{"id":17811,"date":"2020-02-25T07:00:02","date_gmt":"2020-02-25T15:00:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/25\/news-11544\/"},"modified":"2020-02-25T07:00:02","modified_gmt":"2020-02-25T15:00:02","slug":"news-11544","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/25\/news-11544\/","title":{"rendered":"In Safe Hands with Trend Micro Home Network Security \u2013 Part 3: Testing Its Functions"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Tue, 25 Feb 2020 14:05:34 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"158\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-300x158.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-300x158.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-1024x540.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-768x405.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-1536x810.jpg 1536w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-2048x1080.jpg 2048w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-640x338.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-900x475.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-440x232.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-380x200.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><strong>We continue our four-part series on protecting your home and family. See the links to the previous parts at the end of this blog.<\/strong><\/p>\n<p>As you use more internet-connected devices and smart appliances in your home, it\u2019s of utmost importance to make sure your gadgets are properly protected from malware and hackers\u2014and <a href=\"https:\/\/go2.trendmicro.com\/geoip\/home-network-security\">Trend Micro Home Network Security<\/a> (HNS) helps you do just that. But while it\u2019s easy to set up, connect, and configure (and even to forget!), you reap the most benefit when you\u2019re actively involved with it, maintaining and monitoring its features and controls.<\/p>\n<p>Start by asking the question: <em>Are you sure your home network is secure?<\/em> As you learn what network security entails, by the end of this blog you\u2019ll be able to answer that question confidently. The more you\u2019re involved with HNS, as the tech-savvy \u201cguru\u201d of the household, the more you\u2019ll know when things are properly secured.<\/p>\n<p>We\u2019ll cover three main topics in Part 3 of our 4-part series, where we help you to test the following features: <strong>Threat Blocking, Access Control, <\/strong>and<strong> Parental Controls.<\/strong><\/p>\n<h3><strong>1.\u00a0\u00a0 <\/strong><strong>Threat Blocking<\/strong><\/h3>\n<p>To better understand how HNS blocks malware on malicious websites from being downloaded to your devices, open your browser either from your mobile device or PC then proceed to these links:<\/p>\n<p><a href=\"http:\/\/www.eicar.org\/download\/eicar.com\">http:\/\/www.eicar.org\/download\/eicar.com<\/a><\/p>\n<p><a href=\"http:\/\/test-malware.hns.tm\">http:\/\/test-malware.hns.tm<\/a><\/p>\n<p>When you run these tests, the test URL will be blocked, your browser will say \u201cWebsite Blocked by Trend Micro<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/12.0.0-1\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> Home Network Security,\u201d and the payload will not be downloaded to the test device. The HNS app will then notify you that a web threat has been blocked, along with the name of the test device that was able to detect it. In the future, you should monitor the HNS app for such messages, so you can see which malicious sites your family has been accessing and warn them.<\/p>\n<h3><strong>2.\u00a0\u00a0 <\/strong><strong>Access Control<\/strong><\/h3>\n<p>Next, there are three aspects of <strong>Access Control<\/strong> that you should test to familiarize yourself with the features. They are: <strong>Approving and Rejecting Devices, Remote Access Protection, <\/strong>and<strong> Disconnecting Devices.<\/strong><\/p>\n<h4><strong>Approving and Rejecting Devices<\/strong><\/h4>\n<p>Device control is the first part of access control.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20\"><\/td>\n<td>\n<ul>\n<li>Navigate to <strong>Settings -&gt; Access Control<\/strong> and enable <strong>New Device Approval<\/strong>, after completing setup and allowing HNS to scan the network for devices.<\/li>\n<li>Connect a device that has never been connected to the HNS-secured network. The phone that\u2019s managing the HNS Station will receive a notification indicating, \u201cRequest from a new device to join the network\u201d.<\/li>\n<li>Once you tap the notification, you\u2019re given the option to either <strong>Allow Connection<\/strong> or <strong>Block<\/strong> the new device\u2019s connection to your network.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Based on the decision to <strong>Allow Connection<\/strong>, verify the connection status on the new device by navigating to a webpage or using an application that connects to the internet.<\/p>\n<h4><strong>Remote Access Protection<\/strong><\/h4>\n<p>For the next test, <strong>Remote Access Protection<\/strong>, you\u2019ll use a real-world remote-access program commonly used in tech support scams. Note that remote desktop software such as LogMeIn, AnyDesk, TeamViewer, and others are not inherently harmful, but malicious hackers often use them for nefarious activities, such as tech support scams, where they lure you into downloading such a program, pretending they need it to \u201csolve\u201d your computer problems. Unsuspecting consumers around the world have fallen victim to such scams, often losing a large amount of money in fake support fees and ransoms. Additionally, such hackers can use remote desktop programs to scoop up your private data and sell it on the Dark Web.<\/p>\n<p>Home Network Security gives owners peace of mind by preventing these types of Remote Desktop programs from establishing connections with remote computers.<\/p>\n<p>In this test, we will use the free version of TeamViewer.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20\"><\/td>\n<td>\n<ul>\n<li>Download the remote access software from <a href=\"https:\/\/www.teamviewer.com\">https:\/\/www.teamviewer.com<\/a> and install it on two devices\u2014e.g., a laptop and desktop computer. (It\u2019s available for phones and tablets too.) One will act as the source, the other the target. The target PC should be on the same home network where HNS is installed. The source PC should be on another network.<\/li>\n<li>Navigate to <strong>Settings -&gt; Access Control -&gt; Remote Access Protection<\/strong> in the HNS app and enable <strong>Block Remote Access<\/strong>.<\/li>\n<li>From the source PC outside of your network, attempt to establish a TeamViewer connection to the target PC and start a session.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>HNS will block the TeamViewer session and the HNS app will receive a notification of a remote access connection attempt, along with the name of the target PC. Once you\u2019ve run your tests and understand how this access blocking works, you can delete the instances of TeamViewer on your devices, if you have no need of them.<\/p>\n<h4><strong>Disconnecting Devices<\/strong><\/h4>\n<p>Next, you should test <strong>Disconnecting Devices<\/strong>.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20\"><\/td>\n<td>\n<ul>\n<li>To do this, navigate to the <strong>Devices<\/strong> page and choose a connected device (indicated by a green status indicator next to the device\u2019s name).<\/li>\n<li>On the chosen device\u2019s detail page, turn off the \u201cConnect to the Network\u201d switch to disconnect it from the network.<\/li>\n<li>Using the disconnected device, attempt to browse to a webpage or use an online application to verify that the device no longer has access.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><strong>3.\u00a0\u00a0 <\/strong><strong>Parental Controls <\/strong><\/h3>\n<p>As we indicated in our last installment of this series, there are many facets to HNS\u2019s Parental Controls. In this segment we will check the effectiveness of its <strong>Website Filtering, Content Filtering, App Controls, Time Limits<\/strong>, and <strong>Connection Alert &amp; Notification<\/strong> capabilities.<\/p>\n<h4><strong>Website Filtering<\/strong><\/h4>\n<p>Testing <strong>Website Filtering<\/strong> is easy.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20\"><\/td>\n<td>\n<ul>\n<li>For this test, under the <strong>Filtering<\/strong> sector, first assign a test PC with the <strong>Pre-Teen-Age Level<\/strong> default profile for <strong>Filtered Categories.<\/strong><\/li>\n<li>Next, using the browser of your assigned test PC, attempt to go to a website that belongs to the default blocked categories in the Pre-Teen level, such as <strong>Personals<\/strong> or <strong>Dating<\/strong>.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The browser will show, &#8220;Website Blocked by Trend Micro Home Network Security&#8221; and indicate the rule that triggered the block, i.e., the <strong>Category: Personals\/Dating<\/strong> rule in our test. The HNS app will receive a notification indicating HNS prevented your \u201cPre-Teen device\u201d was from visiting a <strong>Personals\/Dating<\/strong> site. Tapping the notification will show more details, such as the time and website visited.<\/p>\n<h4><strong>Content Filtering<\/strong><\/h4>\n<p>Moving forward, <strong>Content Filtering<\/strong> is next in our checklist.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20\"><\/td>\n<td>\n<ul>\n<li>Go to the HNS app, proceed to the test user\u2019s profile <strong>Settings -&gt; Filtering.<\/strong> Then scroll down to the <strong>Content<\/strong> Turn ON <strong>Google SafeSearch<\/strong> and <strong>YouTube Restricted Mode<\/strong> if they\u2019re turned OFF, or vice-versa.<\/li>\n<li>The change in settings should be reflected on the browser. To verify this, open a new instance of the browser.<\/li>\n<li>From the Google Search results page go to <strong>Settings -&gt; Search Settings<\/strong> and <strong>Turn On SafeSearch<\/strong> should have a check mark beside it if it\u2019s turned ON by HNS, or it\u2019s unchecked when turned OFF by HNS.<\/li>\n<li>For <strong>YouTube<\/strong>, go to <a href=\"https:\/\/www.youtube.com\">https:\/\/www.youtube.com<\/a> and locate the 3 vertical dots near the SIGN IN button. Scroll down and check whether <strong>Restricted Mode<\/strong> is turned ON or OFF, depending on the toggled setting made from the HNS app.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>When it\u2019s toggled ON, you can try to search for inappropriate content, such as red band trailersDoing this, the user will see a message that says, \u201cSome results have been removed because Restricted Mode is enabled by your network administrator.\u201d In addition, videos with mature or inappropriate content will not be displayed when you open YouTube\u2019s Home page.<\/p>\n<h4><strong>App Controls<\/strong><\/h4>\n<p>To continue, you can test the <strong>Inappropriate App Used<\/strong> functionality. Note that this feature only logs the apps opened in your devices; it does not block those apps from being used by the child.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20\"><\/td>\n<td>\n<ul>\n<li>From the HNS app, toggle on <strong>Inappropriate App Used<\/strong> from the <strong>Settings<\/strong> of the same test user account profile of the assigned test mobile device.<\/li>\n<li><strong>Enable Notifications<\/strong> and choose any or all that are listed in the <strong>App Category.<\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Next, on your test mobile device, open any of the apps that correspond to the <strong>App Categories<\/strong> you\u2019ve chosen. For instance, when a gaming app is opened, The HNS app should get a notification that a Games App was found in the user\u2019s device. Tapping this notification should open the <strong>Report<\/strong> section where more detailed information is presented, such as the name of the app, the amount of time it was used, and the name of the device that triggered the notification.<\/p>\n<h4><strong>Time Limits<\/strong><\/h4>\n<p>To test <strong>Time Limits<\/strong>, you can set up a simple rule that consists of the chosen days the family member can use the internet, set the internet time limit, and set the time spent on YouTube within the set time period they\u2019re allowed to use the internet, then enable notifications for this rule.<\/p>\n<p>As an example:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20\"><\/td>\n<td>\n<ul>\n<li>Monday, Tuesday, Wednesday, Thursday, Friday<\/li>\n<li>30 minutes of Internet allowed, including 15 minutes of YouTube<\/li>\n<li>Times allowed: 6:00 PM to 10:00 PM<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>To check if the rule is working, look for when the user attempts to surf and use YouTube beyond what\u2019s permitted by the rule. HNS will block access to the internet and YouTube and provide you with a notification that says the YouTube or internet time limit has been reached by the user account. This notification is also logged in the user profile\u2019s <strong>Report<\/strong> section.<\/p>\n<h4><strong>Connection Alert &amp; Notification<\/strong><\/h4>\n<p>Let\u2019s wrap up testing the Parental Control features with enabling <strong>Connection Alert<\/strong>. This allows you to receive a notification when a device you choose, like your child\u2019s mobile phone, reconnects to your HNS-secure network after getting home from school.<\/p>\n<p>To do this, from the HNS App\u2019s <strong>User Account &gt;<\/strong> <strong>Settings<\/strong>, enable <strong>Connection Alert<\/strong> to indicate when the devices you have selected connect to the home network, according to your set schedule. You\u2019ll only receive notifications of connections from HNS during that scheduled time.<\/p>\n<h3><strong>And Now, the Answer to Your Question<\/strong><\/h3>\n<p><em>Is your network secure?<\/em> As the techie in your household, you\u2019re the designated technical support for the family. As the saying usually goes, \u201cHeavy is the head that wears the crown,\u201d but armed with what you\u2019ve just learned about Trend Micro Home Network Security\u2019s capabilities, your burden will lighten significantly and you and your family will stay safe and secure from constantly evolving network threats.<\/p>\n<p>Go to our website for more information on <a href=\"https:\/\/go2.trendmicro.com\/geoip\/home-network-security\">Trend Micro Home Network Security<\/a>. And watch for Part 4 of this series, where we wind up with some additional monitoring and maintenance best practices.<\/p>\n<p>Go here for Parts 1 and 2 of our series:<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/youre-in-safe-hands-with-trend-micro-home-network-security\/\">You\u2019re in Safe Hands with Trend Micro Home Network Security &#8211; Part 1: Setup and Configuration<\/a><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/parental-controls-trend-micro-has-got-you-covered\/\">Trend Micro Home Network Security Has Got You Covered &#8211; Part 2: Parental Controls<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/in-safe-hands-with-trend-micro-home-network-security-part-3-testing-its-functions\/\">In Safe Hands with Trend Micro Home Network Security &#8211; Part 3: Testing Its Functions<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/in-safe-hands-with-trend-micro-home-network-security-part-3-testing-its-functions\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Tue, 25 Feb 2020 14:05:34 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"158\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-300x158.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-300x158.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-1024x540.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-768x405.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-1536x810.jpg 1536w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-2048x1080.jpg 2048w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-640x338.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-900x475.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-440x232.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/02\/happy-mother-with-her-daughter-using-digital-WMPSFEG-380x200.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>We continue our four-part series on protecting your home and family. See the links to the previous parts at the end of this blog. As you use more internet-connected devices and smart appliances in your home, it\u2019s of utmost importance to make sure your gadgets are properly protected from malware and hackers\u2014and Trend Micro Home&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/in-safe-hands-with-trend-micro-home-network-security-part-3-testing-its-functions\/\">In Safe Hands with Trend Micro Home Network Security &#8211; Part 3: Testing Its Functions<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10789,21576,16861,24289],"class_list":["post-17811","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-consumer","tag-home-network-security","tag-iot-security","tag-securing-your-network"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17811"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17811\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17811"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}