The Spotlight Secure Threat Intelligence Platform aggregates threat feeds from multiple sources to deliver open, consolidated, actionable intelligence to SRX Series Devices across an organization. This product is now superseded by the Juniper Connected Security Policy Enforcer. The Juniper Connected Security framework delivers enhanced security from external as well as internal attacks by leveraging both security as well as network devices as a coherent security system.
Policy Enforcer is an orchestration solution that orchestrates user intent policy enforcement for threat remediation as well as micro-segmentation across the entire network. This document talks about the logistics of migrating from Spotlight Secure to Policy Enforcer.
Spotlight Secure and Policy Enforcer with Sky ATP are two different platforms and therefore a direct migration of threat policies from Spotlight Secure to Policy Enforcer is not supported. Instead it is recommended that you remove Spotlight Connector from your Space Fabric and remove threat related configurations on Security Director before you install Policy Enforcer. Then you will need to reconfigure your data and threat feeds. The following sections provide an overview of the transition process from Spotlight Secure to Policy Enforcer with Sky ATP.
The function of Spotlight Secure connector, to bring together all the available threat intelligence and make it available to security policies, is now done via Policy Enforcer with Sky ATP. In addition, Policy enforcer is a key part of the Juniper Connected Security Solution.
Spotlight Secure was installed to a separate virtual machine and then added as a specialized node to the Junos Space Fabric on Junos Space until version 15.1. Policy Enforcer is shipped as a virtual machine that is deployed independently. Instead of adding the new VM as a Junos Space node, the configuration has been simplified with a workflow using the Security Director user interface.
Note Spotlight Secure supported a HA deployment. The current version of Policy Enforcer is supported only as a single stand-alone deployment.
For existing Spotlight Secure customers, no new additional license is needed. If you have a Spot-CC license, it can be used with Policy Enforcer and Sky ATP as well. A Policy Enforcer license would only be needed if you want to use the complete set of Juniper Connected Security features with Sky ATP. Juniper Connected Security/Policy Enforcer features includes all threat prevention types: C&C, infected hosts, malware, GeoIP, and policy management and deployment features such as secure fabric and threat prevention policies. See Features By Sky ATP Configuration Type for more details.
The following table provides a product comparison:
Table 310: SKY ATP and Spotlight support Quick Summary
Feature | Support in Spotlight Secure | Support with Policy Enforcer and Sky ATP | Workflow using Sky ATP, Security Director and Policy Enforcer |
---|---|---|---|
Command and Control Feed | Fully Supported | Fully Supported |
|
Custom Feeds | Blocklist, Allowlist, and Dynamic Address features are fully supported. | Blocklist, Allowlist, Infected Host, and Dynamic Address features are fully supported |
|
Infected Host | Not directly supported by Spotlight. You must create custom feeds | Sky ATP supports an Infected Host feed, natively integrated with Policy Enforcer and Security Director. | Sky ATP supports an Infected Host feed, natively integrated with Policy Enforcer and Security Director. |
Infected Host Remediation at the Access Network level | Not supported using Spotlight and Security Director | Sky ATP supports an Infected Host feed which is natively integrated with Policy Enforcer. Policy Enforcer can take block/quarantine actions at the access network level. Note: This requires a Policy Enforcer license and does not come with a SPOT_CC license. | Sky ATP supports an Infected Host feed which is natively integrated with Policy Enforcer. Policy Enforcer can take block/quarantine actions at the switch port level. |
In this section, there is a side by side comparison of feature configuration for Spotlight Secure on Security Director 15.1 and Policy Enforcer on Security Director 16.1 and higher to aid in re-configuring your threat policies.
This is an overview of the tasks needed to migrate:
Note Since the underlying operation system is upgraded to Centos6.8 on Junos Space version 16.1, first upgrade Junos Space and applications to 15.2R2 and then follow the documentation to restore the database before deploying 16.1 or higher. Please refer to the Junos Space 16.1 release notes for details.
Policy Enforcer provides centralized, integrated management of all your security devices (both physical and virtual), allowing you to combine threat intelligence from different solutions and act on that intelligence from one management point. Using Policy Enforcer and the intelligence feeds it offers through Sky ATP, you can create threat prevention policies that provide monitoring and actionable intelligence for threat types such as known malware, command and control servers, infected hosts, and Geo IP-based server data.
Policy enforcer is shipped as a OVA file that should be deployed over VMware ESX.
Note Do not change the name of the Policy Enforcer virtual machine image file that you download from the Juniper Networks support site. If you change the name of the image file, the creation of the Policy Enforcer virtual machine can fail.
Figure 140: Deploy Policy Enforcer OVF File 1
Figure 141: Deploy Policy Enforcer OVF File 2
Note See Deploying and Configuring the Policy Enforcer with OVA files for the complete Policy Enforcer installation documentation.
Figure 142: Policy Enforcer Configuration Summary
Note Unlike Spotlight Secure, Policy Enforcer does not need to be added to Junos Space Fabric. The addition is done only through the Security Director UI.
Sky ATP with Juniper Connected Security—All Policy Enforcer features and threat prevention types are available
Sky ATP—All threat prevention types are available: Command and control server, Geo IP, and Infected hosts.
Cloud feeds only—Command and control server and Geo IP are the only threat prevention types available.
No selection (No Sky ATP)—You can choose to make no selection. When you make no selection, there are no feeds available from Sky ATP, but the benefits of Secure Fabric, Policy Enforcement Groups, and Threat Prevention policies provided by Policy Enforcer are available. Infected hosts is the only prevention type available
Note You can switch from Cloud feeds only to Sky ATP, or SKY ATP to SKY ATP with Juniper Connected Security, but the reverse is not supported.
Note If you upgrade from Cloud feeds only to Sky ATP, you cannot roll back again. Upgrading resets all devices previously participating in threat prevention, and you must re-enroll them with Sky ATP. This is true for upgrading from Sky ATP to SKY ATP with Juniper Connected Security. “SKY ATP with Juniper Connected Security” is for the Juniper Connected Security solution and not covered in this section.
Note See Sky ATP Configuration Type Overview for the Policy Enforcer documentation on this topic.
Note Policy Enforcer with Sky ATP does not support a workflow for removing Policy Enforcer. To switch to a different Policy Enforcer, replace the IP and login information in the Policy Enforcer settings page.
The following section is a side by side comparison of how advanced threat prevention features were configured on Spotlight Secure compared to how they are configured with Policy Enforcer.
Configuring Command and Control and Infected Host
Spotlight Secure: C&C and Infected Host
This is how C&C and infected host feeds were configured on Security Director 15.1 with Spotlight Secure:
Figure 143: Spotlight Secure: Add Information Source
Figure 144: Spotlight Secure: Create Security Intelligence Profile
Figure 145: Spotlight Secure: Create Profile
Figure 146: Spotlight Secure: Create Security Intelligence Policy
Figure 147: Spotlight Secure: Apply Security Intelligence Policy to Firewall Policy
Policy Enforcer with Sky ATP: C&C and Infected Host
This is how C&C and infected host feeds are configured on Security Director 16.1 and higher with Policy Enforcer:
Note Policy Enforcer can be configured with Sky ATP or Cloud feeds only to enable Command and Control feeds. The following instructions are for Cloud feeds only.
Note In addition to the instructions provided here, Threat Prevention Guided Setup under Configuration > Guided Setup > Threat Prevention can be leveraged for a wizard driven workflow.
(You must have a Sky ATP account to configure a realm. If you do not have an account please click on the link provided in the Sky ATP Realm window to create one at the Sky ATP account page. See Creating Sky ATP Realms and Enrolling Devices or Associating Sites for details).
Note You do not need a Sky ATP premium license to create an account or realm.
Figure 148: Policy Enforcer: Create Threat Prevention Policy
Figure 149: Policy Enforcer: Create Threat Prevention Policy, Select Threat Score and Logging
Figure 150: Policy Enforcer: Apply Threat Prevention Policy to Firewall Policy
Figure 151: Policy Enforcer: Update Firewall Policy
Note If Sky ATP is chosen as the Sky ATP Configuration Type under Administration > Policy Enforcer > Settings, the workflow remains the same, but additional parameters become available for configuring anti-malware.
Configuring Custom Feeds
Spotlight Secure: Custom Feeds
This is how custom feeds were configured on Security Director 15.1 with Spotlight Secure:
Figure 152: Spotlight Secure: Add Information Source
Figure 153: Spotlight Secure: Configure Custom File Upload
Figure 154: Spotlight Secure: Enter Server Login for Custom File Upload
Figure 155: Spotlight Secure: Select Custom Feed in Dynamic Address Group
Figure 156: Spotlight Secure: Select Dynamic Address in Security Policy
Figure 157: Spotlight Secure: Edit Global Whitelist or Blacklist
Policy Enforcer with Sky ATP: Custom Feeds
This is how custom feeds are configured on Security Director 16.1 and higher with Policy Enforcer:
Note In addition to the instructions provided here, Threat Prevention Guided Setup under Configuration > Guided Setup > Threat Prevention can be leveraged for a wizard driven workflow.
Policy Enforcer supports manually adding or uploading custom feed information from a file server. The custom feed can be a dynamic object, infected hosts list, allowlist or blocklist which can then be used within the match criteria of a firewall rule.
Figure 158: Policy Enforcer: Configure Custom Feed
Note Dynamic objects can be used within a firewall policy to match criteria as a source or destination address object.
Note Policy Enforcer supports only cloud based C&C feeds and not custom C&C feeds. Policy Enforcer APIs can be used to extend this functionality.
Figure 159: Policy Enforcer: Upload Custom File
Figure 160: Policy Enforcer: Use Dynamic Addresses in Firewall Policy
Configuring Geo IP
Spotlight Secure: Geo IP
This is how Geo IP feeds were configured on Security Director 15.1 with Spotlight Secure:
Figure 161: Spotlight Secure: Create Geo IP with Dynamic Address Group
Figure 162: Spotlight Secure: Use Geo IP in Firewall Policy
Policy Enforcer with Sky ATP: Geo IP
This is how Geo IP feeds are configured on Security Director 16.1 and higher with Policy Enforcer:
Figure 163: Policy Enforcer: Create Geo IP
Figure 164: Policy Enforcer: Use Geo IP in the Firewall Policy