Anyone Use AV at home?

Associate
Joined
7 Aug 2012
Posts
948
Hi All,

Just wondering for those who have windows servers at home for the media servers, do you use any sort of anti virus at all?

I currently don't but I'm wondering if I should?

Cheers

Swain90
 
Soldato
Joined
5 Mar 2010
Posts
12,340
I guess it depends entirely what you use it for.

For example if you don't do any internet browsing, and all your media has come from a reliable source, then it's likely any risk is potentially low.

However if you obtain your media from other sources, or use it for browsing the internet, i probably would just on the safe-side.

I did have Avast installed on mine, although the pop-ups are starting to annoy me, so will soon be on the lookout for something different. In terms of scanning speed though, it's very quick as it blips through media files no problem.
 
Soldato
Joined
18 Oct 2002
Posts
7,622
Location
SX, unfortunately
Seems fine to me - to the best of my knowledge it's never let anything through - including at work and we have a relatively lax system. with ~200 seats. WAY better than the Vipre that it replaced.
 
Associate
OP
Joined
7 Aug 2012
Posts
948
I'm not going down the avast route, really don't like the UI.

The college I used to work at had Kaspersky and then switched to Sophos and they found that sophos had detected a few things Kaspersky missed.
 
Associate
Joined
1 Aug 2007
Posts
1,065
I'm not going down the avast route, really don't like the UI.

The college I used to work at had Kaspersky and then switched to Sophos and they found that sophos had detected a few things Kaspersky missed.

Swings in roundabouts...

Anyway its all about defense in depth...

EMET, Firewalls, IPS, Application Whitelisting...
 
Associate
Joined
1 Sep 2009
Posts
1,084
There's growing evidence that anti-virus actually exposes you to more security flaws than it protects you against. Security researchers have found dozens of critical vulnerabilities in common AV clients that expose you to anything up to remote code execution. There was a recent one where a researcher emailed a proof of concept of an attack on Symantec AV to them, but it turned out they used their own AV to protect their email servers and the PoC code brought down the server:

https://www.wired.com/2016/06/symantecs-woes-expose-antivirus-software-security-gaps/

Moreover, AV is really bad at handling the most common threats out there at the moment. It's useless for defending against most ransomware for example, especially if Cryptolocker or whatever is actually on your clients and is attacking a fileshare or something. No AV will protect your files in that case.

I work for a security vendor and we strongly recommend that no AV is installed on any of the servers where our software is deployed for exactly this reason. If you want to defend yourself:

- use only the MS built in AV (whatever it's called this week - MSE or Defender or something) don't bother with anything else
- restrict access to the server, only open up those ports necessary for your applications
- wherever possible don't RDP onto a Windows server. Use remote management tools or Powershell Remoting instead
- rotate passwords frequently. If you use SSH keys on Linux/Unix, rotate them as well. Better yet, use two-factor for everything.
- implement application whitelisting
- protect all services, especially web pages, with SSL
 
Associate
Joined
1 Aug 2007
Posts
1,065
There's growing evidence that anti-virus actually exposes you to more security flaws than it protects you against. Security researchers have found dozens of critical vulnerabilities in common AV clients that expose you to anything up to remote code execution. There was a recent one where a researcher emailed a proof of concept of an attack on Symantec AV to them, but it turned out they used their own AV to protect their email servers and the PoC code brought down the server:

https://www.wired.com/2016/06/symant...security-gaps/

I work for a security vendor and we strongly recommend that no AV is installed on any of the servers where our software is deployed for exactly this reason. If you want to defend yourself:

Agree with the second part but there's a lot more evidence to suggest it makes sense to have AV on the servers as well.

Moreover, AV is really bad at handling the most common threats out there at the moment. It's useless for defending against most ransomware for example, especially if Cryptolocker or whatever is actually on your clients and is attacking a fileshare or something. No AV will protect your files in that case.

This is where things like FSRM restricting file types, macro polices and the importance of NTFS and Share permissions accross the organisation is extremely important.

AV is still a extremely important part of the defense system. I wouldnt start removing it on the basis of a few organisations research.
 
Last edited:
Associate
Joined
1 Sep 2009
Posts
1,084
Agree with the second part but there's a lot more evidence to suggest it makes sense to have AV on the servers as well.

On balance, I disagree. Any sort of vulnerability that allows someone to take remote control via AV on a server is going to be very, very bad. Most AVs run as Local System or even Local Administrator, any attacker getting control of it is going to be able to to some Very Bad Things, up to and including getting hold of Domain Admin password hashes, doing a Pass-The-Hash attack on a DC, then executing a Golden Ticket attack on the domain. When that happens, your only option is to trash the domain and rebuild your infrastructure from scratch. I've seen it happen.

If you set up your server estate properly, having a virus actually execute on a server is pretty low down in terms of both probability and overall risk. If users are getting to the point that they can accidentally run malicious code on a server, then there's something wrong with your approach that an AV isn't going to help you with. Much better to harden the OS, and implement proper access controls.

On normal desktops I can still just about see some value (even if that value is mainly "it satisfies our auditors"). For admin desktops, AV is problematic due to the higher probability of using AV as a vector for getting hold of admin privileges. For servers, it's a downright liability, and this is starting to become the accepted wisdom.
 
Caporegime
Joined
18 Oct 2002
Posts
26,080
AV is trash quality code running in the most important part of your system. At best it will catch some low hanging fruit and make you feel warm about your investment, but at worst it can be an attack vector or a faulty signature update can bring your system down as it starts to quarantine system files.

Give your end users limited accounts, give them training, use AppLocker, make sure your backups work and aren't part of the system you're backing up - e.g. don't back up onto a domain-joined NAS with write access granted to the account you use daily. No AV is going to stop the modern style threats so focus your efforts elsewhere.
 
Last edited:
Back
Top Bottom