Views:

The Intrusion Prevention rules using ransomware-client and ransomware-server Application Type monitor almost all ports on a target machine. This is required because ransomware doesn't really have an application type or (specific port) that it uses. There is a trade-off using these Intrusion Prevention rules, in order for them to be effective and catch ransomware activities, the rules need to have visibility over a wider range of network ports. This can cause additional latency especially on backup software or software that generates a lot of network traffic using their own custom port numbers.

A. Excluding Application Ports from Application Type

As a workaround to avoid scanning network traffic from trusted applications, you can identify the port numbers used by these applications.

In this example here, we have a backup software that uses (TCP Port 1556 and 13724). It generates a lot of backup traffic over these port numbers.

We can exclude the ports used (13724 and 1556) by the backup software and change the port list used by application types ("Suspicious Client Ransomware Activity" and "Suspicious Server Ransomware Activity").

  1. Go to Policies → Common Objects → Rules → Intrusion Prevention Rules → Click on Application Types.

  2. On the screen that appears. On the top right corner search box. Type in the keyword "Ransomware". It will show both these application types.

  3. Select the Application Type and click the Properties button. In the window that appears, click on the Edit button.

  4. Edit the "port list" create an exception by excluding the port number (1556 and 13724 from the range of port numbers, for example.
    1-138
    144-444
    446-1555
    1557-13723
    13725-65535
  5. Click Okay to save the changes.
  6. Apply similar action to other ransomware application type.

B. How to check if Intrusion Prevention rules are included in Scan for Recommendation.

Some Intrusion Prevention rules can be assigned automatically to computers using Scan for Recommendation. While some rules are excluded from recommendation scan and have to be assigned manually. You can review the list of rules using these steps:

  1. Go to Policies → Common Objects → Rules → Intrusion Prevention Rules → Click on Columns. Select the checkbox for Recommendable. This allows us to see if a rule is included or not in Scan for Recommendation.

  2. On the top right corner of the Web Console, type in this keyword "Ransomware Activity" in the search box.

  3. It will display all Intrusion Prevention rules that are using either Suspicious Client Ransomware Activity or Suspicious Server Ransomware Activity.

  4. Take note of the column "Recommendable".
    • Rules which are set to No means they don't get assigned automatically by Recommendation Scan.
    • Rules that are set to yes can be assigned automatically by Recommendation Scan.
    • Rules that are set to yes, it is possible to configure the DPI rule to be excluded from recommendation scan. Go into the rule Properties → Options Tab → Exclude from Recommendations, after this change it will show "No (Excluded from Recommendations)"

Setting this configuration will prevent the rules from being assigned automatically.

C. Check your "Maximum TCP Connection" configuration, make sure it is not using 1000.

The Suspicious Client/Server Ransomware Activity Application Type allows the Network Engine to monitor more ports than before. This translates to more traffic being analyzed by the Network Engine and this may also increase the number of connection count in the Network Engine state table. If the Max TCP Connection is using the minimum value of 1000, once the state table connection count goes above 1000, it will cause traffic to be blocked by Network Engine if the Network Engine is configured to use Inline mode.

To check whether you are affected by this configuration, you can review recent Firewall Events. Packets dropped due to the Maximum TCP Connection setting are logged under the Column field "Reason" as "Max TCP Connection".

Make sure your Max TCP Connection is configured to use 1,000,000. You can check this configuration under Computer Properties Page or Policies → Settings → Advanced Tab → Network Engine Settings → Advanced Network Engine Options → Maximum TCP Connections

​​
 
If you upgraded Deep Security Manager from an older version, the default value may still be using 1,000. On new manager installation, the default value is now configured to use 1,000,000.