Acronis #CyberFit Cloud Tech Associate Advanced Security 2023 Handout
Acronis #CyberFit Cloud Tech Associate Advanced Security 2023 Handout
Acronis #CyberFit Cloud Tech Associate Advanced Security 2023 Handout
#CyberFit Academy
Meet your Instructor
Francisco Amadi
Partner Technology Evangelist EMEA
Francisco has been working in Acronis for over 14 years
Milan, Italy and he has over 19 years of experience in the IT industry
in training, presales, support and system administration
English and Italian areas. He was previously a Teacher of mathematics,
Francisco.Amadi@acronis.com physics and computer sciences in High School. He has
obtained multiple certifications from VMware, Microsoft
and CompTIA Security+.
.
#CyberFit Academy
Learning Objectives
#CyberFit Academy
Course Modules
1. Case Study
2. High Level Overview and Benefits
3. Core Solution - Security Components
4. Advanced Security - Technical
Discussion Part 1, 2, 3
5. Scenarios and Examples
#CyberFit Academy
Cyber Protect Cloud
Case Study
#CyberFit Academy
Meet Emma
(IT Manager of a SMB Company)
#CyberFit Academy
The Disaster and the Opportunity
#CyberFit Academy
Signing up
#CyberFit Academy
Cyber Protect Cloud
High Level Overview and Benefits
#CyberFit Academy
Integrated Platform
An integrated solution of cyber security, backup, disaster recovery,
management and automation built specifically for SPs
#CyberFit Academy
Integrated Platform
An integrated solution of cyber security, backup, disaster recovery,
management and automation built specifically for SPs
Security
Technicians
Owner
#CyberFit Academy
Cyber Protect Cloud
Core Solution
Security Components
#CyberFit Academy
Core Solution – Security Components
1. #CyberFit Score
2. Vulnerability Assessment
3. Device Control
4. Quarantine
5. Active Protection
6. Antimalware (without local signature-
based engine)
#CyberFit Academy
Cyber Protect Cloud
#CyberFit Score
#CyberFit Academy
Acronis #CyberFit Score
Simplify MSP operations and
service upselling
Assess the level of protection
of any machine:
Is backup enabled?
Is antimalware installed?
Is the firewall in place?
Are HDDs encrypted?
Is a VPN in use?
#CyberFit Academy
#CyberFit Score
0-579: Poor
580-669: Fair
670-739: Good
740-799: Very Good
800-850: Excellent
#CyberFit Academy
#CyberFit Score
#CyberFit
#CyberFit Academy Score
#CyberFit Score
#CyberFit
Score
#CyberFit Academy
#CyberFit Score
Help and
options
#CyberFit Academy
Cyber Protect Cloud
Vulnerability Assessment
#CyberFit Academy
Vulnerability Assessment
Discover a potential issue
before it happens
Information from NVD (National
Vulnerability Database)
CPOC sends information via
agent
Another vulnerability
assessment tool
• Great way to validate patching
Loss leader Opportunity
• Patching service opportunity
#CyberFit Academy
Vulnerability Assessment
CVE: Common Vulnerabilities and Exposures
CVSS Score (Common Vulnerability Scoring
System)
• Assigns severity scores: prioritize
responses/resources
• Low, Medium and High Severity Levels
a) Low: CVSS score of 0.1 – 3.9
b) Medium: CVSS score of 4.0 – 6.9
c) High:0 CVSS score of 7.0 – 10.0
d) None: 0
#CyberFit Academy
Vulnerability Assessment
What can be
scanned
Scheduling
options
#CyberFit Academy
Cyber Protect Cloud
Device Control
#CyberFit Academy
Device Control
#CyberFit Academy
Device Control
Device Control
settings
#CyberFit Academy
Device Control
Access settings
devices list
permission
#CyberFit Academy
Device Control
Redirected
devices
#CyberFit Academy
Device Control
Device types
allowlist
#CyberFit Academy
Cyber Protect Cloud
Quarantine
#CyberFit Academy
Quarantine
#CyberFit Academy
Actions with Quarantined Files
#CyberFit Academy
Quarantine
Quarantined files
#CyberFit Academy
Quarantine
Actions with
quarantined files
#CyberFit Academy
Cyber Protect Cloud
Active Protection
#CyberFit Academy
Active Protection
Backup industry’s most advanced David Walkiewicz,
anti-ransomware technology Director Test Research,
av-test.org
#CyberFit Academy
Active Protection
Protects against:
#CyberFit Academy
Active Protection
#CyberFit Academy
Active Protection
#CyberFit Academy
Active Protection
Protects collaboration and communications
applications (self-protection selection):
#CyberFit Academy
Active Protection
Monitoring processes:
#CyberFit Academy
Active Protection
#CyberFit Academy
Active Protection
Process Injection
#CyberFit Academy
Active Protection
Things to help
#CyberFit Academy
Active Protection
Behavior and how we respond
In place overwrite, rename or new file behavior
#CyberFit Academy
Active Protection
Behavior and how we respond
Master boot record (MBR) overwrite
#CyberFit Academy
Active Protection
Behavior and how we respond
In place, rename or new file with injection into known
good process
#CyberFit Academy
Active Protection
Threat actors ways
#CyberFit Academy
Cyber Protect Cloud
Antimalware
(without local signature-based engine)
#CyberFit Academy
Antimalware – Core Solution
3rd party antivirus present • Full scan: checks all files • Trust certain files,
when applying Protection on machine folders and processes
Plan Antimalware module: • Quick scan: checks only • Block specific
alert generated and on- machine system files processes
access protection • Detected threats
stopped to prevent quarantined and
conflicts automatically deleted
• To enable full after 30 days (default)
functionality:
disable/uninstall 3rd
party antivirus
#CyberFit Academy
Antimalware – Core Solution
#CyberFit Academy
Antimalware – Core Solution
#CyberFit Academy
Antimalware
Not part of the
core solution
Quarantined files
#CyberFit Academy
Behavior Engine
#CyberFit Academy
Stacktrace AI Analyzer
ML based malware detection
technology
Recognize legitimate/malicious
injections
Analysis of 25B+ processes
100M+ unique stacktrace
database
Advantages:
• Trusted processes monitoring
• Lightweight GBM ML model
• Fast response time: ~10 ms
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
Malicious items (or reported as malicious) enter
4 system, quarantine allows to review what was
triggered. Determine what to do: delete, restore or
add to allowlist.
#CyberFit Academy
Section Summary
AI-based behavior heuristics: protects against
6 unauthorized changes to Acronis processes,
alteration to back up agent, registry, configuration
files, executables and backups located in local
folders.
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Security
Technical Discussion – Part 1
#CyberFit Academy
Advanced Security Components Part 1
1. Forensic Backup
2. URL Filtering
3. Corporate Allowlist (automatic and
manual)
4. Backup Scanning (scanning cloud
backups for malware)
#CyberFit Academy
Forensic Backup
#CyberFit Academy
Forensic Backup
What is it?
US-CERT (Computer Emergency Readiness Team) Main Goal:
#CyberFit Academy
Forensic Backup
What is it?
Capture original data in unaltered state
IMAGE CLONE
▪ Not for working copy (evidence ▪ Working copies for analysis (could
preservation purpose) be for preservation purposes)
▪ Bit by bit copy is an image VS
#CyberFit Academy
Hash
Hash signature
Cryptographically secure checksum to prove
byte stream did not change
Difference in hash value between original and
a copy? Confirms not exact copies
Hash applied to entire image
#CyberFit Academy
Forensic Backup
Recovery:
• Recovered as entire machine
#CyberFit Academy
Forensic Backup Process
.DMP
1. Collects raw memory 2. Reboots machine 3. Creates backup 4. Notarizes backup 5. Reboots into OS
dump and then list of into bootable (occupied and and continue plan
running processes environment unoccupied space) execution
#CyberFit Academy
Forensic Backup
Notarization certificate
download:
• Entire machine recovery task from
forensic backup
• Select Get certificate from Disk
mapping view1
#CyberFit Academy
Forensic Backup
Notarization:
prove authentic and unchanged since backup
4. Verifying authenticity
#CyberFit Academy
Forensic Backup
When needed:
• Create a protection plan with machine to select for forensic backup and
turn forensics on
• Perform backup process and verify certificate produced
• One can delete the protection plan (only purpose was forensic backup at
that time) for that machine
#CyberFit Academy
Forensic Backup
Enable collection
of forensic data in
Backup options
#CyberFit Academy
Forensic Backup
Recover Forensic
data
#CyberFit Academy
Forensic Backup
Select Forensic
data to recover
#CyberFit Academy
VIDEO – Forensic Process
#CyberFit Academy
URL Filtering
#CyberFit Academy
URL Filtering
#CyberFit Academy
URL Filtering
URL Filtering
settings
#CyberFit Academy
URL Filtering
Warning alert
when URL is
blocked
#CyberFit Academy
URL Filtering
#CyberFit Academy
Corporate Allowlist
#CyberFit Academy
Corporate Allowlist
• Applications detected as false positive by antivirus
solutions
• Need to add manually as trusted application to whitelist
(avoid unwanted errors and disruptions)
• Automate by scanning cloud backups:
• Scan backups: two or more machines and enable
Automatic generation of whitelist
• Level of heuristic detection configurable:
Default | Low | High
• Automatic generation of allowlist enabled, manual adding
of applications will be available (seven days to run)
• Allowlist used by all agents during antimalware scanning
#CyberFit Academy
Corporate Allowlist
#CyberFit Academy
Corporate Allowlist
Enable Automatic
generation of
whitelist and level of
heuristics
#CyberFit Academy
Backup Scanning
#CyberFit Academy
Backup Scanning
• Windows OS:
• Only Entire machine or disks/volumes backups scanned
• NTFS file system with GPT or MBR partitioning volumes
• Acronis Cloud Backups only
• After backup scanning plan created, placed in queue for execution
• May take time for scan to start/complete depending on queue; will
show Not scanned status until scanning complete
• Status of backup once completed: No malware | Malware detected
#CyberFit Academy
Backup Scanning
Create
Backup
Scanning
plan
#CyberFit Academy
Backup Scanning
Backup
Scanning
plan settings
#CyberFit Academy
Section Summary
Forensic backup goal: identify, collect (in unaltered
1 state), preserve, and analyze data. Enables
investigation in the event of security incident.
Forensic backup takes snapshot of unused disk
space, full memory dump, snapshot of running
2 processes and entire machine backup. It is
automatically notarized.
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Security
Technical Discussion – Part 2
#CyberFit Academy
Advanced Security Components Part 2
1. Safe Recovery
2. Windows Defender Antivirus/Microsoft
Security Essentials Integration
3. Microsoft Defender Firewall
Management
4. Remote Wipe
5. Smart Protection Plans
#CyberFit Academy
Safe Recovery
#CyberFit Academy
Safe Recovery
#CyberFit Academy
Safe Recovery
Enable Safe
Recovery
#CyberFit Academy
Windows Defender Antivirus /
Microsoft Security Essentials Integration
#CyberFit Academy
Windows Defender / Security Essentials Antivirus
#CyberFit Academy
Windows Defender / Security Essentials Antivirus
Windows
Defender
Antivirus
settings
#CyberFit Academy
Windows Defender / Security Essentials Antivirus
Microsoft
Security
Essentials
settings
#CyberFit Academy
Microsoft Defender
Firewall Management
#CyberFit Academy
Firewall management for Microsoft Defender
#CyberFit Academy
Firewall management for Microsoft Defender
Microsoft
Defender Firewall
settings
#CyberFit Academy
Firewall management for Microsoft Defender
Enable Microsoft
Defender Firewall
#CyberFit Academy
Remote Wipe
#CyberFit Academy
Remote Wipe
#CyberFit Academy
Remote Wipe
Remote Wipe
setting in
machine Details
#CyberFit Academy
Smart Protection Plans
#CyberFit Academy
Smart Protection Plans
#CyberFit Academy
Smart Protection Plans
Cyber Protection
#CyberFit Academy widgets
Smart Protection Plans
#CyberFit Academy
Smart Protection Plans
Select
recommended
actions to take
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Security
Technical Discussion – Part 3
#CyberFit Academy
Advanced Security Components Part 3
1. Exploit prevention
2. Local signature-based detection
antimalware
3. Real-time antimalware protection
#CyberFit Academy
Exploit Prevention
#CyberFit Academy
Exploit Prevention
• Memory protection
• Code injection
• Privilege escalation
• ROP protection (return-oriented programming)
#CyberFit Academy
Exploits
#CyberFit Academy
Exploits
#CyberFit Academy
Exploit Prevention
#CyberFit Academy
Local Signature-Based
Detection Antimalware
#CyberFit Academy
Local Signature Based Detection
#CyberFit Academy
Real-time Antimalware
scanning
#CyberFit Academy
Real-time Antimalware Scanning
#CyberFit Academy
Section Summary
Exploit Prevention detects and prevents different
1 malicious processes from exploiting various
vulnerabilities on a system including memory
protection, code injection, privilege escalation and
return-oriented programming.
Local signature based detection used for known
2 threats. Since running local on machine can
process at a higher speed and produce low false
positive rates to known threats. Slow Internet
connections benefit.
Real-time antimalware scanning runs in background
3 depending on scan mode setting of on-
access(default) or on-execution.
#CyberFit Academy
Cyber Protect Cloud
Advanced Security Pack
Scenarios and Examples
#CyberFit Academy
Topics for Scenarios and Examples
1. Forensic Backup
2. Active Protection
• Ransomware – Live Malware
• Self Protection – MS Teams exploited
• Cryptomining - XMRig
3. URL Filtering
• Live malicious URL’s and trusted and blocked
4. Device Control
• Lock down of USB port yet use other items on port
• Protection of intellectual property
#CyberFit Academy
Forensic Backup
#CyberFit Academy
Scenarios and Examples – Forensic Backup
• Ransomware distributors
• Intellectual property theft cases
• Espionage
• Fraud
• Employment disputes
• Using email/messaging services for inappropriate things
• Other reasons
• Bankruptcy investigations
• Issues surrounding regulatory compliance
#CyberFit Academy
Scenarios and Examples – Forensic Backup
#CyberFit Academy
Scenarios and Examples – Forensic Backup
Already attacked?
#CyberFit Academy
Scenarios and Examples – Forensic Backup
#CyberFit Academy
Scenarios and Examples – Forensic Backup
CERT statement
#CyberFit Academy
Scenarios and Examples – Forensic Backup
#CyberFit Academy
Scenarios and Examples – Forensic Backup
Final Thought
#CyberFit Academy
Active Protection
#CyberFit Academy
Scenarios and Examples – Active Protection
#CyberFit Academy
URL Filtering
#CyberFit Academy
Scenarios and Examples – URL Filtering
#CyberFit Academy
Device Control
#CyberFit Academy
Scenarios and Examples – Device Control
#CyberFit Academy
Thank you for watching!
#CyberFit Academy
Cyber Foundation
Building a More Knowledgeable Future
#CyberFit Academy
Cyber Protect Cloud
APPENDIX
Top Troubleshooting Issues
#CyberFit Academy
Set Up Exclusion Settings /
Processes Have No Path
Problem
Receive a false positive alert about
suspicious process from Active
Protection
Want to exclude process (add to
“Trusted” processes), but no exact
path for exclusion
Process has new name or new
location by each run
Excluding entire folder where
process is located does not help
#CyberFit Academy
Set Up Exclusion Settings /
Processes Have No Path
Cause
Active Protection – zero-day technology /
behavioral heuristics
Constantly observing patterns in how data
files being changed in system
One set behaviors typical and expected.
Another: signal a suspect process taking
hostile action
Looks at actions and compares against
behavior patterns
Exact path to executable is required to
exclude a specific process from monitoring
Not possible to exclude all processes in a
specific folder
#CyberFit Academy
Set Up Exclusion Settings /
Processes Have No Path
Solution
Workaround 1: Active protection always
monitors processes that do not have a valid
signature. If possible, update the software or
contact the vendor to add valid signature to
process files
Workaround 2: Instead of adding process to
“Trusted” list: exclude the folder where
process performs value changes (example:
folders with databases that are being
updated by affected “suspicious” processes)
Side note: not possible to exclude a file or
executable located on a network share from
Active Protection Monitoring. Adding to
exclusions supported only for local NTFS
volumes.
#CyberFit Academy
Alert – Windows Defender Is
Blocked
Problem
When Acronis Antimalware Real-time
protection conflicts with a third-party
antivirus or Windows Defender,
Acronis generates alerts
Unclear to partners – three alerts
#CyberFit Academy
Alert – Windows Defender Is
Blocked
Cause
“Windows Defender Is Blocked By A
Third-Party Antivirus Software: Windows
Defender Blocked because Acronis
Cyber Protect installed on machine”
Both Defender and Acronis real-time
protection are enabled – not good to run
two AV real-time on one machine
#CyberFit Academy
Alert – Windows Defender Is
Blocked
Cause
“Windows Defender Is Blocked By A Third-
Party Antivirus Software: Windows Defender
Blocked because ANY third-party A/V and
Acronis Cyber Protect Is Installed On The
Machine”
Some third party running: both Acronis and
Defender enabled in protection plan
Want to use third party
Disabled Acronis real-time protection, URL
Filtering and Windows Defender
Want to use Acronis
Uninstall third party A/V and disable
Windows' Defender from the protection plan
#CyberFit Academy
Alert – Windows Defender Is
Blocked
Cause
“Detected a conflict with security protect.
Real-time Antimalware was not enabled
because it conflicts with another security
solution <vendor name> installed on machine
<machine name>
Acronis real-time protection is enabled in
protection plan and third-party A/V is installed
on machine
#CyberFit Academy
Links to KB Articles – Top
Troubleshooting Issues
• Set Up Exclusion Settings / Processes
Have No Path
• https://kb.acronis.com/content/69641
• Windows Defender Blocked
• https://kb.acronis.com/content/68358
#CyberFit Academy