cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
671
Views
0
Helpful
5
Replies

Exclude / Whitelist source IP in SCA from Alerts

YZ2
Level 1
Level 1

Hi,

I can't find a proper way to exclude a vulnerability scanner IP from alerts in SCA. 

One possible way to solve this (I guess) is to add entity groups for source IP and destination subnets. Afterwards select these entity groups in an Internal Connection Watchlist item and set the rule to "allow". This isn't very handy and I hope there is another way to whitelist the scanner IP from alerts. 

Any suggestions?

5 Replies 5

oevranos
Cisco Employee
Cisco Employee

Hi,

 

Depending on the alerts you are receiving or your vulnerability scanner, you might check IP Scanner Rules.

"Enter IP scanners that are permissible on your network. Scanning rules on this list will be excluded from several alerts, including the Internal Port Scanner alert, the New IP Scanner alert, the NetBIOS Connection Spike alert, SMB Connection Spike alert, the Outbound SMB Spike alert, the New SNMP Sweep alert, the Outbound LDAP Spike alert, the LDAP Connection Spike alert, and the Non-Service Port Scanner alert."

Thank you for your reply. 

As I understand IP Scanner rules, I have to enter each destination address to this rule. This is pretty unhandy as there are several targets and possible changes in of IPs. Is it therefore possible to allow the source address of the scanner somehow? 

 

oevranos
Cisco Employee
Cisco Employee

If you don't want to limit the targets you can put "0.0.0.0/0" in the Target Address section and it should work. This would silence the selected alarms to all IPs. Depending on your deployment you might want to limit this to only private IPs by adding 3 private IP blocks.

Perhaps I am misinterpreting the rules.
As I understand the rule, I have to enter the targets here. That is correct, isn't it?

If I now enter 0.0.0.0/0 or only the private addresses, I will no longer detect scans from potential attackers because I have removed my entire infrastructure from this alarm. In my opinion, this is the wrong approach, as I will lose sight of potential attacks or be spammed with constant false positives.

oevranos
Cisco Employee
Cisco Employee

If you create a rule and hover over the question marks on the rules you can see the explanations. Prefix section should be your scanner ( this is basically your scanner) and the target section should be the part of the network which will be scanned by the prefix. With this you are basically whitelisting the traffic between the prefix and the target network for the events I mentioned on the previous post. If there is another host performs scans you will get alarms for that traffic. 

In this example I am allowing the 192.168.100.1 to scan all IP ranges on all ports. You can test this by creating a rule for your scanner IP and initiating a test scan on your endpoint, or if you have multiple IPs on your scanners you can just create a rule for single IP and see alerts only stop for the IP(s) rule configured for.

 

oevranos_0-1755783945954.png

oevranos_1-1755784008720.png