Skip to main content

Illumio Core 23.2 Visualization User Guide

Ransomware Protection Dashboard for Servers

In Illumio Core 23.2.0, a new dashboard gives you broad, visualized information about ransomware protection readiness, risk exposure, and protection coverage statistics.

Working with the Ransomware Protection for Servers Dashboard

You can access the Dashboard by clicking Dashboard in the left menu.

dash-button.png

The new Ransomware Protection Dashboard is located above the VEN Dashboard.

ransomware_dash.png

In this release, only the following global user roles are allowed to use the Ransomware Protection Dashboard:

  • Global Org Owner

  • Global Administrator

  • Global Viewer

Only managed server workloads are included in the Dashboard statistics. Endpoints and container workloads are not included.

In the upper-right corner, you can see the Refresh button, which brings new fresh data from the system.

reset-dashboard.png

Four of the dashboard widgets are auto-refreshed at a regular interval and are not refreshed by the Refresh button. The last refresh time is indicated by the tool tip over the Clock icon.

Left Section of the Dashboard

The two widgets show the following stats:

Protection Ready Workloads

A workload is protection-ready when there is a VEN installed on the workload and can be configured to enforce Illumio security policies.

Users can optionally enter the target number of workloads requiring protection, which can be edited at any time. This widget indicates the number of such workloads compared to all available target workloads.

510f52.png

In the example above, 51 workloads are protection-ready.

Protection Ready Workloads (daily, weekly, monthly. quarterly)

This widget shows the number of Protection Ready workloads for a selected period of time.

In each of the selected views, the number of Protection-Ready Workloads is represented as a percentage of the available target workloads (100%).

The resolution might be Day, Week, Month, and Quarter.

Middle Section of the Dashboard

The middle sections shows the following stats:

Protected Workloads

A workload is protected when it has policies on all the ransomware risky services / ports and the policies are enforced: the workload has to be in Selective Enforcement or Full Enforcement mode.

Workloads by Ransomware Exposure

A workload is assessed according to its exposure to the services commonly exploited by ransomware. The risk of each service is classified into four severities: Critical, High, Medium, and Low.

A workload is protected for the service in these two cases:

  • The service is blocked by enforcement boundary in Selective Enforcement or

  • The workload is in Full Enforcement, whether there is rule or no rule for that service.

This widget shows the number of workloads by their ransomware exposure (Critical, High, Medium, Low, and Protected) across the organization.

Right Section of the Dashboard

The right section shows the following stats:

Protection Coverage Score

The Protection Coverage Score is a metric used to measure the effectiveness of security policies in protecting workloads. It indicates the percentage of the entire possible attack surfaces that are actively protected by security policies. For example, a policy that allows all workloads as source will have a lower coverage score compared to a policy that only allows a small number of source workloads.

Protection coverage score takes all the protection ready workloads into consideration across the organization.

prot-coverage2.png

The color of the widget changes from red to yellow and then to green as the protection coverage score increases.

Risky Ports by Severity

This widget shows how many ransomware-risky ports, categorized by their severity (Critical, High, Medium, and Low) are in the system. Each category of ransomware-risky ports has a different total on each workload and hence across the system.

API Support for the Ransomware Protection for Servers Dashboard

The Dashboard uses several APIs to aggregate various data from the system and helps you focus on the data you are interested in.

The Dashboard is powered by the two main APIs: time_series and risk_summary.

For the complete list of REST APIs that are used to power the Ransomware Protetion Dashboard, see "Ransomware Protection Dashboard APIs" in the REST API Developer Guide.

View Workload Ransomware Protection for Servers Details

The Ransomware Protection tab provides detailed protection information for the workloads regarding each of the ransomware-risky services.

Information about the ransomware risk is then aggregated into the Ransomware Protection Dashboard for the system-side ransomware risk analysis.

workloads-ransomeware-protection-2.png

The Severity and Port Type are designated per each ransomware-risky service.

For more details, see "Services" in the Security Policy guide.

Here is the explanation for the data provided in the Ransomware Protection table:

  • Severity: Severity of the ransomware risk, which can be Critical, High, Medium or Low.

  • Port Status: Port status can be Active or Inactive.

    • Listening: Listening means there is a running process on that port.

    • Inactive: Inactive means there is no process running on the port. The same information is also provided on the Processes tab.

  • Port Type: The port type can be Admin or Legacy.

    • Admin: Admin refers to the service and ports are used for common administrative tasks.

    • Legacy: Legacy means that ports are used for legacy protocols.

  • Protection: Protection types are:

    • Protected (Blocked). When port is blocked by deny rules in Selective Enforcement or blocked with no allow rules in Full Enforcement. No ransomware can propagate through that port.

    • Unprotected The port is exposed to ransomware exploits.

    • Protected (Allowed by Policy). When there are allow rules intentionally policing the traffic. Only the trusted sources are allowed to access the port and hence the risk of lateral movement for ransomware is reduced. The workload has to be either in Selective Enforcement or Full Enforcement for the policy to be enforced.

  • The Port status does not affect the protection state.

  • Active Policy and Draft Policy: Indicates whether there is an Active or Draft policy to protect that particular port and the corresponding action.

Dashboard Access for Supercluster Users

Starting from the release 23.2.10, access to the Ransomware Protection Dashboard was extended to supercluster users in the following way:

- The Supercluster Leader is able to see the Ransomware Dashboard icon in the side menu and to visit dashboard page after clicking on it;

- Supercluster members are not able to see the Ransomware Dashboard icon in the side menu and have no access to the dashboard page.

- Both the Supercluster Leader and members can view the workload information in the workload page and the service page.