Trend MicroTM Deep SecurityTM 20 Training for Certified Professionals eBook Copyright © 2021 Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, InterScan, VirusWall, ScanMail, ServerProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Portions of this manual have been reprinted with permission from other Trend Micro documents. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted. Information in this document is subject to change without notice. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Released: February 18, 2021 Trend Micro Deep Security 20 Software Courseware v1.1 Trend Micro™ Deep Security™ 20 Training for Certified Professionals Student Guide Copyright © 2021 Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, InterScan, VirusWall, ScanMail, ServerProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Portions of this manual have been reprinted with permission from other Trend Micro documents. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted. Information in this document is subject to change without notice. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Released: February 18, 2021 Trend Micro Deep Security 20 Software Courseware v1.1 Trend Micro Deep Security 20 Training for Certified Professionals - Student Guide Lesson 1: Deep Security Overview.................................................................................................................... 1 Trend Micro Solutions ............................................................................................................................................... 1 User Protection ................................................................................................................................................... 1 Network Defense ............................................................................................................................................... 2 Hybrid Cloud Security ...................................................................................................................................... 2 Trend Micro Smart Protection Network ...................................................................................................... 2 Visibility and Control ........................................................................................................................................ 3 Evolution of the Data Center ................................................................................................................................. 3 Trend Micro XGen™ Security ................................................................................................................................. 4 Smart .................................................................................................................................................................... 4 Optimized ............................................................................................................................................................ 4 Connected ........................................................................................................................................................... 4 Deep Security ............................................................................................................................................................. 5 Deployment Options ......................................................................................................................................... 6 Deep Security Protection Modules ....................................................................................................................... 8 Anti-Malware ...................................................................................................................................................... 8 Web Reputation ................................................................................................................................................. 8 Firewall ................................................................................................................................................................. 9 Intrusion Prevention ......................................................................................................................................... 9 Integrity Monitoring .......................................................................................................................................... 9 Log Inspection ...................................................................................................................................................10 Application Control ..........................................................................................................................................10 Deep Security Components .................................................................................................................................... 11 Deep Security Manager .................................................................................................................................... 11 Database .............................................................................................................................................................. 11 Deep Security Manager Web Console ......................................................................................................... 12 Deep Security Agent ........................................................................................................................................ 12 Deep Security Relay ......................................................................................................................................... 12 Apex Central ...................................................................................................................................................... 12 Deep Security Virtual Appliance ................................................................................................................... 13 Deep Security Notifier ..................................................................................................................................... 13 Trend Micro Smart Protection Network ..................................................................................................... 13 Trend Micro Smart Protection Server ......................................................................................................... 13 Deep Security Smart Check ...........................................................................................................................14 Deep Security Scanner ....................................................................................................................................14 Deep Discovery Analyzer ...............................................................................................................................14 Third-Party Authentication ............................................................................................................................14 Threat Detection ......................................................................................................................................................15 Detecting Threats at the Entry Point ..........................................................................................................15 Detecting Threats Pre-execution .................................................................................................................15 Detecting Threats at Runtime .......................................................................................................................16 Detecting Threats at the Exit Point .............................................................................................................16 Review Questions ..................................................................................................................................................... 17 Lesson 2: Deep Security Manager .................................................................................................................. 19 Deep Security Manager ..........................................................................................................................................19 Deep Security Manager System Requirements .......................................................................................20 Operating System ............................................................................................................................................20 Database ...................................................................................................................................................................20 Database Requirements ................................................................................................................................20 Supported Databases ...................................................................................................................................... 21 Database Communication .............................................................................................................................22 Database Sizing ............................................................................................................................................... 23 © 2021 Trend Micro Inc. Education i Trend Micro Deep Security 20 Training for Certified Professionals - Student Guide Database Installation Requirements ..........................................................................................................24 Deep Security Manager Architecture ................................................................................................................26 Apache Tomcat ................................................................................................................................................26 Web Client .........................................................................................................................................................26 Manager Core ...................................................................................................................................................26 Jasper Reports .................................................................................................................................................26 Communication Ports ..................................................................................................................................... 27 Network Communication ...............................................................................................................................28 Configuration Settings ...................................................................................................................................28 Multiple Deep Security Manager Nodes ............................................................................................................29 High Availability ...............................................................................................................................................29 Performing Operations Through the Deep Security Manager Web Console ............................................ 31 Performing Operations Through a Command Line ......................................................................................... 31 Performing Operations Through the Windows Command Prompt ...................................................... 31 Performing Operations Through the Linux Terminal ..............................................................................31 Command Syntax ............................................................................................................................................ 32 Installing Deep Security Manager 20 for Windows Server ...........................................................................34 Deep Security Pre-Installation Checklist ...................................................................................................34 Deep Security Manager Readiness Check .................................................................................................34 Installing Deep Security Manager for Windows Server .........................................................................36 Installing Deep Security Manager for Linux .............................................................................................47 Logging into the Deep Security Manager Web Console ............................................................................... 48 Deep Security Manager Digital Certificates .................................................................................................... 50 Upgrading From Deep Security 12 .......................................................................................................................51 Upgrading From Deep Security 11 .......................................................................................................................55 Review Questions ................................................................................................................................................... 60 Lesson 3: Deploying Deep Security Agents............................................................................. 61 Deep Security Agent Architecture ......................................................................................................................61 Deep Security Agent System Requirements ............................................................................................62 Deploying Deep Security Agents ........................................................................................................................63 Importing Deep Security Agent Software into Deep Security Manager ............................................63 Installing the Deep Security Agent .............................................................................................................67 Adding the Protected Servers to the Computer list ...............................................................................76 Activating Deep Security Agents ................................................................................................................87 Deep Security Agent Heartbeat ...........................................................................................................................91 Deep Security Manager to Agent Communication ..................................................................................92 Review Questions ....................................................................................................................................................93 Lesson 4: Managing Deep Security Agents............................................................................ 95 Performing Deep Security Agent Operations Through a Command Line ................................................95 Performing Operations Through the Windows Command Prompt .....................................................95 Performing Operations Through the Linux Terminal .............................................................................95 Command Syntax ............................................................................................................................................95 Resetting Deep Security Agents .........................................................................................................................97 Protecting Deep Security Agents From Modification ....................................................................................97 Viewing Computer Protection Status ............................................................................................................... 98 Computers Without a Deep Security Agent ............................................................................................. 98 Computers With an Unactivated Deep Security Agent ..........................................................................99 Computers with an Activated Deep Security Agent ...............................................................................99 Deep Security Relay ...................................................................................................................................... 100 ESXi Server ..................................................................................................................................................... 100 Deep Security Virtual Appliance ................................................................................................................ 100 ii © 2021 Trend Micro Inc. Education Trend Micro Deep Security 20 Training for Certified Professionals - Student Guide Virtual Machine ............................................................................................................................................... 101 Protection Module Installation States .............................................................................................................. 101 Viewing Deep Security Agent Tasks in Progress ................................................................................... 103 Dealing With Offline Agents ............................................................................................................................... 104 Cleaning Up Inactive Agents ............................................................................................................................. 105 Cleaning up Inactive Agent ......................................................................................................................... 105 Reactivate Unknown Agents ...................................................................................................................... 106 Overriding Inactive Agent Cleanup ........................................................................................................... 106 Upgrading Deep Security Agents to Deep Security 20 ............................................................................... 107 Anti-Malware Protection During Upgrades ................................................................................................111 Upgrading Agents on Activation .........................................................................................................................111 Controlling the Agent Version ............................................................................................................................112 Organizing Computers Using Groups .................................................................................................................113 Creating Groups .............................................................................................................................................. 114 Adding Computers to a Group ......................................................................................................................115 Organizing Computers Using Smart Folders ...................................................................................................117 Review Questions ................................................................................................................................................... 119 Lesson 5: Keeping Deep Security Up To Date ....................................................................... 121 Security Updates .....................................................................................................................................................121 Security Update Process ..............................................................................................................................122 Creating Update Bundles ..............................................................................................................................123 Software Updates ................................................................................................................................................. 124 Software Update process ............................................................................................................................ 125 Deleting Imported Agent Packages .......................................................................................................... 125 Scheduling Checks for Updates ......................................................................................................................... 126 Update Source Settings ........................................................................................................................................127 Deep Security Relays ...........................................................................................................................................127 Deep Security Relay Architecture ............................................................................................................. 128 Enabling Deep Security Relays .................................................................................................................. 129 Organizing Relays Into Groups .................................................................................................................. 130 Review Questions .................................................................................................................................................. 135 Lesson 6: Trend Micro Smart Protection............................................................................... 137 File Reputation Service .................................................................................................................................137 Web Reputation Service ...............................................................................................................................137 Census Service ............................................................................................................................................... 138 Predictive Machine Learning Service ....................................................................................................... 138 Certified Safe Software Service ................................................................................................................ 138 Smart Feedback ............................................................................................................................................. 139 Smart Protection Sources .................................................................................................................................. 139 Trend Micro Smart Protection Network .................................................................................................. 140 Smart Protection Server ............................................................................................................................. 140 Configuring the Smart Protection Source ....................................................................................................... 141 Smart Protection Source for File Reputation Service ........................................................................... 141 Smart Protection Source for Web Reputation ....................................................................................... 142 Smart Protection Source for Census, Certified Safe Software and Predictive Machine Learning ...................................................................................................................... 143 Review Questions .................................................................................................................................................. 144 © 2021 Trend Micro Inc. Education iii Trend Micro Deep Security 20 Training for Certified Professionals - Student Guide Lesson 7: Assigning Protection Settings Through Policies ............................................... 145 Policy Structure ..................................................................................................................................................... 147 Policy Inheritance .......................................................................................................................................... 148 Policy-Level Overrides ................................................................................................................................. 149 Computer-Level Overrides .......................................................................................................................... 150 Rule Inheritance ...............................................................................................................................................151 Creating Policies ................................................................................................................................................... 153 Creating a New Policy .................................................................................................................................. 153 Duplicating an Existing Policy .................................................................................................................... 154 Importing an Existing Policy From Another Installation ...................................................................... 155 Running Recommendation Scans ..................................................................................................................... 155 Assigning the Recommendations .............................................................................................................. 158 Performing Ongoing Scans .......................................................................................................................... 161 Scheduling a Recommendation Scan ....................................................................................................... 162 Creating a New Policy Based on a Recommendation Scan ................................................................ 162 Common Objects ................................................................................................................................................... 165 Rules ................................................................................................................................................................. 165 Lists ................................................................................................................................................................... 166 Contexts ........................................................................................................................................................... 166 Firewall Stateful Configurations ................................................................................................................ 169 Malware Scan Configurations ..................................................................................................................... 169 Schedules ........................................................................................................................................................ 170 Syslog Configurations .................................................................................................................................. 170 Tags .................................................................................................................................................................. 170 Review Questions ....................................................................................................................................................171 Lesson 8: Protecting Servers from Malware ........................................................................ 173 Anti-Malware Solution Platform ........................................................................................................................ 174 Anti-Malware Scanning Methods ...................................................................................................................... 175 Virus Scanning ............................................................................................................................................... 175 Spyware and Grayware Scanning .............................................................................................................. 176 Process Memory Scanning .......................................................................................................................... 176 Behavior Monitoring ......................................................................................................................................177 Windows Antimalware Scan Interface (AMSI) ........................................................................................177 IntelliTrap ........................................................................................................................................................ 178 Predictive Machine Learning ...................................................................................................................... 178 Enabling Malware Protection ............................................................................................................................. 179 Defining a Malware Scan Configuration .................................................................................................. 179 Turning the Anti-Malware Module On ...................................................................................................... 186 Assigning the Scan Configuration to a Scan Type ................................................................................ 189 Keeping Deep Security Up To Date on Malware .................................................................................... 193 Viewing Anti-Malware-Related Events ............................................................................................................ 194 System Events ................................................................................................................................................ 194 Computer Events ........................................................................................................................................... 194 Adding Malware to the Allowed List ......................................................................................................... 195 Reviewing Files Identified as Malware ............................................................................................................. 196 Restoring Identified Files ............................................................................................................................. 197 Quarantining Files on Deep Security Agents .......................................................................................... 201 Smart Scan ............................................................................................................................................................ 202 File Reputation .............................................................................................................................................. 203 Querying the File Reputation Service ..................................................................................................... 205 Review Questions ................................................................................................................................................. 208 iv © 2021 Trend Micro Inc. Education Trend Micro Deep Security 20 Training for Certified Professionals - Student Guide Lesson 9: Blocking Malicious Web Sites................................................................................ 209 Trend Micro URL Filtering Engine .................................................................................................................... 209 Credibility Scores ............................................................................................................................................211 Web Reputation Communication ................................................................................................................212 Enabling Web Reputation .....................................................................................................................................212 Turning on Web Reputation protection ....................................................................................................212 Setting the Security Level ........................................................................................................................... 214 Defining Exceptions ...................................................................................................................................... 215 Unblocking Pages ...................................................................................................................................................217 Viewing Web Reputation-Related Events ...................................................................................................... 220 System Events ............................................................................................................................................... 220 Computer Events .......................................................................................................................................... 220 Review Questions ...................................................................................................................................................221 Lesson 10: Filtering Traffic Using the Firewall..................................................................... 223 Enabling Firewall Protection ............................................................................................................................. 224 Turning the Firewall on ............................................................................................................................... 224 Applying Firewall Rules ............................................................................................................................... 225 Creating Custom Firewall Rules ....................................................................................................................... 226 Actions ........................................................................................................................................................... 228 Priority ..............................................................................................................................................................231 Packet Direction .............................................................................................................................................231 Frame Type ......................................................................................................................................................231 Protocol ...........................................................................................................................................................232 Packet Source and Packet Destination ....................................................................................................232 Recommended Firewall Policy Rules ...............................................................................................................233 Rule Order of Analysis .........................................................................................................................................233 Traffic Analysis ..................................................................................................................................................... 236 Tap Mode .........................................................................................................................................................237 Inline Mode ......................................................................................................................................................237 Failure Response Behavior ........................................................................................................................ 238 Anti-Evasion Posture ................................................................................................................................... 239 Advanced Network Engine Options ......................................................................................................... 240 Order of Analysis .................................................................................................................................................. 241 Integrity Check ............................................................................................................................................... 241 Reconnaissance Scans ................................................................................................................................. 241 Check Firewall Rules .................................................................................................................................... 243 Check Stateful Configuration .................................................................................................................... 243 Decrypt SSL Traffic ...................................................................................................................................... 245 Check Intrusion Prevention Rules ............................................................................................................ 245 Important Points to Remember ................................................................................................................ 245 Port Scans .............................................................................................................................................................. 245 Defining Ports to Scan ................................................................................................................................ 246 Scan Triggers ................................................................................................................................................ 247 Scan Results .................................................................................................................................................. 249 Viewing Firewall-Related Events ...................................................................................................................... 250 System Events ............................................................................................................................................... 250 Computer Events ........................................................................................................................................... 251 Review Questions ................................................................................................................................................. 252 Lesson 11: Protecting Servers From Vulnerabilities ........................................................... 253 Blocking Exploits Using Intrusion Prevention ............................................................................................... 254 Virtual Patching ............................................................................................................................................ 254 © 2021 Trend Micro Inc. Education v Trend Micro Deep Security 20 Training for Certified Professionals - Student Guide Detecting Suspicious Network Activity ................................................................................................... 254 Blocking Traffic Through Protocol Control ............................................................................................ 254 Protecting Web Applications ..................................................................................................................... 254 Enabling Intrusion Prevention .......................................................................................................................... 255 Turning the Intrusion Prevention Module On ........................................................................................ 255 Setting the Intrusion Prevention Behavior ............................................................................................ 256 Running a Recommendation Scan ........................................................................................................... 257 Applying the Intrusion Prevention Rules ................................................................................................ 260 Staying Up To Date on Rules Through Ongoing Recommendation Scans ..................................... 262 Types of Intrusion Prevention Rules ............................................................................................................... 263 Rule Groups ........................................................................................................................................................... 264 TippingPoint Equivalent Rule ID Mapping ...................................................................................................... 265 Filtering SSL-Encrypted Traffic ....................................................................................................................... 265 Protecting Web Applications ............................................................................................................................. 270 Patterns ............................................................................................................................................................271 Drop Threshold ..............................................................................................................................................272 Log Threshold ................................................................................................................................................272 Max Distance Between Matches ................................................................................................................273 Viewing Intrusion Prevention-Related Events ...............................................................................................273 System Events ................................................................................................................................................273 Computer Events .......................................................................................................................................... 274 Review Questions ................................................................................................................................................. 275 Lesson 12: Detecting Changes to Protected Servers ......................................................... 277 Enabling Integrity Monitoring ........................................................................................................................... 278 Turning on Integrity Monitoring ............................................................................................................... 278 Applying Integrity Monitoring Rules to a Policy or Computer .......................................................... 279 Building a Baseline for the Computer ..................................................................................................... 282 Periodically Scanning for Changes to a Computer .............................................................................. 284 Detecting Changes ............................................................................................................................................. 284 Viewing Integrity Monitoring-Related Events ............................................................................................... 285 System Events ............................................................................................................................................... 285 Computer Events .......................................................................................................................................... 285 Review Questions ................................................................................................................................................. 287 Lesson 13: Blocking Unapproved Software........................................................................... 289 Enforcement Modes ............................................................................................................................................ 290 Enabling Application Control ............................................................................................................................ 290 Installing Approved Software .................................................................................................................... 290 Running a Malware Scan on the Server ................................................................................................... 291 Enabling Application Control ...................................................................................................................... 291 Detecting software changes ...................................................................................................................... 293 Viewing Application Control-Related Events ................................................................................................ 295 System Events ............................................................................................................................................... 295 Computer Events .......................................................................................................................................... 296 Overriding Application Control Enforcement ........................................................................................ 297 Global Block ........................................................................................................................................................... 299 Pre-Approving Software Updates .................................................................................................................... 299 Maintenance Mode ....................................................................................................................................... 299 Trusted Updater ............................................................................................................................................. 301 Application Control Order of Analysis ............................................................................................................. 301 Resetting Application Control ................................................................................................................... 302 Review Questions ................................................................................................................................................. 304 vi © 2021 Trend Micro Inc. Education Trend Micro Deep Security 20 Training for Certified Professionals - Student Guide Lesson 14: Inspecting Logs on Protected Servers.............................................................. 305 Enabling Log Inspection ..................................................................................................................................... 306 Turning on Log Inspection ......................................................................................................................... 306 Applying Log Inspection Rules .................................................................................................................. 308 Viewing Log Inspection-Related Events ............................................................................................................311 System Events .................................................................................................................................................312 Computer Events ............................................................................................................................................312 Monitoring Windows Events ................................................................................................................................313 Review Questions .................................................................................................................................................. 315 Lesson 15: Events and Alerts .................................................................................................... 317 Event Forwarding ...................................................................................................................................................317 Security Information and Event Management Server .......................................................................... 318 Amazon Simple Notification Service ........................................................................................................ 318 SNMP ................................................................................................................................................................ 319 Web Services API ........................................................................................................................................... 319 Alerts ........................................................................................................................................................................ 319 Viewing Alerts in the Deep Security Manager Web Console ............................................................. 320 Email Notifications For Alerts ....................................................................................................................322 Event Tagging ...................................................................................................................................................... 324 Manual Tagging ............................................................................................................................................. 324 Standard Auto-Tagging ............................................................................................................................... 325 Trusted Source Auto-Tagging ....................................................................................................................327 Trend Micro Certified Safe Software Service ........................................................................................ 329 Reporting .................................................................................................................................................................331 Filtering Report Data ...........................................................................................................................................333 Filtering by Tag ..............................................................................................................................................333 Filtering by Date and Time ........................................................................................................................ 334 Filtering by Computer ................................................................................................................................. 334 Encrypting Reports ...................................................................................................................................... 335 Review Questions ................................................................................................................................................. 336 Lesson 16: Protecting Containers ........................................................................................... 337 Continuous Integration/Continuous Deployment .........................................................................................337 DevOps ............................................................................................................................................................ 338 Software Development Using Containers ...................................................................................................... 338 Concepts and Terminology ................................................................................................................................ 340 Image ............................................................................................................................................................... 340 Repository ...................................................................................................................................................... 340 Tags ................................................................................................................................................................. 340 Registry ........................................................................................................................................................... 340 Container ........................................................................................................................................................ 340 Docker ............................................................................................................................................................. 340 Kubernetes ...................................................................................................................................................... 341 Pods ................................................................................................................................................................. 342 Helm ................................................................................................................................................................. 342 Chart ................................................................................................................................................................ 342 Protecting Containers With Deep Security .................................................................................................... 343 Protecting the Software Build Pipeline ................................................................................................... 344 Protecting the Host at Runtime ................................................................................................................ 347 Review Questions ................................................................................................................................................. 352 © 2021 Trend Micro Inc. Education vii Trend Micro Deep Security 20 Training for Certified Professionals - Student Guide Lesson 17: Automating Deep Security Operations ............................................................. 353 Scheduled Tasks ................................................................................................................................................... 353 Creating Scheduled Tasks .......................................................................................................................... 355 Event-Based tasks ................................................................................................................................................ 355 Creating Event-Based tasks ....................................................................................................................... 356 Quick Start Templates ........................................................................................................................................ 357 Deploying Deep Security Manager in Amazon Web Services Using a CloudFormation Template .......................................................................................................................... 357 Deploying Deep Security Manager in Microsoft Azure Using Quickstarts ..................................... 363 Baking the Deep Security Agent into an Amazon Machine Image .......................................................... 369 Application Programming Interface ................................................................................................................ 370 Setting up the Development Environment ...............................................................................................371 API URL .............................................................................................................................................................371 Authenticating API Requests ......................................................................................................................371 API Reference ........................................................................................................................................................373 API Endpoints ................................................................................................................................................ 374 Command Parameters ................................................................................................................................ 375 API URL ........................................................................................................................................................... 376 Request Samples .......................................................................................................................................... 376 Review Questions ................................................................................................................................................. 378 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense ......... 379 Connected Threat Defense Phases ................................................................................................................. 379 Detect .............................................................................................................................................................. 380 Respond .......................................................................................................................................................... 380 Protect ............................................................................................................................................................ 380 View and Analyze Threats .......................................................................................................................... 380 Connected Threat Defense Requirements .................................................................................................... 380 How Connected Threat Defense Works ........................................................................................................... 381 Trend Micro Apex Central .................................................................................................................................. 382 Connecting Deep Security with Trend Micro Apex Central ............................................................... 383 Deep Discovery Analyzer ................................................................................................................................... 384 Suspicious Activities .................................................................................................................................... 385 Connecting Deep Discovery Analyzer to Apex Central ....................................................................... 386 Populating the Apex Central Product Directory .......................................................................................... 387 Configuring Deep Security for Connected Threat Defense ....................................................................... 389 Creating a Malware Scan Configuration ................................................................................................. 389 Configuring Deep Security to Submit Files to Deep Discovery Analyzer ........................................ 391 Subscribing to the Suspicious Object list ............................................................................................... 392 Enabling Sandbox Analysis ........................................................................................................................ 392 Manually Submitting a File to Deep Discovery For Analysis ..................................................................... 393 Tracking the Submission .................................................................................................................................... 393 Suspicious Objects ............................................................................................................................................... 397 Handling Suspicious Object ........................................................................................................................ 398 Review Questions .................................................................................................................................................. 401 Appendix A: Activating and Managing Multiple Tenants ..................................................403 Segmentation using Multi-Tenancy .................................................................................................................404 Segmentation by Business Unit ................................................................................................................404 Segmentation in a Service Provider Model ............................................................................................405 Tenant Isolation ............................................................................................................................................405 Database Isolation ........................................................................................................................................405 Deep Security Manager Web Console For Tenants ..............................................................................406 viii © 2021 Trend Micro Inc. Education Trend Micro Deep Security 20 Training for Certified Professionals - Student Guide Enabling Multi-Tenancy ...................................................................................................................................... 407 Licensing Modes ...........................................................................................................................................408 Creating Tenants ..................................................................................................................................................409 Tenant Administrator ................................................................................................................................... 410 Tenant Account Confirmation ..................................................................................................................... 411 Managing Tenants ................................................................................................................................................ 412 Tenant State ................................................................................................................................................... 412 Tenant Properties ......................................................................................................................................... 413 Deleting Tenants ............................................................................................................................................ 417 Diagnosing Tenant Issues ............................................................................................................................ 418 Activating Deep Security Agent on Tenants .................................................................................................. 418 Deep Security Relays .................................................................................................................................... 418 Usage Monitoring .................................................................................................................................................. 418 Multi-Tenant Dashboard .............................................................................................................................. 419 Multi-Tenant Dashboard/Reporting ......................................................................................................... 420 Status Monitoring API ................................................................................................................................. 420 Administering Tenants ....................................................................................................................................... 420 Logging into Deep Security Manager as a Tenant ................................................................................ 421 Review Questions ................................................................................................................................................. 422 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance.423 Deep Security Virtual Appliance ...................................................................................................................... 424 Benefits of Using the Virtual Appliance .................................................................................................. 424 Virtual Appliance Deployment Models ............................................................................................................ 425 Deployments Using NSX for vShield Endpoint ...................................................................................... 426 Deployments Using NSX Advanced or Enterprise ................................................................................ 427 Deployments Without NSX ......................................................................................................................... 427 Deploying and Activating the Virtual Appliance Using NSX-V .................................................................. 428 Importing the Deep Security Virtual Appliance Package into Deep Security Manager .............. 428 Adding VMware vCenter to Deep Security Manager ........................................................................... 430 Installing the Guest Introspection Service on VMware ESXi ............................................................. 432 Installing the Deep Security Service on VMware ESXi ........................................................................ 436 Creating an NSX Security Group .............................................................................................................. 439 Creating an NSX Security Policy ............................................................................................................... 441 Applying the NSX Security Policy to the NSX Security Group .......................................................... 447 Activating Deep Security Protection on the Virtual Machines .........................................................448 Viewing Protected Virtual Machines .......................................................................................................450 Deep Security Notifier .................................................................................................................................450 Deep Security Virtual Appliance-Related Communication ........................................................................450 Traffic between the Deep Security Virtual Appliance and Deep Security Manager ..................... 451 Traffic between vCenter Server and Deep Security Manager ........................................................... 451 Traffic between ESXi and Deep Security Manager ............................................................................... 451 Deep Security Manager and VMware vCenter Server ................................................................................. 451 Re-configuring vCenter Server Communication .................................................................................... 451 Deep Security Manager and vCenter Server Synchronization ......................................................... 453 Event-based tasks ........................................................................................................................................454 Agentless Anti-Malware Protection ................................................................................................................ 455 Real-Time Scanning ..................................................................................................................................... 455 On-Demand Scan .......................................................................................................................................... 455 Scan Cache Settings and Concurrent Scan ........................................................................................... 455 Quarantining in Anti-Malware ................................................................................................................... 457 Agentless Integrity Monitoring Protection .................................................................................................... 457 VMware High Availability ................................................................................................................................... 457 Moving Deep Security Virtual Appliance Data ...................................................................................... 459 © 2021 Trend Micro Inc. Education ix Trend Micro Deep Security 20 Training for Certified Professionals - Student Guide Review Questions .................................................................................................................................................460 Appendix C: Troubleshooting Common Deep Security Issues ..........................................461 Diagnostic Logging in Deep Security Manager .............................................................................................. 461 Creating a Diagnostic Package for Deep Security Agents ................................................................. 463 Creating a Diagnostic Package for Deep Security Manager .............................................................. 465 Troubleshooting Offline Agents ....................................................................................................................... 467 Potential Causes ........................................................................................................................................... 467 Possible Solutions ........................................................................................................................................468 Troubleshooting Deep Security Agent Activation Failures .......................................................................469 Possible Solutions ........................................................................................................................................469 Troubleshooting High CPU usage ..................................................................................................................... 471 Possible Solutions ......................................................................................................................................... 471 Troubleshooting Security Update Failures .................................................................................................... 472 Possible Solutions ........................................................................................................................................ 472 Appendix D: What's New in Deep Security 20 .....................................................................475 New Database Support ....................................................................................................................................... 475 New Manager Platform Support ...................................................................................................................... 475 New Agent Platform Support ............................................................................................................................ 475 Google Cloud Platform Support ....................................................................................................................... 476 Upgrade on Activation ........................................................................................................................................ 476 Agent Version Control ........................................................................................................................................ 476 Reboot Requirement Removed for Agent Upgrade .................................................................................... 476 Anti-Malware Protection During an Agent Upgrade ................................................................................... 476 Agentless Anti-Malware for NSX-T .................................................................................................................. 477 Hide AWS Host Groups ....................................................................................................................................... 477 Search Cloud Instance Metadata ..................................................................................................................... 477 AWS Manager-generated External ID ............................................................................................................. 478 Agent Integrity Check ......................................................................................................................................... 478 Deep Security Manager API updates .............................................................................................................. 478 Automate Google and AWS accounts ...................................................................................................... 478 New Anti-malware Features .............................................................................................................................. 478 Windows Antimalware Scan Interface (AMSI) ....................................................................................... 478 Behavior Monitoring Action ....................................................................................................................... 478 Predictive Machine Learning Action ........................................................................................................ 479 Behavior Monitoring on Linux ................................................................................................................... 479 Database Encryption ........................................................................................................................................... 479 Appendix E: FIPS 140-2 Support in Deep Security ...............................................................481 Enable FIPS Mode for Deep Security Manager on Windows ...................................................................... 481 Enable FIPS mode for Deep Security Manager on Linux ........................................................................... 482 x © 2021 Trend Micro Inc. Education Lesson 1: Deep Security Overview Lesson Objectives: After completing this lesson, participants will be able to: • • • List the Deep Security deployment options Identify the roles of each of the Deep Security protection modules List the required and optional components of a Deep Security installation Trend Micro Solutions Trend Micro provides layered content security with interconnected solutions that share data so you can protect your users, network, data center, and cloud resources from data breaches and targeted attacks. NETWORK DEFENSE HYBRID CLOUD SECURITY USER PROTECTION User Protection The threat landscape is constantly changing, and traditional security solutions on endpoint computers can’t keep up. Turning to multiple point products on a single endpoint results in too many products that don’t work together, increasing complexity, slowing users, and leaving gaps in an organization’s security. To further complicate matters, organization are moving to the cloud and need flexible security deployment options that will adapt as their needs change. Trend Micro User Protection is an interconnected suite of security products and advanced threat defense techniques that protect users from ransomware and other threats, across endpoints, gateways and applications, allowing the organization to secure all it users' activity on any application, any device, anywhere. © 2020 Trend Micro Inc. Education 1 Lesson 1: Deep Security Overview Network Defense The enterprise is at the cross-hairs of an increasingly complex array of ransomware, advanced threats, targeted attacks, vulnerabilities, and exploits. Only complete visibility into all network traffic and activity will keep the organization ahead of purpose-built attacks which bypass traditional controls, exploit network vulnerabilities, and either ransom or steal sensitive data, communications, and intellectual property. Trend Micro Network Defense detects and prevents breaches anywhere on the network to protect critical data and reputation. Rapidly detect, analyze, and respond to targeted attacks on your network. Stop targeted email attacks, and detect advanced malware and ransomware with custom sandbox analysis, before damage is done The Trend Micro Network Defense solution preserves the integrity of the network while ensuring that data, communications, intellectual property, and other intangible assets are not monetized by unwanted third parties. A combination of next-generation intrusion prevention and proven breach detection enables the enterprise to prevent targeted attacks, advanced threats, and ransomware from embedding or spreading within their network. Hybrid Cloud Security The Trend Micro Hybrid Cloud Security solution protects enterprise workloads in the data center and the cloud from critical new threats, like ransomware, that can cause significant business disruptions, while helping to accelerate regulatory compliance. Hybrid Cloud Security delivers comprehensive, automated security for physical, virtual and cloud servers. The organization can secure critical data and applications across their cloud and virtualized environments with effective server protection that maximizes their operational and economic benefits. Whether you are focused on securing physical, virtual, cloud, or hybrid environments, Trend Micro provides the advanced server security you need with the Trend Micro Deep Security platform. Available as software, in the Amazon Web Services and Azure marketplace, or as a service, Deep Security provides you with security optimized for VMware, Amazon Web Services, and Microsoft Azure. Trend Micro Smart Protection Network The Trend Micro Smart Protection Network is collection of cloud-based services that mine data around the clock and across the globe to ensure up-to-the-second threat intelligence to immediately stamp out attacks before they can harm valuable enterprise data assets. Trend Micro rapidly and accurately collates this wealth of global threat intelligence to customize protection to the specific needs of your home or business and uses predictive analytics to protect against the threats that are most likely to impact you. 2 © 2020 Trend Micro Inc. Education Lesson 1: Deep Security Overview To maintain this immense scale of threat protection, Trend Micro has created one of the world’s most extensive cloud-based protection infrastructures that collects more threat data from a broader, more robust global sensor network to ensure customers are protected from the volume and variety of threats today, including mobile and targeted attacks. New threats are identified quickly using finely tuned automated custom data mining tools and human intelligence to root out new threats within very large data streams. Visibility and Control Whether you are operating in the data center, the cloud, or across a hybrid environment, you can manage a comprehensive set of security capabilities from one single management console providing and strong level of visibility and control. Evolution of the Data Center The data center has gone through significant evolution over the years as new platforms for hosting workloads have been introduced. Physical, rack-mounted servers running Windows, Linux, Unix or Solaris were once the norm, but many organizations took advantage of the benefits of virtualization to reduce the amount of hardware they had to manage. When cloud technologies became more prominent, many of these physical and virtual workloads were transitioned to cloud platforms such as Amazon Web Services or Microsoft Azure. Emerging technologies such containers and serverless are now becoming popular and presents another possible transition point for the workloads in the data center. Physical Virtual Cloud Containers Serverless This constantly evolving infrastructure presents challenges to organizations as each new technology requires a reworking of the data center and retraining of the staff responsible for its operation. Since organizations may use a mix of technologies within the same data center, the tools used to protect the workloads running in the data center must be supported on all of the platforms being used. © 2020 Trend Micro Inc. Education 3 Lesson 1: Deep Security Overview Trend Micro XGen™ Security Trend Micro Hybrid Cloud Security solution, powered by XGen, delivers a blend of cross-generational threat defense techniques that are smart, optimized, and connected to protect servers and applications across the modern data center and the cloud – all while preventing business disruptions and helping with regulatory compliance. Smart Trend Micro solutions, powered by XGen, protect against the full range of known and unknown threats using a cross-generational blend of threat defense techniques that applies the right technique at the right time, powered by global threat intelligence. Optimized Trend Micro solutions, powered by XGen, deliver security solutions to protect users, networks, and hybrid cloud environments – all designed specifically for and tightly integrated with leading platforms and applications, like VMware, Amazon Web Services (AWS), Microsoft Azure, Google Cloud, Office365, and more. Connected Trend Micro solutions, powered by XGen, speeds the time to response with automatic sharing of threat intelligence across security layers and centralized visibility and control. XGen™ security uses proven techniques to quickly identify known good or bad data, freeing advanced techniques to more quickly and accurately identify unknown threats. This identification in rapid succession with righttime technology regardless of location and device across a connected system, maximizes both visibility and performance. This core set of techniques powers each of the Trend Micro solutions, in a way that is optimized for each layer of security: hybrid clouds, networks, and user environments. 4 © 2020 Trend Micro Inc. Education Lesson 1: Deep Security Overview Deep Security The Deep Security platform is at the core of the Trend Micro Hybrid Cloud Security solution. Deep Security provides advanced server security for physical, virtual, and cloud-based computers and delivers multiple security techniques in a single product. Deep Security makes the deployment and management of security faster and easier, simplifying the transition from physical to virtual, and to the cloud. It protects enterprise applications and data from breaches and business disruptions without requiring emergency patching. This centrally-managed platform consolidates security operations within a single management dashboard for all capabilities and simplifies security operations while enabling regulatory compliance and accelerating the ROI of virtualization and cloud projects. Deep Security is FIPS certified. Deep Security consists of the Manager application, responsible for creating security policy and managing servers, along with an Agent application, responsible for enforcing the policies on the managed servers. A Web-based management console allows administrators to access policies, settings and computers. Deep Security Manager Deep Security Manager Web Console Deep Security Agents Deep Security protects servers against zero-day malware and ransomware, identifies suspicious behavior, shields the network from vulnerabilities before they can be exploited and detects and stops network-based attacks while minimizing operational impact from resource inefficiencies and emergency patching. As a hybrid cloud solution, Deep Security seamlessly integrates with cloud platforms including Amazon Web Services (AWS), Microsoft Azure, Google Cloud and VMware vCloud Air, enabling you to extend data center security policies to cloud-based workloads. With a wide range of capabilities optimized across environments, Deep Security empowers enterprises and service providers to offer a differentiated and secure multi-tenant cloud environment to their users. © 2020 Trend Micro Inc. Education 5 Lesson 1: Deep Security Overview Deployment Options Deep Security can be deployed to protect the workloads in the datacenter in a few different ways: • Installed software You can buy Deep Security software and install it on a local Windows Server or Red Hat Linux server, on an Amazon Web Services (AWS) instance, or on an Azure or Google Cloud virtual machine. Deep Security can also protect virtual machines on single VMware server or VMware images through ESXi. • Software as a Service Cloud One™ - Workload Security (previously known as Deep Security as a Service) delivers a complete set of security capabilities through a software-as-a-service model. When Workload Security is deployed as a service, you have nothing to install or configure and all updates and security data are stored for you. You also pay only for what you use through usage-based pricing. Administrators connect to their instance of Workload Security through a URL provided by Trend Micro. 6 © 2020 Trend Micro Inc. Education Lesson 1: Deep Security Overview • Marketplace A cloud marketplace is an online storefront operated by the cloud service provider that helps their customers easily find and buy software and services that are built on, integrate with, or complement the cloud provider's offerings. In the Amazon Web Services and Microsoft Azure Marketplaces, Deep Security is available as a software piece and as a service, which customers can purchase. When purchasing Deep Security through the Marketplace, service fees conveniently show up on their respective Marketplace bill without the need of a separate invoice specific for Deep Security. Quick Start templates are available to get Deep Security up and running quickly and easily. © 2020 Trend Micro Inc. Education 7 Lesson 1: Deep Security Overview Deep Security Protection Modules Deep Security provides a collection of protection modules to ensure server, application, and data security across physical, virtual, and cloud servers, as well as virtual desktops. Intrusion Prevenon An-Malware Firewall HYBRID CLOUD SECURITY Web Reputaon Applicaon Control Integrity Monitoring Log Inspecon These modules can be licensed in many different combinations and can leverage both agent-based and agentless protection mechanisms. In agent-based models, the computers (physical or virtual machines) are protected by in-guest Deep Security Agents whereas in agentless environments, the virtual machines are protected by a Deep Security Virtual Appliances running on each ESXi server. The protection modules perform similarly in both physical agent-based or virtual agentless environments, though, depending on the environment, some protection modules may require an on-host agent. Anti-Malware The Anti-Malware module detects and blocks malicious software such as viruses, trojans, spyware, ransomware and other applications intended to harm the server. It is based on the Trend Micro AntiMalware Solution Platform in conjunction with the Trend Micro Smart Protection Network. Antimalware protection can occur in real-time, can be run on demand, or can be set up to run on a schedule. A variety of techniques including behavior monitoring and machine learning enable Deep Security to provide protection against emerging malware that would not be captured by traditional pattern-based malware scanning. Web Reputation The Web Reputation module tracks the credibility of websites to safeguard servers from malicious URLs. It integrates with the Trend Micro Smart Protection Network to detect and block Web-based security risks, including phishing attacks. The Web Reputation module blocks servers from accessing compromised or infected sites, blocks users from communicating with Communication & Control servers (C&C) used by cybercriminals and blocks access to malicious domains registered for perpetrating malicious activities. Protection is provided whether a user types a URL in a Web browser or an application makes an internal reference to a URL. 8 © 2020 Trend Micro Inc. Education Lesson 1: Deep Security Overview Firewall The Firewall module provides broad coverage for all IP-based protocols and frame types as well as fine-grained filtering for ports and IP and MAC addresses through a bidirectional, stateful firewall. The firewall examines the header information in each network packet to allow or deny traffic based on direction, specific frame types, transport protocols, source and destination addresses, ports, and header flags. The firewall module can prevent denial of service attacks as well as block reconnaissance scans. Intrusion Prevention The Intrusion Prevention module examines all incoming and outgoing traffic at the packet level, searching for protocol deviations, policy violations, or any content that can signal an attack. This module detects and blocks known and zero-day attacks. Where the Firewall module examines the header information in the packet, the Intrusion Prevention module examines the payload information. The Intrusion Prevention module can implement rules to drop traffic designed to leverage unpatched vulnerabilities in certain applications or the operating system itself. This virtual patching protects the host while awaiting the application of the relevant patches. Intrusion Prevention can detect activity that is considered suspicious, such as ransomware or remote access as well as detecting and blocking traffic that does not conform to protocol specifications, allowing Deep Security Agents to detect packet fragments, packets without flags, and similar anomalies. This protection can also block traffic associated with specific applications like Skype or file-sharing utilities. Built-in Intrusion Prevention rules are provided for over 100 applications, including database, web, email and FTP servers. The Intrusion Prevention module automatically delivers rules that shield newly discovered vulnerabilities (within hours), and these can be pushed out to thousands of servers within minutes, without a system reboot. Integrity Monitoring The Integrity Monitoring module monitors critical operating system and application files, including directories, custom files, registry keys and values, open ports, processes and services to provide real time detection and reporting of malicious and unexpected changes. The Integrity Monitoring modules tracks both authorized and unauthorized changes made to a server instance. The ability to detect unauthorized changes is a critical component in a security strategy as it provides the visibility into changes that could indicate the compromise of an instance. Trusted event tagging reduces administration overhead by automatically tagging similar events across the entire data center. © 2020 Trend Micro Inc. Education 9 Lesson 1: Deep Security Overview Log Inspection The Log Inspection module collects and analyzes operating system and application logs for suspicious behavior, security events, and administrative events across the data center. This module optimizes the identification of important security events buried in multiple log entries. Suspicious events can be forwarded to a Security Information and Event Management (SIEM) system or to a centralized logging server for correlation, reporting and archiving. The Log Inspection module leverages and enhances the Open Source Security (OSSEC) Log Inspection Engine. Log inspection requires running some analysis on the computer and as a result, it is not supported in agentless deployments. Application Control The Application Control module monitors computers for any software changes that drift away from an approved software inventory. It detects all changes to executables, including users installing unapproved software, new PHP pages or Java applications, unscheduled auto-updates, and zero-day malware. This module can lock down software so that only approved applications can execute or stop specific unwanted software from running. During a software update or maintenance window, the Application Control module can be configured to approve the change, while still preventing software on the block list from executing. Application Control requires running some analysis on the computer and as a result, it is not supported in agentless deployments. 10 © 2020 Trend Micro Inc. Education Lesson 1: Deep Security Overview Deep Security Components The Deep Security platform consists of multiple components that work together to provide effective and reliable protection for physical, virtual and cloud-based environments. Authencaon Acve Directory Database Google Cloud VCloud Amazon Web Services Azure Deep Security Manager Web Console Second-Factor Authencator Apex Central SAML Identy Provider Cloud Servers Agentless Support VCenter Deep Security Manager NSX Manager Deep Discovery Analyzer VMware ESXi Deep Security Scanner Deep Security Virtual Appliance VM VM VM Deep Security Smart Check Smart Protecon Server Windows Server Linux Server Solaris Server Physical Servers HPUX/AIX Server Container Registry Relays Windows VM Linux VM Virtual Servers Deep Security Manager Deep Security Manager is a centralized management system to create and manage comprehensive security policies and deploy protection to Deep Security Agents and Deep Security Virtual Appliances. Deep Security Manager does not provide protection itself, but instead, manages the rules and policies which are distributed to the enforcement components in the system. Deep Security Manager is supported on 64-bit Windows and Linux Red Hat Operating Systems. Database Deep Security Manager requires a database for storing the information it needs to function. The database must be installed and a user account with the appropriate permissions must be created before installing Deep Security Manager. Microsoft SQL Server, Oracle or PostgreSQL databases are supported, in addition, cloud deployments using the Marketplace option allows the use of the vendor’s cloud-enabled database as well. © 2020 Trend Micro Inc. Education 11 Lesson 1: Deep Security Overview Deep Security Manager Web Console Administration of the system performed through a Web-based interface. Administrative users with an appropriate role authenticate to the Deep Security Manager Web console and perform policy or computer-related tasks through a supported browser with cookies enabled. Administrative users authenticate to the console using Deep Security-created credentials or a user name and password stored in Microsoft Active Directory. Multi-factor authentication can be implemented to provide an additional level of security on the login process. Some operations can also be performed through the Windows Command Prompt. Deep Security Agent The protection layer of the Deep Security system is provided through the Deep Security Agent. This software component is installed on the server to provide protection though a collection of modules, including Anti-Malware, Web Reputation, Firewall, Intrusion Prevention, Integrity Monitoring, Log Inspection and Application Control. Deep Security Agents are supported on Windows, Linux, Solaris, HP-UX, and AIX and can be installed on either physical servers, virtual machines or cloud servers. Deep Security can also operate without an on-host Agent for specific operations in a VMware environment using the Deep Security Virtual Appliance. Deep Security Relay The Deep Security Relay is a Deep Security Agent with relay functionality enabled. Deep Security Relays download and distribute security and software updates from the Trend Micro Global Update Server to Deep Security Agents and Deep Security Virtual Appliances. You must have at least one Deep Security Relay enabled in your environment to keep your protection up-to-date. Relays improve performance by distributing the task of delivering updates throughout your Deep Security installation. Apex Central Apex Central (previously known as Control Manager) provides a single unified interface to manage, monitor, and report across multiple layers of security and deployment models. Customizable data displays allow administrators to rapidly assess status, identify threats, and respond to incidents. With Apex Central, administrators can view security events in Deep Security, Apex One, as well as other Trend Micro products, from a single interface. User-based visibility shows what is happening across all endpoints and servers, enabling administrators to review policy status and make changes across all devices. In the event of a threat outbreak, administrators have complete visibility of an environment to track how threats have spread. Apex Central is responsible for compiling the Suspicious Objects for use in Connected Threat Defense. This list based on information provided by other components in the infrastructure. 12 © 2020 Trend Micro Inc. Education Lesson 1: Deep Security Overview Deep Security Virtual Appliance The Deep Security Virtual Appliance is a virtual machine that transparently enforces security policies on VMware ESXi virtual machines through NSX, allowing agentless protection through the AntiMalware, Web Reputation, Firewall, Intrusion Prevention, and Integrity Monitoring modules. Some restrictions on Anti-Malware and Integrity Monitoring might be in effect when using the Deep Security Virtual Appliance, for example, related to damage clean-up. If protection through the Log Inspection and Application Control module is required on a virtual machine, a Deep Security Agent can be installed on the virtual machine itself. The Deep Security Virtual Appliance runs as a VMware virtual machine and protects other virtual machines running on the same ESXi Server, each with its own individual set of security policies. The implementation of Protection Modules with the Deep Security Virtual Appliance depends on limitations that exist within the licensing structure of VMWare NSX. Deep Security Notifier The Deep Security Notifier is a Windows System Tray application that communicates the state of the Deep Security Agent and Deep Security Relay to client machines. The Deep Security Notifier displays a pop-up notifications in the System Tray when a Deep Security Agent begins a scan, blocks malware or identifies a malicious web page. The Notifier also provides a console utility that allows the user to view events and check the status of the agent. The Deep Security Notifier gets installed with the Deep Security Agent by default on Windows servers. It may be installed separately on Windows VMs protected by the Deep Security Virtual Appliance. In this case, the Anti-Malware module must be licensed and enabled on the VM for the Deep Security Notifier to display information. Trend Micro Smart Protection Network Deep Security takes advantage of the Trend Micro Smart Protection Network to deliver real-time updates of malware signatures and patterns. This cloud-client infrastructure delivers protection from emerging threats by continuously evaluating and correlating threat and reputation intelligence for websites, email sources, and files. Trend Micro Smart Protection Server One or more optional standalone Smart Protection Servers can be also be deployed locally on the network to improve access time and increase privacy on behalf of Anti-Malware and Web Reputation modules. © 2020 Trend Micro Inc. Education 13 Lesson 1: Deep Security Overview Deep Security Smart Check Deep Security Smart Check performs pre-runtime scans of Docker images to detect OS vulnerabilities and malware, enabling you to fix issues before they reach the orchestration environment. Deep Security Scanner Deep Security Scanner provides integration with the SAP NetWeaver platform and performs antimalware scans and reviews the information to identify potential threats in SAP systems. Note: Deep Security Scanner is not supported on computers where the Deep Security Agent is enabled as a Relay. Deep Discovery Analyzer Deep Discovery Analyzer is a secure virtual environment used to analyze samples submitted by Trend Micro products. Sandbox images allow observation of file and network behavior in a natural setting without any risk of compromising the network. Deep Discovery Analyzer performs static analysis and behavior simulation to identify potentially malicious characteristics. During analysis, Deep Discovery Analyzer rates the characteristics in context and then assigns a risk level to the sample based on the accumulated ratings which is then forwarded to Trend Micro Apex Central to build the suspicious objects list. Third-Party Authentication In addition to a Deep Security-created username and password for administrators, other authentication methods are supported. Microsoft Active Directory When configured, administrative users can authenticate to the Deep Security Manager Web Console using credentials stored in Microsoft Active Directory. In addition, Deep Security Manager can populate its Computers list using information retrieved from Active Directory servers. To import these hosts, the Add Directory Wizard performs an LDAP query to retrieve the necessary information from Active Directory. Second-Factor Authenticators When configured, administrative users can authenticate to the Deep Security Manager Web Console using second-factor authenticators such as Google Authenticator or Duo. With second-factor authentication in place, administrative users will be required to enter their Deep Security Manager user name and password, followed by the response from the configured authentication device. 14 © 2020 Trend Micro Inc. Education Lesson 1: Deep Security Overview SAML Identity Providers When configured, administrative users can authenticate to the Deep Security Manager Web Console using credentials provided by an external SAML 2.0 Identity Provider. This mechanism enables single sign-on to the management interface for administrative users. In this configuration, Deep Security Manager behaves as the SAML Service Provider. Threat Detection There are several points at which threats could enter the system through the server computer. A variety of automated threat detection techniques can be enabled in Deep Security to monitor for threats on the server. Entry point Pre-execution Runtime Exit point Detecting Threats at the Entry Point Entry point detection uses methods to capture threats as they enter the server. These methods include: • Web Reputation: Web reputation blocks connections to malicious Web sites. This is done at the kernel level, allowing Deep Security to block programs on the server from accessing the site. • Virtual Patching: Deep Security block exploits of operating system and application vulnerabilities by applying a virtual patch. Trend Micro provides timely protection for exploits and vulnerabilities with the industry’s most timely vulnerability research. Detecting Threats Pre-execution Detection methods used in the pre-execution phase capture and block threats as they are written to disk or to memory. These methods include: • Packer Detection: Deep Security identifies packed malware as it unpacks prior to execution, blocking threats attempting to hide themselves in memory. • Predictive Machine Learning: File-based threats can be evaluated against a cloud-based model before they are run to predict if the file is malicious. • Application Control: Application control prevents unrecognized software from executing. © 2020 Trend Micro Inc. Education 15 Lesson 1: Deep Security Overview • Variant Protection: Variant protection detects mutations of malicious samples by recognizing known fragments of malware code. • File-based Signatures: The majority of threats still arrive at the server as file-based attacks. File-based signatures provide an effective technique for detecting known malicious items. Detecting Threats at Runtime While many threats can be detected as they are written to disk, there are some threats that won’t be detected until they execute. Detection methods used in this phase include: • Behavior Analysis: Powerful behavior analysis techniques provide a clear indication if an attack is taking place based on file behavior. • In-memory Runtime Analysis: Some malware executes only in memory. In-memory runtime analysis can monitor for malicious behavior in memory and stop them once they start running. Detecting Threats at the Exit Point Methods in this phase can detect and block attempts to forward data from the server. Detection methods used in this phase include: 16 • Web Reputation: At this phase, Web reputation protection can block connections to malicious Web sites, such as Command & Control sites. Again, this protection is applied at the kernel level blocking connections from applications running on the server. • Host Intrusion Prevention: Host intrusion prevention detects and blocks malware lateral movement behavior. © 2020 Trend Micro Inc. Education Lesson 1: Deep Security Overview Review Questions 1 Describe the role of the following components in a Deep Security implementation: • Deep Security Notifier • Deep Security Scanner • Trend Micro Smart Protection Network • Deep Security Manager • Deep Discovery Analyzer • Trend Micro Apex Central • Deep Security Smart Check • Deep Security Agent • Deep Security Manager Web console • Active Directory • Deep Security Relay • Deep Security Virtual Appliance • Trend Micro Smart Protection Server • Database 2 List the Deep Security Protection Modules and describe the protection they provide? © 2020 Trend Micro Inc. Education 17 Lesson 1: Deep Security Overview 18 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager Lesson Objectives: After completing this lesson, participants will be able to: • Describe the computer, database and operating system requirements for Deep Security Manager 20 • • Identify Deep Security components and ports • Perform Deep Security Manager actions through the Deep Security Manager Web console or a Command Line • • Install Deep Security Manager 20 on Windows Server Describe how multiple Deep Security nodes can be used for high availability and load balancing Upgrade an existing installation to Deep Security 20 Deep Security Manager Deep Security Manager is a centralized management system for creating and managing comprehensive security policies and deploying protection to Deep Security Agents installed on the servers in the datacenter. Deep Security Manager does not provide protection itself, but instead, manages the rules and policies which are distributed to the enforcement components in the system. The Deep Security Agents in turn forward security events back to Deep Security Manager through the management console allowing preventive actions taken in response to threats. Deep Security Manager can be configured to automate or distribute security updates to servers on-demand. It also generates reports to gain visibility into activity and meet compliance requirements. Deep Security Manager Policies Events Deep Security Agents © 2020 Trend Micro Inc. Education 19 Lesson 2: Deep Security Manager Deep Security Manager System Requirements Many Deep Security Manager operations (such as Updates and Recommendation Scans) require high CPU and memory resources. Trend Micro recommends that each Manager node have four cores and sufficient RAM in high scale environments. The system requirements for Deep Security Manager include: • Minimum Memory: Minimum RAM requirements depend on the number of Agents that are being managed. The recommended can vary from 16GB of RAM and 8GB of Java Virtual Machine (JVM) memory for a small deployment of under 500 Agents to 24GB and 16GB of Java Virtual Machine for larger deployments of 20,000 Agents. • • Minimum Disk Space: 200GB recommended Deep Security Manager must have Internet connectivity to download software packages and updates as well as to renew the system license. Operating System Deep Security Manager is available for different operating systems, including: • • Windows Server 2012 R2 (64-bit) • Windows Server 2019 (64-bit) • Red Hat Linux 7 (64-bit) • Red Hat Linux 8 (64-bit) Windows Server 2016 (64-bit) NEW NEW Ensure that the operating system is installed with the latest service pack and patches. Database A database server is required by Deep Security Manager. It can be installed on the same system as Deep Security Manager or on a different system. For on-premise enterprise deployments, Deep Security Manager can use Microsoft SQL Server, Oracle Database Server, or PostgreSQL. A database instance must be created before installing Deep Security Manager. The credentials for a database administrator with appropriate permissions will be required to complete the setup of Deep Security Manager. Cloud deployments using the Marketplace option allows the use of the vendor’s cloud-enabled database as well. In this case, traffic generated by database access will incur charges that will appear on your marketplace statement. Database Requirements The database should be installed on hardware that is equal to or better than the specifications of the best Deep Security Manager node. For optimal performance, the database should have 8-16GB of RAM and fast access to the local or network attached storage. Whenever possible, a database administrator should be consulted regarding the best configuration of the database server. 20 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager Database CPU, memory, and disk space required varies by: • • • • • Number of protected computers Number of platforms where you install Deep Security Agent Number of events (logs) recorded per second (related to which security features are enabled) How long events are retained Size of the database transaction log Supported Databases The following databases are supported: Note: • Oracle Database 19c • Oracle Database 18 • • • Oracle Database 12c • Microsoft SQL Server 2019 • • • • • Microsoft SQL Server 2017 • PostgreSQL 11.x • PostgreSQL 10.x • PostgreSQL 9.6 • • • Amazon RDS for PostgreSQL (for Deep Security Manager for AWS Marketplace) NEW NEW Oracle Database 11g Oracle RDS NEW Microsoft SQL Server 2016 Microsoft SQL Server 2014 Microsoft SQL Server 2012 Microsoft SQL RDS NEW Azure SQL (for Deep Security Manager VM for Azure Marketplace) Amazon Aurora Microsoft SQL Server Express is only supported in very limited deployments of less than 50 protected computers. More computers' events will cause a larger database which Microsoft SQL Server Express cannot handle. SQL Express can potentially be used for proof-of-concept installations, but since it has a 10 GB database size limit, it should never be put into production. Deep Security Manager and the database can be installed on the same computer if the final deployment is not expected to exceed 1000 computers (real or virtual). If you think you may exceed 1000 computers, Deep Security Manager and the database should be installed on dedicated servers. © 2020 Trend Micro Inc. Education 21 Lesson 2: Deep Security Manager Database Communication It is very important that the database and Deep Security Manager be co-located on the same network with a 1GB LAN connection to ensure unhindered communication. The same applies to additional Deep Security Manager nodes. A two millisecond (or 2 million nanoseconds) latency or better is recommended for the connection from the Manager(s) to the database. The speed of the database connection in your environment can be verified in the Database Query Benchmark value, displayed under System Information in the Deep Security Manager Web console. Encrypted Communication NEW For performance reasons, communication between Deep Security Manager and the database is not encrypted by default. The channel between Deep Security Manager and the database may already be secured if they are running on the same computer or they are connected by crossover cable, a private network segment, or tunneling via IPSec. If the communication channel between Deep Security Manager and the database is not secure, you should encrypt the communication between them. In its current design, Deep Security Manager attempts to build an encrypted communication connection with the database server. if it fails, Deep Security Manager uses and unencrypted connection with database server instead. The mechanisms for creating the encrypted connection are built into the database library that Deep Security Manager is based on, therefore, the server certificate does not need to be imported nor any configuration file updated. Check the Help Center for each of supported databases for details on configuring data encryption or SSL connections. If you have already installed Deep Security Manager, stop and restart Deep Security Manager after enabling secure connections on the database. 22 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager Database Sizing The amount of database space required per computer is dependent on the number of event logs recorded and how long they are retained. You can modify the default retention values from the Storage tab under System Settings. As well, additional settings and rules can be configured for each module, which can also increase the overall logging size. The table below estimates database disk space with default event retention settings. If the total disk space for the protection modules you enable is more than the 2 or more modules value, use the smaller estimate. For example, you could deploy 750 agents with Deep Security Anti-Malware, Intrusion Prevention System and Integrity Monitoring. The total of the individual recommendations is 320 GB (20 + 100 + 200) but the recommendation is less (300 GB). Therefore, you would estimate 300 GB. Number of agents AntiMalware Web Reputation Log Inspection Firewall IPS Application Control Integrity Monitoring 2 or more modules 1-99 10 GB 15 GB 20 GB 20 GB 40 GB 50 GB 50 GB 100 GB 100-499 10 GB 15 GB 20 GB 20 GB 40 GB 100 GB 100 GB 200 GB 500-999 20 GB 30 GB 50 GB 50 GB 100 GB 200 GB 200 GB 300 GB 1000-9999 50 GB 60 GB 100 GB 100 GB 200 GB 500 GB 400 GB 600 GB 10,000-20,000 100 GB 120 GB 200 GB 200 GB 500 GB 750 GB 750 GB 1 TB Database disk space also increases with the number of separate Deep Security Agent platforms. For example, if you have 30 agents (maximum 5 versions per agent platform), this increases the database size by approximately 5 GB. © 2020 Trend Micro Inc. Education 23 Lesson 2: Deep Security Manager Database Installation Requirements You must install the database software, create a database instance for Deep Security Manager, and create a user account before you install Deep Security Manager. Refer to your database provider's documentation for instructions on installing your database. Before you start the installation, however, make sure that your installation plan addresses the following requirements for integrating your database with Deep Security Manager. • The database must be located on the same network as Deep Security Manager with a connection speed of 1Gb/s over LAN. (WAN connections are not recommended.) • The database can be installed on the same system as Deep Security Manager or it be installed on a separate dedicated machine. This typically depends on how many protected computers are in your environment. • • The recommended transport protocol is TCP. • Record the account details used in the creation of your database as they will be required during the Deep Security Manager installation process. • If using Microsoft SQL Server, consider the following requirements: The Deep Security database is compatible with database failover protection as long as no alterations are made to the database schema. For example, some database replication technologies add columns to the database tables during replication which can result in critical failures. For this reason, database mirroring is recommended over database replication. - Enable Remote TCP Connections. (See http://msdn.microsoft.com/en-us/ library/bb909712(v=vs.120).aspx) - The database account used by Deep Security Manager must have db_owner rights. - Select the simple recovery model property for your database. (See http:// technet.microsoft.com/en-us/library/ms189272.aspx) - If using Multi-Tenancy, keeping the main database name short will make it easier to read the database names of your tenants. For example, If the main database is MAINDB, the first tenant's database name will be MAINDB_1, the second Tenant's database name will be MAINDB_2, and so on. - When using Named Pipes to connect to an SQL Server, a properly authenticated Microsoft Windows communication channel must be available between the Deep Security Manager host and the SQL Server host. This may already exist if any of these conditions exist: If using Multi-Tenancy, the database account used by Deep Security Manager must have dbcreator rights. · · · The SQL Server is on the same host as Deep Security Manager Both hosts are members of the same domain A trust relationship exists between the two hosts If no such communication channel is available, Deep Security Manager will not be able to communicate to the SQL Server over Named Pipes. • If using Oracle Database Server, consider the following requirements: - 24 Start the Oracle Listener service and make sure it accepts TCP connections. The database account used by Deep Security Manager must be granted the CONNECT and RESOURCE roles and UNLIMITED TABLESPACE, CREATE SEQUENCE, CREATE TABLE and CREATE TRIGGER system privileges. © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager - If using Multi-Tenancy, the database account used by Deep Security Manager must be granted the CREATE USER, DROP USER, ALTER USER, GRANT ANY PRIVILEGE and GRANT ANY ROLE system privileges. - Although Oracle allows special characters in database object names if they are surrounded by quotes, Deep Security does not support these special characters. - Deep Security supports Oracle Real Application Clusters (RAC), including: · · SUSE Linux Enterprise Server 11 SP3 with Oracle RAC 12c Release 1 (v12.1.0.2.0) Red Hat Linux Enterprise Server 6.6 with Oracle RAC 12c Release 1 (v12.1.0.2.0) The default Linux Server Deep Security Policy is compatible with the Oracle Real Application Clusters environment, with the exception of Firewall settings. You can disable Firewall or customize the Firewall settings according to the instructions in the Firewall Settings with Oracle RAC section of the Deep Security Manager Help Center. • If using PostgreSQL, consider the following requirements: - There is no supported migration path for moving from an earlier version of Deep Security with another database to Deep Security 20 with a PostgreSQL database. - To prepare a PostgreSQL database for use with Deep Security Manager, run the following SQL commands: CREATE DATABASE "<database>"; CREATE ROLE "<username>" WITH PASSWORD '<password>'; GRANT ALL ON DATABASE "<database>" TO "<username>"; GRANT CONNECT ON DATABASE "<database>" TO "<username>"; - If using multi-tenancy, users also need the right to create new databases and roles: ALTER ROLE <username> CREATEDB CREATEROLE; - By default, PostgreSQL log files are not rotated, which can lead to the log files using a large amount of disk space. When using PostgreSQL with Deep Security, we recommend that you use these four parameters in the postgresql.conf file to configure log rotation: log_filename log_rotation_age log_rotation_size log_truncate_on_rotation log_rotation_age and log_rotation_size control when a new log file is created. For example, setting log_rotation_age to 1440 will create a new log file every 1440 minutes (1 day), and setting log_rotation_size to 10000 will create a new log file when the previous one reaches 10 000 KB. log_filename controls the name given to every log file. You can use time and date format conversion in the name. - By default, the PostgreSQL deadlock_timeout setting in the postgresql.conf file is configured to 1 second. This means every time a query waits on a lock for more than 1 second, PostgreSQL will launch a check for deadlock condition and will log an error if the logging setting has been configured that way (by default, it is). This can lead to performance degradation on bigger systems, where it can be normal for queries to wait for more than 1 second during load times. On large systems, consider increasing the deadlock_timeout setting. © 2020 Trend Micro Inc. Education 25 Lesson 2: Deep Security Manager Deep Security Manager Architecture Deep Security Manager consists of the following major modules: Apache Tomcat An Apache Tomcat Web and application server is built into Deep Security Manager and is used to run the necessary server-side Java components. Web Client This Web client is responsible for generating the Deep Security Manager Web console, and for implementing access control. Manager Core The Manager Core on Windows or Linux is comprised of compiled Java libraries that are responsible for the bulk of Deep Security Manager functionality, including command queuing and deployment, database access, downloading updates from the security center, and interfacing with various network services (e.g., SMTP, Active Directory, VMware servers, etc.) Jasper Reports Jasper Reports functions as the report generator mechanism running in Tomcat. 26 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager Communication Ports You must make sure the following ports on the computers hosting Deep Security Manager are open and not reserved for other purposes. Deep Security Manager automatically implements specific firewall rules to open the required communication ports on machines hosting Deep Security Relays, Deep Security Agents and Deep Security Virtual Appliances. Deep Security Manager UDP TCP Deep Security Manager Web Console 4119 80/443 Trend Micro AcveUpdate API 4119 80/443 4119 123 4120 SMTP 25 4118 NTP Deep Security Agent/ Virtual Appliance DNS 53 514 53 514 DNS SIEM or Syslog Apex Central 80/443 4122 4118 80/443 4122 Deep Discovery Analyzer 80/443 VMWare vCenter ESXi, NSX 80/443 Deep Security Relay 4123 5274 /5275 Smart Protecon Server NTP 123 8080 80 / 443 SNMP Amazon Web Services 162 8443 Azure Acve Directory SQL Database Server 389 / 636 80/443 1433 11000/11999 14000/14999 Oracle Database Server PostgreSQL Azure SQL Database 1521 5432 © 2020 Trend Micro Inc. Education 27 Lesson 2: Deep Security Manager Network Communication Communication between Deep Security Manager and Deep Security Relays/Agents/Appliances and hypervisors uses DNS hostnames by default. In order for Deep Security deployments to be successful, you must ensure that each computer can resolve the hostname of Deep Security Manager. This requires a DNS entry for the Deep Security Manager host. Note: You will be asked for the Deep Security Manager hostname as part of the installation procedure. If you do not have a DNS entry, enter an IP address during the installation. Configuration Settings On startup, Deep Security Manager uses the following steps to obtain and maintain all required configuration settings: 1 Loads static settings, including the database connection settings from a set of *.properties configuration files. 2 Loads system-wide dynamic configuration settings from the systemsettings database table. 3 Loads host-specific dynamic configuration settings from the hostsystemsettings database table. 4 Loads other dynamic settings from other database tables. dsm.properties This dsm.properties file contains some of the most relevant Deep Security Manager settings, including the database type, connectivity details and credentials. The settings in the file are specified, one per line, using the <name>=<value> format. These values can be specified in clear text or in encrypted format; all encrypted values begin with $1$. To change an encrypted setting in the dsm.properties file, stop the Deep Security Manager service, specify the new value in clear text, save the change and start the service. After startup, Deep Security Manager will encrypt and store the new value in encrypted format. Deep Security Manager rewrites this file each time it starts. Some sample dsm.properties settings are listed in the table below. 28 Setting Value Description database.type SqlServer | Oracle | PostgreSQL Configured database server: Microsoft SQL Server, Oracle, or PostgreSQL. database.name <DB Name> Name of the database in the database server used by Deep Security Manager. Default: dsm. database.SqlServer.server <IP> | <Host> Name of the SQL database server in the network. database.SqlServer.instance <String> Instance name the SQL database server, if different from the default. database.SqlServer.user <String> User name in the SQL database server. database.SqlServer.password <String> Encrypted user password in the SQL database server. © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager configuration.properties This properties file is created in the installation folder by the Deep Security installer and is not modified after that. override.properties The properties specified in this configuration file override the properties specified in the dsm.properties file. This file can be created manually by a support engineer to modify product behavior without affecting the original configuration. This file supports the same configuration settings as in dsm.properties. If Deep Security finds an instance of override.properties during product initialization it will use this file, leaving dsm.properties untouched. If the new settings in override.properties behave as expected, rename the file to dsm.properties. logging.properties The properties in this file control the logging behavior in Deep Security. Multiple Deep Security Manager Nodes You may want to prepare two computers for Deep Security Manager installations. In a production environment, two Deep Security Manager nodes connected to a single database can be set up to provide increased reliability, redundant availability, virtually unlimited scalability, and better performance. By default, the multi-node manager provides the address of both Deep Security Manager nodes to Deep Security Agents and Virtual Appliances, who in turn use the list of addresses to randomly select a node to contact. If neither of the nodes can be reached, it waits until the next heartbeat and tries again. Once the second Deep Security Manager node is created, neither node is more important that the others. High Availability Multi-node installations provide Deep Security networks with failover capability. If one Deep Security Manager is busy, or fails, the rest of the network can fail over to the second. Therefore, whenever possible, having more than one node is advisable. Each node is capable of all tasks and no node is more important than any of the others. Users can sign into any node to carry out their tasks. The failure of any node cannot lead to any tasks not being carried out. The failure of any node cannot lead to the loss of any data. All Deep Security Manager nodes periodically check the health of all other nodes. If the other Manager node loses network connectivity for more than 3 minutes, it is considered offline. The remaining nodes assume its tasks. © 2020 Trend Micro Inc. Education 29 Lesson 2: Deep Security Manager For networks with up to 20,000 Deep Security Agents or Virtual Appliances, having at least two Deep Security Manager nodes is advisable, but not required for scalability. Above 20,000, having at least two nodes is recommended. dsm_1 dsm_2 Manager Node Online Manager Node Online SQL-01 SQL Server Primary Each node must be running the same version of the Deep Security Manager software. When performing an upgrade of the Manager software, the first Manager to be upgraded will take over all Deep Security Manager duties and shut down all the other Deep Security Manager nodes. They will appear as offline in the System Activity panel with an indication that an upgrade is required. dsm_1 dsm_2 Manager Node Online Manager Node Offline (Upgrade Required) SQL-01 SQL Server Primary All critical Deep Security Manager data are stored in the database, therefore, in disaster recovery situations the only consideration to note is the location of the database server and authentication credentials stored in dsm.properties. As all information and settings are stored in the database, it is IMPERATIVE that regular backups of the Deep Security database are scheduled. Database clustering is supported in both Oracle and Microsoft SQL environments and is recommended for disaster recovery situations. Oracle Data Guard and Microsoft SQL database mirroring both have no side effects in regular Deep Security functionality and can be safely used. 30 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager Performing Operations Through the Deep Security Manager Web Console The Deep Security Manager Web console allows administrative users with the appropriate permissions to manage policies, computers and system settings through a Web-based interface. Administrative users authenticate to the Deep Security Manager Web console through a supported browser, and click the appropriate menu and interface components to perform system operations. Performing Operations Through a Command Line In addition to performing operations in the Deep Security Manager Web console, you can instruct Deep Security Manager to perform a number of actions from a command line in Windows or Linux. Performing Operations Through the Windows Command Prompt Open the Windows Command Prompt as an Administrator and change folders to the following location on the Deep Security Manager host computer: C:\Program Files\Trend Micro\Deep Security Manager\ Performing Operations Through the Linux Terminal Open the Linux Terminal as the root user and change folders to the following location on the Deep Security Manager host computer: © 2020 Trend Micro Inc. Education 31 Lesson 2: Deep Security Manager /opt/dsm/ Command Syntax To perform any of the following Deep Security Manager actions, use the following syntax: dsm_c -action <actionname> Action Name changesetting viewsetting Description Usage Change a setting dsm_c -action changesetting -name NAME -value VALUE [-computerid COMPUTERID] [-computername COMPUTERNAME] [policyid POLICYID] [-policyname POLICYNAME] [-tenantname TENANTNAME] View a setting value dsm_c -action viewsetting -name NAME [computerid COMPUTERID] [-computername COMPUTERNAME] [-policyid POLICYID] [policyname POLICYNAME] [-tenantname TENANTNAME] Create insert statements createinsertstatements (for export to a different database) dsm_c -action createinsertstatements [-file FILEPATH] [-generateDDL] [databaseType sqlserver|oracle] [maxresultfromdb count] [-tenantname TENANTNAME] diagnostic Create a diagnostic package for the system dsm_c -action diagnostic fullaccess Give an administrator the full access role dsm_c -action fullaccess -username USERNAME [-tenantname TENANTNAME] resetcounters Reset counter tables (resets back to an empty state dsm_c -action resetcounters [tenantname TENANTNAME] setports Sets the Deep Security Manager port(s) dsm_c -action setports [-managerPort port] [-heartbeatPort port] trustdirectorycert Trust the certificate of a directory dsm_c -action trustdirectorycert directoryaddress DIRECTORYADDRESS directoryport DIRECTORYPORT [-username USERNAME] [-password PASSWORD] [tenantname TENANTNAME] unlockout Unlock a user account dsm_c -action unlockout -username USERNAME [-newpassword NEWPASSWORD][tenantname TENANTNAME] addregion Add a private cloud provider region dsm_c -action addregion -region REGION -display DISPLAY -endpoint ENDPOINT listregions List private cloud provider regions dsm_c -action listregions removeregion Remove a private cloud provider region dsm_c -action removeregion -region REGION addcert Add a trusted certificate dsm_c -action addcert -purpose PURPOSE -cert CERT listcerts List trusted certificates dsm_c -action listcerts [-purpose PURPOSE] removecert Remove a trusted certificate dsm_c -action removecert -id ID 32 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager Action Name Description Usage masterkey Generate, import, export, or use a custom master key to encrypt the: - database password - keystore password - personal data If a custom master key is not configured, Deep Security will use a hard-coded seed, and personal data will not be encrypted by default. If a custom master key was configured during a new install, the installer has completed this setup for you. If you skipped master key creation, use this command to configure one dsm_c -action masterkey -subaction [generatekmskey -arn AWSARN | generatelocalkey] script Perform batch processing of dsm_c commands in a script file dsm_c -action script -scriptfile FILEPATH [-tenantname TENANTNAME | tenantid TENANTID] upgradetasks Runs the upgrade task actions which may be required as part of an inservice upgrade dsm_c -action upgradetasks [listtasksets] [-listtasks -taskset UPGRADE_TASK_SET [-force]] [tenantlist] [-tenantsummary] [-run taskset UPGRADE_TASK_SET [-force] [filter REGULAR_EXPRESSION]] [showrollbackinfo -task TASKNAME] [purgehistory [-task TASKNAME]] [showhistory [-task TASKNAME]] [tenantname TENANTNAME | -tenantid TENANTID] versionget View information about the current software version, the database schema version, or both dsm_c -action versionget [-software] [-dbschema] © 2020 Trend Micro Inc. Education 33 Lesson 2: Deep Security Manager Installing Deep Security Manager 20 for Windows Server For a successful installation, review the pre-installation checklist before proceeding with the steps in the installation. Deep Security Pre-Installation Checklist Prior to installing Deep Security Manager, you should review the following conditions to ensure that all necessary permissions, ports and other settings are in place for the Deep Security Manager installation. • You must have Administrator/root privileges on the computers where you will be installing Deep Security software components. • You will require Deep Security Activation Codes for the protection modules and a separate Activation Code for Multi-Tenancy if you intend to implement it. VMware Licenses will also be required for VMware components. • All computers running Deep Security software should be synchronized with a reliable time source (NTP server). • A supported database is installed and the database server hostname, database name, database administrator user name and database administrator password are available. • A deployment requires at least one Deep Security Relay (an Agent with Relay functionality enabled). Relays are used to keep the protection on your Deep Security Agents/Virtual Appliances up to date. Trend Micro recommends installing a relay-enabled agent on the same computer as Deep Security Manager to protect the host computer and to function as a local Relay. • To receive alert emails from Deep Security Manager, you will need to supply your SMTP server IP address. Deep Security Manager uses port 25 by default for connections to the SMTP server. • Deep Security Manager will need to connect to Trend Micro update servers over the Internet. If a proxy is needed for Internet access in your environment, you will need to supply your proxy server address, port and log in credentials as part of the Deep Security Manager installation process. • Fully-qualified domain names (FQDNs) are used for communications between Deep Security Manager and Agents, Relays and Virtual Appliances. For proper communications, ensure that each of your computers can resolve the hostname of Deep Security Manager and Relay. You will be asked to enter the Deep Security Manager hostname as part of the installation procedure. If you do not have a DNS, you can enter the Deep Security Manager host IP address. Deep Security Manager Readiness Check To ensure a seamless installation of Deep Security Manager, the setup routine includes a Readiness Check tool as part of the Installation Wizard. This tool will verify certain system requirements to make sure environment is suitable for this version of Deep Security Manager. 34 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager Items verified during the Readiness Check include: • • • • • • • • Supported host operating systems Host memory Host available disk space Deep Security manager version (in cases of upgrades) Supported databases Deep Security Agent version (in cases of upgrades) Deep Security Relay version (in cases of upgrades) Deep Security Virtual Appliance version (in cases of upgrades) When displayed during the Setup Wizard, click Start Readiness Check. Icons will be displayed to highlight the results of the Readiness check. Icon Result This item is supported in Deep Security 20 and Install Deep Security Manager become available. This item is not supported in Deep Security 20 and must be corrected before Deep Security Manager can be installed. Cancel is the only setup option available in this case. i This item is identified for information only. You can proceed with the installation. ! This item is identified with a warning; it is supported with caveats. For example, SQL Express is supported for use as the Deep Security database, but only for a limited number of Deep Security Agents. Deep Security will not install on unsupported operating systems or databases. Any items displayed as Not Ready must be corrected before restarting the Readiness Check. © 2020 Trend Micro Inc. Education 35 Lesson 2: Deep Security Manager Installing Deep Security Manager for Windows Server You can download the latest version of the Deep Security Manager installation package from the Trend Micro Deep Security Online Help Center at: https://help.deepsecurity.trendmicro.com/software.html Select the appropriate Deep Security Manager installation program (Windows or Read Hat Linux) from the Long Term Support (LTS) tab and download to the target computer. Double-click the installation application and step through the Setup Wizard by clicking Next on each page after providing the required information. 1 36 Select the language for the installation. © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager 2 Click Next on the Welcome window. 3 If you agree to the terms, click I accept the terms of the Trend Micro license agreement. © 2020 Trend Micro Inc. Education 37 Lesson 2: Deep Security Manager 4 The Installer will scan the server for a previous installation of Deep Security. If a previous version exists, the installer will prompt to upgrade. If no previous version exists, the installer will proceed with a new server installation. 5 Specify the folder on the hard drive where you would like Deep Security Manager to be installed. 38 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager 6 Specify the type of database you wish to use and provide the connection details. The database instance must be created beforehand and an administrator with appropriate rights must be assigned. 7 Click Start Readiness Check to confirm that all the components of your system are supported. © 2020 Trend Micro Inc. Education 39 Lesson 2: Deep Security Manager If no warnings are displayed, click Install Deep Security Manager. If any items is displayed with a warning, correct the issue and restart the installer. 8 Enter the Activation Code for the individual modules for which you have purchased a license. You can proceed without entering any codes, but none of the protection modules will be available for use until you do. You can enter your first or additional codes after the installation through the Deep Security Manager Web Management console. 40 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager 9 Confirm the address details of the Deep Security Manager server. Manager address must be a resolvable hostname, a fully qualified domain name, or an IP address. If DNS is not available in your environment, or if some computers are unable to use DNS, a fixed IP address should be used instead of a hostname. At this point, you could also modify the default communication ports. 10 Enter the login credentials for the Master Administrator. This administrator will be able to create identities for any other administrative users who require access to the Deep Security Manager Web console. © 2020 Trend Micro Inc. Education 41 Lesson 2: Deep Security Manager 11 Select a Security Update Configuration. Click Create Scheduled Task to regularly check for Security Updates. When selected, Deep Security Manager will automatically retrieve the latest security updates from Trend Micro and distribute them to your Deep Security Agents and Deep Security Appliances. You can configure security updates later using Deep Security Manager. 42 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager 12 Select a Software Update Configuration. Click Create Scheduled Task to regularly check for Software Updates. When selected, Deep Security Manager will automatically retrieve the latest software updates from Trend Micro and distribute them to your Deep Security Agents and Deep Security Virtual Appliances. You can configure software updates later using Deep Security Manager. 13 Provide an input value to generate master keys for encrypting personal information in the database. The value entered here will be used as the basis for generating the encryption keys used for this process. If not entered at this point, the keys can be generated later through a Command Prompt command. 14 If a Deep Security Agent installation package is available either in the local folder or from the Trend Micro Download Center, you will be given the option to install a co-located Relay-enabled agent on this computer. © 2020 Trend Micro Inc. Education 43 Lesson 2: Deep Security Manager Note: Deep Security requires at least one relay to download and distribute security and software updates. If you don't install a relay-enabled agent now, you will need to do so when the first agent is added. 15 Select whether you want to enable Trend Micro Smart Feedback. When enabled, your installation contributes to the Trend Micro Smart Protection Network to improve analysis, identification, and prevention of new threats. You can enable or configure Smart Feedback later in the Deep Security Manager console. Optionally, enter the industry your organization belongs to by selecting it from the drop-down list. 44 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager Note: Trend Micro Smart Feedback provides continuous communication between Trend Micro products and the company's 24/7 threat research centers and technologies. Each new threat identified through a single customer's routine reputation check automatically updates all of Trend Micro's threat databases, blocking any subsequent customer encounters of a given threat. For example, routine reputation checks are sent to the Smart Protection Network. By continuously processing the threat intelligence gathered through this global network of customers and partners, Trend Micro delivers automatic, real-time protection against the latest threats and provides better together security. The privacy of a customer's personal or business information is always protected because the threat information gathered is based on the reputation of the communication source. Trend Micro Smart Feedback is designed to collect and transfer relevant data from Trend Micro products to the Smart Protection Network so that further analysis can be conducted, and consequently, advanced solutions can evolve and be deployed to protect clients. Samples of information sent to Trend Micro: - File checksums - Websites accessed - File information, including sizes and paths - Names of executable files You can terminate your participation to the program anytime from the web console. 16 Finally, confirm the settings you provided and click Install to proceed with the setup of Deep Security Manager on the server. © 2020 Trend Micro Inc. Education 45 Lesson 2: Deep Security Manager 17 The Setup Wizard will proceed with the installation operations. 18 Once complete, click Finish to close the wizard. 46 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager The Trend Micro Deep Security Manager service will start automatically once the setup wizard is complete. To view the status of the service, click Start > Administrative Tools > Services. Locate the Trend Micro Deep Security Service in the list and note that it has started. Installing Deep Security Manager for Linux You can use the command line to perform a silent install, or, if you have X Windows installed, you can use the graphical installer. View the section called Deploy Deep Security in the Trend Micro Deep Security Online Help Center for details on installing Deep Security Manager on Red Hat Enterprise Linux systems. © 2020 Trend Micro Inc. Education 47 Lesson 2: Deep Security Manager Logging into the Deep Security Manager Web Console The Setup Wizard places a shortcut to Deep Security Manager Web Management console in the Windows Start menu on the host computer. To access the Deep Security Manager Web console from a remote computer, type the following URL in a web browser: https://<hostname>:<port>/ (Where <hostname> is the hostname of the server on which you have installed Deep Security Manager and where <port> is the Deep Security Manager port specified during the installation, 4119 by default). Administrative users accessing the Deep Security Manager Web console will be required to sign in with their Username and Password. These credentials are created during the initial installation and are needed to log in and create other administrative user accounts. • 48 If Multi-Factor Authentication is enabled for administrative users, you will be prompted to enter a response to a token challenge before being allowed access to the console. © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager • If SAML Authentication is enabled for administrative users, you will be redirected to the Identity Provider log in page to provide credentials. • If Multi-Tenancy is enabled, you will be required to provide an Account Name on the Sign in page as well. The Deep Security Manager Web Management console is displayed after a successful login. You can confirm the Deep Security version number by clicking Support > About. © 2020 Trend Micro Inc. Education 49 Lesson 2: Deep Security Manager Deep Security Manager Digital Certificates Deep Security Manager creates a 10-year self-signed certificate to secure connections with Deep Security Agents, Virtual Appliances, and Relays, as well as for performing administration activities through the Web browser. This self-signed certificate may trigger security warnings in Web browsers since the signature on the certificate can not be verified by the web browser. The warning can be disabled by importing the self-signed certificate created by Deep Security Manager into the browsers used by administrative users. A better solution is to replace this self-signed certificate with a certificate issued by a trusted Certificate Authority (CA). Such certificates are maintained after a Deep Security Manager upgrade. For information on using a certificates from a 3rd party Certificate Authority, consult the Deep Security Online Help Centre. 50 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager Upgrading From Deep Security 12 A direct upgrade to Deep Security 20 is available if your current installation uses Deep Security 11.x or 12.x. For any previous version, you must upgrade to Deep Security 11 or 12, then upgrade that installation to Deep Security 20. The Readiness Check tool will allow you to confirm that the components of your current Deep Security Installation are supported as part of the upgrade. The Readiness Check can be run as part of the Setup Wizard, or it can be run as a separate tool from the Command Prompt. If your current installation of Deep Security includes components that are not supported in Deep Security 20, the upgrade will not proceed and you will be advised to update those components. To upgrade your installation of Deep Security 12 to Deep Security 20 for Windows, perform the following steps: 1 Download the Deep Security 20 installer from the Deep Security Online Help Center. Double click the installer to initialize the Setup Wizard. The Wizard will scan for existing installations of Deep Security. © 2020 Trend Micro Inc. Education 51 Lesson 2: Deep Security Manager 2 If an installation of Deep Security 12 is detected, you will be prompted to either upgrade the existing version to Deep Security 20 or create a new installation. This new installation will require different database details. 3 The Readiness Check is displayed. Click Start Readiness Check to being the process. The tool will verify the components of your current deployment are supported with Deep Security 20. 52 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager 4 The results of the Readiness Check are displayed. If all the components of your current deployment are supported with Deep Security 20, Upgrade Deep Security Manager becomes available, allowing you to continue with the upgrade. If an item is unsupported, a red icon will be displayed, with an explanation. Update the identified item and click Restart Readiness Check until no items display with red warning icons. 5 A summary of the selected upgrade options is displayed. Click Install to begin the upgrade. © 2020 Trend Micro Inc. Education 53 Lesson 2: Deep Security Manager 6 The upgrade is run on the existing installation of Deep Security Manager 12. 7 When the upgrade is complete, click Finish. 54 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager Upgrading From Deep Security 11 An upgrade from Deep Security 11 incorporates a few extra steps as a database schema update must be performed and an input value for the master key encryption must be provided. To upgrade your installation from Deep Security 11 for Windows, perform the following steps: 1 Download the Deep Security 20 installer from the Deep Security Online Help Center. Double click the installer to initialize the Setup Wizard. The Wizard will scan for existing installations of Deep Security. 2 If an installation of Deep Security 11 is detected, you will be prompted to either upgrade the existing version to Deep Security 20 or create a new installation. This new installation will require different database details. © 2020 Trend Micro Inc. Education 55 Lesson 2: Deep Security Manager 3 The Readiness Check is displayed. Click Start Readiness Check to being the process. The tool will verify the components of your current deployment are supported with Deep Security 20. 4 The results of the Readiness Check are displayed. If all the components of your current deployment are supported with Deep Security 20, Upgrade Deep Security Manager becomes available, allowing you to continue with the upgrade. If an item is unsupported, a red icon will be displayed, with an explanation. Update the identified item and click Restart Readiness Check until no items display with red warning icons. 56 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager 5 Provide an input value to generate master keys for encrypting personal information in the database. The value entered here will be used as the basis for generating the encryption keys used for this process. If not entered at this point, the keys can be generated later through a Command Prompt command. 6 A reminder is displayed to backup the database. If a problem occurs during the upgrade, the database may become corrupt. Having a recent backup available is essential for restoring the system in this scenario. Run a backup of the database, then click I Have Backed Up My Database. © 2020 Trend Micro Inc. Education 57 Lesson 2: Deep Security Manager 7 An option to purge old data from the database during the update of the schema is presented. If desired, select a time period to preserve older event data. 8 A summary of the selected upgrade options is displayed. Click Install to begin the upgrade. 58 © 2020 Trend Micro Inc. Education Lesson 2: Deep Security Manager 9 The upgrade is run on the existing installation of Deep Security Manager. 10 When the upgrade is complete, click Finish. © 2020 Trend Micro Inc. Education 59 Lesson 2: Deep Security Manager Review Questions 1 What information does Deep Security store in the database? 2 What factors affect the system resources requirements (CPU, memory, disc space) for the database used by Deep Security? 3 Why does Trend Micro recommend that Deep Security be installed in a multi-node configuration? 60 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Lesson Objectives: After completing this lesson, participants will be able to: • • • • • Describe the responsibilities of the Deep Security Agent Import the Deep Security Agent software packages into Deep Security Manager Install Deep Security Agents Add protected computers to the Computers list Activate Deep Security Agents A Deep Security Agent is the software component deployed directly on a server which provides Application Control, Anti-Malware, Web Reputation, Firewall, Intrusion Prevention, Integrity Monitoring, and Log Inspection protection. Deep Security Agents are supported on a variety of physical, virtual and cloud servers and enforce the policy settings configured in Deep Security Manager. The Agents return event details to Deep Security Manager on a regular basis, allowing administrators to view security events occurring on the protected servers. Deep Security Agent Architecture When initially installed, the Deep Security Agent does not include the security modules until they are enabled through policies. When a new module is installed, it is driven by the Smart Agent policy meaning that only the modules assigned by the policy will be installed. The Deep Security Agent consists of two main parts: • Deep Security Agent Core: The Deep Security Agent Core includes the minimal framework needed to start on a system, establish a communication with Deep Security Manager and provides the primary features such as platform utilities and configuration management. The Deep Security Agent Core includes only the code required for communicating with Deep Security Manager as well as downloading and installing the required features. • Deep Security Agent Features: The Deep Security Agent Features are downloadable components that provide the high-level functionality that must be implemented depending on the scanning features being enabled, as well as Agent variants such as a Relay. Depending on the features being installed, other plug-ins or components required to implement the selected features may also be installed. Note: Installed features can be disabled, but cannot be uninstalled. © 2020 Trend Micro Inc. Education 61 Lesson 3: Deploying Deep Security Agents Agent Core Features An-Malware dsa ds_agent dsa_control dsa_query Installed Components Web Reputaon Agents Firewall Commands Intrusion Prevenon Uninstaller 4118 Nofier Integrity Monitoring Plug-ins AMSP Log Inspecon Update iAU Applicaon Control Network Plug-in Relay Component Network Driver Relay Backend 4122 Deep Security Agent System Requirements Deep Security Agents are available for a wide variety of 32-bit and 64-bit operating systems, including Windows, Linux, Unix and Solaris. Consult the Online Help Center for the most up-to-date list. The system requirements for Deep Security Agents include: Note: 62 • Minimum Memory: Minimum RAM requirements depend on the protection features enabled on the Agent. 4GB of RAM is recommended when all protection features are enabled. Less RAM is required (2GB) if you do not enable all Deep Security features. • Minimum Disk Space: 1 GB of hard drive space is recommended on the Agent computer, which increases to 30GB when the Agent is promoted to become a Relay. Available Deep Security Agent features may vary by operating systems. View the following help topic for full details on which Agent feature are supported on each operating system: https://helpcenter.deepsecurity.trendmicro.com/20_0/on-premise/ supported-features-by-platform.html © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Deploying Deep Security Agents When you first install the Deep Security Agent software, only core functionality is enabled. None of the Protection Modules are installed until you enable protection on the Deep Security Agent by assigning policies. When the Protection Module is enabled, any plug-ins or components needed for that module are installed. The steps involved in deploying a Deep Security Agent on a server includes the following: 1 Importing the Deep Security Agent software package for the required operating systems into the Deep Security Manager. 2 Installing the Deep Security Agent using one of the following methods: • • • Installing manually Installing using a script Installing using Microsoft Installer 3 Adding the protected server to the Computers list. 4 Activating the Deep Security Agent on the protected server. Depending on the method used to install the Deep Security Agent, adding the server to the Computers list and activating the Agent may be performed automatically as part of the process. Importing Deep Security Agent Software into Deep Security Manager Importing the Deep Security Agent software packages (which includes all protection module features, plug-ins and filters) into Deep Security Manager before installing it on your computers will simplify the process of enabling the plug-ins and components needed for that module. Importing the Deep Security Agent software package also makes it convenient to extract the Deep Security Agent installer from the package through the Deep Security Manager Web console. Note: Deep Security verifies the digital signature on the Deep Security Agent package to ensure that the software files have not changed since the time of signing. NEW The process for importing Agent software packages to Deep Security Manager includes the following steps: 1 In the Deep Security Manager Web console, click the Administration menu. In the left-hand pane, expand Updates > Software > Download Center. The Trend Micro Download Center page displays the latest versions of all Deep Security Agent software available from Trend Micro. © 2020 Trend Micro Inc. Education 63 Lesson 3: Deploying Deep Security Agents 2 Select the Deep Security Agent software packages required from the list and click Import at the top of the list or the Import Now icon. Deep Security Manager will begin to download the software from the Trend Micro Download Center. Note: 64 Import the software packages for each operating system used on the servers to be protected. © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents 3 Once the software has finished downloading, a green check mark will appear in the Imported column for the selected Deep Security Agent. 4 Click Local in the left-hand pane. The Local Software page lists all the software packages that have been imported into Deep Security. The Is Latest column displays whether local software is up to date with software available from Download Center. © 2020 Trend Micro Inc. Education 65 Lesson 3: Deploying Deep Security Agents You can view the contents of the software packages in Local Software by browsing to the following folder on the Deep Security Manager computer: C:\Program Files\Trend Micro\Deep Security Manager\temp 66 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Installing the Deep Security Agent Deep Security Agents can be installed on the protected server using one of the following methods: • Install manually using an *.msi, *.deb or *.rpm file (depending on the operating system on the protected computer) • • Install using a script which in executed on the protected server Distribute the *.msi file using a software distribution process then install using the Microsoft Installer commands Installing Deep Security Agents Manually The process for installing Deep Security Agents manually on the host computer includes the following steps: 1 Exporting the Deep Security Agent software installer from the Agent software package 2 Running the Deep Security Agent installer on the host computer As mentioned previously, plug-ins for the protection modules are only downloaded from Deep Security Manager after you have enabled that module on the Deep Security Agent. If you do not import the Deep Security Agent installation package into Deep Security Manager, they will be unable to download the required module plug-ins when enabling the individual protection modules on the Deep Security Agent computer. Exporting the Deep Security Agent installer Once the import process is complete, the Deep Security Manager stores the Deep Security Agent Installer Package (.zip), containing the core Installer (.msi, .rpm or .deb as appropriate to platform) and the feature packages (.dsp). The installer can be exported from Deep Security Manager with the following steps. 1 In the pane displayed on the left-hand side of the window, expand Updates > Software > Local. Right-click the software package *.zip file and click Export and make the appropriate selection. • Click Export Package to export the entire software package. Deep Security Agents will install the necessary Protection Module components from this package. • Click Export Installer to extract the core Deep Security Agent installer from the package. The installer is a lightweight package that does not contain any of the plug-ins required for any of the protection modules. When you activate the Deep Security Agent and turn on a protection module, Deep Security Manager retrieves the required plug-in from the software package in the database and sends it out to the Deep Security Agent to be installed on the computer. © 2020 Trend Micro Inc. Education 67 Lesson 3: Deploying Deep Security Agents 2 Save the exported item to a local folder. 3 Copy the exported item to a location which is accessible by client computers. The installers can also be made available using any software distribution method used in your organization. Running the Deep Security Agent Installer on a Windows Host Computer You must have administrator permissions to install and run the Deep Security Agent on a protected Windows server. If the protected server is running on an AWS instance or on an Azure virtual machines, use RDP to connect to the server and run the installer as indicated in the following steps. 1 Locate the Deep Security Agent installer *.msi file (exported from the Deep Security Manager using the above steps) and double-click the installation file. 2 When prompted, click Run. 68 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents 3 When the Welcome screen is displayed, click Next to begin the installation. 4 Accept the terms of the license agreement, and click Next. 5 Select the destination folder where you would like the Deep Security Agent to be installed, and click Next. © 2020 Trend Micro Inc. Education 69 Lesson 3: Deploying Deep Security Agents 6 Click Install to begin the installation. 7 The Setup Wizard installs the Agent files on the server. 8 On Windows Server computers, the Deep Security Notifier will display a message indicating the installation of that component is complete. 70 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents 9 When the installation has completed successfully, click Finish. The Deep Security Agent is now installed and running on this computer, and will start every time the machine restarts. Running the Deep Security Agent Installer on a Red Hat, CentOS and other Linux Host Computers You must have root privileges to install and run the Deep Security Agent on a protected Linux server. 1 Copy the Deep Security Agent installer *.rpm/*.deb file (or other installer executable exported from the Deep Security Manager using the above steps) to the Linux computer. 2 To install the Agent on Red Hat or CentOS Linux, enter with the following command in the Terminal: # sudo rpm -i <Agent_package_name> To install the Deep Security Agent on other platforms, please refer to the Online Help Center: • • • • • • Amazon Linux Debian Ubuntu AIX HP-UX Solaris Installing Deep Security Agents Using Deployment Scripts Deployment scripts can be used to install the Deep Security Agent and add the computer to the list of protected resources in Deep Security Manager. Most of the steps available in the Deep Security Manager Web console can also be performed from the command line; you can include any of these commands as part of your deployment scripts. In the Deep Security Manager console, there is a helpful tool that you can use for creating your own deployment scripts. © 2020 Trend Micro Inc. Education 71 Lesson 3: Deploying Deep Security Agents 1 Click Support > Deployment Scripts. This tool can also be accessed directly from the Local Software page. Select the appropriate package from the list and click Generate Deployment Scripts. 72 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents 2 Select the Platform for which a script will be created (Windows, Linux or Solaris). The Deployment Scripts tool will display the code for the script. Scripts can be adjusted for specific needs, for example, sleep time can be extended if the cloud environment is busy or short of resources. If automatic activation of the Deep Security Agent is required, an option in the Deployment Scripts window will also include the commands necessary to activate the Deep Security Agent after installation, along with details of policies, group, relay groups and proxies to apply. The option to activate requires Allow Agent Initiated Activation be enabled under Administration > System Settings > Agents. An activation token can also be provided to ensure that only script generated by this installation of Deep Security Manager are accepted. © 2020 Trend Micro Inc. Education 73 Lesson 3: Deploying Deep Security Agents 3 Click Save to File to save the script code. Alternately, click Copy to Clipboard and paste the script code into deployment tools such as RightScale, Chef, Puppet, SSH or Powershell. 4 Run the script on the host computer. Note: 74 The deployment scripts generated by Deep Security Manager for Windows Agent deployments require Windows Powershell version 4.0 or later. © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Installing Deep Security Agents on an AWS Instance Using Deployment Scripts Deployment scripts can be used to install the Deep Security Agent on an AWS instance by using RDP to connect to the server and running the script in Powershell or another deployment tool. Alternately, the script can be incorporated into an Amazon Web Services AMI. An AMI is a template that contains the software configuration (operating system, application server, and applications) required to launch your instance. Adding the script to this template installs and activates a Deep Security Agent automatically when new instances are launched, insuring that protection on the new instance is immediate. Add the script content to the User Data field in the Advanced Details section of the template definition. Installing Deep Security Agents on an Azure Virtual Machine Using Deployment Scripts The scripts can be run on an Azure virtual machines by using RDP to connect to the server and running the script in Powershell or another deployment tool. © 2020 Trend Micro Inc. Education 75 Lesson 3: Deploying Deep Security Agents Installing Deep Security Agents on an Google Cloud Platform Virtual Machine Using Deployment Scripts The scripts can be run on Google Cloud Platform virtual machines by using RDP to connect to the server and running the script in Powershell or another deployment tool. Installing Deep Security Agents From the Microsoft Installer Command Prompt Deep Security Agents can be installed using the Microsoft Installer file (*.msi) through the msiexec command from the Command Prompt and identifying the following parameters: msiexec.exe /q /i <DSA_Agent_Installer.msi> Where: /q - quiet|silent installation /i - install <DSA_Agent_Installer.msi> - Filename of Deep Security Agent installer Adding the Protected Servers to the Computer list Deep Security Manager can only detect vulnerabilities and implement security on servers that are displayed in the Computers list. Populating this list and seeing to it that it correctly reflects the correct composition of the network is a critical security task. Some Add operations will automatically activate the Deep Security Agents that are located on the servers. 76 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Methods for adding computers to the Computers list include: • • • • • • • Adding computers by hostname • Adding computers by Google Cloud Platform (GCP) • Importing a computer from a file Discovering computers in an IP address range Adding computers by Active Directory lookup Adding VMware vCenter virtual machines Adding computers by Amazon Web Services account Adding computers by Microsoft Azure account Adding computers by VMware vCloud account NEW Adding Computers by Hostname Administrators can add individual computers to the Computers list by specifying them in the New Computer Wizard. Type the Hostname (or IP address) of the new computer and optionally select a Policy to be applied to the new computer and Relay Group from the list. Clicking Next will tell Deep Security Manager to find the computer on the network. • If the computer you specified is not found, Deep Security Manager will still create an entry for it in the Computers list, but you will have to ensure that it can reach this computer and that a Deep Security Agent is installed and activated. You can then apply the appropriate policy to it. © 2020 Trend Micro Inc. Education 77 Lesson 3: Deploying Deep Security Agents • If the computer is found but no Agent is identified, Deep Security Manager will create an entry for the computer in the Computers list. You will have to install an Agent on the computer and activate it. • If the computer is found and an Agent is detected, Deep Security Manager will create an entry in the Computers list. As soon as you exit the wizard (by clicking Finish), Deep Security Manager will activate the Agent on the computer and apply the policy you selected. Discovering Computers in an IP Address Range To add multiple computers at once, an administrative user can specify a range of IP addresses and Deep Security Manager will search the range and locate any computers with IP addresses within that range. Click Add > Discover. 78 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Deep Security Manager uses an ICMP echo request to locate a host. If the attempt fails, Deep Security Manager will try to establish a TCP connection on port 7 (echo) to the target host. During discovery, Deep Security Manager searches the network for any visible computers that are not already listed. When a new computer is found, Deep Security Manager attempts to detect whether an Agent is present. When discovery is complete, Deep Security Manager displays all the computers it has detected and displays their status in the Status column. When running a Discovery operation with Automatically Resolve IPs to hostnames enabled, it is possible that the discovery operation will find hostnames where Deep Security Manager can not. Discovery is able to fall back to using a WINS query or NetBIOS broadcast to resolve the hostname in addition to DNS. Deep Security Manager only supports hostname lookup via DNS. • Computers identified with this method can be automatically assigned a group, but not a policy. • • Agent software found on those computers will NOT be automatically activated. If a computer is listed through other detection methods, it will NOT be listed in the results of this search. © 2020 Trend Micro Inc. Education 79 Lesson 3: Deploying Deep Security Agents Adding Computers by Active Directory Lookup Deep Security Manager can populate its Computers list using information retrieved from Active Directory servers. To import these hosts, the Add Directory Wizard performs an LDAP query to retrieve the necessary information from the Directory. When prompted, provide the details of the Active Directory branch to search for new computers. 80 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Computers in the specified Directory branch are displayed. • • • Computers identified with this method will NOT be automatically assigned a policy. • Computers are imported and synchronized according to the structure in the directory. For example, the Deep Security Manager hosts computer object hierarchy matches the Directory structure. • After the initial data retrieval, Deep Security Manager needs to periodically synchronize its host information with the information in the Directory to keep its information up-todate. Agent software found on those computers will NOT be automatically activated. If a computer is listed through other detection methods, it will STILL be listed in the results of this search. Depending on the communication needs of the directory, the wizard can send its query as a clear text query at port 389, or as a secure SSL/TLS connection at port 636. • Computer discovery can use both SSL-based and clear text methods, while users and contacts are restricted to non-anonymous SSL methods. The latter restriction ensures that user account and usage is protected. SSL-based access methods will only work with SSL-enabled Active Directory servers, so users and contacts can only be imported from suitably configured servers. • SSL-enabled Active Directory servers must have a server certificate installed. This may either be self-signed, or created by a third-party certificate authority. • • You must include your domain name as part of the User Name field. The Details window of each computer in the Deep Security Manager has a Description field. To use an attribute of the Computer object class from your Active Directory to populate the Description field, type the attribute name in the Computer Description Attribute text box. © 2020 Trend Micro Inc. Education 81 Lesson 3: Deploying Deep Security Agents Filtering Active Directory Objects When importing Active Directory objects, search filters are available to manage the objects that will be returned. By default, the wizard will only show groups. You can add additional parameters to the filter to further refine the selections. For additional information about search filter syntax, refer to the following Microsoft document: http://msdn.microsoft.com/en-us/library/aa746475(v=vs.85).aspx Adding VMware vCenter Virtual Machines Deep Security Manager queries VMware vCenter Server for information about the virtual machines on the ESXi servers that are registered with it. • • • Computers identified with this method will NOT be automatically assigned a policy. Agent software found on those computers will NOT be automatically activated. If a computer is listed through other detection methods, it will STILL be listed in the results of this search. The same logic takes place behind the scene whether Deep Security Manager populates its computers list using computer information lists of computers from vCenters, or by importing lists from Active Directory. 82 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents It is important to notice that real-time synchronization will be maintained with VMware vCenter to keep the information displayed in the Deep Security Manager up-to-date (number of VMs, their status, etc). Adding Computers in an Amazon Web Services Account Deep Security can connect to and manage computers supplied by Amazon Web Services Account. © 2020 Trend Micro Inc. Education 83 Lesson 3: Deploying Deep Security Agents Provide your Amazon Web Services Access Key ID and Secure Access Key to begin the detection process. A list of all the EC2 instances in the account will be added to the Computers list. • • • Computers identified with this method will NOT be automatically assigned a policy. Agent software found on those computers will NOT be automatically activated. If a computer is listed through other detection methods, it will STILL be listed in the results of this search. Once you have imported the resources from any of the cloud provider accounts into the Deep Security Manager, the computers in the account are managed like any computer on a local network. Note: Empty AWS host groups can now be hidden on the Computers page. Instead of showing all host groups, empty host groups will be represented by a greyed out, italicized count. This feature can be toggled on and off by right clicking on Computers in the host group tree. NEW 84 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Adding Computers in a Microsoft Azure Cloud Account Deep Security can connect to and manage computers supplied by Microsoft Azure cloud services. Provide the details of your Azure subscription to begin the detection process. A list of all the Azure virtual machines in the account will be added to the Computers list • • • Computers identified with this method will NOT be automatically assigned a policy. Agent software found on those computers will NOT be automatically activated. If a computer is listed through other detection methods, it will STILL be listed in the results of this search. © 2020 Trend Micro Inc. Education 85 Lesson 3: Deploying Deep Security Agents Adding Computers in a VMware vCloud Account Deep Security can connect to and manage computers supplied by VMware vCloud. A list of the virtual machines in the account will be added to the Computers list. • • • Computers identified with this method will NOT be automatically assigned a policy. Agent software found on those computers will NOT be automatically activated. If a computer is listed through other detection methods, it will STILL be listed in the results of this search. Adding Computers by Google Cloud Platform NEW A Google Cloud Platform (GCP) connector has been added to Deep Security 20. When you add a Google Cloud Platform account to Deep Security, all virtual machines associated with that account are imported into Deep Security Manager and become visible in the Computers list. Only virtual machines hosting Deep Security 12 Agents (or higher) can be managed through this connector. If you have Agents already installed on Google Cloud Platform virtual machines, upgrade them to at least Deep Security 12 so that they will be recognized by the connector. 86 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Importing a Computer From a File To save you the trouble of re-discovering and scanning computers in a new installation of Deep Security Manager, you can export computers in your list of devices on one system to an XML or CSV file. You can then manually import the devices into the Computers list on the new system. Activating Deep Security Agents Activation is required for Deep Security Agents and Virtual Appliances to accept commands from Deep Security Manager and report its status. Behind the scenes, the following operations are performed during activation: 1 The SSL certificate and the URL of the Deep Security Manager are transfered to the Deep Security Agent. 2 A Global Unique Identifier (GUID) is generated and returned to the Deep Security Agent. 3 Information about the Deep Security Agent’s NICs is retrieved. 4 The registered Deep Security Agent information is stored in the database. Prior to activating your Agents you will first need to determine and configure the direction of communication between your Deep Security Manager and Agents. This setting must be configured correctly in order for Agents to get activated and communicate with Deep Security Manager. To secure the communications between the Agent and the Deep Security Manager during Agentinitiated activations, administrative users must set a shared Agent activation token to include in Command Prompt and deployment scripts. © 2020 Trend Micro Inc. Education 87 Lesson 3: Deploying Deep Security Agents In the Deep Security Manager Web console, click the Administration menu and in the left-hand pane, click System Settings. Click the Agent tab and click Allow Agent-Initiated Activation. Type a secret in the Agent activation token field. If an administrative user enables Agent-Initiated Activation and an Agent activation token is not provided, Agents will be able to automatically activate without providing authentication. If Agent-initiated activation is enabled, and the Agent activation token is entered, Agents will be required to provide this value in order to activate. Note: 88 In a multi-tenant environment, the Agent activation secret applies only to the primary tenant. Other tenants are assigned a system generated password. © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Activating Deep Security Agents Through the Deep Security Manager Web console Activation of Deep Security Agents can be initiated in Deep Security Manager by an administrative user by right-clicking the device in the Computers list and selecting Activate/ Reactivate. In this case, Deep Security Manager sends activation commands to the Agent. Activating Deep Security Agents Through a Command Line Administrative users can initiate Agent-based activation of Deep Security Agents by typing the following command in the command line on the Deep Security Agent host: dsa_control -a dsm://<host or IP>:<port>/ For the command-line Agent activation option to work, Deep Security Manager must be set to accept Agent-Initiated Activations (AIA) commands. This method is particularly useful when using scripts or in Cloud environments like Amazon Web Services where Deep Security Manager can not typically connect to Deep Security Agents to activate them, but the Agents can connect to Deep Security Manager. Activating Deep Security Agents Through a Script Scripting support in Deep Security allows automated deployment and Agent-initiated activation of Deep Security Agents. Administrative users can generate deployment scripts to automatically download the Deep Security Agent software from Deep Security Manager, install the Agent and activate it. © 2020 Trend Micro Inc. Education 89 Lesson 3: Deploying Deep Security Agents Note: 90 To use a deployment script to activate your Agents, Deep Security Manager must be set to allow Agent-initiated activations. © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Assigning Policy Automatically Self-activated Deep Security Agents can be assigned a predetermined Policy automatically to ensure at least a minimum level of protection, using event-based tasks. To create the task in the Deep Security Manager Web Management console, click the Administration menu and in the lefthand frame, click Event-Based Tasks. Create a New tasks using Event Computer Created (by system) and select the Assign Policy action. Tasks such as Policy, Relay and Computer Group assignment can be automatically carried out on newly discovered assets based on their hostnames, IPs, Tenancy ID, Tenancy Template, Instance Type, or other cloud asset properties. Deep Security Agent Heartbeat A heartbeat is a periodic communication between the Deep Security Manager and Agent or Appliance. During a heartbeat, the Deep Security Manager collects information about the Agent, including: • • • • • The status of the drivers (on- or off-line) The status of the Agent or appliance (including clock time) Agent or Appliance logs since the last heartbeat Data to update counters A fingerprint of the Agent or appliance security configuration (used to determine if it is up to date) © 2020 Trend Micro Inc. Education 91 Lesson 3: Deploying Deep Security Agents The heartbeat can be configured through policy, or on an individual computer. Deep Security Manager to Agent Communication The available settings for configuring the Deep Security Manager to Agent communication direction are: • Bidirectional: With bidirectional communication enabled, the Deep Security Agent or Appliance will initiate the heartbeat but will still listen on the Agent port for Deep Security Manager connections. Deep Security Manager is free to contact the Agent or Appliance in order to perform operations as required. The Deep Security Virtual Appliance can only operate in bidirectional mode. This is the default setting configured in the Deep Security Manager Web Management console. • Manager-initiated: With manager-initiated communication, Deep Security Manager will initiate all communications with Deep Security Agents. Communication will occur when the Deep Security Manager performs scheduled updates, performs heartbeat operations, and when the Activate/Reactivate or Send Policy are selected in Deep Security Manager Web Management console. • Agent-initiated: With Agent-initiated communications, the Deep Security Agent itself will periodically check for updates and control heartbeat operations. It is important to configure the direction of communication correctly, otherwise misleading events will be generated. As an example, if bi-directional communication is configured, Deep Security Manager will create an event every time it does not receive a Deep Security Agent heartbeat. This may generate events saying the Deep Security Agent is Offline. Another example is where Deep Security Agents can contact Deep Security Manager, but not the other way around (for example due to NAT device, or a firewall policy). If bi-directional communication is configured, every time Deep Security Manager tries to contact Deep Security Agents after a policy change, an error will be generated stating that the Deep Security Agents didn't respond. 92 © 2020 Trend Micro Inc. Education Lesson 3: Deploying Deep Security Agents Review Questions 1 What methods are available for deploying a Deep Security Agent to a server that requires protection? 2 Describe the purpose of the Deep Security Agent heartbeat? © 2020 Trend Micro Inc. Education 93 Lesson 3: Deploying Deep Security Agents 94 © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Lesson Objectives: After completing this lesson, participants will be able to: • Perform Deep Security Agent operations from the Deep Security Manager Web console or a Command Line • • • View the protection status of computers managed by Deep Security Upgrade Deep Security Agents Organize the Computers list using Groups and Smart Folders Performing Deep Security Agent Operations Through a Command Line You can instruct Deep Security Agents to perform a number of maintenance tasks from the command line in Windows and Linux. Performing Operations Through the Windows Command Prompt Open the Windows Command Prompt as an Administrator and change folders to the following location on the Deep Security Agent host computer: C:\Program Files\Trend Micro\Deep Security Agent\ Performing Operations Through the Linux Terminal Open the Linux Terminal as the root user and change folders to the following location on the Deep Security Manager Agent computer: /opt/ds_Agent/ Command Syntax To perform any of the following Deep Security Agent actions, use the following syntax: dsa_control [-a <str>] [-r] [-m] [-s <num>] [-R <str>] [-d] [-b] [-x] [u] [-g <str>] [-c <str>] [-p <str>] [-t <num>] © 2020 Trend Micro Inc. Education 95 Lesson 4: Managing Deep Security Agents Supported command-line arguments include: Argument Description -a <str>, -activate=<str> Activates the Agent with Deep Security Manager at the specified URL. URL format must be in the following format: dsm://hostOrIp:port/ (where port is the Manager's heartbeat port, default 4120) -r, --reset Resets the Agent configuration. -m, --heartbeat Asks the Agent to contact the Deep Security Manager now -s <num>, -selfprotect=<num> Enables self-protection on the Agent by preventing local end-users from uninstalling, stopping, or otherwise controlling the Agent. Command-line instructions must include the authentication password when self-protection is enabled. (1: enable, 0: disable) -R <str>, --restore=<str> Restores a quarantined file -d, --diag Generates an Agent diagnostic package -b, --bundle Creates an update bundle for use on air-gapped Relays -x, --proxy Sets the address of the proxy server which the Agent uses to communicate with the Deep Security Manager. URL format must be in the following format: dsm_proxy://proxyURL/ -u, --unpw Set the proxy username and password in the format of key:value pairs (with a colon as a separator) -g <str>, --Agent=<str> Displays the Agent URL. Defaults to https://localhost:4118/ -c <str>, --cert=<str> Identifies the certificate file -p <str>, --passwd=<str> Sets the Authentication password -t <num>, --retries=<num> If dsa_control cannot contact the Deep Security Agent service to carry out accompanying instructions, this parameter instructs dsa_control to retry <num> number of times. There is a one second pause between retries 96 © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Note: These operations can be performed from the Deep Security Manager Web console, but these commands, executed from the Command Prompt on the Deep Security Agent host computer, can be especially helpful when Deep Security Agents can no longer be controlled through Deep Security Manager (for example, due to configuration or network problems). These commands can also be used in conjunction with scripts. Resetting Deep Security Agents In the rare case where Deep Security Manager is unable to manage the Deep Security Agents on a host computer, it is possible to wipe out any Deep Security Agent settings, including its relation with Deep Security Manager, by performing a reset operation. This action will also remove from memory any security policy previously deployed and implemented within the Deep Security Agent. To reset the Agent, open a Command Prompt on the server protected by the Deep Security Agent, change to the Deep Security Agent folder and run the following command: dsa_control -r In Deep Security Manager, Deactivate the problematic Agent from the Computers list, then Reactivate over again. Protecting Deep Security Agents From Modification Modification to the Deep Security Agent on Windows computers can be prevented by enabling Agent Self Protection settings in the Deep Security Manager Web console. © 2020 Trend Micro Inc. Education 97 Lesson 4: Managing Deep Security Agents When self-protection is enabled, attempts to make modifications to the Deep Security Agent through the operating system graphical user interface, such as uninstalling the Agent, stopping the Agent service, modifying Agent-related Windows Registry entries, or modifying Agent-related files will be met with a message similar to Removal or modification of this application is prohibited by its security settings. These restrictions can be overridden by issuing the following command from the Command Prompt on the Deep Security Agent computer: dsa_control --selfprotect=0 It is possible that Deep Security Manager loses the ability to communicate with an Agent. In such cases you will have to interact with the Agent locally using the Deep Security Agent's command-line interface. Enable Local override requires password by entering a password to protect the local command-line functionality. Note: Store this password in a safe location. If you lose or forget the password you will have to contact your support provider for assistance in overriding this protection. Viewing Computer Protection Status The Computers list in Deep Security Manager allows you to manage and monitor the machines on your network. The Preview icon displays a status summary table for the computer that varies by computer type; hover your pointer over Preview to display the pop-up details window. This provides a quick way for an administrator to verify various details for the computer such as the presence and status of a Deep Security Agent, the status of the protection modules, the number of rules in use, the available updates, and other items. Computers Without a Deep Security Agent The preview for a computer added to Deep Security Manager but not hosting a Deep Security Agent will display a status of Unmanaged (No Agent) or Discovered (No Agent). Since no Agent is available, Not Activated will be displayed for all Deep Security Protection Modules. 98 © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Computers With an Unactivated Deep Security Agent The preview for a computer added to Deep Security Manager that is hosting an Deep Security Agent that has not yet been activated will display a status of Unmanaged (Activation Required) or Discovered (Activation Required). Since the Agent is not yet communicating with Deep Security Manager, Not Activated will be displayed for all Deep Security Protection Modules. Computers with an Activated Deep Security Agent The preview for a computer hosting an activated Deep Security Agent lists the presence of an Agent, its status, and details about the Protection Modules modules enabled on that host. © 2020 Trend Micro Inc. Education 99 Lesson 4: Managing Deep Security Agents Deep Security Relay The preview for a computer hosting a Deep Security Relay displays its status, the number of security and software update components it has available for distribution, and the status of the Protection Modules provided by its embedded Deep Security Agent. ESXi Server The preview for an ESXi Server displays its status and the version numbers of the ESXi software. The Guests list displays the Deep Security Virtual Appliance, and the virtual machines running on this host. Deep Security Virtual Appliance The preview for a Deep Security Virtual Appliance displays its status and its version number. The Protected Guests On list displays the virtual machines protected by the Appliance. 100 © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Virtual Machine The preview for a protected virtual machine displays whether it is being protected by a Deep Security Virtual Appliance, an in-guest Agent, or both. It displays details about the protection modules running on the virtual machine. Since the Deep Security Virtual Appliance is not capable of providing Log Inspection or Application Control protection, it will be listed as Not Supported. Firewall and Intrusion Prevention configuration will always be the same for both the Virtual Appliance and the inguest Agent. Note: A virtual machine can run a Deep Security Agent as though it were an ordinary computer managed by the Deep Security Manager. It does not need to be imported into the Deep Security Manager by way of VMware vCenter. Protection Module Installation States The computer Preview in the Deep Security Manager Web console provides details of the installation state of the various Protection Modules. A module may be turned on in the configuration, but until it is installed and providing protection through the Deep Security Agent it will not display as On. © 2020 Trend Micro Inc. Education 101 Lesson 4: Managing Deep Security Agents Various installation states may be displayed, including: Feature Installation State Description On/Off If the On/Off state is On, it means that the module has been installed on the Agent and it is currently providing protection. Installed The listed module is installed on the Agent. This state is only displayed when the On/Off state of the module is Off and no protection is provided. Installation Pending The listed module is configured in Deep Security Manager but is not installed on the Agent. Installation In Progress The module is being installed on the Agent. Matching Module Plug-In not Found The version of the software package containing the module imported into Deep Security Manager does not match the version reported by the Agent. A matching software package was found on the Agent, but it does not contain the module. Not Supported or Update Not Not Supported/Update Not Supported Supported is displayed depending on whether there is already a version of this module installed on the Agent. Not Installed 102 The software package containing the module has been downloaded in Deep Security Manager, but the module has not been turned on in Deep Security Manager or installed on the Agent. © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Viewing Deep Security Agent Tasks in Progress Tasks in progress on managed Deep Security Agents can be displayed in Deep Security Manager Web console in the Tasks column. Common tasks includes installing Protection Modules, sending policies, running Recommendation Scans, updating Application Control inventories, and so forth will display a message in the Tasks column to provide feedback that an activity is being processed. Once the message in the Tasks column disappears, the operation is complete on the Deep Security Agent. To provide fast refresh of the Computers list, the Tasks column is not displayed by default. To show the column in the Deep Security Manager Web console, click Columns and enable Tasks. © 2020 Trend Micro Inc. Education 103 Lesson 4: Managing Deep Security Agents Dealing With Offline Agents A computer status of Offline or Managed (Offline) means that the Deep Security Manager hasn't communicated with the Agent's instance for some time and has exceeded the missed heartbeat threshold. The status change can also appear in alerts and events. Heartbeat connections can fail because: • The Agent is installed on a workstation or other computer that has been shut down. If you are using Deep Security to protect computers that sometimes get shut down, make sure the policy assigned to those computers does not raise an alert when there is a missed heartbeat. In the policy editor, go to Settings > General > Number of Heartbeats that can be missed before an alert is raised and change the setting to Unlimited. • • • • Firewall, IPS rule, or security groups block the heartbeat port number Bi-directional communication is enabled, but only one direction is allowed or reliable Computer is powered off Computer has left the context of the private network This can occur if roaming endpoints (such as a laptop) cannot connect to Deep Security Manager at their current location. Guest Wi-Fi, for example, often restricts open ports, and has NAT when traffic goes across the Internet. 104 • Amazon WorkSpace computer is being powered off, and the heartbeat interval is fast, for example, one minute; in this case, wait until the WorkSpace is fully powered off, and at that point, the status should change from 'Offine' to 'VM Stopped' • • • • DNS was down, or could not resolve the Deep Security Manager's host name • Deep Security Agent's or Deep Security Manager's system time is incorrect (required by SSL/TLS connections) • • A Deep Security rule update is not yet complete, temporarily interrupting connectivity Deep Security Manager, the Agent, or both are under very high system resource load Deep Security Agent process might not be running Certificates for mutual authentication in the SSL or TLS connection have become invalid or revoked On AWS EC2, ICMP traffic is required, but is blocked © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Cleaning Up Inactive Agents NEW In some deployments Deep Security Manager can accumulate large numbers of computers that no longer exist. The primary means to address this problem is to add your AWS, Azure, or vCloud account to Deep Security Manager. Adding an AWS, Azure, or vCloud account allows Deep Security Manager to connect to the cloud environment and receive updates on the life cycle of computers in your environment, including deletion. With this information, the computers page can be updated automatically on your behalf. In environments where adding an account is not possible, computers that no longer exist must be manually deleted. In dynamic environments where computers have a short lifecycle, unwanted computers can accumulate quickly which typically results in customer specific processes to delete unwanted computers. To address this issue the following features are available: Cleaning up Inactive Agent A system setting is provided to delete Agents that have not communicated with Deep Security Manager in a configurable period of time. Inactive agent cleanup will check hourly for computers that have been offline and inactive for a specified period of time (from 2 weeks to 12 months) and remove them. Inactive agent cleanup will remove a maximum of 1000 offline computers at each hourly check. If there are more offline computers than this, 1000 will be removed at each consecutive check until all of the offline computers have been removed. Note: Inactive agent cleanup does not remove offline computers that have been added by a cloud connector. © 2020 Trend Micro Inc. Education 105 Lesson 4: Managing Deep Security Agents Reactivate Unknown Agents If you have offline computers that are active but communicate irregularly with the Deep Security Manager, inactive Agent cleanup will remove them if they don't communicate within the period of inactivity you defined. To ensure that these computers reconnect to Deep Security Manager, we recommend enabling both Agent-Initiated Activation and Reactivate unknown Agents. To do so, under System Settings > Agents > Agent Initiated Activation, first select Allow Agent-Initiated Activation and then select Reactivate Unknown Agents. When a removed computer reconnects, it will not have a policy, and will be added as a new computer. Any direct links to the computer will be removed from the Deep Security Manager event data. Note: This feature requires the use of Agent-Initiated Activation. In addition, the Agent must have been successfully activated prior for the reactivation to succeed. When an inactive Agent cleanup job runs, system events will be generated that you can use to track removed computers. You'll need to check the following system events: • • • 2953 - Inactive Agent Cleanup Completed Successfully 251 - Computer Deleted 716 - Reactivation Attempted by Unknown Agent (if Reactivate Unknown Agents is enabled) Overriding Inactive Agent Cleanup You can set an override at the computer or policy level to explicitly prevent computers from being removed by inactive agent cleanup. Open the Computer or Policy editor for the computer or policy you want to set an override on. Go to Settings > General and under Inactive Agent Cleanup Override, select Yes. 106 © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Upgrading Deep Security Agents to Deep Security 20 Deep Security Agents can be upgraded to Deep Security 20 directly from the Details window. Note: Any Deep Security Relays must be upgraded to Deep Security 20 before upgrading the Deep Security Agents. The software package for the updated Deep Security Agent must be imported into Deep Security Manager before the Deep Security Agent can be upgraded. 1 Import the version 20 Agent packages for the operating systems hosting Deep Security Agents into Deep Security Manager. © 2020 Trend Micro Inc. Education 107 Lesson 4: Managing Deep Security Agents 2 In Deep Security Manager Web console, locate the Deep Security Agent to upgrade and doubleclick to open its Details. If an upgraded Deep Security Agent software package for the operating system being used is available, Upgrade Agent will be available on the Actions tab. 3 Click Upgrade Agent, and select the version for the upgrade. 108 © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Note: The Agent Version list displays all the versions of Deep Security Agent packages that have been imported into Deep Security Manager. 4 Select a time to process the upgrade, or select Now. During the Deep Security Agent upgrade, the Actions tab will identify the progress of the upgrade. © 2020 Trend Micro Inc. Education 109 Lesson 4: Managing Deep Security Agents 5 Once complete, the Details window will display the version of the updated Deep Security Agent. To simplify the process of upgrading several Deep Security Agents, multiple Agents can be selected in the Computer list, and click Actions > Upgrade Agent Software from the right-mouse menu. 110 © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents The Tasks column with display Upgrading Software (in Progress) while the selected Agents are upgraded. Anti-Malware Protection During Upgrades NEW When upgrading Deep Security Agents, any impact, either in the form of a network interruption or protection impact is unacceptable. Agent upgrades now proceed without impacting either the host services used by applications or functionality provided by the Deep Security Agent. When Anti-Malware is enabled and an Agent is upgraded to Deep Security 20, Anti-Malware protection will remain in place without interruption. Upgrading Agents on Activation NEW Upgrade on activation instructs Deep Security Agents to automatically upgrade on activation if the current version of the Agent does not match the latest compatible version of the Agent available for that platform in Deep Security Manager. © 2020 Trend Micro Inc. Education 111 Lesson 4: Managing Deep Security Agents This feature can be helpful if you bake the Agent into your AMI or WorkSpace bundle and then want to use a newer Agent, but are unable to update the bundle to include the new Agent. The Automatically upgrade agents on activation setting can be enabled so when the Agent in the AMI or bundle activates itself, Deep Security Manager can automatically upgrade the Agent to the latest version. Controlling the Agent Version NEW Agent Version Control determines the specific versions of Deep Security Agents that will be deployed when upgrading Deep Security Agents, using deployment scripts or using the Automatically upgrade agents on activation feature. This allows security operations teams to declare exactly what Agents will be used at any given time. As new Agents are released by Trend Micro, your security operations team can test them in controlled environments before changing the version control settings to expose the new Agents to downstream applications teams in their production environment. Prior to the introduction of Agent Version Control, the primary way to control the Agent version was to selectively import only those Agents that you were confident you wanted to deploy. Once the Agents were imported, the latest one for each platform was distributed to Relays. The latest Agents were then picked up from the Relays by features like upgrade on activation and deployment scripts. If you want to continue with this functionality, import the agents you want to deploy to your inventory, and remove the old ones. On the Agent Version Control page and make sure all platforms are set to the default, Latest. The Latest setting instructs Deep Security Manager to continue using the latest Agents in its local inventory, and you can continue to use your existing processes without any changes. Selecting Latest LTS indicates that the latest long-term support (LTS) software build available in your local inventory should be used. Latest LTS can be the original LTS release, or can be an update to the original LTS release. 112 © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Selecting the <agent_version> option, (for example, 20.0.0.760), indicates that a specific Agent version available in your local inventory should be used. Other agents in your inventory are ignored. If no Agent version appears in the list, it's because there is no Agent in your local inventory that matches the OS. To fix this issue, import an agent to your inventory. Ensure that any previously created deployment scripts are updated when using this feature. If you have existing deployment scripts that you generated prior to the availability of the agent version control feature, and you do not update them, they will default to Latest. This default will be used for any older deployment scripts regardless of how you have set your agent version control settings. Replace the older deployment scripts with new deployment scripts to leverage the settings you define in the agent version control settings. The latest deployment scripts pass additional information to Deep Security Manager (for example, tenant information and platform information) that is required for the version control feature to work properly. Note: Full access to all Agent versions is accessible when using the Upgrade Agent button or Upgrade Agent Software page. Selecting either of these options launches a wizard with a drop-down list that always defaults to Use latest version for platform regardless of your version control settings. Organizing Computers Using Groups To simplify administration of computers in a large implementation, groups can be used to sort and organize computers. Administrators can create groups with any organizational structure they require, then computers can be added into those groups. Computers can be moved into a different group at any time through the computer Details window. Grouping computers is done for organization purposes only; changing the group does not affect policy. © 2020 Trend Micro Inc. Education 113 Lesson 4: Managing Deep Security Agents Note: Servers added to the Computers list through connectors (computers added through Active Directory lookup, VMware vCenter virtual machines, Amazon web Services instances, Azure virtual machines, vCloud virtual machine and Google Cloud Platform virtual machines) can not be added to groups, as they are already grouped by their connector. Creating Groups Groups can be created from the Add menu. 114 © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Click Create Groups. Type a name, description and choose a location in the groups structure for the group to be added. Adding Computers to a Group Computers can be added to a group through Details. Double-click a computer to open its Details and select a group from the list. © 2020 Trend Micro Inc. Education 115 Lesson 4: Managing Deep Security Agents A group can also be specific as part of a deployment script. All computers using the script will be assigned to the specified group. 116 © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Organizing Computers Using Smart Folders Smart Folders are used to group your computers dynamically. The computers displayed in a Smart Folder are determined by a set of custom rules, that act as a saved search which is executed each time you click on the folder to display its contents. This allows administrators to easily filter and group computers by these defined properties. Additionally, you can use Smart Folders to restrict administrators to their own administration groups by assigning appropriate read and write permissions. When defining the properties for a Smart Folder, you are creating a search query that includes the following settings: • • • Property, which defines what to search through Operator, which defines how to search Value, which defines what to search for Property Note: Operator Value View the section called Group computers dynamically with Smart Folders in the Deep Security Help Center for a full list searchable properties. © 2020 Trend Micro Inc. Education 117 Lesson 4: Managing Deep Security Agents Once you have configured your Smart Folders from the Computers page, any computers that match the search will be displayed in folders which will always up-to-date information in the right-hand pane of the display. Smart Folders can be organized into subfolders that can be nested up to three levels deep. If you are using Deep Security with Amazon Web Services, you can nest your folders deeper by using Amazon Web Service tag keys. In this case, the subfolders will be created according to each of the tag key’s values. Smart Folders can be selected and used throughout the Deep Security Manager Web console under the various tabs, for example, Dashboard, Alerts, Events & Reports and so on. 118 © 2020 Trend Micro Inc. Education Lesson 4: Managing Deep Security Agents Review Questions 1 What methods are available in the Deep Security Manager Web console to organize the Computers list? 2 Describe the purpose of the Deep Security Agent reset command (dsa_control -r) ? © 2020 Trend Micro Inc. Education 119 Lesson 4: Managing Deep Security Agents 120 © 2020 Trend Micro Inc. Education Lesson 5: Keeping Deep Security Up To Date Lesson Objectives: After completing this lesson, participants will be able to: • • Describe how security and software updates are delivered to Deep Security Agents Configure Relay Groups and promote Deep Security Agents to Relays The two types of updates performed by Deep Security are software updates and security updates. Security Updates You must keep your Deep Security deployment up to date with the security updates that Deep Security uses to identify potential threats. Security updates for Deep Security Agents in version 12.0 and later are digitally signed to prove that they came from Trend Micro and to ensure that they were not tampered with in transit to the Agent. Trend Micro releases new rule updates every Tuesday, with additional updates as new threats are discovered. You can get information about the latest updates from the Trend Micro Threat Encyclopedia. When performing the Security Update task, Deep Security Manager instructs the Deep Security Relay to download new scan components from the Trend Micro ActiveUpdate Server. There are two types of security updates: • • Pattern Updates, which are used by the Anti-Malware Protection Module. Rule Updates, which are used by the following Protection Modules: • • • • Firewall Intrusion Prevention Integrity Monitoring Log Inspection © 2020 Trend Micro Inc. Education 121 Lesson 5: Keeping Deep Security Up To Date The Security Updates Overview page offers an at a glance view of the state of security updates in your environment. Click Administration > Updates > Security to get an overview of the Rule and Pattern update status. Security Update Process Deep Security uses the following process for distributing security updates: Trend Micro AcveUpdate Server Deep Security Manager Deep Security Relay Deep Security Agents 122 Deep Security Virtual Appliance © 2020 Trend Micro Inc. Education Lesson 5: Keeping Deep Security Up To Date 1 Deep Security Manager contacts the Trend Micro ActiveUpdate Server to check for updates. This check is based on a scheduled task, or when an administrator clicks Check For Updates and Download on the Security Updates Overview window. 2 If security updates are available, Deep Security Manager instructs Relays to download the new security components from Trend Micro ActiveUpdate Server. 3 The Relays download the components and store them locally in their \relay\iau folder. 4 Deep Security Manager sends a command to Deep Security Agents retrieve the security components. 5 The Deep Security Agents retrieve the updates from the Relays. Note: Administrators can configure direct access to the ActiveUpdate Server as a failover if the Deep Security Relay goes offline. 6 Deep Security Manager downloads any new Rules from the Relay and stores them in the database. 7 The new rules are transferred to any affected Agents using the Policy Update command. The Agents apply the new rules to the computer. Creating Update Bundles In the case of an air-gapped Relays, update bundles can transfer all available security components from one Deep Security Relay to another. To create an update bundle, run the following command on a source Relay computer with Internet connectivity: dsa_control -b This command creates a *.zip file that includes the contents of the following folder: ...\Deep Security Agent\relay\iau Once created, move the archive to the Relay installation folder of the air-gapped destination systems. On the next security update, the air-gapped Relay will update from the zipped bundle. © 2020 Trend Micro Inc. Education 123 Lesson 5: Keeping Deep Security Up To Date Software Updates Deep Security Manager will regularly check for any updates on Agent packages that have been imported. If new updates for any of these packages are made available on the download center, Deep Security Manager will notify the Agents. When performing a software update, Deep Security Manager loads the new software into the database and advises the Relay. The Relay retrieves the software packages from Deep Security Manager (or from the Download Centre if the Deep Security Manager is not available) and makes the update available. When instructed by Deep Security Manager, the Deep Security Agents and Deep Security Virtual Appliances retrieve the software package from the Relays and installs them on the local systems. The Software Updates Overview page offers an at a glance view of the state of software updates in your environment. 124 • Trend Micro Download Center: This section displays whether there are any updates available for the software that has already been imported to Deep Security. • Deep Security: This section displays the last time a check for software updates was performed and whether the check was successful. Click Check for updates to perform an on-demand check. The date of the next scheduled task for a software update is displayed. There will be a warning if no scheduled tasks exist. • Computers: This section displays whether any computers are running Deep Security Agents for which updates are available. The check is only performed against software that has been downloaded to Deep Security, not against software available from the Download Center. If any computers are out of date, you can click Upgrade Agent /Appliance software which will redirect you to the Computers page, filtered to display any out-of-date computers. © 2020 Trend Micro Inc. Education Lesson 5: Keeping Deep Security Up To Date Software Update process Deep Security uses the following process for distributing software updates. Trend Micro Download Center Deep Security Manager Deep Security Relay Deep Security Agents 1 Deep Security Virtual Appliance Deep Security Manager contacts the Trend Micro Download Center to check for software updates, either automatically based on a scheduled task or initiated manually by an Administrator 2 New Deep Security Agent packages are downloaded to Deep Security Manager. 3 Relays request the packages from the Deep Security Manager. If the Deep Security Manager is unavailable, Relays may download the packages directly from the Download Center, if this setting is enabled. 4 Relays unpack the packages and make each module component available. 5 Deep Security Agent Agents will download the required components from the Relays and install them. Deleting Imported Agent Packages To save space, when Deep Security downloads an update to a package, it may automatically delete old Agent packages that are not currently being used by Agents. The number of old software packages kept in the database is configured in the Number of older software versions to keep per platform setting on the Storage tab in Deep Security Manager Web console. The default is to keep the last 5 packages. You can also manually delete unused Deep Security Agent packages. If you try to delete software that is being used on one of your managed computers, you will get a warning and be prevented from deleting the software. Therefore the number of older packages to keep is a minimum, not an absolute. For example, if set to five, and you have seven versions of the package in use, then all seven packages will be kept. © 2020 Trend Micro Inc. Education 125 Lesson 5: Keeping Deep Security Up To Date Note: In Multi-Tenancy, the primary tenant owns all the Agent software that is being used across all tenants. In order to automatically prune older software, the primary tenant would need to be able to monitor other tenants to find out what software is actually being used. Deep Security Manager will keep all imported software indefinitely until it is manually deleted. Scheduling Checks for Updates Scheduled Tasks can be created to enable Deep Security Manager to regularly contact the ActiveUpdate Server to check for security and software updates. When the Deep Security Manager Setup Wizard is run, an option to automatically create tasks to check for both Security and Software updates is displayed. These selections create a task for each type of update that runs once a day. . 126 © 2020 Trend Micro Inc. Education Lesson 5: Keeping Deep Security Up To Date Update Source Settings Update source settings can be identified on the Updates tab in System Settings. Deep Security Relays A Relay is an Agent that is capable of distributing the software and security updates to other Deep Security Agents and Virtual Appliances. Deep Security Relays help to optimize the distribution of these updates. Relays can: • • Reduce WAN bandwidth costs by shaping update traffic Provide redundancy to update distribution You must have at least one Deep Security Relay in your environment. You can co-locate the Deep Security Relay on the same host as Deep Security Manager or install it on a separate computer. © 2020 Trend Micro Inc. Education 127 Lesson 5: Keeping Deep Security Up To Date Deep Security Relay Architecture The process for adding a Deep Security Relay to your environment involves installing and activating a Deep Security Agent and then enabling the Deep Security Relay functionality on that Deep Security Agent. The Deep Security Relay also includes a Notifier component and a Relay Backend component. • Deep Security Agent: Deep Security Relays reside on a fully functional Deep Security Agent that protects the local system • Deep Security Notifier: The user notification service is used to report detected security threats on Windows computers • Deep Security Relay Backend: The Deep Security Relay Backend launches the Nginx Caching Proxy Server and accepts the store/request/delete commands from Deep Security Manager or Virtual Appliance. These commands are also used to transfer the virtual machine scan context between the Deep Security Virtual Appliances when handling vMotion events • Nginx Caching Proxy: Downloads updates, stores them locally and offers to the Deep Security Agents and Virtual Appliances for download • ds_relay.pem and ds_relay.key:These files store the SSL certificate and the private key Ports By default, Deep Security Relays use the following TCP ports to accept connections: • • 128 Port 4118 allows Deep Security Agents to accept commands from Deep Security Manager Port 4122 is used by Deep Security Relays to accept requests for updatable components from Deep Security Agents © 2020 Trend Micro Inc. Education Lesson 5: Keeping Deep Security Up To Date Enabling Deep Security Relays Relay functionality is enabled by promoting a Deep Security Agent to a Relay. To enable Relay functionality, click the Administration menu. In the left-hand pane, expand Updates > Software and click Relay Management. Select the Relay Group from the list and click Add Relay. Select the Deep Security Agent to promote and click Enable Relay and Add to Group. Note: Only 64-bit Deep Security Agents can be promoted to a Relay. If Enable Relay is not available, it is likely that you are try to enable a 32-bit Deep Security Agent, or the Relay has already been activated for this computer. © 2020 Trend Micro Inc. Education 129 Lesson 5: Keeping Deep Security Up To Date Deep Security Agents will install the plug-ins required, and the Agent will begin to function as a Relay. Organizing Relays Into Groups For distributing updates throughout the network more efficiently, Relays can be organized into groups. This ensures that the update load is distributed across multiple Deep Security Relays, and also adds redundancy to your Deep Security deployment. It is recommended that Deep Security Agents on computers in a particular geographic region or office be configured to download updates from a Relay Group in the same region. Trend Micro AcveUpdate Server 130 Deep Security Manager O awa Relay Group Dallas Relay Group Cork Relay Group O awa Agents Dallas Agents Cork Agents © 2020 Trend Micro Inc. Education Lesson 5: Keeping Deep Security Up To Date Although a Relay Group may contain as few as a single member Relay, for performance and redundancy reasons, it is best to configure the group to contain more than one member Relay. Each Deep Security Agent will try to download updates from a randomly arranged list of the relays in the group it is assigned to. If there's no response from the relay, the Agent will try another from the list until it can successfully download the update. The list is random for each Deep Security Agent so that the update load is shared evenly across relays in a group. Trend Micro recommends at least 2 relays for redundancy. Number of relays should vary by: Note: • • Redundancy requirements • • Number of protected computers (deployment scale) Geographic locations: Trend Micro recommends that Deep Security Agents download updates from a relay group in the same geographic region, preferably the same local network. Number of network bottlenecks / maximum bandwidth: A bottleneck occurs when all Agents cannot quickly download updates through the same connection, such as a low bandwidth WAN connection between the Deep Security Agents' local network segment and a remote Deep Security Manager / Trend Micro Update Server. Alerts can occur if this happens. Routers / firewalls / proxies with high system resource usage between Agents and the update source can also be performance bottlenecks. To alleviate bottlenecks, put a relay inside each bottlenecked network segment. Don't convert all of your Deep Security Agents to be Relays. Too many Relays can introduce a delay. A Deep Security Relay requires more system resources than an ordinary Agent. In order to distribute load and fault impact, Deep Security Relays in a group are not prioritized. Each Deep Security Agent and Appliance assigned to a Relay Group automatically chooses a member Relay from the group at random to connect to. If the initial Relay fails to respond when the Agent/ Appliance attempts to download updates, then the Agent/Appliance randomly selects another member Relay from the Relay Group to update from. Since the list is shuffled by each Agent/ Appliance, they each contact the Relays in a different order. Note: If a Deep Security Relay is busy with an update to a Deep Security Agent or Virtual Appliance, it will reject new connections from other Agents and Virtual Appliances. Although there must always be at least one Relay Group in your environment that downloads Security Updates from the Trend Micro Update Server, a Relay Group can alternatively download updates from another Relay Group. Creating a Relay Group Once you have installed and activated your Deep Security Relays, complete the following steps to create Relay Groups. Relays not yet configured into a group are automatically configured as members of the Default Relay Group. © 2020 Trend Micro Inc. Education 131 Lesson 5: Keeping Deep Security Up To Date 1 In the Deep Security Manager Web console, click the Administration menu. Expand Update > Software and click Relay Management. 2 Click New Relay Group, and in the right-hand Relay Group Properties, configure the details for the Relay Group. 132 © 2020 Trend Micro Inc. Education Lesson 5: Keeping Deep Security Up To Date Assigning Deep Security Agents and Appliances to Relay Groups Computers can be added to a Relay Group group through Details. Double-click a computer to open its Details and select a group from the Download Security Updates From list. © 2020 Trend Micro Inc. Education 133 Lesson 5: Keeping Deep Security Up To Date Alternately, select the Relay group when creating a deployment script. 134 © 2020 Trend Micro Inc. Education Lesson 5: Keeping Deep Security Up To Date Review Questions 1 Describe the function of the Deep Security Relay? How does a Relay differ from an Agent? 2 How can you keep a Relay without Internet connectivity up to date? 3 Why would you organize Relays into Relay Groups? © 2020 Trend Micro Inc. Education 135 Lesson 5: Keeping Deep Security Up To Date 136 © 2020 Trend Micro Inc. Education Lesson 6: Trend Micro Smart Protection Lesson 6: Trend Micro Smart Protection Lesson Objectives: After completing this lesson, participants will be able to: • • Define the Smart Protection Services used by Deep Security Configure Smart Protection Sources Smart Protection includes services that provide anti-malware signatures, web reputation credibility scores, vulnerability patterns, in-the-cloud threat databases and more. Smart Protection Services used by Deep Security include: • • • • • • File Reputation Service Web Reputation Service Predictive Machine Learning Service Census Service Certified Safe Software Service Smart Feedback File Reputation Service The File Reputation Services checks the reputation of each file against an extensive in-the-cloud database. Since the malware information is stored in the cloud, it is available instantly to all users. The cloud-Agent architecture eliminates the burden of pattern deployment while significantly reducing the overall Agent footprint. Deep Security Agents must be in Smart Scan mode to use File Reputation Services. Web Reputation Service With one of the largest domain-reputation databases in the world, Trend Micro Web Reputation technology tracks the credibility of Web domains by assigning a reputation score based on factors such as a Website's age, historical location changes and indications of suspicious activities discovered through malware behavior analysis. Web Reputation then continues to scan sites and block users from accessing infected ones. Web Reputation ensures that the pages that servers access are safe and free from Web threats, such as malware, spyware, and ransomware. To increase accuracy and reduce false positives, Trend Micro Web Reputation technology assigns reputation scores to specific pages or links within sites instead of classifying or blocking entire sites, since often, only portions of legitimate sites are hacked and reputations can change dynamically over time. © 2020 Trend Micro Inc. Education 137 Lesson 6: Trend Micro Smart Protection Census Service This service provides information about the prevalence of detected files. Prevalence is a statistical concept referring to the number of times a file was detected by Trend Micro sensors at a given time. If a file has not triggered any detections, the file becomes suspicious as over 80% of all malware is only seen once. Census covers over 300 million distinct executable files. File prevalence and maturity is important because polymorphism is the primary weapon of malware. An unknown binary can mean a possible targeted attack. In Deep Security, the Census Service is used for behavior monitoring and predictive machine learning. Predictive Machine Learning Service Deep Security provides enhanced malware protection for unknown threats and zero-day attacks through Predictive Machine Learning. Trend Micro Predictive Machine Learning uses advanced machine learning technology to correlate threat information and perform in-depth file analysis to detect emerging security risks through digital DNA fingerprinting, API mapping, and other file features. Predictive Machine Learning is effective in protecting against security breaches that result from targeted attacks using techniques such as phishing and spear phishing. In these cases, malware that is designed specifically to target your environment can bypass traditional malware scanning techniques. During real-time scans, when Deep Security detects an unknown or low-prevalence file, the Deep Security Agent scans the file using the Advanced Threat Scan Engine (ATSE) to extract file features. It then sends the report to the Predictive Machine Learning engine which is hosted on the Trend Micro Smart Protection Network. Through the use of malware modeling, Predictive Machine Learning compares the sample to the malware model, assigns a probability score, and determines the probable malware type that the file contains. If the file is identified as a threat, Deep Security quarantines the file to prevent the threat from continuing to spread across your network. Certified Safe Software Service The Certified Safe Software Service provides a comprehensive list of applications considered to be safe by Trend Micro. The list includes most popular operating system files and binaries as well as applications for desktops, servers, and mobile devices. Trend Micro periodically provides updates to the list. Certified Safe Software Service queries Trend Micro datacenters to check submitted sample files and objects against these databases. Allow listing known good files is used to: • • • 138 Reduce false positives Save computing time and resources Provide a mechanism for locking down systems from any undesired infiltration © 2020 Trend Micro Inc. Education Lesson 6: Trend Micro Smart Protection Sources for the Certified Safe Software Service include: • Internal sources, such as the File Reputation Service, Tech Support, All Trend Release Builds, etc. • Partnerships with other tech companies, including Adobe, Apple, Google, Mozilla, Cisco, Acer, VMWare, Yahoo!, Citrix, Intel, Intuit, Bigfish Games, Electronics Arts, etc. • Targeted, pro-active sourcing including software download sources, such as Cnet download.com, Majorgeeks, Softpedia, Sourceforge, crawlers, etc. • Subscriptions, including National Software Reference Library, MSDN, and some regional magazines (especially from Europe) that include DVDs/applications • • Local sourcing teams for P regional file collection • Customer Submission, for example, through Customer Support GRID (Good Reputation Index Database), the world’s largest goodware catalog with over 700 million unique files and 130+ Grid Partners Smart Feedback Trend Micro Smart Feedback provides continuous communication between Trend Micro products and its 24/7 threat research centers and technologies. Each new threat identified through every single customer's routine reputation check automatically updates all Trend Micro threat databases, blocking any subsequent customer encounters of a given threat. By continuously processing the threat intelligence gathered through its extensive global network of customers and partners, Trend Micro delivers automatic, real-time protection against the latest threats and provides better together security, much like an automated neighborhood watch that involves the community in the protection of others. Because the gathered threat information is based on the reputation of the communication source, not on the content of the specific communication, the privacy of a customer's personal or business information is always protected. Samples of information sent to Trend Micro through Smart Feedback include: • • • • File checksums Websites accessed File information, including sizes and paths Names of executable files You can terminate your participation to the program anytime from the Deep Security Manager Web console. You do not need to participate in Smart Feedback to protect your servers. Your participation is optional and you may opt out at any time. Trend Micro recommends that you participate in Smart Feedback to help provide better overall protection for all Trend Micro customers. Smart Protection Sources The Smart Protection sources to which the Deep Security Agent connects can be either: • • Trend Micro Smart Protection Network Smart Protection Server © 2020 Trend Micro Inc. Education 139 Lesson 6: Trend Micro Smart Protection Trend Micro Smart Protection Network The Trend Micro Smart Protection Network is a collection of on-line services. It powers both onpremise and Trend Micro hosted solutions to protect users whether they are on the network, at home, or on the go. Protection is automatically updated and strengthened as more products, services and users access the network, creating a real-time neighborhood watch protection service for its users. Service URLs The URLs used Deep Security Agents to communicate with the required services on the Smart Protection Network include: • • • • • • • Predictive Machine Learning: ds20-en-f.trx.trendmicro.com ActiveUpdate: iaus.activeupdate.trendmicro.com Census: ds2000-en-census.trendmicro.com Certified Safe Software Service: grid-global.trendmicro.com Web Reputation: ds20-0-en.url.trendmicro.com Smart Scan: ds20.icrc.trendmicro.com Smart Feedback: ds200-en.fbs25.trendmicro.com Smart Protection Server Smart Protection Servers localize File Reputation and Web Reputation services to the corporate network to optimize efficiency. This server is available as a VMware image that runs CentOS and is compatible with the following virtual servers: • • • • • • 140 VMware ESXi Server 6.5 Update 1, 6.0 Update 3a and 5.5 Update 3b Microsoft Windows Server 2008 R2 with Hyper-V Microsoft Windows Server 2012 with Hyper-V Microsoft Windows Server 2012 R2 with Hyper-V Microsoft Windows Server 2016 with Hyper-V Citrix XenServer 7.2, 7.1, 6.5 © 2020 Trend Micro Inc. Education Lesson 6: Trend Micro Smart Protection Configuring the Smart Protection Source Deep Security Agents send queries to their configured Smart Protection sources (the Trend Micro Smart Protection Network, or a local Smart Protection Server) when scanning for security risks and determining a Web site’s reputation. File Reputaon Web Reputaon Deep Security Agent Smart Protecon Server To reduce the possibility of going off-line, Security Agents can be assigned multiple Smart Protection Servers. If the Agent is unable to query one Smart Protection Server, it can switch to an alternative Smart Protection Server if another is available, thereby avoiding a single-point-of-failure for cloud scanning functionality. Smart Protection Source for File Reputation Service The Smart Protection Source for File Reputation Service is defined in the Anti-Malware Protection Module and supplies file reputation information required by Smart Scan. In the Deep Security Manager Web Management console, go to Computers or Policies > Anti-Malware > Smart Protection. © 2020 Trend Micro Inc. Education 141 Lesson 6: Trend Micro Smart Protection You can select to connect directly to Trend Micro's Smart Protection Server or to connect to one or more locally installed Smart Protection Servers. If you want to use a proxy for communication between Deep Security Agents and the Smart Protection Network, we recommend that you create a proxy server specifically for the Smart Protection Network. You can view and edit the list of available proxies on the Proxies tab on the Administration > System Settings page. After you select a proxy, you will need to restart any agents that will be using it. Select the When off domain, connect to global Smart Protection Service (Windows only) option to use the global Smart Protection Service if the computer is off domain. The computer is considered to be off domain if it cannot connect to its domain controller. (This option is for Windows agents only.) If you have a locally installed Smart Protection Server, this option should be set to Yes on at least one computer so that you are notified if there is a problem with the Smart Protection Server itself. Set the Smart Protection Server Connection Warning to generate error events and alerts when a computer loses its connection to the Smart Protection Server. Smart Protection Source for Web Reputation The Smart Protection Source for Web Reputation supplies Web site credibility score information required by the Web Reputation Protection Module. In the Deep Security Manager Web console, go to Computers or Policies > Web Reputation > Smart Protection. You can select to connect directly to Trend Micro's Smart Protection Server or to connect to one or more locally installed Smart Protection Servers. If you want to use a proxy for communication between agents and the Smart Protection Network, create a proxy server specifically for the Smart Protection Network. You can view and edit the list of available proxies on the Proxies tab on the Administration > System Settings page. For information on proxy protocols, see Proxy protocols supported by Deep Security. After you select a proxy, you will need to restart any agents that will be using it. 142 © 2020 Trend Micro Inc. Education Lesson 6: Trend Micro Smart Protection Select the When off domain, connect to global Smart Protection Service (Windows only) option to use the global Smart Protection Service if the computer is off domain. The computer is considered to be off domain if it cannot connect to its domain controller. (This option is for Windows agents only.) If you have a locally installed Smart Protection Server, this option should be set to Yes on at least one computer so that you are notified if there is a problem with the Smart Protection Server itself. Set the Smart Protection Server Connection Warning to generate error events and alerts when a computer loses its connection to the Smart Protection Server. Smart Protection Source for Census, Certified Safe Software and Predictive Machine Learning The Smart Protection Source for the Census, Certified Safe Software and Predictive Machine Learning services is enabled as a general setting for the computer or the policy. In the Deep Security Manager Web console, go to Computers or Policies > Settings. On the General tab, indicate whether a proxy is required to access the Global Server. © 2020 Trend Micro Inc. Education 143 Lesson 6: Trend Micro Smart Protection Review Questions 1 Which of the Smart Protection services are used by Deep Security? 2 Which of the Smart Protection services are available through a local Smart Protection Server? 3 How is the Census service used in conjunction with the Predictive Machine Learning service? 144 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies Lesson Objectives: After completing this lesson, participants will be able to: • • • • • Create security policies Override policy values inherited from a parent policy Create common objects which can be reused in multiple policies Run Recommendation Scans to identify known vulnerabilities Create policies based on the results of a Recommendation Scan While protection settings can be assigned manually to each server, it is more efficient to assign these settings though policies. Policies are collections of rules and configuration settings that are saved for easier assignment to multiple computers. In Deep Security, a policy can include the configuration of the following items: • Protection Module state: The policy can dictate whether a Protection Module will be enabled or disabled on computers using this policy © 2020 Trend Micro Inc. Education 145 Lesson 7: Assigning Protection Settings Through Policies • Settings: Settings that are set in a policy are applied to any computers using this policy • Rules: Rules assigned to Protection Modules that use them are assigned to any computers using this policy The Policy editor is used to create and edit policies that can then be applied to one or more computers. The Computer editor, which is very similar to the Policy editor, can be used to apply settings to a specific computer. 146 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies Policy Structure Most Deep Security policy elements and settings operate on multiple hierarchical levels starting with a Base Policy level, going down through multiple levels of child policies. Computers can be assigned policies at any level in the hierarchy and will inherit the settings configured in that policy. Any changes to the settings in the assigned policy will be refreshed on all computers using that policy. The Policies tab in the Deep Security Web console displays all the existing Policies along with their parent/child relationship in a hierarchical tree structure. Deep Security provides a collection of policies that can be used as initial templates for the design of policies tailored to your environment. © 2020 Trend Micro Inc. Education 147 Lesson 7: Assigning Protection Settings Through Policies Policy Inheritance Deep Security supports multiple levels of policy inheritance. Newly created child policies can be configured to inherit all or some of their settings from their parent policies. This allows you to create a policy tree that begins with a base policy configured with settings and rules that will apply to all computers, then a set of child and further descendant policies which have progressively more specific targeted settings. For example, you can use the base policy for settings to be applied to all computers throughout the organization. A child policy can then be created containing settings to be applied to all Windows computers. This child policy can inherit settings from the base policy or it can override them. This child policy can in turn have child policies of their own for different editions of Windows, for example, one child policy to enforce settings on Windows Server 2012 R2 computers and another to enforce settings on Windows Server 2016 computers. Your policy trees can be built based on any kind of classification system that suits your environment. For example, the Deep Security branch in the policy tree that comes with Deep Security has two child policies, one designed for a server hosting the Deep Security Manager and one designed for the Deep Security Virtual Appliance. This is a role-based tree structure. Deep Security includes three policy branches designed for specific operating systems: • • • Linux Solaris Windows The Windows branch contains further child policies for desktop or server computers. As an example, the Windows policy displayed here was created as a child of the Base Policy and in this policy, the Anti-Malware configuration is Inherited (Off). 148 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies This means that the Anti-Malware setting in the Windows policy is inherited from its parent policy, in this case, the Base Policy. If you were to change the Anti-Malware setting in the Base Policy from Off to On, the setting would change in the Windows policy to Inherited (On). The value in parentheses always shows you what the current inherited setting is. Policy-Level Overrides In the example below, the Windows Server policy is a child of the Windows policy. Here the AntiMalware setting is no longer inherited as it been overridden and set to On: Any child policies created below the Windows Server level will inherit the Anti-Malware configuration of On, as it is was set in its parent. This inherited setting will be displayed as (Inherited) On. © 2020 Trend Micro Inc. Education 149 Lesson 7: Assigning Protection Settings Through Policies You can view the settings that have been overridden on a policy by going to the Overrides page in the Policy Details: Overrides are displayed by Protection Module. You can revert system or module overrides by clicking Remove. If you find yourself overriding a large number of settings, you should probably consider branching the parent Policy. Computer-Level Overrides Any setting in a policy that is assigned or inherited can be overridden at the computer level. In this scenario, the computer will apply all the settings within the policy it is assigned to, EXCEPT for the items that were overridden. 150 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies You can see the number of settings that have been overridden on a computer by going to the Overrides page in the Computer Details: Overrides are displayed by Protection Module. You can revert system or module overrides by clicking Remove. Rule Inheritance Some Protection Modules, including Intrusion Prevention, Integrity Monitoring, Log Inspection and Firewall use rules to define behavior. You can assign rules at any level in the hierarchy, either through a policy or directly to a computer. However, rules that are in effect at a particular policy or computer level because their assignment is inherited from a parent policy cannot be unassigned locally. They must be unassigned at the Policy level in which they were initially assigned. © 2020 Trend Micro Inc. Education 151 Lesson 7: Assigning Protection Settings Through Policies Rules that are inherited and can not be disabled are greyed out in the policy Assign/Unassign list for each Protection Module. 152 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies Creating Policies There are several ways to create policies in the Deep Security Manager Web Management console, depending on whether the policy is being created from scratch, based on existing parameters or based on the result of a Recommendation Scan. Creating a New Policy Click the Policies menu and in the Policies pane, click New > New Policy. Select an existing policy as the parent. All the settings in this parent policy will be inherited in the new policy, which can then be modified by adding, removing or editing the parameters. © 2020 Trend Micro Inc. Education 153 Lesson 7: Assigning Protection Settings Through Policies Duplicating an Existing Policy To create a replica of an existing policy, select and duplicate the policy, then rename this new policy. The settings in the original policy are carried over to the duplicate. The Windows Server policy is displayed in this example. This policy is duplicated and renamed to Windows Serve 2019. The settings in the original are carried over to the duplicate. Any changes required on this duplicate can be applied to this new policy. 154 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies Importing an Existing Policy From Another Installation Policies configured in one installation of Deep Security Manager can be imported into another Deep Security Manager. In the source installation, select a policy from the tree and click Export > Export Selected to XML (For Import). The resulting *.XML file can then be copied over to the destination Deep Security Manager computer. Click New > Import From File to import policies from the XML file. When importing policies, ensure that the system where you created the policies and the system that will receive them both have the latest security updates. If the system that is receiving the policies is running an older security update, it may not have some of the rules referenced in the policies from the up-to-date system. Running Recommendation Scans Deep Security Agents can run Recommendation Scans on their host computer to offer suggestions on rules that would be appropriate for this device. This operation scans the operating system and installed applications and based on what is detected, Deep Security will recommend security rules that should be applied. Recommendation scans provide administrative users with a list of Deep Security rules that need to be applied to a computer and creates a guide in hardening a host using Deep Security. These rule recommendations rely on the following software properties: • The recommended Intrusion Prevention rules rely on the installed software and known vulnerabilities • The recommended Integrity Monitoring rules rely on detected critical system and software objects • The recommended Log Inspection rules rely on detected logs and their known critical entries © 2020 Trend Micro Inc. Education 155 Lesson 7: Assigning Protection Settings Through Policies During a Recommendation Scan, Deep Security Agents scan: • • • • • • • The operating system Installed applications The Windows registry Open ports The directory listing The file system Running processes and services A Deep Security Virtual Appliance can perform Agentless recommendation scans on virtual machines but only on Windows platforms and is limited to scanning: • • • • The operating system Installed applications The Windows registry The file system Best Practice: Because changes to your environment can affect which rules are recommended, it's best to run recommendation scans on a regular basis (the best practice is to perform recommendation scans on a weekly basis). Trend Micro releases new intrusion prevention rules on Tuesdays, so it's recommended that you schedule recommendation scans shortly after those releases. The use of system resources, including CPU cycles, memory, and network bandwidth, increases during a recommendation scan so it's best to schedule the scans at non-peak times. There are several ways to run Recommendation Scans: • Scheduled task: Create a scheduled task that runs Recommendation Scans according to a schedule that you configure. You can assign the scheduled task to all computers, an individual computer, a defined computer group, or all computers protected by a particular policy. • Ongoing scans: Configure a policy so that all computers protected by the policy are scanned for recommendations on a regular basis. You can also configure ongoing scans for individual computers. This type of scan checks the timestamp of the last scan that occurred and then and follows the configured interval thereafter to perform future scans. This results in Recommendation Scans occurring at different times in your environment. This setting is helpful in environments where an agent might not be online for more than a few days (for example, in cloud environments that are building and decommissioning instances frequently). • Manual scans: Run a single Recommendation Scan on one or more computers. A manual scan is useful if you’ve recently made significant platform or application changes and want to force a check for new recommendations instead of waiting for a scheduled task. • API: Initiate a Recommendation Scan via the Deep Security API. Best Practice: 156 Use either the scheduled tasks or ongoing scans, but not both. © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies Once a Recommendation Scan has run, alerts are raised on the all computers for which recommendations have been made. A Recommendation Scan follows these steps: Deep Security Manager Deep Security Agent Query host information Collect host metadata Return host information Identify recommendations that apply to host Rules applied 1 Query host information Deep Security Manager sends a query to Deep Security Agents to initiate the scan. The query includes instructions as to where on the host computer the Agent needs to collect information. These instructions are based on the detection rules and expressions that are included in every Security Update. 2 Collect host metadata Upon receipt of the query request, the Deep Security Agent collects information about the host computer for return to Deep Security Manager. Features within the Deep Security Agent obtain information from the following sources: • • • • • Registry entries Running processes Open ports File system Services This information includes not only information about the host operating system, but also the applications that are installed upon it. This information is used to determine the vulnerabilities that may exist on the host. 3 Return host information Once the host metadata is compiled, it is sent to Deep Security Manager as an XML-based message. If the Recommendation Scan was initiated from Deep Security Manager, the information is returned synchronously with the query. Otherwise, it is sent as part of the regular Deep Security Agent heartbeat cycle. 4 Identify recommendations Once the Deep Security Manager receives host metadata from the Deep Security Agent, it compares this information with the following security information in its database to identify which rules need to be applied to the host: • • • • Intrusion Prevention rules Integrity Monitoring rules Log Inspection rules Log Inspection decoders © 2020 Trend Micro Inc. Education 157 Lesson 7: Assigning Protection Settings Through Policies For example, if the service information collected from the Windows Service Control Module indicates that Microsoft IIS was present on the host, then the rules related to this particular Web server need to be applied. A list of recommended rules is displayed in the Deep Security Manager Web console. 5 Rules applied Rules can be set to be applied manually or automatically at the computer level. Any policy assigned to this server will also have the recommendations available to be applied manually to the policy. Assigning the Recommendations Recommendation Scans offer suggestions on rules which would be appropriate for the server, based on the operating system and applications the server is currently hosting. The scan is run on the server and the recommendations can be assigned to this server only, or can be applied to a policy that the server is bound to. Assigning the Recommended Rules to a Computer Once a scan has completed, the rules recommended by the scan can be added to a computer manually or automatically. To apply the rules manually, once the Recommendation Scan is complete, select the corresponding protection module and click Assign/Unassign from the General tab of Computer Details. Select Recommended for Assignment from the list and click to select the individual rules to apply. 158 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies The recommended rules can also be applied automatically by setting Automatically Implement Recommendations to Yes on the General tab before running the scan. Note: Rules assigned this way override both Base and assigned Policy-level settings. Maintaining these rules may become tedious and may eventually require use of an Override at the assigned Policy level. The results of a Recommendation Scan can also include recommendations to unassign rules. This can happen when applications are uninstalled, when security patches from a manufacturer are applied, or when unnecessary rules have been applied manually. If Automatically Implement Recommendation is set to Yes, rules that are no longer needed are automatically removed, otherwise, select Recommended for Unassignment from the display filter menu and deselect the rules that are no longer needed. © 2020 Trend Micro Inc. Education 159 Lesson 7: Assigning Protection Settings Through Policies Applying the Recommended Rules to a Policy If the computer on which you ran a recommendation scan is currently using a policy, the suggested rules will also be available to apply manually to the policy through the Recommended for Assignment list. 160 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies If a rule that was previously applied in the policy is no longer needed after the scan is run, it can be selected from the Recommended for Unassignment list. Performing Ongoing Scans To ensure that the results of the scan are always up to date, Recommendation Scans can be configured to run automatically at a specified interval. At the computer level, any new rules released since the previous scan will be either added to the Recommended for Assignment list (if rule assignment is being done manually) or added automatically (if Automatically Implement Recommendations is enabled). Likewise, any rules that are no longer needed will be added to the Recommended for Unassignment list (if rule assignment is being done manually) or removed automatically (if Automatically Implement Recommendations is enabled). © 2020 Trend Micro Inc. Education 161 Lesson 7: Assigning Protection Settings Through Policies Scheduling a Recommendation Scan Recommendation Scans can also be set to run as a scheduled task. This can be set at the Base Policy, individual Policy or Computer level. Creating a New Policy Based on a Recommendation Scan To create a policy to be used on a collection of computers with similar configurations, the results of the Recommendation Scan can be used as the basis for a new policy. 162 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies Create a new policy and when prompted, click Yes to base the policy on an existing configuration. Select the server on which you ran the Recommendation Scan that will be used as the basis for the policy. © 2020 Trend Micro Inc. Education 163 Lesson 7: Assigning Protection Settings Through Policies Select which configuration settings and rules from the selected server will be carried over to the new policy. 164 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies Common Objects Common Objects lists objects that can be shared by many constructs such as policies and rules throughout Deep Security. Common Objects can be considered as a root repository for shared objects and can be accessed from the Policies menu. Rules The Rules list displays all of the current Protection Module rules (for those modules that make use of rules): • • • • • Firewall rules Intrusion Inspection rules Integrity Monitoring rules Log Inspection rules Application Control rulesets © 2020 Trend Micro Inc. Education 165 Lesson 7: Assigning Protection Settings Through Policies The list of rules is refreshed regularly by Trend Micro as new vulnerabilities are discovered and new applications released. Any custom rules you have created will also be listed. Lists The Lists page contains objects that can be reused by various configuration or rules by either policies or computers. • • Directory Lists includes a reusable lists of directories File Extension Lists includes a list of file extensions that are used by Malware Scan Configurations. For example, one list of file extensions can be used by multiple Malware Scan Configurations to identify files to include in a scan. Another list of file extensions can be used by multiple Malware Scan Configurations as files to exclude from a scan. • • • • File Lists includes a reusable lists of files IP Lists includes a reusable lists of IP addresses for use by multiple Firewall Rules MAC Lists includes a reusable lists of MAC addresses Port Lists includes a reusable lists of ports Contexts Contexts provide a mechanism for implementing different security policies depending on the computer's network environment. 166 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies With many laptops now capable of connecting to both wired and wireless networks, users need to be aware of the problems that can result from this scenario. For example, a common problem is a network bridge configured between wired and wireless networks. This risks forwarding the internal traffic externally and potentially exposing internal hosts to external attacks. Deep Security allows administrators to configure a set of firewall rules for these types of users to prevent them from creating a network bridge. Contexts are designed to be associated with Firewall and Intrusion Prevention Rules. If the conditions defined in the Context associated with a rule are met, the rule is applied. To link a security rule to a Context, go to the Options tab in the Properties window for the rule and select the Context from the menu. Contexts can also be used to provide Deep Security Agents with location awareness. To determine a computer's location, contexts examine the nature of the computer's connection to its domain controller and connectivity to the Internet. • Locally Connected to Domain is true only if the computer can connect to its domain controller directly • Remotely Connected to Domain is true if the computer can only connect to its domain controller through a VPN connection • • Not Connected to Domain is true if the computer cannot connect to its domain controller Not Connected to Domain, No Internet Connectivity is true if the computer cannot connect to its domain controller by any means and the host has no Internet connectivity. (The test for Internet connectivity can be configured in Administration > System Settings > Contexts.) By assessing the ability of the computer to connect with its domain controller or the Internet, an Agent can then implement rules such as restricting HTTP traffic to non-routable (or private) IP addresses only. © 2020 Trend Micro Inc. Education 167 Lesson 7: Assigning Protection Settings Through Policies The following contexts are included with Deep Security by default: Both the Off Domain and Remote Domain VPN contexts use the Deep Security Agent’s host domain controller as their reference servers. Interface Isolation forces the Deep Security Agent host to use only one network interface, thereby facilitating protection. This is particularly useful for laptops that have wireless functionality as well as a network connection, where a connection can be bridged. A context that uses Interface Isolation will apply to interfaces that have been disabled. This is useful for firewall policies using the Allow and Force Allow actions. 168 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies Firewall Stateful Configurations Firewall Stateful Configurations analyze each packet in the context of traffic history, correctness of TCP and IP header values, and TCP connection state transitions. In the case of stateless protocols like UDP and ICMP, a pseudo-stateful mechanism is implemented based on historical traffic analysis. Malware Scan Configurations Malware Scan Configurations handle the way the detection of malware is processed. Configuration options include what files to scan, whether the scanning is done in real time or on a scheduled basis, and what actions to carry out if malware is detected. In this section you can set how, in what combination, and when these configurations are in effect on a computer, and whether it is set at the policy and at the computer levels. As with most elements in Deep Security, many global settings can be overridden at the Policy and computer levels. © 2020 Trend Micro Inc. Education 169 Lesson 7: Assigning Protection Settings Through Policies Schedules Schedules are reusable timetables for configuring when certain actions should take place. Syslog Configurations Syslog configurations define the destination and settings that can be used when forwarding system or security events. Tags In Deep Security, a tag is a unit of meta-data that you can apply to a Deep Security event in order to create an additional attribute for the event that is not originally contained within the event itself. Tags can be used to sort, group, and otherwise organize Events in order to simplify the task of event monitoring and management. A typical use of tagging is to distinguish between events that have been investigated and found to be benign and those that require action. 170 © 2020 Trend Micro Inc. Education Lesson 7: Assigning Protection Settings Through Policies Review Questions 1 Characterize the differences between the following protection module states as displayed in a policy: • Default (On/Off) • Inherited (On/Off) • On • Off 2 The Firewall Protection Module is enabled in a new child policy called Internal-SQL. You notice that some rules for Firewall are already enabled in the policy, but when you try to remove one of the rules, the item is greyed out. Why are you not able to remove the rules for the Firewall protection module in this policy? 3 Describe the use of the Contexts policy object. Which protection modules would make use of this object? © 2020 Trend Micro Inc. Education 171 Lesson 7: Assigning Protection Settings Through Policies 172 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware Lesson Objectives: After completing this lesson, participants will be able to: • • • • • Describe the anti-malware scanning techniques used in Deep Security Define malware scan configurations, including the action taken when potential malware is identified Enable malware protection through a policy or directly to a computer Review quarantined files and restore if the file is proven to not be a threat Locate and view malware-related events The Deep Security Anti-Malware Protection Module provides real-time, on-demand or scheduled protection against file-based threats, including malware, viruses, Trojans, spyware and ransomware. To identify these threats, the Anti-Malware Protection Module checks the files against a comprehensive threat database, portions of which are hosted online or kept locally as updatable patterns. It also checks files for certain characteristics, such as compression and known exploit code. Deep Security also provides security settings that you can apply to Windows servers that are protected by a Deep Security Agent to enhance your malware and ransomware detection and clean rate. These settings go beyond malware pattern matching and identify suspicious files that could potentially contain emerging malware that hasn’t yet been added to the anti-malware patterns (known as a zero-day attack). To address threats, the Anti-Malware Protection Module selectively performs actions that contain and remove the threats while minimizing system impact. The Anti-Malware Protection Module can clean, delete, or quarantine malicious files. It can also terminate processes and delete other system objects that are associated with identified threats. You can configure the anti-malware settings through a policy and assign that policy to all relevant computers (for example, to all Windows Servers), or to a computer directly (at the computer level). The best practice is to use policies as much as possible for ease of management. Note: A newly installed Deep Security Agent cannot provide anti-malware protection until it has contacted an update server to download anti-malware patterns and updates. Ensure that your Deep Security Agents can communicate with a Deep Security Relay or the global Trend Micro Update Servers after installation. © 2020 Trend Micro Inc. Education 173 Lesson 8: Protecting Servers from Malware Anti-Malware Solution Platform Anti-malware functionality uses the Trend Micro Anti-Malware Solution Platform (AMSP). This common framework abstracts Trend Micro products from specific security technology implementations and manages the different security modules for spyware, phishing, spam, web threat, and behavior monitoring and so forth across multiple Trend Micro products. Trend Micro Product Solutions Machine learning Process memory Content security Behavior monitoring Anti-rootkit Anti-spam Anti-spyware Anti-virus Anti-Malware Solution Platform In a Deep Security Agent installation, the Anti-Malware Solution Platform exists as a separate entity. On a Windows computer, the Anti-Malware Solution Platform service host, framework host, log server, and various configuration files (in the form of *.cfg and *.ini files) are held in the following folder: C:\Program Files\Trend Micro\AMSP Sub folders include configuration and resource backup files, debug and engine debug logs as well as the core modules. 174 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware The Anti-Malware Solution Platform service appears as a service in the Windows Services window. Anti-Malware Scanning Methods Deep Security Agents use the Anti-Malware Solution Platform to administer the following scanning methods: Virus Scanning Virus Scanning is responsible for detecting file-based viruses. Viruses infect files by inserting malicious code. Typically, when an infected file is opened the malicious code automatically runs and delivers a payload in addition to infecting other files. Common types of viruses include: • COM and EXE infectors: These infect DOS and Windows executable files, which typically have COM and EXE extensions. • • Macro viruses: These typically infect Microsoft Office files by inserting malicious macros. Boot sector viruses: These infect the section of hard disk drives that contain operating system startup instructions The Anti-Malware Protection Module uses different technologies to identify and clean infected files. The most traditional method is to detect the actual malicious code that is used to infect files and strip infected files of this code. Other methods include regulating changes to infectable files or backing up such files whenever suspicious modifications are applied to them. Deep Security offers conventional scanning using virus patterns stored locally on the Deep Security Agent computer, or Smart Scan which shifts some of the scanning functionality to the Smart Protection Network or Smart Protection Server. © 2020 Trend Micro Inc. Education 175 Lesson 8: Protecting Servers from Malware Spyware and Grayware Scanning Spyware and grayware comprises applications and components that collect information to be transmitted to a separate system or collected by another application. Spyware/grayware detections, although exhibiting potentially malicious behavior, may include applications used for legitimate purposes such as remote monitoring. Spyware and grayware applications are typically categorized as: • • Spyware: software installed on a computer to collect and transmit personal information. • Hacking tools: programs or sets of programs designed to assist unauthorized access to computer systems. • Adware: any software package that automatically plays, displays, or downloads advertising material. • Cookies: text files stored by a Web browser. Cookies contain website-related data such as authentication information and site preferences. Cookies are not executable and cannot be infected; however, they can be used as spyware. Even cookies sent from legitimate websites can be used for malicious purposes. • Keyloggers: software that logs user keystrokes to steal passwords and other private information. Some keyloggers transmit logs to remote systems. Dialers: malicious dialers are designed to connect through premium-rate numbers causing unexpected charges. Some dialers also transmit personal information and download malicious software. Although they exhibit what can be intrusive behavior, some spyware-like applications are considered legitimate. For example, some commercially available remote control and monitoring applications can track and collect system events and then send information about these events to another system. System administrators and other users may find themselves installing these legitimate applications. These applications are referred to as grayware. To provide protection against the illegitimate use of grayware, the Anti-Malware module detects grayware but provides an option to approve detected applications and allow them to run. Spyware and Grayware Scanning detects and removes file-based components of malware. Damage Cleanup, along with the Spyware Scanning API, detects and cleans malware-related system alterations outside the file system (for example, malware processes in memory, Registry entries, Layered Service Providers in the protocol stack, etc). Process Memory Scanning Malware writers often use customized packers that can trick file-based anti-malware engines and bypass detection. Typical virus patterns are constructed into binary machine code and this machine code can be repacked using packing tools. Since most conventional anti-malware detection is based on virus signatures, this repacking of the virus machine code can bypass conventional detection. Deep Security can now monitor process memory in real time and once a process is determined to be suspicious, Deep Security will perform additional checks with the Trend Micro Smart Protection Network to determine whether the process is a known good process. If these checks determine it is not a known good process, Deep Security will terminate the running process. 176 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware Behavior Monitoring Deep Security provides security settings that you can apply to Windows and Linux machines that are protected by a Deep Security Agent to enhance malware and ransomware detection and clean rate. These settings enable you to go beyond malware pattern matching and identify suspicious files that could potentially contain emerging malware that hasn’t yet been added to the anti-malware patterns. Threat detection To avoid detection, some types of malware attempt to modify system files or files related to known installed software. These types of changes often go unnoticed because the malware takes the place of legitimate files. Deep Security can monitor system files and installed software for unauthorized changes to detect and prevent these changes from occurring. Anti-exploit In Deep Security, the anti-exploit functionality monitors for processes that may be performing actions that are not typically performed by a given process. Using a number of mechanisms, including Data Execution Prevention (DEP), Structured Exception Handling Overwrite Protection (SEHOP), Caller Check, Special API Check, Heap Spray Prevention and Null Page Prevention, Deep Security can determine whether a process has been compromised and then terminate the process to prevent further infection. Extended ransomware protection Ransomware has become more sophisticated and targeted. Most organizations have a security policy that includes anti-malware protection on their servers, which offers a level of protection against known ransomware variants; however, it may not be sufficient to detect and prevent an outbreak for new variants. The ransomware protection offered by Deep Security can protect documents against unauthorized encryption or modification. Deep Security has also incorporated a data recovery engine that can optionally create copies of files being encrypted to offer users an added chance of recovering files that may have been encrypted by a ransomware process. In the Action to take list, choose the remediation action that you want Deep Security to take when it detects malware: NEW • ActiveAction (recommended): Use the action that ActiveAction determines. ActiveAction is a predefined group of cleanup actions that are optimized for each malware category. Trend Micro continually adjusts the actions in ActiveAction to ensure that individual detections are handled properly. • Pass: Allows full access to the infected file without doing anything to the file. (An AntiMalware Event is still recorded.) Windows Antimalware Scan Interface (AMSI) NEW The Windows Antimalware Scan Interface (AMSI) is an interface provided by Microsoft in Windows 10 and newer. Deep Security leverages AMSI to help detect malicious scripts. © 2020 Trend Micro Inc. Education 177 Lesson 8: Protecting Servers from Malware IntelliTrap IntelliTrap is available for Real-Time scanning. Virus writers often attempt to circumvent virus filtering by using real-time compression algorithms. IntelliTrap helps reduce the risk of such viruses entering your network by blocking real-time compressed executable files and pairing them with other malware characteristics. Because IntelliTrap identifies such files as security risks and may incorrectly block safe files, consider quarantining (not deleting or cleaning) files when you enable IntelliTrap. If users regularly exchange real-time compressed executable files, disable IntelliTrap. Predictive Machine Learning Predictive Machine Learning protects your servers from new, previously unidentified, or unknown threats through advanced file feature analysis and heuristic process monitoring. Predictive Machine Learning can ascertain the probability that a threat exists in a file or process and the probable threat type, protecting you from zero-day attacks. After detecting an unknown or low-prevalence file, Deep Security scans the file to extract file features and sends the report to the Predictive Machine Learning service, hosted on the Trend Micro Smart Protection Network. Through use of malware modeling, Predictive Machine Learning compares the sample to the malware model, assigns a probability score, and determines the probable malware type that the file contains. When Predictive Machine Learning is enabled, choose the remediation action that you want Deep Security to take when it detects malware: NEW • Quarantine (recommended): Moves the infected file to the quarantine directory on the protected computer. The quarantined file can be viewed and restored in Events & Reports > Events > Anti-Malware Events > Identified Files. • Pass: Allows full access to the infected file without doing anything to the file. (An AntiMalware Event is still recorded.) • Delete: On Linux, the infected file is deleted without a backup. On Windows, the infected file is backed up and then deleted. Windows backup files can be viewed and restored in Events & Reports > Events > Anti-Malware Events > Identified Files. Pre-execution machine learning is supported on Windows computers hosting a Deep Security Agent. Predictive Machine Learning requires Internet access to check files against the Global Census Service and Predictive Machine Learning Service hosted on the Trend Micro Smart Protection Network. If your Deep Security Agents or Deep Security Virtual Appliance cannot access the Internet directly, you will need to configure a proxy to enable agents to check those sites. Note: 178 If the Deep Security Agents or Deep Security Virtual Appliance cannot connect to the Global Census Service or Predictive Machine Learning Service, the Predictive Machine Learning cannot work properly and new/unknown ransomware may not be detected. © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware Enabling Malware Protection Enabling Anti-Malware protection in Deep Security typically involves the following steps: 1 Defining a malware scan configuration by selecting the anti-malware scanning methods to be used. 2 Turning the Anti-Malware protection module on in a policy or on a computer. 3 Assigning the malware scan configuration to a scan type in a policy or on a computer. 4 Ensuring that Deep Security can keep up to date on the latest threats. Defining a Malware Scan Configuration A Malware Scan Configuration defines the settings and options such as what files to scan, when the scan is performed, exclusions, what actions to carry out if malware is detected and more. How, in what combination, and when these configurations are in effect on a computer, can set either in a policy or on specific computers. Default Malware Scan Configurations are displayed in the Deep Security Manager Web console from the Common Objects list. These can be used as defined or edited to create new configurations. When a Scan Type is selected, a corresponding Malware Scan Configuration must also be selected to identify the scanning parameters. New Malware Scan Configuration that are created are added to Common Objects list allowing these configuration settings to be easily applied within policies or on computers. You can edit the Malware Scan Configuration from Common Objects, or from the policy or computers. Note: It is recommended to create duplicates of the default scan configurations provided in the Deep Security Manager console. This creates a backup that can be used by administrators for future reference or as templates for new configurations. © 2020 Trend Micro Inc. Education 179 Lesson 8: Protecting Servers from Malware Click the Policy menu and in the left-hand pane, expand Common Objects > Other > Malware Scan Configuration. Double-click an existing configuration or click New to create a new configuration. Select the type of scan by identifying whether the new configuration for a Real-Time Scan or a Manual/Scheduled Scan. The configuration options are displayed on the following tabs. 180 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware General Tab Scan settings on the General tab define the types of scans to be performed and to enabled alerts. Note: The icons beside the scan methods identify whether the method is limited to particular operating system, whether a on-host agent is required and whether a performance hit is expected. © 2020 Trend Micro Inc. Education 181 Lesson 8: Protecting Servers from Malware Inclusions Tab Scan settings on the Inclusions tab define the folders and files to scan when this configuration is used. Directories to scan • • All directories: The Agent will scan files in all directories on the server. Directory List: Select a Directory List common object to restrict the scanning to only the identified directories on the server. Files to scan • File Extension List: Administrators can specify the types of files to scan by selecting a file extension common object from the File Extension List. This option relies on file extensions, which may not necessarily indicate the true nature of the file. • File types scanned by IntelliScan: Some files can’t be scanned, and cannot be malicious. The Agent won’t scan files if it does not know how they can become infected. True file type detection is used by the Agent to identify the type of file it is dealing with, to decide if it is to be scanned, and how to scan it. IntelliScan is a technique used by the Agent to make a scanning decision based on a list of file types which are considering dangerous, and skip the ones not considered dangerous. • All files: The All files option also uses true file type detection, but will also scan files even if it cannot determine the true file type. As an example, the Agent detects a file called dangerous.txt. Since text files have no true file type, it will be scanned when All files is enabled, but not when IntelliScan is enabled as it considers .txt files to be safe. If the text file did contain a malicious script, it would be captured by the All files scan. A file called dangerous.com is detected. No true file type detection is possible with .com files. This file will be scanned when All files is enabled, and also when Intelliscan is enabled as .com files are considered potentially dangerous. 182 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware The examples in this table can provide some examples on choosing between File types scanned by IntelliScan or All files. Header in file Extension yes .exe Considered dangerous yes Scanned by IntelliScan yes Scanned by All Files Notes yes Always scanned .jpeg yes no no no .jpeg files could contain malicious information, such as scripts, but to be malicious the application opening those infected files would also need to be compromised to use the malicious information in the file. .com no yes yes yes Always scanned yes A .txt file could contain malicious scripts, but it is not dangerous in .txt form, but could become dangerous if changed to .com .txt no no no Exclusions Tab Scan settings on the Exclusions tab define the folders and files to ignore when this configuration is used. When the Anti-Malware Protection Module is enabled, there are certain files and folders that should not be scanned. Reasons could include that the files are unscannable due to being encrypted or being locked, or that scanning these files would cause performance issues or cause software using these files to become unstable. © 2020 Trend Micro Inc. Education 183 Lesson 8: Protecting Servers from Malware As an example, if you are creating a malware scan configuration for a Microsoft Exchange server, you should exclude the SMEX quarantine folder to avoid re-scanning files that have already been confirmed to be malware. Recommended exclusions include Microsoft Exchange mailbox folders, database folders and VMWare images. Refer to Trend Micro Knowledge Base article 1059795 for recommended exclusion lists when using Trend Micro products: http://esupport.trendmicro.com/solution/en-us/1059795.aspx Advanced Tab Scan settings on the Advanced tab define various settings such as scanning of linked or embedded objects, scanning of compressed files, as well as the remediation of malware files. The Remediation Actions section identifies how Deep Security will deal with the malware when detected. Default actions are assigned to each type of malware using ActiveAction technology. With ActiveAction, the administrator relies on Trend Micro action recommendations that are stored within the virus scanning pattern. Trend Micro Anti-Virus engineers define these actions based on their analysis of various malware types. Custom actions can also be defined, allowing an administrative user to specify a particular action for malware variations. 184 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware The following actions are available for each malware type displayed: • • • • The Pass action does nothing to the file and allows full access • The Quarantine action moves malware to a quarantine folder The Clean action attempts to remove virus code from the infected file The Delete action deletes the infected file The Deny Access action, which is only available in Real-time scan configurations, stops file open and execute operations. ActiveAction is a predefined group of cleanup actions that are optimized for each malware category. Trend Micro continually adjusts the actions in ActiveAction to ensure that individual detections are handled properly. © 2020 Trend Micro Inc. Education 185 Lesson 8: Protecting Servers from Malware Enhanced Scanning actions also performs the following actions when it finds an issue, however, these actions are determined by Deep Security and are not configurable. Note: • The Deny Access action immediately blocks the operation and records an anti-malware event when Deep Security detects an attempt to open or execute a suspicious file • The Terminate action terminates processes that perform suspicious operations and records an anti-malware event If a Clean action fails, the Anti-Malware Solution Platform creates a backup of the file in the quarantine folder and deletes the file. Possible Malware identifies an action to take if a file is identified as possible malware, meaning the file appears suspicious but cannot be classified as a specific malware variant since it’s based on heuristics rules only and not patterns. If you leave this option set to Default, the action will be what was selected in the Upon detection list. When possible malware is detected, Trend Micro recommends that you contact your support provider for assistance in further analysis of the file. Assigned To Tab The Assigned To tab lists all the policies and computers that are using the particular Malware Scan Configuration. Note: New or modified Malware Scan Configurations can be created from within policies or from the details of a particular computer. Turning the Anti-Malware Module On You can enable Anti-Malware protection in policies or in the settings for a computer. Turning the Anti-Malware Module On in a Policy Anti-Malware protection can be assigned to policies at any level in the hierarchy. Any sub-policies with inheritance enabled will be assigned the Anti-Malware protection setting. 186 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware To do this in a policy, click the Policies menu and double-click the policy to which you’d like to assign protection. Click the Anti-Malware protection module from the left-hand frame and set the Anti-Malware State to On and click Save. A Malware Scan Configuration and Schedule must also be selected when turning the Protection Module on. © 2020 Trend Micro Inc. Education 187 Lesson 8: Protecting Servers from Malware Turning the Anti-Malware Module On on a Computer To set Anti-Malware protection on a specific computer only, click the Computers menu. Locate and double-click a computer in the list to open Details. In the right-hand pane, click Anti-Malware and on the General tab set the Anti-Malware Configuration to On and click Save. Turning the module on at the computer level will override the inheritance of settings from the policy. A Malware Scan Configuration and Schedule must also be selected when turning the protection module on. When you click Save, the appropriate scanning components will be downloaded to the Deep Security Agent and any required security updates will be applied. A message in the lower left-hand corner of the console window will display the status of the updated operation. 188 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware The status for the Anti-Malware protection module will be listed as On, as well as the type of scan being used. Assigning the Scan Configuration to a Scan Type Deep Security needs to know what type of scans it should perform. You can configure this from the Anti-Malware > General tab for a policy or on a computer. Real-Time Scan Real-Time Scanning is a persistent and ongoing scan, designed to detect file infection and/or malware creation attempts as they happen. This functionality represents the primary reason for using anti-malware products in the first place. Each time a file is received, opened, downloaded, copied, or modified, Deep Security scans the file for security risks. If Deep Security detects no security risk, the file remains in its location and users can proceed to access the file. If Deep © 2020 Trend Micro Inc. Education 189 Lesson 8: Protecting Servers from Malware Security detects a security risk, it displays a notification message that shows the name of the infected file and the specific security risk. Real-time scan is run every day, all day unless another time period is selected from the Schedule list. You can configure real-time scanning to run when it will not have a large impact on performance, for example, when a file server is scheduled to back up files. This scan can be run on all platforms supported by the Anti-Malware module. Both Deep Security Agents and Virtual Appliances possess this functionality, however their implementations are different. Manual Scan Manual scanning runs a full system scan on all processes and files on a computer. The time it takes to complete depends on the number of files to scan and the computer's hardware resources. There are two Manual Scan options that can be selected: • 190 Quick Scan for Malware will scan a computer's critical system areas for currently active threats. A Quick Scan will look for currently active malware but it will not perform deep file scans to look for dormant or stored infected files. It is significantly faster than a Full Scan on larger drives. Quick Scan can only be run on Windows servers. © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware • A Full Scan for Malware enumerate all files on a disk. Unlike real-time scans which only apply to individual objects that trigger events, manual and scheduled scans require the scan engines to scan entire system areas to detect malware. The process of collecting information is called enumeration. If a system area can be enumerated, it can be scanned. This scan can be run on all platforms supported by the Anti-Malware module. To run a manual scan, click Quick Scan for Malware or Full Scan for Malware from the Malware section of the General tab. Alternately, right-click one of the hosts in the Computers list, and click Actions. From the pop-up menu, click Quick Scan for Malware or Full Scan for Malware. Scheduled Scan A Scheduled Scan runs automatically on the appointed date and time and can automate routine scans and improve scan management efficiency. This scan can be run on all platforms supported by the Anti-Malware module. © 2020 Trend Micro Inc. Education 191 Lesson 8: Protecting Servers from Malware As with other recurring tasks within Deep Security, Scheduled Scans are set using the Scheduled Task wizard. Click Administration > Scheduled Tasks and click New. A Timeout setting defines an allowable scan duration. If this preset limit is reached, the scan is suspended. Combined with the Start time setting, scans can be time boxed so they run exclusively during non-impacting hours. 192 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware Keeping Deep Security Up To Date on Malware Deep Security periodically needs to be updated with the latest security updates. The update packages are retrieved from Trend Micro in the form of security updates. Deep Security Relays, organized into Relay Groups (also managed and configured by the Deep Security Manager) are used to retrieve security updates from Trend Micro and distribute them to Agents and Virtual Appliances. To ensure that Deep Security has the ability to get the latest information about threats and patterns from Trend Micro, from the Administration menu, expand System Settings > Updates. Make sure you have at least one relay-enabled agent and it is assigned to the appropriate Agents and Virtual Appliances. Verify that you have a scheduled task to perform regular updates for both security and software updates though Administration > Scheduled Tasks. The enhanced scanning features require Internet access to check files against the Global Census Service, Good File Reputation Service and Predictive Machine Learning. If your Deep Security Agents cannot access the Internet directly, you will need to configure a proxy to enable agents to check those sites. If the agent cannot check the Global Census Server and Good File Reputation Service, the detection rate for scans will be very low. For example, ransomware may not be detected and process memory scanning will also be affected. © 2020 Trend Micro Inc. Education 193 Lesson 8: Protecting Servers from Malware Viewing Anti-Malware-Related Events Events related to Anti-Malware activities on the protected computers can be viewed for the entire system, or on a computer-by-computer basis. System Events To view all the Anti-Malware events that have occurred, click the Events & Reports menu. Click AntiMalware Events in the left-hand frame. Select the criteria for the retrieval of the events and click Refresh. All the retrieved events will be displayed. Computer Events To view anti-malware events for a specific computer, double-click the device in the Computers list to view the Details. Click the Anti-Malware Protection Module in the left-hand frame and click the AntiMalware Events tab. 194 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware Since new events are only retrieved at each heartbeat, you may need to click Get Events to view recent activity. Adding Malware to the Allowed List If the events list displays malware that is to be allowed, right-mouse click the event and click Allow. This file is added to the allowed list and will no longer be identified as malware. © 2020 Trend Micro Inc. Education 195 Lesson 8: Protecting Servers from Malware Reviewing Files Identified as Malware A file that has been identified to be or to contain malware can be quarantined. These files are encrypted and moved to a special folder. The action to take on an identified file is derived from the filter which initially inspected the file. Custom actions, including quarantine, can be assigned to the following types of malware: • • • • • • • • Note: 196 Virus Trojan Packers Spyware Common Vulnerabilities and Exposures (CVE) exploits Files identified by Aggressive Detection rules Other threats Possible Malware After a file has been quarantined, a utility is used to decrypt, examine, and restore the file. © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware A limited amount of disk space is set aside for storing identified files. The amount of space can be configured and alerts can be raised when there is not enough disk space to quarantine a suspicious file. Note: If the limit is reached, the oldest files will be deleted first until 20% of allocated space is freed up. The Quarantine action was designed to give administrators a chance to verify if the file that was flagged as malware is indeed a malicious file. For this to work, administrators must receive notifications when files are quarantined and have a means to access the quarantined files. Restoring Identified Files Once a file has been identified as malware but is determined to be benign, administrators can use tools to manually restore the files to their original locations. This should be done with caution as infected files could be extremely damaging to your network. © 2020 Trend Micro Inc. Education 197 Lesson 8: Protecting Servers from Malware Restoring Identified Files to the Agent Computer Through the Deep Security Manager Web Console On the Identified Files tab, select a file from the list and click Restore. A Restore File Wizard is launched. Step through the wizard to restore the file on the Agent computer. 198 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware Downloading and Unarchiving Identified Files Using the Administration Utility Identified files can be downloaded from the Agent computer to the Deep Security Manager computer and decrypted for further analysis. On the Identified Files tab, select the file and click Download. A Download File Wizard is launched. © 2020 Trend Micro Inc. Education 199 Lesson 8: Protecting Servers from Malware Step through the Wizard and select a location for the file. On the final Summary page, click the link to download the restore utility. A zip file called QFAdminUtil.zip is downloaded containing QDecrypt.exe, which is run as a Windows application, or QDecrypt.com which is run as a Command Line utility. Double-click QDecrypt.exe and locate the extracted quarantined file you wish to restore and select a safe location for saving the file. 200 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware Decrypting Identified Files From the Command Prompt To manually restore a file identified as malware, you must use the command-line version of the decryption utility downloaded from Deep Security Manager (QDecrypt.com) to decrypt the file and then move it back to its original location. Quarantining Files on Deep Security Agents Quarantining on Deep Security Agents is based on the Anti-Malware Solution Platform backup mechanism. Whenever a scan action is performed that results in a change in a file (for example, clean, delete, quarantine), it creates a backup in the following location, where the file is compressed and encrypted: C:\ProgramData\TrendMicro\AMSP\quarantine Note: Since this Windows folder may hidden as it is a protected operating system file, change its view settings in order to list the contents of the quarantine folder. Whenever the Deep Security Agent cleans, deletes, or quarantines a file, the action will create a quarantine event. © 2020 Trend Micro Inc. Education 201 Lesson 8: Protecting Servers from Malware Smart Scan In addition to conventional pattern-based detection, Deep Security offers Smart Scan, as a feature of the Trend Micro Smart Protection Network. Smart Scan shifts much of the malware and spyware scanning functionality to a Smart Protection Service, either in the cloud or local. It keeps local pattern files small and reduces the size and number of updates required by Agents. The move to in-the-cloud protection is driven by two considerations: 202 • Malware creation is outstripping traditional malware knowledge deployment. By the time a malware is recognized, it has already changed. • As patterns grow in power, they grow in size. An inescapable consequence of a rise in the number of malware is accelerated growth of anti-malware patterns. As things currently stand, network administrators now have to be careful about when they schedule their updates, to avoid network disruption. © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware To address these conditions, Trend Micro re-thought how it deployed malware knowledge to its protection products. Instead of pre-deploying anti-malware knowledge to the end points, with the resulting deployment delay and bandwidth issues, this knowledge is now deployed on-demand from a centralized database that is updated more frequently than traditional methods through a mechanism called File Reputation. Smart Scan provides the following features and benefits: • • Reduces the overall time it takes to deliver protection against emerging threats • • • Reduces the cost and overhead associated with corporate-wide pattern deployments Reduces network bandwidth consumed during pattern updates. The bulk of pattern definition updates only needs to be delivered to the cloud and not to many servers Lowers kernel memory consumption on servers. Consumption increases minimally over time Provides fast, real-time security status lookup capabilities in the cloud and therefore increases overall protection By default this option is set to on. (In the Deep Security Virtual Appliance, the default is off). Agents that implement the Smart Scan solution use the following components: • Smart Scan Agent Pattern: The pattern file contains complete threat information for all malware that is currently in the wild. • Smart Query Filter: This compressed index file references complete threat information that is stored in the Smart Scan Pattern on the Smart Protection Server. • Smart Scan Pattern: This pattern file stores information for virus confirmation and actions to proceed in case of cleaning and is located on the Smart Protection Server. File Reputation File Reputation is a new implementation of malware identification through the use of Cyclic Redundancy Check (CRC) values. Cyclic Redundancy Check information can be divided into two parts: • • Part 1 - Used for initial malware identification Part 2 - Used for malware confirmation The following diagram represents a file that has been infected by a virus. Virus part 1 (Jump code) File contents Virus part 2 (Main poron) Jump code When a virus infects a file, it typically appends a part of itself to the front of the file. This serves two purposes: • To keep other instances of the virus from re-infecting an already infected file, thereby ensuring efficient propagation. • To ensure that the virus code in the file runs first, whenever the file is opened this frontappended portion often contains a jump command to the main portion of the virus, which is located elsewhere in the file. © 2020 Trend Micro Inc. Education 203 Lesson 8: Protecting Servers from Malware For this kind of virus, the CRC information in part 1 would be used to identify the first part of the virus added to the front of the file. Virus part 1 (Jump code) Virus part 2 (Main poron) File contents CRC part 1 The scan engine uses this information to detect if a file has been infected with a specific virus. After detecting the first part of the virus using part 1 of the CRC information, the scan engine looks for the corresponding part 2 of the CRC for additional identification information about the remaining portion of the virus and to confirm that the file is indeed a virus. To locate part 2 of the CRC information, the scan engine requires information about its expected location within the file. This information is stored in what pattern builders call the CRC table, and the location within the file is called its offset. Offset Virus part 1 (Jump code) Virus part 2 (Main poron) File contents CRC part 2 Once the virus has been identified, the scan engine requires information to clean/remove the virus. This information comes from the Smart Protection Server. Once the scan engine retrieves the cleaning/removal information that corresponds to the identified virus, it is then able to take action against the virus. File Reputation addresses the needs enumerated in the previous section by de-constructing the existing pattern. New pa ern (Smart Query filter) External database (Smart Scan Pa ern) CRC part 1 CRC part 1 CRC part 2 Virus info Non-CRC data CRC and virus info for in-the-wild malware Non-CRC pa ern (Smart Scan Agent Pa ern) Deep Security Agent computer 204 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware Note the following changes to the existing pattern: Note: • CRC and virus information is still stored locally for malware that is classified as in-the-wild. This means that the only malware information that is available locally corresponds to malware that is actively doing harm. This information resides in the Smart Scan Agent Pattern file. • CRC and virus information for malware that is no longer considered in-the-wild is moved to an external database called the Smart Scan Pattern. This pattern contains all the CRC Parts 1 and 2 information of the traditional pattern. Non-CRC data is also stored in the Smart Scan Pattern. • A compressed copy of CRC Part 1 information, for not-in-the-wild malware, is moved to a new pattern called the Smart Query Filter, which the Deep Security Agent uses to determine when to query the external database for matching Part 2 information. This serves as a kind of index to the information in the external database. Both the Smart Query Filter and Smart Scan Agent Pattern reside on the Deep Security Agent. Querying the File Reputation Service Components on the Deep Security Agent are responsible for looking for malware and taking action upon them when found. However, the knowledge required to identify malware does not completely reside within the product itself, part of this knowledge is located externally. The File Reputation Service containing CRC information that corresponds to known malware can be located either on the Global Trend Micro Smart Protection Network, or a local Smart Protection Server. These elements work together as shown below. Smart Protection Server Deep Security Agent Reference Smart Scan Agent Pattern for local verification Calculate CRC Part 1 Submit CRC Part 1 Smart Scan Returns corresponding CRC Part 2 Malware identification Pattern query (for CRC Part 2) Virus ID query Smart Scan Returns cleaning/removal instructions from virus info Pattern query (for virus info) Remove malware © 2020 Trend Micro Inc. Education 205 Lesson 8: Protecting Servers from Malware 1 Reference Smart Scan Agent Pattern Each time the Deep Security Agent scans a file, it first uses the local pattern file to check if the scanned content contains malware and obtain cleaning instructions. It does this by referencing information in the Smart Scan Agent Pattern. The Agent uses this to perform the In-the-wild verification and clean/remove these active viruses. 2 Calculate CRC part 1 If the content looks suspicious but the malware cannot be detected and cleaned using the local pattern files, it calculates a Cyclic Redundancy Check (CRC) sum for the initial portion of the content (CRC Part 1). 3 Submit CRC part 1 The Agent submits the CRC Part 1 sum to the local or in-the-cloud File Reputation Service to query the malware database for all records matching the calculated CRC Part 1. 4 Smart Scan Pattern query for CRC part 2 In this step, the File Reputation service uses the CRC Part 1 value to query for matching CRC Part 2 information, which enables the scan engine to confirm that the suspect file is indeed malware. The CRC Part 2 information is stored in a database on the File Reputation service called the Smart Scan Pattern. By design, the Agent only waits for a response from the File Reputation service for a specific period of time (a maximum of 500 milliseconds). For this brief period, the scan engine locks the file. If the scan engine is unable to query the File Reputation service, the server-side processing portion of this step does not occur, and the Agent attempts to query another File Reputation service if one is available, or proceeds using offline protection. 5 Reply with corresponding CRC part 2 If the CRC information sent in the query matches CRC Part 1 information in the Smart Scan Pattern, the File Reputation service returns all the corresponding CRC Part 2 records to the Agent. 6 Malware identification When the Agent receives the CRC Part 2 information from the File Reputation service, it passes the information to the scan engine to perform matching operations. If no match is found, the file is safe and the scanning process ends. 7 Virus ID query If a match is found, the Agent sends a second query to the File Reputation service for information about how to clean/remove the malware. Instead of sending CRC information like in the first query, the Agent sends the Virus ID of the CRC Part 2 record of the malware that was detected. 8 Smart Scan Pattern query The File Reputation service then searches for the virus information that corresponds to this Virus ID submitted to retrieve cleaning instructions. 9 Cleaning instructions returned to Agents Once the virus information is retrieved, the File Reputation service returns this to the Agent for use by the scan engine. The Agent waits for a maximum of 500 milliseconds for the File Reputation service to reply. If the Agent does not receive a timely reply, the Agent will abandon the primary action, in favor of the secondary action. A failure in this operation would cause the Agent to quarantine the malware instead of cleaning it. 10 Remove Malware Finally, the Deep Security Agent receives the virus information from the File Reputation service and the scan engine uses this information to clean/remove the virus. 206 © 2020 Trend Micro Inc. Education Lesson 8: Protecting Servers from Malware Best Practice: Do not use Smart Scan if the computer doesn't have reliable network connectivity to the File Reputation service on the Trend Micro Smart Protection Network or your Smart Protection Server. © 2020 Trend Micro Inc. Education 207 Lesson 8: Protecting Servers from Malware Review Questions 1 What malware scanning methods are available in Deep Security? 2 Define the following terms used when configuring a Malware Scan Configuration: 208 • IntelliTrap • IntelliScan • ActiveAction • Smart Scan © 2020 Trend Micro Inc. Education Lesson 9: Blocking Malicious Web Sites Lesson Objectives: After completing this lesson, participants will be able to: • • • • • Enable Web Reputation protection through a policy or directly to a computer Set the security level for URL filtering Configure exceptions to override the assigned rating of a Web page Test the blocking status of a Web page Locate and view Web Reputation-related events The Web Reputation module in Deep Security protects against web threats by blocking access to malicious URLs. Deep Security uses databases from the Trend Micro Smart Protection Network to check the reputation of Web sites that are being accessed. These databases include references to sites collected from a variety of sources, including URLs collected from malware analysis. Approximately 10 billion URLs are processed per day by Trend Micro Web Reputation Services resulting in a daily average of 150,000 malicious URLs. Sites in the database are classified and assigned credibility scores that reflect their potential for either becoming infecting computers or their involvement in a malware or spyware’s lifecycle (for example, sources of instructions or components, etc). It contains over 11 million URLs classified as dangerous. Trend Micro products with Web Reputation protection enabled use these credibility scores to regulate access to these sites. The Web site reputation score is correlated with the specific Web Reputation Security Level enforced on the computer. Depending on the Web Reputation Security Level being enforced, Deep Security will then either block or allow access to the URL. Note: Deep Security can verify the credibility score of http URLs only. Trend Micro URL Filtering Engine Deep Security Agents interfaces with the Trend Micro Web Reputation Service using a component called the URL Filtering Engine (TMUFE). Deep Security uses the URL Filtering Engine for sending score requests to the rating server, and then receiving the replies. © 2020 Trend Micro Inc. Education 209 Lesson 9: Blocking Malicious Web Sites Different sources can be used for score requests. • Web Reputation Service: If the Web site being visited is new, the Deep Security Agent queries the Web Reputation Service on the Trend Micro Smart Protection Network, or a local Smart Protection Server, if it is available. Trend Micro URL Filtering Engine Web Reputaon query Credibility score Local Smart Protecon Server • In-Memory Cache: If a site has been visited previously, an existing credibility score may exist in the cache. If a cached entry exists, URL Filtering Engine uses this existing rating. For agentless protection, all Virtual Agents share a single cache on the appliance. Trend Micro URL Filtering Engine Web Reputaon query Credibility score Local Smart Protecon Server Cache Note: The URL Filtering Engine is not actually involved in the URL blocking function. It merely provides the information necessary for the blocking decision. Deep Security will either connect to a locally installed Smart Protection Server or it will connect to the Global Smart Protection Service. 210 © 2020 Trend Micro Inc. Education Lesson 9: Blocking Malicious Web Sites Configure the connection to the Smart Protection Network, or local Smart Protection Server on the Smart Protection tab for the Web Reputation module in either a Policy or on a Computer. Credibility Scores The defined Web Reputation Service source will return a credibility score as follows: Score Rating Description 81-100 Safe No known or potential threats. 66-80 Suspicious 51-65 Highly Suspicious Possibly a phishing page or a potential source of malware or spyware. Associated with spam or has a history of being compromised. 0-50 Dangerous Verified to be a phishing page or a source of malware or spyware. 71 Untested Has not been tested by Trend Micro. Untested pages are not blocked by default. © 2020 Trend Micro Inc. Education 211 Lesson 9: Blocking Malicious Web Sites Web Reputation Communication Instead of blocking the initial connection to the Web site, the Agent lets the HTTP request through to the intended Website, but blocks the reply. Connect to Web site Request Web site score Reply dropped Intended connection Score retrieved Connection allowed The Web Reputation communication process includes the following steps: 1 The protected server sends an HTTP request to an external Web server for a resource. This request can originate from a Web browser on the server, or from within an application. 2 The network filter and URL Filtering Engine on the Deep Security Agent captures the request and forwards the URL to the configured Web Reputation Service. 3 Meanwhile, the Web server replies to the request. This reply is blocked by the Deep Security Agent until the Web Reputation score can be verified. 4 The Web Reputation Protection Module receives the score and it is compared against the Security Level configured in the policy. 5 The Deep Security Agent takes the appropriate action: either let the page through to the browser or application, or displays a blocked page warning screen. Enabling Web Reputation Enabling Web Reputation protection in Deep Security typically involved the following steps: 1 Turning on Web Reputation protection in a policy or on a computer 2 Setting the security level 3 Defining any exceptions 4 Configuring the Smart Protection source Turning on Web Reputation protection You can enable Web Reputation protection in policies or in the settings for a computer. Turning the Web Reputation Module On in a Policy Web Reputation protection can be assigned to policies at any level in the hierarchy. Any sub policies with inheritance enabled will be assigned the Web Reputation protection setting. 212 © 2020 Trend Micro Inc. Education Lesson 9: Blocking Malicious Web Sites To do this in a policy, click the Policies menu and double-click the policy to which you’d like to assign protection. Set the Web Reputation State to On and click Save. Turning the Web Reputation Module On on a Computer To set Web Reputation protection on a computer, click the Computers menu. Locate and doubleclick a computer in the list to open Details. In the right-hand pane, click Web Reputation and on the General tab set the Web Reputation Configuration to On and click Save. Turning the module on at the computer level will override the inheritance of settings from the policy. © 2020 Trend Micro Inc. Education 213 Lesson 9: Blocking Malicious Web Sites Setting the Security Level Deep Security administrators determine the types of sites that are blocked by configuring the security levels. Security levels can be set in a policy or on a computer and can be inherited from the parent. In the Security Level section of the General tab for either a policy or a computer, select the required security level: 214 • High: Pages deemed to be Dangerous, Highly Suspicious, or Suspicious are blocked when the Security Level is set to High. Only pages with a credibility score 81 or higher are allowed when this level is enabled. • Medium: Pages deemed to be Dangerous, or Highly Suspicious are blocked when the Security Level is set to Medium. With this security level, pages with credibility scores between of 0 to 65 are blocked, pages with a score of 66 or higher are allowed. • Low: When this security level is enabled, all pages deemed to be Dangerous are blocked. These pages have a credibility score between of 0 to 50. • Block pages that have not been tested by Trend Micro: Enable this setting to block URLs that have a credibility score of 71, meaning they are untested. By default, untested pages are allowed. © 2020 Trend Micro Inc. Education Lesson 9: Blocking Malicious Web Sites After enabling the security level, the protection settings can be verified using the following test websites: URL Credibility Score wrs91.winshipway.com 91 wrs81.winshipway.com 81 wrs71.winshipway.com 71 wrs61.winshipway.com 61 wrs51.winshipway.com 51 wrs41.winshipway.com 41 wrs31.winshipway.com 31 Trend Micro maintains these sample sites for testing and demonstrating Web Reputation blocking and score retrieval functionality. Defining Exceptions Exceptions are URLs that are blocked or allowed regardless of their safety ratings. Deep Security administrators can specify exceptions to the Web Reputation analysis by specifying URLs in the Allowed or Blocked list. Like Security Level, Exceptions can be set at the policy or at the computer level. © 2020 Trend Micro Inc. Education 215 Lesson 9: Blocking Malicious Web Sites Allowed URLs included in the Allowed list will be accessible regardless of their safety ratings. Multiple URLs can be added at once but they must be separated by a line break. When adding URLs to the Allowed list, select whether to allow all URLs with the same domain or the URL: 216 • Allow URLs from the domain: Enable this setting to allow all pages from the domain. Subdomains are supported. Include only the domain (and optionally sub-domain) in the entry. For example, example.com and another.example.com are valid entries. • Allow the URL: The URL will be allowed as entered. Wildcard characters are supported. For example, example.com/shopping/coats.html, and example.com/shopping/* are valid entries. © 2020 Trend Micro Inc. Education Lesson 9: Blocking Malicious Web Sites Blocked URLs and URLs containing specified keywords that are listed in the Blocked list are always blocked, unless there is an overriding entry in the Allowed list. Multiple URLs or keywords can be added at once but they must be separated by a line break. When blocking URLs, you select whether to block all URLs from a domain, block the specified URL, or block URLs that contain a specific keyword. • Block URLs from the domain: Block all pages from the domain. Sub-domains are supported. Only include the domain (and optionally sub-domain) in the entry. For example, example.com and another.example.com are valid entries. • Block the URL: The URL as entered will be blocked. Wildcards are supported. For example example.com/shopping/coats.html, and example.com/shopping/* are valid entries. • Block URLs containing this keyword: Any URL containing the listed keyword will be blocked. The Allowed list takes precedence over the Blocked list. URLs that match entries in the Allowed list are not checked against the Blocked list. The following flowchart illustrates the URL analysis process. Start URL Analysis Is URL on the Allowed List? Y Allow site Y Block site Y Use exisng rang End N Is URL on the Blocked List? N Exisng rang in cache? N Request Web Reputaon rang from Trend Micro Smart Protecon source Evaluate rang and perform acon based on Web Reputaon se ngs Unblocking Pages If an administrative user deems a page to be improperly blocked, they can add the page to the Allowed list, which overrides the rating assigned to the page. © 2020 Trend Micro Inc. Education 217 Lesson 9: Blocking Malicious Web Sites Locate the event related to the blocked page. Right-mouse click the event and select Add to Allow List. Alternately, open the event and click Add to Allow List. 218 © 2020 Trend Micro Inc. Education Lesson 9: Blocking Malicious Web Sites Select whether the block applied to the entire domain or this specific page as well as the policy or this computer only. Administrators can verify the credibility score of sites and request reassessment in the event that the prevailing score is incorrect by visiting the following URL: http://global.sitesafety.trendmicro.com/ © 2020 Trend Micro Inc. Education 219 Lesson 9: Blocking Malicious Web Sites Viewing Web Reputation-Related Events Web Reputation events can displayed for all computers in the system or for specific computers. System Events To view all the Web Reputation events that have occurred, click the Events & Reports menu. Click Web Reputation Events in the left-hand frame. Select the criteria for the retrieval of the events and click Refresh. All the retrieved events will be displayed. Computer Events To view Web Reputation events for a specific computer, double-click the device in the Computers list to view the Details. Click the Web Reputation Protection Module in the left-hand frame and click the Web Reputation Events tab. 220 © 2020 Trend Micro Inc. Education Lesson 9: Blocking Malicious Web Sites Review Questions 1 What sources are available for a Deep Security Agent to retrieve Web Reputation scores for Web sites? 2 An organization would like to prevent servers from accessing some specific web sites, even though their credibility score lists the sites as being safe. How can this be achieved? 3 How can an administrator override the block on a web page for a specific server only? © 2020 Trend Micro Inc. Education 221 Lesson 9: Blocking Malicious Web Sites 222 © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall Lesson Objectives: After completing this lesson, participants will be able to: • • • • • • Identify and describe the two basic firewall types Enable firewall protection through a policy or directly to a computer Create firewall rules Describe the order of analysis for traffic filtering Identify vulnerabilities on the system using reconnaissance scans and port scans Locate and view firewall-related events The Deep Security Firewall protection module enables an NDIS-based, bi-directional, stateful firewall that is responsible for making sure that packets originating from unauthorized sources do not reach the applications on its host. Firewall rules examine the control information in the first packet of an exchange. The rules either block or allow the packets based on their settings. Firewall rules are assigned directly to computers or to policies which are in turn assigned to a computer or collection of computers. Typically, firewall policies are based on one of two design strategies. Either they permit any service unless it is expressly denied or they deny all services unless expressly allowed. It is best practice to decide what type of firewall you would like to implement. This helps reduce administrative overhead in terms of creating and maintaining the rules. The firewall types include: • Restrictive: With a restrictive design, traffic that is not expressly allowed is prohibited. A restrictive firewall is the recommended best practice from a security perspective. All traffic is stopped by default and only traffic that has been explicitly allowed is permitted. If the primary goal of your planned firewall is to block unauthorized access, the emphasis needs to be on restricting rather than enabling connectivity. A restrictive firewall is easier to maintain and more secured. Allow rules are used only to permit certain traffic across the firewall and deny everything else. As soon as you assign a single outgoing Allow rule, the outgoing firewall will operate in restrictive mode. This is also true for the inbound firewall: as soon as you assign a single incoming Allow rule, the inbound firewall will operate in restrictive mode. • Permissive: A permissive firewall permits all traffic by default and only blocks traffic believed to be malicious based on signatures or other information. A permissive firewall is easy to implement but it provides minimal security and requires complex rules. Deny rules are used to explicitly block traffic. In general, restrictive policies are preferred and permissive policies should be avoided. © 2020 Trend Micro Inc. Education 223 Lesson 10: Filtering Traffic Using the Firewall Enabling Firewall Protection Enabling Firewall protection in Deep Security typically involves the following steps: 1 Enabling the Firewall protection module in a policy or on a computer 2 Applying Firewall rules that make sense for your purposes to the policy or to a computer Turning the Firewall on You can enable Firewall protection in policies or in the settings for a supported computer. Turning the Firewall Module on in a Policy Firewall protection can be assigned to policies at any level in the hierarchy. Any sub policies with inheritance enabled will be assigned the Firewall settings. To do this in a policy, click the Policies menu and double-click the policy to which you’d like to assign protection. Set th Firewall State to On and click Save. Note: 224 Certain rules that are applied when the Firewall Protection Module is enabled. These are inherited from the Base policy. Since they were assigned at a parent level, they can not be disabled. © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall Turning the Firewall Module for a Single Computer In the Deep Security Manager Web console, click the Computers tab, and open the Details for a specific computer. Click the Firewall Protection Module in the left-hand frame. Set the Firewall Configuration to On and click Save. The Firewall Protection Module on the Agent will be installed on the host computer. Applying Firewall Rules Firewall rules examine the control information in individual packets. The rules either block or allow those packets based on rules that are defined on these pages. Deep Security provides a set of Firewall rules that can be applied to policies or directly to a computer. These default rules provide coverage for typical scenarios. © 2020 Trend Micro Inc. Education 225 Lesson 10: Filtering Traffic Using the Firewall To apply rules, click Assign/Unassign from the General tab of the policy or computer Details. Click to enable the individual rules to apply. If the rule required is not part of the default collection provided by Trend Micro, custom rules can be created. Creating Custom Firewall Rules Firewall rules are created as Common Objects and can be reused in different policies as needed. To create a new firewall rule, click New > New Firewall Rule in the Assign/Unassign window for the Firewall protection module. 226 © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall . Configure the firewall rules by identifying the following attributes to match traffic against: • • • • • • • Action Priority Packet direction Frame type Protocol Packet source and destination Flags © 2020 Trend Micro Inc. Education 227 Lesson 10: Filtering Traffic Using the Firewall Actions Firewall rules can behave in different ways depending on the action assigned. Deny Firewall rules using the Deny action explicitly block traffic that matches the rule. Allow Firewall rules using the Allow action explicitly allow traffic that matches the rule to pass, and then implicitly denies everything else. Allow rules have two functions: • • 228 Permit traffic that is explicitly allowed. Implicitly deny all other traffic. © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall Note: Traffic that is not explicitly allowed by a rule using Allow is dropped and gets recorded as an Out of Allowed Policy firewall event. Firewall rules using Allow always have priority of 0. Commonly applied firewall rules using the Allow action include: • • ARP rules permits incoming Address Resolution Protocol (ARP) traffic. • Allowing solicited ICMP replies ensuring that host computers are able to receive replies to their own ICMP messages. This works in conjunction with ICMP stateful configuration. Allowing solicited TCP/UDP replies ensuring that host computers are able to receive replies to their own TCP and UDP messages. This works in conjunction with TCP and UDP stateful configuration. If you have no firewall rules using Allow in effect on a computer, all traffic is permitted unless it is specifically blocked by a rule using the Deny action. Once you create a rule using Allow, all other traffic is blocked unless it meets the requirements of this rule. There is one exception to this: ICMPv6 traffic is always permitted unless it is specifically blocked by a rule using the Deny action. Bypass The Bypass action allows traffic to bypass both firewall and intrusion prevention analysis. Only the port, direction, and protocol can be set with this action. Bypass is designed for mediaintensive protocols where filtering by the Firewall or Intrusion Prevention modules is neither required nor desired. Firewall rules using Bypass have the following noteworthy characteristics: Note: • • Bypass skips both Firewall and Intrusion Prevention analysis. • • Firewall rules using Bypass will not be logged. This is not a configurable behavior. Since stateful inspection is skipped for bypassed traffic, bypassing traffic in one direction does not automatically bypass the response in the other direction. As a result firewall rules using Bypass are always created in pairs, one for incoming traffic and another for outgoing. Some firewall rules using Bypass are optimized, in that traffic will flow as efficiently as if the Deep Security Agent/Deep Security Virtual Appliance was not there. If you plan to use a Bypass action in a firewall rule to skip intrusion prevention processing on incoming traffic to TCP destination port N and Firewall Stateful Configuration is set to perform stateful inspection on TCP, you must create a matching outgoing rule for source port N to allow the TCP responses (This is not required for firewall rules using Force Allow because force-allowed traffic is still processed by the stateful engine). Firewall rules using Bypass are designed to allow matching traffic through at the fastest possible rate. Maximum throughput can be achieved with (all) the following settings: • • • • Priority: Highest Frame Type: IP Protocol: TCP, UDP, or other IP protocol. (Do not use Any) Source and Destination IP and MAC: Any © 2020 Trend Micro Inc. Education 229 Lesson 10: Filtering Traffic Using the Firewall • Note: - If the protocol is TCP or UDP and the traffic direction is incoming, the Destination Ports must be one or more specified ports (not Any), and the Source Ports must be Any. - If the protocol is TCP or UDP and the traffic direction is outgoing, the Source Ports must be one or more specified ports (Not Any), and the Destination Ports must be Any. Schedule: None If Deep Security Manager uses a remote database that is protected by a Deep Security Agent, Intrusion Prevention-related false alarms may occur when the Deep Security Manager saves these rules to the database. The contents of the rules themselves could be misidentified as an attack. One of two workarounds for this is to create a firewall rule with a Bypass action for traffic from the Deep Security Manager to the database host. Log Only Firewall rules using the Log Only action will only generate an event if the packet in question is not subsequently stopped by either a rule using a Deny action, or a rule using an Allow action that excludes it. If the packet is stopped by one of those two actions, those rules will generate the event and not the rule using Log Only. If no subsequent rules stop the packet, the rule using Log Only will generate an event. Force Allow Firewall rules using the Force Allow action exclude a sub-set of traffic that could otherwise have been covered by a Deny action. Force Allow has the same effect as Bypass, however, unlike Bypass, traffic that passes the firewall because of this action is still subject to Intrusion Prevention. The Force Allow action is particularly useful for making sure that essential network services are able to communicate with the Deep Security Agent computer. Among the default rules using Force Allow that are commonly enabled in real life are: • Allowing DHCP traffic to the DHCP client on the Deep Security Agent host. This ensures that the client can obtain its dynamic IP address • Allowing wireless authentication traffic through the Extensible Authentication Protocol (EAP) One situation that would require a Force Allow action would be when an administrators wants a host to accept ICMP and/or UDP traffic, but the Deep Security Agent has stateful configuration for ICMP and UDP traffic enabled. Firewall rules using Force Allow should only be used in conjunction with rules using Allow and Deny actions to allow a subset of traffic that has been prohibited by these rules. Firewall rules using Force Allow are also required to allow unsolicited ICMP and UDP traffic when ICMP and UDP stateful are enabled. 230 © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall Priority If you have selected Force Allow, Deny, or Bypass as your rule action, you can set a priority of 0 (low) to 4 (highest). Setting a priority allows you to combine the actions of rules to achieve a cascading rule effect. Rules using Log Only can only have a priority of 4, and rules using Allow can only have a priority of 0. The priority determines the order in which rules are applied. High priority rules get applied before low priority rules. For example, a port 80 incoming rule with Deny with a priority of 3 will drop a packet before a port 80 incoming rule using Force Allow with a priority of 2 ever gets applied to it. Only one rule action is applied to any particular packet, and rules (of the same priority) are applied in the order listed above. Rules are run in priority order from highest (Priority 4) to lowest (Priority 0). Within a specific priority level the rules are processed in order based on the rule action. The order in which rules of equal priority are processed is as follows: • • • • • Bypass Log Only Force Allow Deny Allow Remember that rule actions of type Allow run only at priority 0 while rule actions of type Log Only run only at priority 4. Packet Direction The Deep Security Firewall is a bi-directional firewall. Therefore, it is able to enforce rules on traffic originating from the network to the Deep Security host, referred to as incoming, and traffic from the host to the network, referred to as outgoing. Firewall rules only apply to a single direction; therefore Firewall rules for specific types of traffic often come in pairs. Frame Type The term frame refers to Ethernet frames, and the available protocols specify the data that the frame carries. Select a frame type from the list. Use Not to specify whether you will be filtering for this frame type or anything but this frame type. Internet Protocol (IP), Address Resolution Protocol (ARP), and Reverse Address Resolution Protocol (REVARP) are the most commonly carried protocols on contemporary Ethernet networks but by selecting Other from the list you can specify any other frame type by its frame number. © 2020 Trend Micro Inc. Education 231 Lesson 10: Filtering Traffic Using the Firewall Protocol If you select the Internet Protocol (IP) frame type, the Protocol field is enabled, where you specify the transport protocol that your rule will look for. Use the checkbox to specify whether you will be filtering for this protocol or anything but this protocol. You can choose from the drop down list of predefined common protocols, or you can select Other and enter the protocol code yourself (a three digit decimal value from 0 to 255). Note: Solaris Agents will only examine packets with an IP frame type, and Linux Agents will only examine packets with IP or ARP frame types. Packets with other frame types will be allowed through. Note that the Deep Security Virtual Agent does not have these restrictions and can examine all frame types, regardless of the operating system of the virtual machine it is protecting. Packet Source and Packet Destination The firewall rule can specify an IP address, MAC address, or Port to determine traffic source and destination. IP Address The following options are available for defining the IP Addresses in the firewall rule: • • • • • Any: No address is specified so any host can be either a source or destination • IP List: Enables you to select a value that you defined on the Policies > Common Objects > Lists > IP Lists page. Single IP: A specific machine is identified using its IP address. Masked IP: This applies the rule to all machines that share the same subnet mask Range: This applies the rule to all machines that fall within a specific range of IP addresses IP(s): Use this when applying a rule to several machines that do not have consecutive IP addresses. MAC Address The following options are available for defining the MAC addresses in the firewall rule: • • • • 232 Any: No MAC address was specified, so the rule applies to all addresses Single MAC: Rule applies to a specific MAC address MAC(s): Rule applies to the MAC addresses specified here MAC List: Enables you to select a value that you defined on the Policies > Common Objects > Lists > MAC Lists page. © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall Port The following options are available for defining the Ports in the firewall rule: • • • Any: Rule applies to all ports Port(s): Rule applies to multiple ports specified here Port List: Enables you to select a value that you defined on the Policies > Common Objects > Lists > Port Lists page. Specific Flags If you have selected TCP, ICMP, or TCP+UDP as your protocol in the General Information section, you can direct your firewall rule to watch for specific flags. If the rule does not apply to all flags, you can choose from these flags: • • • • • • URG (urgent) ACK (acknowledgment) PSH (flush buffer) RST (reset) SYN (synchronize) FIN (finish) Recommended Firewall Policy Rules It is recommended that you make the following rules mandatory for all of your firewall policies. Some of these rules are already applied to the Base policy and by default are inherited by child policies: • ARP: This rule allows incoming ARP requests for the host to reply to queries for its MAC address. If you do not assign this rule, no devices on the network can query the host for its MAC address and it will be inaccessible from the network. • Allow solicited TCP/UDP replies: Ensures that the computer is able to receive replies to its own TCP and UDP messages. This works in conjunction with TCP and UDP stateful configuration. • Allow solicited ICMP replies: Ensures that the host computer is able to receive replies to its own ICMP messages. This works in conjunction with ICMP stateful configuration. • • • DNS Server: Ensures that the DNS servers can receive inbound DNS requests. Remote Access RDP: Ensures that the computer can accept Remote Desktop connections. Remote Access SSH: Ensures that the computer can accept SSH connections. Rule Order of Analysis Deep Security firewall rules have both a rule action and a rule priority. Used in conjunction, these two properties allow you to create very flexible and powerful rule sets. Unlike rule sets used by other firewalls, which may require that the rules be defined in the order in which they should be run, Deep Security Firewall rules are run in an order based on the rule action and the rule priority, which is independent of the order in which they are defined or assigned. © 2020 Trend Micro Inc. Education 233 Lesson 10: Filtering Traffic Using the Firewall Before any rules are applied, the Deep Security Firewall operates in a permissive mode, meaning all traffic is allow to pass through the firewall. Implementing a firewall rule using the Allow action will cause all other traffic not specifically covered by the rule to be denied. A firewall rule using the Deny action can be implemented over a rule with an Allow action to block specific types of traffic. 234 © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall A firewall rule using the Force Allow action can be placed over the denied traffic to allow certain exceptions to pass through. Packets arriving at a computer get processed first by firewall rules, then the Firewall Stateful Configuration conditions, and finally by the Intrusion Prevention rules. The priority value in the rule define the order in which firewall rules are applied (incoming and outgoing): Log only Force allow Deny Priority 3: High Bypass Force allow Deny Priority 2: Normal Bypass Force allow Deny Priority 1: Low Bypass Force allow Deny Priority 0: Lowest Bypass Force allow Deny Priority 4: Highest Note: Bypass Allow If there are no rules using the Allow action in effect on a computer, all traffic is permitted unless it is specifically blocked by a rule with the Deny action. Once a single rule using Allow is created, all other traffic is blocked unless it meets the conditions of that rule. Consider the example of a DNS server policy that makes use of a Force Allow rule to allow all incoming DNS queries over TCP/UDP port 53. Creating a Deny rule with a higher priority than the Force Allow rule lets you specify a particular range of IP addresses that must be prohibited from accessing the same public server. © 2020 Trend Micro Inc. Education 235 Lesson 10: Filtering Traffic Using the Firewall Priority-based rule sets allow you to set the order in which the rules are applied. If a rule using a Deny action is set with the highest priority, and there are no rules using Force Allow with the same priority, then any packet matching the rule with Deny is automatically dropped and the remaining rules are ignored. Conversely, if a rule using a Force Allow action with the highest priority flag set exists, any incoming packets matching that rule will be automatically allowed through without being checked against any other rules. Traffic Analysis Deep Security Agents can implement two modes for intercepting network traffic at their hosts. Traffic analysis takes place whichever mode is used. These can be viewed in the Deep Security Manager Web console at Policies > Settings > Advanced. 236 © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall Tap Mode In Tap Mode, live packet streams are replicated and diverted from the main stream. In Tap Mode, the live stream is not modified. All operations are performed on the replicated stream. When in Tap Mode, Deep Security offers no protection beyond providing a record of events. It is a good idea to test your Firewall rules in Tap Mode. Once you are satisfied that the rules are working correctly, switch to Inline Mode. Inline Mode When operating using Inline Mode, the live packet stream passes through the network engine. Stateful tables are maintained, Firewall rules are applied and traffic normalization is carried out so that intrusion prevention rules can be applied to payload content. Only the inline mode provides security functionality. Use Inline Mode with rules set to Detect when there is a need to test the configuration and rules before deploying them in to the production environment. This way, the real world process of analyzing the traffic takes place without having to perform any action such as blocking/denying of packets. © 2020 Trend Micro Inc. Education 237 Lesson 10: Filtering Traffic Using the Firewall Failure Response Behavior In some cases, the network engine may block packets before the Firewall rules (or Intrusion Prevention rules) can be applied. By default, the network engine blocks packets if: • The Deep Security Agent or Deep Security Virtual Appliance host has a system problem, for example, it's out of memory • The packet sanity check fails This fail closed behavior offers a high level of security as it ensures that cyber attacks cannot penetrate your network when an agent or virtual appliance is not functioning properly, and safeguards against potentially malicious packets. The drawback to fail closed is that your services and applications might become unavailable because of problems on the Deep Security Agent or Deep Security Virtual Appliance. You might also experience performance issues if a large number of packets are being dropped unnecessarily as a result of the packet sanity check (too many falsepositives). If you have concerns about service availability consider changing the default behavior to allow packets through (or fail open) for system and packet check failures. Open the Details for a Computer or Policy and click Settings in the left-hand frame. Click the Advanced tab and under Network Engine Settings, set the Failure Response settings as follows: • 238 Set Network Engine System Failure to Fail open to allow packets through if the network engine host experiences problems, such as out of memory failures, allocated memory failures, and network engine (DPI) decoding failures. Consider using fail open here if your agent or virtual appliance frequently encounters network exceptions because of heavy loads or a lack of resources. With fail open, the network engine allows the packet through, does not perform rules checking, and logs an event. Your services and applications remain available despite the problems on the agent or virtual appliance. © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall • Set Network Packet Sanity Check Failure to Fail open to allow packets through that fail the network engine's packet sanity checks. Examples of packet sanity checks: firewall sanity checks, network layer 2, 3, or 4 attribute checks, and TCP state checks. Consider using fail open here if you want do rules checking only on 'good' packets that pass the sanity check. With fail open, the network engine allows the failed packet through, does not perform rules checking on it, and logs an event. Anti-Evasion Posture Anti-evasion settings control the network engine handling of abnormal packets that may be attempting to evade analysis. Anti-evasion settings are configured in a policy or an individual computer. The Security Posture setting controls how rigorous Intrusion Prevention analyzes packets. Anti-evasion posture can be set to one of the following values: • Normal: Prevents the evasion of Intrusion Prevention rules without false positives. This is the default value. • Strict: Performs more stringent checking than Normal mode but can produce some falsepositive results. Strict mode is useful for penetration testing but should not be enabled under normal circumstances. • Custom: If you select Custom, additional settings are available that enable you to specify how Deep Security will handle issues with packets. For these settings (with the exception of TCP Timestamp PAWS Window), the options are Allow (Deep Security sends the packet through to the system), Log Only (same behavior as Allow, but an event is logged), Deny (Deep Security drops the packet and logs an event), or Deny Silent (same behavior as Deny, but no event is logged) © 2020 Trend Micro Inc. Education 239 Lesson 10: Filtering Traffic Using the Firewall If you changed the posture to Custom in earlier versions of Deep Security, all default values for the anti-evasion settings were set to Deny. This led to a dramatic increase in block events. Now, the default custom values can be set. Advanced Network Engine Options The Advanced Network Engine Options allow the overriding of default timeout values for managing connections, for example, how long to wait to close a connection or how many simultaneous connections are allowed. If you deselect the Inherited check box, you can customize these settings. 240 © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall Order of Analysis Network traffic intercepted by the driver is passed through several levels of analysis before being passed to the application. Integrity Check In the first step of traffic analysis, the driver verifies the validity of the packet. It makes sure that the packet is actually suitable for analysis. Attacks involving malformed packets can be detected by their deviation from protocol requirements, and can therefore be addressed here: • • • • Tiny fragment Overlapping fragment Teardrop Ping-of-death (POD) Reconnaissance Scans In this step, the driver can detect possible reconnaissance scans that attackers often use to discover weaknesses before beginning a targeted attack. Set Reconnaissance Scan Detection Enabled to yes. You can configure the Deep Security Firewall to detect possible reconnaissance scans and help prevent attacks by blocking traffic from the source IPs for a period of time. Once an attack has been detected, you can instruct Deep Security Agents and Deep Security Virtual Appliances to block traffic from the source IPs for a period of time. © 2020 Trend Micro Inc. Education 241 Lesson 10: Filtering Traffic Using the Firewall Use the Block Traffic lists on the on the Policy/Computer Editor > Firewall > Reconnaissance tab to set the number of minutes. • Computer OS Fingerprint Probe: Deep Security Agents and Virtual Appliances will recognize and react to active TCP stack OS fingerprinting attempts • Network or Port Scan: The Deep Security Agents and Virtual Appliances will recognize and react to port scans. • TCP Null Scan: The Deep Security Agents and Virtual Appliances will refuse packets with no flags set. • TCP SYNFIN Scan: The Deep Security Agents and Virtual Appliances will refuse packets with only the SYN and FIN flags set. • TCP Xmas Scan: The Deep Security Agents and Virtual Appliances will refuse packets with only the FIN, URG, and PSH flags set or a value of 0xFF (every possible flag set). For each type of attack, the Deep Security Agent and Deep Security Virtual Appliance can be instructed to send the information to the Deep Security Manager where an Alert will be triggered by selecting the option Notify DSM Immediately. For this option to work, the Deep Security Agent and Deep Security Virtual Appliance must be configured for Agent-initiated or bidirectional communication in Policy/Computer Editor > Settings > Computer. If enabled, the Deep Security Agent and Deep Security Virtual Appliance will initiate a heartbeat to the Deep Security Manager immediately upon detecting the attack or probe. 242 © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall Note: If you want to enable reconnaissance protection, you must also enable the Firewall and Stateful Inspection on the Policy/Computer Editor > Firewall > General tab. You should also go to the Policy/Computer Editor > Firewall > Advanced tab and enable the Generate Firewall Events for packets that are Out of Allowed Policy setting. This will generate Firewall events that are required for reconnaissance. Detection can be enabled or bypassed for certain IP addresses by selecting the IP address list from Computers/Networks on which to perform detection or Do not perform detection on traffic coming from. IP lists can be created as Common Objects. Check Firewall Rules With the exception of the Bypass rule, Firewall rules are applied at this point in the analysis. The Firewall module will filter traffic based on the characteristics defined in the rule. Check Stateful Configuration Stateful Filtering plays a very important role in thwarting the attacks such as Denial of Service (DoS) and ACK Storm. Traditionally, these attacks leverage the characteristics of the following protocols: • • • TCP UDP ICMP Stateful Configuration analyzes each packet in the context of traffic history, correctness of TCP and IP header values, and TCP connection state transitions. In the case of stateless protocols like UDP and ICMP, a pseudo-stateful mechanism is implemented based on historical traffic analysis. A packet is passed to the stateful routine if it has been allowed through by a static Firewall rule conditions. The packet is examined to determine whether it belongs to an existing connection, and the TCP header is examined for correctness (e.g. sequence numbers, flag combinations, etc.). Deep Security Agents provide functionality that addresses known attack techniques for each of these protocols. When stateful analysis is enabled, packets are analyzed within the context of traffic history, correctness of TCP and IP header values, and TCP connection state transitions. • A packet is passed through the stateful routine if it is explicitly allowed via static rules. The packet is examined if it belongs to an existing connection by checking the connection table for matching end points • The TCP header is examined for correctness (for example, sequence numbers, flag combination) • Once enabled, the stateful engine is applied to all traffic traversing the interface. UDP pseudo-stateful inspection, by default, rejects any incoming unsolicited UDP packets. If a computer is running a UDP server, a Force Allow rule must be included in the policy to permit access to that service. For example, if UDP stateful inspection is enabled on a DNS server, a Force Allow rule permitting UDP traffic to port 53 is required. © 2020 Trend Micro Inc. Education 243 Lesson 10: Filtering Traffic Using the Firewall ICMP pseudo-stateful inspection, by default, rejects any incoming unsolicited ICMP request-reply and error type packets. A Force Allow must be explicitly defined for any unsolicited ICMP packet to be allowed. All other ICMP (non request-reply or error type) packets are dropped unless explicitly allowed with static rules. Stateful Configuration for TCP Of the three protocols that this feature supports, TCP is the only protocol which the Deep Security Manager Administrator is able to configure. From the Policies menu, click Common Objects in the left-hand frame, then Other > Firewall Stateful Configurations. Click New > New Firewall Stateful Configuration, or double click and existing configuration in the list. Click the TCP tab to modify the properties for this protocol. Pseudo-Stateful Configuration for UDP and ICMP Both UDP and ICMP are connectionless protocols, so normal stateful inspection, the kind done with TCP, does not apply to these protocols. Stateful configuration, therefore, uses pseudostate table that keeps track of related UDP and ICMP messages which are then treated as pseudo connections. 244 © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall Decrypt SSL Traffic If the packet is part of an SSL connection, the driver will decrypt the traffic to allow Intrusion Prevention. This feature, however, requires the administrator to provide the relevant keys to permit decryption. Check Intrusion Prevention Rules Finally, the Intrusion Prevention module inspects the contents of the packet for malicious instructions and other unauthorized content. Important Points to Remember Note: • Firewall rules using the Allow action are prohibitive. Anything not specified in the collection rules is automatically dropped. This includes traffic of other frame types so you need to remember to include rules to allow other types of required traffic. For example, don't forget to include a rule to allow ARP traffic if static ARP tables are not in use. • If UDP stateful inspection is enabled, a firewall rule using Force Allow must be used to allow unsolicited UDP traffic. For example, if UDP stateful is enabled on a DNS server then a force allow for port 53 is required to allow the server to accept incoming DNS requests. • If ICMP stateful inspection is enabled, a rule using Force Allow must be used to allow unsolicited ICMP traffic. For example, if you wish to allow outside ping requests a force allow rule for ICMP type 3 (Echo Request) is required. • • A firewall rule using Force Allow acts as a trump card only within the same priority context. If you do not have a DNS or WINS server configured (which is common in test environments) a firewall rule using Force Allow on incoming UDP port 137 rule may be required for NetBios. When troubleshooting a new firewall policy, the first thing you should do is check the Firewall Rule logs on the Agent/Appliance. The Firewall Rule logs contain all the information needed to determine what traffic is being denied so that you can further refine your policy as required. Information collected using the dsa_config command locally on a Deep Security Agent can also be very helpful for troubleshooting. Port Scans Port scanning allows administrators to detect open, and potentially vulnerable, ports on machines on the company network. This functionality can be used for the following purposes: • • • Aid in the selection of firewall rules to apply Evaluate the effectiveness of existing firewall rules When used in combination with malware-specific port lists, detect the ports opened by malware © 2020 Trend Micro Inc. Education 245 Lesson 10: Filtering Traffic Using the Firewall Deep Security Manager checks for open ports by initiating connections with them. If a connection is established, then the port is identified as open. Best Practice: Add Deep Security Manager’s own IP address in the Ignore reconnaissance IP list so that port scans do not generate Reconnaissance Scan alerts. Defining Ports to Scan By default, Deep Security Manager scans ports 1 to 1024. However, administrators can use port lists to scan alternative ports, such as those associated with specific applications or threats. 246 © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall From either the Policies or Computers menu, click Settings and on the General tab, select from the Ports to scan list. A customized Ports to scan list can be created as a Common Object. Scan Triggers Administrators can initiate port scans from either the Computers list in the Deep Security Manager Web console. © 2020 Trend Micro Inc. Education 247 Lesson 10: Filtering Traffic Using the Firewall A port scan can also be initiated from the computer Details page. Note: Scan for Open Ports is not available on the base and assigned (child) policies. A Scanning for Open Ports message is displayed while the scan is in progress. 248 © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall Scan Results Port scan results are displayed on the Details page of the target computer. © 2020 Trend Micro Inc. Education 249 Lesson 10: Filtering Traffic Using the Firewall Viewing Firewall-Related Events Firewall events can displayed for all computers in the system or for specific computers. System Events To view all the Firewall events that have occurred for the entire system, click the Events & Reports menu. Click Firewall Events in the left-hand frame. Select the criteria for the retrieval of the events and click Refresh. All the retrieved events will be displayed. Note: 250 The Firewall, Intrusion Prevention and Web Reputation Protection Modules share a common network engine. Because of this, some Firewall events may still be generated even though the Firewall Protection Module itself may be off. © 2020 Trend Micro Inc. Education Lesson 10: Filtering Traffic Using the Firewall Computer Events To view Firewall events for a specific computer, double-click the device in the Computers list to view the Details. Click the Firewall Protection Module in the left-hand frame and click the Firewall Events tab. © 2020 Trend Micro Inc. Education 251 Lesson 10: Filtering Traffic Using the Firewall Review Questions 1 1. Describe the effect of the following actions set in Firewall rules. • Deny • Allow • Force Allow • Log Only • Bypass 2 What is the purpose of the Priority setting in a Firewall rule? 3 How would you characterize the differences between the Network Engine Modes of Inline and Tap? Which Protection Modules make use of this setting? 4 How can a Firewall Stateful Configuration help in thwarting Denial of Service (DoS) attacks against a protected server? 252 © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities Lesson Objectives: After completing this lesson, participants will be able to: • • • • • • • Describe the functions enabled though the Intrusion Prevention protection module Enable Intrusion Prevention through a policy or directly to a computer Assess system vulnerabilities by running recommendation scans List the different types of Intrusion Prevention rules Describe how Deep Security-applied Intrusion Prevention rules are applied to SSL traffic Protect Web applications from common attacks using Intrusion Prevention rules Locate and view Intrusion Prevention-related events The Intrusion Prevention module protects computers from being exploited against known vulnerability attacks as well as SQL injections attacks, Cross-Site Scripting attacks, and other web application vulnerabilities. Whereas Firewall rules and Firewall Stateful Configurations examine a packet's control information (data that describes the packet), Intrusion Prevention rules examine the actual content of packets and sequences of packets. Based on the condition set within the Intrusion Prevention rule, various actions are then carried out on these packets. Actions range from replacing specifically defined or suspicious byte sequences, to completely dropping packets and resetting the connection. Intrusion Prevention shields vulnerabilities until code fixes can be completed. It also identifies malicious software accessing the network and increases visibility into, or control over, applications accessing the network. Trend Micro’s membership in the Microsoft Active Protections Program (MAPP) provides advanced access to Microsoft’s monthly security bulletins. This allows the rule development team to anticipate emerging threats and craft rules that protect against a new vulnerability, even before they are officially acknowledged. Deep Security Agents look at the content of a packet to determine if it contains malicious content. It is able to determine if content is malicious by referencing instructions within Intrusion Prevention rules. If the content matches what the rule looks for, the packet is dropped. © 2020 Trend Micro Inc. Education 253 Lesson 11: Protecting Servers From Vulnerabilities Blocking Exploits Using Intrusion Prevention The Intrusion Prevention Protection Module can be leveraged to protect against exploits with the following functions. Virtual Patching Intrusion Prevention rules can drop traffic designed to leverage unpatched vulnerabilities in certain applications or the operating system itself. This protects the host while awaiting the application of the relevant patches. This form of vulnerability protection mitigates the impact of falling behind on patch application duties. Once the patch is applied, it is then possible to safely unassign the Intrusion Prevention rule that protects against that particular vulnerability. Virtual patching does not replace the need to run regular system updates. Once a security update is applied to the operating system or an application, a Recommendation Scan can help identify rules that can be unassigned. System performance can be affected if a large number of Intrusion Prevention rules are applied to the server. Virtual patching can also be used in cases where an operating system is no longer supported by the vendor. Trend Micro will still issue updated Intrusion Prevention rules for an extended period of time after the end of support by the original vendor. Detecting Suspicious Network Activity Intrusion Prevention rules could detect activity that is considered suspicious, such as ransomware or remote access as well as detecting and blocking traffic that does not conform to protocol specifications, allowing Deep Security Agents to detect packet fragments, packets without flags, and similar anomalies. Blocking Traffic Through Protocol Control Communication applications like peer-to-peer chat programs use specific and distinct communication protocols. Intrusion Prevention rules could identify packets that use these protocols allowing the rule to detect the presence, and/or prevent the use, of these applications. Intrusion Prevention rules can be used to block traffic associated with specific applications like Skype or filesharing utilities. Protecting Web Applications Intrusion Prevention rules can be used to block common web site vulnerabilities such as Cross-Site Scripting and SQL Injection. 254 © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities Enabling Intrusion Prevention Enabling Intrusion Prevention in Deep Security typically involves the following steps: 1 Turning the Intrusion Prevention module on in a policy or on a computer 2 Setting the Detection mode in a policy or on a computer 3 Running a recommendation Scan on a computer 4 Applying the Intrusion Prevention rules to a policy or to a computer 5 Staying up to date on rules through ongoing recommendation scans Turning the Intrusion Prevention Module On You can enable Intrusion Prevention protection in policies or on a computer. Turning the Intrusion Prevention Module On In a Policy Intrusion Prevention protection can be assigned to policies at any level in the hierarchy. Any sub policies with inheritance enabled will be assigned the Intrusion Prevention protection settings. To do this in a policy, click the Policies menu and double-click the policy to which you’d like to assign protection. Click the Intrusion Prevention Protection Module in the left-hand frame and on the General tab, set the Intrusion Prevention State to On and click Save. © 2020 Trend Micro Inc. Education 255 Lesson 11: Protecting Servers From Vulnerabilities Turning the Intrusion Prevention Module On on a Computer To set Intrusion Prevention protection on a computer, click the Computers menu. Locate and double-click a computer in the list to open Details. In the right-hand pane, click Intrusion Prevention and on the General tab set the Intrusion Prevention Configuration to On and click Save. Turning the module on at the computer level will override the inheritance of settings from the policy. Setting the Intrusion Prevention Behavior This setting specifies the behavior of the Intrusion Prevention rule and can be set in a Policy or on a Computer. • 256 Detect: Detect is useful for testing when you first apply a new set of Intrusion Prevention rules to make sure they don’t interfere with legitimate traffic. When set to Detect, all of the Intrusion Prevention rules will be triggered and events are generated, but traffic is not affected. You should test new Intrusion Prevention settings in Detect to ensure that service on your computers will not be interrupted by false-positives. © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities • Prevent: If you are satisfied that no false positives are being triggered after monitoring the Intrusion Prevention events for a period of time, you can switch to Prevent which will prevent rule-triggering traffic from continuing. This setting only applies when the network engine is operating Inline; that is, live traffic is being streamed through Deep Security. The rules will be applied to traffic and related log events are generated. Rule Behavior You can configure a rule's behavior mode to override the mode that is set for Intrusion Prevention at the policy or computer level. Overriding is useful for testing new rules that are applied to a policy or computer. For example, when a policy is configured such that intrusion prevention works in Protect mode, you can configure a rule to use Detect mode. For that rule only, Intrusion Prevention merely logs the traffic, and enforces other rules that do not override the policy's behavior mode. Some rules issued by Trend Micro use Detect mode by default. For example, mail client rules generally use Detect mode because in Protect mode they block the downloading of all mail. Some rules trigger an alert only when a condition occurs a large number times, or a certain number of times within a certain period of time. These types of rules apply to traffic that constitutes suspicious behavior only when a condition recurs, and a single occurrence of the condition is considered normal. Best Practice: To prevent blocking legitimate traffic and interrupting network services, when a rule requires configuration, keep it in Detect mode until you've configured the rule. Switch a rule to Prevent mode only after configuration and testing. Running a Recommendation Scan Recommendation Scans provide a snapshot of existing vulnerabilities on a host, and a selection of actions that can be taken to address these vulnerabilities. This eliminates much of the guesswork involved in configuring security. © 2020 Trend Micro Inc. Education 257 Lesson 11: Protecting Servers From Vulnerabilities An on-demand scan can be triggered within the Deep Security Manager Web console by right-mouse clicking the computer and selecting Actions > Scan for Recommendations. 258 © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities Alternately, Scan for Recommendations can be triggered from the General tab of the Computer Details page. A message is displayed while the scan is in progress. You will also note that the Task column for the computer displays Scanning for Recommendations. Once this message disappears from the column, the scan is complete. © 2020 Trend Micro Inc. Education 259 Lesson 11: Protecting Servers From Vulnerabilities Applying the Intrusion Prevention Rules Rules recommended as part of a Recommendation scan can be assigned to Deep Security Agent in different ways: Applying the Rules to a Computer The rules recommended by the scan can be added to a computer manually or automatically. To apply the rules manually, once the Recommendation Scan is complete, click Assign/ Unassign from the General tab of Computer Details. Select Recommended for Assignment from the list and click to select the individual rules to apply. Click the category name to assign all the rules in the category. Rules can be unassigned using the same method by selecting Recommended for Unassignment and disabling the displayed items. 260 © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities The recommended rules can also be applied automatically by setting Automatically Implement Intrusion prevention Recommendation to Yes on the General tab. Note: Rules assigned this way override both Base and assigned Policy-level settings. Maintaining these rules may become tedious and may eventually require use of an Override at the assigned Policy level. Applying the Rules Through an Assigned Policy When a Recommendation Scan is performed on an individual member of an assigned policy group, the recommendations for the Deep Security Agent will be reflected on the assigned policy as well. Accepting the recommendations at the assigned policy level applies the rules to all members of the related assigned policy, without actually assigning them directly to the Deep Security Agents. The advantage to this method is ease of maintenance. There is, however, the possibility that rules may be assigned to policy members that do not actually need them. Unless the network consists of identical machines, applying the rules through an assigned policy may be less than ideal. © 2020 Trend Micro Inc. Education 261 Lesson 11: Protecting Servers From Vulnerabilities Staying Up To Date on Rules Through Ongoing Recommendation Scans Recommendation scans can be configured to run automatically, on an ongoing basis. Running the scan regularly will enable new rules to be added as new vulnerabilities are discovered, or older rules that are no longer required because of a software can be removed. Ongoing scans can also be configured as a scheduled task. 262 © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities Types of Intrusion Prevention Rules There are three types of Intrusion Prevention rules: • Exploit Rules: An Exploit rule protects against a specific exploit. There could be as many exploit rules as there are methods for using the vulnerability. Depending on the nature of the exploit, multiple exploits can be addressed by a single exploit rule. • Vulnerability Rules: A Vulnerability rule, on the other hand, applies a virtual patch on the vulnerability, thereby rendering all exploits that use that vulnerability harmless. Vulnerability rules, therefore, can theoretically take the place of several Exploit rules. • Smart Rule: A Smart rule is a generic rule that provides virtual patching for multiple vulnerabilities. Because of the breadth of these rules, some configuration may be required to prevent false positives. Exploit B Exploit A Vulnerability Exploit C One-to-one patterns are designed for a specific malware variants and rely on a precise pattern match. As variants emerge, the common denominator found in these variants is used as the basis for a one-to-many pattern which can recognize the different variants without the pattern size impact of a one-to-one pattern. This database space conservation measure permits Trend Micro to retire the one-to-one pattern without loss of detection capability. Mapped to Intrusion Prevention rules, Exploit rules would be roughly analogous to a one-to-one pattern (exploits can actually match with more than one exploit), while Vulnerability and Smart rules would be analogous to the one-to-many patterns. The broader the applicability of the rule, the greater the chances of blocking traffic that really shouldn’t be blocked. For this reason, Smart rules will probably not be developed for every single vulnerability. These are only released after completion of exhaustive testing to address false-positive concerns. Rules generate Intrusion Prevention events when they are triggered. Unless packet capture functionality is enabled, these events typically only contain the name of the rule that was triggered, and the time and location of the event. The usefulness of these events for forensic analysis of attacks is directly proportional to the granularity of the information they contain. Smart rules alone, therefore, are too broad for forensic analysis because they cover too many attack vectors. Targeted exploit filters, on the other hand, offer the most targeted Intrusion Prevention logging information. © 2020 Trend Micro Inc. Education 263 Lesson 11: Protecting Servers From Vulnerabilities Exploit B Exploit Y Exploit rule for Exploit B Exploit rule for Exploit Y Vulnerability rule for Vulnerability #1 Vulnerability rule for Vulnerability #2 Vulnerability #1 Smart rules for Vulnerability #1 and #2 Vulnerability #2 Exploit rule for Exploit C Exploit rule for Exploit Z Exploit C Exploit Z Exploit rule for Exploit X Exploit A Exploit rule for Exploit A When all three rules are available for a particular vulnerability, they form a layered defense mechanism around the vulnerability. Exploit X • • • Different Exploits targeted at Vulnerability #1. • Both vulnerabilities can be protected by a single Smart rule that can deal with all the attack vectors for Vulnerability #1 as well as attacks for Vulnerability #2. Each attack vector has a corresponding Exploit rule. Each of these vulnerabilities has a Vulnerability rule that can address all of the attack vectors by itself. Rule Groups To simplify the display of rules, Intrusion Prevention Rules are divided into groups. Selecting a group limits the display of rules to those assigned to the group. 264 • Web Application Protection: These rules are designed to protect Web applications from malicious attacks. • Application Traffic: As its name implies, these rules detect the use of particular applications on Deep Security Agent hosts. • Suspicious Network Activity: These rules are designed to detect activity that is considered suspicious, such as remote access. • Vulnerabilities and Exploits: These rules include protection from known vulnerabilities. © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities TippingPoint Equivalent Rule ID Mapping Many customers are benefiting from both TippingPoint network security and Deep Security host security. To make it easier for you to know which Deep Security Intrusion Prevention rule maps to an equivalent TippingPoint rule, the Intrusion Prevention Rules table can display an optional TippingPoint column that will show the equivalent TippingPoint rule ID if it exists. Click the Columns menu item and enable the display of the column. Filtering SSL-Encrypted Traffic The Intrusion Prevention module supports filtering of encrypted SSL traffic. SSL Configurations are assigned to a given credential-port pair on one or more interfaces. The credentials required to decrypt the SSL traffic must be imported in PKCS#12 or PEM format. Windows computers have the option of using CryptoAPI directly. The credentials are required to give the Deep Security Agent access to the private decryption key. Note: Filtering of SSL traffic is only supported by the Deep Security Agent, not the Deep Security Virtual Appliance. The Agent does not support filtering SSL connections on which SSL compression is implemented. © 2020 Trend Micro Inc. Education 265 Lesson 11: Protecting Servers From Vulnerabilities A secure SSL connection is made possible by using the server’s certificate to authenticate its identity and to encrypt the master secret which will be used as a shared secret allowing both devices in the communication to generate an identical session key. Any information exchanged between the two devices will be encrypted using the session key, protecting the connection for the duration of the session. Note: HTTPS payload inspection must be able to observe the SSL session establishment to be able to decrypt SSL traffic. It cannot read an already established session. If an established secure session is present when HTTPS Payload inspection is enabled, the Deep Security Agent will terminate this connection. If the packet is part of an SSL connection, the driver needs to decrypt the traffic to perform Intrusion Prevention filtering. If you are using PEM or PKCS#12, the administrator must identify the location of the credential file and the pass phrase to permit decryption. If you are using Windows CryptoAPI credentials, choose the credentials from the list of credentials found on the computer. Click View SSL Configurations to view existing or create new configuration for encrypted scanning. Create a new configuration and follow the prompts in the Wizard. 266 © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities Identify the interface to monitor for encrypted traffic. Identify the port (or ports) to monitor. The port list may have been created as a common object, if so, select the list. © 2020 Trend Micro Inc. Education 267 Lesson 11: Protecting Servers From Vulnerabilities You can monitor traffic coming from all IP addresses, or selected IP address. Identify the IP addresses to monitor. Identify how the credentials will be provided to the Agent. Select the type of credentials to be used. Credentials can be imported in PKCS#12 or PEM format, or Windows servers can use CryptoAPI directly. 268 © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities If selecting a file, provide the full path to the file and provide the password. The credentials provided will be tested and the configuration will display in the list. Note: Deep Security Agents do not support filtering on SSL connections with SSL compression enabled. - When HTTPS payload inspection is enabled, any encrypted traffic that Deep Security Agents cannot decrypt will be dropped. This includes SSL connections with SSL compression enabled. - If HTTPS payload inspection is NOT enabled, then SSL connections with SSL compression enabled will simply be allowed through without analysis. Each time an SSL packet passes through a Deep Security Agent, the traffic is decrypted and analyzed. This decryption is applied both to incoming traffic and its corresponding response. When Deep Security Agents receive a packet from the network, the packet is deferred while its content is analyzed. After the Firewall module completes its analysis of the packet, it is handed off to Intrusion Prevention and HTTPS payload inspection for analysis. The decryption engine is not able to re-encrypt the traffic that it decrypts. To preserve the original encrypted packet, a copy of the packet is created, the copy is decrypted, and then inspected. If the packet contains malicious content, then it is dropped. If the packet cannot be decrypted, then it is also dropped. If the packet does not trigger any Intrusion Prevention rules, the deferred encrypted packet is allowed to proceed to its destination. © 2020 Trend Micro Inc. Education 269 Lesson 11: Protecting Servers From Vulnerabilities Protecting Web Applications Two of the most common application-layer attacks are SQL Injection and Cross-Site Scripting (XSS). Cross-Site Scripting and SQL Injection rules intercept the majority of attacks by default, but you may need to adjust the drop score for specific resources if they cause false positives. • Cross-Site Scripting Cross-Site Scripting is a code injection attack that allows an attacker to execute malicious scripts in another user's browser. Rather than directly targeting a user, the attacker makes use of vulnerabilities in web sites that the victim visits in order to get the web site to deliver the malicious scripts. To the browser, the malicious JavaScript appears to be a legitimate part of the web site, and the web site acts as an unintentional accomplice to the attacker. The attack may occur when a web application does not properly validate or escape user input. If user input is echoed back to the browser without escaping it properly or using it without proper validation, malicious HTML or script code may be executed by crafting malicious input. • SQL Injection SQL Injection is an attack in which SQL code is inserted or appended into an application or user input parameters. These are later passed to a back-end SQL server for parsing and execution. Any procedure that constructs SQL statements could potentially be vulnerable, as the diverse nature of SQL and the methods available for constructing it provide a wealth of coding options. The primary form of SQL injection consists of direct insertion of code into parameters that are concatenated with SQL commands and executed. SQL injection may occur when a web application does not properly escape user input that is used in SQL statements. Malicious input may result in executing arbitrary SQL statements. The Intrusion Prevention module is able to defend against Cross-Site Scripting and SQL Injection attacks through the following out-of-the-box rules available in Deep Security: • • 1000552 - Generic Cross-Site Scripting (XSS) prevention 1000608 - Generic SQL injection prevention Both rules may require custom configuration for web servers. If you have output from a Web Application Vulnerability Scanner, you should leverage that information when applying protection. For example, if the username field on a login.asp page is vulnerable to SQL injection, ensure that the SQL injection rule is configured to monitor that parameter with a low drop threshold. 270 © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities Administrators however can add their own custom Web application rules. The configuration options for both rules are very similar. Both have similar parameters that are available and configurable. Patterns The Patterns field contains the characters that Intrusion Prevention rules look for in the HTTP message. Consider the following pattern in the default Generic Cross-Site Scripting rule: This pattern prompts the driver to keep track of instances of < and >. Each time the driver encounters these characters in the URL, it increments the URL score by 1. character <,%3c,>,%3e:1 character in UTF-8 encoding © 2020 Trend Micro Inc. Education score 271 Lesson 11: Protecting Servers From Vulnerabilities Another pattern is designed to keep track of relevant scripting keywords. As an example, both of these patterns are applied to this very simple Cross-Site Scripting attack: ‘--<script> alert(‘XSS Executed’)</script> When the patterns are applied to the string, the result is shown below: 1 1 2 1 1 11 2 1 ‘--<script> alert(‘XSS Executed’)</script> The word script is part of the second pattern, and is given a score of 2. All other matches, including the single apostrophe, are given a score of 1. This gives this script a total score of 11. In practice, the filter implements a score threshold, which may be breached before the full script is analyzed. Drop Threshold Drop Threshold defines the maximum score that a string can accumulate before it is dropped. The default value is 4, so when the score reaches 5, the packet is dropped. Applied to the same attack string as in the example above, the threshold is breached by the time the > after script is read. Total score =5 (Threshold exceeded) 1 1 2 1 1 11 2 1 ‘--<script> alert(‘XSS Executed’)</script> Log Threshold Log Threshold works the same way as the Drop Threshold parameter. When the string’s score reaches this value, the driver creates a log entry for this event. 272 © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities Max Distance Between Matches Max Distance Between Matches defines how many characters can exist between two pattern matches for both matches to be part of the same score count. 30 characters (default) yyyXyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyXyyyy If there are no pattern matches beyond this value, then the score is reset to zero. The default value for this parameter is 30. Viewing Intrusion Prevention-Related Events Intrusion Prevention events can displayed for all computers in the system or for specific computers. System Events To view all the Intrusion Prevention events that have occurred, click the Events & Reports menu. Click Intrusion Prevention Events in the left-hand frame. Select the criteria for the retrieval of the events and click Refresh. All the retrieved events will be displayed. © 2020 Trend Micro Inc. Education 273 Lesson 11: Protecting Servers From Vulnerabilities Computer Events To view Intrusion Prevention events for a specific computer, double-click the device in the Computers list to view the Details. Click the Intrusion Prevention Protection Module in the left-hand frame and click the Intrusion Prevention tab. 274 © 2020 Trend Micro Inc. Education Lesson 11: Protecting Servers From Vulnerabilities Review Questions 1 Describe the concept of virtual patching. 2 A Recommendation Scan for Intrusion Prevention rules recommends a large number of rules to be applied to a server, which could adversely affect performance. How can you reduce the number of rules that are recommended to be applied to the server? 3 A security patch is applied to the operation system on a Windows Server 2016 computer. How can you identify which of the Deep Security-identified vulnerabilities on this server have been resolved by this patch? 4 How does the Deep Security Agent perform Intrusion Prevention scanning on an SSL-encrypted connection? © 2020 Trend Micro Inc. Education 275 Lesson 11: Protecting Servers From Vulnerabilities 276 © 2020 Trend Micro Inc. Education Lesson 12: Detecting Changes to Protected Servers Lesson Objectives: After completing this lesson, participants will be able to: • • • • Enable Integrity Monitoring protection through a policy or directly to a computer Run a recommendation scan and apply the suggested rules Build a trusted baseline configuration for protected computers Locate and view Integrity Monitoring-related events The Integrity Monitoring module detects changes to system objects such as files, services, processes and critical system areas like the Windows Registry that could indicate suspicious activity. It does this by comparing current conditions to a baseline reading it has previously recorded. Deep Security uses rules to identify the objects to monitor. Deep Security ships with predefined Integrity Monitoring rules and new rules are delivered to Deep Security Agents through security updates. Integrity Monitoring detects changes made to the system but will not prevent or undo the change. This protection module can monitor system objects including: • • • • • • Files Folders Registry entries Processes Services Listening ports It is important to note that Integrity Monitoring will detect any change that happens to an object but lacks the ability to distinguish between legitimate and malicious changes. You can enable Integrity Monitoring protection through a policy or directly at the computer level. © 2020 Trend Micro Inc. Education 277 Lesson 12: Detecting Changes to Protected Servers Enabling Integrity Monitoring Enabling Integrity Monitoring in Deep Security typically involves the following steps: 1 Turning on Integrity Monitoring in a policy or on a computer 2 Applying Integrity Monitoring rules that make sense for your purposes to a policy or to a computer 3 Building a baseline for a computer 4 Scanning periodically for changes to a computer Turning on Integrity Monitoring You can enable Integrity Monitoring protection in policies or on a computer. Turning on Integrity Monitoring in a Policy Integrity Monitoring protection can be assigned to policies at any level in the hierarchy. Any sub policies with inheritance enabled will be assigned the Intrusion Prevention protection settings. To do this in a policy, click the Policies menu and double-click the policy to which you’d like to assign protection. Click the Integrity Monitoring Protection Module in the left-hand frame and from the General tab, set the Integrity Monitoring State to On and click Save. 278 © 2020 Trend Micro Inc. Education Lesson 12: Detecting Changes to Protected Servers Turning on Integrity Monitoring on a Computer To set Integrity Monitoring protection on a computer, click the Computers menu. Locate and double-click a computer in the list to open Details. In the right-hand pane, click Integrity Monitoring and on the General tab set the Integrity Monitoring Configuration to On and click Save. Turning the module on at the computer level will override the inheritance of settings from the policy. Applying Integrity Monitoring Rules to a Policy or Computer Under the Policies or Computers menu, go to Integrity Monitoring > General. To add or remove Integrity Monitoring Rules, click Assign/Unassign. This will display a window showing all available Integrity Monitoring rules, from which you can select or de-select rules. © 2020 Trend Micro Inc. Education 279 Lesson 12: Detecting Changes to Protected Servers Some Integrity Monitoring Rules written by Trend Micro may require local configuration to function properly. If you assign one of these rules to your computers or one of these rules gets assigned automatically, an alert will be raised to notify you that configuration is required. Best Practice: Integrity Monitoring rules should be as specific as possible to improve performance and to avoid conflicts and false positives, for example, do not create a rule that monitors the entire hard drive. Running a Recommendation Scan on a Computer Run a Recommendation scan on the computer to get suggestions about which rules would be appropriate. These rules identify objects on the protected server which can be monitored. To do this, click the Computers menu and select a machine to scan. In the left-hand frame, click Integrity Monitoring. On the General tab, click Scan for Recommendations. You can optionally specify whether Deep Security should automatically implement the rule recommendations that it finds. 280 © 2020 Trend Micro Inc. Education Lesson 12: Detecting Changes to Protected Servers © 2020 Trend Micro Inc. Education 281 Lesson 12: Detecting Changes to Protected Servers Once the recommendation scan has run, click Assign/Unassign and in the rules window, select Recommended for Assignment to view the recommendations. Select the rules that are appropriate for your requirements. Best Practice: Recommended Integrity Monitoring rules may result in a large number of monitored entities and attributes. The best practice is to decide what is critical and should be monitored, then create custom rules or tune the predefined rules. Pay extra attention to rules that monitor frequently-changed properties such as process IDs and open ports because they can be noisy and may need some tuning. Building a Baseline for the Computer Integrity Monitoring works by comparing the current condition of a monitored object with an existing baseline, which represents the original secure state of the objects. The state of many objects are identified by a hash, captured during the creation of the baseline. 282 © 2020 Trend Micro Inc. Education Lesson 12: Detecting Changes to Protected Servers Best Practice: You can select the hash algorithm(s) that will be used by the Integrity Monitoring module to store baseline information. You can select more than one algorithm, but this is not recommended because of the detrimental effect on performance. A baseline is created automatically when the protection module is enabled and rules are applied. The resulting snapshot is stored on the Deep Security Agent host. Any events related to detected changes to the objects are uploaded to Deep Security Manager as part of a heartbeat operation. Once fetched, the events will be deleted from the database, with the exception of the most recent integrity events. These are retained for display in the Deep Security Manager Web console. If changes are applied manually to the monitored objects (for example, after a software update) it is recommended that you manually rebuild the baseline. Best Practice: Run a new baseline scan after applying patches. To rebuild a new baseline for Integrity Scans on a computer, open the details for a computer and click the Integrity Monitoring protection module in the left-hand frame. © 2020 Trend Micro Inc. Education 283 Lesson 12: Detecting Changes to Protected Servers A prompt in the lower-right corner of the Deep Security Manager Web console displays the progress of the scan. Note: The size of the database will vary depending on the number of events that occur on the host. If free disk space drops below 5MB, Integrity Monitoring will be suspended. Periodically Scanning for Changes to a Computer To detect changed to monitored objects, the Agent must periodically scan for changes. To perform an on-demand scan, from the Computer menu, click Integrity Monitoring. On the General tab click Scan for Integrity. You can also enable Real Time Scan or create a scheduled task that performs scans on a regular basis. Detecting Changes The following Events can trigger the comparison between a system object and its baseline. 284 • On-demand scans: Even when Integrity Monitoring is off, you can run an on-demand Integrity Monitoring scan. To do this, click the Computers menu and click the Integrity Monitoring Protection Module. From the General tab, click Scan for Integrity. • Real-Time scans: When Integrity Monitoring is on, you can enable real-time scanning. When this option is selected, Deep Security monitors entities for changes in real time and raises Integrity Monitoring Events when it detects changes. • Scheduled scans: When Integrity Monitoring is on, you can schedule Integrity Monitoring scans just like other Deep Security operations. Deep Security checks the entities that are being monitored and identifies and records an Event for any changes since the last time it performed a scan. Multiple changes to monitored entities between scans will not be tracked; only the last change will be detected. To detect and report multiple changes to an entity's state, consider increasing the frequency of scheduled scans (for example, daily instead of weekly) or enable realtime scanning for entities that change frequently. © 2020 Trend Micro Inc. Education Lesson 12: Detecting Changes to Protected Servers Viewing Integrity Monitoring-Related Events Events related to Integrity Monitoring activities on the protected computers can be viewed for the entire system, or on a computer-by-computer basis. System Events To view all the Integrity Monitoring events that have occurred, click the Events menu. Click Integrity Monitoring Events in the left-hand frame. Select the criteria for the retrieval of the events and click Refresh. All the retrieved events will be displayed. Computer Events The list of Events can also displayed for a specific computer. Locate and double-click a device from the Computers list and from its Details page, click the Integrity Monitoring Protection Module. Click the Integrity Monitoring Events tab to view all the events for this specific computer. © 2020 Trend Micro Inc. Education 285 Lesson 12: Detecting Changes to Protected Servers The display might not be up-to-the-minute, click Get Events to refresh the list and view the most recent Events. Each Integrity Monitoring rule can include an alert. When an Integrity Monitoring Event occurs with a rule that has this feature enabled, it will generate an alert. 286 © 2020 Trend Micro Inc. Education Lesson 12: Detecting Changes to Protected Servers Review Questions 1 On what types of system objects is the Integrity Monitoring protection module able to detect changes on? 2 In what situations would you rebuild the baseline for Integrity Monitoring on a particular server? 3 How often is the server scanned for changes to the items being monitored by the Integrity Monitoring protection module? © 2020 Trend Micro Inc. Education 287 Lesson 12: Detecting Changes to Protected Servers 288 © 2020 Trend Micro Inc. Education Lesson 13: Blocking Unapproved Software Lesson Objectives: After completing this lesson, participants will be able to: • • • • Enable Application Control through a policy or directly to a computer Build a baseline inventory of approved software for computers Locate and review Application Control-generated events Override Application Control to allow or block software on protected computers In Deep Security, Application Control is used for managing and tracking new or changed software while keeping the attack surface known and controlled. Application Control detects all forms of executable software, including: • • • • Unwanted or unapproved software installed by users New PHP pages, Python scripts or Java applications Unscheduled auto-updates Zero-day malware New or updated software is considered to be drift from your approved software inventory. The configured enforcement mode dictates behavior when unrecognized software is encountered. Application Control locks down software, so only software in your inventory can execute, or stop specific unwanted software from running. Allow rules can then be added for software that must execute despite not being in the inventory. Note: Application Control will not block files that are executed from remote folder or other removable media like a USB stick. When it's time for a software update, you can tell Application Control that the update is allowed by setting a maintenance window, while still preventing blocked software from executing. Since Application Control requires processing on the host computer, it is not supported in agentless implementations. Note: Application Control is intended for use on stable servers that are not updated frequently, and not for workstations or servers that undergo a lot of software changes. © 2020 Trend Micro Inc. Education 289 Lesson 13: Blocking Unapproved Software Enforcement Modes Two different Enforcement modes are available for application control, depending on how the Protection Module is to be used. • Block unrecognized software until it is explicitly allowed: In this mode, all new or changed software is blocked by the Application Control Protection Module. Software can be allowed by changing the blocking rule to Allow. • Allow unrecognized software until it is explicitly blocked: In this mode, all new or changed software is allowed by the Application Protection Module. Software can be blocked by changing the blocking rule to Block. Best Practice: For most environments, it is suggested that the enforcement mode be set to Allow unrecognized software until it is explicitly blocked. This will allow software changes by default when you first enable application control, then you can add block rules for changes you don’t want to allow. Eventually, the rate of software changes should decrease. At that point, you could consider blocking software changes by default and creating allow rules for the software that you know is good. Enabling Application Control Enabling Application Control in Deep Security typically involves the following steps: 1 Installing all of a server’s normal and approved software 2 Running a malware scan on the server 3 Enabling Application Control in a policy or on a computer 4 Detecting software changes on a computer 5 Monitoring for Application Control-related events on a computer 6 Allowing or blocking software on a computer Installing Approved Software To use Application Control, you must first ensure that your servers are installed with normal and approved software. This is important because when Application Control is first enabled, the Deep Security Agent builds an inventory of installed software on that computer. This inventory is the baseline of what is expected and normal on that computer and is central to how Application Control detects drift. Note: 290 Since everything in the inventory is considered to be known, approved software, it is very important to always review all installed software on your computer PRIOR to enabling Application Control. © 2020 Trend Micro Inc. Education Lesson 13: Blocking Unapproved Software Any software that is NOT in the inventory is considered unknown or unrecognized until you either: • • • Create an allow rule Create a block rule Rebuild the inventory to include the software Running a Malware Scan on the Server To ensure that no dormant malware exists on the server before the inventory scan is triggered, a full scan of the server should be run before Application Control is enabled. Note: Building the inventory will approve all currently installed software, even if it is malware. Before building the inventory, verify that unknown or unapproved software is not currently installed. Failure to do so could prevent the Application Control Protection Module from blocking that unwanted software. If you are not sure what is installed, the safest way is to make a clean install, and then enable Application Control. Enabling Application Control You can enable Application Control protection in policies or in the settings for a supported computer. Enabling Application Control in a Policy Application Control protection can be assigned to policies at any level in the hierarchy. Any sub policies with inheritance enabled will be assigned the Application Control protection settings. To do this in a policy, click the Policies menu and double-click the policy to which you’d like to assign protection. Set the Application Control State to On and click Save. © 2020 Trend Micro Inc. Education 291 Lesson 13: Blocking Unapproved Software Select the Enforcement mode, either Block unrecognized software until it is explicitly allowed, or Allow unrecognized software until it is explicitly blocked. Best Practice: Some software, such as web hosting software, Microsoft Exchange, and Oracle PeopleSoft, can change its own files. In those cases, instead of a complete lockdown, it usually works better to select Allow unrecognized software until it is explicitly blocked, so the software's self-change isn't automatically blocked. Then you would manually add block rules for unwanted software if it occurs. Enabling Application Control on a Single Computer In the Deep Security Manager Web console, click the Computers tab, and open the Details for a specific computer. Click the Application Control Protection Module in the left-hand frame. Set the Application Control Configuration to On. Select the Enforcement mode, either Block unrecognized software until it is explicitly allowed, or Allow unrecognized software until it is explicitly blocked and click Save. 292 © 2020 Trend Micro Inc. Education Lesson 13: Blocking Unapproved Software The Application Control Protection Module on the Agent will be installed, and will create an inventory of all installed applications. When the Agent begins to build the software inventory, the Task column for the computer displays Build Inventory In Progress and a progress prompt is displayed. It may take around 20 minutes to complete the inventory scanning. Enabling Application Control on Multiple Computers If you have server farms or auto-scaling virtual machines, you may want to use the API to automatically deploy Application Control to those computers. This is faster than manually enabling application control on one computer at a time. Detecting software changes When you enable Application Control, Deep Security Agents will scan for currently installed software. This is the baseline of what is expected and normal on that computer. Application Control assumes that currently installed software should be allowed. Unlike Integrity Monitoring which monitors any file, Application Control looks only for software files when examining the initial installation and monitoring for change. Software can be: • Compiled binaries and libraries, such as *.exe applications, and Java *.jar and *.class files. © 2020 Trend Micro Inc. Education 293 Lesson 13: Blocking Unapproved Software • Scripts that are interpreted or compiled on-the-fly, even though they remain editable like any plain text file, such as PHP, Python, and shell scripts Even if a file doesn't have execute permissions, the Deep Security Application Control module will still detect it as software if it has a PHP, Python, PowerShell, or Java file extension, including: - *.class *.jar *.war *.ear *.php *.py *.pyc *.pyo *.pyz *.ps1 The Deep Security Agent continuously monitors the computer for change. Application Control is integrated with the kernel and file system and has permissions to monitor the whole computer, including software installed by root / Administrator accounts. The Agent looks for disk write activity on software files. It compares the file with the hashes of the initially installed software to determine if the software is new or has changed. Detected changes to software include: • Note: Changes to file hash NEW Rules will no longer also be enforced by file name and/or file path attributes. This improves the coverage of each rule and reduce the operational overhead of creating and managing multiple rules for the same hash value. For example, if a particular hash executes repeatedly on a machine, but with a different file name each time, a single hash value rule (Allow or Block) will control its execution. Previously, rules also included file name and file path, so a new rule would need to be created each time the software executes. • • • Changes to time stamps Changes to permissions Changes to file contents If any drift from the approved inventory is detected, Application Control will apply the enforcement mode, and log the event. Depending on the severity level of the event, it will also trigger an alert. Administrators can set rules to override the enforcement mode by creating allow or block rules if required. 294 © 2020 Trend Micro Inc. Education Lesson 13: Blocking Unapproved Software Viewing Application Control-Related Events Application Control events can displayed for all computers in the system or for specific computers. System Events To view all the Application Control events that have occurred, click the Events & Reports menu. Expand Application Control Events in the left-hand frame and click Security Events. Select the criteria for the retrieval of the events and click Refresh. All the retrieved events will be displayed. When an Agent heartbeat includes several instances of the same security event, Deep Security aggregates the events in the Security Events log. Event aggregation reduces the number of items in the log, making it easier to find important events: • When the event occurs for the same application, which is usually the case, the log includes the application name with the aggregated event. For example, a heartbeat includes three instances of the Execution of Unrecognized Software Allowed event for the Test_6_file.sh file, and no other instances of that event. Deep Security aggregates these three events for the file Test_6_file.sh. When the event occurs for many files, the log omits the file names. For example, a heartbeat includes 21 instances of the Execution of Unrecognized Software Allowed event that occurred for several different files. Deep Security aggregates the 21 events in a single event, but does not include a file name. • When aggregated events apply to multiple files, other occurrences of these events have likely been reported in other heartbeats. After you respond to other events where the file name is known, it is likely that no more aggregated events occur. In the log, aggregated events use special icons, and the Repeat Count column indicates the number of events that are aggregated. © 2020 Trend Micro Inc. Education 295 Lesson 13: Blocking Unapproved Software Computer Events To view Application Control events on a computer, open the Details window for the device and click the Application Control Protection Module in the left-hand frame, then click the Application Control Events tab. 296 © 2020 Trend Micro Inc. Education Lesson 13: Blocking Unapproved Software Overriding Application Control Enforcement When Application Control detects unapproved software, events will be displayed on the Events & Reports tab and on the Application Control Events tab for each computer. To override the enforcement used by Application Control, click Change Rules in the Events entry and create an Allow or Block rule in the ruleset. © 2020 Trend Micro Inc. Education 297 Lesson 13: Blocking Unapproved Software Alternately, you can quickly find all unapproved software and easily resolve it by creating Allow All or Block All rules from the Actions menu. Note: Unlike the Computers tab, this pane usually does not show all computers. If Application Control has not detected unapproved software, this pane will be empty. If software is both on the blocked list and in the inventory (which would allow it), the block list has priority. This could happen, for example, if computers with different software use the same Allow or Block rules. A unique computer might have the software already installed when its Agent makes the baseline inventory. Note: 298 You can use the API to create shared allow or block rules and apply the rulesets to other computers. This can be useful if you have many identical computers (such as a load balanced web server farm). Shared rulesets should be applied only to computers with the exact same inventory. © 2020 Trend Micro Inc. Education Lesson 13: Blocking Unapproved Software Global Block The Application Control Protection Module includes a global block by hash feature that enables administrators to submit known bad hash values to Deep Security for Application Control block list enforcement. This control recognizes a global rule set that includes a list of hash values to be blocked. This rule set takes precedence over any other rules from existing shared or local rule sets and will be enforced by every Deep Security Agent enabled with Application Control. This feature provides a simple way for administrators to block unwanted or bad software from running at a global system-wide level. The design allows the workflow to be fully automated, with APIs for creating the global rule set, adding and deleting hash values. Pre-Approving Software Updates Normally, you will want Application Control to alert you when there are any unexpected software updates. However, some updates are expected and you will need provide allowances for these updates. Two methods for pre-approving software updates includes maintenance mode and trusted installers. Maintenance Mode To avoid unnecessary downtime due to manual approvals, and to avoid receiving alerts about normal software updates, you can indicate when your maintenance window is. Enable Maintenance Mode while completing the updates. Application Control will still continue to block software that is in the Block rules, but it will allow new software and add new or changed software to the baseline inventory. In Deep Security Manager, click the Computers menu. Locate and double-click a computer in the list to display its Details. Click the Application Control Protection Module and in the Maintenance Mode section, click Turn On. © 2020 Trend Micro Inc. Education 299 Lesson 13: Blocking Unapproved Software Set a time period for the maintenance window; this will prevent scenarios where the administrator forgets to turn off Maintenance Mode once the update is complete. While Maintenance Mode is active, the computer Status will display as Managed (Online) but the Maintenance Mode column will indicate the mode is enabled. Once the software update is complete, disable Maintenance Mode to start to monitor and enforce your list of approved software once again. If that computer was using shared Allow or Block rules, the next time that the Agent connects with Deep Security Manager, it will upload the new rules. Deep Security Manager will transmit these new rules to the other Deep Security Agents the next time they connect. 300 © 2020 Trend Micro Inc. Education Lesson 13: Blocking Unapproved Software Trusted Updater Application Control creates a software change event log whenever new executable files are detected on protected systems. Sometimes these changes are generated as part of the normal operation of trusted software. For example, when Windows self-initiates a component update, hundreds of new executable files may be installed. Application Control will auto-authorize file changes that are created by well-known Windows processes. Removing the noise associated with expected software changes provides you with clearer visibility into changes that may need your attention. Application Control Order of Analysis Application Control continuously monitors for software changes on your protected servers. Based on the enforcement mode assignment, Application Control either prevents unauthorized software from running until it is explicitly allowed, or allows unauthorized software until it is explicitly blocked. Which option you choose depends on the level of control you want over your environment. Applicaon Control enabled Soware inventory created Inventory change detected Maintenance Mode on? Y Add to inventory Y Add to inventory N Changed by trusted installer? N Matches exisng soware rule? Y N Allow or Block by default Allow or Block rule ? Allow Block Allow Block Application Control uses the following order for verifying whether software should be blocked or allowed: 1 Enable application control in a policy or directly to a computer that is protected by a Deep Security Agent. © 2020 Trend Micro Inc. Education 301 Lesson 13: Blocking Unapproved Software 2 When the Agent receives the policy, it creates an inventory of all software installed on the computer. All software listed in the inventory is assumed to be safe and is allowed to run on that computer. This inventory list is not visible from Deep Security Manager, which means you need to be absolutely certain that only good software is installed on a computer where you intend to enable application control. 3 After the inventory is finished, Application Control is aware of any software changes on the computer. A software change could be new software that appears on the computer or changes to existing software. 4 If the computer is in maintenance mode, the Deep Security Agent adds the software to its inventory and it is allowed to run. 5 If the change was made by a trusted installer, the Deep Security Agent adds the software to its inventory and allows it to run. For example, when Microsoft Windows self-initiates a component update, hundreds of new executable files may be installed. Application Control auto-authorizes many file changes that are created by well-known Windows processes and does not list these changes in Deep Security Manager. Removing the noise associated with expected software changes provides you with clearer visibility into changes that may need your attention. 6 If the computer's ruleset contains a rule for this exact piece of software, the software is allowed or blocked according to the rule that's in place. 7 If software is not in the computer's inventory and is not covered by an existing rule, it's considered unrecognized software. The policy assigned to the computer specifies how unrecognized software is handled. Depending on the policy configuration, it's either allowed to run or is blocked. If the software is blocked and it is able to produce error messages in the OS, an error message on the protected computer indicates that the software does not have permissions to run or that access is denied. The unrecognized software appears on the Application Control - Software Changes page in Deep Security Manager. On that page, an administrator can click Allow or Block to create an allow or block rule for that piece of software on a particular computer. An Allow or Block rule takes precedence over the default action specified in the policy. Resetting Application Control Application Control is designed to assist your software change management process and is not designed for unregulated computers with continuous, large numbers of software changes. Too many changes make large rulesets that consume more RAM (unless you remove old rules each time). If you don't use maintenance mode during authorized software updates, too many changes can also result in high administrator workload because they must manually create allow rules. If unrecognized software changes exceed the maximum (based on system resources), application control will stop detecting and displaying all of the computer's software changes. This prevents accidental or malicious stability and performance impacts: consuming too much memory, disk space, and (for shared rulesets) network bandwidth. If that happens, Deep Security Manager will notify you through alerts and an event logs. You must resolve the issue to continue detecting software changes. • Examine the computer's processes and security events. Verify that the computer has not been compromised. If you are not sure, or do not have enough time, the safest and fastest way is to restore the system from a backup or VM snapshot. If you don't remove any unauthorized software (including zero-day malware), application control will ignore it when you reset application control. It won't appear on the Actions tab anymore and if its process has already executed and it is in RAM, application control won't log any events or alerts about it until you reboot the computer. 302 © 2020 Trend Micro Inc. Education Lesson 13: Blocking Unapproved Software • If the computer was running software updates, including auto-updates such as browser, Adobe Reader, or yum updates, disable them or schedule them so that they occur only when you have enabled application control's maintenance mode. • Reset application control. To do this, disable application control. Once the Agent has acknowledged it and cleared the error status, enable application control again. Local rulesets will be rebuilt; shared rulesets will be downloaded again. © 2020 Trend Micro Inc. Education 303 Lesson 13: Blocking Unapproved Software Review Questions 1 Describe the enforcement modes available for the Application Control protection module? 2 Why is it a good practice to run a full Anti-Malware scan on a server before enabling the Application Control protection module? 3 What methods are available for pre-approving software updates so they do not trigger Application Control events? 304 © 2020 Trend Micro Inc. Education Lesson 14: Inspecting Logs on Protected Servers Lesson Objectives: After completing this lesson, participants will be able to: • • • Enable Log Inspection through a policy or directly to a computer Run a recommendation scan and apply the suggested Log Inspection rules Locate and view Log Inspection-related events The Log Inspection protection module helps you identify important events that might be buried in your operating system and application logs. These events can be sent to a Security Information and Event Management (SIEM) system or centralized logging server for correlation, reporting, and archiving. All events are also securely collected in the Deep Security Manager. Log Inspection in Deep Security enables real-time analysis of third party log files. The Log Inspection rules and decoders provide a framework to parse, analyze, rank and correlate events across a wide variety of systems. As with Intrusion Prevention and Integrity Monitoring, Log Inspection content is delivered in the form of rules included in a security update. These rules provide a high level means of selecting the applications and logs to be analyzed. The Log Inspection module captures and analyzes system logs to provide audit evidence for PCI DSS or internal requirements that your organization may have. Deep Security Manager Event handling Event log Rule: Severity level=Crical 00:00:01 00:00:10 00:00:20 00:00:30 00:00:40 00:00:50 00:01:00 01Apr20 01Apr20 01Apr20 01Apr20 01Apr20 01Apr20 01Apr20 EventA EventB EventC EventD EventE EventF EventG Medium Medium Critical Low Low Medium Low Deep Security Agent The Open Source Security (OSSEC) Log Inspection Engine is integrated into Deep Security and gives you the ability to inspect the logs and events generated by the operating systems and applications running on the computers. The Log Inspection module is equipped with a default decoder provided by Trend Micro, but it is possible to load custom versions, as well as create custom Log Inspections rules using the OSSEC standard. Open Source Security is an open source agent-based security software package owned by Trend Micro and forms the Log Inspection module of Deep Security and is integrated into every Deep Security Agent. © 2020 Trend Micro Inc. Education 305 Lesson 14: Inspecting Logs on Protected Servers This module takes elements of both the OSSEC server and client and combines it into an efficient log parser with categorization and correlation capabilities. This allows the Deep Security Agent to filter the logs before transmission to Deep Security Manager or output using Syslog. This different from Open Source Security where the raw log stream is sent to the server. Log Inspection rules can be assigned directly to computers through policy or directly to a computer. Like Integrity Monitoring events, Log Inspection events can be configured to generate alerts in Deep Security Manager. Log Inspection requires running some analysis on the computer and is not supported in Agentless deployments. Deep Security Manager collects Log Inspection Events from Deep Security Agents at every heartbeat. The data from the logs is used to populate the various reports, graphs, and charts in Deep Security Manager. Enabling Log Inspection Enabling Log Inspection in Deep Security typically involves the following steps: 1 Turning on Log Inspection in a policy or on a computer 2 Applying the Log Inspection rules that make sense for your purposes to a policy or to a computer Turning on Log Inspection You can enable the Log Inspection Protection Module in the settings for policies or a computer. Turning on Log Inspection in a Policy Log Inspection protection can be assigned to policies at any level in the hierarchy. Any sub policies with inheritance enabled will be assigned the Log Inspection protection settings. 306 © 2020 Trend Micro Inc. Education Lesson 14: Inspecting Logs on Protected Servers To do this in a policy, click the Policies menu and double-click the policy to which you’d like to assign protection. Click the Log Inspection Protection Module in the left-hand frame and from the General tab, set the State to On or Inherited (On) and click Save. Turning on Log Inspection on a Computer To set Log Inspection protection on a computer, click the Computers menu. Locate and doubleclick a computer in the list to open its Details. In the left-hand pane, click the Log Inspection Protection Module and on the General tab set the Log Inspection Configuration to On and click Save. © 2020 Trend Micro Inc. Education 307 Lesson 14: Inspecting Logs on Protected Servers Turning the module on at the computer level will override the inheritance of settings from the policy. Applying Log Inspection Rules Deep Security ships with many pre-defined rules covering a wide variety of operating systems and applications. Under the Policies or Computers menu, click Log Inspection. On the General tab, the Assigned Log Inspection Rules section displays the rules that are in effect for this policy or computer. To add or remove Log Inspection rules, click Assign/Unassign. This will display a window showing all available Log Inspection rules, from which you can select or de-select rules. Running a Recommendation Scan For Log Inspection Run a Recommendation Scan on the server to get suggestions about Log Inspection rules which would be appropriate to implement on this computer. To do this, locate and double-click a supported computer in the Computers list and click the Log Inspection Protection Module in the left-hand frame. On the General tab, click Scan for Recommendations. 308 © 2020 Trend Micro Inc. Education Lesson 14: Inspecting Logs on Protected Servers Some Log Inspection rules written by Trend Micro require local configuration to function properly. If you assign one of these rules to your computers or one of these rules gets assigned automatically, an alert will be raised to notify you that configuration is required. Best Practice: When improperly set, events for this feature can overwhelm the Deep Security database if too many log entries are triggered and stored. Rules should only be set to gather security events relevant to your requirements. As with Recommendation Scans for other protection modules, you can have Deep Security implement the recommended rules automatically. You can also select and manually assign rules. © 2020 Trend Micro Inc. Education 309 Lesson 14: Inspecting Logs on Protected Servers Select the Recommended for Assignment list to view the rules that were suggested to implement based on the applications on the server. Only enable the rules that make sense for your requirements. 310 © 2020 Trend Micro Inc. Education Lesson 14: Inspecting Logs on Protected Servers Creating Log inspection Rules Although Deep Security ships with Log Inspection rules for many common operating systems and applications, you also have the option to create your own custom rules. To create a custom rule, you can either use the Basic Rule template, or you can write your new rule using XML. Viewing Log Inspection-Related Events Deep Security Agents monitor the application and operating system logs defined by Log Inspection Rules. Once an event with the relevant severity level is detected, the Deep Security Agent copies the event, and then uploads it to Deep Security Manager. Upon receipt of the log information, Deep Security Manager normalizes the information in the log using a decoder specifically designed for the log format sent. Deep Security Manager stores the event in the database and displays it in the Deep Security Manager © 2020 Trend Micro Inc. Education 311 Lesson 14: Inspecting Logs on Protected Servers System Events Log Inspection event for the entire system can be viewed under Events & Reports > Log Inspection Events. Computer Events Events can also be viewed for a specific computer, by clicking the Log Inspection Events tab from the computer Details. 312 © 2020 Trend Micro Inc. Education Lesson 14: Inspecting Logs on Protected Servers Monitoring Windows Events Log Inspection rules that monitor various Windows-related logs will cause Deep Security Agents to monitor logs that are normally viewed through the Windows Event Viewer. If a relevant rule is applied, Deep Security Agents can monitor this log and read Events that are being written to it. © 2020 Trend Micro Inc. Education 313 Lesson 14: Inspecting Logs on Protected Servers The same event below appears in Windows Event Viewer and in Deep Security: The Windows Event log record was generated when the Audit Log was cleared. Since the computer where the event occurred had a suitably configured Deep Security Agent, the Log Inspection module was able to obtain a copy of the event, generating the Deep Security Log Inspection Event displayed on the right. Note: 314 Log inspection can only read new events. This inspection feature cannot be set to retrieve a specific range of logs. © 2020 Trend Micro Inc. Education Lesson 14: Inspecting Logs on Protected Servers Review Questions 1 How can the Log Inspection protection module help identify important events in application logs on your protected servers? 2 You would like to inspect the log files on an existing SQL Server to help troubleshoot an issue that has been occurring over the last few weeks. You install and activate a Deep Security Agent on this server and enable Log Inspection with the appropriate rules. You notice that only new events are being retrieved? Why? © 2020 Trend Micro Inc. Education 315 Lesson 14: Inspecting Logs on Protected Servers 316 © 2020 Trend Micro Inc. Education Lesson 15: Events and Alerts Lesson Objectives: After completing this lesson, participants will be able to: • • • • Forward events to external storage Configure alerts Tag events Filter data and create reports Event Forwarding Deep Security integrates with third-party logging and event storage devices This can be used to configure dedicated log collection devices or applications (such as ArcSight and Splunk) for long log retention or large numbers of events. You can configure Deep Security Manager to instruct all managed computers to send logs to a SIEM, Amazon Simple Notification Service or SNMP computers. © 2020 Trend Micro Inc. Education 317 Lesson 15: Events and Alerts Security Information and Event Management Server If a customer has a large environment and requires log retention for a period longer than 3 months, it is recommended they rely on Security Information and Event Management (SIEM) for event storage instead of the Deep Security Database. One very important design consideration is that syslog output can be sent directly from Deep Security Agents. If the Agents are located on different network segments, network and firewall restrictions must be configured to allow connectivity to the SIEM server. If you select the Direct Forward option on the SIEM tab for a computer, you cannot select Log Event Extended Format 2.0 as the Syslog Format. Deep Security will only send events in LEEF format through Deep Security Manager. Deep Security has been tested with the Enterprise version of these products: • • • Splunk 6.5.1 IBM QRadar 7.2.8 Patch 3 HP ArcSight 7.2.2 The configuration for syslog to the SIEM is configured as a common object under the Policies menu. Amazon Simple Notification Service If you have an AWS account, you can take advantage of the Amazon Simple Notification Service (SNS) to publish notifications about Deep Security events and deliver them to subscribers. On the Event Forwarding tab, provide the details of the AWS account and select the type of events to publish. 318 © 2020 Trend Micro Inc. Education Lesson 15: Events and Alerts SNMP Deep Security supports SNMP for forwarding system events to a computer from Deep Security Manager. On Windows, the MIB file is located at: ..\Trend Micro\Deep Security Manager\util\DeepSecurity.mib On Linux, the default location is: /opt/dsm/util Web Services API To assist in deployment and integration into customer and partner environments, Deep Security includes a REST Web Service APIs. This allows for easy, language-neutral methods to externally access data and program configurations. If a customer wants to pull Deep Security events into their SIEM product but don’t have syslog servers available in all required network segments, the recommended alternative is to pull the events directly from Deep Security Manager using the Web Services APIs. When using Web Services, events will not be collected in real-time, but a heartbeat between the Deep Security Manager and Agent or Appliance will need to occur before the events appear in the Deep Security Manager. Note: Web Services API documents and samples are available on the Deep Security Automation Center web site at the following URL: https://automation.deepsecurity.trendmicro.com Alerts Alerts are generated when Deep Security requires your attention, such as an administrator-issued command failing, or a hard disk running out of space. Deep Security includes a pre-defined set of alerts. Additionally, when you create Protection Module rules, you can configure them to generate alerts if they are triggered. There are several ways to see which alerts have been triggered: • • • • They're displayed in the Alert Status dashboard widget in Deep Security Manager. They're displayed on the Alerts page in Deep Security Manager You can get an email notification when an alert is triggered You can generate alert reports Unlike security events and system events, alerts are not purged from the database after a period of time. Alerts remain until they are dismissed, either manually or automatically. © 2020 Trend Micro Inc. Education 319 Lesson 15: Events and Alerts Viewing Alerts in the Deep Security Manager Web Console The Alerts page in Deep Security Manager displays all alerts that have been triggered, but not yet responded to. You can display alerts in a summary view that groups similar alerts together, or in list view, which lists all alerts individually. To switch between the two views, use the menu next to Alerts in the page's title. You can also sort the alerts by time or by severity. In summary view, expanding an Alert panel (by clicking Show Details) displays all the computers (or users) that have generated that particular alert. Clicking the computer will display the computer's Details window. If an alert applies to more than five computers, an ellipsis ("...") appears after the fifth computer. Clicking the ellipsis displays the full list. Once you have taken the appropriate action to deal with an alert, you can dismiss the alert by selecting the check box next to the target of the alert and clicking Dismiss. (In list view, right-click the alert to see the list of options in the context menu.) Alerts that can't be dismissed (like Relay Update Service Not Available) will be dismissed automatically when the condition no longer exists. Note: In cases where an alert condition occurs more than once on the same computer, the alert will show the timestamp of the first occurrence of the condition. If the alert is dismissed and the condition reoccurs, the timestamp of the first re-occurrence will be displayed. Use the Computers filtering bar to view only alerts for computers in a particular computer group, with a particular policy, etc. 320 © 2020 Trend Micro Inc. Education Lesson 15: Events and Alerts Configure Alert Settings To configure the settings for individual alerts, go to the Alerts page in Deep Security Manager and click Configure Alerts. This displays a list of all alerts. A green check mark next to an alert indicates that it is enabled. An alert will be triggered if the corresponding situation occurs, and it will appear in the Deep Security Manager. © 2020 Trend Micro Inc. Education 321 Lesson 15: Events and Alerts You can select an alert and click Properties to change other settings for the alert, such as the severity level and email notification settings. Email Notifications For Alerts Deep Security Manager can send emails to specific users when selected alerts are triggered. In the Deep Security Manager Web console, provide the details the SMTP mail server. 322 © 2020 Trend Micro Inc. Education Lesson 15: Events and Alerts In the Alert Information details, specify which alerts cause email notifications to be sent. For example, you can send email only for the most critical alerts. Most alerts send email notifications by default. Specify which administrators will receive email notifications by configuring their user account. With this option, email is sent regardless of the configuration of the user accounts. Click Administration > Users to configure the administrators to receive the alerts. © 2020 Trend Micro Inc. Education 323 Lesson 15: Events and Alerts Event Tagging Deep Security enables you to create tags that you can use to identify and sort events. For example, you might use tags to separate events that are benign from those that require further investigation. You can use tags to create customized dashboards and reports. Although you can use event tagging for a variety of purposes, it was designed to ease the burden of event management. After you have analyzed an event and determined that it is benign, you can look through the event logs of the computer (and any other similarly configured and tasked computers) to find similar events and apply the same label to them, eliminating the need to analyze each event individually. In Deep Security, a tag is an additional attribute that can be applied to a Deep Security Event and can be used for all Deep Security Events, however, an additional type of tagging based on a Trusted Source, is only available for Integrity Monitoring. Tags can be used as sorting criteria just like any other Event properties. You can use them to create customized dashboards and reports. You can use tags to control analysis workflow by hiding already analyzed Events or identifying Events that require further analysis. Note: Tags do not alter the data in the Events themselves, nor do they allow users to delete Events. They are simply extra attributes provided by Deep Security Manager. A typical use of tagging is to distinguish between Events that have been investigated and found to be benign and those that require action. Events can be manually tagged on an ad-hoc basis, or they can be automatically tagged using one of two available auto-tagging systems. Manual Tagging You can manually apply tags to Events by right-clicking the Event and then clicking Add Tag(s). To manually tag this event only, click Selected Integrity Monitoring Event. 324 © 2020 Trend Micro Inc. Education Lesson 15: Events and Alerts The tag is applied to this instance of the Event only. Standard Auto-Tagging Standard Auto-Tagging uses an existing Event as the model for auto-tagging existing and/or future Events on the current or any other computers. The parameters for similarity are defined by selecting which Event attributes have to match the model Event attributes for a tag to be applied. To use auto-tagging, right-click the Event, click Add Tag(s) then click Apply to selected and similar Integrity Monitoring Event. © 2020 Trend Micro Inc. Education 325 Lesson 15: Events and Alerts Identify the computers to which the auto-tags may apply. Select the criteria for the automatic tagging. Auto-tagging can be applied to all existing and future events, or only future events. Optionally, save the tag details. 326 © 2020 Trend Micro Inc. Education Lesson 15: Events and Alerts The Event list is refreshed with the tags matching the selected criteria. Trusted Source Auto-Tagging Trusted Source Auto-Tagging applies tabs automatically to Events based on their similarity to knowngood Events that occur on a trusted computer. Trusted Source Event Tagging is designed to reduce the number of Events that need to be analyzed by automatically identifying Events associated with authorized changes. In addition to auto-tagging similar Events, the Integrity Monitoring module allows you to tag Events based on their similarity to Events and data found on trusted sources. A trusted source can be either a Local Trusted Computer, the Trend Micro Certified Safe Software Service, or a Trusted Common Baseline. © 2020 Trend Micro Inc. Education 327 Lesson 15: Events and Alerts Local Trusted Computer A Local Trusted Computer is a computer that will be used as a model computer that you know will only generate benign or harmless Events. A target computer is a computer that you are monitoring for unauthorized or unexpected changes. The auto-tagging rule examines Events on target computers and compares them to Events from the trusted computer. If any Events match, they are tagged with the tag defined in the autotagging rule. You can establish auto-tagging rules that compare Events on protected computers to Events on a Trusted Computer. For example, a planned roll-out of a patch can be applied to the Trusted Computer. The Events associated with the application of the patch can be tagged as Patch X. Similar Events raised on other systems can be auto-tagged and identified as acceptable changes and filtered out to reduce the number of Events that need to be evaluated. Integrity Monitoring Events contain information about transitions from one state to another. When comparing Events, the auto-tagging engine will look for matching before and after states; if the two Events share the same before and after states, the Events are judged to be a match and a tag is applied to the second Event. 328 © 2020 Trend Micro Inc. Education Lesson 15: Events and Alerts Trusted Source Events Trusted Computer Trusted Computer Trusted Computer Initial state First changed state Second changed state Generate baseline (Run IM rules and generate data) Scheduled or Real-Time scan (Run IM rules and generate data) Scheduled or Real-Time scan (Run IM rules and generate data) Data Data Data becomes the Trusted Computer Baseline Compare data with Trusted Computer Baseline Differences between data and Baseline become Trusted Source Events Data Differences between data and Baseline are added to Trusted Source Events Compare data with Trusted Computer Baseline Trusted Computer Baseline updated with new data Trusted Computer Baseline updated with new data Trusted Computer Baseline When using a Local Trusted Computer for Trusted-Source-Based Event Tagging, the Events being tagged are Events generated by Deep Security Integrity Monitoring rules. This means that the Integrity Monitoring rules that are generating Events on the target computer must also be running on the Local Trusted Source computer. Utilities which regularly make modifications to the content of files on a system (prelinking on Linux, for example) can interfere with Trusted-Source Auto-Tagging. Trend Micro Certified Safe Software Service The Certified Safe Software Service is a list of known-good file signatures maintained by Trend Micro. This type of Trusted Source tagging will monitor target computers for file-related Integrity Monitoring Events. When an Event has been recorded, the file's signature (after the change) is compared to Trend Micro's list of known good file signatures. If a match is found, the Event is tagged. © 2020 Trend Micro Inc. Education 329 Lesson 15: Events and Alerts Trusted Common Baseline The Trusted Common Baseline method compares Events within a group of computers. A group of computers is identified and a common baseline is generated based on the files and system states targeted by the Integrity Monitoring rules in effect on the computers in the group. When an Integrity Monitoring Event occurs on a computer within the group, the signature of the file after the change is compared to the common baseline. If the file's new signature has a match elsewhere in the common baseline, a tag is applied to the Event. Note: In the Trusted Computer method, the before and after states of an Integrity Monitoring Event are compared, but in the Trusted Common Baseline method, only the after state is compared. This method relies on all the computers in the common group being secure and free of malware. A full Anti-Malware scan should be run on all the computers in the group before the common baseline is generated. When an Integrity Monitoring baseline is generated for a computer, Deep Security will first check if that computer is part of a Trusted Common Baseline group. If it is, it will include the computer's baseline data in the Trusted Common Baseline for that group; the Trusted Common Baseline Auto-Tagging Rule must be in place before any Integrity Monitoring rules have been applied to the computers in the common baseline group. 330 © 2020 Trend Micro Inc. Education Lesson 15: Events and Alerts Reporting Event information can published in a report. Deep Security Manager produces reports in PDF, RTF and in the case of certain reports, XLS formats. Most of the reports have configurable parameters such as date range or reporting by computer group. Deep Security uses the JasperReports open source reporting library and includes a collection of built-in reports. If changes or additional reports are required, please send a request to Trend Micro Support. © 2020 Trend Micro Inc. Education 331 Lesson 15: Events and Alerts The Deep Security reports are available from the Events and Reports menu. Depending on which protection modules are used, different reports will be available in the Report list 332 • • • • • Alert Report: List of the most common alerts • • • Firewall Report: Record of Firewall Rule and Stateful Configuration activity • • • • • • • Integrity Monitoring Detailed Change Report: Details about the changes detected • • • • Security Module Usage Report: Current computer usage of protection modules Anti-Malware Report: List of the top 25 infected computers Attack Report: Summary table with analysis activity, divided by mode Computer Report: Summary of each computer listed on the Computers tab DPI Rule Recommendation Report: Intrusion Prevention rule recommendations. This report can be run for only one security policy or computer at a time Forensic Computer Audit Report: Configuration of an Agent on a computer Integrity Monitoring Baseline Report: Baseline of the host(s) at a particular time, showing Type, Key, and Fingerprinted Date. Integrity Monitoring Report: Summary of the changes detected Intrusion Prevention Report: Record of Intrusion Prevention rule activity Log Inspection Detailed Report: Details of log data that has been collected Log Inspection Report: Summary of log data that has been collected Recommendation Report: Record of recommendation scan activity Security Module Usage Cumulative Report: Current computer usage of protection modules, including a cumulative total and the total in blocks of 100 Summary Report: Consolidated summary of Deep Security activity Suspicious Application Activity Report: Information about suspected malicious activity System Event Report: Record of system (non-security) activity © 2020 Trend Micro Inc. Education Lesson 15: Events and Alerts • • • System Report: Overview of Computers, Contacts, and Users User and Contact Report: Content and activity detail for Users and Contacts Web Reputation Report: List of computers with the most web reputation events Any of these reports can also be set up to run automatically on a regular basis from the Recurring Reports tab. These reports are simply scheduled tasks that periodically generate and distribute reports to any number of users and contacts. Most of the options are identical to those for single reports. Filtering Report Data After selecting the desired report use the options to filter the report data. Filtering by Tag Deep Security enables you to create tags that you can use to identify and sort events. For example, you might use tags to separate events that are benign from those that require further investigation. You can use tags to create customized dashboards and reports. Although you can use event tagging for a variety of purposes, it was designed to ease the burden of event management. After you have analyzed an event and determined that it is benign, you can look through the event logs of the computer (and any other similarly configured and tasked computers) to find similar events and apply the same label to them, eliminating the need to analyze each event individually. © 2020 Trend Micro Inc. Education 333 Lesson 15: Events and Alerts Filtering by Date and Time You can set a date and time filter for any period for which records exist. This is useful for security audits. Time filter options include: • Last 24 Hours: Includes events from the past 24 hours, starting and ending at the top of the hour. For example if you generate a report on December 5th at 10:14am, you will get a report for events that occurred between December 4th at 10:00am and December 5th at 10:00am. • Last 7 Days: Includes events from the past week. Weeks start and end at midnight (00:00). For example if you generate a report on December 5th at 10:14am, you will get a report for events that occurred between November 28th at 0:00am and December 5th at 0:00am. • Previous Month: Includes events from the last full calendar month, starting and ending at midnight (00:00). For example, if you select this option on November 15, you will receive a report for events that occurred between midnight October 1 to midnight November 1. • Custom Range: Enables you to specify your own date and time range for the report. In the report, the start time may be changed to midnight if the start date is more than two days ago. Reports use data stored in counters which aggregated periodically from Events. Counter data is aggregated on an hourly basis for the most recent three days. Data from the current hour is not included in reports. Data older than three days is stored in counters that are aggregated on a daily basis. For this reason, the time period covered by reports for the last three days can be specified at an hourly level, but beyond three days, the time period can only be specified on a daily level. Filtering by Computer Another option for filtering the report data is to identify the computers whose data will be included in the report. • • • • • • Note: 334 All Computers: Include data for every computer listed in Deep Security Manager. My Computers: Include data only for the computers for which you have access rights to. In Group: Include data for computers in a Deep Security group. In Smart Folder: Include data for computers in a Smart Folder. Using Policy: Include data for computers using a specific protection policy. Computer: Include data for a single computer. To save time when generating a report on specific computers from multiple computer groups, create a user who has viewing rights only to the computers you require and then either create a Scheduled Task to regularly generate an All Computers report for that user or sign in as that user and run an My Computers report. Only the computers to which that user has viewing rights will be included in the report. © 2020 Trend Micro Inc. Education Lesson 15: Events and Alerts Encrypting Reports Reports can be protected with the password of the currently signed-in user or with a new password that is specific to this report. • • Disable Report Password: Report is not password protected. • Use Custom Report Password: Create a one-time-only password for this report. Use Current User's Report Password: Use the current User's PDF report password. To view or modify the User's PDF report password, go to Administration > User Management > Users > Properties > Settings > Reports. © 2020 Trend Micro Inc. Education 335 Lesson 15: Events and Alerts Review Questions 1 What methods are available for forwarding event details from Deep Security? 2 How do you identify which administrators receive email notifications of Alerts being triggered in Deep Security? 3 Describe the purpose of event tagging? 336 © 2020 Trend Micro Inc. Education Lesson 16: Protecting Containers Lesson Objectives: After completing this lesson, participants will be able to: • • Describe the components required to run containers Describe how Deep Security can protect components of the container environment Infrastructure changes in the datacenter are prompting organization to re-evalute how applications are developed and deployed. In many organizations, monolithic applications that are difficult to deploy and are tied to a specific piece of hardware are being re-engineered into smaller microservices that are easier to deploy and update and are also operating system agnostic. Continuous Integration/Continuous Deployment Continuous Integration and Continuous Delivery (CI/CD) comprises a set of operating principles and practices that enable a development teams to deliver product changes on a more frequent basis, with a higher level of quality and reliability. In the context of cybersecurity, the CI/CD practices will be put in place as part of the software development process. Continuous Integration practices encourage development teams to implement small changes and check the code into version control repositories frequently. Automated mechanisms are integrated into the process to build, package, and test the applications. Defects and other software quality issues are easier to identify on smaller code differentials developed over shorter period of time. Since commit cycles are shorter, it is less likely for multiple developers to be editing the same code which resulting in fewer merges to be performed when committing the code. With consistent integration processes in place, teams are likely to commit code changes more frequently, which leads to better collaboration and software quality. Continuous Delivery picks up where continuous integration ends, automating the delivery of applications to selected infrastructure environments. Continuous Delivery provides automation to push code changes to testing and production systems along with any necessary service calls to web servers, databases, and other services that may need to be restarted or follow other procedures when applications are deployed. Continuous integration and delivery requires continuous testing, usually implemented as a set of automated regression, performance, and other tests that are executed in the CI/CD pipeline, as the goal of the process is to deliver quality applications and code to users. In the context of security, finding issues earlier in the CI/CD pipeline allows developers to discover and remedy the situation earlier. This helps reduce the cost and risk of fixing vulnerabilities after the applications are in production. © 2020 Trend Micro Inc. Education 337 Lesson 16: Protecting Containers DevOps The concept of DevOps is founded on building a culture of collaboration between the development and operation teams that historically functioned in relative silos. The traditional software development process had those who write the code and those who deploy and support that code organizationally separate. The Development and Operations teams had separate responsibilities, and sometimes competing objectives. These teams had different management structures with different performance indicators by which they were judged. In many cases they were physically separated, in different locations. Development Responsibilities Operations Responsibilities Product Infrastructure Design Management Development Server operation Delivery Tools Create new features Maintenance Keep applications running without downtime The fact that separate groups had different responsibilities made CI/CD difficult and prevented organization from taking advantage of the speed and quality benefits of the process. The movement towards a DevOps model allows organizations to improve collaboration between the teams, release products faster with improved quality and security and increased customer satisfaction. With both teams working together, security considerations, which were traditional the domain of the Operation team, can be incorporated into earlier phases of the cycle. Software Development Using Containers Many organizations are implementing CI/CD practices into their software development process through the use of containers. A container is a standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another. This lightweight, standalone, executable package of software includes everything needed to run an application: code, runtime, system tools, system libraries and settings. Containerized software will always run the same, regardless of the infrastructure as it isolates software from its environment. Containers package software into standardized units for development, shipment and deployment. 338 © 2020 Trend Micro Inc. Education Lesson 16: Protecting Containers Containers remove some of the challenges associated with the typical application development methodology. The benefits of using containers are numerous, including: • Containers are lightweight: Containers are abstracted from the operating system and leverage and share the host kernel. Sharing OS resources, such as libraries, significantly reduces the need to reproduce the operating system code, allowing a server to run multiple workloads with a single operating system installation. • Containers are very flexible: Most applications can be containerized, allowing existing applications to be ported, in addition to new development projects. • Containers are interchangeable: Containerized applications are easy to update and upgrade. You can replace one or all containers in a very short amount of time. • Containers are portable: Applications can be developed locally but deployed anywhere regardless of the host operating system. This removes the complexity of having to code for different operating systems and having multiple versions of an application. • Containers are scalable: Applications that are developed for containers can be replicated and distributed easily. New containers can be spun up or removed as necessary to address scaling requirements. • Containers are stackable: Applications that are developed for containers can be added on to (or stacked). With containers, applications can be updated easily by replacing targeted parts of the application without having to re-install or upgrade the entire application. In some ways, containers behave like a virtual machine. Unlike a virtual machine, containers don't need to replicate an entire operating system, only the individual components they need in order to operate. This gives a significant performance boost and reduces the size of the application. They also operate much faster, as unlike traditional virtualization the process is essentially running natively on its host, just with an additional layer of protection around it. Virtual Machine Virtual Machine Virtual Machine App A App B App C Bins/Libs Bins/Libs Bins/Libs Guest OS Guest OS Guest OS Container Container Container App A App B App C Bins/Libs Bins/Libs Bins/Libs Hypervisor Docker Engine Host Operang System Operang System Infrastructure Infrastructure Virtual Machines Containers © 2020 Trend Micro Inc. Education 339 Lesson 16: Protecting Containers Concepts and Terminology To understand how Deep Security can help secure container deployments in the datacenter, it helps to understand some of the concepts and terminology that relate to the technology. Image An image is the package that contains everything that is needed to run an application. It includes the code, the runtime libraries, environment variables, configuration files, etc. Images are built by developers and then run as-is everywhere without the need to be modified. Repository A repository is a collection of images. When images are put in to a repository they are often tagged with information or a version. The repository stores the different version of the images. Tags Images in a repository are identified by a numeric image ID and as a result it can be difficult for an administrator to identify what the image refers to. Tags are a way of providing useful information about an image. Tags provide aliases to the images in a repository. Registry A registry is a storage and content delivery system for container images. This is where the containers are typically stored when built and where they retrieved from when being deployed. Container A container is a runtime instance of an image. It is what the image becomes in memory when executed. Images are pulled from the registry and run. When images are running, they are called containers. A container is similar to a virtual machine but does not contain the host operating system. Docker Docker is a platform for developers and sysadmins to develop, deploy, and run applications with containers. The Docker platform allows for the abstraction of the running application from the host OS, meaning you can develop once and run anywhere. Docker allows you to connect to a registry and pull the images down the local machine. Docker then instantiates the image and starts a running container. Docker can run multiple containers with multiple applications but the idea is that the container is a self-contained piece of functionality. In a virtualization environment, the operating system is includes as part of the virtual machine. With 340 © 2020 Trend Micro Inc. Education Lesson 16: Protecting Containers containers, it's Docker that helps to abstract this layer. As such, Docker runs on the host and allows for use of the containers. Docker is similar to the ESXi server for VMware. Note: Once images are running, they are called containers. Kubernetes Kubernetes is a open-source platform for managing containerized workloads and services. Imagine having tens, hundreds, or even thousands of containers that perform various tasks. Kubernetes provides a platform to help in the automating, deployment, scaling and operations of containerized applications. Kubernetes is the management plane for managing container workloads running on Docker. Container Container Container App A App B App C Bins/Libs Bins/Libs Bins/Libs Kubernetes Docker Engine Operang System Infrastructure The term Kubernetes is sometimes used as shorthand to describe the entire container environment, however, Docker and Kubernetes are different and perform different functions. • • Docker is a platform and tool for building, distributing, and running Docker containers. Kubernetes is a container orchestration system for Docker containers that is meant to coordinate clusters of nodes at scale in production in an efficient manner. Kubernetes and Docker are both fundamentally different technologies but they work very well together, and both facilitate the management and deployment of containers in a distributed architecture. Kubernetes is similar to vCenter with VMware. Docker Swarm is another orchestration environment for containers. © 2020 Trend Micro Inc. Education 341 Lesson 16: Protecting Containers Pods Kubernetes uses pods to define what the application looks like. A pod consists of one or more containers that are guaranteed to be co-located on the host machine and can share resources, but also provides other information such as networking and security. Pod Container Container Container App A App B App C Bins/Libs Bins/Libs Bins/Libs Kubernetes Docker Engine Operang System Infrastructure Helm Helm is a tool that streamlines installing and managing Kubernetes applications and uses charts as its packaging format. Chart A chart is a collection of files that describe a related set of Kubernetes resources. A single chart might be used to deploy something simple, or something complex, like a full web app stack with HTTP servers, databases, caches, and so on. Charts are created as files laid out in a particular directory tree, then they can be packaged into versioned archives to be deployed. Helm and charts are a common method to deploy Kubernetes applications. Container Development Process Continuous Integration/Continuous Deployment (or CI/CD) methodologies can be used as part of the development of applications housing containers. Development 342 Commit Build © 2020 Trend Micro Inc. Education Store Deploy Lesson 16: Protecting Containers 1 Software developers write the code that will eventually become the application executed by end users. 2 Once the code is complete, developers check the code in and commit it to a source repository such as Github, Bitbucket or SVN. 3 Once checked in, an automated process is launched using Jenkins or a similar automation platform to build an image from the software code. 4 In the case of containers, another automated process is triggered to tag the image and push it to the registry. 5 Once in the registry, a final automated process will launched to deploy the image to production as a running container (or set of containers). This can be repeated for multiple parts of the application, resulting in multiple container images for a given application. When the application is ready to be pushed to production, a helm chart is created to describe what the application looks like and how it will be deployed. The application can then be deployed using the helm chart in a quick and easy manner. The application is now running and can be accessed and executed by end users. This process repeats continually as developers create and updated code and check it in, ultimately building, pushing and deploying new containers to production. Applications can be developed with no system dependencies, updates can be pushed to any part of a distributed application and resource density can be optimized. Protecting Containers With Deep Security The benefits of a Docker deployment are real, but so is the concern about the significant attack surface of the Docker host's operating system (OS) itself. Like any well-designed software deployment, OS hardening and the use of best practices for your deployment provide a solid foundation as a starting point. Once you have a secure foundation in place, adding Deep Security to your deployment gives you access to Trend Micro’s extensive experience protecting physical, virtual, and cloud workloads as well as to real-time threat information from the Trend Micro Smart Protection Network. Deep Security provides full lifecycle protection for your deployment. Build Pipeline Development Commit Runme Build © 2020 Trend Micro Inc. Education Store Deploy 343 Lesson 16: Protecting Containers Protecting the Software Build Pipeline Deep Security also ensures security throughout the container lifecycle with advanced pre-runtime image scanning, that can be integrated in the CI/CD pipeline. Deep Security provides pre-runtime scanning and detection on images in the registry for: • • • • Vulnerabilities across all packages and layers in the image • Compliance using pre-made or custom compliance policies through OpenSCAP scanning on Red Hat images Malware using signature matching and machine-learning powered techniques Embedded secrets including passwords, private keys, and license keys Indicators of Compromise (IoC) using Yara rules to create custom queries for any string, including suspicious hash values Many security issues get introduced in the software build pipeline using outdated public containers with potentially vulnerable and outdated packages installed within them. No release of public images, even if they are up to date, is completely void of vulnerabilities. While developers can create containers from scratch, many containers are built with old base images and outdated dependencies. Deep Security provides continuous scanning of registry images, with default registry scanning every 24 hours (user configurable) using the latest intelligence from Trend Micro Research. Images that were scanned and were determined clean when they first reach the registry may contain vulnerabilities that have yet to be disclosed. Using Trend Micro's latest threat intelligence and Deep Security's continued registry scanning, images will be scanned regularly for new and emerging vulnerabilities. After the image is scanned in the registry, the scan results (such as number of malware, severity of malware or number of vulnerabilities and severity) can be used to decide whether a particular image should be promoted to an approved repository. Deep Security Smart Check When containers are used, Deep Security Smart Check provides a valuable step in the CI/CD pipeline. Software projects can be automatically built, tested, and pushed to the registry. Once pushed, the image may be instantly available to run in an orchestration environment. If malware or vulnerabilities exist in the image, then they become a risk when the image is run. Since images are intended to be immutable, the right time to scan the image is when it’s first pushed to the registry and before it becomes a running container. Deep Security Smart Check is a container image scanner from Trend Micro. It performs preruntime scans of Docker images to detect OS vulnerabilities and malware, enabling you to fix issues before they reach the orchestration environment (for example, Kubernetes). 344 © 2020 Trend Micro Inc. Education Lesson 16: Protecting Containers Development Commit Build Store Deploy Deep Security Smart Check Deep Security Smart Check can scan Docker images in any registry that implements the Docker Registry V2 API. Deep Security Smart Check provides the ability to: • • • • • Detect OS-level and application-level vulnerabilities Detect malware Detect secrets and keys embedded in your applications Perform custom scan queries to find suspicious or unwanted files Verify compliance against checklists, such as PCI, HIPPA and NIST All Deep Security Smart Check operations are available through a documented collection of APIs to simplify integration into your CI/CD pipeline. Deep Security Smart Check APIs can be invoked automatically by your CI/CD system to start scans when an image is pushed to a Docker registry. Scan results are also available through the API. The Smart Check API includes a facility that allows CI/CD components to register to receive notifications of scan events, including scan-completed, allowing you to automate workflows. For example, a Docker image signing service could register to receive scan results and then use those results to decide whether a particular image should be digitally signed and promoted to a repository that is available to your orchestration environment. You could also forward scan results to a Slack channel or ServiceNow account. © 2020 Trend Micro Inc. Education 345 Lesson 16: Protecting Containers Deep Security Smart Check also includes an administrator console that provides: • • • • • A dashboard (system-wide summary of scan information, including metrics) User management Registry configuration Access to scan results Scan history The Dashboard provides a summary of the scans completed: 346 • Malware • Content Findings your applications • Vulnerabilities : This item displays the number of vulnerabilities detected during the scans, broken down into High, Medium, Low and Negligible priority • Checklists : This item displays the total incidents of malware detected during the scans : This item displays the number of secrets and keys embedded in : This item displays findings against compliance checklists © 2020 Trend Micro Inc. Education Lesson 16: Protecting Containers Click a link in the Registries section to view the details of the findings for that Registry. Deep Security Smart Check supports the scanning of Docker images in any registry that supports the Docker Registry V2 API and allows catalog listing. Tested registries include: • • • • • • Docker Trusted Registry (DTR) Google Container Registry (GCR) Amazon Elastic Container Registry (ECR) VMware Harbor Nexus Quay To integrate Deep Security Smart Check into your pipeline, you will need to write integration logic to trigger scanning based on the event model of your registry. For example, Google Container Registry uses a pub/sub model to publish events about registry activity and Docker Trusted Registry uses a Webhook model. Protecting the Host at Runtime Once images are approved and pushed to the registry, they are then allowed to be instantiated in to running containers. These containers can be run on a host with Docker and, optionally, Kubernetes as the orchestration layer. In this environment, all the running containers in a container stack share the same kernel and OS. If the host is compromised If the host is compromised, all the containers on the node are at risk. Deep Security supports full policy protection for your Docker hosts. This is important because threats can also be introduced into an organization through the container platform. © 2020 Trend Micro Inc. Education 347 Lesson 16: Protecting Containers Deep Security protects your Docker hosts and containers running on Linux distributions. Deep Security can do the following: Note: • • Find and identify Docker hosts within your deployment • Provide real-time anti-malware detection for the file systems used on Docker hosts and within the containers • Deep Security asserts the integrity of the Docker and Kubernetes hosts for continuous compliance and to protect your deployment using the following techniques: Shield Docker hosts and containers from vulnerabilities to protect them against known and zero-day exploits by virtually patching new found vulnerabilities - Prevent the unauthorized execution of applications on Docker hosts by helping you control which applications are allowed to run in addition to the Docker daemon - Monitor Docker and Kubernetes hosts for unexpected changes to system files Notify you of suspicious events in your OS logs Deep Security runtime protection for Docker and Kubernetes work at the host system level and this means that the Deep Security Agent has to be installed on the Docker and Kubernetes system and not in the containers. Protecting the Docker Host The following Deep Security modules can be used to protect the Linux server hosting Docker: • • • • • • • 348 Intrusion Prevention (IPS) Anti-Malware Integrity Monitoring Log Inspection Application Control Firewall Web Reputation © 2020 Trend Micro Inc. Education Lesson 16: Protecting Containers Protecting Docker Containers The following Deep Security modules can be used to protect Docker containers: • • Intrusion Prevention Anti-Malware App A App B App C App D Kubernetes Docker Engine Operang System App E An-Malware Intrusion Prevenon An-Malware Web Reputaon Firewall Intrusion Prevenon Integrity Monitoring Log Inspecon Applicaon Control Infrastructure Note: Although Deep Security Intrusion Prevention controls work at the host level, it also protects container traffic on the exposed container port numbers. Since Docker allows multiple applications to run on the same Docker host, a single Intrusion Prevention policy is applied to all Docker applications. This means that recommendation scans can not be relied upon for Docker deployments. Protecting Kubernetes and Docker Container users can benefit from Kubernetes and Docker platform protection at runtime with Intrusion Prevention, Integrity Monitoring and Log Inspection rules using the Deep Security Agent installed on the host. The Deep Security Intrusion Prevention approach allows you to inspect both east-west and north-south traffic between containers and platform layers like Kubernetes. Deep Security monitors changes to key Docker and Kubernetes objects to detect compromised instances, and will detect software changes (upgrades, downgrades, removal), monitor binaries for attribute changes, monitor running processes and detect changes to critical files and permissions in key directories. The Deep Security Agent will also scan ingress/egress container traffic and monitor for attacks as well as file system activity and monitor running processes for malware. © 2020 Trend Micro Inc. Education 349 Lesson 16: Protecting Containers Rules can be enabled in the following Protection Modules to ensure that the environment is safe: • • • Intrusion Prevention Log Inspection Integrity Monitoring App A App B App C App D App E Kubernetes Docker Engine Intrusion Prevenon rules Integrity Monitoring rules Log Inspecon rules Operang System Infrastructure Deep Security inspects traffic and monitor keys objects to detect compromised Dockers and Kubernetes instances. Anomalies in Kubernetes behavior that could signal an attack on the platform could include the following: • • • • • • Software upgrades, downgrades or removal Attribute changes for binaries Modification to running processes Modifications to critical files Modifications to iptable rules Modifications to permissions for key directories Scanning of inter-container traffic is available in Deep Security 20. A policy setting in the Intrusion Prevention Protection Module enables this capability. 350 © 2020 Trend Micro Inc. Education Lesson 16: Protecting Containers Deep Security 20 includes Intrusion Prevention Rules to protect against the following known Kubernetes vulnerabilities: • • • CVE-2018-18264 CVE-2019-1002100 CVE-2018-1002105 © 2020 Trend Micro Inc. Education 351 Lesson 16: Protecting Containers Review Questions 1 Deep Security runtime protection can protect running containers as well as what key components of the container infrastructure? 2 What is the benefit of Deep Security Smart Check in the Continuous Integration/Continuous Deployment (CI/CD) pipeline? 3 What is the difference between an image and a container? 4 What is the difference between Docker and Kubernetes? 5 What Trend Micro product offers pre-runtime scanning of containers? What Trend Micro product offers runtime protection of containers and the container infrastructure. 352 © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations Lesson Objectives: After completing this lesson, participants will be able to: • • • • Use scheduled and event-based tasks to automate Deep Security operations Deploy Deep Security in Amazon Web Services or Azure using a Quick Start Bake the Deep Security Agent into an Amazon Web Services AMI Use the Deep Security REST API to access functionality programmatically Deep Security provides multiple mechanisms for automating, monitoring, and managing security for servers in the data center, as well as mechanisms to speed up the protection of computers and other resources. These mechanisms include: • • • • • Scheduled tasks Event-based tasks Quick-start templates Baking the Deep Security Agent into an Amazon Machine Image Application Programming Interfaces (API) Scheduled Tasks Deep Security has many tasks that you might want to perform automatically on a regular basis. Scheduled tasks are useful to keep your system up to date and functioning smoothly. They are especially useful for running scans on a regular basis during off-peak hours. The following Deep Security tasks are available for scheduling: • Check for Security Updates: Regularly check for security updates and import them into Deep Security when they are available. For most organizations, performing this task once daily is ideal. • Check for Software Updates: Regularly check for Deep Security Agent software updates and download them when they are available. • Discover Computers: Periodically check for new computers on the network by scheduling a Discovery operation. You will be prompted for an IP range to check and asked to specify which computer group the new computer will be added to. This task is useful for discovering computers that are not part of your cloud connector. • Generate and Send Report: Automatically generate reports and optionally have them emailed to a list of users. • Run Script: If the Syslog options do not meet your event notification requirements, it may be possible for Trend Micro to provide a solution using custom-written scripts. Contact Trend Micro for more information. © 2020 Trend Micro Inc. Education 353 Lesson 17: Automating Deep Security Operations • Scan Computers for Integrity Changes: Causes the Deep Security Manager to perform an Integrity Scan to compare a computer's current state against its baseline. • Scan computers for Malware: Schedules a Malware Scan. The configuration of the scan is the same as that specified on the Policy or Computer Editor > Anti-Malware page for each computer. For most organizations, performing this task once weekly (or according to your organization’s policies) is ideal. • Scan Computers for Open Ports: Schedule periodic port scans on one or more computers. You can specify individual computers or all computers belonging to a particular computer group. Deep Security Manager will scan the port numbers defined on the Scanning tab in the Policy or Computer Editor > Settings page. • Scan Computers for Recommendations: Causes the Deep Security Manager to scan the computer(s) for common applications and then make recommendations based on what is detected. Performing regular recommendation scans ensures that your computers are protected by the latest relevant rule sets and that those that are no longer required are removed. If you have set the Automatically implement Recommendations option for each of the three protection modules that support it, Deep Security will assign rules that are recommended. Rules that are no longer needed will be displayed on the Recommended for Unassignment list. If rules are identified that require special attention, an alert will be raised to notify you. For most organizations, performing this task once a week is ideal. Best Practice: 354 Recommendation Scans can be CPU-intensive, so when scheduling Recommendation Scans, it is best practice to set the task by group (for example, per policy or for a group of computers, no more than 1,000 machines per group) and spread it in different days (for example, database server scans scheduled every Monday; mail server scans scheduled every Tuesday, and so on). Schedule Recommendation Scans more frequently for systems that change often. • • Send Outstanding Alert Summary: Generate an email listing all outstanding (unresolved) alerts. • Synchronize Cloud Account: Synchronize the Computers list with an added cloud account. (Only available if you have added a cloud account to the Deep Security Manager.) • Synchronize Directory: Synchronize the Computers list with an added LDAP directory. (Only available if you have added an LDAP directory to the Deep Security Manager.) • Synchronize Users/Contact: Synchronize the Users and Contacts lists with an added Active Directory. (Only available if you have added an Active Directory to the Deep Security Manager.) • Synchronize VMware vCenter: Synchronize the Computers list with an added VMware vCenter. (Only available if you have added a VMware vCenter to the Deep Security Manager.) Send Policy: Regularly check for and send updated policies. Scheduled updates allow you to follow an existing change control process. Scheduled tasks can be set to update machines during maintenance windows, off hours, etc. © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations Creating Scheduled Tasks To set up a scheduled task in the Deep Security Manager, click Administration > Scheduled Tasks > New. This opens the New Scheduled Task Wizard, which takes you through the steps to create a scheduled task. Event-Based tasks Event-based tasks let you monitor protected computers for specific events and trigger other tasks based on certain conditions. The following Deep Security tasks can be triggered automatically when certain conditions occur: • Computer Created (by System): A computer being added to the manager during synchronization with an Active Directory or Cloud Provider account, or the creation of a virtual machine on a managed ESXi server running a virtual appliance. • Computer Moved (by System): A virtual machine being moved from one vApp to another within the same ESXi, or a virtual machine on an ESXi being move from one datacenter to another or from one ESXi to another (including from an unmanaged ESXi server to a managed ESXi server running a virtual appliance.) • • • Agent-Initiated Activation: An agent is activated using agent-initiated activation. • Computer Powered On (by System): Enables users to trigger activation by the VMware Virtual Machine power on event. IP Address Changed: A computer has begun using a different IP. NSX Security Group Change: Certain situations will trigger this event (the event will be recorded on each affected virtual machine). © 2020 Trend Micro Inc. Education 355 Lesson 17: Automating Deep Security Operations Creating Event-Based tasks In Deep Security Manager, click Administration > Event-Based Tasks > New. The wizard that appears will guide you through the steps of creating a new task. You will be prompted for different information depending on the type of task. Event-Based Task Conditions You can require specific match conditions to be met in order for the task to be carried out. If you specify multiple conditions, each of the conditions must be met for the task to be carried out. (In other words, multiple conditions are AND conditions, not OR.) 356 © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations Quick Start Templates Deep Security provides templates to automate the deployment of Deep Security Manager and its underlying infrastructure within Amazon Web Services and Microsoft Azure. Deploying Deep Security Manager in Amazon Web Services Using a CloudFormation Template A simple method for deploying Deep Security Manager within Amazon Web Services uses a CloudFormation template and AWS services (including the Relational Database Service). The Deep Security on AWS Quick Start deploys Deep Security and offers two license models: • • Note: Per Protected Instance Hour Bring Your Own License (BYOL) A Virtual Public Cloud (VPC) and an Identity and Access Management (IAM) account for Deep Security Manager must be created in Amazon Web Services before running the CloudFormation template. After deployment, you can modify the configuration to protect instances across your entire Amazon Web Services infrastructure. In the example that follows, Deep Security will be configured using the Bring Your Own License model Type the following URL in your Web browser to access the Deep Security on AWS Quick Start: https://aws.amazon.com/quickstart/architecture/deep-security/ Select the licensing mode, for example Use in AWS Service Catalog (BYOL). © 2020 Trend Micro Inc. Education 357 Lesson 17: Automating Deep Security Operations A CloudFormation template must be selected. The Trend Micro-supplied CloudFormation template for the Quick Start is identified in the Specify an Amazon S3 template URL field. Accept the default template URL. Specify the details for the Deep Security installation. Deep Security Configuration: • • Administrator username for Deep Security: Type a default Deep Security administrator name • • EC2 Key Pair for SSH access: Select the key pair used to access the AWS account Administrator password for Deep Security: Type a password for the default Deep Security administrator name Deep Security License Key: Since the BYOL license option was selected, type the license code supplied by Trend Micro Network Configuration: 358 • VPC for Deep Security Components: Select the Virtual Private Cloud you created for Deep Security • Public Subnet for Deep Security Managers: Select an existing subnet for Deep Security Manager. This must be a public subnet contained in the VPC chosen above. • • Choose the backend database: Select the type of database to be configured using RDS • Secondary private subnet for RDS: Select a second private subnet for the RDS database. This must be a private subnet contained in the VPC chosen above. Primary private subnet for RDS: Select a private subnet for the RDS database. This must be a private subnet contained in the VPC chosen above. © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations RDS Configuration: • Administrator username for RDS Instance: Type an administrator username to be used for the database instance • Administrator password for RDS Instance: Type an RDS database administrator password © 2020 Trend Micro Inc. Education 359 Lesson 17: Automating Deep Security Operations Options, including Tags, Permissions and Advanced settings can be configured if required. 360 © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations A final review of the configuration is displayed. Click to acknowledge that the CloudFormation Template may create resources with custom names. Click Create once you are satisfied with the Details. Click Previous if corrections are required. © 2020 Trend Micro Inc. Education 361 Lesson 17: Automating Deep Security Operations The deployment steps are displayed while the installation and configuration is in progress. It can take 30 to 45 minutes to complete these operations. Once the final status message displays Create Complete, Deep Security has been deployed to the Virtual Private Cloud instance. 362 © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations Deploying Deep Security Manager in Microsoft Azure Using Quickstarts Azure Quickstarts provide a quick way to provision virtual machines and services. A Quickstart is available to install Deep Security in a Bring Your Own License model in Azure. Log into your Microsoft Azure account and on the Dashboard, create either a Linux or Windows virtual machine to host Deep Security. © 2020 Trend Micro Inc. Education 363 Lesson 17: Automating Deep Security Operations Complete the Create Virtual Machine Wizard. Remember to note the details you provide, such as the administrator name and passwords. 364 © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations Once the VM is deployed, run a search in the Azure marketplace, for Deep Security Manager (BYOL). © 2020 Trend Micro Inc. Education 365 Lesson 17: Automating Deep Security Operations Click Create and step through the Wizard to configure Deep Security Manager. 366 © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations A Summary page is displayed providing a final verification of the parameters entered. Click OK to begin the deployment of Deep Security Manager. © 2020 Trend Micro Inc. Education 367 Lesson 17: Automating Deep Security Operations The process make take some time, be patient as the database and Deep Security Manager are installed and configured on the virtual machine. Once the deployment is complete, the Deep Security Manager Web console for the cloud deployed installation can be accessed by entering the URL based on the VM name and location of the data center selected during configuration, for example: https://azuresample.canadaeast.cloudapp.azure.com:8443/auth/ (Where azuresample is the Deep Security VM name entered in the wizard and canadaeast is the datacenter location selected for the virtual machine) From this point, the cloud deployed installation of Deep Security Manager functions the same as an on-premises installation. 368 © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations Baking the Deep Security Agent into an Amazon Machine Image Deployment scripts can be incorporated into an Amazon Web Services Machine Image (AMI) to install and activate a Deep Security Agent when a new AWS instance is launched. An AMI is a template that contains the software configuration (operating system, application server, and applications) required to launch your instance. Adding the script to this template installs and activates a Deep Security Agent automatically when new instances are launched, ensuring that protection on the new instance is immediate. Add the script content to the User Data field in the Advanced Details section of the template definition. © 2020 Trend Micro Inc. Education 369 Lesson 17: Automating Deep Security Operations Application Programming Interface The Deep Security Application Programming Interface (API) enables you to automate operational tasks in Deep Security, thereby increasing productivity and improving the security services that you support. The API allows Deep Security to be integrated with other security solutions, or initiate Deep Security operations from outside of the Web console. Automation using the API can be applied to Protection Module operations, as well as Administration, Computer and Policy operations. Intrusion Prevenon Firewall An-Malware Integrity Monitoring API Web Reputaon Log Inspecon Administraon Applicaon Control Computers Policies Common uses of the Deep Security API include tasks such as: • • • Searching for computers out of compliance Automating tenant creation and setup Automating policy management The Deep Security API is a Representational State Transfer (RESTful) API that you use to make HTTP requests to interact with Deep Security Manager. The Deep Security API is versioned. Each request that you include the version to use in the apiversion header. You must ensure that the API version you are using is compatible with the Deep Security Manager with which you are interacting. However, Deep Security Manager is backwardcompatible with all versions of the API. For example, if your code uses the v1 API and you upgrade Deep Security Manager, your code behavior does not change. However, you should always use the latest available version of the API. The reply to the Deep Security API request is presented as JavaScript Object Notation (JSON). This lightweight data-interchange format is easy for humans to read and write, but also easy for machines to parse and generate. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language. 370 © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations Setting up the Development Environment The environment where you develop your software accessing the Deep Security API requires the following items: • Network access to a running Deep Security Manager, either one that you installed or one provisioned by Deep Security as a Service. • An Software Development Kit (SDK) client library, if you choose to use one. You can download the client library from the Deep Security Automation center. You can also use the API directly through tools such as Postman and curl; in this case, you do not need an SDK. • The runtime environment for the programming language of your client library. API URL Each API-enabled resource is referenced through a URL, such as: https://<URL_of_DSM>:4119/api/<resource> For example, to reference API operations related to computers in our classroom environment, the URL would be: https://server-02.trend.local:4119/api/computers Authenticating API Requests Deep Security uses API keys for authenticating HTTP requests. Each request that you make requires an api-secret-key header that contains a secret key and the api-version header which contains the version of the API being used, as in the following example request: GET /api/policies HTTP/1.1 Host: localhost:4119 api-secret-key: 2:vJC6lckDygB6FYURIvR0WK2ZTAhIY8rb0Amy9UMn4mo= api-version: v1 The API key behaves like a password that is passed within the API request. Role-based controls, such as those used for administrators in Deep Security, can limit the API to certain operations, however, API keys are designed to be issued to automation systems, rather than people. When using a client library, you obtain an instance of ApiClient and configure it to use your secret key. The configuration is global, so that all calls to the API thereafter are authenticated by Deep Security Manager using the secret key. Each API key is associated with a role that determines the actions that you can perform. Creating an API key Create an API key to authenticate requests with Deep Security Manager. When you create an API key, provide a name, the role to associate with the key, and optionally an expiry date. To create an API key, you require the access rights to create users. © 2020 Trend Micro Inc. Education 371 Lesson 17: Automating Deep Security Operations Upon creation of an API key, you are provided a unique secret key that is associated with the API key. Include this secret key in the HTTP request for authenticating. You must store the secret key when it is provided because at no other time are you able to obtain it. If you lose the secret you must create a new API key or create a new secret for the key. The API key can be set to expire on a pre-configured date. In Deep Security Manager, click Administration > User Management > System API Keys. Click New and enter the property values for the key. 372 © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations The secret is presented. This is the only time that you can obtain the secret. Copy the secret to the clipboard and paste into a file. API Reference The API Reference contains details of the Deep Security API endpoints, including parameter descriptions, request and response schemas, and language-specific SDK examples. The API Reference is available on the Deep Security Automation Center, viewable online at the following URL: https://automation.deepsecurity.trendmicro.com/ Click the API Reference menu. The API Reference provides information about each resource that you interact with: • • • Descriptions of operations that you can perform on each resource (GET, POST, etc) Request paths, headers, and payloads Example requests and response messages © 2020 Trend Micro Inc. Education 373 Lesson 17: Automating Deep Security Operations Deep Security version API URL API endpoints Command parameters Request samples API Endpoints In the left-hand frame, all of the API endpoints are listed. These represent all of the resources and operations that can be accessed through the API. The operation are gathered into logical categories; expand the category name to view the individual API items. In the example below, the API-enabled commands available for Computer Groups are displayed in the API endpoints list. 374 © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations API Operations There are four different HTTP operations that can be performed on Deep Security resources using the API: GET POST : The GET operation is used to request data from a specified resource. : The POST operation is used to send data to a server to create/update a resource. DEL : The DEL operation deletes specific resources PUT : The PUT operation assigns an item to specific resources Command Parameters The middle frame displays parameters related to the operation selected in the API endpoints frame, such as authorization requirements, header parameters, and request body fields. In the example here, the parameters related to creating a new group are displayed. © 2020 Trend Micro Inc. Education 375 Lesson 17: Automating Deep Security Operations API URL When the API endpoint is selected, the URL field will display the path to the API object on the Deep Security Manager computer. Click the down arrow to display the full URL path. Select and copy the path and paste where needed, making sure to edit the path to reflect the correct host name for your Deep Security Manager computer, for example: https://server-02.trend.local:4119/api/computergroups Request Samples The right-hand frame displays sample code for the selected endpoint in the three supported development language Software Development Kits. The SDKs consist of programming-languagespecific packages containing modules used to interact with the API. The SDK includes client libraries that enable you to use the API in the following languages: • • • Python JavaScript (via NodeJS) Java The instructions for downloading and installing the SDKs is available in the Deep Security Automation Center. If you would rather use the API directly through demo and testing tools such as Postman and curl, you do not need an SDK. 376 © 2020 Trend Micro Inc. Education Lesson 17: Automating Deep Security Operations In this example, the code required to create a new group using the Java SDK is displayed. The codes samples can be copied and pasted into your application. Modify the YOUR HOST, YOUR API KEY and YOUR VERSION fields in the sample to match the specifics of your environment. Click Payload to displays a JSON-formatted request body to submit the required data with the request. © 2020 Trend Micro Inc. Education 377 Lesson 17: Automating Deep Security Operations Review Questions 1 How would you characterize the difference between a Scheduled Task and an Event-Based Task in Deep Security? 2 Explain how the Deep Security API can automate the management of computers in Deep Security? 3 How can you automate the deployment and activation of a Deep Security Agent in a newly launched Amazon Web Services instance? 378 © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Lesson Objectives: After completing this lesson, participants will be able to: • • • Describe the components of the Connected Threat Defense system Integrate Deep Security with Trend Micro Apex Central and Deep Discovery Analyzer Track submissions through the phases of Connected Threat Defense In the modern data center, more and more security breaches are a result of targeted attacks using techniques such as phishing and spear-phishing. In these cases, malware writers can bypass traditional malware scanners by creating malware specifically targeted for your environment. Deep Security adds enhanced malware protection for new and emerging threats through Connected Threat Defense. Using heuristic detection, Deep Security can identify document files that are deemed suspicious and submit them automatically to Deep Discovery Analyzer for analysis. If the analysis indicates that a particular file does contain malware, Deep Discovery will provide the information to Trend Micro Apex Central. Through Apex Central, an action for this particular malware can be specified and any Trend Micro product can subscribe to the suspicious object list from Apex Central to remediate threats. Connected Threat Defense allows multiple Trend Micro products to share threat information and analysis across multiple layers of protection critical to defending against advanced threats. Connected Threat Defense Phases Connected Threat Defense includes a complete set of security technology to prevent, detect, and respond to advanced server protection. PROTECT RESPOND DETECT © 2020 Trend Micro Inc. Education 379 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Detect Components of the Connected Threat Defense detect advanced malware, behavior and communications invisible to standard defenses. Connected Threat Defense analyzes the risk and nature of the attack and attacker within sandboxes to reveal malicious actions without relying on malware signatures. Respond Components of the Connected Threat Defense enable rapid response through shared threat intelligence and delivery of real-time security updates. Protect Components of the Connected Threat Defense assess potential vulnerabilities and proactively protect endpoints, servers and applications. View and Analyze Threats Components of the Connected Threat Defense provide visibility across the system and analyze and assess the impact of threats. Connected Threat Defense Requirements Deep Security’s participation in Connected Threat Defense requires you to set up a connection between Deep Security, Deep Discovery Analyzer and Apex Central. Before connecting Deep Security to Deep Discovery Analyzer, verify that your environment meets these requirements: • Deep Security Manager is installed and configured with Deep Security Agents or Virtual Appliances protecting computers. Policies are configured in Deep Security to detect and submit suspicious files • • • Deep Discovery Analyzer is installed and the sandbox virtual machines are provisioned Note: 380 Trend Micro Apex Central is installed Deep Discovery Analyzer and Deep Security have been added to the Apex Central Managed Servers list To use Connected Threat Defense with the Deep Security Virtual Appliance, you must be using VMware NSX 6.x. © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense How Connected Threat Defense Works When all the components are deployed and configured correctly, Connected Threat Defense operates as described below. Deep Security Agent Deep Security Manager Deep Discovery Analyzer 1 Apex Central (formerly Control Manager) Deep Security Agents are configured with policy settings to enable detection of malware on the protected computers. 2 Objects deemed to be suspicious are gathered and submitted to Deep Security Manager. 3 Deep Security Manager submits the suspicious objects to Deep Discovery Analyzer for analysis. 4 Deep Discovery Analyzer executes and observes the suspicious object in a secure, isolated virtual sandbox environment. 5 Deep Discovery Analyzer pushes the analysis results to Trend Micro Apex Central, where an action can be specified for the file based on the analysis. Once the action is specified, a list of emerging threats called a Suspicious Object List is created or updated. Other Trend Micro products, such as Apex One, Deep Discovery Inspector or Deep Discovery Email Inspector, may also be connected to Trend Micro Apex Central and be able to update the list. 6 Deep Security Manager receives the list of suspicious objects from Apex Central. 7 The list is forwarded to Deep Security Agents where protection against the suspicious object is applied. Anti-Malware policies define how suspicious objects are to be handled. © 2020 Trend Micro Inc. Education 381 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Trend Micro Apex Central Apex Central is a central repository for local and global threat intelligence. It provides a centralized console to manage, monitor, and report across multiple layers of security in all your Trend Micro product deployments. Customizable data displays provide the visibility and situational awareness for administrators to rapidly assess status, identify threats, and respond to incidents. Administration can be streamlined to achieve more consistent policy enforcement with single-click deployment of data protection policies across endpoint, messaging, and gateway solutions. User-based visibility shows what is happening across all endpoints and servers owned by users, enabling administrators to review policy status and make changes across all user devices. In the event of a threat outbreak, administrators have central access point for complete visibility of an environment to track how threats have spread. With a better understanding of security events, it becomes easier to prevent them from reoccurring. Direct links to Trend Micro Threat Connect database provides access to actionable threat intelligence, which allows administrators to explore the complex relationships between malware instances, creators, and deployment methods. Apex Central is then able to apply policy on how these suspicious objects should be treated. Deep Security sends and can retrieve suspicious objects from Apex Central. Additionally, Deep Security can leverage Scan Actions (for example Log or Block) from Apex Central. The Dashboard in the Apex Central console provides the status summary for the entire Apex Central network. 382 © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Connecting Deep Security with Trend Micro Apex Central To participate in Connected Threat Defense, Deep Security must be added to Apex Central as a Manager Server. In the Apex Central Web Management console, click Administration > Managed Servers > Server Registration. Select Deep Security from the Server Type list and click Add a product. Type the details of Deep Security Manager and click Save. Deep Security is now listed as a Managed Server. © 2020 Trend Micro Inc. Education 383 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Deep Discovery Analyzer Deep Discovery Analyzer provides custom sandbox analysis using virtual images that are tuned to precisely match your system configurations, drivers, installed applications, and language versions. This approach improves the detection rate of advanced threats that are designed to evade standard virtual images. The custom sandbox environment includes safe external access to identify and analyze multistage downloads, URLs, command and control (C&C), and more, as well as supporting manual or automated file and URL submission. Deep Security can send these file types to Deep Discovery Analyzer: • • • • • • • • • • • • • • • • • • • • • • 384 doc - Microsoft Word document docx - Microsoft Word 2007 and later document gul - JungUm Global document hwp - Hancom Hangul Word Processor (HWP) document hwpx - Hancom Hangul Word Processor 2014 (HWPX) document jar - Java Applet Java application js - JavaScript file jse - JavaScript encoded script file jtd - JustSystems Ichitaro document lnk - Microsoft Windows Shell Binary Link shortcut mov - Apple QuickTime media pdf - Adobe Portable Document Format ppt - Microsoft Powerpoint presentation pptx - Microsoft PowerPoint 2007 and later presentation ps1 - Microsoft Windows PowerShell script file rtf - Microsoft Rich Text Format document swf - Adobe Shockwave Flash file vbe - Visual Basic encoded script file vbs - Visual Basic script file xls - Microsoft Excel spreadsheet xlsx - Microsoft Excel 2007 and later spreadsheet xml - Microsoft Office 2003 and later XML file © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Suspicious Activities The Deep Discovery Analyzer monitors activity within the sandbox environment for activities such as those listed here. Anti-security, self-preservation Autostart or other system reconfiguration Deception, social engineering · Deleted AV registry entry · Disabled AV service · Locked registry · Added autorun in registry · Added scheduled task · Added startup file or folder · Stopped or modified AV service · Bypassed firewall · Created message box · Deceiving extension name · Double EXE header · Double extension name with · Suspicious packer · Used watchdog · Modified important registry items · Modified AppInit_DLLs in registry · Modified sensitive file · Dropped fake system file · Fake icon · File signature File drop, download, sharing, or replication · Reset IP settings · Porn-like file name · Copied self Hijack, redirection, or data theft Suspicious network or messaging activity · Deleted self · Downloaded executable · Dropped driver · Dropped executable · Dropped file into share · Executed download · Accessed document files · Installed BHO · Modified configuration files · Set up API hooks · Stole IM password · Created raw socket · Established network connection · Listened on port · Opened IRC connection · Performed DNS query · Performed port scanning · Executed dropped file Process, service, or memory object change · Requested suspicious URL · Opened share · Renamed download · Searched shares · Added service · Created mutex · Created named pipe · Created process · Injected memory with dropped · Requested URL · Sent email · Memory resident · Started self · Started service · Terminated process · Hide file · Hide registry · Hide service executable tail · Copied same file multiple times Malformed, defective, or with known malware traits · Contains known malware string · Crashed document reader · Crashed process · Failed to start files © 2020 Trend Micro Inc. Education Rootkit, cloaking · Attempted to hide file 385 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Connecting Deep Discovery Analyzer to Apex Central The Deep Discovery Analyzer must be added as a Managed Server in Apex Central. In the Apex Central Web Management console, click Administration > Managed Servers > Server Registration. Select Deep Discovery Analyzer from the Server Type list and click Add a product. Type the details of the Deep Discovery Analyzer device and click Save. Deep Discovery Analyzer is now listed as a Managed Server. 386 © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Populating the Apex Central Product Directory In the Apex Central Web Management console, add Deep Security and Deep Discover Analyzer to the Product Directories list. In the Apex Central Web Management console, click Directories > Products and click Directory Management. Click Local Folder, and click Add Folder. Type a name for a new folder (or directory), for example, Trend Micro Servers. © 2020 Trend Micro Inc. Education 387 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Expand the New Entity folder. Drag Analyzer from the New Entity folder to the newly created Trend Micro Servers folder. When prompted, click OK to acknowledge the move. The Analyzer device should now be displayed in the Trend Micro Servers folder. Drag Deep Security from the New Entity folder to the newly created Trend Micro Servers folder. When prompted, click OK to acknowledge the move. 388 © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Deep Discovery Analyzer and Deep Security are displayed in the Trend Micro Servers folder. Configuring Deep Security for Connected Threat Defense You can enable Connected Threat Defense in policies or for individual computers. The steps involved in configuring Deep Security for Connected Threat Defense include: 1 Creating a Malware Scan Configuration and apply to a policy 2 Configuring Deep Security to submit files to Deep Discovery Analyzer 3 Subscribing to the Suspicious Object List 4 Enabling sandbox analysis Creating a Malware Scan Configuration Create a malware scan configuration to allow Deep Security to detect suspicious files and automatically send them to Deep Discovery Analyzer for further analysis. In Deep Security Manager, click the Policies menu. In the left-hand pane, expand Other > Malware Scan Configurations. © 2020 Trend Micro Inc. Education 389 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense On the General tab, click Scan documents for exploits and Scan for exploits against known critical vulnerabilities and aggressive detection of unknown suspicious exploits. Configure any other malware scan settings as required. Assign the Malware Scan Configuration to a policy by clicking the Anti-Malware Protection Module in either the Computers or Policies menu. On the General tab, ensure that the Anti-Malware State is On or Inherited (On). In the appropriate scan section of the General tab and select the Malware Scan Configuration created in the previously. 390 © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Configuring Deep Security to Submit Files to Deep Discovery Analyzer In the Deep Security Manager Web console, click the Administration menu. In the left-hand pane, expand System Settings and click the Connected Threat Defense tab. In the Connected Threat Defense section, click Enable submission of suspicious file to Deep Discovery Analyzer. To automatically submit files to Deep Discovery Analyzer from Deep Security, click Enable automatic file submission. Note: Automatic Submission to Deep Discovery Analyzer occurs every 15 minutes and will submit a maximum of 100 files per submission. Click Use the Deep Discovery Analyzer associated with the Apex Central that Deep Security is registered with. Click Add/Update Certificate to update to the correct Deep Discovery Analyzer certificate, then click Test Connection and insure that the connection is successful. © 2020 Trend Micro Inc. Education 391 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Subscribing to the Suspicious Object list Still in the Connected Threat Defense section, scroll down and enable Compare objects against Suspicious Object List and click Use the Apex Central That Deep Security is registered with. Click Add/Update Certificate to update to the correct Apex Central certificate and click Test Connection and insure the connection is successful. Enabling Sandbox Analysis Open a policy and click the Anti-Malware Protection Module. On the Connected Threat Defense tab, adjust these settings as required and save the policy: 392 • Use Apex Central’s Suspicious Object List: If you have set up a connection between Deep Security and Trend Micro Apex Central, you can set this option to On or Inherited (On) to use the suspicious object list from Apex Central to detect malicious files in computers protected by this policy. • Sandbox Analysis: Set this option to On or Inherited (On) to enable the submission of suspicious files found on computers protected by this policy to Deep Discovery Analyzer. © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Manually Submitting a File to Deep Discovery For Analysis Based on the configuration of Deep Security, files can either be submitted automatically, or manually. To submit a file manually, Locate the suspicious file on the Events & Reports > Events > Anti-Malware Events > Identified Files page. Select the file that you want to submit and click Analyze. After the file is submitted, you can check the progress of its analysis in the Submission Status column on the Identified Files page. When the analysis is finished, the Submission Status column will display Results Ready. Click Results Ready to see details. Tracking the Submission The analysis of the submitted file can be tracked in Deep Discovery Analyzer and Apex Central. © 2020 Trend Micro Inc. Education 393 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Log into the Deep Discovery Analyzer Web Management console and verify that the file has been submitted by the Deep Security by clicking Virtual Analyzer > Submitters. Deep Security should be displayed as the submitter of the object. Click Virtual Analyzer > Submissions. On the Processing tab, verify that the sample is being processed by the Analyzer under today's date. There will be some delay before the file is forwarded from Deep Security Manager and processing of the file by Deep Discovery Analyzer begins. Once the submission is processed, the entry will be displayed on the Completed tab. There will be some delay while the file is processed. 394 © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Click Virtual Analyzer > Suspicious Objects and verify the object it is now visible in the list. To uniquely identify the object, the hash will be displayed instead of the file name. Return to the Apex Central Web Management console and click Threat Intel > Virtual Analyzer Suspicious Objects and verify the object it is now visible in the list. You may need to wait several minutes for the results of the analysis to be passed to Apex Central. © 2020 Trend Micro Inc. Education 395 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Click to select the object in the list and click Configure Scan Action. In the Scan Action window, select Block in the For selected files section and click Apply. When prompted, confirm the application of the scan action. Click Apply Scan Action. 396 © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense The Scan Action is changed to Block. Suspicious Objects There are two primary sources of threat information: • Suspicious objects information collected from Deep Discovery • Community exchanged Indicators of Compromise (IOC) When Deep Discovery discovers suspicious objects through the virtual analysis of a file, it can send information about the object (SHA-1, URL, IP, Domain) to Apex Central for local sharing. Deep Discovery can also send the Suspicious Object List, along with executable files, to the Trend Micro Smart Protection Network. Trend Micro will validate the suspicious objects within a maximum of 6 hours. If suspicious objects are found to be malicious they will be added to Smart Protection Network and all products which integrate with the network can leverage this information. Other Indicators of Compromise may also be manually configured and sent to Apex Central. © 2020 Trend Micro Inc. Education 397 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Handling Suspicious Object The process for handling suspicious object can be broken down into a few phases. To view the details of each phase, click View in the Handling Process column of the Virtual Analyzer Suspicious Objects page in Apex Central. Sample Submission Deep Security and other Trend Micro products use administrator-configured file submission rules to determine the samples to submit to Virtual Analyzer. The Sample Submission tab provides details of the submission to Deep Discovery Analyzer. 398 © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Analysis Virtual Analyzer tracks and analyzes the submitted samples and flags suspicious objects based on their potential to expose systems to danger or loss. Supported objects include files (SHA-1 hash values), IP addresses, domains, and URLs. The Analysis tab provides information on why the object was flagged as suspicious. Distribution Apex Central consolidates suspicious objects and scan actions against the objects and then distributes them to other products. • Virtual Analyzer Suspicious Objects: Trend Micro products integrated with Virtual Analyzer send suspicious objects to Apex Central. • Exceptions to Virtual Analyzer Suspicious Objects: Apex Central administrators can select objects from the list of suspicious objects that are considered safe and then add them to an exception list. Apex Central sends the exception list back to the products integrated with Virtual Analyzer. If a suspicious object from a managed product matches an object in the exception list, the product no longer sends it to Apex Central. • User-Defined Suspicious Objects: Apex Central administrators can add objects they consider suspicious but are not currently in the list of Virtual Analyzer suspicious objects. • Suspicious Object Distribution: Apex Central consolidates Virtual Analyzer and user-defined suspicious objects (excluding exceptions) and sends them to other managed products. These products synchronize and use all or some of these objects. © 2020 Trend Micro Inc. Education 399 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Configure scan actions (log, block, or quarantine) against suspicious objects that affect computers. Block and quarantine actions are considered active actions, while the log action is considered passive. If products take an active action, Apex Central declares the affected computers as mitigated. If the action is passive, computers are declared at risk. Scan actions are configured separately for Virtual Analyzer and user-defined suspicious objects. Apex Central automatically deploys the actions to certain managed products. Impact Assessment and Mitigation Impact assessment checks computers for suspicious activities associated with suspicious objects. Computers with confirmed suspicious activities are considered at risk. Apex Central also considers computer to be at risk if products take passive actions against suspicious objects. The Deep Security Agents and Virtual Appliances perform active scan actions against suspicious objects. When the scan action configured in Apex Central and deployed to Deep Security Agents is Block or Quarantine, the affected computers are considered mitigated. Apex Central also checks Web Reputation, URL filtering, network content inspection, and rulebased detection logs received from all managed products and then compares them with its list of suspicious objects. If there is a match from a specific computer and the managed product takes an active action such as Block, Delete, Quarantine, or Override, Apex Central treats the computer as mitigated. 400 © 2020 Trend Micro Inc. Education Lesson 18: Detecting Emerging Malware Through Connected Threat Defense Review Questions 1 Why would you require multiple sandbox environments in a Deep Discovery Analyzer device? 2 What is the role of Apex Central in the Connected Threat Defense infrastructure? 3 How does Connected Threat Defense ensure that all Trend Micro products in your infrastructure are made aware of suspicious objects? © 2020 Trend Micro Inc. Education 401 Lesson 18: Detecting Emerging Malware Through Connected Threat Defense 402 © 2020 Trend Micro Inc. Education Appendix A: Activating and Managing Multiple Tenants Lesson Objectives: After completing this lesson, participants will be able to: • • • • • • Enable Multi-Tenancy in Deep Security Create Tenants View the status and properties of a Tenant Activate Deep Security Agents on Tenants Monitor the Tenant usage of security services Locate and view Tenant-related events Multi-Tenancy lets you create multiple distinct management environments using a single Deep Security Manager and database server installation. It fully isolates the policies, settings, computers, and events for each tenant and makes use of a number of additional infrastructure scaling options. Tenant 0 Admin for Tenant0 Deep Security Manager VCenter NSX Manager VMWare ESXi Deep Security Virtual Appliance VM VM Windows Server Amazon Web Services VM VM VM Azure VM Tenant A Admin for Tenant A Linux Server Policies Se ngs Computers Events Tenant B Policies Se ngs Computers Admin for Tenant B Events Tenant C Admin for Tenant C © 2020 Trend Micro Inc. Education Policies Se ngs Computers Events Tenant D Admin for Tenant D Policies Se ngs Computers Events 403 Appendix A: Activating and Managing Multiple Tenants Segmentation using Multi-Tenancy When Deep Security Manager is first installed, it is the one-and-only tenant. Once Multi-Tenancy is enabled, the Primary Tenant (referred to as Tenant0) retains all of the capabilities of a regular installation of Deep Security Manager. However, the tenants that are subsequently created can have their access to Deep Security functionality restricted to varying degrees based on how the system is configured for them. No tenant's assets or security components are visible to any other tenants. Each tenancy is independent and isolated from every other tenancy. Multi-Tenancy is available if you are using an on-premise installation of Deep Security or Deep Security for Amazon Web Services Marketplace with the Bring Your Own License (BYOL) option. You cannot set up multi-tenancy with Deep Security as a Service or any other license options for Deep Security for Amazon Web Services Marketplace. Segmentation by Business Unit Once common use for multi-tenancy is to segment an organization’s larger Deep Security installation by business unit or department. In this scenario, each business unit can be made responsible for the creation and management of their own assets including computers, policies, settings and events, independently of other business units. Tenant 0 Admin Deep Security Manager VCenter NSX Manager VMWare ESXi Deep Security Virtual Appliance VM VM Windows Server Amazon Web Services VM VM VM Azure VM Manufacturing 404 Linux Server Design Sales © 2020 Trend Micro Inc. Education Customer Service Appendix A: Activating and Managing Multiple Tenants Segmentation in a Service Provider Model Multi-tenancy is ideal for service providers reselling security services to other organizations. In this model, the service provider segments their Deep Security installation by customer. Each organization subscribing the provider’s services are created as a separate tenant. It is common in this type of installation restrict access to specific protection modules based on services the customer subscribes to. Tenant 0 Admin Deep Security Manager VCenter NSX Manager VMWare ESXi Deep Security Virtual Appliance VM VM Windows Server Linux Server Amazon Web Services VM VM VM Azure VM Acme Company ABC Industries J&E Limited Micron Enterprises Tenant Isolation Tenant isolation involves more than simply configuring Deep Security Manager properly. For absolute isolation between tenants, appropriate network level configuration is also required. Although Deep Security Manager can be configured to isolate one tenant's policies, events, and configuration settings from being seen or modified by other tenants, each tenant must also be restricted from seeing any other tenant's computers (virtual or physical). Otherwise, a tenant may potentially be able to install and activate an Agent on a computer that actually belongs to another tenant. This may not seem harmful if the only purpose of a multi-tenancy configuration is to separate the different departments of a larger company. However, if the tenants themselves are actually different companies, as in an ISP configuration for example, it is absolutely critical that each tenant is completely isolated from a network level to prevent any of them from being able to access or see each other's machines. Database Isolation Multi-tenancy relies on using multiple databases (if you are using Microsoft SQL or PostgreSQL) or multiple users (if you are using Oracle). With Microsoft SQL and PostgreSQL, there's one main database and an additional database for each tenant. With Oracle, all tenant information is in one Deep Security Manager database, but an additional user is created for each tenant. Each user has its own tables. The majority of each tenant's data is stored in a separated database. This database may co-exist on the same database server as other tenants, or can be isolated onto its own database server. In all cases some data only exists in the primary database (the one Deep Security Manager was installed with). © 2020 Trend Micro Inc. Education 405 Appendix A: Activating and Managing Multiple Tenants The segmentation of each tenant's data into a database provides additional benefits: Note: • • Data destruction: Deleting a Tenant removes all traces of that Tenant's data • Balancing: The potential for future re-balancing to maintain an even load on all database servers Backup: Each Tenant's data can be subject to different backup policies. This may be useful for something like tenancy being used for staging and production where the staging environment requires less stringent backups. (Backups are the responsibility of the administrator setting up Deep Security Manager.) Tenants are created on the database with the least amount of load when multiple database servers are available. The decision of which tenant’s Database is located on which database Server is made by Deep Security Manager, and cannot be configured by the user. Each tenant database has an overhead of approximately 100MB of disk space (due to the initial rules, policies and events that populate the system). Tenant creation takes between 30 seconds and 2 minutes due to the creation of the schema and the population of the initial data. This ensures each new tenant has the most up to date configuration and removes the burden of managing database templates (Especially between multiple database servers). To scale further, you can connect Deep Security Manager to multiple database servers and automatically distribute the new tenants across the available set of database servers. To configure additional databases go to Administration > System Settings > Database Servers. The following table shows an estimate of how a Deep Security environment can scale with multitenancy enabled. Component Single Tenant Multi-Tenant Managed Computers (max nodes, 64-bit managers, high-end hardware) 100,000 1,000,000 or more Deep Security Manager Nodes 1-5 1-50 Databases 1 1-10,000 Database Servers 1 (with or without replication) 1-100 Deep Security Manager Web Console For Tenants Some features in the Deep Security Manager Web Console are not available to tenant users. The following areas are hidden for tenants: • • • • • • • 406 Manager Nodes Widget Multi-Tenant Widgets Administration > System Information Administration > Licenses (If Inherit option selected) Administration > Manager Nodes Administration > Tenants Administration > System Settings: © 2020 Trend Micro Inc. Education Appendix A: Activating and Managing Multiple Tenants • • Tenant Tab Security Tab > Sign In Message Updates Tab > Setting for Allowing Tenants to use Relays from the Primary Tenant Advanced Tab > Load Balancers Advanced Tab > Pluggable Section Some of the help content not applicable to tenants Some reports not applicable to tenants Some Alert Types will also be hidden from tenants: • • • • • • • Heartbeat Server Failed Low Disk Space Manager Offline Manager Time Out Of Sync Newer Version of Deep Security Manager available Number of Computers Exceeds Database Limit When inherited licensing is enabled, any of the license-related alerts Enabling Multi-Tenancy Once you enable multi-tenancy, you cannot disable it or remove the Primary Tenant. In the Deep Security Manager Web console, click the Administration menu. In the left-hand frame, click System Settings and in the right-hand pane, click the Advanced tab. In the Multi-Tenant Options section, click Enable Multi-Tenancy. © 2020 Trend Micro Inc. Education 407 Appendix A: Activating and Managing Multiple Tenants A separate Activation Key and license is required to use Multi-Tenancy. Type your Multi-Tenancy Activation Code and click Next. Licensing Modes Choose the license mode you wish to implement and click Next: 408 • Inherit Licensing from Primary Tenant: This option gives all tenants the same licenses that you (the Primary Tenant) have. This option is recommended if you are using multi-tenancy testing in a staging environment, or if you intend to set up tenancies for separate departments within the same organization. • Per-Tenant Licensing: This mode is recommended when Deep Security is being offered as a service. Configured this way, you provide a license at the moment that you create a tenant account (using the API) or the tenants themselves enter a license when they sign in for the first time. © 2020 Trend Micro Inc. Education Appendix A: Activating and Managing Multiple Tenants Once Multi-Tenancy is enabled, a new Tenant tab is displayed under System Settings. This tab contains options that can be globally enabled for tenants of this installation. In addition, a new Tenants item is displayed in the left-hand pane. It is from this list that individual tenants can be managed. Creating Tenants Once Multi-Tenant mode is enabled, tenants can be created from the Tenants page that now appears in the Administration section. In the Deep Security Manager Web console, click the Administration menu. In the left-hand frame, click Tenants. In the right-hand frame, click New to launch the New Tenant wizard. Complete the account details page: • Account Name: Type a tenant account name. It can be any name except Primary which is reserved for the Primary Tenant. • • • Email Address: The email address is required in order to have a contact point per tenant. Locale: This determines the language of the UI for this tenancy. Time Zone: Although time is recorded throughout Deep Security in UT, all tenant-related events will be shown to the tenant users in the time zone of the tenant account, not the server where are created. © 2020 Trend Micro Inc. Education 409 Appendix A: Activating and Managing Multiple Tenants Note: In a multi-tenant environment, tenants may need to add the Deep Security Manager IP address to the Ignore Reconnaissance IP list found in Policies > Common Objects > Lists > IP Lists. This is to avoid getting a Reconnaissance Detected: Network or Port Scan warning. Tenant Administrator A tenant administrator must be assigned as part of the tenant creation process. Complete the first administrator account information page: • • 410 Username: Type the name of the first user of the new tenant account. Password Options: Select one of the three password options: - No Email: The username and password for the tenant’s first user are defined here and no emails are sent. - Email Confirmation Link: You set the password for the tenant's first user. However the account is not active until the user clicks a link in a confirmation email. © 2020 Trend Micro Inc. Education Appendix A: Activating and Managing Multiple Tenants - Email Generated Password: This allows the tenant creator to generate a tenant without specifying the password. This is most applicable when manually creating accounts for users where the creator does not need access Note: All three of these password options are available through the REST API. The confirmation option provides a suitable method for developing public registration. A CAPTCHA is recommended to ensure that the tenant creator is a human and not an automated bot. The email confirmation ensures that the email provided belongs to the user before they can access the account. Note: If problems occur during the tenant creation process, check the following: - Does the Database have sufficient permissions? - Does the Database Server support additional databases (size or total number cap)? - Check serverx.log for errors Tenant Account Confirmation Email confirmations of account creation will be sent to the tenant contact user based on the email address indicated in the new tenant wizard. The confirmation will contain a link to activate the account or access the Deep Security manager Web console. © 2020 Trend Micro Inc. Education 411 Appendix A: Activating and Managing Multiple Tenants Managing Tenants Tenants are managed from Deep Security Manager Web console. Click the Administration menu. In the lefthand frame, click Tenants. The list of configured tenants is displayed. Tenant State Tenant can be in any of the following States: 412 • Created: Tenants listed in the Created state are in the process of being created but are not yet active. • Confirmation Required: Tenants in this state have been created, but the activation link in the confirmation email sent to the tenant user has not yet been clicked. An administrator can manually override this state. • • • Active: Tenants in this state are online and managed. • Database Upgrade Failure: Tenants in this state failed the upgrade path. Click Database Upgrade to resolve this situation. Suspended: Tenants in this state no longer accepting sign-ins. Pending Deletion: Tenants can be deleted, however the process is not immediate. The tenant can be in the pending deletion state for up to seven days before the database is removed. © 2020 Trend Micro Inc. Education Appendix A: Activating and Managing Multiple Tenants Tenant Properties Properties for the tenants are displayed in the following tabs. General The General tab displays account information about the tenant. The Account Name can not be modified once the tenant is created. The Locale, Time Zone and State of the tenant can be altered. Be aware that changing the time zone and locale does not affect existing tenant users. It will only affect new users in that tenancy and events and other parts of the interface that are not user-specific. The Database Name indicates the name of the database used by this tenancy. The server the database is running on can be accessed by clicking the hyperlink. © 2020 Trend Micro Inc. Education 413 Appendix A: Activating and Managing Multiple Tenants Modules The Modules tab provides options for protection module visibility. By default all unlicensed modules are hidden. You can change this by de-selecting Always Hide Unlicensed Modules. Alternatively, selected modules can be shown on a per-tenant basis. If you are evaluating Deep Security in a test environment and want to see what a full MultiTenancy installation looks like, you can enable Demo Mode. When in Demo Mode, Deep Security Manager populates its database with simulated tenants, computers, events, alerts, and other data. Initially, seven days worth of data is generated but new data is generated on an ongoing basis to keep the Deep Security Manager Dashboard, Reports and Events pages populated with data. Note: 414 Demo Mode is not intended to be used in a production environment. © 2020 Trend Micro Inc. Education Appendix A: Activating and Managing Multiple Tenants Features The Features tab allows administrative users to enable and disable specific features per tenant. Statistics The Statistics tab shows information for the current tenant including database size, jobs processed, logins, security events and system events. The small graphs show the last 24 hours of activity. © 2020 Trend Micro Inc. Education 415 Appendix A: Activating and Managing Multiple Tenants Agent Activation The Agent Activation tab displays a command-line instruction that can be run from the Deep Security Agent installation folder on the tenant computers to activate Agents within this tenancy. Any activation scripts created in this tenant will include the tenantID and token values as part of the script commands. 416 © 2020 Trend Micro Inc. Education Appendix A: Activating and Managing Multiple Tenants Primary Contact The Primary Contact tab lists the user who is to be contacted for communications related to that tenant. Deleting Tenants Deep Security customers must wait seven days before information about the tenant is completely removed from the system. When a tenant account is created, the following database items are generated: • • • A new database named dsm_<name> Background jobs which are saved in the dbo.managerhobs table Messages which are saved in the dbo.managemessages table along with the TenantID To delete a tenant from the Deep Security Manager Web console, the record should be removed from the dbo.tenants database table. However, this table and the dbo.managerhobs and dbo.managemessages tables are all correlated. The record in dbo.tenants will be deleted only after all the jobs in dbo.managerhobs are finished. Because the longest job runs every week, the tenant account stays in pending deletion state for approximately seven days before it is removed. Immediate deletion of tenants in not recommended, but if a tenant insists, you can follow this procedure to delete the tenant immediately from the database. 1 Open the Deep Security Manager database. 2 Identify the Tenant ID that you want to delete. Get the corresponding value of the TenantID from dbo.tenants. As an example, the next steps will use 1 for the TenantID. 3 Delete the jobs for the tenant using the following command: delete from dbo.managerjobs where TenantID = 1; 4 Delete the messages for the tenant using this command: delete from dbo.managermessages where TenantID = 1; © 2020 Trend Micro Inc. Education 417 Appendix A: Activating and Managing Multiple Tenants 5 Delete the tenant account from the DB using this command: delete from dbo.tenants where TenantID = 1; 6 Drop database dms_<name> for this tenant. The tenant will then be removed from the database and will no longer appear in the Deep Security Manager Web console. Diagnosing Tenant Issues Tenants are not able to access Deep Security Manager diagnostic packages due to the sensitivity of the data contained within the packages. Tenants can still generate Agent diagnostics by opening the Computer Editor and choosing Overview > Actions > Agent Diagnostics. Activating Deep Security Agent on Tenants Agent-initiated activation is enabled by default for all tenants. Unlike Agent-initiated activation for the Primary Tenant, a Password and Tenant ID are required to invoke the activation for tenant Users. Using tools like Chef or Puppet, tenants can install and deploy Agents using scripts. These scripts can be generated using a wizard launched from Support > Deployment Scripts. The Tenant ID and Password must be appended to the script. The Tenant ID and password are displayed on the Agent Activation tab. Deep Security Relays Each Deep Security Manager must have access to at least one Deep Security Relay, including tenants in a Multi-Tenancy Deep Security installation. By default, the Relays in the Default Relay Group on the Primary Tenant are also available to the other tenants. The setting is located in the Administration menu under System Settings > Tenants > Multi-Tenant Options. If this option is disabled, tenants will have to install and manage their own Deep Security Relays. Usage Monitoring Deep Security Manager records data about tenant usage. This information is displayed in the Tenant Protection Activity widget on the Dashboard, the Statistics tab in tenant Properties, and the Chargeback report. This information can also be accessed through the Status Monitoring REST API which can be enabled or disabled from the Administration > Advanced > System Settings > Advanced > Status Monitoring API. This chargeback (or viewback) information can be customized to determine what attributes are included in the record. This configuration is designed to accommodate various charging models that may be required in service provider environments. For enterprises this may be useful to determine the usage by each business unit. 418 © 2020 Trend Micro Inc. Education Appendix A: Activating and Managing Multiple Tenants Multi-Tenant Dashboard When Multi-Tenancy is enabled, Primary Tenant users have access to additional Dashboard widgets for monitoring tenant activity: Some examples of tenant-related widgets: The same information is available in Administration > Tenants (some in optional columns) and on the Statistics tab of a tenant's Properties. This information provides the ability to monitor the usage of the overall system and look for indicators of abnormal activity, for instance, if a single tenant experiences a spike in Security Event Activity they may be under attack. © 2020 Trend Micro Inc. Education 419 Appendix A: Activating and Managing Multiple Tenants Multi-Tenant Dashboard/Reporting More information is available in the Chargeback report (in the Events & Reports section). This report details protection hours, the current database sizes, and the number of computers (activated and non-activated) for each tenant. Status Monitoring API Use the Status Monitoring REST API to customize the type of tenant information that you would like to see, depending on your environment. For enterprises, this can be useful to determine the usage by each business unit. You can also use the information to monitor the usage of the overall Deep Security system and look for indicators of abnormal activity. For example, if a single tenant experiences a spike in security event activity, it might be under attack. Administering Tenants In certain cases, the Primary Tenant may be required to access a Deep Security Manager Web console on a tenant. The Tenants List and tenant Properties pages provide an option to sign in as a given tenant, granting them immediate access. Users are logged in as a special account on the tenant using the prefix support_. For example if Primary tenant user jdoe logs on as a tenant, an account is created called support_jdoe with the Full Access role. The user is deleted when the support user times out or signs out of the account. The tenant can see a record of the user account being created, the user signing in, signing out and the user account being deleted, along with any other actions in system events. Click Administration > System Information for additional information about tenant memory usage and the state of threads. This may be used directly or provided to Trend Micro support. In addition, the server0.log on the disk of Deep Security Manager nodes contains additional information on the name of the tenant (and the user if applicable) that caused the log. This can be helpful in determining the source of issues. In some cases, tenants may require custom adjustments not available in the Deep Security Manager Web console, usually at the request of Trend Micro support. The command line utility to alter settings accepts the following argument to direct the setting change or other command line action at a specific tenant: -Tenantname "account name" If omitted, the requested action is performed on the Primary Tenant. Tenants are able to control login access from the Primary Tenant using the option Allow Tenants to control access from Primary Tenant. Whenever a Primary Tenant accesses a Tenant account, the access is logged on the Tenant system. 420 © 2020 Trend Micro Inc. Education Appendix A: Activating and Managing Multiple Tenants Logging into Deep Security Manager as a Tenant When Multi-Tenancy is enabled, the sign-in page has an additional Account Name text field. Tenants are required to enter their Account Name in addition to their Username and Password. The account name allows tenants to have overlapping usernames (for example, if multiple tenants synchronize with the same Active Directory server). Note: When you log in as the Primary Tenant, leave the Account Name field blank or type Primary. When tenants log in, they have a very similar environment to a fresh install of Deep Security Manager. Some features in the Deep Security Manager Web console are not available to tenant users. It is also important to note that tenants cannot see any of the Multi-Tenant features of the primary tenant or any data from any other tenant. In addition, certain APIs are restricted since they are only usable with Primary Tenant rights, such as creating other tenants. All tenants have the ability to use Role-Based Access Control with multiple user accounts to further sub-divide access. Additionally they can use Active Directory integration for users to delegate the authentication to the domain. The tenant Account Name is still required for any tenant authentications. © 2020 Trend Micro Inc. Education 421 Appendix A: Activating and Managing Multiple Tenants Review Questions 1 Describe some situations where an organization would benefit from multi-tenancy in Deep Security? 2 How is information from one tenant isolated from the data of other tenants running on the same Deep Security Manager? 3 How does the Deep Security Manager Web console of the Primary tenant differ from that of a tenant? 422 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Lesson Objectives: After completing this lesson, participants will be able to: • Describe how the Deep Security Virtual Appliance provides Agentless protection for virtual machines hosted on the ESXi Server • • • Describe how Deep Security is deployed in VMware environments Describe the VMware components required for Agentless protection Describe how high availability features in VMware affect the Deep Security Virtual Appliance Deep Security has a deep integration with VMware for the purpose of protecting virtual machines. The Trend Micro Deep Security Virtual Appliance protects virtual machines running on your VMware ESXi servers through VMware NSX-V or NSX-T Manager. VCenter NSX Manager VMware ESXi Deep Security Virtual Appliance VM VM VM Through the integration with VMware NSX, Deep Security Virtual Appliances can perform Firewall, Intrusion Prevention, Anti-Malware (Windows only), Web Reputation and Integrity Monitoring (Windows only) on virtual machines hosted on the ESXi server without the need of a physical Agent. If Application Control and Log Inspection is required in the implementation, an on-virtual-host Deep Security Agent can be installed. © 2020 Trend Micro Inc. Education 423 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Deep Security Virtual Appliance The Deep Security Virtual Appliance itself is a guest virtual machine running the CentOS 64-bit operating system and works by intercepting network and disk I/O traffic intended for virtual machines, and then analyzing this traffic for malicious content. The Deep Security Virtual Appliance is built on the same code base as the Deep Security Agent, but the smart policy installation does not make sense for the Deep Security Virtual Appliance, therefore all of the features are installed and updated automatically. The main process running in the Deep Security Virtual Appliance is called Master Agent (ds_Agent), and its purpose is to protect the Deep Security Virtual Appliance itself and all protected virtual machines on the same ESXi server. The Master Agent creates and maintains a directory for each virtual machine that is protected. These directories are named using the virtual machine’s BIOS UUID and are referred to as Virtual Agents, as they hold an individual set of configuration settings, databases and quarantine items for each virtual machine. There is a one-to-one relationship between virtual Agents and virtual machines being protected. Each Deep Security Agent requires network connectivity to locate the Deep Security Manager and Relays. By using a Deep Security Virtual Appliance, network connectivity is limited to the virtual appliance and connectivity from Deep Security components to each individual virtual machines is not required. Benefits of Using the Virtual Appliance Using the Deep Security Virtual Appliance delivers certain benefits over the use of a physical Deep Security Agent. Automatic Protection Generally, deploying one Deep Security Virtual Appliance to each ESXi host is easier than deploying an Agent on multiple virtual machines. With NSX, deployment of Deep Security is done through NSX Manager and applied to the cluster. Any new hosts added to the cluster automatically get Deep Security protection. Simplified Management In some cases, the team managing the infrastructure and the team managing each virtual machine are different (in a Managed Service Provider model, for example). By using a Deep Security Virtual Appliance, the infrastructure team does not require access to the virtual machine to add protection because it can be deployed at the hypervisor level and protect each of the virtual machines. 424 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Improved Scan Performance When the Deep Security Virtual Appliance scans a file, it creates a fingerprint of this file. When files with the same fingerprint are found on other virtual machines, those files no longer need to be scanned which can considerably reduce the overall scan time particularly in situations like when using a Virtual Desktop Infrastructure (VDI). This method of scan caching allows the results of an Anti-Malware scan to be used when scanning multiple machines using the same policy and containing a majority of the same files. Where the workloads are different (such as when protecting multiple servers), the scan cache savings are not as significant. Resource Optimization There can be an increased demand on computing resources when Anti-Malware scans are triggered simultaneously on multiple guest virtual machines on a single physical host, for example, when a scheduled scan is triggered. The result is degradation of service. When scanning is done by the Deep Security Virtual Appliance, the virtual appliance has knowledge of all of the machines it is protecting. When performing Anti-Malware scanning, the virtual appliance can manage resource usage by staggering the launch of the individual scans thereby preventing these scan storms from occurring. Virtual Appliance Deployment Models There are different deployments models for Deep Security that use VMware to provide either hypervisorbased Agentless protection or on-host Agent-based protection. Deep Security previously had a deep integration with VMware vCloud Networking and Security (vCNS). In this deployment architecture, customers could use the Deep Security Virtual Appliance to protect their environment at the hypervisor level, which provided compatibility with Firewall, Intrusion Prevention, Web Reputation, Integrity Monitoring and Anti-Malware. VMware has discontinued general support for vCNS and at the same time released a new virtualization and networking platform called VMware NSX. Administrators still have options on how they approach security for their VMware deployments, but must be aware that Agentless security now requires a transition to VMware NSX. Note: The full capabilities of the Deep Security Virtual Appliance is supported on VMware NSX-T 3.0. NEW © 2020 Trend Micro Inc. Education 425 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Deployments Using NSX for vShield Endpoint NSX 6.2.4 introduced a new default license version of NSX called NSX for vShield Endpoint. This version does not require a license to enable Anti-Malware and Integrity Monitoring functionality. Customers who want to use the default license version of NSX for vShield Endpoint but still require Intrusion Prevention, Firewall, Log Monitoring, Application Control and Web Reputation capabilities of Deep Security must install a software Agent on each virtual machine. This is what is referred to as Combined Mode. Some key points in considering Combined Mode: 426 • Deployment scripts can be used to automate the deployment of the Deep Security Agent using various orchestration tools (Chef, Puppet, etc). Using scripts simplifies the deployment of Agents and also allow activation and assignment of policy. These scripts help to reduce the manual intervention required when deploying the software Agent in the VMware environment. • To specify whether the protection should be provided by the Deep Security Agent or the Deep Security Virtual Appliance in Combined Mode, select an affinity for each of the Deep Security Protection Modules. When you have imported a vCenter into Deep Security Manager, the affinity settings will be available in the Computer or Policy editor, on the Settings > General tab. © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance For each protection module or group of protection modules you can choose from these settings: • Appliance Only: The Protection Module will only be provided by the Deep Security Virtual Appliance, even if there is an Deep Security Agent on the virtual machine. The Agent will never run the Protection Module, even if the Deep Security Virtual Appliance is deactivated or removed. • Appliance Preferred: If there is an activated Deep Security Virtual Appliance for the virtual machine, it will provide the protection. But if the Deep Security Virtual Appliance is deactivated or removed, the Deep Security Agent will provide protection instead. • Agent Only: The Protection Module will only be provided by the Deep Security Agent, even if there is an activated Deep Security Virtual Appliance available. • Agent Preferred: If there is an activated Deep Security Agent on the virtual machine, it will provide the protection. But if there is no activated Agent, the Deep Security Virtual Appliance will provide protection instead. The log inspection and application control modules do not have an affinity setting because they are only available with the Deep Security Agent. When the Anti-Malware module is enabled on Deep Security Agents, the Anti-Malware Solution Platform is downloaded and started as a service. If you do not want this to happen, set AntiMalware affinity to Appliance Only so that even if the Deep Security Virtual Appliance is deactivated, Anti-Malware will not be enabled on the Agents. Note: If you are using the SAP module, keep in mind that it is only available with the Deep Security Agent and it requires that the Anti-Malware protection be Agent-based. Deployments Using NSX Advanced or Enterprise In VMware NSX Advanced or Enterprise deployments, customers can use Deep Security Virtual Appliances to provides Agentless support for Firewall, Intrusion Prevention, Integrity Monitoring, Web Reputation, and Anti-Malware. In this deployment scenario, customers can get the full benefits of Agentless protection in their VMware environments. Deployments Without NSX Customers protecting VMware environments without NSX can use a Deep Security Agent on each of their virtual machines. By using the Deep Security Agent, the VMware environment can be protected using all the Deep Security Protection Module. © 2020 Trend Micro Inc. Education 427 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Protection Anti-Malware Web Reputation Intrusion Prevention Firewall* Integrity Monitoring Log Inspection Application Control Agent-based protection Agentless protection vShield Endpoint for NSX (free) NSX Advanced NSX Enterprise * With the built-in NSX firewall, the Deep Security Firewall will not normally be used. Deploying and Activating the Virtual Appliance Using NSX-V Once VMware NSX-V and ESXi server are prepared, the Deep Security Virtual Appliance can be deployed. The steps involved in deploying the Virtual Appliance include: 1 Importing the Deep Security Virtual Appliance package into Deep Security Manager 2 Adding VMware vCenter to the Deep Security Manager Computers list 3 Installing the Guest Introspection Service on VMware ESXi 4 Installing the Deep Security Service on VMware ESXi 5 Creating an NSX Security Group 6 Creating an NSX Security Policy 7 Applying the NSX Security Policy to the NSX Security Group 8 Activating Deep Security Protection on the virtual machines Importing the Deep Security Virtual Appliance Package into Deep Security Manager Because of the size of the Deep Security Virtual Appliance package, it is recommended that it be downloaded from the Trend Micro Software Download page, then imported manually into Deep Security Manager. In a web browser, type the following URL to access the Deep Security Help Center Software Download page: https://help.deepsecurity.trendmicro.com/software 428 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance On the Long Term Support (LTS) tab, scroll to Appliance section. Click to download the Deep Security Appliance 20.0._____for ESX-x86_64 package and download the .zip file to a location on the hard drive. Once downloaded, log into the Deep Security Manager Web console and click Administration. In the left-hand pane, expand Software > Local Software and click Import. Click Browse to locate the downloaded Deep Security Appliance 20.0._____for ESXx86_64.zip package. © 2020 Trend Micro Inc. Education 429 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Once the import is complete, the appliance installation package will be displayed in the Local Software List. Adding VMware vCenter to Deep Security Manager To manage the security of the virtual machines hosted on the ESXi server with Deep Security agentlessly, with an Agent, or in combined mode, you must add the vCenter to the Computers list in Deep Security Manager. In the Deep Security Manager Web console, click the Computers menu and add a VMware vCenter. Provide the details of the vCenter. 430 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Provide the details of the NSX Manager when prompted. The Add VMware vCenter Wizard will display a successful result message when the vCenter has been imported. The wizard will automatically create two Event-Based Tasks: one activates virtual machines when protection is added and the other deactivates virtual machines when protection is removed. © 2020 Trend Micro Inc. Education 431 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance In the Computers list, expand vCenter. The ESXi clusters and virtual machines are displayed in the list. Installing the Guest Introspection Service on VMware ESXi To use the Deep Security Virtual Appliance for file-based protection such as Anti-Malware and Integrity Monitoring, you must install the Guest Introspection service on your ESXi servers. Guest Introspection offloads file-based scanning to a dedicated secure virtual appliance delivered by VMware partners such as Trend Micro 432 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance In the vSphere Web Client, click Home > Networking & Security > Installation and Upgrades. Click the Service Deployments tab. Add a new service deployment and select Guest Introspection. © 2020 Trend Micro Inc. Education 433 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance When prompted, identify the cluster that contains the ESXi servers and virtual machines to protect. When prompted, identify the network attributes. 434 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Review the settings, and click Finish. vSphere will take a few minutes to install the guest introspection service on your ESXi servers. © 2020 Trend Micro Inc. Education 435 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Installing the Deep Security Service on VMware ESXi Deploying the Trend Micro Deep Security service will enable the Deep Security Virtual Appliance on the ESXi server. Still in the vSphere Web Client, go to Home > Networking & Security > Installation and Upgrades and click the Service Deployments tab once again. Add another new service deployment and select the Trend Micro Deep Security service. 436 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance When prompted, identify the cluster that contains the ESXi servers and virtual machines that you want to protect, and click Next. When prompted, identify the network attributes. © 2020 Trend Micro Inc. Education 437 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Review the settings, and click Finish. vSphere will take a few minutes to install the Deep Security service on your ESXi servers. 438 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Creating an NSX Security Group Still in vSphere Web Client, go to Home > Networking & Security > Service Composer. Click the Security Groups tab. Create a New Security Group. Assign a Name and provide a Description for the security group. © 2020 Trend Micro Inc. Education 439 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance You can restrict membership of virtual machines in this group based on certain filtering criteria if required. To include the virtual image that contains the host that we want to protect, click Virtual Machine from the Object Type menu, and move the client virtual machines to protect to the Selected Objects column. Click Finish to create the new Security Group. 440 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance The Security Groups tab will display the newly listed Security Group. Creating an NSX Security Policy A NSX Security Policy with Deep Security enabled as both an endpoint and as a network service must be created. • If you are using only the Anti-Malware or Integrity Monitoring Modules, you will only need to enable the Guest Introspection service. • If you have NSX Advanced or NSX Enterprise and are also using the Web Reputation, Firewall, or Intrusion Prevention Protection Modules, you will only need to enable the Network Introspection service. © 2020 Trend Micro Inc. Education 441 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Still in the vSphere Web Client, go to Home > Networking and Security > Service Composer and click the Security Policies tab. Create a new Security Policy. Type a Name and Description for the new policy. 442 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance In the Add Guest Introspection Service window, click the green plus sign (+) to add a Guest Introspection Service. Provide the following details for the service, for example • • • • • • • Name: Type a Name for the service Description: Type a description for the service Action: Apply Service Name: Trend Micro Deep Security Service Profile: If you are using event-based tasks to handle the creation and protection of virtual machines, select Default (EBT). If you have synchronized your Deep Security policies with NSX Service Profiles, select the Service Profile that matches the Deep Security policy that you want to apply. State: Enabled Enforce: Yes © 2020 Trend Micro Inc. Education 443 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance If using the NSX firewall, configure the firewall rules you require. Add two Network Introspection Services to the NSX Security Policy: a first one for outbound traffic, and a second one for inbound traffic. Create the first outbound service: • • • • • • • • • 444 Name: Type a name for the first service, preferably one that includes the word Outbound Action: Redirect to service Service Name: Trend Micro Deep Security Profile: Select the NSX Service Profile created previously. Source: Policy's Security Groups Destination: Any Service: Any State: Enabled Log: Do not log © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Create a second inbound service: • • • • • • • • • Name: Type a name for the first service, preferably one that includes the word Inbound Action: Redirect to service Service Name: Trend Micro Deep Security Profile: Select the NSX Service Profile created previously. Source: Any Destination: Policy's Security Groups Service: Any State: Enabled Log: Do not log © 2020 Trend Micro Inc. Education 445 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Both Network Introspection Services are displayed. 446 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance The policy is listed as published. Applying the NSX Security Policy to the NSX Security Group The Security Policy must be applied to the Security Group containing the virtual machines to protect. Still in the vSphere Web Client, click Home > Networking & Security > Service Composer. Click the Security Policies tab and with the new Security Policy selected, click Apply Security Policy. © 2020 Trend Micro Inc. Education 447 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Select the Security Group that contains the virtual machines you want to protect and click OK. The NSX Security Policy is now applied to the virtual machines in the NSX Security Group. When virtual machines are moved into the security group, they will get the NSX Security Group tag and Deep Security Manager will automatically activate the virtual machines and assign the policy to them. Activating Deep Security Protection on the Virtual Machines Like any Deep Security Agent, a Virtual Appliance also needs to be activated in order to communicate with Deep Security Manager. Deep Security Virtual Appliance activation works the same way as Deep Security Agent activation and enables Deep Security Virtual Appliance self-protection, and initiates Virtual Agent instantiation. 448 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Note: If the Deep Security Virtual Appliance is deployed to an unprepared ESXi machine, it cannot be activated and activation attempts would fail. Return to the Deep Security Manager Web console where you can activate the virtual machines in the imported vCenter and apply Deep Security Policies to them. Virtual Agent Activation Like regular Deep Security Agents, Virtual Agents (VA) must be activated before they can provide protection for their virtual machines. Virtual machines can be activated manually by right-clicking on the device in the Computers list in the Deep Security Manager Web console. A Virtual Agent doesn’t actually exist until it is activated. Activation creates the Agent’s subdirectory, under /var/opt/ds_Agent/guests, along with its component files. © 2020 Trend Micro Inc. Education 449 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Viewing Protected Virtual Machines Protected virtual machines, and by extension the virtual Agents that provide protection are displayed in the Deep Security Manager Web console. Click Preview for a computer to view the status. Deep Security Notifier The Deep Security Notifier is a Windows System Tray application which provides local notification when malware is detected or malicious URLs are blocked. It may be installed separately on protected virtual machines, however the Anti-Malware Protection Module must be licensed and enabled on the virtual machine for the Deep Security Notifier to display information. The Notifier displays pop-up user notifications when the Anti-Malware module begins a scan, or blocks malware or access to malicious web pages. The Notifier also provides a console utility that allows the user to view events. Deep Security Virtual Appliance-Related Communication To deploy and manage the Deep Security Virtual Appliance, Deep Security Manager must be able to communicate with the device itself as well as the vCenter server that manages the ESXi server upon which the Deep Security Virtual Appliance is installed. Disruption of either communication is undesirable, but will not actually disrupt protection functionality once it is already in place. Communication between Deep Security Manager and the vCenter Server takes place regularly. It can be time-based or event-based, for example, when a new virtual machine is created in the virtual infrastructure, and vCenter automatically notifies Deep Security Manager, which in turn informs the Deep Security Virtual Appliance to enable protection. 450 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Traffic between the Deep Security Virtual Appliance and Deep Security Manager This is virtually identical to the traffic that would flow between Deep Security Manager and Deep Security Agents and consists of rule updates, log events and heartbeat messages. This communication is initiated according to the heartbeat schedule or upon administrator intervention. Any disruption to the communication will prevent rule updates and event consolidation at the Deep Security Manager. Traffic between vCenter Server and Deep Security Manager Deep Security Manager uses this communication channel to receive virtual machine-related events. This includes virtual machine creation, start and stop events, and vMotion events. Deep Security Manager always stays logged on to vCenter server. If the connection is lost, Deep Security Manager tries to re-establish communication every 10 minutes. Disruptions to this communication during deployment will cause deployment to fail. Any disruptions to this communication during normal operations will prevent Deep Security Manager from detecting the creation of new virtual machines and vMotion events. In addition, virtual machine status indicators on the Deep Security Manager will not be updated. Traffic between ESXi and Deep Security Manager This communication channel only applies during deployment of the Deep Security Virtual Appliance. Any disruption to the communication during deployment will cause the deployment to fail. Deep Security Manager and VMware vCenter Server As discussed previously, Deep Security Manager communicates with vCenter Server to obtain information about the virtual environment it is protecting. Re-configuring vCenter Server Communication Running the Add VMware vCenter wizard from the Computer list ensures that Deep Security Manager has sufficient credentials to establish a relationship with a vCenter Server instance, otherwise, the wizard would fail. In the event that this information changes, administrators can update the information by rightclicking the relevant vCenter Server in the Computers list and clicking Properties. © 2020 Trend Micro Inc. Education 451 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance General This tab defines basic Deep Security Manager to vCenter Server communication. The vCenter Server host information, communication port, and logon credentials can be reconfigured here. NSX Manager This tab the location, port and credentials for configuring NSX Manager. 452 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Network configuration This tab defines the IP address and subnet configuration that Deep Security Virtual Appliance kernel drivers use when they are deployed to ESXi servers. These values should not be modified unless absolutely necessary. Deep Security Manager and vCenter Server Synchronization Deep Security Manager synchronizes its information with vCenter Server constantly to ensure that any changes that occur within the virtual environment are captured, such as the creation of virtual machines, or vMotion events. Although this synchronization occurs automatically, administrators still have the option to synchronize manually. This can be done by right-clicking the vCenter Server in the Computers list and clicking Synchronize Now. © 2020 Trend Micro Inc. Education 453 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Alternately, the information can be synchronized from vCenter Server Properties. Event-based tasks Event-based tasks define system responses for particular situations, such as when a virtual machine is added or moved to a protected ESXi server. These events can trigger tasks such as assigning a policy or relay group. 454 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance The Deep Security Virtual Appliance can instantiate and activate Virtual Agents for virtual machines as they are created and automatically assign a specific security profile. Agentless Anti-Malware Protection The Deep Security Virtual Appliance can provides malware protection for virtual machines without installing any components on them. Real-Time Scanning Real-time scanning uses write-only scan mode. If the Guest Introspection cannot detect that the file is changed, it is not scanned. As applications attempt to access files within the virtual machine, Guest Introspection system drivers detect the Input/Output (I/O) event, and send data about the file being accessed to Deep Security Virtual Appliance for analysis. If malware is detected, Deep Security Virtual Appliance is able to leverage Guest Introspection to prevent the malicious change. On-Demand Scan When performing on-demand scans, Deep Security Virtual Appliance sends the requested list of directories, files and exclusions and then starts receiving the enumerations of events. Each event includes information about a single file including the name and the attributes. To read the file contents, Deep Security Virtual Appliance has to send a separate read request, one per file. After analyzing the file, Deep Security Virtual Appliance can request the server to write the new content, truncate or delete that file. Scan Cache Settings and Concurrent Scan Scan caching can help to enhance Deep Security Virtual Appliance’s Anti-Malware scanning on virtual machines. Sequential scanning is used to avoid scan storms (all virtual machines scanning concurrently using up resources on the ESXi server at the same time) which can have high host CPU impact. © 2020 Trend Micro Inc. Education 455 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance In virtual desktop environments, many of the virtual machines are the same, created from a cloned image. This means that many virtual machines are scanning the same file hundreds of times on every ESXi server. De-duplication helps solve this problem found in Agentless deployments related to VDI environments. A Scan Cache Configuration is a collection of settings that determines Expiry Time of the cache, the use of Update Sequence Numbers (USNs), files to exclude, and files to include. Virtual machines that use the same Scan Cache Configuration also share the same Scan Cache. You can see the list of existing Scan Cache Configurations by going Administration > System Settings > Advanced > Scan Cache Configurations and clicking View Scan Cache Configurations. Deep Security comes with several pre-configured default Scan Cache Configurations. These are implemented automatically by the Virtual Appliance depending the properties of the virtual machines being protected and the types of scan being performed. • Expiry Time: This setting determines the lifetime of individual entries in a Scan Cache. The default recommended settings are one day for Manual (on-demand)/Scheduled Malware Scans, 15 minutes for Real-Time Malware Scans, and one day for Integrity Monitoring Scans. • Use USN (Windows only): This setting specifies whether to make use of Windows NTFS Update Sequence Numbers, which is a 64-bit number used to record changes to an individual file. This option should only be set for cloned VMs. • Files Included and Files Excluded: These fields include regular expression patterns and lists of files to be included in or excluded from the Scan Cache. Files to be scanned are matched against the include list first. Individual files and folders can be identified by name or you can use wildcards (* and ?) to refer to multiple files and / or locations with a single expression. (Use * to represent any zero or more characters, and use question mark ? to represent any single character.) The include and exclude lists only determine whether the scan of the file will take advantage of Scan Caching. The lists will not prevent a file from being scanned in the traditional way. 456 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Scan Cache will attempt to cache certain files that can take longer to scan, instead of how often it is accessed to save on memory and get the best result. There is one cache for on-demand scan, one cache for Real-Time scan, and one cache for Integrity Monitoring Scan. Also, for security reasons, the first 1 KB of file data will get scanned again regardless, when used with Real-Time scan. The gain of using a Scan Cache can be very significant (as high as 20 times better) where strong reductions in input/output volume and Deep Security Virtual Appliance CPU usage have been measured. 1 million cache entries in the Deep Security Virtual Appliance (Memory) uses up approximately 100 MB of space (default policies in Deep Security Virtual Appliance is 500,000 entries). The cache is unique to each Deep Security Virtual Appliance. Quarantining in Anti-Malware A file that has been found contain malware can be encrypted and moved to a special folder as part of a quarantine operation. Each Virtual Agent has its own quarantine folder. If the disk space usage limit is reached, the quarantine action will fail, and the I/O event that triggered the quarantine action will be blocked. Quarantined files will be automatically deleted from a Virtual Appliance under the following circumstances: • If a virtual machine undergoes vMotion, quarantined files associated with that virtual machine will be deleted from the Virtual Appliance. • If a virtual machine is deactivated from the Deep Security Manager, quarantined files associated with that virtual machine will be deleted from the Virtual Appliance. • If a Virtual Appliance is deactivated from the Deep Security Manager, all the quarantined files stored on that Virtual Appliance will be deleted. • If a Virtual Appliance is deleted from the vCenter, all the quarantined files stored on that Virtual Appliance will also be deleted. Agentless Integrity Monitoring Protection Integrity Monitoring also uses the same Guest Introspection components used for Anti-Malware. Unlike full Integrity Monitoring capability that is available with Deep Security Agents, Integrity Monitoring in Deep Security Virtual Appliance is limited to monitoring files and registry settings, and only works with Virtual Machines with Windows operating systems. VMware High Availability VMware enables the live migration of running virtual machines from one physical server to another with zero downtime, continuous service availability, and transaction integrity through a feature called vMotion. vMotion is typically used for the following purposes: • Virtual machines can be moved automatically and transparently between ESXi servers in a datacenter to distribute the processing load • Virtual machines can be automatically migrated to other ESXi servers when a particular ESXi server is being brought offline for maintenance © 2020 Trend Micro Inc. Education 457 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Deep Security Virtual Appliances can protect virtual machines even if they move between ESXi servers, provided that the destination server has a Deep Security Virtual Appliance installed. Note: By design, the Deep Security Virtual Appliance cannot be migrated to another ESXi server using vMotion. If you use High Availability (HA) features in VMware, make sure that the High Availability environment is established before you begin installing Deep Security. Deep Security must be deployed on all ESXi hypervisors (including the ones used for recovery operations). Deploying Deep Security on all hypervisors will ensure that protection remains in effect after a HA recovery operation. Virtual Appliances must be pinned to their particular ESXi host. You must actively change the Distributed Resource Scheduler settings for all the Virtual Appliances to Manual or Disabled (recommended) so that they will not be vMotioned by the DRS. If a Virtual Appliance (or any virtual machines) is set to Disabled, vCenter Server does not migrate that virtual machine or provide migration recommendations for it. This is known as pinning the virtual machine to its registered host. This is the recommended course of action for Virtual Appliances in a Distributed Resource Scheduler environment. Note: If a virtual machine is vMotioned by the Distributed Resource Scheduler from an ESXi protected by a Deep Security Virtual Appliance to an ESXi that is not protected by a Deep Security Virtual Appliance, the virtual machine will become unprotected. If the virtual machine is subsequently vMotioned back to the original ESXi, it will not automatically be protected again unless you have created an Event-based Task to activate and protect computers that have been vMotioned to an ESXi with an available Deep Security Virtual Appliance. You can use Deep Security Manager to create an Event-Based Task to activate new machines or vMotion machines to a protected ESXi host. 1 Log on to the Deep Security Manager Web console. 2 Click the Administration tab and click Event-Based Task > New > Computer created by system. 3 Enable the Activate computer after 1 minutes option. 4 Assign a Security Profile and then click Select the Security Profile. 5 Configure a condition of Appliance Protection Available is True. This means that if Deep Security Virtual Appliance is online on the ESXi host where the virtual machine is created or moved, Agentless protection will be automatically activated. 458 © 2020 Trend Micro Inc. Education Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Moving Deep Security Virtual Appliance Data Each protected virtual machine has a corresponding Virtual Agent. When a virtual machine is transferred to another ESXi server, its Virtual Agent must also be replicated at the Deep Security Virtual Appliance on the receiving ESXi server. During vMotion, the data that defines a virtual Agent’s identity is compressed into a tar file and then transferred to the destination ESXi server using the default virtual machine communication channel. Data transferred includes: • Certificates used for Virtual Appliance-Deep Security Manager communication (ds_guest_Agent.crt, ds_guest_Agent_dsm.crt) • • • Anti-Malware component version information System event database (ds_guest_Agent.db) Miscellaneous vMotion-related data This communication channel, is limited to files that are up to 2KB. This is a concern for the baseline database (si.db) used for Integrity Monitoring, which can become very large depending upon the rules that are applied to the virtual machine. For this reason, Integrity Monitoring-related data is transferred through an alternative, proprietary Trend Micro channel involving a Deep Security Relay. When migrating an Integrity Monitoring-protected virtual machine, the Deep Security Virtual Appliance does the following: 1 Encrypts the Integrity Monitoring database on the Deep Security Virtual Appliance. 2 Includes the keys for decrypting the database into the *.tar file that is transferred using the default virtual machine channel. 3 Uploads the database to the Deep Security Relay. 4 Once the transfer is complete, the virtual Agent has 10 minutes to: • • Re-locate the Deep Security Relay to which it uploaded its Integrity Monitoring database. Download and decrypt the database. If the Deep Security Relay is not able to download its database within this 10 minute window, or if some other aspect of the transfer fails, then the virtual Agent will rebuild its baseline. © 2020 Trend Micro Inc. Education 459 Appendix B: Protecting Virtual Machines Using the Deep Security Virtual Appliance Review Questions 1 Which Protection Modules are not supported in Agentless implementations? 2 What VMware components are required for Deep Security to be installed in an Agentless implementation? 3 Describe the purpose of Combined Mode? 460 © 2020 Trend Micro Inc. Education Appendix C: Troubleshooting Common Deep Security Issues Diagnostic Logging in Deep Security Manager To help diagnose issues related to Deep Security, diagnostic logging can be enabled. While diagnostic logging is running, Deep Security Manager will display the message Diagnostic Logging enabled on the status bar. If you changed the default options, the status bar will display the message Non default logging enabled upon diagnostic logging completion. Best Practice: Don't enable diagnostic logging unless recommended by your support provider. Diagnostic logging can consume large amounts of disk space and increase CPU usage. To enable diagnostic logging, access the Deep Security Manager Web console and click the Administration menu. Click System Information in the left-hand frame and click Diagnostic Logging. © 2020 Trend Micro Inc. Education 461 Appendix C: Troubleshooting Common Deep Security Issues Select the logging details from the list including the time period, the options and the size of the log files. The resulting log file are stored in the following folder: C:\Program Files\Trend Micro\Deep Security Manager\serverx.log The size of the log files and the number of files created will depended on the Maximum log file size and Maximum number of log files values indicated. 462 © 2020 Trend Micro Inc. Education Appendix C: Troubleshooting Common Deep Security Issues Creating a Diagnostic Package for Deep Security Agents Diagnostic packages can help support personnel to investigate customer issue by including the selected traffic, configuration settings, system information and Deep Security Agent status in a *.zip file that can be analyzed offline. When generating the diagnostic package through the Deep Security Manager Web console, a list of items to include in the file is displayed in the Wizard. When creating the diagnostic package from the Command Prompt, a default collection of files is included. © 2020 Trend Micro Inc. Education 463 Appendix C: Troubleshooting Common Deep Security Issues Creating a Diagnostic Package in the Deep Security Manager Web Console You can create a diagnostic package using the Deep Security Manager Web console. From the Details window for the selected computer, click Overview in the left-hand pane and on the Actions tab, click Create Diagnostic Package. In the Diagnostic Package Wizard, select the type of information to include in the zipped package: Creating a Diagnostic Package from the Command Line You can also create a diagnostic package from the computer you want to obtain information about. Open the Command Prompt on the server protected by a Deep Security Agent, change to the Agent main directory and run the following command: dsa_control -d 464 © 2020 Trend Micro Inc. Education Appendix C: Troubleshooting Common Deep Security Issues A *.zip file is created in the following folder: ...\Documents and Settings\All Users\Application Data\Trend Micro\ Deep Security Agent\diag Note: The path may vary depending on the version of your operating system. The diagnostic package includes the Agent configuration files, event databases, system information and any intercepted traffic. Creating a Diagnostic Package for Deep Security Manager Similarly to creating diagnostic packages for the Deep Security Agents, there are also two ways in which to create a diagnostic package for Deep Security Manager. Creating a Diagnostic Package in the Deep Security Manager Web Console You can create a diagnostic package from the Deep Security Manager Web console. Sign in and click the Administration menu. Click System Information in the left-hand pane and click Create Diagnostic Package. © 2020 Trend Micro Inc. Education 465 Appendix C: Troubleshooting Common Deep Security Issues In the Diagnostic Package Wizard, select the type of information to include in the diagnostic package: Creating a Diagnostic Package from the Command Line You can also create a diagnostic package by opening a command prompt on the Deep Security Manager server and entering the following: dsm_c –action diagnostic The Deep Security Manager diagnostic package is created as a *.zip file in the installation folder. 466 © 2020 Trend Micro Inc. Education Appendix C: Troubleshooting Common Deep Security Issues Troubleshooting Offline Agents A computer status of Offline or Managed (Offline) means that the Deep Security Manager hasn't communicated with the agent's instance for some time and has exceeded the missed heartbeat threshold. The status change can also appear in alerts and events. Potential Causes Heartbeat connections can fail because: • The agent is installed on a workstation or other computer that has been shut down. If you are using Deep Security to protect computers that sometimes get shut down, make sure the policy assigned to those computers does not raise an alert when there is a missed heartbeat. In the policy editor, go to Settings > General > Number of Heartbeats that can be missed before an alert is raised and change the setting to Unlimited. • • • • • Firewall, IPS rule, or security groups block the heartbeat port number • Amazon WorkSpace computer is being powered off, and the heartbeat interval is fast, for example, one minute; in this case, wait until the WorkSpace is fully powered off, and at that point, the status should change from Offline to VM Stopped • • • • DNS was down, or could not resolve the Deep Security Manager's host name Bi-directional communication is enabled, but only one direction is allowed or reliable Computer is powered off Computer has left the context of the private network This can occur if servers cannot connect to Deep Security Manager at their current location. Guest Wi-Fi, for example, often restricts open ports, and has NAT when traffic goes across the Internet Deep Security Manager, the agent, or both are under very high system resource load Deep Security Agent process might not be running Certificates for mutual authentication in the SSL or TLS connection have become invalid or revoked © 2020 Trend Micro Inc. Education 467 Appendix C: Troubleshooting Common Deep Security Issues • Deep Security Agent's or Deep Security Manager's system time is incorrect (required by SSL/ TLS connections) • • • A Deep Security rule update is not yet complete, temporarily interrupting connectivity • If you are using manager-initiated or bi-directional communication, and are having communication issues, we strongly recommend that you change to agent-initiated activation (see Use agent-initiated communication with cloud accounts). On AWS EC2, ICMP traffic is required, but is blocked On Solaris 11, the agent was upgraded from 9.0 to 11.0 directly without first being upgraded to 9.0.0-56 Possible Solutions To troubleshoot the error, verify that the Deep Security Agent is running, and then that it can communicate with Deep Security Manager. • On the computer with Deep Security Agent, verify that the Trend Micro Deep Security Agent service is running. Method varies by operating system. - On Windows, open the Microsoft Windows Services Console (services.msc) or Task Manager. Look for the service named ds_agent. - On Linux, open a terminal and enter the command for a process listing. Look for the service named ds_agent or ds-agent, such as: sudo ps -aux | grep ds_agent sudo service ds_agent status • On Solaris, open a terminal and enter the command for a process listing. Look for the service named ds_agent, such as: sudo ps -ef | grep ds_agent sudo svcs -l svc:/application/ds_agent:default • If agents connect to the Deep Security Manager via its domain name or hostname, not its IP address, test the DNS resolution: nslookup [manager domain name] If the test fails, verify that the agent is using the correct DNS proxy or server (internal domain names can't be resolved by a public DNS server such as Google or your ISP). If a name such as dsm.example.com cannot be resolved into its IP address, communication will fail, even though correct routes and firewall policies exist for the IP address. • If the computer uses DHCP, in the computer or policy settings, in the Advanced Network Engine area, you might need to enable Force Allow DHCP DNS • • Allow outbound ports (agent-initiated heartbeat) Telnet to required port numbers on Deep Security Manager to verify that a route exists, and the port is open: telnet [Deep_Security_Manager_IP]:4120 Telnet success proves most of the same things as a ping: that a route and correct firewall policy exist, and that Ethernet frame sizes are correct. (Ping is disabled on computers that use the default security policy for Deep Security Manager. Networks sometimes block ICMP ping and traceroute to block attackers' reconnaissance scans. So usually, you can't ping the Manager to test.) 468 © 2020 Trend Micro Inc. Education Appendix C: Troubleshooting Common Deep Security Issues If telnet fails, trace the route to discover which point on the network is interrupting connectivity. Methods vary by operating system. On Linux, enter the command: traceroute [agent IP] On Windows, enter the command: tracert [agent IP] Adjust firewall policies, routes, NAT port forwarding, or all three to correct the problem. Verify both network and host-based firewalls, such as Windows Firewall and Linux iptables. For an AWS EC2 instance, see Amazon's documentation on Amazon EC2 Security Groups for Linux Instances or Amazon EC2 Security Groups for Windows Instances. For an Azure VM instance, see Microsoft's Azure documentation on modifying a Network Security Group. If connectivity tests from the agent to the manager succeed, then next you must test connectivity in the other direction. (Firewalls and routers often require policy-route pairs to allow connectivity. If only 1 of the 2 required policies or routes exist, then packets will be allowed in one direction, but not the other.) • • Allow inbound ports (manager-initiated heartbeat) On the Deep Security Manager, ping the Deep Security Agent and telnet to the heartbeat port number to verify that heartbeat and configuration traffic can reach the agent: ping [agent IP] telnet [agent IP]:4118 If the ping and telnet fail, use the following command to discover which point on the network is interrupting connectivity.: traceroute [agent IP] Adjust firewall policies, routes, NAT port forwarding, or all three to correct the problem. If IPS or firewall rules are blocking the connection between the Deep Security Agent and the Deep Security Manager, then the manager cannot connect in order to unassign the policy that is causing the problem. To solve this, enter the command on the computer to reset policies on the agent: dsa_control -r You must deactivate, then re-activate the Agent in the Deep Security Manager web console after running this command. Troubleshooting Deep Security Agent Activation Failures When trying to activate an agent, the Deep Security Agent may return an Activation Failed error message. Possible Solutions • Check the description of the error why the activation failed. Most of the time, the problem is self-explanatory. © 2020 Trend Micro Inc. Education 469 Appendix C: Troubleshooting Common Deep Security Issues • • Check if the Deep Security Manager is able to resolve the hostname or FQDN of the agent. • Check and make sure that the system time for Deep Security Agent and Deep Security Manager are synchronized. • Check the Deep Security Agent and make sure that it is not activated or registered to another Deep Security Manager. Check if the Agent is able to resolve the hostname or FQDN used by the server. You can find the Deep Security Manager name used for communication by logging into the Deep Security Manager Web console and going to System > System Information > System Activity > Deep Security Manager object. To check if DSA is activated or not, go to the following folder: ...\Program Files\Trend Micro\Deep Security Agent Look for these three (3) files: config.bin ds_agent.config ds_agent_dsm.crt If these files are available, it means that the agent is already activated. Alternatively, open the ds_agent_dsm.crt file, and go to the Details tab to verify the Deep Security Manager where the Agent is activated from • If the Deep Security Manager where an Agent is registered is no longer available, deactivate the Deep Security Agent. Open a command prompt and navigation to the following folder: ...\Program Files\Trend Micro\Deep Security Agent Run the following command to reset and deactivate the agent: dsa_control.exe /r The message Agent reset successfully appears after successfully completing the command. Re-activate the agent with the following command: dsa_control.exe /a dsm://<hostname>:4120/ The message Command Session Completed appears after successfully completing the command • If you encounter an error when activating the Agent from the Deep Security Manager Web Management console, check the Agent system events for any error message. If you encountered an error when activating the Agent locally, enable additional logging to determine the cause of the activation error. In the C:\Windows folder, create a file named ds_agent.ini. Add this parameter to the file to enable the debug: trace=* Activate the agent using the command line method and check the log file. 470 © 2020 Trend Micro Inc. Education Appendix C: Troubleshooting Common Deep Security Issues Troubleshooting High CPU usage Computers protected by Deep Security Agent are experiencing high CPU usage. Possible Solutions • Verify that the Trend Micro Deep Security Agent process (ds_agent.exe on Windows) has unusually high CPU usage - On Windows: Check Task Manager On Linux and HP-UX, type the following command: top - On Solaris, type the following command: prstat - On AIX, type the following command: topas • • Verify that the agent is updated to the latest version Apply the best practices for performance with Anti-Malware - Reserve an appropriate amount of disk space for storing identified malware files. The space that you reserve applies globally to all computers: physical machines, virtual machines, and Deep Security Virtual Appliances. The setting can be overridden at the policy level and at the computer level If you are using a Deep Security Virtual Appliance to protect virtual machines, all identified files from the protected virtual machines will be stored on the virtual appliance. As a result, you should increase the amount of disk space for identified files on the virtual appliance - Exclude files from real-time scans if they are normally safe but have high I/O, such as databases, Microsoft Exchange quarantines, and network shares - Do not scan network directories - Reduce the CPU impact of malware scans by setting CPU Usage to Medium (Recommended; pauses between scanning files) or Low (pauses between scanning files for a longer interval than the medium setting) - Create a scheduled task to run scans at a time when CPU resources are more readily available - In the virtual machine Scan Cache, select a Real-Time Scan Cache Configuration. If scans are not frequent, increase the Expiry Time (avoid repeated scans) - Use agentless deployments so that CPU usage is in one centralized virtual appliance, not on every computer - Reduce or keep small default values for the maximum file size to scan, maximum levels of compression from which to extract files, maximum size of individual extracted files, maximum number of files to extract, and OLE Layers to scan Do not use Smart Scan if the computer doesn't have reliable network connectivity to the Trend Micro Smart Protection Network or your Smart Protection Server Most malware is small, and nested compression indicates malware. But if you don't scan large files, there is a small risk that Anti-Malware won't detect some malware. You can mitigate this risk with other features such as integrity monitoring © 2020 Trend Micro Inc. Education 471 Appendix C: Troubleshooting Common Deep Security Issues - • Use multi-threaded processing for manual and scheduled scans (real-time scans use multi-threaded processing by default). Multi-threaded processing is effective only on systems that support this capability. Apply the best practices for performance with Intrusion Prevention: - Include packet data in the event log only during troubleshooting - Don't assign more than 300 rules. To minimize the number of required rules, ensure all available patches are applied to the computer operation system and any third-party software that is installed - Do not monitor HTTP responses from the web server, especially if the policy has many signatures applied - When an agent is assigned a large number of Intrusion Prevention rules, the size of the configuration package can exceed the maximum allowed size. When the allowed size is exceeded, the status of the agent changes to Agent configuration package too large and the event message Configuration package too large appears. Assign only Intrusion Prevention rules that apply to the computer's OS and applications. Apply only the Intrusion Prevention rules that a recommendation scan recommends and remove any rules from the computer or the assigned policy that are recommended for unassignment There is a configuration limit of 20 MB in Windows 32-bit platform because it has smaller kernel memory available. For other platforms, the limit is 32 MB. • If you have just enabled Application Control, wait until the initial baseline ruleset is complete. Time required varies by the number of files on the file system. The CPU usage should decrease. • If a recommendation scan is being performed, try running scans during a time when the computer is less busy, or allocating more virtual CPUs if the computer is a virtual machine. • Temporarily disable each protection feature (Anti-Malware etc.), one at a time. Check CPU usage each time to determine if a specific module is the cause. • If high CPU usage still continues, try temporarily stopping the agent. Verify that the issue stops when the Agent is stopped. If it does, collect diagnostic information and give it to your support provider. Troubleshooting Security Update Failures Connectivity issues between the Deep Security Relay and the ActiveUpdate sources may cause security updates on Deep Security Agents to fail. Possible Solutions • To verify that a route exists between the relay server and its Active Update source or proxy server and that the relay port number is open. Enter the command to verify the route: telnet [relay IP] [port number] If the telnet fails, verify that a route exists and that firewall policies (if any) allow the traffic by pinging or using traceroute. Also verify that the port number is open, and doesn't have a port conflict. • 472 To verify that the DNS server can resolve the domain name of the relay, enter the following command: © 2020 Trend Micro Inc. Education Appendix C: Troubleshooting Common Deep Security Issues nslookup [relay domain name] If the test fails, verify that the agent is using the correct DNS proxy or server (internal domain names can't be resolved by a public DNS server such as Google or your ISP) • If you are using Deep Security as a Service, you might not be using your own relays; instead, you will be using the relays that are built into the service: relay.deepsecurity.trendmicro.com. • If you use a proxy server confirm that the proxy settings in the Deep Security Manager Web console are correct • To determine if your Deep Security settings are blocking connectivity, unassign the current policy © 2020 Trend Micro Inc. Education 473 Appendix C: Troubleshooting Common Deep Security Issues 474 © 2020 Trend Micro Inc. Education Appendix D: What's New in Deep Security 20 The appendix provides an overview of the new features and functionality available in the Deep Security 20. Some of these features may have been initially introduced in the Deep Security 12 Feature Releases. New Database Support Additions to supported databases for Deep Security Manager 20 include: • • • Oracle 18 and Oracle 19c PostgreSQL 11 SQL Server 2019 New Manager Platform Support Additions to supported platforms for Deep Security Manager 20 include: • • Red Hat Enterprise Linux 8 (64-bit) Windows Server 2019 (64-bit) Platforms no longer supported for Deep Security Manager 20 include: • Red Hat Enterprise Linux 6 (64-bit) New Agent Platform Support New platforms with a supported Deep Security 20 Agent include: • • • • • • • Ubuntu 20.04 (64-bit) Cloud Linux 8 (64-bit) Debian Linux 10 (64-bit) Oracle Linux 8 (64-bit) SUSE Linux Enterprise Server 15 (64-bit) Red Hat Enterprise Linux 8 (64-bit) CentOS 8 (64-bit) © 2020 Trend Micro Inc. Education 475 Appendix D: What's New in Deep Security 20 Google Cloud Platform Support Google Cloud Platform (GCP) support was introduced in a Deep Security 12 Feature Release. You can now view new GCP instances that come online or are removed, and which instances have protection. If you are using multiple clouds on-premise and in your data center, Deep Security can provide visibility for all of your environments. This feature is available for virtual machines that have Deep Security Agent 12.0 or later installed. Virtual machines are organized into projects, which lets you easily see which GCP Virtual machines are protected and which are not. Policies can be assigned automatically based on the GCP Instance Labels, GCP Network Tags, and other instance attributes while auto-scaling up. Related GCP instances can be grouped in Smart Folders based on the GCP instance labels, GCP network tags, and other instance attributes to simplify the management. Upgrade on Activation Upgrade on activation is a new feature that instructs Deep Security Agents to automatically upgrade on activation if the current version of the Agent does not match the latest compatible version of the Agent available for that platform in Deep Security Manager. Upgrade on activation was supported for Linux platforms only in the LTS release of Deep Security 12. Support for Windows is now available in Deep Security 20. Agent Version Control Agent Version Control allows administrators to define the specific versions of Deep Security Agents that will be deployed when upgrading Deep Security Agents, using deployment scripts or using the Automatically upgrade agents on activation feature. This allows security operations teams to declare exactly what Agents will be used at any given time. As new Agents are released by Trend Micro, your security operations team can test them in controlled environments before changing the version control settings to expose the new Agents to downstream applications teams in their production environment. Reboot Requirement Removed for Agent Upgrade Previously, there were several situations where a Windows server would require a reboot for a new agent to complete the upgrade. The need for the reboot has been completely removed, enabling the application to not be impacted as result of upgrading a Deep Security Agent. Anti-Malware Protection During an Agent Upgrade The Deep Security Agent Anti-Malware driver can be upgraded without rebooting your computers. By removing the need to reboot your computer, the friction involved with operation efforts is drastically reduced. 476 © 2020 Trend Micro Inc. Education Appendix D: What's New in Deep Security 20 Note: There are still scenarios where a reboot is required, for example when the system events 1533: A computer reboot is required to complete an Anti-Malware cleanup or restoration task or 1534: A computer reboot is required to complete Anti-Malware protection occur. Agentless Anti-Malware for NSX-T Deep Security 20 includes support for the latest VMware Service Insertion and Guest Introspection technologies which enables you to protect your guest virtual machines using Intrusion Prevention, Web Reputation, Firewall, Integrity Monitoring and recommendation scans on NSX-T hosts with agentless protection. Deep Security Manager now sends guest virtual machines’ network configuration to all Deep Security Virtual Appliances that are under the same cluster. The effect is that the appliances can now maintain the protection of guest machines that use the network features during and after a vMotion migration from one ESXi host to another under the same cluster. This feature only applies to NSX-T environments where the guest machine is using an assigned policy without network features overrides. Also, by introducing the Data Plane Development Kit (DPDK) in Deep Security 20, network throughput is three times faster when compared with prior technology. Finally, you can add multiple vCenters in the Deep Security Manager, and associate them to the same NSX-T Data Center. An overwrite warning message is displayed if you are using NSX Data Center for vSphere (NSX-V), which does not support the use of multiple vCenters, or if the NSX-T Manager has being registered with another Deep Security Manager cluster. Hide AWS Host Groups A new Deep Security 20 option allows AWS host groups to now be hidden on the Computers page. Instead of showing all host groups, empty host groups will be represented by a greyed out, italicized count. This feature can be toggled on and off by right clicking on Computers in the host group tree. This feature was developed to accelerate the load time of Computers page. Hiding empty host groups also makes the host group tree more streamlined. Empty host groups are hidden by default. Search Cloud Instance Metadata Deep Security 20 adds the ability to do a simple search or advanced search for Cloud Instance Metadata on the Computers page. This allows you to easily find workloads with specific labels, network tags, and more. © 2020 Trend Micro Inc. Education 477 Appendix D: What's New in Deep Security 20 AWS Manager-generated External ID Previously when using a cross-account role for authentication, Deep Security required two pieces of information: a role ARN, and an external ID trusted by the role. This has now changed to a new process where Deep Security provides the external ID, and requires that the role provided has included this external ID in its IAM trust policy. This change provides stronger security in shared Deep Security environments, and ensures that strong external IDs are always used. Agent Integrity Check Deep Security 20 verifies the digital signature on the Deep Security Agent package to ensure that the software files have not been modified or tampered with since the time of signing. Deep Security Manager API updates The Deep Security Manager API has been updated with the following: Automate Google and AWS accounts Deep Security 20 provides REST APIs to allow you to automate the adding of both AWS and Google Cloud accounts into Deep Security. New Anti-malware Features A Deep Security update introduces four new anti-malware features: Windows Antimalware Scan Interface (AMSI) The Windows Antimalware Scan Interface (AMSI) is an interface provided by Microsoft in Windows 10 and newer. Deep Security leverages AMSI to help detect malicious scripts. Behavior Monitoring Action Behavior Monitoring includes a new Action to take list, choose the remediation action that you want Deep Security to take when it detects malware: • • 478 ActiveAction (recommended): Use the action that ActiveAction determines. Pass: Allows full access to the infected file without doing anything to the file. (An AntiMalware Event is still recorded.) © 2020 Trend Micro Inc. Education Appendix D: What's New in Deep Security 20 Predictive Machine Learning Action When Predictive Machine Learning is enabled, you can now choose the remediation action that you want Deep Security to take when it detects malware: • Quarantine (recommended): Moves the infected file to the quarantine directory on the protected computer. • Pass: Allows full access to the infected file without doing anything to the file. (An AntiMalware Event is still recorded.) • Delete: On Linux, the infected file is deleted without a backup. On Windows, the infected file is backed up and then deleted. Behavior Monitoring on Linux Behavior Monitoring capabilities are now supported on Linux server. Database Encryption Editing a configuration file is no longer necessary for enabling a secure encrypted connection with the database. If the database server is configured to require a secure encrypted connection, Deep Security Manager will use the encrypted connection. The mechanisms for creating the encrypted connection are built into the database library that Deep Security Manager is based on, therefore, the server certificate does not need to be imported nor any configuration file updated. © 2020 Trend Micro Inc. Education 479 Appendix D: What's New in Deep Security 20 480 © 2020 Trend Micro Inc. Education Appendix E: FIPS 140-2 Support in Deep Security Federal Information Processing Standard (FIPS) is a set of U.S. government standards for cryptographic modules. Deep Security provides settings that enable cryptographic modules to run in a mode that is compliant with FIPS 140-2 standards. Trend Micro obtained certification for the Java crypto module and Native crypto module (OpenSSL). There are some differences between a Deep Security deployment running in FIPS mode instead of nonFIPS mode. These Deep Security features are not available when operating in FIPS mode: • Agentless protection, including connecting to an NSX Manager and settings related to the Deep Security Virtual Appliance • Connecting to a Microsoft Azure account using the Quick and Advanced methods in Add Azure Account. Key Pair Generation for use with Azure is also not available with FIPS mode. • • • Connecting to virtual machines hosted on VMware vCloud. • • • • Deep Security Scanner (integration with SAP Netweaver) Multi-tenant environment Load balancer settings (From the Administration menu, click System Settings > Advanced > Load Balancers) Connected Threat Defense Identity provider support via SAML 2.0 When configuring SMTP settings, the STARTTLS option is not available. Enable FIPS Mode for Deep Security Manager on Windows Perform the following steps to enable FIPS mode on an installation of Deep Security Manager running on Windows: 1 In Windows Services stop the Trend Micro Deep Security Manager service. 2 In the Windows Command Prompt, navigate to the following folder: C:\Program Files\Trend Micro\Deep Security Manager 3 Type the following command to enable FIPS mode: dsm_c -action enablefipsmode 4 Restart the Deep Security Manager service. Note: FIPS mode must also be enabled on the Windows operating systems you are protecting, as well as the database server used by Deep Security. © 2020 Trend Micro Inc. Education 481 Appendix E: FIPS 140-2 Support in Deep Security Enable FIPS mode for Deep Security Manager on Linux Perform the following steps to enable FIPS mode on an installation of Deep Security Manager running on Linux: 1 In the Linux Terminal navigate to the following folder: /opt/dsm 2 Type the following command to stop the Deep Security Manager service: service dsm_s stop 3 Type the following command to enable FIPS mode: dsm_c -action enablefipsmode 4 Type the following command to restart the Deep Security Manager service: service dsm_s start Note: 482 FIPS mode must also be enabled on the Linux operating systems you are protecting, as well as the database server used by Deep Security. © 2020 Trend Micro Inc. Education CHAPTER 1 Trend Micro™ Deep Security™ 20 Training for Certified Professionals Lab Guide © 2020 Trend Micro Inc. Education Copyright © 2021 Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, InterScan, VirusWall, ScanMail, ServerProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Portions of this manual have been reprinted with permission from other Trend Micro documents. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted. Information in this document is subject to change without notice. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Released: February 18, 2021 Trend Micro Deep Security 20 Software Courseware v1.1 © 2020 Trend Micro Inc. Education Trend Micro Deep Security 20 Training for Certified Professionals - Lab Guide Lab 1: Accessing the Deep Security Lab Environment .............................................................1 Exercise 1: Access the Product Cloud Lab Environment ................................................................................. 3 Lab 2: Deploying Deep Security Agents .....................................................................................9 Exercise 1: Import the Deep Security Agent Software into Deep Security Manager ................................ 9 Exercise 2: Export the Deep Security Agent Installer..................................................................................... 13 Exercise 3: Install a Deep Security Agent Manually ........................................................................................ 13 Exercise 4: Install a Deep Security Agent Using a Deployment Script ....................................................... 17 Exercise 5: Install a Deep Security Agent Using the Command Line ........................................................ 20 Exercise 6: Add the Task column ....................................................................................................................... 20 Exercise 7: Add Devices to the Computers List................................................................................................ 21 Lab 3: Deploying a Deep Security Relay .................................................................................. 27 Exercise 1: Enable a Deep Security Relay .......................................................................................................... 27 Lab 4: Protecting Servers from Malware ................................................................................. 31 Exercise 1: Create a New Malware Scan Configuration .................................................................................. 31 Exercise 2: Create a New Policy .......................................................................................................................... 34 Exercise 3: Apply the Policy to a Computer ..................................................................................................... 35 Exercise 4: Test Agent-Based Malware Protection and Quarantine .......................................................... 37 Exercise 5: Test Agent-Based Grayware/Spyware Protection ................................................................... 40 Exercise 6: Enable Predictive Machine Learning ............................................................................................. 41 Lab 5: Blocking Malicious Web Sites ......................................................................................... 45 Exercise 1: Modify a Policy to Activate Web Reputation Protection ......................................................... 45 Exercise 2: Access Sample Web Sites ............................................................................................................... 46 Lab 6: Filtering Traffic Using Firewall Rules ............................................................................ 51 Exercise 1: Perform a Port Scan ...........................................................................................................................51 Exercise 2: Enable the Firewall Protection Module on the Computer........................................................ 53 Exercise 3: Create a Firewall Rule to Deny Incoming Traffic ...................................................................... 54 Exercise 4: Create a Firewall Rule to Force Allow Incoming Telnet Connections From a Single Host........................................................................................................................... 58 Lab 7: Protecting Servers From Vulnerabilities ...................................................................... 61 Exercise 1: Run a Recommendation Scan ...........................................................................................................61 Exercise 2: Enable Intrusion Prevention Protection and Apply an Additional Rule .............................. 64 Exercise 3: Test Intrusion Prevention Protection .......................................................................................... 65 Lab 8: Blocking Application Traffic with Intrusion Prevention Rules ............................... 67 Exercise 1: Block Internet Explorer .....................................................................................................................67 Lab 9: Detecting Changes to Protected Servers ................................................................... 73 Exercise 1: Create an Object to Monitor ............................................................................................................ 73 Exercise 2: Create a New Integrity Monitoring Rule ...................................................................................... 73 Exercise 3: Generate Integrity Monitoring Events.......................................................................................... 76 Exercise 4: Deploy an Additional Integrity Monitoring Rule ........................................................................ 78 Exercise 5: Generate Integrity Monitoring Events........................................................................................ 80 © 2021 Trend Micro Inc. Education 1 Trend Micro Deep Security 20 Training for Certified Professionals - Lab Guide Lab 10: Blocking Unapproved Software ................................................................................... 83 Exercise 1: Activate Application Control Protection .......................................................................................83 Exercise 2: Install a New Application ................................................................................................................ 85 Lab 11: Inspecting Logs on Protected Servers ........................................................................89 Exercise 1: Create a New Log Inspection Rule ................................................................................................ 89 Exercise 2: Generate Log Inspection Events................................................................................................... 90 Exercise 3: Scan for Recommendations ........................................................................................................... 94 Lab 12: Accessing Deep Security Through the Application Programming Interface .... 97 Exercise 1: Create an API key ...............................................................................................................................97 Exercise 2: Access the API Reference .............................................................................................................. 98 Exercise 3: Use the API to List Computer Details ......................................................................................... 100 Exercise 4: Use the API to Create a Group ..................................................................................................... 103 Lab 13: Integrating Deep Security With Connected Threat Defense .................................. 111 Exercise 1: Integrate Deep Security With Apex Central ..................................................................................111 Exercise 2: Integrate Deep Discovery Analyzer with Apex Central............................................................ 112 Exercise 3: Add Deep Discover Analyzer and Deep Security to the Apex Central Product Directory ............................................................................................................................. 114 Exercise 4: Configure Deep Security for Connected Threat Defense....................................................... 116 Exercise 5: Create a Malware Scan Configuration......................................................................................... 118 Exercise 6: Enable Connected Threat Defense............................................................................................... 118 Exercise 7: Submit a File to Deep Discovery For Analysis ........................................................................... 119 Exercise 8: Track the Submission ....................................................................................................................... 121 Appendix Lab: Activating and Managing Multiple Tenants ................................................ 125 Exercise 1: Enable Multi-Tenancy ...................................................................................................................... 125 Exercise 2: Create Multiple Tenants................................................................................................................. 128 Exercise 3: Lock Down Tenants......................................................................................................................... 130 Exercise 4: Add Computers to a Tenant.......................................................................................................... 135 Appendix Lab: Configuring Agentless Protection ................................................................ 137 Exercise 1: Verify the Import of the Deep Security Virtual Appliance Package into Deep Security Manager ....................................................................................................................137 Exercise 2: Add VMware vCenter to the Computers List............................................................................ 138 Exercise 3: Install the Guest Introspection Service on VMware ESXi ...................................................... 142 Exercise 4: Install the Trend Micro Deep Security Service on VMware ESXi......................................... 147 Exercise 5: Create an NSX Security Group..................................................................................................... 150 Exercise 6: Create an NSX Security Policy ..................................................................................................... 154 Exercise 7: Apply the NSX Security Policy to the NSX Security Group ................................................... 160 Exercise 8: Apply Deep Security Protection to the Virtual Machines...................................................... 162 2 © 2021 Trend Micro Inc. Education Lab 1: Accessing the Deep Security Lab Environment This first lab introduces participants to the virtual lab environment used to complete the hands-on exercises in this Deep Security training course. The classroom lab environment is delivered as a virtual application through Trend Micro Product Cloud 2.0 and will be accessed from a Web browser on your computer. Google Chrome is the preferred browser for this environment. Network Settings The settings and login credentials for each virtual machine in the classroom environment are listed here. VM Name VM-SERVER-01 VM-SERVER-02 VM-SERVER-03 VM-SERVER-04 VM-ANALYZER Hostname Operating System server-01.trend.local server-02.trend.local server-03.trend.local server-04.trend.local DDAN Addressing Login Windows Server 2016 (hosting Active Directory) IP: 192.168.4.1 Subnet mask: 255.255.240.0 Default gateway: 192.168.0.1 DNS 1: ::1 DNS 2: 127.0.0.1 Login Name: administrator Windows Server 2016 (hosting SQL Server 2016 and Deep Security Manager) IP: 192.168.4.2 Subnet mask: 255.255.240.0 Default gateway: 192.168.0.1 DNS 1: 192.168.4.1 DNS 2: 8.8.8.8 Login Name: administrator Windows Server 2012 R2 (hosting Apex Central) IP: 192.168.4.3 Subnet mask: 255.255.240.0 Default gateway: 192.168.0.1 DNS 1: 192.168.4.1 DNS 2: 8.8.8.8 Login Name: administrator Login Name: administrator Windows Server 2019 IP: 192.168.4.4 Subnet mask: 255.255.240.0 Default gateway: 192.168.0.1 DNS 1: 192.168.4.1 DNS 2: 8.8.8.8 IP: 192.168.4.5 Subnet mask: 255.255.240.0 Default gateway: 192.168.0.1 DNS 1: 192.168.4.1 DNS 2: 8.8.8.8 Login Name: admin CentOS © 2021 Trend Micro Inc. Education Password: trendmicro Password: trendmicro Password: trendmicro Password: trendmicro Password: Admin1234! 1 Lab 1: Accessing the Deep Security Lab Environment Application Credentials The URLs, user names and passwords used for each application pre-installed within the classroom lab environment are listed here for easy reference. Deep Security Manager URL: https://server-02.trend.local:4119 • • User name: MasterAdmin Password: trendmicro Apex Central URL: https://server-03.trend.local/WebApp/Login.html • • User name: Admin Password: Pa$$w0rd Deep Discovery Analyzer URL: https://192.168.4.5 • • 2 User name: admin Password: Admin1234! © 2021 Trend Micro Inc. Education Lab 1: Accessing the Deep Security Lab Environment Exercise 1: Access the Product Cloud Lab Environment In this exercise, participants will access the classroom virtual application through the email link delivered to participants by Trend Micro Product Cloud. The lab environment is available for the duration of the training session only and will be reset automatically at the end of the final day of class. Google Chrome is the recommended browser to use for the classroom exercises. 1 Note: In the email message that was sent to you by Trend Micro, click the link to access the lab environment. If you did not receive the email message with the link, you may not have been correctly registered for the class. Please advise the instructor immediately. © 2021 Trend Micro Inc. Education 3 Lab 1: Accessing the Deep Security Lab Environment 2 The Product Cloud Training page is displayed in the browser. The name of the class is displayed in the frame at the top of the Web page. The Status should be listed as provisioned. 3 Hover your mouse over the computer icon on the right side of the page and click Go To Lab Detail. 4 © 2021 Trend Micro Inc. Education Lab 1: Accessing the Deep Security Lab Environment 4 A frame with the vApp details is displayed on the right side of the Web page, listing the virtual machines available in the environment. 5 Hover your mouse over one of the virtual machines, and click Remote Control to enter that virtual machine. © 2021 Trend Micro Inc. Education 5 Lab 1: Accessing the Deep Security Lab Environment 6 The selected virtual machine will be launched. It will take a moment for the virtual machine to load and the window to be resized. 7 To log into the virtual machine, click on the toolbar to send a CTRL+ALT+DEL command to the virtual machine. Log in with the appropriate username and password as indicated in the exercise steps. 6 © 2021 Trend Micro Inc. Education Lab 1: Accessing the Deep Security Lab Environment 8 To maximize the virtual machine window, click on the toolbar. 9 To switch between the different virtual machines in the environment, click the image switcher in the upper right-hand corner of the window. Note: The connection icon on the toolbar will indicate if the network connection is adequate to run the lab environment. Green bars should be displayed. Once you are comfortable with navigating around the Product Cloud environment, proceed to Lab 2. © 2021 Trend Micro Inc. Education 7 Lab 1: Accessing the Deep Security Lab Environment 8 © 2021 Trend Micro Inc. Education Lab 2: Deploying Deep Security Agents In this lab, participants will deploy Deep Security Agents on the computers within the virtual lab environment using a variety of methods. Estimated time to complete this lab: 30 minutes Exercise 1: Import the Deep Security Agent Software into Deep Security Manager In this exercise, a Deep Security Manager Agent software package will be imported into Deep Security Manager. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Log in to Windows Server 2016 using the following credentials: • • Username: administrator Password: trendmicro Note: Verify that the keyboard language is set correctly for your locale. If required, click the Change Language shortcut on the Windows Server 2016 desktop to change the keyboard to another language. Alternately, a text file on the desktop called Copy and Paste.txt contains entries that can be copied into any requested fields. Note: If an Enable Network Discovery message is displayed when logging into ANY virtual machine, click Yes. © 2021 Trend Micro Inc. Education 9 Lab 2: Deploying Deep Security Agents 3 Double-click the Deep Security Manager shortcut on the Windows Server 2016 desktop and log into the Deep Security Manager Web console with the credentials: • • Username: MasterAdmin Password: trendmicro 4 Click the Administration menu. In the left-hand pane, expand Updates > Software > Download Center. The Trend Micro Download Center is displayed in the right-hand pane of the console, listing of all Deep Security Agent software packages available. 5 Scroll through the list and locate the latest version of the Deep Security Agent for 64-bit Windows called Deep Security Agent for Windows x86_64. Note: 10 To limit scrolling in this window, you can type the name of the Agent in the Search field. For example, type windows to display the Windows Agents at the top of the list. © 2021 Trend Micro Inc. Education Lab 2: Deploying Deep Security Agents 6 Click to select the file and click the icon in the Import Now column. Alternately, you can rightclick the file and click Import from the pop-up menu. The Deep Security Agent software is downloaded from the Trend Micro Download Center onto the Deep Security Manager server. Once the download is complete, a green check mark will appear in the Imported column. © 2021 Trend Micro Inc. Education 11 Lab 2: Deploying Deep Security Agents 7 Under Updates > Software > Local, verify that the Agent software package is listed as having been imported. A green check mark is displayed in the Is Latest column to indicate that the latest version has been imported. Note: Deep Security Agents are modular. Initially, the Deep Security Agent contains core functionality only. When you enable a Protection Module, the Agent downloads that plug-in and installs it. Before you can activate any Agents, download the software packages into Deep Security Manager first (by importing them) so that they will be available to the Agents. Installing an Agent when the corresponding software package has not been imported to Deep Security Manager can lead to later complications. Importing the Deep Security Agent software packages into Deep Security Manager makes it convenient for administrators to extract the installer from the Deep Security Manager Web console. 8 In Windows Explorer, locate the following folder to view the Agent package stored on the Deep Security Manager computer: C:\Program Files\Trend Micro\Deep Security Manager\temp\ 12 © 2021 Trend Micro Inc. Education Lab 2: Deploying Deep Security Agents 9 Open the Agent-Windows-20._____.x86_64 folder to view the list components available to install on the Agent computer as Protection Modules are enabled. 10 Close Windows Explorer. Exercise 2: Export the Deep Security Agent Installer In this exercise, participants will export the Deep Security Agent installer for Windows from the Agent package and store it locally where it can be accessed later when deploying the Deep Security Agents in the virtual lab environment. 1 Still on the Local Software page, right-click the 64-bit Windows software package (AgentWindows-12.0.___x64.zip) in the list and click Export Installer. 2 Save the *.msi file for the installer to the Lab Files folder located on the Windows Desktop. This folder can be accessed from different virtual machines in the environment to simplify installation. Exercise 3: Install a Deep Security Agent Manually In this exercise, a Deep Security Agent will be manually installed on the Windows Server 2016 server hosted on the VM-SERVER-01 virtual machine. 1 In the lab environment, switch to the VM-SERVER-01 virtual machine. 2 Log in to Windows Server 2016 using the following credentials: • • Username: administrator Password: trendmicro 3 In the previous exercise, the Deep Security Agent installer was exported to the Lab Files folder. A shortcut to this folder has been placed on the desktop of the VM-SERVER-01 image. Double click the shortcut and locate the installer called Agent-Core-Windows20.0.____.x64.msi. Double-click to start the installation. © 2021 Trend Micro Inc. Education 13 Lab 2: Deploying Deep Security Agents 4 Ignore any security warning and click Run to launch the Deep Security Agent Setup Wizard. 5 The Welcome window is displayed. Click Next. 6 If the terms of the license agreement are acceptable, click I accept the terms in the License Agreement and click Next. 14 © 2021 Trend Micro Inc. Education Lab 2: Deploying Deep Security Agents 7 Accept the default installation folder and click Next. 8 Click Install. 9 A Deep Security Notifier message should be displayed above the system tray. © 2021 Trend Micro Inc. Education 15 Lab 2: Deploying Deep Security Agents 10 Once complete, click Finish to close the Setup window. 11 Right-click the Deep Security Notifier icon in the system tray and click Open Console. Details of the protection on this computer will be displayed. Note that in this scenario, the Deep Security Agent has not been activated yet, and no protection is being applied. 12 Click Cancel to close the Notifier window. 13 In the lab environment, switch to the VM-SERVER-03 virtual image. 14 Repeat the manual Deep Security Agent setup on SERVER-03. If prompted, log in to Windows Server 2012 using the following credentials: • • 16 Username: administrator Password: trendmicro © 2021 Trend Micro Inc. Education Lab 2: Deploying Deep Security Agents Exercise 4: Install a Deep Security Agent Using a Deployment Script In this exercise, a Deep Security Agent will be installed on the Windows Server 2019 computer on the VMSERVER-04 virtual machine using a deployment script. Agent-Initiated Activation must be enabled before the script can be run to insure that the Agent activates properly. In this example, the resulting script will be executed in Windows Powershell. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Return to the Deep Security Manager Web console and click the Administration menu. In the lefthand pane, click System Settings and click the Agents tab. 3 Click to enable Allow Agent-Initiated Activation and Allow Agent to specify hostname. In the Agent activation token field, type a token for Agent activation, for example, trendmicro and click Save. Note: The Agent activation token insures that only scripts created on this installation of Deep Security Manager are accepted for activation on this installation. © 2021 Trend Micro Inc. Education 17 Lab 2: Deploying Deep Security Agents 4 At the top of the Deep Security Manager Web console page, click Support > Deployment Scripts. Select Windows Agent Deployment from the Platform list and click to enable Activate Agent automatically after installation. The script is generated and is displayed in the lower frame of the window. Scroll through the script code to examine the commands that will issued when executed. Note: The token required for Agent-initiated activation is automatically added to the script. Note the entry “token:trendmicro” near the end of the script. 5 Click Save to File and save the resulting AgentDeploymentScript.ps1 file to the Lab Files folder on the desktop. 6 Click Close to exit the Deployments Scripts window. 7 In the lab environment, switch to the VM-SERVER-04 virtual machine. 8 Log into Windows Server 2019 using the following credentials: • • 18 Username: administrator Password: trendmicro © 2021 Trend Micro Inc. Education Lab 2: Deploying Deep Security Agents 9 Open the Lab Files shortcut on the desktop and locate the AgentDeploymentScript.ps1 script file you saved in the previous step. Right-mouse click the file and click Run with PowerShell. 10 Click Open. If the permissions to allow PowerShell scripts to run automatically are not set by default, click Y to execute the script, otherwise, the script will execute and the Deep Security Agent will be installed and activated. The script will execute and the Deep Security Agent will be installed and activated. It may take a couple of minutes for the script to complete since the sleep value in the script will pause the process to allow the Deep Security Agent setup to complete before activating the Agent. Wait for the DSA Deployment Finished message to be displayed in Powershell, or the Powershell window disappears, before continuing. © 2021 Trend Micro Inc. Education 19 Lab 2: Deploying Deep Security Agents Exercise 5: Install a Deep Security Agent Using the Command Line In this exercise, participants will install a Deep Security Agent on the VM-SERVER-02 virtual machine. In the exercise, the Deep Security Agent will be installed using a Microsoft Installer command. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Open the Lab Files folder on the desktop and a copy the Agent-Core-Windows-20.____.x86.msi file to the root of C:\. 3 Open the Windows Command Prompt from the taskbar and type the following command to change directories to C:\: cd\ 4 Type the following command and note the name of the Deep Security Agent *.msi file: dir 5 Type the following command to install the Deep Security Agent: msiexec.exe /q /i <name of Deep Security Agent *.msi file> This command will install the Deep Security Agent core. Since the /q switch runs a quiet install, no dialog boxes will be displayed during the installation of the Deep Security Agent, but the Deep Security Notifier icon will appear in the system tray after a few moments. 6 Wait until the Notifier icon is displayed in the system tray in the lower right-hand corner of the Windows screen before closing the Command Prompt and proceeding to the next exercise. Exercise 6: Add the Task column In this exercise, a new column will be added to the console to display Deep Security Agent activities being processed. 1 In the Deep Security Manager Web console, click the Computers menu. 2 Just above the list of computers, click Columns. 20 © 2021 Trend Micro Inc. Education Lab 2: Deploying Deep Security Agents 3 In the list of available columns, click to display Tasks and click OK. 4 The new column in displayed. This column will display the tasks in progress, such as when a policy is being updated, or Recommendation Scans are being performed. Click and drag the column header to reposition the column in the list, if required. Exercise 7: Add Devices to the Computers List In the previous labs, Deep Security Agents were installed on host computers in our lab environment. In this exercise, we will add these computers to the Deep Security Manager Computers list. 1 Still in the Computers list, note that SERVER-04 is already displayed. This computer was added to the Computers list and activated automatically through the script. 2 Double-click the entry to view its Details. © 2021 Trend Micro Inc. Education 21 Lab 2: Deploying Deep Security Agents The server is listed as Managed and Online. Click Close. 3 In the right-hand pane, click Add > Add Computer. The New Computer Wizard is launched. 22 © 2021 Trend Micro Inc. Education Lab 2: Deploying Deep Security Agents 4 Complete the new computer details as follows and click Next: • • • Hostname: SERVER-01 Policy: We are not applying a policy at this time, leave this field as None Download Security Updates From: Default Relay Group 5 The New Computer Wizard displays a notification indicating that it will automatically activate the Deep Security Agent found on the newly added computer. Click Finish. 6 Click Close. © 2021 Trend Micro Inc. Education 23 Lab 2: Deploying Deep Security Agents 7 The SERVER-01 computer is now displayed in the Computers list and the Details window is opened. Note that since the computer was added using the New Computer wizard, the Agent was automatically activated. Click Close. 8 Repeat the Add Computer process for the SERVER-03 computer. 9 The Windows 2016 Server hosted on the VM-SERVER-02 image will also be added to Computers list using the Discover operation. Click Add > Discover. In the Discover Computers window, enter the following IP address range: • • Note: 24 Range From: 192.168.4.2 Range To: 192.168.4.2 Limiting the range will reduce the time needed for the discovery process to complete in our classroom environment. © 2021 Trend Micro Inc. Education Lab 2: Deploying Deep Security Agents Click OK. 10 The discovery processing is visible in the bottom-left corner of the Deep Security Manager Web console task bar. The process may take a moment. 11 After the Discovery task completes, the Computers list will refresh and computers with IP addresses within the identified range will be displayed. Since our range only included one address, only one computer (server-02.trend.local) will be added to the list. The computer will display a status of Discovered (Activation Required) since the discovery task doesn't automatically activate discovered Agents. Discovered computers are identified by their fully qualified domain name. © 2021 Trend Micro Inc. Education 25 Lab 2: Deploying Deep Security Agents 12 Right-mouse click the discovered computer and click Actions > Activate/Reactivate. Note the Task column displays Activating. Computer Status Summary At this point, the Computers list in Deep Security Manager Web console should appear similar to this: 26 • The SERVER-04 computer was added and activated automatically through the deployment script. • Deep Security Agents were installed manually on the SERVER-01 and SERVER-03 computers. The Deep Security Agents on these computers were activated automatically when the computers were added by hostname. • The Deep Security Agent on SERVER-02 was installed through the command line using Microsoft Installer and activated manually by clicking Activate/Reactivate. © 2021 Trend Micro Inc. Education Lab 3: Deploying a Deep Security Relay In this lab, the Deep Security Agent on SERVER-01 will be promoted to become the Relay for the environment. Estimated time to complete this lab: 10 minutes Exercise 1: Enable a Deep Security Relay Relay functionality is enabled by promoting a Deep Security Agent to a Relay. You must have at least one Relay enabled in your environment for software distribution as well as pattern and security updates. The Deep Security Agent on the VM-SERVER-01 virtual machine is already activated. In this exercise, this Deep Security Agent will be promoted to become a Relay within the Default Relay Group. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 In the Deep Security Manager Web console, click the Administration menu. 3 In the left-hand pane, expand Updates and click Relay Management. © 2021 Trend Micro Inc. Education 27 Lab 3: Deploying a Deep Security Relay 4 Click to select the Default Relay Group and click Add Relay. 5 A list of all of the 64-bit Deep Security Agents activated in Deep Security will be displayed. Click to select the SERVER-01 Deep Security Agent computer in the list and click Enable Relay and Add to Group. 28 © 2021 Trend Micro Inc. Education Lab 3: Deploying a Deep Security Relay The Relay component will be installed and enabled on the Deep Security Agent. This may take a moment to complete. 6 Once the Agent Status is listed as Online, return to the Computers list. 7 The Status column for SERVER-01 will display a message indicating that a security update is in progress. This is the Relay retrieving the distributable update components from the Trend Micro ActiveUpdate Server on the Smart Protection Network. Wait for the message to clear before continuing. 8 Hover the pointer over the SERVER-01 computer in the list, and click Preview . The icon for the server in the Computers list will be updated to indicate that it is now operating as a Deep Security Relay. The number of components available on the Relay for distribution is also displayed. © 2021 Trend Micro Inc. Education 29 Lab 3: Deploying a Deep Security Relay A Sending Policy status may also be displayed for other computers in the list as they are advised of the new Relay in their assigned Relay Group. Note: 30 A small red icon will be displayed over the computer icon in the Computers list for any Agents promoted to Relays. © 2021 Trend Micro Inc. Education Lab 4: Protecting Servers from Malware In this lab, malware and grayware/spyware scanning will be enabled through the Anti-Malware protection module and applied to a server in lab environment though a customized policy. Estimated time to complete this lab: 20 minutes Exercise 1: Create a New Malware Scan Configuration In this exercise, a new Malware Scan Configuration will be created as a reusable Common Object. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Log into the Deep Security Manager Web console as MasterAdmin. 3 In the Deep Security Manager Web console, click the Policies menu. In the left-hand pane, expand Common Objects > Other and click Malware Scan Configurations. The default Malware Scan Configurations are displayed in the right-hand pane. 4 Click New > New Real-Time Scan Configuration. 5 The Malware Scan Configuration Properties window is displayed. Create a new configuration with the following details: General tab: • Name: Type a name for this scan configuration, for example Classroom Scan Configuration • Document Exploit Protection: Click to enable Scan documents for exploits and Scan for exploits against known vulnerabilities only • • Spyware/Grayware: Click to Enable spyware/grayware protection Alerts: Enable to send Alerts when this Malware Scan Configuration logs an event. © 2021 Trend Micro Inc. Education 31 Lab 4: Protecting Servers from Malware Advanced tab • • 32 Remediation Actions: Custom Use custom actions: Set the actions for viruses to Quarantine © 2021 Trend Micro Inc. Education Lab 4: Protecting Servers from Malware Click OK. 6 The Malware Scan Configuration is created and added to Common Objects, but has not been applied to any policies or computers yet. © 2021 Trend Micro Inc. Education 33 Lab 4: Protecting Servers from Malware Exercise 2: Create a New Policy In this exercise, a new policy will be created by duplicating an existing policy and modifying its attributes. 1 Still in the Deep Security Manager Web Console, click the Policies menu and in the left-hand pane, click Policies. 2 Instead of creating a new policy from scratch, we will copy an existing policy and modify some of its attributes. In the right-hand pane, expand Base Policy and click to select the Windows policy. From the menu at the top of the list, click Duplicate. A new policy called Windows_2 will be created. 3 Double-click the Windows_2 policy to display the Details Windows. Rename this policy to Classroom and click Save. 34 © 2021 Trend Micro Inc. Education Lab 4: Protecting Servers from Malware 4 In the Policy Details windows, click the Anti-Malware Protection Module in the left-hand frame and set the following on the General tab: • • • Anti-Malware State: On • Schedule: Select Every Day All Day Real-Time Scan: De-select Inherited Malware Scan Configuration: Select the newly created configuration called Classroom Scan Configuration Click Save Click Close when done. Exercise 3: Apply the Policy to a Computer The new policy must be applied to computers to take effect. In this exercise, the new Classroom policy will be applied to the Windows Server 2012 computer hosted on the VM-SERVER-03 virtual image. 1 Still in the console, click the Computers menu to display the computers currently added to Deep Security Manager. 2 Locate and double-click the SERVER-03 computer to display its details. © 2021 Trend Micro Inc. Education 35 Lab 4: Protecting Servers from Malware 3 From the Policy list, select the new Classroom policy. Click Save, then Close. Since this module was not previously enabled, Deep Security Manager executes the installation of the Anti-Malware protection module and other required components on this Deep Security Agent. 4 The Task column for the computer displays Sending Policy. A progress prompt is also displayed as the change is applied. 5 Security updates will also be applied for the Anti-Malware components. Another progress prompt may be displayed after a moment and the Task column for the computer will change to Security Update in Progress. The updates may take a moment to download. 6 Wait until the Task column clears before continuing. 36 © 2021 Trend Micro Inc. Education Lab 4: Protecting Servers from Malware 7 Hover your mouse over the SERVER-03 computer and click Preview. The Anti-Malware Protection Module now displays as On, with Real Time scanning enabled. Note: If the Relay was not properly enabled in the previous lab, the Anti-Malware component installation will fail. Exercise 4: Test Agent-Based Malware Protection and Quarantine In this exercise, a sample virus file will be accessed to test the malware protection. 1 In the lab environment, switch to the VM-SERVER-03 virtual machine. 2 Double-click the Deep Security Notifier in the Windows System Tray. In the Status pane, confirm that Real Time scanning is enabled for Anti-Malware. © 2021 Trend Micro Inc. Education 37 Lab 4: Protecting Servers from Malware 3 In a Web browser on the Windows Server 2012 computer, type the following URL to access the EICAR web site: http://www.eicar.org/download/eicar.com 4 A Malware Detected message should be displayed notifying that the Eicar test virus file was detected. 5 Cancel the download of the eircar.com file. 6 In a Web browser, click the bookmark to access the Detections Web site, or enter the following URL: http://detection.trend.local 7 Click l1-1.doc in the Deep Discovery Analyzer Sample Submission section to download the malware sample. 38 © 2021 Trend Micro Inc. Education Lab 4: Protecting Servers from Malware 8 The Notifier should display a message indicating that new malware has been encountered. Cancel the Save operation. 9 Double-click the Deep Security Notifier in the Windows System Tray, and click View Events. Click the Anti-Malware Events tab to view the events. 10 Click OK and OK to close the Notifier console. 11 In the lab environment, switch to the VM-SERVER-02 virtual machine. 12 To verify the corresponding events, return to the Deep Security Manager Web console and locate SERVER-03 in the Computers list. Double-click to open Details. 13 Click the Anti-Malware Protection Module in the left-hand frame and click the Anti-Malware Events tab. Confirm the events were logged. You may need to click Get Events to the refresh the events list. © 2021 Trend Micro Inc. Education 39 Lab 4: Protecting Servers from Malware 14 Click the Identified Files tab and examine the results. The malware was quarantined as dictacted by the Action in the Malware Scan Configuration. Click Close. Exercise 5: Test Agent-Based Grayware/Spyware Protection In this exercise, a sample spyware file will be accessed to test the grayware/spyware protection. 1 In the lab environment, switch to the VM-SERVER-03 virtual machine. 2 Open the Lab Files folder and locate the following spyware file in the Spyware_Test_Files subfolder. Spycar_Files_Password_novirus.zip 3 Move (or copy) this file to the Windows Server 2012 desktop. 4 Right-click the file and select Extract All. When prompted, type the password of novirus. 5 A Malware Detected message should be displayed notifying that the test spyware file was detected. 6 Double-click the Deep Security Notifier in the Windows System Tray, and click View Events. Click the Anti-Malware Events tab to view the events. 7 In the lab environment, switch to the VM-SERVER-02 virtual machine. 8 To verify the corresponding events, return to the Deep Security Manager Web console and locate SERVER-03 in the Computers list. Double-click to open Details. 40 © 2021 Trend Micro Inc. Education Lab 4: Protecting Servers from Malware 9 Click the Anti-Malware Protection Module in the left-hand frame and click the Anti-Malware Events tab. Confirm the event was logged. You may need to click Get Events to the refresh the events list. Exercise 6: Enable Predictive Machine Learning In this exercise, virus and grayware/spyware scanning will be disabled and Predictive Machine Learning will be enabled. By disabling virus and grayware/spyware scanning beforehand, we can be assured that the malware is being captured through Predictive Machine Learning and not by a virus or grayware/ spyware pattern. 1 Still in the Deep Security Manager Web console on the VM-SERVER-02 virtual machine, click the Policies menu and in the left-hand frame, click Policies. 2 Double-click the Classroom policy to open its Details. 3 Click the Anti-Malware Protection Module in the left-hand frame. Click Edit for the Malware Scan Configuration called Classroom Scan Configuration. 4 Click to disable Scan documents for exploits and Spyware/Grayware scanning. © 2021 Trend Micro Inc. Education 41 Lab 4: Protecting Servers from Malware 5 Click Enable Predictive Machine Learning and set the Action to take to Quarantine (recommended). Click OK. The Classroom policy is updated with the new Malware Scan Configuration settings and computers using this policy will inherit these new settings. 6 Close the Details window for the Classroom policy. 7 In the lab environment, switch to the VM-SERVER-01 virtual machine. 8 Double-click the Lab Files folder on the SERVER-01 desktop to display the contents of the folder. This folder is a shortcut to a folder on the SERVER-03 computer. 9 In Windows Explorer on SERVER-01, locate the TRENDX_detect.exe file in the following folder: C:\web\detection\trendx\ 42 © 2021 Trend Micro Inc. Education Lab 4: Protecting Servers from Malware 10 Drag TRENDX_detect.exe from the folder on SERVER-01 to the Lab Files folder hosted on SERVER_03. Folder on SERVER-01 Folder on SERVER-03 11 The file will copy to SERVER-03, but will disappear after a moment. (Refresh the display if the file does not disappear a few seconds after being dropped.) The file is captured as malware on SERVER-03 and is quarantined, based on the action set for this type of malware. 12 In the lab environment, switch to the VM-SERVER-02 virtual machine. 13 To verify the corresponding events, return the Deep Security Manager Web console and locate SERVER-03 in the Computers list and double-click to open Details. 14 Click the Anti-Malware protection module in the left-hand frame and click the Anti-Malware Events tab. Confirm the event was logged. (You may need to click Get Events to the refresh the events list.) Double-click the entry to view the details. © 2021 Trend Micro Inc. Education 43 Lab 4: Protecting Servers from Malware You will note that the file was captured through Predictive Machine Learning as it displays the probability that the file is a threat, as well as the threats the sample displays similar characteristics to. Click Close when done. 15 To view malware events for the entire system, click Events & Reports. In the left-hand frame, expand Events, then click Anti-Malware Events. All the malware-related events for all computers will be displayed. At this point in our exercises, the only malware events that have occurred have been on the SERVER-03 computer. 44 © 2021 Trend Micro Inc. Education Lab 5: Blocking Malicious Web Sites In this lab, you will activate the Web Reputation Protection Module in the Classroom policy and attempt to visit potentially hazardous Web sites. Estimated time to complete this lab: 10 minutes Exercise 1: Modify a Policy to Activate Web Reputation Protection In this exercise, the Web Reputation Protection Module will be enabled in the Classroom policy and sample Web sites will be accessed. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Sign in to the Deep Security Manager Web console as the Master Admin. 3 In the Deep Security Manager Web console, click the Policies menu. Locate and double-click the Classroom policy to open the Details windows. 4 Click the Web Reputation Protection Module in the left-hand frame and set the following: General tab • • Web Reputation State: On Security Level: De-select Inherited and set the level to Medium Click Save. © 2021 Trend Micro Inc. Education 45 Lab 5: Blocking Malicious Web Sites Advanced tab: • Alert: Yes Click each of the other tabs to view the different configuration options. 5 Click Save, then Close. 6 Deep Security Manager will now deploy the Web Reputation Protection Module to Deep Security Agents using this policy. This may take a few moments. While the installation is in progress, the Task column on the Computers tab for SERVER-03 (a computer using the Classroom policy) will display Sending Policy. Once the Task column clears, proceed to the next step. 7 Click the Events & Reports menu. Expand Events and click System Events in the left-hand pane and note the entries for the update of the Deep Security Agent on SERVER-03. Double-click the entry to view the Details. 8 Click Close. Exercise 2: Access Sample Web Sites In this exercise, sample web sites will be visited to test blocking through the Web Reputation Protection Module. 1 46 In the lab environment, switch to the VM-SERVER-03 virtual machine. © 2021 Trend Micro Inc. Education Lab 5: Blocking Malicious Web Sites 2 Open a Web browser on the SERVER-03 computer, and attempt to access the following links: • wrs91.winshipway.com (should be allowed) • wrs71.winshipway.com (should be allowed) • wrs41.winshipway.com (should be blocked and the following error message displayed) © 2021 Trend Micro Inc. Education 47 Lab 5: Blocking Malicious Web Sites 3 A Notifier message will also be displayed on the server desktop. 4 Still on the VM-SERVER-03 computer, double-click the Deep Security Notifier and open the console. Click View Events. Click the Web Reputation Events tab to display the web reputation events for the web sites you accessed earlier. Click OK and OK again to close the Notification Console. 5 In the lab environment, switch to the VM-SERVER-02 virtual machine. 6 In the Deep Security Manager Web console, click the Computers tab, and locate and double-click the SERVER-03 computer. 48 © 2021 Trend Micro Inc. Education Lab 5: Blocking Malicious Web Sites 7 The computer Details page is displayed, click the Web Reputation protection module and click the Web Reputation Events tab. A list of events is displayed. (You may need to click Get Events to trigger the heartbeat and retrieve the latest events). 8 Double-click one of the events to examine its details. © 2021 Trend Micro Inc. Education 49 Lab 5: Blocking Malicious Web Sites 9 Click Add to Allow List. The option to create an Allow exemption is displayed. The Allow can be applied to the SERVER-03 computer only, or to the computer’s policy (in this case, the Classroom policy). 10 Click Cancel to close the window. 11 Close the Details for the SERVER-03 computer. 50 © 2021 Trend Micro Inc. Education Lab 6: Filtering Traffic Using Firewall Rules In this lab, participants will become familiar with the Firewall protection module and implement Firewall rules on the Windows Server 2012 computer. Estimated time to complete this lab: 20 minutes Exercise 1: Perform a Port Scan In this exercise, open ports on the SERVER-01 computer will be identified using a Port Scan. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Log in to the Deep Security Manager Web console as the MasterAdmin. 3 Click the Computers menu. Locate and double-click the SERVER-01 computer to open the Details window. 4 Click the Firewall protection module from left-hand pane and click the General tab. Click Scan For Open Ports. © 2021 Trend Micro Inc. Education 51 Lab 6: Filtering Traffic Using Firewall Rules The Task column for the computer will display Scanning for Open Ports. 5 Once the task is complete, open the computer Details to view the results. Take note of the open ports that are found. Port 4118 is identified as open. This port is used by Deep Security Manager to communicate with Deep Security Agents and is enabled by default during setup. 52 © 2021 Trend Micro Inc. Education Lab 6: Filtering Traffic Using Firewall Rules Exercise 2: Enable the Firewall Protection Module on the Computer Since the firewall rules in the Classroom policy are inherited from the Base policy and can not be deselected, we will enable the Firewall rules directly to the SERVER-01 computer. 1 Still on the Details page for the SERVER-01 computer in the Deep Security Manager Web Console, click the Firewall protection module and set the Configuration to On. Click Save and Close. 2 Since this module was not already enabled, Deep Security Manager installs the Firewall module for this Deep Security Agent. The Task column for the computer will display Sending Policy. Wait for the Firewall module installation to complete and the Task column to clear. 3 On the SERVER-02 computer, open the Command Prompt and type the following telnet command to connect to port 80 on the SERVER-01 computer: telnet 192.168.4.1 80 The connection should be accepted and a blinking cursor will be displayed as no rules are blocking the connection at this point. 4 Type <ctrl>+c to terminate the command. © 2021 Trend Micro Inc. Education 53 Lab 6: Filtering Traffic Using Firewall Rules Exercise 3: Create a Firewall Rule to Deny Incoming Traffic In this exercise, participants will create a rule that denies Telnet traffic on port 80 on the SERVER-01 computer and then examine the Firewall events that are created when this traffic is blocked. 1 Back in the Deep Security Manager Web console, click the Computers menu. Locate and doubleclick the SERVER-01 computer to display the Details page. 2 Click the Firewall protection module. On the General tab, click Assign/Unassign in the Assigned Firewall Rules section. 54 © 2021 Trend Micro Inc. Education Lab 6: Filtering Traffic Using Firewall Rules 3 Click New > New Firewall Rule. 4 Create a new firewall rule with the following settings: • • • • • • • Name: Deny Inbound Telnet Port 80 Action: Deny Priority: 3-High Packet Direction: Incoming Frame Type: IP Protocol: TCP Packet Source: • MAC: Any Port: Any Packet Destination: • IP: Any IP: Any MAC: Any Port: Port(s): 80 Any Flags: Enabled Verify the settings you have entered and click OK to save the firewall rule. © 2021 Trend Micro Inc. Education 55 Lab 6: Filtering Traffic Using Firewall Rules Click OK to close the Firewall Rules window. 56 © 2021 Trend Micro Inc. Education Lab 6: Filtering Traffic Using Firewall Rules 5 On the General tab, confirm that Firewall Configuration is set to On and the Deny Inbound Telnet Port 80 rule is applied. Click Close. 6 Once the Task column clears, click Preview to display the computer’s current status, and note that the Firewall rule is in effect. © 2021 Trend Micro Inc. Education 57 Lab 6: Filtering Traffic Using Firewall Rules 7 From the SERVER-02 computer, attempt the telnet command once again to the SERVER-01 on port 80. The connection should fail as the Firewall rule is blocking the connection. Exercise 4: Create a Firewall Rule to Force Allow Incoming Telnet Connections From a Single Host The firewall rule that was created in the previous exercise blocks all inbound telnet traffic to port 80. In this exercise, you will create a rule to force allow inbound telnet traffic but only from a single source, defined by its IP address. 1 On the Details page for the SERVER-01 computer in the Deep Security Manager Web console, click the Firewall protection module. On the General tab, click Assign/Unassign. 2 Click New > New Firewall Rule and configure a new rule with the following settings: • • • • • • • Name: Force Allow Telnet from a Single Address Action: Force Allow Priority: 3-High Packet Direction: Incoming Frame Type: IP Protocol: TCP Packet Source: • MAC: Any Port: Any Packet Destination: • Single IP: 192.168.4.2 IP: Any MAC: Any Port: Port(s): 80 Any Flags: Enabled Verify the settings you have entered and click OK to save the new firewall rule. 58 © 2021 Trend Micro Inc. Education Lab 6: Filtering Traffic Using Firewall Rules 3 Ensure that both custom Firewall rules are assigned, and OK again to close the Firewall rule list. 4 Wait for the Task column to clear then attempt to telnet to port 80 on the SERVER-01 computer once again. The connection should be allowed once again. 5 Before proceeding to the next lab, disable the Firewall protection module on SERVER-01. © 2021 Trend Micro Inc. Education 59 Lab 6: Filtering Traffic Using Firewall Rules 6 Once the Task column clears, click Preview for the SERVER-01 computer and confirm that Firewall protection is off. Note: 60 The Firewall protection module components remain installed on the computer and the rules are preserved in case they need to be re-enabled at a later time. © 2021 Trend Micro Inc. Education Lab 7: Protecting Servers From Vulnerabilities In this lab, participants will enable the Intrusion Prevention Protection Module to protect a server from known vulnerabilities. A Recommendation Scan will be run and the suggested rules will be applied automatically. A sample rule will be enabled to block access to a test file over HTTP. Estimated time to complete this lab: 10 minutes Exercise 1: Run a Recommendation Scan In this exercise, you will run a Recommendation Scan to determine which rules are appropriate for the Windows Server 2016 computer on the VM-SERVER-04 image. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Log into the Deep Security Manager Web console as the Master Administrator. 3 Click the Computers menu. Locate and double-click the SERVER-04 computer. 4 In the left-hand frame, click the Intrusion Prevention Protection Module. On the General tab in the Recommendations section, set Automatically implement Intrusion Prevention Recommendations (when possible) to Yes and Save. Click Scan For Recommendations. © 2021 Trend Micro Inc. Education 61 Lab 7: Protecting Servers From Vulnerabilities 5 The Task column for the computer will display Scanning for Recommendations. 6 While the scan is running, click Settings in the left-hand frame of the Details window. On the General tab, set Perform Ongoing Recommendation Scans to Yes and the Ongoing Scan Interval to 3 Days and click Save. 62 © 2021 Trend Micro Inc. Education Lab 7: Protecting Servers From Vulnerabilities 7 Once the scan in complete, return to the Intrusion Prevention Protection Module. On the General tab, the recommended rules will be displayed and enabled in the Assigned Intrusion Prevention Rules section. This list will be refreshed based on the assigned Ongoing Scan Interval setting. Any new rules released by Trend Micro will be applied to the machine when the scan is run again and any rules no longer needed (for example, if the vendor patches the vulnerable operating system or application) will be removed. Note that the recommended rules are not yet being enforced since the Protection Module Configuration is not yet enabled. © 2021 Trend Micro Inc. Education 63 Lab 7: Protecting Servers From Vulnerabilities Exercise 2: Enable Intrusion Prevention Protection and Apply an Additional Rule In this exercise, an additional rule not suggested by the Recommendation Scan will be applied and the Protection Module enabled. This rule has been included to allow testing of Intrusion Prevention and blocks the download of the eicar test file over HTTP. 1 Note: Still on the General tab for the Intrusion Prevention Protection Module, click Assign/Unassign and locate rule 1005924 - Restrict Download of EICAR Test File Over HTTP. Use the Search field to simplify locating the rule. 2 Click to enable the rule and click OK. 3 On the General tab, set the Configuration to On and the Intrusion Prevention Behavior to Prevent. Click Save, and Close. The Protection Module is installed on the SERVER-04 computer. 64 © 2021 Trend Micro Inc. Education Lab 7: Protecting Servers From Vulnerabilities Exercise 3: Test Intrusion Prevention Protection In this exercise, confirm that Intrusion Prevention Protection is being applied to the SERVER-04 computer by attempting to download the EICAR test file. 1 Still logged into the Deep Security Manager Web console, click Computers and hover your mouse over the SERVER-04 computer. Click Preview and confirm that the Intrusion Prevention Protection Module is On and enforcing the rules. 2 In the lab environment, switch to the VM-SERVER-04 virtual machine. 3 In a Web browser on the Windows Server 2019 computer, type the following URL to access the EICAR web site: http://www.eicar.org/download/eicar.com The connection to the Web site should be reset. © 2021 Trend Micro Inc. Education 65 Lab 7: Protecting Servers From Vulnerabilities 4 In the lab environment, switch to the VM-SERVER-02 virtual machine. 5 In the Deep Security Manager Web Console, return to the Computers list and double-click the SERVER-04 computer to display its Details. 6 Click the Intrusion Prevention Protection Module in the left-hand frame and click the Intrusion Prevention Events tab. 7 Events related to the EICAR test file download being blocked should be displayed. You may need to click Get Events. 66 © 2021 Trend Micro Inc. Education Lab 8: Blocking Application Traffic with Intrusion Prevention Rules In this lab students will enable an Intrusion Prevention rule to block connections from Internet Explorer. Estimated time to complete this lab: 10 minutes Exercise 1: Block Internet Explorer In this exercise, a rule will be applied to block connections from Internet Explorer. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Log into the Deep Security Manager Web console. 3 Click the Policies menu and locate and double-click the Classroom policy to open Details. 4 Click the Intrusion Prevention Protection Module. On the General tab, set the Intrusion Prevention State to On and click Save. 5 Click Assign/Unassign in the Assigned Intrusion Prevention Rules section. In the IPS Rules list, click Application Traffic from the first drop-down list to filter the list. 6 Type Internet Explorer in the Search field in the upper-right and press Enter. © 2021 Trend Micro Inc. Education 67 Lab 8: Blocking Application Traffic with Intrusion Prevention Rules 7 Click to select the following rule and click OK. • 1002312 - Microsoft Internet Explorer Web Browser Click Close. Note: By default, the mode for this rule is set to Detect Only. Initially, traffic will not be blocked, just logged. 8 The Task column for the SERVER-03 computer (which uses the Classroom policy) displays Sending Policy. 9 In the lab environment, switch to the VM-SERVER-03 virtual machine. 10 Open Internet Explorer on SERVER-03 and attempt to visit the following Web site: wrs71.winshipway.com What is the result? _________________________________________________________ 68 © 2021 Trend Micro Inc. Education Lab 8: Blocking Application Traffic with Intrusion Prevention Rules 11 Clear the browsing history in the Web browser and close the browser. 12 In the lab environment, switch to the VM-SERVER-02 virtual machine. 13 Back in the Policy details for Classroom and click the Intrusion Prevention Protection Module in the left-hand frame. Right-click the Internet Explorer rule and select Properties. This will modify the properties for this instance of the rule. © 2021 Trend Micro Inc. Education 69 Lab 8: Blocking Application Traffic with Intrusion Prevention Rules 14 Change the Mode from Inherited (Detect only) to Prevent and click Apply, then OK. 15 Once the security update is complete and the Task column for the computer clears, switch to the VM-SERVER-03 virtual machine. Open Internet Explorer and attempt to visit the same Web site as in the previous step. What is the behavior this time? _________________________________________________________ Open a different browser and attempt to access the Web site. What is the behavior this time? _________________________________________________________ 16 In the lab environment, switch to the VM-SERVER-02 virtual machine. 17 In the Deep Security Manager Web console, open the Details for SERVER-03 and locate the Intrusion Prevention Events related to this second Internet Explorer connection attempt. 70 © 2021 Trend Micro Inc. Education Lab 8: Blocking Application Traffic with Intrusion Prevention Rules 18 As you may want to use Internet Explorer on this Windows 2012 Server later in the course, disable the Internet Explorer rule from the Classroom policy. © 2021 Trend Micro Inc. Education 71 Lab 8: Blocking Application Traffic with Intrusion Prevention Rules 72 © 2021 Trend Micro Inc. Education Lab 9: Detecting Changes to Protected Servers In this lab, participants will create and deploy Integrity Monitoring rules to a Windows Server 2012 computer. In this lab, settings will be applied directly to the computer. Estimated time to complete this lab: 15 minutes Exercise 1: Create an Object to Monitor In this exercise, participants will create a file on a protected computer which will be monitored for changes. 1 In the lab environment, switch to the VM-SERVER-03 virtual machine. 2 In the root of the C: drive of the Windows Server 2012 computer, create a new text document called IM Test.txt and type some content in the file. Save and close the file. Exercise 2: Create a New Integrity Monitoring Rule In this exercise, participants will update SERVER-03 to include Integrity Monitoring protection. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Log into the Deep Security Manager Web console as the MasterAdmin. 3 Click the Computers menu. Locate and double-click the SERVER-03 computer to open its Details. 4 In left-hand pane, click the Integrity Monitoring Protection Module. On the General tab, set the Integrity Monitoring Configuration to On and click Save. © 2021 Trend Micro Inc. Education 73 Lab 9: Detecting Changes to Protected Servers 5 Click Assign/Unassign and in the Integrity Monitoring Rules window, click New > New Integrity Monitoring Rule. Create a new rule with the following details: On the General tab: • • Note: Name: 1000000-IM file test Severity: Medium By prefixing the rule name with a numerical value such as 1000000, it will appear at the top of the Integrity Monitoring Rules list. On the Content tab: • • • Template: File Base Directory: C:\ Include Files With Names Like (One Per Line): IM Test.txt Leave the other settings at their default values and click OK to save the rule. 74 © 2021 Trend Micro Inc. Education Lab 9: Detecting Changes to Protected Servers 6 Click OK again to close the rules window. Ensure that the 1000000 - IM file test rule is enabled and close Details. © 2021 Trend Micro Inc. Education 75 Lab 9: Detecting Changes to Protected Servers 7 The baseline for the computer will be created. The Task column for the SERVER-03 computer will display Sending Policy and Baseline Rebuild in Progress. Wait for the Task column to clear before continuing. 8 Click Preview for SERVER-03 and ensure that Integrity Monitoring is on and one rule is in place. Exercise 3: Generate Integrity Monitoring Events In this exercise, Integrity Monitoring Events will be generated by making changes to the IM Test.txt file on the SERVER-03 computer. 1 In the lab environment, switch to the VM-SERVER-03 virtual machine. 2 Locate the file created earlier: C:\IM Test.txt 3 Open the file and make a change to the content. Save and close the file. 4 In the lab environment, switch to the VM-SERVER-02 virtual machine. 5 Return to the Deep Security Manager Web console and click the Computers menu. 6 Locate and double-click the SERVER-03 computer to open the Details screen. Click Integrity Monitoring from the left-hand pane. 76 © 2021 Trend Micro Inc. Education Lab 9: Detecting Changes to Protected Servers 7 Click Scan for Integrity to run a manual scan. 8 Click the Integrity Monitoring Events tab and click Get Events to refresh the list. Deep Security Manager will contact the Deep Security Agent on this computer to retrieve Events. Events related to the changes to the monitored file should be displayed. © 2021 Trend Micro Inc. Education 77 Lab 9: Detecting Changes to Protected Servers 9 Double-click the Event to display its Details, then click Close. Exercise 4: Deploy an Additional Integrity Monitoring Rule In this exercise, a second Integrity Monitoring Rule will be applied to SERVER-03. 1 Still in the Deep Security Manager Web console, return to the Details for the SERVER-03 computer 2 Click Integrity Monitoring in the left-hand frame and click Assign/Unassign. 78 © 2021 Trend Micro Inc. Education Lab 9: Detecting Changes to Protected Servers 3 Search for an Integrity Monitoring Rule called 1002781 - Microsoft Windows - Attributes of a service modified. Click to enable this rule and click OK. 4 The baseline for the server will be rebuilt to incorporate the new objects. © 2021 Trend Micro Inc. Education 79 Lab 9: Detecting Changes to Protected Servers Exercise 5: Generate Integrity Monitoring Events In this exercise, a Windows Service will be stopped to trigger Integrity Monitoring Events. 1 In the lab environment, switch to the VM-SERVER-03 virtual machine. 2 Click Start > Administrative Tools > Services. In Windows Services, stop the Print Spooler service. 3 In the lab environment, switch to the VM-SERVER-02 virtual machine. 4 In the Deep Security Manager Web console click the Computers menu. Locate and double-click the SERVER-03 computer to open its Details. 5 From the left-hand pane, click the Integrity Monitoring Protection Module and click Scan For Integrity to trigger a manual scan. Wait until the scan completes. 80 © 2021 Trend Micro Inc. Education Lab 9: Detecting Changes to Protected Servers 6 Click the Integrity Monitoring Events tab. Events related to the service being disabled should be displayed. Click Get Events if the items are not immediately displayed. 7 Double-click an event to examine the details. 8 Close the Event details and Computer details. © 2021 Trend Micro Inc. Education 81 Lab 9: Detecting Changes to Protected Servers 82 © 2021 Trend Micro Inc. Education Lab 10: Blocking Unapproved Software In this lab, participants will block the execution of an application on a Windows Server 2019 computer machine with Application Control. Estimated time to complete this lab: 20 minutes Exercise 1: Activate Application Control Protection In this exercise, Application Control protection will be enabled on the SERVER-04 computer. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Log into the Deep Security Manager Web console as MasterAdmin. 3 Click the Computers menu and double-click the SERVER-04 computer to open its Details. Click Application Control in the left-hand frame and set the following: • • Application Control Configuration: On Block unrecognized software until it is explicitly allowed: Enabled Click Save and close Details. © 2021 Trend Micro Inc. Education 83 Lab 10: Blocking Unapproved Software 4 The Task column for the SERVER-04 computer displays Sending Policy, then after a few minutes, Application Control Inventory Scan in Progress. (It may take about 20 minutes for the inventory scan to complete) 5 Wait until the Task column clears before continuing. Note: In some cases, the Application Control Inventory Scan in Progress message may not appear and it can be difficult to determine if the inventory scan is complete. The start and end of the scan are logged as events. Click Events & Reports and view the System Events. You should see a Application Control Inventory Scan Completed entry which provides confirmation that the scan is complete. 6 Hover the mouse over the SERVER-04 computer in the list and click Preview to confirm that Application Control is being applied. 84 © 2021 Trend Micro Inc. Education Lab 10: Blocking Unapproved Software Exercise 2: Install a New Application In this exercise, a new application will be added to the Windows Server 2019 computer to trigger Application Control protection. 1 In the lab environment, switch to the VM-SERVER-04 virtual machine. Open the Deep Security console and confirm that Application Control protection is enabled. 2 Open the Lab Files folder on the Windows Server 2019 desktop and locate the file called WinMD5.exe. Drag the file to the Windows Server 2019 desktop. Click OK if prompted with a warning message. Note: The WinMD5.exe file must be dragged from the Shared folder to the Windows Server 2019 desktop. Application Control will not block files that are executed from a remote folder or other removable media like a USB stick. 3 Double-click WinMD5.exe to launch the application. 4 An application error is displayed as the new software is being blocked by the Application Control ruleset. 5 In the lab environment, switch to the VM-SERVER-02 virtual machine. 6 In the Deep Security Manager Web console, click the Computers menu. Locate and double-click the SERVER-04 computer to open its Details. © 2021 Trend Micro Inc. Education 85 Lab 10: Blocking Unapproved Software 7 Click Application Control in the left-hand frame and click the Application Control Events tab. Click Get Events. 8 An Execution of Unrecognized Software Blocked entry should be displayed in the list. Doubleclick to view the details of the event, then close the viewer window. 9 In the list of Application Control Events, click Change rules in the Rules column. 10 Click Create “allow” rule in Ruleset and click OK, then Close. 86 © 2021 Trend Micro Inc. Education Lab 10: Blocking Unapproved Software 11 The ruleset for this computer is updated and the Tasks column displays Application Control Ruleset Update in Progress. Wait until this message clears before proceeding. 12 In the lab environment, switch to the VM-SERVER-04 virtual machine. 13 Attempt to launch the WinMD5.exe application once again. Since the ruleset was changed to allow the new application, it should start. Click Exit to close the application. © 2021 Trend Micro Inc. Education 87 Lab 10: Blocking Unapproved Software 88 © 2021 Trend Micro Inc. Education Lab 11: Inspecting Logs on Protected Servers In this lab participants will create and enable a Log Inspection rule to monitor Windows Events. Estimated time to complete this lab: 10 minutes Exercise 1: Create a New Log Inspection Rule In this exercise, participants will create a new Log Inspection rule. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Log into the Deep Security Manager Web console as MasterAdmin. 3 Click the Policies menu. Locate and double click the Classroom policy to open its Details. 4 In left-hand menu, click Log Inspection. On the General tab, set the Log Inspection State to On and click Save. 5 Click Assign/Unassign and use the search to locate the Log Inspection rule called 1002795 Microsoft Windows Events. Click to enable the rule then click OK. © 2021 Trend Micro Inc. Education 89 Lab 11: Inspecting Logs on Protected Servers 6 This rule is dependent on another Log Inspection rule, click OK to accept any dependencies and click Close. 7 Confirm that two Log Inspection rules are applied. 8 The Task column for the computers using the Classroom policy will display Sending Policy. 9 Wait for the Task column to clear before proceeding. Exercise 2: Generate Log Inspection Events In this exercise, participants will clear the Windows Security Event logs on a Windows Server 2012 computer and examine the Events generated by the Log Inspection Protection Profile. 1 In the lab environment, switch to the VM-SERVER-03 virtual machine. 2 Click Start and Event Viewer. 90 © 2021 Trend Micro Inc. Education Lab 11: Inspecting Logs on Protected Servers 3 Once open, expand Windows Logs > Security in the left-hand pane. 4 Right-click Security and click Clear Log. Click Clear when prompted to save events. © 2021 Trend Micro Inc. Education 91 Lab 11: Inspecting Logs on Protected Servers 5 The Security log is cleared and will display a single log entry containing details of the log being cleared. 6 Close the Event Viewer. 7 In the lab environment, switch to the VM-SERVER-02 virtual machine. 8 In the Deep Security Manager Web console, locate and double-click the SERVER-03 computer to open its Details. 9 From the left-hand pane, click Log Inspection Protection Module and click the Log Inspection Events tab. An event related to the Security log being cleared is displayed. 92 © 2021 Trend Micro Inc. Education Lab 11: Inspecting Logs on Protected Servers If the events are not displayed, click Get Events and wait for the Deep Security Manager to contact the Agent to retrieve events. Note: Alternately, click the Events and Reports menu, and in the left-hand frame, click Log Inspection Events. This will display Log Inspection Events for all computers. © 2021 Trend Micro Inc. Education 93 Lab 11: Inspecting Logs on Protected Servers 10 Double-click the event triggered by the 1002795 - Microsoft Windows Events rule and examine the event details. 11 Click Close. Exercise 3: Scan for Recommendations In this exercise, participants will initiate a Recommendation Scan to view what other Log Inspection rules would be suggested for this host computer. 1 94 Return to the Computers menu and double-click the SERVER-03 computer to open its Details once again. © 2021 Trend Micro Inc. Education Lab 11: Inspecting Logs on Protected Servers 2 In left-hand menu, click Log Inspection. On the General tab, click Scan for Recommendations. 3 The scan will be initiated on the SERVER-03 computer. The Task column for the computer will display Scanning for Recommendations. This process may take a few minutes to complete. © 2021 Trend Micro Inc. Education 95 Lab 11: Inspecting Logs on Protected Servers 4 Once the Task column clears, click Assign/Unassign. In the Log Inspection Rule window, click Recommended for Assignment from the first drop-down list The list of recommended rules is displayed. To apply any of the recommended rules, click to enable the rules from the list. Click Cancel without applying any of the recommendations, and close Details. 96 © 2021 Trend Micro Inc. Education Lab 12: Accessing Deep Security Through the Application Programming Interface In this lab, participants will access some simple Deep Security functions through the Application Programming Interface (API). An application called Postman will be used to forward the API requests to Deep Security. Estimated time to complete this lab: 30 minutes Exercise 1: Create an API key To use the Deep Security API, you will need an API key. In this exercise, a key with full access to Deep Security will be created. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Log into the Deep Security Manager Web console as MasterAdmin. 3 Click Administration > User Management > API Keys and click New. 4 Create a new API key with the following details and click Next: • • • • Name: Exercise key Description: Type a description for the key Role: Full Access Expires on: Select the date a year from today © 2021 Trend Micro Inc. Education 97 Lab 12: Accessing Deep Security Through the Application Programming Interface 5 The secret key value is displayed. This is the only time you will have access to this key. 6 Click Copy to clipboard and paste the key into the API Keys.txt file on the Windows desktop. Save the file. 7 Close the key creation wizard. Exercise 2: Access the API Reference In this exercise, participants will access the Deep Security API reference information on the Automation Center. The Chrome browser is recommended to display the site. 1 Still on the VM-SERVER-02 virtual machine, access the Deep Security Automation Center by clicking the bookmark in the Chrome browser, or enter the following URL in Chrome: https://automation.deepsecurity.trendmicro.com 98 © 2021 Trend Micro Inc. Education Lab 12: Accessing Deep Security Through the Application Programming Interface The Deep Security Automation Center Web site is displayed. 2 In the Version list, select 20.0 3 Click the API Reference menu. The Deep Security API-accessible functions are displayed in the frame on the left-hand side of the Web page. 4 Scroll down and expand Computers. The operations related to the Computers list available through the API are displayed. Click List Computers. © 2021 Trend Micro Inc. Education 99 Lab 12: Accessing Deep Security Through the Application Programming Interface The parameters related to displaying the Computers list are displayed in the middle frame. Code samples for Python, Javascript and Java are displayed in the right-hand frame. 5 In the code samples frame, click Get /computers to display the URL of the API path. Select the entire path and copy to the clipboard. Exercise 3: Use the API to List Computer Details In this exercise, an API request for computer details will be submitted to Deep Security through the Postman application. This application allows you to test submissions to the API without having to use a specific programming language. 1 On the Windows desktop, open the Postman application. 2 In the GET frame, paste the URL of the API path. Replace dsm.example com with the URL of the Deep Security Server, for example: server-02.trend.local 100 © 2021 Trend Micro Inc. Education Lab 12: Accessing Deep Security Through the Application Programming Interface Note: You can type the URL, or copy and paste the URL listed in the API Keys.txt file. 3 The API key and API version must be included in the request for the Computers list through Postman. In Postman, click the Headers tab. For the API key: • • Click in the first row under Key and type the key name of api-secret-key. Click under Value and paste the value of the secret API key from the API Keys.txt file. For the API version: • • Click in the second row of the list under Key and type the key name of api-version. Click under Value and type v1. © 2021 Trend Micro Inc. Education 101 Lab 12: Accessing Deep Security Through the Application Programming Interface 4 Click Send. Postman will pass the request for the Computers list to Deep Security through an HTTP request. 5 The response, in this case a list of computer details in JSON format, is displayed in the Body section in Postman. Scroll through the list to view details of all the computers. 102 © 2021 Trend Micro Inc. Education Lab 12: Accessing Deep Security Through the Application Programming Interface Exercise 4: Use the API to Create a Group In this exercise, an API request to create a new computer group will be submitted to Deep Security through the Postman application. 1 Return to the API Reference and expand Computer Groups. The operations related to Groups in Deep Security that are available through the API are displayed. Click Create A Computer Group. Note that this function uses a POST operation. © 2021 Trend Micro Inc. Education 103 Lab 12: Accessing Deep Security Through the Application Programming Interface 2 In the code samples frame, click POST /computergroups to display the URL of the API path. Select the entire path and copy to the clipboard. 3 Return to the Postman application and click + to create a new tab. 104 © 2021 Trend Micro Inc. Education Lab 12: Accessing Deep Security Through the Application Programming Interface 4 Select POST from the operations list and paste the URL of the API path for this operation. Replace dsm.example com with the URL of the Deep Security Manager computer, for example: server-02.trend.local 5 On the Headers tab, add the API key and API version headers as in the previous exercise. For the API key: • • Click in the first row of the list under Key and type the key name of api-secret-key. Click under Value and paste the value of the secret API key from the API Keys.txt file. For the API version: • • Click in the second row of the list under Key and type the key name of api-version. Click under Value and type v1. 6 When using a POST operation, parameters must be a submitted along with the headers to provide details to Deep Security, for example, the name and description of the group to be created. Return to the API Reference and in the Request Sample section, click Payload. Click Copy to copy the JSON-formatted template data. © 2021 Trend Micro Inc. Education 105 Lab 12: Accessing Deep Security Through the Application Programming Interface 7 Return to Postman. In the list of tabbed items below the API URL, click Body. In the list of formats, click Raw, then at the end of the list of formats, expand the list and click JSON. Paste the payload template data in the frame. 8 Modify the pasted template data in the Body to include the name and description for a new computer group. Replace the string values with the group details, for example: • • • name: Classroom description: Demonstration Group for API Lesson parentGroupID: 0 9 Return to the Headers tab. Note that a new header called Content-Type has been automatically added with a value of application/json as this was the format selected for the Body. 10 Click Send. Postman will pass the request for Deep Security through an HTTP API request. 106 © 2021 Trend Micro Inc. Education Lab 12: Accessing Deep Security Through the Application Programming Interface 11 Return to the Deep Security Manager Web console and note that the new group has been created. © 2021 Trend Micro Inc. Education 107 Lab 12: Accessing Deep Security Through the Application Programming Interface Optional Exercise: Use the API to Delete a Policy If you have extra time at the end of the other exercises, you may attempt this extra task. In this optional exercise, an unneeded policy will be deleted through the API using the Postman application. 1 In the API Reference, expand Policies. The operations related to Policies available through the API are displayed. Click Delete a policy. Note that this function uses a DEL operation. 2 In the code samples frame, note the path of DELETE /policies/{policyID}. This URL requires the policyID of the policy that is to be deleted. Before we can delete the policy, we need to retrieve the IDs of the policies currently available in Deep Security. 3 In the API Reference menu, and expand Policies. Click List Policies and copy the API URL. 4 Return to the Postman application and click + to create a new tab. Select GET from the operations list and paste the URL of the API path. Replace dsm.example com with the URL of the Deep Security Manager computer. 5 On the Headers tab, add the API key and API version headers as in the previous exercise. For the API key: • • 108 Click in the first row of the list under Key and type the key name of api-secret-key. Click under Value and paste the value of the secret API key from the API Keys.txt file. © 2021 Trend Micro Inc. Education Lab 12: Accessing Deep Security Through the Application Programming Interface For the API version: • • Click in the second row of the list under Key and type the key name of api-version. Click under Value and type v1. 6 Click Send. Postman will pass the request to Deep Security through an HTTP API request. 7 The list of policies and their details are displayed in the Body section. © 2021 Trend Micro Inc. Education 109 Lab 12: Accessing Deep Security Through the Application Programming Interface 8 Scroll through the response body, or use Search, to locate the Solaris policy. This policy is not required in your environment and you have decided it should be deleted. Once you locate the Solaris policy, scroll through its parameters to locate its ID. Take note of the policy ID assigned to the Solaris policy. You will find the ID field near the end of the parameters for the Solaris policy. 9 Return to the Delete a Policy operation in the API Reference and copy the policy delete API URL. 10 In Postman, change the operation type to DEL and paste the API URL. Replace dsm.example com with the URL of the Deep Security Manager computer. Replace {policyID} in the URL with the ID of the Solaris policy. 11 On the Headers tab, add the API key and API version headers as in the previous exercise. For the API key: • • Click in the first row of the list under Key and type the key name of api-secret-key. Click under Value and paste the value of the secret API key from the API Keys.txt file. For the API version: • • Click in the second row of the list under Key and type the key name of api-version. Click under Value and type v1 12 Click Send. Postman will pass the request to Deep Security through an HTTP API request. 13 Return to the Deep Security Manager Web console and verify that the Solaris policy has been deleted. 14 Close Postman. 110 © 2021 Trend Micro Inc. Education Lab 13: Integrating Deep Security With Connected Threat Defense In this lab, participants will integrate Deep Security with Deep Discovery Analyzer and Apex Central as part of Connected Threat Defense. A file sample will be submitted manually and the progress of the file through the phases of Connected Threat Defense will be observed. Estimated time to complete this lab: 30 minutes Exercise 1: Integrate Deep Security With Apex Central To participate in Connected Threat Defense, Deep Security must be added to Apex Central as a Manager Server. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Open the Apex Central Web Management console by typing the following URL, or by clicking the bookmark on the browser toolbar: https://server-03.trend.local/WebApp/Login.html 3 When prompted, authenticate with the following credentials: • • Note: Username: Admin Password: Pa$$w0rd (using the zero character) If a license expired message is displayed, click Administration > License Management > Apex Central and click Update License Information. 4 Click Administration > Managed Servers > Server Registration. 5 Select Deep Security from the Server Type list and click Add a product. © 2021 Trend Micro Inc. Education 111 Lab 13: Integrating Deep Security With Connected Threat Defense 6 Type the details of the Deep Security Manager as follows and click Save. • • • • Server: https://server-02.trend.local:4119 Display name: Deep Security User name: MasterAdmin Password: trendmicro 7 Deep Security is now listed as a Managed Server. Exercise 2: Integrate Deep Discovery Analyzer with Apex Central The Deep Discovery Analyzer must also be added as a Managed Server in Apex Central. 1 112 Still in the Apex Central Web Management console, click Administration > Managed Servers > Server Registration. © 2021 Trend Micro Inc. Education Lab 13: Integrating Deep Security With Connected Threat Defense 2 Select Deep Discovery Analyzer from the Server Type list and click Add a product. 3 Type the details of the Deep Discovery Analyzer device as follows and click Save. • • • • Server: https://192.168.4.5 Display name: Analyzer User name: Admin Password: Admin1234! 4 Deep Discovery Analyzer is now listed as a Managed Server. © 2021 Trend Micro Inc. Education 113 Lab 13: Integrating Deep Security With Connected Threat Defense Exercise 3: Add Deep Discover Analyzer and Deep Security to the Apex Central Product Directory In this exercise, Deep Security and Deep Discover Analyzer will be added to the Product Directories list in Apex Central. 1 In the Apex Central Web Management console, click Directories > Products and click Directory Management. 2 Click Local Folder, and click Add Folder. 3 Type a name for a new folder (or directory), for example, Trend Micro Servers and click Save. Click OK to confirm the creation of the new directory. 114 © 2021 Trend Micro Inc. Education Lab 13: Integrating Deep Security With Connected Threat Defense 4 Expand the New Entity folder. Drag Analyzer from the New Entity folder to the newly created Trend Micro Servers folder. When prompted, click OK to acknowledge the move. 5 The Analyzer device should now be displayed in the Trend Micro Servers folder. © 2021 Trend Micro Inc. Education 115 Lab 13: Integrating Deep Security With Connected Threat Defense 6 Drag the Deep Security device from New Entity folder to the Trend Micro Servers folder. When prompted, click OK to acknowledge the move. Deep Discovery Analyzer and Deep Security should be displayed in the Trend Micro Servers folder. Exercise 4: Configure Deep Security for Connected Threat Defense In this exercise, Deep Security will be configured to use the Deep Discovery Analyzer and Apex Central. 1 Log into the Deep Security Manager Web console, click the Administration menu. In the left-hand pane, expand System Settings and click the Connected Threat Defense tab. In the Connected Threat Defense section, click Enable submission of suspicious file to Deep Discovery Analyzer. To automatically submit files to Deep Discovery Analyzer from Deep Security, click Enable automatic file submission. Note: 116 Automatic Submission to Deep Discovery Analyzer occurs every 15 minutes and will submit a maximum of 100 files per submission. © 2021 Trend Micro Inc. Education Lab 13: Integrating Deep Security With Connected Threat Defense Click Use the Deep Discovery Analyzer associated with the Apex Central that Deep Security is registered with. 2 Click Add/Update the Certificate to update to the correct Deep Discovery Analyzer certificate. Click Close. 3 Click Test Connection and insure that the connection is successful. 4 Scroll down and enable Compare objects against Suspicious Object List and click Use the Apex Central That Deep Security is registered with. 5 Click Add/Update the Certificate to update to the correct Apex Central certificate. Click Close. 6 Click Test Connection and insure the connection is successful. 7 Click Save. © 2021 Trend Micro Inc. Education 117 Lab 13: Integrating Deep Security With Connected Threat Defense Exercise 5: Create a Malware Scan Configuration In this exercise, a malware scan configuration will be modified to allow Deep Security to submit suspicious objects to Deep Discovery Analyzer for further analysis. 1 In Deep Security Manager, click the Policies menu. In the left-hand pane, expand Common Objects > Other > Malware Scan Configurations. 2 Edit the Classroom scan configuration created in a previous exercise. On the General tab, click Scan for exploits against known critical vulnerabilities and aggressive detection of unknown suspicious exploits. Click OK 3 Configure any other malware scan settings if required. Exercise 6: Enable Connected Threat Defense In this exercise, sandbox analysis will be enabled in the Classroom policy. 1 118 Still in the Deep Security Manager Web console, click the Policies menu and double-click to edit the Classroom policy. © 2021 Trend Micro Inc. Education Lab 13: Integrating Deep Security With Connected Threat Defense 2 Click the Anti-Malware protection module and click the Connected Threat Defense tab. Ensure that Submit files identified as suspicious... and Use Apex Central’s Suspicious Object List are both set to Yes. 3 Click Save. Exercise 7: Submit a File to Deep Discovery For Analysis In this exercise, a file previously captured as malware will be manually submitted for analysis. 1 In the Deep Security Manager Web console, click the Computers menu and open the details of the SERVER-03 computer. 2 Click the Anti-Malware protection module in the left-hand pane, then click the Identified Files tab. 3 Locate the l1-1.doc file that was captured as malware in a previous lesson. Click the entry to highlight and click Analyze. (You may need to change the Period value and click Refresh) Note: The l1-1.doc file is identified as EXPL_CVE20158 in the Malware column. © 2021 Trend Micro Inc. Education 119 Lab 13: Integrating Deep Security With Connected Threat Defense 4 Follow the steps in the wizard by clicking Next. 5 Submission of the file will be confirmed. 120 © 2021 Trend Micro Inc. Education Lab 13: Integrating Deep Security With Connected Threat Defense Exercise 8: Track the Submission In this exercise, the analysis of the submitted file will be tracked in Deep Discovery Analyzer and Apex Central. 1 Log into the Deep Discovery Analyzer Web Management console by entering the following URL in a web browser, or by clicking the bookmark in the browser: https://192.168.4.5 2 Log in with the following Deep Discovery Analyzer credentials when prompted: • • Note: User name: admin Password: Admin1234! If a message is displayed about the license expiring, click Administration > License and click Refresh. 3 Verify that the file has been submitted by the Deep Security by clicking Virtual Analyzer > Submitters. Deep Security should be displayed as the submitter of the object. 4 Click Virtual Analyzer > Submissions. On the Processing tab, verify that the l1-1 [1].doc file is being processed by the Analyzer under today's date. There will be some delay before the file is forwarded from Deep Security Manager and processing of the file by Deep Discovery Analyzer begins. © 2021 Trend Micro Inc. Education 121 Lab 13: Integrating Deep Security With Connected Threat Defense 5 Once the submission is processed, the entry will be displayed on the Completed tab. There will be some delay while the file is processed. 6 Click Virtual Analyzer > Suspicious Objects and verify the object it is now visible in the list. To uniquely identify the object, the hash will be displayed instead of the file name. 7 Return to the Apex Central Web Management console and click Threat Intel > Virtual Analyzer Suspicious Objects and verify the object it is now visible in the list. You may need to wait several minutes for the results of the analysis to be passed to Apex Central. 122 © 2021 Trend Micro Inc. Education Lab 13: Integrating Deep Security With Connected Threat Defense 8 Click to select the object in the list and click Configure Scan Action. 9 In the Scan Action window, select Block in the For selected files section and click Apply. 10 When prompted, confirm the application of the scan action. Click Apply Scan Action. © 2021 Trend Micro Inc. Education 123 Lab 13: Integrating Deep Security With Connected Threat Defense The Scan Action is changed to Block. 124 © 2021 Trend Micro Inc. Education Appendix A Lab: Activating and Managing Multiple Tenants In this lab, participants will explore multi-tenancy in Deep Security. Note: A dedicated Activation Code is required to enable multi-tenancy. This code is available in the Activation Code.txt file in the Lab Files folder on the computer desktop. Estimated time to complete this lab: 30 minutes The scenario for Multi-Tenancy in this lab will use two tenants. dsm dsm_1 MasterAdmin SQL dsm_2 Tenant 0 ABC_Co XYZ_Ltd Admin_ABC Admin_XYZ Exercise 1: Enable Multi-Tenancy In this exercise, multi-tenancy will be enabled in Deep Security Manager. 1 In the lab environment, switch to the VM-SERVER-02 virtual machine. 2 Log into the Deep Security Manager Web console as the MasterAdmin. © 2021 Trend Micro Inc. Education 125 Appendix A Lab: Activating and Managing Multiple Tenants 3 In the Deep Security Manager Web console, click the Administration menu. Click System Settings and the Advanced tab. Click Enable Multi-Tenant Mode. 4 Type (or paste) the Multi-Tenancy Activation Code from the Activation Code.txt file in the Lab Files folder on the desktop and click Next. 5 Click Inherit Licensing from Primary Tenant and click Next. 126 © 2021 Trend Micro Inc. Education Appendix A Lab: Activating and Managing Multiple Tenants 6 A Configuration Summary is displayed, click Finish to complete enabling multi-tenancy. This operation is irreversible once applied. 7 Multi-Tenancy is now enabled. Click Close to continue. 8 A new menu item called Tenants now appears under the Administration menu, as well as a new tab called Tenants. © 2021 Trend Micro Inc. Education 127 Appendix A Lab: Activating and Managing Multiple Tenants Exercise 2: Create Multiple Tenants In this exercise, two new tenants will be created in Deep Security Manager Web console. 1 Still in the Deep Security Manager Web console with the Tenants item selected in the left-hand pane, click New. 2 Configure a multi-tenant user account with the following details and click Next: • • • • Account Name: ABC_Co Email Address: Admin@ABC.com Locale: English (US) Time Zone: select the time zone for your location 3 Configure an administrator for the tenant with the following details and click Next: • • • 128 Username: Admin_ABC Password Option: No Email Password: trendmicro © 2021 Trend Micro Inc. Education Appendix A Lab: Activating and Managing Multiple Tenants 4 Confirm the settings and click Finish to create the new tenant. 5 A progress bar will display the status of the tenant creation process. It will take a few minutes to create the tenant. © 2021 Trend Micro Inc. Education 129 Appendix A Lab: Activating and Managing Multiple Tenants 6 Once the tenant creation is complete, repeat the process to add another new tenant with the following details: • • • • • • • Account Name: XYZ_Ltd Email Address: Admin@XYZ.com Locale: English (US) Time Zone: select the time zone for your location Username: Admin_XYZ Password Option: No Email Password: trendmicro 7 Two new tenants will be displayed in the Deep Security Manager Web console. Exercise 3: Lock Down Tenants In this exercise, tenants will be assigned different Protection Modules to illustrate how tenants can have different configurations. 1 130 Sign out of the Deep Security Manager Web console as the MasterAdmin user. © 2021 Trend Micro Inc. Education Appendix A Lab: Activating and Managing Multiple Tenants 2 The Sign In window is displayed with a new Account Name field now that Multi-Tenancy is enabled. 3 Sign back in as MasterAdmin for the Primary Tenant. Since you are logging in as the Primary Tenant, leave the Account Field name empty. An indicator on the top of the Deep Security Manager Web console page indicates you are logged into the Primary tenant. 4 Click the Administration menu and click Tenants in the left-hand frame. Double-click the ABC_Co tenant to open Properties. 5 Click the Modules tab. Click Selected Modules and click to enable the Integrity Monitoring and Log Inspection Protection Modules only for this tenant. © 2021 Trend Micro Inc. Education 131 Appendix A Lab: Activating and Managing Multiple Tenants 6 Click the Agent Activation tab and view the Agent-Initiated Activation string. The Tenant ID and Tenant Password in the string will allow Deep Security Agents to activate on the correct tenant. Click Apply then click OK. 7 Repeat this process for the XYZ_Ltd tenant, but enable only the Firewall and Intrusion Prevention Protection Modules. 8 Click the Agent Activation tab once again and view the Deep Security Agent-initiated Activation string. Compare the strings for both tenants and notice that they are different. Click Apply, then OK. 132 © 2021 Trend Micro Inc. Education Appendix A Lab: Activating and Managing Multiple Tenants 9 The Tenants list displays both tenants and the Visible Modules column displays the Protection Modules enabled for each tenant. 10 Sign out, then sign in as the first tenant with the following details: • • • Account name: ABC_Co Username: Admin_ABC Password: trendmicro 11 Click the Policies menu, and in the left-hand frame, expand Common Objects > Rules. Note the rules for the two Protection Modules enabled for this tenant. 12 Expand Policies in the right-hand frame and double-click the Windows policy. Note the Protection Modules that are available for this tenant in the left-hand frame of the Details window. Click Close. 13 Sign out, then sign in again as the second tenant with the following details: • • • Account name: XYZ_Ltd Username: Admin_XYZ Password: trendmicro © 2021 Trend Micro Inc. Education 133 Appendix A Lab: Activating and Managing Multiple Tenants 14 Return to the Policies menu, and in the left-hand frame, expand Common Objects > Rules once again. Note the rules for the two Protection Modules enabled for this tenant. 15 Again, expand Policies in the right-hand frame and double-click the Windows policy. Note the Protection Modules that are available for this tenant in the left-hand frame of the Details window. 16 Sign out of the Deep Security Manager Web console. 17 Still on the SERVER-02 computer, click Start > Microsoft SQL Server Tools 17 > Microsoft SQL Server Management Studio 17. 18 Log into Microsoft SQL Server with the following credentials that were assigned when the database was initialized: • • • • • Server Type: Database Engine Server Name: SERVER-02 Authentication: SQL Server Authentication Login: sa Password: trendmicro Click Connect. 134 © 2021 Trend Micro Inc. Education Appendix A Lab: Activating and Managing Multiple Tenants 19 Once connected to the SQL Server, expand Databases in the left-hand pane to view the individual databases created for each Tenant. Note the main dsm database for the Primary Tenant, and databases for each of the Tenants (dsm_1 and dsm_2). When using Microsoft SQL Server, a separate database will be added for each additional Tenant that is created. 20 Click File > Exit to close the Microsoft SQL Server Management Studio. Exercise 4: Add Computers to a Tenant In this exercise, a Deep Security Agent computer will be deactivated and deleted from Deep Security Manager on the Primary tenant, then added back into one of the tenants. 1 Still on the SERVER-02 computer, log into the Deep Security Manager Web console on the Primary tenant as the Master Administrator. 2 Click the Computers menu. Locate and right-mouse click the SERVER-04 computer and click Actions > Deactivate. Once the computer displays as Unmanaged, right-click again and select Delete. The SERVER-04 computer is no longer registered to the Primary tenant and is removed from the Computers list. 3 Sign out of the Deep Security Manager Web console as the Master Administrator. 4 Sign back into Deep Security Manager Web console as the administrator for the ABC_Co tenant. 5 Click the Computers menu and add the SERVER-04 computer using Add Computer. The Add Computer operation using the hostname automatically activates the Agent on the SERVER-04 computer. © 2021 Trend Micro Inc. Education 135 Appendix A Lab: Activating and Managing Multiple Tenants 6 Double-click the entry for SERVER-04. The Status for the computer is displayed as Managed (Online). Note that in the left-hand pane only the allowed Protection Modules are displayed. 7 Close the Details window and sign out of the Deep Security Manager Web console as the tenant. 136 © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection In this lab, participants will deploy the Deep Security Virtual Appliance in a new environment. Deep Security, VMware vCenter, VMware NSX Advanced and VMware ESXi are already deployed in this environment. Estimated time to complete this lab: 40 minutes Exercise 1: Verify the Import of the Deep Security Virtual Appliance Package into Deep Security Manager The Deep Security Virtual Appliance was already imported into Deep Security Manager. In this exercise, you will confirm the appliance is available for deployment in a later exercise. 1 In the second email message you received from Trend Micro Product Cloud, click the link to open the Deep Security Virtual Appliance Lab. 2 The Product Cloud 2.0 Training page is displayed in the browser. Expand Training in the left-hand pane and click Labs. 3 Hover your mouse over the name of the Deep Security Virtual Appliance Lab class and click Enter Training under the Operations column. 4 Hover your mouse over the Windows 2012 R2 virtual machine, and click Remote Control under the Operations column. 5 Log in with the following credentials: • • Username: Administrator Password: trendmicro 6 IN Google Chrome, log into the Deep Security Manager Web console by clicking the bookmark in the browser or typing the following URL: https://winsrv2012r2std.trend.local:4119 Log into the Deep Security Manager Web console with the following credentials: • • Username: MasterAdmin Password: trendmicro © 2021 Trend Micro Inc. Education 137 Appendix B Lab: Configuring Agentless Protection 7 Click Administration and in the left-hand pane, expand Software > Local Software. 8 Verify that the appliance installation package is displayed in the Local Software list. Exercise 2: Add VMware vCenter to the Computers List To manage the security of the virtual machines hosted on the ESXi server agentlessly with Deep Security, with an on-host Agent, or in combined mode, you must first add the vCenter to the Computers list in the Deep Security Manager Web console. 1 138 In the Deep Security Manager web console, click the Computers menu and click Add > Add VMware vCenter. © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 2 In the Add VMware vCenter Wizard, provide the details of vCenter as follows and click Next: • • • • • Server Address: 192.168.100.65 Server Port: 443 Name: Type a name and description of the datacenter (for display purposes only) User name: admin@vsphere.local Password: trendmicro 3 Accept the SSL certificate when prompted. © 2021 Trend Micro Inc. Education 139 Appendix B Lab: Configuring Agentless Protection 4 When prompted, click Configure NSX Manager to bind with vCenter and provide the details of NSX Manager as follows and click Next: • • • • Manager Address: 192.168.100.66 Manager Port: 443 Username: admin Password: trendmicro 5 Accept the SSL certificate when prompted. Note: 140 If a Previous deployment detected... message is displayed, click I have removed all Deep Security services.... and click Next. © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 6 Review the details of the imported vCenter and click Finish. 7 The Add VMware vCenter Wizard will display a success message when vCenter has been imported. Click to enable the option to automatically create two Event-Based Tasks: one to activate virtual machines when protection is added and another to deactivate virtual machines when protection is removed. Click Close. © 2021 Trend Micro Inc. Education 141 Appendix B Lab: Configuring Agentless Protection 8 In the Computers list, expand vCenter. The ESXi clusters and virtual machines are displayed in the Computers list. 9 Click Administration > Event-Based Tasks. Note the two tasks that were created as part of the Add vCenter wizard. Exercise 3: Install the Guest Introspection Service on VMware ESXi To protect the virtual machine with the Deep Security Virtual Appliance for file-based protection such as Anti-Malware, you must install the Guest Introspection service on your ESXi servers. 1 Still on the Windows 2012 R2 virtual machine, access the vSphere Web Client by clicking the bookmark on the browser toolbar in the Chrome browser, or by typing the following URL in Chrome: https://192.168.100.65 142 © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 2 Select the option to log into the vSphere Web Client (Flash) version of the client with the following credentials: • • Username: admin@vsphere.local Password: trendmicro You will need to click Allow Flash when prompted to access the Web Console in the browser. 3 Click Home > Networking & Security. © 2021 Trend Micro Inc. Education 143 Appendix B Lab: Configuring Agentless Protection 4 In the left-hand frame, click Installation and Upgrades and click the Service Deployments tab. 5 Click the green plus icon (+). 144 © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 6 The Deploy Network & Security Services window is displayed. Click Guest Introspection, and click Next. 7 Click the cluster that contains the ESXi servers and virtual machines that you want to protect, in this case EMEA, and click Next. © 2021 Trend Micro Inc. Education 145 Appendix B Lab: Configuring Agentless Protection 8 Select the network attributes as follows and click Next. • • • Datastore: datastore_1 Network: DPortGroup IP assignment: Click Change. Click Use IP Pool and click the pool named Appliance Pool. Click Next. 9 Review the settings, and click Finish. 10 vSphere will take a few minutes to install the Guest Introspection service. 146 © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 11 When done, Installation Status will display as Succeeded and Service Status will display as Up. To update the status, you may need to click Refresh on the title bar of the vSphere Web Client. Note: Do not proceed with the exercise until the statuses are correctly displayed. It may take a few minutes to complete the needed operations. Exercise 4: Install the Trend Micro Deep Security Service on VMware ESXi Deploying the Trend Micro Deep Security service will enable the Deep Security Virtual Appliance on the ESXi server. 1 Still on the Service Deployments tab, click the green plus icon (+) once again. © 2021 Trend Micro Inc. Education 147 Appendix B Lab: Configuring Agentless Protection 2 The Deploy Network & Security Services window is displayed. Click the Trend Micro Deep Security service, and click Next. 3 Click the cluster that contains the ESXi servers and virtual machines that you want to protect, in this case, EMEA and click Next. 148 © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 4 Select the network attributes as follows and click Next. • • • Datastore: datastore_1 Network: DPortGroup IP assignment: Click Change. Click Use IP Pool and click the pool named Appliance Pool. Click OK, then Next. 5 Review the settings, and click Finish. 6 vSphere will take a few minutes to install the Deep Security service. © 2021 Trend Micro Inc. Education 149 Appendix B Lab: Configuring Agentless Protection 7 When it is finished, Installation Status will display as Succeeded and Service Status will display as Up. To update the status, you may need to click Refresh on the title bar of the vSphere Web Client. Note: Do not proceed with the exercise until the statuses are correctly displayed. It may take a few minutes to complete the needed operations. The Guest Introspection and Deep Security services are now deployed. Exercise 5: Create an NSX Security Group A Security Group will assign policy settings to the virtual machines. In this exercise, an NSX security Group will be created. 1 150 Still in vSphere Web Client, go to Home > Networking & Security > Service Composer. © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 2 Click the Security Groups tab. 3 Click New Security Group. © 2021 Trend Micro Inc. Education 151 Appendix B Lab: Configuring Agentless Protection 4 Assign the details for the security group as follows and click Next: • • Name: Protected by Deep Security Description: Type a description for the Security Group 5 If you wish to restrict membership in this group based on certain filtering criteria, enter these dynamic membership criteria here. Click Next to skip this step. 152 © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 6 There are many ways to include or exclude objects in a NSX Security Group, but for this example, we will simply include the virtual images that contains the host that we want to protect. In the Select objects to include window, click Virtual Machine from the Object Type menu, and move the client virtual machines to protect to the Selected Objects column. Click Finish to create the new Security Group. 7 Return to the Security Groups tab to see the newly listed Security Group. © 2021 Trend Micro Inc. Education 153 Appendix B Lab: Configuring Agentless Protection Exercise 6: Create an NSX Security Policy A NSX Security Policy with Deep Security enabled as both an Endpoint Service and as a Network Introspection service must be created. 154 • If you are using only the Anti-Malware or Integrity Monitoring modules, you will only need to enable the Guest Introspection service. • If you are using only the Web Reputation, Firewall, or Intrusion Prevention protection modules, you will only need to enable the Network Introspection services. 1 Still in the Service Composer, click the Security Policies tab. 2 Click Create Security Policy. © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 3 Assign the details for the Security Group as follows and click Next: • • Name: Protected by Deep Security Policy Description: type a description for the Security Policy 4 In the Add Guest Introspection Service window, click the green plus sign (+) to add a Guest Introspection Service. © 2021 Trend Micro Inc. Education 155 Appendix B Lab: Configuring Agentless Protection Provide the following details for the service: • • • • • • Name: Guest Introspection Action: Apply Service Name: Trend Micro Deep Security Service Profile: If you are using event-based tasks to handle the creation and protection of VMs, select Default (EBT). If you have synchronized your Deep Security policies with NSX Service Profiles, select the Service Profile that matches the Deep Security policy that you want to apply. In this case, use Default (EBT). State: Enabled Enforce: Yes Click OK, then click Next. 5 Do not make any changes in the Firewall Rules window and click Next. 156 © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 6 In the Network Introspection Services window you will add two Network Introspection Services to the NSX Security Policy: a first one for outbound traffic, and a second one for inbound traffic. Click the green plus sign to create a new service. Create the first outbound service with the following details: • • • • • • • • • • Name: Outbound Description: Type a description for the service Action: Redirect to service Service Name: Trend Micro Deep Security Profile: Select the same NSX Service Profile as you did in step 3. Source: Policy's Security Groups Destination: Any Service: Any State: Enabled Log: Do not log © 2021 Trend Micro Inc. Education 157 Appendix B Lab: Configuring Agentless Protection 7 For the second inbound service, click the green plus sign again to create another new service. Provide the following details: • • • • • • • • • • 158 Name: Inbound Description: Type a description for the service Action: Redirect to service Service Name: Trend Micro Deep Security Profile: Select the same NSX Service Profile as you did in step 3. Source: Any Destination: Policy's Security Groups Service: Any State: Enabled Log: Do not log © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection Click OK. 8 Both Network Introspection Services are displayed. Click Finish to complete. © 2021 Trend Micro Inc. Education 159 Appendix B Lab: Configuring Agentless Protection 9 After a few moments, the policy is listed as published. Exercise 7: Apply the NSX Security Policy to the NSX Security Group In this exercise, you will apply the Security Policy to the Security Group containing the virtual machines to protect. 1 160 Still on the Security Policies tab with the new Security Policy selected, click Apply Security Policy. © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 2 In the Apply Policy to Security Groups window, select the Security Group that contains the VMs you want to protect, in this case Protected by Deep Security, and click OK. 3 The NSX Security Policy is now applied to the virtual machines in the NSX Security Group. 4 Click Protected by Deep Security Policy to view the policy summary. When virtual machines are moved into the security group, they will get the NSX Security Group tag and the Deep Security Manager will automatically activate the virtual machines and assign the Security Policy to them. © 2021 Trend Micro Inc. Education 161 Appendix B Lab: Configuring Agentless Protection Exercise 8: Apply Deep Security Protection to the Virtual Machines The Deep Security Virtual Appliance is now configured and virtual machines on the ESXi server activate and are ready for Deep Security protection. 1 Log into the Deep Security Manager Web console as MasterAdmin. 2 Note that the Deep Security Virtual Appliance is listed as Managed (Online). The virtual machines on the ESXi Server will activate automatically based on the event-based task and will list as Managed (Online) within 5 minutes. 162 © 2021 Trend Micro Inc. Education Appendix B Lab: Configuring Agentless Protection 3 Double-click the dsva.trend.local computer to view its details. Note that this machine is listed as an Appliance and displays the protected guest virtual machines on the ESXi server. The details of the appliance virtual machines are also displayed. Click Close when done. 4 Double-click the win2012r2en computer to view its details. © 2021 Trend Micro Inc. Education 163 Appendix B Lab: Configuring Agentless Protection Note that this computer is listed as Managed (Online), but does not yet have a Deep Security Policy applied to it. The policy can be assigned through these details. The ESXi server hosting this virtual machine is also shown as well as the appliance providing the protection. Close the Details window when done. 164 © 2021 Trend Micro Inc. Education