TDR Deployment Guide
TDR Deployment Guide
Deployment Guide
About This Guide
The Threat Detection and Response Deployment Guide is a guide to help you set up the Threat Detection and Response
subscription service.
Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are
fictitious unless otherwise noted. No part of this guide may be reproduced or transmitted in any form or by any means,
electronic or mechanical, for any purpose, without the express written permission of WatchGuard Technologies, Inc.
Guide revised: 11/12/2018
TDR Components 1
TDR Account Regions 1
Recommended TDR Policies 22
Default TDR Policies 22
Policy Tips 26
Next Steps 27
Administrator 34
Operator 35
Multi-Tier Management 36
Administrator (SP) 37
Operator (SP) 37
More Information 38
Threat Detection and Response is supported for Firebox and XTMv device models only and requires Fireware v11.12 or
higher.
TDR Components
The Threat Detection and Response subscription service has several components:
Threat Detection and Response Account
Threat Detection and Response is a cloud-based service hosted by WatchGuard. Your Threat Detection and
Response account in the cloud collects and analyzes forensic data received from Fireboxes and Host Sensors on
your network. You log into your TDR account on the WatchGuard Portal to configure account settings, Host Sensor
settings, and to monitor and manage security threats.
Because your login credentials for TDR are your WatchGuard Portal credentials, when you log in to the WatchGuard
Portal, single sign-on enables you to also be automatically logged in to your TDR account.
Firebox or XTMv Device
Threat Detection and Response is a security subscription that you activate for your Firebox. In the Firebox
configuration, you enable the Firebox to send data to your TDR account, and you configure policies, services, and log
settings to enable the Firebox and Host Sensors to send information to your TDR account.
Host Sensors
You install Host Sensors on the computers on your network. Each Host Sensor collects forensic data from the host
and sends it to the Threat Detection and Response cloud for analysis. Forensic data includes information related to
files, processes, network connections, and registry keys on the host. You can configure Host Sensors to simply
report security threats or to take action to fix certain types of security threats.
AD Helper
AD Helper is an application that you can install to deploy Host Sensors on your network. AD Helper uses your
existing Windows Active Directory infrastructure to assist with distributed installation of Host Sensors on your
network.
TDR Account Regions
WatchGuard hosts TDR servers in these regions:
n Americas (Oregon)
n Europe (Frankfurt)
You select the account region the first time you activate a TDR subscription for a Firebox on the WatchGuard Portal. Host
Sensors and Fireboxes send data to your TDR account in the region you selected.
Some steps to set up TDR require that you log in with a specific user role. The first user in a new
TDR account has both the Administrator and Operator user roles. All other users have the Operator user
role by default. A user with Administrator credentials can change the roles assigned to any user account.
Threat Detection and Response is included in the Total Security Suite subscription. When you activate a Total Security
Suite subscription, Host Sensor licenses are added to your TDR account. After you activate your TDR subscription, you
must update the feature key on your Firebox.
If you have already set a Cloud region for another WatchGuard cloud service, that region is used for
TDR and you are not prompted to select or confirm a Cloud region when you activate your
subscription.
To update the feature key on the Firebox, from Fireware Web UI:
To update the feature key on the Firebox, from Firebox System Manager:
If you are not a WatchGuard partner, skip this step and continue to Step 3.
If you are a WatchGuard Partner, your TDR account is a Service Provider account. In your TDR Service Provider
account, you must add a separate customer account for each business or organization for which you manage TDR. To
configure TDR to run on your own network, you must also add a customer account for your own internal network. You
configure and manage TDR separately for each managed customer account.
1. Go to the WatchGuard Portal at www.watchguard.com and log in to your WatchGuard Portal account as a user
with Administrator credentials.
2. In the Partner Portal, click Support Center.
3. Select My WatchGuard > Manage TDR.
The Threat Detection & Response web UI appears.
4. In the TDR web UI, click Accounts.
5. Click Add Account.
The Add Account dialog box appears.
6. In the Name text box, type business or organization name of the managed customer account.
7. Click Save & Close.
The Account is added to the Accounts list and is also added to the drop-down list in the top navigation bar.
You must assign Host Sensor licenses to each customer account you manage. The number of Host Sensor licenses you
assign to a managed customer account controls the maximum number of Host Sensors you can install on computers for
that customer.
3. On the line of the unassigned license, at the far right side, click .
A drop-down list with the available options appears.
4. Select Assign License.
The Assign License dialog box appears.
5. In the Account text box, begin to type the name of the managed customer account.
Account names that contain the letters you type appear below the text box.
6. Select the customer account name from the list.
7. In the Number of Hosts to Assign text box, type the number of Host Sensor licenses to assign to this account.
By default, the Number of Hosts to Assign is set to the total number of unassigned Host Sensor licenses in the
license you selected. You can change this to a lower number if you plan to install Host Sensors on fewer
computers for this customer.
8. Click Assign License.
The specified number of Host Sensor licenses are assigned to the managed customer account you selected.
To manage TDR for a customer, you must select the customer account to manage. The drop-down list at the top of the
page has the name of your service provider account, and the names of each customer account you added.
2. To see a summary of status for this customer, select Dashboard in the left navigation menu.
After you select a managed customer account, the options available in the left navigation menu depend on the user role
assigned to you in the Service Provider account. Your user account can be assigned one or both of these roles:
n If you have the Administrator (SP) user role, you are an Administrator of your managed customer accounts.
n If you have the Operator (SP) user role in your service provider account, you are an Operator of your managed
customer accounts.
The first user in a TDR Service Provider account has both the Administrator (SP) and Operator (SP) user roles. All other
users have the Operator (SP) user role by default.
After you select a managed customer account, complete the procedures to set up Host Sensors and Fireboxes for each
managed customer.
To go back to your Service Provider account to manage accounts and licenses, select the name of
your service provider account from the drop-down list at the top of the page.
If your Firebox does not run Fireware v11.12, upgrade the Firebox OS to v11.12 or higher.
Next, enable Threat Detection and Response on your Firebox. To enable TDR on the Firebox, you must get the UUID
from your TDR account and add it to the Firebox configuration.
1. Go to the WatchGuard Portal at www.watchguard.com and log in to your WatchGuard partner or customer
account as a user with Operator credentials.
2. If you are a WatchGuard partner, in the Partner Portal click Support Center.
3. Select My WatchGuard > Manage TDR.
4. (Partners only) Select the managed customer account.
5. Select Devices > Firebox.
The Account UUID appears at the top of the page.
n To see the Firebox connection status to Threat Detection and Response in Fireware Web UI, select Dashboard
> Front Panel.
n To see the Firebox connection status to Threat Detection and Response in Firebox System Manager, select the
Status Report tab and search for TDR.
n To see the Firebox connection status in the TDR web UI, select Devices > Firebox and verify that your Firebox
appears in the Fireboxes list.
When you enable TDR on your Firebox, the Firebox configuration must include a policy to allow Host Sensors on your
network to connect to your TDR account. If your Firebox runs Fireware v11.12.1 or higher, when you enable TDR, the
WatchGuard Threat Detection and Response policy to allow Host Sensor connections is automatically added.
When you enable TDR in Fireware v11.12.1 and higher, the WatchGuard Threat Detection and
Response policy is automatically added to the Firebox configuration.
If your Firebox runs Fireware v11.12.0, you must manually add an HTTPS packet filter policy with these settings:
n Connections are — Allowed
n From — Any-Trusted, Any-Optional (or the locations where your Host Sensors are installed)
n To — FQDNs tdr-hsc-na.watchguard.com and tdr-hsc-eu.watchguard.com
If your Firebox configuration includes an HTTPS proxy policy with content inspection and certificate validation enabled,
add these FQDNs as destinations to the WatchGuard Threat Detection and Response policy or to the HTTPS policy
you manually added:
tdr-frontline-eu.watchguard.com
tdr-frontline-na.watchguard.com
tdr-adhh-na.watchguard.com
tdr-adhh-eu.watchguard.com
These additional FQDNs allow Host Sensors to upload files for APT Blocker analysis, and allow Active Directory Helper
to synchronize data with your TDR account.
Next, install a Host Sensor on the computer to protect. The information you need to install the Host Sensor appears on the
TDR web UI page where you download the software. You can manually install a Host Sensor for Windows or Red Hat
Linux.
For information about TDR Host Sensor OS compatibility, see the Threat Detection & Response Release Notes on the
Fireware Release Notes page.
You can also use AD Helper for automated installation of Windows Host Sensors. For more information, see Next Steps.
To complete the group and override procedures described in this topic you must log in to TDR as a user
with Operator privileges. To globally change all default Host Sensor settings, Administrator privileges are
required.
You must decide how many and what types of hosts to include in your pilot deployment. For each host, install the Host
Sensor, and then use other software on the host. Monitor the indicators in your TDR account to see threats and actions
reported by the Host Sensors.
If a Host Sensor identifies a threat, you can look at the details in the indicator to see the name of the file or process and why it
was considered a threat.
For more information about the Indicators page, see Manage TDR Indicators in Fireware Help.
If the Host Sensor identifies a trusted application as a threat, you can add the MD5 value to the Signature Overrides as a
Whitelist item. TDR does not generate indicators for files you add to the Whitelist.
If the Host Sensor causes performance issues or conflicts with other software that cause the Host Sensor or other software
to not function, you can add an exclusion for the installation path of the software. An exclusion causes the Host Sensor to
ignore the files in the specified path.
To add an exclusion:
1. Select Configure > Exclusion.
2. Click Add.
3. Specify the path to exclude.
For more information about how to add an exclusion, see Configure TDR Exclusions in Fireware Help.
If the Host Sensor quarantines a file, it encrypts the file and stores it in the quarantine directory on the host. To remove a file
from quarantine:
1. On the Indicators page, find the indicator. For an indicator with a successful Quarantine action, the threat score is 1.
2. Select the indicator.
3. Select the Unquarantine file or Unquarantine HRP action. The available action depends on whether the file was
quarantined by Host Ransomware Prevention (HRP) or as the result of the Quarantine File action.
For more information about how to remove a file from quarantine, see Remove a File from Quarantine in Fireware Help.
See the documentation from your antivirus software vendor for instructions to edit the exclusions list or whitelist.
For links to integration guides for TDR and popular desktop AV vendors, see Integration Guides in WatchGuard Help Center.
For more information about how to add a TDR exclusion, see Host Sensors and AV Software Exclusions in Fireware Help.
You can manage host group membership from the Hosts page or the Groups page. From the Hosts page you can select
multiple hosts from a list to add them to a new or existing Host Group.
4. Start to type the name of the group. This can be an existing group or a new group.
As you type. the names of existing groups and the option to add a new group appear below the text box.
5. Select the group, or select the option to add the new group with the name you typed.
The selected hosts are added to the group you selected. If you selected the option to add a new group, the Host Group is added.
For more information about the Hosts page, see Manage TDR Hosts and Host Sensors in Fireware Help.
The best Host Sensor settings to use for your hosts might be different based on the installed OS and
applications, physical or virtual hardware, and other aspects of your host environment.
For more information about Host Sensor Settings, see Configure TDR Host Sensor Settings in Fireware Help.
For example, if you have a Servers group, and do not want the Host Sensors on servers in that group to make changes to the
registry, you can add a policy for the Servers group that specifies that Host Sensors cannot perform the Delete Registry
Value action. Or, if you do not want Host Sensors for a group to take any automated remediation action, add a policy for the
group that specifies Host Sensors cannot perform the Quarantine File, Kill Process, or Delete Registry Value actions.
If you add a policy for a Host Group, make sure that policy has a higher priority in the policy list than other
policies that apply to All Hosts.
For more information about policy configuration, see Configure TDR Policies in Fireware Help.
Default TDR Policies
Each TDR account has three default remediation policies and a default containment policy. If you have enabled the
APT Blocker feature, a default APT Blocker Policy is also enabled by default.
The three default remediation policies allow Host Sensors to take remediation actions for indicators with different threat
scores at Cybercon thresholds of 4, 3, and 2. With the default policies enabled, you can change the Cybercon level (from 3 to
2 for example) to immediately allow Host Sensors to take action on threats with a lower threat score.
The default APT Blocker policy allows Host Sensors to send suspicious files that do not match a known threat to the
sandbox for APT Blocker analysis.
The default containment policy automatically contains hosts that have an incident with a Threat Score of 8 (Severe).
Contained hosts are released automatically when the incident Threat Score falls below the threshold. The default
containment policy is not enabled by default. Enable the policy if you want to contain hosts automatically.
The default APT Blocker policy is available only if you enable the APT Blocker feature on the General
Settings page.
When APT Blocker is enabled, the five default TDR policies look like this:
With these default policies, all Host Sensors take these actions:
When the Cybercon level is 4:
n Host Sensors automatically take remediation actions for indicators with a Threat Score of 9 or higher.
n Host Sensors automatically upload suspicious files for analysis in a secure sandbox environment.
When the Cybercon level is 3:
n Host Sensors automatically take remediation actions for indicators with a Threat Score of 8 or higher.
n Host Sensors automatically upload suspicious files for analysis in a secure sandbox environment.
n Host Sensors with an incident Threat Score of 8 or higher are contained automatically.
When the Cybercon level is 2 or 1:
n Host Sensors automatically take remediation actions for indicators with a Threat Score of 7 or higher.
n Host Sensors automatically upload suspicious files for analysis in a secure sandbox environment.
For more information about Cyberon levels, see About TDR Cybercon Levels in Fireware Help.
For more information about how to configure Groups, see Manage TDR Groups in Fireware Help.
The default group All Hosts includes all hosts that have a Host Sensor installed. We recommend that you create separate
groups for clients and servers so that you can create policies specific to these groups.
With these groups, you can configure remediation policies to take automated action for clients at a different threat level than
for servers. At the highest threat levels (lowest Cybercon threshold) you can use the All Hosts group so policies to apply to
all hosts.
Threat Policy
Cybercon Score Target
Example Policy Name Threshold Threshold (Group) Automated Actions
Threat Policy
Cybercon Score Target
Example Policy Name Threshold Threshold (Group) Automated Actions
Policy Tips
As you configure additional policies, keep these tips in mind:
Use the Cybercon Threshold to activate policies quickly
n With the default policies active, set the Cybercon level to 3.
n Configure no policies for Cybercon 5.
n Add policies for the higher severity (lower number) Cybercon levels.
o You set the Cybercon Threshold for your policies.
o You decide when to change the Cybercon level based on the current activity and risks on your network to activate
policies for each Cybercon Threshold.
Use groups for policy targets:
n Configure groups for hosts that have similar requirements; for example, create a group for servers
n Create policies that target that each group
These steps are summarized in the next three sections. For a more detailed description, see Fireware Help.
You can also use AD Group Policy Objects (GPO) to deploy Host Sensors on your network. For more
information, see TDR Host Sensor CLI and GPO Installation in Fireware Help.
Prerequisites:
n You must install Java 8 on the computer where you install AD Helper
n You must run the AD Helper MSI installer as an administrator
To install AD Helper:
1. From the computer where you want to install AD Helper, log in to your TDR account as a user with Operator credentials.
2. Select Devices > AD Helper.
The AD Helper Configuration page appears.
3. Click Download to download the MSI installer file.
4. Copy the Account UUID from the AD Helper Configuration page.
You use the Account UUID tin the next procedure to configure the AD Helper.
5. Run the downloaded file as an administrator.
Next, configure AD Helper to connect to your Active Directory domain controller and your TDR account. To configure
AD Helper, you connect to a local web server on port 8080.
10. In the Domain Controller text box, type the name of your Active Directory domain controller.
11. In the Port text box, specify the port you use for connections to the domain controller. Port, 389, is specified by default.
12. From the Protocol drop-down list, select the protocol to use for the connection to the domain controller.
13. Click Save.
The Domain Controller is added to the list. of servers
14. In the Name text box, type the name of your Active Directory domain.
15. In the Fully Qualified Name text box, type the FQDN (fully qualified domain name) of your Active Directory domain.
16. In the Logon Domain text box, type the domain name that you must specify to log in to the Active Directory domain
controller.
17. In the Username and Password text boxes, type the account credentials that AD Helper must use to log in to your
Active Directory domain controller.
18. Click Save.
AD Helper connects to your Active Directory domain controller and sends the list of hosts and domains to your TDR account.
Active Directory synchronization does not happen instantly. It can take up to two hours for AD Helper to
fully synchronize all host, group, and domain information to your TDR account.
After you set up AD Helper, you can install Host Sensors on the hosts in your Active Directory domain from your
TDR account.
1. Log in to the TDR web UI as a user with Operator credentials.
2. Select Devices > Hosts.
A list of hosts on your network appears. The Install State column indicates whether a Host Sensor is installed.
3. To install a Host Sensor on one host, in the Install State column for that host, click .
The Install State changes to Pending Install. AD Helper receives a request to install the Host Sensor.
Because the Firebox sends log messages about your network events to your TDR account, it is
important to configure the Firebox to send a log message when it blocks, drops, or denies a connection.
When you enable Threat Detection and Response on your Firebox, we recommend that you configure policies to:
n Inspect network traffic, and do not allow traffic that is considered a threat
n Enable Gateway AV, IPS, APT Blocker, WebBlocker, and Reputation Enabled Defense
n Generate log messages for Deny, Drop, and Block actions
For the Firebox to inspect connections and take action when a threat is identified, you must configure proxy policies and
services. When you configure the proxy actions, make sure to enable logging and specify that a log message is generated for
any Deny, Block or Drop action. For example, to examine outbound HTTP, SMTP, and DNS connections, add these policies
to your Firebox configuration:
HTTP-proxy
Proxy action — HTTP-Client.Standard or Default-HTTP-Client
Enable Gateway AV, APT Blocker, WebBlocker and Reputation Enabled Defense in the proxy action
Enable logging for any Deny, Block, or Drop action in the proxy action
HTTPS-proxy
Proxy action — HTTPS-Client.Standard or Default-HTTPS-Client
Enable Content Inspection, with the HTTP-Client.Standard or Default-HTTP-Client proxy action
Enable Gateway AV, APT Blocker, WebBlocker, and Reputation Enabled Defense in the proxy action
Enable logging for any Deny, Block, or Drop action in the proxy action
SMTP-proxy
Proxy action — SMTP-Client.Standard
Enable Gateway AV and APT Blocker in the proxy action
Enable logging for any Deny, Block, or Drop action in the proxy action
If your Firebox allows incoming connections to servers or other resources on your network, make sure to configure a proxy
policy to inspect the incoming traffic and enable services and logging for any Deny, Block, or Drop action in the proxy action.
Administrator
A user assigned the Administrator role can manage user accounts and global Host Sensor settings. A user with the
Administrator role has limited visibility into the status of the system, but cannot see the Dashboard or information about
current incidents.
Administrators can:
n Manage user accounts and user roles
n Change their own user roles
n Change Host Sensor settings
n See the CYBERCON level
n See the status of Firebox and Host Sensor licenses
n Generate and schedule reports
n See the Audit Log
Operators can:
n Change the CYBERCON level
n See the Dashboard
n Take action on incidents and indicators
n Add policies and exclusions
n Generate and schedule reports
n Set up AD Helper, Host Sensors, and Fireboxes
n See information about hosts and network events
n See domain and group information
n Add signature overrides
n See the Audit Log
The actions available to each user in a service provider account are based on the user role, as described in the next section.
Multi-Tier Management
Threat Detection and Response is a multi-tenant, multi-tier system. Each Service Provider account can manage many
customer accounts. Each managed customer account has a separate UUID that uniquely identifies the account. The
Service Provider deploys Host Sensors and Fireboxes, and manages policies, actions, and reports separately for each
managed account. Data is not shared between managed accounts.
As a Service Provider, you create accounts for each of your customers in your TDR service provider account.
After you create an managed customer account, you can assign Host Sensors to each account.
Administrator (SP)
A user assigned the Administrator (SP) user role in a Service Provider account can create managed customer accounts for
the Service Provider account, and can assign Host Sensor licenses to managed customer accounts. A user with the
Administrator (SP) user role can also complete the same actions for a managed account as a user with the Administrator
role.
Administrators can:
n Manage user account roles of other users in the Service Provider account
n Add managed customer accounts
n Assign host sensor licenses to managed accounts
n Configure the global Host Sensor settings in each managed account
n Manage all customer accounts with the same privileges as a user assigned the Administrator role
Operator (SP)
A user assigned the Operator (SP) role is the Operator for all accounts managed from the Service Provider account. The
Operator can manage all managed customer accounts with the same privileges as a user assigned the Operator role.