Beyond Compliance: Combating Threats with Endpoint

Beyond Compliance: Combating Threats
with Endpoint Configuration
Management
Written by Randy Franklin Smith
Commissioned by Lumension Security, Inc.
© 2012 Lumension Security, Inc. and Monterey Technology Group, Inc.
Contents
Executive Summary ................................................................................................................................................................ 3
Business Drivers ..................................................................................................................................................................... 4
Endpoint Focus of Today’s Threats .................................................................................................................................... 4
Compliance Mandates Specific to Workstation Configuration .......................................................................................... 4
Federal Desktop Core Configuration ............................................................................................................................. 4
Office of Management and Budget M-06-16 Mandate ................................................................................................ 4
Payment Card Industry Data Security Standard ............................................................................................................ 5
Other Compliance Guidance ......................................................................................................................................... 5
Top Priority: Endpoint Security.......................................................................................................................................... 6
Key Technical Issues ............................................................................................................................................................... 6
Workstation Security is Important and Very Different than Server Security..................................................................... 6
Configuration Management is the Foundation of Endpoint Security ................................................................................ 7
Group Policy: An Important Part of the Solution ............................................................................................................... 8
Where Group Policy Works: Core Configuration .......................................................................................................... 8
Security Filtering ....................................................................................................................................................... 8
Results and Modeling Wizards ................................................................................................................................. 9
Auditing .................................................................................................................................................................. 10
Import/Backup/Restore Operations ....................................................................................................................... 10
Where Group Policy Stops .......................................................................................................................................... 11
1. Unsupported Security Settings ........................................................................................................................... 11
2. Managed Execution of Custom Scripts ............................................................................................................... 12
3. Reporting and Validation .................................................................................................................................... 12
Configuration Management: Only One Piece of Endpoint Security................................................................................. 13
Solution: Lumension® Endpoint Management and Security Suite ....................................................................................... 13
Configuration Management ............................................................................................................................................ 14
Policy Assessment and Enforcement .......................................................................................................................... 14
SCAP Validated FDCC Scanner ..................................................................................................................................... 15
Visibility and Reporting ............................................................................................................................................... 15
Content Wizard ........................................................................................................................................................... 16
Beyond Configuration Management: Comprehensive Endpoint Management and Security.......................................... 17
Conclusion ............................................................................................................................................................................ 18
About Randy Franklin Smith ................................................................................................................................................. 19
About Lumension ................................................................................................................................................................. 19
Disclaimer ............................................................................................................................................................................. 19
Executive Summary
The risks to organizations are more dangerous than ever as attackers focus their efforts on the endpoint. In
the past couple years we have seen well known businesses suffer huge losses of intellectual property and
goodwill because of attacks that began at the endpoint. As these risks continue to rise, regulators are
responding with increased compliance mandates that go deeper and are more prescriptive. Organizations
cannot afford the penalties of non-compliance, much less the real losses and costs associated with security
breaches. These factors create a powerful business driver for making endpoint security the number one
priority for information security today.
Workstation (laptops, desktops, etc) configuration management is the foundation of endpoint security. All
other endpoint security technologies that run on the operating system (OS) – such as antivirus, patching,
encryption and application control – can be compromised or circumvented if the OS itself is insecure.
But a common misconception persists that security on workstations is less important than on servers, with
more simple security requirements. Workstations are, in fact, a critical part of the overall trusted computing
base within an organization just like servers, storage devices and routers. Any computer, regardless of who it
belongs to or what data is present on it, can serve as a beachhead from which attackers move deeper into an
organization.
Most endpoints are Windows workstations in an Active Directory (AD) domain. This allows administrators to
use Group Policy to configure many of those computers settings. However, certain limitations in Group Policy
prevent it from delivering comprehensive configuration management. To help address these issues,
organizations should mature their use of Group Policy to leverage advanced features like security filtering,
modeling wizards, change control and audit. However, even with these advanced capabilities, Group Policy
does not constitute a comprehensive endpoint configuration management solution. Organizations are still
faced with unsupported security settings, how to manage the execution of custom scripts, and a lack of
visibility and reporting.
Lumension® Security Configuration Management (SCM) works along with Group Policy to fill these remaining
gaps by providing independent validation of security configuration against industry standard baselines.
Lumension® Endpoint Management and Security Suite (L.E.M.S.S.) actively tracks policy enforcement on each
endpoint and provides deep visibility into all exceptions and policy enforcement failures. L.E.M.S.S. fills the
gaps in group policy with a powerful wizard-based facility that simplifies the management of custom
configuration and script execution.
But configuration management is just the first layer of endpoint security. Multiple additional technologies
must be deployed to address the wide-ranging threats affecting endpoints in particular and there are too
many such technologies to use a piecemeal approach that combines numerous point solutions.
Correspondingly, Lumension® Security Configuration Management is just one piece of the overall Lumension®
Endpoint Management and Security Suite. Lumension® Endpoint Management and Security Suite combines
all of these technologies into a single, integrated solution that provides comprehensive endpoint security,
while maintaining an productive end-user experience and preserving efficiency within IT.
Business Drivers
Workstation security and configuration management is more important than it ever was. Endpoints are
more powerful than ever and locally store copies of more sensitive data. Moreover, today’s attackers
target workstations more than ever. In this section we will explain why the workstation is the initial,
tactical target of today’s attackers and explore the compliance regulations that authorities are
developing in response.
A compromised endpoint provides a beach-head within the
organization from which the attacker can then use a variety of
Endpoint Focus of
Today’s Threats
After years of focus on the
server and perimeter,
workstation security has reemerged as the weak link in
today’s organization. Attackers are more sophisticated than ever in the history of computers. Today’s
attacker is financially or politically motivated and can draw on the resources of a large organization and
an ecosystem of malware vendors and botnet providers. While their strategic aim may require much
deeper penetration within the targeted organization’s network, any endpoint presents a very desirable
target from a tactical point of view because:
methods that tend to fly under the radar.
1) A compromised endpoint provides a beachhead within the
organization from which the attacker can then use a
variety of methods that fly under the radar.
2) Endpoints are especially vulnerable due to the direct
interaction with end-users and the processing of large
amounts of content from the Internet.
Compliance Mandates Specific to Workstation
Configuration
Endpoint
Focus of
Today's
Attacks
Desktop
Compliance
Mandates
Priority 1:
Endpoint
Security
As privacy concerns intensify and exposures of confidential data
mount, governments and other regulatory bodies are recognizing
that the endpoint is the first place to start. The response is a growing number of compliance mandates
that specifically address workstation security configuration.
Federal Desktop Core Configuration
The Federal Desktop Core Configuration (FDCC), developed by the National Institute of Standards and
Technology (NIST), the Department of Defense (DoD) and the Department of Homeland Security (DHS),
provides a set of security configuration standards by which all federal agencies must adhere to as
mandated by the Office of Management and Budget (OMB).
Office of Management and Budget M-06-16 Mandate
The OMB M-06-16 Mandate requires agencies to establish safeguards for sensitive agency data on
laptops and workstations. To achieve compliance with the M-06-16 Mandate, agencies must enforce
security measures that safeguard the integrity and availability of sensitive agency information at the
endpoint.
Payment Card Industry Data Security Standard
The continuation of massive credit card data breaches at many high profile organizations prompted the
development of the Payment Card Industry Data Security Standard (PCI DSS), which standardizes how
credit card data should be protected.
To achieve compliance with the PCI DSS, vendors and service providers must adhere to six major
categories of requirements, with a total of twelve PCI-required controls, covering access management,
network security, incident response, network monitoring and testing and information security policies.
Unquestionably, PCI DSS includes workstation configuration management because it designates a
cardholder data network (CDN) that encompasses all components that come into contact with
cardholder data, either at rest or in transit. This includes all workstations and other endpoints that
process cardholder data or connect to such system.
Other Compliance Guidance
There are a myriad of other compliance mandates which organizations must be aware of, depending on
their industry and jurisdiction. In addition, there are a number of useful guidelines which may help
organizations meet their cybersecurity obligations. Here are a few to consider:



1
Data Protection laws on a pan-national level (e.g., the EU Data Protection legislation1), national
level (e.g., the UK Data Protection Act2) or state level (currently, 49 US states and territories
have data breach notification laws3). Be aware that some of these extend their reach beyond
their natural borders; for instance, the Massachusetts data protection law (MA 201 CMR 17)
pertains to all organizations holding sensitive personal information on any resident of the
Commonwealth.4
US Federal configuration guidelines from the National Institute of Standards and Technology
(NIST) such as SP 800-53 (entitled Recommended Security Controls for Federal Information
Systems and Organizations)5 and FIPS 200 (entitled Minimum Security Requirements for Federal
Information and Information Systems)6 might be useful to non-governmental organizations as
well.
Other guidelines such as the Critical Security Controls (fka the Consensus Audit Guidelines) from
the SANS Institute7, SSAE 16 (which replaces the old stalwart SAS 70), COBIT, and so on.
See http://ec.europa.eu/justice/data-protection/index_en.htm
See http://www.legislation.org.uk/
3
See http://www.ncsl.org/issues-research/telecom/security-breach-notification-laws.aspx
4
See http://www.mass.gov/ocabr/docs/idtheft/201cmr1700reg.pdf
5
See http://csrc.nist.gov/publications/PubsSPs.html
6
See http://csrc.nist.gov/publications/PubsFIPS.html
7
See http://www.sans.org/critical-security-controls/guidelines.php
2
Top Priority: Endpoint Security
In the past couple years we have seen well known businesses suffer huge losses of intellectual property
and goodwill because of attacks that began at the endpoint. Regulators are responding with increased
compliance mandates that go deeper and are more prescriptive. Organizations cannot afford the
penalties of non-compliance, much less the real losses and costs of security breaches. These factors
create a powerful business driver for improving endpoint security. In the next section we will discuss the
key technical issues concerning workstation configuration management and its essential role in endpoint
security.
Key Technical Issues
Workstation configuration management is the foundation of endpoint security. All other endpoint
security technologies that run on the OS (e.g., antivirus, patching, encryption, application whitelisting)
can be compromised or circumvented if the OS itself is insecure.
Most endpoints are Windows workstations in an Active Directory (AD) domain, allowing administrators
to use Group Policy to configure many of those computers settings. However, certain limitations in
Group Policy encourage a “set and forget” approach to workstation configuration, which fails to address
today’s risks and compliance regulations. We will explore these important gaps later in this section, but
first let’s consider a more fundamental issue.
Workstation
Security
Server
Security
Workstation Security is Important and Very Different
than Server Security
Workstations cannot be treated like servers; they require a very
different configuration to match a very different use case. Servers are
configured to sit “headless” in a computer room and service transaction
requests over the network. As such, servers must be hardened at the network layer, and access control
within file system and other resources are critical. On the other hand, with a few exceptions for remote
management connections, workstations can flatly refuse inbound connections.
Going back to servers, except for thin-client systems, the only interaction at the GUI level that servers
have is with IT professionals. In contrast, workstations constantly interact with end-users who typically
have less security awareness and directly process content from the Internet like emails, documents,
images, html, flash, java and other types of rich content.
The type of exploits and the hardening techniques required in response are very different. For example,
on servers you need to close all unneeded ports and patch remaining services against buffer overflows.
On workstations, malicious network-based attacks attackers should be easily rebuffed by the
workstation firewall with a very simple configuration. On the other hand, workstations must be patched
against an unending list of content-based exploits, such as malformed images or malicious flash content
embedded in an Excel spreadsheets. These are vulnerabilities to which most servers are not exposed if
basic best practices are followed, such as not browsing the web.
Another difference lies in the service window characteristics encountered with workstations and
servers. On servers, your opportunity to patch and remediate should be as short as possible, occur on a
predictable basis and in general be very controlled. Whereas workstations typically do not have a
particularly regular usage pattern and there may be more flexibility in the scheduling of patch and
remediation. On the other hand, the availability/connectivity of mobile laptops is quite unpredictable
compared to servers. Laptops are often disconnected from the corporate LAN for weeks or even
indefinitely making web-based management very desirable.
The lack of awareness on this distinction between workstation and server security is at least partly due
to a lingering misconception, dating back to mainframe days, that workstations are not as important to
security as servers are. Workstations are in fact a critical part of the overall trusted computing base
within an organization, just like servers, storage devices and routers. After all, the organization’s
information is in motion and/or at rest on all of these components. An attacker that compromises a
server, device or workstation can steal or tamper with any information with which that component
comes into contact.
Today it is the exception to find a workstation or laptop without sensitive data on it because so many
applications, such as Outlook, SharePoint, and CRM systems, store corporate data on local workstations.
But even a workstation assigned to the lowliest member of an organization constitutes an important
tactical target to attackers. This is true because any computer, regardless of who it belongs to or what
data is present on it, can serve as a beachhead from which attackers move deeper into an organization.
This very fact was demonstrated in the notorious attack on RSA last year. A mere handful of low level
employees were targeted by a malicious email which allowed attackers to gain control of their
endpoints. Having established a beachhead on one of the employee’s computers, the attackers moved
out from there to gain access to apparently extremely sensitive and proprietary data about RSA SecurID
product technology that had far reaching consequences for RSA and its customers.
Configuration Management is the Foundation of Endpoint Security
As established earlier in this paper, endpoint security is more important than ever. But endpoint security
encompasses so many different risk vectors and technologies such as:








Disk encryption
Data leakage prevention
Patch management
Anti-virus
Application whitelisting
Firewall
Device control
Port control
With so many aspects to
endpoint security where does
an organization begin? Fundamentally, all of the above endpoint security technologies are simply
applications running on an OS. One of the fundamental laws of computer security is that an application
is only as secure as OS upon which it runs. Therefore, configuration management is the foundation of
endpoint security.
Configuration management is the first step in coming to grips with today’s endpoint security crisis. So
organizations need to be able to centrally mandate strong and consistent security configuration
standards to all endpoints so that additional layers of endpoint defense can be built on top of that solid
foundation.
Group Policy: An Important Part of the Solution
Thankfully Windows endpoints have a powerful technology to help automate configuration in the form
of Group Policy. Organizations with Windows endpoints belonging to an AD domain should use Group
Policy to perform the core configuration. We will consider several features of Group Policy that are
important to understand and use in order to manage endpoint security effectively.
While Group Policy is powerful, it is not intended to be a comprehensive configuration management
solution. We will identify three areas of configuration management not addressed by Group Policy.
Where Group Policy Works: Core Configuration
Group Policy is an effective and flexible technology for defining the hundreds of settings that comprise a
Windows configuration state. Not only does Group Policy support almost every setting in Windows, the
application of a Group Policy Object (GPO) is embedded deep within the Windows OS so that it is very
difficult for administrators to override and for all practical purposes impossible for end-users to
circumvent. Within minutes an administrator can create one GPO that configures hundreds of settings
on thousands of computers.
However, Group Policy must be used carefully and effectively because it can easily be misconfigured,
resulting in adverse impact to the security and availability of hundreds or thousands of endpoints. To
make effective use of Group Policy without adverse consequences it is important to get beyond the
basic functionality of Group Policy and leverage several more advanced features:




Security Filtering
Results and Modeling Wizards
Auditing
Import/Backup/Restore Operations
Next we will show how to use these features to ensure Group Policy is configured correctly and that
changes to it are subject to appropriate change controls.
Security Filtering
Group Policy’s flexibility allows administrators to tailor security settings to handle different types of
systems as well as exceptions for special users or other circumstances. One feature in particular of
Group Policy that organizations should make more use of is Security Filtering. Too often organizations
rely exclusively on Organizational Units (OU) to set the scope of group policy application. This is
understandable because it is easy to grasp how linking a GPO to an OU will result in all computers within
that OU receiving group policy.
But OUs control more than just group policy application; primarily, OUs control the delegation of
administrative authority, which is critical to implementing least privilege in AD. In fact, OUs are the only
way to delegate administrative authority, whereas OUs are just one way to scope group policy. Security
Filtering is an alternative way to scope group policy application completely independent of OU
hierarchy.
Security Filtering leverages GPO permissions to limit which users or computers the GPO is applied. By
default, the Authenticated Users special principle is listed under the GPO’s Security Filter. Since all
domain users and computers are automatically part of Authenticated Users, the GPO is applied to all
users and computers in the container (domain or OU) where the GPO is linked. But if an administrator
removes Authenticated Users and adds some other group, the GPO is now applicable only to the
members of that particular group. To apply a GPO to a certain set of users or computers regardless of
which OU they reside in, the administrator can simply link the GPO to the root of the domain and then
replace Authenticated Users in the Security Filtering list of the GPO with the appropriate group.
Thus, Security Filtering is an important feature for allowing OU hierarchy to reflect the division of
delegated administrative authority while preserving the ability to apply specific configuration polices to
appropriate users and groups.
Results and Modeling Wizards
Group Policy is flexible enough to handle almost any configuration scenario. This flexibility is provided
through multiple ways to scope Group Policy, and several methods for adjusting the order of
precedence that arbitrates between conflicting GPOs to arrive at a given computer’s Resultant Set of
Policy (RSOP). The various options that can impact Group Policy application include:








Container to which a GPO is linked
Security filtering
WMI filtering
Disabled GPO links
Disabled Computer Configuration
Disabled User Configuration
Enforced GPOs
No override GPOs
Complexity, though, is the price for such flexibility. It is very easy to misconfigure Group Policy, resulting
in organizations assuming their endpoints are configured securely while in fact they are not, because of
some unaccounted for interaction between the many options that impact group policy application.
Organizations need positive confirmation that group policy is being applied according to expectations.
There are two wizards in the Group Policy Management Console that provide some help in gaining this
confirmation.
The Group Policy Results Wizard allows you to choose one computer and generate a report detailing
exactly which GPOs were applied to that computer and in what order of precedence, having taken into
consideration all factors that influence the RSOP. The good news with the Results Wizard is that it shows
you the actual results in effect. For each setting within Group Policy the Results Wizard identifies the
applied value and the winning GPO that supplied it. But the bad news is that the Results Wizard only
reports this information for one computer. There is no way to aggregate this results data from many
computers into one analysis of your overall endpoint security posture.
On the other hand, the Group Policy Modeling Wizard allows you to select an organizational unit and
simulate the RSOP expected for a typical computer within that OU. The good news is that the Modeling
Wizard allows you to model the configuration anticipated for many computers. But the bad news is that
its data is not guaranteed to be accurate since you must make several assumptions when defining the
report. Some of these assumptions include the groups to which a typical computer belongs so that the
wizard can take security filtering into account as well as WMI filters.
The bottom line is that while the Results and Modeling Wizards, when used together, can give a degree
of assurance about the security posture of an organization’s endpoints, group policy cannot provide
comprehensive, quantitative confirmation. This gap will be explored later in this paper.
Auditing
Because Group Policy changes can have such deep impact to the security configuration of so many
computers in such a short period of time, organizations need to know when Group Policy related
changes occur and who performed them. The Directory Service category of Windows auditing allows
administrators to receive notification of changes to GPOs themselves or Group Policy related settings on
containers (OUs, domains and sites) in the Windows security log of domain controllers.
In addition to enabling the Directory Services Changes audit category on domain controllers,
administrator must edit the audit policy of the root of the domain in AD Users and Computers. Enable
auditing of Write permission on groupPolicyContainer objects to catch changes to GPOs themselves.
Audit the Write Property permission on gpLink and gpOptions attributes of domains, OUs and sites to
catch group policy related changes to container objects. Once these audit policies are in place, Windows
will log event ID 5136 whenever something related to Group Policy is changed.
To also audit the creation and deletion of GPOs, administrators should enable auditing of Create and
Delete permissions on the root of the domain for groupPolicyContainer objects. Windows will log event
IDs 5137 and 5141 to the Security log when GPOs are created or deleted respectively.
Import/Backup/Restore Operations
Another important requirement, given the huge impact group policy have on endpoints, is change
control. By default, the authority to edit GPOs is limited to domain administrators and their delegates;
but in addition to access permissions, organizations need the ability to test and rollback Group Policy
changes. The Group Policy Management
Console allows administrators to backup
and restore GPOs and to import the
settings from a backed-up GPO.
Organizations should implement standard
operating procedures that ensure GPOs are
always backed up prior to modification.
Even with the advanced capabilities, group policy does not
constitute a comprehensive endpoint configuration management
solution.
In addition, proposed changes to GPOs should be tested, in a development OU or domain, and then
moved to the production GPO. One way to move tested settings from a development GPO to a
production GPO is to back up the tested GPO to a file. Then select the targeted production GPO and
import the settings from the test OU. By importing just the settings rather than restoring the entire GPO,
administrators can get the updated settings without overwriting other aspects of the production GPO
such as security filtering, delegated permissions, and WMI filters.
Where Group Policy Stops
Even with the advanced capabilities, Group Policy does not constitute a comprehensive endpoint
configuration management solution. In this section we will discuss the three areas where additional
technology is needed beyond Group Policy to satisfy compliance requirements and to meet today’s
endpoint security needs.
1. Unsupported Security Settings
While Group Policy certainly covers the majority of Window’s security settings, there are some areas of
configuration that go unmanaged. BIOS settings are very important to security since they relate to
secure boot device sequence, hardware passwords, hardware security devices such as biometric devices
and smart card readers as well as hard drive passwords. Because BIOS settings vary so widely by vendor
and model, these settings are not managed by group policy.
Applications also have security related settings that can have great impact on the vulnerability or
resilience of endpoints. For instance, Microsoft Excel spreadsheets can contain a variety of active
content that is enabled by default. In the famous intrusion at RSA, the initial attack could have been
thwarted by disabling flash content in Office applications. This is just one example of the real world
importance of application security configuration. But applications are outside the native scope of Group
Policy and very few application vendors provide Group Policy extensions to manage their applications
settings via Group Policy.
Administrators can potentially leverage the “preferences” feature of Group Policy to manage application
security settings. The Preferences section of a GPO allows administrators to configure application
registry values or modify application configuration files. But it is very important to realize that these
definitions are preferences and not policies. Policies are enforced by Windows and it is very difficult to
override or circumvent them. Preferences, on the other hand, are applied at the time of Group Policy
processing but can be overwritten by end-users or the application itself between applications of Group
Policy.
Configuration Management with Group Policy
2. Managed Execution of Custom Scripts
Besides OS and application security settings
there are frequently operations that need to
be performed to maintain the security of
endpoints. These operations are typically
performed via the command line or through
scripts and cannot be accomplished through
a simple registry tweak or Group Policy
settings.
The only method for executing custom
scripts via Group Policy is via
startup/shutdown scripts and logon/logoff
scripts which, as the terms imply, allow you
to trigger the execution of a provided script when a system starts up, shuts down, or at the time a user
logs on or off.
Unfortunately, system startup and logon events are often outside the control and scheduling of
administrators. Also it may be a comparatively long time before an important script is executed by
Group Policy. There are a number of other downsides to trying to manage the execution of custom
scripts via Group Policy. First, Group Policy attempts to execute the script each time the associated
event (e.g., logon) occurs, but some operations should only be performed once. This means that
additional logic must be coded into the script to prevent repeated execution of the critical operation.
Furthermore, scripts don’t always execute successfully on endpoints because of the inherent uniqueness
of endpoint resulting from that endpoint’s hardware and that particular end-user’s role and habits.
Unfortunately, group policy provides no tracking or reporting functionality to assess the aggregate
success of a script across the large numbers of endpoints at any organization.
3. Reporting and Validation
The matter of tracking and reporting brought up in the previous section extends beyond just the
execution of custom scripts. Group Policy can fail for a many different reasons, such as DNS problems,
permission issues, and domain controller health, just to name a few. Furthermore, individual endpoints
can have health or connectivity issues that prevent a group policy from being applied.
Moreover, Group Policy can be misconfigured and the Modeling and Results Wizards discussed above
fall short of providing comprehensive and quantitative visibility into the status and health of
configuration management across all endpoints. A medium or large organization may have dozens of
GPOs and hundreds or thousands of endpoints, but no way to report on their status or compliance with
mandated security standards.
Without such reporting, Group Policy is very much a fire and hope technology. For compliance, and in
order to lay a solid foundation for additional layers of endpoint security, organizations need an
aggregate view of the security posture of all endpoints.
Configuration Management: Only One Piece of Endpoint Security
While Configuration Management is the foundation of endpoint security, it is still only one piece. There
are so many layers on top of configuration management required to address the very real threats of
endpoint security today. Organizations are faced with providing:








Disk encryption
Data leakage prevention
Patch management
Anti-virus
Application whitelisting
Firewall
Device control
Port control
With all of the threat vectors facing endpoints today and the technologies that must be brought to bear
against them, endpoint security has become a veritable Medusa’s head with each serpent being slain
seeming to produce two its place. This translates to an overload of security agents consuming resources
on endpoints, and a plethora of disconnected security systems for administrators to coordinate and
manage. The traditional piecemeal approach to endpoint security desperately needs a new, more
coordinated, consolidated and comprehensive approach.
Solution: Lumension® Endpoint Management and Security Suite
Confronting the multitude of risks affecting endpoints today while maintaining good performance on
endpoints and efficiently managing the array of required security technologies requires a
comprehensive and consolidated endpoint security solution. It must combine all required technologies
into a single agent and allows administrators to manage them from a single, unified administrative
console.
That requirement is the driving force behind the design of Lumension® Endpoint Management and
Security Suite (L.E.M.S.S.) which combines all critical endpoint security technologies into one endpoint
agent and presents a single, integrated command and control interface to administrators.
Policy
Assessment and
Enforcement
SCAP Validated
FDCC Scanner
Content Wizard
Visibility and
Reporting
Lumension Security Configuration
Management
Group
Policy
Comprehensive Configuration Management
Configuration Management
As shown earlier in this whitepaper, configuration management is the foundation of endpoint security.
While Group Policy provides the first step in configuration management, important gaps remain that
prevent organizations from completing a solid foundation upon which to build the rest of their endpoint
security strategy.
The L.E.M.S.S. Security Configuration Management module works with Group Policy to fill these
remaining gaps by providing independent validation of security configuration against industry standard
baselines. L.E.M.S.S. provides comprehensive validation which does not rely on sampling a small portion
of endpoints or on simulations of policy application that depend on numerous assumptions. L.E.M.S.S.
actively tracks policy enforcement on each endpoint and provides deep visibility into all exceptions and
policy enforcement failures. L.E.M.S.S. fills the gaps of unsupported security settings and endpoint
scripts through a powerful wizard-based facility that simplifies the management of custom configuration
and script execution.
Policy Assessment and Enforcement
Lumension® Security Configuration Management fills the gap between group policy and assurance that
endpoints are actually secure comparing endpoints to selected baseline security standards completely
independent of group policy. Lumension® Security Configuration Management’s advanced policy
assessment and enforcement capabilities provide detail and roll-up visibility into configuration posture.
Organizations can instantly identify endpoints where:


Group Policy has been misconfigured thus producing unexpected configuration results
Group Policy is failing to be applied due to any number of network or AD issues
Using Lumension® Security Configuration Management, organizations maintain constant audit readiness
through the automated collection and centralization of security configuration results.
SCAP Validated FDCC Scanner
Beyond the real-world risks facing endpoints today is the added business driver of compliance with the
growing number desktop security standards like FDCC. Through the Security Configuration Management
module, L.E.M.S.S. enables agencies to comply with FDCC standards by providing a Security Content
Automated Protocol (SCAP) Validated FDCC Scanner that assesses, standardizes and reports against
required configurations.
Lumension® Security Configuration Management ensures that endpoint configurations are compliant
with the standards outlined in the FDCC. Through import of SCAP policy templates, network and agentbased scanning, policy enforcement and enterprise reporting, Lumension® Security Configuration
Management automatically checks the security properties of network devices and effectively maps
security configuration controls to these enterprise endpoints to enforce proper configurations and
report against FDCC requirements to prove compliance.
As a NIST-validated solution, Lumension® Security Configuration Management provides a comprehensive
list of SCAP policies with hundreds of defined checks, allowing organizations to quickly evaluate their
security posture and determine what must be fixed to meet configuration requirements according to:





Microsoft Windows Security Guide Series
NIST Special Publication 800-68
Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG)
National Security Agency (NSA)
Office of Management and Budget (OMB) Federal Desktop Core Configuration (FDCC)
In addition, customized templates ensure that assessments are tailored to the various compliance
policies that fit an organization's specific requirements.
Visibility and Reporting
Organizations that rely on Group Policy alone are in the dark as to the actual status of their army of
endpoints. Lumension® Security Configuration Management exposes the true security posture of
endpoints throughout the enterprise with aggregate views of endpoint baseline compliance, as well as
detailed security configuration exception reports that expose specific configuration exceptions on
individual endpoints that can be automatically remediated.
L.E.M.S.S. features a wide range of predefined, integrated report templates that list and/or depict data
collected during network management. These range from general (endpoints, discovery scan jobs) to
highly detailed (operating systems installed on network endpoint).
Standard reports included in L.E.M.S.S. provide raw data that can be extracted and manipulated to meet
all of your reporting needs. Lumension® Reporting Services (a free add-on that integrates with
L.E.M.S.S.) is a collection of powerful and actionable pre-defined reports providing centralized visibility
of IT assets and the security posture of the L.E.M.S.S. endpoint environment.
Content Wizard
One of the key technical issues unaddressed by Group Policy is how to configure unsupported security
settings and how to manage the execution of custom scripts. Lumension® Content Wizard (LCW) extends
the capabilities of L.E.M.S.S. to cost-effectively streamline desktop and system management tasks with
simple and customizable wizard-based policy creation, distribution and baseline enforcement – without
requiring additional tools and
costs. This powerful utility enables
organizations to extend their
The easy-to-use wizard allows administrators to create custom
Lumension solution capabilities to
remediation packages that perform security operations or patch
dynamically meet the needs of
little known or in-house developed applications.
their diverse IT environments,
without the purchase of additional
technologies. Lumension® Content
Wizard simplifies the setting and enforcement of local security configuration policies, such as: disabling
guest accounts, turning off unnecessary services, enforcing password complexity and length, and forcing
unattended systems to log off. Policies can be based on industry best-practices templates with 24 preconfigured checks or policy elements that can be added and modified based on your specific security
policies.
The easy-to-use wizard allows administrators to create custom remediation packages that perform
security operations or patch little known or in-house developed applications. These packages can
perform custom detection, deployment or configuration operations such as distribution or removal of
files, registry value changes or any other operation through the execution of OS commands and custom
scripts. Lumension® Content Wizard makes it easy to centrally deploy, manage and report on all new and
existing IT scripts. Organizations can automatically monitor and report on scripting actions taking place
throughout the environment and a template based approach to the creation of remediation scripts
which allows novice users to quickly author remediation scripts (VBScript, JavaScript, command line) to
remedy identified system problems.
Endpoints are often laden with unwanted software and outdated, insecure versions of required
software. Lumension® Content Wizard provides policy-based installation of new and updated software
packages. Organizations can quickly identify installed software on endpoints and then automatically
remove outdated or unauthorized software thus ensuring ongoing monitoring and baseline
enforcement.
Lumension® Content Wizard capabilities include:


Local Enforcement of Security Configuration Policies - Enforce security configuration policies
based on industry best-practices, such as disabling guest accounts, turning off unnecessary
services, enforcing password complexity and length, and forcing unattended systems to log off.
Centralized Management of System Desktop Configuration Tasks and Policies - Automate timeconsuming tasks across the entire network, including automated scheduling of disk


defragmentation tasks, and policy enforcement for account, device control, domain, network,
and system policy security settings.
Customizable Policy Creation and Syndication - Customize configuration settings to meet
internal policy controls and extend patching to in-house developed applications. This can be
across several different operating platforms.
Centralized Deployment, Management and Reporting on all Scripts - Centrally deploy, manage,
and report on all scripting actions throughout the organization including making sure antivirus
(AV) is installed and distributing third-party patches.
To help organizations leverage previous investments in configuration management and avoid reinventing the wheel inside and outside the organization, Lumension® Content Wizard allows sharing and
collaboration through:


Content Exchange Forum - Content collaboration is made simple via a company-internal site
access thru the Lumension® Content Wizard, allowing custom created content to be shared
among separate divisions to ensure standardized detections, deployments and reporting.
Lumension Connect Content Garden - Share best practice scripts with other Lumension
customers within the Lumension Community.
Beyond Configuration Management: Comprehensive Endpoint Management
and Security
Lumension® Security Configuration Management is just one piece of the overall Lumension® Endpoint
Management and Security Suite (L.E.M.S.S.). With a single agent and one centralized management
console L.E.M.S.S. delivers integrated and comprehensive endpoint security.
L.E.M.S.S. is developed with a modular, extensible architecture can scale from small to larger,
distributed infrastructures to manage anywhere from a few endpoints to thousands. The single, resilient
agent eliminates agent bloat while providing self-monitoring and recovery capabilities to ensure
continuous protection.
L.E.M.S.S. server/agent communication delivers near real-time policy and events updates – even for
endpoints outside the corporate intranet. Role-based access control (RBAC) enables everyone to access
the information and operations they need without compromising security and AD integration. This
allows organizations to leverage existing users, groups and computers within AD to harmonize the
infrastructure.
Enhanced asset discovery and agent deployment provides comprehensive visibility into both managed
and unmanaged systems and makes it easy to deploy agents to unmanaged systems interactively,
automatically or on a scheduled basis.
Conclusion
The evolution of threats and the
accelerating arms-race between
organizations and attackers has
caused endpoint security to reemerge as a critical security issue.
In fact, for most organizations
today, endpoint security should
be the first priority of information
security efforts.
Configuration
Management
Patch and
Remediation
AntiVirus
Lumension®
Endpoint
Management
and Security
Suite
Disk
Application
Configuration management is the
Control
Encryption
foundation of endpoint security.
Relying on the native
Device
functionality of Group Policy
Control
alone leaves serious gaps in an
organization’s ability to comply
with desktop security standards
and to keep endpoints secure and up-to-date against an ever-changing threat landscape. Lumension®
Security Configuration Management works with Group Policy to fill the gaps and provide a solid and
comprehensive solution upon which to build the rest of the organization’s endpoint security approach.
But configuration management is just the first layer of endpoint security. Multiple additional
technologies must be deployed to address the wide-ranging threats affecting endpoints in particular.
There are too many such technologies to use a piecemeal approach that combines numerous point
solutions. Lumension® Endpoint Management and Security Suite combines all of these technologies into
a single, integrated solution that provides comprehensive endpoint security while maintaining an
productive end-user experience and preserving efficiency within IT.
About Randy Franklin Smith
Randy Franklin Smith is an internationally recognized expert on the security and control of Windows and
Active Directory security who specializes in Windows and Active Directory security. Randy publishes
www.UltimateWindowsSecurity.com and wrote The Windows Server 2008 Security Log Revealed – the
only book devoted to the Windows security log. Randy is the creator of LOGbinder software which
makes cryptic application logs understandable and available to log management and SIEM solutions. As
a Certified Information Systems Auditor, Randy performs security reviews for clients ranging from small,
privately held firms to Fortune 500 companies, national, and international organizations. Randy is also a
Microsoft Security Most Valuable Professional.
About Lumension
Lumension Security, Inc., a global leader in operational endpoint security, develops, integrates and
markets security software solutions that help businesses protect their vital information and manage
critical risk across network and endpoint assets.
Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by
delivering a proven and award-winning solution portfolio that includes Vulnerability Management,
Endpoint Protection, Data Protection, Antivirus, and Reporting and Compliance offerings. Lumension is
known for providing world-class customer support and services 24x7, 365 days a year.
Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Texas, Florida,
Washington D.C., Ireland, Luxembourg, Singapore, the United Kingdom, and Australia. Lumension: IT
Secured. Success Optimized.™ More information can be found at www.lumension.com.
Disclaimer
Monterey Technology Group, Inc., Lumension Security, Inc., and other contributors make no claim that
use of this whitepaper will assure a successful outcome. Readers use all information within this
document at their own risk.