XCS v91 Studentguide Basics
XCS v91 Studentguide Basics
Content Control
• Attachment Control
• Objectionable Content Filter
• Content Scanning
• Dictionaries & Lists
• Pattern Filters
Directory Services (LDAP)
Policies
Monitoring
• Dashboard
• Reports
• Message History
• Logs
XCS Basics: Contents
Administration
• Backup & Restore
• Software Updates
• Security Connection
• Tiered admin accounts
Available Resources
• Additional resources for WatchGuard XCS support and documentation
WatchGuard XCS Overview
XCS: Extensible Content Security
There are many threats to your network security, but two primary
delivery methods: Email and Web
The XCS platform stops threats before they reach your network and
controls outbound content for complete email and web security
XCS Feature Matrix
Model Company Email Security Web Security Other
size Subscription Subscriptions
XCS 170 500 users X LiveSecurity® Standard
XCS 370 1000 users X LiveSecurity® Standard
XCS 570 1000 users X LiveSecurity® Plus
(24/7 support)
XCS 770 4000 users X X LiveSecurity® Plus
Mid-enterprise (24/7 support)
XCS 970 7000 users X X LiveSecurity® Plus
Large (24/7 support)
Enterprise
XCS 1170 10,000+ X X LiveSecurity® Plus
Fortune 500, (24/7 support)
ISPs
Includes: Adds: Additional Options:
• Email Security includes: • Web Scanning • McAfee Anti-Virus
• Intercept Anti-Spam • OCF for Web • Email Encryption
• Kaspersky® Anti-Virus • URL Filtering • Brightmail Anti-Spam
• Reputation Authority™ • Web Reputation
• Outbreak Control • Uncategorized Web
• Attachment Control Filtering
• Objectionable Content Filter (OCF) • Web Caching
• Content Scanning • Application Web Usage
• Content Rules • Web Application Control
• Document Fingerprinting • Streaming Media Control
• Queue Replication • Web Traffic Management
• Clustering and Clustering
• Centralized Management
WatchGuard XCS Features
Virus Scanning
• KasperskyTM Anti-Virus
• McAfeeTM
Outbreak Control
• Catch zero-day viruses
Malformed Message Protection
• Protect downstream servers
WatchGuard XCS Features
Intercept Anti-Spam
• Spam Words
• Mail Anomalies
• DNS Block List
• URL Block List
• ReputationAuthorityTM
• Token Analysis
• Sender Policy Framework (SPF)
• DomainKeysTMAuthentication
• Backscatter Detection
Symantec Brightmail Anti-Spam option
WatchGuard XCS Features
Threat Prevention
• Real-time threat detection and response
Trusted and Blocked Senders List
• Allows end-user whitelisting/blacklisting
User Spam Quarantine
• Allows end-user spam management
• Quarantine Management Server (QMS) provides quarantine services on a
separate appliance
Secure WebMail Proxy
• Secures 3rd party webmail servers such as Outlook Web Access TM and Lotus
iNotesTM
WatchGuard XCS Features
Secure Authentication
• RADIUS
• LDAP
• RSA SecurIDTM
• SafeWordTM and CRYPTOCardTM tokens
Integrated and External Message Encryption
• On-box encryption with Cisco Registered Envelope Service (PostX)
• Integrate with existing third-party encryption infrastructure
Mail Delivery Encryption (TLS)
Policy Control
• Granular control to enforce company rules
• Apply policies to different users, IP addresses, groups, and domains.
WatchGuard XCS Features
Reporting
• Anti-Spam statistics
• Content Control and compliance statistics
• Mail traffic statistics
• Domain-level granularity
• Hosted domain reports
Dashboard
• Summary of current messaging activity
• Recent mail and web activity
• Message traffic flow status
• Message security and content control statistics
WatchGuard XCS Features
Web Proxy
• Web Proxy proxies web traffic and controls access to external web sites
• Scans web traffic and file transfers using the system’s security and content
scanners
• URL filtering and blocking technology
• Web reputation services with ReputationAuthority
• Web access policies can be applied to different users, IP addresses groups,
and domains
• Traffic Accelerator to preserve bandwidth and efficiently use web resources
Email Basics
Objectives – Email Basics
• Routers
Route network packets between networks
• Firewalls
Protect the internal network
Prevent unauthorized access to internal network
Prevent unauthorized access to the external network
Anatomy of a Mail Transport System
port 25
Forward port 25 traffic to
Sending SMTP Server To: [email protected] internal mail server
Lookup MX record for example.com
Router/gateway Firewall
Internet
Internal DNS server
50.50.50.25
Sending
• The basic protocol used to send email is SMTP
• SMTP uses a TCP-based connection on port 25
Retrieving
• Two protocols are typically used by mail clients to retrieve email
• POP uses a TCP-based connection on port 110
Used to retrieve messages from a shared message store for offline
processing
• IMAP uses a TCP-based connection port 143
Used to access messages on a shared message store
SMTP Basics
Sending Receiving
SMTP server SMTP server
Connect to mail.anothercompany.com Connection received from mail.abc.com
>>> EHLO abc.com
>>> 220 mail.anothercompany.com ESMTP
Send 250 OK
EHLO abc.com >>> MAIL FROM:<[email protected]>
>>> 250 mail.anothercompany.com EHLO mail.abc.com Send 250 OK
MAIL FROM:<[email protected]> >>> RCPT TO:<[email protected]>
Send 250 OK
>>> 250 Sender OK
>>> DATA
RCPT TO:<[email protected]> Send 354 OK
>>> 250 Recipient OK >>> Subject: Hello John
DATA
>>> To: Bob
>>> 354 OK
>>> From: Bill Gates
Subject: Hello Bob
>>> Hi Bob,
To: Bob
>>> How was your vacation?
From: Bill Gates >>>.
Hi Bob, Send 250 Ok
How was your vacation? >>> Quit
. Send 221 Bye
>>> 250 Data received OK Close connection
Quit
>>> 221 Bye
Anatomy of an Email Message
Envelope
• Never seen by the user
• Used internally by the MTA to route the message
• Contains the sender and recipient address
Headers
• KEY:VALUE pairs that conform to RFC 822
• Each header is transmitted as a single line of text
• Some are mandatory
Date, From, To
• Optional headers include
Subject, Cc, Reply-To, Received, Message-ID
Header beginning with “X-” are for custom usage
Anatomy of an Email Message
Message body
• Actual content of the email message
• Separated from the headers by a single blank line
• All data transmitted as string of plain text characters
• Any binary message content is encoded as ASCII text.
To transmit binary data (such as most message attachments)over
SMTP, it must be encoded as a series of ASCII-printable characters.
There are several encoding methods, such as MIME, Base64, and
BinxHex, to encode binary data as ASCII characters.
Anatomy of an Email Message
HELO mail.watchguard.com
MAIL FROM: [email protected]
RCPT TO: [email protected]
envelope
DATA
Sending Receiving
SMTP server SMTP server
telnet mailserver.abc.com 25
With the SMTP commands you just learned, you can send yourself a test
message
Installation
Objectives – Installation and Configuration
• Click Continue.
• From the drop-down list, select the WatchGuard XCS device.
• Click Activate.
• Copy the full feature key to a text file and save it on your computer.
Pre-Installation Considerations
Deployment topology
• DMZ
• Parallel to firewall
• Behind firewall
DNS changes
• MX, A, and PTR records
Firewall changes
• For the WatchGuard XCS to process messages effectively when located
behind a network firewall, various networking ports and/or NAT rules must
be configured on the network firewall to ensure connectivity
Outbound mail routing
• While DNS entries are required to route inbound messages through the
WatchGuard XCS, changes are required to the existing internal mail
servers to route outbound messages through the WatchGuard XCS
DMZ Deployment
DNS changes
• An MX (mail exchanger) record should be added to your DNS
configuration to forward incoming messages to the WatchGuard
XCS:
example.com. IN MX 0 hostname.example.com
Setup Wizard
• Regional settings
• Administrator password
• Customer info
• Feature Key
• Mail and scanning settings
• Start mail processing
Mail routing
Establish trusts for internal mail servers
Configure internal mail servers to route outbound mail through
the XCS
Connect the WatchGuard XCS Web UI
Click Update to manually add a feature key. Paste your feature key
into the text box and click Apply.
Click Get Feature Key to automatically download and apply your
feature key from the WatchGuard LiveSecurity service. This option
requires an Internet connection and an existing LiveSecurity account.
Click Enter Feature Key Later to manually add the feature key after
installation.
WARNING: If you do not enter a valid feature key in this step, the
Mail Configuration and Start Processing steps of the wizard
are not displayed.
Installation – Feature Key
Click Update to manually add a feature key. Paste your feature key
into the text box and click Apply.
Click Get Feature Key to automatically download and apply your
feature key from the WatchGuard LiveSecurity service. This option
requires an Internet connection and an existing LiveSecurity account.
Click Enter Feature Key Later to manually add the feature key after
installation.
WARNING: If you do not enter a valid feature key in this step, the
Mail Configuration and Start Processing steps of the wizard
are not displayed.
Installation – Mail Configuration
Mail Configuration :
• The email domain you are processing mail for
• Your internal mail server (for example, an Exchange server)
• Initial settings for Intercept Anti-Spam, Anti-Virus, and Attachment Control
WatchGuard Training 50
Installation – Start Mail Processing
51 WatchGuard Training
Web Setup Wizard
52 WatchGuard Training
Mail and Network Settings
Network Configuration
Select Activity > Status > Status & Utility to stop and
start mail processing.
You can also stop/start only inbound or outbound mail.
Threat Prevention
Threat Prevention: How it Works
Junk Senders
• stats1h.bad_mail > 20 && stats1h.perc_ham_to_spam < 25 &&
stats5m.messages > 10 && (!is_internal && !is_mynetworks)
Internal DoS
• open_connections > 50 && is_internal
External DoS
• open_connections > 20 && !is_internal
Excessive Senders
• !is_peers && !is_internal && stats1h.messages > 50000
Threat Prevention: Configuration
When you enable Threat Prevention, the default rules are enabled
Anti-Virus
Anti-Virus: Configuration
Spyware Scanning: Configuration
Many viruses and denial of service attacks (DoS) try to elude virus
scanners by concealing themselves in malformed messages.
The scan engines cannot detect the attachment and therefore pass the
complete message through to an internal server.
• Some mail clients try to rebuild malformed messages and may rebuild or
activate a virus-infected attachment.
• Other types of malformed messages are designed to attack mail servers
directly. Most often these types of messages are used in denial-of-service
(DoS) attacks.
The system analyzes each message with extensive integrity checks.
Malformed messages are quarantined if they cannot be processed.
Malformed Mail
Make sure Share Statistics, Use Domain and Sender Behavior, and
Reject on Reputation are enabled and you have selected an
appropriate Rejection Threshold (Blue)
ReputationAuthority also allows you to reject on infected IP addresses,
as well as dial-up connections. These are safe to enable (Red)
Intercept Anti-Spam
Intercept Anti-Spam Features
Spam Words
• Filters messages based on a dictionary of typical spam words and phrases
that are matched against the message.
Mail Anomalies
• Checks the incoming message for issues such as unauthorized SMTP
pipelining, missing headers, and mismatched identification fields.
DNS Block List (DNSBL)
• Checks the message source against domain-based lists of hosts that have a
poor reputation. Messages can also be rejected immediately, before other
Anti-Spam processing, if the client is on a DNSBL.
URL Block List
• Examines any URLs in the body of a message to see if they appear on a URL
block list. URL Block Lists contain a list of domains and IP addresses of URLs
that have appeared previously in spam messages.
ReputationAuthority
• Reports a collection of metrics about the sender of a mail message, including
their overall reputation, whether the sender is a dial-up, and whether the
sender appears to be virus-infected.
Intercept Anti-Spam Features
Token Analysis
• Detects spam based on advanced content analysis of the message against
databases of words and phrases from known spam and valid mail.
Backscatter Detection
• Detects spam based on signature verification of the Envelope Sender and
prevents spam bounce emails to forged sender addresses.
Sender Policy Framework (SPF)
• Checks the sending host’s SPF DNS records to identify and validate the
source of a message to determine whether a message was spoofed.
DomainKeys Authentication
• Checks the sending host’s DomainKeys DNS records to identify and validate
the source of a message to determine whether a message was spoofed.
Brightmail
• You can utilize the Symantec Brightmail Anti-Spam™ engine as a cost-option.
• Brightmail integrates into the overall Intercept spam score, or you can run
Brightmail independently.
Trusted and Untrusted Networks
Trusted mail
• Allows XCS to be used as a mail relay
• Bypasses Anti-Spam controls
• Used to update Token Analysis tables with trained legitimate mail
Untrusted mail
• Cannot relay mail through XCS
• Mail is processed by Anti-Spam controls
Trusted and Untrusted Mail Sources
B
IP : 203.54.97.133 untrusted
Public interface
Mask: 255.255.255.0
IP : 203.54.95.134
Mask: 255.255.255.0
IP : 10.10.0.1
Private interface
Mask: 255.255.255.0
IP : 10.10.0.2 A
Mask: 255.255.255.0 trusted
Anti-Spam: How it Works
Anti-Spam: Configuration
Anti-Spam: How it Works – Decision Strategies
Objective Components
• DNS Block List
• URL Block List
• Mail Anomalies
• ReputationAuthority Dial-up
• Backscatter Detection
• SPF
• DomainKeys
Subjective Components
• Spam Words
• Token Analysis
• ReputationAuthority
Anti-Spam: Configuration – Decision Strategy
Used to redirect spam into a local storage area for each individual user
Allows users to manage their own quarantined spam
• Release messages to their inbox
• View messages
• Delete messages
To get access to spam quarantine, local accounts must exist for each
user
• Can be created manually or via LDAP Mirrored Users import
Configure User Spam Quarantine
Parent object
A Directory is
composed of Child object
Entries (objects).
uid=jsmith
givenName= Joe
lastName=smith
Click Test
If the results you expected are displayed, the query was successful
Directory Users
Note: Both mail and sAMAccountName are required for a successful import
Configuring Directory Users
Click Test
• For LDAP Query the default can be used:
(|(objectCategory=group)(objectCategory=person))
• If the results you expected are displayed, the query was successful
Importing Users & Groups
Check Activity > Logs > System to make sure the import was
successful.
Automating Imports
Select Configuration > LDAP > Directory Users
Click Import Settings
Define LDAP server via Configuration > LDAP > Directory Servers
Configure LDAP Authentication via Administration > Accounts >
Remote Authentication
Enable WebMail via Configuration > Network > Interfaces
Configure LDAP Authentication with WebMail Client
Users need Local mail option selected in Configuration > WebMail > WebMail
Use a query that will return your users, and the attribute for email
• (&(objectCategory=*)(|(proxyAddresses=SMTP:%s)(mail=%s)))
Directory Users vs LDAP Recipients
*Note: if both are enabled with Reject on Unknown Recipient then the local and
mirrored Directory Users first and then query the LDAP server.
LDAP Groups
Attachment Control
Objectionable Content Filter
Content Scanning
Dictionaries and Lists
Pattern Filters
Content Rules
Attachment Control
Secure Content: Attachment Controls : How it Works
Define files that should or should NOT enter or leave the organization
Sending host transmits End of Body (Email) or Request Header (Web)
Validates Extension/Fingerprint/MIME/Content Type
Provides the following capabilities:
• Detects attachments in outbound and inbound traffic
• Extracts contents of archive files (such as zip, tar, rar) from up to 24 levels of
compression
• Detects web content types
• Determines the size of the attachments
Attachment Control decides if attachment should be blocked or passed
Secure Content: Attachment Control: Configure
Can examine over 400 types of files and extract text within them
Often referred to as Deep Content Scanning because it extracts text
beyond the basic email parts (such as subject and body) and plain Web
text
Provides the capability for extracted text to be analyzed using tools such
as:
• Dictionaries
Strict Word Match
Combination Word Match
• Pattern Filters
Secure Content: Content Scanning - Configure
Use a text editor to create a weighted dictionary and save the file. (Use
negative weights to make certain words more neutral, such as health-50)
For example, the file is named patient.txt:
match, weight
patient, 25
diagnosis, 25
patient number, 35
social security, 35
SSN, 50
SIN, 50
Secure Content: Dictionaries and Lists - Configure
Use Pattern Filters to control email processing. Pattern Filters can match
text in any part of the message
• Supports exact, partial, and pattern matching
Patterns can be specified with the POSIX.2 Regular Expression syntax
Rules can be written to match any part of the email message (such as
envelope, header, recipients, body and attachments)
In addition to Content Control, Pattern Filters are used for:
• Trusting (Whitelist) and Blocking (Blacklist) Senders using the HELO,
Envelope-TO, Envelope-From and Client IP message parts
• Routing email messages
Secure Content: Pattern Filters - How it Works
To enable Pattern Filters, select Security > Content Control > Pattern
Filters
Select Security > Content Control > Content Rules
Select the Create New Rule link to create a new Content Rule, or select
an existing rule to modify its settings
Secure Content: Content Rules: Configuration
Policies
• Policy controls allow specific messaging security features to be customized
and applied to different domains, user groups, IP addresses/networks, or
individual users
Ability to Analyze
• Who, what, where, how…
• The features that can be used with policy controls:
Threat Management
Secure Content
Anti-Spam options
Email features
Web scanning
Secure Content: Policies - How it Works
Hierarchical Order:
1. User policy ([email protected])
2. IP address policy
3. Group policy (sales, support, accounting)
Precedence for Group Policies is determined by the order in
which the groups appear in the list
4. Domain policy (example.com)
5. Default policy (for users with no user, group, or domain policies
defined)
6. Global Settings
Secure Content: Policies - How it Works
Time policies:
If time policies are configured, a policy with a specific effective time
frame takes precedence over a policy with an effective time period of
“Always”.
For example,
If a domain has these two domain policies applied to it:
Policy 1 has an effective time frame of Always
Policy 2 has an effective time frame of Monday to Friday 9am to
5pm
The final result is that Policy 2 takes effect if the current time is
within the effective time period.
Secure Content: Policies - How it Works
Using Policies
• Feature must be enabled globally
• Default Policy is used for global exceptions and to enable web notifications
• Create new policies to control behavior
• Assign policies to users, IP addresses, groups, and domains
Typical Uses
• Exceptions to general processing, such as.exe’s
• Different needs for different people, such as forensics
• In a hosting environment, you can offer some features (such as Anti-Virus) to
some domains and not the others
• Time and IP restrictions for web usage
Secure Content: Policies - Configure
To create a Policy
• Select Security > Policies > Policies
• Click the Create New Policy link
• Name the Policy (such as Encryption Policy)
• Select Enable This Policy
• Optionally, enter a Description
• Click Finished
• The Policy is now created and appears on the Policies page
Secure Content: Policies - Configure
The XCS
automatically
adds a
hidden /32 for
single host
addresses
Report Generation
• Derived from various system logs, then stored in the database
• One-time report or can be scheduled
Report Viewing
• PDF, HTML, or CSV format
• Via the admin web interface
• Emailed to specific users
Reports based on:
• Data aggregated for all domains
• Include per domain tables
• Separated reports one for each host domain
Reporting: Configuration
If a simple search does not satisfy the search criteria, you can use
advanced search to narrow your down search
Message History
Advanced Search allow you to specify dates and times to narrow the
database search to that timeframe
Search History
Backup is saved to the local hard drive of system running the Web UI
Local Disk Backup
Choose the specific contents you want to restore from the backup
file
Restore
To make sure your system software is up to date with the latest patches
and upgrades, you must install any updates released for your version of
software.
Staying current with the latest patches and upgrades is essential to:
• Maintain security
• Respond quickly to new attacks
If a system fails after it receives an email but before it delivers it, the
message may be lost forever
System - A System - B
failover connection
Note: Processing mail in the mirror queue for the failed XCS must be manually initiated by the administrator
Queue Replication: Configuration
Use hostname for cluster member and IP address for non-cluster systems
Available Resources
Available Resources
Product Documentation
• You can view and download the most current documentation for the
WatchGuard XCS on the WatchGuard Product Documentation page:
http://www.watchguard.com/help/documentation
Training Resources
• Training presentations and additional training resources are available
on the WatchGuard Product training page:
http://www.watchguard.com/training/courses.asp
Knowledge Base
• You can view and search the knowledge base for information on
specific WatchGuard product issues at:
http://watchguard.custhelp.com