Twin Cities Security User Group

 View Only

Metrics using data from SEPM (Part2) 

Aug 29, 2009 12:47 AM

This article is in response to Andy Chow’s request for correlating data from the SEPM Risk Report on figuring out where the threat came from. This will not pickup every source accurately but will give you some great “extra data” to work with and provide to management. It worked for me getting a remote web filtering client installed on our remote workforce…. We’ll should be beginning to see the payoff if the remote filtering software is blocking access to malicious websites in the next couple of months.

Here is how I do some cheap correlation.  Let’s go back to the original article (https://www-secure.symantec.com/connect/articles/metrics-using-data-sepm) and get our csv risk report imported into Excel. We can stop at the point just before we open a pivot table (or you can use the pivot table to get the information).
 
Now looking at our excel spreadsheet containing all of this information we can see the following columns.
 
Events
Computer name
Source
Risk Name
Occurances
File Path
Description
Actual Action
Requested Action
Secondary Action
Event Date
Event Insert Time
Domain
User Name
Server
Client Group
Source Computer Name
Source Computer IP
Event End Date
Timestamp
Deleted
 
There is a wealth of information in here. Let’s look specifically at the File Path column. We can see if a file was detected in our Temp folder, under our profile, on different drive letter and what type of file it was (exe, tmp, htm, …) Lots to work with here folks.
 
Now let’s perform an AutoFilter (look under Data) in Excel, on the first row of items. Now each of these rows contains enough information that we can make some logical assumptions as to where the threat originated. Look at the below image (click to enlarge). Each item highlighted in red can be filtered on (somewhat).
 
imagebrowser image
 
 
So let’s use that little drop down button on the File Path column. Select custom and you should see the image below (click to enlarge).
 
imagebrowser image
 
Now we can further filter our data in the File Path column. If you use the drop down on the Custom AutoFilter you’ll see there are a lot of options. Below is the list found in Excel.
 
Equals
Does not equal
Is greater than
Is greater than or equal to
Is less than
Is less than or equal to
Begins with
Does not begin with
Ends with
Does not end with
Contains
Does not contain
 
For example let’s select “Begins with” and enter “?:” (not the quotes) in the field immediately to the right. Now keep the radio button on “And” and drop down the selection below to read “Does not begin with” and enter “C:” (again not the quotes). Click ok. You have just generated a list of malware detections on either network or removable drives. 
 
Here is how I slice and dice most of my risk report and what it means to me.
 
Malware detections from removable media
Begins with
?:
And
 
Does not begin with
C:
 
 
Malware from drive by downloads
Contains
Temporary Internet Files
 
 
Malware threats targeting popular Adobe products
Ends with
.pdf
Or
 
Ends with
.swf
 
 
Executable downloaded malware
Ends with
.exe
 
 
Malware detected by either Lotus or Outlook SEP component
Does not begin with
?:
And
 
Does not begin with
Unavailable
 
 
 
Depending upon how you want to slice and dice these logs can either generate great or not so great information. YOU need to play with the filters to determine what works for your environment. The above examples are only a small start to the ways you can tear apart the logs generated by SEP. If enough patience and time you’ll see the data beginning to jump out from your screen.
 
 
 Stay tuned...  Part 3 will hopefully be published this weekend.
 

Statistics
0 Favorited
3 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Comments

May 05, 2010 09:03 AM

thanks for u r article

Oct 09, 2009 02:02 PM

By including who did the infection would give us accountability and not just counting how many infections it did...

Sep 08, 2009 02:49 PM

A little later than I planned but moving took more of my time this weekend than planned.  Here is part three to my metrics article.  I just submitted so it should be published (approval by moderators) within the next couple of hours/days.

https://www-secure.symantec.com/connect/articles/metrics-using-data-sepm-part-three

Sep 05, 2009 06:47 PM

Good one again Jeff Wichman!

Sep 04, 2009 09:04 PM

I think the monthly report should have more detailed and better information. Pie chart with bright colors look nice, but more important for us -- enterprise customers need to get is what happened to our environment this month, how safe we are, are there any events still left there and who\what they are if any....  

Sep 04, 2009 11:43 AM

Now if Symantec would let SEM send me a monthly log export automatically! OR, since our management has requested Monthly logs (have their email right here!) I could have SEM export each log, attach it to an email and have it sent to them along with your article links.
(sorry, Symantec, your reports are worthless and lame. We don't want pie charts of how many there were, we want who, what, when and where, name names, give us a list of who did it and with what, esp for DEVICE control)
Well, ya got my vote........

Related Entries and Links

No Related Resource entered.