Related Articles

Special Report
7 Things You Should Know About AV
When it comes to fighting viruses, don't assume the "standard" way is the best way.
More

Special Report
Building "Synergistic" AV
Signature scanners aren't enough to combat today's multivector viruses and worms.
More

Special Report
The Future of Malicious Code
Predictions on blended threats, e-mail exploits, social engineering and more.
More

Special Report
Combating Nonviral Malware
Combating Nonviral Malware - Trojans, sniffers and spyware, oh my!
More

Special Report
Cyber-Menace
A six-part Information Security Special Report on the growing virus problem--and what to do about it.
More

May 2002

Special Report

Command and Control

Centralized management solutions provide enterprises with a bird's-eye view of AV defenses.

BY Jack Koziol

Contemporary distributed networking is a complex infrastructure of servers, gateways and workstations--in some enterprises, numbering thousands of nodes--all vulnerable to virus infections. The challenge to sysadmins is keeping the AV applications on all of these boxes updated and properly configured before they're infected with the next variant of Anna Kournikova or Nimda.

Centralized AV management solutions aim to provide enterprises with a bird's-eye view of their AV defenses and granular command and control. The basic feature set of all AV management suites is the ability to see all users on the network, know what application versions they're running, efficiently and expediently update virus signatures and policies, and receive alerts and other reports.

Signature Updates

In theory, heuristics scanners will detect and block new and previously undetected malicious code. But because AV heuristics remains an inexact science with high false-positive rates, most AV solutions rely on signature matching-comparing samples of malicious code with the fingerprints of known viruses and worms.

Although reactionary, signature matching is effective as long as scanning engines' databases are updated before a new virus or worm hits. AV vendors often release signatures within hours of new malware being discovered. The nightmare of AV management is ensuring signature definitions are updated regularly and uniformly across the enterprise, which includes myriad servers, desktops and laptop.

Centralized AV management allows admins to efficiently push new signature updates to every node through point-and-click GUIs and scripted routines. For example, the drag-and-drop function in Central Command 's Vexira Antivirus Professional (http://www.centralcommand.com/) allows admins to automatically propagate signatures to predefined nodes. This eliminates the need to have users manually connect to an FTP server to retrieve new signatures.

Enterprises can also take advantage of automated update services, which periodically check a vendor's Web site for new signatures and program upgrades. For example, most of Symantec 's (http://www.symantec.com/) AV applications come with an optional "Live Update" service. While efficient for routine updates, such services don't replace the need for a push function for responding to new malware outbreaks.

Policy Enforcement

Updating signatures is only part of the challenge of managing AV defenses on large, distributed networks. If users disable their virus scanners--say, to install a new piece of (often unauthorized) software--they can create gaps in the AV screens.

Centralized AV management enables efficient enforcement of security policies by providing mechanisms for routinely applying patches and upgrading software, scanning systems for malware, and configuring AV application settings.

Admins may have tight control over server-based AV agents, but the client-based scanners are a wild card. Because AV tasks can impede productivity and functionality, users will often disable scanners or cancel periodic scans. Centralized management gives admins the ability to monitor the status of AV scanners and enforce an organization's AV policy.

For instance, Computer Associates' eTrust Antivirus (http://www.ca.com/) can deny a user access to network resources if he disables the AV client. This feature is particularly useful for remote users and road warriors, who could expose the corporate network to viruses via their infected clients.

Centralized management solutions can also push policy and configuration changes to the client, restart disabled scanners and deploy new AV software. In some cases, the management console can remotely install new software and reboot the client.

Policy may also dictate how viral code is handled. Using solutions such as Kaspersky Lab's Corporate Suite (http://www.kaspersky.com/), admins can configure clients to either quarantine or delete code at the site of infection, or forward it to a central repository for analysis. Admins can set server-based solutions to do the same, and strip suspect attachments from e-mails before they pass through border gateways.

Alerting Functions

Time is of the essence when new viruses are discovered in the wild. Admins must implement mitigations and update signatures before the virus or worm enters the network. Most management consoles come with alerting mechanisms that tell admins when their AV devices encounter a threat.

Most AV management solutions allow admins to set the threshold for alerts based on the risk severity and level of infection. Alerts are often issued to admins via e-mail, pager, SMS or all three. For instance, Trend Micro's Trend Virus Control System (http://www.trendmicro.com/) allows admins to define what constitutes a severe infection and a threshold requiring immediate attention.

Once an alert is issued, admins can identify the point of infection and determine an appropriate course of action. If new signatures are available, they can push the signatures out to the AV clients. If signatures aren't available, they can quarantine the point of infection to keep the malware from spreading to the rest of the network.

Reporting and Analysis

Individual AV applications have long delivered statistics on the number of viruses they detected, deleted and quarantined. AV management consoles can collect and aggregate those statistics, as well as other operational information, for analysis.

A crucial function of centralized AV management solutions is knowing the version and status of AV applications running on the network. For example, Norman's Virus Control 5 (http://www.norman.com/) will keep track of what versions of its AV software are running in different user groups, as well as when they were last updated.

Some centralized AV management solutions keep a running inventory of network devices and clients. Reports, such as those generated by Sophos' SAVAdmin (http://www.sophos.com/), show what devices have been added to the network and whether they need an AV agent or update.
Analyzing infection rates and attempted virus attacks can yield crucial intelligence on what network segments and devices are being targeted. These reports help admins gauge their AV systems' performance and user policy compliance, and provide data for measuring the ROI of AV investments.

AV logs and reports can show the devices and network segments most often targeted, and how well the AV defenses perform. Such information can help admins identify and correct soft spots in their security infrastructure. And policy compliance reports show which users are opening gaps in the AV defenses.

AV management consoles offer control and information-gathering functions, but those functions are useless if admins don't know how to use them.

Security managers often struggle to provide quantitative metrics to justify cost to management. With the reporting capabilities of centralized AV management, security practitioners can gather data on the number of attempted virus/worm attacks and the rates of infection. This information can be extrapolated into a cost/benefits analysis for AV spending. Gap analysis is a powerful tool in motivating management, especially when used to compare an organization's AV posture to that of industry peers.

Limited Reach

While centralized AV management systems offer enterprises tremendous command and control over the distributed network, they may be limited by design drawbacks.

As with other security solutions, the effectiveness of centralized AV management depends on proper configuration and administration. Security admins must be able to properly deploy and manage remote clients, accurately interpret incident logs and appropriately respond to new alerts. The management consoles offer control and information-gathering functions, but those functions are useless if admins don't know how to use them.

Time also works against centralized AV solutions, particularly because automated and centralized signature and policy deployment doesn't mean immediate updates. Even with the best management systems, it takes time for updates to propagate across the network. For instance, remote workers who connect to the central office only once or twice a week may have machines that are vulnerable to new viruses for days before they can get updated.

Virtually all enterprise-class AV management systems employ some sort of signature-push mechanism, but not all have the same reach. Some products can't reach beyond the corporate network to update and manage remote networks and users, requiring separate management systems and personnel. 

Cross-Product Management

Perhaps the greatest pitfall to centralized AV management is that it may impede a defense-in-depth AV strategy. Because of the varying effectiveness of the different AV applications, security experts recommend running multiple solutions--such as running Trend on the gateway, Sophos on the e-mail servers and Symantec on the desktop. All except one management solution is proprietary, requiring enterprises to use a vendor's client applications and management console.

McAfee Security (http://www.mcafeeb2b.com/) is the first vendor to move away from the proprietary model with the release of ePolicy Orchestrator, which can manage McAfee and Symantec AV applications. McAfee says future versions will also support Trend Micro applications.

Whether cross-product management will take off remains to be seen. Other vendors are adopting a suite approach to security, making content scanning a core component of an integrated security offering. Symantec recently released its Security Gateway appliance, which has centralized AV, IDS and firewall management and reporting in one console. Likewise, Aladdin (http://www.ealaddin.com/) is offering the eSafe Appliance, a plug-and-play box that offers antivirus and content security.

AV Management Solutions

Vexira Antivirus
Professional
Central Command
http://www.centralcommand.com/

eTrust Antivirus
Computer Associates
http://www.ca.com/

Kaspersky Corporate Suite
Kaspersky Lab
http://www.kaspersky.com/

ePolicy Orchestrator
McAfee Security (a division
of Network Associates)
http://www.mcafeeb2b.com/

Norman Virus Control 5
Norman
http://www.norman.com/

Symantec AntiVirus
Enterprise Edition 8.0
Symantec
http://www.symantec.com/

SAVAdmin
Sophos
http://www.sophos.com/

Trend Virus Control System
(Trend VCS)
Trend Micro
http://www.trendmicro.com/
* Representative list.


JACK KOZIOL (jackkoziol@hotmail.com) is an information security officer at a major financial institution in Chicago.