You are on page 1of 6

DATA SHEET

McAfee Advanced Threat Defense


Detect advanced malware

McAfee® Advanced Threat Defense enables organizations to detect advanced, evasive malware McAfee Advanced Threat
Defense Key Differentiators
and convert threat information into immediate action and protection. Unlike traditional
sandboxes, it includes additional inspection capabilities that broaden detection and expose
Broad solution integration
evasive threats. Tight integration between security solutions—from network and endpoint ■■
Integration with existing McAfee
to investigation—enables instant sharing of threat information across the environment, solutions, third-party email
enhancing protection and investigation. Flexible deployment options support every network. gateways and other products
supporting open standards
■■
Close the gap from encounter
Our technology has transformed the act of detection by in-depth static code analysis that inspects file attributes to containment and protection
connecting advanced malware analysis capabilities with and instruction sets to determine intended or evasive across the organization
existing defenses—from the network edge through the behavior and assesses similarity with known malware ■■
Streamline workflows to expedite
endpoint—and sharing threat intelligence with the entire families. A final step in the analysis, McAfee Advanced response and remediation
IT environment. By sharing threat intelligence across the Threat Defense specifically looks for malicious indicators ■■
Enable automation
ecosystem, integrated security solutions work together that have been identified through machine learning
Powerful analysis capabilities
to immediately shut down command-and-control via a deep neural network. Combined, this represents ■■
Combine in-depth static code
communications, quarantine compromised systems, the strongest advanced malware security protection analysis, dynamic analysis,
block additional instances of the same or similar threats, on the market and effectively balances the need for and machine learning for
assess impact, investigate, and take action. both in-depth inspection and performance. While lower more accurate detection with
analytical intensity methods such as signatures and unparalleled analysis data
McAfee Advanced Threat Defense: Detect Advanced features support the
real-time emulation benefit performance by catching
■■

Advanced Threats SOC and enable investigation


more easily identified malware, the addition of in-
McAfee Advanced Threat Defense detects today’s depth static code analysis and insights gained through
stealthy, zero-day malware with an innovative, layered machine learning to sandboxing broadens detection of
approach. It combines low-touch analysis engines highly camouflaged, evasive threats. Malicious indicators
such as antivirus signatures, reputation, and real- Connect With Us
that may not execute in a dynamic environment can
time emulation with dynamic analysis (sandboxing) to be identified through unpacking, in-depth static code
analyze actual behavior. Investigation continues with analysis, and machine learning insights.

1 McAfee Advanced Threat Defense


DATA SHEET

Malware writers use packing to change the composition McAfee Advanced Threat Defense can integrate in Flexible, centralized deployment
of the code or to hide it in order to evade detection. different ways: direct with select security solutions,
■■
Reduce cost with centralized
deployment that supports multiple
Most products cannot properly unpack the entire through McAfee Threat Intelligence Exchange, or
protocols
original (source) executable code for analysis. McAfee through McAfee Advanced Threat Defense Email ■■
Flexible deployment options
Advanced Threat Defense includes extensive unpacking Connector. support every network
capabilities that remove obfuscation, exposing the
A direct integration enables security solutions to take Integrated Solutions
original executable code. It enables in-depth static code
action on files convicted by McAfee Advanced Threat McAfee® Active Response
analysis to look beyond high-level file attributes for
■■

Defense. They can immediately incorporate threat McAfee® Advanced Threat Defense
anomalies, analyzing attributes and instruction sets to
■■

intelligence into existing policy enforcement processes Email Connector


determine the intended behavior.
and block additional instances of the same or similar ■■
McAfee® Enterprise Security
Together, in-depth static code, machine learning, files from entering the network. Manager
and dynamic analysis provide a complete, detailed ■■
McAfee® ePolicy Orchestrator ®
McAfee Advanced Threat Defense convictions appear software
evaluation of suspected malware. Unparalleled analysis
in the integrated products’ logs and dashboards as McAfee® Network Security
output produces summary reports that provide broad
■■

if the entire analysis had been completed onboard, Platform


understanding and action prioritization, and more
streamlining workflows and enabling administrators to ■■
McAfee® Threat Intelligence
detailed reports that provide analyst-grade data on
efficiently manage alerts by working through a single Exchange
malware.
interface. −− McAfee® Application Control
Enhance protection −− McAfee® Endpoint Protection
Integration with McAfee Threat Intelligence Exchange −− McAfee® Security for Email
Tight integration between McAfee Advanced Threat
extends McAfee Advanced Threat Defense capabilities Servers
Defense and security devices—from the network edge
to additional defenses including McAfee Endpoint −− McAfee® Server Security
through the endpoint—enables integrated security
Protection and enables a broad range of integrated McAfee® Web Gateway
devices to take immediate action when McAfee
■■

security solutions to access analysis results and Bro Network Security Monitor
Advanced Threat Defense convicts a file as malicious.
■■

indicators of compromise. If a file is convicted by McAfee TAXII (Trusted Automated


This tight and automated integration between detect
■■

Advanced Threat Defense, McAfee Threat Intelligence eXchange of Indicator Information)


and protect is critical.
Exchange immediately publishes threat information via
a reputation update to all integrated countermeasures
within the organization.

2 McAfee Advanced Threat Defense


DATA SHEET

McAfee Threat Intelligence Exchange-enabled endpoints Threat-sharing to enhance and automate


can block patient-zero malware installations and provide investigation
proactive protection if the file appears in the future. To investigate and remediate an attack, organizations
McAfee Threat Intelligence Exchange-enabled gateways need comprehensive visibility with actionable
can prevent the file from entering the organization. intelligence to make better decisions and respond
Additionally, McAfee Threat Intelligence Exchange- appropriately. McAfee Advance Threat Defense produces
enabled endpoints continue to receive file conviction in-depth threat intelligence that is easily shared across
updates when off-network, eliminating blind spots from your entire environment to enhance and automate
out-of-band payload delivery. investigations. Support for McAfee Data Exchange Layer
McAfee Advanced Threat Defense Email Connector (DXL) and REST application programming interfaces
enables McAfee Advanced Threat Defense to receive (APIs) facilitates integrations with other products
email attachments for analysis from an email gateway. and widely used threat-sharing standards, such as
McAfee Advanced Threat Defense analyzes files in the Structured Threat Information eXpression (STIX)/
attachments and returns a verdict to all active email Trusted Automated eXchange of Indicator Information
gateways within the header of the message. The email (TAXII) further enables organizations to create, support,
gateway can then take policy-based action, such as and expand a collaborative security ecosystem.
deleting or quarantining the attachment, preventing Within a McAfee ecosystem, McAfee Enterprise
the malware from infecting and spreading into the Security Manager consumes and correlates detailed file
internal network. An offline mode enables email with reputation and execution events from McAfee Advanced
attachments to be delivered to the end user while being Threat Defense and other security systems to provide
scanned by McAfee Advanced Threat Defense. The email advanced alerting and historic views for enhanced
gateway does not wait for a verdict on the attachment. security intelligence, risk prioritization, and real-time
Administrators view attachment scanning results situational awareness. With indicator of compromise
through McAfee Advanced Threat Defense or McAfee data from McAfee Advanced Threat Defense, McAfee
Threat Intelligence Exchange. For enhanced detection Enterprise Security Manager will look back up to six
at the email server, McAfee Advanced Threat Defense months to hunt for indications of these artifacts in any
integrates with McAfee Security for Email Servers network or system data it has retained. It can reveal
through McAfee Threat Intelligence Exchange. systems that have previously communicated with newly

3 McAfee Advanced Threat Defense


DATA SHEET

identified malware sources. Tight integration with ■■ Sample submission to multiple virtual
McAfee Endpoint Protection, McAfee Threat Intelligence environments: Speeds investigation by determining
Exchange, and McAfee Active Response optimizes which environment variables are needed for file
security operations response and efficiency with execution.
visibility and action such as issuing new configurations, ■■ Detailed reports: Provide critical information for
implementing new policies, removing files, and deploying investigation including MITRE ATT&CK™ mapping,
software updates that can proactively mitigate risk. disassembly output, memory dumps, graphical
Informed action is easily taken when infected endpoints function call diagrams, embedded or dropped file
across the network are automatically identified by information, user API logs, and PCAP information.
McAfee Active Response and listed in McAfee Advanced Threat time lines help visualize attack execution steps.
Threat Defense reports. Analyst efficiency is increased
■■ Bro Network Security Monitor integration:
when these detailed reports are viewed from a single
Deploy Bro sensor to a suspected network segment
workspace within McAfee Active Response.
to monitor and capture traffic and forward files to
Advanced capabilities support investigation McAfee Advance Threat Defense for inspection.
McAfee Advanced Threat Defense offers numerous, Deployment
advanced capabilities including: Flexible advanced threat analysis deployment options
■■ Configurable operating system and application support every network. McAfee Advanced Threat
support: Tailor analysis images with select Defense is available as an on-premises appliance or a
environment variables to validate threats and support virtual form factor, with support for both private and
investigation. public cloud with availability in the Azure Marketplace.
■■ User interactive mode: Enables analysts to interact
directly with malware samples.
■■ Extensive unpacking capabilities: Reduces
investigation time from days to minutes.
■■ Full logic path: Enables deeper sample analysis by
forcing execution of additional logic paths that remain
dormant in typical sandbox environments.

Figure 1. Timeline activity visualizes execution steps of the analyzed threat.

4 McAfee Advanced Threat Defense


DATA SHEET

Figure 2. Results map to MITRE ATT&CK™ framework.

Figure 3. A filtered view of the results displayed in Figure 2 focuses report on identified techniques.

5 McAfee Advanced Threat Defense


DATA SHEET

McAfee Advanced Threat Defense Specifications Learn More


Physical form factor ATD-3100 ATD-6100
1U Rack-Mount 1U Rack-Mount For information or to start an
Virtual form factor v1008 evaluation of McAfee Advanced
ESXi 5.5, 6.0, 6.5, 6.7 Threat Defense, contact your
Hyper-V Windows Server 2012 R2, Windows Server 2016
Azure Marketplace representative or visit

Detection www.mcafee.com/atd.

File sample types supported PE files, Adobe files, MS Office Suite files, Image files, Archives, Java, Android Application Package, URLs
Analysis methods McAfee Anti-Malware, GTI reputation: file/URL/IP, Gateway Anti-Malware (emulation and behavioral
analysis), dynamic analysis (sandboxing), in-depth code analysis, custom YARA rules, machine learning:
deep neural network
Supported OS Win 10 (64-bit), Win 8.1 (64-bit), Win 8 (32-bit/64-bit), Win 7 (32-bit/64-bit), Win XP (32-bit/64-bit), Win
Server 2016, Win Server 2012, Win Server 2012 R2, Win Server 2008, Win Server 2003, Android
Windows operating system support available in all languages.
Output formats STIX, OpenIOC, XML, JSON, HTML, PDF, text
Submission methods Point product integrations, RESTful APIs, manual submission, and McAfee Advanced Threat Defense Email
Connector (SMTP)

2821 Mission College Blvd. McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other
Santa Clara, CA 95054 marks and brands may be claimed as the property of others. MITRE ATT&CK and ATT&CK are trademarks of The MITRE Corporation. Copyright
888.847.8766 © 2018 McAfee, LLC. 4169_1118
NOVEMBER 2018
www.mcafee.com

6 McAfee Advanced Threat Defense

You might also like