There are two basic scenarios that need to be examined:
- The client is receiving a single IPS detection (meaning one or more detections of the same threat).
If this is the case, the following steps should be followed:
- Review the client logs using View Logs > Client Management > Security Log
- Review the entries and look in particular at the Signature ID and Signature Name values.
These fields identify the specific threat that was detected.
Note: If the threat name includes a CVE in the name, such as Attack: Apache Struts CVE 2017 9805 2, or on the attack signatures page under Additional Resources, this is indicating that this threat is something that can potentially be patched and remediated. While the SEP IPS module includes many mitigating controls for CVE threats, the best option when dealing with all CVE threats is to patch the application where the vulnerability exists. The SEP IPS module and its detections should always be considered a secondary remediation plan step after patching the application.
- If the client is getting multiple different IPS detections in rapid succession (meaning one or more detections of multiple different threats).
This often indicates that the endpoint is being scanned by a vulnerability scanner, either from an internal Remote Host or from the internet.
If this is the case, the following steps should be followed:
- Review the client logs using View Logs > Client Management > Security Log
- Review the entries and look in particular at the Signature ID, Signature Name, and Remote Host.
These fields identify the specific threat that was detected.
If the Remote Host is a local host that has a vulnerability scanner installed, then that hostname/IP should be added to the IPS Excluded Hosts section of the IPS policy. This is to tell the client to ignore these IPS detections from that specific host(s). See the following documentation on adding hosts to the Excluded Hosts list:
https://techdocs.broadcom.com/content/broadcom/techdocs/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/setting-up-a-list-of-excluded-computers-v8148757-d53e9455.htmlIf the Remote Host is NOT a local host or is a local host where a vulnerability scanner is NOT known to be installed, then these detections need to be researched to determine if they are legitimate or not. If the threat detections are not legitimate internal scanning activities, then SEP is protecting the endpoint, and the scans coming from that remote host need to be examined as that is a possible indication of compromise of that endpoint.