september 29, 2009computer security awareness day1 fermilab

18
September 29, 2009 Computer Security Awareness Day 1 Fermila b

Upload: gwenda-bates

Post on 29-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: September 29, 2009Computer Security Awareness Day1 Fermilab

September 29, 2009Computer Security Awareness Day 1

Fermilab

Page 2: September 29, 2009Computer Security Awareness Day1 Fermilab

• Why are we here?• Current environment• How are machines getting infected?• Improvements (timeline)• Weekly AV scan changes• What is Tissue?• AV Notice TIssue Detector• Rebuilds vs fixes• AV service enhancements• Help us to help you• Blocked? Getting help…• Questions?

September 29, 2009Computer Security Awareness Day 2

Page 3: September 29, 2009Computer Security Awareness Day1 Fermilab

AV Protection for ~3000 Windows systems Volume of AV notices via Email

◦ ~1000 per month A single machine can generate several notices Too many for any one person to filter by hand

◦ Manual response Can be unreliable No priority

No official procedures prior to May 2009 Tune IT Up requirement

September 29, 2009Computer Security Awareness Day 3

Page 4: September 29, 2009Computer Security Awareness Day1 Fermilab

Symantec AV corporate edition 10◦ multiple parent servers to support Fermilab◦ servers report into a central AV Report server◦ system is configured to download and advertise

new signature files every 15 minutes If away from the lab: clients are configured to

download new sig files from Symantec once a day◦ clients are configured to perform a full scan once

a week (most are set for Tuesday 2AM)◦ clients use heuristics in addition to the standard

signature based realtime protection.

September 29, 2009Computer Security Awareness Day 4

Page 5: September 29, 2009Computer Security Awareness Day1 Fermilab

AV alone cannot cover all malware◦ Malware being written at a high rate, a challenge

for AV manufactures to keep up◦ Now needed - Antivirus, Antispyware, firewall,

intrusion prevention, device and application control

◦ Local admin permissions Domain and local accounts

◦ USB devices Autorun & Autoplay can allow malware

◦ Web browsing Business need web browsing Non-business casual web browsing

September 29, 2009Computer Security Awareness Day 5

Page 6: September 29, 2009Computer Security Awareness Day1 Fermilab

Malware runs in memory

Attempt to write Rootkit to file systemAV does real-time file scan after file is closed

Malware

Normal web surfing

Request Rootkit from the cloud

September 29, 2009Computer Security Awareness Day 6

Malware

Malware

Malware

Page 7: September 29, 2009Computer Security Awareness Day1 Fermilab

Web Proxy Server◦ Applied to 98% of the network subnets at the lab

Disable Autorun◦ prevents malware from auto-running on USB

device insertion Restricting web access via domain

◦ Applies to machines with critical business needs Restore points - 2 options

◦ disable restore to remove malware, then re-enable◦ rebuild

Weekly AV Scan changes – next slide

September 29, 2009Computer Security Awareness Day 7

Page 8: September 29, 2009Computer Security Awareness Day1 Fermilab

Scans may be postponed four times ◦ instead of cancels

Tested new setting for several weeks with no problems

Staged rollout throughout the end of the year

September 29, 2009Computer Security Awareness Day 8

Page 9: September 29, 2009Computer Security Awareness Day1 Fermilab

September 29, 2009Computer Security Awareness Day 9

Tracking Issue workflow system◦ Strong Authentication violations◦ OS patching levels◦ Network inventory◦ Antivirus Notices

Monitors the central logging repository◦ Blocks are issued based on parameter settings

Page 10: September 29, 2009Computer Security Awareness Day1 Fermilab

September 29, 2009Computer Security Awareness Day 10

Registered system administrators will get notified

Issue must be properly remediated or the system will be blocked

You will be blocked again if the problem is not actually fixed

Page 11: September 29, 2009Computer Security Awareness Day1 Fermilab

September 29, 2009Computer Security Awareness Day 11

This email is automatically generated, do not reply. The system listed below is registered to you as a sysadmin.

A network block for this system (described below) has been requested by Computer Security.

Please visit:https://nimisrva.fnal.gov/WF/TIssue/event_mgr/displayRemediationForm?machine_id=34754to view more details about the vulnerability found and to enter the action taken to fix the vulnerability.

Note: If this event is not remediated, the system will be blocked from network access at None

Here is a description of the host/sms check:IP Address: 131.225.xx.xxMAC Address: 00:00:00:00:00:00Node name: xxxxxxxxxAffiliation: xx/xx/xxx/xxxxxxxxxxxxxxxxxLast found: 2009-09-22 13:08:41Issue: Virus Found (Blocking Event)Additional Info:Class/Action/Location trigger:Host:xxxxxxxxxxxxIP:131.225.xx.xxUSER:xxxxxxxxxClass/Action/Location triggers: Infostealer=Security Update for OS Microsoft Windows>>KB390496.exe (Cleaned by Deletion ) Infostealer=Security Update for OS Microsoft Windows>>KB390496.exe (Cleaned by Deletion ) Infostealer=Security Update for OS Microsoft Windows>>KB390496.exe (Cleaned by Deletion )

THIS IS A BLOCK EVENT.

If you experience difficulties resolving this issue or require additional assistance, please contact the FNAL Service Desk (x2345) to open a ticket to be routed to your local desktop or server support group.

Page 12: September 29, 2009Computer Security Awareness Day1 Fermilab

Previously each notice was manually reviewed Now automated - virus notices are sorted and

filtered◦ Notices are flagged that require follow-up

All other AV notices are ignoredo Started by using criteria that matched our current AV

experienceo Criteria changes will be made from Windows Policy

Committee proposal vote

September 29, 2009Computer Security Awareness Day 12

Page 13: September 29, 2009Computer Security Awareness Day1 Fermilab

Follow-up criteria◦ Virus type blocks

Root kits, keyloggers, information stealing, etc◦ File location blocks

Operating system, application program, etc Departmental file servers are exempt from

blocks

September 29, 2009Computer Security Awareness Day 13

Page 14: September 29, 2009Computer Security Awareness Day1 Fermilab

Number of rebuilds are small versus the number of identified viruses

Rebuild if virus types meet criteria◦ such as Hacktool.Rootkit & downadup (aka Confiker)

Rebuild if infected files are in protected system areas◦ such as Windows, WINNT, System, System32

Fix if virus is in restore point Ignore notices in temporary internet file areas

and non-system areas

September 29, 2009Computer Security Awareness Day 14

Page 15: September 29, 2009Computer Security Awareness Day1 Fermilab

Working with vendor to identify detected malware

Review and upgrade current solution◦ Endpoint Security Protection

Antivirus Antispyware Firewall intrusion prevention device and application control

September 29, 2009Computer Security Awareness Day 15

Page 16: September 29, 2009Computer Security Awareness Day1 Fermilab

If you are blocked please tell us if:◦ you have recently borrowed a flash-drive/memory

stick◦ you have opened an email attachment

especially from your non-Fermi account◦ you have browsed business related web sites◦ you have browsed casual web sites

Providing detailed information may help problem resolution and future enhancements

September 29, 2009Computer Security Awareness Day 16

Page 17: September 29, 2009Computer Security Awareness Day1 Fermilab

Email notice goes to the registered system administrator◦ When your machine gets blocked you may not

receive an email notice. Contact the Service Desk at x2345

◦ If you suspect you have been blocked ask that the TIssue site be checked Need to provide username, nodename, IP address

etc.

September 29, 2009Computer Security Awareness Day 17

Page 18: September 29, 2009Computer Security Awareness Day1 Fermilab

Thank you for attending!

September 29, 2009Computer Security Awareness Day 18