Secure Carbon Black Cloud updates

​​​​​​​Introduction 

  • Update of the security product 
  • Update of the security policy 

To use a real-world example, I am going to use the Carbon Black Cloud for a company with 30,000 computers running Windows OS (Operating System).  

Create groups of sensors 

Because you probably want to test some malware, you first need to test on an isolated virtual machine (isolated from production, but with Internet access), then on a real machine using the base image of Windows used in your company. 

In your company, your neighbors and people in your department are good candidates to be beta testers, you will receive quick feedback. 

Then because all entities of your company use different software, try to identify testers, it may be the most difficult part, but it is important, HR (Human Resources), sales and dev teams use different tools and have different constraints. 

And finally, create 4 to 10 groups of computers to update progressively. 

Table 1: Group of sensors 

Number of computers 

Team 

Usage 

1 or 2 

VMs (Virtual Machines) isolated from other computers but with Internet access 

Malware testing ​ 

1 or 2 

Laptop with company’s standard configuration 

OS compatibility testing 

10 to 100 

Security or IT (Information Technology) team 

Day to day usage testing 

100 to 200 

Various beta testers in all departments 

Compatibility with specific applications testing 

10 groups of 3000 

10 big Groups of computers in production in chunks of 10% of total computers  

Production, and securely update of no more than 10% of computers. 

Carbon Black Cloud sensor version 

The version number of Carbon Black sensor, is made of 4 numbers: 

  •  “Major.Minor.Revision.Build” 

As of today (3/27/2023), VMware Carbon Black Cloud propose 6 versions of Carbon Black Cloud sensor to download: 

  •  3.9.1.2464 (latest) 
  •  3.9.0.2357 (latest in minor branch 3.9.0) 
  •  3.8.0.722 (latest in major branch 3.8) 
  •  3.8.0.684 
  •  3.8.0.627 
  • 3.8.0.535 

Windows Sensors Support is available in VMware Docs

Table 2: Windows Sensors support as of 3/27/2023 

Release 

Enter Standard 

Enter Extended 

Enter End of Support 

3.9 

January 2023 

   

3.8 

January 2022 

July 2023 

January 2024 

Because the Carbon Black version 3.9 is still in constant development, and introduces new features in new versions, I would recommend using the latest version of the major release 3.8 in production, and to test the more recent versions on beta testers computers to prepare a complete upgrade of the computer fleet in 3.9 release before January 2024. 

If you need a bugfix or a recent feature only available in release 3.9, I recommend carefully reading all release notes before upgrading and using the latest minor branch version. 

It applies to Carbon Black and to all software products in general. 

PRO TIP: Do not update anything (Firewall, software, antivirus…) the day before your weekend/holidays, trust me! 

PRO TIP2: If your company has a seasonal business, and for example your company is selling products for Christmas, do not update the two weeks before Christmas. 

Security policy version 

Test rule 

If you are using Carbon Black, you are lucky, because you can test a new security rule based on all events recorded during the past 30 days! 

​ 

Graphical user interface, application</p>
<p>Description automatically generated​ 

Smooth policy update  

I do not recommend changing a policy applied to 30,000 computers directly without testing! 

Update policies for various sensor groups according to the following table. 

Table 3: Policy versions 

Number of computers 

Team 

Usage 

Policy version 

1 or 2 

VMs isolated from other computers but with Internet access 

Malware testing ​ 

Policy #n 

1 or 2 

Laptop with company’s standard configuration 

OS compatibility testing 

Policy #n 

10 to 100 

Security or IT team 

Day to day usage testing 

Policy #n-1 

100 to 200 

Various beta testers in all departments 

Compatibility with specific applications testing 

Policy #n-2 

10 groups of 3000 

10 big Groups of computers in production in chunks of 10% of total computers  

Production, and secure update of no more than 10% of computers. 

Policy #n-3 

Policy versions comparison 

Each time you want to change a rule in your security policy, duplicate the latest policy, and increment the version number or use the date in the policy name. 

For example, if the current corporate policy is #22, and you want to block PowerShell in a new policy #23. 

You can use cbapi-qt-demo open-source tool (C++) to compare policies #22 and #23 before applying to the first group of 3000 computers (10% of 30,000 in my example). 

And do not to forget to check in “Audit Logs” who did change the security policy if you find unwanted changes. 

I recommend building the latest version on Ubuntu, but an old version for Windows is available too if needed. 

​ 

​ On the left, we have the security policy #22, and on the right the policy #23. 

Using a tool to visualize the difference between two text files (gvimdiff in the screenshot), we can easily see that policy #23 adds a rule to block PowerShell, and there is no other difference between both policies. 

Conclusion 

VMware Carbon Black security policy update process is more secure than other security products because: 

- you can test a new rule against the event’s history of the last 30 days. 

- you can compare security policies with each other. 

Author

  • Stephane List, Staff Technical Marketing Manager at VMware Carbon Black

Additional Resources: 

To learn more about Carbon Black APIs (Application Programming Interface), Python API framework, and open-source tools available: 

Filter Tags

Carbon Black Cloud Document