McAfee QUICKCLEAN 3.0 User's Guide

Browse online or download User's Guide for Networking McAfee QUICKCLEAN 3.0. McAfee QUICKCLEAN 3.0 Product guide User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 140
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Product Guide

Product GuideRevision BMcAfee Advanced Threat Defense 3.0.4

Page 2 - License Agreement

• Block future downloads of the same file: Subsequently, if the file is found to be malicious, youranti-malware protection must prevent future downloa

Page 3 - Contents

Upload files for analysis using SFTPBefore you begin• Your user name has FTP Access privilege. This is required to access the FTP server hostedon McAf

Page 4 - 7 Analyzing malware 97

bSet the frequency at which the Analysis Status page must refresh itself.The default refresh interval is 1 minute.cTo refresh the Analysis Status page

Page 5 - Index 139

5Hide the columns that you do not require.aMove the mouse over the right corner of a column heading and click the drop-down arrow.bSelect Columns.cSel

Page 6

Table 7-5 Column definitions Column DefinitionReportsClick to display the types of reports available for the sample. Click any of the enabled repo

Page 7 - About this guide

Table 7-5 Column definitions (continued)Column DefinitionSeverityIndicates the severity level of the analyzed sample.• Information — Indicates that t

Page 8 - Find product documentation

Task1To access the Analysis Summary report in the McAfee Advanced Threat Defense web application, dothe following:aSelect Analysis | Analysis Results.

Page 9 - Advanced

The various sections of the HTML format of the Analysis Summary report are outlined here.Figure 7-4 Analysis Summary report7Analyzing malwareView the

Page 10 - Advanced Threat Defense

Table 7-6 Analysis Summary report sections Item Description1 This section displays the details of the sample file. This includes the name, hash value

Page 11

Table 7-6 Analysis Summary report sections (continued)Item Description8 GTI URL Reputation. This provides McAfee GTI reputation and severity for the

Page 12

• On the right-hand side, a table provides the properties of the file. This includes information suchas:• Signed or unsigned for the digital signature

Page 13

• It has the McAfee Anti-Malware Engine embedded within it for signature-based detection.• It dynamically analyzes the file by executing it in a virtu

Page 14 - Web Gateway

• Process operations: Details the process operation activities such as new process creation,termination, new service creation, and code injection into

Page 15

Table 7-9 A section of a sample Disassembly Results report Column 1 Column 2 Column 3:00401010 e8 1f2c0000 call 00403c34;;call URLDownloadToFileAThe

Page 16

This section uses yWorks yEd Graph Editor to explain how to use the Logic Path Graph GML file. In theyEd Graph Editor, you must first set the Routing

Page 17 - Defense Appliance

When you open the <file name>_logicpath.gml file in yEd Graph Editor, initially you might see manyrectangle boxes overlapping each other or a si

Page 18

In the yEd Graph Editor select Layout | Hierarchical.Figure 7-8 Incremental Hierarchic Layout dialog7Analyzing malwareView the analysis results114McA

Page 19 - Usage restrictions

In the Incremental Hierarchic Layout dialog, click Ok without changing any of the default settings. Thefollowing example shows the complete layout of

Page 20 - Check your shipment

Two colors are used to indicate the executed path. The red dash lines show the non-executed path,and the blue solid lines show the executed path.Accor

Page 21

convention. Consider that the sample submitted is vtest32.exe. Then the .zip file contains thefollowing results:• vtest32_summary.html (.json, .txt, .

Page 22

• System Health — Provides the system health details of the McAfee Advanced Threat DefenseAppliance.• System Information — Provides the version number

Page 23

File CountersThis monitor shows the analysis status for files submitted during the specified time period. Forexample, if you set the time period for t

Page 24 - Port numbers

McAfee Advanced Threat Defense deployment optionsYou can deploy McAfee Advanced Threat Defense in the following ways:• Standalone deployment — This is

Page 25

• The infected and not infected file counts are indicated using different colors.• To hide the infected or not infected files, click the corresponding

Page 26

VM Creation Status monitorThis monitor displays the status of the analyzer VMs created for the specified time period in thedashboard. For example, if

Page 27 - Handling the front bezel

System InformationThis monitor shows the version numbers of the software components related to McAfee AdvancedThreat Defense.Figure 7-17 System Infor

Page 28 - Connect the network cable

8CLI commands for McAfee AdvancedThreat DefenseThe McAfee Advanced Threat Defense Appliance supports command-line interface (CLI) commands fortasks su

Page 29

Logging on to the McAfee Advanced Threat Defense Applianceusing an SSH clientTask1Open an SSH client session.2Enter the IPv4 address of the McAfee Adv

Page 30

• set appliance gateway is also required if any of the following are true:• If the McAfee Advanced Threat Defense Appliance is on a different network

Page 31 - Defense web application

Table 8-1 CLI commands for managing the disks Command Descriptioncopyto backup Copies the software version on the active disk to the backup disk. Fo

Page 32

• To check if an MD5 is present in the blacklist, use blacklist query <md5>Parameter Description<md5> The MD5 hash value of a malware that

Page 33

Parameter Description<md5> The MD5 value of the file for which you want to delete all the reports in McAfeeAdvanced Threat Defense.Example: dele

Page 34 - Viewing user profiles

listLists all the CLI commands available to users.Syntax: listThis command has no parameters.nslookupDisplays nslookup query result for a given domain

Page 35 - Add users

• Integration with Network Security Platform — This deployment involves integrating McAfeeAdvanced Threat Defense with Network Security Platform Senso

Page 36 - Figure 4-3 Add users

rebootParameter Descriptionreboot active Reboots the Appliance with the software version on the active disk.reboot backup Reboots the Appliance with t

Page 37 - Edit Users

set appliance ip 192.34.2.8 255.255.0.0set appliance gatewaySpecifies IPv4 address of the gateway for the McAfee Advanced Threat Defense Appliance.Syn

Page 38 - Delete Users

set intfport ipSets an IP address to an interface port.Syntax:set intfport <1><2><3> ip A.B.C.D E.F.G.HExample:set intfport 1 10.10.

Page 39 - Troubleshooting

Default Value:By default, the network port is set to auto (auto-negotiate).set_ui_timeoutSpecifies the number of minutes of inactivity that can pass b

Page 40 - Delete the analysis results

show epo-stats nspDisplays the count of requests sent to McAfee ePO, the count of responses received from McAfee ePO,and the count of requests that fa

Page 41 - Creating analyzer VM

Information displayed by the show nsp scandetails command includes:• The IP address of the IPS Sensor.• Total number of packets received from the Sens

Page 42

Table 8-2 System IP routing table (continued)Destination Gateway Genmask Flags Metric Ref Use Iface13.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 mgmt0.0.0.0 10.

Page 43

Syntax:watchdog <on | off | status>Parameter Description<on> Enables the watchdog.<off> Disables the watchdog. Use it if the Applian

Page 44

8CLI commands for McAfee Advanced Threat DefenseList of CLI commands138McAfee Advanced Threat Defense 3.0.4 Product Guide

Page 45 - • Confirm — Enter cr@cker42

IndexAabout this guide 7CCLI commands issue 123auto-complete 124console 123mandatory commands 124ssh 123CLI logon 125CLI syntax 124conventions and ico

Page 46

• Integration with McAfee® Web Gateway — You can configure McAfee Advanced Threat Defense asan additional engine for anti-malware protection. When you

Page 48

• It is an on-premises solution that has access to cloud-based GTI. In addition, you can integrate itwith other McAfee's security products.• McAf

Page 49 - Select I/O Controller Types

1Malware detection and McAfee® Advanced Threat DefenseThe McAfee Advanced Threat Defense solution16McAfee Advanced Threat Defense 3.0.4 Product Guide

Page 50 - Figure 5-12 Select a disk

2Setting up the McAfee Advanced ThreatDefense ApplianceReview this chapter for information regarding the McAfee Advanced Threat Defense Appliance and

Page 51

Before you install the McAfee Advanced Threat DefenseApplianceThis section describes the tasks that you must complete before you begin to install a Mc

Page 52

Warnings and cautionsRead and follow these safety warnings when you install the McAfee Advanced Threat DefenseAppliance. Failure to observe these safe

Page 53

COPYRIGHTCopyright © 2014 McAfee, Inc. Do not copy without permission.TRADEMARK ATTRIBUTIONSMcAfee, the McAfee logo, McAfee Active Protection, McAfee

Page 54

Unpack the shipment1Open the crate.2Remove the first accessory box.3Verify you have received all parts as listed in Check your shipment on page 20.4Re

Page 55

McAfee Advanced Threat Defense Appliance front and back panelsFigure 2-1 Front view of ATD-3000 with bezelFigure 2-2 Side view of ATD-3000 without b

Page 56

Label Description1 Power supply module 12 Power supply module 23 Management port (NIC 1)4 NIC 25 NIC 36 NIC 47 Video connector8 RJ45 serial-A port9 US

Page 57

Hardware specifications and environmental requestsSpecifics ATD-3000 ATD-6000Dimensions• 734.66 L x 438 W x 43.2 H inmillimeters• 29 L x 17.25 W x 1.7

Page 58 - Select Write

Specifics ATD-3000 ATD-6000Vibration Unpackaged: 5 Hz to 500 Hz, 2.20 gRMS randomUnpackaged: 5 Hz to 500 Hz, 2.20 gRMS randomPackaged: 5 Hz to 500 Hz,

Page 59

Install or remove rack handles• To install a rack handle, align it with the two holes on the side of the McAfee Advanced ThreatDefense Appliance and a

Page 60

2At the back of the rack, pull the back mounting-bracket (extending the mounting rail) so that italigns with the required rack holes.Ensure that the m

Page 61

8Lift the release tab and push the Appliance into the rack.Figure 2-12 Lift release tab and push Appliance into rack9To remove the McAfee Advanced Th

Page 62

Task1Follow these steps to remove the front bezel.aUnlock the bezel if it is locked.bRemove the left end of front bezel from rack handle.cRotate the f

Page 63

Task1Plug a console cable (RJ45 to DB9 serial) to the console port (RJ45 serial-A port) at the back panelof the McAfee Advanced Threat Defense Applian

Page 64

ContentsPreface 7About this guide ... 7Audience ... 7Conventions ...

Page 65 - • Password — Enter cr@cker42

6To set the management port IP address and subnet mask of the McAfee Advanced Threat DefenseAppliance, type set appliance ip <A.B.C.D> <E.F.G

Page 66

3Accessing McAfee Advanced ThreatDefense web applicationThe McAfee Advanced Threat Defense web application is hosted on the McAfee Advanced ThreatDefe

Page 67 - Figure 5-33 Run sigcheck.exe

Access the McAfee Advanced Threat Defense web applicationTask1From a client computer, open a session using one of the supported browsers.2Use the foll

Page 68 - Figure 5-37 Warning message

4Managing users and performanceYou use the McAfee Advanced Threat Defense web application to manage user accounts and monitorthe McAfee Advanced Threa

Page 69 - Figure 5-38 Activate Windows

• ATD admin — This is the default user account to access the FTP server on McAfee AdvancedThreat Defense. The user name is atdadmin and the password i

Page 70 - Figure 5-39 Settings option

2Hide the columns you do not want to see.aMove the mouse over the right corner of a column heading and click the drop-down arrow.bSelect Columns.cSele

Page 71

Task1Select Manage | User Management | New.The User Management page is displayed.Figure 4-3 Add users2Enter the appropriate information in the respec

Page 72

OptionnameDefinitionDefault AnalyzerProfileSelect the analyzer profile that must be used for files submitted by the user. Forexample, if the file is s

Page 73

3Make the changes to the required fields and click Save.For information on the fields, see Add users on page 35.Delete UsersIf you are assigned the ad

Page 74 - Managing VM profiles

Task1Select Manage | Software Management.Figure 4-4 McAfee Advanced Threat Defense software upgrade2Click Browse and select the required McAfee Advan

Page 75 - View VM profiles

5 Creating analyzer VM 41Create a VMDK file from an ISO image ... 42Import a VMDK file into McAfee Advanced Threat Defense ...

Page 76 - Create VM profiles

Task•To access the Troubleshooting page, select Manage | Troubleshooting.Figure 4-5 Troubleshooting pageTasks• Export McAfee Advanced Threat Defense

Page 77

5Creating analyzer VMFor dynamic analysis, McAfee Advanced Threat Defense executes a suspicious file in a secure virtualmachine (VM) and monitors its

Page 78 - Figure 5-51 Shut down the VM

If you already have a VMDK file, it must be a single file that contains all the files required to create theVM.Contents Create a VMDK file from an

Page 79 - Figure 5-53

3In the New Virtual Machine Wizard window, select Custom (Advanced) and click Next.Figure 5-1 Select the configuration type for the virtual machine4I

Page 80 - Delete VM profiles

5In the Guest Operating System Installation window, select either Installer disc or Installer disc image file (iso),browse and select the ISO image, a

Page 81 - View the VM creation log

• Confirm — Enter cr@cker42• Log on automatically (requires a password) — Deselect this box.Figure 5-4 Easy Install Information window7In the VMware

Page 82

8Complete the following in the Name the Virtual Machine window and then click Next.• Virtual Machine name — Enter virtualMachineImage• Location — Brow

Page 83 - Defense for malware analysis

9Leave the default values and click Next for the following unless specified otherwise:•Processor ConfigurationFigure 5-7 Processor configuration for

Page 84 - Terminologies

•Memory for the Virtual MachineFigure 5-8 Memory configuration for the VMFor Windows XP set 1024 MB as the memory. For Windows 7, set 3072 MB as the

Page 85

•Network TypeFigure 5-9 Network type configuration for the VM•Select I/O Controller TypesFigure 5-10 Select the I/O controller typeCreating analyzer

Page 86

createDefaultVms ...127deleteblacklist ... 127deletesamplereport ...

Page 87 - Managing analyzer profiles

10In the Select a Disk Type page, select IDE and click Next.SCSI disks are not compatible with McAfee Advanced Threat Defense.Figure 5-11 Select a di

Page 88 - View analyzer profiles

12Complete the following in the Specify Disk Capacity window and then click Next.• Maximum disk size (GB) — Enter the exact values mentioned here base

Page 89 - Create analyzer profiles

13In the Specify Disk file window, make sure virtualMachineImage.vmdk is displayed by default and clickNext.If you specified a different name for Virt

Page 90

This step might take around 30 minutes to complete.Figure 5-15 VM creation progress15If the Removable Devices pop-up window is displayed, select Do n

Page 91 - Integration with McAfee ePO

17Select Public network in the Set Network Location window and click Next.Figure 5-17 Select a network location18Complete the following only for Wind

Page 92

21For Windows 7, in the virtualMachineImage, complete the following.aSelect Start | Control Panel | System and Security | Windows Firewall | Turn on W

Page 93

cSelect Start | Control Panel | Programs | Programs and Features | Turn Windows feature on or off and completethe following.1Select Internet Informati

Page 94

23In the Telnet Properties(Local Computer) window, you must select Automatic from the Startup type drop-downlist. Then select Apply | Start | OK.Figur

Page 95

3Select Write.4Select Log visits and click Apply and then OK.5Creating analyzer VMCreate a VMDK file from an ISO image58McAfee Advanced Threat Defense

Page 96

25To enable FTP on Windows 7, complete the following.aIn the virtualMachineImage, select Start | Control Panel | System and Security | Administrative

Page 97

Contents6McAfee Advanced Threat Defense 3.0.4 Product Guide

Page 98

1Select Sites and right-click Default Web Site and remove. Confirm by clicking Yes.Figure 5-23 Remove Default Web Site5Creating analyzer VMCreate a V

Page 99

2Right-click Sites and select Add FTP Site. Then complete the following.Figure 5-24 Select Add FTP SiteaFor FTP site name, enter root.bPhysical Path:

Page 100 - Analyzing malware

3For Bindings and SSL Settings, select No SSL. For all other fields, leave the default values and clickNext.Figure 5-26 Binding and SSL settings4For

Page 101

26Set automatic logon.aFor Windows XP, select Start | Run, enter rundll32 netplwiz.dll,UsersRunDll and press Enter.bFor Windows 7, select Start | Run,

Page 102 - View the analysis results

27In the User Accounts window, deselect Users must enter a user name and password to use this computer and clickApply.Figure 5-29 User Accounts windo

Page 103

28In the Automatically Log On pop-up window, complete the following.• User name — Enter Administrator• Password — Enter cr@cker42• Confirm Password —

Page 104

Press OK in the message boxes.Figure 5-31 User Accounts window29Download Sigcheck on to the VM from http://technet.microsoft.com/en-us/sysinternals/b

Page 105

31In Windows Explorer, go to C:\ WINDOWS\system32 and double-click sigcheck.exe.Figure 5-33 Run sigcheck.exe32If prompted, click Run in the warning m

Page 106

33Click Agree for Sigcheck License Agreement.Figure 5-35 Sigcheck license agreement 34Download MergeIDE.zip from https://www.virtualbox.org/attachme

Page 107

37Close Windows Explorer.38Verify if Windows is activated. Click Start, right-click Computer, then select Properties.It is mandatory that Windows is a

Page 108 - Analysis Environment section

PrefaceThis guide provides the information you need to work with your McAfee product.Contents About this guide Find product documentationAbout t

Page 109 - Operations details section

a .docx file using Office 2003, you need the corresponding compatibility pack installed. After youdownload the compatibility pack, install it on the v

Page 110 - Dropped files report

bSelect CD/DVD (IDE) and then select either Use physical drive or Use ISO image file and browse to the ISOimage of Microsoft Office. Then click OK.Fig

Page 111 - Logic Path Graph

dSelect Run all from my computer for Microsoft Office. Then select Not Available for applications such asAccess, InfoPath, Lync, Outlook, Publisher, a

Page 112

43In the Windows Run dialog, enter msconfig.44In the System Configuration utility, go to the Startup tab.45Deselect reader_sl and jusched and then cli

Page 113

Convert the VMDK file to an image fileBefore you begin• You have uploaded the VMDK file to McAfee Advanced Threat Defense.• You have admin-user permis

Page 114

VM profiles contain the operating system and applications in an image file. This enables you to identifythe images that you uploaded to McAfee Advance

Page 115

2Hide the unneeded columns.aMove the mouse over the right corner of a column heading and click the drop-down arrow.bSelect Columns.cSelect only the re

Page 116 - User API Log

3Click Activate to create and activate the VM from the selected image file.When you click Activate, the VM is opened in a pop-up window. So, make sure

Page 117

After you OK the warning messages, the VM starts.Figure 5-50 VM displayed in a pop-up window4Activate the VM, shut it down, and also close the pop-up

Page 118 - Malware analysis monitors

5Create the VM profile for the VM that you created by entering the appropriate information in therespective fields.Table 5-1 Option definitions Optio

Page 119 - Files analyzed by File Type

Find product documentationMcAfee provides the information you need during each phase of product implementation, frominstallation to daily use and trou

Page 120 - Top malware by file name

Edit VM profilesBefore you beginTo edit a VM profile, either you must have created it or you must have admin-user role.Task1Select Policy | VM Profil

Page 121 - VM Creation Status monitor

View the VM creation logWhen you create a VM profile using the VM Profile page, McAfee Advanced Threat Defense creates ananalyzer VM from the image fi

Page 122 - System Information

5Creating analyzer VMView the VM creation log82McAfee Advanced Threat Defense 3.0.4 Product Guide

Page 123 - Threat Defense

6Configuring McAfee Advanced ThreatDefense for malware analysisAfter you install McAfee Advanced Threat Defense Appliance on your network, you can con

Page 124 - CLI syntax

analysis. For static analysis, McAfee Advanced Threat Defense uses the following resources and inthe same order:• Local whitelist — This is the list o

Page 125 - Appliance

Only the following operating systems are supported to create the analyzer VMs:• Windows XP SP2 32-bit • Windows Server 2008 64-bit• Windows XP SP3 32-

Page 126 - List of CLI commands

To dynamically analyze a file, the corresponding user must have the VM profile specified in theuser's analyzer profile. This is how the user indi

Page 127

7In the Analysis Status page, monitor the status of the analysis. See Monitor the status of malwareanalysis on page 1008After the analysis is complete

Page 128

You use the McAfee Advanced Threat Defense web application to manage analyzer profiles.Figure 6-2 Contents of an analyzer profileView analyzer profil

Page 129

Create analyzer profilesBefore you beginIf you intend to select the dynamic analysis option in the analyzer profile, make sure thatyou have created th

Page 130

1Malware detection and McAfee® AdvancedThreat DefenseOver the years, malware has evolved into a sophisticated tool for malicious activities such as st

Page 131

2Enter the appropriate information in the respective fields.Option name DefinitionNameEnter the name for the analyzer profile. It should allow you to

Page 132

Option name DefinitionSaveCreates the analyzer profile record with the information you provided.CancelCloses the Analyzer Profile page without saving

Page 133

To determine the analyzer VM for a file submitted by Network Security Platform or McAfee WebGateway, McAfee Advanced Threat Defense uses the following

Page 134

Task1Select Manage | ePO Login.The ePO Login page displays.Figure 6-3 McAfee ePO integration2Enter the details in the appropriate fields.Option name

Page 135

Task1Select Manage | HTTP Proxy Setting.The HTTP Proxy Setting page is displayed.Figure 6-4 Proxy Setting page2Enter the appropriate information in t

Page 136

2Enter the appropriate information in the respective fields.Option name DefinitionDomainEnter the Active Directory domain name, for example, McAfee.co

Page 137

6Configuring McAfee Advanced Threat Defense for malware analysisConfigure the proxy DNS settings96McAfee Advanced Threat Defense 3.0.4 Product Guide

Page 138

7Analyzing malwareAfter you have configured McAfee Advanced Threat Defense, you can upload files for analysis. Thefollowing are the methods you can fo

Page 139

Table 7-1 Option definitions Option DefinitionFileEither drag and drop the malware file from Windows Explorer or click Browse and selectthe file. If

Page 140

requests for user-intervention by the malware are not honored. However, the screen shots of all suchrequirements are available in the Screenshots sect

Comments to this Manuals

No comments