Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
Welcome to Cyber is video series in The Comedy of Security, plus 5 +01 Certification and Exam.
00:07
I'm your Instructor, Round Warner.
00:09
In this video, we'll be talking about section 2.4.
00:13
Given a scenario, analyze and interpret output from security technologies.
00:18
Keywords for this video are gonna be interpreting output.
00:23
Most systems and security administrators implement a combination of many different types of technologies.
00:29
However, there are challenges with it, like choosing the right security technology,
00:34
configuring it, optimizing it and then last how to interpret the output from these technologies. Technologies provide a lot of good information,
00:45
but are you using it
00:47
with the output you have three choices
00:50
do nothing, either because it's a false positive. Or the organization really has no significant risk to fixing or eliminating the vulnerability or security gap
01:00
or three accepting the risk but implementing mitigating controls.
01:06
In this video, I'll discuss the process of analyzing and interpreting output from these different security technologies so you can select an act upon the proper option. You see, the different technologies will be talking about in this video on your screen, including firewalls, host based firewalls, network firewalls,
01:26
file integrity checks,
01:27
application white listing
01:30
data loss prevention, removal meet, removable media control,
01:34
patch management
01:37
application firewalls and data exfiltration prevention.
01:41
Let's dive into the world of technology output.
01:46
The first type of technology I'll be talking about where we need to understand the output are firewalls on hosts,
01:53
desktops and laptops, and even mobile devices all need to have layered security just like servers. One of the most common ways to protect desktops and laptops is to use ah, Host firewall
02:06
for the purpose of this video, The discussion focuses on software firewalls that could be implemented into the user environment.
02:14
Most major operating systems come with its own host firewall on Windows. It's the Windows firewall you can locate by typing wfp dot MSC at a Windows Command Prompt.
02:27
Lennox has its uncomplicated firewall or U F. W
02:31
I. P tables is also associated with Lennox.
02:36
Each of these provide the ability to block ports Service's I P's or I P Range is. They can also use other types of rules to block unwanted network traffic onto the host.
02:49
Host firewalls provide a great layered security across your network.
02:54
There can be some challenges, though, with firewall configurations, for example, end user should not be allowed to disable a firewall or change the firewall rules, you should always be centrally managed.
03:07
Additionally, the firewall needs to monitor both incoming and outgoing network traffic, not just one or the other. But both
03:16
the output of the firewall depends on the actual application and the operating system in use.
03:23
For example, on Window, she should be looking at the Windows Event viewer security event to see output from firewall logs. There may also be more information through pop ups.
03:36
Lennox Logs Too far log.
03:38
Take some time to be familiar with your own operating systems and how your host firewalls work.
03:45
Another protection technology we see on hosts is the host Intrusion detection System or host intrusion prevention system
03:53
hit heads or hips.
03:55
Each of these provides sensors on each host. That relay backed with centralized management console, which compiles the data to identify distributed friends, for example, you see viruses across your network.
04:10
Each of those are sensors going to a centralized management console that can tell you of a whole network wide event. It's not just on one system, but happening across your infrastructure.
04:20
Heads and hips may also be included with the host firewall or anti virus solution. So consult your own documentation for the solution that's on your systems.
04:31
Some issues associated with kids in hips include false positives, legitimate traffic labeled as an attack and false negatives. Attacks labeled as legitimate traffic
04:43
concept is to match that traffic identified as an attack with the actual network traffic. To learn more about intrusion detection prevention systems, you should check out nest SP 894 which is their guide.
04:59
There's a lot of good information about kids and hips. I recommend you check out to learn more about this topic.
05:04
There are a variety of different anti virus and anti Mauer solutions available for desktops, servers, even mobile devices. On your screen, you see Windows Defender.
05:16
Windows 10 delivers a comprehensive built in ongoing security protections, including Windows Defender, antivirus firewall and more.
05:26
Windows Defender Anti Virus delivers ongoing riel time protection again software threats like viruses and ransom, where you see a typical pop up, which is the output from anti virus or anti malware. Review How these pop ups work and what you can do. For example, it's
05:45
this message is telling you that there's harmful or
05:47
potentially unwanted software on the machine,
05:50
and you can remove it. You can review it, or you can ignore it.
05:55
This is an important output regarding anti virus and anti malware
06:00
in enterprises. They may use centralized consoles to take away this decision from the end users. Either way, I know how your anti virus and anti malware software works.
06:12
Common challenges we see with antivirus and anti malware software particularly associated with output is that pop up warning you saw on the previous screen. If that's happening on an end user system, there's a good potential that the engineers air might click. Ignore.
06:28
That's why it's important to centralize security and automate the response as much as possible to take the end user out of the equation
06:36
for malware, you should consider whether to quarantine it so putting in its own safe container or removing it.
06:44
It's often up to the anti virus, anti malware application that makes this decision and should trust it. But go to the manufacturer's website to learn more about that particular virus or malware warning that occurs through the anti virus anti Mauer.
07:00
Other issues associated with anti virus and anti Mauer include the Avie not being updated and outdated signatures
07:10
way Anti Virus Works is that it pulls signatures from the vendor that corresponds with known malware wolf. It's not continually being updated. There's a potential for a zero day to be able to sneak through and breach that host system.
07:25
Another challenge is false positives. As previously mentioned,
07:29
it might be an alert that really doesn't exist. That'll be an annoyance for the end user.
07:34
Mauer may still be present even when it said it's been quarantined or removed.
07:40
Malware is going to be very tricky, and you can sometimes stay in residents, even though it looks like it's gone, really takes practice and removing it. And the best choices to re image the system.
07:53
All of these air challenges associated with anti virus and anti Mauer
07:58
there's some simple solutions to the challenges with antivirus and anti malware. First auto updating Auto updating requires network connectivity, but the system should be set to automatically pull signatures and update the antivirus program.
08:13
If there is a virus within your network environment, you need to detach that system from the network, make sure that virus doesn't spread.
08:22
Another idea is potentially used different products.
08:26
For example, I run Windows Defender, along with malware bites, provides layered approach to security.
08:33
I previously mentioned hunting malware with CeCe internals in a different video, learning how to manually remove malware. It can be very tricky, but it's a great experience. It's something to learn about.
08:46
The last thing to do with malware on a system is to just re image the system. Put on a new operating system that you know is good and clean.
08:54
All of these are potential solutions. Review them as you're studying for your security plus material.
09:01
A file Integrity checker is another type of security solution you may find on either servers or clients.
09:07
What it does is it computes a cryptographic hash such a Shaw one or MD five for all selected files and creates a database of the hash is so has the file name, along with the hash value.
09:22
Hashes are periodically cup re calculated and compared to the hash is in the database to check for modification.
09:28
It's a little check to see against a known hash and have exchanged than the file has changed, and an alert could be sent to the management console
09:39
for alert. You need to determine what has changed and why. It could be due to patching or other types of software upgrades or could be due to malware.
09:50
File integrity. Checkers are nice layered approach to security on servers and on hosts. A common program associated with the File Integrity Checker is trip wire
10:01
in Application White listing an organization of proof software applications that are permitted to be used on their assets permitted on desktops, laptops or even mobile devices.
10:13
Onley. Those approved applications can be installed and used.
10:18
The primary purpose of white listing is to protect Resource is from harmful applications. For example, in Microsoft Environment, APP Locker can be used to a white list applications based on the following three Conditions.
10:31
Publisher for digitally signed files.
10:35
The PATH, which identifies an application by its location.
10:39
Or the file hash, which uses a system computed cryptographic hash.
10:46
All of these air techniques for application white listing that provide more security on who's based systems and servers
10:54
on your screen. You see Windows App Locker in use. AP Locker lets you control which APS and files users can run.
11:01
These include Execute herbal file scripts, Windows installer files dynamic linked libraries or D l's packaged APS and packaged app installers.
11:13
AP Locker helps you define the rules based on those attributes I talked about on the last slide.
11:18
A sign rules to a security group or an individual user create exceptions to rules.
11:24
For example, you can create a rule that allows all users to run all Windows binaries except the registry editor like Reg et it.
11:33
Another benefit for AP lockers to use audit on Lee Mode to deploy the policy and understand its impact before enforcing it.
11:43
AP Lockers. Powerful Tool I recommend you experiment with it to get that hands on experience with application white listing
11:52
data loss prevention DLP is a tool to prevent sensitive information from physically or logically leaving corporate systems. You start by determining what is sensitive. So do you have credit cards, Social Security numbers or other personally identifiable information on your systems or network?
12:09
Once it's identified, you can ensure it's not being ex full traded
12:13
through a DLP solution.
12:16
It's designed to detect and prevent unauthorized use and transmission of that confidential information,
12:22
and it could be being put out to a USB drive. US people lockers or out to social media, cloud storage or even through email deal. People will check for this to make sure it does not occur.
12:37
Deal P systems provide another layered approach to security The output is basically an alert, saying a user's trying to expel trait data. Knowing what to do when that situation occurs is all part of your incident response plan.
12:52
And it's all part of a DLP solution.
12:56
On the last light, I talked about US bees Common challenge within corporations. People can put him in their pockets, store confidential information on it and walk out the building with it and could be hard to detect. When that happens,
13:09
removable media control prevents that it can block all US be usage from a particular set of devices, say, from laptop or desktop. You can use this type of control either locally on a system or throughout your network by setting a corporate policy.
13:26
Be aware of how you handle exception. For example, you have a marketing director who has to put his presentation on a thumb drive to deliver it to a client. Maybe you can set temporary permissions for removable media, but normally not allow its use within your corporation.
13:43
Another concept is to use only corporate owned and secure devices.
13:48
US bees that are encrypted and are owned by the organization and inventory.
13:54
Lastly, is to scan the removal media on each used to make sure that there's no viruses or malware being transmitted and that they're scrubbed and cleaned if they're no longer in use.
14:07
Patching is one of the best ways. Cleanest ways, easiest ways to prevent and reduce the effects of malware. Another type of breaches.
14:16
Automate your patches whenever possible. You should also have a patching process where you start with the vendor notification. For example, second Tuesday of every month, Microsoft sends out a notification about its patches.
14:31
Then you test those patches within some type of a test environment
14:35
to make sure they're not gonna have some detrimental effect on your network or systems.
14:41
Then they want to use stage deployment rather than rolling out a patch to everybody, which could be problematic. You do it to pockets. Maybe I t gets the patch first and then contested over a few days, and then different groups. You roll it out in stages.
14:56
Lastly, is reporting have all of the systems received the patch is it hasn't taken. Do any systems miss the patch? Going through that report is very important part of a security professionals life to make sure all the systems within your infrastructure stay up to date and none are missing that patches.
15:16
Creating those alerts on failed patches is another type of output you see from Patch management systems.
15:22
The Microsoft patches take care of a lot of the major ones on Windows systems,
15:28
but not all. If you have any third party applications, make sure they are up to date and automatically. If at all possible,
15:35
help automate the patch management process. There's some tools that you can use. One is the Microsoft System Center Configuration Manager or S. C. C. M,
15:46
formerly known as the System Management Server. This consolidates and centralizes patching within the Microsoft environment so you could make sure you pull it down from a centralized resource and then distributed out through your network all of your windows systems and devices. Following that process, I just mentioned
16:06
the Lenox Red Hat package. Manager RPM does something similar for Lennox Systems.
16:12
These Patch Management service is provide automated approach for patching, which reduces if overhead increases efficiency and security.
16:22
In a previous video, I talked about you, T m's and N G F W s. These are all one firewall appliances from a single vendor with one management console.
16:33
The output from this will depend on the particular vendor.
16:37
They will use some type of a console, and sometimes this will be sent to a security operation center that can be monitored and watched 24 by seven
16:48
and set it up. It's too who has alerted when anomalies or problems are identified through a U T M or N G. F W.
16:55
Also from a previous video, I discussed wafts Web application firewalls,
17:00
thes control, the input output and our access to, from or by applications or service is based on categories, rules or heuristics. It watches what's happening on your Web applications, and we'll block malicious traffic in the output from these devices. Will depend on the particular application or vendor in use.
17:19
Refer to their documentation for more information.
17:23
Typical rules apply for handling output from laughs. Have your incident response plan in place and be ready if you see an attack happening against a Web application server
17:36
data execution prevention or depth is available either through hardware or software and prevents malware from executing in the memory space reserved for operating system processes.
17:48
You see the example on your screen from Microsoft. This is available in both E a. M D and Intel platform. It's built into the hardware capabilities taught automatically protect the operating systems memory space from potential malware.
18:03
This is available also on Windows 10.
18:06
In this video, I discussed numerous security technologies and the potential output you may see as a security professional.
18:15
Let's practice on a sample quiz question.
18:17
Question one.
18:18
The security tool is best for checking to see if specific system files have been changed and report on those changes.
18:26
The answer is a file integrity checker
18:30
provides hash of system files and checks the hash to see if the file has changed.
18:37
Question, too.
18:38
You're working as a security analyst and receive a call from an end user saying he has received a warning about a virus.
18:45
Which of the following is not a step you should take to resolve the issue?
18:49
The answer is B manually delete virus files that won't fully get rid of the virus. You need to be using an antivirus program that will help you remove that file or re image the system.
19:03
There are also labs associated with this module,
19:07
the first being the application data establishing host security.
19:12
In this guide, you will practice with antivirus programs and explore built in anti Mauer applications used within Windows 10 such as Windows Security Essentials.
19:25
Another lab you may consider. It's the one on implementing patching using W sauce.
19:30
Granted, WS Us is an older technology, but it gives you the ideas of how Windows patching works.
19:37
Windows Server Update Service provides a cost effective patch management solution to deploy updates to the main join window servers and workstations in corporate networks.
19:48
In this exercise, you learn how to install and configure it, create computer groups and W S U. S. And configure the group policy object policy for it.
19:57
It's another opportunity for you to get hands on experience with this material.
20:03
This concludes the video for section 2.4. Given a scenario, analyze and interpret output from security technologies.
20:11
Refer to your study material for more information on these topics,

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor