Symantec™ Threat Isolation Platform Guide for Administrators
Total Page:16
File Type:pdf, Size:1020Kb
Symantec™ Threat Isolation Platform Guide for Administrators Version 1.14 August 2020 Guide for Administrators - Revisions Version Date New/Enhanced Features 1.14 August 2020 n Regional Cloud Document Isolation Server n Localization of end user messages n PAC File Security using Zone Internal Settings n HSM Integration n Activity Log Forwarding to Amazon S3 n Log export verbosity level setting n Management portal location change n Deleting Logged Data t Automatic log purging t Manual deletion of Activity / Audit /Event log index files n Monitoring the Management Audit Logs Service n Licensing - license entitlements view n Matching rule using destination port criteria n Selective forwarding based on hostname or URL n Selective Isolation in online service suites t Option to isolate some online services included in online service suites. t Ability to customize the list of suite service URLs n Logging Server Authentication steps n New content action - Altered n RADIUS MFA and Password Complexity n Downstream proxy object - support forwarding of custom headers Symantec™ Threat Isolation Platform Guide for Administrators Page 2 Version Date New/Enhanced Features 1.13 September 2019 n Bandwidth Usage Reduction n Browser's Native Menu Support n Data Criteria Matching in Request Body n Data Leakage Prevention Server Settings integrated in Upload Profile Scan Settings n Document Isolation Actions Policy n Exporting Activity Logs Analytics and Narrow By Filter Results to PDF n Gateway Cluster Time Zone Selection n Geolocation Destination Match Criteria n Isolation Policy for iframes n Inspect Advanced Settings in Download and Upload Profiles n Isolation Indication Custom Color n Keytab Settings Workflow Modifications n Management Users "Terms of Use" Page n Media Quality - Controlling Audio, Video and Image Settings n Mobile Browser Rendering Support n Multiple Organizations n Native Context Menu Support n Prompting End User Before File Download n Request Filters Data Criteria n Rule Editing New Capabilities n SAML Authentication in Management Users n Session Activity Settings n Symantec Cynic Sandbox n Website Subresources Policy in Rule Advanced Settings 1.12 December 2018 n Authentication Connectivity Improvements n Block Page Integration n Clear Authorization Claims n Cloning Objects n Convenient Activation of Report Server n Customized List of URLs in VRM for Grid Rendering n Doc Isolation Viewer: Open File in New Tab n Email Threat Isolation (ESS/SMG) n Enhanced Granularity for Download Scanner Settings n Media Quality n Read-Only Enhancements n Symantec AV Support n Votiro v3.0 Support Symantec™ Threat Isolation Platform Guide for Administrators Page 3 Version Date New/Enhanced Features 1.11 September 2018 n Anti-Bot Protection n Customized Text for Untrusted Certificate Message n Gateway Audit Logs n Management Identity Providers n Management Roles n On-premises Document Isolation Server n SNMP Servers n Trusting Only Imported Certificates 1.10 April 2018 n Application Destination n Downstream Proxy n Easy Gateway Registration n Licensing n Log Forwarding to Apache Kafka n Next Hop Proxy/Server n Risk Levels 1.9 December 2017 n About Symantec Threat Isolation Dialog n License Agreement n New Gateway/PDP Registration n Private Data Processing n SAML IdP Configuration Web n Troubleshooting n Web Application Isolation Mode 1.8 July 2017 n ArcSight CEF Fields Mapping n Management Supported Browsers n Minimum System Requirements n Read-Only Webpages Symantec™ Threat Isolation Platform Guide for Administrators Page 4 Contents 1 Preface 21 1.1 Abstract 21 1.2 Document Purpose 22 1.3 Using this Document 22 1.4 References 23 1.5 Terminology 23 2 Symantec Threat Isolation Solution Overview 25 2.1 Goals and Scenarios 25 2.2 Returned HTML Content 26 2.3 High-level Data Architecture 26 Data Flow 27 2.4 Platform Components 28 2.5 Protection Scenarios 29 2.5.1 Overview 29 2.5.2 Protecting an Organization’s Endpoints from Attack 30 2.5.3 Protecting an Organization’s Web Applications from Attack 32 2.6 Deployment Topologies 32 2.6.1 Overview 33 2.6.1.1Symantec Threat Isolation Explicit Proxy 34 2.6.2 Symantec Threat Isolation Cloud Service 35 Accessing Symantec Threat Isolation Cloud Service from the Organization's Network 35 Accessing Symantec Threat Isolation Cloud Service from Outside the Organization 36 2.6.3 Symantec Threat Isolation with Downstream Proxy Forwarding 37 2.6.4 Symantec Threat Isolation with Block Page Integration 38 Symantec™ Threat Isolation Platform Guide for Administrators Page 5 2.6.5 Symantec Email Threat Isolation 40 2.6.6 Symantec Threat Isolation as Web Application Isolation Gateway Mode 43 2.6.6.1Using a Load Balancer 43 2.6.6.2Not Using a Load Balancer 44 2.7 Cloud Services 45 2.8 How Symantec Threat Isolation Processes Private Data 45 2.8.1 Cookies and Session Data 45 2.8.2 Browsing Logging Data 46 2.8.3 Cloud Telemetry Data 46 2.8.4 Third-Party File Sanitizer Data 47 2.8.5 Document Viewer Data 47 2.8.6 Flash Activation Request Data 48 2.9 Reducing Bandwidth Usage 48 3 Installing the Symantec Threat Isolation Platform 49 3.1 System Requirements 49 3.2 Supported Platforms 50 3.3 Supported Browsers 51 3.3.1 Management Browser 51 3.3.2 Endpoint Browser 51 3.4 Preparing for Symantec Threat Isolation Platform Installation 52 3.4.1 Overview 52 3.4.2 Defining Components Per Machine 52 3.4.3 Defining Networking 54 3.4.3.1TIE Public DNS Name Considerations 55 3.4.3.2Signing the CA Certificate 56 3.4.3.3Prerequisite 58 3.4.3.4Generating the Encrypted Private Key 58 Symantec™ Threat Isolation Platform Guide for Administrators Page 6 Signing the CA Certificate File 60 Using an intermediate CA certificate signed by your organizational root CA 60 Using a self-signed CA certificate 61 3.4.3.5Transferring Encrypted Private Key and CA Certificate File 62 3.5 Installing the Symantec Threat Isolation Platform 62 3.5.1 Overview 62 3.5.2 Preparing the Symantec Threat Isolation Platform Machine 64 3.5.3 Downloading the ISO File and Verifying the MD5 Signature 65 3.5.4 Configuring the Machine for Loading the ISO File 65 3.5.5 Booting the Machine and Starting Installation 65 3.5.5.1Changing the Operating System Password 67 3.5.6 Initializing the Symantec Threat Isolation Platform 67 3.5.6.1Initializing the Symantec Threat Isolation Platform 67 3.5.6.2Initializing the Management Gateway 67 3.5.7 Defining the Management Gateway 68 3.5.8 Defining Symantec Threat Isolation Components 78 3.5.8.1Deciding Where the PDP Will Reside 78 3.5.9 Initializing Gateways 79 Registering the Gateway 80 3.5.9.1Checking Gateway Registrations 82 3.5.10 Associating the CA Certificate with Your Zone 82 3.5.11 Installing the CA Certificate as Trusted Root CA on the Client Side 84 3.5.11.1Deploying the CA Certificate File to the End Users 84 3.5.11.2Installing the CA Certificate in Windows Browsers 84 3.5.11.3Installing the CA Certificate in a Firefox Browser 88 3.5.11.4Installing the CA Certificate on a Mac Machine 88 3.5.12 Verifying the Trusted Root CA in the Endpoint Browser 90 Symantec™ Threat Isolation Platform Guide for Administrators Page 7 3.5.13 Making Sure Third-Party Cookies Are Accepted 90 3.6 Configuring Your Deployment Topology 92 3.6.1 Configuring the Symantec Threat Isolation Explicit Proxy Topology 93 3.6.1.1Editing the Proxy Auto-Configuration (PAC) File 93 3.6.1.2Configuring the PAC File in a Single Endpoint Browser 93 96 3.6.1.3Verifying PAC File Configuration in the Endpoint Browser 96 3.6.1.4Defining Firewall Rules 100 3.6.1.5Defining Firewall Rules for the Cloud Deployment 108 3.6.2 Configuring Symantec Threat Isolation with Downstream Proxy Forwarding 109 3.6.2.1Configuring the Downstream Proxy for Communication over HTTPS 111 Adding forwarding hosts to the downstream proxy 111 SSL Inspection 111 Adding rules to the downstream proxy for HTTPS 111 3.6.2.2Configuring the Downstream Proxy for Communication over HTTP 111 Adding rules to the downstream proxy for HTTP 112 3.6.2.3Defining Firewall Rules 112 3.6.3 Configuring Symantec Threat Isolation with Block Page Integration 118 3.6.3.1Configuring the NGFW/SWG to Redirect Traffic to the Isolation Portal 118 3.6.3.2Placing a Transparent SWG between NGFW and Threat Isolation 118 3.6.3.3Defining Firewall Rules 119 3.6.4 Configuring Symantec Email Threat Isolation 121 3.6.4.1Defining Firewall Rules 122 Symantec™ Threat Isolation Platform Guide for Administrators Page 8 3.6.5 Configuring Symantec Threat Isolation as Web Application Isolation Gateway Mode 125 3.6.5.1Defining Firewall Rules 125 3.6.6 Pushing Settings to the Gateways 127 3.7 Viewing Version and License Information, Credits 127 3.8 Moving Management to a Different Server 128 3.9 Upgrading the Symantec Threat Isolation System 128 3.9.1 Upgrading from Version 1.10 to Version 1.14 128 3.9.2 Upgrading from Version 1.11 to Version 1.14 128 3.10 Performing Shutdown 129 3.11 Performing Backup, Restore and Reset Procedures 129 3.11.1 Backing Up System Data 129 3.11.2 Restoring System Data 130 3.11.3 Resetting a Management User Password 130 3.11.3.1Password Policy 130 3.11.4 Restoring the Default Settings 131 4 Configuring Security Policy Settings 132 4.1 Overview 132 4.2 Defining Security Policies and Rules 134 4.2.1 Menu Search 134 4.2.2 Editing Your Policy 134 4.2.2.1Defining Authentication Profiles 137 4.2.2.2Authentication Mode 138 Proxy Authentication Mode 138 Skipping Authentication when Egress IP Has Been Authenticated139 Server Authentication Mode 140 Skipping Authentication when Egress IP Has Been Authenticated141 Activity Logs