Cisco Email Security Flashcards
Learn primary technologies.
SenderBase Reputation Filters
SenderBase scores are assigned to IP addresses based on a combination of factors, including email volume and reputation.
Reputation scores in SenderBase may range from -10 to +10, reflecting the likelihood that a sending IP address is trying to send spam. Highly negative scores indicate senders who are very likely to be sending spam; highly positive scores indicate senders who are unlikely to be sending spam.
SenderBase is designed to help email administrators better manage incoming email streams by providing objective data about the identity of senders. SenderBase is akin to a credit reporting service for email, providing data that ISPs and companies can use to differentiate legitimate senders from spam sources. SenderBase provides objective data that allows email administrators to reliably identify and block IP addresses originating unsolicited commercial email (UCE) or to verify the authenticity of legitimate incoming email from business partners, customers or any other important source. What makes SenderBase unique is that it provides a global view of email message volume and organizes the data in a way that it is easy to identify and group related sources of email. SenderBase combines multiple sources of information to determine a “reputation score” for any IP address. This information includes:
Email volume information provided by tens of thousands of organizations that regularly receive Internet email
Spam complaints received by the SpamCop service
Information on other DNS-based blacklists
ESA
Email Security Appliance
CSM
Cisco Security Manager.
Anti-Spam
- False Positive rate of less than 1 in 1,000,000.
- Uses CASE.
- Industry Leading Accuracy.
CASE
Context Adaptive Scanning Engine.
Uses Complete Context of the Message.
1. Message content.
2. Message construction.
3. Sender
4. Where does the call to action take you.
This adds up to industry-leading accuracy.
Forged Email Detection
Protects against BEC attacks focused on executives. Provides detailed logs of all attempts and actions taken.
BEC
Business Email Compromise
Benefits of Global Threat Intelligence (TALOS)
Uses TALOS that combines data from below sources and changes the rules in CES every 3 to 5 minutes.
- 600 billion emails per day.
- 16 billion web requests per day.
- 1.5 million malware samples.
CDP
Cisco Domain Protection
1. Automates the process of implementing DMARC.
Graymail Detection and Safe Unsubscribe
- Precisely classifies and monitors graymail coming in.
- Safe Unsubscribe protects from threats masquerading as unsubscribe links.
- Uniform interface for managing all subscriptions.
Graymail
Marketing
Social Networking
Bulk Messages
AMP
Advanced Malware Protection.
AMP and Cisco Threat Grid
- File reputation scoring and blocking.
- Sandboxing
- File Retrospection
- Mailbox auto-remediation
- Integrates with AMP for endpoints to correlate files, telemetry data, behavior and activity to proactively defend against advanced threats from all possible vectors.
File retrospection
Being able to see what has happened with a file and
SPF
Sender Policy Framework
DKIM
Domain Keys Identified Mail
How does DKIM publish keys?
Through DNS
What is DKIM in a nutshell for sender?
- You generate a keypair.
- Public key is published in DNS as a txt record.
- Private key is stored on all outgoing mail gateways.
- As message is sent out, it is cannonicalized then signed.
- Signature is inserted in header call DKIM SIGNATURE.
- Message is sent out.
Cannonicalized
Modified for easier signing.
What is DKIM in a nutshell for receiver?
- Receive message.
- Parse DKIM signature header.
- Fetch public key.
- Verify hash for body and hash for header.
- Determine what to do with message if it fails.
What are the 9 parts of the DKIM-Signature Header
- DKIM-Signature: Header field name.
- v=1 Version: DKIM Version
- a=rsa-sha256: Algorythm used for Signing and Hashing
- c=relaxed/simple: Canonicalization Scheme
- d=ietf.org: Who is signing the message, doesn’t have to match sending domain, anyone can sign a message.
- s=ietf1: Selector, for multiple versions of a key
- h=To:From:Date:Subject:List-ID:List-Unsubscribe:List-Archive:List-Post:List-Hellp:List-Subscribe: THIS OF HEADERS THAT ARE SIGNED
- bh=+Imgidla2peicjdls5jfi?jfiJDi:9fis: HEADER HASH
- b=DmDxUUN1XBQDUFb930490VjkdQjfolij9d09f0s…: BODY HASH
Sender Group
Contains list of sender ip addresses or domains.
Mail Flow Policy
Tells sender group what to do with connection.
CASE non-final action
Allows message to continue to process down the workqueue.
CASE “early exit”
Final action of “drop” will exit immediately and not continue on down the workqueue.
What are the 3 types of spoofing attacks?
- Simple Spoof
- Cousin Domain / Typo Squatting
- Display Name Modification
Simple Spoof
Who are they spoofing?:External Parties
Target:Your Users
Description:Attacker attempts to change or manipulate the envelope from in the headers of an email, or change the reply-to to redirect email.
Cousin Domain / Typo Squatting
Who are they spoofing?:Your Brand
Target:Your Customers
Description:Relies on minor changes to the suffix and/or prefix of your domain. They register a domain that is very close to yours and then using various techniques to get past controls.
Display Name Modification
AKA (Business Email Compromise or BEC):
- Using legitimate domains that are either hijacked or created.
- Manipulate message headers to show:
a. An accurate display name.
b. Cousin Domain / Typo in the email address - Most common attack with a high success rate.
CES Disclaimers and Action Variables
We can display a message that says WARNING: Replies to this message will go to $EnvelopeFrom. If you are unsure this is correct please contact the helpdesk.
We can set this policy to not apply to messages from trusted senders that we do want to spoof.
Define the 6 parts of a DMARC record.
- _dmarc.cinbell.com: TXT Record for cinbell.com
- v=DMARC1: DMARC version
- p=quarantine: p tag, Action to take on auth failure.
- pct=100: Percentage of messages to apply policy to.
- rua=mailto:dmarc-rua@cinbell.com: Aggregate Feedback report URI
- ruf=mailto:dmarc-ruf@cinbell.com: Forensic Feedback report URI.
What 3 technologies does CASE use?
- IronPort Anti-Spam
- Graymail Detection
- Threat Outbreak Filter