Automating Endpoint Security Policy Enforcement Computing and Networking Services University of Toronto.

Slides:



Advertisements
Similar presentations
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Advertisements

Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Vulnerability Analysis Borrowed from the CLICS group.
Chapter 7 HARDENING SERVERS.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Trend Micro Round Table May 19, Agenda Introduction – why switch? Timeline for implementation Related policies Trend Micro product descriptions.
How PNNL Manages Windows Desktops 1 Will Jorgensen.
Potions of Protection Server Security. What does that do again? Familiarity Differing levels of protection –Low, does not exist –Medium, No private data.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Payment Card Industry (PCI) Data Security Standard
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Bullet-Proofing Your Wireless Router By Steve Janss.
Windows Anti-virus and Security WNUG Meeting
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Additional SugarCRM details for complete, functional, and portable deployment.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Cyber Patriot Training
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Endpoint Control. Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Policy and Configuration Compliance for Devices Connecting to the Wireless Network.
CERN’s Computer Security Challenge
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Module 14: Configuring Server Security Compliance
The Microsoft Baseline Security Analyzer A practical look….
RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
Linux Networking and Security
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Module 11: Designing Security for Network Perimeters.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security fundamentals Topic 10 Securing the network perimeter.
Retina Network Security Scanner
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Module 8 Implementing Security Using Group Policy.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Security fundamentals
CSCE 548 Student Presentation By Manasa Suthram
Port Scanning James Tate II
Chapter 6 Application Hardening
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
IBM Software Group | Tivoli Brand Software
Information Security Session October 24, 2005
Chapter 27: System Security
Network hardening Chapter 14.
Presentation transcript:

Automating Endpoint Security Policy Enforcement Computing and Networking Services University of Toronto

Computing and Networking Services University of Toronto Unmanaged ‘Endpoints’ Systems not proactively managed by University IT staff:  7000 student residents – Sept & Jan overload.  active unique wireless user accounts. Subject to:  Missing OS updates, missing/expired AV protection, unsupported/pirated OS/SP.  Already compromised – spyware, V / W / T.

Computing and Networking Services University of Toronto Automation Framework Network Isolation VulnerabilityDetectionRemediation Missing Patches ↔ user - WindowsUpdate Missing Patches ↔ user - WindowsUpdate … ↔ … … ↔ … CompromiseDetectionRemediation V / W / T ↔ user – SAV scan V / W / T ↔ user – SAV scan … ↔ … … ↔ …

Computing and Networking Services University of Toronto Isolation  IP based – DHCP using two address pools, routable and non-routable (SWU Netreg) with full DNS.  HTTP control (Squid) – configure access for users in restricted zone.  Dynamic firewall port control (IPtables) – block services in restricted zone – except for IDS test interval

Computing and Networking Services University of Toronto Detection Framework  Active  Scanning from external source, eg. Nmap, Nessus.  Passive  Monitoring network traffic, eg. Tcpdump, Snort.  Agent  Client software, continuous or run-once.

Computing and Networking Services University of Toronto Detection Implementation Vulnerability  Missing critical patches: MBSA (cli version)  Missing antivirus: registry check and wmic  Weak passwords: John the Ripper  Insecure user configuration: user privileges, AutoUpdates, root cert audit Compromise  Virus/worm/trojan: IDS (Snort, TCPView), Microsoft MSR*  Spyware: Spybot cli  Rootkit: RootkitRevealer

Computing and Networking Services University of Toronto Remediation Vulnerability  WindowsUpdate (user)  Install SAV (user)  Weak passwords (user)  Insecure user configuration (user-run wizard) Compromise  Virus/worm/trojan: SAV scan, TrendMicro Sysclean, Microsoft MSR MSR  Spyware: (user-run Spybot)  Rootkit: (assisted )

Computing and Networking Services University of Toronto Tools in Detail Wizard UI  CLI utilities wrapped using open source Windows installers: NSIS, InnoSetup.  Provides familiar wizard user interface for detection/remediation tools.  Provides ‘run-once’ function – no installation required.  API includes registry read/write, cookie writing.  Two formats – stand-alone and server integration. MBSA  Detection of all critical updates available day of release, also detects updates to existing versions. Detection

Computing and Networking Services University of Toronto Tools in Detail Password Audit  Checks for blank password, password=username, dictionary lookup of words found in blended threats. Checks IDS  Snort check for host/port scan (20 sec. sample) Note: Isolation opened up to allow client server connections. Snort  TCPView check for excessive SYN rate. TCPView

Computing and Networking Services University of Toronto Applications - ESP  integration of isolation, MBSA detection, user remediation. integration  admin functions: init registration cycle, isolation/block MAC, configure isolation access.

Computing and Networking Services University of Toronto Applications - HealthChk  integration of isolation, compromise detection for assisted detection and remediation.  admin functions: convenient access to external utilities.

Computing and Networking Services University of Toronto Applications - Future  Create a remote HealthChk system.  User runs detection and remediation tools remotely, support for Linux?  Other Applications?  Managed environment use – encourage users to use automated systems, no isolation, enforcement via reminders.

Computing and Networking Services University of Toronto More Information   