Terms Flashcards

1
Q

Plugins

A

software packages that can easily be integrated and expand the functionality of CounterACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is information from plugins used for?

A

– Creating polices which enable Actions and Reports
– Displaying Information Panel data
– Triggering Threat Protection events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Plugin updates

A

CounterAct will check automatically if new updates are availble for your plugins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are default plugins?

A
  • User Directory
  • Switch
  • Macintosh/Linux
  • Host Property Scanner (HPS)
  • NBT Scanner
  • Syslog
  • DNS Client
  • Reports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Default plugin: User Directory

A

Resolves user details via a User Directory
server such as Microsoft Active Directory or any
other LDAP-based directory server such as
SUN or Novell via LDAP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Default plugin: Switch

A

Allows CounterACT to display information about
hosts connected to specific switch ports
including information about the switch and
ports. Required for blocking network access via
ACL/VLAN or port assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Default plugin: Macintosh/Linux

A

Enables deep inspection of Macintosh/Linux

endpoints via SSH or SecureConnector access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Default plugin: Host Property

Scanner (HPS)

A

Enables all of the windows endpoints operation
including vulnerability scanning, remediation
actions and windows host polling. Responsible
for organization operating system classification
using built-in components. Also contains
SecureConnector code and operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Default plugin: NBT Scanner

A

Attempts to obtain the username, MAC,
hostname and domain name that is logged onto
a given host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Default plugin: Syslog

A

Lets you forward, receive and format event

messages to/from an external Syslog server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Default plugin: DNS Client

A

Allows CounterACT perform DNS lookups to

resolve host names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Default plugin: Reports

A

Gathers information from CounterACT and
populates the reports, assets and dashboard
portals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CounterAct Channels

A

A channel defines a pair of interfaces used by CounterACT to monitor and protect your network

** It is critical that the proper channel connection and definitions are configured correctly **

There are three interfaces:

  • Monitor interface
  • Response interface
  • Management Interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Monitor interface

A
Lets the Appliance monitor
and track network traffic.
Traffic is mirrored to a port
on the switch or via a
network tap and monitored
by the Appliance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Response interface

A
– The Appliance responds to
traffic using this interface.
Response traffic protects
against malicious activity
and performs policy actions.
– In a Layer 3 Deployment,
the response interface is set
to “IP Layer”. In this case,
the management interface is
used for response.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Management Interface

A
Manages CounterACT and
performs queries and deep
inspection of endpoints. The
interface must be connected
to a switch port with access
to all network endpoints.
17
Q

What are policies composed of?

A
  • a unique name
  • policy scope
  • policy conditions
  • policy actions
18
Q

What is a group?

A
A collection of hosts with something in common, such as hosts that run Windows systems, or guest hosts.
Groups help you:
– View and manage
CounterACT detections
– Logically track policy
implementation
19
Q

What are segments?

A

• Segments are used to organize your network endpoints into logical categories.

• Helpful for filtering hosts
–Specific for a network range(s)
–Quantify how many hosts exists in a specific segment

• Can create a segment
for an single IP or a
range of IP addresses

20
Q

What is an organizational unit?

A
  • It reflects one or more CounterACT segments that have something in common.
  • It is used for reporting: In the executive dashboard the Compliance Trend are sorted by organizational units
21
Q

Where does CounterAct sit?

A

– At the connection point between a protected network area and the rest of the network.
– Behind a VPN concentrator, where encrypted VPN channels are decrypted and malicious traffic enters your network
– Behind remote access servers, where remote access users are entering your network

22
Q

What is CounterAct Appliance Packet Engine?

How does it work?

A

• To provide Intra-VLAN threat protection, the Appliance setup must have:
– A Layer 2 channel within broadcast domains (tagged packets in
the mirroring ports)

• To work with the Virtual Firewall, the Appliance must:
– Have channel visibility into traffic that will be controlled using the Virtual Firewall action

• To utilize HTTP notification and re-direction the ppliance must:
– See bi-directional traffic on the Channel, Asymmetric traffic will not work
– Be allowed to inject packets into the network, network layer antispoofing controls may need to be adjusted

23
Q

What is SecureConnector?

A

SecureConnector is a lightweight, small-footprint
executable that runs at the endpoint so that CounterACT
can inspect it.
– SecureConnector opens an encrypted tunnel to
CounterACT allowing it to remotely inspect it.
 Via TCP/10003 for Windows
 Via TCP/2200 for MAC/Linux
 Ports can be modified
– Used for endpoint inspection of unmanageable hosts
 Useful for rapidly enhancing the versatility of CounterACT
endpoint actions

24
Q

How does CounterAct maintain fault tolerance?

A

• Uses clusterin g to integrate two or more Appliances
(nodes) into a logical unit
– Active node: Controls the cluster and provides communication with the external world
– Standby node: Constantly ready to take over in case of failure of Active node
• Cluster Connectivity
– Each cluster has a VIP address used for communication with the network
– Appliances within a cluster are inter-connected by
synchronization cables
• Switch Connectivity
– Connections are for dual
management, span(monitoring) and response
– Dual Span
 Connection to a single switch using dual span sessions
– Single Span
 Connection to a single switch
using Single Span sessions, requires a TAP

25
Q

Monitor Interface (detailed)

A

Traffic is morrored to a port on the switch and monitored by the appliance. The user of 802.1q vlan tagging depend upon the number of vlans being monitored

  • single vlan: when monitored traffic is generated from a single vlan, the mirrored traffic does not need to be vlan tagged
  • multiple vlans: if monitored traffic is from more than one vlan, the mirrored traffic must be 802.1q vlan tagged

! When 2 switches are connected as a redundant pair, the appliances must monitor traffic from both.
! No IP address is requred on the monitor interface

26
Q

Response Interface (detailed)

A

Used for protecting agains malicious activity and perform policy actions, web browser redirecting, session blocking etc.
Switch port configuration depends on traffic being monitored
- single vlan: when monitored traffic is generated from a single vlan, the response port must belong to the same vlan. in this case the appliance requires a single IP address on that vlan
- multiple vlans: if monitored traffic is from more than one VLan, the response port must also be configured with 802.1q vlan tagging for the same vlans. the appliances requires an ip address for each monitored vlan.

27
Q

Management Interface (detailed)

A
  • For queries and deep inspection of endpoints.
  • must be connected to switchport with access to all endpoints (core switch)
  • each appliance must have a single management connection to the netork
  • requires an IP address on local LAN and port 13000/TCP access from machines that will be running the CounerACT console management application. Management port must have access to additional network devices.