Solved

how to block advanced pc shield in sonicwall

Posted on 2011-09-29
1
572 Views
Last Modified: 2013-11-16
Hi
I am using sonicwall nsa2400 in company, recently one of my user who accidentally hit the ok button when the faked antivirus software pop up when the user browsing a website, my sonicwall has antispyware and content filtering subscription but still not able to detect it, how come?  And how can i block such kind of faked antivirus software and spyware?

Thanks!
0
Comment
Question by:KANEWONG
1 Comment
 
LVL 13

Accepted Solution

by:
khairil earned 500 total points
ID: 36890295
Hi,

It is like chicken and egg thing. We have dual layer firewall (different brand) + antimalware installed, but still out of 10,000 there are 2 or 3 that feels they are more knowledgable than us so they decide to put additional av - which then found out to be fake.

How come?
The answer are:
1. Firewall and antimalware depends on signature, if they do not have it then they do not know it. Some have heuristic that be able to guess some of the files but still not all.
2. The install package have special way to pack the files, which makes antimalware/spyware useless because they cannot "see" what is the package.

You can blocked that file by file name or hash signature (if your firewall support that) but by experience, it is useless - the scammer always come out with new "version" that have different signature.

The best thing you can do it to have awareness programme to your users. If you have active directory and your user attach to it, you can use GPO to disallow user from running installer of that fakeware - you still can do this manually with more work. You also might want to impose some fine if user failed to comply with that - you better have published policy before doing that.

0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question