This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Discussions
  • NetWitness Community
  • Discussions
  • Re: ecat / nwe compatibility with meltdown/spectre mitigations/patches
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page

ecat / nwe compatibility with meltdown/spectre mitigations/patches

VladimirPrevin
VladimirPrevin Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2018-01-09 05:33 PM

Can you please confirm if there are any compatibility issues with ECAT 4.1-4.4 and https://support.microsoft.com/en-us/help/4072699/january-3-2018-windows-security-updates-and-antivirus-software or the registry key mitigations https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 [our AV vendor is pushing out the registry keys and we’re deploying the patch]

 

Best I could find is https://community.rsa.com/docs/DOC-85418 but it doesn’t state agent compatibility with the patches.

Labels:
  • Labels:
  • RSA NetWitness Endpoint
  • Community Thread
  • Discussion
  • ECAT
  • EDR
  • Endpoint
  • Forum Thread
  • NetWitness
  • NetWitness Endpoint
  • NWE
  • patch compatibility
  • RSA NetWitness Endpoint
  • RSA NetWitness Platform
0 Likes
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
8 REPLIES 8

MichaelGotham
MichaelGotham Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2018-01-09 05:43 PM

The RSA NWE team is currently working through testing to ensure there are no issues with the patch and NWE agent.  The team is testing multiple flavors of Windows with the 4.4.0.1 agent.  If your environment is not already on the latest version (4.4.0.1) I would strongly recommend upgrading both the server and agents to ensure there are no issues since that is what is being tested.

 

The team is shooting to have this completed by Monday January 15th.  HTH.

0 Likes
Reply

VladimirPrevin
VladimirPrevin Beginner
Beginner
In response to MichaelGotham
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2018-01-09 05:47 PM

the problem is the fixes can be pushed silently by people's AV vendors in signatures. e.g sophos. 

the second problem - not everyone is on 4.4.0.1. and not everyone can go and upgrade to it urgently and immediately.... (generally most people have and EDR agent test and deployment internal cycle and change management contraints)

are there any plans to test the rest of the versions not officially retired. 

0 Likes
Reply

MichaelGotham
MichaelGotham Beginner
Beginner
In response to VladimirPrevin
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2018-01-09 05:57 PM

Vladimir,

 

Completely understand not all customers will be able to quickly upgrade to the latest version.  However testing is normally a time consuming process and testing every agent version (4.3 for example has 6 different patches) isn't feasible for a quick turn around, which is the immediate goal.  I'm not sure of any plans to test other versions of the agent at this point.  Sorry 😕

 

Out of curiosity...what version are you on?

0 Likes
Reply

VladimirPrevin
VladimirPrevin Beginner
Beginner
In response to MichaelGotham
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2018-01-09 06:21 PM

heh. we're on a mix of 4.2.0.4, 4.1.1.1 (yes yes i know there's awful bugs, half of which we reported) and 4.3.0.3 [roughly 1/3 each] 

 

 

Personally I think RSA testing should be based on is the telemetry submitted by ecat server and the official support lifecycles. As such you should have a semi automated test harness for each version . Just testing the latest version  is frankly not acceptable?

 

it looks like quite a few AV vendors have decided to push the patch compatible flag (here)

 edit -  the customers still control windows update deployment, even if the AV vendor sets the compatibility flag (and EDR is potentially incompatible), it's not the memory management settings here 4072698  that most AV engines set , but the compatibility flag from here 4072699  ]

Basically as a customer we have to delay releasing the patch until RSA finishes testing. [hopefully RSA tests both the patch and extra mitigation registry keys]

 

However the 15th Jan/only the latest version testing is not satisfactory 

 

 

Perhaps the testing can be extrapolated for:

a) versions with older TDI driver < 4.4

b) versions with the WFP driver (4.4+)

 

at least to some extent. 

0 Likes
Reply

VladimirPrevin
VladimirPrevin Beginner
Beginner
In response to VladimirPrevin
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2018-01-09 07:59 PM

edited the above a little. didn't realize there were two microsoft KBs and registry key sets . the rest is mostly the same feedback. 

0 Likes
Reply

IoanaSundius
Employee IoanaSundius
Employee
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2018-01-10 04:07 PM

Vladimir, those are good concerns you are raising, likely shared by others. I will break down my answer into a few separate points, and hopefully address them all:

 

1. Registry key update management: The Endpoint agent does not rely on registration with the Microsoft Windows Security Center in order to get updates. As such, it is not affected by the registry key. Instead of relying on the WSC, it will self-update through the Kernel Adaptation Module (KAM) mechanism, a service offered through RSA Live, as soon as the underlying OS was updated. As of today, all but two kernels have been updated, with the remaining two coming online tomorrow. (The MS KB article on this issue details how the registry key works. You will read that only agents registered with WSC respond to that key.)

 

2. The KAM updates support all the agents since 4.1.0.2.  If anyone happens to be on an older agent, we strongly suggest an upgrade to our latest versions, both for features and stability reasons, and because support is not provided on older versions. However, older agents will still be compatible with the updates provided through KAM, as long as they are based on version 4.1.0.2 or later. Your 4.1.1.1 agents will be included.

 

3. Testing follows the usual procedure we've always had in place for updating the agents in sync with the underlying OS since the feature was introduced, in 4.1. We do have confidence that the patches are functionally compatible with all of our supported agents at this time. TDI should be included, as it always is.

 

4. We are running some supplemental server-side performance testing, (which Mike Gotham was referring to). We will share our findings, should we find any worrysome slow-downs. Note that the testing concerns the server, rather than the agents, as the MS patch will affect intense I/O operations, which the agents don't do. As of today, we have not found any issue, but testing continues.

 

Please let me know if this answers your concerns. I will be happy to answer any follow-up question.

2 Likes
Reply

VladimirPrevin
VladimirPrevin Beginner
Beginner
In response to IoanaSundius
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2018-01-14 11:42 PM

thanks Ioana 

 

is what you're saying - RSA are not going to mark the new kernels as compatible via live for KAM until you finish perf and BSOD + whatever standard testing for ecat 4.1.0.2 onwards? (I guess my only caveat is the live KAM file is ecat agent version agnostic I thought, hence needing info on ECAT version compatibility with the kernel update)

 

>We do have confidence that the patches are functionally compatible with all of our supported agents at this time.

 

specifically for the Jan updates with the AV compat flag set?

0 Likes
Reply

IoanaSundius
Employee IoanaSundius
Employee
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2018-01-16 03:09 PM

We do not depend on the flag. We simply work with whatever OS patching level you have, without triggering an update. In this, we are different from AV. When you are ready to turn on the registry key to allow the update, the agent will incorporate the new symbols to match that patch. Note that the single update needed for our agent in this is a simple update of the kernel symbols, the same we do for every other patch. There is no actual patch that is needed for our software. Because we do have access to early patches, we already know we are compatible, and will not experience BSOD -- that testing has already happened, and has included performance testing of the agents. Server side, we know we are compatible, and expect little impact on performance, if any. PSR testing on the server side takes longer, so we are still completing that due diligence, to find out if the MS patch impacts our recommendations for scale. So far, we have not seen an indication that it does.

0 Likes
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.