Security Analytics 7.2.1.43768 Release Notes
Total Page:16
File Type:pdf, Size:1020Kb
Security Analytics 7.2.1 Release Notes Version: 7.2.1.43768 Software Release Date: 4 August 2016 Document Revision: 1.7 on 24 February 2017 Blue Coat Security Analytics is a sophisticated network security device that delivers full network visibility, advanced network forensics, and real‐time content inspection for all network activity. IMPORTANT In Security Analytics 7.2.1 many features from earlier versions have been significantly retooled. When you upgrade to 7.2.1 from an earlier version, this information will not be automatically preserved: Saved reports ThreatBLADE‐related reports, alerts, CMC VPN and sensor entries actions, and favorites (including ThreatBLADE favorites customized by Child alerts from Local File Analysis support services); remote notification, Customized alert thresholds and URL unknown protocol, and endpoint protocol Analysis verdict mappings settings Unmodified default actions and favorites Credentials and settings for third‐party Custom favorites and actions created via reputation providers such as FireEye and the CMC Lastline The Default Summary view Some RBAC settings for user groups Data‐enrichment file‐type filter settings Actions associated with discontinued Customized YARA rules and custom providers (Bit9, NormanShark, Lastline hashes in Solera HashDB Hash, Local File Analysis) To preserve the information you can and transfer it to version 7.2.1, go to "Installation and Upgrades" on page 18. Release Notes Contents "Additional Features Since 7.1.0" on page 2 "Installation and Upgrades" on page 18 "New in Security Analytics 7.2.1" on page 3 • "CMC Upgrade Instructions" on page 23 • "Security Upgrades" on page 13 "Known Issues" on page 25 "Fixes" on page 15 • "Known CMC Issues" on page 25 • "CMC Fixes" on page 17 • "Discontinuation" on page 25 "Resources" on page 26 1 of 29 Security Analytics 7.2.1 43768 Release Notes Additional Features Since 7.1.0 Since the release of Security Analytics 7.1.0, the following features and improvements were added in 7.1.x maintenance releases: New and enhanced enrichment providers: • Endpoint analysis such as EnCase° Cybersecurity by Guidance° Software •YARA rules, including user‐defined •Provider selection for Local File Analysis •FTP File Mover option for e‐mail attachments only •Customized pivot‐only reputation providers •Login Correlation Service support for Windows 2012 Server DC •More precise WebThreat BLADE alerting •Remote notification of ThreatBLADE alerts •Malware Analysis improvements: .SandBox profile prioritized for parallel tasks .Sample sent once, even with multiple profiles .Child files of ZIP archives displayed with parent .Android APK file support .Faster verdict returns .Direct link to task from the alert .Feedback on new malware returned to Blue Coat Global Intelligence Network Improved PCAP downloader: backgrounding, remote‐path save Alert filtering by import_id Data‐enrichment jobs displayed on the capture summary graph Transition from packet‐based reporting to flow‐based reporting Report performance improvement GRE encapsulation detection SSL Serial Number, Machine ID, Tunnel Initiator, and Tunnel Responder reports Stop Report and Stop Extraction buttons Combined reindexing with reprocessing Signature‐based and protocol‐based extraction options Fuzzy‐hash calculation for real‐time extraction Telnet‐session extraction Heartbleed‐detection alerts and reports Support for LDAP anonymous bind Authenticated proxy support, including certificate handshake Self‐encrypting disk (SED) support to protect data at rest 2 of 29 New in Security Analytics 7.2.1 New in Security Analytics 7.2.1 From a new landing page to a wholly re‐imagined and rebuilt data‐enrichment process to dynamic capture filters and selectable capture profiles, this major release of Security Analytics provides exciting new features to assist in forensic investigations. "Alerts Management Dashboard" on page 4 "Anomaly Detection" on page 4 "Data Enrichment" on page 5 • "Real-Time Enrichment Providers" on page 5 ."Blue Coat Intelligence Services" on page 5 ."Blue Coat Analysis Providers" on page 6 ."Local File Analysis" on page 6 ."Indicators" on page 7 ."Rules" on page 8 • "File-Type Filters" on page 7 • "Real-Time Extraction" on page 7 "Data Enrichment Profiles" on page 9 "Dynamic Filters" on page 9 "Reports" on page 10 • "Report Status Pages" on page 10 • "New Reports" on page 10 ."Additional Metadata" on page 11 ."SCADA Reports" on page 11 ."Encapsulation Reporting" on page 11 • "Filters" on page 11 • "Extractor" on page 12 ."Artifact Preview" on page 12 "Command-Line Utilities" on page 12 "Web UI and More" on page 12 "New on the Central Manager Console (CMC)" on page 13 "Security Upgrades" on page 13 • "Remote Access" on page 14 • "Role-Based Access Control" on page 14 3 of 29 Security Analytics 7.2.1 43768 Release Notes Alerts Management Dashboard Analyze > Alerts As the new default landing page, the Alerts Management Dashboard provides immediate visibility into the current state of network traffic. Read More: In the Help Files under Alerts Management Dashboard. Important: Upgrading to version 7.2.1 from earlier versions has a significant impact on alerts. Before attempting to upgrade to 7.2.1, review the "Upgrade Instructions" on page 18 to avoid losing data and settings. Anomaly Detection Analyze > Anomalies Anomaly Detection provides visibility into abnormalities in your traffic patterns. By evaluating traffic in 10‐minute analysis windows, Anomaly Detection determines which traffic is normal for your network and then creates alerts for outlier network behavior. A mere six hours after Security Analytics 7.2.1 begins to capture traffic, the anomaly detector has established a baseline and will begin to report anomalies. 4 of 29 New in Security Analytics 7.2.1 From an individual anomaly alert, you can pivot to the new Anomaly Investigation summary view for immediate insight into which traffic triggered the alert—then drill down into more specific data through the reports). You can also send the anomaly data to a remote resource for further analysis. Read More: In the Help Files under Data Analysis > Anomaly Detection. Note: Anomaly detection requires an appliance or VM with at least 64GB RAM to function properly. Less memory will result in degraded performance and missed anomalies. To disable anomaly detection, see "Data Enrichment Profiles" on page 9. Data Enrichment The Security Analytics data‐enrichment subsystem has undergone a comprehensive rewrite so that you can deploy the enrichment providers more independently, in terms of both configuration and prioritization. The new system also provides improved data‐enrichment performance and scalability. Important: Upgrading to version 7.2.1 from earlier versions has a significant impact on data‐ enrichment features. Before attempting to upgrade to 7.2.1, review the "Upgrade Instructions" on page 18 to avoid losing data and settings. Real-Time Enrichment Providers Settings > Data Enrichment Traffic that matches the filters in a rule (formerly: “action”) can be sent to one or more real‐time enrichment providers to get a prompt verdict. All of the real‐time enrichment providers can be selected individually for any rule—default or user‐ defined—using any set of filters that you specify. Blue Coat Intelligence Services The functionality of the ThreatBLADES has been consolidated into two Blue Coat Intelligence Services: File Reputation Service—The SHA256 hashes of files that match a rule are sent to the Blue Coat Global Intelligence Network (GIN), which returns a verdict based on the file‐reputation information from more than 15,000 customers and 75 million endpoints that contribute to GIN’s threat intelligence, which includes: •A black list of 3.5 billion file hashes • Additional black and white lists from three major security organizations •Malware Analysis detonation results from the field •Research results from Blue Coat Labs 5 of 29 Security Analytics 7.2.1 43768 Release Notes Web Reputation Service—The URLs that are associated with artifacts that match a rule are sent to GIN, which returns one or more URL categories that Security Analytics evaluates for threat level. Read More: In the Help Files under Data Enrichment > Enrichment Providers > Intelligence Services. Blue Coat Analysis Providers ICAP—Send ICAP service objects to Blue Coat Content Analysis. Malware Analysis—No longer dependent on ThreatBLADES for real‐time enrichment, Malware Analysis can operate in conjunction with—or independently of—the File Reputation Service. •With the FRS Prefilter setting (enabled by default) you can get a verdict on files that are already known to the File Reputation Service without sending them to Malware Analysis. •With the default per‐environment task settings available in Malware Analysis 4.2.x, you can select iVM plugins such as ghost_user.py to apply to samples sent from Security Analytics. •Samples sent to Malware Analysis retain their original filenames. •New file types are sent to Malware Analysis: BAT, COM, DEB, PS1, IPA •Malware Analysis now supports iOS (IPA) in the Mobile IntelliVM. Read More: In the Help Files under Data Enrichment > Enrichment Providers > Analysis Providers. Local File Analysis As separated entities that you can select for real‐time enrichment, Local File Analysis comprises five providers. Important: Upgrading to version 7.2.1 from earlier versions has a significant impact on Local File Analysis providers. Before attempting to upgrade to 7.2.1, review the "Upgrade