Dear community,
Due to the C19 situation, "The Business" has requested a solution to provide visibility of events pertaining to malware prevention, device control and DLP functionalities for endpoints which are connected to the Internet from a non-corporate network.
So, we've deployed a DXL appliance, placed it in the DMZ with a public IP and hostname.
Our on-premise ePO, has the DXL fabric lit green, the DXL registered services are displaying and all.
When I select a workstation from the system tree (which is outside of the CDN) and do Actions -> DXL -> Look up in DXL, it shows as Connected.
And now... I expect to download eicar and have the ENS detection show real-time in the system's Threat Events, but that's not the case.
Could someone please shed some light as to what we're missing? Are our expectations wrong?
Your assistance is greatly appreciated.
BR,
Radko
P.S. I went through the installation/product/architecture guide but could not find an answer.
Solved! Go to Solution.
Hello RMazhReport,
DXL has a number of uses but I am afraid replacing agent handler functionality is not one of them. Within the McAfee product suites we have numerous product integrations over DXL. ENS/TIE as you have outlined but we also expand into other AV solutions as well, MWG, ATD, ATP. Command and control functionality and threat hunting is offered with integrations with MAR/EDR. Endpoint Encryption can leverage DXL....we also heavily use it for On Prem > Cloud solutions.
It does handle agent wakeup functionality today, but only the wakeup. The remaining ASCI workflow remains unchanged and is the reason an agent handler must be present. To get the output you would expect (covering events for external devices) an agent handler in the DMZ would be required. As long as this DMZ handler can communicate with your internal ePO and is also reachable by your clients either through a direct public address....or NAT, etc...it should be all you need.
If you have some time you can also review some of the open/third-party integrations offered over OpenDXL. www.opendxl.com
Thanks
Brian
Hello RMadzReport,
While I may not have the full picture of your deployment there, there is a piece missing. By placing a DXL broker in the DMZ and ensuring that DMZ DXL broker is connected to your internal brokers you should have any services hosted internally on DXL also available to external clients. This means, for instance, TIE reputation data is available to your externally connected endpoints.
However, TIE/DXL do not manage the trafficking of threat events. That is still the responsibility of MA > EPO/AH communication. Did you also place an agent handler in the DMZ? Is it fully connected to the internal ePO server?
Thanks
Brian
Hello RMazhReport,
DXL has a number of uses but I am afraid replacing agent handler functionality is not one of them. Within the McAfee product suites we have numerous product integrations over DXL. ENS/TIE as you have outlined but we also expand into other AV solutions as well, MWG, ATD, ATP. Command and control functionality and threat hunting is offered with integrations with MAR/EDR. Endpoint Encryption can leverage DXL....we also heavily use it for On Prem > Cloud solutions.
It does handle agent wakeup functionality today, but only the wakeup. The remaining ASCI workflow remains unchanged and is the reason an agent handler must be present. To get the output you would expect (covering events for external devices) an agent handler in the DMZ would be required. As long as this DMZ handler can communicate with your internal ePO and is also reachable by your clients either through a direct public address....or NAT, etc...it should be all you need.
If you have some time you can also review some of the open/third-party integrations offered over OpenDXL. www.opendxl.com
Thanks
Brian
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA