Endpoint Security

Looking for some input on security controls for desktops, laptops, servers. We do have AV, HIPS, DLP deployed, however not all features are enabled. I would like to enable everything, but would first like to get some suggestiosn on what everyone feels is most critical. thanks.
Mark WaldenInformation Security EngineerAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Thomas Zucker-ScharffSolution GuideCommented:
Depends on your environment. Some anti ransomware protection is needed.  If you have a string firewall,  that will mitigate a lot.  Human error/education is still the biggest problem.
btanExec ConsultantCommented:
Make a risk assessment to guide how critical those layer of controls are. Need to know the threats faced in the environment and remote sites, identify the user group most susceptible like mobile users, HR etc, usage of the machine esp for system and db administration etc. These factor will drive how much you want all to turn all. There should be appl and device control whitelisting - those external USB, wireless, mobile device connectivity to the machine open the infection easily.

Each layer of control should augment and complement rather than duplicate esp when normally for operation purpose one tends to go for the all in one suite - review the control clinically too on the capability ... anti-exploit and anti-malware may not means the same thing and etc...

Focus on threat vector to ensure the checks are done esp in these low hanging channel/means
-via the device (mass storage carrying malware, exfiltration channel),
-via web browser (malicious website, drive by download, online storage),
-via file server (leakage of data, tampering by insider threats); and
-via email (phishing email, infected attachment) ...

The hardening should layer as baseline on top of these security control, duplicates layer of check need to review so that it is not over strenuous on the usage - security controls should be in supporting role and driver instead of creating more "issue".

Also having more control also means fatigue kick in to update the signature for each and misconfiguration can be possible. Backup validation and diligence in timely update of patches and hotfixes must laid the foundation, otherwise those tools will really be a "threat" vector exploited by the attacker..

User training and being able to response with the alert trigger will help in the incident handling too as Thomas shared earlier. Likewise you need the central monitoring when those control triggers or anomalies shows up, we cannot simply depends on user. This influence also the expertise and competency of the analyst to make those assessment and recommendation to tighten and respond correctly to the alerts and correlated events...

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Mark WaldenInformation Security EngineerAuthor Commented:
good detail. thanks for the advice.
btanExec ConsultantCommented:
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.