Forefront Threat Management Gateway 2010 Introduction to Forefront TMG Forefront TMG Value Proposition Firewall – Control network policy access at the edge Comprehensive Secure Web Gateway – Protect users from Web browsing threats Secure E-mail Relay – Protect users from e-mail threats Integrated Remote Access Gateway – Enable users to remotely access corporate resources Intrusion Prevention – Protect desktops and servers from intrusion attempts Simplified Features Summary • VoIP traversal • Enhanced NAT • ISP link redundancy Firewall • NAP integration with client VPN • SSTP integration Remote Access • HTTP antivirus/ antispyware • URL filtering • HTTPS forward inspection Secure Web Access • Exchange Edge integration • Antivirus • Antispam E-mail Protection • Array management • Change tracking • Enhanced reporting • W2K8, native 64-bit Deployment and Management • Network inspection system Intrusion Prevention • Malware protection • URL filtering • Intrusion prevention Subscription Services Deployment Scenarios Networks DMZ Internal External DMZ External DMZ EXT Internet ISP 1 DMZ INT ISP 2 TMG LAN 1 Local Host VPN client VPN Clients LAN 2 Branch LAN 3 Internal 5 Deployment Scenarios Network Sets DMZ Networks DMZ EXT Internet ISP 1 DMZ INT ISP 2 TMG VPN client LAN 1 LAN 2 Branch LAN 3 Deployment Scenarios Single Adapter Local Host Internet TMG LAN 1 LAN 2 LAN 3 VPN Client VPN Clients Internal 7 Forefront TMG as a Secure Web Gateway Array Support, Load balancing Scalable Logging & Reporting Support New reports, log fields Competitive Feature Set URL Filtering, Malware Inspection, NIS Easily Manageable Web Access Wizard, Task Oriented Integrated Policy Management, Directory Services Integration, Licensing 8 Secure Web Gateway Layered Security Unifies inspection technologies to: Malware Inspection URL Filtering Application Layer Proxy Network Inspection System HTTPS Inspection Logging & Reporting Windows Server® 2008 / R2 Protect against multi-channel threats Simplify deployment Keeps security up to date with updates to: Web antimalware URL filtering Network Inspection System HTTPS Inspection How HTTPS Inspection Works Enable HTTPS inspection Generate trusted root certificate Install trusted root certificate on clients contoso.com https://contoso.com https://contoso.com SIGNED BY VERISIGN SIGNED BY TMG 1. 2. 3. 4. 5. 6. 7. 8. Contoso.com Contoso.com Intercept HTTPS traffic Validate contoso.com server certificate Generate contoso.com server proxy certificate on TMG Copy data from the original server certificate to the proxy certificate Sign the new certificate with TMG trusted root certificate [TMG manages a certificate cache to avoid redundant duplications] Pretend to be contoso.com for client Bridge HTTPS traffic between client and server 11 HTTPS Traffic Inspection Process URL Filtering Malware Inspection Network Inspection System Internet SIGNED BY VERISIGN SIGNED BY TMG Contoso.com Contoso.com HTTPS Inspection terminates the SSL traffic at the proxy for both ends, and inspects the traffic against different threats Trusted certificate generated by proxy matching the URL expected by the client 12 HTTPS Inspection Notifications Notification provided by Forefront TMG client Notify user of inspection History of recent notifications Management of Notification Exception List May be a legal requirement in some geographies 13 HTTPS Inspection Notification User Experience 14 URL Filtering URL Filtering Microsoft Reputation Service • 91 built-in categories • Predefined and administrator defined category sets • Integrates leading URL database providers • Subscription-based • Customizable, per-rule, deny messages URL DB Internet TMG • • • • URL category override URL category query Logging and reporting support Web Access Wizard integration URL Filtering Benefits Control user web access based on URL categories Protect users from known malicious sites Reduce liability risks Increase productivity Reduce bandwidth and Forefront TMG resource consumption Analyze Web usage Utilizes Microsoft Reputation Service How TMG Uses Microsoft Reputation Service Multiple Vendors Federated Query Combines with Telemetry Data MRS Telemetry Path (also SSL) SSL Cache Fetch URL Query (URL) Categorizer Policy • Cache: Feedback Fetch on cache •mechanism miss Persistent on • •Category SSL In-memory for auth overrides & •privacy Weighted TTL • No PII What Makes MRS Compelling? Existing URL filtering solutions Single vendor cant be expert in all categories Categorization response time MRS unique architecture MRS merges URL databases from multiple sources/vendors Multi-vendor AV analogy Based on Microsoft internal sources as well as collaboration with third party partners Scalable Ongoing collaborative effort Recently announced an agreement with Marshal8e6 More announcements to follow URL Filtering Categories Security Liability Productivity Per-rule Customization TMG administrator can customize denial message displayed to the user on a per-rule basis Add custom text or HTML Redirect the user to a specific URL URL Category Override Administrator can override the categorization of a URL Feedback to MRS via Telemetry 22 User Experience User Experience HTML tags 24 24 Malware Inspection HTTP Malware Inspection MU or WSUS • Integrates Microsoft Antivirus engine • Signature and engine updates • Subscription-based Third party plug-ins can be used (native Malware inspection must be disabled) Content delivery methods by content type Signatures DB Internet TMG • Source and destination exceptions • Global and per-rule inspection options (encrypted files, nested archives, large files…) • Logging and reporting support • Web Access Wizard integration Content Trickling Firewall Service GET msrdp.cab 200 OK Web Proxy Malware Inspection Filter GET msrdp.cab 200 OK Request Context Accumulated Content Scanner 27 Malware Scanner Behavior High Normal Low • Partial inspection for Standard Trickling • Final inspection for files smaller than 1 MB when Progress Page is not used • Partial inspection for Fast Trickling • Final inspection for files larger than 1 MB but smaller than 50 MB when Progress Page is not used • Final inspection when Progress Page is used • Final inspection for files larger than 50 MB Low Priority Queue Normal Priority Queue High Priority Queue Antimalware Engine 28 Malware Inspection Per-rule Overrides 29 User Experience Content Blocked User Experience Progress Notification 31 Network Inspection System (NIS) Network Inspection System (NIS) Protocol decode-based traffic inspection system that uses signatures of known vulnerabilities Vulnerability-based signatures (vs. exploit-based signatures used by competing solutions) Detects and potentially block attacks on network resources NIS helps organizations reduce the vulnerability window Protect machines against known vulnerabilities until patch can be deployed Signatures can be released and deployed much faster than patches, concurrently with patch release, closing the vulnerability window Integrated into Forefront TMG Synergy with HTTPS Inspection 33 New Vulnerability Use Case Vulnerability is discovered Response team prepares and tests the vulnerability signature Signature released by Microsoft and deployed through distribution service, on security patch release All un-patched hosts behind Forefront TMG are protected Corporate Network Vulnerability Discovered Signature Authoring Team Signature Authoring Signature Distribution Service TMG Testing 34 Network Inspection System Architecture Design Time Protocol Parsers Signatures Microsoft Update Run Time NIS Engine Telemetry and Portal 35 NIS Response Process Threat Identification Signature Release Threat Research Targeting 4 hours Encyclopedia Write-up Signature Development Signature Testing Other Network Protection Mechanisms Common OS attack detection DNS attack filtering IP option filtering Flood mitigation 37 DNS Attack Filtering Enables the following checks in DNS traffic: DNS host name overflow – DNS response for a host name exceeding 255 bytes DNS length overflow – DNS response for an IPv4 address exceeding 4 bytes DNS zone transfer – DNS request to transfer zones from an internal DNS server 38 IP Options Filtering Forefront TMG can block IP packets based on the IP options set Deny all packets with any IP options Deny packets with the selected IP options Deny packets with all except selected IP options Forefront TMG can also block fragmented IP packets 39 Flood Mitigation Forefront TMG flood mitigation mechanism uses: Custom Limit Limit Connection limits that 600 6000 are used to identify and 160 400 block malicious traffic 80 Logging of flood mitigation 600 6000events 1000 Alerts that are triggered when a connection limit 160 is exceeded 600 400 TMG comes with default configuration settings Exceptions can be set per computer set 40 Forefront TMG 2010 vs. Forefront™ Unified Access Gateway (UAG) Product Positioning Forefront TMG 2010 Enables users to safely and productively use the Internet without worrying about malware and other threats Forefront UAG Comprehensive, secure remote access to corporate resources Forefront UAG is the preferred solution for providing remote access Forefront TMG 2010 still provides support for remote access features, but not the recommended solution Server Publishing Non-HTTP Server Publishing Allows map requests for non-Web servers in one of the TMG 2010 networks Clients can be either on the Internet or on a different internal network Can be used to publish most TCP and UDP protocol Behavior depends on whether non-Web server is behind a NAT relationship or not If behind NAT, clients will then connect to an IP address belonging to Forefront TMG If behind a route relationship, TMG 2010 listens for requests on the IP address of the non-Web server The published server should be configured as a SecureNAT client with a default gateway pointing to TMG 2010 Sample Server Publishing Scenario DNS Server Publishing 192.168.0.100 DG: 192.168.0.3 ` DNS Server 203.16.4.1 10.0.0.3 192.168.0.254 192.168.0.3 TMG 1. DNS request 203.16.4.1 > 10.0.0.3 2. Check rule match 192.168.0.101 DG: 192.168.0.254 FTP Server Check Publishing Rule Match 45 Non-HTTP Server Publishing Things to consider when planning Server Publishing No authentication support Access restriction by network elements only Networks, subnets, or IP addresses No support in single adapter configuration Client source IP address preserved Behavior can be changed using rule setting Application Layer Filter and NIS signature coverage SMTP, POP3, DNS, etc. 46 Web Publishing Provides secure access to Web content to users from the Internet Web content may be either on internal networks on in a DMZ Supports HTTP and HTTPS connections Forefront TMG 2010 Web Publishing features: Mapping requests to specific internal paths in specific servers Allows authentication and authorization of users at TMG level Allow delegation of user credentials after TMG authentication Caching of the published content (reverse caching) Inspection of incoming HTTPS requests using SSL bridging Load balancing of client requests among Web servers in a server farm Accessing Web Resources OWA RPC/HTTP(S) ActiveSync HTTPS Exchange Server HTTPS ` HTTP HTTPS HTTP Internet Web Server HTTP SharePoint Server Forefront TMG 2010 can publish multiple internal Web servers, using multiple external IP addresses and protocols Securing SSL Traffic SSL Bridging: 1. Client on Internet encrypts communications 2. TMG 2010 decrypts and inspects traffic 3. TMG 2010 sends allowed traffic to published server, re-encrypting it if required Authentication Process 1. Client credentials received 2&3. Credentials validated 4. Credentials delegated to internal server 5. Server send response 6. Response forwarded to client Single Sign On Sample Scenario – Two Published Web Sites requiring AuthN With Single Signon Without Single Signon: 1. User Prompted for authentication 2. User Clicks Link to SharePoint 3. User NOT Prompted for authentication Prompted for authentication again Exchange.Company.Com FBA SharePoint.Company.Com ` 51 Forefront TMG Virtual Private Networking (VPN) Forefront TMG Virtual Private Networking (VPN) TMG 2010 supports two types of VPNs: Remote Access VPN Site-to-site VPN TMG 2010 implements Windows Server® 2008 VPN technology Implements support for Secure Socket Tunneling Protocol (SSTP) Implements support for Network Access Protection (NAP) Secure Socket Tunneling Protocol (SSTP) New SSL-based VPN protocol HTTP with SSL session (TCP 443) between VPN clients and servers to exchange encapsulated IPv4 or IPv6 packets Support for unauthenticated Web proxies Support for Network Access Protection (NAP) Client support in Windows Vista® SP1 No plans to backport SSTP to previous versions Network Access Protection (NAP) Windows Policy Validation and Enforcement Platform Policy Validation Determines whether the computers are compliant with the company’s security policy. Compliant computers are deemed healthy. Network Restriction Restricts network access to computers based on their health. Remediation Provides necessary updates to allow the computer to get healthy. Once healthy, the network restrictions are removed. Ongoing Compliance Changes to the company’s security policy or to the computers’ health may dynamically result in network restrictions. NAP Support in Forefront TMG 2010 Enforces compliance and provides remediation for clients connecting remotely through Remote Access VPN Supports all VPN protocols, including SSTP Different solution than the Remote Access Quarantine Services (RQS) supported in ISA Server 2006 NAP validates health status of the remote client at connection time VPN network access limitation is done through IP packet filters applied to the VPN connection Access limited to resources on the restricted network NAP with Forefront TMG Walkthrough Restricted Network Remediation Servers Corporate Network System Health Servers Unhealthy SHA performs remediation against remediation servers VPN QEC SoH VPNpasses QEC queries NAPAgent collects Responses back to NAPAgent for SOHs new SoH and passes NAPAgent to VPN QEC Ongoing policy updates to Network Policy Server Here is the fix you need. EAP messages PEAP Can I pleaseHere haveisaccess to the network? my SOH VPNPEAP Session Request messages EAP -Here Response/Identity is my SOH Client PEAP PEAP Message Message EAP - Request/Identify State: State: Full Access – Send SOH EAP –Quarantine Request/Start SOH SOH Responses Responses Forefront TMG 2010 EAP - Request/Identify RADIUS Access-Accept EAP – Request/Start – Send According to policy, the clientSOH is not up to date. up toQuarantine date. client. Restrict Grantclient access to –10.10.10.0/24 no filters Network Policy Server NAP Components Platform Components Enforcement Components Health Components System Health Agents = Declare (patch state, virusnetwork signature, system configuration, Quarantine Agent (QA)(SHA) =Clients Reports client health status, coordinates between SHA and QEC. Quarantine Enforcement (QEC) =health Negotiate access with access device(s); etc.). DHCP, VPN, 1X, IPSec QECs. Quarantine Server (QS) = Restricts client’s network access based on what SHV certifies. System Health Validators (SHV) = Certify declarations made byendpoints. health agents. Network Access Devices = Provide network access to healthy System Health Servers = Define health certificates requirements for system on the client. Health Registration Authority = Issues to clients that components pass health checks. Remediation Servers = Install necessary patches, configurations, applications. Bring clients to healthy state. Remediation Servers System Health Servers Health policy Updates Client Health Statements SHA<n> Quarantine Agent QEC 1 QEC 2 Network Access Requests Health Result Network Policy Server SHV<n> Network Access Device (Forefront TMG 2010) Quarantine Server Mail Protection Mail Protection – Forefront Threat Management Gateway Full featured SMTP hygiene Exchange Edge Transport for SMTP stack Requires valid license Integrated with Microsoft® Forefront™ Protection 2010 for Exchange Server Antimalware Antispam Antiphishing Also supports generic SMTP mail servers E-mail Threats ~98% of all e-mail is spam/malicious Over 400 billion unwanted e-mails in H2 2008 Estimated cost is $130 billion in 2009 Causes 90% of NDRs Risk of software vulnerabilities Percentage of incoming messages filtered by Forefront Online Protection for Exchange, 1H06-2H08 100% 80% 60% 40% 20% 0% 1H06 2H06 1H07 2H07 1H08 2H08 61 The Solution Filter unwanted e-mail as early as possible 100% 80% 60% 40% 20% 0% 1H06 Edge Filtered 2H06 1H07 Content Filtered 2H07 1H08 Unfiltered 2H08 Percentage of incoming messages blocked by Forefront™ Protection for Exchange using edge-blocking and content filtering, 1H06-2H08 62 E-mail Protection Features Protection at the edge Protects mail at the edge of the organization with Forefront Protection 2010 for Exchange Server Advanced protection and premium antispam Multiple scan engines to protect against malware and provide a premium antispam solution Integrated management Easy management of Microsoft Exchange Server Edge role and Forefront Protection 2010 for Exchange Server through Forefront TMG Array deployment Support for managing and load balancing traffic among multiple servers Solution Components Microsoft Products Forefront Protection 2010 for Exchange Server Microsoft® Exchange Server® 2007 (or 2010) Edge Transport Forefront Threat Management Gateway Windows Server® 2008 x64 64 Mail Protection – Forefront Threat Management Gateway Anti-virus Engines Forefront Security for Exchange (FSE) Multi-layer Filters Multi-layer Filters Exchange Edge Role Receive Connector Send Connector Network Inspection System (NIS) TMG Filter Driver Internal Network External Network `` Typical Deployment Topology Any SMTP Servers Forefront TMG Array myorg.com Internal SMTP Server Internal Network SMTP Traffic Internet Partner SMTP Server MX pointing to Forefront TMG external IP address SMTP Traffic EdgeSync (Exchange Server Only) 66 Configure SMTP Routes Defines how Forefront TMG routes traffic from and to the organization SMTP servers At least two routes required: Internal_Mail_Servers define the IP addresses and SMTP domains of the internal mail servers External_Mail_Servers define which mail is allowed to enter the organization and the external FQDN/IP address that will receive mail Configure Spam Filtering Defines spam filtering policy Connection-level filtering IP Allow List IP Allow List Providers IP Block List Block List Providers Protocol-level filtering Configuring Recipient Filtering Configuring Sender Filtering Configuring Sender ID Configuring Sender Reputation Content-level filtering Spam Filtering Connection-level Filtering 69 Virus and Content Filtering Configures antivirus, file attachment, and message body filtering Virus filter – Engine selection policy and remediation actions File filters – Unwanted file attachments based on file type, filename, and prefix Message body filters – Identify unwanted e-mail messages by applying keyword lists to the contents of the message body Virus and Content Filtering Replicating Configuration to Exchange Server and FPE FPE Service 1. TMG UI 4. Configure services using PowerShell API Administrator 2. Store to DB 3. Array members load new configuration Exchange Edge Service 72 Design Options Single purpose and location, no high availability Forefront TMG 2010 Standard Edition Single purpose and location, high availability Forefront TMG 2010 Enterprise Edition in stand-alone array Multiple purposes and/or locations, high availability Enterprise Management Server Single Purpose and Location Forefront TMG 2010 Standard Edition (SE) Light and medium traffic All-in-one solution No high availability requirements Internet Forefront TMG Standard Edition 74 Single Purpose and Location Forefront TMG 2010 Enterprise Edition (EE): Stand-alone array Shared configuration High traffic solution Simple upgrade to EE Data maintained EE license key Provides high availability and scale out Internet Stand-alone Array 75 © 2009 Microsoft Corporation. All rights reserved. Microsoft, Forefront, Windows and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.