Quantcast
Channel: Symantec Connect - Products - Articles
Viewing all articles
Browse latest Browse all 818

How to utilize SEP 12.1 for Incident Response - PART 1

$
0
0

The purpose of this article is to provide insight on how to use the various features within SEP 12.1 for Incident Response. This will be the first in a series of articles showing you various ways to utilize SEP 12.1 for this purpose. I make no assumptions regarding your environment so this is provided "As-is." You should always test before deploying into your production environment or at the very least, understand the consequences associated with it. Let's get started.

PROBLEM: You receive a call in the middle of the night that a virus is loose on your network. SEP 12.1 appears to only be stopping a few infected files but some still remain. The technician who first noticed the infection performed a quick analysis and sent you a file which SEP does not appear to remediate. You quickly confirm this by submitting to https://www.virustotal.com and see that Symantec does not yet have a signature for this piece of malware. You head to the office and get to work. After submitting the file to Symantec Security Response, you decide to use the "Application to Monitor" feature which is inside the Exceptions policy.

As we can see, for the purposes of this article, the undetected malicous file running on PCs is called apt.exe

7.JPG

This filename needs to be added so that is can be monitored and reported back to the SEPM any time it executes.

To add, open your Exception policy and select the Exceptions tab

2_0.JPG

 

Click Add >> Windows Exceptions >> Application to Monitor

3_0.JPG

 

The "Add an Application to Monitor" windows appears and we add the filename and click "Add"

8.JPG

 

9.JPG

 

After being added, click OK to save to the policy. Once the clients check in and pickup the latest policy, this application will be monitored (Log Only) when it is executed and reported back to the SEPM. This process can take some time depending on how often your clients are configured to heart beat in so be wary of this if you don't see logs for awhile. This feature is better used in situations where the heart beat is set at a lower time interval (5-15 minutes) or especially if the clients are in Push mode. After we have waited for some time, we need to check our Application log to see if the process has showed up so we can configure an action to be taken on it when it tries to execute.

Go back to your Exception policy and select the Exceptions tab again. This time, select Add >> Windows Exception >> Application

6_0.JPG

 

The "Add Application Exception" window will come up, set the View to "Watched Applications"

10.JPG

 

This view will only show applications that you specifically added to be monitored and filters out all the others that you don't need to see at this point.

Now, we can select the apt.exe file and to the Action of your choice. I will set it to "Terminate"

11.JPG

 

Click OK to add to the Exception policy and you will see the new exception added using the Hash of the executable. Click OK to save to the policy

12.JPG

 

Once your clients pickup the new policy, SEP will now block the file from executing

13.JPG

 

This feature is very useful in cases where SEP is not yet detecting a malicious executable. You can use it for Incident Response purposes while Symantec creates a signature. And it will stop the further spreading of malware throughout your network.

I hope this article will be helpful for you. Comments/Questions/Criticisms are welcome!

Brian


Viewing all articles
Browse latest Browse all 818

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>