Download Application Control

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Zero-configuration networking wikipedia , lookup

Net neutrality law wikipedia , lookup

Remote Desktop Services wikipedia , lookup

TCP congestion control wikipedia , lookup

RapidIO wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Net bias wikipedia , lookup

IEEE 1355 wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Internet protocol suite wikipedia , lookup

Quality of service wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Distributed firewall wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Deep packet inspection wikipedia , lookup

Transcript
FEATURES & FUNCTIONALITY
Agenda
Main topics
• Packet Filter Firewall
• Application Control
• Other features
Page 2
Requirements
Supported platfroms
• Windows 2000 Professional (with SP4 or higher) and Windows XP
(Professional and Home Edition, with SP1 or higher)
• Also installs on Longhorn Beta
Minimum requirements
• Intel Pentium compatible hardware
• 128 MB (Windows 2000), 256 MB (Windows XP)
• 256 MB or more recommended (depending on the installed components)!
• 50 MB free hard disk space
• Internet connection recommended
Page 3
PACKET FILTER FIREWALL
IP Filtering for Workstations
Protects data on mobile workstations and desktops
against network worms and cracking
Intercepts IP packets at the NDIS (Network Device
Interface Specification) layer
• Allowed incoming packets are forwarded to the TCP/IP
stack
• Allowed outgoing packets are sent out through the
network interface
Application
Presentation
Session
Transport
Network
DataLink
Physical
Page 5
Filtering Rules
Filtering traffic based on rules
• Rules for inbound, outbound or bidirectional traffic
• There is no need of allowing inbound
traffic to any workstations
Administrator can define what traffic
is allowed from one network segment
to another or between corporate
departments
• Also, it is possible to define filtering
rules for host-to-host or host-tonetwork connections
Page 6
Predefined Rules
Rules are bundled into six Security
Levels
• Block all
• Mobile
• Home
• Office
• Custom
• Network quarantine
Page 7
Predefined Services
F-Secure predefined
approximately 100 services
• IP Protocols
• ICMP, TCP, UDP
• Application level protocols
• HTTP, HTTPS, DNS,
SMB, etc.
Page 8
User Definable Services
New services can be defined
according to IP Protocol
• For TCP/UDP protocols
• Initiator and responder port
number or range
• For ICMP
• Type and codes
• Allow broadcasts for UDP and ICMP
• yes/no
Page 9
Security Levels Structure
1
SECURITY LEVEL
2 RULES
Allow Web Browsing
3 SERVICES
• HTTP / Hyper Text Transfer Protocol
• HTTPS (SSL)
• FTP / File Transfer Protocol
out
out
out
Page 10
Intrusion Detection System (IDS)
Analyses the payload and the header information of an IP packet to
detect different kind of intrusion attempts
• Monitors inbound traffic
• Inspects single packets only, not full stream or TCP/IP sequence
• System alerts on 31 malicous packets; most common operating system
fingerprinting attempts (nmap, CyberCop), port scans and network worms
• Database selected carefully to avoid false positives
• Patterns are updated when software is updated
IDS engine is divided in to generic IP engine (13 packets), UDP
protocol engine (5 packets) and TCP protocol engine (13 packets)
Page 11
Internet Connection Sharing
Possibility of sharing the internet
connection with other local computers
• Needs at least two network interfaces
X
Define the internal network card as a
”Trusted interface”
• No filtering, everything passes through the
defined network interface
Important: Trusted interface should be
disabled for the whole domain!
• Set “Allow Trusted Interface = disabled”
(mark as final!)
Page 12
APPLICATION CONTROL
Application Control
Decides what products can and what cannot be used to connect to the
internet, manipulate or launch other programs
Application controls
What is controlled
Connection Control
External connection attempts
Launching Control
Application launches
Manipulating Control
Code injections
Page 14
Application Connection Control
Protection against malicious
programs that try to open
connections from the local
machine to an outside host
• Detects outbound connection
attempts and inbound listening
attempts
• Prompts the user to allow this
connection before opening it
Application controls
Connection Control
Launching Control
Manipulating Control
Page 15
Application Launching Control
Protection against malicious
programs that try to launch
other application instances
• Disabled by default
Application controls
Connection Control
Launching Control
Manipulating Control
Page 16
Application Manipulation Control
Detects applications trying to
inject code into the memory
space of running applications
• Disabled by default
Application controls
Connection Control
Launching Control
Manipulating Control
Page 17
Executable Decisions
Permanent Application control decisions regarding a certain program
are always tied to the executable
• Binary change detection uses a hash function (SHA-1 checksum)
• If a program is updated, Internet Shield will prompt for a new decision
• Policy Manger is pre-configured with a whitelist of most critical windows
and F-Secure services (e.g. allowing AUA connections)
Page 18
Dynamic Rules
Application connection control
creates dynamic rules to the firewall
packet filter rulebase
• Creates dynamic inbound rules for
allowed applications
• Checks for existing outbound static
rules before opening the connection
to prevent timeouts
• Tied to the executable
Rules visible in the rulebase
• Rules only in use when the
executable is running
• Rules added juts before the last deny
rest rule
Page 19
Central Administration
Policy Manager supports central administration for Application
Connection Control
• PMC application rules overwrite user defined rules
• Applications cannot be added manually (need to be reported by the hosts)
• All new application connections can be reported to FSPMC (except
system and boot time services)
Page 20
OTHER FEATURES
Dial-up Control
Protection against malicous dialing attempts (monitors dialup
processes, e.g. RAS API)
• Maintains a list of allowed or denied numbers
• Limited central management (user decisions are not reported to the PMC!)
Hang-up control
• Only allowed applications can close an active connection.
Page 22
Alerting
Internet Shield alerts are divided into two groups
• Packet filter alerts (only create a log entry if so defined in the rule)
• Log only (blue alert)
• Log and pop-up (red alert)
• Intrusion alerts (yellow alert)
Page 23
Logging
Extended logging capabilities
• All firewall actions
• All alerts
Packet logging
• Packet logging will grab all frames
from all network devices and store
them to a file
• Useful for debugging
• Needs to be activated with a
specific policy!
Page 24
Summary
Main topics
• Packet Filter Firewall
• Application Control
• Other features
Page 25