ADMINISTERING INTERNET SHIELD. Page 2 Agenda What can Internet Shield be used for? Administering Internet Shield Firewall configuration Network Quarantine.

Slides:



Advertisements
Similar presentations
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Advertisements

ADVANCED FUNCTIONALITY & TROUBLESHOOTING. Page 2 Agenda Main topics Advanced Policy Manager Server configuration Resolving Apache Web Server security.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Lesson 19: Configuring Windows Firewall
ADMINISTERING F-SECURE POLICY MANAGER
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
1 Enabling Secure Internet Access with ISA Server.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
VIRUS AND SPY PROTECTION ADMINISTRATION. Page 2 Agenda Main topics Administration interface Local user interface Administrating scanning remotely Tips.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
ADVANCED FUNCTIONALITY & TROUBLESHOOTING. Page 2 Agenda Internet Shield Architecture Advanced functionality IDS vs. packet filter Stateful packet filters.
Course 201 – Administration, Content Inspection and SSL VPN
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
INTRODUCING F-SECURE POLICY MANAGER
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
ADMINISTRATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Hands-On Microsoft Windows Server 2008
Implementing Network Security
ADMINISTRATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way that allows you to work independently, but still giving.
Using Windows Firewall and Windows Defender
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Chapter 6: Packet Filtering
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Honeypot and Intrusion Detection System
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Troubleshooting Windows Vista Security Chapter 4.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Access Control List ACL. Access Control List ACL.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Windows 7 Firewall.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
BASIC FUNCTIONALITY. Page 2 Agenda Main topics Policy Manager Communication Understanding communication Information flow Communication modules F-Secure.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
ADMINISTRATION HANDS-ON. Page 2 Agenda Task 1: Initial Configuration Task 2: Testing disinfection with eicar.com HTTP traffic scanning, manual scanning.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Module 10: Windows Firewall and Caching Fundamentals.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Security fundamentals
Proventia Network Intrusion Prevention System
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
Securing the Network Perimeter with ISA 2004
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Access Control Lists CCNA 2 v3 – Module 11
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

ADMINISTERING INTERNET SHIELD

Page 2 Agenda What can Internet Shield be used for? Administering Internet Shield Firewall configuration Network Quarantine configuration Application Control configuration Intrusion Prevention configuration

Page 3 Internet Shield…What For? Internet Shield protects computers from unauthorized access from the internet, as well as attacks originating from inside the LAN Core protection components and purpose Firewall Restrict traffic based on used protocols and ports Application Control Preventing malicious programs sending information out of the computer (trojan defense) Intrusion Prevention Stops malicious packets aimed on open ports (network attacks)

Page 4 Network Attack: Managed Network Web Server Managed Mobile Host Managed Hosts F-Secure Policy Manager x x Worm traffic Policy traffic

Page 5 Network Attack: Unmanaged Network Web Server Unmanaged Mobile Host Unmanaged Hosts Unmanaged File Server x Worm traffic Trojan traffic VPN tunnel

INTERNET SHIELD ADMINISTRATION INTERFACE

Page 7 Remote Administration The Policy Manager Console offers two different graphical interfaces Anti-Virus Mode Optimized for administering F-Secure Anti-Virus Client Security Advanced Mode Used for deeper product configurations Products other than AVCS have to be administered with this mode Some settings are only available in this mode!

Page 8 Anti-Virus Mode Message view Informative messages e.g. virus definitions update info Management tabs Host configuration and monitoring Operations management Policy domain tab Displays policy domain structure

Page 9 Advanced Mode Message view Informative messages e.g. virus definitions update info Policy properties pane Host configuration and monitoring Operations management Product help Field focus help, if policy properties tab selected Product view pane Provides most common settings Functions differ for selected properties tabs (e.g. policy tab)

Page 10 Anti-Virus Mode Summary Tab Policy Manager section Policy distribution status Virus and spyware definitions status Autoregistration request Internet Shield section Active security level (if host selected) Latest Attack (host or whole domain) Virus protection section Real-time protection status Infections (host or whole domain) Virus definitions status (host or domain) Domain/Host section Displays most important information More detailed for hosts (e.g. UID) Host alert summary

Page 11 Anti-Virus Mode Internet Shield Settings Firewall Security Levels Define security level for host/s Enable/disable/add security levels Configure firewall components (e.g. Network Quarantine) Enable/disable firewall components (e.g. Application Control) Firewall Rules Define rules for existing or added security levels Firewall Services Edit existing or create custom your own custom services Application Control Define rules for unknown applications reported by hosts

FIREWALL CONFIGURATION

Page 13 Internet Shield Security Levels F-Secure Internet Shield provides administrators with predefined security levels Each of them has a set of pre-configured firewall rules Provides a easy and fast way of defining different policies on different domain levels The security levels are created in a way, that they suit most corporations In general, no changes are needed The console provides the possibility to change existing, or create complete new security levels (from scratch)

Page 14 Provided Security Levels There are seven predefined security levels Mobile, Home, Office (default), Strict (disabled), Normal (disabled), Custom (disabled), Network Quarantine “Block all” and “Disabled” (allow all traffic) levels cannot be edited! Network Quarantine is a special security level used by the Intelligent Network Access (INA) feature

Page 15 SECURITY LEVEL RULES Allow Web Browsing Security Levels Structure SERVICES HTTP / Hyper Text Transfer Protocol out HTTPS (SSL) out FTP / File Transfer Protocol out 1 2 3

Page 16 Finetuning Security Levels Define location for sub-domain and host specific rules Only possible on root level! Choose the security level to edit Disable/Enable rules Doesn’t delete the rule! Edit, add or clear (delete) rules Restore or force security levels Choice: Active or all security levels Allow and place user defined rules Recommended to leave “disabled”

Page 17 The auto-selection feature enables the automatic switching between different Internet Shield security levels, based on specific arguments Rules are read from top to down (first rule matching will be applied) Specified arguments (IP address or network) are referring to pre-defined methods (e.g. Default Gateway IP address) Never: Disables the rule (no argument needed) Always: Applies the rule, argument disregarded (used at last rule) Using Security Level Autoselection

Page 18 Creating Auto-selection Rules Goal Hosts connected to the LAN should automatically use the ”Office” security level, and host outside the LAN should switch to the ”Mobile” security level

Page 19 Office Rule Priority: 1 Security Level: 40office (security level ID) Method1: Default Gateway IP Address (most common method) Argument1: Method2:Always (default method)

Page 20 Mobile Rule Priority: 2 (doesn’t automatically increment!) Security Level: 20office (security level ID) Method1: Always (last catch rule) Argument1: No argument needed Method2: Always (default method)

Page 21 Allow only the needed services, deny all the rest In this way the security risk is minimized and well-known The drawback is that when new services are needed the firewall must be reconfigured, but this is a small price for the security The opposite concept, to only deny dangerous services and allow the rest is not acceptable No one can tell with certainty, which services are dangerous or might become dangerous in the future when a new security problem is discovered. Principles for Designing Firewall Rules

Page 22 Principles for Designing Firewall Rules 1.Deny rules for the most dangerous services or hosts, optionally with alerting 2.Allow rules for much-used common services and hosts 3.Deny rules for specific services you want alerts about, e.g. trojan probes, with alerting 4.More general allow rules 5.Deny everything else

Page 23 Proper Alerting Proper alerting can only be done by having proper granularity in the rule set: one rule for each type of alert you want “Broad” rules will generate a lot of alerts, any important information may be lost in large volumes of useless noise If you really want alerts on the last rule (deny everything else) then it might be a good idea to have deny rules without alerting before it that drop high-volume traffic with little interest A bad decision would be to alert on network broadcasts in a corporate LAN

Page 24 Good Practice Allow only the needed services, deny the rest Keep it simple and efficient For normal workstations, deny all inbound traffic For optional security measures, deny services that transfer confidential information (password etc) over the network Deny POP, IMAP, SMTP, FTP, Telnet etc to /0

Page 25 Example: Simple Ruleset Outbound traffic First rule allows outbound TCP & UDP to everywhere (for example web browsing is possible) Protocols used during web browsing TCP port 80 (HTTP) TCP or UDP port 53 (DNS) Bi-directional traffic Second rule drops all other traffic

Page 26 Basic Desktop Policy Managed host x Inbound traffic Outbound traffic TCP, UDP ICMP

Page 27 Basic Desktop Policy

Page 28 PortDescription 135 RPC (Remote Procedure Call) DCOM (Distributed Component Object) Allows remote computer to send commands to another computer. Used by services like DNS (Domain Name System) 137,138 & 139Windows Networking using SMB over NBT (Netbios) (Windows NT and 9X) 445Windows Networking using SMB directly over TCP (Windows 2000 and later) SMB over Netbios...Still needed?

Page 29 Windows Networking Rules

Page 30 More Strict Destop Policy Managed host x DNS Server Mail Server File Server DMZ /24 LAN / Inbound traffic Outbound traffic External (allowed) External (denied) Internal (allowed) TCP SMTP POP, IMAP SMTP POP, IMAP SMB DNS

Page 31 More Strict Desktop Policy

NETWORK QUARANTINE CONFIGURATION

Page 33 Who Is Connecting To My Network? It is in the interest of every corporation to prevent unauthorized hosts from connecting to the company network Virus infections in data networks have become an increasingly serious problem Physically guarding network sockets is not going to be the solution An automated system is needed, checking the host protection before granting network access Anti-Virus protection status (e.g. real-time protection check) Firewall protection status (e.g. packet filter status check)

Page 34 Policy Manager Network Security Policy Manager Server provides two different solutions Network Admission Control (NAC) Solution developed by Cisco Systems Supported by Anti-Virus Client Security 6.x No centralized management Network Quarantine (a.k.a. Intelligent Network Access INA) Solution developed by F-Secure Complete integration in Internet Shield Centralized management possible

Page 35 Using Network Quarantine Network Quarantine is disabled by default Very simple to enable (Firewall Security Levels/Network Quarantine) Monitors two host conditions Virus definitions update status (age, default settings 4 days) Real-time scanning status If one of the conditions applies, then the host is quarantined (security level switches to “Network Quarantine”)

Page 36 Example: Host Access Restrictions Network traffic is restricted Reason: Real-time scanning is disabled Solution: Re-enable real-time scanning Important: Administrators should restrict changes to system critical settings!

Page 37 Network Quarantine Security Level Access limited to F-Secure Update Servers Automatic Update Server/s Automatic Update Proxy/ies F-Secure Root Update Server Network access will be granted once the computer has Re-activated real-time scanning Updated the virus definitions

APPLICATION CONTROL CONFIGURATION

Page 39 Application Control Features Application Connection Control Monitors applications sending and receiving information (client and server applications) Protects from trojans sending out confidential information (trojan defense) Component supports complete remote administration (all settings) Enhanced features Memory write protection (application manipulation control) Process creation protection (application launch control) No central management Feature enabling or disabling as only PMC setting

Page 40 Application Connection Control Operation Managed Hosts F-Secure Policy Manager Application traffic Policy traffic x x x

Page 41 Rules Wizard Connection Properties At first, you have to define the connection properties Act as client (outbound, connecting) Act as server (inbound, listening) It makes no sense to allow inbound connections for client applications (e.g. Internet Explorer)

Page 42 Rules Wizard User Messages As a second step define, how the application connection policy is informed to the end user No message (completely transparent) Default message (defined in MIB tree) Customized message

Page 43 Rules Wizard Target Domain Selector New application instances cannot be created manually on the PMC They are informed by the managed hosts (reporting needs to enabled!) Not all the hosts might report the same applications Still you might want to force certain host applications to the whole domain The rules Wizard has a domain target selector Simple and fast to create company wide application control rules

Page 44 Creating the Application List 1.Create a test environment representing your production computers (operating systems, service packs, applications, etc.) 2.Import these hosts to the centrally managed domain 3.Define rules for the reported applications 4.Distribute the policies

Page 45 Configuration Tips Key settings 1.Action on Unknown Applications = Deny (inbound and outbound) 2.Report to Administrator = Report 3.Application Control Enabled = Yes 4.Memory Write Protection Enabled = No 5.Process Creation Protection Enabled = No

INTRUSION PREVENTION

Page 47 Recommended Configuration Intrusion Prevention is enabled by default Similar to Network Quarantine, IDS configuration is really simple Action on malicious packet: Log without dropping packet (default) Alert severity: Warning (default) Detection sensitivity: 100 % (default)

Page 48 Detection Sensitivity Possibility of adjusting the detection sensitivity has two main purposes Reducing the amount of alerts (false positives) Improving the performance of the managed hosts Using values reduces the amount of false positives 10 %: Maximum network performance, minimum alerts 50 %: Only malicious patterns are verified and reported 100 %: All existing patterns are verified and reported

Page 49 Monitoring Network Attacks Possible network attacks can be monitored with several user interfaces Anti-Virus Client Security user interface Policy Manager Console Internet Shield web interface Most common way is to use the Policy Manger Console Possibility of monitoring the whole policy domain, rather than a specific host

Page 50 Example: Host Intrusion Portscan on specific host Local user interface reports alerts 4 different static firewall rule hits (red) 1 intrusion alert (Fin scan, yellow)

Page 51 Monitoring Network Attacks Using Policy Manger Console Most recent attack visible in the Anti-Virus Mode Summary tab Direct link to Internet Shield status information (affected host/s, attack time, etc.)

Page 52 Summary What can Internet Shield be used for? Internet Shield remote administration Firewall configuration Network Quarantine configuration Application Control configuration Intrusion Prevention configuration