Do you have a question about the SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1 and is the answer not in the manual?
Questions and answers
Related Manuals for Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1
Summary of Contents for Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1
Page 1
Security Threat Response Manager Category Offense Investigation Guide Release 2008.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 408-745-2000 www.juniper.net Part Number: 530-025609-01, Revision 1...
Page 2
Juniper Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
ONTENTS BOUT UIDE Documentation Feedback Requesting Support CCESS FFENSES What is an Access Offense? How do I Investigate an Access Offense? How do I Tune an Access Offense? SIM A UDIT FFENSES What is SIM Audit? How do I Investigate a SIM Audit Offense? How do I Tune a SIM Audit Offense? Tuning Using False Positive Function Tuning Using Custom Rules Wizard...
Page 4
How Can I Verify If STRM is Receiving Valid DoS Offenses? XPLOIT FFENSES What is an Exploit Attack? How do I Investigate an Exploit Offense How do I Tune an Exploit Offenses? How Can I Verify That STRM is Receiving Valid Exploit Offenses? ALWARE FFENSES What is Malware?
Page 5
USPICIOUS CTIVITY FFENSES What is a Suspicious Attack? What is Suspicious Traffic? What is a Suspicious Offense? How do I Investigate Suspicious Offense How do I Tune a Suspicious Offenses? YSTEM FFENSES What is a System Offense? How do I Investigate a System Offense? How do I Tune a System Offense? How Can I Verify That STRM is Receiving Valid Offenses? EFINED...
BOUT UIDE This preface provides the following guidelines for using the Category Offense Investigation Guide: Documentation Feedback • Requesting Support • Documentation We encourage you to provide feedback, comments, and suggestions so that we Feedback can improve the documentation. Send your comments to techpubs-comments@juniper.net, or fill out the documentation feedback form at http://www.juniper.net/techpubs/docbug/docbugreport.html.
CCESS FFENSES This chapter provides information on access offenses including: What is an Access Offense? • How do I Investigate an Access Offense? • • How do I Tune an Access Offense? What is an Access Limiting access to your network and networked resources is an essential Offense? component of any network security strategy.
CCESS FFENSES How do I To investigate an access offense: Investigate an Access Offense? Click the Offense Manager tab. Step 1 The Offense Manager window appears. Click By Category from the navigation menu. Step 2 The By Category view appears displaying high-level categories. The counts for each category are accumulated from the values in the low-level categories.
Page 11
How do I Investigate an Access Offense? Double-click the offense you wish to view. Step 5 The details panel appears. To investigate the attacker, view the Attacker Summary box: Step 6 Location - Allows you to determine if the attacker is local or remote: •...
Page 12
CCESS FFENSES STRM, use the Event Viewer to investigate firewall logs to make sure it is probably configured. For more information on the Event Viewer, see the STRM Users Guide. • User - If the attacker is local or a VPN user and STRM is receiving user identity logs, this field indicates user identity information.
How do I Tune an Access Offense? Once you have determined the impact of the offense, you must perform the Step 8 necessary steps to rectify the source of the activity. If you have determined this behavior is normal, you can tune STRM to no longer detect this activity. For more information, see How do I Tune an Access Offense?.
Page 14
CCESS FFENSES Select the necessary event properties to tune as a false positive. Step 4 Click Tune. Step 5 STRM will no longer create additional offense for this source IP address when this type of activity occurs. Offense Category Investigation Guide...
SIM A UDIT FFENSES This chapter provides information on SIM audit offenses including: What is SIM Audit? • How do I Investigate a SIM Audit Offense? • • How do I Tune a SIM Audit Offense? What is SIM Audit? STRM generates an records SIM audit events for system and configuration changes occurring within the STRM deployment.
Page 16
SIM A UDIT FFENSES To view additional low-level category information for the SIM Audit category, click Step 3 the arrow icon next to SIM Audit. Double-click any low-level category to view the list of associated offenses. Step 4 The list of offenses appear. Double-click the offense you wish to view.
Page 17
How do I Investigate a SIM Audit Offense? User - If the attacker is local or a VPN user and STRM is receiving user identity • logs, this field indicates user identity information. This allows you identify the user who is the source of the suspicious traffic. To obtain further information about the user, right-click on the IP address in the Description field to access additional menu options.
SIM A UDIT FFENSES Once you have determined the impact of the offense, you must either block the Step 11 source of the unauthorized configuration activity, then take the desired action against the offense. Once you have resolved the offense, close or hide the offense. Step 12 For more information on closing or hiding an offense, see the STRM Users Guide.
Page 19
How do I Tune a SIM Audit Offense? Select the event with the source IP address known to be producing the SIM audit Step 2 activity. Click False Positive. Step 3 The False Positive window appears with information derived from the selected event.
SIM A UDIT FFENSES Tuning Using Custom To tune SIM audit activity using the custom rules wizard: Rules Wizard In the navigation bar of the Offense Manager, click Rules. Step 1 The Rules interface appears. Using the Display drop-down list box, select Building Blocks. Step 2 In the Block Name list, locate the Default-BB-HostDefinition: VA Scanner Step 3...
Page 21
How do I Tune a SIM Audit Offense? In the Enter an IP address or CIDR and click ‘Add’ field, enter the IP address of Step 6 the VA scanner or IP address that is producing false positives. Click Add. Step 7 Repeat for all VA scanners or IP address(es).
UTHENTICATION FFENSES This chapter provides information on authentication offenses including: What is an Authentication Offense? • How do I Investigate an Authentication Offense? • • How do I Tune an Authentication Offense? What is an Typically, the first level of network security starts with authentication. When a user Authentication navigates a protected network, the network generally requires authentication at Offense?
Page 24
UTHENTICATION FFENSES To view additional low-level category information for the Authentication category, Step 3 click the arrow icon next to Authentication. Double-click any low-level category to view the list of associated offenses. Step 4 The list of offenses appear. Offense Category Investigation Guide...
Page 25
How do I Investigate an Authentication Offense? Double-click the offense you wish to view. Step 5 The details panel appears. To investigate the attacker, view the Attacker Summary box: Step 6 Location - Allows you to determine if the attacker is local or remote: •...
Page 26
UTHENTICATION FFENSES STRM, use the Event Viewer to investigate firewall logs to make sure it is probably configured. For more information on the Event Viewer, see the STRM Users Guide. • User - If the attacker is local or a VPN user and STRM is receiving user identity logs, this field indicates user identity information.
How do I Tune an Authentication Offense? How do I Tune an If you determine that the authentication activity is normal and STRM is creating Authentication false positive offenses, you can tune STRM to make sure no more offenses are Offense? created due to this activity.
Page 28
UTHENTICATION FFENSES Select the necessary event properties to tune as a false positive. Step 4 Click Tune. Step 5 STRM will no longer create additional offense for this source IP address when this type of activity occurs. Offense Category Investigation Guide...
CRE O FFENSES This chapter provides information on CRE offenses including: What is a CRE Offense? • How do I Investigate a CRE Offense? • What is a CRE Custom Rule Engine (CRE) offenses are generated through user defined custom Offense? rules or sentries.
Page 30
CRE O FFENSES To view additional low-level category information for the CRE category, click the Step 3 arrow icon next to CRE Double-click any low-level category to view the list of associated offenses. Step 4 The list of offenses appear. Double-click the offense you wish to view.
Page 31
How do I Investigate a CRE Offense? View the Attacker Summary box to understand the attacker: Step 6 Location - Allows you to determine if the attacker is local or remote: • - Local - This field specifies the network (group) in which it is located. - Remote - This field specifies the geographic location of the attacker, for example, Asia.
CRE O FFENSES How do I Tune a If you determine that the CRE activity is normal and STRM is creating false CRE Offense? positive offenses, you can tune STRM to make sure no more offenses are created due to this activity. You can use the Custom Rules wizard in the Offense Manager to create a building block to allow this behavior.
ENIAL OF ERVICE FFENSES This chapter provides information on DoS offenses including: What is a DoS Offense? • How do I Investigate a DoS Offense? • • How do I Tune a DoS Offense? • How Can I Verify If STRM is Receiving Valid DoS Offenses? What is a DoS A DoS attack is an attempt to prevent an application or host from behaving in Offense?
S) O ENIAL OF ERVICE FFENSES What is a DoS The intention of a DoS service exploit is to cause a disruption in service for a host Service Exploit? or service. A DoS exploit attempts to disrupt a service by sending an exploit, which may be a single packet containing a DoS exploit, to a port where a vulnerable service is listening.
Page 35
How do I Investigate a DoS Offense? Double-click any low-level category to view the list of associated offenses. Step 4 The list of offenses appear. Double-click the offense you wish to view. Step 5 The details panel appears. Category Offense Investigation Guide...
Page 36
S) O ENIAL OF ERVICE FFENSES View the Description field and determine the activity associated with this offense. Step 6 This may indicate multiple types of activity. If the offense is a DDoS attack, the following terms appear: • Distributed DoS Attack (Low, Medium, or High Number of Hosts) Potential Unresponsive Service or Distributed DoS •...
Page 37
How do I Investigate a DoS Offense? DoS attack. From the right-click menu, select Information > WHOIS Lookup or DNS Lookup. For more information on using the right-click menu, see the STRM Users Guide. Once you have determined ownership, contact your network administrator to determine if the source IP address(es) of the DoS attack may be blocked using your firewall or intrusion prevention device.
S) O ENIAL OF ERVICE FFENSES How do I Tune a If you determine that the DoS activity is normal and STRM is creating false positive DoS Offense? offenses, you can tune STRM to make sure no more offenses are created due to this activity.
How do I Tune a DoS Offense? In the Event Properties option, select the first option. Step 4 In the Traffic Direction option, choose one of the following options: Step 5 For a DoS attack, select the <IP address> to Any Destination option. For a DDos attack, select the <IP address>...
S) O ENIAL OF ERVICE FFENSES How Can I Verify If If you believe STRM should be receiving DoS offenses but none have appeared in STRM is Receiving the Offense Manager, verify that the events were received and processed using Valid DoS the Event Viewer interface.
Detection Systems (IDSs) or Intrusion Prevention System (IPSs). These systems may include stand-alone network sensors such as Sourcefire or Enterasys Dragon, part of an IPS within a firewall (such as Juniper Networks ISG), or host-based IDS systems (such as the Cisco Security Agent). By default, STRM attempts to detect high exploits that are likely to be successful or show a pattern of the attacker attempting to exploit multiple host or using multiple types of attacks.
Page 42
XPLOIT FFENSES To view additional low-level category information for the Exploit category, click the Step 3 arrow icon next to Exploit. Double-click any low-level category to view the list of associated offenses. Step 4 The list of offenses appear. Double-click the offense you wish to view. Step 5 The details panel appears.
Page 43
How do I Investigate an Exploit Offense Determine if the offense is a result of a remote host attempting to exploit one or Step 6 more local hosts. Typically the target of the attacker is located inside the Demilitarized Zone (DMZ) or in the public facing Network Address Translation (NAT) range.
Page 44
XPLOIT FFENSES Determine if the offense is the result of a local host attempting to exploit another Step 7 local host on your network. If this is the case, this is one of the most serious types of offenses, but also the most likely to be a false positive offense.
How do I Tune an Exploit Offenses? How do I Tune an If you determine that the exploit activity is normal and STRM is creating false Exploit Offenses? positive offenses, you can tune STRM to make sure no more offenses are created due to this activity.
XPLOIT FFENSES Click Tune. Step 8 STRM will no longer create additional offense for this source IP address when this type of activity occurs. How Can I Verify To verify that STRM is receiving valid offenses: That STRM is Receiving Valid Exploit Offenses? By default, STRM automatically removes noise and false positives commonly Step 1...
ALWARE FFENSES This chapter provides information on malware offenses including: What is Malware? • How do I Investigate a Malware Offense? • • How do I Tune a Malware Offense? What is Malware? This section provides information regarding malware including: What is Malware? •...
Page 48
ALWARE FFENSES How do I To investigate a malware offenses: Investigate a Malware Offense? Click the Offense Manager tab. Step 1 The Offense Manager window appears. Click By Category from the navigation menu. Step 2 The By Category view appears displaying high-level categories. The counts for each category are accumulated from the values in the low-level categories.
Page 49
How do I Investigate a Malware Offense? View the Attacker Summary box to understand the attacker: Step 6 Location - Allows you to determine if the attacker is local or remote: • - Local - This field specifies the network (group) in which it is located. - Remote - This field specifies the geographic location of the attacker, for example, Asia.
Page 50
ALWARE FFENSES has become chained to another offense. Chaining means that the target has become an attacker of another offense. This indicates a self-propagating malware. Note: Any remote targets associated to a malware offense may be foreign or unknown servers that the source IP address is communicating with to receive instructions to upload data.
Page 51
How do I Tune a Malware Offense? How do I Tune a If you determine that the malware activity is normal and STRM is creating false Malware Offense? positive offenses, you can tune STRM to make sure no more offenses are created due to this activity.
Page 52
ALWARE FFENSES Select the necessary event properties to tune as a false positive. In the case of a Step 4 malware offense, select the type of event and the event high-level category, which is creating the false positive malware offense. For additional information on using the False Positive tuning function, see the STRM Users Guide.
ETWORK NOMALIES FFENSES This chapter provides information on an network anomaly offenses including: What is an Network Anomaly Offense? • How do I Investigate a Network Anomaly Offense • • How do I Tune a Network Anomaly Offense? What is an Network Network anomaly offenses are generated using Network Behavior Anomaly Anomaly Offense? Detection (NBAD) and occur if STRM is receiving flow data (for example, NetFlow,...
ETWORK NOMALIES FFENSES threshold sentries, however, we recommend that you edit the value of the threshold sentries to values that meet the needs of your network. Anomaly An anomaly based offense includes changes in the amount of time particular services or networks are active. This includes three states: Detection of services, such as a mail server being installed in the Demilitarized •...
Page 55
How do I Investigate a Network Anomaly Offense To view additional low-level category information for the Network Anomalies Step 3 category, click the arrow icon next to Network Anomalies. Double-click any low-level category to view the list of associated offenses. Step 4 The list of offenses appear.
ETWORK NOMALIES FFENSES Click the At Time of Alert graph to investigate the flows creating this offense. Step 6 Click the graph to zoom in on the information. Step 7 Click the legend with the corresponding color to isolate the problem. Step 8 Click on the lower half of the graph.
OLICY FFENSES This chapter provides information on policy offenses including: What is a Policy Offense? • How do I Investigate a Policy Offense? • • How do I Tune a Policy Offense? • How Can I Verify That STRM is Receiving Valid Offenses? What is a Policy Policy offenses include correlated events that may constitute violations of security Offense?
Page 58
OLICY FFENSES To view additional low-level category information for the Policy category, click the Step 3 arrow icon next to Policy Double-click any low-level category to view the list of associated offenses. Step 4 The list of offenses appear. Double-click the offense you wish to view. Step 5 The details panel appears.
Page 59
How do I Investigate a Policy Offense? View the Attacker Summary box to understand the attacker: Step 6 Location - Allows you to determine if the attacker is local or remote: • - Local - This field specifies the network (group) in which it is located. - Remote - This field specifies the geographic location of the attacker, for example, Asia.
OLICY FFENSES Once you have determined the impact of the offense, you must perform the Step 9 necessary steps to rectify the source of the activity. If you have determined this behavior is normal, you can tune STRM to no longer detect this activity. For more information, see How do I Tune a Policy Offense?.
How Can I Verify That STRM is Receiving Valid Offenses? Select the necessary event properties to tune as a false positive. Step 4 Click Tune. Step 5 STRM will no longer create additional offense for this source IP address when this type of activity occurs.
OTENTIAL XPLOIT FFENSES This chapter provides information on potential exploit offenses including: What is a Potential Exploit Offense? • How do I Investigate a Potential Exploit Offense? • • How do I Tune a Potential Exploit Offense? What is a Potential Potential exploit offenses may be generated from many different sources, such as, Exploit Offense? a custom rule created in STRM or from an Intrusion Detection System...
Page 64
OTENTIAL XPLOIT FFENSES To view additional low-level category information for the Potential Exploit category, Step 3 click the arrow icon next to Potential Exploit. Double-click any low-level category to view the list of associated offenses. Step 4 The list of offenses appear. Double-click the offense you wish to view.
How do I Tune a Potential Exploit Offense? remote source IP address to make sure that your firewalls are probably configured to block any threatening traffic. If firewall logs are being sent to STRM, use the Event Viewer to investigate firewall logs to make sure it is probably configured.
Page 66
OTENTIAL XPLOIT FFENSES Select the event with the source IP address known to be producing this activity. Step 2 Click False Positive. Step 3 The False Positive window appears with information derived from the selected event. Select the necessary event properties to tune as a false positive. Step 4 For additional information on using the False Positive tuning function, see the STRM Users Guide.
ECONNAISSANCE FFENSES This chapter provides information on reconnaissance offenses including: What is Reconnaissance? • How do I Investigate a Reconnaissance Offense? • • How do I Tune a Reconnaissance Offense? What is STRM detects reconnaissance activity, which is the first step in thwarting and Reconnaissance? blocking serious network attacks.
ECONNAISSANCE FFENSES If reconnaissance activity from a specific attacker is followed by an exploit attack, STRM correlates this information to the offense to provide full details of the attacks. How do I This section provides information on further investigating a reconnaissance Investigate a offense.
Page 69
How do I Investigate a Reconnaissance Offense? The list of offenses appear. Double-click the offense you wish to view. Step 5 The details panel appears. View the Attacker Summary box to understand the attacker: Step 6 Location - Allows you to determine if the attacker is local or remote: •...
Page 70
ECONNAISSANCE FFENSES determine if the target responded to the scan. A scan is worth investigating if it receives a reply. This may indicate the initial behavior of a worm or an employee operating an unauthorized VA scanner. Click Events. Step 8 The List of Events appears for the selected offense.
How do I Tune a Reconnaissance Offense? Once you have determined the impact of the offense, you must either block the Step 11 source of the scan, patch or shut down services on the appropriate systems, then take the desired action against the offense. Once you have resolved the offense, close or hide the offense.
Page 72
ECONNAISSANCE FFENSES Select the event with the source IP address known to be producing Step 2 reconnaissance activity. Click False Positive. Step 3 The False Positive window appears with information derived from the selected event. Select the necessary event properties to tune as a false positive. Step 4 For example, in the window above, the Events with specific QID option is selected to tune the specific IP address and the event high-level category that is creating...
How do I Tune a Reconnaissance Offense? Click Tune. Step 5 STRM will no longer create additional offenses for this source IP address when performing normal VA or network management tasks. Tuning Using Custom To tune reconnaissance activity using the custom rules wizard: Rules Wizard In the navigation bar of the Offense Manager, click Rules.
Page 74
ECONNAISSANCE FFENSES In the Building Block section, click the IP address that appears. Step 5 A configuration window appears. In the Enter an IP address or CIDR and click ‘Add’ field, enter the IP address of Step 6 the VA scanner or IP address that is producing false positives. Click Add.
USPICIOUS CTIVITY FFENSES This chapter provides information on a suspicious attack including: What is a Suspicious Attack? • How do I Investigate Suspicious Offense • • How do I Tune a Suspicious Offenses? What is a This section provides information on a suspicious attack including: Suspicious Attack? What is Suspicious Traffic? •...
USPICIOUS CTIVITY FFENSES What is the event rate? STRM profiles the event rate for a device to determine the normal and abnormal rate for a device. If STRM detects a sudden increase in event rate from a device, or related to a specific source IP address, an offense is created. Who is the attacker (source IP address)? STRM profiles attackers and maintains a historical record of all detected attackers.
Page 77
How do I Investigate Suspicious Offense To view additional low-level category information for the Suspicious Activity Step 3 category, click the arrow icon next to Suspicious Activity. Double-click any low-level category to view the list of associated offenses. Step 4 The list of offenses appear.
Page 78
USPICIOUS CTIVITY FFENSES View the Description field and determine the suspicious activity associated with Step 6 this offense. This may include multiple types of activity. View the Attacker Summary box to understand the attacker: Step 7 Location - Allows you to determine if the attacker is local or remote: •...
How do I Tune a Suspicious Offenses? If this offense includes local targets, the Top 5 Local Targets box appears. This box Step 9 displays the top 5 destination IP addresses associated with this offense. Targets are rated based on their overall magnitude, which takes into consideration the severity of the overall offense, if the target is vulnerable, or if the asset has been assigned a high weight value (indicating that this is a critical business asset).
Page 80
USPICIOUS CTIVITY FFENSES In the List of Event Categories, double-click the related category to display Step 2 associated events. Select the event that includes the known source IP address that is reported to Step 3 produce suspicious activity. Click False Positive. Step 4 The False Positive window appears with information derived from the selected event.
Page 81
How do I Tune a Suspicious Offenses? STRM will no longer create additional offense for this source IP address when this type of activity occurs. Category Offense Investigation Guide...
YSTEM FFENSES This chapter provides information on system offenses including: What is a System Offense? • How do I Investigate a System Offense? • • How do I Tune a System Offense? What is a System An important component of a network security solution is monitoring the health Offense? status of the hosts and connected devices.
Page 84
YSTEM FFENSES To view additional low-level category information for the System category, click the Step 3 arrow icon next to System. Double-click any low-level category to view the list of associated offenses. Step 4 The list of offenses appear. Double-click the offense you wish to view. Step 5 The details panel appears.
Page 85
How do I Investigate a System Offense? View the Attacker Summary box to understand the attacker: Step 6 • Location - Allows you to determine if the attacker is local or remote: - Local - This field specifies the network (group) in which it is located. - Remote - This field specifies the geographic location of the attacker, for example, Asia.
YSTEM FFENSES Once you determine the root cause of the error, notify the proper administrators to Step 8 rectify the situation. If you have determined this behavior is normal, you can tune STRM to no longer detect this activity. For more information, see How do I Tune a System Offense?.
How Can I Verify That STRM is Receiving Valid Offenses? STRM will no longer create additional offense for this source IP address when this type of activity occurs. How Can I Verify By default, STRM generates system offenses as a result of multiple system errors That STRM is occurring within a specified time frame on the same host.
Page 88
YSTEM FFENSES In the Rule box, click the number that appears in the more than 10 times Step 5 statement. In the Enter a rule count field, enter the number that meets the needs of your Step 6 network. In the Rule box, click the number that appears in the within 3 minutes statement. Step 7 Edit the time frame, as necessary Step 8...
EFINED FFENSES This chapter provides information on user defined offenses including: What is a User Defined Offense? • How do I Investigate a User Defined Offense? • • How do I Tune a User Defined Offense? What is a User You can use many different tools, techniques, and strategies to protect your Defined Offense? network.
Page 90
EFINED FFENSES To view additional low-level category information for the User Defined category, Step 3 click the arrow icon next to User Defined. Double-click any low-level category to view the list of associated offenses. Step 4 The list of offenses appear. Double-click the offense you wish to view.
Page 91
How do I Investigate a User Defined Offense? To investigate the attacker, view the Attacker Summary box: Step 6 Location - Allows you to determine if the attacker is local or remote: • - Local - This field specifies the network (group) in which it is located. - Remote - This field specifies the geographic location of the attacker, for example, Asia.
EFINED FFENSES Once you have determined the impact of the offense, you must perform the Step 8 necessary steps to rectify the source of the activity. If you have determined this behavior is normal, you can tune STRM to no longer detect this activity. For more information, see How do I Tune a User Defined Offense?.
Page 93
How do I Tune a User Defined Offense? Use the available rules and building blocks to create the required logic necessary Step 3 to generate the offense. Click Next. Step 4 The Rules Response Window appears. Step 5 Select the Dispatch New Events check box. Step 6 Additional optional appears.
Page 94
EFINED FFENSES Complete the rules wizard. Step 9 For more information on using the Custom Rules Wizard, see the STRM Administration Guide. Offense Category Investigation Guide...
Need help?
Do you have a question about the SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1 and is the answer not in the manual?
Questions and answers