I'm in fine tuning mode now, try to make Squert results less noisy and hence more meaningful. I'm seeing a lot of "ET POLICY DNS Update From External net" events, always between endpoints and DNS servers on our internal network.
I currently have EXTERNAL_NET set to any. I've read some articles about changing this to !$HOME_NET, but I'm concerned about missing lateral scans/attacks.
What is the best practice?
- Suppress the event where destination is any of my DNS servers?
- Set EXTERNAL_NET to !$HOME_NET?
- Any other suggestions?
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
Steven,
The default value is any. So you really didn’t effect anything. By saying EXTERNAL_NET= !#HOME_NET , whatever you define under the home_net variable is trusted. For instance, I have multiple interfaces off my firewall, but they are still trusted any interfaces. If it connects to another firewall via the WAN port, which is usually untrusted, then it is a false positive. Once I changed my variable, It drastically reduced my false positives. Point being, whatever is not your HOME or Private network, i.e. coming from the Internet is untrusted, which you have effectively achieved by saying this. You can also threshold as you said, but it is worth investigating the alert because for example, anytime I update my iphone or MAC, I get an alert because it Is downloading an update file which sets of Security Onion. It is not malicious, and it will happen quite often. So, you can threshold or disable the rule. Depends on what is normal baseline traffic in your environment. Thanks for sharing a well thought out response.
As far as internal traffic goes, you will catch internal traffic if you have enough sensors to capture it. This is a strategic process, and it takes yo understanding how layer 2 and layer 3 works, and how traffic is routed through the network. A lot of the time, you have to place your sensors where you will get the best bang for your buck. If you are fortunate to have the budget to acquire multiple sensors than it may not be an issue, if you are not as fortunate, then it will take strategic placement and utilizing other tools in tandem such as endpoint protection where you will have to correlate data and perform analysis.
He didn’t say how many sensors he had, maybe if he discloses that, there is input that can be provided, but without a network map that defines the gateways and how traffic is routed, it will be difficult to advise.
Brian
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.