UTM Flashcards

1
Q

What hostname is required to join the UTN to Active Directory?

A

A hostname with a DNS A record in the internal Active Directory DNS domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can a user configure Google Authenticator to generate one-time passwords for the UTM?

A

Scan the QR code in the User Portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the requirements for Active Directory in SSO transparent mode?

A
  • AD authentication service configured and working
  • UTM joined to the domain
  • Clients able to resolve the UTM’s internal address by hostname and FQDN
  • All clients joined to Active Directory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the AD SSO in transparent mode limitations?

A

uses last cached successful authentication

  • https
  • any url with a parameter
  • AJAX requests
  • Any non-browser application not using ‘Mozilla’ in the agent string
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe how to configure AD SSO transparent mode

A
  • Enable AD SSO in web proxy profile:
  • Add the UTM FQDN to the local intranet zone on the client(Windows)
  • add both hostname and FQDN
  • chrome uses the same settings as internet explorer
  • Firefox must be configured separately
  • To use Mac OS X, Kerberos authentication must be enabled on the AD Server.

See KBA 120791 for further info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe how the rules are managed in Application Control.

A
  • Create rules with one or more applications or dynamic filters
  • Block or allow traffic
  • Rules apply to one or more network definitions
  • Traffic NOT matching a rule is allowed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between web filtering profile and web filtering policy?

A

A web filtering profile determines where the user id connecting from and how they will authenticate. The web filtering policy matches a user to a filter action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can be used in an Application Control rule to selct what applications to block?

A

Application categories and productivity and risk ratings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 2 independent virus scanners?

A

Sophos and IlVira for SMTP an POP3.
Blocks malware before it reaches e-mail servers or desktops
Can specify file formats ( file extensions) and content (MIME type) to block
Emails and attachments can be dropped rejected with messages to sender, passed with a warning or quarantined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Anti- SPAM offer feature wise.

A

Reject at SMTP time, RBL’s real time blackhole lists, heuristic checksum-based spam filter, Sender blacklist, Invalid HELO / missing RDNS, Greylisting, BATV, SPF check, recipient check and expression filter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What 3 methods of encryption does the UTM use for e-mail?

A

open pgp, smime and sophos secure pdf exchange. SPX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what features does the utm provide?

A

encryption, decryption and digital signatures for SMTP e-mails, completely transparent, Easy setup, Central Management of all keys and certificates
allows content scanning for encrypte emails
Simple encryption using Sophos SPX, escure pdf exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what does Routing do with regard to mail?

A

Method of routing

  • define the email domains to accept mail for
  • specify static host names
  • specify DNS hostname and MX records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is required to e-mail out of the UTM?

A

Relaying is required for the UTM to process outbound e-mails. Becareful not to allow your UTM become blacklisted as an open relay. Do NOT select ANY as a relay!!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what 2 modes does anti-virus configuration offer?

A

dual or single engine scanning.
*optionally reject malware during transmission
*quarantine or blackhole (delete) malware
* filter content based on MIME types ,File extensions
whitelist content by MIME type.
*optional footnote

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does CCL stand for?

A

Content Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe SPX

A

Secure PDF Exchange (SPX)

  • does not require key or certificate exchange
  • 128 bit or 256 AES encryption
  • simple portal for secure reply ( supports attachments)
  • customisable templates
  • encryption password
18
Q

What is a RED Management device?

A

Its a branch office device that connects back securely to the main office. Device need router running dhcp and gateway to the internet. The network just appears in in UTM management as any other interface.

19
Q

How does an admin setup the UTM?

A

The admin configures the red on the UTM by setting up publically resolvable ip address and hostname. ( ip and netmask of remote network) and RED ID which is a 15 character string on a sticker underneath of device. The UTM sends the config to a cloud based provisioning service on the internet. The red connects via internet connected router to the provisioning server for its config.

20
Q

What connection does RED use to connect to the Main Office UTM?

A

The RED establishes a layer 2 tunnel to the UTM using tcp/udp3400, RED udp 3410

21
Q

Name the 3 Operating modes for a RED to connect.

A

Standard/Unified, Standard/Split and Transparent/Split

22
Q

What is Standard/Unified?

A

remote network is managed by the UTM, which serves as dhcp server and default gateway. All traffic is sent through the network to the UTM from the RED.

23
Q

What is standard/split mode?

A

UTM still manages network by providing dhcp and default gw. Only defined network traffic is sent from the RED to the UTM. All other traffic is sent directly to the internet.

24
Q

Name 2 versions of RED

A

RED10 and RED 50

25
Q

Red 10 attributes?

A

heavy duty steel chassis, unrestricted number of users, no lcd, data compression, no hardware accelerated encryption, 30 Mbit/s vpn throughput, 1x10/100 Wan port, 4x 10/100 lan ports, no vlans, 1 usb port, power consumption 7W.

26
Q

Red 50 Attributes?

A

heavy duty steel chassis, unrestricted number of users, lcd, data compression, hardware accelerated encryption, 360 Mbit/s vpn throughput, 2x1 Gbit Wan port, 4x Gbit lan ports, vlans, 2 usb port, power consumption 38W.

27
Q

What site to site VPN connections does the Sophos UTM support?

A

IPsec VPN, SSL VPN, Amazon VPC (Virtual Private Cloud) Tunnels.

28
Q

what steps need to be carried on both UTM’s to setup a site to site VPN configuration.

A
  1. edit / create an IPSEC policy (IKE policy and IPsec policy config , data compression)
  2. create a remote gateway ( remote gateway ip address, remote networks authentication type and VPN ID)
  3. configure the connection
  4. Configure the firewall rules.
29
Q

What is SUM?

A

Sophos UTM Manager. SUM provides events in real time . Central point where admins can get a view of their infrastructure.

30
Q

What features does SUM provide?

A
  • Real-Time Monitoring, aggregated reporting, Inventory management, device maintenance, central configuration, access management.
31
Q

What 2 ways can SUM be deployed?

A

As a software appliance or a Virtual appliance.

32
Q

What are the benefits of SUM?

A
  1. Save and distribute management tasks.
  2. Simple configuration for company wide security policies
  3. Overview for important resources used.
  4. Monitor critical system parameters in real-time
  5. Easy maintenance for worldwide distributed services.
33
Q

What is RMM?

A

Remote Management and Monitoring

34
Q

What is RMM data collection sorted by?

A
  • SNMP traps and queries
  • Syslog
  • E-mail
35
Q

What can RMM be used with?

A

Sophos iview, Kaseya, Labtech, Level Platforms, Nagios

36
Q

For which modules can reporting data be anonymized?

A

Email Protection and Web Protection

37
Q

What is SMC?

A

Sophos Mobile Control

38
Q

What can be achieved from SMC?

A

*Push Wi-Fi and configuration to Sophos Mobile Control.

Manage Wi-Fi and VPN access from mobile devices.

39
Q

What needs to be configured for SMC server connection?

A

Server URL, Customer and Administrator credentials. CA cert is also required.

40
Q

Which types of configuration can the UTM push to Sophos Mobile Control?

A

L2TP over IPsec, Cisco IPsec and Wi-Fi

41
Q

What is used to determine comliance of devices connecting to a VPN?

A

Username

42
Q

What hostname is required to join the UTM to Active Directory?

A

A hostname with a DNS A record in the internal Active Directory DNS domain