Vector
Vector

Choose your topics

Blogs
What is Risk Management in Cybersecurity?

Let’s explore the essentials of risk management in the context of cybersecurity to help you understand how to identify, assess and mitigate cyber threats effectively.

Cyber Risk Management Enterprise Risk Management
Blogs
3 Best Practices for Data Privacy

With more technology comes more data, and with that a greater need for data privacy enforcement. What best practices should you be following?

Data Privacy
Blogs
How to Prioritize Your Third-Party Risks

How can you prioritize effectively and enhance your organization’s security posture? Here are our top tips for setting up realistic, sustainable processes.

Third-Party Risk Management GRC
Blogs
Top Tips to Save Time When Assessing Third-Party Risks

Is assessing third-party risks taking up too much of your time? How can you make the process more effective and efficient? Find out in the latest post from SureCloud.

Third-Party Risk Management GRC
Blogs
The GRC Trends to Look Out for in 2024

Our GRC experts at SureCloud share their 2024 predictions for the world of governance, risk and compliance.

GRC
Blogs
The Top 5 Challenges of Third-Party Risk Management

With the supply chain now seen as a legitimate attack path, what can your organization do? Let’s explore 5 challenges of TPRM and how to overcome them.

Third-Party Risk Management GRC
Blogs
What is Third-Party Risk Management?

What is third-party risk management and how should you approach it? Find out in this post.

Third-Party Risk Management GRC
Blogs
Questions You Should Ask when Preparing For Your First Pen Test

Understand the processes that you and your chosen pentest provider will travel through for your first pen test, from the initial point to the day the test starts.

Penetration Testing
Blogs
TPRM Blog 6-Writing Clear Questions

Our GRC Practice Director explores the importance of clear communication and how to achieve it in your third party questionnaires. Read more here.

Third-Party Risk Management GRC
Vector (7)
Vector-1
Cyber Security

Antivirus Advice – Scoping an enterprise AV solution

Antivirus Advice – Scoping an enterprise AV solution
Written by

Fenellarhodes

Published on

2 Oct 2016

Antivirus Advice – Scoping an enterprise AV solution

 
 

We are often asked for recommendations about the purchase and implementation of anti-virus (AV) software and, whilst we cannot provide a definitive product choice, we provide unbiased advice highlighting what to look for in an AV solution, as well as best practices for configuration.  In this blog post we’re going to look at the features we’d always recommend that your chosen AV solution should provide.

Tamper Protection

This feature prohibits users from making changes to the local AV configuration without first entering additional credentials (such as a password or additional administrative user credentials). Most configurations observed during penetration tests, over a wide variety of AV products, were found not to have tamper protection. Instead, only local administrative privileges were required for AV configuration changes to be made.  So a malicious user, who has obtained administrative access (either by exploitation, shared passwords, or other methods), could easily disable the AV software.

For instance, if AV is installed and operating on a Domain Controller and an attacker has obtained Domain Admin privileges yet the AV cannot be disabled or modified, then this greatly restricts the attacker’s ability to extract password hashes from the Domain without additional bypasses. However, if the AV product does not have tamper protection, the attacker is able to disable the services, possibly even remove the AV software altogether, and can continue post-exploitation attacks.

In some instances it is possible for an Administrative user to disable the antivirus on the host by stopping the services directly, essentially bypassing the Tamper Protection controls that are in place. Of course most organisations will consider that these user accounts should have full access to perform such tasks, however in the event of a system compromise, further restricting the Administrator account’s ability to disable these services directly will ensure that any malicious files are not transferable to the host.

Hardware Device Control

Another feature, often overlooked, is Hardware Device Control. Some endpoint AV software allows the creation of policies that can restrict the use of hardware such as USB storage, CD/DVD-ROM access, SD cards, etc.  The benefit here being that additional software does not need to be purchased, and can be centralised within the endpoint server. AV/endpoint products that have this feature would also include granular control over these devices, allowing restrictions based upon the Device ID or keywords.

Access to USB storage devices can be restricted using Windows Group Policies, however there are methods to bypass/remove these restrictions if users have administrative control of their devices.  Endpoint software that offers hardware device control (along with Tamper Protection) can even prevent local administrators from accessing external storage media.

Location-Based Policies

A great feature of policy deployment that is rarely seen is the ability to choose and deploy policies based upon the location of the device. As remote working has become the norm, it is imperative that IT departments enforce policies to control what users can/cannot do when outside the office.  For example, if end users require USB access whilst off-site, connected via VPN or working from home, then a more lenient policy may be in place. However, when the user is next on-site, a more stringent policy is applied.

Our next blog provides some unbiased advice on Antivirus (AV) configuration best practices.

Authored by Adam Govier, Security Consultant, SureCloud Penetration Testing Team