You are on page 1of 18

1 | First aid kit for sys admins Try GFI LanGuard today FREE 30-Day trial

e-book: A GFI Software™ publication


First aid kit for sys admins

Sys admins have to deal with network and security emergencies every
so often, so here’s a first aid kit with a number of tips on how to handle
various emergency scenarios and the necessary steps to take.

2 | First aid kit for sys admins


Contents
When disaster strikes...........................................4

Malware infection..................................................5

Cracked passwords...............................................8

Defaced website....................................................10

Unauthorized access to critical data..........12

Compromised DNS...............................................14

Licensing violations..............................................15

Stolen hardware......................................................16

Conclusion.................................................................17

3 | First aid kit for sys admins


When disaster strikes
You’ve found a virus running on
your server. You discover logon IDs 1. Don’t panic
on your network that you don’t
2. Assess the situation
recognize and you can’t delete them.
The logs say someone accessed 3. Keep the team informed
the payroll admin’s computer and 4. Take steps to minimize
copied the master earning report. A the damage
hacker emails you saying they have
5. Determine the appropriate
your credit card database. Any one
remediation response
of these is enough for you to hit
the panic button and lose it – don’t. 6. Follow the appropriate steps
These things happen, and when they for the situation
do, just keep a cool head on your
7. Learn from the incident
shoulders and follow the established
procedure for dealing with issues. 8.
KEEP
In our First aid kit for sys admins, we’re CALM
AND
going to give you the steps you
need to take to provide immediate CARRY
aid to hacked systems, infected ON
workstations, compromised services
and other computer emergencies
that will come up from time to time
in any network. There are eight steps
to take for any incident:

Try GFI LanGuard today FREE 30-Day trial First aid kit for sys admins | 4
Like us on Facebook

Malware infection
Even companies that have antivirus is caused by a virus. Confirm
running on all their servers and that the system is infected by
workstations may eventually scanning with your antivirus
experience a software or an emergency boot
malware disk. If there is
infection. A any doubt,
network err on the side
that is not of caution.
secured against zero-day
attacks; out-of-date definitions;
»» Contain the infection.
antivirus software that is turned off
Remove the system from
to speed up performance can all,
the network. Disconnect the
in turn, lead to a malware infection
Ethernet cable, disable the Wi-Fi
– and that’s without even talking
and then shut the computer
about infected attachments in email,
down until you can boot from
malicious files on USB drives, etc.
known good media to proceed
Microsoft has a six-step incident
with remediation. You don’t
response plan that works very well
want the virus destroying other
for most companies. Here are the
data on the PC, trying to spread
highlights, along with a seventh
to other systems on your
critical step:
network or spewing out spam
to the Internet.
»» Confirm the infection. Not
everything that looks strange

5 | First aid kit for sys admins Try GFI LanGuard today FREE 30-Day trial
»» Determine the course of can clean the system this way,
action. Many IT professionals so that you don’t have to rely
prefer to nuke a machine from upon the software on the PC
high orbit, just to be sure, rather that was already breached by
than attempting to clean an the malware.
infection. However, there may
»» Attempt to restore the
be critical data on the hard
system state. If you cannot
drive which you have to back
clean the machine but you
up first. If it is an application
have a good backup, try
server you may not have the
restoring from that backup or
option to rebuild, so you will
disabling system restore.
need to decide whether to
clean the malware or restore »» Rebuild the system. If you
from backup. cannot clean or restore, you
have no choice but to rebuild
»» Attempt to clean the system. the system from scratch. Back
Boot the system from a USB key
up any critical files first, and
or optical media that you have
then completely wipe the drive
your antivirus software installed
before beginning the install.
upon, with updated definitions,
in case you cannot get »» Conduct a post-attack
network access. Some antivirus review. Fix the problem.
applications have the ability to Discuss how the malware got
create an emergency boot disk past your current defenses,
for cleaning infected systems, and address the shortcomings
so check your chosen solution to reduce the chance of this
for that. Check whether you happening again.

Try GFI LanGuard today FREE 30-Day trial First aid kit for sys admins | 6
Follow us on Twitter

You can read the entire Microsoft »» What Process – This website
article that details these steps, has a useful database of
and you can download useful Windows processes to help you
supplemental content. You can figure out what is running on
also see how to create a bootable your system.
Windows 7 USB key.

Helpful tools
Here are some helpful tools to
assist you when dealing with an
infected system:

»» PsTools – This collection of


tools can help you identify
running processes, and more
importantly, kill the ones
that you don’t want but
cannot stop.
»» Netstat – This article may be
old, but the steps to use netstat
to identify what processes are
using the network are effective
all the way through Windows 8.

7 | First aid kit for sys admins Try GFI LanGuard today FREE 30-Day trial
Cracked passwords
There are lots of ways that passwords accountability, and you may have a
can be “cracked” and not all of them situation where someone can now
involve technology. Users write access data that they shouldn’t. Here’s
passwords down, share them with how to handle this:
others and pick ones that can be
easily guessed. Password cracking »» Force all users who might
software, key be impacted to change their
loggers and sniffing passwords. You can do this in
unencrypted traffic AD (Active Directory) by simply
ticking a box to require users to
change their password at
next logon.
»» Implement a strong
password policy. Microsoft
provides recommendations
are secondary
as to what makes a strong
to bad user
password, as well as how to
habits. If one
implement this with AD.
of your users
knows another »» Remind users about your
user’s password, policy regarding securing
you lose the passwords. This may require
ability to more of a training approach
maintain than a conversational one.
individual

Try GFI LanGuard today FREE 30-Day trial First aid kit for sys admins | 8
Follow us on YouTube

»» Consider setting up logon


auditing to prevent this
from happening again in
the future. Microsoft offers
information on how to
do this.

Helpful tools
Here are some tools to help you
with account lockout issues:

»» The account lockout


tools – This set of tools
includes the Event Log Parser
EventCombMT.exe and other
tools to find which domain
controller is processing a
lockout event, so you can then »» KeePass – One of the many
locate the source. very good open source
»» How to create a strong password tools, which are
password – Simple steps you infinitely better than writing
can share with users to help passwords down or reusing
them create strong, easy-to- the same password for
remember passwords. different purposes.

9 | First aid kit for sys admins Try GFI LanGuard today FREE 30-Day trial
Defaced website
This is the technical equivalent of against your website to see
someone spray painting graffiti on how the person got access to
your building, but it’s visible around your system in the first place.
the world. You will want to restore
»» Remediate any vulnerabilities
your website to normal operation
and apply any missing patches.
as soon as possible, but you will
also want to make sure this doesn’t »» Restore your website content
happen again. from backup.
»» Rescan your server with the
»» Take the web server offline restored content before
and put up a simple “Under returning it to service.
Maintenance” page on another
server so your visitors know you
»» Make sure the entire team
understands what happened so
will be back soon.
you can reduce the chance of it
»» Perform a vulnerability scan happening again.

Try GFI LanGuard today FREE 30-Day trial First aid kit for sys admins | 10
Helpful tools
Here are some tools to assist you with
keeping an eye on your website:

»» Wget – A great command line


tool for mirroring websites. Use
it to grab a copy of all the static
content on your website.
»» Site 24x7 – Not only can the
web-based service monitor
your services; it can also alert
you if any page changes
on your website.
»» Google Webmaster
Tools – Use these free tools
from Google to scan your site
for malware and identify
other issues.

11 | First aid kit for sys admins Try GFI LanGuard today FREE 30-Day trial
Unauthorized access to
critical data
Whether an internal user was just
poking around or an attacker gained
access to your network and started
looking for data to steal, when
unauthorized access to critical data
occurs, you must respond swiftly
and completely. In some cases, you
must also disclose the incident in
compliance with the law.

Try GFI LanGuard today FREE 30-Day trial First aid kit for sys admins | 12
Join us on LinkedIn

»» Determine what data was »» Consult your legal counsel to


accessed. Use access logs, determine whether you should
when possible, to determine notify customers, consumers or
whether data was simply a regulatory agency.
touched, copied or altered.
»» Scan your network for other
»» Determine how the data was instances of the same problem
accessed and remediate this that led to this unauthorized
immediately. Open FTP servers, access and fix those issues.
peer-to-peer software, websites
with improper permissions or Helpful tools
open shares on the internal Here are some tools to help you
network can all easily be review access to data:
exploited by others to gain
access to data. »» Logparser – This powerful log
mining tool can help you parse
»» Work with the data owner
through several different
and the people who have
log formats.
authorized access to confirm
your findings. »» Cacls – This tool can dump
and/or modify file system
»» Determine whether the
access control lists.
data access was done with
malicious intent or not. If it
was accessed by an attacker,
assume malicious intent. If by
an employee, work with HR to
determine the intent.

13 | First aid kit for sys admins Try GFI LanGuard today FREE 30-Day trial
Compromised DNS
This is one of the worse things that »» Determine how the
can happen to a company, since it unauthorized access occurred.
means the attacker can redirect all Were passwords guessed, were
email, website visits and other traffic they reset with new credentials
destined for that network. Because sent to a compromised email
this happens to companies large and account, or was a change
small, it’s critical for you to keep an request sent from a spoofed
eye on things and to act swiftly if an email account? However
attacker does manage to compromise it happened; implement
your DNS. procedural changes to ensure it
doesn’t happen again.
»» Immediately contact your
service provider or registrar to Helpful tools
cut off the unauthorized access Use these tools to help you
to your DNS records. with DNS:

»» Restore your zone files »» Dig for Windows – Much more


from backup. powerful than nslookup.

»» Be open and honest about »» DNS Stuff – A premium


what happened. Notify your collection of DNS tools on
customers and vendors so that the Internet.
they are aware that anything »» DNS Lint – A great tool for
that they might have been diagnosing and testing DNS
redirected to was inadvertent. both for AD and other purposes.

14 | First aid kit for sys admins Try GFI LanGuard today FREE 30-Day trial
Licensing violations
Licensing violations can cost even »» Work with the vendor to
small businesses tens of thousands obtain licenses for software
of dollars to remediate. When users you cannot uninstall as quickly
install software that they don’t have as possible.
a license for, it’s the company that is
»» Educate your users on the
on the hook to the vendor for this;
importance of complying with
so preventing this from happening
licensing requirements, and
is critical.
train them on the proper way
to request licensed software for
»» Uninstall unapproved business purposes.
software from all
systems immediately.
»» Close open network
shares to software if
users were installing
from the network.

Try GFI LanGuard today FREE 30-Day trial First aid kit for sys admins | 15
Read our blog posts

Stolen hardware
Hardware theft can cost a company a and who is responsible for
significant part of its annual IT the hardware.
budget, but it can also go
»» Train users on the importance
undetected for weeks
of securing laptops, portable
or even months.
storage media and other
Maintaining a
hardware both at their
complete, accurate
desk, in their car and
and current
when travelling.
inventory of your
hardware assets »» Notify law enforcement
is crucial. Properly of any hardware thefts.
securing servers in a »» Ensure that all storage
locked server room, media is encrypted to prevent
using security cables data loss if the hardware
to lock laptops down is stolen.
when users travel, and ensuring users
sign agreements for any hardware
»» Encourage users to use
backpacks or other “less
they take out of the office will
obvious” ways to transport their
help to reduce the likelihood
laptops; also avoid displaying
of hardware loss.
company logos on bags as
these will attract attention
»» Maintain a complete inventory
and temptation.
of all hardware purchased,
including serial numbers

16 | First aid kit for sys admins Try GFI LanGuard today FREE 30-Day trial
Visit www.gfi.com

Conclusion
Of course, prevention is better than the tools you need to perform
cure. Implementing the right tools patch management, vulnerability
on your network to help you patch assessments, network audits and
your systems, deploying antivirus more, take a look at GFI LanGuard®.
software, performing security scans You can get a fully functional
and maintaining an inventory, could 30-day trial so you can see for
prevent or at least help with most of yourself how powerful this application
the incidents outlined in the e-book. is, and how much it can help you with
your preventative efforts.
If you’re looking for a virtual
security consultant that provides

Try GFI LanGuard on your business network


Your 24/7 virtual security consultant

FREE 30-Day trial

First aid kit for sys admins | 17


USA, CANADA AND CENTRAL AND SOUTH AMERICA
15300 Weston Parkway, Suite 104, Cary, NC 27513, USA
Telephone: +1 (888) 243-4329
Fax: +1 (919) 379-3402
ussales@gfi.com

33 North Garden Ave, Suite 1200, Clearwater, FL 33755, USA


Telephone: +1 (888) 243-4329
Fax: +1 (919) 379-3402
ussales@gfi.com

UK AND REPUBLIC OF IRELAND


Magna House, 18-32 London Road, Staines-upon-Thames, Middlesex, TW18 4BP, UK
Telephone: +44 (0) 870 770 5370
Fax: +44 (0) 870 770 5377
sales@gfi.co.uk

EUROPE, MIDDLE EAST AND AFRICA


GFI House, San Andrea Street, San Gwann, SGN 1612, Malta
Telephone: +356 2205 2000
Fax: +356 2138 2419
sales@gfi.com

AUSTRALIA AND NEW ZEALAND


83 King William Road, Unley 5061, South Australia
Telephone: +61 8 8273 3000
Fax: +61 8 8273 3099
sales@gfiap.com

For a full list of GFI offices/contact details worldwide, please visit http://www.gfi.com/contactus

Disclaimer
© 2013. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners.
The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but not limited
to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind
that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided,
GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-of-date information, or errors. GFI
makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document.
If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.

First aid kit for sys admins | 18

You might also like