{"id":1721,"date":"2020-08-10T21:53:35","date_gmt":"2020-08-10T21:53:35","guid":{"rendered":"https:\/\/partnernews.sophos.com\/fr-fr\/?p=1721"},"modified":"2020-09-02T14:25:02","modified_gmt":"2020-09-02T14:25:02","slug":"making-the-most-of-xg-firewall-v18-part-4","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/fr-fr\/2020\/08\/products\/making-the-most-of-xg-firewall-v18-part-4\/","title":{"rendered":"Comment exploiter au maximum XG Firewall\u00a0v18\u00a0: 4\u00e8me\u00a0Partie"},"content":{"rendered":"<h2>Protection contre les menaces zero-day et les ransomwares.<\/h2>\n<p>Dans notre <a href=\"https:\/\/www.sophos.com\/fr-fr\/medialibrary\/Gated-Assets\/white-papers\/sophos-the-state-of-ransomware-2020-wp.pdf\">rapport intitul\u00e9 \u2018\u00c9tat des Ransomwares\u00a02020\u2019<\/a>, plus de la moiti\u00e9 des entreprises interrog\u00e9es dans 26\u00a0pays ont d\u00e9clar\u00e9 avoir \u00e9t\u00e9 prises pour cible par un ransomware au cours des 12\u00a0derniers mois.\u00a0 Ce constat montre bien le besoin critique d\u2019une identification et d\u2019une protection pr\u00e9dictives concernant les menaces zero-day, \u00e0 mesure que des menaces avanc\u00e9es telles que les ransomwares deviennent plus cibl\u00e9es et \u00e9vasives.<\/p>\n<p>In this fourth in our series of articles on making the most of the great new features in XG Firewall v18, we\u2019re going to specifically focus on the new capabilities in XG Firewall v18 designed to protect against the latest zero-day threats such as new ransomware variants.<\/p>\n<h2>Xstream Threat Protection<\/h2>\n<p>In previous articles, we covered the Xstream Architecture and the new DPI engine, the new TLS inspection solution, and the Network Flow FastPath.\u00a0 These all play a critical role in identifying and stopping the latest zero-day threats.\u00a0 This article highlights the new cloud-based Threat Intelligence and Sandstorm sandboxing technologies which are part of the Sandstorm Protection subscription.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1722 \" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/08\/XG-Firewall-Xstream.png\" alt=\"\" width=\"640\" height=\"339\" \/><\/p>\n<h2>How it Works<\/h2>\n<p>XG Firewall v18 includes new machine learning (ML) based Threat Intelligence and a newly enhanced version of Sandstorm Sandboxing, to catch the latest threats.\u00a0 They work together to identify the latest zero-day threats.\u00a0 Both are powered by SophosLabs Intelix which uses machine learning technology, decades of threat research, and petabytes of intelligence, providing unmatched protection against new and previously unseen threats.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1723\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/08\/SophosLabs-Intelix.png\" alt=\"\" width=\"640\" height=\"357\" \/><\/p>\n<p>When XG Firewall\u2019s Xstream DPI engine performs AV analysis on a file entering the network and determines there is active code, it holds the file temporarily and sends it to the SophosLabs Intelix service in the cloud for both static and dynamic (sandbox) analysis.\u00a0 It then provides a detailed overview of the results and only releases the file to the downloader or email recipient if the file is declared safe.<\/p>\n<p>This last step is important, as many advanced malware solutions on firewalls release a file to the end-user before the analysis is complete, potentially resulting in an extensive and expensive cleanup if the file is then ultimately convicted as a threat once all analysis is finished.<\/p>\n<p>Let\u2019s take a look at what happens to a file that is scanned in a bit more detail:<\/p>\n<h2>Threat Intelligence Analysis<\/h2>\n<p>Threat Intelligence uses multiple machine learning models to analyze the characteristics, features, genetics and global reputation of the file. It compares the new file with millions of known good and bad files in the SophosLabs database to render a verdict in seconds without the need to execute it in real-time.\u00a0 This makes it remarkably fast and effective at identifying new threats and new variants of existing threats, particularly with files which are not easily sandboxed, such as password protected documents.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1724\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/08\/Feature-Analysis.png\" alt=\"\" width=\"640\" height=\"293\" \/><\/p>\n<h2>Sandstorm Sandboxing Analysis<\/h2>\n<p>At the same time a file is submitted for Threat Intelligence Analysis, it is also submitted for dynamic behavioral analysis in our cloud sandbox environment. Because it\u2019s cloud-based, there\u2019s no additional software or hardware required, and no impact on firewall performance.<\/p>\n<p>To identify threats based on their behavior, SophosLabs has integrated the latest protection technologies from our industry-leading Intercept X next-gen endpoint product into the Sophos Sandstorm sandbox. This includes deep learning analysis, exploit detection, and CryptoGuard to detect active ransomware encrypting files in real time.\u00a0 The Sandbox also monitors all file, memory, registry and network activity as well as sandbox evasion techniques.\u00a0 No other firewall can offer this kind of run-time analysis with the world\u2019s best threat protection, Intercept X.\u00a0 And no other firewall offers the level of insight and reporting that XG Firewall provides \u2013 including a time-lapse series of screen shots showing events during the file execution.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1725\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/08\/Word-2010.png\" alt=\"\" width=\"640\" height=\"243\" \/><\/p>\n<p>Sandboxing is particularly effective at detecting threats that can lurk in normally benign files that may not have any obvious malicious characteristics.\u00a0 Office files with macros, or benign executables and application updates, that have been subverted by hackers, are prime candidates for detection through sandboxing.<\/p>\n<h2>How to Make the Most of this Threat Protection<\/h2>\n<p>There are three key things you need to enable this critically important protection:<\/p>\n<ol>\n<li>Ensure all your customer XG Firewall licenses include the Web and Sandstorm Protection subscriptions. They need both of these subscriptions active to be protected from the latest threats. The new Threat Intelligence analysis in XG Firewall v18 is part of the Sandstorm license adding tremendous value over the previous version at no extra cost.\u00a0 Log into XG Firewall and go to the <strong>Administration<\/strong> menu to see a list of active subscriptions.\u00a0 Be sure to proactively upgrade customers without this important protection.<\/li>\n<li>The new threat protection technology in XG Firewall can only inspect and analyze decrypted traffic so ensure that TLS encrypted web traffic is being inspected. With the vast majority of web traffic now encrypted, it\u2019s critical that to decrypt and inspect files being downloaded onto the network to have them analyzed for potential threats.\u00a0 <a href=\"https:\/\/news.sophos.com\/en-us\/2020\/07\/27\/making-the-most-of-xg-firewall-v18-part-2\/\">Check our recent article<\/a> on the great high-performance TLS Inspection solution in XG Firewall v18 for full details on how to take advantage of this great new capability.<\/li>\n<li>In all Firewall rules governing web traffic, ensure the following two web filtering security options are set to scan web traffic and use the latest zero-day protection technologies as outlined here.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1726\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/08\/Security-Features.png\" alt=\"\" width=\"600\" height=\"141\" \/><\/p>\n<p>That\u2019s it \u2013 it\u2019s really that easy!<\/p>\n<p>Check out this video for an in-depth guide on making the most of this new feature and a detailed look at the new and improved threat intelligence reporting and how to interpret the results:<\/p>\n<p><iframe loading=\"lazy\" title=\"v18 Threat Intelligence | Sandstorm Reporting\" src=\"https:\/\/player.vimeo.com\/video\/422806696?dnt=1&amp;app_id=122963\" width=\"640\" height=\"329\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write\"><\/iframe><\/p>\n<h2>Testing it Yourself<\/h2>\n<p>There\u2019s a convenient harmless test file which you can find at <a href=\"http:\/\/sophostest.com\/\">SophosTest.com<\/a> which will provide a sample report for you to review.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1727\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/08\/Sandstorm-Test-File-1.png\" alt=\"\" width=\"600\" height=\"258\" \/><\/p>\n<p>Also, keep an eye on the Control Center widget for the any recent file downloads that have been analyzed and then drill down for further details.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1728\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/08\/Control-Center.png\" alt=\"\" width=\"600\" height=\"456\" \/><\/p>\n<p>When clicking the Control Center widget (highlighted above), it drills down into a detailed list of files analyzed and their results.\u00a0 Mouse-over the results column to display the threat meter which provides a good high-level overview of the analysis results (as shown below).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1729\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/08\/Advanced-Threat.png\" alt=\"\" width=\"640\" height=\"361\" \/><\/p>\n<p>Here\u2019s a summary of the resources available to help make the most of the new features in XG Firewall v18, including the new zero-day threat protection capabilities:<\/p>\n<ul>\n<li><a href=\"https:\/\/docs.sophos.com\/nsg\/sophos-firewall\/18.0\/Help\/en-us\/webhelp\/startup\/nsg\/sfos\/concepts\/ControlCenterOverview.html\">XG Firewall getting started guide<\/a><\/li>\n<li><a href=\"https:\/\/docs.sophos.com\/nsg\/sophos-firewall\/18.0\/Help\/en-us\/webhelp\/onlinehelp\/index.html\">Full online XG Firewall documentation<\/a><\/li>\n<li><a href=\"https:\/\/www.sophos.com\/en-us\/support\/products\/xg-firewall\/how-to-library.aspx#newVersion\">How-to videos on what\u2019s new in v18<\/a><\/li>\n<li><a href=\"https:\/\/vimeo.com\/422806696\">Video on how to make the most of zero-day threat protection<\/a><\/li>\n<li><a href=\"https:\/\/community.sophos.com\/products\/xg-firewall\/f\/recommended-reads\">A full list of recommended community articles on v18<\/a><\/li>\n<\/ul>\n<p>If you\u2019re new to Sophos XG Firewall, <a href=\"https:\/\/www.sophos.com\/en-us\/products\/next-gen-firewall.aspx\">learn more<\/a> about the great benefits and features XG Firewall can deliver to your customer networks.<\/p>\n<p>&nbsp;<\/p>\n<h2>Selling XG Firewall<\/h2>\n<p>On the Sophos partner portal, we provide you with a wealth of\u00a0<a href=\"https:\/\/partners.sophos.com\/prm\/English\/s\/assets?collectionId=10929\" target=\"_blank\" rel=\"noopener noreferrer\">sales assets<\/a>. You may filter the list of assets by selecting a category to narrow down the results. And don\u2019t forget to check whether there is a\u00a0<a href=\"https:\/\/partners.sophos.com\/prm\/English\/s\/assets?collectionId=10956\" target=\"_blank\" rel=\"noopener noreferrer\">sales promotion<\/a>\u00a0available for your region. It\u2019s worth checking back from time to time to make sure you\u2019re not missing out on a great opportunity!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protection contre les menaces zero-day et les ransomwares. Dans notre rapport intitul\u00e9 \u2018\u00c9tat des Ransomwares\u00a02020\u2019, plus de la moiti\u00e9 des entreprises interrog\u00e9es dans 26\u00a0pays ont d\u00e9clar\u00e9 avoir \u00e9t\u00e9 prises pour cible par un ransomware au cours des 12\u00a0derniers mois.\u00a0 Ce [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":300000607,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[74],"tags":[26],"coauthors":[45],"class_list":["post-1721","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-xg-firewall"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/02\/xg-firewall-v18-1600x-960-horizontal.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts\/1721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=1721"}],"version-history":[{"count":1,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts\/1721\/revisions"}],"predecessor-version":[{"id":1782,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts\/1721\/revisions\/1782"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=1721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=1721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=1721"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/coauthors?post=1721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}