{"id":1375,"date":"2015-03-02T17:22:53","date_gmt":"2015-03-02T17:22:53","guid":{"rendered":"http:\/\/emtunc.org\/blog\/?p=1375"},"modified":"2017-02-24T15:23:53","modified_gmt":"2017-02-24T15:23:53","slug":"cisco-ironport-esa-useful-content-filters","status":"publish","type":"post","link":"https:\/\/emtunc.org\/blog\/03\/2015\/cisco-ironport-esa-useful-content-filters\/","title":{"rendered":"Cisco IronPort ESA &#8211; Useful Content Filters"},"content":{"rendered":"<p>In this article I will briefly discuss some content filters that I think could come in handy for IronPort ESA users.<br \/>\nSome of these can also be useful for outbound mail &#8211; for example, you should detect and notify when executables are sent outbound as it could be indicative of an internal outbreak which you obviously want to know about.<\/p>\n<p><!--more--><\/p>\n<ol>\n<li>\n<h3><strong>Quarantine Active Exploits<\/strong><\/h3>\n<p>Use this content filter to block malicious e-mails (usually based on file type) that are based on active\/in-the-wild exploits. For example, the 0-day .RTF exploit late last year that could cause remote code execution just by viewing a .RTF attachment in Outlook.<\/li>\n<li>\n<h3><strong>Quarantine or Drop invalid bounce backs<\/strong><\/h3>\n<p>Set the condition: Other Header &#8211;&gt; Header Name: <strong>X-Bounce-Valid<\/strong> with header value: Equals = <strong>Failed<\/strong>.<\/p>\n<p>This filter will drop bounce backs from spoofed e-mails. i.e., a bounce back from someone you didn&#8217;t e-mail in the first place.<\/li>\n<li>\n<h3><strong>Quarantine SPF<\/strong><\/h3>\n<p>Use this filter to quarantine hard fail SPF e-mails.<br \/>\nA hard fail means that the sender&#8217;s domain administrator has explicitly defined hosts that are permitted to send e-mails on behalf of the domain. This content filter will check the sender&#8217;s IP against the SPF DNS record and if there is a match, the message is allowed.<br \/>\nSet the condition: SPF Verification: <strong>Is = Fail<\/strong><\/li>\n<li>\n<h3><strong>Quarantine DKIM hard fail<\/strong><\/h3>\n<p>Similar to the above whereby a message is signed with a digital signature defined by the domain keys in DNS. If a message is sent without the correct keys then it is likely that the message is spoofed.<\/li>\n<li>\n<h3><strong>Quarantine malicious and &#8216;bad&#8217; file types<\/strong><\/h3>\n<p>Create a content dictionary with &#8216;bad&#8217; file types. There are plenty of comprehensive lists online which have some good recommendations on what you should and shouldn&#8217;t block to keep your e-mail environment healthy.<br \/>\nMy list consists of:<\/p>\n<pre class=\"lang:default decode:true  \">.com$,.vb$,.vbs$,.vbe$,.cmd$,.bat$,.ws$,.wsf$,.scr$,.shs$,.hta$,.jar$,.js$,.jse$,.lnk$,.bas$,.chm$,.cpl$,.crt$,.hlp$,.inf$,.ins$,.isp$,.msc$,.msi$,.msp$,.mst$,.pif$,.reg$,.sct$,.url$,.wm,$,.wsc$,.wsh$,.exe$<\/pre>\n<\/li>\n<li>\n<h3><strong>URL categories<\/strong><\/h3>\n<p>Define a content filter for URL categories to be blocked by the IronPort.<br \/>\nSet the condition: URL Category and choose which categories to block in your organisation. Some obvious ones are &#8216;Adult, Child Abuse Content, Pornography&#8217;, etc.<\/p>\n<p>Here I also added a condition to block e-mails which have &#8216;dropbox.com&#8217; in the body. I have noticed in the past that a lot of malicious files are linked via Dropbox so better to be safe than sorry.<\/li>\n<li>\n<h3><strong>Malicious and Suspicious URL Reputation<\/strong><\/h3>\n<p>Set a content filter for malicious and suspicious URLs as this can block a lot of spam and malicious e-mails.<\/li>\n<li>\n<h3><b>Legal Disclaimer (Outbound Only)<br \/>\n<\/b><\/h3>\n<p>Some legal departments insist on an outbound legal disclaimer (footer) to be applied to mail. This is pretty straight forward to do on the IronPort.<br \/>\nSimply create a <em>Text Resource\u00a0<\/em>under\u00a0<em>Mail Policies<\/em> and choose the\u00a0<em>Add Disclaimer Text<\/em> option in the content filter.<br \/>\nP.S. By not adding any conditions to this filter, it will\u00a0<span style=\"text-decoration: underline;\">always<\/span> apply.<\/li>\n<\/ol>\n<p>That&#8217;s it for now! If I come across any other useful filters I will follow up with another post or update this one.<\/p>\n<p>Feel free to share your most used filters in the comments section below!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article I will briefly discuss some content filters that I think could come in handy for IronPort ESA users. Some of these can also be useful for outbound mail &#8211; for example, you should detect and notify when executables are sent outbound as it could be indicative of an internal outbreak which you [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[1],"tags":[135,161],"class_list":["post-1375","post","type-post","status-publish","format-standard","hentry","category-tech","tag-cisco-ironport","tag-content-filters"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1trTO-mb","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/1375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/comments?post=1375"}],"version-history":[{"count":18,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/1375\/revisions"}],"predecessor-version":[{"id":2485,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/1375\/revisions\/2485"}],"wp:attachment":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/media?parent=1375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/categories?post=1375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/tags?post=1375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}