CounterACT Console User Manual 7.0.0
CounterACT Console User Manual 7.0.0
CounterACT Console User Manual 7.0.0
Version 7.0.0
Table of Contents
Preface ....................................................................................................... 16
About This Manual ...................................................................................... 16
Updates to This Manual ............................................................................... 19
Chapter 9: Assets Portal The Assets Portal is a web-based search and discovery tool that
allows you to leverage extensive network information collected
and correlated by CounterACT and plugins. This includes not only
endpoint information, but also Policy violations, login histories,
User Directory details, organizational mapping details and
endpoint device connections. The information is useful across
your organization, especially for:
Security teams
IT departments
Help Desk
This chapter describes how to set up and work with the Assets
Portal.
Chapter 10: Generating This chapter describes CounterACT report generation tools. These
Reports and Logs tools provide you with important compliance information, as well
as detailed information about malware and self-propagating
code. Reports about policy compliance, inventory and
vulnerabilities can be generated from the Reports site.
In addition, user audit trail and system event logs can also be
generated.
Chapter 11: Managing This chapter contains information about working with Virtual
Your Virtual Firewall Firewall rules. Network Virtual Firewall protection allows you to
Policy easily create network security zones to give you more control
over network traffic and provides all the benefits of an inline
firewall without being located inline.
Chapter 12: Threat CounterACTs Active Response technology fights worms and
Protection other self-propagating malware by:
Pinpointing threats at the earliest stage of the infection
process
Providing real-time protection against zero-day worms
Protecting your network against infection methods known
and unknown to the security community
This chapter provides basic information about the Active
Response malicious endpoints technology, including how
CounterACT defines, detects and handles threats. It also
describes how to define legitimate traffic as part of your Threat
Protection policy, i.e., traffic to be ignored for requirements that
compel you to grant full access to specific addresses.
Chapter 13: Threat This chapter provides information regarding advanced tools
Protection, Advanced available for handling threats including: defining naming
Tools conventions for marks, defining virtual site endpoint operating
system distribution and density, and parsing event information
displayed in email alerts.
Chapter 14: Managing This chapter describes how to:
Users Create and manage CounterACT users.
Define user permissions.
Create password protection policies.
Audit user activity.
Chapter 15: Managing Use the tools described in this chapter to update settings defined
Appliances, Enterprise during your setup. Additional options, such as upgrading your
Managers and Consoles software version and installing new licenses are also detailed.
Chapter 16: The CounterACT provides a web-based information center for both
Executive Dashboard executives and IT professionals that delivers dynamic at-a-glance
information about:
Network compliance
Network threats
Network guests
This chapter describes how to set up and use the executive
dashboard.
Chapter 17: Additional This chapter describes additional CounterACT options.
Options
Appendix 1: Command This appendix details CounterACT device command line tools that
Line Tools can, for example:
Update SSH access.
Enable access to the Console.
Enable or disable ACPI shutdown.
Access remote support.
Appendix 2: Handling This appendix details how to handle network connectivity failures
Network Connectivity between the Appliance and your network.
Failures
Appendix 3: Remote This appendix details how to gain remote access to an endpoints
Access to Endpoints registry service. You must perform these steps to take advantage
of the policy scanning processes.
Appendix 4: Generating This appendix describes how to generate and import a trusted
and Importing a certificate and remove the browser security warning that opens
Trusted Web Server when trying to access the CounterACT Web Portals.
Certificate
Appendix 5: HTTP For browser notification, login and remediation actions the
Redirection Appliance must see traffic going to the web. This appendix
details how to make these actions work properly, including how
to set the IP address used by the HTTP redirection features, for
example the Assets Portal, Dashboard and Reports Portal.
Appendix 6: SNMP This appendix describes CounterACT SNMP support.
Integration
Appendix 7: SNMP MIB This appendix describes:
for CounterACT About the SNMP MIB for CounterACT Appliances
Appliances
MIB Table Objects for CounterACT Appliances
SNMP Trap Notifications for CounterACT Appliances
Appendix 8: Modifying This appendix describes how to modify ForeScout remote service
ForeScout Remote contact behavior.
Service Contact
Features
See Chapter 8: Base Plugins and ForeScout Modules for a list of bundled plugins.
Documentation, release information and software for base plugins and ForeScout
Modules can be found on the Customer Support portal at:
https://updates.forescout.com/support/index.php?url=counteract.
About CounterACT
ForeScout CounterACT is a platform that provides continuous security monitoring
and mitigation. It allows IT organizations to efficiently address numerous access,
endpoint compliance and threat management challenges even within todays
complex, dynamic and expansive enterprise networks. This is delivered by providing:
Real-Time Network Visibility
Network Integrity
Comprehensive Third-Party Integration
On-Demand Asset Intelligence
Network Integrity
Most network realities consist of complex topologies and architectures; a multitude of
events, users, vendors and devices; continuously changing downloads and patches;
new vulnerabilities; extensive compliance requirements, and more.
ForeScout CounterACT lets you automatically and easily tackle these intricate and
time-consuming realities.
Network Restrictions
Port disable (802.1X, SNMP, CLI)
VLAN control
VPN disconnect
ACL block at the switch, firewalls and routers
Wireless allow/deny
Quarantine until the devices is remediated
Traffic Control
Virtual firewall
Update network ACL (switch, router, firewall)
Device Control
Disable NIC
Shut down desktop/laptop
Disable use of peripheral devices
CounterACT Components
CounterACT is comprised of the following components:
The Appliance
The Enterprise Manager
The Console
Virtual systems are also available. See Virtual Systems for more information.
Refer to the CounterACT Enterprise Manager Appliance Communication Technical
Note for information regarding Enterprise Manager/Appliance communication.
The Appliance
A CounterACT appliance (Appliance) is a dedicated device that monitors traffic going
through your corporate network. It protects the network against malicious activity
and performs extensive network protection.
Your Appliance should have been installed at your network so that it sees vital
network traffic.
To work with the Virtual Firewall, the Appliance should be set up:
Between segments or VLANs.
Your Appliance may be one of several Appliances included in an Enterprise solution
or may be part of a High Availability system. The High Availability feature provides
high network uptime utilizing redundancy and automatic recovery.
For more information about the High Availability feature, Appliance installation,
Appliance specifications and deployment, refer to the CounterACT Installation Guide.
The Console
The Console is the CounterACT management application used to view important
detailed information about endpoints and control them. This information is collected
by CounterACT devices.
Console
Virtual Systems
CounterACT virtual devices (Appliances and Enterprise Managers) can be installed
and managed in virtual data centers and IT environments. They provide capabilities
identical to CounterACT device software installations carried out on dedicated
machines.
Refer to the CounterACT Installation Guide for details about installing virtual
systems.
Using CounterACT virtual devices lets you:
Simplify and ease product distribution and deployment, especially for
distributed remote sites.
Reduce IT costs, space, energy consumption and maintenance by using less
hardware.
Comply with green IT requirements.
Installing and working with licenses differs slightly for virtual systems and physical
systems. Refer to Virtual Licenses for details about working with virtual licenses.
Hybrid Deployments
Hybrid deployments are also supported. This means that a physical Enterprise
Manager can manage both physical and virtual Appliances or a virtual Enterprise
Manager can manage both physical and virtual Appliances.
Help Tools
CounterACT provides a range of Help tools to assist first-time users in gaining
proficiency and an understanding of the CounterACT Console. Help tools also guide
veteran users in working with more advanced Console options. This section describes
help tools available and how to access them.
Console Help Buttons
Console Help
Feature Dialog Box Descriptions
On-Screen Troubleshooting
Documentation Portal
Plugin Configuration Help
Console Help
Select CounterACT Help from the Help menu to open the Console Online Help.
On-Screen Troubleshooting
Messages about irresolvable issues, failed actions and other errors can be displayed
in the Detections pane for a selected endpoint. Information is also available about
resolving these issues.
Documentation Portal
The Documentation Portal is an online library containing a comprehensive range of
information about CounterACT tools, features and functionality. The portal includes
the following sets of documents:
CounterACT Console User Manual (this document)
CounterACT Installation Guides
CounterACT How-to Guides
CounterACT Plugin Configuration Guides
FStool Command Reference Guide
CounterACT Glossary Reference Guide
Logging In to CounterACT
Access to the CounterACT device via the Console is authenticated by verifying the
appropriate CounterACT IP address, user name and password. Make sure that you
have this information before attempting to log in.
To log in:
1. Select ForeScout CounterACT>CounterACT Console from the Start menu.
The CounterACT Login dialog box opens.
2. Type the CounterACT device IP address or host name in the IP/Name field.
3. Select a login method.
Three login authentication methods are available:
Password
1. Select Password to perform standard authentication. Enter your user name
and password.
Smart Card
1. Select Smart Card to allow authentication using a smart card.
2. Enter your PIN code. If the Dll Location field is empty, enter the location
where the Smart Card driver is installed on your computer.
Kerberos
1. Select Kerberos if you are using the Kerberos authentication method to log
in. Kerberos is a computer network authentication protocol that allows users
communicating over a non-secure network to prove their identity to one
another in a secure manner. See Using Kerberos Authentication for more
information.
2. Select Save address and user name to instruct CounterACT to remember
these credentials when you next log in.
3. Select Login.
4. If prompted with a Notice and Consent dialog box, read the message and then
select Accept.
Setup Scenarios
The following sections describe the various setup scenarios available when installing
CounterACT Enterprise Manager or Appliances.
Welcome
The Welcome page displays the CounterACT component to which you logged in as
well as information you defined during the installation at the Data Center. More
Appliance information can be viewed from the CounterACT Options window.
The License page allows you to install the virtual demo license that was provided by
your CounterACT representative by email. The license is valid for 30 days from the
time it was generated by the CounterACT representative. When installing the license,
you are presented with the licenses expiration date. You must request and install a
permanent license before this period expires. See Virtual Licenses for details.
License Page
You will be contacted via email regarding the license expiration date and any license
violations. In addition, license alerts, violations, status and troubleshooting
information can be accessed from the Appliance, Details pane. See Viewing License
Alerts for more information.
Virtual licenses are authenticated daily by the ForeScout License Server (at
https://license.forescout.com). Licenses that cannot be authenticated for a month
are revoked. If this happens, significant CounterACT functionality will stop. See
Virtual Licenses for information about working with the License Server.
Time
Define time settings for this Appliance.
Time Page
Time Zone Set the time zone according to your geographical location or by GMT offset.
The default value is the time zone of the Appliance. This time zone is used
when displaying and recording detection times at the Console.
NTP Server CounterACT devices require NTP connectivity (port 123 UDP) to an NTP
server.
Enter an NTP server that your organization connects to or use the ForeScout
default (ntp.foreScout.net).
Select Test.
If the test fails, contact your IT professional.
Use the fstool ntp setup command to define additional NTP servers. For
information about working with fstool commands, see Appendix 1: Command
Line Tools.
Mail
CounterACT generates email messages regarding:
Policy and Threat Protection alerts
Scheduled reports
Critical system operation alerts
Licenses alerts
Mail relay and Admin email addresses are defined here.
Mail Page
Admin Email The CounterACT administrator address or another address that should
(Required) receive CounterACT alerts. Separate multiple addresses by commas, spaces
or semicolons.
Example 1: [email protected]
Example 2: [email protected], [email protected]
You can sign these emails using a digital certificate, as specified by the
Secure/Multipurpose Internet Mail Extensions (S/MIME) standard. See
Signing Emails with an S/MIME Certificate for details.
Mail Relay The internal mail relay IP address to allow delivery of email alerts if SMTP
(port 25) traffic is not allowed from CounterACT to the Internet.
This must be the fully qualified host name, for example,
mail-relay.example.com.
If you type an incorrect address you will not receive CounterACT alerts.
You can change these addresses from the CounterACT Options window by selecting
General and then Mail.
User Directory
Use this option to define credentials for a User Directory server. These credentials
are used to validate network authentication and resolve user details, for example,
the endpoint users User Directory display name, department name or email address.
CounterACT offers you the option to define any of the following types of User
Directory servers:
Microsoft Active Directory
Novell eDirectory
Sun Directory Server
IBM Lotus Notes
Open LDAP Server
RADIUS protocol server
TACACS protocol server
In the Console, define User Directory servers by selecting Options from the Tools
menu and then select User Directory from the Options navigation tree.
Setup requires a User Directory server that is queried to validate authentication and
obtain details regarding users at detected endpoints. User details and authentication
status are displayed in the Console, Detections pane.
View and edit an existing User Directory server configuration by selecting Options
from the Tools menu and then select User Directory from the Options navigation
tree.
Domain Credentials
Network domain credentials are used by the Appliance to perform deep inspection on
endpoints. Enter the domain information necessary for the Appliance to authenticate
with the Domain Controller. Domains should include endpoints that are handled by
your policies. You may include several domain entries.
Domains Page
Domain The Domain Controller IP address. This information is used to test password
Controller validity and provide defaults for the authentication servers defined later.
Domain The domain name. The domain should include all endpoints that you want to
Name inspect via the policy. Endpoints in this domain must also be in the Internal
Network.
User The domain administrator name for this domain.
Password The domain administrator password for this domain.
If the verification test fails, you may need to perform troubleshooting tasks. See
Appendix 3: Remote Access to Endpoints for more information.
Authentication Servers
Policies can be created to verify that endpoints have authenticated successfully. Use
this option to define the authentication servers used in your network (domain
controllers, exchange servers, etc.). The domain controllers that you previously
entered appear here automatically.
Microsoft-DS (445/TCP)
FTP (21/TCP)
IMAP(143/TCP)
POP3(110/TCP)
rlogin (513/TCP)
MAPI
Internal Network
The Internal Network is the ranges of IP addresses in your organization that you
want CounterACT to protect. It is recommended that you include your entire
corporate network in this definition (including unused IP address ranges). IP
addresses outside the Internal Network are not handled by CounterACT. In addition,
endpoints in the Internal Network must be visible to CounterACT Appliances.
You can assign a segment name to the Internal Network for easy identification. This
name is displayed at the Console, Filters pane and can be used when working with
many CounterACT tools. Segments can be fine-tuned to more closely represent the
structure of your corporate network. See Working with CounterACT Segments for
more information.
Enforcement Mode
Use this option to define Appliance enforcement mode. The Full Enforcement mode
allows complete functionality. The Partial Enforcement mode lets you monitor
network traffic but limits your ability to respond to it. Specifically, the Threat
Protection, HTTP Actions and Virtual Firewall options are disabled in Partial
Enforcement mode. This mode is recommended for evaluation purposes only.
Select the NAT detection checkboxes to detect NAT devices.
The Partial Enforcement Mode icon is displayed on the status bar if your
system is set to this mode.
By selecting Auto Discovery, you allow CounterACT to resolve and display endpoint
properties, for example, NetBIOS names Nmap and domain information. See
Defining Endpoint Discovery Rules for more information.
Channels
A channel defines a pair of interfaces used by the Appliance to protect your network.
In general, one interface monitors traffic going through the network (monitor
interface) and the other interface generates traffic back into the network (response
interface). Response traffic is used to:
Protect against self-propagating malware, worms and hackers.
Carry out Virtual Firewall blocking.
Perform policy actions. These actions may include, for example, redirecting
web browsers or carrying our Virtual Firewall blocking.
A single interface may also be used as both the monitoring and response interface.
You should have defined monitoring and response interfaces and made the
appropriate physical connections at the Data Center when installing the Appliance
and connecting it to the network switch.
Use the Channels page to complete interface assignments made at the Data
Center
If you change the monitoring interface assignment here, you must go back to the
Data Center and readjust the physical interface connections so that they match.
Channels Page
If your network architecture is set up to work with VLANs, the Appliance will
automatically detect them. These VLANs are displayed in the Channels page.
Add Channels
You must define channel definitions to match Appliance interface connections in
order to detect and respond to traffic on network interfaces.
To add channels:
1. Select the Channel drop-down list and then select Add. The Add Channel
dialog box opens.
The interfaces detected on your Appliance appear in the Interface List. Every
few seconds, traffic is captured on the selected interface and is broken down
into the different VLANs.
Review the interfaces and related information to verify that traffic is being
seen on the interfaces that you connected to at the Data Center, for example,
if traffic is actually mirrored. If you change the monitoring interface
assignment here because no traffic is detected or for any other reason, you
must go back to the Data Center and readjust the physical interface
connections.
The information in the following table is displayed.
Symmetric Indicates whether the interfaces passed the Symmetric Traffic test.
The test verifies that the Appliance can see symmetric traffic on the
monitoring interfaces. That is, for every TCP conversation, both
incoming and outgoing traffic is visible. If this condition is detected,
the traffic received on the channel is ignored until the condition has
cleared.
The test runs continually.
If the test fails, you can review related troubleshooting information at
the bottom of the Channels pane.
# Hosts Displays the total number of endpoints monitored on the VLAN.
Response Interface Information
Response Displays all VLAN IDs discovered for the selected response interface.
VLAN
Traffic Displays total VLAN traffic detected on the response interface.
Response Indicates whether the Response Traffic test succeeded on the VLAN.
The test verifies that the Appliance successfully sends response traffic
to the network.
The test is runs continually.
If the test fails, you can review related troubleshooting information at
the bottom of the Channels pane.
IP Displays the DHCP address used by the Appliance for response traffic.
Address By default, the IP address is acquired through DHCP.
If the DHCP is not successful, CounterACT cannot respond to ARP
requests. In this case, manually define the address.
Addresses are defined per VLAN, if required. See Manually Adding a
VLAN for more information.
Switch
For switches that are managed by the Switch Plugin, CounterACT switch tools let
you:
Track the location of endpoints connected to network switches and retrieve
relevant switch information. For example, users can view the switch IP
address and switch port to which endpoints are connected.
Detect new endpoints on the network, by alerting CounterACT on port status
changes via SNMP traps.
Assign switch ports to VLANs, allowing you to set up dynamic, role-based
VLAN assignment policies or quarantined VLANs.
Use ACLs to open or close network zones, services or protocols on specific
endpoints at the switch.
Block endpoints based on IP addresses or MAC addresses.
Shut down switch ports completely.
Switch Page
From the Switch page of the wizard, configure a switch that exists in your network
by selecting Add and stepping through the Add Switch wizard.
Switch General
Select Help to open the Switch Plugin Configuration Guide if you need help
configuring the switch.
You can configure the switch that you are configuring here to add other switches in
your network to CounterACT in two ways:
Auto-discover additional switches: Switches of certain vendors (Cisco, HP,
Brocade/Foundry, Enterasys and Nortel) can auto-discover neighboring
switches of any of these vendors.
Discovered switches inherit basic attributes of the switch that detected
them.
All permissions and ACL configurations in discovered switches are
disabled.
Policy
Use this option to classify endpoints into easily manageable groups of network assets
and corporate/guest users. Classification is carried out with the CounterACT Asset
Classification Policy template and the Corporate/Guest Policy template. These are
core CounterACT policy templates.
Policy
Corporate/Guest Policy
The Corporate/Guest Control template lets you detect endpoints that may be guests,
i.e. not part of the corporate network, and endpoints are part of the corporate
network.
The policy organizes endpoints into Guest Hosts and Corporate Hosts groups. If
CounterACT cannot evaluate the status of an endpoint, that endpoint is classified as
a guest.
Corporate Hosts are endpoints that either:
Are manageable using domain credentials
Have an authorized NetBIOS domain name
Have authenticated recently to an approved authentication server
Inventory
The Inventory presents a live display of network activity at the Console, for example,
processes and services currently running, vulnerabilities currently detected, ports
currently open or users currently logged in.
Use the inventory to:
Broaden your view of the network from endpoint-specific to activity-specific.
View endpoints that have been detected with specific attributes whether or
not they are policy-compliant.
Easily track network activity.
Incorporate inventory detections into policies. For example, if you discover
that network guests are running unauthorized processes on your network,
create a policy that detects and halts these processes on guest machines.
See Working with Inventory Detections for details about the inventory or select Help
in this pane.
Use the wizard to select items that will appear in the inventory.
Inventory
Macintosh machines
Users logged-in
Operating systems running
Processes running
Updates missing
Open ports can also be displayed in the inventory. This information can be
displayed by creating a policy that includes the Open Ports property. It is not
generated from this pane.
Finish
Finish Page
A summary of all the wizard definitions is displayed. If you select Cancel, all the
information in the wizard is deleted. You can update this information from the
CounterACT Options window.
Select Save to save the configuration to an external file.
Use the Check for Updates feature to automatically update your system with
the most current version of all currently installed CounterACT plugins. See
Chapter 8: Base Plugins and ForeScout Modules for more information about
working with Check for Updates and other plugins.
To set up an Appliance:
1. Log in to the Enterprise Manager via the Console.
2. Select Options from the Tools menu and then, if necessary, select
CounterACT Devices.
3. Select Add.
Assign IP Addresses
All endpoints in your Internal Network should be assigned to an Appliance.
Define assignments so that the Appliance manages endpoints that are physically
close or manages IP address ranges of the broadcast domains it is tapping in to.
Unassigned endpoints can be viewed in the Detections pane by selecting Show only
Unassigned.
Distributing the work load among various Appliances:
Improves performance.
Improves robustness and responsiveness.
Prevents the Enterprise Manager from being a single point of failure if the
Enterprise Manager temporarily disconnects.
The dialog box includes the Appliance that you are adding as well as others
Appliances. Edit as required.
All endpoints in your Internal Network should be assigned to an Appliance.
Assignments must be unique to each Appliance. This means IP ranges or segments
cannot overlap between Appliances.
Unassigned endpoints can be viewed in the Detections pane by selecting Show Only
Unassigned.
Editing is only available if you are logged in to the Console via the Enterprise
Manager.
You can later view and edit assignments for all Appliances and display unassigned IP
addresses. See Assigning Network IPs to Appliances for details.
1. In the Select Script drop-down, choose a script to run on this Appliance. The
drop-down lists scripts uploaded to the Enterprise Manager. These scripts
may have significant impact on the functionality of the Appliance.
2. In the Default Parameters Values field, edit the default parameter values
for variable parameters in the script. Separate values with spaces. When the
script runs, values are assigned to parameters in the order in which they
occur during script processing. (Optional)
CounterACT copies the script to the Appliance, and runs it using the parameter
values you specified.
CounterACT runs the script immediately. It does not wait for you to finish the
Initial Setup Wizard.
Finish
A summary of all the wizard definitions is displayed. If you select Cancel, all the
information in the wizard is deleted and the Appliance is removed. You can update
this information from the CounterACT Options window.
1. Select Check for Updates to automatically update your system with the
most current versions of all installed CounterACT plugins. See Automatically
Update Plugins for more information.
2. Select Save to save the configuration to an external file.
2. Select Setup from scratch to run the wizard for the Enterprise Manager. You
are prompted to enter the following information:
Appliance time zone and NTP Server settings
Mail relay and admin email addresses
User Directory account information and the server IP address
Domain credentials including, domain administrative account name and
password
Authentication servers used to verify that endpoints have been
authenticated successfully
Internal Network
Inventory
See Set Up an Appliance from Scratch for more information about the items.
To replicate settings:
1. Log in to the Enterprise Manager via the Console. The initial setup page
opens.
Add Appliance
Finish
A summary of all the wizard definitions is displayed. If you select Cancel, all the
information in the wizard is deleted and the Appliance is removed. You can update
this information from the CounterACT Options window.
Select Check for Updates to automatically update your system with the most
current versions of all installed CounterACT plugins.
Plugins significantly broaden CounterACTs capabilities. For example, the Switch
Plugin lets you track the location of endpoints connected to network switches and
retrieve relevant switch information, detect new endpoints on the network, assign
switch ports to VLANs, or shut down switch ports completely. See Chapter 8: Base
Plugins and ForeScout Modules for more information about this and other plugins.
Select Save to save the configuration to an external file.
Set Up Segments
Network segments are used create a visual representation of your organizational
structure, for example, specific departments. After you define segments, you can
display endpoints in the Detections pane per segment and configure your policy
scope and other CounterACT features using segments.
For example, you can view vulnerable endpoints detected in your sales department,
malicious endpoints detected by R&D or network policy violations in the finance
department. The segment names that you assign also appear in the Detections pane,
Segment column when endpoints are detected. The segments that you define also
appear for other features. For example, when creating an accounting segment, the
defined range is available when using the VA tool (i.e. a user wants to scan
accounting), or the Virtual Firewall Policy (i.e. accounting cannot use FTP).
Sub-Segments Defined
2. In the IP/Name field, type the CounterACT device IP address or host name.
3. Three login authentication options are available:
Password
If you select Password, standard authentication is performed. Enter your
user name and password.
Smart Card
Select Smart Card to allow authentication using a smart card.
You must enter your PIN code. If the Dll Location field is empty, you must
type the location where the Smart Card driver is installed on your computer.
See Using Smart Card Authentication for more information.
Kerberos
Select Kerberos if you are using the Kerberos authentication method to log
in. Kerberos is a computer network authentication protocol that allows users
communicating over a non-secure network to prove their identity to one
another in a secure manner. See Using Kerberos Authentication for more
information.
4. Select Save address and user name to instruct CounterACT to remember
these credentials when you next log in.
5. Select Login.
6. If prompted with a Notice and Consent dialog box, read the message and then
select Accept.
Title Bar
The title bar displays the following information:
CounterACT device IP address or host name.
Login user name.
Menu Bar
The menu bar displays the Console menu options.
CounterACT Detections
The Home view displays:
Extensive real-time information about endpoints detected on your network,
for example, endpoint details learned by CounterACT information about
endpoint policy status, CounterACT actions applied to endpoints, and more.
See Working with CounterACT Detections for details.
The CounterACT site map. The map, powered by Google, provides at-a-
glance, real-time information about endpoints at across offices, cities,
countries and continents. See Working at the Site Map for details.
Toggle Arrows
Inventory Detections
The Inventory presents a live display of network activity at multiple levels, for
example, processes and services currently running, vulnerabilities currently detected,
ports currently open or users currently logged in.
Use the inventory to:
Threat Detections
The Threats view displays endpoints detected via Threat Protection policies. Create
and edit Threat Protection Policies from this view. See Chapter 12: Threat Protection
for more information.
Policy Management
Use the tools in the Policy view to create, edit and manage policies. See Chapter 5:
Policy Management for details.
Policy Tab
Dashboard
Access the Executive Dashboard a web-based information center that delivers
dynamic at-a-glance information about:
Network compliance
Network threats
Network guests
See Chapter 16: The Executive Dashboard for details.
Additional Functionality
You can also access the Reports Portal, the CounterACT Dashboard and the
CounterACT options pane from the toolbar.
Status Bar
The status bar may display the following information:
Service Attack The service attack indicator blinks when CounterACT detects a service
Indicator attack at your network. The indicator blinks until the service attack is
viewed in the Current Service Attack dialog box. See Handling Service
Attacks for more information.
Connection Indicates the connection status between Appliances and the Enterprise
Status Indicator Manager. If an Appliance is disconnected the red checkmark is
displayed.
Date and Time Represents the current date and time according to your local time zone
Indicator setting.
Console Searches
Use the search tool to quickly access information from tables in the Console; for
example, in the Views pane, Detections pane or the Plugins pane. Items that match
the search text appear as you type.
Where relevant, collapsed folders expand if the search item you entered is found in
the folder. Some search bars can be hidden or displayed by clicking on the pane
header, for example, the Filters pane.
Wildcard Searches
You can use wildcard characters in searches throughout the CounterACT Console, as
follows:
* (asterisk). Matches any string, including an empty string, and including
symbols. You can use the asterisk (*) anywhere in a string.
? (question mark). Matches one single character, including symbols.
\ (backslash). Used as an escape character to protect a subsequent special
character (*,? ,\). For example, typing "\?" will search for a question mark (?)
symbol.
Site Map
Use the map to get high-level status information for each site, such as:
Total number of devices
Non-compliant devices
Unmanaged devices
Devices without policies deployed
Blocked devices
Malicious devices
Number of online and offline devices
Number of corporate and guest devices
Browser Requirements
The map runs with Internet Explorer 8 and above.
When you click on a site, the map displays detailed site information.
When you double-click on a site, the endpoints at that site are displayed in the
Detections pane below the map. A blue highlight appears around the site icon to
indicate that the site is selected. You can deselect the site by clicking anywhere on
the map.
You can also assign segments to locations from the Segment Manager.
To define locations:
1. Select Options from the Tools menu.
2. Select Map and then select Locations. The Locations pane opens.
3. Select Add. The Add Location wizard opens.
4. Enter a location name and description. Select Next. The Location page opens.
5. Define a location:
7. Select Add. The Segment selection dialog box opens. Select the segments
that you want to associate with this geographical location.
8. Select OK. The location appears in the Locations pane.
To customize:
1. Select Options from the Tools menu.
2. Select Thresholds from the Maps folder. The Thresholds pane opens.
To customize:
1. Select Options from the Tools menu.
2. Select Thresholds from the Maps folder. The Thresholds pane opens.
locations together and displays only one offsite indicator. When you zoom in, you will
see each location independently.
The larger the number, the more offsite locations that are geographically close to
one another will be clustered together at higher zoom levels. See View Grid-Based
Clustering of Endpoints for details.
To customize:
1. Select Options from the Tools menu.
2. Select Thresholds from the Maps folder. The Thresholds pane opens.
3. Adjust the Cluster grid size value.
Map Tools
Use map tools to:
Access Map Legend
View Grid-Based Clustering of Endpoints
Drill Down for Site-Specific Statistics
Filter Map Display
Display Information about Endpoints Not Assigned to a Location
Enable or Disable the Map
Map Legend
The Externally Managed Devices item in the legend serves as groundwork for
future support of offsite endpoint management.
Grid-Based Clustering
The Cluster grid size field determines how locations are clustered. See Customize
Cluster Grid Size Settings for details.
Filter by Group/Segment/Policy
No Location Form
If you have installed plugins, related plugin information will also appear, for
example, if you installed the VPN Plugin, you will see VPN user information.
See About Base Plugins and ForeScout Modules for more information about
plugins.
Detections Pane
Two panes are available for displaying detection information from the Home tab
Detections Pane
Details Pane
Detections Pane
You can use an extensive range of Detections pane tools to help you find endpoints
of interest and control them.
For example:
Controlling Endpoints from the Detections Pane.
Tracking Endpoints Using the Detections Pane Filter.
Viewing Mouse-Over Table Information.
Filter the view in the Detections pane. See Working at the Filters Pane.
Filter the view based on policy status, for example, only display endpoints
that did not match a policy, or only display endpoints that are offline.
The Hosts indicator at the top right corner of the Detections pane displays the total
number of endpoints detected for the folder or sub-folder you select. When there are
a large amount of endpoints and it takes a long time to load the information to the
Console, this indicator is updated to Showing X of X and will display the number of
endpoints currently loaded out of the total detected.
Showing Counter
Details Pane
When you select an endpoint from the Detections pane, extensive details appear in
the Details pane.
Details Pane
Home Views
The information displayed in the Detections pane varies depending of the Home view
that you select. The following views may be chosen:
All Hosts View
Policy View
Real-Time Policy Status Summary
Compliance View
Corporate/Guests View
History View
The All Hosts view displays all endpoints that CounterACT detects.
This includes endpoints that are not part of a particular policy.
Policy View
The Policy view displays endpoints detected as a result of policies that you
created in the Policy Manager. Important detection statistics are provided. For
example:
The policy that the endpoint matched and the time that it was detected.
Machine information such as the IP address, MAC address, NetBIOS name and
DNS name.
Actions taken at the endpoint, for example, if the endpoint was blocked or if
access was prevented to the Internet.
User Directory information.
Automated notifications sent to endpoint users.
Information about endpoints that do not match the policy; endpoints that
have been released from policy sanctions and endpoints that are pending
inspection is also available.
To review a summary:
1. Mouse-over a policy folder.
Policy Summary
See Chapter 5: Policy Management for more information about working with policies.
Compliance View
The Compliance view displays endpoints that were detected in policies
categorized as Compliance policies. By default, these include policies generated from
Compliance templates.
Compliance categorization can also be configured in the Policy Manager. See Working
with the Policy Manager for details.
Use this view to see information about the overall compliance status of endpoints
included in such policies.
Compliance Summary
Select a specific endpoint and view a compliance summary for Compliance policies at
which the endpoint was inspected.
Compliance View
The Compliance column entry in the Detections pane indicates whether the endpoint
is overall compliant. If an endpoint is inspected by several compliance policies and is
not compliant in one, the endpoint is not compliant.
Compliance Entry
Corporate/Guests View
History View
The History view lets you display a snapshot of detection and action
information from a previous period. You can view information about malicious
endpoints, Service Attacks and policy detections.
History View
3. Select required values for the filters. The following filters are available:
Date filter: Select a search date
Time filter: Select a search time
Policy filter: Select a policy to view
Status filter : Select endpoints to view based on status
The filter applies to all endpoints, but information may not appear if it is
contained in hidden columns. Be sure to display columns that may contain
items that you are searching for.
2. In the Available Columns area, select the columns that you want to add and
then select Add.
3. In the Selected Columns area, select the columns that you want to remove
and then select Remove.
4. The topmost column in the Selected Columns area is displayed in the leftmost
position in the Detections pane. To change this order, use Move Down and
Move Up.
5. Select OK.
A triangle at the top of the column indicates the sorting order (pointing
downwards = descending, pointing upwards = ascending).
To find information:
1. Type Ctrl-F or select Find from the File menu.
The Find dialog box opens.
2. Type the text to find and then select the relevant options.
3. Select Find and then select Cancel to close the dialog box.
You can also use the Filter option to filter information in the table per segment,
Group, Ignored IPs or Organizational Unit. See Working at the Filters Pane for
details.
4. Select OK.
To start an action:
1. Right-click an endpoint from the Detections pane.
2. Select an action category and sub-category then select an action.
If you installed a plugin, actions related to the plugin are available. For
example, if you installed the VPN Plugin, VPN related actions are included.
One-time actions have temporary impact on the endpoint until they are carried out
again; for example the Send Email action or the HTTP redirection action. One-time
actions cannot be manually canceled once they are carried out. If you have
incorporated an action in an Action Schedule, you can perform the manual cancel on
a one-time action.
How do you know if an action can be cancelled?
Youll know if an action can be cancelled if you right-click the endpoint in the
Detections pane and the Cancel Actions options is displayed.
Cancel Actions
Action Tooltip
To cancel actions:
1. Right-click an endpoint from the Detections pane that has an action that you
want to cancel and then select Cancel Actions.
Additional Controls
Additional controls are also available from the Detections pane.
Exception Exclude selected endpoints from policy inspection. See Creating Policy
Endpoint Exceptions for more information.
Delete Release the endpoint from any action taken. If the endpoint is detected
and at the next recheck matches the policy, the action is applied again.
Recheck Recheck the endpoint for policy detections. Options are available to
recheck a single endpoint for a particular policy or recheck the endpoint
for all policies. You can also recheck multiple endpoints simultaneously.
The dialog box displays all endpoint events, regardless of whether they
were detected on the endpoint.
The Event Viewer and Audit Trail maintain information about cleared
events. See Chapter 10: Generating Reports and Logs for more
information.
Events can also be cleared from the Assets Portal. See Chapter 9:
Assets Portal for more information.
Comment Make endpoint management easier with user-defined comments.
Create a comment by right-clicking an endpoint or group of endpoints,
and then either use the search box to look for endpoints with the
comment text or create a policy that detects endpoints based on your
comment.
The comment is retained for the life of the endpoint in CounterACT.
Use the Device Information>Comment property to create policy that
detect endpoints with a comment. See Device Information Properties
for details.
Malicious Host Actions
Set State/Time Change the malicious host state and expiration time. See Changing the
Host State for more information.
Add to Define the endpoint as a legitimate email host. CounterACT will ignore
Legitimate Email email traffic detected at this endpoint.
Servers
To create exceptions:
1. From the Detections pane, right-click an endpoint or group of endpoints and
select Add Policy Exception.
The endpoints that you select appear in the Add Policy Exception dialog box
that opens.
2. Select a policy or sub-rule from which to exclude the endpoint and define the
exception type.
3. In the Except these drop-down list, select an identifier by which to detect
the endpoint. Options may include the IP address, host name, and MAC
address or user name of the endpoint. Select the identifier that you think is
least likely to change.
4. Select OK.
Endpoints are exempt from further inspection for this policy. Blocking actions taken
are released. Non-blocking actions, such as Add to Group, Send email and one-time
HTTP actions are not stopped.
Filters Pane
folder. The search bar can be hidden or displayed by clicking on the Filters pane
header.
Select an item from the Filters pane and view related endpoint detection in the
Detections pane. For example, view endpoint detections from Sales or Finance
segment.
Inventory View
You can maximize smooth tracking of this activity by customizing the inventory
categories into sub-categories. For example, you may discover via the Inventory that
your network is working with a variety of authorized and unauthorized processes. If
this is the case, you could create lists of authorized and unauthorized processes
under the Process Running property folder or lists of Switch IP addresses per VLAN
under the Switch folder.
Inventories only show endpoints that are currently online.
Inventory activities are queried and refreshed every 23 hours. The refresh frequency
can be modified from the Inventory Discovery rule. See Defining Endpoint Discovery
Rules for details.
Inventory Tab
To ensure that these properties are discovered and displayed, you must
enable Inventory Discovery.
The user Audit Trails log displays changes made to the Inventory Discovery
rule. See Monitoring User Activity for details about this log.
If you clear a property in the Inventory Discovery rule but select it in another
discovery rule, that property is included in the Inventory. For example, if you clear
the Applications Installed property in the Inventory Discovery rule but select it in
another discovery rule, installed applications are displayed in the Inventory view.
Detection Policies
Inventory properties can also be discovered via your policies. For example, if you run
a policy that detects running processes, the detected processes will appear in the
Inventory. Specifically, if you want to discover and display Open Ports in the
Inventory, you should create a policy that detects these ports.
Filter By Inventory
Applications installed
The Detections Pane lists information about the inventory property category
selected in the Views pane. For example, the number of endpoints that are
running a certain process.
The Hosts Pane displays all endpoints that are detected with the inventory
item that is currently selected. For example, the endpoint IP address, MAC
address, connected switch port or User Directory name.
Inventories only show information detected at endpoints that are online.
Views Pane
The Views pane shows the Inventory items that you can view.
Views Pane
Windows machines
Processes Running
Services Running
Operating system versions running
Macintosh machines
Users logged-in
Operating system versions running
Processes Running
Software Updates Missing
Applications Installed
You can create Lists for each of the property categories shown in the view for
example, create an Unauthorized Processes Running List under the Processes
Running category, and add all unauthorized processes detected at your network to it.
Lists
Detections Pane
This pane displays information about the property that you selected from the Views
pane.
Inventory Property The property that you selected from the Views pane. Information in
(for example, this column will include all the values for the related property. For
Processes Running) example, if you selected the Process Running property, this column
will show all the processes currently running.
No. of Hosts The number of endpoints currently detected with the selected
property. For example, the number of endpoints currently running a
process; the number of endpoints detected at switch IP address;
the number of endpoints detected with vulnerabilities or the
number of endpoints logged in as Windows users.
Last Update The last date and time that the detection was made.
Last Host The last endpoint at which the activity was detected.
Lists The lists to which the live inventory property was assigned. For
example, the iexplore.exe process may be part of the White listed
Server Processes list and the White listed Endpoint Processes list.
See Customizing the Inventory for more information about creating
lists.
Detections Pane
Hosts Pane
The Hosts pane displays the endpoints that have been detected for the Inventory
item selected. Use the tools available when working with endpoint detections to
handle these endpoints, for example, assign actions to endpoints or drill down to get
more detailed endpoint information. See Controlling Endpoints from the Detections
Pane and Getting More Information about Endpoints for details.
Hosts Pane
Working with inventory lists enables more customized, smoother tracking of network
activity.
To create lists:
1. Select an Inventory category from the Views pane, for example,
Windows>Windows Services Running.
2. Right-click one or several property values from the Detections pane.
3. Select Add to List.
The Add to List dialog box opens.
4. Add the value to an existing list by selecting the required list from the drop-
down list.
5. Select OK. Alternatively, add the value to a new list.
Select (Add). The New List dialog box opens.
New List
Type a list name in the List Name field, for example, Authorized Windows
Services Running.
Type a list description in the Description field. The description is
displayed in the Lists dialog box, where lists are managed.
6. Select OK. The list is added to the Add to List dialog box.
7. Select OK.
8. The list is displayed in the Views pane when you select the parent Inventory
item.
Inventory List
Inventory List
To create lists:
1. Right-click a property folder from the Views pane. For example, right-click
Open Ports.
2. Select Add List. The New List dialog box opens.
3. In the List Name field, type a list name, for example, Unauthorized Open
Ports.
4. In the Description field, type a description of the list. The description is
displayed in the Lists pane.
5. In the Values field, type the property values, for example, the names of the
ports that are not authorized.
6. Select OK.
The values that you enter will appear in the Inventory under the folder that
you created when they are detected on the network.
The list and all the values that you entered can be viewed in the Lists pane.
You can use lists when working with policies. For example, create a policy that
tracks and stops machines running unauthorized processes. See Defining and
Managing Lists for more details.
To view lists:
1. Right-click the Inventory folder whose sub-items you want to view.
2. Select View Lists.
3. The Lists pane opens with all lists related to this item.
See Defining and Managing Lists for information about working with feature.
You cannot remove lists that are being used in policies. Lists that are currently being
used in policies can be edited, but the changes may immediately affect the policy
behavior.
To remove a list:
1. Right-click a list from an Inventory folder.
2. Select Remove List.
3. Select OK.
To edit a list:
1. Right-click a list from an Inventory folder.
2. Select Edit List.
The List dialog box opens, showing all the values for the list.
Edit List
Filtering Detections
After you define segments, you can filter the endpoints displayed at the Console,
Detections pane per segment. For example, display endpoints in the Sales
department that match a specific policy or Threat Protection detections found in the
finance department. This makes it easier for you to locate problematic network
areas.
Segments Single
Segments Multiple
Manhattan and then assign the respective segments in the NYC-HQ office network to
this location.
See Set Up the Map Create Site Locations for details.
Generating Reports
You can create reports based on segments; for example, Compliance trends per
segment. See Chapter 10: Generating Reports and Logs for details.
Managing Segments
Use the Segment Manager to:
Create Segment Hierarchies
Create Segment Ranges
Segments are shared among users. This means that if one user creates, edits
or deletes a segment, all users logged in to the same Appliance see the
change.
Segment Manager
2. Above the Segment tree, select (Add Segment). The Add New Segment
dialog box opens.
Conversely, if you remove the segment range from the Ranges section, that specific
range will no longer be handled by CounterACT.
No Range Defined
To remove a segment:
1. Select Segment Manager from the Tools menu. The Segment Manager
opens.
2. Right-click a segment from the Segment tree and select Remove. The
segment is removed from the Segment Manager. The name of the segment is
removed from other features in which it is displayed, but CounterACT
continues handling endpoints assigned to it.
Exporting a Structure
To export a segment:
1. Select Segment Manager from the Tools menu. The Segment Manager
opens.
2. Right-click the segment that you want to export from the segment tree.
3. Select Export.
4. Select XML file format.
5. Locate the file and then select Export. The data is exported.
Importing a Structure
You can import your segment structure from an XML file. These files can be created
using any standard editing tool.
The hierarchy defined in the file should represent the hierarchy of the Internal
Network.
2. Save as an XML file.
To create a range:
1. Select Segment Manager from the Tools menu. The Segment Manager
opens.
2. Select a segment from the Segment tree. The segment Name appears in the
Name field.
3. Enter a description on the Description field.
4. If you are working with the Console map, select Location and enter location
information. See Working with Map Locations for more information.
5. Select Add from the Ranges section.
The IP Address Range dialog box opens.
Segment Filter
Organizational Units
Organizational Units
Not all users have access to the Group features. See Access to Console Tools
Permissions for details.
Group Basics
This section provides basic information about groups. The following is covered:
Groups and Policies
Using Sub-Groups
Adding Endpoints to Groups
Using Sub-Groups
The Filters pane displays groups in a hierarchy, with sub-groups inside main groups.
In this case, all endpoints in the sub-groups are also in the main group.
Group Tree
Use the Group tree toolbar to perform the following:
Add a group
Delete a group
Change the parent-child hierarchy of groups
Import or export groups
Group Tree
Permanent group member: Endpoints that are manually entered via the
Groups Manager>Add or Groups Manager>Import option; or added to a
group by using the Add to Group action.
Detected group member: All endpoints that are currently assigned to a group,
provided that they have not been purged from the system.
Added At The timestamp of when the endpoint was added or the last time it was
edited.
Added By The name of the CounterACT user that added the member (if the was
added manually)
The name of the policy that added the member (if added by a policy).
Comment The Comment text specified when the endpoint was added.
Created Whether the endpoint was added manually or automatically using a policy.
Expires This is relevant only if the endpoint was added by a policy. It indicates
whether the Expires when host no longer matches policy option was
used, which automatically removes the endpoint from the group when it no
longer meets the policy condition.
Criteria The way in which the endpoint is identified in the group.
If the endpoint is added manually, the specified IP address or MAC address
is used. If the endpoint is added using the Add to Group action (either
using a policy or by right-clicking the endpoint in the Detections pane), the
MAC address is used if it is known at the time, otherwise the IP address is
used (this remains true even if the MAC address is learned later).
Host Displays the endpoint name if available, and if not then the IP address. In
the case of an address range, this field is blank.
IP Address Displays the IP address if available. In the case of an address range, this
field is blank.
Key The value by which the endpoint is associated with the group (IP address or
MAC address) CounterACT detects groups association based in this value.
Path The parent-child group hierarchy.
General Displays general information regarding the endpoint, for example, the
Appliance to which the endpoint is assigned, the endpoint IP address, the
online or offline status.
Manually Adding Groups and Group Members from the Groups Manager
3. Define a group name in the Name field and then select OK.
4. The name you defined appears in the Name field of the Groups Manager.
Type a brief description of the group Description field.
5. Verify that the Permanent tab is selected.
6. Select Add. The Add Group Member dialog box opens.
Deleting Groups
To delete a group:
1. Select a group from the Group tree.
2. Select the Remove Group icon.
You cannot delete the root Groups item. In addition, if the group is being used
in a policy, you are informed and the deletion is not allowed. Otherwise, the
group is deleted.
The Move dialog box opens. The segment that you chose is displayed in the
dialog box.
3. Select the drop-down arrow and move the group to the required location.
Ignore IP Filter
Details Pane
The Details pane displays an extensive range of information about the endpoint that
you selected in the Detections pane. The following categories of information are
available:
Information about specific policies: Review matched and unmatched
details or review information about why the endpoint was not inspected by a
policy. This information is available when a policy is selected from the Views
pane.
All policies information: Review matched and unmatched details for all the
policies by which an endpoint was inspected or review information about why
the endpoint was not inspected in those policies.
Profile information: Review specific details about endpoint properties, for
example, device identity information, switch information, Active Directory
information.
Compliance Information: Review a summary of endpoints compliance
status. The ForeScout Compliance Center summarizes endpoints that comply
or do not comply with policies that you have created. A single line indicates
whether the endpoint is compliant. This line is followed by a table with a row
for each compliance policy that includes the policy status, name, compliance
issues, actions taken, original detection date and last update time. To display
the ForeScout Compliance Center, you must categorize your policy as a
Compliance policy in the Policy Manager. See Categorizing Policies for details.
Compliance Tab
Host Details
Information in the Policy Actions tab can be exported. See Policy Action Log for more
information.
Host Log
Use the Host Log to investigate the activity of specific endpoints, and display
information about how CounterACT handled those endpoints. The log displays
information about endpoints as they are detected and is continuously updated.
You can display endpoints from a specific time period and IP address range. In
addition, filter tools are available to limit the log display for, example, to specific
policies or sub-rules. An option is also available to export the Log to an XML file.
Host Log
Status The status of the operations that have taken place. For example, if a policy
Action is complete, the status is OK.
MAC Address The MAC address of the detected endpoint.
Origin The CounterACT device that detected the event.
7. Select OK.
Assets Portal
The Assets Portal displays information about the endpoint in a web-based search and
discovery tool. For example, view information about endpoint properties, policy
violations, login information, User Directory identity details, organizational mapping
details, endpoint device connections and more. You can perform Google-like
searches from the portal. See Chapter 9: Assets Portal for more information.
For the ForeScout Compliance Center to be effective, the endpoint user must
have SecureConnector installed on the endpoint device accessing the
network. See Start SecureConnector / Stop SecureConnector for information
about installing SecureConnector.
The ForeScout Compliance Center dialog box is displayed until the endpoint has
successfully logged in and is compliant with selected policies.
Users can open the compliance wizard manually from their endpoint to view their
compliance status as well.
Customizing Page Design
The design of the ForeScout Compliance Center may be customized. In addition to
customizing the look and feel of the page, i.e. adding logos, images and text, you
can also create a separate design for endpoints that are compliant and another
design for endpoints that are not compliant. See Customizing HTTP Pages.
Login Tab
The Login tab prompts users to enter their login credentials to sign in to your
network. See the HTTP Login action for more information about when the Login tab is
activated.
After users have successfully signed in, the Compliance tab opens.
Compliance Tab
The Compliance tab:
Assists you in downloading and installing SecureConnector.
Assists you in achieving network compliance.
You can add additional comments to this tab by using the HTTP Notification action.
Messages entered using these actions are also displayed in the tab.
Installing SecureConnector
If the endpoint is not managed by SecureConnector, the wizard prompts you to
download and run SecureConnector. The following pages are displayed:
Achieving Compliance
The Compliance tab displays the endpoint compliance status.
If there is any noncompliance with any policy, Host is Not Compliant is displayed.
This indication refers to all policies that you are running on the endpoint which are
categorized as Compliance in the Policy Manager, as well as default Compliance
template policies. See Working with the Policy Manager for details.
In addition, the Compliance tab can be used to display messages and links prompting
noncompliant endpoints to become compliant by taking action; for example, by
clicking a link that redirects end users to a site where they can download the latest
antivirus application or to install patches.
Users can select Recheck to verify their compliance status. All categorized policies
are rechecked against the GUI Policy Editor options. Categorization is configured in
the Policy Manager. See Working with the Policy Manager for details.
If the endpoint meets all the requirements of each of these policies, it is compliant
and Host is Compliant is displayed.
Noncompliance Indication
When you activate the Compliance Center for one action, all actions are
automatically activated to use the ForeScout Compliance Center dialog box, even if
Show ForeScout Compliance Center is cleared.
If you installed plugins, plugin templates may also be available. See Chapter
8: Base Plugins and ForeScout Modules for details.
Consider the following when rolling out any policy template or custom policy:
Do not enable policy actions when first running policies. First verify that the
policy pinpoints the right users and devices, and verify that there were a
reasonable number of discoveries.
Rather than rolling out several policies at the same time, consider working as
follows:
Deploy one policy.
Review and fine-tune the policy. See Edit Policies and Rules for more
information.
Roll out another policy.
Initially, avoid rolling out a policy across all enterprise sites. Consider rolling
out policies one site at a time, even if the policies will eventually be deployed
across the enterprise. The rollout should be handled this way because many
sites operate under unique work procedures with site-specific requirements.
Template Structure
Templates are predefined to streamline the process of creating policies. CounterACT
templates are built as follows:
Policy name (there is a predefined default name) and an optional description.
Policy scope, for example, the endpoints that you want to inspect (filtered for
certain templates).
Instructions regarding what endpoint properties to look forconditions. For
example, find Windows endpoints that are running peer-to-peer applications
(predefined when using templates).
Instructions regarding measures to take at endpoints, if conditions are met
actions. For example, send email to the IT department when non-corporate
installations are found (predefined when using templates). Template actions
are disabled by default.
For more information about these policy elements, see Creating Custom Policies.
Detections and actions resulting from the template policies appear in the Home view,
and can be managed from there.
In addition, a policy is created for each group type. You can view these policies in the
Policies>Asset Classification folder in the Views pane.
Prerequisites
Consider which endpoints you want to inspect. The policy does not handle
endpoints outside of the Internal Network.
Verify that the Asset Classification template is run before any other template.
Asset Classification groups are used when working with the other
templates. The template was most likely run during initial CounterACT
setup. Check the Filters pane to verify that your endpoints have been
classified.
Organizing your endpoints into groups makes it easier to create and
manage other policies and easier to track policy results.
4. Select Next. The Sub-Rules page opens. This page lets you review sub-rule
conditions and actions.
Refer to the HPS Inspection Engine Plugin Configuration Guide for more
information about classification methods. Select Options from the Tools
menu. Select Plugins. Select this plugin and then select Help.
3. Select the appropriate device category from the Network Function drop-
down list.
4. Select OK.
Troubleshooting Tip
The classification method that CounterACT uses is displayed in the Profile tab of the
Details pane when you select the information icon.
Classification Type
3. Select Edit. The Policy dialog box opens for the policy.
4. Select Add in the Sub-Rules section. The New Rule>Name dialog box opens.
5. Type a Sub-Rule name and description. For example, use the name
Handheld devices.
6. Select OK. The Sub-Rule>New Rule dialog box opens. Configure the condition
as follows.
7. Select Add from the Condition section.
a. Expand the Classification node and then select Network Function.
b. Select Mobile Device from the Network Function pane.
c. Select Evaluate irresolvable criteria as False.
Network Function
d. Navigate and expand the Device Information folder and select the Open
Ports property.
e. In the In Ranges text box, type 62078/TCP.
f. Select Evaluate irresolvable criteria as False.
g. Select OK. The Sub-Rule dialog box reopens.
h. Select One criterion is True from the Condition drop-down list.
i. Select OK.
8. Configure the Action as follows:
9. Select Add from the Actions section.
a. Expand the Manage node and select the Add to Group action.
b. Select New Group. The New Groups dialog box opens.
c. Create a Handheld Devices group. See Working with CounterACT Groups
for details.
d. Select OK from the Groups Manager. The action dialog box reopens with
the Hand Held Device group in the in the Add to Group drop-down list.
e. Complete the action configuration and select OK. The Sub-Rule dialog box
reopens.
10.Select OK. The Policy Editor dialog box opens. The new sub-rule appears as
the last sub-rule in the policy.
11.Use the Up button so that the Hand-held devices sub-rule is number 5.
(Below the Linux/Unix Sub-Rule and above the Macintosh Sub-Rule).
Prerequisites
Consider which endpoints you want to inspect. The policy does not handle
endpoints outside of the Internal Network.
Verify that you have already run the Asset Classification template and would
like to improve classification results.
4. Select Next. The Sub-Rules page opens. This page lets you review the sub-
rules predefined with this policy.
To compare results:
1. Select the Console Home tab.
2. From the Views pane, navigate to the Classification Migration policy.
3. Select a sub-rule from the Migration Classification policy in the Views pane.
Information about endpoints inspected in the sub-rule appears in the
Detections pane.
4. Select an endpoint. Endpoint details appear in the Details pane.
5. Select the tab with the related sub-rule.
6. Expand the folder with the rule. Details about the comparison appear.
7. Review the details and manually classify the device, if required. See Manually
Assigning a Classification.
3. Select the appropriate device category from the Network Function drop-
down list.
4. Select OK.
Prerequisites
Run the Asset Classification policy template before running this policy
template. This is required because the Asset Classification policy creates
device groups, including the Mobile group, on which the Mobile Classification
template is based. If you are working with a CounterACT version earlier than
6.3.4.10, the Asset Classification policy places mobile devices in the Hand
Held group, rather than the Mobile group.
Consider which endpoints you want to inspect. The policy does not handle
endpoints outside of the Internal Network.
In addition, a policy is created for each group type. You can view these policies in the
Policies>External Devices folder in the Views pane.
Prerequisites
Consider which endpoints you want to inspect. The policy does not handle
endpoints outside of the Internal Network.
Run this template first:
External Device groups are used when working with the other templates.
The template was most likely run during initial CounterACT setup. Check
the Filters pane to verify that your endpoints have been classified.
Organizing your endpoints into groups makes it easier to create and
manage other policies and easier to track policy results.
4. Select Next. The External Device Classification page opens. This page lets
you select the types of external devices for which you want to create policies.
4. Select Next. The Sub-Rules page opens. This page lets you review sub-rule
conditions and actions.
Prerequisites
Consider which endpoints you want to inspect, specifically segments in which
guests may connect to the network. The template does not handle endpoints
outside of the Internal Network.
The Corporate/Guest Control policy does not apply to printers and network
devices, which are detected and classified by the Asset Classification policy.
Verify that you have run and fine-tuned the Asset Classification policy.
Verify that the Asset Classification policy is applied to the network segment or
IP address range on which you want to apply the Corporate/Guest Control
policy.
Guest Groups
When you select a group, associated endpoints appear in the Console, Detections
pane.
The Corporate page describes the criteria for corporate host evaluation and lets you
fine-tune this criteria. All endpoints in your policy scope are first evaluated against
these criteria.
4. Select OK and then select Next. The Corporate page opens. Information in
this page is used to define corporate host criteria.
All endpoints in your policy scope will first be evaluated against the criteria defined
here.
Prerequisites
Consider which endpoints you want to inspect. CounterACT does not handle
endpoints outside the Internal Network.
Verify that you have run and fine-tuned the Asset Classification and
Corporate/Guest Control templates. The External Disk Drive Compliance
template applies only to corporate, Windows endpoints. These groups are
automatically included in the scope.
Verify that the HPS Inspection Engine Plugin is configured with credentials
that allow it to remotely inspect corporate Windows endpoints. This may
require using Windows Group Policy to allow access from all CounterACT
Appliances to port 445/TCP on domain endpoint devices.
6. Edit the name, and if required add a description. See Naming Tips for
guidelines about creating effective names.
7. Select Next. The Scope page appears. Use this page to determine which
endpoints are inspected by the policy.
4. Select Next. The External Disk Drive page opens. This page lets you define
which external disk drives are acceptable.
5. Enter the authorized external disk drive ID. It is important to type the exact
device ID. This ID is what CounterACT detects when an external device is
connected to an endpoint.
6. Select OK. The added value is displayed on the New List dialog box.
7. Select Next. The Sub-Rules page opens.
To view sub-rules:
1. Select a sub-rule and then select Edit.
2. View the sub-rule details and select OK.
Prerequisites
Consider which endpoints you want to inspect. CounterACT does not handle
endpoints outside the Internal Network.
Verify that you have run and fine-tuned the Asset Classification and
Corporate/Guest Control templates. The Overall Endpoint Compliance
template applies only to corporate, Windows endpoints. These groups are
automatically included in the scope. To view them, run the policy and then
use the edit tools to view the policy Main Rule.
Verify that the HPS Inspection Engine Plugin is configured with credentials
that allow it to remotely inspect corporate Windows endpoints. This may
require using Windows Group Policy to allow access from all CounterACT
Appliances to port 445/TCP on domain endpoint devices.
Require
Define which applications must be installed at endpoints.
Restrict
Define which applications should not be allowed at endpoints.
To define tests:
1. Select the tests that you want to perform.
2. Select Next. The Summary page opens. It displays the list of policies that
have been set using the Overall Endpoint Compliance template.
2. Use the Up and Down buttons to change the endpoint inspection order.
Before Inspection
Before inspecting endpoints defined in the Scope page, the policy verifies that
CounterACT can perform deep inspection. This means that either:
CounterACT can access the endpoint via TCP ports 139/445 and is able to
inspect it using domain credentials. When this happens, the endpoint is
manageable (domain). Unmanageable endpoints are usually foreign to the
domain.
Inspection Details
Sub-rule conditions criteria define how CounterACT detects endpoint compliance
status.
The template finds endpoints that are not running one of the personal
firewalls listed in the page. For example:
ZoneAlarm
Windows Firewall
Symantec Firewall
Sygate
Sophos Firewall
McAfee Personal Firewall
Internet Connection Firewall (ICF)
3. From the Actions section, select an action and select Edit. The action
definition is displayed.
4. Select OK. The Compliance page reopens.
5. From the Actions section, select an action and then select Enable to run it.
6. Select OK. The Main Rule page reopens.
7. Select Finish.
Noncompliance Indication
to-Peer and Windows Updates instead of running the policies together. Refer to the
templates located under the Compliance folder for details about each option.
The policies created using the individual compliance templates inspect only
Windows machines. To inspect Macintosh machines, use the Macintosh
Update Compliance template.
Prerequisites
Asset Classification and Guest provisions must have already been activated.
Detected endpoints must be categorized into Windows, Macintosh and
Corporate groups.
Endpoints must be manageable. The template verifies which endpoints are
manageable and which are not. See Start SecureConnector / Stop
SecureConnector for information regarding the SecureConnector connection.
5. Select Next. The Scope page opens. Use the page to define which endpoints
are inspected.
4. Select Next. The Sub-Rules page opens. This page lets you review policy
conditions and actions.
2. Select Edit.
3. From the Condition section of the Sub-Rules dialog box, select Microsoft
Vulnerabilities and select Edit to view the criterion.
Prerequisites
Asset Classification and Guest provisions must have already been activated.
Detected endpoints must be categorized into Windows, Macintosh and
Corporate groups.
Endpoints must be manageable. The template verifies which endpoints are
manageable and which are not. See Start SecureConnector / Stop
SecureConnector for information regarding the SecureConnector connection.
4. Select Next. The Sub-Rules page opens. This page lets you review policy
conditions and actions.
2. Select Edit.
3. From the Condition section of the Sub-Rules dialog box, select Macintosh
Software Updates Missing and select Edit to view the criterion.
Send Email: You can deliver email notification to network users indicating that
specific security and other updates are missing on their machines. This action
is disabled by default.
Start Macintosh Update: You can automatically send an update link to the
endpoint. This action is disabled by default.
Threats Templates
This section describes general guidelines for using all of the Threats templates. It
covers:
About the Threats Templates
Prerequisites
Using the Threats Templates
Which Endpoints Are Inspected Policy Scope
Malicious Hosts Template
ARP Spoofing Template
Impersonation Template
Dual Homed Template
Prerequisites
There are no prerequisites for any of the Threats templates.
4. Select Next. Either the Main Rule or Sub-Rules page opens. These pages lets
you review policy conditions and actions.
For more information about these events, see About Threat Protection and Basic
Terminology.
To view conditions:
1. Select the Malicious Event entry from the Condition section of the Main
Rule page.
specific time period exceeds a certain limit. You can define the number of MAC
address and the time period.
To view conditions:
1. Select the ARP Spoofing entry from the Condition section of the Main Rule
page.
Impersonation Template
This section covers:
About the Impersonation Template
How Impersonation Is Detected Policy Condition
How Impersonation Is Handled Policy Actions
You can fine-tune the template policy by defining the IP addresses that are to
be ignored when calculating using the Number of IP Addresses property. To
do this, navigate to Tools>Options>HPS Inspection Engine>Tuning tab.
If endpoints meet these criteria they are considered dual-homed. You can manage
these endpoints by notifying your IT or Security team. See How Threats to Dual-
Homed Hosts Are Handled Policy Actions.
To further control these endpoints, you can disable the network adapter and use the
Start SecureConnector action to manage the endpoints with SecureConnector. When
this happens the endpoints will be automatically detected by the SecureConnector
Manageable Sub-Rule.
4. If required, repeat the previous steps for another Dual Homed entry.
5. Select Finish.
application version has been altered or a new application has been introduced into
your network.
This section describes the guidelines for using all of the templates except for New
TCP/IP Port template. This section covers:
Prerequisites
Using the Track Changes Templates
Which Hosts Are Inspected Policy Scope
How Frequently Are Endpoints Inspected Change Time
How a Change Is Detected Policy Condition
How a Change Is Handled Policy Actions
How to Modify a Condition Advanced Settings
For details about using the New TCP/IP Port template, see About the New TCP/IP
Port Template.
Prerequisites
There are no prerequisites for any of the Track Changes templates.
1. Select Next. The Main Rule or Sub-Rules page opens. This page lets you
review policy conditions and actions.
2. Select a sub-rule.
3. Select Edit to review the entry. The Sub-Rules Condition dialog box opens.
4. Select an entry in the Condition section of the Sub-Rules Condition dialog
box.
5. Select Edit to review the entry. The Condition dialog box opens.
6. Select OK.
Prerequisites
There are no prerequisites for using this template.
4. Select Next. The Change Time page opens. This page lets you set the time
period and interval for new TCP/IP port detection.
5. Select Next. The Main Rule page opens. This page lets you set conditions for
new TCP/IP port detection.
1. Select Next. The Main Rule page reopens and lets you review policy
conditions and actions.
2. Select Edit.
3. After viewing the criteria and timeframe for new TCP/IP port detection, select
OK.
What Is a Policy?
Most network realities consist of complex topologies and architectures; a multitude of
events, users, vendors and devices; continuously changing downloads and patches;
new vulnerabilities; extensive compliance requirements, and more.
CounterACT policies let you automate and simplify the intricate and time-consuming
tasks involved in dealing with these realities. For example:
Pinpoint and quarantine endpoints that are working without antivirus software
or that are not properly patched.
Limit the network access available to guests and consultants.
Enable automated detection of endpoints that are missing required Microsoft
Service Packs, and provide self-remediation tools.
Verify that all mission critical servers are hardened according to the server
hardening policy.
Run scheduled vulnerability checks and automatic repair and protection
mechanisms.
Automatically discover and quarantine rogue wireless access points.
Create admission control policies to determine who can access the network
and under what conditions.
Display important policy results in the CounterACT Dashboard. This Executive
Dashboard is a web-based information center that delivers dynamic at-a-
glance information about network compliance, threats and guests.
Policies allow you to define instructions for automatically identifying, analyzing and
responding to a broad range of network activity for the purpose of bringing
endpoints to policy compliance.
Specifically, you use policies to initiate endpoint inspection, specify conditions under
which CounterACT should respond to endpoints, and define actions to perform at
endpoints that match or do not match the policy requirements. You can define
policies as simple as identifying missing laptops or more complex policies that control
network access and VLAN assignment based on the organizational structure.
In addition to creating your own policies, you can also use policy templates
CounterACT-supplied templates that help you quickly create important policies
based on predefined policy parameters.
response to changes at the endpoint. For more information about event driven
monitoring this feature, refer to the HPS Inspection Engine Plugin Configuration
Guide. Select Options from the Tools menu. Select Plugins. Select this plugin and
then select Help.
Working with Policy Results
After running a policy, you can view detection information in the Home view,
Detections pane. You can also manage policies from this location. See Controlling
Endpoints from the Detections Pane for more information.
Actions taken at the endpoint. For example, if the endpoint was blocked or if
access was prevented to the Internet.
User directory information.
Switch related information.
Troubleshooting Messages
Messages about irresolvable issues, failed actions and other errors can be displayed
at the Console. You can also open linked troubleshooting pages that offer
suggestions for handling these issues.
Troubleshooting Display
To view troubleshooting:
This information is also available from the Host Details dialog box.
Troubleshooting Toggle
Using Groups
A group is a collection of endpoints with something in common, such as endpoints
that run Windows, or network guests. An endpoint can belong to any number of
groups.
Organizing your endpoints into groups makes it easier to manage and analyze
policies. For example, there is no need for a rule to detect operating system types or
user types. These groups can be defined once and reused for various policies. Fewer
rules mean simpler policies that are easier to prepare, monitor and track.
In policies, groups can be used:
To filter the scope of endpoints inspected by the policy.
To define endpoints excluded from the policyexceptions.
As a policy condition: Automatically perform policies on predefined groups.
For example, define a policy with the condition that endpoints are members of
both the Windows group and the Norton Antivirus Installed group. The policy
can then check whether the antivirus application is running and enable it if
necessary. The Member of Group property is found in the Device Information
property category. See About Policy Conditions for details.
As a policy action: Automatically add endpoints to predefined groups based on
certain conditions. For example, define policies that use the Nmap-OS Class
property and the Add to Group action to organize your endpoints into groups
called Windows, Linux, Macintosh and Other.
There is an additional option to automatically remove the endpoints from the group
when the condition is no longer met. This keeps the group membership constantly
updated. Consider the example where a policy places all endpoints with connected
USB mass storage devices into a group called USB Attached. If someone removes
the USB device from the endpoint, the policy will automatically remove the endpoint
from the USB Attached group.
You can customize the mechanism by which CounterACT recognizes and handles
endpoint identity changes. For example, endpoint identity change can also be
calculated for changing NetBIOS host names that are associated with specific IP
addresses. See Policy Preferences for more information.
One-time actions, for example, email and HTTP redirection, can only be cancelled if
they were defined in Actions schedules.
Views Pane
3. Select Stop Policy Actions or Start Policy Actions. The Stop Action or
Start Action dialog box opens.
4. Select the actions that you want to stop or start. You can edit the action
definitions from here.
How do I know if actions have been stopped for a policy?
You can check to see if an action is stopped by:
Looking at the action icon: Action icons are grayed out if cancelled.
Checking the Start or Stop Rule Actions dialog box: Click the policy or
sub-policy and select Start or Stop Policy Actions to see the stopped and
started actions.
Policy Manager
Edit a policy.
Remove a policy.
Categorize policies to help you organize and view them in the Policy
Manager. For example, only display policies that have been labeled
as Compliance policies. In addition, a Compliance folder and
Corporate/Guest folder in the Views pane of the Console displays all
policies according to their category.
These categories are also used by the:
Executive Dashboard
ForeScout Compliance Center
Site Map
Compliance Status property
Corporate/Guest Status property
See Categorizing Policies for details.
In addition, the following policy management tools are available in the Policy
Manager:
Create Create custom reusable policy conditions. Select Custom from the Tools
Custom menu. See Authentication Properties for more information.
Conditions
Generate Generate a report listing all your policies, and policy definitions.
Policy Report Select Policies Summary Report from the Reports menu on the
Console.
Import and By default, policies are imported as XML files. Select Import from the
Export Policy Policy Manager and complete the fields in the Import Policy Folder
Folders dialog box, where:
Target Node is the destination.
Import Mode is the method used to import the policy folder, either as
a subfolder of the folder in the original location (Add folder to the
target) or as a subfolder of the target itself (Add folder content to
the target).
File name is the name of the policy that you want to import.
Import limitations
If you import a policy that refers to groups not defined on the Appliance,
these groups will automatically be created. Note that the groups will not
contain any members.
If you import a policy with a segment that does not exist, you receive a
warning message and the policy is imported without the segment.
Item Description
Name The name assigned to the policy.
Status Indicates whether the CounterACT detection mechanism is paused or
running. When paused, new detection events are ignored.
Category The category assigned to the policy.
Description The policy description.
Conditions The properties inspected on endpoints, i.e., specific OS systems, antivirus
updates, registry information, etc.
Scope The endpoints that are inspected for this policy.
Actions Measures taken at the endpoint if it matches the policy.
Recheck The conditions under which to recheck endpoints that match the policy.
Specifically, you can define:
How often endpoints are rechecked after they match a policy.
Under what conditions to carry out the recheck.
Groups CounterACT groups included in the policy inspection. See Groups and
Policies for details.
Segments The range of IP addresses to be inspected for the policy. See Defining a
Policy Scope for details.
Exceptions The range of IP addresses excluded from policy inspection.
User Scope The range of endpoints a CounterACT operator can view and work with.
Complete: Indicates that the policy scope is within the user scope and
the policy can be edited.
Partial: Partial access is available. The policy can only be viewed.
None: No access is available. The policy can only be viewed.
See Access to Network Endpoints Scope.
Path The path to the policy (in the Policy Folders pane of the Policy Manager).
To edit:
1. Right-click a policy or sub-rule from the Policy Manager and select Quick
Edit.
Policy Manager
You can hide and display policies associated with a subfolder by using the Show
subfolder policies checkbox at the Policy Manager.
To see all policies and sub-rules, select the Policy icon at the tree root and then
select the checkbox.
To create folders:
1. Right-click an item in the Policy Folders pane of the Policy Manager.
2. Select New Policy Folder.
3. Policies and policy folders are exported and imported as XML files. In the
Export dialog box, specify the location of the exported XML file and select OK.
The selected policy or folder is exported.
2. In the Import dialog box, specify the location of the XML file you want to
import and select OK.
3. When policy conditions or actions include login credentials for network
devices, servers, or services, CounterACT encrypts the exported policies.
When you import these policies, CounterACT prompts you for the password
that was used to encrypt the exported file.
4. Enter the password and select OK. The policy or folder is imported to the
location you specified in the Policy Folders tree.
To create a policy:
1. Select the Policy tab. The Policy Manager opens.
Policy Manager
2. Select Add from the Policy Manager. The Policy wizard opens.
3. Select Custom.
Policy Wizard
4. Select Next.
Custom, Name
Naming Tips
Make sure names are accurate and clearly reflect what the policy does. For example,
do not use a generic name such as Antivirus.
In this example, use a more descriptive name that indicates that your policy is
checking antivirus updates and which vendors are authorized.
You should avoid having another policy with a similar name. In addition, ensure that
the name indicates whether the policy criterion must be met or not met.
Examples:
Including only certain CounterACT groups, for example, endpoints that run
Windows. Use this option to pinpoint endpoint inspection.
Excluding devices or users that should be ignored when using a policy, for
example, VIP users running Windows.
To define a scope:
1. The IP Address Range dialog box automatically opens.
Custom, Scope
Select Add from the Filter by Group section to include only specified
CounterACT groups in the inspection. These groups must be part of the
Internal Range.
The Policy Group dialog box opens.
Select a group.
Select OK. To create more groups, select New Group.
Exclude endpoints from inspection. For example, ignore groups of VIP users
when conducting inspections.
Select Add from the Exceptions section, to exclude endpoints from
inspection. For example, ignore groups of VIP users from inspections. The
Exception Type dialog box opens.
Select an exception type and then select OK. An Exception dialog box
opens. Exception dialog boxes vary depending on the exception that you
selected. In general, you can define a specific exception value, for
example, enter a specific user name or use a Property Value List (a user-
defined list of property values, for example, a list of user names).
Select OK.
Use the Evaluate Irresolvable As checkbox to instruct CounterACT how
to evaluate the endpoint if the exception value cannot be resolved, for
example, CounterACT does not know the user name. Either include the
endpoint as an exception, exclude the endpoint as an exception or mark
the endpoint as Irresolvable for the policy.
After defining each exception, select OK.
4. Select Next. The Main Rule page opens.
Some policies, however, are designed to accomplish more, and contain more than
one problem and solution. For example:
Communicate with users who have installed peer-to-peer applications:
If users are part of the IT or Development departments, then list peer-to-
peer applications detected and advise users to uninstall.
If users are part of any other department, then send them email asking
them to contact the IT department to assist them in uninstalling, and
notify IT which endpoints are not compliant.
In such cases, you should use policy sub-rules to create several conditions and
related actions. Sub-rules allow you to automatically follow up with endpoints after
initial detection and handling. Creating sub-rules lets you streamline separate
detection and actions into one automated sequence. See Defining Policy Sub-Rules
for more information.
Exceptions
Recheck instructions
Custom, Sub-Rules
2. Type a unique policy and description. See Defining a Policy Name and
Description for details.
3. Select OK. The name is displayed in the New Sub-Rule dialog box that opens.
Use the dialog box to define sub-rule conditions and actions. See Chapter 6:
Working with Policy Conditions and Chapter 7: Working with Actions for
details.
Advanced, General
indicates the admission of an endpoint into the network, such as when it physically
connects to a switch port. A complete list of admission events is described below.
Recheck tools let you define:
How often endpoints that match a policy are rechecked
Under what conditions to perform recheck
You can update the default setting for matched and unmatched hosts, for example,
to initiate inspection according to a set schedule. You can also configure several
recheck settings to work simultaneously, for example, when a host IP address
changes every five hours.
Separate settings can be defined for hosts that either match or do not match a
policy.
Every Use this option to run a policy at short intervals, i.e. per seconds, minutes,
hours or days. This is recommended, for example, if you want to check
that a web or email service is consistently running, or if you want to verify
the integrity of any other mission critical service in your network.
Scheduled Define a schedule for running the policy.
A delay time exists between the detection of network admission events and the onset
of the policy evaluation. When an endpoint boots, the IP address is assigned rather
quickly, before most of its services have loaded. Waiting 30 seconds (default delay
time) increases the chances that the policy evaluation starts when more details could
be learned about the endpoint (after all services have loaded). You can update the
delay default time. See Policy Preferences for more information.
General Tab
5. Select OK.
6. Use the Evaluate Irresolvable As checkbox to instruct CounterACT how to
evaluate the endpoint if the exception value cannot be resolved, for example,
CounterACT does not know the user name. Either include the endpoint as an
exception, exclude the endpoint as an exception or mark the endpoint as
Irresolvable for the policy.
7. After defining each exception, select OK.
Policy Preferences
The following policy preferences are available:
Defining Authentication Servers
HTTP Preferences
Customizing HTTP Pages
Customizing HTTP Screen Elements for Mobile Interactions
Email Preferences
Customizing Endpoint Identity Change Thresholds and Detection Mechanisms
Time Settings
HTTP Login Attempts
The preferences that you set here are applied to all connected Appliances.
Preferences cannot be set individually for each Appliance.
NAC Folder
NetBIOS (139/TCP)
FTP (21/TCP)
IMAP(143/TCP)
POP3(110/TCP)
rlogin (513/TCP)
After you configure authentication servers, they are automatically deployed. This
means these servers are automatically opened, and added as Virtual Firewall rules.
These rules can be viewed in the Firewall Policy pane.
NAC>Authentication Pane
HTTP Preferences
Various preferences are available for handling HTTP traffic.
Defining HTTP Redirect Exceptions
Redirect Using Web Server DNS Name
Globally Redirect via HTTPS
Skip HTTP Redirect Confirmation Message
Defining Proxy Ports for HTTP Notification
To create exceptions:
1. Select Tools>Options and then select NAC>HTTP Redirection.
2. Select Global in the HTTP Redirection Exceptions section. The Global dialog
box opens.
updates.microsoft.com
exchange
This allows access to Microsoft Windows Update servers and prevents redirection of
the Exchange server when used via the web interface. These URLs cannot be seen or
edited by the user.
If the address contains one string from the following list, the user is not
redirected.
HTTP Login
HTTP Notification
Start SecureConnector
If you want to apply global HTTP exceptions to all network users, you can
work with Global URL Exceptions.
When multiple HTTP actions, each containing HTTP Redirection Exceptions, are
simultaneously applied to an endpoint, only the exceptions of the first HTTP action
received by CounterACT are applied. Additional HTTP Redirection Exceptions are only
applied when there are no other HTTP actions applied to the endpoint.
3. Select Add.
4. Enter a name for the exception in the Add IP Range dialog box.
5. Select Add to add an IP address range or segment and select OK.
To apply an exception:
1. In the relevant HTTP action configuration, navigate to the Exceptions tab.
3. Select the name of an HTTP exception from the Select IP Range dropdown list
and select OK. The exception is displayed in the Exceptions table.
3. Select Yes. When you apply changes, the CounterACT web server will restart.
To define:
1. In the HTTP pane, select Monitor Proxy Ports for HTTP Notifications.
2. Type the ports in the Proxy Ports List field. Use the following format:
80/TCP, 8080/TCP, 8888/TCP.
3. Select Apply.
The HTTP Redirection Page: Customization Tool page contains a table listing
all saved customized pages. When first using the tool, a default template is
displayed. This default template is automatically selected to be used to create
a new customized template.
To use a customized page, it must be published. In the HTTP Redirection
Page: Customization Tool page the template published status is displayed in
the Status column. The icons and descriptions are as follows:
The HTTP Redirection Page: Customization Tool page contains the buttons
described in the following table.
Button Description
Used to create new templates.
3. Select Add to create a new template or select an existing template and select
Edit. The Customization Tool opens.
For customization CounterACT provides you with the basic option for entering
the customization elements, as well as an advanced HTML editing option.
4. In the Name section type the template name in the Label field and a
template description in the Description field.
5. Complete the rest of the fields in accordance with your preferences; see Basic
Customization and Advanced Customization.
6. Select Save. If the template name already exists an overwrite confirmation
dialog box opens. In the confirmation dialog box select OK. The template is
saved and the page preview opens.
7. Select Return to Customize menu. The HTTP Redirection Page:
Customization Tool page opens.
Basic Customization
There are three configuration areas available for customization:
Page Body: Used to configure the page Header and Footer.
Page Properties: Used to configure the page background.
File Manager: Used to manage images, CSS files and JS files used in the
Header, the Footer and the background.
In the Header and Footer area there are two sub-areas, one for the Header and one
for the Footer.
The Header and Footer customization options are the same.
Images
The Image drop-down list provides a list of all uploaded images, see File Manager.
To include an image in the Header or Footer, select the image from the drop-down
list.
Where the selected image is placed in the Header or Footer, the image alignment is
customized by selecting one of the following options under the Image field:
Left
Center
Right
The following figure illustrates a left aligned image.
Text
In the Text field type the text to be displayed in the Header.
Where the entered text is placed in the Header or Footer, the text alignment is
customized by selecting one of the following options under the Text field:
Left
Center
Right
The following figure illustrates center aligned text.
Page Properties
In the Page properties area there are the following sub-customization areas:
Page Background Color: Used to customize the page background color.
Page Background Image: Used to add an image in the page background.
Use ForeScout StyleSheet: Used to remove the pre-configured ForeScout
page configuration.
Page Background Color
To customize the background color, select the icon. The Background Color
Customization panel opens.
The current background color is displayed at the top right. To its left, the proposed
color being selected is displayed.
In the center color strip all the available colors are displayed. Where the arrow is
located, the expanded color option is displayed in the left area. The color can be
selected from the left area or a color code can be entered on the panels right side.
Select your preferred color and then apply the color by selecting the icon. The
color is displayed in the modified icon.
File Manager
The File Manager area is used for managing images used in the HTTP page
customization. The images can be used in the Header, Footer and the background.
Only images, CSS files and JS files uploaded to the File Manager can be utilized in
the page customization.
To upload an image:
3. Select the image and select Open. The path is displayed in the field next to
the browse button.
4. Select Upload. The uploaded image is displayed in the File Manager uploaded
file list. The uploaded image is also added to the Image drop-down list in the
Header and Footer and Page Properties sections.
Advanced Customization
Advanced customization requires good HTML knowledge. CounterACT provides the
following advanced customization options:
Additional Head Tags Elements
Advanced Header and Footer customization
In the HTML Head Tag Elements section, additional HTML Head Tag elements can
be added to enhance the HTML customization options. These can include elements
such as scripts, instructions to the browser where to find style sheets, provide meta-
information, etc.
The following tags can be added to this section: <title>, <base>, <link>, <meta>,
<script> and <style>.
For advanced Header or Footer customization, in the Header and Footer section
select Advanced Customization. The simple customization Image and Text field
area is replaced by the advanced customization text box displaying the basic
customization HTML equivalent.
Advanced Customization
It is important that the Place holder for the ForeScout Message area is not
deleted from the code.
To publish a page:
1. Save the customized page.
2. Select Publish. The Publish Type Page opens.
If the endpoint is not compliant the Not Comply (FCC Mode) customized page is
used. The following FCC noncompliant page example has a red background and a
stop sign.
When FCC mode is disabled in CounterACT, the General customized page is used.
To use this feature, you must have both Assets Portal User and Policy
Management permissions. See Access to Console Tools Permissions for
details about acquiring permissions.
You must be familiar with Java script and CSS functionality to update the
skin.
/usr/share/tomcat5/webapps/portal/customize/mobile/mobile_customize.js
Text and label edits you make are applied to both desktop and mobile endpoints,
with the exceptions of three items that are only applied to mobile endpoints. These
three items are described below.
You can apply HTML formatting code to texts; for example bold and underlines. A
new line <Enter> in action text areas is automatically translated to a <br> tag.
3. Select an entry and select Edit. The Edit Locale Text dialog box opens.
Email Preferences
The Send Email action automatically delivers email to administrators when a policy is
matched. If there is extensive activity as a result of your policy, the recipients may
receive an overwhelming number of emails.
The following tools are available to help you manage email deliveries:
Define the maximum number of email alerts delivered per day (from
midnight)
Define the maximum number of events that are listed in each email
For example, you can define that you only want to deliver five emails per day, and
that each email will contain up to 50 events. The limits defined apply to each email
recipient, and for both the Send Email and Send email to host actions.
Default Settings
By default, up to ten emails can be sent within 24 hours, and one message is
displayed in each email. This means, for example, that if there is activity early in the
day and ten emails are sent by 2:00 PM, you will not receive emails about events
that occurred during the rest of the day.
After the maximum number of emails has been sent, a warning email is delivered
stating that the email delivery threshold has been reached and that you will receive
no more email alerts until midnight. At midnight, an email is sent summarizing
events that were not delivered.
2. Enter a value for Maximum actions listed in each email or use the spin
controls to adjust the value. For example, to receive an email alert each time
an events occurs, type 1 in the Maximum actions listed in each email
field.
3. Type a value in the Maximum emails per day field or use the spin controls
to adjust the value.
4. Select Apply.
Email Pane
You can sign these emails using a digital certificate, as specified by the
Secure/Multipurpose Internet Mail Extensions (S/MIME) standard. See Signing Emails
with an S/MIME Certificate for details.
Identity Pane
Count The number of IP address changes that can occur before the threshold
is passed.
Period The time period during which identity changes can occur before the
threshold is passed.
Ignore Endpoint identity change will be ignored for this period.
period
Ignored The MAC addresses that are ignored during detection. The threshold
host for IP address changes on this MAC has been passed. The MAC is
identities automatically added to a list of ignored addresses. You can edit and
remove MAC addresses from the list.
NetBIOS Apply the ignore mechanism and threshold definitions to NetBIOS
Hostname names that change on the same IP address.
Time Settings
The following general preferences can be customized:
Network Admission Resolve Delay
The External Inactivity Timeout option in NAC > Time Settings currently
serves as groundwork for future support of offsite endpoint management.
Configuring this option will not affect CounterACT functionality.
only when the endpoint in rediscovered as a result of the activation settings defined.
The default Inactivity Timeout is defined in the Policy Preferences dialog box. The
value there is applied to all Appliances until changed specifically, per policy, here.
Login Page
You can define the number of failed login attempts that occurs within a specific time
frame. Users who exceed this limit can be detected using the HTTP Login Failure
property. In addition, you can follow up with users who exceeded the limit by
creating useful policy actions, for example, notifying the IT team or preventing user
access to the production network.
To define a limit:
1. Select Options from the Tools menu and then select NAC > HTTP Login
Attempts.
2. Type the number of failed login attempts and the time within which failed
login attempts must occur in order for a login failure attempt to be detected.
3. Select Apply.
Property Lists
Lists contain endpoint properties and related values, for example, a list of domain
user names, or a list of DNS names, or of processes that you want to prohibit on
your network. Each List is associated with a single endpoint property and can contain
multiple related values.
Using lists speeds up and streamlines the policy creation process.
For example, if you discovered that network guests are running unauthorized
processes on your network, create a list of these processes, and then incorporate
them into a policy that will detect and halt them. You can manually create lists or
create lists based on Inventory detections and policy detections. See Defining and
Managing Lists for details.
Categorizing Policies
Assign policies to policy categories to:
Help you organize and view policies in the Policy manager. For example, only
display policies that have been labeled as Compliance policies. See Working
with the Policy Manager.
Include categorized policies in the Compliance folder and Corporate/Guest
folder in the Views pane of the Console. See Home Views.
Include categorized policies in the Executive Dashboard. See Chapter 16: The
Executive Dashboard.
Include categorized policies in the ForeScout Compliance Center. See Working
with the ForeScout Compliance Center.
Display categorized policies in the Site Map. See Working at the Site Map.
The Compliance Status and Corporate/Guest Status properties. See Device
Information Properties.
By default, these include policies generated from Compliance and Corporate/Guest
Control templates.
This section describes how to categorize other policies as either Compliance or
Corporate/Guest.
Follow these guidelines:
1. Create a policy whose results you want to display at the dashboard.
2. Categorize the policy as either Compliance or Corporate/Guest.
3. Label endpoints that match the policy sub-rules as follows:
Matched endpoints are compliant / not compliant / unlabeled
Matched endpoints are authorized guest / unauthorized guest / corporate /
unlabeled
Endpoints that do not match sub-rules or are unlabeled are not integrated
with dashboard results
When working with policies that only have a Main Rule, label endpoints that either
match or do not match the policy. For example, consider a policy detecting endpoints
Rule Definitions
2. Finish creating the policy and select it from the Policy Manager.
3. Select Categorize.
The Categorize dialog box opens.
4. Select Compliance from the Select a policy category drop-down list.
Sample Label
This means that endpoints with the vital file are calculated as compliant.
Other endpoints are unlabeled.
6. Select Unlabeled if you do not want results to be calculated.
Policy Reports
Two categories of reports are available:
Policies summary
Reports portal
Policies Summary
You can generate a report listing your policies and policy definitions.
Reports Portal
The Reports Plugin lets you generate reports with real-time and trend information
about policies, endpoint compliance status, vulnerabilities, device details, assets and
network guests.
Use reports to keep network administrators, executives, the Help Desk, IT teams,
security teams or other enterprise teams well-informed about network activity.
Reports can be used, for example, to help you understand:
Long-term network compliance progress and trends
Immediate security needs
Compliance with policies
To generate reports:
1. Select Web Reports from the Reports menu. The Login page opens.
2. Enter the credentials that you use to log in. The home page opens. A variety
of reports are available, for example, compliance and guest status reports or
device and policy detail reports.
Web Reports
The Reports Portal is provided by the CounterACT Reports Plugin. Plugin updates
may be available in between CounterACT version releases.
Policy Logs
Use the Policy Log to investigate the activity of specific endpoints, and display
information about how those endpoints are handled. The log displays information
about endpoints as they are detected and is continuously updated.
You can display endpoints from a specific time period and IP address range. In
addition, filter tools are available to limit the log display for, example to specific
policies or sub-rules. An option is also available to export the Log to an XML file.
Status The status of the operations taken place. For example, if a policy action is
complete, the status is OK.
Origin The CounterACT device that detected the event.
MAC Address The MAC address of the detected endpoint.
4. Select OK.
4. Select the indicator to access the Action Threshold dialog box, where you can,
for example, change the threshold or stop the Appliance. Additional options
are also available. See Releasing Actions from On-Hold on a Specific
Appliance for details.
5. When the situation is remediated and the blocking limit falls below the
threshold, you can cancel the on-hold status and continue blocking or
remediating.
6. You can also manually select endpoints and cancel on-hold status.
You can also create threshold policy exceptions, i.e., policies that you would like to
exclude from action threshold calculations. You can, for example, exclude all
thresholds when working with policies that handle outside contractors.
How On-hold Calculations are Made
Actions thresholds for each action type are calculated per Appliance, based on the
number of endpoints assigned to the Appliance.
To enforce on-hold status, the following must occur:
A threshold percentage must be exceeded. See Actions Covered and
Threshold Percentages for details.
The number of endpoints with an action assigned to them must be equal to or
more than the minimal number of endpoints CounterACT is instructed to
detect before calculating the threshold. By default, this number is ten. See
Controlling the Counting Mechanism for details.
Using the default, if the total number of endpoints assigned to an Appliance is 500,
and the default threshold for the Switch Block action is 2%, then the threshold limit
is passed after 2% of the endpoints on the Appliance (or ten endpoints in this
example) are blocked via the switch. At this point, the action is put on-hold for new
endpoints detected.
To change a default:
1. Select the Configuration tab from the Action Threshold dialog box.
2. Select Custom.
3. Type a value in the field that follows.
4. Select Apply.
How Do I Know When a Threshold Violation Occurred?
The action threshold indicator flashes if a threshold violation occurred.
You can select the icon to open the Action Threshold dialog box for details. At that
point the indicator will remain on the status bar, but will not flash.
A tooltip gives you information about the on-hold status.
Actions Section
This section lists all the actions defined in your enterprise and provides related
information.
Status The on-hold status of the action. If the action is put on hold at one
Appliance, the overall status is considered On-hold.
A green checkmark means that the action is not on-hold at any
Appliance. A blue icon indicates that it is.
Action The action being handled.
# On-hold The number of Appliances that are working with an on-hold action.
Appliances
Max % Hosts With The highest percentage of endpoints covered by an action at a
Action specific Appliance, in relation to all enterprise Appliances. For
example, 20% of all endpoints at a specific Appliance have been
assigned this action, and this is the highest percentage at all
Appliances.
Use the value to get a better understating of how to configure your
threshold for a particular action. Using this example, if 20% is the
maximum value but the default threshold is at 2%, you may want to
adjust the threshold.
Threshold The current on-hold threshold for the action.
Policies Policies that include this action.
Select an action from this section and review detailed threshold information per
Appliance in the Threshold Details per Appliance section.
Appliances Tab
Display threshold information for an action that you selected in the Actions section;
for example, the current number of endpoints on hold at a specific Appliance for the
Virtual Firewall action.
Appliances Tab
Item Description
Status The On-hold status for the action on the selected Appliance. A green
checkmark means that the action is not On-hold at this Appliance. A
blue icon indicates that it is.
Appliance The Appliance IP address.
Threshold The current threshold for this action. Note that it is identical on all
Appliances, and varies by default per action.
% Hosts With The percentage of endpoints on the Appliance that are targeted for
Action the action selected in the Actions section. Some actions may be
carried out, while others may be on-hold because of a threshold
violation.
# Hosts With The total number of endpoints on the Appliance to which the action
Action applies. Endpoints detected by policies that are configured as
threshold exceptions are not counted.
# On-hold Hosts The number of endpoints on the Appliance that are not being
controlled by the action because of a threshold violation On-hold.
Stop Appliance
When you stop an Appliance, all CounterACT activity on endpoints is halted. You may
decide to do this if you feel that the action is causing unexpected results.
Configuration Tab
Use this tab to change the default configuration for the threshold and to create
threshold policy exceptions policies that you would like to exclude from action
threshold calculations. For example, exclude all policies that handle organizational
visitors. You can exclude an entire policy or a specific rule.
Configuration Tab
To create exceptions:
1. Select Add.
The Add Policy Threshold Exceptions dialog box opens.
2. Select the policy items that you want to exclude from the threshold
calculations.
3. Select OK.
To approve:
1. Sort the Detections pane via the Actions column.
2. Click the Actions column header and look for the hourglass icon. This icon
indicates endpoints that are On-hold or Pending. The first set of endpoints is
On-hold.
3. Right-click the endpoint and select Approve Actions. Select the action that
you want to release from On-hold.
Condition Shortcuts
Create and reuse Custom conditions in any of your policies. Using Custom
conditions saves you time when you create policies and prevents you from
making mistakes when defining the condition. See Authentication Properties
for more information.
Create and use Lists of property values in any of your policies. These are
user-defined lists of property values, for example, a list of user names or a
list of domain names. Using Lists saves you time when you create policies and
prevents you from making mistakes when entering values. For example, a list
of switch IP addresses that you may need to use repeatedly when defining
different policies. See Defining and Managing Lists for more information.
Irresolvable Criteria
Many properties provide an option for handling irresolvable criteria endpoint
properties that CounterACT cannot properly resolve. If CounterACT cannot verify a
property, you can choose how to treat that endpoint.
Irresolvable Criteria
True The endpoint will match the criteria defined for the property.
False The endpoint will not match the criteria defined for the property.
Irresolvable The endpoint will not be further analyzed. The endpoint is not checked to
see if it matches additional condition criteria.
Case Sensitivity
Indicate if you want the condition property to be case sensitive.
Properties
A property is an attribute detected on the endpoint, for example, device and
operating system information or information about switch connections or user
directly information. CounterACT supports an extensive range of endpoint and
network device properties. If you have installed a plugin included in a ForeScout
Module, related properties are also available. For example, if you installed the
Microsoft SMS/SCCM Plugin, properties regarding SMS collections and reports are
available.
Using properties lets you quickly and efficiently pinpoint endpoint and network
devices.
See Defining Properties for a complete list of properties.
Refer to the HPS Inspection Engine Plugin Configuration Guide for details about
working with scripts. Select Options from the Tools menu, select HPS Inspection
Engine and then select Help.
Defining Properties
Conditions include one or several properties. A property is an attribute detected on
the endpoint. The following categories of properties are available by default with
CounterACT:
Authentication Properties
Classification Properties
Advanced Classification Properties
Device Information Properties
Event Properties
External Devices Properties
Guest Registration Properties
Linux Properties
Macintosh Properties
Microsoft NAP Properties
Remote Inspection Properties
SNMP Properties
Switch Properties
Track Changes Properties
To define properties:
1. Select Add from the Condition section of the Sub-Rules dialog box.
2. Select a property type from the Select Property section and define the
property value. When defining properties, indicate if the endpoint meets the
criteria defined or does not meet the criteria. The properties are detailed
below.
3. Select OK. The Conditions dialog box reopens.
Authentication Properties
Property Description
Authentication Indicates whether the endpoint performed any of the following:
Login A successful login to an authentication server. To use this feature you
must configure your authentication servers. CounterACT supports the
following authentication services: HTTP(80/TCP), Telnet(23/TCP),
NetBIOS(139/TCP), FTP(21/TCP) IMAP (143/TCP), POP3(110/TCP),
rlogin(513/TCP).
The user authenticated via the User Directory server as a result of the
policy HTTP Login action.
The user authenticated as a guest as a result of the policy HTTP Login
action.
See Defining Authentication Servers for more information.
Authentication Indicates endpoints that logged in to the network using a specific protocol or
Login against a specific server. Type the protocol name or the server IP address.
(Advanced) Servers referenced here must be defined in the Authentication pane. See
Defining Authentication Servers for more information.
HTTP Indicates whether the end user confirmed an HTTP notification message
Confirmation generated by CounterACT. Confirmation is discovered via the Confirmation
Events Identifier name, defined in the HTTP Notification action.
Type the name of the identifier. If discovered, the user confirmed the
message.
HTTP Login Indicates whether the endpoint exceeded the HTTP login failure threshold
Failure defined in Options > NAC > HTTP Login Attempts. The User Directory
Plugin must be installed to work with this property.
HTTP Login Name of the last user that performed successful HTTP Login authentication.
User
Signed In Indicates endpoints that:
Status Are signed-in to the network using a valid domain name. See HTTP Login
action for details.
Are signed-in as guests.
Are signed-out or never signed in.
Classification Properties
Property Description
Network Indicates the type and function of an endpoint, as determined by Nmap. Note
Function that due to the activation of Nmap, this information may take longer to resolve.
Use of this property requires that you configure the HPS Inspection Engine
Plugin.
Property Description
OS Indicates the type of the operating system running on the endpoint, as
Fingerpri determined by Nmap. Use this property instead of OS Class for classification of
nt unlisted and unknown OS names. Note that due to the activation of Nmap, this
information may take longer to retrieve.
Use of this property requires that you configure the HPS Inspection Engine
Plugin.
Service Indicates the service and version information, as determined by Nmap. Note that
Banner due to the activation of Nmap, this information may take longer to retrieve.
Use of this property requires that you configure the HPS Inspection Engine
Plugin.
Property Description
DHCP Server Indicates whether the device IP address was received from a DHCP server. If
Address so the value of the property is the IP address of the DHCP server.
In addition to DHCP server properties, such as this one, which are
discovered by CounterACT, additional DHCP host properties are discovered
by the DHCP Classify Plugin. This plugin extracts host information from
DHCP messages and uses DHCP fingerprinting to determine the operating
system and other host configuration information. For more information, refer
to the DHCP Classify Plugin Configuration Guide. Select Options from the
Tools menu. Select Plugins. Select this plugin and then select Help.
DNS Name Indicates the endpoints DNS name.
Host is online Indicates whether the endpoint is connected to the network.
IP Address Indicates endpoints with specific IP addresses, including:
Any IP address
Addresses in a specific network segment
Addresses in a specific range
Endpoints without a known IP address (endpoints will be detected when
CounterACT discovers their MAC address)
IP addresses that start with, end or match a certain numerical
expression
MAC Address Indicates the MAC address of the endpoint.
Member of Allows you to investigate endpoints that are part of a group.
Group
NetBIOS Indicates the NetBIOS Domain to which the endpoint is logged on.
Domain
NetBIOS Indicates the NetBIOS host name of the endpoint.
Hostname
Network Indicates specific types of network adapters, for example, with a specific
Adapters device name, MAC address or connection status.
NIC Vendor Indicates the vendor of the NIC, as detected by CounterACT based on the
MAC prefix.
The HPS NIC Vendor DB Plugin updates vendor information used to resolve
this property. CounterACT can automatically add newly supported vendors to
a policy condition that you create with this property. For more information
about this plugin, select Options from the Tools menu. Select Plugins.
Select this plugin and then select Help.
NIC Vendor Indicates a string value associated with the NIC Vendor. You can create
Value conditions that match several variants of a vendor name, or look for a
specific substring in a name.
The HPS NIC Vendor DB Plugin updates vendor information used to resolve
this property. CounterACT can automatically add newly supported vendors to
a policy condition that you create with this property. For more information
about this plugin, select Options from the Tools menu. Select Plugins.
Select this plugin and then select Help
Property Description
Number of IP Indicates endpoints that are assigned more than one IP address. In such
Addresses cases, a separate address can be used to connect to different networks. This
information may be important because endpoints connected to more than
one network can be used as routers to transmit malicious traffic. Endpoints
connected to both wireless and land networks can also create back doors to
hackers and worms.
You can specify endpoint IP addresses to ignore when calculating the
number of IP addresses. Select Tools>Options>HPS Inspection
Engine>Tuning to define the addresses to ignore.
Use of this property requires the proper configuration and activation of the
HPS Inspection Engine Plugin.
Open Ports Indicates the availability of open ports on the endpoint. This is determined
by inspecting real-time traffic as well as using Nmap.
The condition is considered "true" if any of the listed ports are detected.
OS CPE Indicates the operating system running on the endpoint, in Common
Format Platform Enumeration format. This property is reported by the HPS
Applications, Macintosh/Linux Property Scanner, OS X and ARF Reports
Plugins. The property contains the CPE 2.3 representation of the operating
system bound to a formatted string.
You can use CounterACT property expression types (For example, Contains,
In List, or Matches) to create policy conditions that identify logical parts or
substrings of the CPE name string.
SMB Relay Indicates the endpoint may be spoofing session-layer SMB authentication.
CounterACT compares the IP address of the SMB session used by the
endpoint to the IP addresses it discovers on the endpoint. If the IP address
of the SMB session is not included in the addresses discovered on the
endpoint, CounterACT assigns this property the value True and reports a
NAT detection event using the Device Is NAT host property. Use this
property to improve detection of man-in-the-middle attacks.
There is a parallel Track Changes property.
Traffic seen Indicates the most recent time network traffic was seen.
User Indicates the domain user name currently logged on to the endpoint.
Event Properties
Property Description
ARP Spoofing Indicates whether the number of different MAC address reported for an IP
address becomes greater than the number specified here. This lets you
keep track of the different MAC addresses used by an IP address as
advertised by ARP responses. Normally there should be only one MAC
address per IP address.
ARP spoofing lets you detect attempts to maliciously direct network traffic.
To work with this condition, the Appliance must monitor ARP traffic, i.e. the
broadcast domain where ARP requests are transmitted. Refer to the Port
Mirroring in CounterACT Advanced Technical Note for more information
about configuring your environment for detecting ARP spoofing.
Property Description
Admission Indicates whether one or several admission events were detected.
Admission event types include:
New IP: By default, endpoints are considered new if they were not
detected at your network within a 30-day period. For example, if an IP
was detected on the first of the month, and then detected again 31
days later, the detection will initiate the activation. The default time
period can be changed. See Policy Preferences for more information.
IP Address Change
Switch Port Change
DHCP Request
Authentication via the HTTP Login action
Log in to an authentication server
SecureConnector connection
If you have installed plugins, additional admission events types may be
available. For example, the New Wireless Host Connected Events option is
available if you installed the Wireless Plugin.
Malicious Event Refers to the type of threat protection event to respond to. Parameters
selected here are applied in addition to parameters defined in the Threat
Protection Policy. See Chapter 12: Threat Protection for more information.
Miscellaneous Indicates endpoints whose IP address was used by a newly connecting
Events endpoint. This may happen, for example, if the original endpoint was
offline for a certain period and the newly connecting endpoint received its
IP.
When this happens the original endpoint will be displayed at the Console
without an IP address, until it reconnects.
Sessions as Sessions let you run policies based on real-time identification of network
Client / traffic patterns between servers and clients, allowing you to pinpoint:
Sessions as When session are initiated
Server
Which protocols are used
For example, use this property to ensure compliance of data flow security
for audit usage or to track down network users trying to access sensitive
protected data, for example, credit card information or financial accounts.
Indicates which endpoints generated sessions to specific servers using a
defined protocol.
Sessions as Client: Indicates which endpoints generated sessions to
specific servers using a defined protocol.
Sessions as Server: Indicates which servers received sessions from
specified endpoints using a defined protocol.
Traps Received Indicates that an SNMP trap was received on the port where the endpoint
is connected.
Property Description
Guest Indicates users who registered for network access as guests via the HTTP
Registration Login action, and provides the following registration information entered by
Information the guest in the registration form:
Account Approve Date
Comment
Company
Contact Person
Contact Person Email
Custom form fields ( x5)
Email Address
Full Name
Location
Phone Number
Registration browser user agent
Registration Date
Title
User Name
You can use any of this information to enforce actions on guests.
Linux Properties
Property Description
Linux Expected Use this property to run a command or file that detects certain endpoint
Script Result attributes, statuses or any other information defined in the script or
command. Commands and file can also be used to carry out actions on
endpoints.
Type a command or browse to a file that you want to run. The
commands and scripts that you create are automatically saved on all
Appliances. All file extensions are supported and can be run.
A Run Script Action is also available.
Linux File Date Indicates the last modification date and time of a defined file on an
endpoint.
Linux File Exists Indicates the existence of a defined file on an endpoint.
Linux File Size Indicates the size (in bytes) of a defined file on a Linux device. Type a
single file size or a range of sizes, for example, 1-100. Use a dash when
defining a range.
Linux Hostname Indicates the Linux host name.
Linux Manageable Indicates whether the endpoint is connected to CounterACT via SSH.
(SSH Direct See the Macintosh/Linux Property Scanner Plugin Configuration Guide
Access) for more information.
Linux Manageable Indicates whether the endpoint is connected to CounterACT via
(SecureConnector) SecureConnector.
Linux Processes Indicates whether a process is currently running on detected endpoints.
Running
Property Description
Linux User Indicates whether the user is directly logged in to the Linux console.
Linux Version Indicates the specific version of the Linux OS running on the endpoint.
Use of this property requires that the endpoint be managed via
SecureConnector.
Macintosh Properties
Property Description
Macintosh Indicates whether a specified application is installed on an OS X
Applications endpoint. It parallels the Applications Installed host property for
Installed Windows endpoints. This property is only reported for Mac OS X
endpoints managed by the OS X Plugin.
Macintosh Use this property to run a command or file that will detect certain
Expected Script endpoint attributes, statuses or any other information defined in the
Result script or command. Commands and file can also be used to carry out
actions on endpoints.
Enter a command or browse to a file that you want to run. The
commands and scripts that you create are automatically saved on all
Appliances. All file extensions are supported and can be run.
A Run Script Action is also available.
Macintosh File Indicates the last modification date and time of a defined file on an
Date endpoint.
Macintosh File Indicates the existence of a defined file on an endpoint.
Exists
Macintosh File Size Indicates the size (in bytes) of a defined file on a Macintosh device.
Type a single file size or a range of sizes, for example, 1-100.
Macintosh Indicates the Macintosh host name.
Hostname
Macintosh Indicates whether the endpoint is connected to CounterACT via SSH.
Manageable (SSH See the Macintosh/Linux Property Scanner Plugin Configuration Guide
Direct Access) for more information.
Macintosh Indicates whether the endpoint is connected to CounterACT via
Manageable SecureConnector.
(SecureConnector)
Macintosh Indicates whether a process is currently running on the detected
Processes Running endpoints.
Macintosh Indicates the version of the SecureConnector package that is running on
SecureConnector the endpoint.
Version
Macintosh Indicates Macintosh security and other updates that are missing on the
Software Updates detected endpoint.
Missing
Macintosh User Indicates whether the user is directly logged in to the Macintosh
console.
Property Description
Macintosh Version Indicates the specific version of the Macintosh OS running on the
endpoint. Use of this property requires that the endpoint be managed
via SecureConnector.
Property Description
MS-RRP Reachable Indicates whether CounterACT can use the Remote Registry Protocol for
Remote Inspection tasks on the endpoint.
MS-SMB Indicates whether CounterACT can use the SAMBA protocol for Remote
Reachable Inspection tasks on the endpoint.
MS-WMI Indicates whether CounterACT can use the Windows Management
Reachable Interface for Remote Inspection tasks on the endpoint. In previous
releases, this property was named Windows Manageable Domain by
WMI.
These properties do not have an Irresolvable state. When the plugin cannot establish
connection with the service, the property value is False. Do not use the Evaluate
Irresolvable Criteria as option with these properties.
The following corresponding Track Changes policies are listed under the Track
Changes folder:
MS-RRP reachability changed
MS-SMB reachability changed
MS-WMI reachability changed
SNMP Properties
Use of SNMP properties requires the proper configuration and activation of the HPS
Inspection Engine Plugin. When entering the following values, use these guidelines:
-p <port> Specify the port used for SNMP messaging on the server.
-r <retries> Specify the number of times to retry the request.
-t <seconds> Specify the timeout period before retrying the request.
-E <engine_ID> Specify the Context Engine ID for REQUEST messages (SNMP v3 only).
-n <cont_name> Specify the Context Name (SNMP v3 only).
Property Description
SNMP-MIB-II Indicates the number of network interfaces (regardless of their current
ifNumber state) present on this system. The collection of this information depends
on access parameters (SNMP Parameters) specific to the SNMP version of
the inspected endpoint.
In the SNMP-MIB-II ifNumber field, type the number of interfaces to be
detected on the SNMP agent.
SNMP-MIB-II Indicates a textual description of the entity. This value should include the
sysDescription full name and version identification of the systems hardware type,
software operating-system, and networking software. It is mandatory that
this only contain printable ASCII characters. The collection of this
information depends on access parameters (SNMP Parameters) specific to
the SNMP version of the inspected endpoint.
In the SNMP-MIB-II sysDescription field, type the description that
should match the SNMP agent system description. If you are not sure of
the name, you can use the regular expression option, and enter wildcard
text for example, ci.* if you want to detect a Cisco switch.
SNMP-MIB-II Indicates the physical location of this node (for example, telephone closet,
sysLocation third floor). The collection of this information depends on access
parameters (SNMP Parameters) specific to the SNMP version of the
inspected endpoint.
In the SNMP-MIB-II sysLocation field, type the location that should
match the SNMP agent. If you are not sure of the name, you can use the
regular expression option, and enter wildcard text (.*).
SNMP-MIB-II Indicates an administratively-assigned name for this managed endpoint.
sysName By convention, this is the endpoints fully-qualified domain name. The
collection of this information depends on access parameters (SNMP
Parameters) specific to the SNMP version of the inspected endpoint.
In the SNMP-MIB-II sysName field, type the requested system name to
match.
Property Description
SNMP-MIB-II Indicates the time since the network management portion of the system
sysUpTime was last re-initialized. The collection of this information depends on access
parameters (SNMP Parameters) specific to the SNMP version of the
inspected endpoint.
Use the Older than or Before options to create a condition based on the
time the SNMP agent was last turned on.
SNMP-OID Indicates an OID value, on the SNMP agent. The collection of this
information depends on access parameters (SNMP Parameters) specific to
the SNMP version of the inspected endpoint.
In the SNMP OID field, type the requested OID value on the endpoint. If
the OID query and the SNMP-OID Value match, then the condition is
registered.
Switch Properties
An extensive range of properties are resolved for Switches that are configured to
work with CounterACT. The section provides an overview of the Switch properties.
Select Options from the Tools menu and then select Switch to configure the Switch
Plugin. Select Help for information about configuration and for more information
about working with switch properties.
Property Description
Number of The number of endpoints connected to a specific port. You can write a
Hosts on Port condition for this number to instruct the Switch Plugin to detect ports
with more than one endpoint (MAC address) if, for example, a hub and
a guest computer have been connected together with a company
endpoint on a company switch port. Ports connecting between switches
are excluded from this calculation.
Switch IP The switch IP address.
Switch IP and The switch IP address and port name (the format is
Port Name <IP_address>:<port>).
Switch The switch location based on the switch MIB.
Location
Switch Port The actions (Blocked or Assign to VLAN) that are assigned to the
Action switch port.
Switch Port The description of the port as defined in the switch configuration and
Alias modified by the Switch Plugin.
Switch Port For use with Cisco devices only.
Configurations The configuration detail of the switch interface to which an endpoint is
connected.
Switch Port The physical connectivity between the endpoint and the switch port.
Connect
Property Description
Switch Port For use with Cisco devices only.
PoE Description of the PoE device that is connected to the PoE-enabled
Connected switch port, as provided by the managed Cisco switch. For example,
Device Cisco IP Phone 6921.
Note: Because this property information is resolved on a switch port
basis, the CounterACT Console also displays the resolved information
for a detected endpoint that is connected to the port via its connection
to the PoE device (cascaded).
Switch Port For use with Cisco devices only.
PoE Power Power consumption of the PoE device that is connected to the PoE-
Consumption enabled switch port, as provided by the managed Cisco switch. The
power consumption value provided is in milliwatts (mW). For example,
750.
When either a non-PoE device or no device is connected to the PoE-
enabled switch port, the property value is zero (0).
For switch vendors that the plugin does not support switch port PoE,
the Console displays the following information for this property:
Vendor is currently not supported for this property.
Note: Because this property information is resolved on a switch port
basis, the CounterACT Console also displays the resolved information
for a detected endpoint that is connected to the port via its connection
to the PoE device (cascaded).
Switch Port The hard-coded port name.
Name
Switch Port The VLAN associated with the switch port.
VLAN
Switch Port The name of the VLAN associated with the switch port.
VLAN Name
Switch Port Whether the endpoint connected to the switch port is a VoIP device.
Voice Device
Switch Port The switch port VLAN to which the VoIP endpoint is connected.
Voice VLAN
Switch Vendor The switch vendor name.
Switch VoIP Whether the switch port is a VoIP port.
Port
System Detects the system description information provided by the managed
Description device. System description information is as specified by the network
device SNMPv2-MIB property sysDescr (1.3.6.1.2.1.1.1).
Property Description
Running For use with Cisco devices only.
Config Detects running config information of switches managed by
CounterACT, as generated by the show running-config command.
The Switch Plugin resolves this property for information at the
following instances: (a) After plugin start and initially detecting the
switch and (b) Whenever running config information changes.
Before working with this property, several configuration tasks must be
performed.
As the amount of information provided by the resolved Running Config
property can be very extensive, you can filter this information.
Running For use with Cisco devices only.
Config Time Contains the timestamp, MM/DD/YY HH:MM:SS AM/PM, of the plugins
running config information query of the device.
Interface For use with Cisco devices only.
Table Detects the specific interface configuration provided in a device
running config for the interface.
Per interface, the resolved property provides the following information:
Interface Name - The interface name and when available the
interface location information.
Interface Configuration (raw) - the specific, interface configuration,
as provided in a device running config.
Property Description
Company
Department
Display Name
Distinguished Name
Email
Employee Number
Initials
Last Name
LDAP User Name
Member Of
Mobile Phone
Password Last Set
Phone
Street Address
Title
User Given Name
Windows Properties
Property Description
Windows Domain Indicates whether the endpoint is a member of any of the domains
Member defined in the HPS Inspection Engine Plugin.
Windows Expected Use this property to run a command or file that will detect certain
Script Result endpoint attributes, statuses or any other information defined in the
script or command. Commands and file can also be used to carry out
actions on endpoints.
(If you use a file that exists on the endpoint, type its absolute path).
You can also enter output text that should be matched on the endpoint
against the output of the script.
Use this property, for example, to find users sharing the My Music folder.
This property may be used on managed Windows machines only.
Running a script is performed by starting a service called fsprocsvc. The
service does not open any new network connection or generate traffic.
Communication is carried out over Microsofts SMB/RPC (139/TCP or
445/TCP) and authentication is carried out using domain credentials. If
there is no request to run a new command within two hours, the service
dissolves automatically. Refer to the HPS Inspection Engine Plugin
Configuration Guide for more information about this service. Select
Options from the Tools menu. Select Plugins. Select this plugin and
then select Help.
You can reference the result of the script using a property tag.
Windows File Date Indicates the date that a specific file was last modified. Use this
property, for example, to check that endpoints on the network have a
specific file, from a specific date. Examples would be a security
configuration file or an antivirus signature file. By using this condition,
you can create a policy that enforces the specific file, from a specific
date, to exist on every endpoint.
Property Description
Windows File Indicates a file name. Use this property, for example, to check that
Exists endpoints on the network have a specific file. You can use the following
Windows environment variables when you specify a pathname in a
condition:
%COMMONPROGRAMFILES% %PROGRAMFILES% %TEMP%
%HOMEDRIVE% %SYSTEMDRIVE% %USERPROFILE%
%HOMEPATH% %SYSTEMROOT% %WINDIR%
Windows File MD5 Indicates to endpoints with specific MD5 signatures.
Signature
Windows File Size Indicates to a file name and size (in bytes). Use this property to check
that endpoints on the network have a specific file, and specific file size.
Windows File Indicates the version of a defined file on an endpoint.
Version
Windows File Indicates the existence of a defined file with a version higher than
Version specified.
Comparison
Windows Is Behind Indicates whether the endpoint was detected behind a NAT device.
NAT
Windows Last Indicates the last detected login event on Windows endpoints that are
Login Event managed by SecureConnector installed as a service. The property is
resolved to one of the following values:
None: No Login or Logout events have been detected, or the
endpoint is not managed by SecureConnector as a service.
Login: The most recent Windows Login/Logout Event received by
SecureConnector was Login.
Logout: The most recent Windows Login/Logout Event received by
SecureConnector was Logout.
Windows Logged Indicates whether a user is logged in to the endpoint.
On
NetBIOS Indicates whether the endpoint is a domain or workgroup member.
Membership Type
Windows Registry Indicates the existence of a specified Windows registry key. Note that
Key Exists only the following key roots are available: HKEY_CLASSES_ROOT,
HKEY_LOCAL_MACHINE and HKEY_USERS.
Windows Registry Indicates the value of a specified Windows-registry key. Note that only
Value the following key roots are available: HKEY_CLASSES_ROOT,
HKEY_LOCAL_MACHINE and HKEY_USERS.
To retrieve the default value of a registry key, end the pathname with a
backslash as in this example:
HKEY_LOCAL_MACHINE\HW\DESCRIPTION\System\BIOS\
Windows Registry Indicates the existence of a value for a specified Windows registry key.
Value Exists
Windows Indicates the TLS version used in communications with SecureConnector
SecureConnector on Windows.
Connection
Encryption
Property Description
Windows Indicates the SecureConnector deployment mode installed on the
SecureConnector endpoint.
Deployment Type
Windows Indicates the SecureConnector visible mode installed on the endpoint.
SecureConnector
Systray Display
Windows Shared Indicates whether a specific folder is currently shared on a Windows
Folders endpoint. Use this property, for example, to find network users sharing
music folders.
The ability to detect shared directories increases network security by
helping CounterACT users stop unwanted data from propagating across
the network.
This property returns the name of the directory.
SMB Signing Indicates support for SMB Signing on the Windows endpoint. Valid values
are:
Required: the endpoint requires that all SMB communication is
signed.
Enabled: the endpoint supports SMB signing but does not require it.
Disabled: the endpoint does not support SMB signing, even when it is
requested by the communicating entity
Windows Indicates whether CounterACT has access to the endpoints remote
Manageable registry and file system. If either criterion is not met, the endpoint is
Domain unmanageable. This is typical of endpoints that are foreign to the
domain.
Irresolvable endpoints are resolved based on their previous recheck
status.
Windows Similar to the Windows Manageable Domain property, except that if
Manageable irresolvable, the status not manageable is applied until the next recheck.
Domain (Current) This property differs from the Windows Manageable Domain property,
which resolves irresolvable endpoints based on their previous recheck
status.
Windows Indicates that CounterACT either has or does not have access to
Manageable Local localhost credentials on the detected machine. These credentials include
the local user name, password and domain. When this information is
available, the endpoint is manageable and can be inspected.
Windows Indicates whether CounterACT SecureConnector is running on the
Manageable endpoint. See Start SecureConnector / Stop SecureConnector for more
SecureConnector information.
When an endpoint with multiple interfaces connects to CounterACT
through one NIC, only that host (NIC) is reported by this property.
When CounterACT policies apply an action to a dual-homed endpoint, the
action is applied to all interfaces of the endpoint, even if another host
(NIC) on the same endpoint is managed by SecureConnector. If a
blocking action is applied to the endpoint, it may lose access to network
services it uses.
The Advanced Tools Plugin provides an additional host property that can
be used to detect and manage dual-homed endpoints using
SecureConnector.
Property Description
Windows Refers to Windows processes running on inspected endpoints.
Processes Running
Windows Services Indicates whether a specific Windows service is installed on a Windows
Installed endpoint. This property resolves the name of the service.
Windows Services Indicates whether a specific service is currently running on a Windows
Running endpoint. This property returns the name of the service. Note that this
property relates to Windows services, not regular processes.
Windows Version Refers to specific Windows versions detected or missing on the endpoint.
Windows Version Indicates the Windows version running on an endpoint in Common
CPE Format Platform Enumeration format. The property contains the full CPE 2.3
name string, bound to a URI, as follows:
cpe:/<part>:<vendor>:<product>:<version>:<update>:<edition
>:<language>:<sw_edition>:<target_sw>:<target_hw>:<other>
Use text matching tools to create policy conditions that match substrings
of the CPE name string.
The value of this property is duplicated in the more general OS CPE
Format host property.
Windows Version Indicates the specific version of Windows running on the host.
Fine-tuned
Use other host properties to create conditions that inspect endpoints and detect files
or processes of unsupported applications.
Property Description
Applications Installed Indicates which applications are installed on the endpoint via
Add/Remove Programs. This property resolves the name of the
applications, and their version number if available.
Cloud Storage Indicates that at least one of the following cloud storage applications
Installed is installed on the endpoint.
Cloud Storage Indicates that at least one of the following cloud storage applications
Running is running on the endpoint.
Hard Drive Encryption Indicates the hard drive encryption applications(s) installed on the
Installed endpoint.
Hard Drive Encryption Indicates whether hard drives on the endpoint are encrypted, and
State which application, if any, was used to encrypt each drive.
Instant Messaging Indicates that an instant messaging application is installed on the
Installed endpoint.
Instant Messaging Indicates that an instant messaging application is running on the
Running endpoint.
Microsoft Applications Indicates the existence of Microsoft products on the endpoint.
installed
Peer-to-peer Installed Indicates endpoints that have installed peer-to-peer applications.
Peer-to-peer Running Indicates endpoints that are running peer-to-peer applications.
Property Description
Anti-Spyware Indicates whether Anti-Spyware is installed.
Installed
Antivirus Installed Indicates whether an antivirus service is installed.
Antivirus Running Indicates whether an antivirus service is currently running on the
endpoint.
Antivirus Update Refers to the date of the last antivirus signature update performed on
Date the endpoint. The antivirus application must be running to be
detected. This means an update is installed on any antivirus vendor
running on the endpoint.
Windows Hotfix Indicates the existence of a security update on the endpoint, based on
Installed Hotfix ID and caption.
Property Description
Intranet WSUS Indicates the host name or IP address of the intranet WSUS server on
Server the endpoint. Use this property when working with the Microsoft
Vulnerability properties and the Start Windows Updates action. The
server version on the endpoint and the server version installed on the
network must match in order for endpoints to be remediated by a
WSUS server.
Microsoft Indicates the existence of Microsoft published OS and Office
Vulnerabilities vulnerabilities detected on the endpoint.
To use this property:
The Windows Update Agent must be available on the endpoint.
The agent is available on all Windows 7, Windows Vista, Windows
XP with SP2 or above, and Windows 2000 with SP2 or above.
Older Windows versions must run the Microsoft Windows Updates
once from the endpoint and the required agent are upgraded
automatically.
The endpoint must be managed Manageable (Domain) or
Manageable (SecureConnector).
Refer to the HPS Inspection Engine Plugin Configuration Guide for
details about scanning methods. Select Options from the Tools
menu. Select Plugins. Select this plugin and then select Help.
The plugin detects new vulnerabilities as they become available. To
automatically check for monthly vulnerabilities, select Check for new
vulnerabilities automatically. To allow endpoint users to download
associated patches, use the Windows Self Remediation action.
An advanced option for the Microsoft Vulnerabilities property lets you
improve performance and reduce network bandwidth. Use the option
to define the rate to recheck endpoint vulnerabilities on machines
where vulnerabilities were already checked and not found.
These endpoints will not be rechecked at a rate higher than the rate
that you define. If the rate that you define is more frequent than the
rate in the Recheck policy, the Recheck policy rate is applied. If you
disable this option, the Recheck policy rate is applied.
CounterACT can automatically add newly supported vulnerabilities to a
policy condition that you create with this property. See Detection of
New Vulnerabilities and Newly Supported Vendor Applications.
Microsoft Indicates the existence of Microsoft published OS and Office
Vulnerabilities Fine- vulnerabilities detected on the endpoint. Fine-tune inspection
tuned according to specific criteria.
The following criterion can be searched:
Label
Update Time
Severity
Product
CVE
Personal Firewall Indicate if a personal firewall has been detected on the endpoint.
Windows Updates Indicates if Windows updates were installed, and if the endpoint is
Installed Reboot waiting for a reboot.
Required Use this property in conjunction with Microsoft Vulnerability Updates
to indicate if a reboot of the endpoint is needed to complete the
installation of a security update.
Property Description
Windows Security Indicates antivirus applications detected on the endpoint by the
Center Antivirus Windows Security Center, as well as endpoint status.
Status
Windows Update Indicates whether the Windows Update Agent (WUA) is installed on
Agent Installed network endpoints. The agent is required to resolve the Microsoft
Vulnerabilities and Microsoft Vulnerabilities Fine-tuned properties, as
well as carry out the Start Windows Updates action.
To use conditions:
1. Select the Custom folder from the Select Property section of the Condition
dialog box.
network. Each List is associated with a single endpoint property and can contain
multiple related values. Manually create lists here or create lists based on Inventory
detections and policy detections. You can use Lists of property values when defining
policies.
Using lists speeds up and streamlines the policy creation and endpoint management
process.
For example, create an Unauthorized Processes Running list and use that list in a
policy with the Kill Process action on endpoints that are running the process.
You can use this option for any property that is comprised of free text and for the
Device Information>Open Ports property. Other properties, for example, installed
software, peer-to-peer applications or properties indicating endpoint manageability
cannot be included in lists.
To generate a list:
1. Select Options from the Tools menu and then select Lists.
Lists Pane
List Name
Properties
5. Select the property for which you want to make a List. See Defining
Properties for more information about the properties shown. You can use this
option for any property that is comprised of free text and for the Device
Information>Open Ports property. Other properties, for example, installed
software, peer-to-peer applications or properties indicating endpoint
manageability cannot be included in lists.
6. Select Next. The Values page opens.
Values Windows
Lists Pane
Lists added here will appear in the Inventory view if the list includes
properties detected at the network.
Managing Lists
Perform the following tasks from the Lists pane.
To edit a list:
1. Select an entry from the Lists pane and select Edit. The required dialog box
opens.
2. Edit the value and select Apply.
To remove a list:
1. Select an entry from the Lists pane and select Remove.
2. Select Apply.
To create a list:
1. Select an endpoint from the Home view, Detections pane.
2. Navigate to the Console, Details pane, Profile tab.
Add to List
3. Select adjacent to the properties shown in the Details pane, Info tab. The
Add to List dialog box opens.
4. Select a list from the drop-down list or select Add to add the property to a
new list.
5. Select OK.
8. Select OK.
9. The list is displayed as part of your policy condition. You cannot remove lists
that are used in policies.
About Actions
Actions are measures taken at endpoints; ranging from notices, warnings and alerts to
remediation, network and web access restrictions and complete blocking.
Actions
Manage
Notify
Remediate
Restrict
Action Schedules
Action schedules can be assigned to each policy action. This allows you to control when
actions are carried out and for what duration. For example, create a policy that warns
users not to run peer-to-peer applications and then blocks their Internet access if
applications are detected after the warning period. See Creating Action Schedules for
more information.
Action Thresholds
Action thresholds automatically implement safeguards when rolling out blocking and
restrictive actions.
Action thresholds are designed to automatically implement safeguards when rolling out
such sanctions across your network. Consider a situation in which you defined multiple
policies that utilize a blocking action, for example, the Virtual Firewall or Switch Block
action. In a situation where an extensive number of endpoints match these policies, you
may block more endpoints than you anticipated.
An action threshold is the maximum percentage of endpoints that can be controlled by a
specific action type defined at a single Appliance. By working with thresholds, you gain
more control over how many endpoints are simultaneously restricted in one way or
another.
See Working with Action Thresholds for details.
The Advanced Tools Plugin provides conditions and actions that let you
implement complex scripted interactions for endpoint classification and
diagnostics. Refer to the Advanced Tools Plugin Configuration Guide for details.
Defining Actions
This section describes how to define CounterACT actions.
Audit Actions
Authenticate Actions
Manage Actions
Notify Actions
Remediate Actions
Restrict Actions
In addition to the actions delivered with your CounterACT system, plugin-specific actions
may appear when you install non-bundled plugins or plugins included in Forescout
Modules. For example, if you are working with the CounterACT Wireless Plugin or the
CounterACT Bromium Plugin, actions delivered with those plugins will be available. See
Chapter 8: Base Plugins and ForeScout Modules for information about working with
plugins.
Audit Actions
The Send Message to Syslog action is included by default as an Audit action.
6. Specify the following or use Default where applicable to apply the default
configuration.
Message Type a message to send to the Syslog server when the policy is
to Syslog triggered
Syslog Syslog server IP address
Server
Address
Syslog Syslog UDP port number (default is 514)
Server
Port
Syslog Syslog messages facility (default is local4)
Facility
Syslog Syslog messages priority (default is info)
Priority
If you specify any of the options for the action, Add Tags is enabled. You can
add property tags to the message. The tag is translated to the current
information associated with the tag. See Working with Property Tags for more
information.
Authenticate Actions
This section describes actions that allow the CounterACT operator to control the access
of corporate and guest users to a corporate network. These actions are provided by the
User Directory Plugin.
HTTP Login
HTTP Sign Out
HTTP Login
Use the HTTP Login action to:
Prompt endpoint users to authenticate before accessing your network. Users
attempting to access the network are presented with a Login page and must
enter valid credentials.
Login Page
This action can be used with other policy actions. For example, you can define a policy
quarantining all unauthenticated users to an isolated VLAN. If the user logs in properly,
the policys actions are cancelled, removing all limitations imposed. In this example, the
user is removed from the isolated VLAN and can join the network and browse.
Web messages and emails used in this action can be changed and localized. See
Localizing CounterACT Redirected Web Pages and Messages.
Login failures can be easily tracked. See HTTP Login Attempts for details.
You can customize the text that the HTTP Login action displays at the user's
endpoint. For details, see Customize HTTP Login Action Text.
Handling Guests
This section describes how to work with the HTTP Login action when handling network
guests. For example, create policies that deal with visiting professionals, contractors,
etc.
Guests are authenticated against the CounterACT Appliance.
You can define the action so users who do not have authentication credentials can
register as guests using a Guest Registration form that is displayed in the user's web
browser.
To configure the HTTP Login action for guest login, use the following tabs:
Guests Tab: Defines how authentication and registration is performed.
Registration Page Tab: Controls the guest information provided in the Guest
Registration form.
Login Page Tab: Specifies the text that is to appear on the Login page.
Miscellaneous Tab: Specifies additional configuration options such as encryption
and compliance.
Login Page
After the user successfully logs in, the endpoint Authentication, Signed In Status
property is resolved by CounterACT as either Signed In as a Guest, if the user's status
is network guest, or Signed In as a Domain User, if the user's status is corporate
user.
The name entered here will be used when resolving the Device Information > User
Name property. If necessary, you can instruct CounterACT to use the machine name
instead of this name or to use this name when the machine name is not available. Refer
to the HPS Inspection Engine Plugin Configuration Guide for more information. Select
Options from the Tools menu. Select Plugins. Select this plugin and then select Help.
The following Login Page tab options are available:
Login Instructions
In the text box of the Login Page tab, define the Login page message that is presented
to both guests and corporate users.
Show Help Button
Help instructions are available on the Login page to assist users.
You can update the Help file text if required, including translating it into a language
other than English. The files are located at:
/usr/local/forescout/webapps/portal/help/addomainloginhelp.htm
If you do not want to give users access to the Help page for any reason, hide the Help
button on the Login page by clearing the Show Help Button checkbox.
Guests Tab
Use the Guests tab to define guest login session options, as well as a registration
strategy.
The user must keep this window open to maintain a network to Internet
connection, provided this access was granted in the policy. During this time,
CounterACT resolves the Authentication, Signed In Status property for the
endpoint as Signed In as a Guest.
After selecting Logout, the following windows are displayed:
Logout Window
In the Guest Management Portal where sponsors can view the registered
guests that specified them as their corporate contact. For information about
the Guest Management Portal, see The Guest Management Portal.
In the Registered Guests tab of the Console Guest Registration page. Select
Options from the Tools menu and then navigate to and select Guest
Registration to display the Registered Guests tab and view the registered
guest entries.
Manual sponsor approval of guests
If you require that guests be explicitly approved by an individual in your
organization - a corporate sponsor - select the Manual sponsor approval of
guests option. The sponsor specified by the guest on the Guest Registration
form receives a notification email that includes a link to the Guest Management
Portal. After logging in to the portal, sponsors can approve or decline network
access to their guests awaiting approval. The following are related options:
Sponsor approval using email link - Select this option to include an
additional link in the notification email to a Network Access Request page
containing the specific guest registration request.
This option is useful if:
o You do not want to require sponsors to log in to the Guest Management
Portal to approve guest registration requests.
o Sponsors are temporarily unable access the Guest Management Portal.
o Your organization does not employ an Active Directory server to verify the
credentials of its personnel. (Logging in to the Guest Management Portal
requires Active Directory verification of user domain credentials).
Use of this option maintains backward compatibility with HTTP Login action
functionality of previous versions.
Additional sponsors - Select this option to provide a comma-separated list
of emails of corporate sponsors. In addition to the primary sponsor named by
each guest in the Contact Person and the Contact Person Email fields of the
Guest Registration form, these sponsors will also receive guest registration
notifications.
Restrict sponsors to these domains - Select this option to provide a
comma-separated list of corporate domains. The entries specified in this field
limit the allowed domain(s) in the Contact Person Email field of the Guest
Registration form submitted by a registering guest. For example, if the field
contains the entries finance.my-company.com, marketing.my-company.com,
sample.com, then only an email address that ends with one of these domains,
such as [email protected], is valid for use in the Contact
Person Email field.
Two approval strategies are available:
1. Define additional approving sponsors
Select Additional sponsors.
The guest registration request notification email can include either one or two
links.
One link opens the Login page of the Guest Management Portal, where a
sponsor can log in and administer all their guest registration requests. For
information about the Guest Management Portal, see
If the CounterACT user selected the Sponsor approval using email link
option in the Guests tab of the HTTP Login action, then a second link is
included. This link opens a Network Access Request page, where the sponsor
can approve or decline the network access request of the specific guest.
Verification Codes
You can tighten access by using guest verification codes. If you use these codes,
guest identity is verified by sending a one-time verification code to the guest
email address or mobile phone number that they entered in their registration
form.
The guest is requested to enter the code before attempting to log in.
The purpose of the code is to verify that the email address or phone number
entered by in the registration form are valid. The code is automatically generated
and validated by CounterACT.
2. Select Add.
Select Mail Carrier to send text message requests to a carrier in email format,
or select URL Carrier to send text message requests to a carrier in a URL string.
3. Select OK. In the Add Carrier dialog box, enter a name that identifies this carrier
in the Name field. In the other fields of the dialog box, enter string patterns that
define the format used to submit message requests.
For message requests in email format, the fields correspond to the Address,
Subject, and Message fields of an email message.
For message requests in URL format, a single URL field is used to submit the
message request. In addition, an optional Proxy URL field lets you specify an
alternative URL.
In these fields, use the following parameters as placeholders for values that are
inserted into the request:
_PHONE_NUMBER_ is the target phone number for the text message. For
example, for guest registration this is the phone number submitted by the
guest.
_MESSAGE_ is message text inserted in the request. For example, for guest
registration this is the registration code.
4. Select Test to send a sample message request using the defined format. Enter
values for the _PHONE_NUMBER_ and _MESSAGE_ parameters, and select OK to
submit the message request. Confirm receipt of the test message on the target
mobile device.
5. In the Add Carrier dialog box, select OK. The carrier is added to the list in the
Mobile Text Message pane.
Viewing Registered Guests
Approved guests can be viewed in the Guest Management Portal and in the Registered
Guest window. See The Guest Management Portal and The Guest Registration Pane.
Working with Guest Tags
Use guest tags to categorize guests into groups, for example, Limited Access guests and
Full Access guests or Building A guests and Building B guests.
You can create policies that evaluate guests for their guest tag assignments. For
example, create a policy that detects Building A-tagged guests and assigns them to a
specific VLAN or allows them minimum network access.
See Guest Tags for detailed information about administering guest tags.
Localization
Registration Codes
You can require guests to enter a registration code before beginning the registration
process. These codes are automatically generated by CounterACT, but they must be
shared with endpoint users manually. Use this feature to ensure that only guests with
whom you've shared the registration code can apply for network access. See Retrieving
Registration Codes.
Corporate Tab
Use the Corporate tab to define which servers will be used for domain authentication, as
well as other authentication settings.
Before configuring corporate users, you must have already configured User Directory
servers. Under most circumstances this configuration was performed when setting up
the Console using the Initial Setup wizard.
To see which servers are defined, select Options from the Tools menu and then select
User Directory. For more information about configuring User Directories see User
Directory.
To allow the endpoint user to select a server against which to authenticate, select Ask
user to select Authentication Server. When this option is selected, the Login page
displays a Domain field, from which the endpoint user can select a domain.
To display a CounterACT Login Session window for corporate users, select the Open
sign-in window after corporate authentication option. The user must keep this
window open to maintain a network to Internet connection, provided this access was
granted in the policy. During this time, CounterACT resolves the Authentication, Signed
In Status property for the endpoint as Signed In as a Domain User.
Control the number of machines a single user can log in to concurrently. Select Allow
the same guest to be signed in concurrently from multiple hosts to allow multiple
logins. If this option is not selected, a second login by the same user closes the first
session on the original computer.
Miscellaneous Tab
Use the Miscellaneous tab to configure additional user login parameters.
For details about customizing texts that CounterACT processing generates in a user's
endpoint, see Localizing CounterACT Redirected Web Pages and Messages.
The HTTP Sign Out action updates the Authentication, Signed In Status property of the
detected endpoint to Not Signed In and displays the CounterACT Login Session Expired
window in the signed-out endpoint.
Manage Actions
This section describes actions that manage endpoints:
Add to Group
Classify
Delete Host
Delete Properties
Add to Group
A group is a predefined collection of IP addresses that has something in common, for
example, a group of endpoints that are printers, or a group of VPN or VIP users. Groups
can be used in several ways when defining policies.
Classify
You can use the Classify action to classify network devices manually. You may need to
do this if devices could not be classified by the Asset Classification template or if you
would like to reclassify them. Select the network function (classification) to assign to the
endpoint.
After a device is classified, it is added to the related Asset Classification group, provided
that the Asset Classification template was deployed.
See Asset Classification Template for details about the template.
Delete Host
This action lets you instruct CounterACT to delete endpoints detected in a policy. Select
Generate admission event to rediscover endpoints immediately after they are
deleted. When you clear the checkbox, endpoints will be rediscovered after they
generate traffic.
Delete Properties
This action lets you instruct CounterACT to clear all detections made on endpoints.
Clearing cancels any actions assigned to the endpoints as a result of the detection.
Select Generate admission event to reevaluate the endpoint immediately after the
detections are cleared. When you clear the checkbox, properties will be evaluated after
an endpoint generates traffic.
Use the HTTP Localhost Login action to detect unmanageable guest endpoints, and allow
users at the endpoints to authenticate. After the endpoints are authenticated, they can
be included in all policy inspections.
Users at unmanageable endpoints are presented with an HTTP Login page when they
attempt to access the web, and must provide their local login credentials to gain web
access. If you have assigned other actions to the policy and the authentication is
successful, all the policys actions are cancelled, removing all the limitations imposed.
If you think login credentials may not be available to users and do not want to limit their
access, you can allow guest login to the web. To do this, select Allow Guest Login.
When selected, the Login page includes a guest link option. You may want to do this, for
example, when the guest user does not authenticate and as such is blocked from your
network, but allowed web access.
The network user is prompted with a Login page at each attempt to access the web,
until:
The user successfully logs in.
The endpoint is released via the Home view, Detections pane or Assets Portal.
The guest login option is selected (when enabled).
Help instructions are available on the HTTP Login page to assist you. The files are
located at the following location if you want to update them:
/usr/local/forescout/webapps/portal/help/localhostloginhelp.htm
To send the redirected page via HTTPS, select Use Encrypted protocol (HTTPS). See
Transmitting Actions via HTTPS for more information about this transmission method.
Show ForeScout Compliance Center
Select Show ForeScout Compliance Center to display the Login page at the endpoint.
If the endpoint has been assigned compliance policies, they will also appear in the
wizard. See Working with the ForeScout Compliance Center for details.
Recommended Conditions
When using this action, you should configure the following condition properties. Use the
AND value between both properties.
Windows OS>does not meet the following criteria>manageable (domain)
Windows OS>does not meet the following criteria>manageable (local)
Recheck Host
Use this action to instruct CounterACT to recheck endpoints against conditions defined in
a policy, i.e. if the endpoints match or do not match the policy conditions.
Improve kill frequency when working with the Kill Process , Kill Instant
Messaging and Kill Peer-to-peer actions. These actions detect and halt
specific Windows processes. If the endpoint has SecureConnector installed the
process is killed once per second; if not, the process is killed once per minute
(recommended).
To improve frequency, you should run the Start SecureConnector action
described here and also make the required configuration in the HPS Inspection
Engine Plugin. For details, select Options from the Tools menu, select HPS
Inspection Engine and then select the SecureConnector tab.
Message Tab
Use this tab to customize the notification page that is displayed to the end user. The
message is displayed when the installation method chosen from the Parameters Tab is
either HTTP Installation at the endpoint or Both.
Message Tab
Parameters Tab
Use this tab to define Start SecureConnector installation and deployment parameters.
Allow endpoint to refuse Allow users to the skip the installation by selecting the Check
SecureConnector Later button. This option is only applicable if Install Method is
installation set to either the HTTP Installation at the endpoint or Both.
Install Method The following installation methods are available:
HTTP installation at the endpoint: Install at the endpoint via
the end users web browser (redirection). In such cases,
endpoint users are prompted to download SecureConnector
when they browse the Internet. The notification and button
labels can be customized. See Localizing CounterACT
Redirected Web Pages and Messages for details.
Remote installation: Carry out remote installation on
manageable endpoints using domain credentials.
CounterACT uses a script when this option is selected.
Both: Both methods are activated simultaneously. If an
installation succeeds using domain credentials first, the web
installation is halted.
Deployment Type The following deployments types are available:
Install Dissolvable: Configure SecureConnector to close at
reboot or disconnection from the network, leaving no
footprints. If SecureConnector is not installed via the
Dissolvable mode, it can always be removed via the
uninstall option in the Start>Programs menu.
Install Permanent as Application/Service: Install
SecureConnector permanently as an endpoint application or
service on the endpoint. Using the service option provides
the following advantages:
- Enhances SecureConnector performance, especially when
working with interactive actions, such as Run Script on
Windows.
- The service can be run before login and after logout.
Refer to the HPS Inspection Engine Plugin Configuration
Guide for details. Select Options from the Tools menu.
Select Plugins. Select this plugin and then select Help.
Use Encrypted protocol Send the redirection page via HTTPS. See Transmitting Actions
(HTTPS) via HTTPS for more information.
Show ForeScout Display the Login page at the endpoint. If the endpoint has
Compliance Center been assigned compliance policies, they will also appear in the
wizard. See Working with the ForeScout Compliance Center for
details.
Schedule Tab
Define an action schedule. See Creating Action Schedules for details.
Recommended Conditions
You can use the following condition properties to help you identify unmanageable
endpoints:
Windows OS>Manageable (Connector), Manageable (Domain), and Manageable
(Local)
Does not meet the following criteria.
Upgrade OS X SecureConnector
Unlike other plugins that support SecureConnector for Windows and Linux endpoints,
the OS X plugin does not automatically update SecureConnector on endpoints when you
install a new release of the plugin. Use this action to update SecureConnector on Mac
OS X endpoints after you upgrade the OS X Plugin.
This action updates the SecureConnector package running on a Mac OS X endpoint.
Deployment type (permanent/dissolvable) and menu bar visibility options are preserved
during upgrade.
In the Installer package URL field, specify a valid network path to the update.tgz archive
that is used to update endpoints. By default, this field points to the file that the OS X
Plugin places on each CounterACT Appliance. If you copy this archive to a content
distribution network or server, specify the full network path to this new location. For
details, see the OS X Plugin Configuration Guide.
Notify Actions
This section describes actions used for communicating with endpoint users:
HTTP Notification
HTTP Redirection to URL
Send Balloon Notification
Send Email
Send Email to User
HTTP Notification
The users web session is redirected when attempting to access the web. The user is
presented with a message that you compose.
Notification Page
Message Tab
Type the message that you want the user to read.
You can receive information regarding end user confirmation of browser notification
messages. To discover which users have confirmed, add a confirmation string to the
Button text field and then create a policy with the new HTTP Confirmation Events
Property.
By default, the users session is redirected when the user attempts to access the web.
However, you can define the action to automatically open a browser at the endpoint,
instead of waiting for the user to browse. This ensures that the message gets to the
user faster. Select Attempt to open a browser at the detected endpoint. (This
option is not available for Windows 2000 and Windows 2003 server machines, and only
works on managed machines.) CounterACT uses a script when this option is selected.
Refer to the HPS Inspection Engine Plugin Configuration Guide for details about how
scripts work. Select Options from the Tools menu. Select Plugins. Select this plugin
and then select Help.
You can also customize the height and width of the notification page and open the
notification page as an Explorer dialog box, rather than displaying it using the default
web browser. These options are available if the Attempt to open the endpoint
browser option is selected.
These features are available from Tools>Options>HPS Inspection Engine pane.
Notification Customization
Parameters Tab
To allow the endpoint user only confirm the message once, select Show
message only until user confirms.
To send the redirected page via HTTPS, select Use Encrypted protocol
(HTTPS). See Transmitting Actions via HTTPS for more information about this
transmission method.
Endpoints users can run a policy recheck directly from the notification page by
selecting Allow immediate recheck. This allows endpoints to verify compliance
status in between CounterACT defined rechecks. On-demand rechecks at the
endpoint enable faster overall network compliance and increase productivity. You
can hide this option by clearing Allow immediate recheck.
Select Show ForeScout Compliance Center to display the Login page at the
endpoint. If the endpoint has been assigned compliance policies, they will also
appear in the wizard. See Working with the ForeScout Compliance Center for
details.
Select Open single page to only redirect the first web browser tab, allowing the
user to continue browsing in other tabs. Verify that the Attempt to open a
browser at the detected endpoint checkbox from the Message tab is selected.
By default, the users session is redirected when the user attempts to access the web.
However, you can define the action to automatically open a browser at the endpoint,
instead of waiting for the user to browse. This ensures that the message gets to the
user faster. Select Attempt to open a browser at the detected endpoint. (This
option is not available for Windows 2000 and Windows 2003 server machines, and only
works on managed machines.) CounterACT uses a script when this option is selected.
Refer to the HPS Inspection Engine Plugin Configuration Guide for details about how
scripts work. Select Options from the Tools menu. Select Plugins. Select this plugin
and then select Help.
By default, the action is only applied one time during the match period. This means that
the first time the end user enters a URL in the web browser, the endpoint is redirected
to the URL configured in action. You can configure this action to continuously apply to
endpoints that match the policy rule by clearing the Redirect endpoint only once
checkbox. This means the endpoint is always redirected to the URL configured in the
action within the match period.
Balloon messages are displayed in the endpoint system tray, as shown in the example
below.
Balloon Message
Send Email
Send an email notification to the administrator or to other addresses. Basic information
about the endpoint is displayed by default in the email message. Add additional text as
required. When composing the message, you can insert any number of property tags.
For example, if you enter {ip}, the IP address at which the events were detected is
automatically inserted into the message. See Working with Property Tags for more
information.
Select Aggregate messages to help you manage email deliveries. When selected, the
values set for Policy Email Preferences are applied to this action. Specifically these
preferences define:
The maximum number of email alerts delivered per day (from midnight)
You can sign these emails using a digital certificate, as specified by the
Secure/Multipurpose Internet Mail Extensions (S/MIME) standard. See Signing Emails
with an S/MIME Certificate for details.
Basic information about the endpoint is displayed by default in the email message. Add
additional text as required. When composing the message, you can insert any number
of property tags. For example, if you enter {ip}, the IP address at which the event was
detected is automatically inserted into the message. See Working with Property Tags for
more information.
You can sign these emails using a digital certificate, as specified by the
Secure/Multipurpose Internet Mail Extensions (S/MIME) standard. See Signing Emails
with an S/MIME Certificate for details.
Remediate Actions
This section describes actions that help you remediate endpoint vulnerabilities, install
security patches, kill processes and more:
Disable Adapters on Dual Homed Devices
Disable External Devices
Expedite IP Discovery
Kill Instant Messaging
Kill Cloud Storage
Kill Peer-to-Peer
Kill Process on Linux and Kill Process on Macintosh
Requirements
Verify that the endpoint is managed by SecureConnector.
Disconnect USB
Expedite IP Discovery
The Expedite IP Discovery action is a remediate action provided by the Switch Plugin.
Use the Expedite IP Discovery action to address situations of delayed endpoint IP
discovery. The action expedites the resolution of endpoint IP addresses (IP discovery
resolve requests) by the Switch Plugin querying the ARP table of designated, adjacent,
L3-enabled network devices.
For details about this action, including the symptoms and root causes of delayed
endpoint IP discovery, refer to the CounterACT Switch Plugin Configuration Guide. Select
Options from the Tools menu. Select Plugins. Select the Switch Plugin and then select
Help.
By default, the application is killed once a minute. If the endpoint has SecureConnector
installed it is killed once a second. You can automatically install SecureConnector on
endpoints when this action is applied.
CounterACT uses a script on the endpoint to apply this action if the endpoint is
managed via domain credentials (Windows Manageable (Domain) is True).
See the HPS Inspection Engine Plugin Configuration Guide for details about
scripts. Select Options from the Tools menu. Select Plugins. Select this plugin
and then select Help.
CounterACT uses a script on the endpoint to apply this action if the endpoint is
managed via domain credentials (Windows Manageable (Domain) is True).
See the HPS Inspection Engine Plugin Configuration Guide for details about
scripts.
The HPS Applications Plugin provides updates to the applications supported by this
action. Refer to the HPS Applications Plugin Configuration Guide for a detailed list of
supported applications. Select Options from the Tools menu. Select Plugins. Select
this plugin and then select Help.
Kill Peer-to-Peer
This action halts specific peer-to-peer applications installed at Windows endpoints.
By default, the application is killed once a minute. If the endpoint has SecureConnector
installed it is killed once a second. You can automatically install SecureConnector on
endpoints when this action is applied.
CounterACT uses a script on the endpoint to apply this action if the endpoint is
managed via domain credentials (Windows Manageable (Domain) is True).
See the HPS Inspection Engine Plugin Configuration Guide for details about
scripts. Select Options from the Tools menu. Select Plugins. Select this plugin
and then select Help.
The HPS Applications Plugin provides updates to the applications supported by this
action. Refer to the HPS Applications Plugin Configuration Guide for a detailed list of
supported applications. Select Options from the Tools menu. Select Plugins. Select
this plugin and then select Help.
By default, the process is killed once a minute. If the endpoint has SecureConnector
installed it is killed once a second.
You can automatically install SecureConnector on endpoints when this action is applied.
Quickly find the endpoints with the process you are looking for by using the Windows
Processes Running property.
CounterACT uses a script on the endpoint to apply this action if the endpoint is
managed via domain credentials (Windows Manageable (Domain) is True).
See the HPS Inspection Engine Plugin Configuration Guide for details about
scripts. Select Options from the Tools menu. Select Plugins. Select this plugin
and then select Help.
Run interactive Select this option to run the specified command or script
(Macintosh interactively on Mac OS X endpoints.
endpoints) On endpoints managed by the OS X Plugin using
SecureConnector, prompts are displayed to the currently
logged in user in a terminal window. See the OS X Plugin
Configuration Guide for details.
Run script as root Select this option to run the specified script using root
user on endpoint user privileges on Linux endpoints. Select this option when
(Linux endpoints) a script requires root privileges, but CounterACT does not
use root credentials to access the endpoint.
To use this option the sudo utility must be enabled on
Linux endpoints. When sudo mode is password protected,
you must configure a password that lets CounterACT enter
sudo mode. See the Macintosh/Linux Property Scanner
Plugin Configuration Guide..
3. Use the options of the Schedule tab to specify when the action is applied, to delay
application of the action, or to specify repeat application of the action.
Select Yes at the Run Interactive drop-down list if the script launches a process or
dialog box at the endpoint.
The Terminal Services service must be running if interactive scripts are used. If
you use this action and it fails, the service may have been stopped.
Type a command or browse to a file that you want to run. If you use a file that exists on
the endpoint, type its absolute path. The commands and scripts that you create are
automatically saved on all Appliances. All file extensions are supported and can be run.
You can also run Powershell scripts. However, vbs file extensions are prefixed with
cscript.
You can create a repository of scripts and apply them as needed. Select the browse
button from the Parameters tab to manage scripts that you created.
Quickly recheck endpoints after they are remediated by the script. Select Recheck
policies after script is run (seconds) and indicate how many seconds to wait before
carrying out the recheck.
CounterACT uses a script on the endpoint to apply this action if the endpoint is
managed via domain credentials (Windows Manageable (Domain) is True).
See the HPS Inspection Engine Plugin Configuration Guide for details about
scripts. Select Options from the Tools menu. Select Plugins. Select this plugin
and then select Help.
Registry Keys
CounterACT uses a script on the endpoint to apply this action if the endpoint is
managed via domain credentials (Windows Manageable (Domain) is True).
See the HPS Inspection Engine Plugin Configuration Guide for details about
scripts. Select Options from the Tools menu. Select Plugins. Select this plugin
and then select Help.
Start Antivirus
Launch antivirus applications that have been halted at Windows endpoints.
This option is available for users working with Symantec, McAfee and Trend
Micro.
/usr/local/forescout/plugin/va/local.properties
The Software Update page will continue to display at the endpoint after all the patches
have been installed. The page, however, is empty. You can stop or disable the action if
you do not want an empty Software update page to appear.
Remediation Server
Microsoft remediation can be done via the Microsoft website or via a Microsoft WSUS
server.
Microsoft Website
Remediation via the website requires connectivity to the Internet. For more information
about these methods, refer to the Microsoft website.
WSUS Server
Remediation via WSUS requires connectivity to the WSUS server. You can also enter a
WSUS Target Group name. This enhances update performance.
When using WSUS, consider the following:
In addition to setting up the WSUS server, you must define the WSUS
environment parameters in the HPS Inspection Engine Plugin (see below).
When the Start Windows Updates action is performed on an endpoint, the WSUS
parameters are permanently defined in the endpoint registry.
You can clear the Apply WSUS settings parameter to avoid having the WSUS
parameters defined in the endpoint registry. If you do this, be aware that if the
endpoints WSUS settings are not defined correctly, the endpoint will not be
remediated.
Update Methods
Three methods are available. Changes made at the endpoint as a result of the method
selected here are kept permanently on the endpoint.
Automatically Download and Install
The patches are downloaded without user notification or interaction.
Automatically Download and Notify of Installation
The endpoint user is notified that updates are available. The endpoint user can either
update immediately or wait till later. Some patches may require machine reboot; in this
case, CounterACT will reboot the machine according to endpoint settings.
The Windows Automatic update may have been defined to let the user decide which
patches to install.
Use Windows Automatic Updates Settings
The Windows Automatic Updates settings are used to determine how the update is
performed.
In a scenario where the Windows Automatic Update setting is defined to Turn off
Automatic Updates and the action Update method is defined as Use Windows Automatic
Updates Settings, the action will not be carried out. To force the update, see Handling
Windows Automatic Updates That Are Turned Off.
Update Antivirus
Update outdated antivirus applications at Windows endpoints.
You may need to select more than one vendor if you think different antivirus vendors
are installed on the same endpoints in the policy scope. This setup is not recommended.
If more than one vendor is installed on the same endpoint, the update will only be run
on one.
CounterACT uses a script on the endpoint when carrying out this action if the
endpoint is managed via domain credentials Manageable (Domain). Refer to
the HPS Inspection Engine Plugin Configuration Guide for details about how
scripts work. Select Options from the Tools menu. Select Plugins. Select this
plugin and then select Help.
The HPS Applications Plugin provides updates to the vendor applications supported by
this action. Refer to the HPS Applications Plugin Configuration Guide for a detailed list of
supported applications. Select Options from the Tools menu. Select Plugins. Select
this plugin and then select Help.
Use the manual option if you want endpoint users to have more control over
patching vulnerabilities on their machines.
To send the redirected page via HTTPS, select Use Encrypted protocol (HTTPS). See
Transmitting Actions via HTTPS for more information about this transmission method.
You can define the action to automatically open a browser at the endpoint instead of
waiting for the user to browse. This ensures that the message gets to the user faster.
Select Attempt to open a browser at the detected endpoint. (This option is
unavailable for Windows 2000 and Windows 2003 server machines, and for unmanaged
machines.) CounterACT uses a script when this option is selected and the endpoint is
managed via domain credentials. Refer to the HPS Inspection Engine Plugin
Configuration Guide for details about scripts. Select Options from the Tools menu.
Select Plugins. Select this plugin and then select Help.
Network users can select the More Info link to review details about the vulnerability
detected.
Network users can select the Recheck my Computer link to immediately recheck the
status of their computer. If the required files are not downloaded and rechecked,
redirection continues.
Recommended Conditions
When using this action, you should configure the following condition property:
Windows Security>meets the following criteria>Microsoft Vulnerabilities
The required patches are automatically listed for the vulnerabilities selected here.
Users cannot access the web until one of the following happens:
Remediation is complete.
The endpoint is released via the Home view, Detections pane or Assets Portal.
By default, CounterACT continuously displays patch links that reside on the Microsoft
website. An option is available, however, to define a local server from which to centrally
manage your patch updates. You may want to do this if you are using customized patch
packages. If necessary, you can also restore to the original Microsoft path.
Restrict Actions
This section describes actions that are used to restrict endpoint access to the network
and Internet:
Switch Restrict Actions
Virtual Firewall
In the ACL configuration, take advantage of the full set of switch capabilities.
CounterACT does not inspect and does not alter the provided content; the plugins role
is one of delivery vehicle to provision a network switch.
Assign to VLAN
Use the Assign to VLAN action to assign endpoints to a VLAN, rather than turning off
their switch ports.
This enables secured remote connection to endpoints for the purpose of deploying
patches, but still prevents the propagation of unwanted traffic to other sections of the
network.
The Assign to VLAN action is not supported for the VoIP device if there is a VoIP device
between the switch and the endpoint (a VoIP port with a connected VoIP phone and a
connected PC behind the phone).
In this scenario, the Assign to VLAN action is supported for the endpoint, when specific
CounterACT/Switch Plugin requirements are fulfilled.
MAC ACL: Instruct a switch to block all traffic sent from the affected, endpoint
MAC address.
The Switch Plugin only supports applying the Endpoint Address ACL action on the
switches of the following switch vendors:
Brocade/Foundry
Cisco
Enterasys Matrix N-Series
Switch Block
Use the Switch Block action to completely isolate endpoints from your network by
turning off their switch port and preventing endpoints from communicating with the
network. This is an extreme action that should be used with care.
If there is a VoIP device between the switch and the endpoint, that is, a VoIP port with a
connected VoIP phone and a connected PC behind the phone, using the Switch Block
action is supported for the endpoint, when the blocking of VoIP ports is globally enabled
in the Switch Plugin for all managed switches.
Virtual Firewall
The Virtual Firewall action lets you block access to and from detected Windows
endpoints. The action also provides you with an option to define blocking exceptions. For
example, when you define a range of addresses to block, but want to allow traffic to and
from IT administrator endpoints or VIP endpoints.
You can configure your system so that you can use the action to block endpoints
connecting through a proxy server from accessing HTTPS pages when a redirect action
is also used. See Blocking HTTPS via Proxy Server.
Sophos
Symantec
For a complete list of currently supported vendors, see Appendix A: Endpoint
Applications Detected by CounterACT in the HPS Applications Plugin Configuration
Guide. Access the Guide in the Documentation Portal or the Customer Support Portal,
Base Plugins page.
Endpoints detected via a policy and blocked with the Virtual Firewall, appear in the
Virtual Firewall pane, but for display purposes only. Manage these endpoints via the
Home view, Detections pane.
Rules created directly via the Virtual Firewall pane take precedence over policies created
here.
3. In the Source IP section, define the endpoints that are prevented from
communicating with the detected endpoint.
4. In the Target Port section, define the services on the detected endpoint that are
blocked.
5. Select OK. The rules that you defined appear in the Blocking Rules list. Use Edit
and Remove as required.
Creating Exceptions
You can define exceptions to the blocking rules created. This enables the continuous
flow of traffic to or from detected endpoints. For example, when you define a range of
addresses to block, but want to allow traffic to and from IT administrator endpoints or
VIP endpoints.
2. Select The FW will allow traffic to the detected host. This allows inbound
traffic to detected endpoints.
3. In the Source IP section, define the endpoints that are allowed to communicate
with the detected endpoints.
4. In the Target Port section, define the services on the detected endpoints that
are allowed.
5. Select OK. The rules that you defined appear in the Blocking Exceptions list. Use
Edit and Remove as required.
Setup
To allow this action to block such endpoints, your system must be set up as follows:
Select Options > NAC > HTTP Redirection > Monitor Proxy Ports for HTTP
Notifications and configure the proxy port.
Verify that the IP address of the proxy server is within the range of the Internal
Network (Options > Internal Network).
If you want to apply the HTTP Notification action to HTTP traffic, clear the
Show message only until user confirms option in the Parameters tab of the
action. HTTPS traffic will not be redirected by this action.
Verify that the defined proxy service is not configured as an Authentication
Server (Options > NAC > Authentication).
Enable/Disable
After your system is set up properly, perform the following to block endpoints
connecting through a proxy server from accessing HTTPS pages when a redirect action
is also used.
To disable:
1. Run the following commands:
fstool set_property engine.conf.params.blockOutgoingSessionInHijack 0
fstool service restart
Action Tools
This section discusses the following tools:
Creating Action Schedules
Enabling and Disabling Actions
Working with Property Tags
Action Icon Display Tool
Policy Action Log
About HTTP Actions
Transmitting Actions via HTTPS
Captive Portal Detection Exceptions
Action Thresholds
Action
3. Select the Schedule tab and then select the Schedule tab.
4. Select Customize action start time. The Action Scheduler dialog box opens.
Action Scheduler
If the information cannot be resolved, the message will display the tag code,
rather than the resolved information.
3. Select the tag that you want to insert and select OK.
When the text field is evaluated, the tag is replaced by the actual property value
of the endpoint.
details than presented at the Home view, Detections pane. The dialog box lists the
current actions and important related information, such as:
Details entered in notification actions
The Appliance that carried out the action
The time the actions were carried out
Information indicating the action status
An option is also available to export the log.
The dialog box lists basic information about the action that you defined and its details.
Appliance Indicates the Appliance at which the actions were carried out.
Status Details Indicates whether the action failed.
You can customize the default look and feel of the HTTP pages delivered to the
endpoint. For example, you can add your company logo, and define background
colors or background images to these pages. See Customizing HTTP Pages for
more information.
Messages that appear in the redirected pages can be changed to the language
defined at your operating system. See Localizing CounterACT Redirected Web
Pages and Messages for more information.
You can customize HTTP preferences to include redirect exceptions that will not
be affected by HTTP actions. These exceptions can be configured either globally
or per action. See Defining HTTP Redirect Exceptions for details.
The DNS Enforce Plugin lets CounterACT implement HTTP actions in cases where
stateful traffic inspection is not possible. This is relevant, for example, with a
remote site or an unmanaged network segment. For more information, refer to
the CounterACT DNS Enforce Plugin Configuration Guide. To open this guide,
select Options from the Tools menu and then select Plugins. Select DNS
Enforce and then select Help.
End user redirect pages may include several messages that are the result of
different actions. The title bar on the redirected page will represent the most
secured state. Specifically, this means if several messages appear on one
redirect page, and one of them is the result of a secured action, the title bar will
show HTTPS.
This feature supports Apple WISPr and Android captive portal detections and is relevant
for the following HTTP actions:
HTTP Redirection to URL
HTTP Login
HTTP Notification
Start SecureConnector
Action Thresholds
There are scenarios in which policy enforcement requires blocking or restricting network
devices and users.
Action thresholds are designed to automatically implement safeguards when rolling out
such sanctions across your network. Consider a situation in which you defined multiple
policies that utilize a blocking action, for example, the Virtual Firewall or Switch Block
action. In a situation where an extensive number of endpoints match these policies, you
may block more endpoints than you anticipated.
An action threshold is the maximum percentage of endpoints that can be controlled by a
specific action type defined at a single Appliance. By working with thresholds, you gain
more control over how many endpoints are simultaneously restricted in one way or
another. See Working with Action Thresholds for details.
Base Plugins
Base plugins are components that enhance CounterACT visibility, network
connectivity, detection and control capabilities. Two categories of base plugins are
available.
Bundled Plugins
Non-Bundled Optional Plugins
Bundled Plugins
CounterACT is delivered with several bundled plugins. These plugins link CounterACT
to the network infrastructure (switches, domain servers and user directories), and
provide core endpoint detection and management functionality, including a
comprehensive set of host properties and actions.
To allow timely and responsive updates, new plugin functionality and supporting data
(such as vendor or vulnerability information) may become available independently
between major CounterACT version releases.
The table in this section lists plugins currently bundled with CounterACT. Plugins may
be added to this list in future CounterACT ISO releases. See the Release Notes on
the Product Downloads page of the Customer Support portal for information about
new or removed bundled plugins provided with CounterACT ISO releases.
In addition to working with bundled plugins provided with CounterACT ISO releases,
you can install the CounterACT Cumulative Update Pack, which provides a simplified
and automated process for updating a CounterACT environment with the latest
version of the CounterACT service pack, bundled plugins and additional base plugins.
Refer to the Product Downloads page of the Customer Support portal to download
the CounterACT Cumulative Update Pack and read about the plugins provided.
Module Packaging
Modules can package individual plugins or multiple plugins.
ForeScout Modules: Individual Plugins
Integration Modules: Multiple Plugins
Plugins Released Plugins that were released for the first time (version 1.1.0) after
After Service Pack Service Pack 2.3.0 will be packaged individually as the sole
2.3.0 component of a ForeScout Module even if you are working with a
service pack version earlier than 2.3.0.
Plugins Released Plugins that were released for the first time before Service Pack 2.3.0
Before Service will be packaged individually as the sole component of a ForeScout
Pack 2.3.0 Module when all of the following are true:
You did not install the same plugin packaged as part of an
integration module. See Integration Modules: Multiple Plugins.
The ForeScout Module version was released after the Service Pack
2.3.0 release.
Service Pack 2.3.0 or above is installed.
ForeScout Module demo licenses are valid for 90 days. See Demo Licenses.
Open Integration
This module contains the Data Exchange Plugin, which supports bidirectional query
and update interactions with external SQL, Oracle, and LDAP servers.
In addition, it contains plugins and other components that support the CounterACT
Web Service, which lets external entities communicate with CounterACT.
Information can be retrieved from CounterACT using simple, yet powerful web
service requests based on HTTP interaction.
Information can be submitted to CounterACT using web service requests with
an XML data body. The CounterACT Web Service parses the data to update
CounterACT host properties.
Vulnerability Assessment
Modules in this category integrate CounterACT with vulnerability assessment
platforms such as Nessus/Tenable VM and McAfee Vulnerability Manager to support
auditing, asset profiling, sensitive data discovery, and more.
Centralized Management
Plugins are centrally managed across the enterprise. This means if you install or
update a plugin at the Enterprise Manager, it is automatically installed or updated at
all registered Appliances.
You can perform the following actions on several plugins simultaneously:
Start
Stop
Configure
Test
Install and uninstall
If an Appliance on which a plugin is running is disconnected, the plugin will not
appear in the Plugins pane. A warning message indicates that the Appliance is not
connected. Plugins may not be uninstalled via individual Appliances.
The uninstall process must be carried out from the Enterprise Manager.
Plugins Pane
The Plugin Manager displays basic plugin information, for example, the plugin name,
operational status, version and build, and associated modules.
Plugin Security
Transfer of information between CounterACT and plugins is secured as follows:
All passwords defined in plugin configurations are:
Kept encrypted on the hard drive
Never printed to log files (even in their encrypted format)
Transferred encrypted over the wire (between CounterACT components)
When a plugin is uninstalled, the encrypted password is deleted from the hard
drive where it is stored.
To update plugins:
1. Double-click the Plugin Updates icon. The Software Updates dialog box
opens. The dialog box displays available plugin updates.
Plugin Updates
2. Double-click the related Note icon and read the release notes for the plugin.
3. Select the plugin and then select Install. The End User License Agreement
dialog box opens.
4. Select I accept the license terms and select Next. If you do not agree to
the license terms, you cannot install the plugin.
The progress bar indicates the progress of the installation. You can view the
installation log file, which itemizes any installation failures.
To roll back:
1. Select Options from the Tools menu and then select Plugins.
Plugins Pane
2. Select a plugin and then select Rollback. A message is displayed listing all
the plugin versions to which you can roll back.
3. Select the version that you want and then select OK. A dialog box opens that
shows you the progress of the rollback.
4. Select Done.
Demo Licenses
You will receive a demo license after installing a plugin. This license is valid for 90
days.
The license for integration modules that package groups of related license
plugins is 30 days. The demo expiration period is calculated from the first
installation of a plugin in the module. See Integration Modules: Multiple
Plugins.
Request a demo license extension or permanent license before this period expires.
The demo license expiration date applies to all plugins included in a module,
regardless of how many of the modules plugins are installed. This means if you only
installed one plugin and the module includes two plugins, the expiration date applies
to both plugins.
Permanent Licenses
When working with permanent licenses, a device count is performed separately by
each module and analyzed against the number of devices (including endpoints and
network devices) that the module is authorized to support. In addition, a device
count is performed by CounterACT and compared to the authorized CounterACT
license capacity.
If you add Recovery and High Availability devices to your CounterACT system after
purchasing Module licenses, you will need to request licenses to work with the
updated system.
Some plugins are not packaged as modules. These plugins do not require a license.
Module licenses should be installed on the Enterprise Manager. Once installed, they
are automatically applied to all managed Appliances.
Not all users have access to the module features. See Access to Console Tools
Permissions for details.
Modules Pane
2. Select Request License and then select Generate Request. The License
Request wizard, Company pane opens.
3. The pane may include company information taken from previous CounterACT
license installations or requests. Update the information if required or enter
new information if none was displayed. License alerts and license files will be
sent to the address listed here. You can enter more than one email address.
Separate addresses with spaces, commas or semicolons.
4. Select Next. The Type pane opens.
5. Request either a permanent license, which does not have a time limitation, or
to extend your demo license for a specific time period.
6. Select Next. The Devices pane opens.
7. Indicate the number of endpoints you want the license to handle. Options
may vary depending on the module you are working with.
8. Select Next. The Request Format pane opens.
Request Pane
Installing Licenses
Once your license is approved it will be sent to the email addresses listed in the
License Request wizard. If you sent your request via the web, the license will also be
immediately accessible from Modules pane. You will be notified as follows:
You can sign these emails using a digital certificate, as specified by the
Secure/Multipurpose Internet Mail Extensions (S/MIME) standard. See
Signing Emails with an S/MIME Certificate for details.
Modules Pane
In addition the module name and status appear in the Plugins pane.
Event Viewer
The Event Viewer indicates:
When a module license was installed
Periodic license alerts
When a module license expires
When a module license is invalid
When the number of devices handled by the license is exceeded
The Appliance runs a web server to operate the portal. (Access to the portal
page requires a secured HTTPS connection, because the information displayed
is sensitive.) During the installation of the Appliance, a default self-signed
certificate is created for this purpose. However, the certificate was not signed
by a known CA, which causes the web browser to display a security warning
when network users attempt to use the portal. Refer to Appendix 4:
Generating and Importing a Trusted Web Server Certificate for more
information. You can turn off this option and transmit via HTTP.
Supported Browsers
The Assets Portal runs in Internet Explorer, Chrome, and Firefox version 2 and
above.
Search Tools
Powerful search tools give you immediate access to an extensive range of endpoint
and user information.
Wild card searches: Search items are highlighted on the results page.
Exact searches.
Searches per category. For example, you can search by: IP addresses, MAC
addresses, Email addresses or DNS host names, User Directory names.
From the Search Results page, you can easily pinpoint problematic endpoints, events
and users. In addition, action tools let you control endpoints directly from the portal.
Search Status
The Assets Portal search result page indicates how many Appliances have been
queried and how many responded to your Assets Portal search.
Appliances disconnected at the time of the search are not queried. If you search for a
specific address, the Appliance to which the IP address is assigned is queried. Other
Appliances are ignored.
To define users:
1. Select Options from the Tools menu and select Console User Profiles.
3. To create an Assets Portal user, select Assets Portal User. Assign Assets
portal permissions from the Permissions section.
4. Update other user definitions as required and select OK.
You may need to verify that Assets Portal users can access the portal. By
default, all users in the NAC network are granted access. If someone outside
the Internal Network needs access or if, for some reason, you need to update
the default, the setting can be modified.
To update the setting, select Options from the Tools menu and then select
Access>Web. If you remove a user from the default range, that user no
longer has access to the portal. In addition, the user no longer receives HTTP
actions defined as part of policies. Such actions include HTTP alerts, self-
remediation and login pages. For more information about Network Policy
settings, see What Is a Policy? It is not recommended to deny portal access.
When you access the portal from the Console, you may not be prompted
to log in. For more information see Separate Login to Each CounterACT
Web-Based Portal.
2. Enter the User Name and Password of a user that can access the portal.
Typically the credentials you use to access the Console also grant access to
the portal. For more information, see Creating Users and User Groups.
3. When Service Pack 2.2.0 or above is installed in your environment, you may
be able to use a Smart Card for authentication:
In some operating systems, you may not be prompted for all the login
steps described here.
a. Select the Login with Smart Card link. The Select a Certificate dialog
box opens.
b. Select a certificate and then select OK. A PIN dialog box may open.
Browser Support
The browser search is supported for Internet Explorer 7 and above, and
Firefox version 2 and above.
Searches are only available for endpoints that were previously discovered.
The User Directory search is only available for endpoints that were detected
via a NAC policy or as a result of the Threats policy.
Specific Search
4. Select Search.
5. The Search Results page opens with items that match the search query.
If the search text was found in a field that is not shown by default, the value
of the relevant field is shown in the More Info column.
6. Select the IP address or item of interest to you, or select any other linked
item to continue the search. If the search produces only one result, the
related ticket page opens.
7. The Host Ticket page opens with information about the selected item.
Item Description
Host information The IP address, MAC address, DNS host name, NetBIOS host name and
NetBIOS domain name for the endpoint.
User Details Information about the logged on user where the endpoint was detected.
Policy Status A list of the policies applied to the endpoint and the current endpoint
status.
You can select the Undo link to reverse any action taken at the
endpoint, for example, releasing an endpoint if it is blocked. The
blocking action will no longer be deployed at the endpoint for this
policy, even if the endpoint is detected again.
If you incorrectly reversed the action, you can return to the previous
state by reassigning the action from the Home view, Detections pane.
Threat Protection Details regarding malicious endpoints activity currently detected.
Activity Detected
Manual Actions Manual policy actions currently taken at the endpoint (actions carried
out from the Home view, Detections pane).
Host Open Service Services at the endpoint that are accessible to other network users, and
the time the services were last detected. Basic information about the
service is also provided.
Authentication The most current authentication login events and the time that they
Login Events were detected, for example, the last MAPI authentication or User
Directory authentication. See also Clearing Events Detections.
Admission Events The most current admission events detected and the time of detection.
Any of the following events may be detected:
New IP: By default, endpoints are considered new if they were not
detected at your network within a 30-day period. For example, if an
IP address was detected on the first of the month, and then
detected again 31 days later, the detection will initiate the
activation. The default time period can be changed. See Policy
Preferences for more information.
IP Address Change
Switch Port Change
DHCP Request
Authentication via the HTTP Login action
Login to an authentication server
SecureConnector connection
If you have installed plugins, additional admission event types may be
available. For example, the New Wireless Host Connected Events option
is available if you installed the Wireless Plugin. See also Clearing Events
Detections.
Page Display
You can display information on a page by page basis or display information on one
page, and use scroll features to view it. It is recommended to select Display All if
you want to print portal data or export it.
To clear an event:
1. Navigate to the event that you want to clear on the ticket page.
About Reports
Your Console is equipped with the following powerful report generation tools.
On-Screen Threat Protection Reports
These tools provide you with important system information about policies and
detections; the services most frequently targeted by malicious endpoints; the origin
of a worm outbreak or the infected endpoints in each network segment. You can also
generate detailed reports on events, such as the number of probe and infection
attempts per host or service, or the number and types of marks distributed over a
time period.
Two options are available for generating on-screen reports:
Generate reports on-screen. See Generating On-Screen Threat Protection
Reports for more information.
Schedule automatically generated reports to be sent by email. See Generating
Scheduled Reports for more information.
By default, an Executive Summary report is sent daily, at midnight, to the email
addresses defined during initial wizard setup. This report provides you with important
information regarding detections made at your network.
Report management tools let you save, print, and export the reports that you
generate.
Web Reports Reports
You can generate comprehensive real-time reports regarding policy detections and
endpoint discovery information. See Web-Based Reports for more information.
Automated updates to these reports are available via the Reports Plugins pane.
Audit Trails Reports
You can view user audit trail reports that contain information about user activities
during a specified time period. These reports can be exported. See Monitoring User
Activity for details.
Reports may include information about both bites and infection attempt
events. The bite event is the event in which the endpoint used a mark to try
and gain access to your network. An infection attempt events is an event
followed by a bite event that is detected at an open, real port on the service
that the bite event was detected.
Executive Reports
The Executive Report provides you with a concise overview of important CounterACT
and endpoint activities.
Report Details
Operational Reports
Operational reports provide you with extensive information about probe, scan, bite
and infection attempt events that occurred at targets, endpoints and services in your
network. These reports allow in-depth drill-down of security information gathered by
CounterACT.
Report Details
Report Details
Email Infected Lists endpoints in your network that generated email worm infection
Hosts per attempts, sorted by segment. Important information about each endpoint is
Segment presented, including the email address from which the attempt was made,
the number of senders, and the number of mails sent.
Related Worm Names for Hosts
Displays endpoints, and names of high profile worms that performed
activities similar to that of the endpoint.
You can load the most current related attack name file by selecting Load
Related Attack Names from the Tools menu. This option installs new
related worm names and the associated services that they attacked.
Updated files can be found on the support page of the ForeScout website.
Targeted Hosts
Displays information about infection attempts that occurred at the endpoints in your
network.
Top Infection Displays the most frequently targeted real endpoints in your network. The
Attempts per report lists the endpoint IP addresses and the number of infection attempts
Host at each real endpoint.
By default, the ten real endpoints that were most frequently targeted are
displayed. This value can be changed from the Report Options dialog box.
Additional report customization options allow you to only display results
greater than a set value, for example, only shown the results if the real
endpoint was targeted more than ten times.
Infection Displays all infection attempts that were targeted at a specific endpoint.
Attempt Report options allow you to generate a table listing the details of all the
Summary for a events shown in the report. For, the date and time the event occurred and
Selected Host the endpoint IP address that initiated the event.
Targeted Services
Displays information about services targeted in your network.
Infected Hosts Shows the number of infected endpoints that attempted to infect a service,
/ Targeted and the number of endpoints in the network at which an infection attempt
Hosts per was carried out for that service.
Service Report customization options allow you to adjust the following for the top
ten reports:
Only display results greater than a set value (calculated according to
infected endpoints).
Update the top ten value, for example, to top five or top fifteen
(calculated according to infected endpoints).
Top Infection Displays the top infection attempts per service.
Attempts per The report displays the service and the number of infection attempts at
Service each service.
This allows you to evaluate which services in your network are more
attractive to worms, and can help in analyzing the security mechanism
protecting these services.
By default, the ten services that were most frequently targeted are
displayed. This value can be changed from the Report Options dialog box.
Additional options allow you to only display results greater than a set value,
for example, only display a service if it was attacked more than ten times.
Report Details
Scan Results
Displays information about Scan policy results.
Displays information regarding vulnerable machines detected in your
network. The report lists the name of the vulnerability, the number of
machines at which it was detected, as well as the number of services
closed.
By default, the ten most common vulnerabilities detected in your network
are displayed. This value can be changed from the Report Options dialog
box.
Report customization options allow you to:
Only display results greater than a set value.
Generate a table detailing report events.
Activity Statistics
Infection Displays the number of infection attempt events that occurred during a
Attempts Over specified time period.
Time Report customization options allow you to:
Define the intervals at which results are displayed, i.e. hourly, daily, or
weekly.
Generate a table detailing report events.
Scan Displays the numbers of scan events that occurred during a specified time
Detections period. Report customization options allow you to:
Over Time Define the intervals at which results are displayed, i.e. hourly, daily, or
weekly.
Generate a table detailing report events.
Top Bite Displays the most common bite methods used over a specified time period,
Methods as well as the number of times each method was used.
By default, the top ten bite methods are displayed. You can update this
value from the Report Options dialog box. Report customization options
also allow you to:
Only display results greater than a set value. For example, only display
results for a method if the method was used more than ten times.
Generate a table detailing report events.
Top Scan Displays the most common scan methods used over a specified time period
Methods as well as the number of times each method was used.
By default the top ten scan methods are displayed. You can update this
value from the Report Options dialog box. Report customization options
also allow you to:
Only display results greater than a set value. For example, only display
results for a method if the method was used more than ten times.
Generate a table detailing report events.
Report Details
Top Mark Displays the top mark types distributed during a specified time period, as
Types well as the number of times each mark type was distributed.
By default, the ten mark types that were most frequently distributed are
displayed. You can update this value from the Report Options dialog box.
Report customization options also allow you to:
Only display results greater than a set value. For example, only display
results for a mark type if the mark was distributed more than ten
times.
Generate a table detailing report events.
Top Always Shows always allowed services that were most frequently accessed by
Allowed blocked endpoints. Always allowed services are defined when creating
Services exception rules from the Virtual Firewall pane.
The results of this report help you evaluate the implications of maintaining
always allowed services.
By default, the ten always allowed services that were most frequently
accessed are displayed. This value can be changed from the Report Options
dialog box.
Report customization options also allow you to:
Only display results greater than a set value. For example, only show
services that were accessed more than ten times.
Generate a table detailing report events.
See Chapter 11: Managing Your Virtual Firewall for more information.
Appliances
Hosts Per Displays the number of endpoints handled at each Appliance in your
Appliance enterprise as well as the average for all Appliances. By default, all
Appliances are displayed.
See Customizing Reports for information about customizing the report results
display.
2. Select a report.
3. In the Time Period section, specify a time period for results:
Relative time: Select Last and then specify the required number of hours,
days, weeks or months by using the spin controls or by typing a value in
the field. Select a time unit from the drop-down list.
A time range: Select From / To and then specify the beginning and end of
the time range.
4. Select Options to customize the report. See Customizing Reports for more
information.
5. Select Generate to create the report.
Customizing Reports
Reports are generated with default customization options. These options can be
modified so that you can better manage results and view information that is
important to you. The following report customization options are available for
reports. Not all customization options are applicable to all reports.
Define the intervals at which results are displayed, i.e. hourly, daily, or
weekly. The default is on a daily basis. See Define Result Display Intervals.
Show only top-level results. The default is the top ten highest results. See
Limit to Top Results Only.
Show only results for a specific endpoint in the network. See Show Only
Results for a Specific Endpoint.
Show only results greater than a certain value. The default minimum value is
one. See Show Only Results Greater Than a Set Value.
Generate a table listing details of each event displayed in the report. See
Generate a Detailed Event Table.
Generate a report of activity at specific Appliances. See Generate a Report
from Activity at Selected Appliances.
If you update the default, it is only applied to the current report. This means that
after the report is generated, the default is restored.
extensive number of results, and you want to limit the report to display only
significant information.
To select an Appliance:
1. In the Report Options dialog box, select Appliance. The Appliance Selector
dialog box opens.
Reports Toolbar
Icon Details
Moves to first or last page of the report. (Only available when the
report is displayed in print layout view).
First/Last Page
Moves to previous or next page of report. (Only available when the
report is displayed in print layout view).
Previous/Next Page
Sends the report to the printer.
Print Report
Saves the current report to a file. The file is automatically saved to a
default location, which you can update if required. See Modifying the
Report Output Location for Manually Saved Reports.
Save
You can open saved reports from the Reports menu on the Console.
View the report in either print layout view or normal layout view. The
cover page and the header and footer can be seen in the print layout.
Print/Normal Layout
View
View the report chart or the event detail table, if you generated one.
To export a report:
1. Select Export from the File menu. A standard browse (Save As) dialog box
opens.
2. Select the location and format in which to export the report.
3. To export the table, use the Save Event Table menu option to save the table
as a CSV file and the Export Event Table menu option to export the table as
a PDF file.
4. Select the file format in which to deliver reports from the Email using
format field. The default is PDF. If you select CSV format, you cannot use the
report cover page and header/footer option. If you select HTML format, you
can only use the cover page option.
5. In the Email address field, enter any number of email addresses in which to
send the reports. Multiple addresses must be separated by spaces or
semicolons.
6. Select Next. The Add Scheduled Report Schedule dialog box opens.
Daily Type a value in the Generate every field, for example, every eight days.
Weekly Type a value in the Generate every field, for example, every two weeks.
Select the required checkboxes to indicate which days of the week the
report is generated.
Monthly In the Days field, enter the days of the month to generate the report. Use
a hyphen to indicate day ranges. Days and ranges must be comma-
separated.
Type a value in the every field.
For example, you can receive reports on the 1st, 10th and 20th day of the
month, every two months.
11.By default, the Report name, user name, creation date and report options
that you selected will appear on the report cover. You can update or delete
this text or add a JPG graphic file by using the standard editing tools located
on the toolbar.
12.Select Next. The Add Scheduled Report Header&Footer dialog box opens.
13.If required, delete, add or edit the text using the standard editing tools
located on the toolbar. Page numbers automatically appear for reports
generated as PDF files, and in the print layout view.
Tools are also available to save your cover page, header and footer text, and
load them to other reports, or to create a default cover page, header and
footer. See Managing the Cover Page, Header and Footer Text for more
information.
14.Select Finish. The report that you scheduled is displayed in the Scheduled
Report Manager dialog box.
15.Select OK in the Scheduled Report Manager dialog box.
The report is sent to the email addresses that you defined, according to the
delivery schedule and report format that you chose. If you generated an
event detail table, the email will also include a zipped CSV file containing the
detailed event information.
Any tag can be entered on the cover page, header or footer, according to the
following format requirements:
Use all caps (upper case), i.e. REPORT_TIME and not Report_Time.
Use the same font for each tag.
Use up to three lines of text for each of the header and footer.
3. Select OK.
Scheduled reports are automatically saved to the Appliance under the Reports
directory. Reports are deleted when the directory size reaches 20 MB. The
oldest reports are deleted first.
All reports that you created through the report scheduler are displayed. The
dialog box displays the scheduled and actual time of delivery. Slight
discrepancies may occur if you scheduled several reports for delivery at the
same time or because of technical issues.
3. Select a report and then select Open. The report opens.
Event detail tables generated for reports saved by CounterACT are not
automatically available. This information must be saved separately and then
opened.
Web-Based Reports
You can access a web-based, Reports Portal to generate comprehensive real-time
and trend information about policies, vulnerabilities and network inventory.
Use reports to keep network administrators, executives, the Help Desk, IT teams,
security teams or other enterprise teams well-informed about network activity.
Reports can be used, for example, to provide information about:
Long-term network compliance progress and trends
Immediate security needs
Compliance with policies
Status of a specific policy
Network device statistics
You can create reports and view them immediately, save reports or generate
schedules to ensure that network activity and detections are automatically and
consistently reported.
In addition, you can use any language supported by your operating system to
generate reports. Reports can be viewed and printed as either PDF or CSV files.
When you access the portal from the Console, you may not be prompted
to log in. For more information see Separate Login to Each CounterACT
Web-Based Portal.
2. Enter the User Name and Password of a user that can access the portal.
Typically the credentials you use to access the Console also grant access to
the portal. For more information, see Creating Users and User Groups.
3. When Service Pack 2.2.0 or above is installed in your environment, you may
be able to use a Smart Card for authentication:
In some operating systems, you may not be prompted for all the login
steps described here.
a. Select the Login with Smart Card link. The Select a Certificate dialog
box opens.
b. Select a certificate and then select OK. A PIN dialog box may open.
To add a Report:
1. Select Add from the Reports portal home page. The Add Report Template
window opens.
2. Select a report template and define the report parameters. The following
report templates are available:
Assets Inventory -generates an inventory report about selected assets
Vulnerability - generates a vulnerability status report about selected
Windows hosts
Policy Trend - generates a report of policy results over a selected period
of time.
Policy Status - generates a report of the policy status for selected hosts
From the web-based Reports Portal, CounterACT users can manually change their
user password. This is a global change that applies to all uses of your CounterACT
user login.
The Reports Portal is provided by the CounterACT Reports Plugin. Plugin updates
may be available in between CounterACT version releases. For comprehensive
information about the Reports Portal, including the reports that can be generated
and changing your CounterACT user password, refer to the Reports Plugin
Configuration Guide.
To view events:
1. Select Event Viewer from the Log menu. The Event Viewer dialog box
opens.
You can hide or display columns in the dialog box and filter the information
that is displayed.
These events are sent automatically to the Syslog server. If you do not want
to send them, configure the CounterACT Syslog Plugin not to transfer this
information. Select Tools>Options>Plugins>Syslog>Configure>Events
filtering.
Item Description
Host The endpoint that was blocked.
Target The IP address to which the blocked endpoint attempted to connect.
Time The time the endpoint was blocked.
Service The service at which the endpoint was detected when it was blocked.
Indicates whether the block event was the result of a Virtual Firewall
block rule.
Item Description
Reason The reason the source was blocked.
3. If you have logged in to the Console via an Enterprise Manager, you can
select specific Appliances for which to run a report.
4. Select OK. The Blocked Events dialog box opens.
The following information is available:
If you have created an exception rule via the Virtual Firewall and also create a
policy rule that blocks detected endpoints, the Virtual Firewall exception rule
takes precedence. This means that the endpoints will not be blocked.
Virtual Firewall rules are centrally managed. This means rules cannot be added,
edited or removed from individual Consoles that are part of your enterprise.
Policy Priorities
Rules created directly via the Virtual Firewall pane take precedence over Virtual
Firewall rules created via the policy.
The following hierarchies, from highest to lowest, are applied when an endpoint is
detected as a result of different policies:
Virtual Firewall Allow Rule
Threat Protection Policy Threat Protection Blocked (source, port) and Virtual
Firewall Block Rule
Group Definition Authentication Servers (allow access)
Policy Virtual Firewall Block
3. Select Allow.
To edit a range:
1. Select a rule from the Virtual Firewall pane.
2. Select Edit.
3. Edit the range as required.
4. Select OK.
CounterACT records all traffic going to the service. When a service is blocked, no
communication with that service is permitted.
CounterACT also responds to:
Service attacks
Emails worms
If necessary, you can disable the Worm Slowdown mechanism. See Disabling and
Enabling the Worm Slowdown Mechanism in Appendix 1: Command Line Tools.
Basic Terminology
This section details basic malicious host concepts and terminology.
Malicious Endpoints
A malicious endpoint is a machine from which a malicious event was detected, i.e. a
worm infection or malware propagation attempt.
Cells
A cell is a group of endpoints that are monitored and protected by a single Appliance.
Specifically, this means that CounterACT can see and intervene with traffic entering
and exiting the cell. Traffic viewed is determined by:
The network topology and the type of hardware that is placed in front of the
Appliance, for example, a hub, router or a switch.
The Active Response range handled. This is the range of addresses that will
be protected by the Threat Protection policy. This range must be included in
the Internal Network.
Scans
A scan occurs when an endpoint performs a specific probe a defined number of times
within a defined time period. By default, when an endpoint initiates three probes
within one day, CounterACT considers this activity a scan*. The system identifies the
following scan categories:
Finger
HTTP
Login
NetBIOS (disabled by default)
Port (Port scan categories, such as UDP or TCP port scans are also
recognized.) (*The default probe count is five probes for port scans.)
SNMP
Vertical Scan A vertical scan is detected when a defined number of UDP or TCP
probes are carried out at a single endpoint.
Vertical A vertical UDP scan or vertical TCP scan is detected when a defined
UDP/TCP Scan number of probes are carried out either on UDP services or TCP services
at a single targeted endpoint.
Horizontal A horizontal UDP scan or horizontal TCP scan is detected when a defined
UDP/TCP Scan number of probes are carried out on the same service at a defined
number of targeted endpoints.
Ping Sweep Scan A Ping Sweep scan is detected when a defined number of Ping Sweep
(ICMP) probes are carried out at any endpoint in the Active Response network.
TCP/UDP Scan A TCP scan or UDP scan is detected when port scan activity does not
meet the Vertical, Vertical UDP/TCP, Horizontal UDP/TCP or ICMP scan
recognition criteria.
The default probe endpoint count and required time range is five in one day. This
means, for example, that by default:
A horizontal UDP scan is detected when an endpoint probes the same UDP
port on five different endpoints within one day.
A vertical scan is detected when an endpoint probes five different services on
the same endpoint within one day.
Use the Scan Details dialog box to change the default. See Customizing Scan
Settings for details.
CounterACT updates the port scan category when subsequent probe activity
takes place within the required time period. For example, if an endpoint
probes a single endpoint at two TCP ports and one UDP, the port scan activity
is categorized as a Vertical Scan. If an additional probe is carried out at
another TCP port within the required time period, the category is changed to
a TCP vertical scan.
Probing Endpoints
A probing endpoint is an endpoint that has scanned your Internal Network.
By default, probing endpoints are monitored by the system for 12 hours. During this
time, CounterACT allows the endpoint to communicate with the network and records
the endpoint activity. In addition, CounterACT responds by sending marks to the
endpoint virtual resource information required to carry out the infection.
If the endpoint continues to scan your network while it is being monitored, the
monitoring period is extended. If the probing endpoint uses a mark, it has performed
a bite event, and it is blocked.
An option is also available to prevent probing endpoints from establishing
communication with your network before they use a mark.
Bite Event
A bite event is identified when an endpoint tries to gain access to your network using
a system mark. When the endpoint uses a mark, it is referred to as a bite event.
This endpoint can be a probing endpoint or any endpoint that received and tried to
use the mark. Endpoints that perform a bite are referred to as infected endpoints.
Infected Endpoints
An endpoint is considered infected if it has used a mark to try to gain access to your
network or if it has passed the email anomaly threshold.
CounterACT responds to infected endpoints by performing one of the following:
Monitoring the infected endpoint: The infected endpoint is permitted to
communicate with your network and domains outside your organization for a
specified time period. During this period, CounterACT records the activity of
the infected endpoint and distributes marks to it. These endpoints are
referred to as monitored infected endpoints.
Blocking the infected endpoints: The infected endpoint is prevented from
establishing communication with the network and domains outside your
organization for a specified time period. These endpoints are referred to as
host blocked endpoints.
Diverse Endpoints
A diverse endpoint is an endpoint that scans for multiple services. This may indicate
that the source is a human attacker rather than a worm, which typically looks for one
service across multiple endpoints.
Service Attacks
CounterACT identifies services attacks when a service-probing criterion is met, i.e.
when a service is heavily probed by multiple endpoints. CounterACT calculates this
criterion based on the size of the network. Service attacks are handled by monitoring
or blocking all endpoints at attacked services only. This differs from the standard
response to individual infected endpoints that are monitored or blocked at any
service in the network or at the service that they attempted to infect. By default,
both UDP and TCP are monitored. TCP ports 68, 80, 113, 443 and 1080 are ignored.
UDP ports 68, 113, 1080 and 33434-33524 are ignored.
Threats Tab
The Console, Detections pane is updated with threat detection information when the
Threats tab is selected. Quickly find threat detections of interest to you. Use the:
Filters: See Working at the Filters Pane.
Text search: Endpoints that meet the search requirements appear as you
type.
State filter: Use a drop-down list to display endpoints that were resolved
with a specific state, i.e., Blocked, Scanning, etc.
Search Tools
Threat Protection
Item Description
Threat Select Enabled to activate the Threat Protection policy features in
Protection CounterACT. These features let you define how CounterACT handles
hosts that attempt to attack or infect your network.
Threat Protection may not be suited to all environments, such as
those with asymmetric traffic. In such environments, if left
enabled, these features will not work properly and endpoints
may be mistakenly blocked. In such a case you may want to
disable Threat Protection.
Disabling Threat Protection means that the Threats policy templates
and all configurations defined in Options>Threat Protection,
including all of the following child directories will not work:
Legitimate Scan
Legitimate Email Servers
Manual Set State
Advanced
Although these configuration options will still be accessible and
configurable from the Console, they are functionally disabled. Any
changes made to these options in the Console will not take effect until
Threat Protection is enabled.
Threat Protection is already automatically disabled when your system
is working in Partial Enforcement mode. If you are working in Full
Enforcement mode, you can choose to selectively disable Threat
Protection while continuing to enable all other CounterACT
functionality. Refer to the section about Enforcement Mode in the
CounterACT Console User Manual for more information.
Item Description
Action On Choose one of the following responses to a bite:
Bite Monitor: the endpoint is permitted to communicate with your network.
CounterACT records the activity of the endpoint and sends marks to it.
Port Block: The endpoint is prevented from establishing communication at
the service it attempted to infect for a specified time period. You can escalate
the Port Block policy to the Host Block policy. When escalated, the endpoint
is prevented from communicating with the entire network, rather than the
service it attempted to infect. By default, the Port Block policy is
automatically escalated to the Host Block after the endpoint attempts to
infect three separate services, that is, when the third service is bitten. You
can change this default.
Host Block: The endpoint is prevented from establishing communication with
the network for a specified time period.
The default block or monitor period for infected endpoints is 12 hours. If the
endpoint performs another scan or uses any system mark during this time, the
blocking or monitoring period is extended.
This means, for example, that if the endpoint is blocked and after two hours uses
a system mark again, the 12-hour block period is restarted, and the total block
time is 14 hours.
The block or monitor expiration time for each malicious endpoint can be seen in
Detections pane in the Expires In column.
Notify Select Operator to send email notification regarding bite detections. Addresses
that receive email are defined during installation, but can be changed. See
Chapter 15: Managing Appliances, Enterprise Managers and Consoles for
information about updating addresses.
See Managing Threat Protection Mail Alert Deliveries for information about
additional email customization options.
Select Infected host to send a Net Send message informing of infected
endpoints running under the Windows platform. The message alerts the user that
the machine is infected. See Customizing Email Worm Settings for information
about changing the default and customizing the message sent.
Item Description
Email Select Enabled for CounterACT to detect and respond to email worm infections.
Worm
Action on Choose to either block or monitor the endpoint when an email infection is
Email detected.
Notify Select Operator to send email notification regarding the email infection
detection. Addresses that receive email are defined during installation, but can be
changed. See Chapter 15: Managing Appliances, Enterprise Managers and
Consoles for information about updating addresses.
Select Infected host to send a Net Send message the infected endpoint running
under Windows platforms. The message alerts network users that their machine
may be infected. See Customizing Email Worm Settings for information about
changing the default and customizing the message text.
Event Traffic
Item Description
Packet Select Enabled for CounterACT to display the packets that were transferred
Capture between a malicious host and the network in the Traffic dialog box. Enabling
Packet Capture may affect CounterACT device performance.
3. Type a new name in the Policy Name field (if required) to maintain the
previous policy, and save the update under a new name.
4. Type comments in the Comments field.
5. Select Apply. A confirmation dialog box opens.
6. Select OK to apply the policy changes.
3. Double-click an Action field and select Monitor or Host Block scan type
from the drop-down list.
Blocking NetBIOS, Port and SNMP scans that are UDP based is strongly
discouraged. If you block these scans, an endpoint can scan your network
using a spoofed endpoint IP address, in which case CounterACT will block the
spoofed address instead of the scanning endpoint address.
4. Double-click the value in the Action Period column to update the time
period. Type a value or use the arrows to adjust the value. From the drop-
down list, select a unit of time.
5. Verify that the first checkbox [] is selected to enable system response to the
event. Clear the checkbox for the system to ignore the event when it occurs.
6. Select the second checkbox [operator email] to send email notification for this
type of scan event.
7. Select the third checkbox [infected endpoint notification] to deliver a Net
Send message to the infected endpoint.
8. Adjust the Policy Name and Comments if required. If you update the
current policy and change the policy name, the new policy is automatically
applied when you save the changes.
9. Select Apply to save your changes.
10.Select Basic to return to the basic policy settings.
Alternatively, you can select Details to customize the scan recognition criterion for
each scan type. For more information, see Customizing Scan Recognition Criteria.
4. Double-click the Action field to define how CounterACT will handle this scan.
5. Double-click the Scan Count field to define the number of probe events that
must occur within a specified period in order for the system to identify the
probing endpoint activity as a scan.
6. Double-click the During field to adjust the time interval in which the events
must occur.
7. Verify that the checkbox [] is selected to enable detection of a specific scan
method. Clear the checkbox for the system to ignore the event.
Scan Types and Related Methods
8. Update the Action Duration field to adjust the time interval in which the
system blocks or monitors these endpoints. The value is applied to all
methods listed. Type in a parameter or use the spin controls to adjust the
parameter. Use the drop-down list to assign a unit of time.
9. Select the Notify Operator checkbox to send email notification to designated
operators when the event occurs.
10.Select Notify Infected host to deliver a Net Send message to the infected
endpoint.
11.Select OK to save changes and close the dialog box.
3. Double-click the Action field for the required bite and select Monitor, Port
Block or Host Block from the drop-down list. See Viewing and Updating the
Policy for details.
If you update the action for a bite type to Port Block while the endpoint is
currently being blocked from the network, the Port Block is postponed until
the Host Block period is expired, and the endpoint performs another bite.
4. Double-click the value in the Action Period column to update the period in
which the system blocks or monitors this bite type. Type a value or use the
arrows to adjust the value. From the drop-down list, select a unit of time.
5. Select the first checkbox [operator email] to send email notification for this
type of event.
6. Select the second checkbox [infected endpoint notification] to deliver a Net
Send message to the infected endpoint.
7. Adjust the Policy Name and Comments if required. If you update the
current policy and change the policy name, the new policy is automatically
applied when you save the changes.
8. Select Apply to save your changes.
9. Select Basic to return to the basic policy settings.
Alternatively, you can select Details to customize the block or monitor response for
each bite type, based on the kind of bite mark used. For more information, see
Customizing Bite Type Values.
If the action is both blocked and monitored, the Bite Type field appears
grayed out in the Bite tab.
4. In each Real Host and Virtual Host column, click the required row, and
select Monitor, Port Block or Host Block from the drop-down list. See
Viewing and Updating the Policy for these option details.
5. Update the Action Duration field to adjust the time interval in which the
system blocks or monitors endpoints that attempt to carry out this type of
infection method. The value is applied to all mark types listed. Type in a
parameter or use the spin controls to adjust the parameter. Use the drop-
down list to assign a unit of time.
6. Select the Notify Operator checkbox to send email notification to designated
operators when the event occurs.
7. Select Notify Infected host to deliver a Net Send message to the infected
endpoint.
8. Select OK to save changes and close the dialog box.
Port Bite
HTTP Bite
NetBIOS Bite
Finger Bite
Login Bite
Amount Endpoints that send more than a certain number of emails within a specified
time period. The default is ten mails within one minute.
Attachment Endpoints that send email with the following attachment formats within a
specified time interval:
.vbs, .vbe, .vb, .scr, .com, .pif, .bat, .shs, .exe, .wsc, .wsf, .wsh, .sct, .reg,
.pcd, .mst, .msp, .msi, .msc, .mde, .mdb, .jse, .isp, .ins, .hta, .crt, .cpl, .cmd,
.chm, .bas, .adp, .ade, .zip, .lnk, .inf, .job, .ini, .shb, .scp, .scf, .dll, .386,
.acm, .asp, .avb, .bin, .cla, .cnv, .cs, .drv, .gms, .hlp, .nta, .hit, .mht, .mpd,
.ocx, .ov, .sys, .tlb, .vxd, .wbt, .wiz
To exclude any of these file types from being checked for anomalies, delete
them from the smtp_extensions file located under the etc. directory at the
installation location.
The default is ten mails (with any of the extensions listed) within one minute.
Sender Endpoints that send email from one machine using more than a certain
number of sender names within a specified time period. The default is mails
with three different sender names within one minute.
Recipient Endpoints that send multiple emails with the same subject to different
recipients within a specified time period. The default is ten mails with the
same subject within one minute.
Server Endpoints that send email to a specified number of email servers within a
defined time period. The default is ten mails to ten servers within one minute.
3. Double-click the Action field for the required email anomaly type and select
Monitor, Port Block or Host Block from the drop-down list.
4. Double-click the value in the Action Period column to update the time
period. Type a value or use the arrows to adjust the value. From the drop-
down list, select a unit of time.
5. Verify that the first checkbox [] is selected to enable system response to the
event. Clear the checkbox for the system to ignore the event when it occurs.
6. Select the second checkbox [operator email] to send email notification for this
type of event.
7. Select the third checkbox [infected endpoint notification] to deliver a Net
Send message to the infected endpoint.
8. Adjust the Policy Name and Comments if required. If you update the
current policy and change the policy name, the new policy is automatically
applied when you save the changes.
9. Select Apply to save your changes.
10.Select Basic to return to the basic policy settings.
Alternatively, you can select Details to customize email anomaly recognition values.
For more information, see Customizing Email Anomaly Recognition Values.
4. Double-click the Action field for the anomaly and select Monitor, Port Block
or Host Block from the drop-down list. See Viewing and Updating the Policy
for an explanation of these options.
5. Double-click the Count field to define the number of events that must be
occur within a specified period in order for the system to identify the
anomaly.
6. Double-click the During field to adjust the time interval in which the endpoint
must send the emails in order to be identified by the system.
7. Verify that the checkbox [] is selected to enable system response to the
event. Clear the checkbox if you want the system to ignore the event.
8. Update the Action Duration field to adjust the time interval in which the
system blocks or monitors this anomaly type. Type in a parameter or use the
spin controls to adjust the parameter. Use the drop-down list to assign a unit
of time.
9. Select the Notify Operator checkbox to send email notification to designated
operators when the event occurs.
10.Select Notify Infected host to deliver a Net Send message to the infected
endpoint.
11.Select OK to save changes and close the dialog box.
3. By default, the Port block policy is escalated to Host block after the endpoint
attempts to infect three separate services, i.e. when the third service is
bitten. Set the Threshold to Host Block field to adjust this default.
4. Clear Enable External Block to block endpoints in the network only.
5. Adjust the Policy Name and Comments if required. If you update the
current policy and change the policy name, the new policy is automatically
applied when you save the changes.
6. Select Apply to save your changes.
7. Select Basic to return to the basic policy settings.
endpoints are blocked again for the time period set. Use the block option to prevent
worm attacks from reaching the service at other endpoints in your network.
By default, both UDP and TCP are monitored for 12 hours. TCP ports 68, 80, 113,
443 and 1080 are ignored. UDP ports 68, 113, 1080 and 33434-33524 are ignored.
You can disable this feature for either service. When disabled, traffic going to the
selected service is neither blocked nor monitored. The response is disabled until you
enable it again.
You can also remove the current monitor or block state endpoints at the service.
In addition, users listed in the Email configuration dialog box are sent an email
notification alert when each service attack occurs.
Recommended Usage
Blocking services should be carried out carefully because when the service is
blocked, no communication to the service is allowed for any endpoint, even if the
endpoint is not malicious.
As a result, it is recommended to only monitor services.
You can view service attacks from the Threats view, the Service Attack folder.
In addition, email alerts are sent when a service attack occurs, provided that you do
not disable this option. The following tools are also available:
Viewing the currently monitored and blocked services.
Viewing a history of monitored and blocked services. See Viewing a History of
Monitored and Blocked Services.
Displaying a report with the number of UDP/TCP scans that occurred during a
specific time period.
Sending service attack traps to your management station. See Chapter 8:
Base Plugins and ForeScout Modules.
3. Double-click the Action field for TCP or UDP. From the drop-down list, select
Monitor to record all traffic going to the selected service, or select Block to
prevent all traffic from communication with the service. By default, service
attacks are monitored for 12 hours. These settings can be customized on a
per port basis. See TCP Customizing Service Attack Criteria for details.
4. Double-click the value in the Action Period column to update the time period
that the system blocks or monitors this type of service. Type a value or use
the arrows to adjust the value. From the drop-down list, select a unit of time.
5. Verify that the first checkbox [] is selected to enable system response to the
event. Clear the checkbox for the system to ignore the event when it occurs.
If the checkbox is cleared, service attacks will not be monitored or blocked.
6. Select the second checkbox [operator email] to send email notification when
the attack occurs.
7. Adjust the Policy Name and Comments if required. If you update the
current policy and change the policy name, the new policy is automatically
applied when you save the changes.
8. Select Apply to save your changes.
Alternatively, you can select Details to customize service attack parameters. For
more information, see Customizing Service Attack Criteria.
4. Select Enabled to enable system response to the event. Clear the checkbox
for the system to ignore the event when it occurs. If the checkbox is cleared,
service attacks will not be monitored or blocked (recommended).
5. From the Default Action drop-down list, select Monitor to record all traffic
going to the selected service, or select Block to prevent all traffic from
communication with the service for the selected protocol.
2. Type the port numbers required. Use a hyphen to indicate port ranges. Ports
and ranges must be comma-separated.
3. Select OK. The Service Details dialog box is updated with the port numbers
that you added.
4. Click the action field for the related port and choose an action response from
the drop-down list that opens. The following options are available:
5. Select OK.
Operator Notification
CounterACT sends email notification to specified email addresses regarding bite
detections. If there is extensive activity at your network, email recipients may
receive an overwhelming number of emails.
The following tools are available to help you manage email delivered to email
recipients:
Define the maximum number of email alerts delivered per day (from
midnight)
Define the maximum number of events that are listed in each email
For example, you can define that you only want to receive 50 emails per day, and
that each email should contain no more than 50 events.
Default Settings
By default up to 100 mails are sent within 24 hours. This means, for example, that if
there is extensive activity early in the day and 100 mails are sent by 11 AM, you will
not receive mails about events that occurred during the rest of the day.
After the maximum number of emails is sent, a warning email is delivered; indicating
that the email delivery threshold has passed and that you will no longer receive
email alerts again until midnight. At midnight, an email is sent summarizing events
that were not delivered. The summary includes the type of events detected and the
number of events for each type, for example, 25 Port Bites and 65 Login Bites.
You can change the default parameters and receive email alerts at a frequency that
is more manageable for you.
Emails are also sent when the system detects a service attack. You cannot
customize this delivery parameter, but you can disable the email delivery
feature for service attacks.
Update addresses By default, your system sends email alerts to specified addresses
that will receive when bite events occur. These addresses are defined during
email alerts installation and can be changed. See Managing Email Notification
Addresses for more information.
Receive mail only You can define that you want to receive alerts only when specific
for certain event types of endpoint activity occur, for example, only when Login bites
types occur.
Perform parsing on Email alerts that you receive regarding endpoint and service events
event information include a summary of events. This information is displayed in a
displayed in email format that can be easily used for parsing by external applications.
alerts See Parsing Event Information Displayed in Email Alerts for more
information.
Monitor Monitors endpoint activity for the length of time that you specify.
Host Blocks the endpoint from the network for the length of time that you
Block specify.
Port Block Blocks the endpoint at the services that you define in the Services field.
Multiple services must be comma-separated.
Ignore The system ignores all endpoint activity for the length of time that you
specify. After this time, the system responds to the endpoint activity
according to the policy definitions. When you select this option, the
Firewall block options and HTTP redirection actions are also ignored for
the time specified on these endpoints. See Advanced Policy Options for
more information.
5. In the Active for area, use the spin controls and drop-down list to select the
length of time that you would like the selected endpoint to remain in the
chosen state.
6. You can use the Comments field as required.
7. Select OK to accept the entry or Cancel to close the dialog box without
applying the changes.
3. Select OK.
General information as well as detailed event information about the event can be
viewed. For example, you can review specifics about packets that were transferred
during the session.
In addition, you can view information about the endpoint in the Assets Portal by
selecting Show full host details. See Chapter 9: Assets Portal for more information
about the portal.
Events Tab
The Events tab displays a graphic time-line summary of the source state for the
period that the source is active. In addition, the tab includes an Event table, which
provides extensive, real-time information about the source events and responses to
those events.
Source Time-Line
Event Table
The Event Table provides extensive, real-time information about source events and
CounterACT activity that occurs while the source is active. An event is defined as any
attempt to access an endpoint on the network.
For example, the table displays information about the targeted endpoint for each
event, including the endpoint IP address and the targeted service. Information about
Source Activity
The following table details source activity for the selected event.
Item Description
Time The time and date the event occurred.
Indicates that the source address is verified.
Event Indicates whether the packets sent during the event were normally
Fragmentation fragmented or abnormally fragmented. Abnormally fragmented packets
may indicate that the event was carried out by a human attacker and not
by a worm.
Host, Host IP Displays the IP address at which the event took place.
Accessed Host Indicates that the targeted host was a virtual address.
Type
Indicates that the targeted host is unknown.
External Indicates whether the targeted host resides outside the network.
Service Displays the name of the services accessed on the targeted host.
CounterACT Activity
The following table details activity for the selected event.
Item Description
Detection Indicates the event detected, i.e. NetBIOS scan or infection attempt.
Response Indicates the response to the detection. Options include:
Block: CounterACT does not allow packets from the source to go
through to the specified destination (host + service).
Stall: CounterACT simulates a virtual service for an infected source.
This occurs when the policy is not set to block infected sources.
Mark: CounterACT distributes a mark to the source.
Resulting State Displays the new source state after detection and response.
Returned Data Displays the data sent to the source from CounterACT. For example, if
CounterACT responded by sending a user name mark to the source, the
returned data will indicate the user name sent.
Expiration Indicates the date and time the source state will expire.
Detections Events that caused CounterACT to either change the current source
state or extend the source state.
Detections and Events that caused CounterACT to either distribute marks or change
Marks the current source state or extend the source state.
Infection Events in which an infection attempt was made.
Attempts
Real Site Events in which the source attempted to probe, scan or infect a real
Accesses site, or in which a valid event was carried out at a real site.
Same Host Events that were targeted at the same host as an endpoint that you
select in the table.
Same Service Events that were targeted at the same service as a service that you
select in the table.
To create a rule:
1. Right-click an event in the Event table and select Legitimize Traffic. The
Add Custom Rule dialog box opens.
2. The currently selected source is displayed in the Source section. The targeted
host and service selected in the Events table are also included in the
Legitimate Traffic rule.
3. Edit the rule if required.
4. Select OK.
To view a summary:
1. Double-click an entry in the Event Table or right-click an entry and select
Details. The Event Details dialog box opens for the selected event.
Item Description
Host Activity Summarizes information regarding source activity for the selected event.
CounterACT Summarizes information regarding activity for the selected event.
Appliance
Activity
Item Description
Related Events Lists events related to the selected event.
Related Scan Details displays all probe events related to the scan
event.
Related Probe Details displays additional probe events related to the
scan event.
Related Mark Details displays marks that triggered the bite event.
You can review a history of related mark events.
Related Bite Details displays the bites that responded to the
distributed mark.
Host The targeted host that communicated with the infected source.
Service Name of service or port number, for example, FTP or email.
Count The total number of packets per session.
Bandwidth The total of all packet sizes divided by the duration of the session in
seconds.
First/Last The date and time of the first or last packet of the session.
Packet Arrival
: A real address
Viewing and Saving Packet Data from the Packet Data Section
This section allows you to display and save the packet data of source sessions.
3. Select an option and then select OK. A Save As dialog box opens enabling you
to save the information in a selected directory.
If the source that you selected is still active, a message opens indicating that
the source is still active and that you are not saving all the source sessions.
with the network that they are protecting, the source is automatically blocked or
monitored according to the policy.
For example, if Appliance 1 detects a port bite from source XYZ, an alert is sent to
the other Appliances, notifying them of the source. If Appliance 2 detects source XYZ
communicating with the network it is protecting, the source is either blocked or
monitored according to the port bite block or monitor policy defined at the Appliance.
The source is blocked or monitored for the time indicated in the policy of Appliance 2
and then released.
You can choose to include or exclude specific Appliances that send or receive alerts,
and customize the kind of bite events that are included in the lockdown alert.
4. Select Apply.
3. Select events from Available events and use the arrow buttons to assign
them to Selected events.
4. Select OK.
Legitimate Traffic
This section describes the options available when working with legitimate traffic
options.
The following options are available:
Handling Legitimate Activity of Malicious Sources
Defining Legitimate Traffic
Automatically Defining Legitimate Scanning Activity Wizard
Manually Defining Legitimate Scanning Applications
Manually Defining Removed Servers
Creating Customized Legitimate Traffic
Editing and Removing Legitimate Traffic
Define servers that have been removed, but are still probed by network
users.
Define specific services and endpoints at which scanning is allowed.
Define email servers and sources that should be allowed to send email traffic.
Use the Legitimate Scan Tuning wizard to automatically locate and allow
legitimate scanning activity generated by known scanning applications or
directed at unused servers.
Create rules for detected endpoints.
Import or export Legitimate Traffic.
The default settings require that the source perform three probe events within
a day in order for the system to mark the source as a probing source See
Customizing Scan Recognition Criteria for information about changing the
probe count criterion.
dialog box about the rules that you already defined. A feature is also available to
import and export Legitimate Traffic rules.
Rule Several types of rules can be created, for example, custom design rules,
known scanning application rules or removed server rules. This column
details the rule type created.
Last The date the rule was most recently modified.
Change
Source The source addresses to which the rule is applied.
Target The destination addresses to which the rule is applied.
Type The probe types included in the rule, for example, to allow HTTP probes only.
The following options are available: Finger, HTTP, Login, NetBIOS, SNMP and
Port.
Port The service to which the rule applies.
Indicates that the rule was applied to real endpoints only.
Comment Displays one of several methods used for defining Legitimate Traffic rules.
The methods are detailed later in this chapter.
9. Select Finish. The Legitimate Traffic List opens, listing the allowed
applications and allowed removed servers that you defined from the wizard.
10.Select Apply to accept the rules.
3. Select Legitimate Scanning Applications and then select OK. The Add
Legitimate Scanning Application Rule dialog box opens.
2. Select Removed Server and then select OK. The Add Removed Server Rule
dialog box opens.
2. Select Custom and then select OK. The Add Custom Rule dialog box opens.
If the services and the probe types do not match, you are warned, but you
can still save the rule. For example, if a user selects HTTP and Login Probe
types on 21/TCP and 23/TCP, the system will ignore HTTP and Login probes
only on those services.
2. Use Probe Type to select which probe types are considered legitimate. For
example, you can create a Legitimate Traffic rule in which only HTTP probes
at port 80/TCP are legitimate.
Configurable probe types include: Finger, HTTP, Login, NetBIOS, Port and SNMP.
The default is NetBIOS and Port probe types on all ports.
1. Select OK.
To define endpoints:
1. Select Options from the Tools menu and then select Threat
Protection>Legitimate Email Servers.
2. Select Add and enter the IP address of the relevant endpoint in the Add
dialog box.
3. Select OK.
The address is displayed in the IP column of the dialog box. The Defined By
column indicates whether the server was automatically learned by
CounterACT or entered by a user.
4. Use Remove and Edit as required.
5. Verify that Enable Auto learn Email server is selected for CounterACT to
automatically locate email servers and ignore email traffic generated by them.
Disable this option to detect email activity at these servers, for example, if
you suspect that they may be infected with a worm (recommended).
If there is no traffic at the server for a month, CounterACT will unlearn it.
6. Select Apply.
To create rules:
1. Double-click an endpoint from the Detections pane.
2. Select the Events tab, and select the event that you think is legitimate.
3. Right-click and select Add Legitimate probe. The information required is
displayed in the Add Rule dialog box.
Source address of the probing source
Target address of the probe target
Probe type and service on which the probe was detected
When you save the rule, you are prompted to reset the source. If your
Appliance is registered with an Appliance and you confirm this action, the rule
is applied to all other connected Appliances.
To remove a rule:
1. From the Legitimate Traffic List, select a rule and then select Remove.
2. Select Apply.
The rule is removed from your system. Sources that were granted access are
now handled according to the current policy.
To edit a rule:
1. From the Legitimate Traffic List, select a rule and then select Edit.
2. Edit the range as required.
3. Select OK and then select Apply.
Create mark rules Create mark rules that reflect the naming conventions used for host
and user names in your network.
Create lists of Create lists of names similar to the host and user names used in
names your network.
SC_LINX_123
SC_LINX_223
In the previous examples:
SC = the company name (Sample Company)
WIN/LINX = the platform (Windows or Linux)
123/223 = a numeric sequence
You can define the naming convention rules for the host and user resource names to
use as marks for your system. The mark rules can contain several segments that
reflect the naming conventions used in your networking/organizational environment.
Default Settings
CounterACT is set up with default mark rules, which appear in the Mark Names pane.
If you add mark-naming conventions, marks are sent according to the default rules
and rules that you create. It is recommended that you delete the default names if
your company maintains a policy that all host or user names are created according to
a specific convention. This ensures that marks will appear consistently and
realistically to probing endpoints.
5. Select a segment type from the drop-down list and select OK.
Three types of rule segments can be created:
You can create up to five segments. The rule conventions that you build appear in
the Format and Size fields of the Add Mark Rule dialog box. A sample name that
matches the rule is displayed in the Example field.
6. Use the arrow buttons to adjust the location of the segments, if necessary.
7. Select OK. The rule that you created is displayed in the Mark Names pane.
To remove a segment:
1. Select the segment of the rule to remove from the Format and Size fields.
2. Select Remove and then select OK.
To remove a rule:
1. Select a rule to apply from the Mark Names pane.
2. Select Remove and then select OK.
Defining Lists
Endpoint and user names for your network may be designed to meet specific
networking or organizational needs. For example, user names may be created to
reflect specific departments in your organization or cities in which your organization
is represented, or any group of names created by your security administrator. You
can define a similar list of host and user names to be used when sending marks.
If you work with this tool incorrectly, CounterACT may not protect your
network properly.
Only users with the required permission have access to this tool.
2. Use the sliders to allocate a ratio. Distribution changes are built gradually.
This means the changes will not be implemented immediately.
3. Set the virtual site density, either:
Select Set density by CounterACT Appliance, for a value optimally
calculated by CounterACT.
To set the virtual host density, select Use The Following Density and
adjust the value. The value is set in percentages, for example, utilizing
50% of the virtual site.
4. Select Apply.
Details
User Groups
In addition to creating an Admin and individual users, you can define single
CounterACT users or define user groups. Working with user groups allows you to
streamline and simplify user creation. Specifically, you can define CounterACT user
groups based on existing Active Directory and RADIUS user groups. Users associated
with groups receive identical CounterACT permissions and scope assignments.
For example, create one group of administrative users with full permissions and full
access to all network segments, and create another group of users who can only
access certain features or certain network segments.
Users can log in to CounterACT using Active Directory or RADIUS server credentials
and are authenticated via the selected authentication server defined when the group
was created.
Two methods are available for grouping CounterACT users.
Associate CounterACT user groups with a specific the RADIUS attribute and
value.
Associate CounterACT user groups with a specific via User Directory group
membership.
General Pane
3. Select a user type from the User Type field to indicate if the user will be a
single user or a group user, as well as the authentication method to be used.
Authentication parameters vary depending on the user type selected.
Single User Options
Password: the user is authenticated via CounterACT server. Type in a user
name and password. Enter a user name in the User Name field. The user
name cannot contain any of the following characters: \/:*?'<>|". Type a
password in the Password field. This is the password used to log in to the
Console. You are informed if the password does not comply with the password
rules (see Password Protection). Re-enter the password in the Verify
Password field. There is no character limitation. You must use at least one
digit. This is the name used to log in to the Console.
Smart Card: Enter a user name. When working with this kind of
authentication, you must configure CounterACT to work with Certificate
Authority (CA) files and Certificate Revocation Lists (CRLs), and configure the
frequency (in seconds) to poll the CRLs. See Using Smart Card
Authentication.
Kerberos: Enter a user name. The user is authenticated via Kerberos. See
Using Kerberos Authentication for more information.
User Group Options
These options associate CounterACT user groups with a specific external
directory group membership. Users associated with this group will receive
permissions and scope assignments listed here. The directories defined here
were defined in the User Directory Plugin. Verify that the General > Use for
Console Login option is selected for this server in the plugin.
External User Directory Associate CounterACT user groups with a specific
Active Directory group. Select a server name from the drop-down list and
enter a group name in the Active Directory Group Name field When
entering the group name, use the format resolved when working with the
CounterACT User Directory > Member Of property. Names are case sensitive.
External Radius Associate CounterACT user groups with a specific RADIUS
attribute and value. Enter the attribute and value parameters to which you
want to associate this group. Values are cases sensitive.
4. After defining user types, enter a description of the user or group in the
Description field.
5. Select Next. The Permissions pane opens.
Permissions Pane
6. If you only want the user to work with the Assets Portal, select Assets Portal
permissions only. The Assets Portal is a web-based search and discovery
tool that allows you to leverage extensive network information collected and
correlated by CounterACT and its plugins. It is recommended to create Assets
Portals users for IT, Security and Helpdesk teams. See Chapter 9: Assets
Portal for more information.
7. Select the appropriate permission settings for the user that you are creating:
(View) only allow users to view information
(Update) allow users to view and update information
(No selection) prevents users from viewing the feature
If you are updating permission for other users, those users must exit and
then log in to the Console again for the permissions to take effect.
Access to Console Tools Permissions
Permission Details
Action Thresholds
Action Thresholds Implement Action Thresholds when working with blocking
and restrictive actions. See Working with Action Thresholds
for details.
Assets Portal Permissions
See Chapter 9: Assets Portal for details.
Assets Portal Host View and change the host state from the Assets Portal.
State
Assets Portal Login View user login information for a specific address, an
Information endpoint name, a server, within a group.
Assets Portal View information about open network services.
Network Services
Permission Details
Assets Portal View security information, for example, information about
Security Information antivirus installations.
Console Permissions
Audit Trail View reports on user activities during a specified time period.
See Using Smart Card Authentication.
Backup Back up and restore system and component settings. See
Backing Up and Restoring System and Component Settings.
CounterACT Configure the Appliance using a variety of configuration
Appliance tools, including Channels, Organizational Units tools and
Configuration more. See Appliance Management.
CounterACT Start, restart or stop CounterACT Appliances, and define
Appliance Control mark-naming rules. The rules can be designed so that they
reflect naming conventions used in your organization or
network environment. This makes the CounterACT marks
more realistic. See Defining Mark Rules.
CounterACT Device Add, edit and delete shell scripts. See Running Configuration
Script Management Scripts on CounterACT Devices.
Enterprise Manager Start, restart or stop CounterACT Enterprise Managers. See
Control Standalone Appliance Management.
Event Log View the Event Log that displays system events. See
Working with System Event Logs.
Group Management Add, edit, remove or update CounterACT Groups. The Group
Management permission cannot be changed (to read-only or
view only) if the Policy Management permission is selected.
See Working with CounterACT Groups.
Host State Override Update the state of endpoints and the length of time that the
state is maintained. See Changing the Host State and
Changing the Host State Maintenance Time.
Legitimate Traffic Define the addresses of legitimate traffic at your network.
See Defining Legitimate Traffic.
License Management Install and manage CounterACT device licenses and plugin
module licenses. See Requesting and Installing a CounterACT
Device License and Working with ForeScout Module Licenses.
View Malicious Handle malicious traffic. See Chapter 12: Threat Protection.
Traffic
Multiple CounterACT Manage a number of Appliances within the network. See
Appliance Chapter 15: Managing Appliances, Enterprise Managers and
Management Consoles.
Policy Control Start, stop, pause, test and clear all policy actions without
changing the policy definitions. See The Policy Manager.
Permission Details
Policy Management Create, edit or delete import and export policies. Create, edit
or delete import and export segments, Groups and Lists.
See:
The Policy Manager
Working with CounterACT Segments
Working with CounterACT Groups
Defining and Managing Lists
Enforcement Mode Control the CounterACT Enforcement mode. The Full
Enforcement mode allows complete functionality. The Partial
Enforcement mode lets you monitor network traffic with
limited ability to respond to it. The Partial enforcement mode
is recommended for evaluation purposes only.
See Working with the Enforcement Mode.
Plugin Control Start, stop, test and get help on plugins. See About Base
Plugins.
Plugin Management Install and uninstall plugins. See About Base Plugins.
Policy Reports View NAC reports. See Policy Reports.
Reports Work with the Reports Portal. See Web-Based Reports.
Scheduled Reports Generate schedules for reports. See Generating Scheduled
Reports.
Software Upgrade Upgrade CounterACT Appliance software. See Upgrading
Appliance Software, Upgrading the Enterprise Manager
Software.
Threat Protection View and manage Threat Protection Policy settings. See
Viewing and Updating the Policy.
User Management View and edit user management features. See Chapter 14:
Managing Users.
Virtual Firewall Protect specific services by allowing or preventing traffic and
defining various traffic rules. See Chapter 11: Managing Your
Virtual Firewall Policy.
Scope Pane
Limited Scope access means that users can only see or control the following feature
in the ranges or segments defined:
Policy Management
Segment Management
Group Management
Organizational Units
All tools listed in the CounterACT Options window, with the exception of the
Console Preferences folders
Check for Updates
Lists
For example, if you grant Scope access to the Finance segment in your organization
to user Alice, then user Alice will only be able to work with the Console tools listed
above for this segment.
If permissions are closed to a particular segment, buttons to these features are
grayed out or users are provided with a message indicating that they cannot access
the feature because they do not have the required user Scope.
To allow users access to a specific range but limit their access to a specific feature,
you can grant Scope permissions and then limit feature Permissions. For example,
allow users to view permission to the entire network range but restrict their access
the Appliance configuration features.
Title bar The title bar indicates that the user has a limited view.
Filters pane
No viewing access
Partial viewing access
When a user with limited viewing permissions attempts to view a blocked
network segment or IP address range, the appropriate message is
displayed.
Removing Users
You cannot remove the default CounterACT Admin user.
Password Protection
The password protection features let you:
Define CounterACT password requirements, for example, the minimum length
of CounterACT passwords.
Define a password expiration period.
Lock out users after password failures for a defined lockout period.
2. Define:
Minimum password length.
Minimum number of upper and lower case letters
Minimum number of alphabetic and non-alphabetic characters.
Minimum number of digits.
Minimum number of special characters required in password.
Number of forbidden repeated characters or digits.
If password can contain user name.
Number of most current passwords that cannot be reused.
A password expiration period. A Change Password dialog box opens during
login when this period expires.
3. Define a password failure threshold and lockout period to enforce when the
threshold is passed. For example, if a user entered the wrong password three
times, that user is locked out of CounterACT for two days. Note that:
Admin users cannot be locked out.
Users who enter the wrong user name are not locked out.
4. Select Apply.
Audit Logs
Blocked and released users: Blocked and released users can be viewed in
the Events Viewer Log.
Policy changes: CounterACT users who created and edited password policies
can be viewed in the Audit Trails Log.
4. Select Apply.
Users will see a consent message when they log in and must accept it to
continue.
2. Select Password and Login. The Password and Login pane opens.
3. In the Session section, disable the Always query external authentication
server to restore sessions option.
4. (Optional) Select the Sustain Console session for: option, and specify a
time period. For the time period you specify, CounterACT restores idle or
dropped Console sessions without requiring a new login. Restored sessions
can only be used from the endpoint that originally logged in.
If you are using this feature, consider adding a backup Admin user with the
required permissions so that you can preserve Console access in the rare
circumstance that the Admin user is mistakenly logged out or denied access.
2. Select the Console User Profiles folder, and then select the Password and
Login pane.
3. In the CounterACT Portals area, disable the Console login grants access to
CounterACT portals, without additional login prompts option.
Change Password
2. In the Change Password dialog box, enter the old and new passwords and
select OK.
Where:
<CounterACT_FQDN> is the DNS name of the Enterprise Manager.
<user> is the user created in step 1.
<realm> is the domain name.
Kerberos Pane
19.Open the Console at which the Kerberos user will log in. The CounterACT
Login dialog box opens.
20.Select the Kerberos login method.
21.Type the user name of the Kerberos user created in step 1. This user must be
the user currently logged on to the endpoint.
22.Select Login.
CA Import Pane
CA File Imported
7. Define locations of Certificate Revocation Lists (CRLs) and the frequency (in
seconds) to poll the lists.
Add
Edit
Remove
About Management
This chapter describes features available for managing CounterACT devices
(Appliances and Enterprise Managers) and Consoles.
Not all users have access to these tools. For more information see Access to Console
Tools Permissions.
Appliance-Specific Settings
The following settings are unique per Appliance and are not affected by Enterprise
Manager settings.
Channel configuration
License management
Appliance upgrade
Settings of plugins other than the Switch, VPN and HPS Inspection Engine
Plugins
Console Management
This section describes the following Console management options:
Managing Console Access
Defining Web Access
Defining Proxy Ports for HTTP
Configuring the Time Zone
Customizing Alarm Indicators
Configuring Console Memory Settings
Access>Console Pane
2. Select Add to add a new range of addresses. The IP Address Range dialog
box opens.
Access>Web Pane
Alarms
3. Select the Visual checkbox for the alarm light to flash for a specific severity
level.
4. Select the Audio checkbox to activate a sound signal when the event occurs.
5. Adjust the alarm span duration as required.
6. Select Apply.
Memory Pane
Not all users have access to the tools detailed in this section.
CounterACT Devices
All items that you selected for the upgrade are displayed in the top page of
the window. When you select an item in the top page, its progress log is
shown in the bottom pane of the window.
High Availability Devices Upgrade for High Availability devices can take a
long time (up to a number of hours). If the upgrade of the second node and
the synchronization are not shown in the log, you can verify the status via
icons on the Console status bar:
3. When the upgrade completes, select Launch Console at the bottom of the
window to return to the CounterACT Login dialog box.
To control communication:
1. Log in to the Enterprise Manager.
2. Open a CLI run application.
3. Run the following command:
fstool service start|stop|restart|status|shutdown
Appliance Management
The following Appliance Manager tasks can be performed:
Requesting and Installing a CounterACT Device License
Viewing Appliance Health Information
Registering Appliances with the Enterprise Manager
Upgrading Appliance Software
Upgrading the Console
Starting and Stopping Appliances
Managing Groups of Appliances
Appliance Bandwidth and Endpoint Capacity
Working with Appliance Channel Assignments
Viewing Information about
Viewing Appliance Traffic Statistics
Assigning Network IPs to Appliances
Running Configuration Scripts on CounterACT Devices
Licenses are also required for ForeScout Modules. See Chapter 8: Base
Plugins and ForeScout Modules for more information.
Virtual Licenses
This section provides information about virtual licenses and about connecting to the
ForeScout License Server. Refer to the CounterACT Installation Guide for information
about installing CounterACT virtual systems. Navigate to the guide at:
http://updates.forescout.com/support/index.php?url=counteract
After the Appliance installation, you should have installed a demo license provided by
your CounterACT representative by email. The license can be installed during the
initial Console setup using the Initial Setup wizard and is valid for 30 days from the
time it was generated by the CounterACT representative. See License (CounterACT
Virtual Systems Only).
You must request and install a permanent license from the Console before the demo
license expires. You can also request an extension to the demo license from this
location.
If you skipped the virtual demo license installation at the Initial Setup wizard, you
can generate a request from the Console. See Generating a License Request for
details.
Before your demo license expires, you must install a permanent license. This license
has an installation begin and end date. You must install the permanent license within
these dates, which will be sent to you when the license is issued.
The demo and permanent license are authorized daily by the ForeScout License
Server.
Communication with ForeScouts License Server is performed by one CounterACT
device, which has access to all other CounterACT devices. This is required so that
one device can perform the authentication for all the devices. The first device that
has connectivity is used for the communication. If there are no communication
problems, the first on the list will usually be used for performing the communication
with ForeScout License server for all devices in the network. You should expect daily
traffic from that device equivalent to the number of VM devices installed.
Licenses that cannot be authorized for a month will be revoked. When this happens,
significant CounterACT functionality will stop. You will be contacted via email
regarding the expiration date and violations. In addition, license alerts, violations,
status and troubleshooting information can be accessed from the Appliance, Details
pane.
If policies are stopped as a result of a license being revoked (for example, due to
expiry or license violations) and an authorized license is subsequently installed, the
policies are not automatically restarted. You must restart policies from the Console.
See Policy Manager Tools and Stopping the Policy from the Appliance.
4. To delete unnecessary requests, select the request to delete and then select
Cancel Request.
5. To view details about the status of your license request, contact information,
submission request and time, and other license-related matters, select View
Details. Depending on whether you have requested a license for Appliances
or an Enterprise Manager, the details shown vary. Details for Appliances
include endpoint and bandwidth information, which is automatically
determined by your Appliance model.
5. Type in the license file path or select the folder where want to save your
request file, and select Apply.
6. Submit the saved request to a ForeScout representative. For example,
transfer the request file to a USB drive and send it from another computer.
License Alerts
Health Information
License The number of days remaining until the demo license expires.
Capacity Bandwidth and endpoint assignment capacity violations. See
Appliance Bandwidth and Endpoint Capacity for details.
Bandwidth Statistical information on bandwidth usage.
High Indicates whether a High Availability System is running.
Availability
Swap Indicates whether the swap exceeded 100 kbps consecutively in
the last one minute, i.e. swap polling exceeded 100 on each of
the polls (1 every five seconds). When this happens, the system
may work slowly. To resolve this issue, add physical memory to
the Appliance or replace the Appliance with a new Appliance that
has more physical memory.
Lost Packets Indicates whether the Appliance engine lost on an average more
than a 10% packet loss in the last one minute. Packet loss is
displayed in 10% accuracy, i.e. 0% is 0-10, 10% is 10-20, and
so on. The string O.K. is displayed if the packet loss is less than
10%. When packet loss is more than 10%, HTTP Redirection and
Virtual Firewall may not work consistently. For the same source
and destination, they might work in some cases and fail in
others. To resolve, upgrade the Appliance or configure the
channels to monitor less traffic.
CPU Utilization Indicates the percentage of actual CPU Utilization. If the value is
high, contact your CounterACT, ForeScout representative.
Time Gap from Indicates whether the time set at the Enterprise Manager and at
EM an Appliance varies by more than five minutes. When this
happens, the event time may be incorrectly displayed at the
Console. To resolve this, the Appliance or the Enterprise Manager
clock should be reset.
4. Select Close.
8. To verify the Appliance key, log in to the Appliance as root and run the
following command:
fstool key
Stop Appliance
3. Name the folder and select OK. The folder appears under the Appliances
root.
4. To edit, remove and move a folder, use the respective toolbar buttons or
right-click a folder and select the desired action.
Folder Move
3. Enter the new IP address or host name of the Appliance. Verify that you have
updated the Appliance IP address and name on the machine.
4. Enter a port number of the Appliance. This port is used to communicate with
the Enterprise Manager and the Appliance Console.
5. Enter a password for the admin user for this Appliance. Verify that you have
updated the password for this user from the Appliance Console.
Log in to the Console for this Appliance and select
Tools>Options>Console User Profiles. See Modifying User Details for
information about changing the password. You must enter the current
password even when only updating the IP address and name or port.
6. Select OK. The Appliance connection details are updated. The Device Alerts
and connection status indicator columns in the CounterACT Devices pane will
be updated to indicate that the Appliance is connected.
Options>Plugins
3. From the left pane navigate to and select the Appliance, folder or Enterprise
Manager to display the list of devices on which the plugin is installed.
4. Select Close to close the dialog box.
To view alerts:
1. Select Options from the Tools menu.
2. Select Alerts from the License button drop-down list in the CounterACT
Devices pane.
Details are provided in the Capacity Alert column on any Appliances that have
exceeded the number of allotted endpoints and bandwidth.
License Alerts
Dashboard
Adding Channels
It is recommended that you create channels to match Appliance interface
connections to monitor and respond to traffic on network interfaces.
To add channels:
1. Select Options from the Tools menu and then select Channels.
2. Use the Select Appliance drop-down list to select the Appliance to which you
want to add channels. If you already defined channels from the Initial Setup
wizard, the pane displays channels and related traffic detected on the
Appliance.
Channels Pane
3. Select the Channel drop-down list and then select Add. The Add Channel
dialog box opens.
The interfaces detected on your Appliance appear in the Interface List. Every
few seconds, traffic is captured on the selected interface according to the
various VLANs.
Review the interfaces and related information to verify that traffic is being
seen on interfaces to which you connected at the Data Center, for example, if
traffic is actually mirrored. If you change monitoring an interface assignment
in this dialog box because no traffic is detected or for any other reason, you
must go back to the Data Center and read just the physical interface
connections.
Channels Manager
Response Indicates whether the Response test succeeded on the VLAN. The
test verifies that the Appliance successfully sends response traffic to
the network.
The test runs continually.
If the test failed, you can review related troubleshooting information
at the bottom of the Channels pane.
IP Address Response interface IP address Displays the DHCP address used by
the Appliance for response traffic. By default, the IP address is
acquired through DHCP.
If the DHCP is not successful, CounterACT will not be able to respond
to ARP requests. In this case, manually define the address.
Addresses are defined per VLAN, if required. See Manually Adding a
VLAN for more information.
Management Interface
To customize:
1. Select Options from the Tools menu and then select Channels.
2. Select the Channel drop-down list and then select Add. The basic Add
Channel dialog box opens.
3. Using the Monitor and Response drop-down lists, define the channel
monitor and response settings and then select Advanced. The advanced Add
Channel dialog box opens.
Add a VLAN to monitor a specific path of traffic. You may need to do this, for
example, if there is currently no traffic running on the VLAN.
If this is the case, search for possible reasons, for example, the interface is not
connected, a switch is not correctly configured, or the ports are down.
To add a VLAN:
1. Select Options from the Tools menu and then select Channels.
2. Use the Select Appliance drop-down list to select the Appliance to which you
want to add a VLAN. The Appliance channel list is displayed in the Channels
pane.
3. From the VLAN drop-down list select Add. The Add VLAN on Channel dialog
box opens.
Console Indicators
An indicator is displayed on the Console status bar if:
There is a connectivity problem on enabled VLANs or defined channels.
No channels are enabled.
A new VLAN is automatically discovered by the Appliance.
A tooltip provides details about the event that occurred:
3. Double-click the CounterACT device to open the Host Details dialog box. The
Host Details dialog box opens with three tabs; Status, Channels and IP
Assignment. Alternately, you can select Edit in the CounterACT Devices pane
to access this information.
Status Tab
You can view at-a-glance system health information about Appliances using
this tab.
Information about Appliance health is displayed in a tooltip that opens when
you hover over a specific Appliance in the Status column of the CounterACT
Appliances pane. Icons summarize the Appliance status in the Status column.
Appliance health information is also displayed in the Status tab when you
double-click an Appliance or when you select Edit in the CounterACT Devices
pane.
If the status of any item in the Status section is acceptable and does not
require special attention, it is shown in black. Alerts are shown in orange, and
error messages in red.
Information displayed is useful for troubleshooting. Entries in red may require your
special attention.
The following information is displayed about the Appliance status.
Item Description
License The validity of a license, and the time remaining to expiration, if
applicable.
Capacity The bandwidth and number of endpoints per Appliance.
Item Description
High Availability High Availability system status information:
N/A: No High Availability system is installed.
UP: High Availability is installed and running. Both nodes are up
and synchronized.
Not supported: Versions are incompatible.
Degraded: Review the tooltip for details about why the High
Availability system was degraded.
Refer to the CounterACT Installation Guide for more information about
High Availability.
Swap Indicates whether the swap exceeded 100 kilobytes per second
consecutively in the last one minute, i.e., swap polling exceeded 100 on
each of the polls (1 every five seconds). When this happens, the
system may work slowly. To resolve this issue, add physical memory to
the Appliance or replace the Appliance with a new Appliance that has
more physical memory.
Lost Packets Indicates whether the Appliance engine experienced on an average
more than a 10% packet loss in the last one minute. Packet loss is
displayed in 10% accuracy blocks, i.e., 0% is 0-10, 10% is 10-20, and
so on. OK is displayed if the packet loss is less than 10%. When packet
loss is more than 10%, HTTP Redirection and Virtual Firewall may not
work consistently. For the same source and destination, they might
work in some cases and fail in others. To resolve this issue, upgrade
the Appliance or configure the channels to monitor less traffic.
CPU Utilization Indicates the percentage of actual CPU Utilization. If the value is high,
contact your ForeScout, CounterACT representative.
Channels Tab
Entries in the Channels tab indicate the logical setup and traffic between the monitor
and response interfaces that the CounterACT Appliance uses to interact with the
network.
Alerts on specific channels where traffic problems have been detected are shown at
the bottom of the Channels pane.
IP Assignment Tab
Use the IP Assignment tab to view information about Appliance IP address
assignments for the endpoints in your Internal Network. For details, see Assigning
Network IPs to Appliances .
To view traffic:
1. Select Options from the Tools menu.
2. Right-click an Appliance from the Devices pane and select Traffic. The Traffic
dialog box opens.
3. Select an Appliance and select Edit. The Assign IP Address Range dialog box
opens.
4. Select a range. Add, edit or remove as required and select OK.
5. Select Close from the CounterACT Devices>IP Assignment pane.
Overlapping IP Assignments
CounterACT verifies that each network IP address is only assigned to one Appliance.
This ensures, for example, accurate endpoint monitoring and policy execution.
If you mistakenly define an IP to more than one Appliance, CounterACT displays a
table that lists the ranges and segments to which the overlapping IP was defined.
Review this information and update IP assignments in the IP Assignment dialog box
so that each IP is only assigned to one Appliance. You can export the information in
the table to a .CSV file.
IP Assignment Overlap
To run shell scripts on Appliances, you must have Update level permission for
the Multiple CounterACT Appliance Management permission. To
add/edit/delete shell scripts, you must have Update level permission for the
CounterACT Device Script Management permission. See Access to
Console Tools Permissions for details about acquiring permissions.
New Script
Enter a unique Name and a Description for the script in these fields.
Select Browse and navigate to the shell script file. Select the file and
select OK.
In the Default Parameter Values field, enter values for variable
parameters in the script. Separate values with spaces. When the script
runs, values are assigned to parameters in the order in which they occur
during script processing. You can overwrite these defaults when you run
scripts on individual Appliances.
Select OK to add the script to the table.
The script is run locally, independent of the Enterprise Manager. The root for relative
pathnames is:
/usr/local/forescout/
To retrieve output logs from the most recently run shell script:
1. Log in to the Console on the Enterprise Manager. Select the Options icon from
the Console toolbar.
2. In the Options tree, select CounterACT Devices.
3. Select an Appliance, right-click and select CounterACT Device Scripts >
Export Last Output. The Export dialog opens.
4. Browse to the directory to which CounterACT should copy output files, and
specify a target file.
5. Select Export. CounterACT retrieves the latest script output log file and
overwrites the target file.
In the following example, additional tabs have been added, with separate
configurations for regional groups of Appliances.
2. Select the CounterACT devices to which these configuration settings will apply
3. (Optional) Specify a text label for this configuration instance in the Name
(Optional) field.
4. Select OK. A new tab appears in the pane.
Configuration settings you define while this tab is selected apply only to the
CounterACT devices you selected in step 2.
To delete a configuration:
1. Select the Delete icon x on a tab.
2. Select Yes to confirm deletion.
The configuration tab is removed from the pane.
Settings of the Default tab apply to all devices that were in the scope of the
deleted configuration.
Select Appliances
Scope definitions are made by CounterACT administrators for the purpose of granting
and limiting user access to specific endpoints or segments in the network. Scope
definitions are configured in the Console Users pane. To access the pane, select
Options from the Tools menu and then select Console User Profile.
Viewing Limitations
Certain Appliances that you want to view may contain endpoint IP address
assignments that are not in your Scope. When this happens, you may not be able to
view the Appliance configuration and change it.
Appliances that contain endpoint IP address assignments partially out of your Scope
will appear with a red circle and line through it.
The user accounts defined at the CLI level are not related to Console users.
The following tools support more secure management of CLI level access.
Session timeout (seconds) When a session has been inactive for the specified
period, it is closed. Users can log in again
immediately. Closing inactive sessions enhances
security.
Display this Notice and The text you enter here is displayed to users when
Consent Message for new they connect to the device. Do not enter line break
session: characters in this string.
Mirror system logs to this To mirror logs to an external repository, select this
external Syslog server: option and specify an external Syslog target.
Use enhanced auditing When this option is selected, CounterACT devices
configuration for security monitor additional events and conditions that
events indicate security exposure.
Lock enhanced auditing: It may be necessary to disable enhanced auditing,
reboot is required to disable for example if enhanced auditing causes
enhanced auditing performance issues.
When this option is selected, enhanced auditing
cannot be disabled from the Console. The device(s)
must be rebooted to disable enhanced auditing.
When you access the dashboard from the Console, you may not be
prompted to log in. For more information see Separate Login to Each
CounterACT Web-Based Portal.
2. Enter the User Name and Password of a user that can access the
dashboard. Typically the credentials you use to access the Console also grant
access to the dashboard. For more information, see Creating Users and User
Groups.
3. When Service Pack 2.2.0 or above is installed in your environment, you may
be able to use a Smart Card for authentication:
In some operating systems, you may not be prompted for all the login
steps described here.
a. Select the Login with Smart Card link. The Select a Certificate dialog
box opens.
b. Select a certificate and then select OK. A PIN dialog box may open.
Dashboard Overview
This section provides a short overview of the information available at the Dashboard.
See What You See at the Dashboard for more detailed information.
Dashboard
Item Description
Corporate The number of endpoints that have or have not fulfilled organizational
Network requirements for compliance policies, for example, the number of endpoints
Compliance that have and have not installed prohibited applications, for example,
instant messaging or peer-to-peer applications.
Item Description
Remediated The number of endpoints whose status changes from being noncompliant to
Hosts compliant within a certain time frame, for example, the number of
endpoints that installed prohibited peer-to-peer applications and then
uninstalled them.
Network The number of endpoints that are maliciously scanning or attempting to
Threats infect your network, for example, carrying out NetBIOS attacks or worm
infection attempts.
Network The number of endpoints in your organization not considered part of the
Guests corporate network, for example, personal laptops used by outside
contractors. CounterACT may have detected these endpoints when they did
not properly authenticate with the network.
Organizational A group of segments that has something in common, for example, the East,
Units West and Central Sales segments can be organized into the Sales
Organizational Unit. See Working with CounterACT Segments for more
information about segments.
Compliance Templates
These templates let you generate policies with information about compliant and
noncompliant endpoints and corporate and guest endpoints at your network. This
information is automatically applied to the dashboard.
For example, the Peer to Peer Compliance template policy is automatically integrated
with the dashboard. Endpoints that installed peer-to-peer applications are
automatically labeled not compliant while endpoints that have not installed these
applications are labeled compliant. See Working with Templates for details.
You can also create custom policies and categorize them as Compliance or
Corporate/Guest policies. These policies will also appear in the dashboard. See
Categorizing Policies for details.
Peer-to-peer Compliance
You can also filter the view at the Detections pane according to a specific
organizational unit.
Compliance Trends
Compliance Trends
This section displays compliance trends for specified organizational units in your
enterprise. For example, you can display the number of endpoints in the sales
department that installed and did not install unauthorized peer-to-peer applications
over the last month.
Use the drop-down lists to select an organizational unit, a compliance policy and a
time period.
In addition to displaying compliance information about specific compliance policies,
you can also view results for total compliance. Endpoints that are total compliance
match at least one compliance requirement, and do not match any noncompliance
requirements. Some endpoints may match a compliance policy but are unlabeled for
other policies. This would make them overall or total compliant.
Use the tooltips to view information about how many endpoints were and were not
compliant at a specific time.
The tooltip is displayed when hovering over the graph lines with your cursor.
Tooltips
Remediation Trends
Remediation Trends
This section displays information about the number of remediated events for the
time period, policies and organizational units that you selected. A remediation event
occurs when the endpoint status changes from noncompliant to compliant, for
example, the number of endpoints that installed prohibited peer-to-peer applications
and then uninstalled them.
This section shows real-time policy compliance statistics for organizational units in
your enterprise. For example, out of 981 employees in the sales force, 572 are
compliant and 409 are not compliant with organizational peer-to-peer policies. You
can choose to display organizational unit information for specific compliance policies
or all policies (total compliance).
An organizational unit represents a group of segments. For example, a Sales unit
may include East, West and Central Sales segments.
In addition to displaying organizational compliance information regarding specific
compliance policies, you can also view results for total compliance. Endpoints that
are total compliant match at least one compliance requirement, and do not match
any noncompliance requirements.
Some endpoints may match a compliance policy but are unlabeled for other policies.
This would make them total compliant.
Overall Compliance
Gauges
Dashboard gauges provide information about network guests, malicious endpoints
and remediation events.
Gauge Indicator
Guests
Authorized Guests are endpoints in your organization that you consider part of the
corporate network.
For example, an Authorized Guest could be a laptop used by an outside contractor
that authenticated to the network with the right credentials, whereas an
Unauthorized Guest did not properly authenticate. CounterACT will have detected
these endpoints when they attempted to authenticate with the network.
When working with policies that you manually add for integration with the
dashboard, you can decide which matched rules should be labeled rules that create
authorized and unauthorized endpoints.
Guests Gauge
Threats
Threats: Indicate how many endpoints are maliciously scanning or
attempting to infect your network, for example, carrying out NetBIOS attacks
or worm infection attempts. These endpoints are detected via the Threat
Protection Policy. See Chapter 12: Threat Protection for details.
Blocked: Indicates how many endpoints have been blocked by CounterACT
as a result of malicious activity. If you see that no machines have been
blocked, your Threat Protection Policy may be set to Monitor mode and not
Block mode.
Monitored: Indicates the total number of endpoints that are maliciously
scanning or attempting to infect your network, but are not blocked.
Threats Gauge
Remediations Gauge
CounterACT Coverage
Use this section to learn about endpoints that are monitored by CounterACT and
protected by CounterACT policies.
Monitored
The value shown in the Monitored section represents the number of endpoints
assigned to CounterACT Appliances. These endpoints can be controlled by
CounterACT policies.
Controlled
The value shown in the Controlled section represents Windows, Macintosh and Linux
endpoints that are monitored by CounterACT Appliances and are within the scope of
at least one CounterACT policy. Other network types of devices are not included in
the calculation, for example, guest endpoints, virtual machines, printers and
switches are not included in the calculation.
Total
The value shown in the Total section represents the complete number of endpoints
detected by CounterACT this includes endpoints detected by CounterACT passively
but not specifically assigned to an Appliance, as well as endpoints assigned to an
Appliance. See Assigning Network IPs to Appliances for information about assigning
endpoints to Appliances.
If the number of Monitored, Controlled and Total endpoints is less than the
total number of devices in your network, your entire network may not be well
protected. You may want to take measures to broaden the scope of your
policies.
Dashboard Toolbar
To manage ranges:
1. Select Options from the Tools menu and then select Internal Network.
3. Update as required.
All IPs: Inspect all IP addresses in the Internal Network. In addition,
select this option if you want to detect IP addresses that are malicious but
are not part of the Internal Network and IP addresses that match a
session property that are not part of the Internal Network, for example, all
IP addresses that access the web server.
Segment: Select a segment from the drop-down list. Alternatively,
choose multiple segments by selecting OK and then selecting Segments.
IP Range: Insert an IP range.
4. Select OK to save the changes and close the dialog box.
5. Select Apply to apply the changes to the configuration.
To remove a range:
1. From the Internal Network pane, select a range and select Remove.
The range of selected addresses is no longer protected. This means
CounterACT no longer handles these endpoints.
2. Select Apply to apply the changes to the configuration.
Internal Network, you can disable this feature. After disabling, you must manually
delete the unwanted endpoints.
Only enable this option when the Internal Network includes all traffic monitored by
CounterACT.
Unknown IP Property
Manage Actions
Add to Group
Recheck Host
Delete Host
Delete Properties
Audit Actions
Send Message to Syslog
Notify Actions
Send Email
Restrict Actions
Switch Block
Assign to VLAN
802.1X Plugin actions
Wireless Plugin actions
Perform these actions on endpoints without an IP address by selecting the Unknown
IP addresses option as part of the policy Scope.
Unknown IP Addresses
When selecting All IPs in a policy scope, CounterACT only handles endpoints that
are in the Internal Network.
Email Options
2. Update the address in the Operator email field. If you are using more than
one address, enter a space in between each address.
3. Enter mail relay, DNS domain, and DNS server values.
4. Select Apply to apply the changes to the configuration.
5. Select Test Email to send a test email to this address.
This does not include mails sent by the ForeScout License Server. For
example mails sent regarding:
- CounterACT plugin module license request and approval status.
- CounterACT device license request and approval status.
Digital Signature
3. Verify the S/MIME certificate: the tab shows data fields for the current signed
certificate.
4. The Digitally sign all emails option controls this feature. Do one of the
following:
To enable digitally signed emails, select this option.
To send emails without a digital signature, clear this option.
5. Select Apply.
6. To apply the settings of Step 4 to guest registration emails, restart the User
Directory Plugin.
The Windows Live Mail email client does not correctly display signed guest
registration emails.
When this feature is enabled, the Enterprise Manager applies the digital signature to
emails. Because of this, emails that normally are sent directly by the Appliance are
routed through the Enterprise Manager.
DNS names
Basic User Directory Plugin properties (this plugin is bundled with
CounterACT)
Switch Plugin properties (this plugin is bundled with CounterACT)
Additional properties may also be discovered by default, depending on the plugins
that you have installed. For example, if you installed the VPN Plugin, related VPN
properties are discovered.
You can use the Host Discovery feature to control properties automatically learned.
You may need to do this to:
Expand the information discovered at your network
Limit the information discovered at your network
Discover properties at specific network segments
Discover properties at specific times or under specific conditions
Expanding the Information Discovered by Default
You can update the default to include additional information, for example, properties
that are only available via the policy (Nmap details) or properties that are discovered
via plugins. See Chapter 8: Base Plugins and ForeScout Modules and Chapter 5:
Policy Management for more information.
Limiting the Information Discovered by Default
Under certain circumstances, you may want to prevent discovery tasks on endpoints,
where the information is not needed. You can use the host discovery wizard to
perform this task as well.
Certain properties are learned regardless of the limitations defined in the Host
Discovery tool, including:
Properties learned passively by CounterACT, for example, admission events,
MAC addresses, NetBIOS domain and host names or open ports.
Properties listed in policies.
Properties displayed in Detections pane columns.
Limiting discovery does not impact the policy discovery mechanisms. This
means that if you choose not to discover certain properties via the Network
Host Discovery Policy, they can still be discovered via the policy.
Discovery Pane
3. Select Next. The Properties tab opens. Select the properties that should be
discovered.
4. Select Next. The Scope tab and the IP Address Range dialog box open.
5. Use this dialog box to define the network segment or IP address range to
which to apply the rule.
All IPs: Include the entire Internal Network.
Network Segment: Select a network segment.
IP Range: Insert an IP address range.
Segments: Choose multiple segments. Select the segments and then
select OK.
6. Select OK. The added range is displayed.
7. Select Next. The Trigger tab opens.
Use the trigger option to define when inspection is activated for this policy.
For example, the Admission Event trigger is activated when a user joins the
network. You can configure more than one trigger.
8. Select the trigger events required to initiate endpoint evaluation.
Time The policy is run at a certain date and time. Two options are available:
Based Every: Use this option to run a policy at specific intervals. Short
Recheck intervals are recommended, for example, if you want to check that
a web or email service is consistently running, or if you want to
verify the integrity of any other mission critical service in your
network.
Scheduled: Define a schedule for running the policy.
Admission Three options are available:
Based None: Do not inspect on the basis of an admission event.
Recheck
Recheck on any admission: When any of the following
admission events occur:
- An endpoint performed a DHCP request and then sends ARP
request.
- An endpoint IP address was changed.
- A new endpoint was detected.
- An endpoint was connected to a switch port.
Customized: Customize admission based inspection. Select
Define to customize the admission values.
A delay time exits between the detection of Network Admission
triggers and the onset of the policy evaluation. When an endpoint
boots, the IP address is assigned rather quickly, before most of its
services have loaded. Waiting 30 seconds (default delay time)
increases the chances that the policy evaluation will start when more
details could be learned about the endpoint (after all services have
loaded). You can update the delay default time.
9. Select Finish.
Enforcement Mode
to the CounterACT device. This feature should be used in cases of CounterACT device
hard drive failures or when data is lost for any other reason.
You can perform the following backup-related activities:
Scheduling Automatic Backups of CounterACT Settings to External Servers
Performing a One-Time System Backup
Restoring a System Backup File
Endpoint events and your site structure (real and virtual endpoints) are not saved.
The impact of losing this information is minimal, as the tool should be used in cases
of hard drive failures and not to store endpoint and site information.
In addition, there is a tool that allows you to back up the rSite (real site) and restore
it for a single version. This includes the machines and open services currently
learned. See Backing Up and Restoring the rSite for more information.
You must restore the same version of CounterACT that you backed up.
A remote recovery feature is also available. This features lets you set up a
comprehensive remote recovery system for Enterprise Managers that have
failed as a result of a crisis, for example, an earthquake or fire. See
Recovering an Enterprise Manager.
Backup Pane
Select View public key to view the key in OpenSSH (one-line) or RFC
4716 (SSH2) format. Key-pair information is shared with Recovery
Enterprise Managers and High Availability CounterACT devices. You can
view the status of the creation and transfer of each backup file in the
Event Viewer. Only Console users with update permissions for Backup can
generate key-pairs.
The defined password is also used to encrypt files manually backed up via the
Options > CounterACT Devices pane. When backing up files using this method,
you will be requested to define a password if you have not previously done so.
Encryption Password
2. Type a password. The password must be at least six characters long, and
must contain at least one digit and one letter.
Remember and/or record this password as you will need to use it to
restore the backup file.
E-mail
Internal network parameters
Basic and advanced NAC Policy definitions
Legitimate traffic definitions
Report schedules
System Backup
4. If you want to limit the number of backup files to store, select Limit the
number of backup files to store and select a number.
The number of backup files that will be stored is equal to the number you
configure plus an additional backup file. This ensures that the requested
number of backup files is stored in case of a transfer failure.
If you apply this option and run the backup, and then decrease the configured
number of backup files to store, you will need to manually delete any
superfluous backup files.
Component Backup
5. If you want to limit the number of backup files to store, select Limit the
number of backup files to store and select a number.
The number of backup files that will be stored is equal to the number you
configure plus an additional backup file. This ensures that the requested
number of backup files is stored in case of a transfer failure.
If you apply this option and run the backup, and then decrease the configured
number of backup files to store, you will need to manually delete any
superfluous backup files.
6. Select the event time and recurrence pattern in the Backup Schedule section.
7. Select Apply.
8. (Optional) Select Backup Now to perform a one-time backup to the defined
server.
The backup files are saved to the server defined in the Backup Server tab, in
the following format:
Component_backup.EnterpriseManager_<EM_IP_Address>_
<backup_index>.zip
You must restore to the same version of CounterACT that you backed up.
How It Works
A Recovery Enterprise Manager registered at the Console maintains a lightweight
TCP connection with all CounterACT devices in the corporate network. The purpose of
this connection is to:
Verify that the Recovery device can connect to other CounterACT
components.
Transmit primary Enterprise Manager system settings to the Recovery device.
This connection is used to manage network Appliances when the recovery Enterprise
Manager is switched over as the primary Enterprise Manager.
Communication between the Enterprise Manager and the Recovery Enterprise
Manager is performed on port 13000/TCP using standard TLS encryption.
Recovery Setup
Prerequisites
Disaster recovery may only be deployed on networks that have installed
CounterACT components running version 6.3.X or above.
The Secondary Enterprise Manager may not manage CounterACT managed
Appliances
Event Viewer
The Event Viewer indicates:
When a switchover is made between the primary and secondary
When the connection status of the secondary Enterprise Manager changes
Language Support
CounterACT offers the following tools for displaying and working with local
languages:
Displaying Endpoint Information in a Local Language
Localizing CounterACT Redirected Web Pages and Messages
Displaying Local Languages in Reports, Actions and Other Features
Localizing Guest Management Portal
To display:
1. Select Options from the Tools menu and then select Advanced >
Language Localization > NetBIOS Name Information.
To localize text:
1. In the Console Tools menu, select Options.
2. In the Options window, navigate to and select Advanced > Language
Localization > Endpoint Messages.
The table lists text strings that CounterACT displays in various interactions
between CounterACT and a detected endpoint.
3. In the search field of the Endpoint Messages pane, enter any portion of the
text that you want to localize.
The table displays all entries that include the portion of text, which you
provided in the search field.
4. Do either one of the following actions:
Select a table entry and then select Edit
Double-click a table entry
The Edit Locale Text dialog box opens and displays the text of the selected
entry.
5. In the Edit Locale Text dialog box, modify the text as needed.
6. Select OK.
Select a table entry and then select Default to return to the default text.
HTTP Notification
HTTP Login
Login Page
Start SecureConnector
SecureConnector
SecureConnector Link
Report Localization
For detailed information about working with the Guest Management Portal, refer to
both of the following documents on the CounterACT Customer Support portal, User
Manuals page:
Guest Management for CounterACT Operators How-to Guide
Guest Management Portal for Sponsors How-to Guide
You can localize the strings in the Guest Management Portal. See Localizing Guest
Management Portal.
You can customize the appearance of the Guest Management Portal with the look-
and-feel and branding requirements of your organization. For details, see the Guest
Management for CounterACT Operators How-to Guide.
Add approved guests, edit and remove them. Generate registration codes and
administer guest tags. See Registered Guests.
Define a password policy that will be enforced when passwords are system-
generated or self-selected by guests for login to the corporate network. See
Password Policy.
Define the corporate sponsors who can use the Guest Management Portal for
managing guests. See Sponsors.
Define the terms and conditions for registered guests and for sponsors using
the Guest Management Portal. See Terms and Conditions.
Define the manner in which CounterACT notifies guests about the state of
their guest registration requests. See Guest Notifications.
Define the manner in which CounterACT notifies corporate sponsors about the
state of guest registration requests that are assigned to be administered by
the sponsor. See Sponsor Notifications.
The CounterACT user who works with Guest Registration functionality must have the
Plugin Management update permission. See Access to Console Tools Permissions
for more information.
Registered Guests
In the Guest Registration, Registered Guests tab, perform the following guest
management activities:
Adding Guests at the Console
Editing Guests
Removing Guests
Retrieving Registration Codes
Guest Tags
To add a guest:
1. In the Registered Guests tab of the Guest Registration pane, select Add. The
Add Guest dialog box opens.
Add Guest
Removing Guests
Guests that you remove are automatically and immediately signed out of the
network. Users who are removed while still browsing are notified by a web message
of this management action.
In the Guest Management Portal, sponsors can revoke their approved guests
and decline guest requests. Refer to the Guest Management Portal for
Sponsors How-to Guide.
To remove a guest:
1. In the Registered Guests tab of the Guest Registration pane, select a guest
entry.
2. Select Remove and then select Apply.
Editing Guests
You can edit guest registration values. If you update the password, you must notify
the guest.
To edit a guest:
1. In the Registered Guests tab of the Guest Registration pane, select a guest
entry.
2. Select Edit. The Edit Guest dialog box opens.
3. Update the guest information.
4. Select OK and then select Apply.
In the Guest Management Portal, sponsors can edit the approval period
requested by guests. Refer to the Guest Management Portal for Sponsors
How-to Guide.
Registration Codes
3. Identify the registration code for the day you expect your guest to register.
A unique code is shown for each day. CounterACT does not send the codes to
network guests. This is the responsibility of the CounterACT administrator or other
authorized organizational individuals.
Guest Tags
You can create policies that evaluate guests for their guest tag assignments. For
example, create a policy that detects Building A-tagged guests and assigns them to a
specific VLAN or allows them minimum network access.
Use guest tags to categorize network guests into specific groups as they are being
approved/declined network access by a sponsor. For example, Limited Access guests,
Full Access guests, Building A guests and Building B guests.
These tools are available when Manual sponsor approval of guests is selected in
the Guests tab of the HTTP Login action.
Guest Tags property values come from the tags that you create. For example, if you
created a Limited Access guest tag, this tag appears as a property value to select.
You can create policies that evaluate the Guest Tag property. For example, create a
policy that detects guests with an Authentication, Signed In Status property value of
Signed In as a Guest and a Guest Tag property value of Building A and assigns them
to a specific VLAN or allows them minimum network access.
The CounterACT administrator creates guest tags, and a sponsor, using the Network
Access Request page to approve/decline guests, can assign tags to guests.
To work with tags, perform the following:
Create Tags
Assign Tags
Create Policies with Your Tags
Create Tags
Create tags that sponsors can assign to guests.
To create tags:
1. Select Options from the Tools menu and then select Guest Registration.
2. In the Registered Guests tab, select Tags. The Guest Tags dialog box opens.
3. In the Guest Tags dialog box, you can select guest tag options:
Sponsor may select multiple tags: Selecting this option enables the
sponsor to assign the guest multiple tags.
Sponsor is required to tag the guest: Selecting this option makes it
mandatory for the sponsor to assign the guest one or more tags.
If you do not select any option, sponsors can optionally assign each guest a
single tag.
4. Select Add. The Add Guest Tag dialog box opens.
Assign Tags
Sponsors can assign tags to guests when approving/declining guest network access
using a Network Access Request page, and when adding guests at the Guest
Management Portal. Guest tag assignment is not available to sponsors when
approving pending guests at the Guest Management Portal.
You can create policies that evaluate the Guest Tag property. For example, create a
policy that detects guests with an Authentication, Signed In Status property value of
Signed In as a Guest and a Guest Tag property value of Building A and then assign
them to a specific VLAN or allows them minimum network access.
Password Policy
Use the Password Policy tab to define requirements enforced on passwords that
are used by approved guests to log in to the network. These requirements are
applied to both system-generated passwords for guest login and passwords that
registering guests define by themselves for login.
When defining the HTTP Login action, in the Guests tab, select the option Use
System generated password to have CounterACT generate passwords for guest
login.
Sponsors
In the Guest Registration window, use the Sponsors tab to define the corporate
sponsors who are authorized to log in to the Guest Management Portal and use the
portal to manage guests. The tab provides Add, Edit and Remove sponsor
capabilities.
Sponsors Tab
For detailed information about using the Sponsors tab for Guest Management, refer
to the Guest Management for CounterACT Operators How-to Guide on the
CounterACT Customer Support portal, User Manuals page.
Guest Notifications
Use the Guest Notifications tab to instruct CounterACT about the following:
Use any or all of the following media to send notifications to guests:
Email
Sponsor Notifications
Use the Sponsor Notifications tab to instruct CounterACT to notify sponsors about
the following guest network access events:
The guest registration request of a guest for whom they are a sponsor is
pending (optional)
The guest registration request of a guest for whom they are a sponsor is
approved (optional).
The guest registration request of a guest for whom they are a sponsor is
rejected (optional).
The guest registration request of a guest for whom they are a sponsor is
revoked (optional). This event can only occur, when a managing sponsor of
the guest is working with the Guest Management Portal.
Corporate personnel are considered a sponsor of a guest, when either one of the
following conditions is true:
The registering guest specified the sponsor's email address in the Contact
Person Email fields of the Guest Registration form.
The sponsor's email address is provided in the Additional sponsors field in
the Guests tab of the HTTP Login action.
Select Apply to save your changes in the CounterACT configuration.
A message opens displaying the current list of IP addresses that can connect
to the CounterACT device.
Example:
3. Type in a new end address and press Enter. Alternatively just press Enter to
assign one address.
4. Press S to save your changes and then Q (quit) to exit the command.
3. Type a new password. Use between six and fifteen characters, including at
least one non-alphabetic character.
4. Press Enter.
The following message opens:
Enter new Admin password again:
4. If you stopped the CounterACT device and fixed the clock, select yes.
Choice (1-4):
3. Type yes.
4. To enable the worm delay mechanism, use the following command:
fstool wormdelay enable
3. Type yes.
The following message opens:
Disabling Email privacy...
Restarting CounterACT Engine...
3. Type yes.
The following message opens:
Enabling Email privacy...
Restarting CounterACT Engine...
To import a container with just the signed certificate and public key, see
Importing a Signed S/MIME Certificate in a PEM file.
To import a container with the signed certificate, public key, and a new
private key, see Importing a Signed S/MIME Certificate in a PFX file.
3. If a private key was already generated for the CSR, the following prompt
appears:
A private key already exists. Reuse it? (yes/no) : no
Choose whether CounterACT generates a new private key for the CSR, or
uses the existing key for the CSR.
4. The following prompts appear. Provide values for the fields as prompted, or
press <Enter> to accept previous values, which are displayed in brackets.
RSA key size [2048] :
DNS name of this Enterprise Manager [] :
Organization name [] :
Organizational unit name [] :
City or Locality name [] :
State or Province [] :
Two-letter country code for this unit [] :
Email address [] :
The email address field represents the Enterprise Manager, which applies the
digital signature to emails. The certificate is generated for this email address.
Once a signed certificate is installed on the Enterprise Manager, emails are
sent with this certificate and the email address configured here appears in the
From field. The address should be meaningful, so that users can recognize
that it comes from the CounterACT Enterprise Manager.
Use the procedure described here to import the resulting PEM file.
Where <pem_file_full_path> is the pathname of the PEM file that contains the
signed certificate.
4. The following prompt appears:
Verify that your certificate is in PEM format.
Continue?(yes/no) [yes] :
Type yes.
5. The certificate is imported and updated.
This fstool command supports the PFX file format only. To import a certificate and
private key from two separate files, first convert them to PFX:
To convert a pair of PEM files to a single PFX file, use the following command:
openssl pkcs12 -export -out <pfx_file> -inkey <private_pem> -in <public_pem>
To convert a pair of DER files to a single PFX file, first convert the DER files to PEM
files using the following commands:
openssl x509 -inform der -in <public_der> -out <public_pem>
openssl rsa -inform der -in <private_der> -outform pem -out <private_pem>
Then convert the PEM files to a single PFX file as described above.
Where <pfx_file_full_path> is the pathname of the PFX file that contains the
signed certificate.
4. The following prompts appear:
Verify that your certificate is in PFX format.
Continue?(yes/no) [yes] :
Is the import file protected with a password? (yes/no) : yes
Enter the import password :
Is the private key protected with a passphrase? (yes/no) : yes
Enter the passphrase :
If the certificate and/or private key have been encrypted, provide password
and passphrase values for the imported file and private key as necessary.
5. The certificate and private key are imported and updated.
To reset data:
1. Correct the problems that caused CounterACT to learn and collect the wrong
information.
2. Log in to the CounterACT device.
3. Run the following command:
fstool data_reset all|orgh|intruder|vsite|npsources
The current interface speed and duplex configuration are displayed along with
the following message.
Choice (1-3) :
1) eth0
2) eth1
3) eth2
4) eth3
5) eth4
6) eth5
7) eth6
8) eth7
Choice (1-8) :
4. Choose the interface to configure and press Enter. The current configuration
is displayed along with configuration options. The following displays as an
example:
Choose eth0 configuration:
1) Auto
2) 10baseT/Half
3) 10baseT/Full
4) 100baseT/Half
5) 100baseT/Full
6) 1000baseT/Full
Choice (1-6) :
To generate a summary:
1. Log in to the CounterACT device.
2. Run the following command:
fstool config_sum
Host information
Hostname
Domain name
Dns
Network information
Gateway
eth0 Address: Netmask:
CounterACT Configuration
Email Privacy
Mail relay
Operator mail
Protected net
Management Clients
SSH Clients
Options:
Choice (1-4)
4. At the prompt Time period (in minutes) [10], specify the time period, in
minutes, for which traffic is enabled and press Enter. A message opens
indicating the current time and date and the time and date the traffic is
allowed. For example:
Date : Wed Jun 16 13:22:56 2004
Status: ICMP traffic is enabled until Wed Jun 16
13:27:56 2004
After the time that you entered expires, the built-in firewall default status is
reinstated. This option allows required traffic only.
where:
<hook_name> is a text string that identifies the set of firewall rules or
commands.
<command_1>;;<command_n> is a set of firewall rules or commands.
For example, the following command applies three iptable rules to the
firewall. The set of rules is identified by the hook name newrule:
fstool fw addhook newrule 'iptables -A INPUT -p tcp --tcp-flags ALL
NONE -j DROP; iptables -A INPUT -p tcp ! --syn -m state --state NEW -
j DROP; iptables -A INPUT -p tcp --tcp-flags ALL ALL -j DROP'
If the mail relay has not yet been defined, the following message will appear:
Mail-relay is not defined:
1) Define mail-relay.
2) Send test email.
3) Change operator email address(s).
4) Change sender address.
5) Done.
Choice (1-5) :
To update:
1. Log in to the CounterACT Appliance.
2. Run the following command:
fstool mail_conf
If the mail relay has already been defined, the following message will appear:
1) Disable mail-relay.
2) Change mail-relay settings.
3) Test connectivity to mail-relay.
4) Send test email.
5) Change operator email address(s).
6) Change sender address.
7) Done.
To run a script:
1. Verify that the endpoint is assigned to the Appliance from which you are
activating the command.
2. Log in to the CounterACT Appliance.
3. Run the following command:
fstool va_test h [ip] c script r [command] [-g] [-a] [-z
parameters] [-i]
Examples:
fstool va_test -h 10.0.0.43 -c script -r ping -g -a -z -n 10
fstool va_test -h 10.0.0.43 -c script -r ipconfig -g -a
9. Select OK.
10.Select Finish to complete the Group Policy Wizard.
11.In the Add Standalone Snap-in dialog box, select Close.
12.In the Add/Remove Snap-in dialog box, select OK.
13.In the Console tree, open Computer Configuration>Administrative
Templates>Network>Network Connections>Windows Firewall, as
shown in the following figure.
14.Select Domain Profile and then Windows Firewall: Define port exceptions.
15.Select Enabled.
16.Select Show.
17.Select Add.
18.Define the desired rule, for example:
139:TCP:192.168.10.51:enabled:Port139ForCounterACT would define a rule
allowing the endpoint at 192.168.0.51 to access port 139 on WinXPSP2
computers in the scope controlled by this group policy.
19.Repeat steps 17 and 18 for additional rules.
20.Select OK.
A restart may be needed on the client machines in order for this definition to
take effect.
3. Check that the login is using the Domain, rather than localhost credentials.
2. Verify that the NetBIOS domain name is identical to the one configured in the
Host Properties Scanner Plugin configuration pane. This is done by
running the command nbtstat -n, which should produce the following output.
In a Windows XP group policy, the domain can be configured to set the end-systems
personal firewall settings. For more details, see Working with Windows XP SP2
Machines.
Local configuration of the firewall
Allow monitored network connections:
1. Select My network>Properties>Change Windows Firewall
Settings>Exceptions>File and Printer sharing. Ports TCP 139 and TCP
445 should be set.
2. Select Change Scope and in the Custom List add the CounterACT device IP
address.
e. Services Test
Verify that the services listed in step (circled in red) are running.
To verify:
1. Open the services view by selecting Start>Control Page>Administrative
Tools>Services. Verify that the following services (in red) are running:
Remote Procedure Call (RPC)
Remote Registry Service
Server
f. Shares Test
Verify that the default c$ share exists.
To verify:
1. From My computer, right-click drive C and select Properties.
2. In the Sharing tab, the following should be configured:
Sharing Tab
This appendix describes how to generate and import a trusted certificate and remove
the browser security warning that opens when trying to access the CounterACT Web
Portals, for example the Assets Portal, Dashboard and Reports Portal. The Appliance
runs a web server to operate these portals. Access to them requires a secured
connection (HTTPS), because the information provided is sensitive.
During the installation of the Appliance, a default self-signed certificate is created for
this purpose. However the certificate was not signed by a CA such as VeriSign or
Thawte. This causes the web browser not to trust the self-signed certificate. As a
result, a security alert warning appears each time you connect to a CounterACT
portal.
If you set up the HTTP Login action so that credentials sent to the Appliance
are transmitted, you may also want to generate the certificate.
To prevent this message from appearing, the certificate that the web server is using
needs to be signed by a known CA, and the web server should be accessed using its
DNS name (and not its IP address).
When running the command, you can use SHA-1, SHA-256, SHA-384 or
SHA-512 hash functions for the web server certificate. If no hash function
is selected, SHA-256 is used.
Otherwise, the certificates should be imported using the certificates file(s) of the CA
that signed the request (in addition to the signed certificate file, for example, fstool
cert import /tmp/ca_reply.crt /tmp/intermediate_ca.crt /tmp/root_ca.crt)
You can use the fstool cert clean command to clear all extraneous certificates
from the certificate store. This ensures that new certificates can be properly
imported using the existing fstool cert import command.
You can use the fstool cert test command to print the certificate chain presented
by the SSL server. The default SSL server is localhost:443. This command allows you
to check if the output of the test command matches the certificate chain imported
using the fstool cert import command. You can also print the certificate chain of
an external SSL sever using fstool cert test <sample.server:443>.
The import supports both DER and PEM encoding certificate file formats.
Sample Prompt
# fstool cert gen
-----------------------------------
Generating new Certificate request:
-----------------------------------
DNS name of this CounterACT Appliance : <type here>
Organization name :
Organizational unit name :
City or Locality name :
State or Province :
Two-letter country code for this unit :
Add Email address to the certificate request? (yes/no) : no
Number of months this certificate is valid for [120] :
RSA key size [2048] :
Signature digest algorithm (one of: SHA1, SHA256, SHA384, SHA512) [SHA256]
:
A random seed must be generated that will be used in the
creation of your key. One of the easiest ways to create a
random seed is to use the timing of keystrokes on a keyboard.
To begin, type keys on the keyboard until this progress meter
is full. DO NOT USE THE AUTOREPEAT FUNCTION ON YOUR KEYBOARD!
Continue typing until the progress meter is full:
Finished. Press enter to continue:
Generating key. This may take a few moments...
-------------------------------------------------
Certificate request stored at /tmp/ca_request.csr
-------------------------------------------------
Procedure
To redirect:
1. Connect a NIC other than the one used for management to the general
purpose network. If the injection interface is not configured to handle VLANs
on a switch trunk port, it can be used for this purpose.
2. Configure the NIC with a proper IP address and default gateway by using the
fstool netconfig command. See the following sample session.
The system will redirect using the DNS name of an Appliance if its IP
address (reversibly) resolves to a name, and the name (forwardly)
resolves to the IP address. This behavior can be controlled by setting the
fs.redirect.dns.enabled property:
fstool set_property fs.redirect.dns.enabled true
fstool service restart
The default setting for this property is false (i.e. redirection using DNS
names is not performed).
Security Considerations
After these changes are applied, the Appliance has IP connectivity to both the
general-purpose network and to the isolated management network. Several
measures are in place to prevent the Appliance from connecting the two networks.
The Appliance is configured to not route traffic (net.ipv4.ip_forward = 0). This
attribute is watched for periodically, and is reset if found in the wrong state, so as to
avoid mistakes made manually.
The Appliance built-in firewall blocks all forwarding (FORWARD chain policy is DROP).
This is also watched for periodically and reset if found in the wrong state.
fstool netconfig
Choice (1-4) : 1
---------------------------------------------------
CounterACT Machine Network Interfaces Configuration
---------------------------------------------------
* eth0 Address: 10.0.4.214 Netmask: 255.255.255.0
* eth1 Address: unassigned
* eth2 Address: unassigned
* eth3 Address: unassigned
Choice (1-4) : 2
Updating /etc/sysconfig/network-scripts/ifcfg-eth1...
---------------------------------------------------
CounterACT Machine Network Interfaces Configuration
---------------------------------------------------
* eth0 Address: 10.0.4.214 Netmask: 255.255.255.0
* eth1 Address: 1.2.3.4 Netmask: 255.255.255.0
* eth2 Address: unassigned
* eth3 Address: unassigned
(E)dit,(A)dd VLAN,(D)elete VLAN,(B)ack,(H)elp : B
Choice (1-4) : 2
Choice (1-4) : 3
Choice (1-4) : 4
SNMP Integration
CounterACT hosts an SNMP service that provides the following SNMP support:
Standard MIBs over SNMPv1, SNMPv2c and SNMPv3
Trusted notifications using SNMPv3 with USM traps and INFORMs
SNMPv3 with:
Rich authentication (MD5 or SHA)
Encryption (AES or DES)
View of the MIB tree via industry standards
SNMP functionality is supported in IPv4, IPv6 and Dual-Stack CounterACT device
configurations.
CounterACT uses the Net-SNMP suite to support most SNMP functionality. More
information about Net-SNMP is available at http://www.net-snmp.org/.
This section describes how to configure the SNMP service on CounterACT devices,
including definition of external MIB users and trap targets, and enabling/disabling of
CounterACT-specific traps. Users who configure the SNMP service on CounterACT
devices should be familiar with SNMP and with the View Based Access Control Model
(VACM).
Console-based Configuration
Typically, you configure the service in the SNMP Settings pane of the CounterACT
Console. This pane provides a subset of the most useful settings supported by the
VACM model. For details about using the options of the SNMP Settings pane, see
Configure SNMP Service Settings.
File-based Configuration
To support use of configuration settings not supported by the SNMP Settings pane,
you can apply settings from an internal VACM configuration (.conf) file stored on
Appliances. You can copy a customized .conf file to Appliances, and apply it to the
SNMP service. For details about using the internal configuration file, see Working
with File-based SNMP Service Settings.
These two configurations are distinct: When Console-based settings are applied to
the SNMP service, settings of the internal .conf file are not active. Similarly, when
settings of the internal .conf file are applied to the SNMP service, settings of the
SNMP Settings pane are not active; modifications you make in the SNMP Settings
pane are saved, but are not applied to the running service.
The SNMP Settings configuration pane provides a subset of the most useful
settings supported by the VACM model. If you want to use configuration
settings not supported by the configuration user interface, see About SNMP
Service Settings and Working with File-based SNMP Service Settings.
To configure Views:
1. In the SNMP Settings pane of the Options tree, select the Views tab. The table
lists existing views.
View Name This value is not necessarily unique. Several views can have the
same name, each of them defining different access range of MIB
objects. When a view is applied to a user or group, all access
ranges with the same name are applied together.
3. In the User Name field, specify a unique name for this SNMP user.
4. In the Community field, specify the community strin confgig with which the
user communicates with CounterACT.
5. In the SNMP Settings area, select the version of the SNMP protocol that is
used to communicate with this user.
(Optional) When SNMP V3 is selected, Authentication and Privacy
encryption options are available. Specify encryption protocols and passwords.
6. In the Define Sources area, define the network addresses from which this
user can access the SNMP service. Do one of the following:
Select Add to add a source.
Select a source in the table and select Edit or Remove.
Each entry in the list can be a specific FQDN or IP address, or a subnet
declared using the IP/MASK or IP/BITS convention. For example:
10.10.10.0/255.255.255.0
2001:db8:abcd:3f02::/64
7. In the Apply Views area, select the views that filter access for this user. Do
one of the following:
Select Add to apply a view to the user.
Select an existing view in the table, and select Edit to modify it.
The Apply View dialog box appears.
Define how a view is applied using the following fields and options.
View Name The drop-down lists all view names currently defined in the
Views tab that have not yet been assigned to this user.
Read Only This setting determines permissions granted to the user for the
Read and Write MIB objects in this view:
Read Only user can only read the MIB objects in this view.
Read/Write user can read and write to the MIB objects in
this view.
To remove a view from a user, select it in the table and select Remove. The
view still appears in the Views tab, but no longer applies to this user.
Define a target using the following fields and options. Select OK to save
changes. To test trap reporting to this target, see Test Trap Targets.
IP Address The network address to which the traps are sent. This can be a
or FQDN specific FQDN or IP address.
Community The community string that is used to communicate with this target.
Trap Type The type of SNMP trap message that is sent to this user.
SNMP v3 TRAP messages are not available when you use Console-
based configuration. Use file-based configuration to send SNMP v3
TRAP messages.
The table lists all the CounterACT-specific traps supported by the SNMP
service on CounterACT devices. By default, all traps are enabled.
2. (Optional) Use the search field to show traps that match a substring of any
trap identifier fields, or a MIB subtree.
2. Select OK. Review imported settings in the tabs of the SNMP Settings pane.
Do one of the following:
Select Cancel to roll back the import. Previous settings of the SNMP Settings
pane are restored.
Select Apply to accept imported settings. The tabs of the SNMP Settings pane
reflect imported settings.
When the file-based configuration is applied to the service, use the command
line interface to start and stop the SNMP service on each device. See Start
and Stop the SNMP Service from the Command Line Interface.
You cannot edit or overwrite this file while the SNMP service is using it.
When the SNMP service is running with Console-based settings, you can
edit or overwrite this file without disrupting the service.
When the SNMP service is running with the settings of this file, the service
reads this instance of the file. You must stop the service before you work
with the file. See Start and Stop the SNMP Service from the Command
Line Interface.
3. Edit the file. It is recommended to create a backup of the file before editing.
4. Place the updated file under /etc/snmp/.
Do not rename the file or change the path. The file you want to control the
SNMP service must be at the pathname /etc/snmp/snmpd.conf.
Start and Stop the SNMP Service from the Command Line Interface
When file-based configuration using the internal .conf file is applied to the service,
use this procedure to start and stop the SNMP service on each device.
The ArcSight Plugin also provides SNMP MIB and Trap Notification information
about the interaction between CounterACT devices and their peer ArcSight
servers. Refer to the ArcSight Plugin documentation at
http://updates.forescout.com/support/files/plugins/arcsight/Updates.pdf.
ctDeviceTable
OID: .1.3.6.1.4.1.11789.4.3
This object contains a table of MIB object values for all CounterACT Appliances
managed by this Appliance.
For an Enterprise Manager (EM) this object contains a table of values for all
its managed Appliances. Each row contains the MIB values of a single
managed Appliance.
For a managed or standalone Appliance this table contains a single-row table
representing the MIB values of the Appliance.
ctDeviceId
OID:.1.3.6.1.4.1.11789.4.3.1.1
An internally-defined unique identifier for the CounterACT Appliance. The Enterprise
Manager assigns a unique Device ID to itself, and to each managed Appliance. The
Device ID provides a consistent reference to the Appliance as long as it is associated
with the Enterprise Manager.
ctDeviceIpAddress
OID:.1.3.6.1.4.1.11789.4.3.1.2
The IP address of this Appliance.
For an Enterprise Manager this is the IP address of the device.
For a managed Appliance this is the IP address of the Appliance as perceived
by the Enterprise Manager.
ctDeviceIpAddressType
OID:.1.3.6.1.4.1.11789.4.3.1.3
The type of IP address in the ctDeviceIpAddress object. Valid values are:
ipv4 (1) Indicates that an IPv4 address is used, as defined by the InetAddressIPv4
textual convention.
ipv6 (2) Indicates that an IPv6 address is used, as defined by the InetAddressIPv6
textual convention.
ctNumberOfManagedEndpoints
OID:.1.3.6.1.4.1.11789.4.3.1.12
The total number of endpoints currently managed by this Appliance. For an
Enterprise Manager, this object contains the total number of endpoints directly
managed by the Enterprise Manager.
ctDeviceCpuUtilization
OID:.1.3.6.1.4.1.11789.4.3.1.5
Percentage of the Appliance's allocated processor resources currently in use. This
value is an average taken across all processors.
ctDevicePacketLoss
OID:.1.3.6.1.4.1.11789.4.3.1.13
ctDeviceMemorySwaps
OID:.1.3.6.1.4.1.11789.4.3.1.6
Amount of memory swapped (kbytes) over the last minute. If this value exceeds the
recommended threshold, the system may work slowly. To resolve this issue, add
physical memory to the Appliance or replace the Appliance with a model that has
more physical memory.
ctDeviceConnectionStatus
OID:.1.3.6.1.4.1.11789.4.3.1.4
Indicates the network connectivity status. Possible states are:
connectionOK (1) Indicates that the Appliance is up and ready.
connectionFailed (2) Indicates the connection to the network failed. There may be a
network outage or the Appliance may be down.
connectionStatusUnknown (3) Indicates that the connection status cannot be verified
at this time (for example if the Appliance is down or unreachable).
ctDeviceEngineStatus
OID:.1.3.6.1.4.1.11789.4.3.1.11
Indicates the status of the Packet Engine service, which monitors network traffic and
discovers network endpoints. Possible states are:
ready (1) Indicates that the packet engine is up and ready.
initializing (2) Indicates that the packet engine is starting up and currently
initializing.
down (3) Indicates that the packet engine is currently down.
statusUnknown (4) Indicates that the packet engine status cannot currently be
verified. For example, the CounterACT Appliance may be down or unreachable.
ctDeviceCurrentBandwidth
OID:.1.3.6.1.4.1.11789.4.3.1.10
Bit-rate consumed by the Appliance communication resources expressed in kilobytes
per second; averaged over a sliding window (see CounterACT documentation for
more details). This value accounts for internal traffic between CounterACT Appliances
and traffic handled by the packet engine. If this value exceeds recommended
thresholds for each Appliance model, Appliance performance may be affected. To
resolve this issue, contact ForeScout support or sales representative.
ctDeviceHaStatus
OID:.1.3.6.1.4.1.11789.4.3.1.9
Indicates the status of the High Availability (HA) service, which monitors the status
of the active and the passive (standby) Appliances in a High Availability cluster.
Possible states are:
ok (1) Indicates that the standby CounterACT device is up, responsive and is in sync
with the active CounterACT device.
statusDegraded (2) Indicates that the standby CounterACT device is unreachable,
down, or currently out of sync with the active CounterACT device.
inMaintenanceMode(3) Indicates that the active or the standby CounterACT device is
currently undergoing maintenance operations such as setup or upgrade.
notSupported (4) Indicates that High Availability is not supported or configured on
this Appliance.
statusUnknown (5) Indicates that the High Availability status cannot be determined
because the Enterprise Manager cannot connect to the Appliance.
ctDeviceLicenseStatus
OID:.1.3.6.1.4.1.11789.4.3.1.8
Indicates the status of the licensing service. This service monitors the licensed
operating capacity of CounterACT relative to the number of managed endpoints,
used Appliance bandwidth, software modules and other license terms. Possible states
are:
valid (1) Indicates that the current license status is OK and usage is within the
licensed capacity.
violation (2) Indicates that there are one or more license violations, for example
services running with usage capacity exceeding the currently deployed licenses.
invalid (3) Indicates that the currently deployed license is expired or invalid.
statusUnknown (4) Indicates that the license status cannot be verified at this time
(for example the Appliance is down or unreachable).
ctDeviceNtpStatus
OID:.1.3.6.1.4.1.11789.4.3.1.7
Indicates the status of the network time synchronization service, which handles
synchronization with the associated NTP server. Possible states are:
syncOk (1) Indicates the Appliance is synchronized with the NTP server.
syncFailed (2) Indicates the Appliance failed to connect to the NTP server, or failed
to get a valid response from the NTP server.
notApplicable (3) Indicates that the NTP is not configured or that the NTP service is
down.
statusUnknown (4) Indicates that the Appliance is currently unreachable and that the
current status cannot be verified.
ctDeviceActionsOnHoldStatus
OID:.1.3.6.1.4.1.11789.4.3.1.14
Indicates the status of the pending actions queue. This object indicates if there are
policy-driven actions that were blocked because the number of pending actions
exceeded the queue size defined in the Console (Options>NAC>Action Thresholds).
Queue size and action thresholds can be defined per action and/or per Appliance.
Possible states are:
ok (1) Indicates that policy actions are within the administrator defined Action
thresholds, and that there are no policy driven actions in a blocked state.
blockedOnExceedingThreshold (2) Indicates that actions are blocked. One or more
policies have created a queue of actions that exceeds the administrator defined
threshold. The administrator can review and release blocked actions from the
Console (Options>NAC>Action Thresholds).
blockStatusUnknown (3) Indicates that the queue status cannot be verified (for
example if the CounterACT Appliance is down or unreachable).
ctDeviceChannelStatus
OID:.1.3.6.1.4.1.11789.4.3.1.15
Indicates the status of the network interfaces used by the Appliance to mirror
monitored traffic and insert management input. A channel is defined as a pair of
monitor and response interfaces. Possible states are:
ok (1) Indicates that the Appliance is currently monitoring network traffic.
warning (2) Indicates a significant change in traffic on the channels monitoring
interface. The volume of mirrored traffic may have dropped significantly, indicating
that not all traffic is being monitored. A trap with this severity may report a transient
effect. If the Appliance does not recover channel function within a minute or two,
troubleshooting intervention is typically necessary. Significant, persistent missed
traffic prevents CounterACT from reliably implementing detection, prevention, and
remediation actions and may require reconfiguration of the Appliances channels.
error (3) Indicates that the Appliances internal test of the channels response
interface repeatedly fails, and/or traffic on the monitoring interface may be
asymmetric. The Appliance cannot reliably track communications or insert response
traffic. This effectively prevents the Appliance from implementing detection,
prevention, and remediation actions.
unknown (4) Indicates that the status of channel interfaces cannot be verified at this
time (for example if the CounterACT Appliance is down or unreachable).
notApplicable (5) Indicates that channels are not configured or administratively
disabled.
The ArcSight Plugin also provides SNMP MIB and Trap Notification information
about the interaction between CounterACT devices and their peer ArcSight
servers. Refer to the ArcSight Plugin documentation.
CounterACT Appliance trap notifications can contain the following MIB objects:
ctConfigurationChangedTrap
OID:.1.3.6.1.4.1.11789.0.14
Indicates a configuration change on the Appliance. In addition to the common trap
notification varbinds, this trap provides the following additional varbinds to identify
the configuration change:
fsFieldOid
OID:.1.3.6.1.4.1.11789.3.24
The OID of the changed object. For example, if the CounterACT operator changed
the ArcSight server name, this varbind contains the OID of the arcSightServerName
object.
fsOldValue
OID:.1.3.6.1.4.1.11789.3.25
The value of the MIB attribute before the configuration change.
fsNewValue
OID:.1.3.6.1.4.1.11789.3.26
The updated value of the MIB attribute after the configuration change.
ctDeviceAddedTrapNotification
OID:.1.3.6.1.4.1.11789.0.15
Indicates that a CounterACT Appliance was added to CounterACT Enterprise Manager
(EM).
ctDeviceRemovedTrapNotification
OID:.1.3.6.1.4.1.11789.0.16
Indicates that a CounterACT Appliance was removed from CounterACT Enterprise
Manager (EM).
ctDeviceTrapEndpointCapacityExceeded
OID:.1.3.6.1.4.1.11789.0.25
This trap notification is sent when the ctNumberOfManagedEndpoints MIB attribute
crosses the upper bound of the Number of Hosts threshold. Trap severity is
warning(6).
This alarm trap is cleared by the ctDeviceTrapEndpointCapacityNormal trap
notification.
To set performance thresholds, see Performance Thresholds for SNMP Notifications.
ctDeviceTrapEndpointCapacityNormal
OID:.1.3.6.1.4.1.11789.0.26
This trap notification is sent when the ctNumberOfManagedEndpoints MIB attribute
crosses the lower bound of the Number of Hosts threshold. Trap severity is clear(1).
This trap notification is only sent after a ctDeviceTrapEndpointCapacityExceeded
alarm trap was sent.
To set performance thresholds, see Performance Thresholds for SNMP Notifications.
ctDeviceTrapHighCPUUtilization
OID:.1.3.6.1.4.1.11789.0.19
This trap notification is sent when the ctDeviceCpuUtilization MIB attribute crosses
the upper bound of the CPU Usage threshold. Trap severity is warning(6).
This alarm trap is cleared by the ctDeviceTrapNormalCPUUtilization trap
notification.
ctDeviceTrapNormalCPUUtilization
OID:.1.3.6.1.4.1.11789.0.20
This trap notification is sent when the ctDeviceCpuUtilization MIB attribute crosses
the lower bound of the CPU Usage threshold. Trap severity is clear(1).
This trap notification is only sent after a ctDeviceTrapHighCPUUtilization alarm
trap was sent.
To set performance thresholds, see Performance Thresholds for SNMP Notifications.
ctDeviceTrapHighPacketLoss
OID:.1.3.6.1.4.1.11789.0.28
This trap notification is sent when the ctDevicePacketLoss MIB attribute crosses the
upper bound of the Packet Loss threshold. Trap severity is warning(6).
This alarm trap is cleared by the ctDeviceTrapNormalPacketLoss trap notification.
To set performance thresholds, see Performance Thresholds for SNMP Notifications.
ctDeviceTrapNormalPacketLoss
OID:.1.3.6.1.4.1.11789.0.29
This trap notification is sent when the ctDevicePacketLoss MIB attribute crosses the
lower bound of the Packet Loss threshold. Trap severity is clear(1).
This trap notification is only sent after a ctDeviceTrapHighPacketLoss alarm trap
was sent.
To set performance thresholds, see Performance Thresholds for SNMP Notifications.
ctDeviceTrapHighMemorySwapping
OID:.1.3.6.1.4.1.11789.0.23
This trap notification is sent when the ctDeviceMemorySwaps MIB attribute crosses
the upper bound of the MemorySwaps threshold. Trap severity is warning(6).
ctDeviceTrapNormalMemorySwapping
OID:.1.3.6.1.4.1.11789.0.24
This trap notification is sent when the ctDeviceMemorySwaps MIB attribute crosses
the lower bound of the MemorySwaps threshold. Trap severity is clear(1).
This trap notification is only sent after a ctDeviceTrapHighMemorySwapping alarm
trap was sent.
To set performance thresholds, see Performance Thresholds for SNMP Notifications.
ctDeviceConnectionStatusChangedTrap
OID:.1.3.6.1.4.1.11789.0.33
Indicates a change in the ctDeviceConnectionStatus MIB attribute. The severity of
this alarm trap reflects the current value of the MIB attribute, as shown in the
following table.
Value of Severity of
ctDeviceConnectionStatus ctDeviceConnectionStatusChangedTrap
connectionOK (1) cleared(1)
connectionFailed (2) critical (3)
connectionStatusUnknown (3) indeterminate(2)
ctDevicePacketEngineStatusChangedTrap
OID:.1.3.6.1.4.1.11789.0.33
Indicates a change in the ctDeviceEngineStatus MIB attribute. The severity of this
alarm trap reflects the current value of the MIB attribute, as shown in the following
table.
ctDeviceHighBandwidthUtilizationTrap
OID:.1.3.6.1.4.1.11789.0.21
This trap notification is sent when the ctDeviceCurrentBandwidth MIB attribute
crosses the upper bound of the Bandwidth threshold. Trap severity is warning(6).
This alarm trap is cleared by the ctDeviceNormalBandwidthUtilizationTrap trap
notification.
ctDeviceNormalBandwidthUtilizationTrap
OID:.1.3.6.1.4.1.11789.0.22
This trap notification is sent when the ctDeviceCurrentBandwidth MIB attribute
crosses the lower bound of the Bandwidth threshold. Trap severity is clear(1).
This trap notification is only sent after a ctDeviceHighBandwidthUtilizationTrap
alarm trap was sent.
To set performance thresholds, see Performance Thresholds for SNMP Notifications.
ctDeviceHaStatusChangedTrap
OID:.1.3.6.1.4.1.11789.0.30
Indicates a change in the ctDeviceHaStatus MIB attribute. The severity of this alarm
trap reflects the current value of the MIB attribute, as shown in the following table.
ctDeviceLicenseStatusChangedTrap
OID:.1.3.6.1.4.1.11789.0.17
Indicates a change in the ctDeviceLicenseStatus MIB attribute. The severity of this
alarm trap reflects the current value of the MIB attribute, as shown in the following
table.
ctDeviceNTPStatusChangedTrap
OID:.1.3.6.1.4.1.11789.0.18
Indicates a change in the ctDeviceNtpStatus MIB attribute. The severity of this
alarm trap reflects the current value of the MIB attribute, as shown in the following
table.
ctDeviceActionOnHoldStatusChanged
OID:.1.3.6.1.4.1.11789.0.32
Indicates a change in the ctDeviceActionsOnHoldStatus MIB attribute. The severity
of this alarm trap reflects the current value of the MIB attribute, as shown in the
following table.
Value of Severity of
ctDeviceActionsOnHoldStatus ctDeviceActionOnHoldStatusChanged
actionsOk (1) cleared(1)
actionsBlockedOnExceedingTreshold (2) major(4)
actionsBlockStatusUnknown (3) indeterminate(2)
ctDeviceChannelStatusChangedTrap
OID:.1.3.6.1.4.1.11789.0.31
Indicates a change in the ctDeviceChannelStatus MIB attribute. The severity of this
alarm trap reflects the current value of the MIB attribute, as shown in the following
table.
where:
.1.3.6.1.4.1.11789.3.21 is the OID of varbind fsTrapSeverity
1 is the severity value assigned to this OID. For the
ctDeviceChannelStatusChangedTrap trap notification, a varbind severity value of 1
indicates that traps severity is now cleared, given that the channel status has
changed to channelsOk
The following varbind objects are common to all CounterACT trap notifications:
ctDeviceId
OID:.1.3.6.1.4.1.11789.4.3.1.1
An internally-defined unique identifier for the CounterACT Appliance. The Enterprise
Manager assigns a unique Device ID to itself, and to each managed Appliance. The
Device ID provides a consistent reference to the Appliance as long as it is associated
with the Enterprise Manager.
ctDeviceIpAddress
OID:.1.3.6.1.4.1.11789.4.3.1.2
The IP address of the Appliance or Enterprise Manager that issued the SNMP trap
notification.
ctDeviceIpAddressType
OID:.1.3.6.1.4.1.11789.4.3.1.3
The type of IP address in the ctDeviceIpAddress varbind object. Valid values are:
ipv4 (1) Indicates an IPv4 address as defined by the InetAddressIPv4 textual
convention.
ipv6 (2) Indicates an IPv6 address as defined by the InetAddressIPv6 textual
convention.
fsTrapSeverity
OID:.1.3.6.1.4.1.11789.3.21
The severity assigned to the trap notification. The following are the possible severity
levels:
Cleared (assigned value = 1): Indicates that this trap notification clears one or more
previously reported alarm traps. This trap clears all alarms for this managed object
that have the same Alarm type.
Indeterminate (assigned value = 2): Indicates that the severity level cannot be
determined.
Critical (assigned value = 3): Indicates that a service-affecting condition has
occurred and immediate corrective action is required. This severity is reported when
a managed object goes completely out of service and its function must be restored.
Major (assigned value = 4): Indicates that a service-affecting condition has
developed and urgent corrective action is required. This severity is reported when
there is a severe degradation in the capability of the managed object and its full
capability must be restored.
Minor (assigned value = 5): Indicates a fault condition that does not affect service.
Corrective action should be taken to prevent a more serious fault that may affect
service. This severity is assigned to a detected alarm condition that is not currently
degrading the capacity of the managed object.
Warning (assigned value = 6): Indicates the detection of a potential or impending
service-affecting fault, before any significant effects have been felt. Action should be
taken to further diagnose (if necessary) and correct the problem before it affects
service.
Informational (assigned value = 7): Provided for informational purposes only.
With the exception of the Informational severity, all the other severity levels are
defined in the CCITT standard X.733.
fsTrapTime
OID:.1.3.6.1.4.1.11789.3.21
Date and time that the event occurred in the Appliance, provided in the format of the
DateAndTime field, as specified in the SNMPv2-Textual Conventions standard.
fsTrapId
OID:.1.3.6.1.4.1.11789.3.21
A unique identifier for each issued trap notification. The ID is an integer based on a
counter which increments monotonically until a maximum value is reached, and then
begins again from zero.
Based on a corporate network configuration (UDP), it is possible that the trap
receiver may receive multiple copies of the same trap notification. In such a case,
the Trap ID and Trap Time can be used to identify duplicate trap notifications.