Brksec 3446
Brksec 3446
Brksec 3446
Endpoint Security,
Your Last Line of Defense
How
1. Find this session in the Cisco Live Mobile App
2. Click “Join the Discussion”
3. Install Spark or go directly to the space
4. Enter messages/questions in the space
cs.co/ciscolivebot#BRKSEC-3446
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Endpoint Security, Your Last
Line of Defense
Aaron Woland, CCIE# 20113
Principal Engineer
Advanced Threat Security
loxx@cisco.com
@AaronWoland
http://www.networkworld.com/blog/secure-network-access/
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Sarcasm
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Disclaimer: “All Comments are my own, and are
not representative of Cisco…
Any correlation to real live persons or
situations was completely unintentional...
Blah Blah Blah...”
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Important: Hidden Slide Alert
https://cisco.app.box.com/v/Loxx-Public
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Please Fill Out The Survey!
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Cisco Spark
Questions?
Use Cisco Spark to communicate
with the speaker after the session
How
1. Find this session in the Cisco Live Mobile App
2. Click “Join the Discussion”
3. Install Spark or go directly to the space
4. Enter messages/questions in the space
cs.co/ciscolivebot#BRKSEC-3446
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
• Endpoint Security Strategy
• Cisco Security Connector (Overview)
• Apple & Cisco Partnership
• CSC Details
• AnyConnect
• Network Visibility Module
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Generalized endpoint security strategy
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
AnyConnect
• NVM, Umbrella Roaming Security,
per-App VPN, Posture Assessment,
Secure LAN & WLAN Access
Advanced Malware Protection (AMP)
• File-based malware
• File-less malware
• Anti-Virus
Device Management
• Meraki SM, or MDM EcoSystem
• Active Directory
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
AnyConnect
• NVM, Umbrella Roaming Security,
perApp VPN, Posture Assessment
Advanced Malware Protection (AMP)
• File-based malware
• File-less malware
• Anti-Virus
macOS Device Management
• Meraki SM, or MDM EcoSystem
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
AnyConnect
• NVM*, per-app VPN
Advanced Malware Protection (AMP)
• APK Security
Device Management
• Meraki SM, or MDM EcoSystem
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Introducing:
The Cisco
Security
Connector (CSC)
iOS for iOS
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Apple | Cisco Partnership
Phase 2
Tim Cook (Apple CEO) joined
Chuck Robbins (Cisco CEO)
on the main stage at Cisco
Live & announced the Cisco
Security Connector to the
world.
Cisco Security Connector
Visibility
Gain insight into activity on iOS devices during incident
investigations
Control
Defend against phishing attacks
and accidental browsing of bad sites
Cisco Security Connector - Services
VISIBILITY
• App-layer auditing and correlation via net new iOS 11 functionality
• Logs encrypted URL requests without SSL decryption
• Available to AMP for Endpoints customers at no extra charge
if subscription’s device count already covers iOS devices
Umbrella Clarity
app extension app extension
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Seamless UX for admin-users
One-time registration syncs all products together
PUSHES PUSHES
Umbrella iOS identities1 Meraki SM iOS identities1 AMP Clarity
dashboard can create or pull dashboard
maps policies PULLS Umbrella or PULLS maps policies to
to identities Umbrella policies Clarity policies Clarity policies identities
PULLS PUSHES
Per-device Per-device configurations for
iOS identities1 the Cisco Security Connector
reflecting one or both policies
Supervised
1. iOS identities include
devices
automatically enrolled device serial numbers, friendly
with Meraki names, and group profiles.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Why MDM / EMM?
Systems Manager API Gates Access to System & Security Functions
• Many functions are restricted to the Device Policy owner (the MDM)
• That MDM is required to delegate the functions to the security apps & in some cases
(Android) that MDM Must also be the security app; no delegation is possible.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
How it works:
Supervised mode for iOS
Cisco Security Connector is
for supervised devices only
Enterprise-owned, supervised
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
iOS supervision
• Introduced in iOS 5 to differentiate enterprise-owned iOS
devices
• Enabled using Device Enrollment Program & MDM (out
of the box) or Apple Configurator (manual)
• Allows greater control: app restrictions, silent app push,
block AirDrop, prevent device wipe, provision Cisco
Security Connector (requires iOS 11)
• Note: ½ of the customers interviewed have some iOS
supervision already!
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Apple iOS Details
ForYour
For Your
Reference
Reference
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
ForYour
For Your
Reference
Reference
How DEP works
Cisco Meraki Systems Manager
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
ForYour
For Your
Reference
Reference
Supervised devices
• Only for Corporate Owned Devices.
• Provides the Organization Full Control
Over all Aspects of the iOS Endpoint
• Device Enrollment Program (DEP):
Automate enrollment of Apple devices
into a mobile device management
solution to streamline deployment.
• DEP is not required for Supervised Mode,
but it adds a lot of value.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Why Supervised? Why VPP?
Supervised:
• Allows full device control.
• Examples: can’t change wallpaper, can’t delete apps/configs, prevent installing apps, etc.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Four Scenarios for Devices
1. Bring Your Own Device (BYOD)
2. Corporate Provided – Supervised
3. Corporate Provided – DEP – Not Supervised
4. Corporate Provided – Not Supervised
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Bring Your Own Device (BYOD)
X
• Device is owned by the Employee
• Device may still use MDM, but won’t be used in Supervised Mode
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Corporate Provided – Supervised
• Device Purchased and Supplied by the Organization
• Managed by an MDM
• It is technically possible to be in Supervised Mode without MDM, but not likely.
• Device can run Cisco Security Connector (CSC) – Simply by Installing it along
with a configuration.
• CSC is available via the Volume Purchase Program (VPP).
• VPP requires an MDM to be used to install & license the App
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Corporate Provided – Not Supervised – DEP
• Device Purchased and Supplied by the Organization with the Device Enrollment
Program (DEP)
• Device can only run Cisco Security Connector (CSC) if in Supervised Mode:
• Since DEP enabled, the endpoint may be reactivated remotely and put into Supervised
Mode. (No tethering required)
• Reactivation erases the data, and “resets” the iOS device.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Corporate Provided – Not Supervised – No DEP
• Device Purchased and Supplied by the Organization
• Did not use DEP.
• Device is Not in Supervised Mode
• Device can only run Cisco Security Connector (CSC) if in Supervised Mode:
• Must tether the endpoint and use the Apple Configurator 2 application to reactivate the
endpoint.
• Reactivation erases the data, and “resets” the iOS device.
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
State of the industry comparison for
iOS: Protection & Control
PROBLEM #1 PROBLEM #2
Enforcement problems Not compatible concurrently
with enterprise remote access
Users can turn off VPN
even in supervised mode
With on-demand Cloud VPN
Internet
IPsec VPN profile proxy headend
Visibility and
control lost
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Provisioning problems
With on-demand IPsec VPN profile
PROBLEM #1 PROBLEM #2
Apps (often via users) register Admins manually-register devices
devices 1-by-1 with cloud 1-by-1 with MDM
Supervised devices
MDM tool and security apps
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Enforcement PROBLEM #1 WORKAROUND
problems Browser session expires many times
per day, and is disruptive to end-
For managed locations only, admin must
configure proxy chaining and router
With global HTTP proxy users tunneling
Cloud On-prem On-prem Cloud
proxy proxy router proxy
Supervised Supervised
device Browser: Can I go here? device Doesn’t
Proxy: Don’t remember you? work
over 4G Complex:
Browser’s user: Ugh, it’s me again! IP surrogate and
Sad admin XFF forwarding
PROBLEM #2 WORKAROUND
Non-browser apps running Admin must figure out all URLs to bypass
in background stop working to avoid breaking app
Cloud Hosted
proxy PAC file
Supervised Supervised
device App: HTTP/S-only requests Never- Plus, lost device
Proxy: Don’t remember you? ending visibility and
burden control lost
App has no user: Request fails
Sad admin
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Overcoming all problems
With Umbrella’s native DNS-layer enforcement
Cisco Umbrella
global network
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
State of the industry comparison for
iOS: Visibility
Visibility problems
With app traffic flows
PROBLEM #1 WORKAROUND(S):
Traffic flow capture is non-existent off-network Use VPN or MDM container with specialized apps
No visibility for
cellular or
unmanaged
Customer premises Router networks
Private Private
tunnel Customer premises tunnel Customer premises
PROBLEM #2 WORKAROUNDS:
Traffic flow capture is limited on-network MiTM (Man-in-The Middle) approach via web proxy
to decrypt traffic
Encrypted site
Encrypted site
Router
Apps like Dropbox
Customer premises Router
use certificate pinning,
which breaks MiTM
No visibility
for TLS-
Record Switch Private Supervised encrypted
collector Wi-fI device URLs*
* Clarity gets the URLs before they’re encrypted. Cert Pinning is bypassed Record Switch Private Supervised
because we get the URLs early enough (no MitM). collector Wi-Fi device
Clarity collects URLs from all native apps, Clarity learns about URLs before TLS
not just special or containerized apps. encryption and sends this data to AMP.
HTTP/S and raw socket support. Supervised device and
Cisco Security Connector
Clarity app extension enabled
AMP/Clarity
console Security operations MDM-supervised devices System admins
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
State of the industry comparison for
iOS: Device Administration
ForYour
For Your
Reference
Reference
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
ForYour
For Your
Reference
Reference
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
ForYour
For Your
Reference
Reference
meraki.com/form/systems-manager-signup
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Warning:
Demo Time: Attempting a Live
Clarity & Demo at Cisco
Umbrella Live
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
One-Time Registration Process
Explained
Cisco Security Connector
Push
Link to MDM Endpoint
Umbrella
Query Registers w/
UMBRELLA Config into
Policies Umbrella
DASHBOARD 3 4 Policy
Policy
Add APP Create Tag the
Modified via
+ VPP Policy to be App, Policy
API and
MERAKI Licenses Updated and Devices
DASHBOARD 1 2 Saved 5
New
Endpoints:
SUPERVISED App & Policies
iOS Automatic
Applied
ENDPOINTS
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Cisco Security Connector
Download
Endpoint
Umbrella
Registers w/
UMBRELLA Cert &
Umbrella
DASHBOARD 2 Config
Upload or
Add APP Tag the
Paste
+ VPP App, Policy
Configs into
SUPPORTED Licenses and Devices
MDM 1 3 MDM 4
Download Endpoint
Create iOS
Clarity Registers w/
AMP CLARITY Policy
Config Clarity
CONSOLE 1 2
New
Endpoints:
SUPERVISED App & Policies
iOS Automatic
Applied
ENDPOINTS
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Cisco Security Connector
Ecosystem MDMs
• Every MDM is different.
• Some support the new functions in iOS 11, some do not.
• Some support custom mobileconfig policies, some do not.
• Each one has a very different procedure in order to support pushing CSC & its
configurations
• No integrated offering with 3rd party MDMs to-date
• It is a very manual process
• Some MDMs support uploading the XML configuration
• Others require editing the XML manually & performing a copy/paste into the MDM UI.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Table of Tested MDMs ForYour
For Your
Reference
Reference
Cisco VMWare
Mobile Iron Jamf Pro IBM MaaS360
Meraki SM AirWatch
Supported X X
BETA - Feb 2018 Feb 2018 TBD -
Integrated
Approach via X X X X
API
Clarity Config
upload Merged w/
Umbrella Umbrella into
Config upload Paste Single Config
or Paste
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Warning:
Attempting a Live
Demo Time: Demo at Cisco
Integration Live
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
UI/UX preview:
Cisco Security Connector
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
SECURITY CONNECTOR UI/UX PREVIEW
ForYour
For Your
Reference
Reference
Simple end-user UI displays status and info
Note: Nothing can be edited by end-user
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
UI/UX preview:
Cisco AMP Clarity
TRAJECTORY
Timeline of app usage per
endpoint. Click on entry and
details to the right.
DOMAIN DESTINATIONS
Organized by domain,
lists of full URLs.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
AMP CLARITY UI/UX PREVIEW
ForYour
For Your
Reference
Reference
Device trajectory
DETAILED TIMELINE
One line per app
click on entry and
details to the right.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
AMP CLARITY UI/UX PREVIEW
ForYour
For Your
Reference
Reference
OBSERVED APPS
See the most observed
and least observed apps
in your iOS deployment.
UNSEEN DEVICES
Lists iOS endpoints
that have not checked
in with AMP cloud.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
AMP CLARITY UI/UX PREVIEW
ForYour
For Your
Reference
Reference
MATCHING
APPS
PIVOT
To app or
device
trajectory
MATCHING
IOS ENDPOINTS
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
AMP CLARITY UI/UX PREVIEW
ForYour
For Your
Reference
Reference
ENDPOINT GROUP
Uses the same endpoint
groups that AMP admins
are already used to.
MERAKI SM
Select the organization and
network from the Meraki SM.
Select the existing profiles to
update w/Clarity config.
THIRD-PARTY MDM
For manual use.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Step By Step Configuration in the
Hidden Slides
UI/UX preview:
Cisco Umbrella
ForYour
For Your
Reference
Reference
Admin workflow
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
UMBRELLA UI/UX PREVIEW
ForYour
For Your
Reference
Reference
Initial setup
LINK TO MDM
Just paste the MDM’s API
key into Umbrella, then select
MDM profiles to provision the
Umbrella app extension (and
root cert) onto iOS devices.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
UMBRELLA UI/UX PREVIEW
ForYour
For Your
Reference
Reference
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
UMBRELLA UI/UX PREVIEW
ForYour
For Your
Reference
Reference
FULL CONTEXT
Real-time visibility everywhere Click identities or
destinations to
see all activity.
INSTANT FILTERS
Search activity per
attribute or many
with advanced
search.
WHO’S ATTACKED?
Umbrella’s statistical
models identify more
threats (e.g. phishing)
than others.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
UMBRELLA UI/UX PREVIEW
ForYour
For Your
Reference
Reference
WHO’S IMPACTED
Which mobile
devices as well as
networks, roaming
computers, and
users requested it.
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
UMBRELLA UI/UX PREVIEW
ForYour
For Your
Reference
Reference
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
UI/UX preview:
Cisco Meraki Systems Manager
CLARITY
CONFIGURATION
Settings can be
pushed from AMP
Clarity and Umbrella
admin consoles to
Systems Manager or
created in Systems
Manager.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
MERAKI SM UI/UX PREVIEW
ForYour
For Your
Reference
Reference
UMBRELLA
CONFIGURATION
Settings can be
created in Systems
Manager or pushed
from AMP Clarity
dashboard and
Umbrella admin
consoles to
Systems Manager.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
MERAKI SM UI/UX PREVIEW
ForYour
For Your
Reference
Reference
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
MERAKI SM UI/UX PREVIEW
ForYour
For Your
Reference
Reference
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Cisco Security Connector
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Can Fully Manage an Individual Device
• Manage all Things about an
Endpoint.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Can use Blueprints - Templates to Apply to Devices
• Manage all Things about an
Endpoint.
3 Click Prepare
2
1
Name the Blueprint
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Can use Blueprints - Templates to Apply to Devices
• Manual
• Without DEP Program
• Automated Enrollment
• DEP Program
Select Manual
1
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Blueprints: Add the MDM
• If This is the First Time
Adding the MDM
• Select New Server…
• Click Next
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Blueprint: Add the MDM Enrollment URL
• Configure the MDM
1. Name the MDM
2. Enter the FQDN from
Meraki SM > Add
devices > iOS > Apple
Configurator 1
2
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Blueprint: MDMs Cert to Trust
1. Notice the Certs (all
are included in profile)
2. Click Next
1
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Blueprint: Choose the MDMs Cert to Trust
1. Select Supervise devices
2. Click Next
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Blueprint: Organization Information
• If no Existing
Organization:
1. Enter the
Organization Info 1
2. Click Next
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Blueprint: Organization Information
• If no Existing Organization:
1. Generate a new
supervision identity
1
2. Click Next
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Blueprint: iOS Setup Assistant Configuration
1. Decide what Setup
Assistant Steps the
End-User Sees
2. Click Prepare 1
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Blueprint: The Blueprint is Ready
1. Click Done
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Apply the Blueprint to your iOS Device
Applying the Blueprint to an iOS Device
• Apply to iOS Device
• Can be Multiple
Simultaneously
• Repeat Process Later for 2
New Devices
1. Select the iOS
Device(s) 1
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Applying the Blueprint to an iOS Device
• Warning Message
about possible erasure
appears.
3. Click Apply
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Applying the Blueprint to an iOS Device
• If Setup Assistant has
been run before (device
isn’t brand new), it will
need to be erased
4. Click Erase
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
The iOS Device will Reboot
Setup the iOS Device
1. Click the Home button to begin
2. Join your Wi-Fi network
2
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Setup the iOS Device
This is the MDM setup portion.
1. Click Apply Configuration
2
2. Enter your MDM user’s
username / password 1
• Most often this is an AD
username / pwd
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Setup the iOS Device
Setup is complete. You can
verify the MDM & Supervision:
1. Click Settings > General
2. MDM profile is listed under 1
Device Management
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Setup the iOS Device
Setup is complete. You can
verify the MDM & Supervision: 3
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Configuring Meraki SM for App & Policy
SM: Configure a Label
You’re creating a Tag for
you to apply to the CSC
app & the Policies you
want applied to the devices
1
Systems Manager >
Configure > Tags
1. Create New Tag >
Manual Tag > Next
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
SM: Configure a Tag
Create a new Tag
2
2. Name the Tag
3. Select one or more
devices
4. Click Submit 3
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
SM: Add the CSC App
Systems Manager > MDM >
Apps > Add new iOS
enterprise app
1
1. Select Upload an IPA
2. Click Browse & locate
the ipa file 2
3
3. Scope – with ALL the
following tags 4
4. Choose your new Tag &
iOS Devices 5
5. Click Save
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
SM: Create a Profile (mobileconfig) for the iOS Devices
Systems Manager > MDM
> Settings
1. Click + to create a new
Profile 1
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
SM: Create a Profile (mobileconfig) for the iOS Devices
Systems Manager > MDM >
Settings
1. Name the Profile
2. Choose your tag and iOS
devices
1
3. Click Save Changes
3
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
SM: Copy your Meraki API Key
Grab your Meraki API key
from the Meraki Dashboard
1
1. Click on your login name
in upper right > My
Profile
2. Copy your API Key for
use later in the AMP and
Umbrella Consoles
2
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Configuring Policy from the AMP Cloud
Console
The AMP Cloud
• When you first click on the new iOS Visibility tab in the AMP Console, it realizes
that you are not setup for Clarity yet.
• You can add the Meraki MDM API Key to setup the interaction with Meraki SM,
or you can create & download a .mobileconfig file for your specified group.
• Clarity is using the same group structure that has always existed with AMP.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
AMP: Create a Group for your iOS Devices
Navigate to Management
> Groups
1. Click Create Group.
1
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
AMP: Create a Group for your iOS Devices
Navigate to Management
> Groups
2
2. Name the Group
something that makes
sense, like: iOS
Clarity & provide a
description
3
3. Click Save.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
AMP: Link your Meraki Systems Manager MDM
If iOS devices are
connecting to the AMP
Cloud, then you must use
Accounts > Business
1. Click Cisco Meraki
EMM Integration1
1. EMM = Enterprise Mobility Manager, a term similar to MDM BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
AMP: Link your Meraki Systems Manager MDM
There is a one time setup on
the iOS Visibility tab. Use
Accounts > Business in
future.
1. Paste your Meraki API
Key 1
2. Click save
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
AMP: Link your Meraki Systems Manager MDM
3. Select the group you
created
4. Choose your Meraki
Organization &
Network
5. Select the Meraki
profile you created
3
6. Click Update
4
5
6
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Configuring Policy from the Umbrella
Dashboard
Umbrella: Link your Meraki Systems Manager MDM
1
Navigate to Identities >
Mobile Devices
1. Click LINK MDM
2. Paste your Meraki
MDM API Key
3. Click NEXT 2 3
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
Umbrella: Link your Meraki Systems Manager MDM
Select your Meraki
Organization & Network
1. Pick your Profile
2. Click INSTALL
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
Verifying
If all Tags were set correctly on Meraki
SM, You should be done!
Verify the AMP Clarity Profile Config:
In the Meraki SM, your
profile now has a new
setting “Clarity Content
Filter”.
This was pushed from the
AMP Clarity Console
directly to Meraki.
From AMP
Clarity
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Verify the Umbrella Profile Config:
In the Meraki SM, your
profile now has a new
setting “Umbrella DNS
Proxy”.
This was pushed from the
Umbrella Dashboard.
From
Umbrella
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Verifying
Check the MobileIron Profile:
1. Click Settings > General
2. MDM profile is listed under
Device Management 1
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Verifying
3. Click Meraki Management
3
Verify that Web Content Filter
is now in the list. This is your
confirmation that the updated
profile has been pushed to the
iOS device. 4
4. Click More Details
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
Verifying
3. Click Cisco Umbrella DNS
Proxy
Notice the App:
com.cisco.ciscosecurity
The Provider Bundle:
com.cisco.ciscosecurity.Cisco 3
Umbrella
That shows the profile is working
correctly.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
Verifying
Navigate back to Meraki
Management
4. Click Restrictions
5. Click Web content filter 5
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Verifying
6. Click Web content filter
6
Notice the Plugin Bundle ID
com.cisco.ciscosecurity.
That shows the profile is
working correctly.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Verifying Umbrella
Cisco Security App
2
1. Click Status
2. Click Protected by Umbrella
Details about connection are
there.
Note: IPv6 Unprotected because
no IPv6 Address on device.
1
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Verifying Clarity
Cisco Security App
1. Click Status
2
2. Click Protected by Clarity
Details about connection are
there.
Note: If enabled & registered, but
not connected: Generate some
new web traffic and check back. 1
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Backup Slides
ForYour
For Your
CSC App: Email Problem Report Reference
Reference
Support email
Pre-populated with
admin for org
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
If Meraki Groups are
not Appearing in AMP
Clarity
Troubleshooting:
• Click Refresh Metadata to
re-pull information from
Meraki side.
ForYour
For Your
Reference
Reference
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
ForYour
For Your
Reference
Reference
Logging: Umbrella
Connect iOS device via USB to
macBook.
Open Console app on mac
Select the iOS device on left side
Filter on “CiscoUmbrella”
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
ForYour
For Your
Reference
Reference
Logging: Clarity
Connect iOS device via USB to
macBook.
Open Console app on mac
Select the iOS device on left side
Filter on “#CS”
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
ForYour
For Your
Reference
Reference
Logging: Umbrella
• Filter “CiscoUmbrella”
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
ForYour
For Your
Using Meraki SM to Troubleshoot Reference
Reference
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
ForYour
For Your
Reference
Reference
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
ForYour
For Your
Reference
Reference
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
• Endpoint Security Strategy
• Cisco Security Connector (Overview)
• Apple & Cisco Partnership
• CSC Details
• AnyConnect
• Network Visibility Module
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
180+million endpoints delivering the most
comprehensive set of security services to more than
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
>
VPN
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
Cisco AnyConnect
A Suite of Security Service Enablement Modules
• VPN Module (Core)
• Network Access Manager (NAM)
• Web Security (CWS)
• Posture
• Umbrella Module
• HostScan (aka: ASA posture) (No UI)
• Network Visibility Module (NVM) (No UI)
• AMP Enabler Module
• Diagnostics and Reporting Tool (DART)
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Visibility Module (NVM)
Summary of Features
• Completes the Visibility Story by Augmenting Network Flows with Details from
the Endpoint
• Visibility into All Network Traffic From Endpoint
• Works On and Off Prem
• Sends Data in IPFIX (NetFlow) based “nvzFlow”.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
NVM Settings Offline Storage
Could be Unlimited
Oldest Removed First
If ! Configured, 50MB Default
nvzFlow Collector
• Stealthwatch Endpoint
Concentrator, Splunk, etc.
• 2055 is default port.
Sampled Flows
• Only Collects at Set Interval
(not recommended)
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
NVM Settings Con’t.
Collection Policy
• Define when to collect
(VPN, Trusted, Untrusted)
• What Fields to Collect
• What Fields to Anonymize:
• LoggedInUser
• ProcessName
• ProcessAccount
• ParentProcessName
• ParentProcessAccount
• DestinationHostname
• DNSSuffix
• VirtualStationName
• OSName
• OSVersion
• SystemManufacturer
• SystemType
• OSEdition
• InterfaceName
• SSID
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Use Stealthwatch for onPrem added value
Stealthwatch Enterprise
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Use Splunk for off-prem visibility
Splunk app
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Differentiating NetFlow
from nvzFlow
Customer premises
Router • Network devices use 2055
for NetFlow.
Flow SMC
• AnyConnect NVM
collector
configured to use 3055 for
Wi-fI Switch
nvzFlow.
UDP Endpoint
• UDP Director configured to
Director Concentrator
send only nvzFlows to
Wi-fI Switch
splunk.
> • Splunk requires the
splunk
acnvmcollector service (on-
box or off-box)
nvzFlow netFlow BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Using the UDP Director to Send to SW FC and Splunk
NVM to Splunk
• 2055 is default port
• Network will use 2055 also
• Leverage 3055 for Endpoints
to limit what is sent to Splunk
to just endpoints
NVM to Concentrator
• Stealthwatch Endpoint
Concentrator
Net to Flow Collector
• NetFlows direct to Flow
Collector
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
• Endpoint Security Strategy
• Cisco Security Connector (Overview)
• Apple & Cisco Partnership
• CSC Details
• AnyConnect
• Network Visibility Module
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
The AMP team has been busy! This is only a taste of
all the things they are cooking up!
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
AMP Update Server
New on-Prem AMP Update Server
• Current State:
• AMP for Endpoints has TETRA, a full blown & very competitive anti-virus client for
windows.
• TETRA definitions come from the AMP Cloud to each endpoint directly.
• New Model:
• Home-grown update server that is housed on-prem.
• The update server is configured within the AMP Windows policy.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
TETRA Def
Updates
On-prem AMP
update server
Customer premises
• On-prem server gets
updates from the AMP
TETRA
Public Cloud
Update Server
• Prelim tests of ~50K
endpoints each server
Public Wi-Fi • Server FQDN configured
per AMP policy
• Can make FQDN available
publically for external
updates
Customer premises
Location 1
Customer premises
Location 2
• Per Location
• Different fqdn’s
update1.company.c update2.company.co
• Configured via AMP
om m
Windows Policy
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
AMP Update Server is Downloaded from the Console
Configuration
• XML config
• Identities the AMP customer
aka: “business”
• All update settings included
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
ForYour
For Your
Reference
Reference
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
AMP Betas
New beta opt-in model for public beta
Beta opt-in
• Allows customers to
choose which betas they
want.
• No formal process
• Can send feedback from
portal
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
AMP System Protection
System Protection
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
AMP Exploit Prevention
Exploit Prevention
AMP for Endpoints v6.0.1 – Currently in Public Beta
• What it is
• Patented, non-trivial intellectual property, that is Windows Certified.
• Configured to protect specific applications
• Targeted for PDF, MS office, and IE/flash/silverlight attacks.
• What it isn’t
• Not for every application, only those on the monitored list of executables.
http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
<Inside the Memory Space>
Moving Target Defense
A user activates the application, Trusted Code
which loads to the memory space.
STEP 1
Making the memory unpredictable to attack by
manipulating the memory structure.
System New
Resources System Resources
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
<Inside the Memory Space>
Moving Target Defense
STEP 2 Trusted Code
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
<Inside the Memory Space>
Moving Target Defense
STEP 3 Malicious Trusted Code
Code Injection
Any code that tries to access the original
memory structure, not aware of the changes, is
malicious by default!
Trap
STEP 4
The attack is immediately trapped during the
initial exploit and saved for further investigation.
Decoy New
System
Resources
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
Key Features
• Protection begins when an application that is on the monitored list executes.
• Once a process is under protection, that protection will continue until that
process terminated.
• It will be enabled and disabled via policy like any other engine.
• A default set of applications will monitored, the portal will eventually allow the
user to select their own applications.
• As monitoring extends to process chains, there will be the concept of exclusions.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
Validation
• V1 protection has been tested with:
• PDF ATTACKS: a total of 121 unique attacks, representing 8 CVE-s.
• MS OFFICE ATTACKS: A total of 261 unique attacks, denoting 12 CVE-s.
• IE/FLASH/SILVERLIGHT ATTACKS: A total of 53 unique attacks, denoting 27 CVE-s.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
Caveats
• There is no concept of Audit mode.
• Exploited Applications are killed.
• Will generate events to AMP console.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
New Policy Model
New Policy Model
• Sets up future capabilities for
enhancing and advancing the
functionality and operationalizing of
the polices.
• Multi-list capabilities
• Import / Export
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
New Policy Model
Policy Summary
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Keeps frequently used settings up front
Old New
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 177
Moves advanced settings to its own section
Old New
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 178
AMP Unity
With Unity we’re able to correlate all your queries and data
in the AMP Cloud and provide a Global Trajectory of files
as they traverse across your network, email or web
appliance and land on an endpoint. With Global Outbreak
Control you can do custom black/whitelisting in the AMP
Cloud and have all your AMP enabled products honor
those lists.
Whitelists Simple
Custom
Detections
AMP Cloud
WWW
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 181
AMP Unity
• Cisco Network Security Devices will be able to register with AMP Cloud with
their Device ID
• Devices will then show on AMP Trajectory views for increased visibility of file
traversal across network
• Allow blacklisting to work across all registered devices
• “See once, block everywhere”
• FMC 6.2 supported
• ESA/WSA targeting 11.5 release (Fall 2017)
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 182
ForYour
For Your
Reference
Reference
AMP Unity
• Global Trajectory
• See file & device trajectory from all your AMP enable.
• AMP Appliances.
• AMP on Content (ESA & WSA).
• AMP on Firepower Appliances.
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 183
Splunk app for AMP
New Splunk apps for AMP
Splunk app
https://splunkbase.splunk.com/app/3670/
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
New Splunk apps for AMP
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Closing Thoughts
Please Fill Out The Survey!
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 188
Additional Resources
• https://cisco.jiveon.com/groups/ats-tme
• http://cs.co/ats-youtube
• http://cs.co/ats-community
http://a.co/iir9D6E
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 189
Questions?
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco Spark
Questions?
Use Cisco Spark to communicate
with the speaker after the session
How
1. Find this session in the Cisco Live Mobile App
2. Click “Join the Discussion”
3. Install Spark or go directly to the space
4. Enter messages/questions in the space
cs.co/ciscolivebot#BRKSEC-3446
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
• Please complete your Online Complete Your Online
Session Evaluations after each
session
Session Evaluation
• Complete 4 Session Evaluations
& the Overall Conference
Evaluation (available from
Thursday) to receive your Cisco
Live T-shirt
• All surveys can be completed via
the Cisco Live Mobile App or the
Communication Stations
Don’t forget: Cisco Live sessions will be available
for viewing on-demand after the event at
www.ciscolive.com/global/on-demand-library/.
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Continue Your Education
• Demos in the Cisco campus
• Walk-in Self-Paced Labs
• Tech Circle
• Meet the Engineer 1:1 meetings
• Related sessions
BRKSEC-3446 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 193
Thank you