Securing Shadow IT Starts with Automation
Securing Shadow IT Starts with Automation

Shadow IT is a modern security challenge for the very best reasons – your users rely on it to find new and arguably innovative ways to be more productive. While getting more done more effectively isn’t a bad thing, rogue applications that aren’t supported and maintained by IT is. While we haven’t seen Shadow IT in the headlines as much recently, the problem remains very real. Gartner estimated 38% of technology purchases in 2017 were managed and controlled by business leaders, not IT.

There’s another reason the headache of Shadow IT persists – because addressing the pain of these security incidents waiting to happen is well, painful. There are a few solid approaches you can try to reduce the use of renegade applications and services. The first is a PR program for your IT team. Building awareness of and trust in the important work IT does every day is key to attacking the root of the problem. Collaborate; get involved with other business units. In theory, by creating a bridge between IT and users, it can be easier to break down misconceptions about the barriers to bringing in new technologies and reinforce important security policies.

Automation is another important (and less ambiguous) component to addressing Shadow IT and it’s easier to accomplish in the short term. Setting rules that block traffic by application or network path is a strong step forward in at least blocking the known trouble makers and setting policy for what can and cannot be done. It also makes sense for your budget. According to the 2018 Total Economic Impact study done by Forrester, information security professionals can save 12 minutes in the analysis and triage phase on every security-related response with Absolute.

New Reach Automation Tools

Absolute Reach is a custom query and remediation feature of the Absolute Platform. Today, we added nine new scrips to the hundreds already executed across millions of devices. To address the challenges of Shadow IT, you can now add firewall application rules to prevent traffic from routing through a specific application. Regardless of what your user does on the device, no traffic will flow through the application. This is useful for preventing any unauthorized applications or network paths such as cloud-based file transfers or Torrent applications. And, if you need to reset your firewall settings after a period of time, there is a script for that too.

To address the challenge of managing Windows Updates, two additional scripts have also been added to disable Windows Update Sharing to support bandwidth constraints. You can also generate an automated log of any failed Windows Updates across a given device population.

Because incorrect network settings or misconfigurations often cause user frustration and negatively impact productivity, two more new scripts flush Address Resolution Tables (ARP) or DNS Resolver Caches, helping reset settings back to standard configurations. The ability to run an automated script to enable DHCP settings to automatically assign an IP address within a defined range can help prevent man-in-the-middle attacks.

Like all features of the Absolute platform, they can be performed on devices on or off the network which helps you address potential security vulnerabilities or misconfigurations on devices that are outside of the bounds of your traditional tools. They are available to all Absolute Resilience customers and can be found in the Reach library. The full list of new Reach scripts is in the table below. And more will be dropping soon. Explore Reach for yourself in this short video.

New Script Name Description
 Flush ARP Tables Flush the ARP tables on a system
 Add Firewall Application Rules Add / create a firewall application rule
Remove Firewall Application / Port Rules Remove firewall application / port rules
Reset the Firewall Advanced Firewall Settings Reset the Windows Firewall to defaults
Flush DNS Resolver Cache Flush the DNS resolver cache on a system
Release / Renew IP Address Release the IP & renew IP for the active adapters a system
Email Failed Windows Updates Report the failed installation of Windows Updates on a system
Disable Windows Update Sharing Disable the Windows Update Sharing feature / Windows Update
Enable DHCP for DNS Update the DNS to DHCP, instead of static

ABOUT THE AUTHOR

Jason Short

Jason Short is Senior Director of Product Management for Absolute. He leads product management for the Absolute platform, which provides endpoint visibility and adaptive security controls. Before joining Absolute, Jason spent nearly a decade in the security space, most recently serving as the Director of Product Management at Symantec. He’s also held management roles at Apple, 3Com, Celerity and BuilderMT. Jason has more than 15 years of experience in product development, management and engineering. He holds a bachelors in finance and supply chain management from Arizona State University and an MBA from the Daniels School of Business at the University of Denver.