Views:
Enable the Intrusion Prevention module and monitor network traffic for exploits using Detect mode. When you are satisfied with how your Intrusion Prevention rules are assigned, switch to Prevent mode.
Note
Note
CPU usage and RAM usage varies by your IPS configuration. To optimize IPS performance on the agent, see Performance tips for Intrusion Prevention.
For an overview of the Intrusion Prevention module, see Block exploit attempts using Intrusion Prevention.

Enable Intrusion Prevention in Detect mode Parent topic

Enable Intrusion Prevention and use Detect mode for monitoring. Configure Intrusion Prevention using the appropriate policies to affect the targeted computers. You can also configure individual computers.

Procedure

  1. Go to Computer or Policy editor Intrusion Prevention General.
  2. For Configuration, select either On or Inherited (On).
    editor-intrusion-pre.png
  3. For Intrusion Prevention Behavior, select Detect.
    Note
    Note
    For information on enabling Intrusion Prevention for containers, see Apply your intrusion prevention settings.
  4. Click Save.

What to do next

Tip
Tip
If the behavior settings are not available, Network Engine Mode may be set to Tap. (See Test Firewall rules before deploying them.)
For more fine-grained control, when you assign Intrusion Prevention rules, you can override the global behavior mode and configure specific rules to either prevent or detect. (See Override the behavior mode for a rule.)

Enable Auto Apply core Endpoint & Workload rules Parent topic

Procedure

  1. Switch Implement core Endpoint & Workload rules automatically to 'Yes‘,
  2. Click Save.

What to do next

Tip
Tip
Server & Workload Protection will assign all core Endpoint & Workload Rules to this computer whenever Rule Updates happens.
Note
Note
Manually unassigned core Endpoint & Workload Rules will remain unassigned after Rule Updates.
Note
Note
We recommend that you turn this feature on with Endpoint license, and turn this feature off and use Recommendation scans with Workload license.

Test Intrusion Prevention Parent topic

You should test that the Intrusion Prevention module is working properly before continuing with further steps.

Procedure

  1. If you have an agent-based deployment, make sure you have a computer that has an agent running.
  2. Turn off the Web Reputation module. In the Server & Workload Protection console, click Computers, then double-click the computer where you'll test Intrusion Prevention. In the computer's dialog box, click Web Reputation, and select Off. Web Reputation is now disabled and won't interfere with the Intrusion Prevention functionality.
  3. Make sure bad traffic is blocked. Still in the computer's dialog box, click Intrusion Prevention, and under the General tab, select Prevent. (If it is shaded, set the Configuration drop-down list to Inherited (On).)
  4. Assign the EICAR test policy. Still in the computer's dialog box, click Intrusion Prevention. Click Assign/Unassign. Search for 1005924. The 1005924 - Restrict Download of EICAR Test File Over HTTP policy appears. Select its check box and click OK. The policy is now assigned to the computer.
  5. Try to download the EICAR file (you can't, if Intrusion Prevention is running properly). On Windows, go to this link: http://files.trendmicro.com/products/eicar-file/eicar.com. On Linux, enter this command: curl -O http://files.trendmicro.com/products/eicar-file/eicar.com
  6. Check the Intrusion Prevention events for the computer. Still in the computer's dialog box, click Intrusion Prevention Intrusion Prevention Events. Click Get Events to see events that have occurred since the last heartbeat. An event appears with a Reason of 1005924 - Restrict Download of EICAR Test File Over HTTP. The presence of this event indicates that Intrusion Prevention is working.
  7. Revert your changes to return your system to its previous state. Turn on the Web Reputation module (if you turned it off), reset the Prevent or Detect option, and remove the EICAR policy from the computer.

What to do next

Apply recommended rules Parent topic

To maximize performance, only assign the Intrusion Prevention rules that are required by your policies and computers. You can use a recommendation scan to obtain a list of rules that are appropriate.
Note
Note
Although recommendation scans are performed for a specific computer, you can assign the recommendations to a policy that the computer uses.
For more information, see Manage and run recommendation scans.

Procedure

  1. Open the properties for the computer to scan. Run the recommendation scan as described in Manually run a recommendation scan.
    Note
    Note
    You can configure Server & Workload Protection to Automatically implement recommendations scan results when it is appropriate to do so.
  2. Open the policy to which you want to assign the rules, and complete the rule assignments as described in Manage the recommendation scan results.
    2016-07-08-000130-ds.png
    Tip
    Tip
    To automatically and periodically fine tune your assigned Intrusion Prevention rules, you can schedule recommendation scans. See Schedule Server & Workload Protection to perform tasks.

What to do next

Monitor your system Parent topic

After you apply Intrusion Prevention rules, monitor system performance and Intrusion Prevention event logs.

Monitor system performance Parent topic

Monitor CPU, RAM, and network usage to verify that system performance is still acceptable. If not, you can modify some settings and deployment aspects to improve performance. (See Performance tips for Intrusion Prevention.)

Check Intrusion Prevention events Parent topic

Monitor Intrusion Prevention events to ensure that rules are not matching legitimate network traffic. If a rule is causing false positives you can unassign the rule. (See Assign and unassign rules.)
To see Intrusion Prevention events, click Events & Reports Intrusion Prevention Events.

Enable 'fail open' for packet or system failures Parent topic

The Intrusion Prevention module includes a network engine that might block packets before Intrusion Prevention rules can be applied. This might lead to downtime or performance issues with your services and applications. You can change this behavior so that packets are allowed through when system or internal packet failures occur. For details, see Enable 'fail open' behavior.

Switch to Prevent mode Parent topic

When you are satisfied that Intrusion Prevention is not finding false positives, configure your policy to use Intrusion Prevention in Prevent mode so that rules are enforced and related events are logged.

Procedure

  1. Go to Computer or Policy editor Intrusion Prevention General.
  2. For Intrusion Prevention Behavior, select Prevent.
  3. Click Save.

What to do next

Implement best practices for specific rules Parent topic

HTTP Protocol Decoding rule Parent topic

The HTTP Protocol Decoding rule is the most important rule in the "Web Server Common" Application Type. This rule decodes the HTTP traffic before the other rules inspect it. This rule also allows you to control various components of the decoding process.
This rule is required when you use any of the Web Application Common or Web Server Common rules that require it. Server & Workload Protection automatically assigns this rule when it is required by other rules. As each web application is different, the policy that uses this rule should run in Detect mode for a period of time before switching to Prevent mode to determine if any configuration changes are required.
Quite often, changes are required to the list of illegal characters.
Refer to the following Knowledge Base articles for more details on this rule and how to tune it:

Cross-site scripting and generic SQL injection rules Parent topic

Two of the most common application-layer attacks are SQL injection and cross-site scripting (XSS). Cross-site scripting and SQL injection rules intercept the majority of attacks by default, but you may need to adjust the drop score for specific resources if they cause false positives.
Both rules are smart filters that need custom configuration for web servers. If you have output from a Web Application Vulnerability Scanner, you should leverage that information when applying protection. For example, if the user name field on the login.asp page is vulnerable to SQL injection, ensure that the SQL injection rule is configured to monitor that parameter with a low threshold to drop on.
Apply NSX security tags