CSI-E Computer Security Investigator – Enterprise.

Slides:



Advertisements
Similar presentations
Complete Event Log Viewing, Monitoring and Management.
Advertisements

ProAssist ® complex assistance services management system Global Assistance & INGENIUM Praha.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Week 6: Chapter 6 Agenda Automation of SQL Server tasks using: SQL Server Agent Scheduling Scripting Technologies.
Complete Event Log Viewing, Monitoring and Management.
What’s coming in Sccm 2007R2 aka Sccm 2007R2: 10 reasons to upgrade Kim Oppalfens SCUG.be.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Lesson 18: Configuring Application Restriction Policies
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Ch 8-3 Working with domains and Active Directory.
Microsoft ® Official Course Module 9 Configuring Applications.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Migration XenDesktop 7. © 2013 Citrix | Confidential – Do Not Distribute Migration prerequisites Set up a XenDesktop 7 Site, including the site database.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
Hands-On Microsoft Windows Server 2008
Migration to NSM r11. © 2005 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Training on ManageEngine Desktop Central
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Enforcing Concurrent Logon Policies with UserLock.
Tim Vander Kooi Systems
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
Week #7 Objectives: Secure Windows 7 Desktop
Chapter Fourteen Windows XP Professional Fault Tolerance.
Section 10: Assigning and Publishing Software Packages Using MSI Packages to Distribute Software Using Group Policy as a Software Deployment Method Deploying.
Supplied on \web site. on January 10 th, 2008 Reducing Risk Through Incremental Malware Detection January 2008.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Microsoft Solution Accelerator for Business Desktop Deployment Microsoft ® Solution Accelerator for Business Desktop Deployment Training for IT Professionals.
BASIC FUNCTIONALITY. Page 2 Agenda Main topics Policy Manager Communication Understanding communication Information flow Communication modules F-Secure.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
CensorNet Desktop Surveillance Description, Target audience, Positioning Components, Features
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Learningcomputer.com SQL Server 2008 – Administration, Maintenance and Job Automation.
Computer Emergency Notification System (CENS)
Module 7: Managing the User Environment by Using Group Policy.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
We Call Them Incidents  Attendance Enterprise Will be Equipped with an Incident Engine  Incidents are Configurable Much Like Parameters and Accruals.
Microsoft Management Seminar Series SMS 2003 Change Management.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
Configuring Windows Firewall with Advanced Security
2016 Citrix presentation.
Utilize Group Policy Terminal Server Settings
What Is Sharepoint? Mohsen Ashkboos
IT Management, Simplified
Presentation transcript:

CSI-E Computer Security Investigator – Enterprise

Definitions: Agent – This is an individual machine with Prevx CSI installed on Prevx CSI-E Server – This is the central computer which analyses the Prevx CSI Agents PX5 – This is the way Prevx uniquely identifies a file, similar to an MD5 hash MDB – The Master Database (MDB) refers to the storage of data used by Prevx CSI-E Server LDB – The Local Database (LDB) refers to the file which stores the Prevx CSI-E Agents scan log and settings. Determination – This is the decision on whether a file is Good (clean), Bad (infected) or Unknown (undefined)

CSI Agent CSI-E Server Agent performs Scan Verify Agents scan information Any Agents Scanned recently? Infection or blacklisted program found? Set group configurations Set Agent configurations and remediation and execute alert rules Has Scan been processed? Apply Agent configurations and /or remediation CSI-E Scan Flow Diagram Yes No Yes

File Server Internet: (port 80) DeterminationsScan information Prevx CSI-E Server Software MDB CSI Shares Prevx CSI-E Agent CSI-E Agent Scan information sent CSI-E Agent Scan results received plus additional configuration settings CSI-E Agent info picked up by CSI-E Server CSI-E Agent info processed configuration set Alerts : SMS, , Windows Events... Reports : Customized HTML Scan performed/ Remediation enforced Prevx Community DB CSI-E Architectural diagram File Software

Prevx Community Database and Zero-Day Detection Utilising the Prevx Community database and advanced detection rules, we pride ourselves in finding malware before anyone else and consider ourselves as an incremental (value added) and a stand-alone solution. Prevx CSI Detection Technology Based on the Prevx CSI detection software, Prevx CSI-E builds in additional functionality to allow for a truly dynamic powerful detection program to work exactly how you specify it to operate, using remediation policies and alert rules.

Internet independent agents The Prevx CSI-E implementation does not require client machines to have internet connection to get determinations, since the implementation of the CSI-E server will do all the internet communication on the behalf of the agents, thus negating the need to open up ports for internet communications on every client machine. This is possible by having a central file share folder where the client machines transfer their scan logs and configurations (LDB) and await the verified scan results and additional configuration once the Prevx CSI-E server has processed the client’s logs.

Overrides and Master Database Organisations may have in-house developed software which is unknown by the Prevx Community Database, or a standard desktop build where all the files are known to be good, by having the mechanism to import files directories or even Windows installer (MSI, MSP) installations (all the setup files can be analysed prior to installing) into the Prevx CSI-E Master Database (MDB) you can predefine these import determinations locally to the Prevx CSI-E server. This will increase performance as if the files PX5 has been stored in the MDB the will be no need to look online for a determination. The overrides feature can also be used to mark certain files associated with programs as “bad” so you can disallow or be alerted when certain files on you network have been seen, despite the Prevx Community Database marking the files as “good”. The overrides can be grouped together meaning that, for example, after a scan a sales department machine has seen software which should only be used on a development teams machines, the Prevx CSI-E alerts the administrator or run a remediation policy.

Remediation Policies Once a client machine has been detected as being infected, Prevx CSI-E will enforce automatic remediation policies to perform immediate actions on the infection machine, these policies may include:  Auto cleanup – Automatically cleanup an infected machine before it spreads, the user will be alerted prior to this action as a reboot may be required.  Network Access Control (NAC) – Automatically remove the infected machine of your network by disabling all network devices on the infected host.  User notification – Advise the user that their machine is infected and present a customizable message.  Shutdown/Reboot machine – The infected machine can be immediately shutdown to prevent any further infections spreading.  Server side script execution – Execute any type of script or program with any action by writing your own server side scripts

Alert Rules When a user’s machine is infected you will more than likely not be watching the Prevx CSI-E Server console at that very moment, so we have implemented a messaging system to alert the administrator in numerous ways: notification via the Prevx Premium alert system SMS (Short Messaging Service) notification via the Prevx SMS Premium service Notification via your own system Windows Events log, this will work alongside Microsoft Operations Manager (MOM) alert system. Script Alert rule*

Script Alert Rules One of most configurable features of Prevx CSI-E Server is the Script Alert feature, this allows the administrator to write any script or even program to launch under certain conditions, such a client infection, server or client failure and even when a certain file has been seen in your organization, especially useful when you wish to control the use of applications such as MSN Messenger. Also, you can run advanced scripts to perform Active Directory tasks, so if a machine is seen to be infected you can move the machine into a remediation OU (organizational unit) or even remove the machine of the domain therefore preventing further access to domain resources.

Reports Prevx CSI-E can generate reports on demand and customized exactly to an organization needs. The reports are generated from HTML files which can be formatted by taking advantage of the Prevx CSI-E variables and placeholders. Especially useful for organisations wishing to provide audit reports as part of compliance. Each client which communicates with Prevx CSI-E will have its scan history and infection history and a range of other useful information stored in the MDB ready for reporting. The standard reports include “Infected Report” and “Agent Reports” (individual or groups of agents).

Master Database (MDB) By not relying on external proprietary database technologies Prevx CSI-E has an independent super-efficient database that does not rely on having (for example) MS SQL. The MDB enforces data integrity and backup functionality to ensure your organisations Prevx CSI-E data is secure. The MDB is pre-shipped with pre-determined PX5 of core operating system file signatures to ensure that only new (unseen) files are verified, this increases the performance of Prevx CSI-E as there will be less need to communicate with the Prevx Community Database to get determinations. Over time Prevx can provide mass determinations in a single file format for the administrators to import these pre-defined determinations en-mass.