cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Highlighted
Level 7
Report Inappropriate Content
Message 1 of 10

McAfee ENS Share your own Policies best practices

Jump to solution

Hello Guys ,

In our enviroment we have McAfee EPO 5.9 McAfee ENS 7, with module ATP, Threat Prevention enabled

Windows Enviroment.

I want to make More restricted the ENS,

1-could you please share your policies best practices that you have enabled

2- Wich Access protection rules you create new in you enviroment,

3-Default rules access protection that you hace rentables for blocked

3- Wich critica files And folder i have to monitor day to day 

4- What Alerts you enabled?

3 Solutions

Accepted Solutions
Highlighted
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 10

Re: McAfee ENS Share your own Policies best practices

Jump to solution

Hello eam23

Thanks for posting your queries in community.

For Best practices, I request you to check on the document below. 

https://docs.mcafee.com/bundle/endpoint-security-10.6.0-threat-prevention-product-guide-windows/page...

I have also attached Product Guide for ENS 10.7.0 that shows best practices for all components of Threat prevention - On access scan, On demand scan, Exploit prevention and Access protection. 

Kindly click on the link below to access ENS 10.7 product guide.

https://docs.mcafee.com/bundle/endpoint-security-10.7.x-common-product-guide-windows/page/GUID-B715A...

For ATP related queries, I request you to check on the below KB. 

https://kc.mcafee.com/corporate/index?page=content&id=KB87843

 

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?

View solution in original post

Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 4 of 10

Re: McAfee ENS Share your own Policies best practices

Jump to solution

More than anything,  I would focus on locking down Office apps.  There are a number of defaults in the policy, but there is also room for expansion.  ATP adds a lot more coverage to this than just TP.  

Take a look at and have a rule like it:

https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_office_shell.yml

Biggest other areas to look for are c:\users\** and c:\programdata\*, but the former will likely need exclusions.   If you do it in an Expert Rule, most can be done by cert.  

Behind this,  also block Office executing explorer.exe, as it can also be used to proxy another execution.   If you get false positives, specify that the command line should contain the two paths above and c:\windows\*.   

Block file read access to wbemdisp.tlb so it can't execute through WMI.  Also block any DLLs from temp locations that you don't trust. Some attacks will drop a DLL and load it into the office process itself.   Here again,  you'll probably need a large exclusion list. 

Lastly, use GPO to block standard users from creating folders on the root of their drives.  Otherwise an attacker can create anything they want on c: and use it as a temp directory. 

Hopefully this helps. 

 

Dave

View solution in original post

Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 8 of 10

Re: McAfee ENS Share your own Policies best practices

Jump to solution

The file wasn't intended for import,  but to give examples of things you should block.   I'm currently traveling,  but when I get back I'll write a few rules that cover everything I've mentioned relative to Office and post them.  

View solution in original post

9 Replies
Highlighted
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 10

Re: McAfee ENS Share your own Policies best practices

Jump to solution

Hello eam23

Thanks for posting your queries in community.

For Best practices, I request you to check on the document below. 

https://docs.mcafee.com/bundle/endpoint-security-10.6.0-threat-prevention-product-guide-windows/page...

I have also attached Product Guide for ENS 10.7.0 that shows best practices for all components of Threat prevention - On access scan, On demand scan, Exploit prevention and Access protection. 

Kindly click on the link below to access ENS 10.7 product guide.

https://docs.mcafee.com/bundle/endpoint-security-10.7.x-common-product-guide-windows/page/GUID-B715A...

For ATP related queries, I request you to check on the below KB. 

https://kc.mcafee.com/corporate/index?page=content&id=KB87843

 

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?

View solution in original post

Highlighted
Level 7
Report Inappropriate Content
Message 3 of 10

Re: McAfee ENS Share your own Policies best practices

Jump to solution
Thanks, for replay
Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 4 of 10

Re: McAfee ENS Share your own Policies best practices

Jump to solution

More than anything,  I would focus on locking down Office apps.  There are a number of defaults in the policy, but there is also room for expansion.  ATP adds a lot more coverage to this than just TP.  

Take a look at and have a rule like it:

https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_office_shell.yml

Biggest other areas to look for are c:\users\** and c:\programdata\*, but the former will likely need exclusions.   If you do it in an Expert Rule, most can be done by cert.  

Behind this,  also block Office executing explorer.exe, as it can also be used to proxy another execution.   If you get false positives, specify that the command line should contain the two paths above and c:\windows\*.   

Block file read access to wbemdisp.tlb so it can't execute through WMI.  Also block any DLLs from temp locations that you don't trust. Some attacks will drop a DLL and load it into the office process itself.   Here again,  you'll probably need a large exclusion list. 

Lastly, use GPO to block standard users from creating folders on the root of their drives.  Otherwise an attacker can create anything they want on c: and use it as a temp directory. 

Hopefully this helps. 

 

Dave

View solution in original post

Highlighted
Level 7
Report Inappropriate Content
Message 5 of 10

Re: McAfee ENS Share your own Policies best practices

Jump to solution
Thanks, Dave that would help, this rule Will affected the execution for office suite or i will bloking execution from this apps?
Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 6 of 10

Re: McAfee ENS Share your own Policies best practices

Jump to solution

Execution from it. 

Highlighted
Level 7
Report Inappropriate Content
Message 7 of 10

Re: McAfee ENS Share your own Policies best practices

Jump to solution

Dear Dave ,

how exactly can i use this yml file can it be imported into ENS ?

Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 8 of 10

Re: McAfee ENS Share your own Policies best practices

Jump to solution

The file wasn't intended for import,  but to give examples of things you should block.   I'm currently traveling,  but when I get back I'll write a few rules that cover everything I've mentioned relative to Office and post them.  

View solution in original post

Highlighted

Re: McAfee ENS Share your own Policies best practices

Jump to solution

Great M8 will be waiting for your input , safe journey

Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 10 of 10

Re: McAfee ENS Share your own Policies best practices

Jump to solution

I've decided against publicly posting the rule.  If you'd like it, please DM me and I'll get it to you that way.

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community