Get access to immediate incident response assistance.
Eliminate active threats with 24/7 threat detection, investigation, and response.
Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.
Advance your cybersecurity program and get expert guidance where you need it most.
Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.
Prevent unauthorized access and exceed compliance requirements.
Stop email threats others miss and secure your organization against the #1 ransomware attack vector.
Prepare for the inevitable with 24/7 global breach response in-region and available on-site.
Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.
Microsoft Windows Update (although whitelisted) fails if user authentication/identification is used.
In an environment where authentication or identification is defined and a user attempts to use Microsoft/Windows Update site, after selecting the hotfixes to install, the site's control starts running and then reports the installation attempt failed.
The reason that the pages are blocked is because whenever the ActiveX is trying to access the web, the authentication fails and the wrong policy is assigned to the user at hand, in such a case the policy that will be used is the one assigned to Unknown Users.
If the policy that is assigned to Unknown Users is to block all access to the internet, the ActiveX component will fail to download updates from the update site.
Since authentication will not work for the Microsoft/Windows Update site, the following options are availlable::
Both solutions will require setting up a security policy rule to whitelist the Microsoft/Windows update site.For the following examples, this Security Policy will be referred as “The Restricted SP”.This can be an existing Security Policy that will be modified or a new Security Policy that will be created specifically for this solution.
TIP: To identify the URLs to whitelist, you can find the currently blocked URLs in the Web Logs screen of the Policy Server admin web GUI.
For more information on how to perform the actions described above, please consult the User Manuals . Solution 1Assign The Restricted SP to the Unknown Users.
Solution 2Limiting access by client IP:Since we don’t want to lose the identification by username, we will duplicate and change the current Identification Policy and add a rule at the end to identify by client IP.
Create a new user or user group which will be assigned The Restricted SP, enter the IP ranges for this user group, or add individual users with specific IP addresses.An example is given below, for more information on how to perform these actions, consult the User Manuals.
Now when you have the Users and Security Policies setup up you will need to create the appropriate Identification Policy.Perform the following steps from the policy server web admin GUI:
Now you have an identification process that first try to perform an identification/authentication handshake (will work with supported browsers), and if fails will Identify the client using the Source IP (X-Client-IP HTTP Header).If the user is browsing from an IP address assigned to the user group using the Restricted SP then the user will have access to the Microsoft/Windows Update site.All other users will be treated as Unknown Users.
To contact Trustwave about this article or to request support: