What is happening?
Example: "System Infected: Tidserv Activity": This message indicates communication could be an indicator of a variant of Tidserv attempting to "phone home" or infect other systems.
Why were these changes made?
The previous naming convention was confusing and inconsistent. The goal is to allow IT managers and users a better understanding of what occurred by looking at the signature name. The IPS/Network Threat Protection is a very powerful technology blocking tens of millions of variants of malware and social engineering attacks that Antivirus alone is unable to detect – this new naming convention helps IT managers better understand the true types of protection being delivered and how to use it to protect their environments.
Will it affect me?
The IPS Signature ID stays the same – only the name changes. The client and server operations use only the Signature ID for reporting IPS events; so no action is required from a user perspective. This change affects all Symantec and Norton products that use IPS/Network Threat Protection. This includes Symantec Endpoint Protection and all Norton products.
Proposed Final IPS Signature Naming Conventions Examples:
Original IPS Signature Naming |
Revised Final Proposed IPS Signature Naming |
Post Infection: |
|
HTTP Tidserv Request |
System Infected: Tidserv Activity |
HTTP Tidserv Download Request 2 |
System Infected: Tidserv Download 2 Activity |
Fake antivirus |
|
HTTP Fake antivirus Redirect Request |
FakeApp Attack: Fake antivirus Redirect |
HTTP Fake antivirus Executable Download |
FakeApp Attack: Fake Antivirus Download |
HTTP FakeAV Installer Download Request |
FakeApp Attack: FakeAV Installer Download |
HTTP Fake Codec Request Generic |
FakeApp Attack: Fake Codec Generic |
Drive-by download and Malicious Web Attack Toolkits |
|
HTTP Neosploit Toolkit Activity 1 |
Web Attack: Neosploit Toolkit Attack |
HTTP Malicious JavaScript Heap Spray BO |
Web Attack: HTTP Malicious JavaScript Heap Spray |
HTTP Malicious Toolkit Variant Activity 16 |
Web Attack: Malicious Toolkit (16) |
HTTP Phoenix ToolKit Java Applet Activity |
Web Attack: Phoenix ToolKit Java Applet |
HTTP Suspicious Executable Image Download |
Web Attack: Suspicious Executable Image Download |
HTTP Acrobat Suspicious Executable File Download |
Web Attack: Acrobat Executable File Download |
Base OS Attack: |
|
MSRPC Server Service BO |
OS Attack: MS RPCSS BO |
MS RPCSS Attack (3) |
OS Attack: MS RPCSS (3) |
MSRPC SrvSvc NetApi Buffer Overflow (2) |
OS Attack: MS RPCSS NetApi BO (2) |
Malicious Domain Blocked: |
|
|
Malicious Site: Malicious Domain or IP Blocked |
Other Malicious Sites or domains, IPs, or websites that may serve up drive-by downloads or fakeAV |
Malicious Site: Signature Name |
Attack: |
|
MSIE Yahoo! Messenger GetFile Method File Upload |
Attack: Yahoo! Messenger GetFile Method File Upload |
HTTP Microsoft PowerPoint PPT4 RCE |
Attack: Microsoft PowerPoint PPT4 RCE |