TLS/SSL Encryption for Traps Components
Table of Contents
4.2 (EoS)
Expand all | Collapse all
-
- Set Up the Endpoint Infrastructure
- Activate Traps Licenses
-
- Endpoint Infrastructure Installation Considerations
- TLS/SSL Encryption for Traps Components
- Configure the MS-SQL Server Database
- Install the Endpoint Security Manager Server Software
- Install the Endpoint Security Manager Console Software
- Manage Proxy Communication with the Endpoint Security Manager
- Load Balance Traffic to ESM Servers
-
- Malware Protection Policy Best Practices
- Malware Protection Flow
- Manage Trusted Signers
-
- Remove an Endpoint from the Health Page
- Install an End-of-Life Traps Agent Version
-
-
- Traps Troubleshooting Resources
- Traps and Endpoint Security Manager Processes
- ESM Tech Support File
-
- Access Cytool
- View the Status of the Agent Using Cytool
- View Processes Currently Protected by Traps Using Cytool
- Manage Logging of Traps Components Using Cytool
- Restore a Quarantined File Using Cytool
- View Statistics for a Protected Process Using Cytool
- View Details About the Traps Local Analysis Module Using Cy...
- View Hash Details About a File Using Cytool
TLS/SSL Encryption for Traps Components
Traps supports Transport Layer Security (TLS)
versions 1.0 and 1.2 and Secure Sockets Layer (SSL) version 3.0.
TLS/SSL, which is often referred to simply as SSL, enables clients
to trust the identity of the server and the transmission of data
and secures communication by encrypting traffic. Traps uses TLS/SSL
as the communication protocol for securing traffic between the following
components:
- ESM Server and Traps agents
- ESM Console and Administrative user
- ESM Console and Panorama
- ESM Console and WildFire
- ESM Server and Panorama
- ESM Server and WildFire
- BITS upload folder and Traps agents
Traps
supports TLS 1.2 on Mac endpoints, and provides dual support of
TLS 1.2 and 1.0 on Windows endpoints depending on the .NET library
version:
- Older Windows versions (such as Windows XP), which use .NET 3.5, support TLS 1.0
- Newer Windows versions, which use .NET 4.5, support TLS 1.2
Enabling SSL for Traps components
is a three step-process: First, you must request or issue a certificate
for each ESM Server and ESM Console. Note that traffic between the
ESM Server and WildFire does not require any additional configuration
as the ESM Server encrypts traffic using the default trusted third-party
certificates that comes with Windows. Next, you enable SSL encryption
during the installation of the ESM Server and ESM Console. Finally,
depending on the type of certificate, you deploy the certificate
to your endpoints. For detailed instructions, see the following
workflow:
- Request or generate a certificate for each ESM
component—server and console—with a purpose of server and client
authentication. This certificate must be one that you can export
with a password.The certificate can have a single name or a wildcard name. A single-name certificate requires the Common Name (CN) of the certificate to match the fully qualified domain name (FQDN) of the ESM component (for example, server.trapsserver.com). A wildcard-name certificate enables you to use the same certificate for multiple ESM components that share the same sub-domain (for example, *.trapsserver.com can be used for both server.trapsserver.com and console.trapsserver.com). Wildcard-name certificates are also useful in deployments that use multiple ESM Servers.If you use a wildcard-name certificate, it is recommended to configure the server name using the FQDN when installing the ESM software.Use one of the following basic approaches to obtain certificates:
- Obtain a certificate from a trusted-party CA—The benefit of obtaining a certificate from a trusted third-party certificate authority (CA), such as GoDaddy, is that the endpoint will already trust the certificate because Windows updates and common browsers include root CA certificates from well-known CAs in their trusted root certificate stores.
- Obtain certificates from an enterprise CA—Enterprises that have their own internal root CA can use it to issue certificates for ESM components. The benefit is that domain-joined clients probably already trust the enterprise CA. Another benefit of this method is that the private key does not leave the ESM component.
- Generate self-signed certificates—A self-signed certificate is a certificate that is signed by the same entity whose identity it certifies. You can use IIS Manager or any other publicly available tool to generate a self-signed certificate and then deploy it to the endpoint.
- Install the ESM software and enable SSL encryption (for
full installation instructions, see Install
the Endpoint Security Manager Server Software and Install
the Endpoint Security Manager Console Software).
- During the installation of both the ESM
Server and ESM Console, select the External Certificate
(SSL) option and browse to the PKCS#12 or PFX file containing
the certificate and private key.If you do not already have a PKCS#12 or PFX file, use your preferred method to generate it. For example, to do this in IIS, you can use the Export function in the MMC ConsoleCertificates snap-in. When you export the certificate and private key, it is required to set a password to protect the private key.
- Enter the certificate password.The installer binds the certificate to the selected agent-ESM communication port.If you install Traps on the ESM Server and ESM Console, and use either a self-signed or an enterprise CA certificate, you must also install the certificate on the server as described in the following step.
- During the installation of both the ESM
Server and ESM Console, select the External Certificate
(SSL) option and browse to the PKCS#12 or PFX file containing
the certificate and private key.
- (Certificates issued by an enterprise CA and self-signed
certificates) Install the certificate in the trusted root certificate
store (CA certificates and self-signed certificates) of the computer
account. Certificates issued by a trusted third-party CA are automatically
trusted by the endpoint due to the chain of trust and do not require
installation.
- Add the certificate to the endpoint using
one of the following methods:
- Copy the certificates manually.
- Include the certificate in the master image for new endpoints.
- Use a centralized deployment method such as an Active Directory Group Policy Object (GPO).
- Verify that the certificate appears in the appropriate store on the endpoint.
- Add the certificate to the endpoint using
one of the following methods: