Enterasys Networks 9034385 Plumbing Product User Manual


 
Assessment Design Procedures
5-18 Design Procedures
2. Determine Assessment Server Location
Whendeterminingthelocationoftheassessmentserversonthenetwork,thefollowingfactors
shouldbeconsidered:
•Thetypeofassessment:agentlessoragentbased.
Agentlessassessmentconsumesmorebandwidththanagentbasedassessmentduringthe
scanofanendsystem.However,itisimportanttounderstandthattheamount
ofbandwidth
consumedbyagentlessassessmentshouldonlybeconsideredwhenalargenumberofend
systemsarebeingassessedoveraseverelybandwidthrestrictedlink.Forexample,if1000
endsystemsareconnectedtoabranchofficeovera512Kbpsconnectionthatisalsocarrying
latencysensitive
VoIPandotherrealtimeapplications,itisrecommendedtopositionan
assessmentserveratthebranchofficetoexecuteassessmentforconnectingdevicesandavoid
congestiononthebandwidthrestrictedlink.
•EndsystemconfigurationfortheassociatedSecurityDomain.
Ifagentlessassessmentisimplementedandconnectingendsystemsare
runningpersonal
firewalls,theassessmentserverlocationmayberelevanttotheeffectivenessofthe
assessments.Forexample,MicrosoftXPSP2isenabledbydefaultwithapersonalfirewallthat
deniesallunsolicitedinboundconnectionattempts.Therefore,aMicrosoftXPSP2personal
firewallwillpreventthesuccessfulexecutionofanend
systemassessmentunlessthefirewall
isconfiguredtoallowspecifictypesofunsolicitedinboundconnections,suchasfromspecific
IPaddressesoroverspecificprotocolsasdefinedintheExceptionslist.Thismaybe
configuredbytheenduserviawebbasedremediationorthroughaWindowsdomain
controllergroup
policydefinition.
3. Identify Assessment Server Configuration
Anassessmentserverutilizesthirdpartyassessingsoftwaretoexecutescansagainstconnecting
endsystems,andthissoftwaremustbelocal ly configuredwiththesecurityassessment
parameters.Thethirdpartyassessingsoftwareonallassessmentserversbelongingtothesame
SecurityDomainmustbeconfiguredidenticallysothatconsistencyismaintained
inthe
assessmentofallconnectingendsystemswithinthatdomain.Theselectionofthevulnerabilities
assessedbytheassessmentserversisbasedsolelyontheenterprisesecuritypolicy.Herearesome
examplesofvulnerabilityassessmentconfiguration:
•Remotescansthatutilizealocallyconfiguredaccountontheendsystemcanevaluate
virtuallyanyconfigurationdetailsoftheendsystemwithintherightsoftheaccount.Foran
administrativeaccount,anyendsystemparameterscanbecheckedincludingtheregistry
settingsandtherunningservices.Examplesincludethedateofantivirusdefinitionfiles,
installationofantivirussoftware,statusofantivirusprotection,installed
patches,and
personalfirewallstatusandconfigurationinformation.
•Remotescansthatdonotutilizealocallyconfiguredaccountontheendsystemcanevaluatea
morelimitedsetofvulnerabilitiesthroughtheassessmentofremotelyaccessibleserviceson
theendsystem.ExamplesincludeOSspecificvulnerabilitiesaccessedthroughopenTCP/
UDPports
andvulnerabilitiesofremotelyaccessibleservicesrunningontheendsystem(FTP
server,HTTPserver).
TheSANSTop20securityvulnerabilitiesprovideasuggestedbaseguidelineconfigurationfor
enterprisesinitiallydeployingNACwithendsystemassessment(http://www.sans.org/top20/).
Thirdpartyassessingsoftwareregularlyreleasesupdatestoassessnewlyidentifiedsecurity
vulnerabilities.Asubscriptiontosuchaserviceisrecommendedtomaintainanuptodate
assessmentengineonthenetwork.Newvulnerabilitiesonlyneedtobeincludedintheassessment