This will be a first for me on this forum, this is NOT a complaint, but rather just an observation.
I am punishing this eval unit best I can, throwing everything at it, which includes dual AV, all IPS (Snort) options with no time limit, and also enabling file patterns.
Had user (limited) approach me today that they had an unknown security message. It was a fake antivirus message from "Microsoft" about needing to clean a virus. Luckily they were savvy enough to alert me without clicking.
I can't honestly say what would have occurred had they clicked it (hopefully nothing in my environment), I just find it somewhat disconcerting that with all these layers, these things still blow through.
This was coming from a .blue domain in an ad on FoxNews homepage. Here's what it went past to get to user...
OpenDNS -> Sophos SG125 with dual AV / all IPS options / file patterns -> Invincea FreeSpace with all options (jailed / hardened / and blacklist fed browser) -> Symantec Endpoint Protection with Insight plugin enabled in FreeSpace browser -> limited user on Win7pro64.
So just how many "licks" does it take to get to the center of a "secure" juicy pop? I still don't know the answer to that one. I'm moving everyone to Commodore 64's next week. Stay paranoid everyone.
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
First off you need ot have the dns like this:
client--windows Ad---UTM---wan DNS. Otherwise you bypass the atp protection of utm...
“Stay paranoid, my friends.”
“Stay paranoid, my friends.”
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
ATP works very well. That's one error out of many many installs that have gone well.
as far as your points above:
if you are using internal utm dns the primary dns you are fine in regards to ATP.
Nothing is perfect but the fact is IE still has the same faulty design that makes it the gateway for exploits and malvertising that it has always been. Couple that with flash and java and ANY browser will get nailed if those are not kept updated(most aren't).
I do not have a single client(corporate or personal) that uses ie. The reality is IE is no longer required for folks to do their jobs. For the 1 site that might balk at chrome IE is in the highest security mode and whitelists are designed for that site..that's it.
if you are using a program that emulates IE...sandbox or not you are going to have issues....
The best thing you can do is NOT use symantec, macafee, or trend micro(those a/v suites make me a fair amount of $$$)....if you don't have to have flash of java remove them, Do not use IE, have utm blocking the suspicious and p o r n categories...and the rest is policy enforcement.
IME ads and p o r n (and its ilk) are where most of your online threats are. If folks want to see p o r n they can infect their machines not the office's.
I can say right now it's been more than 2 years since a client of mine has gotten infected by anything. This is as much due to their embracing a strict technology policy(and enforcing it) as it is the technology.
“Stay paranoid, my friends.”
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
“Stay paranoid, my friends.”
I wish you much success. We just have to agree to disagree on some things. Google BadBIOS for giggles some time. When professional security researchers can't keep this cancer out, I'm more prone to think we're in trouble.
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow