Enterasys-networks 9034385 Manual de usuario Pagina 82

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 98
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 81
Assessment Design Procedures
5-18 Design Procedures
2. Determine Assessment Server Location
Whendeterminingthelocationoftheassessmentserversonthenetwork,thefollowingfactors
shouldbeconsidered:
•Thetypeofassessment:agentlessoragentbased.
Agentlessassessmentconsumesmorebandwidththanagentbasedassessmentduringthe
scanofanendsystem.However,itisimportanttounderstandthattheamount
ofbandwidth
consumedbyagentlessassessmentshouldonlybeconsideredwhenalargenumberofend
systemsarebeingassessedoveraseverelybandwidthrestrictedlink.Forexample,if1000
endsystemsareconnectedtoabranchofficeovera512Kbpsconnectionthatisalsocarrying
latencysensitive
VoIPandotherrealtimeapplications,itisrecommendedtopositionan
assessmentserveratthebranchofficetoexecuteassessmentforconnectingdevicesandavoid
congestiononthebandwidthrestrictedlink.
•EndsystemconfigurationfortheassociatedSecurityDomain.
Ifagentlessassessmentisimplementedandconnectingendsystemsare
runningpersonal
firewalls,theassessmentserverlocationmayberelevanttotheeffectivenessofthe
assessments.Forexample,MicrosoftXPSP2isenabledbydefaultwithapersonalfirewallthat
deniesallunsolicitedinboundconnectionattempts.Therefore,aMicrosoftXPSP2personal
firewallwillpreventthesuccessfulexecutionofanend
systemassessmentunlessthefirewall
isconfiguredtoallowspecifictypesofunsolicitedinboundconnections,suchasfromspecific
IPaddressesoroverspecificprotocolsasdefinedintheExceptionslist.Thismaybe
configuredbytheenduserviawebbasedremediationorthroughaWindowsdomain
controllergroup
policydefinition.
3. Identify Assessment Server Configuration
Anassessmentserverutilizesthirdpartyassessingsoftwaretoexecutescansagainstconnecting
endsystems,andthissoftwaremustbelocal ly configuredwiththesecurityassessment
parameters.Thethirdpartyassessingsoftwareonallassessmentserversbelongingtothesame
SecurityDomainmustbeconfiguredidenticallysothatconsistencyismaintained
inthe
assessmentofallconnectingendsystemswithinthatdomain.Theselectionofthevulnerabilities
assessedbytheassessmentserversisbasedsolelyontheenterprisesecuritypolicy.Herearesome
examplesofvulnerabilityassessmentconfiguration:
•Remotescansthatutilizealocallyconfiguredaccountontheendsystemcanevaluate
virtuallyanyconfigurationdetailsoftheendsystemwithintherightsoftheaccount.Foran
administrativeaccount,anyendsystemparameterscanbecheckedincludingtheregistry
settingsandtherunningservices.Examplesincludethedateofantivirusdefinitionfiles,
installationofantivirussoftware,statusofantivirusprotection,installed
patches,and
personalfirewallstatusandconfigurationinformation.
•Remotescansthatdonotutilizealocallyconfiguredaccountontheendsystemcanevaluatea
morelimitedsetofvulnerabilitiesthroughtheassessmentofremotelyaccessibleserviceson
theendsystem.ExamplesincludeOSspecificvulnerabilitiesaccessedthroughopenTCP/
UDPports
andvulnerabilitiesofremotelyaccessibleservicesrunningontheendsystem(FTP
server,HTTPserver).
TheSANSTop20securityvulnerabilitiesprovideasuggestedbaseguidelineconfigurationfor
enterprisesinitiallydeployingNACwithendsystemassessment(http://www.sans.org/top20/).
Thirdpartyassessingsoftwareregularlyreleasesupdatestoassessnewlyidentifiedsecurity
vulnerabilities.Asubscriptiontosuchaserviceisrecommendedtomaintainanuptodate
assessmentengineonthenetwork.Newvulnerabilitiesonlyneedtobeincludedintheassessment
Vista de pagina 81
1 2 ... 77 78 79 80 81 82 83 84 85 86 87 ... 97 98

Comentarios a estos manuales

Sin comentarios