Product Guide: Prevention: Avoiding Threats Flashcards

1
Q

What does Access Protection do?

A

Compares an action being requested against a list of configured rules. Each rule can be configured to block or report, or block and report access violations when they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is Access Protection helpful?

A
  • prevents unwanted changes to computer by restricting access to specified ports, files, shares, registry keys, and registry values.
  • Also protects McAfee processes by preventing users from stopping them (this protection is critical before and during outbreaks)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: The on-access scanner, which detects access violations, must be enabled to detect attempts to access ports, files, shares, and registry keys and registry values.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the most common ways that threats gain access to your system?

A

Macros – As part of word processing documents and spreadsheet applications

Executable files – Seemingly benign programs can include viruses along with the expected program. For example, some common file extensions are .exe, .com, .vbs, .bat, .hlp and .dll

Email – Jokes, games, and images as part of email messages with attachments.

Scripts – Associated with web pages and emails, scripts such as ActiveX and JavaScript,

If allowed to run, can include viruses.

Internet Relay Chat (IRC) messages - Files sent along with these messages can easily contain malware as part of the message. For example, automatic startup processes can contain worms and trojan threats.

Browser and application help files – Downloading these HELP files exposes the system to embedded viruses and

Combinations of all these - Sophisticated malware creators combine all of these delivery methods and even embed one piece of malware within another to try and access your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the basic process VSE uses when providing Access Protection?

A
  1. A user or process tries to take an action.
  2. That action is examined by Access protection according to the defined rules.
  3. When a rule is broken, the action requested by the user or process is managed using the information in the rules configured. For example, the action causes nothing to happen, it is blocked, or it is blocked a report is sent.
  4. The Access protection log file is updated, and an event is generated for the ePO Global admin.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does setting a password for the VSE client interface affect users?

A
  • NON-Admins – non admins run all VSE applications in read only mode. They can view some configuration parameters, run saved scans, and run immediate scans and updates. They cannot change any configuration parameters, create, delete, or modify saved scan or update tasks.
  • Administrators – Administrators must type the password to access the protected tabs and controls in read/write mode. If a password is not provided for a protected item, they view it in read only mode.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different kind of Access Protection rules?

A

Anti Virus

-Rules protecting your computer from common behaviors of malware threats. You can enable, disable, and change the configuration, but you can’t delete these rules

Common

  • These preconfigured rules prevent modification of commonly used files and settings
  • Enable, disable, change configuration, but cannot delete

VM protection

These preconfigured rules prevent termination of VMWare processes and modification of VMWare files.
-enable, disable, and change configuration, but cannot delete

User-defined

-These custom rules supplement the protection provided by the Anti-Virus and Common rules

Anti-spyware

Examples:

  • Prevent Internet explorer favorites and settings
  • Prevent programs from running and execution of scripts from the Temp folder
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the different Access Protection Levels

A
  • Standard: Anti-virus and common rules that protect some critical settings and files from being modified, but generally allow you to install and execute legitimate software
  • Maximum: Anti-Virus and common rules that protect most critical settings and files from being modified. This level provides more protection than standard, but might prevent you from installing legitimate software. If you cannot install software, we recommend that you disable the Access Protection feature first, then enable it again after installation
  • Outbreak Control: Anti-Virus that block destructive code from accessing the computer until a DAT file is released. These rules are preconfigured to block access to shares during an outbreak
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does VSE respond to an Access Point Violation

A

When an access point violation occurs:

  • Information is recorded in the log file, if you selected the Report option for the rule that detected the violation.
  • The event is recorded in the local event log and to SNMP, if you configured Alert Properties to do so.
  • The event is reported to Alert Manager and ePolicy Orchestrator, if those products are configured to do so.
  • A Block and Report action for a rule determine what happens when a rule detects a violation.
  • On the standalone client system, a red frame surrounds the system tray icon and remains visible for 30 minutes, unless you reset it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the Types of User-Defined Rules

A

Port Blocking Rule:

-Blocks incoming or outgoing network traffic on specific ports or ranges of ports

Note: When you block a port, TCP and UDP accesses are blocked

Note: When you block a port any protocol using that port or range of ports is blocked. For example, TCP and UDP accesses are blocked

File/Folder Blocking Rule

-Blocks write access to files and folders, file execution, plus new file creation and file deletion

Note: Once you restrict access to a file or folder, the restriction remains in place until the administrator removes it. This helps prevent intrusions and stops them from spreading during an outbreak

Registry Blocking rule

-Protects registry keys or values by blocking these actions: write to, create, or delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Buffer Overflow Attack?

A

-Attackers use buffer overflow exploits to run executable code by overflowing the fixed-size memory buffers reserved for an input process. This code lets the attacker take over the target computer or compromise its data

There are Heap Based Attacks, which are rare and difficult to execute, and Stack Based Attacks, which are more common

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the process of a Stack Based Overflow attack?

A

1 Normal stack memory process — The fixed-size stack memory object is usually empty and waiting for user input. When a program receives input from the user, such as their name, the data is stored on top of the stack and assigned a return memory address. When the stack is processed, the user’s input is sent to the return address specified by the program.

2 Overflowing the stack — When the program is written, a specific amount of memory space is reserved for the data. The stack overflows if the data written is larger than the space reserved for it within the memory stack. This is only a problem when combined with malicious input.

3 Exploiting the overflow — If the program is waiting for a user to enter their name, but the attacker enters an executable command that exceeds the stack size, that command is saved outside of the reserved space.

4 Running the malicious code — The command is not automatically run just because it exceeds the stack buffer space. But it could be if a return address that points to the malicious command is provided by the attacker. Initially the program starts to crash because of the buffer overflow, but the program tries to recover by using the return address provided by the attacker. If the return address is a valid address, the malicious command is executed.

5 Exploiting the permissions — Since programs usually run either in kernel mode or with permissions inherited from a service account, the malicious code is now running with the same permissions as the application that was compromised. This could mean the attacker can gain full control of the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does VSE Buffer Overflow Protection work?

A
  • BOP prevents exploited buffer overflows from executing arbitrary code on your computer. It monitors user-mode API calls and recognizes when they are called as a result of a buffer overflow
  • When a detection occurs, information is recorded in the activity log and displayed in the On Access Scan Messages dialog box, if you configured those options to do so.
  • VSE uses a Buffer overflow and Access protection DAT file to protect approximately 30 applications, for example, Internet Explorer, Microsoft Outlook, Outlook Express, Microsoft Word, and MSN Messenger
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Potentially Unwanted Programs?

A

PUP are defined ad software programs written by legitimate companies that can alter the security state, or the privacy policy of the computer on which they are installed. This software can, but does not necessarily, include spyware, adware, and dialers. These embedded PUPs can be downloaded with a program that you actually want. Security-minded users recognize such programs and, in some cases, remove them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is Potentially Unwanted Program protection configured in VSE?

A

Configuration is a two step process:

Configure Unwanted programs policy to define which potentially unwanted programs to detect and exclude

Select categories of programs or specific programs within a category from a predefined list which comes form the current DAT file.

Specify exclusions.

Create a list of user defined programs to detect.

2. Enable unwanted program detection in the on-access, email, and on demand scanners, then configure which actions to take when an unwanted program is detected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What comprises DAT files?

A

Known threat information, called signatures, are added to DAT files.

DATs also include how to clean and counteract the damage created by the detected virus

17
Q

How are DATs used in scans?

A

When the scanning engine searches through files looking for threats, it compares the contents of the scanned files to known threat information stored in the DAT files.

If the signature of a certain virus is not contained in any of the DAT files you have installed, that virus will not be detected by the scanning engine. Also, the scanning engine must be the latest version to be able to fully utilize the latest DAT files.

18
Q

Why is important to have an update strategy?

A

Without the latest DAT files and scanning engine installed on your system, it is not fully protected from the latest viruses

There has been an unprecedented rise in the number, propagation rate, and prevalence of new malware.

Growing amount of adware and spyware requires more consistent and available detection and removal

19
Q

T/F: You can rollback DAT files to an older, backed up version if there is a problem with the current one, such as corruption or incompatibility

A

True

20
Q

What is an important reason to specify the correct Scan Exclusions in VSE?

A

because the scanners could scan and lock a file when that file is being used by a database or server. This could cause the database or server to fail or generate errors