Overview Flashcards

1
Q

How do we gain visibility?

A
• SNMP / CLI Integration L2/L3 Switches
• SPAN/TAP/Mirror Traffic
• Classification
– NMAP
– DHCP
– p0f
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Guest Networking

A

How do we register guests?
• Captive Portal
– HTTP 302 Redirect
– DNS Enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can we manage mobile devices?

A
  • HTTP 302 Redirection
  • 3rd Party MDM Integration
  • ForeScout MSM Integration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do we check endpoint compliance?

A
  • Agentless communication over RPC
  • Checks local services, files, and processes.
  • Policy Engine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do we detect?

A
  • Patented Bait/Bite technology
  • Offer Pseudo network information
  • Monitor for response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Passive Monitoring (with active login/query)

A

Passive Monitoring

  • Network switches (and active login option): via SNMP and SSH
  • Active Directory/LDAP Server: Active query
  • Desktops and laptops (and active login): via domain and/or local credentials
  • Desktops and laptops : Secure Connector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the properties to classify Network Assets

A
  • OS Class
  • Open ports
  • Network Functions
  • Traffic events
  • Service Banners: Banners usually contain information about a service, such as the version number. Banner grabbing is a process to collect details regarding any remote PC on a network and the services running on its open ports.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you clarify network assets by gathering and organizing additional information about each type of classified host

A

– Separate known corporate assets from guests
and unknown devices
– Group managed systems to be passed on to for
compliance evaluation
– Identify unmanaged machines that need
maintenance
– Identify unknown and guest machines and pass
them to appropriate controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you measure asset Compliance with ForeScout?

A
Report on:
– Anti Virus
– Open Port(s)
– Process/Services Running
– Peer-to-Peer
– Instant Messenger
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you Control assets?

A
• Perform actions on hosts:
– Alert
– Disable
– Restrict (access to assets): 
>Disable USB devices
> Kill instant messenger
> Kill a process
> Set registry key
> Start/Update Anti-Virus
> HTTP Redirect
> Desktop command to
browser
> Virtual Firewall
> Switch enforcement
> VPN enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CounterAct Visibility

A
Network Assets
– Desktop and servers
 Windows
 Apple
 Linux
– Including virtual assets
Network devices
 Including most major
network vendors
 Cisco, Juniper,
Foundry, HP, Dell
Peripheral devices
 Printers/Copiers
 IP Phones
 Projectors
 Polycoms
 Video Cameras
 Anything with an IP
address
Mobile devices
 iPhones
 iPads
 Android devices
 Blackberry
Inside IT Infrastructure
- Active Directory or any LDAP
– Users
– Connected devices
 USB Hard drives
 USB sticks
 iPod
 Most other USB
connected devices
- Installed Programs: instant messenger, anti virus, peer-to-peer, any type of services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CounterAct Control

> Virtual Firewall

A
– TCP reset injected into
switch to close
connection
– TCP Reset sent to Target
during 3-Way
Handshake
– “ICMP Unreachable”
sent for UDP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CounterAct Control
>HTTP Redirect
> Desktop command to browser

A
1. HTTP Redirect
– Redirects User-generated
HTTP Query
– CounterACT injects HTTP
Redirect
2. Desktop command to browser
– Opens browser
immediately
– Works on managed
devices
 Domain member
 SecureConnector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CounterAct Control
>HTTP Redirect
> Desktop command to browser

A
1. HTTP Redirect
– Redirects User-generated
HTTP Query
– CounterACT injects HTTP
Redirect
2. Desktop command to browser
– Opens browser
immediately
– Works on managed
devices
 Domain member
 SecureConnector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CounterAct Control

> Switch enforcement

A
– VLAN Enforcement
 Sends SNMP
command to switch
 Moves asset to
protected VLAN
 Uses SNMP v1, v2 or
v3
– Port Disable
 Disables port
 Occasional MAC recheck
 Follows device when
moved
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CounterAct Control

> VPN enforcement

A
– CounterACT acts as
RADIUS proxy.
 Correlates IP address
with user.
 Authentication deny.
– SNMP to VPN
Concentrator
 Drop user
 Message to user