Quantcast
Channel: Symantec Connect - Products - Articles
Viewing all articles
Browse latest Browse all 818

Strengthening anti-virus security to prevent Ransom-ware derivative (Trojan.Cryptolocker family, etc.) infections

$
0
0

Because of increasing number of CryptoLocker-like infections, attacks and fast malware mutations the need to enforce the user application policy in our SEP managed systems became urgent.

Presently, the only secure way against these new, unknown viruses is, to disallow any application to run from User Profile directories, like Local and LocalLow with the help of the Application and Device Control feature. We should keep in mind while constructing our rules, that new generations of these Ransom-ware applications install themselves into many directories apart from Local(Low)/Temp. This is a very strict policy, exceptions are required to ensure user experience.

These settings can be achieved in SEP Manager → Policies as follows:

1.jpg

2.jpg

3.jpg

In the blocklist and exception list we can use “regular expressions” to describe rules. With regular expressions we can use wildcards in any part of the paths we supply, simplifying the selection of allowed/blocked directories.

More about this at:

https://support.symantec.com/en_US/article.HOWTO82512.html

The way to add a new block/allow rule:

4.jpg

After adding our settings we can specify actions to take on the “Actions” tab. We set up blocking, logging and notifications in mail:

5.jpg

It’s important to run our settings in Testing mode first, and only enable Production mode after tuning our exception lists to prevent undesired behavior.

6.jpg

The rules:

Application and Device Control Policy 

Block:

C:\\Users\\[^\]*\\appdata\\[^\]*\\[^\]*\.exe

C:\\Users\\[^\]*\\appdata\\Local\\[^\]*\.exe

C:\\Users\\[^\]*\\appdata\\LocalLow\\[^\]*\.exe

C:\\Users\\[^\]*\\appdata\\Local\\Temp\\[^\]*\.exe

C:\\Users\\[^\]*\\appdata\\LocalLow\\Temp\\[^\]*\.exe

C:\\Users\\[^\]*\\appdata\\Local\\Temp\\[^\]*\\[^\]*\.exe

C:\\Users\\[^\]*\\appdata\\LocalLow\\Temp\\[^\]*\\[^\]*\.exe

Exceptions (example):

C:\\Users\\Administrator\\appdata\\Local\\[^\]*\.exe

C:\\Users\\Administrator\\appdata\\LocalLow\\[^\]*\.exe

C:\\Users\\Administrator\\appdata\\Local\\Temp\\[^\]*\.exe

C:\\Users\\Administrator\\appdata\\LocalLow\\Temp\\[^\]*\.exe

C:\\Users\\Administrator\\appdata\\Local\\Temp\\[^\]*\\[^\]*\.exe

C:\\Users\\Administrator\\appdata\\LocalLow\\Temp\\[^\]*\\[^\]*\.exe

More exceptions (example):

C:\\Users\\[^\]*\\appdata\\Local\\Mozilla Firefox\\firefox\.exe 

C:\\Users\\[^\]*\\appdata\\Local\\IE Tab\\[^\]*\\ietabhelper\.exe

C:\\Users\\[^\]*\\appdata\\Local\\Temp\\Foxit Reader Updater\.exe

C:\\Users\\[^\]*\\appdata\\Local\\Google\\Google Talk Plugin\\googletalkplugin\.exe

C:\\Users\\[^\]*\\appdata\\Local\\Google\\Update\\GoogleUpdate\.exe

Create a "Notification condition" under Monitors/Notifications:

4.JPG


Viewing all articles
Browse latest Browse all 818

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>