How to Limit the Impact of Malware

List 1: For environments managed by an IT Professional (e.g., staff with IT support as a primary or sole duty for an entire campus, college, department or business unit)
  1. Where practicable, do not grant administrative or root/superuser privileges to end-users.
    1. Commonly called LUA (least user access)
  2. Know where your data are.
    1. The tools listed below can help you locate sensitive data on your systems:
      1. Identity Finder, Spider, SENF, Find_SSNs
    2. Securely erase data if it is no longer needed.
      1. Information from the Electronic Frontier Foundation, DBAN
    3. Concentrate security resources on systems containing sensitive data.
  3. Microsoft Windows continues to be a major target - focus your efforts here first. Having said that, ensure the rest of your technology environment is also well managed.
    1. Install important security updates on all affected systems (Microsoft Windows, Apple Mac OS, Linux, Unix, etc.) as soon as practicable.
      1. The following tools can help you deploy updates: Secunia(.edu specific information), Bigfix, WSUS, Shavlik, VT WSUS
    2. Harden passwords to prevent password guessing worms from infecting your system via File Sharing, RDP, etc
      1. ADpasswordfilter
    3. Watch systems for new unexplained listening network ports
      1. Portinator
    4. Follow established best-practices for securing mission-critical systems or systems that store, process or transmit sensitive information.
      1. Information Security Guide
  4. Regularly participate in security training and awareness events.
    1. For IT staff:
      1. SANS Institute
      2. SANS Partnership Series (discounts for higher-ed)
      3. Security Professionals Conference
    2. For everyone else:
      1. EDUCAUSE Cybersecurity Awareness Resource Library
  5. Install and appropriately maintain end-point defenses.
    1. Use centrally managed anti-virus and anti-spyware software where appropriate.
      1. Microsoft System Center 2012 Endpoint Protection
    2. Enable and appropriately configure host-based firewalls where practicable. This is particularly important for out-bound traffic.
      1. Enable Windows advanced firewall and push In/Out rules via group policy (if possible) for consistent application: link
    3. Install host-based intrusion prevention software where practicable.
      1. eEye Blink, Mcafee Host Intrusion Prevention for Desktop,Symantec Critical System Protection,Checkpoint Endpoint Security, Cisco Security Agent
    4. Where feasible, make available protection software licensed for home use.
  6. Use an intrusion detection/prevention system where practicable.
    1. Snort, Bro, Fireeye, eEye, Tippingpoint
  7. Use DNS based protection where practicable.
    1. Sink-holes, OpenDNS, guidance from the MAAWG, host file
  8. Use web filtering software, services or appliances where practicable.
    1. Websense, Squid, Microsoft Forefront Threat Management Gateway
  9. Implement application white-listing where practicable.
    1. Bit9,CoreTrace,Savant, Windows 7 built-in AppLocker
  10. Know where you are vulnerable.
    1. Nessus, Nmap, Metasploit, Core, Canvas, Rapid7, SafetyNet
    2. Review status reports from available patch-management systems.
  11. Gather vulnerability and threat information from online sources.
    1. For vulnerabilities in software
      1. Secunia, National Vulnerability Database, SANS Top Cyber Security Risks
    2. For current threats
      1. SANS Internet Storm Center, F-Secure, Web Sense Security Labs, FireEye, M86 Security Labs, Malware Intelligence, Arbor Networks, Microsoft Security Response Center
  12. Monitor available logs and network activity for indicators of malicious software.
    1. Regularly check anti-virus logs.
    2. Regularly check DNS traffic for queries to known malware hosting domains.
    3. Subscribe to Shadowserver notifications for networks you manage.
    4. Centralize event log management and apply appropriate logic to identify out-of-spec results
      1. Microsoft System Center Operations Manager
  13. Have a back-up strategy for your endpoints.
    1. Ensure backup stream is encrypted over the wire.
  14. Make sure people can report problems to you.
    1. Are all your points of contact in whois current (e.g., for your domain, and for your IP blocks, and for your ASN)?
    2. Do you have RFC2142 standard abuse reporting addresses?
    3. If someone checks for your domain at www.abuse.net, will they find reasonable abuse reporting contacts listed?
  15. Know where to get help.
    1. Online malicious software analysis tools
      1. ThreatExpert, Anubis, CWSandbox, JoeBox
    2. Your local network team.
    3. Your local desktop support and/or server support team.
    4. Report domain names with bad whois information.
    5. Sign up for Google's hostmaster tools to scan your sites and report malware infections: link
    6. REN-ISAC
    7. US-CERT
    8. EDUCAUSE
  16. Share your knowledge.
    1. Submit new malware samples to your anti-virus vendor. Doing so may result in early/beta signature files to help with current problems.
      1. Learn what the submission process is for your vendor as soon as possible so you don't waste precious time during a crisis figuring out who to talk to and how to submit your sample.
    2. Submit new malware samples to VirusTotal.
    3. Participate in the REN-ISAC.
    4. Participate in EDUCAUSE.
    5. Participate in DSHIELD
  17. Ensure your incident management/response process is current.
    1. The following guidance is available from the Internet2 Computer Security Incidents working group: Security Incident Management Essentials

#Top of page

List 2: For personally managed environments (e.g., IT support is a secondary duty or not specifically assigned to anyone in particular)
  1. Do not use an account with administrator or root/superuser privileges for day-to-day activities such as surfing the web or checking e-mail. Only use a privileged account when necessary.
  2. Know where your data are.
    1. If you are not storing sensitive university data on your computer, such as personally identifiable information other than your own, you greatly reduce the scope and potential of harm in the event of malware compromise. The tools listed below can help you locate sensitive data on your computer:
      1. Identity Finder, Spider, SENF, Find_SSNs
    2. Securely erase data if it is no longer needed.
      1. Information from the Electronic Frontier Foundation
  3. Windows:
    1. Make sure Windows Update is enabled and set to at least notify you whenever updates are available. Additionally, tools like FileHippo.com Update Checker and Secunia OSI can help you stay up to date on individual Windows computers.
  4. Mac OS X:
    1. Use the built-in Software Update feature. Additionally, you might also be interested in tools like Appfresh, MacUpdate Desktop and Versiontracker to help with third-party application updates.
  5. Install and appropriately maintain end-point defenses.
    1. Use anti-virus and anti-spyware software where appropriate.
    2. Enable and appropriately configure host-based firewalls where practicable. This is particularly important for out-bound traffic.
    3. Use a security-focused DNS host file.
  6. Deploy network-based defenses.
    1. Use DNS based protection where practicable.
      1. OpenDNS
  7. Know where you are vulnerable.
    1. Nessus, Nmap,Metasploit
  8. Gather vulnerability and threat information from online sources.
    1. For vulnerabilities in software
      1. Secunia, National Vulnerability Database, SANS Top Cyber Security Risks
    2. For current threats
      1. SANS Internet Storm Center, F-Secure, Web Sense Security Labs, FireEye, M86 Security Labs, Malware Intelligence, Arbor Networks, Microsoft Security Response Center
  9. Have a back-up strategy for your endpoints.
    1. If centralized backups are not available, potential options include:
      1. Off-site/"In the cloud": Mozy,Jungledisk,Carbonite,Windows Live Skydrive, Dropbox, Syncplicity,Sugarsync,Apple MobileMe
      2. Local: Apple Time Machine, Microsoft Windows 7 Backup and Restore
  10. Know where to get help.
    1. Online malicious software analysis tools
      1. ThreatExpert, Anubis, CWSandbox, JoeBox
    2. Other local IT support professionals.
    3. Your central IT support staff.
    4. Your central IT Security team.
    5. Report domain names with bad whois information.
    6. REN-ISAC
    7. US-CERT
    8. EDUCAUSE

#Top of page

List 3: Operating on very limited resources (e.g., smaller schools where dedicated IT professionals are relatively rare or environments with only one or two dedicated security staff)
  1. As best as you can, determine which computers contain the largest repositories of sensitive data on your campus. Doing so will help you focus your limited security resources on protecting IT assets with the biggest potential for data compromise.
    1. The tools listed below can help you locate sensitive data on your systems:
      1. Identity Finder, Spider, SENF, Find_SSNs
    2. Securely erase data if it is no longer needed.
      1. Information from the Electronic Frontier Foundation
  2. Implement network based protection that will cover as many users and IT assets as possible.
    1. Use DNS based protection where practicable.
      1. Sink-holes, OpenDNS, guidance from the Messaging Anti-Abuse Working Group
    2. Use web filtering software, services or appliances where practicable.
      1. Websense, Squid
  3. If you have not already done so, develop your incident management/response process.
    1. The following guidance is available from the Internet2 Computer Security Incidents working group: Security Incident Management Essentials

#Top of page


(question) Questions or comments? (info) Contact us.

(warning) Except where otherwise noted, this work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0).