Infinity NDR Sensors

Overview

How Infinity NDRClosed Network Detection and Response works: A network sensor extracts log fields from the network traffic to create a record with these and other fields:

  • Source and destination

  • IPClosed Internet Protocol addresses

  • Ports

  • Quantity of data transferred

  • URLs

  • Application categorization

  • Risk categorization

  • User identity

In return, Infinity NDR delivers threat indicators to the sensor.

Supported sensor types include Check Point Security Gateways (Quantum, CloudGuard, and Quantum Spark), and Check Point Harmony Endpoint. In addition, the sensor can deliver threat indicators to 3rd party devices.

If the sensors are managed by NDR, they are managed from a Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. hosted by the Infinity NDR Indicator Management application. This means that you do not need to install a Management Server, SmartEvent, SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. or provision policy.

A non NDR-Managed sensor sends its logs to a Management Server or Log ServerClosed Dedicated Check Point server that runs Check Point software to store and process logs., and Check Point Log Exporter forward the logs to Infinity NDR to process. In addition, you must configure the sensor separately to subscribe to Infinity NDR Intel feeds.

Check Point Quantum NDR Sensors

You can easily convert any Check Point Quantum Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. appliance into an NDR-Managed Infinity NDR Sensor. The appliance's control layer is then slaved to the Infinity NDR application, and all control layer communications, with policy, logs, ThreatCloud queries, NTP, DNS, etc. are tunnelled over a mutually-authenticated SSLClosed Security Socket Layer VPN tunnel to the Infinity NDR cloud. Traffic inspection is done through Monitor Mode interfaces attached to switch mirror ports. In addition, inline environment (Bridge ModeClosed Security Gateway or Virtual System that works as a Layer 2 bridge device for easy deployment in an existing topology.) is supported - with fail-open network interfaces.

In NDR mode, the appliance applies Check Point's real-time advanced SNBT threat detection engines on the mirrored network traffic, with:

NDR sends analytical conclusions as log records to the Infinity NDR back end for more analysis.

Check Point CloudGuard NDR Sensors

You can apply the same NDR mode conversion process you use for Quantum NDR sensors (as described in Preparing an Infinity NDR Sensor on CloudGuard and Open ServerClosed Physical computer manufactured and distributed by a company, other than Check Point. GaiaClosed Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. installations. There are some differences in interface names and license, but the SNBT functionality is the same on these sensors. A major difference is how virtualization specifically impacts the data layer attachment:

  • Fail-open interfaces are unavailable - Therefore, the inline environment is not supported, only Monitor Mode.

  • CloudGuard for VMware ESX deployments operate similar to physical appliances, through mirroring.

  • The Infinity NDR application automatically provisions CloudGuard for AWSClosed Amazon® Web Services. Public cloud platform that offers global compute, storage, database, application and other cloud services., with AWS Lambda serverless computing to manage cloud-native traffic mirroring APIs. The CloudGuard Network Security instance is deployed out of band for its Compute capabilities, with no effect on business traffic.

  • CloudGuard for GCP operates similarly to AWS, but mirroring is currently manually provisioned.

  • As an alternative for all environments, you can deploy a CloudGuard Network Security instance, and convert it into NDR mode. You can provision traffic mirroring on a separate computer or appliance (for example, Check Point CloudGuard Network Security configured with a Mirror and Decrypt policy) on VXLAN.

Log Server Registration

If you have a Check Point Management Server or Log Server that collects logs from Check Point Security Gateways or Check Point Harmony Endpoint, or both, you can export the logs to Infinity NDR Indicator Management for NDR visualizations and analysis, as detailed inInfinity NDR Log Server Registration.

The server is considered non NDR-Managed.