Tailoring Intrusion Protection to Your Network Assets

You can use the FireSIGHT Recommended Rules feature to associate the operating systems, servers, and client application protocols detected on your network (see Introduction to Network Discovery) with rules specifically written to protect those assets, per intrusion policy. This allows you to tailor your intrusion policy to the specific needs of your monitored network. The FireSIGHT Recommended Rules feature requires FireSIGHT and Protection licenses.

When you configure the FireSIGHT Recommended Rules feature, the system searches your base policy for rules that protect against vulnerabilities associated with your network assets, and identifies the current state of rules in your base policy. The system then recommends rule states and, optionally, sets the rules to the recommended states using the criteria in the following table.

 

Table 33-1 FireSIGHT Rule State Recommendations Based on Vulnerabilities

Base Policy Rule State
Rule Protects Your Discovered Assets?
Recommend Rule State

Generate Events or
Disable

yes

Generate Events

Drop and Generate Events

yes

Drop and Generate Events

any

no

Disable

The Cisco Vulnerability Research Team (VRT) determines the appropriate state of each rule in the default policies provided by Cisco. Thus, when your base policy is a default policy provided by Cisco, the net effect of allowing the system to set your rules to the FireSIGHT recommended rule states is that the rules in your intrusion policy match the settings recommended by Cisco for your network assets. See Understanding the System-Provided Policies for more information.

Generating rule state recommendations can be as simple as choosing whether to use the recommended rule states, either when you generate recommendations or at a later time. Advanced recommendations options allow you to tailor your configuration further. Note that choosing to use recommended rule states adds a read-only FireSIGHT Recommendations layer to your intrusion policy, and subsequently choosing not to use recommended rule states removes the layer. See Using Layers in a Network Analysis or Intrusion Policy for information on using policy layers to more efficiently manage multiple intrusion policies.

Note that while the system typically recommends rule state changes for standard text rules and shared object rules, it can also recommend changes for preprocessor and decoder rules.

You can schedule a task to generate recommendations automatically based on the most recently saved configuration settings in your intrusion policy. For information on scheduling a task to generate recommended rule states, see Automating FireSIGHT Recommendations.

See the following sections for more information:

Understanding Basic Rule State Recommendations

License: Protection + FireSIGHT

You can generate recommendations without using the recommended rule states in your policy. You can then display any of three filtered views of the Rules page to show rules that the system recommends you set to Generate Events, Drop and Generate Events, or Disable. This allows you to see beforehand which rules would be modified when you choose to use the recommended rule states. You can also choose to generate recommendations and immediately use them.

While displaying the recommendation-filtered Rules page, or after accessing the Rules page directly from the navigation panel or the Policy Information page, you can manually set rule states, sort rules, and take any of the other actions available on the Rules page, such as suppressing rules, setting rule thresholds, and so on. See Setting Rule States for information on manually changing the state of selected rules. See Tuning Intrusion Policies Using Rules for information on other actions available on the Rules page for tailoring the rules in your intrusion policy.

The system does not change rule states that you set manually. When you choose to use the recommended rule states while generating recommendations:

  • manually setting the states of specified rules before you generate recommendations prevents the system from modifying the states of those rules in the future
  • manually setting the states of specified rules after you generate recommendations overrides the recommended states of those rules

Tip You can include a list in the intrusion policy report of rules whose rule states differ from the recommended state. See Generating a Report of Current Intrusion Settings for more information.


Note also that when you generate recommendations without changing the advanced settings for FireSIGHT recommended rules, the system recommends rule state changes for all hosts in your entire discovered network. Note also that, by default, the system generates recommendations only for rules with low or medium overhead, and generates recommendations to disable rules. See Understanding Advanced Rule State Recommendations for more information.

Understanding Advanced Rule State Recommendations

License: Protection or Protection + FireSIGHT

Advanced settings allow you to redefine which hosts on your network the system monitors for vulnerabilities, to influence which rules the system recommends based on rule overhead, and to specify whether to generate recommendations to disable rules.

If you want to dynamically adapt active rule processing for specific packets based on host information, you can also enable adaptive profiles. For more information, see Adaptive Profiles and FireSIGHT Recommended Rules.

See the following sections for more information:

Understanding the Networks to Examine

License: Protection + FireSIGHT

You configure the FireSIGHT Recommended Rules feature by identifying networks to examine in the network map. The system then recommends the rules you can activate to protect your network. For information on the network map, see Using the Network Map.

You configure the Networks field with the hosts to examine for recommendations. You can specify a single IP address or address block, or a comma-separated list comprised of either or both.

Lists of addresses within the hosts that you specify are linked with an OR operation except for negations, which are linked with an AND operation after all OR operations are calculated.

Understanding Rule Overhead

License: Protection

Cisco rates the overhead of each intrusion rule as none, low, medium, or high, based on the rule’s potential impact on system performance and the likelihood that the rule may generate false positives. You can view the overhead rating for a rule in the rule detail view on the Rules page. See Viewing Rule Details for more information.

You can set the system to make rule state recommendations based on all rules up to and including a specified overhead rating. For example, when you generate recommendations for rules with medium overhead, the system makes recommendations based on all rules with an overhead rating of none, low, or medium, and does not make any recommendations for rules with high overhead.

Note that the system factors rule overhead into recommendations to generate events or to drop and generate events. The system does not factor rule overhead into recommendations to disable rules. Note also that local rules have no overhead, unless they are mapped to a third-party vulnerability. See Importing Local Rule Files and Managing Third-Party Product Mappings for more information.

Generating recommendations for rules with the overhead rating at a particular setting does not preclude you from generating recommendations with different overhead, then generating recommendations again for the original overhead setting. You get the same rule state recommendations for each overhead setting each time you generate recommendations for the same rule set, regardless of the number of times you generate recommendations or how many different overhead settings you generate with. For example, you can generate recommendations with overhead set to medium, then to high, then finally to medium again; if the hosts and applications on your network have not changed, both sets of recommendations with overhead set to medium are then the same for that rule set.

Using FireSIGHT Recommendations

License: FireSIGHT + Protection

You can generate recommendations with or without using the recommended rule states, and with or without modifying the advanced settings for generating recommendations. See Understanding Basic Rule State Recommendations and Understanding Advanced Rule State Recommendations for more information.

After generating recommendations, you can use the recommended rule states; you can also view recommended states and use any features available on the Rules page.

To use FireSIGHT rule state recommendations:

Access: Admin/Intrusion Admin


Step 1 Select Policies > Intrusion > Intrusion Policy .

The Intrusion Policy page appears.

Step 2 Click the edit icon ( ) next to the policy you want to edit.

If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts and Committing Policy Changes for information on saving unsaved changes in another policy.

The Policy Information page appears.

Step 3 You have two options:

    • If you have not generated recommendations, select No recommendations have been generated. Click here to set up FireSIGHT recommendations .
    • If you have generated recommendations, select Click to change recommendations .

The FireSIGHT Recommended Rules Configuration page appears.

Step 4 You have the following choices:

    • To have the corresponding intrusion policy report list the rule message, recommended state, and actual state for all rules whose actual states differ from the recommended state, select Include all differences between recommendations and rule states in policy reports . See Generating a Report of Current Intrusion Settings for more information.
    • To generate recommendations using the default settings, go to step 9 .
    • To modify the advanced recommendations options, go to step 5 .

Step 5 Click the plus icon ( ) to expand the Advanced Settings section.

The advanced FireSIGHT recommendations options appear.

Step 6 In the Networks field under Networks to Examine , specify the network to examine for recommendations.

For information on using IP address notation in the FireSIGHT System, see IP Address Conventions.

Note that lists of addresses are linked with an OR operation except for negations, which are linked with an AND operation after all OR operations are calculated. See Understanding the Networks to Examine for more information.

Step 7 Optionally, under FireSIGHT Recommended Rules Configuration , drag the Recommendation Threshold (By Rule Overhead) slide bar to specify the amount of overhead a rule must have to be included in the recommendations you generate.

Dragging the slide bar to the right includes rules with higher overhead and will likely result in more recommendations, but may increasingly affect system performance. See Understanding Rule Overhead for more information.

Step 8 You have the following options:

    • To generate recommendations to disable rules, select the Accept Recommendations to Disable Rules check box.

Note that accepting recommendations to disable rules restricts your rule coverage.

    • To prevent generating recommendations to disable rules, clear the Accept Recommendations to Disable Rules check box.

Note that omitting recommendations to disable rules augments your rule coverage.

Step 9 You have several options:

    • Click Generate and Use Recommendations if you have not yet generated recommendations and want the system to change your rule states automatically to the recommended states while generating recommendations.

The system generates recommended rule state changes and automatically sets rules to the recommended states.

    • Click Generate Recommendations if you want the system to generate recommendations without automatically changing your rule states to the recommended states.

The system generates recommended rule state changes.

    • If you have generated recommendations before, click Update Recommendations to update existing recommendations.

The system generates recommended rule state changes and, if recommendations are in use, automatically sets rules to the recommended states. The status updates for the number of recommendations, the number of hosts with recommended rule state changes, and the number of recommendations to generate events, drop and generate events, or disable rules.

    • If you have generated recommendations before, click Use Recommendations to use recommendations that you have generated but have not used.

The system automatically sets rules to the recommended states.

    • If you have generated and are already using recommendations, click Do Not Use Recommendations to stop using recommendations currently in use.

The system automatically resets rules to the default rule states unless a specific rule state was applied to the rule before using recommendations; in that case, the rule reverts to the specific rule state.

Note that the system does not recommend a rule state for an intrusion rule that is based on a vulnerability that you disable using the Impact Qualification feature. For more information, see Setting the Vulnerability Impact Qualification.

Note also that updating the policy to use or not use recommendations may take several minutes, depending on the size of your network and rule set.


Note The system always recommends that you enable a local rule associated with a third-party vulnerability mapped to a host. The system does not make state recommendations for unmapped local rules. For more information, see Managing Third-Party Product Mappings.


Step 10 Optionally, click View next to a recommendation type to display a recommendations-filtered view of the Rules page for the type of recommendation you selected.

Step 11 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache. See Resolving Conflicts and Committing Policy Changes for more information.