Enterasys-networks 9034385 Bedienungsanleitung Seite 82

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 98
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 81
Assessment Design Procedures
5-18 Design Procedures
2. Determine Assessment Server Location
Whendeterminingthelocationoftheassessmentserversonthenetwork,thefollowingfactors
shouldbeconsidered:
•Thetypeofassessment:agentlessoragentbased.
Agentlessassessmentconsumesmorebandwidththanagentbasedassessmentduringthe
scanofanendsystem.However,itisimportanttounderstandthattheamount
ofbandwidth
consumedbyagentlessassessmentshouldonlybeconsideredwhenalargenumberofend
systemsarebeingassessedoveraseverelybandwidthrestrictedlink.Forexample,if1000
endsystemsareconnectedtoabranchofficeovera512Kbpsconnectionthatisalsocarrying
latencysensitive
VoIPandotherrealtimeapplications,itisrecommendedtopositionan
assessmentserveratthebranchofficetoexecuteassessmentforconnectingdevicesandavoid
congestiononthebandwidthrestrictedlink.
•EndsystemconfigurationfortheassociatedSecurityDomain.
Ifagentlessassessmentisimplementedandconnectingendsystemsare
runningpersonal
firewalls,theassessmentserverlocationmayberelevanttotheeffectivenessofthe
assessments.Forexample,MicrosoftXPSP2isenabledbydefaultwithapersonalfirewallthat
deniesallunsolicitedinboundconnectionattempts.Therefore,aMicrosoftXPSP2personal
firewallwillpreventthesuccessfulexecutionofanend
systemassessmentunlessthefirewall
isconfiguredtoallowspecifictypesofunsolicitedinboundconnections,suchasfromspecific
IPaddressesoroverspecificprotocolsasdefinedintheExceptionslist.Thismaybe
configuredbytheenduserviawebbasedremediationorthroughaWindowsdomain
controllergroup
policydefinition.
3. Identify Assessment Server Configuration
Anassessmentserverutilizesthirdpartyassessingsoftwaretoexecutescansagainstconnecting
endsystems,andthissoftwaremustbelocal ly configuredwiththesecurityassessment
parameters.Thethirdpartyassessingsoftwareonallassessmentserversbelongingtothesame
SecurityDomainmustbeconfiguredidenticallysothatconsistencyismaintained
inthe
assessmentofallconnectingendsystemswithinthatdomain.Theselectionofthevulnerabilities
assessedbytheassessmentserversisbasedsolelyontheenterprisesecuritypolicy.Herearesome
examplesofvulnerabilityassessmentconfiguration:
•Remotescansthatutilizealocallyconfiguredaccountontheendsystemcanevaluate
virtuallyanyconfigurationdetailsoftheendsystemwithintherightsoftheaccount.Foran
administrativeaccount,anyendsystemparameterscanbecheckedincludingtheregistry
settingsandtherunningservices.Examplesincludethedateofantivirusdefinitionfiles,
installationofantivirussoftware,statusofantivirusprotection,installed
patches,and
personalfirewallstatusandconfigurationinformation.
•Remotescansthatdonotutilizealocallyconfiguredaccountontheendsystemcanevaluatea
morelimitedsetofvulnerabilitiesthroughtheassessmentofremotelyaccessibleserviceson
theendsystem.ExamplesincludeOSspecificvulnerabilitiesaccessedthroughopenTCP/
UDPports
andvulnerabilitiesofremotelyaccessibleservicesrunningontheendsystem(FTP
server,HTTPserver).
TheSANSTop20securityvulnerabilitiesprovideasuggestedbaseguidelineconfigurationfor
enterprisesinitiallydeployingNACwithendsystemassessment(http://www.sans.org/top20/).
Thirdpartyassessingsoftwareregularlyreleasesupdatestoassessnewlyidentifiedsecurity
vulnerabilities.Asubscriptiontosuchaserviceisrecommendedtomaintainanuptodate
assessmentengineonthenetwork.Newvulnerabilitiesonlyneedtobeincludedintheassessment
Seitenansicht 81
1 2 ... 77 78 79 80 81 82 83 84 85 86 87 ... 97 98

Kommentare zu diesen Handbüchern

Keine Kommentare