Betting Sites Not On Gamstop UK 2025
NSS Group logo

Network ICE BlackICE Sentry

Brief product description
BlackICE Sentry is an intrusion detection system developed to detect malicious activity on high speed networks.

Architecture
BlackICE Sentry is a network based IDS solution.It has the ability to work as a stand-alone system or work in a “manager” to “agent” relationship.

At what layer of the protocol stack is the product working?
The device driver used for BlackICE can be described as a Microsoft intermediary driver.BlackICE Sentry intercepts packets directly from the NDIS drivers.

Documentation
All documentation for the BlackICE Sentry can be found on-line at www.networkice.com.Supplemental information regarding security can also be searched on the www.advice.networkice.com site.

What are the minimum/recommended console OS and hardware requirements?�
Hardware:��
200 MHz Pentium class processor
64 MB RAM
3 MB of Disk Space

Operating System:
Windows NT Workstation 4.0
Windows NT Server 4.0
Windows NT 2000

Database:
Microsoft SQL Server 6.5 or higher
Microsoft SQL Workstation 6.5�����

Is a dedicated machine required/recommended?�
It is recommended, but not required.It depends on the number of total “agents” or “Sentry” machines reporting into it.

Will it work on Windows 2000?
Yes.

What are the minimum/recommended agent OS and hardware requirements?�
Hardware:400 MHz Pentium class processor, 3Com 3C905 Ethernet card

Operating System: Microsoft NT Server 4.0 or Workstation 4.0

Is a dedicated machine required/recommended?
Yes.

Will it work on Windows 2000?
No.

What components are installed on a detector
BlackICE Driver and NT Service

Which network types are supported�
10/100 Ethernet, and Gigabit Ethernet (not shipping, but announced)

Any specific recommendations for monitoring Gigabit networks with your product?
BlackICE Sentry can be used with a TopLayer switch to provide Gigabit IDS.BlackICE Gigabit Sentry is an appliance that will be able to hook directly into a switch to perform Gigabit IDS.

Which OS platforms are actively monitored?��
BlackICE Sentry monitors protocols verses OS platforms.

Can sensors/detectors be deployed and configured initially from a central console?��
Yes.Utilizing the ICEcap Manager, a BlackICE Sentry build can be deployed over the network to a pre-configured Windows machine.

Once deployed and configured, can sensors/detectors be managed from a central console?
Yes.��

Authentication between console and engines – Is it available?�
Yes.��

What algorithm/key lengths?
Blowfish for encryption using 56-bit key and Diffie-Hellman for key exchange.��

Secure logon for policy management?�
Yes, username and password.

How are policies distributed to engines?��
By using ICEcap, BlackICE Sentry updates can be made remotely.

How are policy changes handled? Will the central console detect which agents are using a changed policy and redeploy automatically, or does the administrator have to do this manually?��
N/A

How many attack signatures?�
500 +

Can the administrator define custom attack signatures?
No

How are new attack signatures obtained and deployed?�
New attacks are updated with frequent software upgrades.

Frequency of signature updates? Provide dates of all updates in the last year.
There has been one major signature upgrade every quarter this year.Dates of the 2000 updates are March 2000, September 2000, November 2000, and one for December 2000 (coming out of Beta).

What infrastructure do you have behind the signature update process
Internal engineers provide the update process for attack signatures.��

Can one signature update file be downloaded to the local network and used to update all IDS engines from a central location, or is it necessary to initiate a live connection to the Internet download server for each engine?
A file can be downloaded to the ICEcap Manager and pushed out to multiple BlackICE Sentries.

Can signature updates be scheduled and fully automated?
No.

What network protocols are analysed?
HTTP, FTP, IMAP4, POP3, BOOTP/DHCP, ARP, AOL IM, Finger, Gopher, ICMP, ICQ, Identd, MIME, MS RPC, NNTP, PCAnywhere, RealAudio, Rsh/rlogin/rexec, SMB, SMTP, SNMP, S/NTP, SOCKS, MS SQL , Telnet, TFTP, Numerous Sun RPC protocols: portmapper, nfs, mount, lockd, statd, cmsd, bootparam, admin, sadmin, automount, ToolTalk, NIS/YP, and a couple of rarer ones

What application-level protocols are analysed?��
See list above.

Can the product perform protocol decodes?
No (the detection engine uses protocol decodes to detect attacks, but session decodes are not made available to the user)

Can the product perform session recording on suspect sessions?
Yes.

Block/tear down session?
No.

Ability to monitor user-defined connections
N/A

Monitor changes in critical system files?�
N/A

Monitor changes in user-defined files?�
N/A

Monitor changes in Registry?�
N/A

Monitor unauthorised access to files?�
N/A

Monitor administrator activity (creation of new users, etc)?
N/A

Monitor excessive failed logins?
Yes

List any other resources/locations that are monitored.
N/A

Track successful logins, monitoring subsequent file activity, etc?
N/A

Detect network-level packet based attacks?
Yes.

Detect all types of port scans (full connect, SYN stealth, FIN stealth, UDP)?
Yes.

Detect and report on nmap OS fingerprinting?
Yes.

Perform packet reassembly?
Yes.

Resistance to known IDS evasion techniques?
Yes.

Reconfigure firewall? If so, which firewall(s) and how?
No.

Option to record everything for “forensic” investigation? Where is this data stored? How is it secured from tampering?
Yes.Sniffer trace files are stored on the BlackICE Sentry for forensic use.It uses the default Windows NT security to provide authentication and data integrity.

Reporting from engine to console - range of action/alert options (detail these)
The ICEcap manager is capable of sending e-mail, a visual alert via http, and snmp traps.

What provision is made for temporary communications interruption between detector and console? Where are alerts stored? Is the repository secure?
If there is an interruption between the console and detector, the “events” are stored locally on the sensor until they can be forwarded to the manager.

Can alerts be reported to the central console in real time without the use of third party software? How easy is it to filter and extract individual events?
Yes.Alerts are sent to the console in real time.Multiple filtering reports can be used to sort through the event data.

Does the software offer advice on preventative action to ensure the attack does not happen again?
Network ICE provides AdvICE web pages as support documentation to answer and aid in the prevention of many know attacks.Also,BlackICE Agents will block attacks in real-time or be manually upgraded to block certain attacks as they are detected.

Integration with other scanning/IDS products?
None at this time.

Log file maintenance – automatic rotation, archiving, reporting from archived logs, etc.
The log file is kept on a SQL database.Any NT rotation or archiving tool can be used to back up the database and sort through the data.

Management reporting – range of reports/custom reports/how easy is it to filter and extract detail? Different reports for technicians and management/end users?
There is over 10 different management reporting “views”.Technicians and management can select through different levels of reporting for granular details regarding attacks, IP information, attack type, and attack victim.

Report management – can they be scheduled for automatic production?
Yes.��

Can they be e-mailed to administrators or published straight to a Web site?
No.

What are the limitations and restrictions on enterprise-wide alerting and reporting? Can reports consolidate output from every 1) server, 2) detector
Each detector (Sentry) has the capability to display alert information.The ICEcap manager can display alert information as well as generate custom reporting.

Define custom reports?�
Users can define different parameters in creating reports with ICEcap.Users are not restricted by a one template report.

How is it licensed?
Per device.��

How is the license enforced?
End user license agreement.

End user pricing information
US. Pricing - BlackICE Sentry with ICEcap Manager:$7995.00

GBP Pricing - BlackICE Sentry with ICEcap Manager:�5,586.00

Ongoing cost of maintenance/updates
Maintenance:First year is included, 16% of MSRP thereafter.

Click here to return to the Network ICE Review
Click here to return to the Network ICE Results
Click here to return to the IDS Index Section

Send mail to webmaster with questions or�
comments about this web site.

Copyright � 1991-2002 The NSS Group.
All rights reserved.