Disabled 1 Not Installed 12 Unknown 1 8

3.2 Firewall The SEP Firewall is a protection layer which monitors network traffic, and compares it to rules which to allow or block users from accessing the network. Only authorized traffic can pass. This is a highly powerful and customizable component of SEP. While Symantec recommends running this component on all possible systems, it should be noted that High availability servers such as mail servers, domain controllers, etc. should not have the firewall component installed. The following chart outlines how the firewall is deployed: Value Amount Installed 389 Disabled 2 Not Installed 131 Unknown 1 9

3.3 IPS The Intrusion Prevent System (IPS) significantly increases the level of protection that Symantec Endpoint Protection provides by checking for port scans and denial-of-service attacks, and protects against buffer overflow attacks. This engine also supports the automatic blocking of malicious traffic from infected computers. You should always have IPS enabled on your network. The following chart outlines how IPS is deployed in your environment: Value Amount Installed 376 Disabled 2 Not Installed 144 Unknown 1 10

3.4 SONAR Symantec Online Network for Advanced Response (SONAR) provides real-time protection against threats and proactively detects computer security risks. By examining programs as they run, SONAR identifies emerging threats based on application behavior, giving it the capability to locate new and previously unknown threats. Value Amount Installed 386 Disabled 37 Not Installed 98 Unknown 2 11

3.5 Download Insight Advanced Download Protection (Download Insight) is a new advanced protection feature included with the SEP 12.1 client. This feature allows the SEP client to leverage Symantec's Cloud-based reputation database when files are downloaded or executed directly from popular Web browsers. Value Amount Installed 473 Disabled 2 Not Installed 47 Unknown 1 12

4. Threat Detection Summary This section covers information related to the SEP client security detections. Each SEP client uploads inventory and security status information to the SEPM. If a client stops communicating with the SEPM, the SEPM will still report on the client for a configured period of time before the client is deleted: the default setting is 30 days. 13

4.1 Infected Clients SEP clients may report as being infected, when the remediation process was either unsuccessful, or there are still actions pending. Once client reports as being infected, the status will automatically clear if no further action is required. Analysis of reported infected clients should be a regular administrative process. No Clients were reporting an Infected Status 14

4.2 Top Infections An examination of the top infecting threats in the environment can provide insight on the overall health and security posture of the environment. The following chart outlines the top 5 infections detected in the environment in the past 30 days: Threat Name Count Tracking Cookies 113 Adware.GoonSquad 92 WS.Reputation.1 27 Adware.DealPly 19 Yontoo 17 15

4.3 Infections by Client This section outlines the number of file detections per client during the past 30 days. It is recommended to review the infected clients to determine if vulnerabilities exist on the system, or if user education is needed. The following chart outlines clients by detection count: Computer Name Infections STEVELAPTOP3 92 BOBSMITH1 19 XCHNG202 12 WALSH44 11 KISOK22 6 16

4.4 Detections by Scan Type The following chart outlines the top 5 scan type which caused detections: Source Count Scheduled Scan 256 Real Time Scan 75 Manual Scan 12 17

4.5 Top Actions Taken The following chart outlines the top 5 actions taken against detected threats: Action Count Quarantined 159 Deleted 119 Cleaned by deletion 34 Left alone 20 Partially repaired 4 18

5. Detailed Findings 4.1 SEP Manager is not running latest version Finding: The SEPM in the environment is not running the latest version of Symantec Endpoint Protection Manager. Potential Impacts: SEP 12.1 RU 3(12.1.3001.165) is the latest version of the software which includes the latest product fixes. Recommendation: Review release notes for Symantec Endpoint Protection 12.1 to determine if an upgrade would benefit the environment. See the following documentation: http://www.symantec.com/docs/doc4889 Detail Finding(s): Attribute Value SEPM Version 12.1.2015.2015 4.2 SEP Manager is a vulnerable version Finding: The SEPM in the environment is susceptible to SYM13-005- Symantec Endpoint Protection Manager/Protection Center 12.x Buffer Overflow. Potential Impacts: A dynamic link library (dll) in the Symantec Endpoint Protection Manager (SEPM) 12.1.x server and Symantec Protection Center (SPC) 12.0.x Small Business Edition server does not properly validate all external input. This could potentially result in a buffer overflow and remote code execution with application privileges on the system that is hosting the management server. Recommendation: Upgrade your SEP Manager to 12.1 RU3 to ensure that this vulnerability is closed in the environment. For full information on this vulnerability, see the following article: http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_ advisory&pvid=security_advisory&year=&suid=20130618_00 19

Detail Finding(s): Attribute Value SEPM Version 12.1.2015.2015 4.3 Windows 2000 SEP Clients detected Finding: Some SEP Clients are running Windows 2000, which is incompatible with SEP 12.1 Potential Impacts: Machines running Windows 2000 are of concern due to the unsupported nature of the operating system by Microsoft, and SEP 12.1. Recommendation: If possible decommission or upgrade the Operating Systems on these machines. If this is not a possibility, discuss with your sales team the benefits of protecting these systems with Symantec Critical System Protection. Detail Finding(s): Attribute Value SEPM Version 12.1.2015.2015 4.4 LiveUpdate Frequency Finding: LiveUpdate is not configured to run multiple times per day. Potential Impacts: Symantec typically releases 3 certified content updates per day to ensure our customers have the maximum protection against known threats. Failure to update multiple times per day lowers security posture. Recommendation: Configure LiveUpdate to run on the SEP Manager hourly to ensure that the clients are able to obtain the latest updates. Detail Finding(s): Attribute Value SEPM Version 12.1.2015.2015 20

4.5 SEPM Content Revisions are not Best Practice Finding: SEPM Content Revisions are set to a lower number than recommended by Symantec. Potential Impacts: Clients which have not checked into the SEPM recently and running an older definition pattern will likely receive complete packages of content updates. This has a direct impact on network performance in the environment. Recommendation: Increase the amount of content revisions held by the SEPM manager. Client will then leverage Delta creation of virus definitions, increasing the speed and efficiency of virus definition distribution. Keep in mind adjusting the number of content revisions held will directly impact the size of the SEPM database and the content folder on the SEPM hard drive (each content update accounts for 200-300mb of space used). See the following article for information on configuring this setting: http://www.symantec.com/docs/tech104845 Detail Finding(s): Clients Revisions Recommended 523 5 10 4.6 Client IPS installation below 90% Finding: The Percentage of client running IPS in the environment is less that 90%. Potential Impacts: Client level protection is significantly reduced without Intrusion Protection enabled on a system. Symantec's 2012 Threat Report indicates that 42% of detections are stopped via IPS signatures. Recommendation: The Intrusion Prevent System (IPS) significantly increases the level of protection that Symantec Endpoint Protection provides by checking for port scans and denial-of-service attacks, and protects against buffer overflow attacks. This engine also supports the automatic blocking of malicious traffic from infected computers. You should always have IPS enabled on your network on any system possible including servers. 21

Note: IPS is fully compatible with Windows servers and should be used to protect all servers except high availability or high utilization servers. Symantec s Critical System Protection may be a better choice for these servers. See the following article for guidelines: http://www.symantec.com/docs/tech162135 Detail Finding(s): IPS Installed Total Clients % Installed 376 523 71% 22

Copyright 2013, Symantec Corporation (Symantec). All rights reserved. This document may not be copied or further distributed, in whole or in part, without written permission from Symantec.