Symantec Endpoint Threat Defense for Active Directory 3.6.1 Administration Guide

Symantec Endpoint Threat Defense for Active Directory 3.6.1 Administration Guide

Symantec Endpoint Threat Defense for Active Directory 3.6.1 Administration Guide Table of Contents Copyright statement.........................................................................................................................5 Introducing Symantec Endpoint Threat Defense for Active Directory...........................................6 About this guide............................................................................................................................................................. 6 About Symantec Endpoint Threat Defense for Active Directory................................................................................ 6 Capabilities of Threat Defense for AD...........................................................................................................................7 Architecture..................................................................................................................................................................... 7 Getting started with configuring Threat Defense for AD......................................................................................... 10 Where to get more information.................................................................................................................................... 11 About the Symantec Endpoint Threat Defense for Active Directory console............................. 13 About launching the Threat Defense for AD console................................................................................................13 Viewing your environment in the Threat Defense for AD console........................................................................... 14 Adding user accounts and roles..................................................................................................................................15 About the Core server health analytics..................................................................................................................... 16 About the Threat Defense for AD settings..................................................................................................................18 Configuring the notifications from the Notifications tab..........................................................................................19 Configuring additional settings from the Features tab.............................................................................................22 Configuring the system AI through the AI tab..........................................................................................................23 Updating Threat Defense for AD through the System Update tab......................................................................... 25 About the SEPM tab................................................................................................................................................26 Configuring Symantec Endpoint Threat Defense for Active Directory........................................ 28 About Domains..............................................................................................................................................................28 Configuring AD sites..................................................................................................................................................... 28 Configuring a deception policy.................................................................................................................................... 29 Defining features in a deception policy.....................................................................................................................30 Adding deceptive accounts to a deception policy.................................................................................................... 30 Defining the exception list in a deception policy...................................................................................................... 31 Configuring a Deployment Manager............................................................................................................................ 32 Editing a Deployment Manager................................................................................................................................ 33 Changing the log method of a Deployment Manager.............................................................................................. 34 Configuring and deploying Threat Defense for AD with Symantec Endpoint Protection..................................... 36 Configuring SEPM to deploy Memory Manipulation and the deception policy to the SEP agent............................37 Viewing the Deploy tab...........................................................................................................................................40 Assigning the Threat Defense for AD policy to SEPM endpoints and groups........................................................ 42 Confirm the Memory Manipulation deployment.......................................................................................................45 Adding additional SEPM servers................................................................................................................................ 46 Adding instances to a Deployment Manager..............................................................................................................47 2 Adding an additional AD domain................................................................................................................................49 Configuring Alarms in Symantec Endpoint Threat Defense for Active Directory....................... 55 About Alarms.................................................................................................................................................................. 55 Responding to an alarm in Threat Defense for AD..................................................................................................56 Types of breach prevention alarms............................................................................................................................. 56 Viewing the details of an alarm....................................................................................................................................58 Generating a forensics report.......................................................................................................................................59 Components of a forensics report...............................................................................................................................61 Memory Analysis in a forensics report................................................................................................................... 63 Persistence & Autoruns in a forensics report........................................................................................................66 Current Status in a forensics report........................................................................................................................67 Mitigating attacks manually.......................................................................................................................................... 68 Dark Corner alarms in Symantec Endpoint Threat Defense for Active Directory....................... 70 Introducing dark corners of the Active Directory...................................................................................................... 70 About Active Directory assessment..........................................................................................................................70 Domain dark corners..................................................................................................................................................... 71 SYSVOL Attack......................................................................................................................................................... 71 Hidden Security Identifier (SID)................................................................................................................................ 72 Golden Ticket............................................................................................................................................................ 72 DCSync/DCShadow Backdoor Account................................................................................................................... 72 Unprivileged Admin Holder ACL...............................................................................................................................72 Power User Enumeration..........................................................................................................................................73 Anonymous LDAP Binding........................................................................................................................................73 AS-REP Roasting......................................................................................................................................................73 Cached Privileged Account in RODC.......................................................................................................................74 Trusted Domains....................................................................................................................................................... 74

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    93 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us