{"id":21507,"date":"2024-06-26T01:35:25","date_gmt":"2024-06-26T01:35:25","guid":{"rendered":"https:\/\/www.insentragroup.com\/gb\/insights\/uncategorized\/red-hat-insights-malware-detection\/"},"modified":"2024-12-13T02:20:18","modified_gmt":"2024-12-13T02:20:18","slug":"red-hat-insights-malware-detection","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/gb\/insights\/geek-speak\/secure-workplace\/red-hat-insights-malware-detection\/","title":{"rendered":"Red Hat Insights Malware Detection: Your Company&#8217;s Fierce Protector\u00a0"},"content":{"rendered":"\n<p>Picture this: a bunch of big-name companies are rolling up to the Linux server party and they\u2019re all like, \u201cHey, you know what this bash needs? Antivirus!\u201d They&#8217;re waving their arms, tossing around buzzwords and acting like they&#8217;ve just invented the wheel.&nbsp;<\/p>\n\n\n\n<p>Meanwhile, over in the corner is Red Hat, cool as a cucumber, leaning back with a smirk. They\u2019re sipping on their coffee, watching the spectacle and they\u2019re like, \u201cAntivirus? Seriously? We\u2019ve got SELinux, mate! As long as your Linux servers aren\u2019t shaking hands with any of those non-Linux services, we\u2019re all good. No need for any extra fluff.\u201d&nbsp;<\/p>\n\n\n\n<p>However, big-name companies won\u2019t let up. \u201cBut what about the threats, the malware, the\u2026\u201d they sputter.&nbsp;<\/p>\n\n\n\n<p>Red Hat just chuckles. \u201cLook, if you keep your sticky fingers off our servers, no shady protocols, no weird implementations, SELinux has got this. We\u2019re like a bouncer at a nightclub \u2013 we know who to let in and who to toss out.\u201d&nbsp;<\/p>\n\n\n\n<p>So now you&#8217;ve got this scene where big-name companies are trying to sell ice to Eskimos, and Red Hat\u2019s just enjoying the show, probably thinking, \u201cMate, we\u2019ve got it covered. Keep your antivirus; we\u2019re good with our SELinux swagger.\u201d&nbsp;<\/p>\n\n\n\n<p>So, there\u2019s Red Hat, chilling in the corner, confident as ever about SELinux keeping things in check. But then, just to make sure the party stays drama-free and to put an end to all the antivirus chatter, they decide to throw in a little surprise of their own: Red Hat Insights with malware detection.&nbsp;<\/p>\n\n\n\n<p>Red Hat stands up, clinks a glass to get everyone\u2019s attention and says, \u201cAlright, listen up, folks. We heard you. You want malware detection? Boom! Here\u2019s <a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/modern-workplace\/essential-8-compliance-rhel\/\" data-type=\"link\" data-id=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/modern-workplace\/essential-8-compliance-rhel\/\">Red Hat Insights<\/a> with malware detection. It\u2019s like SELinux on steroids \u2013 your servers are now not just bouncer-protected, but they\u2019ve got a whole security team on standby.\u201d&nbsp;<\/p>\n\n\n\n<p>Big-name companies pause, mid-buzzword, looking a bit flustered. \u201cUh, wait, what?\u201d&nbsp;<\/p>\n\n\n\n<p>Red Hat just grins, \u201cYep, you heard us right. We\u2019ve got Insights now, sniffing out malware like a bloodhound. So, no need to worry your pretty little heads about our servers. SELinux and Insights \u2013 it\u2019s a double whammy. Our servers are now a fortress, and your antivirus pitch? Consider it retired.\u201d&nbsp;<\/p>\n\n\n\n<p>With that, Red Hat sits back down, sipping their coffee, while the rest of the room starts to realise that maybe, just maybe, they underestimated the cool cat in the corner. And from then on, no one dared to question the security of Red Hat\u2019s Linux servers again.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Features of Red Hat Insights Malware Detection<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Let\u2019s get to business, shall we? This section will focus on the technical aspect of Insights malware detection.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The following outlines the elements of the Insight\u2019s malware detection:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><strong>IBM X-Force Threat Intelligence Signatures<\/strong>&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Ever heard of the IBM X-Force AKA Red Hat\u2019s secret weapon? They\u2019re like the Sherlock Holmes of cybersecurity. They\u2019ve got this regularly updated database of known threats. It\u2019s like having a team of detectives constantly feeding us the latest scoop on the bad guys.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>YARA Signature Detection<\/strong>&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>YARA\u2019s like the Swiss Army knife of malware detection. It describes malware types through patterns, with a set of strings and a Boolean expression defining a rule. Think of it as a super-sleuthing formula. When one or more conditions in a signature are found on a scanned RHEL system, YARA records a hit on that system.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>Malware Detection Service<\/strong>&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Our service within Red Hat Insights doesn\u2019t just sit around looking pretty. It actively scans systems using the signatures and patterns from our friends at IBM X-Force and YARA. It is like an around-the-clock security patrol.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li><strong>Integration and Reporting<\/strong>&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Red Hat malware detection service isn\u2019t just flying solo. It\u2019s fully integrated into the Red Hat Insights platform. It\u2019s like having a personal assistant that\u2019s got it all covered. You can view and manage security alerts right alongside other system health and performance metrics. Think of it as your one-stop shop for everything your system needs.&nbsp;<\/p>\n\n\n\n<p>So, to wrap it all up, Red Hat\u2019s got the ultimate dynamic duo for malware protection. By combining the detective skills of IBM X-Force threat intelligence with the super-bouncer YARA-based scanning, Red Hat Insights delivers a powerhouse solution for detecting malware threats in the environment.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Insights Malware Detection Configuration&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If the insights-agent is installed, install the following package on a system:&nbsp;&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># dnf install yara&nbsp;&nbsp;<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perform a test run, to validate the configuration&nbsp;<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># insights-client --collector malware-detection&nbsp;<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Once the test malware scan is finalised, navigate to <a href=\"http:\/\/cloud.redhat.com\/insights\/malware\/signatures\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cloud.redhat.com\/insights\/malware\/signatures<\/a> and verify if malware analysis is visible for the host in scope:&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/07\/image-6-1024x600.png\" alt=\"\" class=\"wp-image-21508\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/07\/image-6-1024x600.png 1024w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/07\/image-6-300x176.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/07\/image-6-768x450.png 768w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/07\/image-6-1536x900.png 1536w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/07\/image-6-1568x919.png 1568w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/07\/image-6.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Enable full malware detection on the system, modifying the configuration file:&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># sed -i 's\/test_scan: true\/test_scan: false\/' &nbsp;&nbsp;\n<br>\n\/etc\/insights-client\/malware-detection-config.yml&nbsp;<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Repeat the scan&nbsp;<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># insights-client --collector malware-detection&nbsp;<\/code><\/pre>\n\n\n\n<p>There you have it! Now you know how to leverage Red Hat Insights to protect your organisation against malware. If you\u2019d like to learn more about Red Hat Insights, check out the <a href=\"https:\/\/www.insentragroup.com\/gb\/insights\/\" target=\"_blank\" rel=\"noreferrer noopener\">Insentra Insights<\/a> page for more helpful blogs like this. <a href=\"https:\/\/www.insentragroup.com\/gb\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us<\/a> today for assistance on improving your security posture.\u00a0\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover how Red Hat Insights Malware Detection enhances Linux server security with IBM X-Force and YARA, providing continuous protection and integration. <\/p>\n","protected":false},"author":67,"featured_media":21510,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-21507","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/21507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/users\/67"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/comments?post=21507"}],"version-history":[{"count":2,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/21507\/revisions"}],"predecessor-version":[{"id":21512,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/21507\/revisions\/21512"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/media\/21510"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/media?parent=21507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/categories?post=21507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/tags?post=21507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}