Prevention Recommendations
- Make sure all of the machines have WFBS agent installed, have updated Agent and pattern version.
-
Follow the best configuration practices in the following KB articles:
-
Change the scan settings of Real-Time Scan and Scheduled Scan from Active Action to Customized Actions.
For Real Time Scan
- Go to Devices.
- Select a group.
- Click Configure Policy. The Configure Policy: <group name> screen appears.
- Click Antivirus/Anti-spyware.
- Go to the Actions tab, under For Malware Detections, tick the Set action of Probable malware and set to “Quarantine”.
For Scheduled Scan
- Navigate to Scans > Scheduled Scan.
- Under the Settings tab, select a group.
- Go to the Actions tab, under For Malware Detections, tick the Set action of Probable malware and set to “Quarantine”.
-
Go to the Configure Policy screen by performing one of the following:
- Classic Mode: Go to SECURITY AGENTS and select a group. Click Menu icon (three vertical dots) > Configure Policy.
- Advanced Mode: Go to POLICIES > Policy Management. Click Add or click an existing policy.
- Click the Windows icon.
- Go to Scan Settings then under Real-Time Scan Scheduled Scan, select Configure Settings.
- Go to the Actions tab, under Virus/Malware, change from Active Action to Customized Action.
- Make sure that the action specified for “Probable Malware” is set to “Quarantine”.
- It is advisable to apply the same settings for both Manual and Scheduled Scan.
-
Provision Cloud App Security (TMCAS) to Protect Exchange Online, SharePoint, and OneDrive with the Best Practice, if TMCAS is available.
For detailed information, refer to the TMCAS BPG.
-
Network Best Practices.
-
Back up data regularly, keep offline backups, and verify integrity of backup process. Regularly back up critical data to minimize potential damage. A good strategy is keeping critical data in a secure location that would allow the organization to quickly get back on its feet. Practice the 3-2-1 rule: create three backup copies on two different media with one copy stored offsite.
Refer to the Trend Micro article: World Backup Day: The 3-2-1 Rule. - Implement network segmentation. Sensitive data should not reside on the same server and network segment as the email environment.
- Use two-factor authentication and strong passwords.
- Maintain only the most up-to-date version of PowerShell and uninstall older versions. Disable if not needed on certain endpoints.
- Adhere to the principle of least privilege, ensuring that users have the minimum level of access required to accomplish their duties. Limit administrative credentials to designated administrators.
- Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, secure location.
-
-
Email Best Practices.
- Implement Domain-Based Message Authentication, Reporting & Conformance (DMARC), a validation system that minimizes spam emails by detecting email spoofing using Domain Name System (DNS) records and digital signatures.(SPF and DKIM).
- Mark external emails with a banner denoting it is from an external source. This will assist users in detecting spoofed emails.
- Implement filters at the email gateway to filter out emails with known malspam indicators, such as known malicious subject lines, and block suspicious IP addresses at the firewall.