What Does Tmc Stand for on Domain_6
Summary
1. Overview:
Threat Digital Vaccine (ThreatDV), a combination of the Reputation Feed (formerly known as RepDV) and a malware filter package. Reputation Feed (RepFeed) is a subscription-based service that identifies and delivers suspect IP IPv4, IPv6 and Domain Name System (DNS) security intelligence feeds from a multi-vendor, global reputation database so that customers can actively enforce and manage reputation security policies using the TREND MICRO TippingPoint Next Generation Intrusion Prevention System (NGIPS) Platform.
The addresses are tagged with reputation, geographic, and other identifiers for ready and easy security policy creation and management. The Reputation Feed provides the addresses and tags multiple times a day (two hours on average) in the same manner as standard Digital Vaccines. You can choose to download addresses into the Reputation database automatically or manually.
Details Public 2. Standalone IPS systems and RepFeed Automatic RepFeed updates require a Security Management System (SMS). Only SMS controlled IPSs will be updated automatically, standalone IPS devices require a manual update of the RepFeed from TMC. In order to install RepFeed on standalone IPS, the IPS license package must reflect the fact that the IPS is authorized to install RepFeed. If the customer has purchased the RepFeed service, the license package associated with his device will be updated to reflect the RepFeed authorization. However, since a standalone IPS, does not update the License Package or the RepFeed automatically, the customer must access TMC and download the files and perform a manual update. 3. What IPS devices can use RepFeed? Only the IPS devices process RepFeed data, the SMS downloads the data from TMC and distributes it to the IPS device. The following devices can process the RepFeed data; 4. What RepFeed Version Should I use? Just as Digital Vaccines are created in different version numbers for different TOS versions, so are RepFeed' s different. If the IPS is controlled by an SMS: If the IPS is a standalone IPS 5. What are RepFeed filters used for? RepFeed filters are most commonly used for the following reasons: 6. What does the RepFeed score number mean? The score number assigned to each RepFeed entry signifies how much of a threat the IP address or DNS entry is thought to be. Data is gathered from various sources, it is analyzed and each IP address and/or DNS entry is assigned a score. The RepFeed data is gathered from the following organizations: 9. Can RepFeed entries be deleted or modified? The simple answer is no, RepFeed database entries provided by the RepFeed service are read-only and as such cannot be modified, only User-Provided Entries can be modified. If you find that an IP address or DNS entry is being reported as malicious and you know that this information is incorrect, you can submit a correction by contacting the Trend Micro Technical Assistance Center (TAC). Workaround: While you are not able to delete or modify a RepFeed service entry, you can create a "allow list" or user-provided entries that will in effect cancel out the entry that has been reported as malicious. User-Provided Entries take precedence over RepFeed entries. 10. What are Reputation Exceptions At times, you may need to have RepFeed filters focus on a specific set of IP addresses according to the needs of your network. To restrict all Reputation filters to run against specific IP addresses or Domain Name, you create an exception. Profile exceptions affect all Reputation filters. 11. What are Tag Categories Tag categories define the types of tags that may be used to tag reputation database entries. A tagged class can be created manually or by the Reputation DV. Tag categories created by the reputation service are read-only and may not be modified. All tag categories have the following attributes: 12. How to: This section provides information on configuring Reputation Settings, how to create RepFeed filters, Exceptions, and allow list. Notes and Points to Remember: 12.1. How to: Edit Reputation Settings Reputation Settings apply to all reputation filters in a profile. The Filter Matching Address setting specifies which address of an incoming packet is used when testing for a filter match. The Lookup Packet Handling setting specifies what the device should do with packets that arrive during a reputation lookup. Depending on your version of SMS the steps to edit the Reputation settings will differ. 12.2. How to: Add/Edit a Reputation Tag Category 12.3. How to: Delete a Reputation Tag Category 12.4. How to: Create/Edit a RepFeed filter NOTE: In the "Entry Selection Criteria" you can choose IPv4, IPv6, DNS Domain, or any combination. DNS Domain will only block the DNS lookup, so if the lookup does not go through the IPS, then it will not be blocked. You can also select "Includes Tagged Value", "Includes Untagged Value" or both. Tag Criteria 12.5. How to: Change the Precedence of a Reputation Filter 12.6. How to: Create or Edit a Reputation Domain Name Exception 12.7. How to: Create or Edit a Reputation IP Address Exception 12.8. How to: Create a allow list In order to create a "allow list" you will have to perform the following steps; A. Create a Tag Category B. Create User-Provided Entry C. Create a Reputation Filter Premium Internal Partner
RepFeed Scoring Numbers Score Explanation 80-100 These IP addresses are blocked by default. DVLabs highly recommends you block all traffic from these IP addresses. 60-79 These IP addresses known to be somewhat malicious, but DVLabs may not have enough corroborating information to make a stronger recommendation towards enabling them. 40-59 These IP addresses likely to be malicious; however, Trend Micro TippingPoint has not seen enough information to assign them a score of 60. 20-39 These IP addresses mostly non-malicious in nature but may have generated undesirable traffic such as SPAM or high levels of P2P traffic. 0-19 These IP addresses generally do not represent any threat but may have generated slightly suspicious traffic. DVLabs does not recommend you enabled these IP addresses.
7. What are the different RepFeed exploit categories?
RepFeed Exploit Category Exploit Explanation Blended Threat IP Address or DNS Name is known to attack using several different attack vectors. An example of hosts that fall into this category could be a host that is infected with slammer and is also hosting Malware. Botnet IP Address or DNS Name is known to participate as a Botnet Command and Control device. Many newer botnets communicate with nodes in a Peer to Peer fashion. In such cases, the RepFeed may contain the individual nodes in the botnet. Malware IP Address or DNS Name is known to be a distribution point for malware on the internet. Websites hosting malicious software are the most common hosts in this category. Miscellaneous IP Address or DNS Name does not fit into any category but are known to be malicious. Misuse and Abuse IP Address or DNS Name known to misuse resources. Hosts using click fraud, or sites misrepresenting themselves might fall into this category. Mobile IP Address or DNS Name is known to host malicious/suspicious mobile applications or participate in CnC-related communication with infected mobile devices. Network Worm IP Address or DNS Name is known to be infected with a network worm. Hosts infected with SQL Slammer/code red fall into this category P2P IP Address is known to be a central node for a Peer 2 Peer protocol. Phishing IP Address or DNS Name is known to have executed multiple Phishing attacks. Spam IP Address or DNS Name is known to be sending very large amounts of verified Spam traffic. This entry only contains devices sending very large amounts of spam. Spyware IP Address or DNS Name is known to be hosting significant amounts of Spyware. Spyware such as "Hotbar" and "WildTangent" fall into this category TOR Exit IP Address or DNS Name is known to be a node in an anonymous network, a gateway where encrypted Tor traffic communicates with the Internet. This tag consists of both published and unpublished Tor nodes. Web Application Attackers IP Address or DNS Name is known to attack using attacks against vulnerabilities in web application vulnerabilities. Attackers using SQL Injection, PHP File Include, and Cross-Site Scripting all fall into these categories. Worm These entries are known to be actively distribution self-replicating code, otherwise known as a network worm.
8. From where does the DV team gather RepFeed entries?
a. CollecTor Project collector.torproject.org b. Emerging Threats http://emergingthreats.net c. SANS Institute https://isc.sans.edu d. VIPRE Security www.vipre.com e. WebRoot http://www.webroot.com f. Zvelo (eSoft) http://www.zvelo.com
The reputation team consolidates the data received from the various sources and prepares the same for distribution. The RepFeed packages are then posted to the Threat Management Center (TMC) website from which the Security Management System (SMS) downloads the packages for distribution to the Intrusion Prevention System (IPS).
Tag Categories Attributes Column Description Name The name to identify this tag category. The specified name must be unique. Type The type of data that the tag category contains
Description A brief description (up to 255 characters) indicating how the tag category is to be used.
Rating: Category: Solution Id: Feedback Did this article help you? Thank you for your feedback!
What Does Tmc Stand for on Domain_6
Source: https://success.trendmicro.com/solution/TP000087691-Reputation-Feed-RepFeed
0 Response to "What Does Tmc Stand for on Domain_6"
Post a Comment