Malware Analysis can operate as a service on a Decoder or as a service on a dedicated appliance. This guide includes instructions for setting up the operating environment and then configuring the Malware Analysis service. After this configuration is complete, analysts can conduct malware analysis.
These are the configuration steps for Malware Analysis, and also for editing the configuration. Perform the steps in the section in the sequence they are given.
Basic Configuration Checklist
The following checklist provides the sequence for tasks that are required to configure Malware Analysis that has been added to NetWitness Platform in accordance with the Hosts and Services Guide.
|Step 1 - (Optional) Configure Dedicated Appliance|| |
This topic describes the procedures for configuring the environment to connect to the Malware Analysis service.
|Step 2 - Configure General Malware Analysis Settings|| |
|Step 3 - Configure Indicators of Compromise|| |
Calibrate Indicators of Compromise that are applied for each scoring module (Static, Network, Community, Sandbox) and for YARA-based IOCs.
|Step 4 - Configure Installed Antivirus Vendors|
|Step 5 - Enable Community Scoring|| |
Register with the RSA cloud and test connections to enable Community scoring.
| || |
Configure auditing thresholds and enable Syslog, SNMP, and file auditing.
|Step 7 - Configure Hash Filter|| |
Configure hash filtering to fine tune Malware Analysis event analysis based on known good or bad file hashes.
|Step 8 - Configure Malware Analysis Proxy Settings|| |
(Optional) Configure Malware Analysis to communicate with the RSA Cloud through a web proxy instead of directly.
|Step 9 - Register for a ThreatGRID API key|