Online criminals hate us. We protect you from attacks that antivirus can't block.

Dashboard Features: Group Policy Overview

This article sets the guidelines for navigating the Group Policy interface.

The article will be structured into 3 segments, which illustrate and explain each feature:

  1. General
  2. Thor Vigilance
  3. Thor Foresight

 

Pic_1.jpg

 

General

This feature allows the user to add this GP to a specific AD Group.

Pic2.jpg

The AD Computer Group is the AD Group where all the machines are. This way, whenever that machine comes online only the policy will be applied.

The AD User Group is the AD Group where the all the users are. This way, whenever that user logs onto a computer, the policy begins to be applied.

Policy check interval and Licensing check interval - These features also checks if the policy is applied correctly on the machines. This option is designed to push the policy on all the computers an interval set previously. This way, the policy will also be applied to the machines that were offline when a change was made in the dashboard.

Include in Release Candidate Program - This feature, once enabled, it will update the current version of Thor Foresight Enterprise to BETA (Release Candidate) version. This will happen only on the machines that are using the Group Policy where this option was checked.

Do not show GUI - This feature is designed to offer the possibility to deploy Thor Enterprise without GUI (Graphical User Interface) or to deploy the Beta version/RC of Thor Enterprise.

Note: We recommend everyone running Thor Foresight on Terminal Servers or Citrix servers to make sure that "Do not show GUI" is checked before the entire policy (Thor Foresight Enterprise installation included) is set to be deployed.

Enforce uninstall password – This feature allows to set up a password that will be required when uninstalling Thor Enterprise from one of the machines are related to this Group Policy. 

Synchronize with the time server – This feature will run two silent commands that will keep the time on the server up to date. These commands will run in the background every time Thor Foresight Enterprise Scans the machine. The commands are:

w32tm /resync

net time /set /y 

In order for all the changes made to take effect, remember to click on the Update button in the Bottom left side.

 

Thor Vigilance

By enabling this feature, the antivirus will turn ON.

pic_3__1_.png

General Settings

Enable Real-Time Protection – The endpoints will be scanned in real-time to catch both known and unknown threats. 

  • The default scan action on infected – This allows you to set up the action that you want the antivirus to take upon detecting a threat: Deny, Quarantine or Allow.

Pic_4.jpg

  • The default scan action on suspicious - This allows you to set up the action that you want the antivirus to take upon detecting a suspicious file: Deny, Quarantine or Allow

Pic_5.jpg

Update virus definitions interval [min] – The default time interval is 120 min but can be modified up to 360 min. This feature is designed to check whether there are new virus definitions files (VDF’s) within the Thor Enterprise cloud. If a new VDF is available, this gets automatically downloaded to the local agent database. It is recommended to have the limit set to 120 min in order to update the database as soon as possible.

Pic_6.png

Schedule Scan

As the name states, this section allows you to schedule a scan that suites your needs. You can start creating a schedule by pressing ADD NEW SCAN button on the right side.

2018-04-27_11-14-07.png

Scan Profile Name – In this section you can add the name for the profile you want to create.

Scan Type – This allows you to chose what type of scan you wish Thor Vigilance to run in the profile created.

2018-04-27_11-38-36.png

  • Full scan – profile will scan all the local files on the endpoints that have the policy applied
  • Quick scan – profile will scan critical OS locations and the most usual target folders which are known for virus activity
  • HardDrive scan – profile will scan all files on the hard drive while ignoring the files on all external media types
  • LocalDrive scan – profile will scan all files that are hosted on the partition hosting the OS
  • System scan – profile will scan system files only
  • RemovableDrive scan – profile will only scan for files that become accessible from external sources like flash drives
  • Active Processes Scan – profile will only scan for processes currently running on the target machine

Once the Scan Profile Name and Scan type have been chosen, Heimdal Dashboard allows you to set the timeframe when Thor Vigilance antivirus will start to run. 

You can choose which days of the week you want the antivirus to run on.

2018-04-27_12-00-50.png

You can also choose which days of the month you want the antivirus to run on. Usually, this option is used in corporations that have a very strict maintenance policy.

 2018-04-27_12-01-43.png

 

Choose time interval - This allows you to set up a timeframe for when Thor Vigilance should run the created scan profile.

IMPORTANT!

  • The scan profile does not apply automatically in the policy after clicking the “set scan” button. The administrator needs to confirm this by clicking the “update-policy” button. If the update is not clicked, the defined scan profile will be lost if the current page is left before updating the policy.
  • Multiple scan profiles can be created inside a single Thor Vigilance policy. However, the scan type is exclusive. This means that it is not possible to create multiple profiles with the same scan type. Example: no 2 scan profiles can be defined to perform full scans in the same policy.

Exclusion list

This feature allows you to add exclusions that Thor Vigilance will ignore during scanning.

2018-04-27_12-37-41.png

There are 3 types of exclusions that are allowed:

2018-04-27_12-38-59.png

  • Filename – This option is used if you want Thor Vigilance to ignore a specific file from being scanned or from any actions being taken upon it by our antivirus.
  • File Path - This option is used if you want Thor Vigilance to ignore a specific File Path from being scanned or from any actions being taken upon it by our antivirus.
  • Directory - This option is used if you want Thor Vigilance to ignore a specific Directory from being scanned or from any actions being taken upon it by our antivirus.

General Quarantine List

This feature allows you to add a specific file or path to quarantine. It is used to define a certain AV behaviour when a certain file with a distinct file name is created on the hard drive. Also, it can be tweaked to only apply to files in a certain physical location. 

2018-04-27_12-51-59.png

Basically, the administrator is telling the agent that whenever a certain file name is found on the hard drive, the file gets automatically quarantined. As already stated, this is also valid for file paths: whenever a file is detected on a certain path, that file gets quarantined immediately.

 

Thor Foresight

This engine is structured into 3 features:

- DarkLayer Guard

- VectorN Detection

- X-ploit Resilience

2018-04-27_13-19-26.png

This section of the Group Policy is designed to administrate the Thor Foresight engine embedded in Thor Enterprise.

 

DarkLayer Guard

By enabling the DarkLayer Guard, Thor Foresight will add the DNS 127.7.7.x to the network adapter’s IPv4. This is basically the network filter that will protect the computer from getting infected.

1. Enable High Compatibility Mode – The option is by default enabled for all accounts. This incurs a 15 ms of a delay in applying the Dark Layer Guard filter over the network card (NIC) which currently has internet access, in order to allow all relevant Microsoft Windows OS services to start up normally. The services which are allowed to start up normally are in charge of vital extended environment tasks like domain discovery, network drives authentication, etc. This option enhances functionality in large corporate environments, but it can be disabled if so desired.

2. Automatically Disable Traffic Filtering - If Thor Foresight can’t connect to the cloud servers from your location, Traffic Filtering won’t work properly. This may disconnect your PC from the Internet. To avoid this, you can choose to automatically disable Traffic Filtering. Thor Foresight will re-enable the feature when it can reconnect to the cloud servers.

3. Use default loopback address: Once checked, DarkLayer GUARD will set your DNS to 127.0.0.1 instead of 127.7.7.x. It will also set ::1 as your loopback address for IPv6. This will enforce DarkLayer GUARD to intercept traffic from a single adapter. This setting helps ensure compatibility between Thor Foresight and certain VPN products, as well as other software you may use, such as virtualizations products.

4. Force DHCP DNS usage - If enabled, this feature will make sure you will always have the NIC Card set to automatic DNS in case Thor Foresight fails to add 127.7.7.x on the NIC Card. This option is recommended to be enabled if: 

a. You are using VPN connections in your organization

b. Nobody from your organization uses Static IP.

(We recommend you to contact support before enabling this option)

5. Enable VectorN detection lockdown - this option is recommended to be enabled only if you also have enabled High Compatibility Mode. If enabled, this option will override the High Compatibility Mode option and 127.7.7.x will never be removed from the NIC Card. This option was introduced for users that have the High Compatibility Mode enabled, but Thor Foresight detects a malware pattern on the machine and locks down any gate for this malware, including at reboot, shut down when the user is exposed if he has the High Compatibility Mode option on. 

6. Cisco Anyconnect IPv6 compatibility mode - Enabling this feature will reroute traffic from IPv6 to IPv4 on a Cisco Anyconnect adapter, to solve a known bug in Cisco Anyconnect IPv6 filtering.

7. Check Interval - by using this feature, you can adjust the time for Thor Foresight to initiate a network scan.

8. Enable domains whitelist – This feature allows the user to whitelist a domain that Thor Foresight blocks the access to it due to being suspicious. The domain can be added in the field that appears once the feature is ticked and press adds to whitelist it.

2018-04-27_14-08-47.png

You also have the possibility to upload a CVS file with multiple domains (divided by "," comma).

Example:

facebook.com, youtube.com, amazon.com. That way these domains will be accessible by all machines that are part of the Group Policy. 

The domain can be removed from the whitelist by clicking on the red X next to it.  It will automatically become blacklisted again once this is done.

9. Enable domains blacklist - This feature allows the user to blacklist a domain that Thor Foresight does not consider a threat. Perhaps you want to prohibit access to a specific domain in your environment. You can use this option to block it. You can add the domain to the field that appears once your tick the feature. Just click on “add” to blacklist it.

2018-04-27_14-10-13.png

You also have the possibility to upload a CVS file with multiple domains (divided by "," comma).

Example:

facebook.com, youtube.com, amazon.com. That way these domains will be not accessible by all machines that are part of the Group Policy. 

You can remove the domain from the blacklist by clicking on the red X next to it.  It will automatically become whitelisted again once this is done.

10. Enabled custom block pages – This feature allows you to add a custom HTML page that will be displayed when Thor Foresight blocks a domain instead of the one shown by Thor Foresight.

2018-04-27_14-12-21.png

11. Enable proxy settings – This feature is designed to install Thor Foresight if the user uses a specific proxy server by adding the needed information in the fields displayed. For more information how to set it up please click HERE.

2018-04-27_14-14-55.png

 

VectorN Detection

This feature is designed to periodically scan the system for malware. For more information regarding this feature and what it does, please download and read the latest whitepaper that can be found HERE.2018-04-27_14-16-38.png

It will identify patterns of malicious domain requests and filter these accordingly. The computers identified by VectornN as potentially infected are to be ultimately treated as threats by the system administrator, investigated and scanned for threats either manually or automatically.  

 

X-ploit Resilience

By enabling the X-Ploit Resilience feature, it will allow the user to install or update on all the computers that are added to the Group Policy a specific software from the list.

2018-04-27_14-21-23.png

2018-04-27_14-22-31.png

In order for all the changes made to take effect, you have to click the Update button on the Bottom left side.

1. The Manage Application offers the following actions:

  • The user can select to install and update a specific software on the computers from the GPO
  • The user can select to monitor the software without letting Thor Foresight patch them automatically. This can be done just by marking the checkbox called "Enable this module" 
  • The user can select to install a specific version of the software if it's required by the system.
  • The user can select to only update a specific software on the computers from the GPO. This implies that the software selected is already installed on the machines.
  • The user can select to only install a specific software on the computers from the GPO. This will only install the latest version of the selected software but will not update it if a new version of it will be released.
  • The user can select to update all the pieces of software by checking the option Keep All Up to date. This option will select all the pieces of software and will update them if they are found on the machines that use the Group Policy. Also, it will gray out and will not allow any modifications or exclusions.
  • The user can use the option USER INSTALLATION ALLOWED– This feature will allow the user to install by himself a piece of software that has this option checked in the Group Policy.
  • The user can select a specific day of the week when Thor Foresight can install the updates

Note! Even if no option to Install or Update is selected, Thor Foresight will monitor the found applications from the machines and are also present in our application list. The number of monitored applications can be seen here:

2018-05-08_13-20-31.png

  • The user can select one or more days in a Week when Thor Foresight can install the updates

2018-04-27_14-26-04.png

  • The user can select one or more days in a month when Thor Foresight can install the updates

2018-04-27_14-26-50.png

  • The user can select a certain period of the day or exclude a certain period of the day when the patches to be applied. 

Note: If Select All for Install is enabled, when we add new software in Thor Foresight, they will be automatically installed on your machines. 

2. Lockdown a certain software version

The Group Policy also allows you to select a certain version of a software and lock it down. That means Thor Foresight will not update it anymore.

Note:  If you have a higher version installed and you lock down a lower version, Thor Foresight will not be downgraded, but if you have a lower version of the software and you lock down a higher version, Thor Foresight will update that software to the version you selected. 

 

2018-04-27_14-30-30.png

3. Delay a Patch

Last but not least is the Delay option.

This option offers you the possibility to delay a patch with 1, 3, 7 or 30 days. That means the patch will be applied to your machine after 3 days since we added in Thor Foresight's X-Ploit Resilience.

2018-04-27_15-48-03.png

4. Uninstall Applications

Another feature that the patching system offers is the Uninstall Applications.

This feature allows the user to:

  1. Uninstall a specific application by writing its name in the field and pressing Add or Enter.

For example, maybe you need to remove Adobe Acrobat Reader DC from all the machines.

In this case, you need to add the full name of the application in the field and press Add or Enter.

2018-04-27_15-52-57.png

Important notes:

  • If the “Starts with” option is selected before pressing Add, Thor Foresight will uninstall everything from the computer that begins with the word “Adobe”. That is why you should know exactly what software needs removing. An example will be Adobe Acrobat Reader DC. That way, you can ensure that Thor Foresight will only remove the software Adobe Acrobat Reader DC.
  • If you need to remove a software app from the Managed Application list from all the computers, then you need to make sure that the option to ”Install” or “Update” is not selected in order for it to work.

For example

2018-04-27_15-57-11.png

Then that happens because, in the Managed Application list, Adobe Reader is still selected to perform one of the following actions: Install or Update. Removing these actions will allow the software to be uninstalled.

        2. This feature allows uninstalling software that is not on the Managed Application list. It can be any other software from the computer. As mentioned previously, you have to write the full name of the software (as it appears in Control panel) before pressing Add.

 For more information about this feature please click HERE.

In order for all the changes made to take effect, remember to click on the Update button on the bottom left side.

 

 

 

 

Was this article helpful?
1 out of 1 found this helpful
Have more questions? Submit a request

0 Comments

Article is closed for comments.