06-24-2018 03:06 PM - edited 02-21-2020 07:54 AM
Hi Folks,
If I receive an inbound attempt from outside to inside and it triggers snort rule 45304 (oracle weblogic signature). How do I know if this is relevant regardless of whether it is (oracle weblogic in this instance) actually installed/listening on my internal endpoint, or if it is relevant regardless if installed or not?
If it is only relevant if it is running weblogic on the endpoint, my next step is to ask the server team to confirm if it is running weblogic, and then ensure Firepower will not trigger future events for such destinations in the future.
06-25-2018 11:41 PM
According to the documentation provided SID 1-45304, the affected system is Oracle Weblogic Server. If you do not have Weblogic Server at the IP Address provided after verifying with server team, you can mark it as false positive. You can exclude this IP address from this signature using Rule editor.
Below is the link to Snort documentation:
https://www.snort.org/rule_docs/1-45304
07-05-2018 03:42 PM
Just confirming, Firepower can detect OS versions etc, but not if Oracle or Apache is running on a server?
07-24-2018 12:32 AM
AFAIK, It cannot actively detect the OS unless you are running tools like nmap and feeding that information to FMC. It only looks at the traffic traversing through the device and determine the OS details using certainty factor depending on the traffic information. It can only detect anything that is running at the endpoint passively using the traffic information. You need to use active scanners for accurate information about a certain endpoints' OS, applications.
07-24-2018 02:22 PM - edited 07-24-2018 03:06 PM
Thanks, I am using the inbuilt nmap scanner. What if I remove any doubt and manually set the OS?
For eg,
If I create an IPS signature for one server, and forced that server to be mircosoft 2012 R2, and then set the IPS policy to recommend on the one ip address of this server. Should I expect signatures for Linux, like
to be set to drop (and not drop and generate events)?
**edit, one can't set to drop and not generate events**
I just want to make sure my expectation is right before putting effort in.
07-26-2018 03:12 AM
In my knowledge, yes, manual entry will supersede the data provided through Passive monitoring. So once you identify it as Windows Server 2012, it should ideally recommend to disable all the rules related to Linux servers. The Firepower system uses Network Discovery information to make recommendations for which rules you do or do not need to have enabled.
07-12-2019 03:34 AM
After testing with one host and manually forcing the OS to Windows i did still receive plenty of non windows attacks.
Maybe some of them are relevant even to Windows? I dont' know. But my gut feel is its just not able to 'tune out noise as well as it should'.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide