Trendmicro application identified as "ssl" despite of proper SNI, CN, SAN.

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Trendmicro application identified as "ssl" despite of proper SNI, CN, SAN.

L1 Bithead
  • We have the Trend Micro agent installed on the endpoints, and it is running smoothly. However, the application is still being identified as "ssl", even though the packet captures show the correct SNI value in the Client Hello. In the Server Hello, both the SAN and CN fields contain multiple wildcard entries ending with *.trendmicro.com.

  • The URL category is successfully identified as “Trendmicro.”

We filtered for the Server Hello packets and confirmed that the certificate includes the Common Name and SAN fields with multiple wildcard entries ending in *.trendmicro.com.

We are not opting for App Override or creating a custom application because the other firewalls are able to identify this traffic correctly even without decryption.

5 REPLIES 5

Community Team Member

Hi @V.Sambath ,

 

Do all endpoints behind this firewall experience the same misclassification or is it from a single client? Also, whatis the App-ID content version on the firewall vs. the other firewalls that identify it correctly?

LIVEcommunity team member
Stay Secure,
Jay
Don't forget to Like items if a post is helpful to you!

Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

Cyber Elite
Cyber Elite

app-id does not solely rely on SNI to identify some applications which may be the case here. have you enabled ssl decryption so the content/payload can be identified by app-id?

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

Hello @JayGolf 

- On all endpoints where Trend Micro is installed, the traffic is being detected only as “ssl"
- The PA firewalls have the latest content updates installed. When I mentioned “other firewalls,” I was referring to the Fortinet firewalls.

Hi @reaper 

I am confident that enabling SSL decryption might help here. However, I also have Fortinet firewalls where the SSL Deep Inspection profile is not enabled, and those firewalls are still able to identify the application "trendmicro" without decryption. Since Trend Micro is a well-known application, I’m a bit surprised that PAs does not appear to have signatures for it.

that's where a choice actually pops up:

since this is ssl encryoted traffic, there can't be a 'signature' to identify it and the only identifier is the SNI on the certificate

maybe forti chose to blanket all the traffic using the sni whereas palo identifies this as a web category but not necessarily an application

 

you can easily create a custom app for an SNI by the way

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization
  • 756 Views
  • 5 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!