Trellix Cloud Workload Security 5.3.x Product Guide
Trellix Cloud Workload Security 5.3.x Product Guide
x
Product Guide
Contents
Product overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Key features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
How it works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Finding policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Automatic responses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Remediation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Quarantine workload. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Tag workloads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Update DAT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Predefined queries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Deploying Trellix security products on AWS using Trellix Cloud Workload Security. . . . . . . . . . . . . . . . . . . . . . . 60
Quarantine workloads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Product overview
Overview
Trellix Cloud Workload Security (Trellix CWS) helps you discover, import, manage, and secure your public and private cloud
infrastructure using Trellix® ePolicy Orchestrator - On-prem . It also discovers, assesses, and remediates container-based
applications managed through Kubernetes cluster using Trellix ePO - On-prem.
Cloud Workload Security offers improved visibility and control to address the unique requirements of cloud server security. It
detects and imports virtual infrastructure details, security groups, and virtual networks to the Trellix ePO - On-prem server.
It provides control over cloud infrastructure and insight into the threat information across clouds. It also offers infrastructure
visibility and security alerts so that you can quickly assess security issues and take immediate actions.
Key features
Trellix CWS integrates the management feature of Trellix ePO - On-prem with the configured cloud, which hosts and
manages virtual machines (VM) and containers, and synchronizes periodically with the cloud accounts, and imports the virtual
infrastructure details to Trellix ePO - On-prem.
Trellix CWS has an innovative dashboard to view and monitor security compliance of your cloud assets. You can flag systems at
risk and take corrective actions. You can deploy Trellix® Agent and install other Trellix products on the discovered instances.
• Your virtual workload group list, security risk, and threat details
• Status of other security product installation
• Firewall (security group), and other system information of your VMs
• The total number of pods and their network assessment policy details
Compliance and security posture assessment
You can view potential threats and unsafe settings so that you can take appropriate actions. You can define compliance policies
for security assessment and view all high and low compliance events in the Trellix CWS dashboard.
• Security settings that include unsafe firewall settings for AWS and Microsoft Azure accounts.
• Security settings that check the network policies for pods.
• Systems without Trellix security products installed.
Note
The Smart Scheduler for Trellix® Endpoint Security for Servers gets the CPU utilization value of AWS and Microsoft Azure
accounts using the metering feature. Based on the CPU utilization value, the Smart Scheduler instructs Trellix Agent to
trigger on-demand scans.
How it works
Trellix CWS provides the real-time view of all running workloads, and manages these workloads using Trellix ePO - On-prem.
1. You can configure and register your public and private cloud infrastructure with Trellix ePO - On-prem using Trellix CWS.
• Amazon Web Services (AWS) — Collection of web services that make up the cloud computing solution offered by
Amazon.
• Citrix Hypervisor — A server virtualization platform to handle different workload types, operating systems, and
network configurations.
• Kubernetes — Open-source platform for automating deployment, scaling, and management of container
applications.
• Microsoft Azure — Cloud computing platform and infrastructure for building, deploying, and managing applications
and services through a global network of Microsoft-managed data centers.
• Microsoft Hyper-V — A hardware virtualization product that runs each virtual machine in its own isolated space.
• OpenStack — Open-source platform for cloud computing and infrastructure for deploying virtual servers and other
resources.
• Virtual Machines (VMs) — An isolated guest operating system installation in a normal host operating system that
supports both virtual desktops and virtual servers.
• Azure Virtual Network — A logically isolated section of Azure cloud dedicated to your subscription.
• AWS Virtual Private Cloud — A logically isolated section of Amazon Web Services cloud to start your AWS resources
in a virtual network.
• Hypervisor (ESXi) — A virtual operating platform that manages the execution of the guest operating systems. They
allow multiple operating systems to run concurrently on a hosted system. ESXi are embedded hypervisors for
servers that run directly on server hardware, without requiring another underlying operating system.
• VMware vCenter — Console that manages the ESXi servers, which host the guest VMs that require protection.
2. Trellix CWS discovers workloads and pods, and manages them using Trellix ePO - On-prem policies. Security audit policies
are managed in the Trellix ePO - On-prem Policy Catalog. The policy definitions in the Policy Catalog determine the
severity of the threat.
3. The Trellix ePO - On-prem policies applied across your public and private cloud infrastructure provide simplified
management audit and reporting. You can view your cloud account information, security issues, risks, and other details
in the card-based user interface. Events and workloads are classified as high and medium risks based on the security
policies, whereas pods are classified as high risks based on the network assessment policies. All account properties are
color-coded to reflect their security status.
Trellix ePO - On-prem provides centralized policy management and enforcement of your Trellix security products and the
systems where they are installed. It also provides comprehensive reporting and product deployment capabilities through a single
point of control.
Category Description
Assessment Rules — Firewall This policy defines the firewall settings for the
systems. You can set inbound rules for the systems.
It also defines how the systems are flagged if they
violate the specified rules.
Assessment Rules — General This policy defines how the systems are flagged if the
products aren't installed.
Assessment Rules — Container This policy defines how the pods are flagged if
they don't have any network policies associated with
them.
Assessment Rules — General has Core Protection, Full Compliance, McAfee Default, and My Default policies.
Assessment Rules — Firewall, Assessment Rules — Container, and Auto-Remediation Settings have McAfee Default and My
Default policies.
You can use these policies as is or you can edit My Default policies.
Policy Description
Full Compliance Defines the strongest protection that you can have in
your environment.
Task
1. Log on to Trellix ePO - On-prem as administrator.
2. Select Menu → User Management → Permission Sets.
3. Click Edit against Cloud Workload Security : Policies: in the Permission Sets page.
4. Select:
Finding policies
View and manage your firewall policies from three locations in the Trellix ePO - On-prem console.
You can assign policies to your cloud accounts using the Assigned Policies tab (Systems | System Tree | Assigned Policies for a
selected group in the System Tree), and the Policy Catalog tab (Systems | Policy Catalog). You can also assign policies from Cloud
Workload Security user interface when you register your cloud accounts.
• Create policies.
• View and edit policy information.
• View where a policy is assigned.
• View the settings and owner of a policy.
• View assignments where policy enforcement is disabled.
• Import and export policies.
• Duplicate policies.
• Share policies.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Policy → Policy Catalog, then from the Product list, select Cloud Workload Security.
3. From the Category list, select Assessment Rules - General.
4. Click the name of an editable policy.
Note
You can edit the My Default policies, or any policies that you create. McAfee Default policies aren't editable.
Strong Security Groups are always set as Must Have for your AWS and Microsoft Azure accounts. You cannot change this
setting for AWS and Microsoft Azure accounts.
6. Click Save.
Results
Task
1. Log on to the Trellix ePO - On-prem server as an administrator.
2. Select Menu → Policy → Policy Catalog, then from the Product list, select Cloud Workload Security.
3. From the Category list, select Assessment Rules - Firewall.
4. Select New Policy, type a name for the policy, then click OK.
5. Click the name of an editable policy.
Note
You can edit the My Default policies, or any policies that you create. McAfee Default policies aren't editable.
6. Specify which inbound firewall rules can come from which IP addresses and their severities.
Option Severity
If inbound firewall rule to port Select the inbound port from the list.
Note
You can set If inbound firewall rule to port option to Any to allow all ports, then flag them as Safe or Critical.
If you don't specify a rule for a port, it is flagged as Warning. Critical alerts are flagged for unrestricted IP addresses (with
suffix /0) only.
80 SAFE
80 Anywhere SAFE
7. Click Save.
Results
Task
1. Log on to the Trellix ePO - On-prem server as an administrator.
2. Select Menu → Policy → Policy Catalog, then from the Product list, select Cloud Workload Security.
3. From the Category list, select Assessment Rules - Container.
4. Select New Policy, type a name for the policy, then click OK.
5. Click the name of an editable policy.
Note
You can edit the My Default policies, or any policies that you create. McAfee Default policies aren't editable.
• Must Have — Flags critical alerts if the container network policy is not applied on your pods. We recommend that
you select this option for your container network polices.
• Optional — Doesn't alert any flag if the container network policy is not applied on your pods.
7. Click Save.
Results
Task
1. Log on to Trellix ePO - On-prem server as an administrator.
2. Select Menu → Policy → Policy Catalog, then from the product list, select Cloud Workload Security.
3. From the Category list, select Auto-Remediation Settings.
4. Select New Policy, type a name for the policy, then click OK.
5. Click an editable policy.
You can edit the My Default policies, or any policies that you create. You cannot edit McAfee Default policies.
6. From the Auto-Remediation option, select Enable or Disable to enable or disable auto-remediation respectively.
7. From the Auto-remediation Settings, select:
Note
This action might affect the communication with the instances within your organization. To quarantine a specific
Security Group/Network Security Group or an instance, create a duplicate auto-remediation policy.
Note
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → System Tree, then select your group of systems from the hierarchy.
You can go to the Policy Catalog page from the Register Cloud Account pane of Cloud Workload Security user interface
3. From the Assigned Policies, you can see policies assigned to these systems. Click Edit Assignment.
4. Select Break inheritance and assign the policy and settings below for Inherit from.
5. Select your custom policy from the Assigned Policy list, then specify the values for other fields.
6. Click Save.
Install
Trellix
managed
products Change
View and Trellix Remediate Shut Add/
User Trellix Trellix CWS security Quarantine down Delete
type CWS Agent policies groups workloads workloads accounts
Read- Yes No No No No No No
only user
Install
Trellix
managed
products Change
View and Trellix Remediate Shut Add/
User Trellix Trellix CWS security Quarantine down Delete
type CWS Agent policies groups workloads workloads accounts
Restricte No No No No No No No
d user
Tip
Make sure that the Trellix CWS permission sets assigned to a user doesn't conflict with the Trellix ePO - On-prem permission
sets. By default, a new Trellix CWS user has no permissions to view the Trellix CWS console. The Trellix ePO - On-prem admin
user must change the user permissions by changing the Cloud Workload Security(Controls) permissions under Trellix ePO -
On-prem Permission Sets.
Task
1. Select Menu → User Management → Permission Sets.
2. Click New Permission Sets to create the policy administrator permission set , type the name, then click Save.
3. Select your permission set, then scroll down to Cloud Workload Security (Controls), and click Edit.
This allows the policy administrator user to set visualization permissions to the Trellix CWS users.
4. Select the appropriate option against Control Permissions based on your user level, then click Save.
Option Description
View Cloud Workload Security Console Select to allow the user to view Trellix CWS
console.
Option Description
5. To duplicate the policy administrator permission set and create the policy user permission set, click Actions →
Duplicate.
6. Type the policy user permission set name and click OK.
A duplicate policy administrator permission set is created.
Note
Policies can be managed by users with different permissions. Trellix ePO - On-prem creates two types of user levels and
permissions.
For more information about policy management users, see Trellix ePolicy Orchestrator - On-prem Product Guide.
You can choose whether policy users and administrators need approval to make policy changes. This prevents users from
making inadvertent changes to any product policies.
Task
1. Select Menu → Configuration → Server Settings.
Note
If you change these settings when a policy or task is submitted for review, it is rejected automatically.
All users, including administrators and policy approvers, can create and change policies; but they might need to submit the policy
for review by the administrator, or users with approval permissions, or a policy administrator.
Task
1. Create and maintain policies.
Note
Policy users only have access to policies and settings configured by the administrator in their assigned permission set.
2. To save the policy and send it to the administrator, click Submit for Review.
3. Check the policy approval status using one of these methods:
You can view the policy approval status in the Policy Details pane.
4. Use the Product, Category, and Name filters to select Policy History entries to check.
Results
Note
The notification icon notifies if an action has been taken on the policy submitted for review.
If you are the user making changes and submitting a policy for review, you can withdraw the policy from review.
Task
1. Select Menu → Policy → Policy Catalog.
2. Select Pending Approvals from the Products pane.
3. Select the policy for which you want to cancel review.
4. Click Cancel Review on the Policy Details pane.
5. Click Cancel on the pop-up dialog box that appears to confirm cancellation of review.
Results
The policy changes that were submitted for review are cancelled. The policy is removed from the Pending Approvals list.
As a policy administrator, you need to periodically approve or reject policies submitted by non-admin users. You receive
notifications when a non-admin user submits a policy for approval.
Task
1. To change the status of the policy submitted for review, select Menu → Policy → Policy Catalog.
2. Select Pending Approvals from the Products pane and select the policy you want to review.
3. View all proposed changes on the Policy Details pane.
4. Click Approve or Reject.
A pop-up dialog box appears to confirm your decision. You can enter comments (optional) in the Comments text box.
Results
If you approve the changes, the policy is saved; otherwise the policy changes are not saved.
Purpose
Trellix uses the data collected by Trellix Agent to:
Privacy protection
The data collected by Trellix Agent will be used only for product improvement and Technical Support. The system-specific data
will be filtered or used in aggregate form, unless it is required for Technical Support. For details about Trellix Privacy Notice, see
https://www.trellix.com/en-us/about/legal/privacy.html.
Configure and register the cloud accounts with Trellix ePO - On-prem using Menu → Systems → Cloud Workload Security. You
can view your cloud account information, security issues, risks, and other threat details.
The Trellix CWS console has summary card, Systems pane, and Accounts pane.
• Total Workloads
Compliance Events
Threat Events
• Total Pods
Compliance Events
You can view the details of your instances using the filters in the Trellix CWS user-interface. All account properties are color-
coded to reflect their security status. Events and workloads are classified as critical or warning if they violate the security policies.
The policy definitions in the Trellix ePO - On-prem Policy Catalog determine the severity of the threat.
• Red — Critical
• Yellow — Warning
The Systems pane lists the number of events and workloads in each cloud account. The View and By filters in the Systems pane
filter the workloads and events based on the registered cloud vendors.
The Accounts pane lists the cloud vendor accounts and Kubernetes cluster registered in Trellix ePO - On-prem. When you select
your account, you can view the list of virtual networks in your account. For a VMware vCenter account, you can view the list of
data centers or clusters in the account. For Kubernetes cluster, you can view the number of pods in the cluster.
• Select a virtual network to view the workloads under that virtual network.
• Select a data center or cluster to view the list of hypervisors in it. Select a hypervisor to view the list of workloads in the
hypervisor.
• If you select the VM, you can view the security status, management status, and system properties for that VM.
If you have any VMs which aren't grouped under any VPC, they are placed under Ungrouped VMs for AWS
instances.
• You can check if the VM is managed, and install Trellix Agent on your unmanaged VMs.
• You can check if the network assessment policies are assigned to the pods. You can view issues, product, labels, name,
status, and namespace associate with a pod using the filters.
The Network Security pane lists the Trellix Intrusion Prevention System Manager accounts registered in Trellix ePO - On-prem.
Note
You must install Trellix License extension to register the Manager account.
To protect your instances from attacks, make sure that you install and configure the appropriate Trellix anti-malware software
like Trellix Endpoint Security (ENS).
Your instance is color-coded and classified according to the anti-malware policy that you set in the Trellix ePO - On-prem Policy
Catalog.
When checking for the presence of anti-malware software, the results depend on the cloud environment and operating system.
Install Trellix Endpoint Security (ENS) on your Windows instances and Trellix Endpoint Security (ENS) for Linux on your Linux
instances.
Depending on the Threat Prevention products installed, you can view these product properties.
Product Properties
Product Properties
Exploit Prevention
DAT
You can:
• See if any properties are enabled or disabled. For details, see the product guides for the anti-malware products.
• Install Trellix Endpoint Security (ENS) on your instances.
• Tag this system with the Trellix ePO - On-prem tags related to product deployment tasks. See the product guide for your
version of Trellix ePO - On-prem.
Note
All Threat Prevention properties should be enabled, and DAT should not be older than 7 days. If the DAT for any workload is
older than 7 days, then the Threat Prevention status is noncompliant.
Your instance is color-coded and classified according to the policy that you set in the Trellix ePO - On-prem Policy Catalog.
You can see if Application Control is installed and enabled on the instance. For details, see the product guide for Application
Control.
Trellix® Policy Auditor software automates security audit processes and helps you report consistently and accurately against
internal and external policies.
With Policy Auditor, Trellix CWS assesses workloads based on the policies settings and provide compliance alerts. Policy Auditor
has three benchmarks:
• Baseline configuration
• Patches
• Regular benchmark
Trellix CWS performs a series of checks to determine the Policy Auditor compliance of the workloads. An audit is run on
workloads to check the benchmarks. For a workload to be Policy Auditor compliant, it must have Policy Auditor Agent installed
on it, and it must not have any benchmark failures.
We recommend that you use the Policy Auditor workflow to create an audit, assign it to the VMs, and perform the audit.
A workload is tagged as compliant if it passes all benchmarks in the audit. Any workload which fails to meet the benchmark is
tagged as noncompliant.
Note
Policy Auditor performs audit on standard benchmark levels only. To know more about the issue and failed rules, you must
look into the Policy Auditor Agent audit results.
Install Change Control file integrity monitoring solution to prevent any changes made in your environment that may lead to a
security breach. You can see if your instance has Change Control software installed.
Your instance is color-coded and classified according to the policy that you set in the Trellix ePO - On-prem Policy Catalog.
You can see if Change Control is installed and enabled on the instance. For details, see the product guide for Change Control.
You can view if your AWS volumes encrypted or not. You can view the number of root and data volumes for your instances.
Though both root and data volumes are shown, only data volumes are assessed for your AWS instances.
Your instances are color-coded and classified according to the policy that you set in the Trellix ePO - On-prem Policy Catalog for
volume encryption.
Property Definition
Select or create an assessment policy from the Workload Details pane to assign policy to the selected workload.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select Workload Group or Account from the Systems pane, then select any category from the Event list.
4. Select the workload for which you have to assign the assessment policy.
5. Select a policy from the Assessment Policy drop-down list.
You can create your own policy or select an existing policy from the Workload Details pane. Click next to Policy
Catalog to go to the Policy Catalog page to create or select a policy.
6. Click Save.
You can view various blocked internal connections, and the accepted suspicious and malicious external connections to and from
your AWS and Azure instances. The internal and external traffic is captured as East-West and North-South traffic respectively. The
traffic displayed is the data accumulated for a maximum of seven days.
Note
You must install Trellix License extension to view the traffic details of your cloud accounts. You also need this extension to
view Amazon GuardDuty events.
Threat Protection
• Malware Detected
• Exploit Prevention
Traffic discovery
After you register your cloud accounts, you can discover traffic details for your instances. You must set the required permission
and rules for your AWS account and Microsoft Azure account to enable network traffic flow logs at VPC levels and to discover
Network Security Group traffic discovery respectively. These policies and rules allow Trellix CWS to discover network traffic logs.
Traffic assessment
Trellix GTI — Detects malicious and suspicious North-South connections. Trellix CWS performs IP/connection reputation to
determine the severity of the risk. The malicious and suspicious connections are categorized to high and medium risks, and
color-coded in red and yellow respectively.
Risk port assessment — Identifies the ports with security risks based on the firewall policies. Your connections are classified into
malicious and suspicious connections based on risk port assessment.
For example, the port 3389 is identified as a risk port based on firewall (security group) policies. A North-South inbound traffic
trying to approach your workload through port 3389 is assessed as a malicious connection.
You can set the safe and critical ports in your firewall (security group) policy for to remediate workloads. The corrective actions
such as firewall (security group) remediation or Trellix CWS firewall policy update removes the corresponding threat events.
Network prevention alerts — You can view the network prevention alerts for your instances from your registered Trellix IPS
Manager account.
Note
When you enable traffic discovery for your Azure account, Trellix CWS creates storage accounts for each geographical
location. You can only create 200 storage accounts for one subscription. Azure traffic sync fails if the storage account number
exceeds 200 per subscription. You are charged when a storage account is created. For more information about the pricing,
see Azure pricing for storage accounts.
Note
For every traffic synchronization, Trellix CWS discovers only 8000 records per region with a maximum of 50 traffic records for
one Network Interface.
Amazon GuardDuty
Amazon GuardDuty is a threat detection service that continuously monitors for malicious or unauthorized behavior. You can
view GuardDuty events which include network connections, port probes, and DNS requests for EC2 instances on the Trellix CWS
console. IAM related events are not captured. The GuardDuty events which are categorized as low and medium events in the
AWS console, are both categorized as medium severity events in Trellix CWS console. Network Connection GuardDuty events are
mapped in the traffic graph if the corresponding traffic is discovered.
• Make sure your instances have Threat Prevention installed, enabled and that they have latest DAT updates.
• Shut down the compromised instances using event details card.
• Change your security groups so that they have least permissive rules.
For information about how to act on GuardDuty events, see AWS documentation.
Note
You must enable GuardDuty on your Amazon Web Services management console to view GuardDuty events in the Trellix
CWS console.
Note
Click the Graph button to view the graphical representation of traffic for your instances. You can view the East-West and
North-South traffic on your workload using the filters present in the Traffic pane.
The Trellix CWS traffic card has filters to view the flow logs based on time intervals. The traffic card has filters to display
inbound traffic, outbound traffic, and blocked connections. Inbound connections are traffic flowing towards the workload
whereas, outbound connections are traffic flowing from the workload. Blocked connections are blocked inbound and outbound
connections.
• Time — Displays the date and time of occurrence of the selected event.
• Time Range(+/-) — Filters the issues based on time intervals.
1 minute — Filter issues occurred a minute before and after the time of occurrence of the selected event.
5 minutes —Filter issues occurred 5 minutes before and after the time of occurrence of the selected event.
15 minutes — Filter issues occurred 15 minutes before and after the time of occurrence of the selected event.
30 minutes — Filter issues occurred 20 minutes before and after the time of occurrence of the selected event.
• Show — Filter inbound, outbound, and blocked connections based on traffic flow.
Note
In addition to the filters, you can view the direction of traffic flow by selecting any issue under the Traffic pane. The direction of
flow is highlighted for the selected issue.
You can view information about the security groups associated with your instance by selecting the Show Security Groups option
from the menu in the Workload block. You can shut down your workload as a remediation measure by selecting the Shut Down
Workload option from the menu in the Workload block.
The Table button will take you back to the instance details.
You can view information about the issues associated with your pods using these filters. You can also narrow down the search
results by searching specific labels in the search bar.
Select an instance from the Compliance Events or Threat Events pane to view more information about the security groups
under Workload Details or Event Details respectively.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select your workload from Systems.
• For instances under Compliance Events, select Show Security Groups from the Take Action combo box.
• For instances under Threat Events:
Click Graph.
Click the menu icon in the Workload block.
Select Show Security Groups.
Security Groups
Property Definition
Property Definition
Note
Some VMs in Microsoft Azure accounts might not be associated with any security groups.
5. Click Edit Rules or double-click the security group to view the rules in each security group.
For threat events, you can edit the security group rules by clicking the workload name under Edit Inbound Rules for under
the Event Details.
Automatic responses
Configure your Trellix ePO - On-prem server to trigger an action in response to critical or warning issues.
Set automatic responses from Menu → Automation → Automatic Responses if you want a notification sent to you.
Configure Trellix ePO - On-prem server to receive automatic responses through email.
Specify the SMTP server name and the SMTP server port in Email Server from Menu → Configuration → Server Settings.
For details about automatic responses and specifying the email server, see the product guide for your version of Trellix ePO -
On-prem.
Task
1. Click Menu → Automation → Automatic Responses.
2. Select Preset as Cloud Workload Security.
3. Click New Response or click Edit next to an existing template.
4. On the Description page, type a unique name and any notes for the rule, if you are creating a template.
5. In the Event field, select:
Results
The new response template for Cloud Workload Security appears in the Automatic Responses list.
You can set up an automatic response in Trellix ePO - On-prem that is triggered for every ENS/ENSL event. This response
updates the threat count in the Cloud Workload Security console. The threat count displays the number of threat instances
discovered in the last 7 days. The threat instances are categorized based on the virtual private cloud on the Workload Group List.
The threat instance details of the selected workload group appears in the Workload Groups Overview pane.
By default, the threat event response for ENS/ENSL is configured. The administrator can configure the automatic responses, if it
is configured incorrectly.
Task
1. Select Menu → Automation → Automatic Responses.
2. Click Import Response.
3. Click Choose File on the Automatic Responses page.
4. Select Rule_ThreatEventTriggerforENS_ENSL and click OK.
5. Click Enable Response in the Import Response Details dialog box, then click OK.
The new response template for ePO Notification Events appears in the Automatic Responses list.
Note
The previous threat event response also appear in the Automatic Responses list. You must disable or delete the
duplicate response.
Remediation
After viewing the details of your cloud accounts, and seeing which systems are at risk, activate missing protection by installing
Trellix products and correcting firewall settings.
You can manage your instances by installing Trellix Agent. You can install other Trellix products after installing Trellix Agent.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select your workload from Systems pane, then select an instance from the instance list under Compliance Events.
4. Select Install Trellix Agent from the Take Action combo box.
See KB85233 for details to install Trellix Agent on your instances using deployment URL.
5. Do one of the following:
You can install Endpoint Security on your Windows instances and Endpoint Security for Linux on your Linux instances.
Protect your instance by installing Trellix ENS or Trellix ENS for Linux.
Install Trellix Agent on your unmanaged instances to manage them with Trellix ePO - On-prem.
Important
You cannot install Trellix ENS from Cloud Workload Security if Host Intrusion Prevention or Trellix MOVE AntiVirus is
installed on your instances. If Host Intrusion Prevention and Trellix ENS are installed, Cloud Workload Security checks for the
presence of Trellix ENS and its properties.
Note
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select your workload from the Systems pane, then select an instance from the systems list under Compliance Events.
4. Select Install Threat Prevention from the Take Action combo box, then click Install.
Results
Trellix ENS is installed on Windows Workloads, and Trellix ENS for Linux is installed on Linux workloads.
You can see the installation status on the Systems page. If your Trellix ePO - On-prem server doesn't receive installation status, it
is timed out after 60 minutes.
Results
You can see the installation status on the Systems page. If your Trellix ePO - On-prem server doesn't receive installation status, it
times out after 60 minutes.
What to do next
The Windows workloads aren't restarted and all features except Memory Protection are available. Memory protection is available
after restarting your instance.
Ensure
• that these
Trellix conditions
CWS are met:
General assessment policy for Policy Auditor is set as Optional.
• You installed Trellix Agent on your unmanaged instances to manage them with Trellix ePO - On-prem.
• You have the appropriate license before installing this product.
• You have a compatible Policy Auditor version.
Trellix CWS supports Policy Auditor 6.3 version. See the product guide for Policy Auditor before installing this product.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select your workload from the Systems pane, then select an instance from the systems list under Compliance Events.
4. Click Install Policy Auditor from the Take Action combo box, then click Install.
You can see the installation status on the Systems page. If your Trellix ePO - On-prem server doesn't receive installation
status, it times out after 60 minutes.
• Install Trellix Agent on your unmanaged instances to manage them with Trellix ePO - On-prem.
• Make sure that you have appropriate license before installing this product.
• See the product guide for Trellix Change Control before installing this product.
Task
1. Log on to Trellix ePolicy Orchestrator - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select your workload from the Systems pane, then select an instance from the systems list under Compliance Events.
4. Select Install Change Control (FIM) from the Take Action combo box, then click Install.
Results
You can see the installation status on the Systems page. If your Trellix ePO - On-prem server doesn't receive installation status, it
times out after 60 minutes.
• Make sure that the vNSP prerequisites like controller and cluster are deployed for the VPC and subnet of the selected
instance.
• See the product guide for Trellix Intrusion Prevention System before installing this product.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select your workload from the Systems pane, then select an instance from the systems list under Compliance Events.
4. Select Install Network IPS from the Take Action combo box, then click Install.
Results
You can see the installation status on the Systems page. If your Trellix ePO - On-prem server doesn't receive installation status, it
times out after 60 minutes.
Note
Results
You can see the installation status on the Systems page. If your Trellix ePO - On-prem server doesn't receive installation status, it
times out after 60 minutes.
Quarantine workload
You can stop the infected workload from spreading malware to other workloads by quarantining the affected workload.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select your workload from the Systems pane, then select an instance.
4. Quarantine the malicious workload using these three methods.
• Select an instance under Compliance Events, then select Quarantine Workload from the Take Action combo box.
• Select an instance under Threat Events, then select Quarantine Workload from the Take Action combo box in the
Event Details pane.
• Click Graph, then select Quarantine Workload from the menu in the Workload block.
5. Click OK.
Note
You can release the quarantined workload by changing the security group rules manually. When you quarantine a
workload, a new security group, Trellix_CWS_Quarantine is created. Trellix_CWS_Quarantine replaces the existing security
group, and allows only RDP on windows and SSH on Linux. The source IP address is set to 1.1.1.1/32 by default. You
must replace this IP address with your IP address manually. In the AWS console, you must change the security group
from Trellix_CWS_Quarantine to your security group to access the workload.
You can correct the firewall settings from Policy Catalog: See Where to find policies.
Task
1. Select Menu → Systems → Cloud Workload Security.
2. Select your workload from Systems.
• For instances under Compliance Events, select Show Security Groups from the Take Action combo box.
• For instances under Threat Events:
Click Graph.
Click the menu icon in the Workload block.
Select Show Security Groups.
4. Click Edit Rules or double-click the security group to view and correct the firewall rules in each security group.
5. Edit or add new rules and click Apply Changes.
Change the rules in your security group policy and secure your critical instances.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select the critical system and its security group policy from:
• For instances under Compliance Events, select Show Security Groups from the Take Action combo box.
• For instances under Threat Events:
Click Graph.
Click the menu icon in the Workload block.
Select Show Security Groups.
Changes made to the security group will be applied to all other instances that are associated with the security group. Make
sure that you review other server instances that are associated with the security group.
5. Edit the security group rules by changing Type, Protocol, Port range, or Source. For Microsoft Azure instances, you
cannot edit rules that have Access as Deny.
6. While editing Source, you can choose Anywhere to allow connections from all traffic or Custom IP to provide an IP
address that you want to allow. For AWS instances, you can also provide the security group for which you want to allow
traffic.
7. To add a rule, select Add New Rule and type in the values.
8. To delete a non-complaint rule, click the delete icon.
9. Click Apply Changes.
You can see the action details for edit, delete, update, or add in Menu → User Management → Audit Log.
To secure your critical systems, remove the association of the security group to your AWS instance.
• If your workload has only one security group associated with it, you can't detach it.
• A security group which is associated with this workload can also be associated with many NICs.
• You can't detach a security group if it is the only security group associated with a NIC.
• You can detach a security group only from your AWS instances.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select the critical system and its security group policy from:
• For instances under Compliance Events, select Show Security Groups from the Take Action combo box.
• For instances under Threat Events:
Click Graph.
Click the menu icon in the Workload block.
Select Show Security Groups.
Results
You can see the detach failure or success details in the Detached Status window.
You can shut down AWS and Microsoft Azure instances only.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select your workload from the Systems pane, then select an instance.
4. Shut down the workload using these three methods.
• Select an instance under Compliance Events, then select Shut Down Workload from the Take Action combo box.
• Select an instance under Threat Events, then click the Shut Down Workload button in the Event Details pane.
• Click Graph, then select Shut Down Workload from the menu in the Workload block.
You can shut down only one workload at a time.
5. Click OK.
The shut down workloads and the corresponding events will not be displayed in the Trellix CWS console.
Tag workloads
Tag your instances with Trellix ePO - On-prem tags related to product deployment tasks. You can create auto tags for your
instances based on account name and platform. You can also bulk tag selected instances.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select your workload from the Systems pane, then select an instance or multiple instances from the instance list under
Compliance Events.
4. Select Tag from the Take Action combo box.
Update DAT
The DAT non-compliant instances can be remediated by updating DAT. You can view the status of DAT update in the Workload
Details pane.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select your workload from the Systems pane, then select an instance.
4. Select Update DAT from the Take Action combo box.
5. Click OK.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Select your workload from the Systems pane.
4. Select an instance under Threat Events, then select Take Action → Run On-Demand Scan in the Event Details pane.
5. Click OK.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
3. Click Compliance events in the summary card pod section.
4. Select an issue from the issue browser.
5. Click Take Action and select Assign Network Policy.
6. Select a pod label for which you want to assign the policy.
7. Click Add Rule to apply rules for the selected pod.
You can allow or deny any IP address, namespace selector, or pod selector to communicate with the selected pod.
8. Click Apply.
Quarantine pods
You can isolate a pod from other pods by quarantining the pod.
Task
1. Log on to Trellix ePO - On-prem as an administrator.
2. Select Menu → Systems → Cloud Workload Security.
Assign Network Policy and Quarantine Pod options are disabled for quarantined pods.
• You have AWS or Microsoft Azure accounts and their details ready.
• You have permissions to use Trellix CWS.
• You have the list of tags assigned to your instance in AWS or Microsoft Azure cloud.
• You have installed the Trellix CWS extension on Trellix ePO - On-prem.
• Your Trellix ePO - On-prem system date and time are synchronized with the current date and time.
Task
1. Log on to the Trellix ePO - On-prem server as an administrator.
2. Select Menu → Systems → Cloud Workload Security to open the Trellix CWS console.
3. From the Accounts pane, click Add Account to open the Registered Cloud Account pane.
4. Select Amazon Web Services or Microsoft Azure from the drop-down list, and type the required details.
5. Click Validate to validate the cloud account.
6. Click the Add button under Import Cloud Tags to add the public cloud tags to your workload.
Note
7. In the Import Cloud Tags window, type the tag names assigned to your instances in the AWS or Microsoft Azure cloud
consoles and click Add.
8. Click Save.
Results
The imported tags appear against Cloud Tags under the Account Details section after successful sync.
The predefined queries and dashboards provide out of the box functionality, because they are added to your Trellix ePO -
On-prem server when the software is installed. You can configure these queries to display results in charts or tables, which
you can use as dashboard monitors. Query results can be exported to several formats, which you can download or send as an
attachment to an email message.
You can view the list of predefined queries for the datacenters from Queries and reports → Trellix Groups → Data Center.
You can view the list of predefined queries for the public cloud accounts from Queries and reports → Trellix Groups → Public
Cloud.
Predefined queries
You can use predefined queries as is, edit them, or create queries from events and properties stored in the Trellix ePO -
On-prem database.
To create custom queries, your assigned permission set must include the ability to create and edit private queries.
Query Definition
• Good
• Bad
• Unclassified
Query Definition
Security Incidents (last 14 days) Displays the events reported for these components
on the VMs in the last 14 days.
• Antivirus
• Firewall
• Memory Protection
File Integrity Monitoring Status Displays the number of VMs with FIM installed and
enabled.
For details about FIM, see the product
documentation for Change Control.
Query Definition
Endpoint Scan Report Displays the details of the last scan of the endpoints.
Query Definition
Instance Assessment Status The number of instances that are classified as critical
and the number of instances that are classified as
warning.
Data Protection per Cloud VM The number of VMs that are encrypted and not
encrypted.
Task
1. Log on to the Trellix ePO - On-prem server as an administrator.
2. Select Menu → Reporting → Queries & Reports.
3. From the Groups pane, select Data Center to display the queries for the selected group. Reports are grouped under
Trellix Groups.
4. From the Queries list, select a query, then click Run.
5. In the query results page, click any item in the results to drill down.
6. Click Close when finished.
Task
1. Log on to the Trellix ePO - On-prem server as an administrator.
2. Select Menu → Reporting → Queries & Reports, then click Actions → New to open the Query Builder wizard.
3. To view Usage Metering records, select Public Cloud on the Feature Group list and on the Result Type page, select
Usage Metering records, then click Next.
4. To view network traffic reports for your AWS instances, select Data Center on the Feature Group list, and on the Result
Type page, select Amazon Network Traffic Logs, then click Next.
5. Select the type of chart or table to display the primary results of the query, then click Next to open the Columns page.
If you select Boolean Pie Chart, you must configure the criteria to include in the query.
6. Select the columns to include in the query, then click Next to open the Filter page.
If you had selected Table on the Chart page, the columns you select here are the columns of that table. Otherwise, these
are the columns that make up the query details table.
7. Select properties to narrow the search results, then click Run.
The Unsaved Query page displays the results of the query, which is actionable. You can take any available actions on items
in any tables or drill-down tables. Selected properties appear in the content pane with operators that can specify criteria to
narrow the data that is returned for that property.
• If the query doesn't return the expected results, click Edit Query to go back to the Query Builder and edit the details
of this query.
• If you don’t want to save the query, click Close.
• If this is a query you want to use again, click Save and continue to the next step.
8. On the Save Query page, type a name for the query, add any notes, and select one of these options:
• New Group — Type the new group name and select whether the group is private or public.
• Existing Group — Select the group from the list of Shared Groups.
9. Click Save.
Reports are grouped under Trellix Dashboards at Menu → Queries and reports → Groups.
• The Data Center dashboard displays a collection of monitors based on the results of the default datacenter queries.
• The Public Cloud dashboard displays the collection of monitors for default public cloud account queries.
The data in these monitors on the dashboard is refreshed every 15 minutes.
• OS Distribution — Displays the operating system type. It shows the template value selected while creating the VMs. But,
it might not be the actual operating system installed on the VM.
• Security Incidents (last 14 days) — Specifies events reported for these components on the VMs in the last 14 days.
Application Control
Antivirus
Firewall
Memory Protection
• File Integrity Monitoring Status — Displays the number of VMs with File Integrity Monitoring (FIM) installed and
enabled.
• Instance Assessment status — Displays the number of instances that are classified as critical and the number that are
classified as warning.
• Data protection per Cloud VM — Displays the number of VMs that are encrypted versus the number of VMs that aren't
encrypted.
• Usage Metering Report — Displays the usage of running AWS and Microsoft Azure cloud instances, in number of hours
per month. You can see how many hours are used by your single core, dual core, and your quad-core instances for every
month.
• Application Reputation — Categorizes the applications based on Trellix Global Threat Intelligence file reputation.
Good
Bad
Unclassified
Note
This dashboard retrieves data from the Trellix Application Control extension.
For details about file reputation, see the product documentation for Trellix Application Control.
• Endpoint Scan Report — Displays the last scan details of the endpoints. This report is run every eight hours.
Tip
Best Practice: To get accurate data in this report, first run the Data Center: Compute Endpoint Reports server task
from Menu → Automation → Server Tasks.
• Endpoint Security Report — Displays the protection status of the endpoints. This report is run every eight hours.
Endpoint — The name of the endpoint.
IP Address — The IP address of the endpoint.
Virtual — Specifies whether the endpoint is a virtual system.
VM Classification — Specifies if the VM is a part of public (Cloud Machine) or private (Virtual Machine) cloud.
Vendor — The name of the cloud service provider of the endpoint.
Power Status — Specifies the power status of the endpoint.
Category — The group/resource pool/host of the endpoint.
Operating System — The operating system details.
AntiVirus/Antimalware — The name of the Trellix anti-virus and anti-malware software that is installed on the
endpoint.
Firewall — The name of the Trellix software with the firewall protection active on the endpoint.
Whitelisting — Specifies whether the whitelisting feature is enabled.
Access Protection — The name of the Trellix software that provides access protection.
Memory Protection — The name of the Trellix software that provides memory protection.
Last Communication — The time details of the last server-client communication.
Tip
Best Practice: To get accurate data in this report, first run the Data Center: Compute Endpoint Reports server task
from Menu → Automation → Server Tasks.
Trellix ePO - On-prem communicates with client systems across networks in these ways:
• Client-initiated communication — Trellix Agent is installed on each client system. It periodically connects to the Trellix
ePO - On-prem server to check for updates such as new policy information, assigned tasks, and product updates. For
client systems to connect to Trellix ePO - On-prem:
Note
TCP ports 80 and 443 are the default ports used for communication between Trellix ePO - On-prem and the Trellix Agent.
You can change the ports while installing Trellix ePO - On-prem.
• Trellix ePO - On-prem server-initiated communication — Trellix ePO - On-prem can wake up and force client systems to
pull down the latest security content. For Trellix ePO - On-prem to connect to the client systems:
Note
The AWS Security Group must allow this communication. For details about port requirements, see KB66797.
Prerequisites
• Configure chef server and workstation, and bootstrap the node to the server where Trellix products are to be installed.
For more information, see https://docs.chef.io/.
• Check-in Cloud Workload Security 5.2.0 in Trellix ePO - On-prem, and register AWS or Azure cloud accounts.
• Check-in Trellix Agent 5.0.5 or later.
• Check-in Trellix ENS package.
The recipe cook book requires a connection to Trellix ePO - On-prem to install the security products. Hence, the Trellix ePO -
On-prem credentials needs to be encrypted in the recipe cook book. To encrypt the Trellix ePO - On-prem credentials, run the
ruby EncryptPassword.rb USERNAME PASSWORD command.
You need to have Ruby installed in your chef workstation to run this command.
Attribute Description
• ENS
• ATP
default[:policy][:ENS] (optional field) The name of the ENS/ENSL On-Access Scan policy to
be assigned to node/client.
default[:policy][:ATP] (optional field) The name of the ATP policy to be assigned to node/
client.
After defining the attributes, upload the modified cookbook in the Chef server.
Note
The default.rb recipe is mcafeeagent. To ensure that Trellix Agent is installed, include mcafeeagent in your node's run_list.
{
"name":"my_node",
"run_list":[
"recipe[mcafeeagent]"
]
}
To trigger the installation of Trellix products on the client, run chef-client on the client node. You can also add recipe to the node
run list when bootstrapping it from the workstation.
Prerequisites
• Configure puppet server and workstation, and bootstrap the node to the server where Trellix products are to be
installed. For more information, see https://docs.puppet.com/puppet.
• Check-in Cloud Workload Security 5.2.0 in Trellix ePO - On-prem, and register AWS or Azure cloud accounts.
• Check-in Trellix Agent 5.0 or later.
• Check-in Trellix ENS package.
• Register AWS or Azure cloud accounts
Puppet server settings
Download the module from the external repository and configure puppet attributes in the modules/facts/lib/facter/config.yaml
attribute file. Copy modules and manifests to the /etc/puppetslab/code/environments/production folder in the puppet-server
system.
The module connects to Trellix ePO - On-prem to install the security products. Hence, the Trellix ePO - On-prem credentials
needs to be encrypted in the module. To encrypt the Trellix ePO - On-prem credentials, run the ruby EncryptPassword.rb
USERNAME PASSWORD command.
You need to have Ruby installed in your puppet server to run this command.
For immediate execution on a particular agent node, check for a particular agent node manually by running the /opt/
puppetlabs/bin/puppet agent –test command for Linux and puppet agent –test command for Windows.
Attribute Description
• ENS
• ATP
To manage client instances in AWS cloud, Trellix ePO - On-prem can be deployed:
Trellix ePO - On-prem can be installed to manage instances in one geographic region with multiple availability zones.
This type of deployment supports client-initiated and Trellix ePO - On-prem server-initiated communication. You must create
a separate AWS security group for Trellix ePO - On-prem that allows outbound connections to client instances (server-initiated
communication) and inbound connections (agent-initiated communication). Once you deploy Trellix ePO - On-prem, you can
view the available systems in the System Tree under AWS.
A virtual private cloud (VPC) is a virtual network dedicated to your AWS account. It is logically isolated from other virtual networks
in the AWS Cloud. You can launch your AWS resources, such as Amazon EC2 instances, into your VPC.
In one geographic region with a single VPC, each instance that you launch in a non-default subnet has a private IP address. When
you install Trellix ePO - On-prem in the VPC, client instances in the same VPC communicate with the Trellix ePO - On-prem
server or with other instances across the private network. For information about VPCs and subnets, see AWS documentation.
When multiple VPCs are present in one geographic region, you can use VPC peering to connect the VPCs.
For information about VPC peering and setting one VPC as private and another VPC as public, see AWS documentation.
When you configure VPC peering, Trellix ePO - On-prem server and client instances communicate via the private network. VPC
peering supports client-initiated and Trellix ePO - On-prem server-initiated communication.
Configure a virtual Agent Handler on your Trellix ePO - On-prem server to enable communication through public and private
IP addresses. For more information about configuring a virtual Agent Handler, see Set up Trellix ePO - On-prem and Client
Communication.
You can configure VPC routes to restrict communication between VPCs only to Trellix ePO - On-prem and client instances if other
applications do not require VPC peering on the same infrastructure. For more information, see the product documentation for
your version of Trellix ePO - On-prem.
Tip
Set up VPC peering for Trellix ePO - On-prem server and client communication wherever possible.
In multiple geographic region deployment, you can use an architecture where client instances connect to Trellix ePO - On-prem
using a public IP address using the internet.
• All client instances must have outbound access to Trellix ePO - On-prem. Configure the AWS security groups accordingly.
• The AWS security group of the Trellix ePO - On-prem server must be configured to accept communication from the client
instances.
For more information, see the product documentation for your version of Trellix ePO - On-prem.
Tip
Set the agent-server communication interval to 60 minutes so that client instances can get product, policy, and task updates
frequently without affecting performance.
Configure a virtual Agent Handler on your Trellix ePO - On-prem server to enable communication with client instances through
public IP address. For more information about configuring a virtual Agent Handler, see Set up Trellix ePO - On-prem and Client
Communication.
Configure Trellix ePO - On-prem and Agent Handler to set up communication for Trellix ePO - On-prem and the client on AWS.
Task
1. Install Trellix ePO - On-prem in the region with the highest number of instances.
This ensures optimized communication between Trellix ePO - On-prem and client instances.
2. Assign an elastic IP address to the Trellix ePO - On-prem instance.
This ensures that the public IP address of the Trellix ePO - On-prem instance does not change.
3. Configure a virtual Agent Handler on the Trellix ePO - On-prem server for your managed client instances to connect to
the Trellix ePO - On-prem server.
a. Open the Agent Handlers page: Menu → Configuration → Agent Handlers, then in Handler Groups, click New
Group to open the Add/Edit Group.
b. Specify a virtual Agent Handler group name.
c. In the Included Handlers section, select Use load balancer and specify the details.
• Virtual DNS Name — Type the DNS name assigned to the static public IP address associated with this AWS
server.
• Virtual IP Address — Type the static public IP address associated with this AWS server.
4. Enable the new virtual Agent Handler.
a. Select Menu → Configuration → Agent Handlers, then click the Handler Groups monitor.
b. Find the new virtual Agent Handler, then click Actions → Enable.
5. Assign the virtual Agent Handler group.
a. Select Menu → Configuration → Agent Handlers, then click New Assignment.
b. Specify a unique name for this assignment.
c. In the Agent Criteria section, browse to and select My Organization from the System Tree location.
d. In the Handler Priority section, click Use custom handler list and select the new virtual Agent Handler.
Note
Results
The created virtual Agent Handler publishes Trellix ePO - On-prem on its public IP address and all client instances communicate
using this address.
• Install Trellix ePO - On-prem on an on-premise server to manage systems on-premise. Assign an internal private IP
address to Trellix ePO - On-prem.
• Install Agent Handler on an on-premise server in the DMZ to manage instances on AWS. You must assign a public IP
address to the Agent Handler.
• You must connect Trellix ePO - On-prem server and the Agent Handler through a low latency and high-bandwidth
network.
This architecture supports client-initiated communication, but Trellix ePO - On-prem can't wake up the Trellix Agent on a
managed AWS instance. To use Trellix ePO - On-prem initiated communication (wake up agent) feature, AWS instances must use
a VPN to connect to the on-premise network.
For information about the ports required for Trellix ePO - On-prem and client instance communication, see KB66797. For
information about port guidelines, see the Trellix ePO - On-prem Product Guide.
The Trellix Agent deployment URL contains a link to an installer. The installer downloads and installs Trellix Agent and deploys
Trellix products to AWS instances.
For instructions about deploying Trellix Agent on AWS instances, see KB85233.
Configure Trellix ePO - On-prem and the Agent Handler to set up communication between Trellix ePO - On-prem and the client.
Task
1. Install Trellix ePO - On-prem on an on-premise server.
2. Install the Agent Handler on another on-premise server in the DMZ.
3. Configure the Agent Handler.
a. Open the Agent Handlers page: Menu → Configuration → Agent Handlers, then in Handler Status, click Agent
Handler.
b. From the Handler List, click the Agent Handler that is installed in the DMZ.
c. Specify the public IP address of the Agent Handler to connect to AWS EC2 instances in the Published IP Address
field.
Task
1. Install Trellix ePO - On-prem based on your infrastructure requirements.
2. Install the Cloud Workload Security extension on the Trellix ePO - On-prem server.
3. Make sure that you set up a user on AWS with read-write privileges on EC2 and traffic flow logs for all regions that
requires management.
4. Register your AWS cloud account with Trellix ePO - On-prem, so that Trellix ePO - On-prem discovers, imports, assesses
and displays your cloud account information.
5. Specify the sync interval for Trellix ePO - On-prem to AWS synchronization.
Sync interval determines how often new instances are discovered.
6. While deploying Trellix Agent, select Auto deploy Trellix Agent on VMs when all your EC2 instances and traffic flow logs
are in the same region and support Active Directory based deployment.
Once you deploy Trellix Agent, you can use Trellix ePO - On-prem to manage product installation and network security of the
AWS instances.
Note
You must have credentials for each of the AWS instances. Currently, only password-based authentication is supported on
Windows and Linux.
To ensure security of the AWS instances as they start, create secure client Amazon Machine Images (AMIs) using standard AMIs.
The AMI contains Trellix Agent and Trellix Endpoint Security (ENS).
• We recommend that you access your AWS instances from Trellix ePO - On-prem until the AWS instances are compliant
with the organization's IT security standards.
The Trellix Agent deployment URL contains a link to an installer. The installer downloads and installs Trellix Agent and deploys
Trellix products to AWS instances.
For instructions about deploying Trellix Agent on AWS instances, see KB85233.
Task
1. Depending on the operating system that you use, start a Windows EC2 or a Linux instance on the AWS console.
2. Log on to the instance.
3. Deploy Trellix Agent on the instance using Cloud Workload Security.
• Download the deployment script under Trellix ePO Management on the Cloud Workload Security user interface.
• Select Install Trellix Agent from the Take Action combo box on the Cloud Workload Security user interface.
4. Install Trellix ENS on the instance using the Take Action combo box on the Cloud Workload Security interface.
5. Delete Agent GUID details to avoid duplicate GUID's. For more information, see KB84356.
6. Delete AMcore GUID details. For more information, see KB89849.
7. On the AWS console:
• Use EC2Config or windows tools to sysprep the server with shutdown option.
• Select the AMI and click Launch.
Results
This starts a new secure client AMI with Trellix Agent and Trellix ENS installed on it.
Deploying Trellix security products on AWS using Trellix Cloud Workload Security
You can deploy Trellix security products on the AWS instances from the Cloud Workload Security user interface using the Take
Action combo box.
Consider these best practices when you deploy Trellix security products using Cloud Workload Security on the AWS instances.
• By default, the secure AMIs ensure protection of your instances. It is recommended that you create your server instances
from the secured AMIs.
• You can install Threat Prevention on the AWS instances in batches. The number of systems per batch is 25. You can
increase the number of systems per batch if you have distributed repositories.
• You can set threat alert notifications for Cloud Workload Security in the Automatic Responses page. The default value
of Threat Event Trigger for ENS/ENSL for Cloud Workload Security is 1 minute. It is recommended that you set the
notification time to a higher value if the number of events per aggregation time is more.
Note
Selecting the Trigger this response for every event option is not recommended as it causes significant performance
issues in Trellix ePO - On-prem.
Quarantine workloads
You can stop the infected workload from spreading malware to other workloads by quarantining the affected workload.
When you quarantine an instance, a new security group, Trellix_CWS_Quarantine is created for the corresponding instance. You can
release the quarantined instance by changing the security group for the instance manually in the AWS Management Console.
It's not advisable to edit Trellix_CWS_Quarantine security group rules. It's advised that you create a security group and set required
permissions, and assign it to your instance if you want to open any specific port for the quarantined instance.
You must configure your OpenStack instances if the operating system detail of the instance is not available in the Trellix CWS
console. For more information about OpenStack images, see https://docs.openstack.org/python-glanceclient/latest/cli/property-
keys.html.
Task
1. Open the OpenStack dashboard.
2. Select Images.
3. Select an image, then click Launch → Update Metadata.
4. Click XenAPI Driver → OS Type and select the image's operating system.
The quarantine action might affect the communication with the instances within the organization.
We recommend that you follow these instructions when you enable the quarantine instance settings.
7. Click Save.
Note
The Inherit from option changes to This Node, and the policy is updated after saving the settings.
After a successful Trellix CWS sync, the quarantine action is automatically applied to the selected instance based on the policy
change. With these settings, you can avoid triggering quarantine action for the instances that you don't want to quarantine.
Auto-remediation actions such as quarantine, DAT update, and on-demand scan are listed under Reporting → Audit Log.
For example, you can view the quarantined instances in the Audit Log page
You can view the assigned quarantine tasks under Client Tasks → Client Task Catalog → Trellix Agent → Client Task Types.
Installation
Can I install Trellix Agent on AWS instances using the Agent Deployment URL feature and Amazon User Data?
Can I use scripts for Puppet, Chef, or Amazon OpsWorks to install and configure security solutions offered by Trellix?
Yes.
When upgrading from 5.2.0 to 5.3.0, since the policy structure has changed in the latest version, your previous policies,
policy settings, and policy assignments are lost.
Configuration
How many cloud accounts can I register under one Trellix ePO - On-prem server?
There is no limit to the number of cloud accounts that can be registered under one Trellix ePO - On-prem server.
How do I get the subscription ID, tenant ID, and client ID?
You can get your client ID, tenant ID, and subscription ID after creating an application. You need to configure your client key.
You can create application by following steps listed in Create an application in the Microsoft Azure console. You can also run
PowerShell scripts, which automate this process. For details, see KB87316.
What ports are included when I select port as Any when configuring inbound firewall rule?
Functionality
When AWS instances are switched off, are they reported "powered off" in Trellix ePO - On-prem?
Yes. If the computers are managed, they aren't deleted, even on termination. Unmanaged systems, when terminated, are
no longer seen in the Trellix ePO - On-prem System Tree.
How long does it take for Trellix CWS to discover a new instance?
After the synchronization occurs, the new instance is discovered. Synchronization depends on the Sync Interval that you
specified. If you specify the sync interval as 5 minutes, the next sync is scheduled 5 minutes after the completion of the
current sync. You can also schedule a manual sync and the synchronization starts immediately.
After the instance is terminated (and a synchronization occurs), the instance is no longer displayed in the Trellix ePO -
On-prem System Tree. But, any events from this instance are still present.
• Check your cloud account details. Your access key and secret key pair might have been disabled.
• Check if your network is connected.
• Check if your Trellix ePO - On-prem system date and time are synchronized with the Internet date and time.
• Check if you are registering the same AWS account again in Trellix ePO - On-prem.
What are things to be considered when creating a user type with Trellix CWS Permissions Set?
The user permissions are based on the roles selected for theTrellix CWS user. Make sure that the Trellix CWS permission
sets assigned to the user doesn't conflict with the Trellix ePO - On-prem permission sets. The Trellix ePO - On-prem admin
user must give appropriate user permissions to the Trellix CWS user by changing the Cloud Workload Security(Controls)
permissions under Trellix ePO - On-prem Permission Sets accordingly.
Check if the Trellix ePO - On-prem admin user has assigned the appropriate permission for the Trellix CWS user to tag
workloads under Permission Sets → Systems → Tagging. You can check if these permissions are assigned to the Trellix
CWS user in the Trellix ePO - On-prem Orion logs.
Why do the server tasks fail when triggered from the Trellix CWS console?
Check if the Trellix ePO - On-prem admin user has assigned the permission to the Trellix CWS user to trigger server tasks.
You can check if these permissions are assigned to the Trellix CWS user in the Trellix ePO - On-prem Orion logs.
Check if the Trellix ePO - On-prem admin user has assigned the permission to the Trellix CWS user to assign policies
to workloads/accounts under Permission Sets → Cloud Workload Security(Controls) → Editand select the appropriate
Control Permission option. You can check if these permissions are assigned to the Trellix CWS user in the Trellix ePO -
On-prem Orion logs.
Why can't a newly created Trellix CWS user view the Trellix CWS console?
By default, a new Trellix CWS user has no permissions to view the Trellix CWS console. The Trellix ePO - On-prem admin
user must change the user permissions by changing the Cloud Workload Security(Controls) permissions under Trellix ePO
- On-prem Permission Sets.
Can I view the registered cloud account details in the Trellix CWS console immediately after an upgrade?
After a successful upgrade, initiate a sync on all registered cloud accounts to view the updated Trellix CWS console
immediately. You can also wait for the next scheduled sync to complete successfully.
VirusScan Enterprise is installed on my instance, but the instance is still color-coded as red.
If your instance is not managed with this Trellix ePO - On-prem, then the status is shown as red. For assessment to show
correct result, the instance must be managed by the same Trellix ePO - On-prem.
• If there is one NIC associated with an instance, and you are trying to detach a security group.
• If your instance is associated with multiple NICs and you are trying to detach a security group, which is associated
with another NIC.
If you installed the Trellix CWS extension and completed registering your accounts, you can see your virtual networks in
your accounts when synchronization and assessment is complete.
By default, you can see all virtual networks that have at least one running workload. If your virtual network has no running
workloads, it isn't shown. Select Show All on the Accounts panel to see all virtual networks.
I can see some names and some IDs under Virtual Networks and Workloads.
By default, you can see the names of your virtual networks and workloads. If they don't have a name, you can see their IDs.
Which vendor cloud accounts are supported in the Cloud Workload Security dashboard.
Currently, we support AWS and Microsoft Azure cloud accounts. Microsoft Azure classic accounts aren't shown here.
I can't see network traffic for some workloads on the Cloud Workload Security dashboard.
My traffic discovery is disabled, but I can still see traffic details for AWS instances.
Data retention period for AWS traffic data is seven days. So you might still see some traffic details until the retention period.
How long is the AWS traffic data stored in Trellix ePO - On-prem?
Can I get a detailed server log file if Trellix Agent deployment fails?
Yes.
• From Menu → Automation → Server Task Log, look for Data Center: Auto Deploy Trellix Agent.
• Select the task with the start date of your deployment task.
• Select a subtask with your system IP address.
Can I get a detailed server log file if any product installation fails?
Yes.
• From Menu → Automation → Server Task Log, search for "wake up" task that has details about the feature.
• Select the task with the start date of your deployment task.
• Select a subtask with your system IP address.
Does the installation of Trellix Agent or any of the products times out?
If your Trellix ePO - On-prem server doesn't receive the installation status of Trellix Agent or any of the products, it times
out after 60 minutes.
What number is displayed in the tooltip of data center, cluster, hypervisor, or workloads?
The corresponding ID of the data center, cluster, hypervisor, or the workload is displayed in the tooltip.
Trellix and FireEye are the trademarks or registered trademarks of Musarubra US LLC, FireEye Security Holdings US LLC and their affiliates in the
US and /or other countries. McAfee is the trademark or registered trademark of McAfee LLC or its subsidiaries in the US and /or other countries.
Skyhigh Security is the trademark of Skyhigh Security LLC and its affiliates in the US and other countries. Other names and brands are the
property of these companies or may be claimed as the property of others.