Threat Prevention Policies
Anti-Bot and Anti-Virus
Protecting Networks from Bots
A bot is malicious software that can infect your computer. There are many infection methods, for example:
- Opening attachments that exploit a vulnerability
- Accessing a web site that results in a malicious download
When a bot infects a computer, it:
- Takes control of the computer and neutralizes its Anti-Virus defenses. It is not easy to find bots on your computer, they hide and change how they look to Anti-Virus software.
- Connects to a C&C (Command and Control center) for instructions from cyber criminals. The cyber criminals, or bot herders, can remotely control it and instruct it to do illegal activities without your knowledge. Your computer can do one or more of these activities:
- Steal data (personal, financial, intellectual property, organizational)
- Send spam
- Attack resources (Denial of Service Attacks)
- Consume network bandwidth and reduce productivity
One bot can often create multiple threats. Bots are frequently used as part of Advanced Persistent Threats (APTs) where cyber criminals try to damage individuals or organizations. A botnet is a collection of compromised and infected computers.
The Anti-Bot Software Blade detects and prevents these bot and botnet threats. For more about using the Anti-Bot Software Blade, see the R77 Threat Prevention Administration Guide.
Identifying Bot Infected Computers
The Anti-Bot Software Blade uses these procedures to identify bot infected computers:
- Identify the C&C addresses used by criminals to control bots
These web sites are constantly changing and new sites are added on an hourly basis. Bots can attempt to connect to thousands of potentially dangerous sites. It is a challenge to know which sites are legitimate and which are not.
- Identify the communication patterns used by each botnet family
These communication fingerprints are different for each family and can be used to identify a botnet family. Research is done for each botnet family to identify the unique language that it uses. There are thousands of existing different botnet families and new ones are constantly emerging.
- Identify bot behavior
Identify specified actions for a bot such as, when the computer sends spam or participates in DoS attacks.
Check Point uses the ThreatSpect engine and ThreatCloud repository to find bots based on these procedures.
Protecting Networks from Viruses
The Anti-Virus Software Blade inspects connections to the Internet and scans file transfers and downloads to the internal network to find and prevent malware attacks. It also gives pre-infection protection from external malware and malicious servers.
ThreatSpect engine and ThreatCloud repository
The ThreatSpect engine is a unique multi-tiered engine that analyzes network traffic and correlates information across multiple layers to find bots and other malware. It combines information on remote operator hideouts, unique botnet traffic patterns and behavior to identify thousands of different botnet families and outbreak types.
The ThreatCloud repository contains more than 250 million addresses that were analyzed for bot discovery and more than 2,000 different botnet communication patterns. The ThreatSpect engine uses this information to classify bots and viruses.
The Security Gateway gets automatic binary signature and reputation updates from the ThreatCloud repository. It can query the cloud for new, unclassified IP/URL/DNS resources that it finds.
The layers of the ThreatSpect engine:
- - Analyzes the reputation of URLs, IP addresses and external domains that computers in the organization access. The engine searches for known or suspicious activity, such as a C&C.
- - Detects threats by identifying unique patterns in files or in the network.
- - Detects infected machines in the organization based on analysis of outgoing mail traffic.
- - Detects unique patterns that indicate the presence of a bot. For example, how a C&C communicates with a bot-infected machine.
Learning about Malware
The Threat Wiki is an easy to use tool that lets you search and filter the ThreatCloud repository to find more information about identified malware. The Threat Wiki helps you to learn more about malware, you can:
- Filter by category, tag, or malware family
- Search for a malware
To show the Threat Wiki:
In the tab, click . The page opens.
Examining Anti-Bot and Anti-Virus Protections
The browser shows information about the Anti-Bot and Anti-Virus protections.
To show the Protections browser:
In the tab, click . The lower pane shows a detailed description of the protection type.
Column
|
Description
|
Protection
|
Name of the protection type.
|
Blade
|
If the protection is used by the Anti-Bot or Anti-Virus Software Blade.
|
Engine
|
Layer of the ThreatSpect engine that is protecting the network.
|
Known Today
|
Number of known protections.
|
Performance Impact
|
Impact on the performance of a Security Gateway.
|
<Profile Name>
|
For each profile, shows the action for each protection:
- - Blocks traffic that matches the protection
- - Allows all traffic and logs traffic that matches the protection
- - Protection is disabled
Protections can have more than one action. This column shows the percentage of protections set to each action.
|
Enabling the Anti-Bot Software Blade
Enable the Anti-Bot Software Blade on a Security Gateway.
To enable the Anti-Bot Software Blade:
- In SmartDashboard, right-click the gateway object and select .
The window opens.
- In tab, select .
The window opens.
- Select one of the activation mode options:
- - Enable the Anti-Bot Software Blade and use the Anti-Bot settings of the Threat Prevention profile in the Threat Prevention policy.
- - Packets are allowed, but the traffic is logged according to the settings in the Threat Prevention Rule Base.
- Click .
- Install the Threat Prevention policy.
Anti-Bot and Anti-Virus Rule Base
There is a different Rule Base for Anti-Bot and Anti-Virus. The Anti-Bot and Anti-Virus rules use the Malware database and network objects. Security Gateways that have Identity Awareness enabled can also use Access Role objects as the in a rule. The Access Role objects let you easily make rules for individuals or different groups of users.
The first Anti-Bot or Anti-Virus rule that matches the traffic is applied. There are no implied rules in this Rule Base, all traffic is allowed unless it is explicitly blocked. A rule that is set to the action, blocks activity and communication for that malware.
When necessary, you can add an exception directly to a rule. The object in the , can have a different from the specified Anti-Bot and Anti-Virus rule. Here are some examples of exception rules:
- A profile that only detects protections. You can set one or more of the protections for a user to .
- The RnD network is included in a profile with the action. You can set that network to .
Managing the Anti-Bot and Anti-Virus Rule Base
These are the fields that manage the rules for the Anti-Bot and Anti-Virus threat prevention policy.
Field
|
Description
|
No.
|
Rule number in the Rule Base. An exception rule contains the letter and a digit that represents the exception number. For example, is the second exception for the second rule.
|
Name
|
Name that the system administrator gives this rule.
|
Protected Scope
|
Objects that are protected against bots and viruses. Traffic to and from these objects is inspected even if the objects did not open the connection.
|
Protection
|
For rules, the value for this field is always . The protections are set according the profile in the field.
For exceptions, set this field to one or more specified protections.
|
Action
|
For rules, the value for this field is an Anti-Bot and Anti-Virus profile.
For exceptions, set this field to or .
|
Track
|
Tracking and logging action that is done when traffic matches the rule.
|
Install On
|
Network objects that get this rule. The default setting is and installs the policy on all Security Gateways that have Anti-Bot and Anti-Virus enabled.
|
Sample Rule Base
This table shows a sample Anti-Bot and Anti-Virus Rule Base. (The column is not shown and is set to .)
No.
|
Name
|
Protected Scope
|
Protection
|
Action
|
Track
|
1
|
High Security
|
Finance_ server
Corporate_ internal
Corporate_ finance
|
- n/a
|
High_Security_ Profile
|
Log
Packet Capture
|
2
|
Malware Rule
|
Any
|
- n/a
|
Recommended_ Profile
|
Log
|
E-2.1
|
RnD Server
|
Server_1
|
Backdoor.Win32.Shark.A
|
Detect
|
Log
|
E-2.2
|
Users_3
|
Users_3
|
Adware.Win32.CashFiesta.A
RogueSoftware.Win32. Ackantta.A
Trojan.Win32.Agent.BA
|
Detect
|
Log
|
1. - Traffic for the Finance server and two corporate networks are inspected for bots and viruses according to the settings in the High_Security profile. The traffic is logged and the packets are captured for analysis in SmartView Tracker.
2. - All traffic in the network is inspected for bots and viruses according to the settings in the Recommend_Profile.
E-2.1 r - A global exception rule for the Server-1 object, that only detects the protection.
E-2.2 - An exception rule for the Users_3 Access Role, that only detects some protections.
Anti-Spam
Employees waste more and more time to sort through bulk emails commonly known as spam. The amount of resources (disk space, network bandwidth, CPU) devoted to handling spam also increases from year to year. In addition, unwanted emails continue to grow and can be an unexpected security threat to networks. Cyber-criminals can use emails to let viruses and malware into your network. The Anti-Spam and Mail Software Blade gives system administrators an easy and central tool to eliminate most of the spam that reaches their networks.
Enabling Anti-Spam
Use the page in the tab to enable Anti-Spam on a Security Gateway.
To enable Anti-Spam:
- In the tab, select .
- Click .
The window opens.
- Select one or more Security Gateways.
- Click .
Sample Configuration
Feature
|
Setting
|
Description
|
Content based Anti-Spam
|
|
Identifies spam based on email content
|
IP Reputation Anti-Spam
|
|
Identifies spam based on IP address database of known spammers
|
Block List Anti-Spam
|
|
Identifies spam based on domains or IP addresses that you define
|
Mail Anti-Virus
|
|
Scans and filters emails for viruses and other malware
|
Zero hour malware protection
|
|
Does not scan the Internet to identify and filter new virus email attacks
|
The feature is set to because enabling the feature has a negative effect on network performance.
|