Sunteți pe pagina 1din 20

SAMPLE REPORT

Prepared by Check Point Software Technologies

Contents
Executive Summary 3 Web Security Events 4 Intrusion and Attack Events 6 Data Loss Events 8 Bot and Virus Events 9 Bandwidth Analysis 12 Remediation Recommendations 16 Web Security Event Remediation Recommendations 16 Intrusion Prevention Event Remediation Recommendations 16 Data Loss Event Remediation Recommendations 17 Bot and Virus Event Remediation Recommendations 17 Introducing Check Point 3D Security 18 About Check Point Software Technologies 19

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

Executive Summary
This document provides the ndings of a recent 3D Security Analysis of your infrastructure. The document represents a summary of these ndings and presents a set of recommendations for addressing the discovered events. The analysis is based on data collected using the characteristics below:

3D Security Analysis Date In-Network Analysis Duration Monitored Network Deployment Type Release Version Security Gateway Software Blades Security Management Software Blades

18/04/2012 5 hours Internal network facing the internet Check Point 4800 Appliance R75.40 Identity Awareness, Application Control, URL Filtering, IPS, Data Loss Prevention, Anti-Virus and Anti-Bot Pre-Dened 7 Blades with SmartEvent

The following is a summary of the main high and critical risk security events detected:

High and Critical Event Summary


8 High-Risk Application Events

288 Intrusion and Attack Events

103 Data Loss Events

42 Bot and Virus Events

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

Web Security Events


Top High Risk Applications and Sites
Within the areas of Application Control and URL Filtering, the following items are of the highest risk level (the rst column species the number of events related to the mentioned application/site):

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

Top High-Risk Application Descriptions


The following tables provide summary explanations of the top events found and their associated security or business risks.

Application and Description


Sopcast
Sopcast is a media streaming application which allows media streaming via P2P networks. Sopcast allows users to broadcast media to other users or watchstreams broadcasted by other users.

Events
2 70 15

Dropbox

Dropbox is an application that allows the user to share les.

Sugarsync uTorrent

SugarSync provides online backup, syncing, and sharing les from the user's PC and mobile devices. uTorrent is a freeware closed source BitTorrent client that is designed to use minimal computer resources while offering functionality comparable to larger BitTorrent clients such as Vuze or BitComet. Torrent's development had started in 2005 by Ludvig Strigeus, a Swedish programmer, and since 2006 the code has been owned and maintained by BitTorrent, Inc.

Vuze

Vuze (formerly Azureus) is a Java-based BitTorrent client that is used to transfer les via the BitTorrent protocol. The software provides users the ability to view, publish and share original DVD and HD quality video content as well. Vuze was released under the GNU General Public License.

Top Users of High-Risk Applications


The following users were involved in the highest number of risky application and Web usage events:

Users*
Irma Whitewash Ingrid Whitewash Zachary Zest Leif Lash Ella Eyelash Carlos Cash Hope Hash Evan Eyelash Joe Roberts

Events
23 21 16 11 9 5 2 1 1

*Note: User names will be displayed in the above table only when Check Point Identity Awareness Software Blade is enabled and congured.

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

Intrusion and Attack Events


During the 3D Security Analysis, the Check Point solution identied a number of intrusion prevention-related events. Some of these events were categorized as critical. The following chart shows the distribution of events according to severity:

Severity
Critical

Event Name
Microsoft Windows Remote Desktop protocol code execution (MS12-020) Adobe Flash Player URL security domain checking code execution (APSB12-07)

CVE*
CVE-2012-0002 CVE-2012-0772

Events
2 70

High
Microsoft DNS server denial of service (MS12-017) CVE-2012-0006 15

Medium
Interactive Data eSignal stack buffer overow CVE-2012-3494 5

Total

50

*CVE (Common Vulnerabilities and Exposures) is a dictionary for publicly known security vulnerabilities. To nd more information about specic IPS event, search the CVE ID using National Vulnerability Database CVE search Web page.

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

IPS Events by Country


The following map shows the distribution of IPS events according to their origin countries. To mitigate attacks based on source or destination countries, create a policy using Check Point IPS Geo-protection feature.

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

Data Loss Events


Your company data is one of the the most valuable assets to your organization. Any intentional or unintentional loss can cause damage to your organization. The following represents the characteristics of the data loss events that were identied during the course of the anlysis.

Top Data Loss Events


The following list summarizes the identied data loss activity and the number of times that the specic type of events occurred for different data types congured for the DLP Software Blade.

Severity
Critical

Data
Data containing credit card numbers was sent outside the organization (PCI compliance violation).

Events
17

High
Data containing programming language lines (Source Code) such as C, C++, C#, JAVA and more, was sent outside the organization. Indicates leaks of intellectual property. Pay slip le was sent outside the organization. International Bank Account Number (IBAN) was sent outside the organization. Data containing Mergers and Acquisitions (M&A) plans was sent outside the organization (e.g., corporate strategy, corporate nance and more). 14 16 61 2

Medium
Email sent to several internal recipients and a single external one. Such emails are usually being sent unintentionally to a wrong external recipient. 18

Total

128

Top Data Loss Events by Mail Sender


This chart shows data leakage by mail sender on your network.

Sender
giovannicash@myBiz.com jezebeljosh@myBiz.com dantedash@myBiz.com daphnedash@myBiz.com johnjosh@myBiz.com ericaeyelash@myBiz.com javonjosh@myBiz.com artash@myBiz.com hernandohash@myBiz.com

Events
5 5 5 4 4 4 4 4 4

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

Bot and Virus Events


A bot is malicious software that invades your computer. Bots allow criminals to remotely control your computer to execute illegal activities such as stealing data, spreading spam, distributing malware or participating in Denial of Service attacks, without your knowledge. Bots are often used as tools in targeted attacks known as Advanced Persistent Threats or APTs. A botnet is a collection of such compromised computers.

High and Critical Bot and Virus Events Summary


The following table summarizes the total number of infected hosts involved in malicious activity and the number of Malware found (bots and viruses).

Description
Hosts infected with bots Hosts downloaded a malware Hosts accessed a site/host known to contain malware Different types of high and critical malware found

Findings
5 4 3 7

Trafc Sent and Received by Bots and Viruses


The following amount of trafc was sent and received as a result of bot and virus activity. This trafc might indicate illegal activities executed remotely such as stealing data, spreading spam, distributing malware and participation in Denial of Service (DOS) attacks.

0.9 MB Total Sent

6.5 MB Total Received

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

Top Bot and Virus Events


During the 3D Security Analysis, the Check Point solution identied a number of malware-related events. The following table summarizes the top bots and viruses detected in your environment.

Severity
Critical

Bot/Virus Name
Backdoor.IRC.Zapchast.zwrc Backdoor.Win32.Gbot.pzh P2P-Worm.Win32.Palevo.ath

Events
8 5 8

High
Backdoor.Win32.Hupigon.ozqk Trojan-Downloader.JS.Expack.bn Worm.Win32.AutoRun.duv 6 1 5

Medium
Email-Worm.Win32.Bagle.pac Trojan-Downloader.JS.Agent.gco Trojan-Downloader.Win32.Pendix.d Worm.BAT.Autorun.gr 7 25 24 2

Total

91

More details about malware identied in this report can be found by searching Check Point ThreatWiki, Check Point's public malware database at threatwiki.checkpoint.com.

Bot and Virus Activity


The following chart shows the distribution of detected malware activity according to their infected hosts. Bots usually communicate with Command and Control (C&C) which is the bots remote operator server used to send data outside of the organization.

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

10

Top Hosts Involved in Malicious Activity


From a host perspective, the following machines have the highest number of bots and virus events:

Host
DierdreDash-desktop (125.0.0.63) EvanEyelash-laptop (125.0.0.26) LindaLash-laptop (125.0.0.80) ArielAsh-laptop (86.0.0.57) ClarissaCash-desktop (86.0.0.62) ElvinEyelash-laptop (86.0.0.25) CesarCash-laptop (75.0.0.17) FeliciaFlash-desktop (75.0.0.68) JackJosh-desktop (75.0.0.38) JonJosh-laptop (75.0.0.40) SarahSash-laptop (75.0.0.48)

User
Dierdre Dash Evan Eyelash Linda Lash Ariel Ash Clarissa Cash Elvin Eyelash Cesar Cash Felicia Flash Jack Josh Jon Josh Sarah Sash

Events
2 2 3 2 2 2 2 2 2 2 2

Total

23

*Note: User names will be displayed in the above table only when Check Point Identity Awareness Software Blade is enabled and congured.

Top Destination Countries


The following map shows the distribution of detected bots and viruses according to their destination countries. In the case of bots, the destination country usually refers to the Command & Control center location. In the case of viruses, the destination country usually refers to the place where the virus was downloaded from.

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

11

Bandwidth Analysis
The following section summarized the bandwidth usage and web browsing prole of your organization during the time of analysis.

Application Bandwidth Utilization


During the course of the 3D Security Analysis, your companys employees used signicant corporate network resources for non-work activity. The following chart shows how bandwidth was used by your employees:

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

12

Top Bandwidth Utilization by Applications and Websites


In all, the analysis process identied that the following applications and websites are used within your network as well:

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

13

Top Web Categories


The following table shows the top 10 categories and number of hits associated with employee Internet browsing:

Category
Social Networking Webmail Search Engines / Portals Video Streaming Browser Plugin Multimedia Network Utilities Business Applications Media Sharing Other

Number of Hits
118 50 34 30 29 21 20 18 15 47

% of Total Hits
31% 13% 9% 8% 8% 5% 5% 5% 4% 12%

Total

382

100%

Network Bandwidth Utilization (MB)


During the course of the 3D Security Analysis, your companys employees used signicant corporate network resources for non-work activity. The following chart shows how bandwidth was used by your employees:

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

14

Social Networking Bandwidth (MB)


The use of social networking sites has become common at the workplace and at home. Many businesses leverage social networking technologies for their marketing and sales efforts, and their recruiting programs. During the course of this project, and consistent with over-all market trends, the following social networking sites consumed the most network bandwidth:

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

15

Remediation Recommendations
This report addresses identied security events across multiple security areas and at varying levels of criticality. The table below reviews the most critical of these incidents and presents methods to mitigate their risks. Check Point provides multiple methods for addressing these threats and concerns. Relevant protections are noted for each event, with the Software Blades into which the defenses are incorporated.

Web Security Event Remediation Recommendations


Application
Sopcast Dropbox Sugarsync uTorrent Vuze

Events
2 70 15 5 2

Remediation Steps
With the Application Control and URL Filtering Software Blades, you can activate, track and prevent the use of all the mentioned applications and Web sites. You can dene a granular policy to allow certain applications to specic groups only. Use UserCheck to educate users about the organization Web browsing and application usage policies.

Click for more information about Application Control and URL Filtering Software Blades. To maximize Web security on corporate laptops and desktops, use Check Point Anti-Malware & Program Control and WebCheck Endpoint Security Software Blades.

Intrusion Prevention Event Remediation Recommendations


Threat
Microsoft Windows Remote Desktop protocol code execution (MS12-020)

Events
2

Remediation Steps
In Check Point IPS Software Blade, enable the following protection:

Microsoft Windows Remote Desktop protocol code execution (MS12-020)


In Check Point IPS Software Blade, enable the following protection:

Adobe Flash Player URL security domain checking code execution (APSB12-07)

70

Adobe Flash Player URL security domain checking code execution (APSB12-07)
In Check Point IPS Software Blade, enable the following protection:

Microsoft DNS server denial of service (MS12-017) Interactive Data eSignal stack buffer overow

15

Microsoft DNS server denial of service (MS12-017)


5 In Check Point IPS Software Blade, enable the following protection:

Interactive Data eSignal stack buffer overow

Click for more information about Check Point IPS Security Gateway Software Blade. To maximize intrusions and attacks protection, use Check Point Firewall & Compliance Check Endpoint Security Software Blade.
2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only 16

Data Loss Event Remediation Recommendations


Data
Data containing credit card numbers was sent outside the organization (PCI compliance violation). Data containing programming language lines (Source Code) such as C, C++, C#, JAVA and more, was sent outside the organization. Indicates leaks of intellectual property. Pay slip le was sent outside the organization. International Bank Account Number (IBAN) was sent outside the organization. Data containing Mergers and Acquisitions (M&A) plans was sent outside the organization (e.g., corporate strategy, corporate nance and more). Email sent to several internal recipients and a single external one. Such emails are usually being sent unintentionally to a wrong external recipient.

Events
17

Remediation Steps
To remediate the detected events, activate the DLP Software Blade. Congure DLP policy based on the detected DLP data type and choose an action (Detect/Prevent/Ask User, etc.). If you consider the detected data type to be sensitive information, the recommended action is prevent. Use UserCheck to:

14

16 61

Educate users about the organizations data usage policy Provide users with instant feedback when their actions violate the data usage security policy

18

Click for more information about DLP Software Blade. To maximize data loss protection on corporate laptops and desktops, use Check Point Full Disk Encryption and Media Encryption Endpoint Security Software Blades.

Bot and Virus Event Remediation Recommendations


Bot/Virus Name
Backdoor.IRC.Zapchast.zwrc Backdoor.Win32.Gbot.pzh P2P-Worm.Win32.Palevo.ath Backdoor.Win32.Hupigon.ozqk Trojan-Downloader.JS.Expack.bn Worm.Win32.AutoRun.duv Email-Worm.Win32.Bagle.pac Trojan-Downloader.JS.Agent.gco Trojan-Downloader.Win32.Pendix.d Worm.BAT.Autorun.gr

Events
8 5 8 6 1 5 7 25 24 2

Remediation Steps
To block trafc generated by the detected malware, enable AntiBot and Antivirus Software Blades and set the policys prole settings to Prevent mode. To start the remediation process of the infected machine, searchfor the detected malware in Check Point ThreatWiki to nd additional remediation supporting information about the malware. This information can help you better understand the infection and its potential risks. Use UserCheck to educate users about the organization Web browsing and application usage policies.

Click for more information about Check Point Anti-Bot and Antivirus Security Gateway Software Blades. To maximize bot and virus protection on corporate laptops and desktops, use Check Point Anti-Malware and WebCheck Endpoint Security Software Blades.
2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only 17

Introducing Check Point 3D Security


Check Point 3D Security redenes security as a 3-dimensional business process that combines policies, people and enforcement for stronger protection across all layers of securityincluding network, data and endpoints. To achieve the level of protection needed in the 21st century, security needs to grow from a collection of disparate technologies to an effective business process. With 3D Security, organizations can now implement a blueprint for security that goes beyond technology to ensure the integrity of all information security. Check Point 3D Security enables organizations to redene security by integrating these dimensions into a business process:

Policies that support business


needs and transform security into a business process

Security that involves people in


policy denition, education and incident remediation

Enforce, consolidate and control


all layers of securitynetwork, data, application, content and user

The Check Point Application Control Software Blade provides the industry's strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policiesbased on users or groupsto identify, block or limit usage of over 240,000 Web 2.0 applications and widgets. The Check Point URL Filtering Software Blade integrates with Application Control, allowing unied enforcement and management of all aspects of web security. URL Filtering provides optimized web security through full integration in the gateway to prevent bypass through external proxies; integration of policy enforcement with Application Control for full Web and Web 2.0 protection; and UserCheck empowers and educates users on Web usage policy in real time.

The IPS Software Blade delivers complete and proactive intrusion preventionall with the deployment and management advantages of a unied and extensible next-generation rewall solution.

Check Point DLP Software Blade combines technology and processes to revolutionize Data Loss Prevention (DLP), helping businesses to pre-emptively protect sensitive information from unintentional loss, educating users on proper data handling policies and empowering them to remediate incidents in real-time. The Check Point Anti-Bot Software Blade detects bot-infected machines, prevents bot damages by blocking bot C&C communications, and integrates with other Software Blades to provide a comprehensive threat prevention solution on a single gateway. The Check Point Antivirus Software Blade stops viruses and other malware at the gateway before they affect users. Using a continually updated list of antivirus and anti-spyware signatures and anomalybased protections, the Antivirus Software Blade protects against threats transmitted through popular network protocols.

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

18

About Check Point Software Technologies


The mission of Check Point Software Technologies (www.checkpoint.com) is to secure the Internet. Check Point was founded in 1993, and has since developed technologies to secure communications and transactions over the Internet by enterprises and consumers. When the company was founded, risks and threats were limited and securing the Internet was relatively simple. A rewall and an antivirus solution generally provided adequate security for business transactions and communications over the Internet. Today, enterprises require many (in some cases 15 or more) point solutions to secure their information technology (IT) networks from the multitude of threats and potential attacks and are facing an increasingly complex ITsecurity infrastructure. Check Points core competencies are developing security solutions to protect business and consumer transactions and communications over the Internet, and reducing the complexity in Internet security. We strive to solve the security maze by bringing more, better and simpler security solutions to our customers. Check Point develops markets and supports a wide range of software, as well as combined hardware and software products and services for IT security. We offer our customers an extensive portfolio of network and gateway security solutions, data and endpoint security solutions and management solutions. Our solutions operate under a unied security architecture that enables end-to-end security with a single line of unied security gateways, and allow a single agent for all endpoint security that can be managed from a single unied management console. This unied management allows for ease of deployment and centralized control and is supported by, and reinforced with, real-time security updates. Check Point was an industry pioneer with our FireWall-1 and our patented Stateful Inspection technology. Check Point has recently extended its IT security innovation with the development of our Software Blade architecture. The dynamic Software Blade architecture delivers secure, exible and simple solutions that can be customized to meet the security needs of any organization or environment. Our products and services are sold to enterprises, service providers, small and medium sized businesses and consumers. Our Open Platform for Security (OPSEC) framework allows customers to extend the capabilities of our products and services with third-party hardware and security software applications. Our products are sold, integrated and serviced by a network of partners worldwide. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Points award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

Contact Check Point now


www.checkpoint.com/contactus
By phone in the US: 1-800-429-4391 option 5 or 1-650-628-2000

2012 Check Point Software Technologies Ltd. All rights reserved Classication: [Customer Condential] For customer use only

19

CONTACT CHECK POINT


Worldwide Headquarters U.S. Headquarters
5 HaSolelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753 4555 | Fax: 972-3-624-1100 | email: info@checkpoint.com 959 Skyway Rd. Ste. 300, San Carlos, CA 94070 | Tel: 800-429-4391 ; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com
2003-2012 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point 2200, Check Point 4000 Appliances, Check Point 4200, Check Point 4600, Check Point 4800, Check Point 12000 Appliances, Check Point 12200, Check Point 12400, Check Point 12600, Check Point 21400, Check Point 6100 Security System, Check Point Anti-Bot Software Blade, Check Point Application Control Software Blade, Check Point Data Loss Prevention, Check Point DLP, Check Point DLP-1, Check Point Endpoint Security, Check Point Endpoint Security On Demand, the Check Point logo, Check Point Full Disk Encryption, Check Point GO, Check Point Horizon Manager, Check Point Identity Awareness, Check Point IPS, Check Point IPSec VPN, Check Point Media Encryption, Check Point Mobile, Check Point Mobile Access, Check Point NAC, Check Point Network Voyager, Check Point OneCheck, Check Point R75, Check Point Security Gateway, Check Point Update Service, Check Point WebCheck, ClusterXL, Condence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, DefenseNet, DynamicID, Endpoint Connect VPN Client, Endpoint Security, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IP Appliances, IPS-1, IPS Software Blade, IPSO, R75, Software Blade, IQ Engine, MailSafe, the More, better, Simpler Security logo, Multi-Domain Security Management, MultiSpect, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management,Power-1, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, Safe@Home, Safe@Ofce, Secure Virtual Workspace, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, SecurityPower, Series 80 Appliance, SiteManager-1, Smart-1, SmartCenter, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, SmartEvent, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartProvisioning, SmartReporter, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SmartWorkow, SMP, SMP On-Demand, SocialGuard, SofaWare, Software Blade Architecture, the softwareblades logo, SSL Network Extender, Stateful Clustering, Total Security, the totalsecurity logo, TrueVector, UserCheck, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1 Total Security, VPN-1, VPN-1 Edge, VPN-1 MASS, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VE, VPN-1 VSX, VSX, VSX-1, Web Intelligence, ZoneAlarm, ZoneAlarm Antivirus + Firewall, ZoneAlarm DataLock, ZoneAlarm Extreme Security, ZoneAlarm ForceField, ZoneAlarm Free Firewall, ZoneAlarm Pro Firewall, ZoneAlarm Internet Security Suite, ZoneAlarm Security Toolbar, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its afliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, 7,165,076, 7,540,013, 7,725,737 and 7,788,726 and may be protected by other U.S. Patents, foreign patents, or pending applications. October 5, 2012

S-ar putea să vă placă și