Introduction

    The Cisco Web and Email Content Security products can provide telemetry data back to Cisco and Talos to increase the efficacy of web categorization in the Web Security Appliance (WSA) and connecting IP reputation for the Email Security Appliance (ESA).  

    The telemetry data is provided for the WSA and ESA on an 'opt-in' basis.

    The data is transmitted via binary encoded SSL encrypted packets.  The attachments provided below will provide insight into the data, specific formatting and descriptions for the data that is being transmitted.  WebBase Network Participation (WBNP) and SenderBase Network Participation (SBNP) data is not viewable in a direct log or file format.  This data is transmitted in encrypted form.  At no time is this data 'at rest'.

    WSA - WebBase Network Participation

    Cisco recognizes the importance of maintaining your privacy, and does not collect or use personal or confidential information such as usernames and passphrases. Additionally, the file names and URL attributes that follow the hostname are obfuscated to ensure confidentiality.

    When it comes to decrypted HTTPS transactions, the SensorBase Network only receives the IP address, web reputation score, and URL category of the server name in the certificate.

    For complete information, please review the WSA User Guide for the version of AsyncOS for Web Security currently running on your appliance.  Please see "The Cisco SensorBase Network" in the User Guide.

    ESA - SenderBase Network Participation

    Customers participating in the SenderBase Network allow Cisco to collect aggregated email traffic statistics about their organization, increasing the utility of the service for all who use it. Participation is voluntary. Cisco only collects summary data on message attributes and information about how different types of messages were handled by Cisco appliances. For example, Cisco does not collect the message body or the message subject. Personally identifiable information and information that identifies your organization is kept confidential.

    For complete information, please review the ESA User Guide for the version of AsyncOS for ESA Security currently running on your appliance.  Please see the "SenderBase Network Participation" chapter in the User Guide.

    General Security Concerns FAQ

    Question: Where is the data collected stored?
    Answer: Appliance telemetry is stored in Cisco US-based data centers.
    Question: Who has access to the data collected and stored?
    Answer: Access is limited to Cisco SBG personnel who analyze/use the data to create actionable intelligence.
    Question: What is the retention time of the data collected?
    Answer: There is no data retention/expiration policy regarding appliance telemetry. Data may be kept indefinitely or may be deleted for various reasons including but not limited to down-sampling/aggregation, storage management, age, relevance to current/future threats, etc.
    Question: Are customer serial number(s) or public IP address(es) stored in the Talos categorization database?
    Answer: No, only URL and categories are retained. The WBNP packet does not contain source IP information. 

    Operation

    Below details operation, the type of data (by description), and a sample data to demonstrate the information that would be transmitted:

    • SBNP -  Specific data types (fields) and sample data related to Email Security
    • WBNP - Specific data types (fields) and sample data related to Web Security
    • Threat Detection Operation - General overview of Threat Detection from a operational perspective

    SenderBase (Email) Network Participation

    Statistics shared per Emailappliance

    Item Sample Data
    MGA Identifier MGA 10012
    Timestamp Data from 8 AM to 8:05 AM on July 1, 2005
    Software Version Numbers MGA Version 4.7.0
    Rule Set Version Numbers Anti-Spam Rule Set 102
    Anti-virus Update Interval Updates every 10 minutes
    Quarantine Size 500 MB
    Quarantine Message Count 50 messages currently in quarantine
    Virus Score Threshold Send messages to quarantine at threat level 3 or higher
    Sum of Virus Scores for messages entering quarantine 120
    Count of messages entering quarantine 30 (yields average score of 4)
    Maximum quarantine time 12 hours
    Count of Outbreak quarantine messages broken down by why they entered and exited quarantine, correlated with Anti-Virus result 50 entering quarantine due to .exe rule
30 leaving quarantine due to manual release, and all 
30 were virus positive
    Count of Outbreak quarantine messages broken down by what action was taken upon leaving quarantine 10 messages had attachments stripped after leaving quarantine
    Sum of time messages were held in quarantine 20 hours

    Statistics shared per IP address

    Item

    Sample Data

    Standard Participation

    Limited Participation

    Message count at various stages within the appliance

    Seen by Anti-Virus engine: 100
    Seen by Anti-Spam engine: 80

    Sum of Anti-Spam and Anti-Virus scores and verdicts

    2,000 (sum of anti-spam scores for all messages seen)

    Number of messages hitting different Anti-Spam and Anti-Virus rule combinations

    100 messages hit rules A and B
    50 messages hit rule A only

    Number of Connections

    20 SMTP Connections

    Number of Total and Invalid Recipients

    50 total recipients
    10 invalid recipients

    Hashed Filename(s): (a)

    A file <one-way-hash>.pif was found inside an archive attachment called <one-way-hash>.zip.

    Unobfuscated Filename

    Hashed Filename

    Obfuscated Filename(s): (b)

    A file aaaaaaa0.aaa.pif was found inside a file aaaaaaa.zip.

    Unobfuscated Filename

    Obfuscated Filename

    URL Hostname (c)

    There was a link found inside a message to www.domain.com

    Unobfuscated URL Hostname

    Obfuscated URL Hostname

    Obfuscated URL Path (d)

    There was a link found inside a message to hostname www.domain.com, and had path aaa000aa/aa00aaa.

    Unobfuscated URL Path

    Obfuscated URL Path

    Number of Messages by Spam and Virus Scanning Results

    10 Spam Positive
    10 Spam Negative
    5 Spam Suspect
    4 Virus Positive
    16 Virus Negative
    5 Virus Unscannable

    Number of messages by different Anti-Spam and Anti-Virus verdicts

    500 spam, 300 ham

    Count of Messages in Size Ranges

    125 in 30K-35K range

    Count of different extension types

    300 “.exe” attachments

    Correlation of attachment types, true file type, and container type

    100 attachments that have a “.doc” extension but are actually “.exe”
    50 attachments are “.exe” extensions within a zip

    Correlation of extension and true file type with attachment size

    30 attachments were “.exe” within the 50-55K range

    Number of messages by Stochastic Sampling results

    14 messages skipped sampling
    25 messages queued for sampling
    50 messages scanned from sampling

    Number of messages that have failed DMARC verification

    34 messages have failed DMARC verification

    Notes:

    (a) Filenames will be encoded in a 1-way hash (MD5).

    (b) Filenames will be sent in an obfuscated form, with all lowercase ASCII letters ([a-z]) replaced with “a,” all uppercase ASCII letters ([A-Z]) replaced with “A,” any multi-byte UTF-8 characters replaced with “x” (to provide privacy for other character sets), all ASCII digits ([0-9]) replaced.

    (c) URL hostnames point to a web server providing content, much as an IP address does. No confidential information, such as usernames and passwords, are included.

    (d) URL information following the hostname is obfuscated to ensure that any personal information of the user is not revealed.

    Statistics Shared per SDS Client

    Item

    Sample Data

    TimeStamp

    Client version

    Number of requests made to the Client

    Number of requests made from the SDS Client

    Time results for DNS Lookups

    Server response time results

    Time to establish connection to server

    Number of connections established

    Number of concurrent open connections to server

    Number of service requests to WBRS

    Number of requests which hit local WBRS cache

    Size of local WBRS cache

    Response time results from remote WBRS

    AMP SBNP telemetry data

    Format

    Sample Data

    amp_verdicts' : { ("verdict", "spyname", "score", "uploaded", "file_name"),

             ("verdict", "spyname", "score", "uploaded", "file_name"),

             ("verdict", "spyname", "score", "uploaded", "file_name"),

                                     ……….

           ("verdict", "spyname", "score", "uploaded", "file_name"),

         }

    Description

    Verdict - of the AMP reputation query

    malicious/clean/unknown

    Spyname- Name of the malware detected

    [Trojan-Test]

    Score - AMP assigned reputation score

    [1-100]

    Upload - AMP cloud indicated to upload the file

    1

    File Name - Name of the file attachment

    abcd.pdf

    WebBase (Web) Network Participation

    Statistics shared per web request

    Item

    Sample Data

    Standard Participation

    Limited Participation

    Version

    coeus 7.7.0-608

    Serial Number

    SBNP sampling factor (Volume)

    SBNP sampling factor (Rate)

    1

    Destination IP & Port

    unobfuscated URL path segments

    hashed URL path segments

    Anti-Spyware chosen malware category

    Skipped

    WBRS Score

    4.7

    McAfee malware category verdict

    Referer URL

    unobfuscated URL path segments

    hashed URL path segments

    Content Type ID

    ACL Decision Tag

    0

    Legacy Web Categorization

    CIWUC Web Category and decision source

    {'src': 'req', 'cat': '1026'}

    AVC App Name

    Ads and Tracking

    AVC App Type

    Ad Networks

    AVC App Behavior

    Unsafe

    Internal AVC Result Tracking

    [0,1,1,1]

    User agent tracking via indexed data structure

    3

    Advanced Malware Statistics per web request

    AMP Statistics

    Verdict - of the AMP reputation query

    malicious/clean/unknown

    Spyname- Name of the malware detected

    [Trojan-Test]

    Score - AMP assigned reputation score

    [1-100]

    Upload - AMP cloud indicated to upload the file

    1

    File Name - Name of the file attachment

    abcd.pdf

    End User Feedback statistics feed

    Statistics Shared per End User Miscategorization Feedback

    Item

    Sample Data

    Engine ID (numeric)

    0

    Legacy Web Categorization code

    CIWUC Web Categorization Source

    ‘resp’ / ‘req’

    CIWUC Web Category

    1026

    Example data provided – Standard participation

    # categorized
    "http://google.com/": {    "wbrs": "5.8",
        "fs": {
              "src": "req",
              "cat": "1020"
        },
    }

    # uncategorized
    "http://fake.example.com": {    "fs": {
          "cat": "-"
        },
    }

    Example data provided – Limited participation

    Full WBNP Decode

    Statistics Shared per Cisco Appliance

    Item

    Sample Data

    Version

    coeus 7.7.0-608

    Serial number

    0022190B6ED5-XYZ1YZ2

    Model           

    S660

    Webroot enabled

    1

    AVC enabled

    1

    Sophos enabled

    0

    Response Side Categorization enabled

    1

    Anti-Spyware Engine enabled

    default-2001005008

    Anti-Spyware SSE version

    default-2001005008

    Anti-Spyware Spycat Definitions version

    default-8640

    Anti-Spyware URL Blocklist DAT version

    Anti-Spyware URL Phishing DAT version

    Anti-Spyware Cookies DAT version

    Anti-Spyware Domain Blocking enabled

    0

    Anti-Spyware Threat Risk Threshold

    90

    McAfee enabled

    0

    McAfee Engine version

    McAfee DAT version

    default-5688

    WBNP Detail Level

    2

    WBRS Engine version

    freebsd6-i386-300036

    WBRS component versions

    categories=v2-1337979188,ip=default-1379460997,keyword=v2-1312487822,prefixcat=v2-1379460670,rule=default-1358979215

    WBRS Blocklist Threshold

    -6

    WBRS Allowlist Threshold

    6

    WBRS enabled

    1

    Secure Mobility enabled

    0

    L4 Traffic Monitor enabled

    0

    L4 Traffic Monitor Blocklist version

    default-0

    L4 Traffic Monitor Admin Blocklist

    L4 Traffic Monitor Admin Blocklist ports

    L4 Traffic Monitor Allowlist

    L4 Traffic Monitor Allowlist ports

    SBNP sampling factor

    0.25

    SBNP sampling factor (Volume)

    0.1

    SurfControl SDK version (legacy)

    default-0

    SurfControl Full Database version (legacy)

    default-0

    SurfControl Local Incremental Accumulation file version (legacy)

    default-0

    Firestone Engine version

    default-210016

    Firestone DAT version

    v2-310003

    AVC Engine version

    default-110076

    AVC DAT version

    default-1377556980

    Sophos Engine version

    default-1310963572

    Sophos DAT version

    default-0

    Adaptive Scanning enabled

    0

    Adaptive Scanning Risk Score Threshold

    [10, 6, 3]

    Adaptive Scanning Load Factor Threshold

    [5, 3, 2]

    SOCKS enabled

    0

    Total Transactions

    Total Transactions

    Total Allowed Transactions

    Total Malware Detected Transactions

    Total Transactions blocked by Admin Policy

    Total Transactions blocked by WBRS Score

    Total High Risk Transactions

    Total Transactions detected by Traffic Monitor

    Total Transactions with IPv6 clients

    Total Transactions with IPv6 servers

    Total Transactions using SOCKS proxy

    Total Transactions from remote users

    Total Transactions from local users

    Total Transactions allowed using SOCKS proxy

    Total Transactions from local users allowed using SOCKS proxy

    Total transactions from remote users allowed using SOCKS proxy

    Total transactions blocked using SOCKS proxy

    Total transactions from local users blocked using SOCKS proxy

    Total transactions from remote users blocked using SOCKS proxy

    Seconds since last restart

    2843349

    CPU Utilization (%)

    9.9

    RAM Utilization (%)

    55.6

    Hard Disk Utilization (%)

    57.5

    Bandwidth Utilization (/sec)

    15307

    Open TCP connections

    2721

    Transactions per second

    264

    Client Latency

    163

    Cache Hit Rate

    21

    Proxy CPU Utilization

    17

    WBRS WUC CPU Utilization

    2.5

    Logging CPU Utilization

    3.4

    Reporting CPU Utilization

    3.9

    Webroot CPU Utilization

    0

    Sophos CPU Utilization

    0

    McAfee CPU Utilization

    0

    vmstat utility output (vmstat –z, vmstat –m)

    Number of access policies configured

    32

    Number of configured custom web categories

    32

    Authentication Provider

    Basic, NTLMSSP

    Authentication Realms

    Authentication Provider Hostname, Protocol & other configuration elements

    Statistics shared per web request

    Item

    Sample Data

    Standard Participation

    Limited Participation

    Version

    coeus 7.7.0-608

    Serial Number

    SBNP sampling factor (Volume)

    SBNP sampling factor (Rate)

    1

    Destination IP & Port

    unobfuscated URL path segments

    hashed URL path segments

    Anti-Spyware chosen malware category

    Skipped

    WBRS Score

    4.7

    McAfee malware category verdict

    Referer URL

    unobfuscated URL path segments

    hashed URL path segments

    Content Type ID

    ACL Decision Tag

    0

    Legacy Web Categorization

    CIWUC Web Category and decision source

    {'src': 'req', 'cat': '1026'}

    AVC App Name

    Ads and Tracking

    AVC App Type

    Ad Networks

    AVC App Behavior

    Unsafe

    Internal AVC Result Tracking

    [0,1,1,1]

    User agent tracking via indexed data structure

    3

    Advanced Malware Statistics per web request

    AMP Statistics

    Verdict - of the AMP reputation query

    malicious/clean/unknown

    Spyname- Name of the malware detected

    [Trojan-Test]

    Score - AMP assigned reputation score

    [1-100]

    Upload - AMP cloud indicated to upload the file

    1

    File Name - Name of the file attachment

    abcd.pdf

    End User Feedback statistics feed

    Statistics Shared per End User Miscategorization Feedback

    Item

    Sample Data

    Engine ID (numeric)

    0

    Legacy Web Categorization code

    CIWUC Web Categorization Source

    ‘resp’ / ‘req’

    CIWUC Web Category

    1026

    Talos Detection Content

    Threat Focused

    Related Information