Fore Scout

ForeScout

Solution brief

feature

  1. Passive configuration without stopping critical systems
  2. Deep packet decoding of proprietary protocols for industrial control systems
  3. Mapping complex industrial networks
  4. Whitelist-based security detection with pre-learning
  5. Proprietary Industrial Threat Intelligence Delivery

Functions list

Use Case

Asset management
  • Identify devices and terminals in the system and manage information including vulnerabilities
network visualization
  • Graphical display of communication statistical data such as time series, type and rate, and volume during a specified period
  • Categorize by device type and hierarchy, and graphically display the entire network
Compliance with standards/guidelines
  • Helps meet international and regional standards/guidelines (e.g. IEC 62443, NERC CIP, NIST Cybersecurity Framework, etc.)
Control system security measures
  • Real-time detection of external threats with a blacklist/whitelist in a passive configuration that does not affect plant operation
Prevention of control system design/operation errors
  • By visualizing the communication direction, it is possible to grasp unwanted communication and find design mistakes.
  • By visualizing the contents of communication at a deep level, it is possible to understand even the details of operations, and to detect operation errors in real time.
Measures against internal improprieties in IT systems
  • Support for IT network protocols such as HTTP enables real-time detection of unauthorized access to important data/systems

Introduction image

  • Introduction image
Installation
  • Easy deployment due to passive configuration
arrow arrow
study period
  • Learn communication content
  • Enables ForeScout-defined security detections
arrow arrow
Operation start
  • Detects traffic that does not correspond to the profile set for each user by learning
  • It is also possible to create scripts for each user.

Function introduction

Network map function

There is a network map function that graphically browses the network information collected by the monitoring sensors in the command center. With the network map function, what protocols are common in specific periods and specific communications? where is the contact? You can check network trends such as In addition, sniffed packets can provide detailed asset information such as model name, firmware version, vulnerability information, and inter-system protocols over the network to find inactive hosts and vulnerable PLCs. In addition, it is also possible to automatically group by role or network hierarchy. Assists in compliance with international and regional standards/guidelines (e.g. IEC 62443, NERC CIP, NIST Cybersecurity Framework, etc.).

  • Network map function

security detection

There are detection logic implemented by ForeScout such as Built-in Module and thread library, and whitelist detection function by pre-learning such as LAN CP and DPBI. SD Script also allows users to write their own scripts in the LUA language. With this function, you can independently develop additional rules and implement rules for protocols and control devices that are not supported by SilentDefense.

Function name Overview Usage supplement
Built-in Module Detect threats as defined by ForeScout
  • Automatic detection of external threats through behavioral detection of unauthorized communication at a low layer (network level)
  • No pre-learning required
  • Upgrading updates/adds detection methods
LAN CP Whitelist detection based on communication direction
  • Analysis of communication direction
  • Detect unauthorized/unwanted/unknown communications
  • Detect policy violations by predefining communication direction
  • Prior learning required
  • design required
  • Target communication is updated/added by upgrade
DPBI Whitelist detection based on communication content
  • Analyze communication content
  • Detect unauthorized/unwanted/unknown communications
  • Since it can identify even specific values, it is also possible to detect unique operation errors.
  • It is possible to automatically leave evidence of specific operation details
  • Prior learning required
  • design required
  • Target communication is updated/added by upgrade
Thread library features Detect threats as defined by ForeScout
  • Automatic detection of common operation errors
  • Automatically detects design errors in general-purpose network equipment
  • Automatic detection of external threats in industrial systems
  • No pre-learning required
  • Threat information updated/added with upgrade
SD Script Detected by additional development by the user
  • Enables visualization and detection of industrial networks including proprietary devices
  • Additional development required

3rd party cooperation

Information obtained by SilentDefense can be output as a log. It is possible to output alert logs with Syslog to analysis tools such as ArcSight, Splunk, McAfeeSIEM, QRadar, etc., and output communication channels and status logs to Syslog servers. In addition, it is possible to import information from existing in-house authentication servers such as AD and LDAP for analysis based on user names.

  • 3rd party cooperation

movie

GUI operation image

You can graphically view the network information collected by the monitoring sensor using the command center GUI, and configure the monitoring sensor settings using the command center GUI.

Security Detection: Built-in Module

The Built-in Module enables low-layer behavior detection and can be used without a learning period. Detection logic defined by ForeScout allows SilentDefense monitoring sensors to detect and alert.

Functions of Built-In Modules
  • Detecting Man-In-The-Middle Attacks
    • ARP spoofing
    • ICMP redirect
    • DHCP spoofing
  • Detection of attacks that exploit low-level vulnerabilities
    • Malformed Packed
  • Discovery activity detection
    • port scan

Security detection: LAN CP

LAN CP (The LAN Connection Profiler) is capable of detecting communication direction whitelist, and it is a function that requires prior learning. Create a profile of information such as the IP addresses and protocols (port numbers) of the systems that communicate during the learning period. After the learning period ends, you can monitor communications and detect anomalies based on the created profile.

Security Detection: SD Script

With SD Script, customers can write their own scripts in the LUA language (LUA language is used in game development and various industrial applications). With this function, detailed analysis and detection can be performed by independently developing additional protocols and control devices that are not supported by SilentDefense.

Threats in industrial control systems

Product offer

  • Product offering overview
  command center surveillance sensor
role
  • Graphical display
  • Rule setting
  • Distribute set rules to monitoring sensors
  • Storage of data (network analysis result alerts)
  • network monitoring
  • network analysis
  • Detection based on rules distributed from the command center
Form of provision
  • software
  • Subscription yearly license (Weekdays 9:00-17:00 Japanese email software support included)
  • software
  • Subscription yearly license (Weekdays 9:00-17:00 Japanese email software support included)

Product provision scheme

The product provision scheme for SilentDefense is as shown below. Macnica provides verification support before installation, product design and training during installation, software support and related information via email from 9 a.m. to 5 p.m. on weekdays.

  • Product provision scheme