05-17-2017 12:44 PM - edited 03-12-2019 06:24 AM
Dears,
i have a sourcefire in my network and i want to block ramsomware attacks what shild i do for that ????? i have read on cisco sites Cisco has release a snort rules. what are these snort rules ???
what signatures i have to search in the sourcefire to confirm the sourcefire is updated with rules.
Thanks
Solved! Go to Solution.
05-22-2017 06:13 PM
Yes the signatures should do their job in the event of access without remote acces VPN.
If it were my servers I would add some additional endpoint protections on them like Cisco Umbrella (former OpenDNS product) or AMP for Endpoints just to be extra cautious. The most effective security does not rely on a single solution.
05-17-2017 07:57 PM
Look under System > Updates > Rule Updates.
Best practice is to have FMC automatically check for rule updates, import them and deloy to your managed sensors. You can then view the Rule Update Log to confirm they are deployed.
Snort rule update
See the following screenshots from an FMC with 6.2 software:
05-17-2017 09:30 PM
Dear Marvin
i have done yesterday rule update 16-05-2017, is it MS17-010 signature has been included how i will come to know???
if i enable port 139,445 for the remote users,, the genuine users should get access but the hacker should get blocked by Rule signatures when something wrong in the packet seen by the firepower
Please correct me if i m wrong.
thanks
05-18-2017 12:54 AM
You can confirm the presence of the relevant Intrusion rules by looking at Objects > Intrusion Rules and then grouping by Microsoft Vulnerabilities and scrolling down to MS17-010.
You can further see their status in your particular Intrusion Policy via editing the policy and searching again for the MS17-010-specific rules. In my case we see the following (I am using Balanced Security and Connectiivty settings):
We do not recommend opening up the SMB ports to outside access. If you require remote access to your servers, they should be accessed via users who have connected via VPN and been duly authenticated and authorized. Otherwise you have no way of confirming their identity until they are already at the server and you are unnecessarily exposing your server to not only this threat but many other as well - some of which may be yet unknown to the community.
05-22-2017 12:50 PM
Dear Marvin,
yes their identity is confirmed but my question is if they are access without vpn than the installed signatures should do their job ??
thanks
05-22-2017 06:13 PM
Yes the signatures should do their job in the event of access without remote acces VPN.
If it were my servers I would add some additional endpoint protections on them like Cisco Umbrella (former OpenDNS product) or AMP for Endpoints just to be extra cautious. The most effective security does not rely on a single solution.
05-31-2017 01:40 PM
thanks marvin
+5 to you
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide