• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

How to whitelist Anydesk (Remote Access Software) in snort?

Scheduled Pinned Locked Moved IDS/IPS
12 Posts 4 Posters 5.7k Views 4 Watching
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • N Offline
    noor92 @Gertjan
    last edited by Oct 22, 2020, 11:53 AM

    @Gertjan The program which is using the 80 and 443 port is Anydesk software, (Anydesk is a remote access software same like TeamViewer) as I mentioned we are using anydesk software to access our systems on our LAN from the internet.

    The sources IP addresses that you can see on logs are all the Anydesk IPs.

    What I want to do is to whitelist Anydesk in snort, and I do not know how to accomplish this, should I configure IP pass list in snort by adding all the IPs which belong to Anydesk?

    B 1 Reply Last reply Oct 22, 2020, 2:24 PM Reply Quote 0
    • B Offline
      bmeeks @noor92
      last edited by bmeeks Oct 22, 2020, 2:25 PM Oct 22, 2020, 2:24 PM

      @noor92 said in How to whitelist Anydesk (Remote Access Software) in snort?:

      @Gertjan The program which is using the 80 and 443 port is Anydesk software, (Anydesk is a remote access software same like TeamViewer) as I mentioned we are using anydesk software to access our systems on our LAN from the internet.

      The sources IP addresses that you can see on logs are all the Anydesk IPs.

      What I want to do is to whitelist Anydesk in snort, and I do not know how to accomplish this, should I configure IP pass list in snort by adding all the IPs which belong to Anydesk?

      Whitelisting is not what you want in this case.

      You broke the cardinal rule of IDS/IPS that I preach about and that @Gertjan mentioned. You installed the package and immediately enabled blocking without first carefully selecting your rules and evaluating your network traffic for several weeks in non-blocking mode to see what false positives occur so you could disable those rules. So now you are reaping the result of not following the suggested course. You are getting nuisance blocks.

      You have a series of clear false-positive rules from the HTTP_INSPECT preprocessor in that ALERTS tab capture. If you search this forum for a bit, you will find a lot of posts where this is discussed and what to do about it.

      The IDS/IPS packages are not a good fit for inexperienced IT Security admins. These packages are not like anti-virus products that you can just install, update, and forget about. They require constant maintenance and tuning. You also need a firm foundation in the threats out there (how they work) as well as knowledge of the rules syntax and how they detect the threats. Finally, it stands to reason you need to know how to actually configure and operate the package in question. Installing the IDS/IPS packages on a home network for experimentation and learning is one thing, but installing them on a commercial production network without lots of experience configuring and maintaining them is a recipe for disaster.

      N 1 Reply Last reply Oct 23, 2020, 6:31 AM Reply Quote 2
      • N Offline
        NogBadTheBad
        last edited by Oct 22, 2020, 7:46 PM

        @bmeeks said in How to whitelist Anydesk (Remote Access Software) in snort?:

        You have a series of clear false-positive rules from the HTTP_INSPECT preprocessor in that ALERTS tab capture. If you search this forum for a bit, you will find a lot of posts where this is discussed and what to do about it.

        You can disable the pre proc rules here if needed:-

        Screenshot 2020-10-22 at 20.40.45.png

        @bmeeks is the filtering option broken ?

        Screenshot 2020-10-22 at 20.44.02.png

        Andy

        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

        B 2 Replies Last reply Oct 22, 2020, 8:28 PM Reply Quote 0
        • B Offline
          bmeeks @NogBadTheBad
          last edited by bmeeks Oct 22, 2020, 8:28 PM Oct 22, 2020, 8:28 PM

          @NogBadTheBad said in How to whitelist Anydesk (Remote Access Software) in snort?:

          @bmeeks is the filtering option broken ?

          Screenshot 2020-10-22 at 20.44.02.png

          It's not supposed to be ... 😊, but I have not checked it lately. I will need to test it.

          1 Reply Last reply Reply Quote 0
          • B Offline
            bmeeks @NogBadTheBad
            last edited by Oct 22, 2020, 8:30 PM

            @NogBadTheBad:
            I just tested the "Disabled Rules" filter on my firewall and it worked (in Snort).

            N 1 Reply Last reply Oct 23, 2020, 8:14 AM Reply Quote 1
            • N Offline
              noor92 @bmeeks
              last edited by Oct 23, 2020, 6:31 AM

              @bmeeks Thanks for your reply, the answer was short and I ve just got it from another fellow member here, I just need to suppress the alert, please correct me if I am wrong.

              B 1 Reply Last reply Oct 23, 2020, 12:26 PM Reply Quote 0
              • G Offline
                Gertjan
                last edited by Oct 23, 2020, 7:25 AM

                That must be :

                5fac6f83-d49a-4e78-bb55-9a075c021362-image.png

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                1 Reply Last reply Reply Quote 0
                • N Offline
                  NogBadTheBad @bmeeks
                  last edited by NogBadTheBad Oct 23, 2020, 8:15 AM Oct 23, 2020, 8:14 AM

                  @bmeeks said in How to whitelist Anydesk (Remote Access Software) in snort?:

                  @NogBadTheBad:
                  I just tested the "Disabled Rules" filter on my firewall and it worked (in Snort).

                  Should it not also filter disabled by user rather than disabled by default?

                  As a test I disabled 1:49361 and it doesn't show:-

                  Screenshot 2020-10-23 at 09.11.43.png

                  Screenshot 2020-10-23 at 09.12.06.png

                  Andy

                  1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                  B 1 Reply Last reply Oct 23, 2020, 12:23 PM Reply Quote 0
                  • B Offline
                    bmeeks @NogBadTheBad
                    last edited by Oct 23, 2020, 12:23 PM

                    @NogBadTheBad said in How to whitelist Anydesk (Remote Access Software) in snort?:

                    @bmeeks said in How to whitelist Anydesk (Remote Access Software) in snort?:

                    @NogBadTheBad:
                    I just tested the "Disabled Rules" filter on my firewall and it worked (in Snort).

                    Should it not also filter disabled by user rather than disabled by default?

                    As a test I disabled 1:49361 and it doesn't show:-

                    Screenshot 2020-10-23 at 09.11.43.png

                    Screenshot 2020-10-23 at 09.12.06.png

                    I need to check the code to see what it's doing. I know it catches rules disabled by SID MGMT configurations, because that's how I have a number of the HTTP_INSPECT rules disabled.

                    1 Reply Last reply Reply Quote 1
                    • B Offline
                      bmeeks @noor92
                      last edited by Oct 23, 2020, 12:26 PM

                      @noor92 said in How to whitelist Anydesk (Remote Access Software) in snort?:

                      @bmeeks Thanks for your reply, the answer was short and I ve just got it from another fellow member here, I just need to suppress the alert, please correct me if I am wrong.

                      I would instead suggest disabling those rules. They are highly prone to false positives. Suppressing them still loads them into memory, and CPU cycles are wasted evaluating traffic against them. They just don't generate alerts when suppressed. Disabling them results in them never even being loaded up, so RAM and CPU cycles are conserved for more important rules.

                      1 Reply Last reply Reply Quote 0
                      12 out of 12
                      • First post
                        12/12
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                        This community forum collects and processes your personal information.
                        consent.not_received