About ThreatSync Automation Policies

ThreatSync automation policies define the actions that ThreatSync takes automatically when a threat is detected.

Automation policies enable Incident Responders to automatically respond to specific types of incidents so they can focus on the most important incidents that might require manual investigation and remediation. For example, default automation policies automatically archive specific types of incidents that have a low-risk score, and perform automatic remediation actions on the most critical incidents.

You can manually remediate any incidents not covered by an automation policy. For more information, go to Perform Actions on Incidents and Endpoints.

To learn more about automation policies, go to these sections:

We recommend that you do not add automation policies other than the default automation policies in ThreatSync Best Practices until you are familiar with the different types of incidents that can occur in your environment and the remediation actions you can perform.

ThreatSync Automation Policy Types

In ThreatSync, you can configure two types of automation policies:

Remediation Policy

A Remediation automation policy performs the specified remediation actions for incidents that meet the policy conditions.

Archive Policy

An Archive automation policy changes the status of incidents that meet the policy conditions to Archived.

Default ThreatSync Automation Policies

Each ThreatSync account has two default automation policies. These default automation policies enable ThreatSync to take automatic action on the highest and lowest risk incidents so you can focus on the most important incidents that might require manual investigation and remediation.

Default Remediation Automation Policy

To make sure that ThreatSync automatically protects you from high risk incidents, we recommend you enable the default remediation policy for incidents with a risk range of 7-10. For more information about how to enable or disable automation policies, go to Enable or Disable an Automation Policy.

Default Remediation Policy

  • Rank — 1
  • Policy Type — Remediation
  • Risk Range — 7-10
  • Device Type — Endpoint, Firebox, Access Point
  • Actions — Perform > Isolate Device

This policy automatically isolates from the network any devices affected by incidents with a score of 7 or higher to prevent the spread of the threat. This enables you to analyze isolated devices and investigate incident details. For more information, go to Review Incident Details.

Default Archive Automation Policy

To reduce the number of low risk incidents in the incident list so you can focus on higher risk incidents, we recommend you enable the default archive automation policy that applies to incidents with a risk score of 1.

Default Archive Policy

  • Policy Type — Archive
  • Risk Range — 1
  • Device Type — Endpoint, Firebox, Access Point
  • Actions — Perform > Archive

This policy automatically archives incidents with a risk score of 1. We recommend you review archived incidents and decide if any other actions are necessary. To review your archived incident list, filter your incidents by status on the Incidents page. For more information, go to Monitor ThreatSync Incidents.

If you do not have time to investigate every low risk incident, consider a change to your archive policy to increase the risk range to 1-3.

ThreatSync Automation Policy Conditions and Actions

For each ThreatSync automation policy, you configure conditions and actions.

Conditions

Conditions define when ThreatSync executes a policy. If an incident meets the conditions of a policy, ThreatSync performs the specified actions.

For each policy, you can specify these conditions.

  • Risk Range — Specify a range of incident risk levels. For more information, go to ThreatSync Risk Levels and Scores.
  • Incident Type — Select one or more incident types.
  • Device Type — Select Firebox, Endpoint, or Access Point.
  • Actions Performed — Select one or more of these actions performed on an incident (Archive policy only).

The Actions Performed condition is only available for the Archive policy type. Remediation policies have a separate section to select remediation actions.

Actions

Actions define what ThreatSync does when the policy executes.

For each policy, you must specify whether the policy performs or prevents actions.

  • Perform — ThreatSync performs the specified actions for new incidents that meet the policy conditions.
  • Prevent — ThreatSync prevents the specified actions. To create an exception to a broader Perform policy, you can add a policy with the Prevent action and rank it higher than the other policy in the policy list. A policy with the Prevent action does not prevent the manual execution of an action by an operator.

For a Remediation policy, select one or more of these remediation actions to perform:

  • Block Threat Origin IP (only external IPs) — Blocks the external IP address associated with the incident. When you select this action, all Fireboxes with ThreatSync enabled in the WatchGuard Cloud account block connections to and from the IP address.
  • Delete File — Deletes the flagged file associated with the incident.
  • Isolate Device — Isolates the computer from the network to prevent the spread of the threat, and to block the exfiltration of confidential data.
  • Kill Malicious Process — Terminates a process that exhibited malicious behavior associated with the incident.

For an Archive policy, there is only one action:

  • Archive — Changes the incident status to Archived. This action is selected automatically and you cannot change it.

ThreatSync Automation Policy Precedence

You rank ThreatSync policies in order of relative priority from top to bottom. If an incident matches the conditions configured in multiple policies, ThreatSync performs the action specified in the highest priority policy that applies.

Each recommended action in an incident is evaluated individually against a policy. If an incident does not have a recommended action that matches an action specified in the policy, that policy is skipped.

Screen shot of the Automation Policies page in ThreatSync

Automation policies assigned through a template appear at the top of the policies list in the Subscriber account. To change the order of your automation policies and templates, go to Manage ThreatSync Automation Policies (Subscribers).

Automation Policy Example

In this example, you have two automation policies with these conditions:

Automation Policy 1

  • Rank — 1
  • Policy Type — Remediation
  • Risk Range — 8 to 10
  • Device Type — Endpoint, Firebox
  • Actions — Perform > Kill Malicious Process

Automation Policy 2

  • Rank — 2
  • Policy Type — Remediation
  • Risk Range — 8 to 10
  • Device Type — Endpoint, Firebox
  • Actions — Perform > Isolate Device, Kill Malicious Process

An incident occurs with these details:

  • Type — IOA
  • Risk Level — 8
  • Device Type — Endpoint
  • Recommended Actions — Perform > Isolate Device, Kill Malicious Process, Delete File

In this example:

  • Automation Policy 2 is the highest ranked policy that applies to the incident for the Isolate Device recommended action.
  • Automation Policy 1 is the highest ranked policy that applies to the incident for the Kill Malicious Process recommended action.
  • No automation policies apply to the incident for the Delete File recommended action.

Result:

  • ThreatSync automatically isolates the device and kills the malicious process but does not try to delete the file.

ThreatSync Automation Policy Templates

You can create automation policies at the Subscriber account level. To add an automation policy for a Subscriber account, go to Manage ThreatSync Automation Policies (Subscribers).

In addition, Service Providers can create automation policy templates that include multiple automation policies, then assign the templates to the accounts or account groups they manage. This enables Service Providers to apply automation policies consistently across managed accounts, and save time when they set up ThreatSync for new accounts.

To set up automation policy templates for your managed accounts or account groups, go to Manage ThreatSync Automation Policy Templates (Service Providers).

Related Topics

Manage ThreatSync Automation Policies (Subscribers)

Manage ThreatSync Automation Policy Templates (Service Providers)

Configure ThreatSync Device Settings

Manage IP Addresses Blocked by ThreatSync

Configure ThreatSync

About ThreatSync