Threat Prevention

From Edge Threat Management Wiki - Arista
Jump to navigationJump to search

    Threat Prevention
Other Links:
Threat Prevention Description Page
Threat Prevention Demo
Threat Prevention Forums
Threat Prevention Reports
Threat Prevention FAQs




About Threat Prevention

Threat Prevention blocks potentially harmful traffic from entering or exiting the network. This app is useful if you host servers such as a web or email server as can prevent cyber attacks to your servers. It is also useful to prevent data loss in case users mistakenly try to connect to a phishing site or other malicious host.

Threat prevention uses Threat Intelligence technology managed by Webroot BrightCloud®. It works by performing a query to the BrighCloud® service, requesting for the reputation score and historical data of each IP address. Based on the rating of the IP address, the session may be blocked. By default, the Threat Prevention app blocks sessions with a "High Risk" rating. IP addresses rated as High Risk are typically associated with the following types of attacks:

  • Spam Sources - IP addresses involved in tunneling spam messages through proxy, anomalous SMTP activities, and forum spam activities.
  • Windows Exploits - IP addresses participating in the distribution of malware, shell code, rootkits, worms or viruses for Windows platforms.
  • Web Attacks - IP addresses using cross site scripting, iFrame injection, SQL injection, cross domain injection, or domain password brute force attacks to target vulnerabilities on a web server.
  • Botnets - IP addresses acting as Botnet Command and Control (C&C) centers, and infected zombie machines controlled by the C&C servers.
  • Denial of Service
 - The Denial of Service category includes DOS, DDOS, anomalous sync flood, and anomalous traffic detection.
  • Scanners - IP addresses involved in unauthorized reconnaissance activities such as probing, host scanning, port scanning and brute force login attempts.
  • Phishing - IP addresses hosting phishing sites and sites related to other kinds of fraudulent activities.
  • TOR Proxy - IP addresses acting as exit nodes for the TOR Network. Exit nodes are the last point along the proxy chain and make a direct connection to the originator’s intended destination.
  • Proxy - IP addresses providing proxy services, including both 
VPN and open web proxy services.
  • Mobile Threats - Denial of service, packet sniffing, address impersonation, 
and session hijacking

Settings

This section reviews the different settings and configuration options available for ThreatPrevention.


Status

This displays the current status and some statistics.


Rules

The Rules tab allows you to specify rules to Block, Pass or Flag traffic that crosses the Untangle.

The Rules documentation describes how rules work and how they are configured. ThreatPrevention uses rules to determine to block/pass the specific session, and if the sessions is flagged. Flagging a session marks it in the logs for reviewing in the event logs or reports, but has no direct effect on the network traffic.

Typically Untangle is installed as a NAT/gateway device, or behind another NAT/gateway device in bridge mode. In this scenario all inbound sessions are blocked by NAT except those explicitly allowed with port forwards. Because of this, the ThreatPrevention does not block anything by default. It is up to you to decide to best fit for your network, whether you only want to block specific ports or you want to block everything and allow only a few services.


Rule Actions

  • Pass: Allows the traffic which matched the rule to flow.
  • Block: Blocks the traffic which matched the rule.

Additionally a session can be flagged. If Flag is checked the event is flagged for easier viewing in the event log. Flag is always enabled if the action is Block.


Reports

ThreatPrevention Reports


Related Topics

User Guide


ThreatPrevention FAQs

ThreatPrevention FAQs