In this lab, we’ll be setting up USBGuard to to control which USB devices are allowd to communicate with our hosts once they are plugged in. USB devices are an easy way for attackers to gain a foothold in our environments via USB Dropper attacks. USBGuard is a great security control that can help us avoid being infected by a malicious USB device.
*This course is not approved or sponsored by Red Hat.*
Learning Objectives
Successfully complete this lab by achieving the following learning objectives:
- Install and Configure USBGuard with Basic Settings
Install USBGuard
[root@host]# yum install -y usbguard
Start the USBGuard service
[root@host]# systemctl start usbguard.service
Generate a base policy for USBGuard
[root@host]# usbguard generate-policy > /etc/usbguard/rules.conf
Restart the USBGuard service after creating the base policy
[root@host]# systemctl restart usbguard.service
Enable the USBGuard service to start at boot
[root@host]# systemctl enable usbguard.service
- Configure USBGuard Permissions
Create a group named
USBGuard-Users
[root@host]# groupadd USBGuard-Users
Add
cloud_user
to theUSBGuard-Users
group[root@host]# usermod -a -G USBGuard-Users cloud_user
Verify group membership:
[root@host]# cat /etc/group | grep USBGuard-Users
Update USBGuard to permit the
USBGuard-Users
group to make changes to USBGuard[root@host]# nano /etc/usbguard/usbguard-daemon.conf
Change the
IPCAllowedGroups
line to read:IPCAllowedGroups=USBGuard-Users
Restart the USBGuard service
[root@host]# systemctl restart usbguard.service