Ransomware Protection for Servers Dashboard

The Ransomware Protection dashboard provides broad visual information about ransomware protection readiness, risk exposure, and protection coverage.

NOTE:

One of the following global user roles are required to use the Ransomware Protection Dashboard:

  • Global Org Owner

  • Global Administrator

  • Global Viewer

About the Dashboard

To access the Ransomware Protection Dashboard, click Dashboard-> Ransomware Protection in the left navigation.

Dashboard Layout

The Dashboard includes multiple columns and widgets.

Refreshing the widget information

  • The widgets that include small clock icons are auto-refreshed every four hours. To learn about the auto-refresh schedule. click on the clock icon.

  • The widgets with no clock icons are refreshed when users click Refresh.

Widget color changes

Widgets change colors to show the percentage of the achieved coverage:

  • Red: indicates coverage between 0 and 50%

  • Yellow: indicates coverage between 50% and 80%

  • Green: indicates coverage between 80% and 100%

Getting more information from the Dashboard

  • Click Info (?) to learn about the Dashboard functions.

Widget Types

The Ransomware Protection Dashboard presents several types of widgets.

Protection Readiness Widgets

These widgets show workload protection readiness.

Protection Ready Workloads

A workload is protection-ready when there is a VEN installed on it and it is configurable to enforce Illumio security policies.

You can change the number of workloads requiring protection by clicking the underlined number on the widget and entering a new target number of workloads. This non-underlined number indicates the number of such workloads that are protection-ready.

Protection Ready Workloads over time

This widget provides a chart showing the number of Protection Ready workloads over a selected period of time.

In each of the selected views, the number of Protection-Ready Workloads is represented as a percentage of the available target workloads (100%).

You can view protection readiness over time: Daily, Weekly, Monthly, and Quarterly.

Workload Protection Exposure Widgets

These widget display information about the workloads protection exposure.

Protected Workloads

A workload is protected when it has policies on all the ransomware-risky services / ports and the policies are enforced.

To be counted as a protected workload, the workload must be in Selective Enforcement or Full Enforcement mode.

In this example, out of 423 that are protection-ready, 182 workloads are protected. Because the percentage of protected workloads is 43%, the widget color is light red.

Workloads by Ransomware Exposure

This widget shows the number of workloads according to their ransomware exposure across the organization (Critical, High, Medium, Low, and Protected).

A workload is assessed according to its exposure to the services commonly exploited by ransomware.

For more details, see Services in the Security Policy guide.

A workload is protected from the service in these two cases:

  • The service is blocked by enforcement boundary in Selective Enforcement, or

  • The workload is in Full Enforcement, regardless of whether there is or is not a rule for that service.

Workloads Exposure over time

The Workload Exposure widget shows, over the selected time period, the percentage of existing workloads that are or are not protected from the ransomware. Unprotected workloads are further grouped in their exposure categories as Critical, High, Medium, and Low.

Protection Coverage Widgets

Protection Coverage Score

The Protection Coverage Score is a metric used to measure the effectiveness of security policies in protecting workloads. It indicates the percentage of the entire possible attack surfaces that are actively protected by security policies. For example, a policy that allows all workloads as Source will have a lower coverage score compared to a policy that only allows a small number of Source workloads.

Protection coverage score takes all the protection-ready workloads into consideration across the organization.

The color of the widget changes from red to yellow and then to green as the protection coverage score increases.

Protection Coverage Score over Time

This widget displays the percent of the ransomware protection coverage over a time period: Daily, Weekly, Monthly, and Quarterly. In each case, it displays the last data point of the period.

To help illustrate the protection coverage trends, five percentage data points are used: 20%, 40%, 60%, 80%, and 100%.

When you mouseover the widget, the pop-up shows ransomware protection during the target period.

Table for 10 total address spaces:

Enforcement Mode Policy blocked_peer_set_count Coverage %
Selective Enforcement No deny or allow 0 0%
  allow (no deny) 0 0%
  Deny 10 100%
  Deny and allow 5 50%
Full Enforcement No allow rules 10 100%
  Allow 5 50%

Weight assigned for protection coverage score

Protection Weight assigned
Critical 40
High 30
Medium 20
Low 10

Coverage score example

Protection coverage score calculation for four ports

Ports Policy Idle Visibility Selective Enforcement Full Enforcement
SMB S-SMB TCP 445 Critical 40 No rules Unprotected Unprotected 0 100%
VNC S-VNC TCP 5900 High 30 Deny rules Unprotected Unprotected 100% 100%
POP3 S-POPV3 TCP 110 Low 10 Allowed rules Unprotected Unprotected 0 50%
FTP Data S-FTP-DATA TCP 20 Medium 20 Deny rules and allow rules Unprotected Unprotected 50% 50%
Protection Coverage Score 0% 0% 40% 85%

According to the table above, here is how the protection coverage was calculated:

  • Selective Enforcement = ( 40 * 0 + 30 * 100% + 10 * 0 + 20 * 50%) / (40+30+10+20) = 40%

  • Full Enforcement = ( 40 * 100% + 30 * 100% + 10 * 50% + 20 * 50%) / (40+30+10+20) = 85%

Top 5 Risky Applications and Services

Risky Applications

This widget displays the top 5 riskiest applications in your environment. Application risk is based on the Protection Coverage Score that appears in the App Group List. For an app-level risk assessment and remediation recommendations, click any application in the list to redirect to its details page.

For an app-level risk assessment and remediation recommendations, click any application in the list to redirect to its details page.

Risky Services

The PCE automatically assigns default ransomware protection settings on certain services deemed to be at risk of ransomware penetration and lateral movement. These services and their default risk assessment are listed in the Ransomware-risky services table below. Based on this default risk assignment, the top 5 riskiest services in your environment are displayed in a dedicated widget on the Ransomware Dashboard.

Click any service in the list to redirect to its details page. From there you can edit or remove the service, or navigate up one level to add new services.

To address the unique conditions in your environment, you can change the default ransomware risk assessment on a per-service basis by gong to Policy Objects > Services and changing the Severity as shown in the following image.

Ransomware-risky services table

The list of services at risk of ransomware penetration and lateral movement is provided in this table to help you assess ransomware exposure on your Enterprise Services. All new organizations created after the release 23.2 have services created and tagged with the metadata as system default. Organizations created before the release 23.2 with services that have exact match of protocol and port numbers will be tagged with the ransomware risk metadata.

Service Service Name Protocol Port Number Severity Category OS
HTTP S-HTTP TCP 80 Medium Legacy Linux, Windows
LLMNR S-LLMNR UDP 5355 Medium Legacy Linux, Windows
NFS S-NFS TCP/UDP 2049 Medium Admin Linux
RDP S-RDP TCP/UDP 3389 Critical Admin Windows
MSFT RPC S-RPC TCP 135 Critical Admin Linux, Windows
SMB S-SMB TCP/UDP 445 Critical Admin Linux, Windows
SSH S-SSH TCP/UDP 22 Medium Admin Linux
WinRM S-WINRM TCP 5985 Critical Admin Windows
WinRM Secure S-WINRM-SECURE TCP 5986 Critical Admin Windows
FTP Data S-FTP-DATA TCP 20 Medium Legacy Linux, Windows
FTP Control S-FTP-CONTROL TCP 21 Medium Legacy Linux, Windows
METASPLOIT S-METASPLOIT TCP/UDP 4444 Low Legacy Linux, Windows
Multicast DNS S-MDNS UDP 5353 Medium Legacy Windows
NetBIOS S-NETBIOS

UDP

TCP

137, 138

137, 139

High Legacy Windows
POP3 S-POPV3 TCP 110 Low Legacy Linux, Windows
PPTP S-PPTP TCP/UDP 1723 Low Legacy Linux, Windows
SSDP S-SSDP UDP 1900 Medium Legacy Windows
SunRPC S-SUNRPC TCP/UDP 111 Low Legacy Linux
TeamViewer S-TEAMVIEWER TCP/UDP 5938 High Admin Linux, Windows
Telnet S-TELNET TCP/UDP 23 Medium Admin Linux, Windows
VNC S-VNC TCP/UDP 5900 High Admin Linux, Windows
WSD S-WSD TCP/UDP 3702 Medium Legacy Windows

Risky Ports Widgets

These widgets illustrate risky ports in your environment.

Risky Ports by Severity

This widget shows the percentage of ransomware-risky ports in your environment according to their level of severity (Critical, High, Medium, and Low). Each category of risky ports has a different total on each workload, and therefore, across the environment.

To help illustrate the protection coverage by severity, five percentage data points are used: 20%, 40%, 60%, 80%, and 100%.

Colored bars depict the percentage of protected (green) and unprotected (orange) ports.

Risky Ports by Type

This widget shows the percentage of ransomware-risky ports in your environment by type, administrative or legacy.

To help illustrate the protection coverage by port type, five percentage data points are used: 20%, 40%, 60%, 80%, and 100%.

Colored bars depict the percentage of protected (green) and unprotected (orange) ports.

Recommended Actions Widget

This widget presents links for securing your workloads so that you can more easily address the risks revealed in the other widgets.

Workload Ransomware Protection for Servers Details

The Ransomware Protection tab provides detailed protection information for the workloads regarding each of the ransomware-risky services.

Information about the ransomware risk is then aggregated into the Ransomware Protection for Servers Dashboard for the system-side ransomware risk analysis.

The Severity and Port Type are designated per each ransomware-risky service.

For more details, see Services in the Security Policy guide.

Here is the explanation for the data provided in the Ransomware Protection table:

  • Severity: Severity of the ransomware risk, which can be Critical, High, Medium or Low.

  • Port Status: Port status can be Active or Inactive.

    • Listening: Listening means there is a running process on that port.

    • Inactive: Inactive means there is no process running on the port. The same information is also provided on the Processes tab.

  • Port Type: The port type can be Admin or Legacy.

    • Admin: Admin refers to the service and ports are used for common administrative tasks.

    • Legacy: Legacy means that ports are used for legacy protocols.

  • Protection: Protection types are:

    • Protected (Blocked). When port is blocked by deny rules in Selective Enforcement or blocked with no allow rules in Full Enforcement. No ransomware can propagate through that port.

    • Unprotected The port is exposed to ransomware exploits.

    • Protected (Allowed by Policy). When there are allow rules intentionally policing the traffic. Only the trusted sources are allowed to access the port and hence the risk of lateral movement for ransomware is reduced. The workload has to be either in Selective Enforcement or Full Enforcement for the policy to be enforced.

  • The Port status does not affect the protection state.

  • Active Policy and Draft Policy: Indicates whether there is an Active or Draft policy to protect that particular port and the corresponding action.

API Support for the Ransomware Protection for Servers Dashboard

The Dashboard uses several APIs to aggregate various data from the system and helps you focus on the data you are interested in.

The two main APIs are: time_series and risk_summary. To learn about APIs used to power the Ransomware Protection Dashboard, see Ransomware Protection Dashboard APIs.