SANGFOR NGAF V8.0.47 Associate 2022 07 Server Security
SANGFOR NGAF V8.0.47 Associate 2022 07 Server Security
SANGFOR NGAF V8.0.47 Associate 2022 07 Server Security
47 Associate
Server Security
1 Server Protection
3 DLP
5 Ransomware Protection
1. The feature of get is that the submitted content is directly displayed in the URL column after URI
encoding.
2. The feature of post is that the submitted content will not be directly displayed in the URL part, but in the
data field of the post packet.
Web App Protection
DLP:
The information disclosure vulnerability is due to the improper handling of some special files. By accessing
these files or paths, some sensitive information of the web server such as username, password, source code,
server information and configuration information, can be disclosed.
Common data leaks include:
1. Application error information disclosure
2. Leakage of backup file information
3. Web server default page information disclosure
4. Information disclosure of sensitive documents
5. Directory information disclosure
• Anti-scanning
• FTP, HTTP application
hiding
• Hide specified fields in
HTTP response header
• Replace server error
page
• Replace request error
page
• Prevent against password cracking threats NGAF only detect, don’t deny.
For some of the maintenance of the sub directory on the server, you
can protect them to prohibit user access. For some URL denied by
NGAF WAF, you can add here to allow them.
URL directory only support up to the 3 directory, if more than 3
directory must be written on the full path of the URL.
Filter the file type that the client upload to the server
Web App Protection
HTTP Request Anomaly
There are some abnormal request
protections for HTTP server.
Request Method:
HTTP defines a set of request methods to
indicate the desired action to be performed
for a given resource. Two commonly used
methods for a request-response between a
client and server are: GET and POST.
Some of others may be potential risk for
Web server, like delete, move, etc.
Web App Protection Configuration Ideas
1. Go to Objects > Security Policy Template > Web App Firewall, add a new web application protection policy
template.
2. The Port select the default. If the web server uses non-standard port 80, fill the corresponding port into the
HTTP option.
3. Protection Features select all, other by default.
4. Go to Policies > Network Security Policy > Policy for Server Scenario, add a server protection policy and
reference the Web App Policy template.
5. The Source Zone select the external network zone, and select ALL for the source IP group.
6. The Destination Zone select the zone where the server is located, and the destination IP selects the server IP
group to be protected.
7. Action, Local DNS Server Exists, Log event are depending on the situation. (The Local DNS Server function
will be introduced separately in the following chapters)
Note: If traffic are HTTPS, Encryption must be configured in order to decrypt HTTPS packets.
Web App Protection - Configuration Demonstration
1. Access to Objects > Security Policy Template > Web App Firewall, add a new web application policy
template.
2. Access to Policies > Network Security Policy Policy for Server Scenario, add a server protection
policy and reference the Web App Policy template.
Web App Protection - Logs
Go to Monitor > Security Log, and click on View to check the details log.
Web App Protection - Misjudgment
Method 1: Add URL parameters in Policies > Network Security Policy > Advanced. After exclusion, the
web application protection will skip the detection of these parameters. It is mainly used in the case that some
request parameters are detected as attacks due to carrying special strings in normal business production. It can
be excluded only for these parameters.
Web App Protection - Misjudgment
Method 2: Query the log in Security Logs, find out the misjudgment log and then click Exclude to excludes
the false positive rules detected by the web.
Web App Protection - Misjudgment
If need to cancel the exclusion of misjudgment, you can edit it in the following interface to cancel the
exclusion.
3. DLP
DLP
Scenario:
1. Finance : Traffic of normal user can’t contain No. ATM , No. HP , No.IC
2. ISP : Not allow a lot of email address in HTTP traffic
3. Normal user: Allow certain file format to be download
WAN LAN
3. Verification pass
server: 172.17.1.10
WAN LAN
server: 172.17.1.10
Server Access Verification
Server verification settings
Server Access Verification
A verification page will pop up after Accessing.
Submit your
email address.
1. The server file is encrypted. For example, it is encrypted into a .java suffix or other strange
suffix name, and the desktop prompts that you need to pay a bitcoin ransom to an account. If
you do not pay, the file will never be available, as shown in the following figure:
Ransomware Protection
What is Ransomware?
2. Many hosts on the intranet are experiencing blue screens. The code of the blue screen
indicates that there is a problem with the srv.sys driver, as shown in the following figure:
Note:
Many host blue screens on the intranet is usually a variant type of ransomware virus, which has a strong
spread.
Ransomware Protection
Impacts of Ransomware
Ransomware can cause tremendous impacts that can disrupt business operations and
lead to data loss. The impacts of ransomware attacks include:
Loss or destruction of crucial information
Business downtime
Productivity loss
Business disruption in the post-attack period
Damage of hostage systems, data, and files
Loss of reputation of the victimized company
Ransomware Protection
Protection Against Ransomware
1. Reinforcement in advance: Ransomware risk assessment, accurate assessment of
the risk of ransomware entry points, configuration of special strategies for
ransomware, and comprehensive protection of ransomware risks.
3. Post-event quick response and disposal: Isolate and identify the host that has
been compromised and use special tools for anti-virus.
Ransomware Protection
The principle of ransomware infection
1. First, hacker will perform password brute force cracking through SMB and RDP port. It is the
port that ransomware commonly used. Besides, the hacker will exploit the vulnerabilities of server
and the ransomware will try to find a way to infect the host.
2. After the host in infected by ransomware, the ransom process will be executed in the host. At the
same time, the hacker will manually use SMB or RDP to spread the ransomware in order to get
more host infected.
3. When the ransomware process runs on one or more host, the ransomware will search through
local disk and will encrypt a specific file type. Encrypted file will not be able to read.
4. It will prompt a ransom message to the victim of the computer which has been infected by
ransomware. Besides, it also require the victim to make payment by using bitcoin within a period
of time in order to recover the encrypted data, or else the ransom will be double or will not decrypt
the encrypted file.
5. Normally the encrypted data is not able to decrypt by itself because ransomware is using strong
encryption method which makes the victim unable to decrypt the encrypted data if the victim does
not have private key.
Ransomware Protection
The value of NGAF in Ransomware protection
(1) Risk assessment of ransomware, accurately assessing the risk of entry points of
ransomware.
(2) Special protection configuration for ransomware, comprehensive protection
against ransomware risks.
(3) Special blackmail protection area, visual recognition and rapid handling of
blackmail risk.
Ransomware Protection
Reinforcement In Advanced
Sort out the exposure of assets and block the entry points of ransomware. Identify common ports of
ransomware, common vulnerabilities of ransomware, weak passwords in advance and give corresponding
treatment suggestions.
Ransomware Protection
Defense In Event
1. The special protection policy for ransomware is automatically generated to comprehensively protect
against ransomware hacker attacks. Configuration path: SOC > Specialized Protection > Ransomware
Protection.
2. Through in-depth detection of intrusion methods through security policies, against covert ransomware
attacks, and comprehensive intrusion defense against ransomware viruses through web application
protection, vulnerability protection, content security, and slow blasting detection, the ransomware can be
further analyzed according to the log display of ransomware analysis. Detailed analysis
Ransomware Protection
Post-event Response and Disposal
1. Correlate with ES to detect and scan, quarantine lost assets and quickly dispose of ransomware.
192.200.19.0/24
following functions: 192.168.0.2/24
GW: 192.200.19.1
192.168.1.0/24
GW: 192.168.1.1
Security Protection Case Study
Detailed Requirements
1. For Clients
(1) Forbid to play games at working time;
(2) Forbid to access the porn, drugs, malicious websites;
(3) Detect the HTTP, FTP, SMTP, POP3, IMAP protocol, to prevent internal network users infected
by the virus;
(4) Do intrusion detection on users’ traffic, to prevent attackers using the existing loopholes in the
client or implanted Trojans, backdoors in the intranet computer and other attacks.
2. For Servers
(1) Hide the version information of the server;
(2) Prevent server from SQL injection, XSS, CSRF, system command injection attack and so on.
Security Protection Case Study
1. Network configuration
1.1 Interface Configuration
Path: Network > Interfaces
Security Protection Case Study
1.2 Routing Configuration
Path: Network > Routing
Security Protection Case Study
2. Objects
2.1 Network Objects
Path: Objects > Network Objects
Security Protection Case Study
2.2 Schedule
Security Protection Case Study
3. NAT
Security Protection Case Study
4. Application Control
Security Protection Case Study
5. Policy template Path: Object > Security Policy Template > Content Security
Security Protection Case Study
WAF
Path: Objects > Security Policy Template > Web App Protection
Security Protection Case Study
Path: Objects > Security Policy Template > Intrusion Prevention
IPS(Use the default template) APT (Use the default template)
Security Protection Case Study
6. Network Security Policy
6.1 Internet access scenario
Path: Policies > Network Security Policy > Policies
Security Protection Case Study
6.2 Server Scenario
Path: Policies > Network Security Policy > Policies
Thank you !
[email protected]
www.sangfor.com