TECHNICAL DOCUMENT Reference Nr. 20151211/CI/2 Written by C ostas Ioannou Latest update 21/1/2016 F-SECURE CONFIGURATION BEST PRACTICE AGAINST ZERO-HOUR MALWARE F-SECURE C LIENT SECURITY (CS) F-SECURE SERVER SECURITY (SS) F-SECURE EMAIL AND SERVER SECURITY (ESS) The following document is a best-practice configuration for making sure that you get the maximum protection level from F-Secure solution against ransomware and zerohour malware to maximum. Many settings are proposed to be locked. This means that end-user at the user interface cannot change the setting and thus disable a protection setting. F-secure Policy Manager Console can work in ‘Antivirus Mode’ and in ‘Advanced Mode’. Some of the settings can be configured only in ‘Advanced Mode’. We indicate which settings are configured in Antivirus mode and which can only be configured in Advanced Mode. Under each configuration setting (or set of settings) you will find a brief explanation of what this setting accomplishes. T ABLE OF C ONTENTS Best Practice for F-secure Client Security and F-secure Server Security ............................ 3 Policy Manager Console Antivirus Mode ................................................................. 3 Policy Manager Console - Advanced Mode .............................................................. 5 Best Practice for F-secure E-mail and Server Security .................................................. 7 E-mail traffic on Exchange.................................................................................... 7 Administrator’s web User Interface ...................................................................... 7 Policy Manager Console Advanced Mode ................................................................ 8 ___________________________________________________________________________________________________________ Negreponti 5 413 35 Larissa, Greece Tel. (+30) 2410-670030 Fax.(+30) 2410-670006 email [email protected] URL: www.inter-datasecurity.com 2 Disclaimer The information contained in this document is meant to help the reader in the combat against specific malware. Although utmost care has been taken for the correctness of the information, Inter Engineering does not accept any responsibility for the use, misuse or inability to use the information in this document. Due to the nature of the subject the information provided in this document is or will become incomplete over time. It is the sole responsibility of the reader to judge whether or not to use the information herein and to accept the consequences. If you disagree with this then you should not use this document. The aim of this document This document aims to provide the reader a configuration guide on how F-Secure Anti Malware software can contribute to protection of an organization against zero-hour malware. ___________________________________________________________________________________________________________ Negreponti 5 413 35 Larissa, Greece Tel. (+30) 2410-670030 Fax.(+30) 2410-670006 email [email protected] URL: www.inter-datasecurity.com 3 BEST PRACTICE FOR F-SECURE CLIENT SECURITY AND F-SECURE SERVER SECURITY Policy Manager Console Antivirus Mode Automatic Updates Automatic Updates > Enabled Automatic Updates = Checked & Locked - end-user cannot disable automatic updates. Status > Automatic Updates > Virus Definition Version (column) - Check that latest updates are installed on all hosts Real Time protection Real-Time Scanning > Real Time scanning enabled = Checked & Locked - end-user cannot disable real-time scanning Real-Time Scanning > Custom Action on infection = Quarantine Automatically (Locked) - end-user does not leave infected code in the hard drive by mistake Real-Time Scanning > Files to scan = Files with these extensions - it is recommended to perform only specific extensions (the default in Policy Manager Console) in order to avoid performance issues at the endpoint. Real-Time Scanning > Included Extensions = Default and Locked - IMPORTANT: This setting must NOT be locked on the Root policy domain level, because it will not allow F-secure installers to add new extensions if needed. It should be locked on Policy Domains under the Root policy domain level. - Currenlty, default included extensions in policy manager console (PMS v12) are: o C OM EXE SYS OV? BIN SC R DLL SHS HTM HTML HTT VBS JS INF VXD DO? XL? RTF C PL WIZ HTA PP? PWZ POT MSO PIF AC M ASP AX C NV C SC DRV INI MDB MPD MPP MPT OBD OBT OC X PC I TLB TSP WBK WBT WPC WSH VWP WML BOO HLP TD0 TT6 MSG ASD JSE VBE WSC C HM EML PRC SHB LNK WSF {* PDF ZL? XML ANI BAT C MD DOC DOT JOB LSP MHT PHP PPT SWF WMA WMV WMF WRI XLS XLT C LASS DOC X DOC M DOTX DOTM DOCB XLSX XLSM XLTX XLTM XLSB XLAM PPTX PPTM POTX POTM PPAM PPSX PPSM SLDX SLDM PUB Zero-hour protection Real-Time Scanning > Enable DeepGuard = Enabled and Locked - zero-hour malware detection cannot be disabled by end user. Mandatory for ransomware protection. Real-Time Scanning > Action on System Modification attempt = Automatic: Do not ask Real-Time Scanning > Use server Queries to improve accuracy = Enabled and Locked - additional method for zero-hour detection by cloud-looukups. Mandatory for ransomware protection. ___________________________________________________________________________________________________________ Negreponti 5 413 35 Larissa, Greece Tel. (+30) 2410-670030 Fax.(+30) 2410-670006 email [email protected] URL: www.inter-datasecurity.com 4 Real-Time Scanning > Use Advanced process monitoring = enabled and locked - additional method for zero-hour detection. Mandatory for ransomware protection. Email Scanning on Desktop Email scanning on desktop is highly recommended especially if you don't have a gateway solution or F-secure on Microsoft-Exchange (ESS). Supports IMAP, POP3, SMTP scanning. Email Scanning > Enable Incoming e-mail Scanning = enabled and locked - Email scanning cannot be disabled by user Email Scanning > Action on incoming infected attachments = Disinfect Attachment (Locked) - Attempt to disinfect infected attachment. Setting cannot be changed by enduser Email Scanning > Action on malformed message parts = Remove Message Part (Locked) - Malformed parts cannot be scanned. Setting cannot be changed by end -user Email Scanning > Scan inside compressed attachments = Enabled and Locked - Scan inside archives (zip, rar, etc.). Setting cannot be changed by the end user Web Traffic Scanning Web Traffic scanning on desktop is highly recommended especially if you don't have a gateway/proxy solution protecting web-traffic. Web Scanning > HTTP Scanning Enabled = Only Included Content Types (Locked) - Web traffic scanning cannot be disabled by end-user. Web Scanning > Action on infection = Block (Locked) - User cannot bypass an infected item and download it. Browsing Protection > Browsing Protection Enabled = Checked and Locked - Browsing protection protects browser from vulnerability exploits and blocks access to malicious URLs. Setting cannot be disabled by the end -user. Browsing Protection > Allow users to continue t o blocked pages = Disabled and Locked - End-user cannot bypass the blocking of a malicious page. Desktop Firewall Firewall Security Levels > Enabled network quarantine = enabled and locked - Network quarantine will block host’s access to the network if virus definitions are old or RTS is disabled. Firewall Security Levels > Active network quarantine on host if real-time scanning is disabled = enabled and locked - do not allow network access to endpoint if real-time scanning is disabled (except for updating). ___________________________________________________________________________________________________________ Negreponti 5 413 35 Larissa, Greece Tel. (+30) 2410-670030 Fax.(+30) 2410-670006 email [email protected] URL: www.inter-datasecurity.com 5 Application Control > Do not prompt for applications that DeepGuard has identified = enabled and locked Application Control > Do not prompt for Applications that identified using Real-time protection network = enabled and clear Application Control > Do not prompt for applications identified by scan engines = enabled and clear - Application Control does not allow unknown applications to connect to the network. Web traffic scanning Advanced Protection Web Traffic Scanning > Advanced Protection - These settings can help you block java, flash, pdf, Silverlight, active-x, etc. content from web-sites. You can implement an aggressive policy where you block the active content from pages by default, and whitelist only the web sites you need in order to work. Note that this approach demands more administration than normal, because you need to whitelist sites that your users are visiting. Policy Manager Console - Advanced Mode F-secure Antivirus > Plug-ins > confirm that All plugins (Antimalware engines) are enabled Real-time scanning F-secure Antivirus > Settings for Real Time Protection > Scanning Options > File Scanning > Inclusions and Exclusions > Add Extensions Defined in Database = en abled + locked - F-secure may include new extensions in database as new threats may rise. Exclusions F-secure Antivirus > Settings for Real Time Protection > Scanning Options > File Scanning > Inclusions and Exclusions > Excluded Objects Enabled = Disabled (locked) F-secure Antivirus > Settings for Real Time Protection > Scanning Options > File Scanning > Inclusions and Exclusions > Excluded Objects >Disallow User Changes = enabled F-secure Antivirus > Settings for Real Time Protection > Scanning Options > File Scanning > Inclusions and Exclusions > Excluded Processes Enabled = Disabled (locked) F-secure Antivirus > Settings for Real Time Protection > Scanning Options > File Scanning > Inclusions and Exclusions > Excluded Processes = empty (locked) -if you choose and need to enable exclusions the it’s better to define exclusions (objects, processes, paths) into PMC and keep these ‘locked’ so the end user may not add exclusions at the local UI. E-mail Scanning on desktop level F-Secure Antivirus > Settings for E-mail Scanning > Scanning Options > Incoming Email Scanning > Action on Disinfection Failure = Remove attachment (Locked) ___________________________________________________________________________________________________________ Negreponti 5 413 35 Larissa, Greece Tel. (+30) 2410-670030 Fax.(+30) 2410-670006 email [email protected] URL: www.inter-datasecurity.com 6 - if disinfection of attachment fails, then remove the complete attachment. F-Secure Antivirus > Settings for E-mail Scanning > Scanning Options > Common > Inclusions and Exclusions > Included Extensions > Check included extensions that have the default extensions to scan. - Default extensions are: COM EXE SYS OV? BIN SCR DLL SHS HTM HTML HTT VBS JS INF VXD DO? XL? RTF CPL WIZ HTA PP? PWZ POT MSO PIF . ACM ASP AX CNV CSC DRV INI MDB MPD MPP MPT OBD OBT OCX PCI TLB TSP WBK WBT WPC WSH VWP WML BOO HLP TD0 TT6 MSG ASD JSE VBE WSC CHM EML PRC SHB LNK WSF {* PDF ZL? XML ANI BAT CMD DOC DOT JOB LSP MHT PHP PPT SWF WMA WMV WMF WRI XLS XLT CLASS DOCX DOCM DOTX DOTM DOCB XLSX XLSM XLTX XLTM XLSB XLAM PPTX PPTM POTX POTM PPAM PPSX PPSM SLDX SLDM PUB F-Secure Antivirus > Settings for E-mail Scanning > Scanning Options > Common > Inclusions and Exclusions > Included Extensions for Compressed Files > check that they are the default - Default extensions are: ZIP JAR ARJ LZH TAR TGZ GZ CAB RAR BZ2 HQX F-Secure Antivirus > Settings for E-mail Scanning > Scanning Options > Common > Inclusions and Exclusions > Add Extensions Defined in Database Updates = Enabled (locked) - F-secure may automatically add extensions for scanning based on new threats rise. F-Secure Antivirus > Settings for E-mail Scanning > Scanning Options > Common > Inclusions and Exclusions > Excluded Extensions > Check for any 'dangerous' excluded extensions – (see list of included extensions above) Automatic Updates F-Secure Automatic Update Agent > Settings > Communications > Ask Before Download = no (Locked) - prevent end-user from stopping downloads Zero-hour Detection F-Secure DeepGuard > Settings > Exploit protection = enabled (locked) - protects browser from exploit attempts F-Secure DeepGuard > Settings > Applications > Check for any 'suspicious'/'unknown' application that is allowed by DeepGuard to run F-Secure Real-Time Protection Network Client > Participate in the Real-Time Protection Network = yes (Locked) F-Secure Real-Time Protection Network Client > Client is enabled = Yes (Locked) F-Secure Real-Time Protection Network Client > Excluded Domains (Check for any 'suspicious' domain) - Real-Time Protection Network is F-secure’s Cloud is one of Deep Guard’s methods for detecting zero-hour malware. F-Secure Network Filter > Excluded Applications > check for any application that is not necessary to be included here. ___________________________________________________________________________________________________________ Negreponti 5 413 35 Larissa, Greece Tel. (+30) 2410-670030 Fax.(+30) 2410-670006 email [email protected] URL: www.inter-datasecurity.com 7 BEST PRACTICE F-SECURE E-MAIL AND SERVER SECURITY E-MAIL TRAFFIC ON EXCHANGE FOR Administrator’s web User Interface Attachment Stripping Transport Protection > Inbound Mail > Attachments > Strip attachments from Inbound e -mail messages = enabled Transport Protection > Inbound Mail > Attachments > Strip these attachments = Disallowed Files Transport Protection > Inbound Mail > Attachments > Action on disallowed attachments = Drop Attachment Transport Protection > Inbound Mail > Attachments > Disallowed Files = *.bat,*.cmd,*.com,*.exe,*.hta,*.js,*.jse,*.pif,*.scr,*.shs,*.vbe,*.vbs,*.{* Transport Protection > Inbound Mail > Attachments > Quarantine stripped attachments = e nabled - strip incoming dangerous attachments (executables and scripts) Incoming Virus protection Transport Protection > Inbound Mail > Viruses > Scan inbound e-mail messages for viruses = enabled Transport Protection > Inbound Mail > Viruses > Heuristic scanning = enabled Transport Protection > Inbound Mail > Viruses > Action on infected messages = drop attac hment Transport Protection > Inbound Mail > Viruses > Quarantine infected messages = enabled Transport Protection > Inbound Mail > Grayware > Scan inbound e-mail messages for grayware = enabled Transport Protection > Inbound Mail > Grayware > Action on Grayware = Drop attachment Transport Protection > Inbound Mail > Grayware > Quarantine dropped grayware = enabled Transport Protection > Inbound Mail > Archives > Scan archives = enabled Transport Protection > Inbound Mail > Archives > List of files to scan inside archive s = unsafe files Transport Protection > Inbound Mail > Archives > Unsafe files = *.ACM, *.APP, *.ARJ, *.ASD, *.ASP, *.AX, *.BAT, *.BIN, *.BOO, *.BZ2, *.CAB, *.CHM, *.CMD, *.CNV, *.COM, *.CPL, *.CSC, *.DLL, *.DO?, *.DRV, *.EML, *.EXE, *.GZ, *.HLP, *.HTA, *.HTM, *.HTML, *.HTT, *.INF, *.INI, *.JS, *.JSE, *.LHA, *.LNK, *.LZH, *.MDB, *.MP?, *.MSG, *.MSO, *.OBD, *.OBT, *.OCX, *.OV?, *.P?T, *.PCI, *.PDF, *.PGM, *.PIF, *.PP?, *.PRC, *.PWZ, *.RAR, *.RTF, *.SCR, *.SHB, *.SHS, *.SYS, *.TAR, *.TD0, *.TGZ, *.TLB, *.TSP, *.TT6, *.VBE, *.VBS, *.VSD, *.VWP, *.VXD, *.WB?, *.WIZ, *.WML, *.WPC, *.WS?, *.XL?, *.XML, *.ZIP, *.ZL?, *.{*, Treatment of Archives files (zip, rar, etc.) Transport Protection > Inbound Mail > Archives > Excluded these files = <blank> Transport Protection > Inbound Mail > Archives > Limit max levels of nested archives to 3 / enabled Transport Protection > Inbound Mail > Archives > Detect disallowed files inside archives = disallowed files / enabled - enable this setting with caution as it can be resource intensive. On the other hand it will strip archives (zip, rar, etc.) which contain disallowed (executables and scripts). Transport Protection > Inbound Mail > Archives > Action on archive with disallowed files = drop archive Transport Protection > Inbound Mail > Archives > Action on max nested archives = drop archive Transport Protection > Inbound Mail > Archives > Action on password protected archives = drop archive ___________________________________________________________________________________________________________ Negreponti 5 413 35 Larissa, Greece Tel. (+30) 2410-670030 Fax.(+30) 2410-670006 email [email protected] URL: www.inter-datasecurity.com 8 - beware that this setting will block password protected archives (zip, rar, etc.) Transport Protection > Inbound Mail > Archives > Quarantine dropped archives = enabled Miscellaneous Options Transport Protection > Inbound Mail > Other > Intelligent File type recognition = enabled - intelligent file type recognition recognizes file types based on their content and not on their filename extension. Transport Protection > Inbound Mail > abled Transport Protection > Inbound Mail > = drop the whole message Transport Protection > Inbound Mail > message Transport Protection > Inbound Mail > Other > Limit max levels of nested message to 3 / e nOther > Actions on mails with exceeding nesting levels Other > Actions on malformed mails = drop the whole Other > Quarantine problematic messages = enabled Storage Protection Real-time scanning Storage Protection > Real-time scanning > Viruses > Storage Protection > Real-time scanning > Viruses > folders Storage Protection > Real-time scanning > Viruses > Storage Protection > Real-time scanning > Viruses > Storage Protection > Real-time scanning > Viruses > Storage Protection > Real-time scanning > Viruses > ments = enabled Scan mailboxes = scan all mailboxes Scan public folders = scan all public Scan these attachments = unsafe files Exclude these attachments = <blank> Actions > Try to disinfect = disabled Actions > Quarantine infected attach- Policy Manager Console Advanced Mode F-Secure Content Scanner Server > Settings > Virus Scanning > Scan Engines > All engines enabled F-Secure Content Scanner Server > Settings > Virus Scanning > Action if Engine Malfunctions = Return Scan Error F-Secure Content Scanner Server > Settings > Virus Scanning > Scan Inside Archives = Enabled F-Secure Content Scanner Server > Settings > Virus Scanning > Suspect Max Nested A rchives = Treat as Unsafe F-Secure Content Scanner server > Settings > Virus Scanning > Suspect Password Protected Archives = Treat As Unsafe F-Secure Content Scanner server > Settings > Virus Scanning > Scan extensions inside a rchives > check that they are the default extensions - default extensions: ACM APP ARJ ASD ASP AX BAT BIN BOO BZ2 CAB CHM CMD CNV COM CPL CSC DLL DO? DRV EML EXE GZ HLP HTA HTM HTML HTT INF INI JS JSE LHA LNK LZH MDB MP? MSG MSO OBD OBT OCX OV? P?T PCI PDF PGM PIF PP? PRC PWZ RAR RTF SCR SHB SHS SYS TAR TD0 TGZ TLB TSP TT6 VBE VBS VSD VWP VXD WB? WIZ WML WPC WS? XL? XML ZIP ZL? {* F-Secure Content Scanner server > Settings > Virus Scanning > Extensions Allowed in Pas sword Protected Archives = <empty> ___________________________________________________________________________________________________________ Negreponti 5 413 35 Larissa, Greece Tel. (+30) 2410-670030 Fax.(+30) 2410-670006 email [email protected] URL: www.inter-datasecurity.com
© Copyright 2026 Paperzz