Quantcast
Channel: Symantec Connect - Products - Articles
Viewing all articles
Browse latest Browse all 818

The Use Case of CSP - File Watch

$
0
0

Symante Critical System Protection (CSP) provides policy-based behavior control and detection for server and desktop computers. Symantec Critical System Protection provides a flexible computer security solution that controls application behavior, blocks port traffic, and provides host-based intrusion prevention and detection.

Symantec Critical System Protection agents control behavior by allowing and preventing specific actions that an application or user might take. For example, a Symantec Critical System Protection prevention policy can specify that an email application may not spawn other processes, including dangerous processes like viruses, worms, and Trojan horses. The email application can still read and write to the directories that it needs to access.

Symantec Critical System Protection agents detect behavior by auditing and monitoring processes, files, log data, and Windows registry settings. For example, a Symantec Critical System Protection detection policy can specify to monitor the Windows registry keys that the Welchia worm changes during infection and send an alert. As a result, Windows registry security-related events can be put into context and appropriate measures taken.

We will give the introduction of some use cases of CSP. The first and the simplest one is file watch.

Here are the configuration steps:

1. From the CSP management console, make a copy of this IDS policy: Windows_Baseline_Detection

CSP_File_Watch_01.png

2. Open to edit this new policy, and select 'My Custom Rules':

CSP_File_Watch_02.png

3. Click the + button to add a new custom control:

CSP_File_Watch_03.png

4. From the category list, select 'File Watch':

CSP_File_Watch_04.png

5. Click the + to edit the custom control:

CSP_File_Watch_05.png

6. Select to enable 'File Watch Rule Options':

CSP_File_Watch_06.png

7. Click the 'Edit' of the 'File Watch Rule Options', then input the name of the rule:

CSP_File_Watch_07.png

8. Select to enable 'Files to watch':

CSP_File_Watch_08.png

9. Click the 'Edit' of the 'Files to watch', then click 'Add':

CSP_File_Watch_09.png

10. Input the name of the folders or the files that you want to watch/monitor:

CSP_File_Watch_10.png

11. Select to enable the option of 'Monitor file creation', 'Monitor file deletion' or 'Monitor file access':

CSP_File_Watch_11.png

12. Save this policy:

CSP_File_Watch_12.png

13. Right click this saved policy, and select 'Apply' to apply this policy to the target agent:

CSP_File_Watch_13.png

14. Check out that the target agent/asset has received this policy:

CSP_File_Watch_14.png

15. If the use on the agent access the folders or files, the audit log will be find out on the Monitors tab of CSP management console:

 CSP_File_Watch_15.png

 

 


Viewing all articles
Browse latest Browse all 818

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>