Manage and Run Recommendation Scans - Deep Security
Manage and Run Recommendation Scans - Deep Security
Manage and Run Recommendation Scans - Deep Security
p: Recommendation scans provide a good starting point for establishing a list of rules that you should
implement, but there are some important additional rules that are not identified by
recommendation scans. You should implement those rules manually. See Implement additional
rules for common vulnerabilities
You can configure recommendation scans and implement the recommended rules for individual
computers or at the policy level. For large deployments, Trend Micro recommends managing
recommendations through policies. This way, you can make all your rule assignments from a single
source (the policy) rather than having to manage individual rules on individual computers.
This can
mean that some rules are assigned to computers on which they are not required; however, the
minimal effect on performance is outweighed by the ease of management that results from using
policies. If you enable recommendation scans in policies, use separate policies for scanning
Windows and Linux computers, to avoid assigning Windows rules to Linux computers, and vice-
versa.
installed applications
the Windows registry
the Windows registry
open ports
the directory listing
the file system
running processes and services
environment variables
users
The Deep Security Virtual Appliance can perform agentless recommendation scans on virtual
machines but only on Windows platforms and is limited to scanning the operating system for:
installed applications
the Windows registry
the file system
Scan limitations
Certain technical or logical limitations result in the rules for some types of software not being
accurately recommended, or not recommended at all:
On Unix/Linux systems, the recommendation scan engine might have trouble detecting
software that is not installed through the operating system's default package manager, for
example, Apache Struts, Wordpress, or Joomla. Applications installed using standard
package managers are not a problem.
On Unix/Linux systems, rules for desktop application vulnerabilities or local vulnerabilities (for
example, browsers and media players) are not included in recommendation scans.
Generic web application protection rules are not included in recommendation scans.
Smart rules are generally not included in recommendation scans unless they address a major
threat or a specific vulnerability. Smart rules address one or more known and unknown (zero-
day) vulnerabilities. Rule lists in Deep Security Manager identify smart rules with "Smart" in
the Type column.
When dealing with rules related to a content management system (CMS), the
recommendation scan cannot detect the CMS installation and installed version. It also cannot
detect the plug-ins installed with a CMS and their versions. As a result, whenever a
recommendation scan finds a web server installed and PHP installed or running on a system,
all CMS-related intrusion prevention rules get recommended. This may result in the over-
recommendation of rules, but balances the need for security vs. accuracy.
The recommendations for the following web technologies may suggest more rules than
necessary, so some tailoring may be required:
Red Hat JBoss
Eclipse Jetty
Apache Struts
Oracle WebLogic
WebSphere
Oracle Application Testing Suite
Oracle Golden Gate
Nginx
OpenSSL rules are recommended on Windows only when OpenSSL is explicitly installed. If
OpenSSL in being used internally by an application but it was not installed as a separate
package, a recommendation scan does not detect it.
On Linux systems, rules for Java-related vulnerabilities do not get recommended if web
browsers are the only applicable vector.
Recommendation scans cannot detect the Adobe Flash Player plug-in that is included in a
default Chrome installation. Recommendations are based on the Chrome version, which
means some unnecessary rules may be recommended.
Scheduled task: Create a scheduled task that runs recommendation scans according to a
schedule that you configure. You can assign the scheduled task to all computers, one
individual computer, a defined computer group, or all computers protected by a particular
policy. See Create a scheduled task to regularly run recommendation scans.
Ongoing scans: Configure a policy so that all computers protected by the policy are
scanned for recommendations on a regular basis. You can also configure ongoing scans for
individual computers. This type of scan checks the timestamp of the last scan that occurred
and then and follows the configured interval thereafter to perform future scans. This results in
recommendation scans occurring at different times in your environment. This setting is helpful
in environments where an agent might not be online for more than a few days (for example, in
cloud environments that are building and decommissioning instances frequently). See
Configure an ongoing scan
Manual scans: Run a single recommendation scan on one or more computers. A manual
scan is useful if you’ve recently made significant platform or application changes and want to
force a check for new recommendations instead of waiting for a scheduled task. See Manually
run a recommendation scan.
Command line: Initiate a recommendation scan via the Deep Security command-line
interface. See Command-line basics.
API: Initiate a recommendation scan via the Deep Security API. See Use the Deep Security
API to automate tasks.
e: Scheduled tasks and ongoing scans are each capable of running recommendation scans
independently with their own settings. Use either the scheduled tasks or ongoing scans, but not
both.
Once a recommendation scan has run, alerts are raised on the all computers for which
recommendations have been made.
Note: You can select all computers, choose one individual computer, select a group of computers,
or select computers that are assigned a particular policy. For large deployments, it's best to
perform all actions, including recommendation scans, through policies.
6. Give a name to your new scheduled task, select whether or not to Run Task on 'Finish', click
Finish.
want to configure the scan for an individual computer or for all computers that are using a
policy.
Note: For large deployments, it's best to perform all actions, including recommendation scans,
through policies.
2. Click Settings. On the General tab, under Recommendations, the Perform ongoing
Recommendation Scans setting enables or disables ongoing recommendation scans. The
Ongoing Scan Interval setting specifies how often the scans occur. Both of those settings
can be inherited from the computer or policy's parent (see Policies, inheritance, and overrides
for details about how inheritance works).
Note: For large deployments, it's best to perform all actions, including recommendation scans,
through policies.
2. Depending on which type of rule you want to exclude, go to the Intrusion Prevention,
Integrity Monitoring, or Log Inspection page.
3. On the General tab, click Assign/Unassign (for rules) or Application Types (for application
types).
4. Double-click the rule or application type that you want to exclude.
5. Go to the Options tab. For rules, set Exclude from Recommendations to "Yes" or
"Inherited (Yes)". For application types, select the Exclude from Recommendations
checkbox.
Note: For large deployments, it's best to perform all actions, including recommendation scans,
through policies.
2. Depending on which type of rules you want to implement automatically, go to the Intrusion
Prevention, Integrity Monitoring, and/or Log Inspection pages. (You can change the
setting independently for each protection module.)
3. On the General tab, under Recommendations, change the setting to "Yes" or "Inherited
(Yes)".
General tab of the protection module (Intrusion Prevention, Integrity Monitoring, and Log
Inspection).
The example below describes how to deal with intrusion prevention recommendation scan results
via a policy:
1. Once a recommendation scan is complete, open the policy that is assigned to the computers
you have just scanned.
2. Go to Intrusion Prevention > General. The number of unresolved recommendations (if any)
is displayed in the Recommendations section.
3. Click Assign/Unassign to open the rule assignment window.
4. Sort the rules By Application Type and select Recommended for Assignment from the
display filter menu:
This displays a list of rules that are recommended for assignment but that have not been
assigned.
5. To assign a rule to the policy, select the checkbox next to the rule name. Rules flagged with a
icon have configuration options that you can set. Rules flagged with a icon have
settings that must be configured before the rule is enabled.)
Alternatively, to assign several rules at once, use the Shift or Control keys to select the rules,
right-click the selection, and click Assign Rule(s).
p: The results of a recommendation scan can also include recommendations to unassign rules. This
can happen when applications are uninstalled, when security patches from a manufacturer are
applied, or when unnecessary rules have been applied manually. To view rules that are
recommended for unassignment, select Recommended for Unassignment from the display
filter menu.
e: Recommended rules are indicated by a full flag ( ) . A partial flag ( ) identifies an application
type where only some of the rules that are part of the application type have been recommended.
p: This list includes the most common of the additional rules you should configure. You can find others
in Deep Security Manager by searching for rules whose type is "Smart" or "Policy".
1007598 - Identified Possible Ransomware File Rename Activity Over DCERPC Services
Network Share
1007064 - Executable File Uploaded On System32 Folder Through SMB DCERPC Services
Share
1006067 - Identified Too Many HTTP Requests With Specific HTTP Web Server
Method Common
Communication
Typically for communication issues "protocol error" will appear in the body of the error message.
If you don't have open inbound firewall ports from the Deep Security Manger to the agent, open the
ports or switch to agent-initiated communication. For more information, see Activate and protect
agents using agent-initiated activation and communication.
Server resources
Monitor the CPU and memory resources on the server. If the memory or CPU is becoming
exhausted during the scan, increase the resources.
Timeout values
Increase the timeout values for the recommendation scan.
1. Open the command prompt and navigate to the Deep Security Manager installation folder.
2. Enter the commands below (if this is a multi-tenant environment, add the tenant name):
dsm_c -action changesetting -name
settings.configuration.agentSocketTimeoutOverride -value 1200
3. If you are using the Deep Security Virtual Appliance, also enter these commands:
dsm_c -action changesetting -name
settings.configuration.timeoutEpsecScanRequest -value 1770
Privacy Notice