520 likes | 1k Views
Required Slide. SESSION CODE: SIA308. Secure Endpoint: Advanced Protection from Dynamic Threats, a Microsoft Forefront Threat Management Gateway 2010 Deep Dive. Adwait Joshi Jim Harrison Sr. Product Manager Program Manager Microsoft Corporation. Agenda. Business Ready Security
E N D
Required Slide SESSION CODE: SIA308 Secure Endpoint: Advanced Protection from Dynamic Threats, a Microsoft Forefront Threat Management Gateway 2010 Deep Dive Adwait Joshi Jim Harrison Sr. Product Manager Program Manager Microsoft Corporation
Agenda • Business Ready Security • TMG New Features - overview • Deep Dives with Troubleshooting • URL Filtering • Malware Inspection • Summary
Forefront TMG Administrator’s Companion 20% off at the Tech Ed Bookstore!! ANNOUNCING
Business Ready SecurityHelp securely enable business by managing risk and empowering people Across on-premises & cloud Access Protection Identity Protect everywhere, access anywhere Integrate and extend security across the enterprise Management Highly Secure & Interoperable Platform Simplify the security experience, manage compliance from: to: Block Enable Cost Value Siloed Seamless
Secure Endpoint Solution Protect endpoints from emerging threats and information loss, while enabling more secure access from virtually anywhere PROTECT everywhere ACCESS anywhere INTEGRATE and EXTEND security SIMPLIFY security, MANAGE compliance • Provides unified administration for desktop management and protection • Increases visibility of potentially vulnerable desktops • Enables multi-layered antimalware protection • Protects critical data wherever it resides • Provides more secure always-on access • Uses existing System Center Configuration Manager infrastructure • Builds on and extends Windows security
URL Filtering DEMO
WebSvr MRS Cache 10.10.0.1:8080 2 Firewall Service X 11 Web Proxy Engine 1 6 12 7 3 10 WWSAPI 5 8 127.0.0.1:8080 9 WinHTTP MRS 4
GET HTTP://my.kitty.cat.com/calico?gimmenow HTTP://my.kitty.cat.com/calico?gimmenow HTTP://kitty.cat.com/calico?gimmenow HTTP://cat.com/calico?gimmenow HTTP://com/calico?gimmenow MRS Cache In MRS Cache? Nope… WWSAPI SOAP Req to HTTPS://10.ds.mrs.microsoft.com
WinHTTP WWSAPI POST HTTPS://10.ds.mrs.microsoft.com CONNECT 10.ds.mrs.microsoft.com:443 WinHTTP 200 OK SSL Tunnel SOAP Request WinHTTP SOAP Response WWSAPI WinHTTP SOAP Response
WWSAPI URL Categories 403 12233 MRS Cache
Firewall Policies (rule ordering) WPS License Expired Users Don’t Read The Error Page (12233.htm, 12233r.htm) CRL Validation Name Resolution Network WPAD Configuration WinHTTP Auto-Discovery WinHTTP Proxy Settings First TMG RFC was for URL Filtering (MRS Queries) Problem Areas
A Real CSS Call Too Much MRS Traffic (~1GB/day)
TMG logs verify the complaint LOTS of failed attempts to communicate with MRS LOTS of WPAD requests from TMG itself TMG tells WWSAPI to use localhost:8080 WWSAPI tells WinHTTP to use localhost:8080 What Did We Know?
GET HTTP://my.kitty.cat.com/calico?gimmenow WWSAPI SOAP Req to HTTPS://10.ds.mrs.microsoft.com WinHTTP WWSAPI POST HTTPS://10.ds.mrs.microsoft.com WinHTTP POST HTTPS://10.ds.mrs.microsoft.com
Web Services behavioral data (tracing) WinHTTP Proxy configuration (netsh winhttp sho pro) Behavioral data (tracing) NetCaps What Did We Need?
Web Services Tracing • Requires Windows SDK: http://www.microsoft.com/downloads/details.aspx?FamilyID=c17ba869-9671-4330-a63e-1fd44e0e2505 • Use it like unto thusly: • Click Start, All Programs, Microsoft Windows SDK v7.0 • R-click CMD Shell and select “Run as Administrator” (elevated). • Run the following sequence of commands: • wstrace.bat create verbose • wstrace.bat on • create the repro • wstrace.bat dump > C:\Temp\wwstraces.csv
WinHTTP Tracing • Requires Nothing Extra • ..so we have no link; sorry… • Use it like unto thusly: • Click Start, All Programs, Accessories • R-click Command Prompt and select “Run as Administrator” (elevated). • Run the following command: • netsh winhttp set tracing output=file level=verbose trace-file-prefix={c:\temp} state=enabled • create the repro • netsh winhttp set tracing state=disabled
Do It All Together • Click Start, All Programs, Microsoft Windows SDK v7.0 • R-click CMD Shell and select “Run as Administrator” (elevated). • Run the following commands: • netsh winhttp set tracing output=file level=verbose trace-file-prefix={c:\temp} state=enabled • wstrace.bat create verbose • wstrace.bat on • Create the repro • Run the following commands: • netsh winhttp set tracing state=disabled • wstrace.bat dump > C:\Temp\wwstraces.csv
Real Case Discussion DEMO
TelemetryAnother MRS Request • Same mechanism as MRS Lookups • FQDN is 10. s.mrs.microsoft.com • Amount of data sent depends on participation • Same problem areas as URLF except not (entirely) user-driven • Need to scan logs for problems t
TMG Update Agent 1 9 WU Config WUA API 2 WSUS or MU ? 8 3 4 7 WinHTTP WinHTTP WPADSvc 6 5
Computer Default • WSUS or MU (GP, Registry) • MS Updates • Default + MU
WSUS Product Classifications for Forefront TMG • Anti-Malware • Network Inspection System
Windows Automatic Update Agent Configuration (MSKB 328010) Behavioral data (logging) WinHTTP Configuration (netsh winhttp sho pro) Behavioral data (tracing) What Do We Need?
WinHTTP Tracing • Requires Nothing Extra • ..so we have no link; sorry… • Use it like unto thusly: • Click Start, All Programs, Accessories • R-click Command Prompt and select “Run as Administrator” (elevated). • Run the following command: • netsh winhttp set tracing output=file level=verbose trace-file-prefix={c:\temp} state=enabled • create the repro • netsh winhttp set tracing state=disabled
WAUA Logging / Configuration • Requires Nothing Extra MSKB 902093 describes it • Use it like unto thusly: • Press the Start and R keys simultaneously • In the Run dialog, type notepad %windir%\windowsupdate.log and hit <Enter>
Update Center Configuration • http://blogs.technet.com/isablog/archive/2009/11/28/using-windows-server-update-service-for-the-tmg-update-center.aspx
Anti-Malware DEMO
Firewall Service Web Proxy Filter Malware Inspection Filter
Trickling • Content-Type Exceptions
Scanning Location • High R/W capacity • DO NOT mix with logging or OS
Cleaning • Blocking • Threat level • Suspicious • Corrupted • Unscannable • Encrypted • Scan Time • Archive depth • Pre-, Post unpacked size
Log type: Web Proxy (Forward) Status: 12210 An Internet Server API (ISAPI) filter has finished handling the request. Contact your system administrator. Rule: Allow Web Access for parent Source: Internal (10.10.255.1:49226) Destination: External (188.40.238.250:80) Request: GET http://www.eicar.org/download/eicar.com Filter information: Req ID: 09906bf2; Compression: client=No, server=Yes, compress rate=0% decompress rate=0% Protocol: http User: anonymous Additional information Client agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727) Object source: Internet (Source is the Internet. Object was added to the cache.) Cache info: 0x40800000 (Response includes the LAST-MODIFIED header. Response should not be cached.) Processing time: 390 MIME type: application/x-msdos-program TMG Log Summary
Update Center Configuration WPS License Expired WSUS / MU Configuration WinHTTP Auto-Discovery WinHTTP Proxy Settings Users Don’t Read The Error Page (12210.htm, 12210r.htm) No CSS cases (yet) Problem Areas
Summary • Web usage increasingly provides an attack vector into the corporate network • Forefront Threat Management Gateway Provides: • Intelligent protection to enable employees to use the Web safely and productively • Simplifies Web security with a single solution that integrates into your Microsoft infrastructure • Troubleshooting WPS is (now) no more difficult than any other Web request Learn more & try our solutions at: www.microsoft.com/forefront
Required Slide Speakers, please list the Breakout Sessions, Interactive Sessions, Labs and Demo Stations that are related to your session. Related Content SIA320 |Business Ready Security: Protecting Endpoints from Advanced Threats with Microsoft's Secure Endpoint Solution SIA301 |Secure Endpoint: DirectAccess and Microsoft Forefront Unified Access Gateway 2010, the Complete Remote Access Solution SIA308 | Secure Endpoint: Advanced Protection from Dynamic Threats, a Microsoft Forefront Threat Management Gateway 2010 Deep Dive SIA309 |Secure Endpoint: What’s in Microsoft Forefront Endpoint Protection 2010 - A Deep Dive into the Features and Protection Technologies SIA325 | Secure Endpoint: Virtualizing Microsoft Forefront Threat Management Gateway (TMG) SIA02-INT | Secure Endpoint: Planning DirectAccess Deployment with Microsoft Forefront Unified Access Gateway SIA07-INT | Secure Endpoint: Architecting Forefront Endpoint Protection 2010 on Microsoft System Center Configuration Manager • SIA05-HOL | Microsoft Forefront Threat Management Gateway Overview • SIA09-HOL | Secure Endpoint Solution: Business Ready Security with Microsoft Forefront and Active Directory • SIA11-HOL | Microsoft Forefront Unified Access Gateway (UAG) and Direct Access: Better Together Red SIA-3 | Microsoft Forefront Secure Endpoint Solution
Track Resources Learn more about our solutions: http://www.microsoft.com/forefront Try our products: http://www.microsoft.com/forefront/trial
Required Slide Resources Learning • Sessions On-Demand & Community • Microsoft Certification & Training Resources www.microsoft.com/teched www.microsoft.com/learning • Resources for IT Professionals • Resources for Developers http://microsoft.com/technet http://microsoft.com/msdn
Required Slide Complete an evaluation on CommNet and enter to win!
Sign up for Tech·Ed 2011 and save $500 starting June 8 – June 31st http://northamerica.msteched.com/registration You can also register at the North America 2011 kiosk located at registrationJoin us in Atlanta next year