Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Documentation Search

    Example: Using Profiler to Investigate Unanticipated Attacks

    Suppose your corporate security policy does not permit SQL servers on the internal network. However, during a regular Microsoft update, SQL applications are installed on a network server, without your knowledge. Because you are not aware that an SQL server is running on your network, you have not configured security policy rules to block SQL attacks.

    Suppose you receive a call informing you that the SQL Slammer worm attacks and infects your network.

    To investigate:

    1. Create a custom TCP service object to represent Microsoft SQL (default port: TCP/1433).
    2. Restart the Profiler.
    3. In the NSM navigation tree, select Investigate > Security Monitor > Profiler to display the Profiler viewer.
    4. Click the Network Profiler tab and review the source, destination, and service data.
    5. Use a filter to display only records matching the SQL service object you created in Step 1.

      The filtered view highlights the SQL servers in your network.

    6. Take appropriate measures to secure the network, such as:

      • Applying patches.
      • Removing the components from your network.
      • Removing SQL server from all components.
      • Creating a rule in your security policy that drops all SQL connections between your internal network objects.

    Published: 2011-02-08