Best Practices: Implementing Large Scale Collections with F- Response



Similar documents
CLOUD FORENSICS WITH F-RESPONSE

Installation Overview

1. Installation Overview

Support Guide: Managing the Subject machine s Firewall.

Your Mission: Use F-Response Now to connect to remote computers and devices over the Internet

PROPALMS TSE 6.0 March 2008

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS

Propalms TSE Deployment Guide

Microsoft Windows Apple Mac OS X

Pearl Echo Installation Checklist

WhatsUp Event Archiver v10 and v10.1 Quick Setup Guide

Symantec NetBackup 7.1 What s New and Version Comparison Matrix

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

Installing Websense Data Security

Content Distribution Management

OPTIONS / AGENTS DESCRIPTION BENEFITS

Information Technology Solutions

System requirements for MuseumPlus and emuseumplus

Microsoft Windows Apple Mac OS X

Capito. G- Cloud 6. REFERENCE NUMBER RM1557vi. Service Definition Document SECURE HOSTED BACKUP SERVICE 2015

2 Installing Privileged User Manager 2.3

VMware Server 2.0 Essentials. Virtualization Deployment and Management

MS MCITP: Windows 7 Enterprise Desktop Support Technician Boot Camp

Module 5 Introduction to Processes and Controls

Workflow Templates Library

TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - SAP FOR ORACLE IDATAAGENT GETTING STARTED - DEPLOYING ON WINDOWS

SyAM Software Management Utilities. Creating Templates

Optimizing Backup & Recovery Performance with Distributed Deduplication

SNOW LICENSE MANAGER (7.X)... 3

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

Operating Systems compatible with GigasoftOBM / GigasoftACB (Supported Operation System List):

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices

PARALLELS SERVER BARE METAL 5.0 README

SNOW LICENSE MANAGER (7.X)... 3

WhatsUp Event Analyst v10.x Quick Setup Guide

Networking Best Practices Guide. Version 6.5

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

Nexio Connectus with Nexio G-Scribe

Parallels Server 4 Bare Metal

Steelcape Product Overview and Functional Description

Verax Service Desk Installation Guide for UNIX and Windows

Check 21 Guide to Connectivity Options

Using WMI Scripts with BitDefender Client Security

WW HMI SCADA-08 Remote Desktop Services Best Practices

Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software

Small Business Server Part 1

Kaseya IT Automation Framework

EMC AVAMAR. Deduplication backup software and system. Copyright 2012 EMC Corporation. All rights reserved.

Chapter 1 - Web Server Management and Cluster Topology

Online Backup Frequently Asked Questions

IBM Tivoli Remote Control

WhatsUp Event Alarm v10x Quick Setup Guide

Shipping Products Chart. Contents

Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)

IOS110. Virtualization 5/27/2014 1

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

SystemWatch SM. Remote Network Monitoring

TMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA

QUICK START GUIDE PRINT MANAGER PLUS STANDARD Take Control of Your Network Printing

EZblue BusinessServer The All - In - One Server For Your Home And Business

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

PARALLELS SERVER 4 BARE METAL README

TABLE OF CONTENTS. Administration Guide - SAP for MAXDB idataagent. Page 1 of 89 OVERVIEW SYSTEM REQUIREMENTS - SAP FOR MAXDB IDATAAGENT

Pre-Installation Notes & Checklist for LISTSERV Maestro

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led

Acronis Backup & Recovery 11

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

TABLE OF CONTENTS. Administration Guide - SAP for Oracle idataagent. Page 1 of 193 OVERVIEW SYSTEM REQUIREMENTS - SAP FOR ORACLE IDATAAGENT

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

Features - SRM UNIX File System Agent

Windows Server 2008 R2 Hyper-V Live Migration

Microsoft Windows Server System White Paper

SAN TECHNICAL - DETAILS/ SPECIFICATIONS

NetSupport Manager v11

Online Backup Plus Frequently Asked Questions

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

Server application Client application Quick remote support application. Server application

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Laptop Backup - Administrator Guide (Macintosh)

Virtualization and Windows 7

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

Freshservice Discovery Probe User Guide

SMALL BUSINESS OUTSOURCING

XenClient Enterprise Synchronizer Installation Guide

Veritas NetBackup 6.0 Server Now from Symantec

Name Description Included in

Belkin. Automatic Power Management Software. User s Manual

Network Setup Instructions

Request for Expressions of Interest 3777EOI Fleet Management Software

EnCase Portable Demo P A G E 0

Transcription:

Best Practices: Implementing Large Scale Collections with F- Response Note: This guide assumes you have familiarity with F-Response Enterprise or Consultant Edition. For more information, please reference the F-Response User Manual, individual Mission Guides, or the training videos on the F- Response Website. F-Response and large scale collections F-Response actually began as a software tool specifically designed to allow our consultants to perform large distributed investigations, collections, and incident response with the tools and techniques they had accumulated over the years. We built F-Response to make large (and small) scale network based collections and investigations easier, more flexible, faster, and within reach of just about any project budget. Scope and Planning Prior to commencing any large scale collection engagement it is critical to establish the scope and parameters of the exercise. You will want to ask the important questions, such as: What is the scope of the data to be collected? o Is the client interested in full disk images, logical files, a combination? o Is there a defined list of custodians, by machine, by employee, by IP Address? o Where are the custodians located? Local LAN, WAN, or Remote VPN? o If we are collecting full disk images, how large is the average custodian hard drive? Are we collecting unallocated space, or only allocated files? o If we are collecting logical files, are they identified by location, or by name, size, or extension? What criteria will be used to identify the files and is it subject to interpretation? o Is full disk encryption in use on the custodian machines? Can we access the device un-encrypted by connecting to the logical volume? Are there filter drivers or overlays that will allow us to access the encrypted disk natively? o Is this a covert engagement? Should the custodian be unaware of the collection effort?

o Is there a preferred final delivery format? What post processing will be required? Preparing Your Collection Workgroup First we ll want to define the collection workgroup. We recommend leveraging the unlimited licensing model of F-Response Consultant, Enterprise, and even Consultant + Covert to engage multiple collection machines in a small workgroup configuration. In this model we would have one machine in the workgroup acting as our F-Response License Manager/Master, and all other collection machines using the F-Response Accelerator. In order to leverage this model you will need to install F-Response Consultant edition or higher on all Accelerator machines. No additional license dongle or license is required. The following diagram outlines the recommended configuration: Collection Workgroup Configuration Custodian Machines, Laptops, Workstations, Servers Ethernet (Gig-e Preferred) F-Response License Manager Optional[FEMC] F-Response Accelerator Machines, Unlimited Next, we recommend you make certain all your designated collection machines (laptops, workstations, or even virtual machines) are running Windows 7 as their operating system. Alternately, if you are performing your collections using Linux, we recommend a modern Linux distribution with the Open-iSCSI 1 tools installed. 1 Open-iSCSI tools are available for almost all major Linux Distributions. More information can be found at www.open-iscsi.org

In addition, if possible we recommend Gigabit Ethernet, the speed and performance afforded by Gigabit Ethernet is definitely worth the investment in additional local workgroup switches or networking equipment. Lastly, with regards to imaging software, we have found that not all imaging products perform the same, in our tests X-Ways Imager and X-Ways Forensics are exceptionally fast when paired with F-Response and Windows 7. While the X-Ways Imager product is not free, it is reasonably priced and can readily be factored into the cost of the engagement. The above recommendations should go a long way in optimizing your full disk imaging experience. However, should your collection objectives call for logical file collection you have much more flexibility. There are a number of options you can consider including: Leveraging the F-Response Flexdisk API and Powershell scripts to collect individual files from custodian machines. 2 Use individual forensics applications to create logical containers of required content, either by scripting or manually. Custodian Machines/Network Once the scope of the collection effort is defined, we can look at the environment to determine the challenge to acquisition. Machines in a remote office When looking at collecting a remote machine we need to consider the speed of the WAN link and the size of the data to be collected. It may make more sense to look at setting up a collection machine in the remote location to perform the collection and have the results shipped back (If security is a concern, the data can always be collected to an encrypted drive). By making use of USB-Over-Ethernet 3 the licensing dongles for any of your forensics tools can be forwarded to the remote collection machine giving you the option of not having to ship any equipment to the remote site. In addition, since the F-Response Accelerator can used on an unlimited number of collection machines, you can readily configure an Accelerator much closer to the custodian machine, ie on the same local LAN segment as the custodian. 2 Automating Large Collections with Flexdisk/Powershell (F-Response Website) 3 USB-Over-Ethernet is available from www.usb-over-ethernet.com.

Firewalls/AV Firewalls can sometimes interfere with F-Response communication. Thankfully in a large environment, the firewall is usually centrally managed through policy and exceptions can be made for the required F-Response ports: 3260, 3261, and 5681. If possible, work with the Network Administrator to allow for F-Response to run on these ports, or temporarily disable the local firewall on the target machines. Anti-Virus(A/V) AV software can interfere with communications on the remote target machine. It may not only prohibit communication, but may slow down the collection process by interfering with each read command during the imaging process. Again, work with the local Administrator to make exceptions/temporarily disable AV on the target machine. Active Directory If your custodian machines are part of an Active Directory we recommend the following modifications be made to maximize uptime and performance. All of these recommendations can be accomplished by creating a separate Organizational Unit ( OU ) within the domain and applying the policy changes to that OU. Where possible disable the automatic application of Windows Updates. Where possible alter the power policy to disable sleep, poweroff, or any other low power state. Set firewall exceptions either based on port, or based on the IP/hostname of the collection machines/workgroup. Temporarily disable Anti-Virus software. In addition when working with Active Directory managed environments you ll want to review the domains and trusts. Any account you provision to deploy F-Response (or deploy via MSI) must have sufficient trust to operate between domains within the Active Directory. Backup Intervals and Maintenance Additional consideration should also be given to backup windows and standard system maintenance. Are any custodian systems (servers or workstations) part of a backup rotation that would make them unavailable for a period of time?

Is there a general system maintenance window where custodian systems might be rebooted? Are administrators of those maintenance windows aware of your operations such that impacted custodian systems will not be affected? Laptops Are the target machines local laptop users? Are they aware of the collection? If the target employee is aware of the collection we can simply ask they leave their machine connected to the network until the process is complete. If the laptop must be collected in a covert manner, there is a bit more planning involved. We will want to look at using a tool for collection that will allow us to reconnect and continue imaging should the user disconnect from the network. Not all Forensic imaging products allow for the restart of a incomplete image, you will want to review your tool selection independently. Deployment Depending on the version of F-Response you are using you ll have the following deployment options available to get F-Response running on the custodian machines: F-Response Enterprise o The F-Response Enterprise Management Console (FEMC) You will need valid credentials on the network, either Domain Administrator, or Credentials with permission to access the remote computer from the network 4. o The F-Response Enterprise Scriptable COM Object You will need valid credentials on the network, either Domain Administrator, or Credentials with permission to access the remote computer from the network. o F-Response Enterprise MSI Installer You will need valid credentials as indicated above, alternatively the MSI can be provided to an administrator to be applied to target machines. F-Response Consultant + Covert o F-Response Covert Console (single covert target at any given time) 4 Additional guidelines for Active Directory permissions is available on our website at https://www.fresponse.com/index.php?option=com_content&view=article&id=357:using-active-directory-to-delegate-fresponse-ee-duties&catid=34:blog-posts

Both the FEMC and FEMC COM object options outlined above will work for deployment. o F-Response Consultant edition executable (GUI on target machine, unlimited usage) The F-Response Consultant Edition executable (f-response-ce.exe) must be executed on the target machine with administrative privileges. F-Response Consultant o F-Response Consultant edition executable (GUI on target machine, unlimited usage) The F-Response Consultant Edition executable (f-response-ce.exe) must be executed on the target machine with administrative privileges. Various Operating Systems What Operating Systems (OSs) are running on the machines to be collected? In addition it will be important to know what must be collected on non-windows systems, as drives and partitions may look very different than their Windows counterparts. F- Response Enterprise, Consultant + Covert, and Consultant Edition support over ten major operating system environments: Windows Includes Windows 2000, XP, 2003, Vista, 2008,7 & 8, 32 and 64bit, Physical memory only supported on 32bit and 64bit Windows Apple OSX Includes OSX 10.3,10.4,10.5,10.6, 10.7, 10.8 Universal Binary Linux includes most Linux distributions build on Glibc 2.3.5 and higher Solaris includes Solaris 8, 9, & 10 on SPARC and OpenSolaris, Oracle Solaris on Intel IBM AIX includes AIX 5.1,5.2,5.3,6.1 on the Power processor HPUX includes HP_UX11iv2,11iv3 on the Itanium processor FreeBSD includes FreeBSD 7 on the Intel/i386 processor SCO includes SCO OpenServer 6 and Unixware 7 on the Intel/i386 processor Divide and Conquer In addition to all the recommendations provided above, we also recommend grouping the custodian collection activities into manageable sized logical units wherever possible. These logical units can be re-run if necessary, and greatly reduce the exposure to unforeseen environmental issues (emergency power loss, network interruption, etc).