Overview

This guide introduces the concept of security posture checks for ensuring client devices are operating within the proper system requirements defined by the NetFoundry Network administrator before accessing NetFoundry Services.   

There are several types of Posture Check:

  • device is running an expected operating system, optionally limited to minimum or maximum OS version or both, e.g. MacOS >= 11.2 
  • required processes e.g. navapsvc.exe (Norton AntiVirus) is running and has expected sha256 sum
  • device has expected MAC address
  • device is a member of expected Active Directory Domain

Using Posture Checks

Any or all of the Posture Checks can be defined and added to an AppWAN with a Posture Check role attribute. Posture Check role attributes appear like a #hastag and are used to group Posture Checks. The Posture Check becomes enforced when it has the same role attribute as the AppWAN. Any one Posture Checks may also be included in an AppWAN with an @mention by name. For more information about AppWANs see Create and Manage AppWANs.


An example AppWAN edit Screen is shown below.  Multiple Services, Endpoints, and Posture Checks can be added with attributes as shown.

 

Screen_Shot_2020-11-23_at_12.56.56_PM.png

When a Posture Check attribute is added to an AppWAN, any client Endpoints in that AppWAN must satisfy all Posture Checks that posses the same #hashtag role attribute.  Any number of Posture Checks may be added to and therefore enforced by an AppWAN. 

The same Posture Check can be added to any number of AppWANs and Posture Checks only controls access to the services for each endpoint assigned to that AppWAN, only for AppWAN to which it is added.  Thus AppWANs can be provisioned such that an endpoint could have access to some services and not others, based on different posture check requirements.

Applicable Posture checks means for example, the Operating System (OS) posture check for MAC OS does not apply to Windows devices, but the Windows OS posture check would apply to Windows devices, and so on.   

Posture Check Enforcement

Any Posture Checks that are Assigned to an AppWAN will be relayed to the Endpoints that are also assigned to that AppWAN.   The Client device , via NetFoundry application will check each of the conditions in the applicable Posture checks assigned and report the status of that check.   The Network Controller will validate that all posture checks pass before allowing the Client Device to access that service.  Thus, this is incorporated into the Zero Trust model.

If a client device is in multiple AppWANs, the device must comply to only the Posture Checks defined in that AppWAN to access the corresponding services in that AppWAN.   

Note: The local device User Interface will still show all services for its endpoint identity, regardless of whether it is in compliance with the Posture Checks.   Additional statuses will be added to the Console for Endpoint Posture Check data to aid the Network Administrator with identifying the Posture Check conditions for each endpoint (identity).

Each Posture check currently available will be described in more detail below.

In Addition, Posture Check status provided will be detailed below.

 

Creating Posture Checks

After logging in to the NetFoundry console with the credentials for your NF Organization, Select your NF  Network in the pulldown. The pulldown is exposed when you expand the navigation sidebar by clicking the green globe at upper left. Then select "Posture Checks" in the sidebar.

 

Screen_Shot_2020-11-20_at_9.24.33_AM.png

The "Manage Posture Checks" page with a list of existing Posture Checks will be shown.

Initially this page will be empty. Select the blue "+" button to add your first Posture Check.

Screen_Shot_2020-11-20_at_9.25.14_AM.png

Multifactor Authentication Posture Checks:

Details about multifactor authentication posture checks can be found here. 

 

MAC Address Posture Check

This will require the Endpoint software or tunneler to be running on a device with an expected MAC address.  Any one of that devices MAC addresses needs to match any one of the expected MAC addresses. 

Screen_Shot_2020-11-23_at_1.05.36_PM.png

 

Operating System (OS) Posture Checks

Operating System (OS) Posture Checks can be created for one or more OS in the same Posture Check.   

OS Version Specification

MIN VERSION

This optional minimum value means that if the client Endpoint's OS is of the type selected and has a version equal to or higher than the minimum version then the Posture Check will succeed.  A default value is already added as a hint value.

 

MAX VERSION

This optional maximum value means that if the client Endpoint's OS is of the expected type and has a version less than or equal to this value then the Posture Check will succeed.

Example: OS Posture Checks with minimum OS version for multiple OS types

 

Screen_Shot_2020-11-20_at_9.39.47_AM.png

 

Example: OS Posture Checks with minimum and maximum OS version for multiple OS types

Screen_Shot_2020-11-20_at_9.40.45_AM.png

 

Process Posture Checks

The Posture Check for client Endpoint processes enables the administrator to ensure that specific processes, such as antivirus processes or others, are running and are valid executables.  The binary verification of the process is optional and can be done by providing the hash or signer thumbprint or both. If all specified fields match the client Endpoint process's characteristics then the Process Check succeeds.

mceclip0.png

 

PowerShell Example

How to get SHA 512
(Get-FileHash -Algorithm SHA512 path/to/file).Hash.ToLower()
Or
$filename = "C:\Program Files\Common Files\McAfee\Platform\McUICnt.exe"
(Get-FileHash -Algorithm SHA512 $filename).Hash.ToLower()

Sample below
PS C:\> (Get-FileHash -Algorithm SHA512 F:\Software\McAfee.com\Agent\mcagent.exe).Hash.ToLower()
a304386591c69ec1f3f0d441b059609675069c43cee2f843dda329175b86ec3ee277b
7250d03378d949d4adc4bf4289c216f5cf72fca67c2a9139167c82a6c36
Note - *********Hash is case sensitive and must be lowercase*************

Example Process Signer Certificate Thumbprint Generation for Windows

How to get the signer certificate thumbprint

You can find it via the GUI by following these directions:

  1. Find the executable in Windows Explorer.
  2. Right click the file and click “Properties.”
  3. From the “Digital Signatures” tab, click on the listed signature, then click “Details.” A new window will appear.
  4. Click on “View Certificate;” another new window will appear.
  5. Click the “Details” tab, scroll down, and click on thumbprint.
  6. Finally, you will be presented with the thumbprint

You can add multiple processes per process check policy. Note that the process check will pass if one of the processes are running. 

 

mceclip1.png

Domain Posture Check

Membership of the client Endpoint to one of expected Active Directory Domains can be required using this Posture Check. The domain check is available for Windows. Multiple Domains may be entered separated by semi-colons.

Screen_Shot_2020-11-23_at_1.08.04_PM.png

 

Managing / Editing Posture Checks

Select the "Posture Checks" button/menu option from main menu and the Posture Checks list screen will appear.

Export list of Posture Checks

Exporting a list of posture checks to a CSV file can be done by selecting one or more (or all by selecting the top bubble at the top of the "Name" column) and selecting the ellipses to download the list.

Screen_Shot_2020-11-23_at_1.10.37_PM.png

Edit Posture Check

Edit a Posture Check and its settings by selecting the Posture Check name or "Edit" on the the ellipses menu on the far right of the specific Posture Check.

Delete Posture check

Delete a Posture Check by selecting the Posture Check "Delete" option on the the ellipses menu on the far right of the specific Posture Check.   The user will be prompted to verify the deletion by typing in the name of the Posture Check.

 

Screen_Shot_2020-11-23_at_1.17.51_PM.png

 

Endpoint Posture Check Status / Debugging

To view the Posture Checks provisioned and active for a specific client endpoint, navigate to the Endpoint list screen and select an Endpoint.  On the Endpoint details screen, select the Posture Data button in the upper left hand corner.

Screen_Shot_2020-11-23_at_3.08.48_PM.png

 

The Posture Check Data will be shown as in the example below.  This will show the active Posture checks for the client endpoint. These are the posture checks applied to one or more AppWANs in which the endpoint is added.  
Note: if different AppWANs have different posture checks assigned, this window of information will be a compilation of all of the posture checks for the endpoint.   To determine which are applicable for each AppWAN (and services assigned to that AppWAN), please refer to the specific AppWAN details page.

 

Checking Posture check status. 

If an endpoint is not accessing a service and the endpoint and service is part of an AppWAN, refer to the AppWAN details page for that appWAN.   Note the Posture checks assigned to that AppWAN.  The endpoint device must comply to all the Posture checks assigned to that AppWAN.  

Then refer to the Posture Data for the Endpoint as shown below.

Example: AppWAN has Posture Checks following Posture checks assigned: 

  • domainCheck
  • puttyprocesscheck
  • macaddrcheck
  • win10osvercheck

Domain Check: this box shows the configured Domain Check named domainCheck.  It has two allowed values as denoted by "Customer Configured Domains:".

The "Returned Domain(s)" shows the actual domain observed on the Endpoint device.  The value "WORKGROUP"  matches one of the allowed values so that check will be passing. 

 

Process Check: This box shows the configured Process Check named puttyprocesscheck.

This shows the process is running, so that check will be passing.  The binary hash is also viewable and must match that which is provisioned in the Posture Check definition(if provided).

 

Screen_Shot_2021-01-06_at_1.14.28_PM.png

Example of Process Check with process not running(sshproccheck (defined as c:\bin\ssh.exe), thus failing the process check:

 

Screen_Shot_2021-01-06_at_1.21.34_PM.png

 

MAC Address Check: This box shows all the mac addresses found to be associated with the endpoint device.   One of them must match the provisioned values for mac addresses in the MAC Address posture check (in this case defined as "macaddrcheck").   

Note: refer to posture check details page for the list of required/allowed MAC Addresses.

This list most likely will be too long to display here for possible values, if a single posture check is used for MAC addresses for many users.

 

OS Check: This box shows the observed OS and Version of OS of the Endpoint device.  Refer to the provisioned OS posture check (in the above example "win10osvercheck"), to determine the requirements of the OS Check to see if it passes.

 

If you have checked all the Posture checks and the proper ones pass, the service should be accessible from the Endpoint device.    

If the service is not accessible, debug logs may need to be collected on the Endpoint device.

 

Posture Check Debug Data Current view

Currently the data is show in the format below.

This raw data identifies the endpoint "name".

"postureData" section contains posture checks such as "mac" for mac address.  The "timedOut" field shows the check run status.  The example below shows the mac address check timedOut = true, so that means it failed to run.

For the process check, "is Running" = true means the check passed.

For each check, the timedOut should be false.

 

{
"endpoint": {
"id": "760776b3-0cc5-4c87-a5b3-87f829aa498f",
"ownerIdentityId": "d6cdce3f-96dc-4862-8dd8-6c478456517f",
"createdBy": "d6cdce3f-96dc-4862-8dd8-6c478456517f",
"createdAt": "2020-11-10T18:26:42.939011Z",
"updatedAt": "2020-11-21T15:52:55.213863Z",
"networkId": "07904894-e4ec-4ee6-a782-e69d780ebd7c",
"zitiId": "pPIlh92Gg",
"name": "dwwin10",
"branch": "HEAD",
"revision": "b9e3ed2",
"type": "ziti-sdk-c",
"version": "0.17.13-local",
"arch": "x86_64",
"os": "MINGW32_NT-10.0",
"osRelease": "10.0.17134",
"osVersion": "Windows 10 Pro"
},
"postureData": {
"mac": {
"postureCheckId": "XKyn1JhGg",
"timedOut": true,
"lastUpdatedAt": "2020-11-22T19:54:18.769857664Z",
"addresses": [
"02f07cb89f01",
"b6ae2bd715fb",
"b6ae2bd710fb",
"005056c00001",
"005056c00008",
"b4ae2bd714fa",
"00ff94c65f57",
"b4ae2bd714fb"
]
},
"domain": {
"postureCheckId": "",
"timedOut": true,
"lastUpdatedAt": "0001-01-01T00:00:00Z",
"name": ""
},
"os": {
"postureCheckId": "xnTCb1hMR",
"timedOut": true,
"lastUpdatedAt": "2020-11-22T19:54:18.971534119Z",
"type": "windows",
"version": "10.0.17134",
"build": "unused"
},
"process": [
{
"postureCheckId": "OoJuNaoMR",
"timedOut": true,
"lastUpdatedAt": "2020-11-22T19:54:19.188277666Z",
"isRunning": true,
"binaryHash": "fbd1b72fc347762b151c73ec6fae58a2b4ddb49e2df75f88b006f35ea83d7edfda070a306799f3d128d3ae2d2169adbb54d18069da124a68a51959cf52cdcf4d",
"signerFingerprints": [
"02faf3e291435468607857694df5e45b68851868",
"d09e349fd5615f147cf855accd3c03b0833a2bc4",
"4022bb3c0398d595623a5380d5eeb520fc6150aa",
"03a5b14663eb12023091b84a6d6a68bc871de66b"
]
},
{
"postureCheckId": "3xzTvaoGg",
"timedOut": true,
"lastUpdatedAt": "2020-11-22T19:54:19.393232157Z",
"isRunning": false,
"binaryHash": "",
"signerFingerprints": []
}
]
},
"_links": {
"self": {
"href": "https://gateway.production.netfoundry.io/core/v2/endpoints/760776b3-0cc5-4c87-a5b3-87f829aa498f/posture-data"
},
"endpoint": {
"href": "https://gateway.production.netfoundry.io/core/v2/endpoints/760776b3-0cc5-4c87-a5b3-87f829aa498f"
}
}

 

 

 

Was this article helpful?
1 out of 1 found this helpful

Comments

0 comments

Please sign in to leave a comment.