Prevention: Host Defenses Flashcards

1
Q

Host Defenses

A

We have already looked at some basic host defenses in the Security Fundamentals domain. This lesson is going to cover host defenses in greater detail, to help you understand common security controls to defend systems themselves. We will be covering HIDS and HIPS, anti-virus, endpoint detection, and response (EDR) agents, local firewalls, vulnerability scanning, and group policies for Windows domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Host Intrusion Detection and Prevention

A

Host intrusion detection systems, also known as HIDS, are software installed on an endpoint that allows for the detection of suspicious or malicious activity using rules which are checked against activity to see if it matches any known malicious patterns. Typically this security control will generate alerts (detection) so that human analysts can investigate further.

Host intrusion prevention systems, also known as HIPS, are software installed on an endpoint that works similarly to HIDS but is able to take autonomous actions to defend systems once malicious activity has been detected instead of just alerting human analysts. Rules are written to search for specific patterns of activity, but with HIPS these rules contain actions, so the software knows what to do when unusual activity is detected. This can include terminating connections to websites or IP addresses, deleting malicious files, or generating an alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anti-Virus Software

A

Anti-virus software, commonly abbreviated to “AV” should be deployed on all endpoints, such as desktops, laptops, and servers. This is a fundamental security control that works to detect and remove known malware that is present on the system. There are two types of anti-virus solutions:

Signature-based:
The AV solution will use signatures which are specific patterns of activity to identify previously documented malware, either removing the file, generating an alert, or quarantining the malware. Unfortunately, if the AV vendor doesn’t have the signature of a certain type of malware, it will not be detected by this type of anti-virus and can potentially execute successfully.

Behavior-based:
This type of unconventional AV works to identify suspicious behavior by creating a baseline of “normal” activity and working to identify any deviations or anomalies that don’t fit the baseline, as these could indicate suspicious or malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Centralized Logging

A

Endpoints can be configured to send logs to a centralized location, a SIEM platform, where this data is aggregated, normalized, and matched against a number of rules designed to detect and flag suspicious or unusual activity so it can be investigated by security analysts. If an endpoint is sending logs, whether it’s a desktop, laptop, or server, and it starts acting unusually the SIEM should pick this up and generate an alert to signal a human investigation. We can use Syslog to achieve this level of logging and monitoring by combining it with a SIEM platform. We’ll cover this in a lot more detail during the SIEM domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Endpoint Detection & Response

A

EDR agents are pieces of software that sit silently on endpoints and provide logging, monitoring, and reactive capabilities. Similar to HIDS and HIPS, EDR agents will report activity back to a platform similar to a SIEM, where analysts can log in and investigate alerts generated by the EDR solution. These solutions will typically allow analysts to conduct investigations straight from the platform and see exactly what processes are running on monitored systems, and conduct in-depth investigations to analyze the suspicious activity. EDR platforms can also be utilized to monitor for insider threats by closely watching exactly what certain users are doing. This can be combined with other forensic-grade tools to retrieve specific information from a system such as sites visited, messages sent, and programs run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Local Firewall

A

Operating in the same way as hardware firewalls, local firewalls or web application firewalls can provide even tighter security using rules that apply to the system the firewall is running on. The software will allow administrators to decide what ports should be open, and allow or deny connections coming in or going out of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Windows Group Policies

A

If you care about data security, you need to understand group policies. We will discuss what group policies and GPOs are and how system administrators use them to protect, secure and lockdown computers and user accounts. A Group Policy Object is a collection of settings systems administrators create with the Microsoft Management Console (MMC) Group Policy Editor. The GPO can be associated with one or more of the Active Directory containers, such as sites, domains, or organizational units(OUs).

Active Directory applies GPOs in the following predictable and logical order.

Local policies
Site policies
Domain policies
OU policies
So what can GPOs actually do? One example is using Group Policy Objects to completely disable Local Administrator rights globally in your network and instead, grant administrative permissions to a single individual or group based on their job. Ideally, you are implementing a least-privileged model where even the system administrators are limited to administering only the servers they are assigned.

Strengths of GPOs

There are several advantages to implementing GPOs outside of security.

Ease of management: Setting up new users on the network used to be a long and tedious process. Pre-existing GPOs apply a standardized environment to each new user and computer that joins your domain which saves many hours of configurations.
One-stop administration: Sysadmins can deploy patches, software, and other updates via GPO.
Password policy enforcement: Passwords can be easily brute-forced if they aren’t changed regularly, contain simple words, or are short. GPOs establish length, reuse rules, and other requirements for passwords to keep your network safe.
Folder redirections: Do you want users to keep important company files on a centralized and monitored storage system? Use a folder redirection GPO to redirect their user folder to your NAS.

Weaknesses of GPOs

By now it sounds like GPOs are the bee’s knees. There are a few pitfalls to using GPOs you want to consider before you dive in headfirst.

GPOs update randomly every 90 to 120 minutes or so, or when the computer gets rebooted. You can specify an update rate from 0 to 64,800 minutes (or 45 days), but if you select 0 minutes, the computer tries to update GPOs every 7 seconds. That’s going to murder a network with traffic. If you must implement an emergency GPO update, you have to keep this in mind and use another method to get users to reboot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly