I am pleased this feature now exists in Intercept-X
We see one of the main attack vectors as follows:
- User receives phishing e-mail or a macro-enabled attachment.
- User clicks through warnings and executes the macro-enabled attachment. Or, they're tricked into a download.
- It downloads an executable or payload etc, etc.
While we can block Downloads in a Web Control policy (particularly exe, DLL, etc) - it would never prevent Downloads through HTTPS connections.
Now we have the capability:
- Given my use case above, is it possible to implement a policy on the endpoint that prevents users from downloading executables or potentially malicious payloads (i.e. Beacons)
- If so, how do we avoid legitimate downloads (i.e. Microsoft Updates, Adobe, etc) - or do we simply have to whitelist wildcard domains?
I appreciate we can do this at the firewall level with SSL-inspection.
Ideas welcomed.
Thanks
This thread was automatically locked due to age.