ADMINISTERING INTERNET SHIELD Agenda What can Internet Shield be used for? Administering Internet Shield • Firewall configuration • Network Quarantine configuration • Application Control configuration • Intrusion Prevention configuration Page 2 Internet Shield…What For? Internet Shield protects computers from unauthorized access from the internet, as well as attacks originating from inside the LAN Core protection components and purpose • Firewall • Restrict traffic based on used protocols and ports • Application Control • Preventing malicious programs sending information out of the computer (trojan defense) • Intrusion Prevention • Stops malicious packets aimed on open ports (network attacks) Page 3 Network Attack: Managed Network Worm traffic Managed Mobile Host Web Server x Policy traffic x Managed Hosts F-Secure Policy Manager Page 4 Network Attack: Unmanaged Network Worm traffic Unmanaged Mobile Host Web Server Trojan traffic VPN tunnel x Unmanaged Hosts Unmanaged File Server Page 5 INTERNET SHIELD ADMINISTRATION INTERFACE Remote Administration The Policy Manager Console offers two different graphical interfaces • Anti-Virus Mode • Optimized for administering F-Secure Anti-Virus Client Security • Advanced Mode • Used for deeper product configurations • Products other than AVCS have to be administered with this mode • Some settings are only available in this mode! Page 7 Anti-Virus Mode Management tabs • Host configuration and monitoring • Operations management Policy domain tab • Displays policy domain structure Message view • Informative messages • e.g. virus definitions update info Page 8 Advanced Mode Policy properties pane • Host configuration and monitoring • Operations management Product view pane • Provides most common settings • Functions differ for selected properties tabs (e.g. policy tab) Product help • Field focus help, if policy properties tab selected Message view • Informative messages • e.g. virus definitions update info Page 9 Anti-Virus Mode Summary Tab Policy Manager section • Policy distribution status • Virus and spyware definitions status • Autoregistration request Domain/Host section • Displays most important information • More detailed for hosts (e.g. UID) • Host alert summary Virus protection section • Real-time protection status • Infections (host or whole domain) • Virus definitions status (host or domain) Internet Shield section • Active security level (if host selected) • Latest Attack (host or whole domain) Page 10 Anti-Virus Mode Internet Shield Settings Firewall Security Levels • Define security level for host/s • Enable/disable/add security levels • Configure firewall components (e.g. Network Quarantine) • Enable/disable firewall components (e.g. Application Control) Firewall Rules • Define rules for existing or added security levels Firewall Services • Edit existing or create custom your own custom services Application Control • Define rules for unknown applications reported by hosts Page 11 FIREWALL CONFIGURATION Internet Shield Security Levels F-Secure Internet Shield provides administrators with predefined security levels • Each of them has a set of pre-configured firewall rules • Provides a easy and fast way of defining different policies on different domain levels The security levels are created in a way, that they suit most corporations • In general, no changes are needed • The console provides the possibility to change existing, or create complete new security levels (from scratch) Page 13 Provided Security Levels There are seven predefined security levels • Mobile, Home, Office (default), Strict (disabled), Normal (disabled), Custom (disabled), Network Quarantine • “Block all” and “Disabled” (allow all traffic) levels cannot be edited! • Network Quarantine is a special security level used by the Intelligent Network Access (INA) feature Page 14 Security Levels Structure 1 SECURITY LEVEL 2 RULES Allow Web Browsing 3 SERVICES • HTTP / Hyper Text Transfer Protocol • HTTPS (SSL) • FTP / File Transfer Protocol out out out Page 15 Finetuning Security Levels Choose the security level to edit Define location for sub-domain and host specific rules • Only possible on root level! Edit, add or clear (delete) rules Restore or force security levels • Choice: Active or all security levels Disable/Enable rules • Doesn’t delete the rule! Allow and place user defined rules • Recommended to leave “disabled” Page 16 Using Security Level Autoselection The auto-selection feature enables the automatic switching between different Internet Shield security levels, based on specific arguments • Rules are read from top to down (first rule matching will be applied) • Specified arguments (IP address or network) are referring to pre-defined methods (e.g. Default Gateway IP address) • Never: Disables the rule (no argument needed) • Always: Applies the rule, argument disregarded (used at last rule) Page 17 Creating Auto-selection Rules Goal • Hosts connected to the LAN should automatically use the ”Office” security level, and host outside the LAN should switch to the ”Mobile” security level Page 18 Office Rule Priority: 1 Security Level: 40office (security level ID) Method1: Default Gateway IP Address (most common method) Argument1: <Gateway IP address> Method2: Always (default method) Page 19 Mobile Rule Priority: 2 (doesn’t automatically increment!) Security Level: 20office (security level ID) Method1: Always (last catch rule) Argument1: No argument needed Method2: Always (default method) Page 20 Principles for Designing Firewall Rules Allow only the needed services, deny all the rest • In this way the security risk is minimized and well-known • The drawback is that when new services are needed the firewall must be reconfigured, but this is a small price for the security The opposite concept, to only deny dangerous services and allow the rest is not acceptable • No one can tell with certainty, which services are dangerous or might become dangerous in the future when a new security problem is discovered. Page 21 Principles for Designing Firewall Rules 1. Deny rules for the most dangerous services or hosts, optionally with alerting 2. Allow rules for much-used common services and hosts 3. Deny rules for specific services you want alerts about, e.g. trojan probes, with alerting 4. More general allow rules 5. Deny everything else Page 22 Proper Alerting Proper alerting can only be done by having proper granularity in the rule set: one rule for each type of alert you want • “Broad” rules will generate a lot of alerts, any important information may be lost in large volumes of useless noise If you really want alerts on the last rule (deny everything else) then it might be a good idea to have deny rules without alerting before it that drop high-volume traffic with little interest A bad decision would be to alert on network broadcasts in a corporate LAN Page 23 Good Practice Allow only the needed services, deny the rest Keep it simple and efficient For normal workstations, deny all inbound traffic For optional security measures, deny services that transfer confidential information (password etc) over the network • Deny POP, IMAP, SMTP, FTP, Telnet etc to 0.0.0.0/0 Page 24 Example: Simple Ruleset Outbound traffic • First rule allows outbound TCP & UDP to everywhere (for example web browsing is possible) • Protocols used during web browsing • TCP port 80 (HTTP) • TCP or UDP port 53 (DNS) Bi-directional traffic • Second rule drops all other traffic Page 25 Basic Desktop Policy Inbound traffic TCP, UDP ICMP Outbound traffic Managed host x Page 26 Basic Desktop Policy Page 27 SMB over Netbios...Still needed? Port Description 135 RPC (Remote Procedure Call) DCOM (Distributed Component Object) Allows remote computer to send commands to another computer. Used by services like DNS (Domain Name System) 137,138 & 139 Windows Networking using SMB over NBT (Netbios) (Windows NT and 9X) 445 Windows Networking using SMB directly over TCP (Windows 2000 and later) Page 28 Windows Networking Rules Page 29 More Strict Destop Policy Inbound traffic Outbound traffic SMTP POP, IMAP External (allowed) External (denied) Internal (allowed) TCP File Server Managed host LAN 10.10.10.0/24 SMB Mail Server DNS Server SMTP POP, IMAP DNS .110 .53 DMZ 194.197.29.0/24 x .139 Page 30 More Strict Desktop Policy Page 31 NETWORK QUARANTINE CONFIGURATION Who Is Connecting To My Network? It is in the interest of every corporation to prevent unauthorized hosts from connecting to the company network • Virus infections in data networks have become an increasingly serious problem Physically guarding network sockets is not going to be the solution • An automated system is needed, checking the host protection before granting network access • Anti-Virus protection status (e.g. real-time protection check) • Firewall protection status (e.g. packet filter status check) Page 33 Policy Manager Network Security Policy Manager Server provides two different solutions Network Admission Control (NAC) • Solution developed by Cisco Systems • Supported by Anti-Virus Client Security 6.x • No centralized management Network Quarantine (a.k.a. Intelligent Network Access INA) • Solution developed by F-Secure • Complete integration in Internet Shield • Centralized management possible Page 34 Using Network Quarantine Network Quarantine is disabled by default • Very simple to enable (Firewall Security Levels/Network Quarantine) • Monitors two host conditions • Virus definitions update status (age, default settings 4 days) • Real-time scanning status • If one of the conditions applies, then the host is quarantined (security level switches to “Network Quarantine”) Page 35 Example: Host Access Restrictions Network traffic is restricted • Reason: Real-time scanning is disabled • Solution: Re-enable real-time scanning Important: Administrators should restrict changes to system critical settings! Page 36 Network Quarantine Security Level Access limited to F-Secure Update Servers • Automatic Update Server/s • Automatic Update Proxy/ies • F-Secure Root Update Server Network access will be granted once the computer has • Re-activated real-time scanning • Updated the virus definitions Page 37 APPLICATION CONTROL CONFIGURATION Application Control Features Application Connection Control • Monitors applications sending and receiving information (client and server applications) • Protects from trojans sending out confidential information (trojan defense) • Component supports complete remote administration (all settings) Enhanced features • Memory write protection (application manipulation control) • Process creation protection (application launch control) • No central management • Feature enabling or disabling as only PMC setting Page 39 Application Connection Control Operation Application traffic Policy traffic F-Secure Policy Manager Managed Hosts x x x Page 40 Rules Wizard Connection Properties At first, you have to define the connection properties • Act as client (outbound, connecting) • Act as server (inbound, listening) It makes no sense to allow inbound connections for client applications (e.g. Internet Explorer) Page 41 Rules Wizard User Messages As a second step define, how the application connection policy is informed to the end user • No message (completely transparent) • Default message (defined in MIB tree) • Customized message Page 42 Rules Wizard Target Domain Selector New application instances cannot be created manually on the PMC • They are informed by the managed hosts (reporting needs to enabled!) • Not all the hosts might report the same applications • Still you might want to force certain host applications to the whole domain The rules Wizard has a domain target selector • Simple and fast to create company wide application control rules Page 43 Creating the Application List 1. Create a test environment representing your production computers (operating systems, service packs, applications, etc.) 2. Import these hosts to the centrally managed domain 3. Define rules for the reported applications 4. Distribute the policies Page 44 Configuration Tips Key settings 1. Action on Unknown Applications = Deny (inbound and outbound) 2. Report to Administrator = Report 3. Application Control Enabled = Yes 4. Memory Write Protection Enabled = No 5. Process Creation Protection Enabled = No Page 45 INTRUSION PREVENTION Recommended Configuration Intrusion Prevention is enabled by default • Similar to Network Quarantine, IDS configuration is really simple • Action on malicious packet: Log without dropping packet (default) • Alert severity: Warning (default) • Detection sensitivity: 100 % (default) Page 47 Detection Sensitivity Possibility of adjusting the detection sensitivity has two main purposes • Reducing the amount of alerts (false positives) • Improving the performance of the managed hosts Using values reduces the amount of false positives • 10 %: Maximum network performance, minimum alerts • 50 %: Only malicious patterns are verified and reported • 100 %: All existing patterns are verified and reported Page 48 Monitoring Network Attacks Possible network attacks can be monitored with several user interfaces • Anti-Virus Client Security user interface • Policy Manager Console • Internet Shield web interface Most common way is to use the Policy Manger Console • Possibility of monitoring the whole policy domain, rather than a specific host Page 49 Example: Host Intrusion Portscan on specific host • Local user interface reports alerts • 4 different static firewall rule hits (red) • 1 intrusion alert (Fin scan, yellow) Page 50 Monitoring Network Attacks Using Policy Manger Console Most recent attack visible in the Anti-Virus Mode Summary tab • Direct link to Internet Shield status information (affected host/s, attack time, etc.) Page 51 Summary What can Internet Shield be used for? Internet Shield remote administration • Firewall configuration • Network Quarantine configuration • Application Control configuration • Intrusion Prevention configuration Page 52