Pain Points
We went all in on Watchguard this year because the sales team talks a big game but I'm starting to regret it.
Here are my most painful points:
1. Support doesn't understand the product. I always have to try to escalate until I find someone that kind of understands it. Most of the time support wants to connect to one of my firewalls instead of TDR, when the issue has nothing to do with the firewall. Honestly this product is so different from the others, there should be a separate support team for it IMO.
2. Lack of documentation on things like best practices.
3. Loads of indicators on things that should be trusted. We see indicators on files signed by Microsoft. There is no way to exclude indicators based on publisher. Whitelisting doesn't solve the issue as most of the indicators are for updates or patches which is a routine thing that happens everyday and creates unique files.
4. No way to whitelist domains / report false positives. I understand that it's RED on my firewall that is blocking it and I can whitelist in the HTTP proxies but when something like my AV vendor domains are getting level 7 incidents because of RED, wouldn't the better solution be to submit the domain as a false positive and whitelist it?
5. Files don't upload to APT blocker 90% of the time due to file size. When they do upload, if the file is found to be by a trusted vendor the indicator still stays at the original level rather than being remedied.
6. No way to create rules to automatically remedy or take complex actions, there's not enough control over policy actions.
7. It doesn't interact / take advantage of intelligentAV. There are big holes in the intelligentAV product(no proper way to scan MAPI protocol without routing all mail through a single firewall) which could be remedied by directly interacting with TDR.
8. No true baselining. As far as I can tell it doesn't set a network baseline for things like traffic and activity on the host. I thought this was supposed to be an intelligent product that could detect and alert on abnormal behavior on the host. How can it do that if it doesn't set a network activity baseline.
9. Reporting is sparse and uses scary lingo in executive reports. I am yet to bring any of the reports to our board of directors because the language in the reports makes it seem like our network has been infected when in fact it was just a RED false positive or there are outstanding indicators for things like Microsoft patches.
TDR has a lot of potential but right now it seems half baked. It's frustrating how much was promised and how little was actually delivered.
Comments
Good afternoon @JellyKid. That is fantastic feedback! I'll address each individually.
Ricardo Arroyo | Principal Product Manager / ThreatSync Guru
WatchGuard Technologies, Inc.
Regarding point 7, "IntelligentAV - Right now TDR passively receives Firebox Logs that we convert into an event", is there some way NOT to see what the firewall does in a TDR report? If I want to see firewall events, I'll at firewall logs. If I want to see TDR events for a HOST, I'll look at those logs. I have no need to have my hosts' logs duplicating firewall events.
Gregg Hill
Hello Gregg! I can add it to the backlog. How would you like the option to be available? Would a simple checkbox to include Network Graphs suffice?
Ricardo Arroyo | Principal Product Manager / ThreatSync Guru
WatchGuard Technologies, Inc.
Ricardo, I am not sure how you would implement what I mean. I don't see the point of TDR reporting to me what the firewall is doing; I have Dimension and FSM traffic for that. I only need TDR to report what each host is doing locally. It has been a long time since I have looked at TDR due to its information overload, so I need to check now for what it shows before I can answer your question.
Gregg Hill
I will anxiously await your feedback
Ricardo Arroyo | Principal Product Manager / ThreatSync Guru
WatchGuard Technologies, Inc.
TDR - System -> Network Events shows many pages of dnsQuestionMatch, and there is no way that I see to see exactly what the DNS question was in the Event Data. This is all that I see:
"<?xml version="1.0" encoding="UTF-8" standalone="yes"?>6366</account..."
How is it helpful to have this recorded for anyone ?
It is not at all useful to me.
And there does not seem to be any way to select "everything but" to easily see the entries which are not dnsQuestionMatch.
Thank you for the feedback Bruce. The System -> Network Events Page is intended to be used as a troubleshooting page to ensure the Log generated by your Firebox made it to TDR. That is the reason why we don't provide any advanced sorting and filtering functionality. It was never intended to be a page to used to take actions or make decisions. Firebox Events that correspond to a Host then are processed to become an Indicator. If a Firebox Event gets generated and does not correspond to a Host with a Host Sensor, there's nothing TDR can do about it so we decided to not generate an Indicator. In our new paradigm of Network to Process Correlation, on most Operating systems DNS questions are made by the OS, not the application requesting a name be translated to an IP. Therefore, that specific indicator might not be as useful as originally intended.
Ricardo Arroyo | Principal Product Manager / ThreatSync Guru
WatchGuard Technologies, Inc.
I think a lot of the pain boils down to too much noise and no way to reduce it. The only tool you give us to reduce the indicator noise is whitelisting which in a static environment might work but what environment remains static? We are constantly pushing vendor updates. When we push out Windows updates or Chrome updates I don’t expect to see 300 new level 3/4 indicators as that’s a common thing we are going to do everyday. If there is no way to cut through the noise, there is no way to see what’s actually happening in the environment and detect real threats.
I’m not a WatchGuard engineer, but it seems like giving us more flexibility to tailor TDR to our environment would be a step in the right direction. I’ll go back to the complex rules. Here is an example of a complex rule I would like to be able to create: