Host Intrusion Prevention System (HIPS)

Host Intrusion Prevention System, or HIPS, is an important tool in the LANDesk Security Suite and one of the components of Endpoint Security.

HIPS gives you the ability to protect managed devices from known and unknown internal malware attacks before they contaminate your network. HIPS adds an extra layer of protection to your managed devices by monitoring processes and files and using rules to determine allowed actions and behaviors. In a sense, HIPS protects systems from themselves.

Read this section to learn about:

Host Intrusion Prevention (HIPS) overview

HIPS stands for Host-based Intrusion Prevention System. HIPS provides another layer of protection on top of antivirus, anti-spyware, patch management and firewall configuration to prevent malicious activity on your machine. HIPS continuously monitors specified processes, files, applications, and registry keys to prevent unauthorized behavior. You control which applications run on devices and how they are allowed to execute.

Because it is a rule-based system, instead of a definition-based system, HIPS is more effective at protecting systems against zero-day attacks (malicious exploitation of vulnerable code before patches are available).

Unlike vulnerability detection and remediation, spyware detection and removal, or antivirus scanning, HIPS protection does not require ongoing file updates (patch files, definition/pattern files, or signature database files).

HIPS protects servers and workstations by placing software agents between applications and the operating system’s kernel. Using predetermined rules based upon the typical behavior of malware attacks, these systems evaluate activities such as network connection requests, attempts to read or write to memory, or attempts to access specific applications. Behavior known to be good is allowed, behavior known to be bad is blocked, and suspicious behavior is flagged for further evaluation.

The HIPS tool and features are accessed from the main console (Tools > Security > Security Configurations). The HIPS tool lets you create HIPS agent installation, update, and removal tasks; configure HIPS settings that can be deployed to targeted devices you want to protect; and customize HIPS display/interaction settings that determine how HIPS appears and operates on managed devices, and which interactive options are available to end users. You can also view HIPS activity and status information for protected devices.

Component of Endpoint Security

HIPS is one of the components of the comprehensive Endpoint Security solution, along with the LANDesk Firewall and Device Control tools.

Proactive security

HIPS proactively protects your managed devices from by:

System-level security

HIPS offers the following system-level security:

HIPS console features

HIPS provides administrators with the ability to define and manage separate profiles for different user groups with HIPS settings. HIPS settings accommodate the needs of any and all user groups by allowing administrators to create multiple, highly flexible configurations for different user profiles.

HIPS settings can include custom password protection, WinTrust handling, protection mode, custom whitelists, network and application access control policies, file certifications, and file protection rules.

HIPS client features

The HIPS client gives administrators a powerful new tool for controlling what applications run on enterprise desktops and servers, and how those applications are allowed to execute.

HIPS client software uses proven heuristic and behavior-recognition techniques to recognize typical patterns and actions of malicious code. For example, a file that attempts to write to the system registry could be blocked and flagged as potentially malicious. The HIPS client uses a variety of proprietary techniques to reliably detect malware even before a signature has been identified.

Supported device platforms

HIPS supports many of the same desktop and server platforms supported by the standard LANDesk-managed device platforms, including the following operating systems:

NOTE: HIPS is not supported on core servers or rollup cores
You should not install/deploy HIPS to a core server or a rollup core. However, you can deploy HIPS on an additional console.

Supported antivirus products

HIPS is compatible with the LANDesk Security Suite Antivirus solution as well as several third-party antivirus products. Compatibility means that HIPS will not interfere with antivirus processes such as scans, real-time protection, etc.

Make sure the managed devices you want to configure with HIPS have one of the following antivirus products installed:

Do not deploy HIPS to devices with any other antivirus product installed.

HIPS licensing

In order to access the HIPS tool you must first activate your core server with a HIPS license.

For information about HIPS licensing, contact your reseller, or visit the LANDesk Web site.

Role-based administration with HIPS

HIPS, like Patch and Compliance, uses role-based administration to allow users access to features. Role-based administration is the access and security framework that lets LANDesk Administrators restrict user access to tools and devices. Each user is assigned specific roles and scope that determine which features they can use and which devices they can manage.

Administrators assign these roles to other users with the Users tool in the console. HIPS is included in the Security Configurations right, which appears under the Security rights group in the Roles dialog box. In order to see and use HIPS features, a user must be assigned the necessary Security Configurations access rights.

IMPORTANT: LANDesk Script Writers group permission required
In order to create scheduled tasks and policies in the Patch and Compliance tool and the Security Configurations tool (for security and compliance scan tasks, repair tasks, and change settings tasks), a user must have the LANDesk Script Writers group permission. In other words, they must belong to a group that has the LANDesk Script Writers permission assigned. For more information about role-based administration, see Role-based administration.

With the Security Configurations right, you can provide users the ability to:

HIPS task workflow

The steps below provide a quick summary outline of the typical processes or tasks involved in implementing HIPS protection on your network. All of these procedures are described in detail in subsequent sections.

Basic steps in implementing and using HIPS:

  1. Configuring managed devices for HIPS protection (deploying the agent to target devices).
  2. Configuring HIPS options with HIPS settings, such as signed code handling, protection mode, whitelists (applications allowed to execute on devices), file certifications, file protection rules, and end user interactive/options.
  3. Discovering file and application behavior on devices with the HIPS learn mode.
  4. Enforcing HIPS protection on managed devices with the HIPS automatic block mode.
  5. Viewing HIPS activity for protected devices.

Configuring devices for HIPS protection

Before managed devices can be protected from zero-day attacks, they must have the Endpoint Security agent installed. The Endpoint Security agent is a single agent service that manages all of the Endpoint Security components, including HIPS.

You can configure devices for HIPS either during initial device agent configuration or with a separate installation or update task.

To install or update HIPS on managed devices via an agent configuration
  1. In the console, click Tools > Configuration > Agent Configuration.
  2. Click the New Windows toolbar button.
  3. After specifying your desired settings for the agent configuration, you must first click the Start page, and select the Endpoint Security option under Security. (This deploys the agent to target devices, but you still need to select a HIPS settings.)
  4. Now you can access the options on the Endpoint Security page.



  5. Select one of the settings from the available list to apply it to the agent configuration you're creating. You can create new settings or edit existing settings by clicking Configure. The Endpoint Security settings contain HIPS settings (among other security component settings). The HIPS settings determine the following options: whether the HIPS client is password protected, WinTrust signed code handling, action on programs added to system startup, buffer overflow protection, operating mode, whitelists, file certifications, and file protection rules.
  6. Finish specifying settings for the agent configuration and then click Save.

If you want to install or update HIPS at a later time, you can do so as a separate task from the Security Configurations tool in the console.

To install or update HIPS as a separate task
  1. In the console, click Tools > Security > Security Configurations.
  2. Click the Create a task toolbar button, and then click Install/Update security components.



  3. Enter a name for the task.
  4. Specify whether the installation is a scheduled task or a policy-based task, or both.
  5. Select an Endpoint Security setting from the available list to apply it to the agent configuration you're creating. You can create new settings or edit existing settings by clicking Configure. The Endpoint Security settings contain HIPS settings (among other security component settings).
  6. If you want to display the installation progress in the security scanner dialog on targeted devices, select the Show progress dialog on client option.
  7. Select a Scan and repair setting from the list to apply its reboot configuration (only) to the agent configuration you're creating. You can create new settings or edit existing settings by clicking Configure. Keep in mind that only the reboot options specified on the Scan and repair settings you select are used by this agent configuration's Endpoint Security agent deployment to target devices. You can use an existing Scan and repair setting that already includes the reboot configuration you want, or you can create a brand new Scan and repair setting specifically for your agent deployment.
  8. Click OK.

Removing HIPS from devices

If you want to remove HIPS from managed devices, you can also do that as a separate task from the console.

To remove HIPS
  1. In the console, click Tools > Security > Security Configurations.
  2. Click the Create a task toolbar button, and then click Remove security components.
  3. Enter a name for the task.
  4. Specify whether the installation is a scheduled task or a policy-based task, or both.
  5. Select the Endpoint Security component to remove the agent that includes HIPS.
  6. If you want to display the installation progress in the security scanner dialog on targeted devices, select the Show progress dialog on client option.
  7. Select a scan and repair setting from the available list to apply its reboot configuration to the task you're creating. You can create new settings or edit existing settings by clicking Configure. The task will use the selected scan and repair settings' reboot options only, which determine reboot requirements and actions on target devices during agent removal.
  8. Click OK.

Customizing HIPS protection with HIPS settings

HIPS settings give you complete control over how HIPS operates on target devices, and which options are available to end users.

This section describes how to create and manage HIPS settings:

Creating HIPS settings

You can create and apply HIPS settings to a HIPS installation or update task or to a change settings tasks. You can create as many HIPS settings as you like. HIPS settings can be designed for a specific purpose, time, or set of target devices.

To create HIPS settings
  1. In the Security Configurations tool window, right-click Host Intrusion Prevention, and click New.



  2. At the General settings page, enter a name for the HIPS settings, and then specify the general requirements and actions. For information about an option, see HIPS settings help.
  3. At the Mode configuration page, select whether you want to enforce HIPS automatic blocking protection mode, or learn mode. You can also create a whitelist (applications allowed to execute on devices) based on the current certified files, and specify whether you want the whitelist generation to run for a specified period of time initially and then re-enforce automatic blocking mode, or continue using learn mode. (NOTE: If you select learn mode as the general protection mode and want to generate a whitelist, the enforce automatic mode option is disabled.)
  4. At the File certifications page, add, modify, or delete file certifications.
  5. At the File protection rules page, add, modify, prioritize, or delete file protection rules. HIPS includes a predefined (default) set of protection rules.
  6. At any of the settings pages, click Save at any time to save your configured options for the HIPS settings, or click Cancel to exit the dialog box without saving the settings.

Once configured, you can deploy HIPS settings to target devices with an installation or update task, or a change settings task.

Changing default HIPS settings

The device default HIPS settings are deployed as part of the initial agent configuration. At some point you may want to change these default HIPS settings on certain devices. HIPS provides a way to do this without having to redeploy an entirely new and complete agent configuration.

To do this, use the Change settings task located in the drop-down list of the Create a task toolbar button. The dialog box that appears lets you enter a unique name for the task, specify whether it is a scheduled task or policy, and either select an existing HIPS settings as the default or use the Edit button to create a new HIPS settings as the default for target devices.

Viewing device HIPS settings in the inventory

You can discover and/or verify HIPS settings in a device's Inventory view.

To do this, right-click the selected device, click Inventory > LANDesk Management > Host Intrusion Prevention.

HIPS settings help

Use this dialog box to create and edit a HIPS setting. When creating HIPS settings, you first define the general requirements and actions, and then add specific file certifications. You can create as many HIPS settings as you like and edit them at any time.

If you want to modify the device default HIPS settings without reinstalling the HIPS agent or redeploying a full agent configuration, make your changes to any of the options on the HIPS settings dialog box, assign the new settings to a change settings task, and then deploy the change settings task to targeted devices.

This dialog box contains the following pages:

About the HIPS: General settings page

About the HIPS: Mode configuration page

About the HIPS: File certifications page

About the HIPS: File protection rules page

About the HIPS: General settings page

Use this page to configure the general protection settings and actions for HIPS.

This page contains the following options:

About the HIPS: Mode configuration page

Use this page to configure the operating mode of HIPS protection.

This page contains the following options:

About the HIPS: File certifications page

Use this page to view and manage file certifications. File certifications are a set of rights (privileges or authorizations) that allow and deny certain actions that can be performed by an application on managed devices.

This page contains the following options:

About the HIPS: Configure file certification dialog box

Use this dialog box to configure certifications for a specific application file.

This dialog box contains the following options:

About the HIPS: File protection rules page

Use this page to view, manage, and prioritize file protection rules. File protection rules are a set of restrictions that prevent specified executable programs from performing certain actions on specified files. With file protection rules, you can allow or deny access, modification, creation, and execution by any program on any file.

This dialog box contains the following options:

NOTE: File protection rules are stored in the FILEWALL.XML file, located in: ProgramFiles\Landesk\ManagementSuite\ldlogon\AgentBehaviors\Hips_Behavior.ZIP

About the HIPS: Configure file protection rule dialog box

Use this page to configure file protection rules.

This dialog box contains the following options:

Understanding the HIPS learn mode

HIPS can run in one of the following protection modes: Automatic, Learn, Log only, or Block.

Using the HIPS learn mode

Below is a description of the HIPS learn mode process:

Learn mode can be applied to managed devices generally allowing HIPS violations to occur until a new HIPS setting is deployed, or learn mode can be applied initially for a specified period of time in order to discover what applications are run and their behavior and to create a whitelist (applications allowed to execute on devices). If the general protection mode is automatic blocking, you can still use learn mode to discover application behavior and then re-enforce automatic blocking mode once the learning period has expired.

Note that both the core server and the managed device must be operating in learn mode in order for the action history communication to take place.

Merging HIPS certifications

You can merge HIPS certified files from one HIPS setting to one or more other HIPS settings. This lets you update and share certified file settings quickly and easily.

To merge HIPS certified files
  1. In the Security Configurations tool window, right-click Host Intrusion Prevention, and click Merge certified files.
  2. Select a source configuration from the list.
  3. Select whether you want to merge differences in the certified files or simply replace all certified files.
  4. Select the target configurations.
  5. Click OK.

About the Merge certified files dialog box

Use this dialog box to configure and execute a merger of HIPS certified files between one or more HIPS settings.

This dialog box contains the following options: