Saturday 23 May 2020


Scenario and theory based question on McAfee ePO


It’s very easy to learn theory related to any technology but, when we start working on it, we face issue related to it, if we are new in IT industry we find that theoretical knowledge is not enough, we need real work experience to deal with daily activity.

My this blog will explain what issue a new comer face while working on McAfee EPO and how they can deal with it. I focus more on day to related issue then the theoretical knowledge,   so let’s start.

What is  McAfee EPO server?

The McAfee ePO server is the central software repository for all McAfee product installations, updates, and other content.




1.    How to login in ePO?


Answer: there is mainly three type of login process
Type 1: To login in EPO server, you need to click on McAfee icon and EPO console will open where you need to enter user name and password.

Type 2: Open Browser and in search URL location you need to enter IP address of the server.

Example: if IP address of EPO server is 123.156.78.67 then you need to type URL like this.
https:// 123.156.78.67: 8443
After that you need to enter user name and password.

Type 3: Open EPO from server name: suppose the EPO server name is abcderf
Open browser in your computer and type the below URL
https:// abcderf:8443/
Here it’s important to enter port number: port 8443 which is inbound port used for console – to - application server communication.

2.    What is your EPO password?


Answer: EPO password depends on the user management password:

Type 1: The Admin of EPO will add your ID and will share you the user name and password for the EPO. This is called EPO authentication method

Type 2: If your ID is added by Windows authentication method in EPO then windows server password will synchronize with the EPO password and you need to login in EPO with windows password.

Type 3: certificate based authentication:  
User needs to authenticate digital certificate with browser and user can login without any password in the EPO.

3.    What is Amcore/Dat and how to check in EPO or server?


Answer: Amcore and dat contains set of known signatures of malware files.
Dat file is use with VSE (Virus scan enterprise) and Amcore is used with ENS (Endpoint Security)
 It’s very important that EPO have latest dat and Amcore, so that all machines connected to EPO must get latest dat and amcore file, but sometimes dat or Amcore not updated in EPO due to few issue.
Reason 1: Pull task failed the server task
Reason 2: Due to network issue.

Solution 1:
Step 1: Check connectivity with EPO server with McAfee server, you can test it by ping command.
Step 2: If pull take is configured run pull task,
menu -> master repository ->pull nowà select product (dat, Amcore)-à run

Solution 2
and download DAT Package. To download dat for McAfee ePO click on  DAT Package For Use with McAfee ePO under V2 section of table.
For AMcore download “DAT Package For Use with McAfee ePO  from V3 section of table.
Then open EPO and click on
 menu -> master repository -> Check in package à select package type à chose fileàNext à current package à save

How to apply policy on single system ?

Answer: To apply policy on single system first you make a new policy that you want to apply on the single machine. (If policy already there no needs to create new policy)
For ex:
Let take an example to disable the ENS firewall policy on a single machine, to do that first go to the policy catalog.  
Select Endpoint security Firewall from the Product
And select option from the category
You will see my default policy there Click on duplicate from the action section
Right the name of the duplicate policy and click ok
Now you can see new policy in policy catalog
Now click on that policy, and uncheck Enable firewall option
Then click on save.
We have created a policy for disable a Endpoint firewall policy now we need to apply this policy to a machine to do that go to systems tree option.
Apply Disabled firewall policy
Search machine in quick find
Select the machine
Click on Action -> modify policy on single systems.
Select product “Endpoint security firewall
Click on edit assignment under Action
In Assigned policy select the new policy that you created to disable the firewall. Assigned policy Assigned policy: Assigned policy: Break inheritance and assign the policy and settings below
And click on save. 

6.     What is threat report?


we can set Threat event notification email from EPO on daily basis we will check how many threats come on all the machines in one EPO, and in which how many we need to investigate so that we can protect our environment.

So we make a report on threats that came on all the machines in our environment on daily or weekly basis. It helps to identify all the types of attacks that came in our environment and how we make policy to protect our machines from such attacks or virus.  

7.     How to apply filter in system tree?


Answer: To fetch data from EPO we generally use query and report, but we can apply filter in System tree also to get data at limited extend.
Systems tree->systems
Preset->this group and all subgroup
Custom ->add
A new window will open; you can select property as per your requirement, 
for example:
Ex. If you want to select system names which are communicated in last week
Select last communication under available properties select last communication from Systems group.
Then select Is later than from last communication and select the date and time from the value. 

8.     How to apply filter in System Tree?



Answer: To fetch data from EPO we generally use query and report, but we can apply filter in System tree also to get data at limited extend.
Systems tree->systems
Preset->this group and all subgroup
Custom ->add
A new window will open; you can select property as per your requirement, for example:
Ex. If you want to select system names which are communicated in last week
Select last communication under available properties select last communication from Systems group.
Then select Is later than from last communication and select the date and time from the value.

9.     How to change policy on single system?

                               OR

How to disable ENS firewall on one machine


Answer: To apply policy on single system first you make a new policy that you want to apply on the single machine. (If policy already there no needs to create new policy)
For ex:
Let take an example to disable the ENS firewall policy on a single machine, to do that first go to the policy catalog.  
Select Endpoint security Firewall from the Product
And select option from the category
You will see my default policy there Click on duplicate from the action section
Right the name of the duplicate policy and click ok
Now you can see new policy in policy catalog
Now click on that policy, and uncheck Enable firewall option
Then click on save.
We have created a policy for disable a Endpoint firewall policy now we need to apply this policy to a machine to do that go to systems tree option.
Apply Disabled firewall policy
Search machine in quick find
Select the machine
Click on Action -> modify policy on single systems.
Select product “Endpoint security firewall”
Click on edit assignment under Action
In Assigned policy select the new policy that you created to disable the firewall. 

Assigned policy : Break inheritance and assign the policy and settings below


And click on save. 

10. How to remove outdated server tasks from the Server Task Log?

1.    Open the Server Task Log: select Menu → Automation → Server Task Log.
2.    Click Purge.
3.    In the Purge dialog box, enter a number, and then select a time unit.

4.    Click OK.

11.  Difference between client task and server task


Answer: server tasks - are ePO internal tasks. Depending on the task, some could run once a day, some runs multiple times in a day. It can include downloading latest updates, sending automatic email to helpdesk or administrators, replications, synchronizations with active directory etc. as you can see these do not affect your users / client systems. Some server tasks are built in but you may need to configure or create your own.
Client tasks - are what you run on user’s workstations. Most common is DAT update and when needed, you can upgrade products, for instance VSE 8.8 patch 7 to VSE 8.8 patch 8 upgrade, or deploying Site Advisor to client systems. You can of course remove a product which is also a type of client task. You need to define client tasks in the EPO client task catalog.
In EPO 5.10 we have a separate option of client task.

Client deployment tasks will cause ePO to "push" packages to clients. If network bandwidth is a concern, you should target a smaller batch of systems, tag them and schedule your tasks.



12. How to make policy for client task and server task?


Answer: For client task, take an example to make a policy to run scan on workstation:

Step 1: Make a group where you keep all the workstation for which you want to make task if you do not want to make a new group apply tag on all the workstations for which you want to make task

Step 2: Click Menu -> Client task catalog

Step 3: Select the product Endpoint security Threat prevention, under that costume on demand scan.

Step 4: Click on new task, and verify type of scan now, and click ok
A new windows will open here you enter name of policy and all the policy details like, do you want to scan boot sector or not, want to scan archive files  archive files or not. If you want to add files in exception add that in the exception list.

Step 5: Click on save.

Now we have created the rule.
Now we need to assigned that on which we want to scan, at what time
To do that, click on client task assignment.
Select the product from the top:
And apply the task rules
Here we want to apply only on work stations so go in tag section Send this task to only computers which have the following criteria  
Select has any of these tags option
From their select workstation tag
Select the time when you want to apply this task  
Example 2: take an example to make a policy to install ENS on all the workstation:

Read question 21

13.What is tag? How to create a new tag?


Answer: Tags allow users to create labels that can be applied to systems manually or automatically, based on the criteria assigned to the tag.

Types of tags:
There are two types of tags:
  • Tags without criteria - These tags can be applied only to selected systems in the System Tree (manually) and systems listed in the results of a query (manually or on a scheduled basis).
  • Criteria-based tags - These tags are applied to all non-excluded systems at each agent-server communication. Such tags use criteria based on any properties sent by agent. They can also be applied to all non-excluded systems on-demand.
To create new tag go
1.    Log on to the ePO console.
2.    Click Menu, Systems, Tag Catalog.
3.    In the Tag Catalog, click New Tag.
4.    Under Description, type a name and description, and then click Next.
5.    Under Criteria, select and configure the appropriate criteria, and then click Next.

Under Evaluation, select whether all systems are evaluated against the tag's criteria only when the Run Tag Criteria action is taken, or on every agent-server communication. Then click Next.
1.    Under Preview, verify the information about this page.

NOTE: If the tag has criteria, this page displays the number of systems that receive this tag when evaluated against its criteria.
 
2.    Click Save.
The tag is added to the list of tags on the Tag Catalog page.





14. If you are not able to login in the EPO and you are getting database related error? What steps you will take to resolve this issue?

Answer: Login in EPO server and check all EPO related services are running or not, it happens when event parse services gets stop.

If services are running find then check at network level.

15.You have created a new group in systems tree, how you will apply policy in that group from existing group? How to modify policy on single system?


Answer: First create a duplicate policy that you want to apply on any group.
Modify that as per your requirements.
Go in system tree
Select the machine on which you want to modify the policy
Click Action -> agent->modify policy on single System
Select product from the top

Click on the edit assignment on the policy that you want to edit
Select the policy that you have created
And save

Apply policy on a group.

Suppose you have made a group and you have moved few machines in that group. Now you want to apply policy on those groups. How we can do that?
First go in policy catalog and make policy for them by duplicating any existing policy

Then go in policy assignment group select the group that you have created by default it will inherit its parent policy so click on edit assignment and break inheritance and select the policy that you have created newly and click on save button 

16. Make a tag to install ENS

Answer: Read question 21


17. How to create a new supper agent?

Answer: First make a policy to create super- agent than apply that policy on that machine which you want to use as super- agent
Go to policy catalog
Productà agent
Select General from category
Make duplicate of default policy
Click on new policy that you just created
Click Super agent
Check convert agent to super agent
Now save

Apply this policy to the machine that you want to make super agent.

18. If McAfee agent is not communicating with EPO what steps you need to do ?

Answer: Ping that machine from the EPO
If it’s not working we need to check on machine
Check all services are running of that machine, if services where down check Microsoft events logs and try to find why services where down
Check agent is updated or not
Check ports 8081 8082 is open or not by using telnet command from the machine
Click on McAfee try icon -> McAfee Agent status monitor

1.      Right Click McAfee agent tray icon
2.      Click on McAfee Agent Status Monitor
3.      Click on Collect and Send Props
4.      Click On Check New Policies
5.      Click on Enforce Policies
6.      Wait for 2 mins and check if issue still occurs.

Check the log files is it showing any error or not
If everything is fine please reinstall the agent.

Even after that it’s not communicating read the logs of Threat prevention and agent you may get error.  

19. If one agent handler is down how you will check and what steps you will take to communicate it with EPO.

Answer: Check it is down or not if it is down then
Step 1:Login in agent handler server setting and check all services are running or not, if any service is down restart that service, “ and investigate why that service was down to check that,
Step 2: Check event logs in mcafee EPO, and Microsoft events logs
Step 3: Check ports by using telnet command,

20. How to Check- in ENS new updated product or patch in EPO

Answer: Download setup file from support.mcafee.com
Step 1: MenuàSoftwareà master rePOsitory-> check in à select product or update option  -> select the product  from the browser -> next
New here you need to select current ( if you are doing for testing select evaluation) and save.

Step 2: Now we need to make task to install on all the machines
Menuà Client taskàclients task Assignment à Create New task à from product select McAfee agent àtask type à product deployment à click on create new task à write the name of task à -à select target platform à select the product components you want to install à save

Step 3: Assign the task.
clients task Assignment à from product select McAfee agent àtask type à product deployment à Now select the schedule type, effective period… etc à save.

Note: If you want to install ENS just by Using Tag then select “ has any of these tags” from tag.Has any of these tags Has any of these tags


22.How to Create and download agent installation package


Answer: Click on New Systems in the systems tree
Select Create URL for client-side agent download
Click OK
You will get a URL

You just need to share it with user and user can download agent from the URL.

23. How to configure and install agent handler? Add agent handler in EPO. Explain in details.

Answer: Download agent handler setup from Support.mcafee.com In this example I will install agent handler in the same server that we are using for EPO.  
To download agent handler you can download mcafee EPO setup because EPO package contacts mcafee agent setup also

Run the setup file of agent handler where setup file type will be application.

Steps :
Click on Next à select language à accept agreement àSelect location à next

Enter IP of EPO server
EPO server PORT :9443
Admin user Name
Admin password

Now we need to enter windows authentication or SQL Authentication

Then click on nextà install
 Click on finish
Now we have install agent handler

Login in EPO
Menu à configuration à agent handler
Here you can see the agent handler that you have install

Now if you want to allow the user to access agent handler by public internet.

Click on Menuà configuration à agent handler à New assignment
Write the name

In agent criteria select System tree location

After that select agent priority as per your requirement (if you will select all agent handlers then all agent handlers will have same priority) OR you can customize handle list where you can give priority of agent handler.

Now go to system tree then click on new systems.
Here if you have to make a setting in such a way that user first downloads the agent from the agent handler and if it gets failed then download from EPO

  Click on new systems in system tree then
Select “Create and download agent installation package” from “How to add systems
And from “assign to agent handler
You can define selected Primary agent handler or secondary agent handler

Now save 

24. Difference between Adaptive Threat prevention and Threat prevention.

Answer:  McAfee Advanced Threat Defense provides these features.
·         Detection of file downloads — Detects when a user tries to download a file from an external resource.
·         Analysis of the file for malware — verifies if the file contains any known malware.
·         Block future downloads of the same file — Prevents future downloads of the file or its variants if the file is found to be malicious.
·         Identify and remediate affected hosts — identifies the host that executed the malware, and also detects the hosts to which it has spread. Then, Advanced Threat Defense shares the report with your other security products. This allows you to quarantine the affected hosts until they are clean.
·         Local blacklist — Checks for a known malware using a local blacklist.
·         Cloud-lookups — Integrates with the McAfee® Global Threat Intelligence™ (McAfee GTI) to detect malware that has already been identified by organizations throughout the globe.
·         Emulation capabilities — Integrates with McAfee® Gateway Anti-Malware Engine for emulation capabilities.
·         Signature-based detection — Includes the McAfee® Anti-Malware Engine for signature-based detection.
·         Sandboxing capability (Dynamic analysis) — Analyzes the file by executing it in a virtual sandbox environment to determine whether the file is malicious.


Overview of Threat Prevention
McAfee Endpoint Security Threat Prevention prevents threats from accessing systems, scans files automatically when they are accessed, and runs targeted scans for malware on client systems.
Endpoint Security Threat Prevention detects threats based on security content files. Security content updates are delivered automatically to target specific vulnerabilities and block emerging threats from executing.
Threat Prevention protects your environment from the following:
  • Viruses, worms, and trojan horses
  • Access point violations
  • Buffer overflow exploits
  • Illegal API use
  • Network intrusions
  • Potentially unwanted code and programs
  • Vulnerability focused detection
  • Zero-day exploit detection

You use McAfee ePO to deploy and manage Threat Prevention on client systems.

25. Explain modules of ENS.

Answer: Endpoint Security consists of these security modules:
·         Threat Prevention — Prevents threats from accessing systems, scans files automatically when they are accessed, and runs targeted scans for malware on client systems.
·         Firewall — Monitors communication between the computer and resources on the network and the Internet. Intercepts suspicious communications.
·         Web Control — Monitors web searching and browsing activity on client systems and blocks websites and downloads based on safety rating and content.
·         Adaptive Threat Protection — Analyzes content from your enterprise and decides how to respond based on file reputation, rules, and reputation thresholds. Adaptive Threat Protection is an optional Endpoint Security module.
Apart from this there ENS platform that suppose all this products

26. What are the different types of scanning in McAfee?

Answer: The on-demand scan detection list is cleared when the next on-demand scan starts.
On demand can be  Full Scan and Quick Scan 
1.    The on-demand scanner uses the following criteria to determine if the item must be scanned:
o    The file extension matches the configuration.
o    The file hasn't been cached, excluded, or previously scanned (if the scanner uses the scan cache).
If the file meets the scanning criteria, the scanner compares the information in the item to the known malware signatures in the currently loaded AMCore content files.

·         If the file is clean, the result is cached, and the scanner checks the next item.
·         If the file contains a threat, the scanner responds with the configured action.
For example, if the action is to clean the file, the scanner:
a.     Uses information in the currently loaded AMCore content file to clean the file.
b.    Records the results in the activity log.
c.     Notifies the user that it detected a threat in the file, and includes the item name and the action taken.


How on-access scanning works

The on-access scanner examines files as the user accesses them, providing continuous, real-time detection of threats.
The scanner uses this criteria to determine whether to scan an item:
·         The file extension matches the configuration.
·         The file information isn't in the global scan cache.
·         The file hasn't been excluded or previously scanned.

Read scan

When Read scan is selected and an attempt is made to read, open, or execute a file:
1.    The scanner blocks the request.
2.    The scanner determines whether the item must be scanned.
o    If the file doesn't need to be scanned, the scanner unblocks the file, caches the file information, and grants the operation.
o    If the file needs to be scanned, the scan engine scans the file, comparing it to signatures in the currently loaded AMCore content file.
§  If the file is clean, the scanner unblocks the file and caches the result.
§  If the file contains a threat, the scanner denies access to the file and responds with the configured action.
For example, if the action is to clean the file, the scanner:
a.     Uses information in the currently loaded AMCore content file to clean the file.
b.    Records the results in the activity log.
c.     Notifies the user that it detected a threat in the file, and prompts for the action to take (clean or delete the file).

Write scan

The scanner examines the file only after it is written to disk and closed. When write scan is selected and a file is written to disk:
1.    The scanner determines whether the item must be scanned.
a.     If the file doesn't need to be scanned, the scanner caches the file information, and grants the operation.
b.    If the file needs to be scanned, the scan engine scans the file, comparing it to signatures in the currently loaded AMCore content file.
§  If the file is clean, the scanner caches the result.
§  If the file contains a threat, the scanner responds with the configured action.
The scanner doesn't deny access to the file.



How the script scanner works

The Threat Prevention script scanner intercepts and scans scripts before they are executed.


27.Difference between high risk and low risk scanning ?


Answer: Scan on read is enabled on high risk scanning but in low risk scanning scan on read is disabled. 

28.What steps you will take when a virus attack will take place in your environment ?


Answer: Isolate the machine from the network.
Run full scan on the machine.
Check log files. (threat events log)
If any file not deleted or clean by AV please investigate that file.
Check source and destination machines related to that event
Do more investigating on that file from your side on internet
File source destination and other machines involved in that investigate those machines also
Also check files in quarantine in sand box in AV
Collect the sample file and submit with vender
If extra dat is related check in that in EPO after testing.

If AV is not able to clean that file reimage that machine.

29. Difference between ATP and TIE and Active response and ATD and Threat prevention ?

Answer:
ATP:
Adaptive Threat Protection. McAfee Endpoint Security Adaptive Threat Protection (ATP) analyzes content from your enterprise and decides what to do based on file reputation, rules, and reputation thresholds. ... Configure queries, reports, and dashboards to monitor threat activity within your environment.

TIE:
McAfee Threat Intelligence Exchange (TIE) provides a framework personalized to your environment where your security products collectively pinpoint threats and act as a unified threat defense system.

ATD:
McAfee® Advanced Threat Defense enables organizations to detect advanced, evasive malware and convert threat information into immediate action and protection. Unlike traditional sandboxes, it includes additional inspection capabilities that broaden detection and expose evasive threats

McAfee Active Response 
McAfee Active Response delivers continuous detection of and response to advanced security threats to help security practitioners monitor security posture, improve threat detection, and expand incident response capabilities through forward-looking discovery, detailed analysis, forensic investigation, comprehensive ...


(DXL)
The Data Exchange Layer (DXL) communication fabric connects and optimizes security actions across multiple vendor products, as well as internally developed and open source solutions. Enterprises gain secure, real-time access to new data and lightweight, instant interactions with other products.
Threat Prevention protects your environment from the following:
·         Viruses, worms, and trojan horses
·         Access point violations
·         Buffer overflow exploits
·         Illegal API use
·         Network intrusions
·         Potentially unwanted code and programs
·         Vulnerability focused detection
·         Zero-day exploit detection
·         Access Protection — Protect against unwanted changes to client systems by restricting access to specified files, shares, registry keys, registry values, and preventing or restricting processes and services from executing threat behavior.
·         Exploit Prevention — Threat Prevention uses signatures in content updates to protect against these exploits:
o    Buffer Overflow Protection — Stop exploited buffer overflows from executing arbitrary code.
o    Illegal API Use — Protect against malicious API calls being made by unknown or compromised applications running on the system.
o    Network Intrusion Prevention (Network IPS) — Protect against network denial-of-service attacks and bandwidth-oriented attacks that deny or degrade network traffic.
o    Expert Rules — Provide additional parameters and allow more flexibility than the Access Protection custom rules. But, to create Expert Rules, you must understand the McAfee proprietary syntaxes.
Detect threats when they occur in your environment using these Threat Prevention features.
·         On-Access Scan — Scan for threats as files are read from, or written to, disk. Run scans only when the system is idle. Integrates with Antimalware Scan Interface (AMSI) to provide better enhanced scanning for threats in non-browser-based scripts.
·         On-Demand Scan — Run or schedule predefined scans, including scans of spyware-related registry entries that weren't previously cleaned.
·         Potentially Unwanted Programs — Detect potentially unwanted programs, such as spyware and adware, and prevent them from running in your environment.
·         Quarantine — Quarantine infected items, attempt to clean or repair them, or automatically delete them.
·         Dashboards and monitors — Display statistics about Threat Prevention, including scan duration, content update status, and applications with the most exploits.
·         Queries and reports — Retrieve detailed information about Threat Prevention, including threat count, scan completion, detection response, false positive mitigation events, and McAfee GTI sensitivity level.

·         Early Load Anti-Malware — Provide support for the ELAM feature included with Windows 8 and later releases. ELAM collects the list of device drivers loaded during the boot cycle and scans them once the scanning services are running.

30. How to block multiple hash in ATP ?


Answer: 1. In McAfee ePO, select Menu Systems TIE Reputations.
2. Click the File Overrides or Certificate Overrides tab.
3. From the Actions menu, select Import Reputations.

4. In the Import Reputations dialog box, specify whether to import an XML file with one or more reputations, or a single reputation.


<?xml version="1.0" encoding="UTF-8"?>
<TIEReputations>
<FileReputation>
<FileName>HackIt.exe</FileName>
<SHA1Hash>0x98AF3632E17677A8A23739F720B1A2F215CB8836</SHA1Hash>
<MD5Hash>0xDEF30CBEA881149C2AFFDF9A059FB751</MD5Hash>
<SHA256Hash>0xEF127619BAC9E6790FBC925C339111806DA71FAA0CFA0A1E630BEF32B8B1DF91</SHA256Hash>
<ReputationLevel>15</ReputationLevel>
</FileReputation>
<FileReputation>
<FileName>trayMan.dll</FileName>
<SHA1Hash>0x7F618396A910908019B5580B4DA9031AF4A433CA</SHA1Hash>
<MD5Hash>0xB2B3DAE040F6B5AE1DF52B0CD7631A18</MD5Hash>
<SHA256Hash>0xAF37EBACF8697B55A82E5FA0D742E65ABE0953BA6B09EABA6B35B5B1958F37EC</SHA256Hash>
<ReputationLevel>15</ReputationLevel>
<Comment>Comment for ALTTAB</Comment>
</FileReputation>
</TIEReputations>

Certificate reputations
For each certificate, include its SHA-1 hash and Public Key SHA-1 values in hexadecimal encoding. Include the certificate name to
Identify it in reports.



Setting Numeric value

Known trusted installer
100 All files created by that file are trusted.

Known trusted
99 It is a trusted file or certificate.

Most likely trusted
85 It is almost certain that the file or certificate is trusted.

Might be trusted
70 It seems a benign file or certificate.

Unknown
50 The reputation provider has encountered the file or certificate before but the provider

Might be malicious
30 It seems a suspicious file or certificate.

Most likely malicious
15 It is almost certain that the file or certificate is malicious.

Known malicious

1 It is a malicious file or certificate.

Not Set 0 The file or certificate's reputation hasn't been determined yet.

Not Available — The reputation provider hasn't been queried about the specific item. This reputation label also appears for disabled reputation providers or providers with pending reputation reports.

1 comment: