Software Secure Workload
Activity Configure

Security Exclusions

Software agents continuously interact with the host operating system during their normal operations. This operation may cause other security applications installed on the host, such as antivirus, security agents, and others, to raise alarms or block the actions of Secure Workload agents. Therefore, to ensure that agents are installed successfully and are functioning, you must configure the necessary security exclusions on the security applications that are monitoring the host.

Table 1. Security Exclusions for Agent Directories

Host OS

Directories

AIX

/opt/cisco/tetration

Linux

/usr/local/tet or /opt/cisco/tetration or <user chosen inst dir>

/var/opt/cisco/secure-workload

Windows

C:\Program Files\Cisco Tetration

C:\ProgramData\Cisco Tetration

Solaris

/opt/cisco/secure-workload

Table 2. Security exclusions for Agent Processes

Host OS

Processes

AIX

csw-agent

tet-sensor

tet-enforcer

tet-main

Linux

csw-agent

tet-sensor

tet-enforcer

tet-main

enforcer

Windows

CswEngine.exe

TetEnfC.exe

Solaris

csw-agent

tet-sensor

tet-enforcer

tet-main

Table 3. Security Exclusions for Agent Actions

Host OS

Actions

AIX

Access /dev/bpf*, /dev/ipl, /dev/kmem

Invokes cfg_ipf, ipf, ippool, ipfstat lslpp, lsfilt, prtconf, uname, uncompress, oslevel

Scan /proc

Modifies /etc/security/audit/config and /etc/security/audit/objects and creates /etc/security/audit/config.backup and /etc/security/audit/objects.backup when the Forensics feature is enabled.

Linux

Invokes ip[6]tables-save, ip[6]tables-restore, rpm/dpkg, uname, unzip

Scan /proc, open netlink sockets

Windows

Access registry

Register to firewall events

Invokes c:\windows\system32\netsh.exe

Solaris 11.4

Invokes pkg, ps, smbios (x86 only), uname, unzip

Scan /proc

Creates /etc/audit/rules.d/taau.rules when Forensic is enabled

Solaris 10

pkgrm, pkgchk, pkgadd, ps

Scan/proc, prtconf, virtinfo(sparc only), svcadm, pfctl, uname, unzip

Creates /etc/audit/rules.d/taau.rules when Forensic is enabled

Table 4. Security Exclusions for Agents Scripts or Binaries Executions

Host OS

Invoked scripts/binaries

AIX

-

Linux

-

Windows

dmidecode.exe

npcap-installer.exe

sensortools.exe

signtool.exe

Solaris

-