Application and Device Control - V1.2
Application and Device Control - V1.2
Application and Device Control - V1.2
Content Table
Content
Introduction ......................................................................................................................................... 3
Audience ............................................................................................................................................... 3
Rules ..................................................................................................................................................... 7
Conditions ............................................................................................................................................. 8
Performances ...................................................................................................................................... 16
Chapter Three: Use cases for Application and device control ....................................................... 21
Audience
This document is aimed at administrators and product specialist with a working knowledge of
Symantec Endpoint Protection 11.0. The reference guide and other documentation provided on
the CD are a pre requisite to fully benefit from this document.
Application and Device control.
Application Control Policies can only be created and/or modified from the Symantec Endpoint
Protection Admin console. Application Control cannot be modified on the Endpoint Protection
Client.
4
Application and Device control.
To the right of the rule set name there is an option to configure Test/Production. This feature
allows administrators to test rules before actually enabling them. In the Test (log only)
configuration, no actions will be applied in the rule, but the action is logged. This allows
administrators to see what would have happened if this rule would have been active. All new rule
sets are created with the default option configured to test. This reduces potential accidents an
administrator may make by not considering all possibilities of the rule.
5
Application and Device control.
Note: The edit, delete, move up, and move down button will remain greyed out until a rule set is
selected.
Rule Sets consists of Rules and Conditions. A rule is a set of conditions and actions that apply to
a given process or processes. For organizational purposes, it is recommended to create a rule set
that includes all of the actions that you want to allow/block/monitor a given task. For example, if
an administrator wanted to block write attempts to all removable drives and block
people/applications from tampering with a specific application, it would be recommended to
create two distinct rule sets versus creating all of the necessary rules to do both tasks under one
rule set.
In order to get high performance environment it is recommended not to exceed 100 rules in a
rule set.
6
Application and Device control.
Rules
Rules define the application(s) that you are monitoring. Conditions define what specifically you
want to allow or block an application from doing, and actions determine what action to take when
the condition is meet.
Before getting into rule development, it is best to understand how rules work. A rule applies to an
application or multiple applications. Rules contain conditions that monitor specified operations
for the application(s) defined in the rule. The condition also contains the actions to take when the
specified operation is observed. A majority of the issues encountered by new administrators
when configuring Application Control is caused by not realizing that Actions always apply to the
process defined in the rule and not the Condition.
Adding a Rule
1. Open the Rule Set
2. Click the Add button in the Rules pane
3. Click the Add Rule option.
4. In the Rule Name, enter a name for the rule
5. In the Description Field, enter a description
for the rule (optional)
There are two sections that deal with tying the rule to an application or multiple applications.
One process definitions list contains processes to which the rule applies. The other process
definitions list contains processes to which the rule does not apply. If an administrator wanted to
tie the rule to all application except for a given set of applications, then they would define a
wildcard for all (*) in the top section, and list the applications that need an exception in the
bottom section.
NOTE: In every configuration, the top section must have at least one application defined.
When adding applications to a rule, administrators can use the process name, wildcards, regular
expressions, fingerprints, and/or drive types from where the application was launched.
7
Application and Device control.
1. Determine if the Application being added is the application to tie the rule to or if the
application is going to be an exception to the rule.
2. Select the Add for the appropriate the section.
3. In the Add Process Definition, you can use the criteria of choice to define the application(s)
Administrators can define as many applications as they would like to a given rule.
Conditions
Conditions are operations that can be allowed or denied for an application or multiple
applications. There are several condition types that can be configured. These include the
following:
Registry Access Attempts - Allow or block access to a client computer's registry settings
File and Folder Access Attempts - Allow or block access to defined files or folders on a client
computer
Launch Process Attempts -Allow or block the ability to launch a process on a client computer
Terminate Process Attempts - Allow or block the ability to terminate a process on a client
computer. For example, you may want to block a particular application from being stopped.
NOTE: This Condition does not prevent an application from being terminated using normal
methods of quitting an application (i.e. Alt-F4, or the Program’s native exit routine). It will
prevent the process from being terminated by other applications or procedures.
Load DLL Attempts - Allow or block the ability to load a DLL on a client computer
To add a condition to a rule, select the add Click in the Rules pane and then select the condition
type you want to add.
8
Application and Device control.
Multiple conditions can be added to a given rule. As conditions are added, administrators will
need to specify the specific properties of the condition and what actions to take when the
condition is meet. Each condition type will have different properties.
9
Application and Device control.
Condition Properties
Each condition type has its own Condition Properties to specify what the condition is looking for.
Each condition also has its own specific actions to take when the condition is true. To edit the
properties and action for a condition, select the condition in the rules windows pane.
10
Application and Device control.
For registry access attempts, administrators can define different actions to take for read and/or
create/delete/write attempts.
File and Folder Access Attempts : Administrators can define files and folders. Administrators
can also use wildcards and regular expressions. In addition, Administrators can also restrict the
monitoring of files and folders to specific drive types.
11
Application and Device control.
NOTE: When applying a condition to everything in a given folder, it is best to {folder name}\*. In
many cases, administrators forget to include the wildcard to include all files similar to Registry
Attempt Access, administrators can choose to take different actions for read and/or
Create/Delete/Write attempts.
12
Application and Device control.
The actions for Launch Process Attempts are limited to allowing the process, blocking the
process from being launched, or terminate the calling application.
13
Application and Device control.
In the Actions, administrators can choose to allow the DLL to load, block the DLL from being
loaded, or terminate the application that is attempting to load the DLL.
14
Application and Device control.
Common Mistakes
There are two common mistakes made by individuals configuring Application Control for the first
time. The first is configuring the wrong action and the second is neglecting the order of rules.
Wrong Action
In every action setting, there are four options for the action to take: Continue processing other
rules, Allow access, Block access.
Continue processing – This action allows administrators the ability to log the event and
continue processing other rules in the stack. The standard operation is to stop processing
rules once the first criteria matches.
Allow – Allows the operation to continue
Block – Prevents the operation
Terminate process – Kills the application making the request.
Although these options seem simple, many people will accidentally choose to terminate the
process. This can lead to undesired results. To fully understand the common mistake, consider
the scenario below:
An Administrator wants to block individuals from modifying the secret.doc on client machines.
The administrator does the following:
To test the policy, the administrator opens MS Word. The administrator then proceeds to use
Word to navigate to the folder where secret.doc is located. The administrator opens the file. The
Administrator makes some changes and then attempts to save the file. The End Result, MS Word
terminates. Although no writes were allowed, the administrator did not expect MS Word to close.
The reason this occurred is due to the Administrator choosing the Terminate option vs. the Block
option.
It is recommended to use the Block Action to prevent a condition vs. Terminate. Terminate should
be only be used in advanced configurations.
Order of Rules
Many new administrators fail to notice that Application Control rules function very similar to the
way that most network based firewalls work with the first rule match feature. When there are
multiple rules where the conditions are true, the rule list on the top will be the only
condition/action that will be applied It is important to understand the order of rules being
configured. Neglecting the order could lead to wrong expectations.
15
Application and Device control.
In the above scenario, clients would be able to create/modify a file called test.doc on USB drives.
Because the Allow Writes to test.doc is ordered before the Block All USB Writes, the Block ALL
USB Writes never gets processed in the case where rules above it are true.
Performances
The more rules you have the more it can slow you down. The effect of the number of rules on the
client performance is very gradual.
The performance of Application and Device Control really depends on what the rules are applied
to. For example if ones creates 1,000 rules only for Word then none of the other applications
should function any differently, though Word may be slower.
The best practice would be to limit a rule set 100 rules and the policy to 1000 Rule Sets.
Note that when doing a block all for read & write actions, smcgui.exe can cause higher than
normal CPU utilization. The workaround is to exclude smcgui.exe from this rule. This appears to
impact systems limited RAM (512MB or less typically.)
16
Application and Device control.
Device control allows SEP administrators to restrict the access of usage of a given peripheral by
policy. The features acts in the registry and disable on the device manager level the chosen
peripheral. Once a peripheral is blocked you need to re-enable it by policy, uninstalling SEP will
not re-enable the device.
Standard Devices
A large number of devices controlled by SEP are pre listed on the SEPM for the standard entries
under Policy >Policy Component >Hardware Devices:
This list allows having an out of the box solution for standard requests.
Class ID:
To facilitate device installation, devices that are set up and configured in the same manner are
grouped into a device setup class. For example, SCSI media changer devices are grouped into the
Medium Changer device setup class. The device setup class defines the class installer and class
co-installers that are involved in installing the device.
Microsoft defines setup classes for most devices. IHVs and OEMs can define new device setup
classes, but only if none of the existing classes apply. For example, a camera vendor does not
have to define a new setup class because cameras fall under the Image setup class. Similarly,
uninterruptible power supply (UPS) devices fall under the Battery class.
17
Application and Device control.
There is a GUID associated with each device setup class. System-defined setup class GUIDs are
defined in Devguid.h and typically have symbolic names of the form GUID_DEVCLASS_Xxx.
The device setup class GUID defines the ..\CurrentControlSet\Control\Class\ClassGUID registry
key under which to create a new subkey for any particular device of a standard setup class.
Custom Device
Sometimes these categories do not suffice as you need to allow on ly a specific hardware to work
with your SEP clients. (Block IPods, Allow specific WIFI dongle…).
For this reason the administrator can add a custom device to integrate in the device control
policy alongside with the preconfigured ones.
18
Application and Device control.
19
Application and Device control.
Device ID
A device ID is a vendor-defined identification string that is the most specific ID that Setup uses to
match a device to an INF file. A device has only one device ID. A device ID has the same format as
hardware ID. When an enumerator reports a list of hardware IDs for a device, the device ID should
be the first hardware ID in the list.
A device id is like a URL as it gives you the connection path to the device manager. For this string
you can gather, the port used by the peripheral, the type of device, the manufacturer, the device
version and ultimately in some case the serial number.
if you want to block all iPods then you need to add a new hardware description with a wildcard
(*) on the device ID string.
USBSTOR\DISK&VEN_APPLE&PROD_IPOD*
20
Application and Device control.
a) You have a restricted amount of hardware to manage: Then you can use the Device
control policy to add all the Wi-Fi interfaces Devices ID and block these according to
what you need.
Example:
Screen Capture Instructions
Gather the Devices ID with
DevViewer.
21
Application and Device control.
22
Application and Device control.
When such procedure is required ensure that all hardware and network connection types are
available when creating the policies.
Example:
Screen Capture Intructions
Create 3 Firewall policies:
FW-Lan
FW-Eth_out
FW-Wifi_out
FW-Lan : allow all traffic
in/out on the Ethernet
card.
Block all on Wifi
FW-Eth_out: Allow all
traffic outbound on
Ethernet.
Block all on Wifi
FW-Wifi_out: Allow all
traffic outbound on Wifi.
Block all on Ethernet
Assing the Policies to the
appropriate locations
Test
Note: Should you have issue with unwanted IP address on blocked interface, think of
disabling the smart traffic rules.
23
Application and Device control.
Example:
The company Acme, LTD purchased a stock of “PNY Attaché” USB devices for the employees to
exchange documents outside of the corporate network. All other USB storage devices are blocked
in every location (Home, Office, VPN). Authorized users are separated in 2 Pools:
Content Producers: On the Office location and VPN they can write to the corporate USB
device
Content Readers: In all locations they can read documents from the corporate USB
device
24
Application and Device control.
25
Application and Device control.
Example:
Create a new rule set called Monitor USB and disk Drive Regkeys
Create a registry key access attempt rule for the following keys:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR\*\*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR\*\*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB*\*\*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB*\*\*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceClas
ses\{53f56307-b6bf-11d0-94f2-00a0c91efb8b}\*\*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceClas
ses\{53f56307-b6bf-11d0-94f2-00a0c91efb8b}\*\*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceClas
ses\{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\*\*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceClas
ses\{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\*\*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceClas
ses\{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\*\*
26
Application and Device control.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceClas
ses\{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\*\*.
Apply the policy to the group of client you want to monitor and then consult the logs from the
console.
27
Application and Device control.
28
Application and Device control.
The following example illustrate Internet explorer, but you can easily adapt it to the browser of
your choice.
29
Application and Device control.
%windir%*\*,%programfiles%*\*
*\*softwaredistribution*,*\*softwaredistribution*\*\*,*\*windowsupdate*,*\*windowsu
pdate*\*\*,%windir%\profile*\*\*.
Action:
Create, delete, or write attempt: Block (Log)
30
Application and Device control.
%windir%*\*,%programfiles%*\*
Exclude:
Action:
Create a new Launch process attempt to block IE from launching any other processes (like a
malware for example).
Action:
Create a new Load DLL attempt condition to allow IE to launch system dlls required to run.
Action:
Load DLL attempt: Allow
31
Application and Device control.
Create a new Load DLL attempt condition to prevent IE from launching any other dlls.
Action:
32
About Symantec
Symantec is a global leader in
providing security; storage and
systems management solutions
to help businesses and
consumers secure and manage
their information. Headquartered
in Cupertino, Calif., Symantec
has operations in 40 countries.
More information is available at
www.symantec.com.
For specific country offices and Symantec Corporation Copyright © 2009 Symantec Corporation. All rights reserved.
Symantec and the Symantec logo are trademarks or
registered trademarks of Symantec Corporation or its
contact numbers, please visit World Headquarters affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
our Web site. For product 20330 Stevens Creek Boulevard
information in the U.S., call Cupertino, CA 95014 USA
toll-free 1 (800) 745 6054. +1 (408) 517 8000
1 (800) 721 3934
www.symantec.com