http://www.wireshark.com
https://www.e-fense.com/store/index.php?_a=viewProd&productId=11
https://submit.symantec.com/websubmit/basic.cgi Web Site Expected information_ First Name: Last Name: Company Name: Email Address: contact ID: File to Upload: (Please submit no more than 9 files in any zip file regardless of size. Total Size should not be greater than 10MB.) Symptoms: What symptoms are you seeing? - Increased email activity - Ports opened/used, and protocols used - Anti-virus software is being disabled - Files being deleted - Network traffic - Users being locked out of their accounts - Error messages - Blue screens - Registry keys being created
https://submit.symantec.com/websubmit/platinum.cgi Web Site Expected information_ First Name: Last Name: Company Name: Email Address: contact ID: File to Upload: (Please submit no more than 9 files in any zip file regardless of size. Total Size should not be greater than 10MB.) Symptoms: What symptoms are you seeing? - Increased email activity - Ports opened/used, and protocols used - Anti-virus software is being disabled - Files being deleted - Network traffic - Users being locked out of their accounts - Error messages - Blue screens - Registry keys being created
Users should be familiar with the methods that malicious code uses to propagate and the symptoms of infections. Holding regular user education sessions helps to ensure that users are aware of the risks that malicious code poses. Teaching users how to safely handle email attachments should reduce the number of infections that occur.
Bulletins regarding new malicious code threats provide timely information to incident handlers.
Host-based IDPS software, particularly file integrity checkers, can detect signs of malicious code incidents, such as configuration changes and modifications to executables.
Antivirus software should be deployed to all hosts and all applications that may be used to transfer malicious code. The software should be configured to detect and disinfect or quarantine malicious code infections. All antivirus software should be kept current with the latest virus signatures so the newest threats can be detected.
Files that are very likely to be malicious should be blocked from the environment, such as those with file extensions that are usually associated with malicious code and files with suspicious combinations of file extensions.
Many worms spread through unsecured shares on hosts running Windows. A single infection may rapidly spread to hundreds or thousands of hosts through unsecured shares.
Network and host-based intrusion detection software (including file integrity checking software) is valuable for detecting attempts to gain unauthorized access. Each type of software may detect incidents that the other types of software cannot, so the use of multiple types of computer security software is highly recommended.
Incidents are easier to detect if data from all hosts across the organization is stored in a centralized, secured location.
A password compromise may force the organization to require all users of an application, system, or trust domain—or perhaps the entire organization—to change their passwords.
By limiting the types of incoming traffic, attackers should be able to reach fewer targets and should be able to reach the targets using designated protocols only. This should reduce the number of unauthorized access incidents.
Unsecured modems provide easily attainable unauthorized access to internal systems and networks. Remote access clients are often outside the organization’s control, so granting them access to resources increases risk.
This action permits the organization to allow external hosts to initiate connections to hosts on the DMZ segments only, not to hosts on internal network segments. This should reduce the number of unauthorized access incidents.
Every service that is running presents another potential opportunity for compromise. Separating critical services is important because if an attacker compromises a host that is running a critical service, immediate access should be gained only to that one service.
Deploying host-based or personal firewall software to individual hosts and configuring it to deny all activity that is not expressly permitted should further reduce the likelihood of unauthorized access incidents.
The password policy should require the use of complex, difficult-to-guess passwords and should ensure that authentication methods are sufficiently strong for accessing critical resources. Weak and default passwords are likely to be guessed or cracked, leading to unauthorized access.
AutoRuns Tool http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx
Process Explorer http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx
https://submit.symantec.com/websubmit/basic.cgi Web Site Expected information_ First Name: Last Name: Company Name: Email Address: contact ID: File to Upload: (Please submit no more than 9 files in any zip file regardless of size. Total Size should not be greater than 10MB.) Symptoms: What symptoms are you seeing? - Increased email activity - Ports opened/used, and protocols used - Anti-virus software is being disabled - Files being deleted - Network traffic - Users being locked out of their accounts - Error messages - Blue screens - Registry keys being created
https://submit.symantec.com/websubmit/platinum.cgi Web Site Expected information_ First Name: Last Name: Company Name: Email Address: contact ID: File to Upload: (Please submit no more than 9 files in any zip file regardless of size. Total Size should not be greater than 10MB.) Symptoms: What symptoms are you seeing? - Increased email activity - Ports opened/used, and protocols used - Anti-virus software is being disabled - Files being deleted - Network traffic - Users being locked out of their accounts - Error messages - Blue screens - Registry keys being created
Using Application and Device Control in Symantec Endpoint Protection (SEP) to log activity to common loading points for threats http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2009101207390448?Open&docid=2010011510455048&nsf=ent-security.nsf&view=854fa02b4f5013678825731a007d06af
How to increase the sensitivity of Proactive Threat Protection in Symantec Endpoint Protection 11.x http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2009120214031748?Open&docid=2010011510455048&nsf=ent-security.nsf&view=854fa02b4f5013678825731a007d06af
https://submit.symantec.com/websubmit/basic.cgi Web Site Expected information_ First Name: Last Name: Company Name: Email Address: contact ID: File to Upload: (Please submit no more than 9 files in any zip file regardless of size. Total Size should not be greater than 10MB.) Symptoms: What symptoms are you seeing? - Increased email activity - Ports opened/used, and protocols used - Anti-virus software is being disabled - Files being deleted - Network traffic - Users being locked out of their accounts - Error messages - Blue screens - Registry keys being created
https://submit.symantec.com/websubmit/platinum.cgi Web Site Expected information_ First Name: Last Name: Company Name: Email Address: contact ID: File to Upload: (Please submit no more than 9 files in any zip file regardless of size. Total Size should not be greater than 10MB.) Symptoms: What symptoms are you seeing? - Increased email activity - Ports opened/used, and protocols used - Anti-virus software is being disabled - Files being deleted - Network traffic - Users being locked out of their accounts - Error messages - Blue screens - Registry keys being created