GAMFT Hardening Guide
GAMFT Hardening Guide
Hardening Guide
Copyright Terms and Conditions
Copyright © Fortra, LLC and its group of companies. All trademarks and registered trademarks are the property of their respective
owners.
The content in this document is protected by the Copyright Laws of the United States of America and other countries worldwide. The
unauthorized use and/or duplication of this material without express and written permission from Fortra is strictly prohibited. Excerpts and
links may be used, provided that full and clear credit is given to Fortra with appropriate and specific direction to the original content.
202310060320
Table of Contents
Introduction 6
Getting Assistance 7
Getting Started 11
Services 12
HTTPS/AS2/AS4 12
Server 19
FTP 20
Server 22
FTPS 25
Server 27
SFTP 29
Server 31
GoFast 33
Agent Service 35
Server 36
PeSIT 36
GoAnywhere Gateway 37
Gateway Manager 38
Gateway Configuration 38
Hardening Recommendations 43
Agent Manager 44
Agent Configuration 45
Users 47
Web Users 52
Domains 60
Login Settings 61
Reporting 62
Log Settings 62
Encryption 63
Encrypted Folders 63
Folder Restrictions 63
System 65
Global Settings 65
Security Settings 65
Antivirus Settings 68
Admin Server 70
Database Configuration 72
System Alerts 73
IP Filter 75
IP Block Listing 76
Glossary 79
This guide does not guarantee the security of your application or environment, however it
is a resource to follow for best-practices when hardening your deployment of GoAnywhere
MFT. It is written with the current cybersecurity landscape in mind and provides specific
configuration guidelines for anyone involved in deploying GoAnywhere MFT.
NOTE: GoAnywhere products should only be run on vendor systems (OS, databases,
file systems, etc) that are up to date with the latest security patches and have not
reached End of Life (EOL).
This guide outlines the steps required for hardening GoAnywhere products. Before you
begin:
NOTE: Fortra recommends keeping the JRE up to date for all three GoAnywhere
products: MFT, Gateway, and Agents. For instructions on externalizing the JRE
and keeping it up to date, see the GoAnywhere MFT, GoAnywhere Gateway,
and the GoAnywhere Agents Installation Guides.
l Following the principle of least privilege, create a service account for running your
GoAnywhere products.
NOTE: On Linux and Unix, the service account will need elevated permissions
to bind to privileged ports (1 - 1024).
l Following the principle of least privilege, limit access to the installation locations of
your GoAnywhere products to select users.
l Fortra recommends using a firewall or another device to limit traffic to any hosted
GoAnywhere Services (Admin, HTTPS, AS2, AS4, FTP/S, SFTP, GoFast, Agents,
and PeSIT). Further, Fortra recommends updating your firewall to ensure the
admin ports are not publicly accessible. The default admin ports are 8000 and
8001. Review your Admin Server configuration to determine which ports are being
used by your Admin Client.
l Disable non-blocking entropy gathering on Linux, Unix, Solaris, and MacOS
servers. Using blocking entropy gathering helps to generate more secure
cryptographic keys. Note, this requires editing a startup script for MFT. To edit this
script:
NOTE:
Enabling this option can cause slower startup times while the operating system
gathers enough entropy to properly generate randomness for use in
cryptographic functions.
There are risks when accepting inbound data transfers from the internet, even from trusted
trading partners. See the Antivirus Settings section for instructions on how to enable
automatic AV scanning for inbound data transfers. This helps prevent malware from
entering your environment and causing damage.
Fortra recommends the GoAnywhere Threat Protection bundle which combines Clearswift
ICAP Gateway with GoAnywhere MFT for proven, compatible, best-in-class threat
protection.
When sharing data, you may need to mask aspects of that data or put further controls on
sensitive information. This can ensure that trading partners do not leak sensitive
information, intentionally or accidentally. This also allows you to keep track of which files
are outside of your environment, and even control access by revoking rights to this data.
Fortra recommends the GoAnywhere Zero Trust File Transfer bundle for tackling best-in-
class controls on both outbound and inbound data transfers.
This guide makes regular reference to the GoAnywhere MFT Admin User Guide, and
Fortra recommends that you have the User Guide readily available as you move through
the hardening process.
While it is not absolutely necessary to use this guide in a linear fashion, it helps ensure that
all elements of the application are considered and addressed.
WARNING:
Implementing the configuration settings recommended throughout this guide can
result in unintended consequences, such as connectivity failures to systems that do
not support the latest security standards. Consult with your security team and other
involved parties to determine the ramifications of hardening your installation of
GoAnywhere MFT. Fortra also recommends you first harden a test or non-production
installation before applying these changes to a production instance. Fortra is not
responsible for any damages caused by the usage of this guide.
HTTPS/AS2/AS4
The following section provides the recommended settings for hardening the
HTTPS/AS2/AS4 Service. Only fields and options with recommended settings will be
addressed.
1. Log in as an Admin User with the Product Administrator role. If your user account
is assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services and then click the Service Manager link.
3. Click Action next to the HTTPS Service, and then click Edit .
Web Client
Enabled
Enable the Web Client if you plan to use it. If not, disable this feature.
Enabling the HTTP Strict Transport Security (HSTS) header will instruct
supported browsers to prevent all HTTP communication to GoAnywhere MFT by
enforcing HTTPS and blocking users from overriding invalid certificate warnings.
Include Header
Enabled
Maximum Age
Set the maximum age to greater than 10368000 seconds (120 days).
The Content Security Policy (CSP) response header allows Admin Users to
control which resources GoAnywhere is allowed to load for a given page. The CSP
mitigates potential threats by restricting which domains content can be loaded
from.
Policy
Begin with 'Default' setting. Consult your internal security team and customize as
needed.
NOTE:
Adjusting the CSP policy can impact application functionality. Please test all
changes before applying them to a production environment.
Secure Folders allows Web Users to work with authorized folders and files on the
network through the HTTPS Web Client.
NOTE:
Even though file types will be validated, Fortra recommends following the
principle of least privilege when determining who has access to the
ghttpsroot directory.
HTTPS
Configuring a maximum upload size can help prevent attacks that consume
server resources. Therefore, limit the maximum upload size according to your
company's needs and security policy. Fortra also recommends limiting disk space
for Web Users and Web User Groups to help prevent this type of attack.
Fortra recommends that you disable this feature, as this could help prevent the
upload of malicious files.
Fortra recommends that you enable this feature. Most valid file uploads will
include a file extension. In addition, enabling this feature along with choosing a
File Extension Filter allows GoAnywhere MFT to prevent unwanted files from
being uploaded.
This text area allows you to list the file types that are allowed to be uploaded via
GoAnywhere MFT. Limiting allowed file types can help prevent the upload of
malicious files.
NOTE: Type all file extensions without a period (.), separate them with
commas, and do not add line breaks or spaces (for example, if you want to
allow only .txt, .xls, .xlsx and .csv files, type: txt,xls,xlsx,csv).
AS2
The settings on the AS2 tab configure the identity, security, and file restrictions for
AS2 communications. The AS2 service supports multiple AS2 Recipients, each
with their own AS2 ID, certificate alias, upload folder destinations, MDN receipts,
and message security.
Enabled
Enable this Service only if you intend to use it.
AS2 Recipients
Message Decryption
Key Location
Specify the key used to decrypt incoming messages. Use the System Key vault
whenever possible. RSA keys with a key size of 2048 bits or larger are
recommended. The corresponding certificate should be sent to all Web Users
who will be sending AS2 messages to GoAnywhere. Use a dedicated SSL
certificate for message decryption.
Keep Receipts
Enable
MDN Signature
Specify the location and name of the private key that will be used to sign the AS2
message receipt. This ensures nonrepudiation.
Key Location
Use a dedicated SSL certificate for message signatures.
Require Encryption
Enable this feature. Messages sent without encryption will be denied and will
result in an error.
Require Signature
Enable this feature. Messages sent without a signature will be denied and will
result in an error.
Require Authentication
Enable this feature. Messages sent without requiring authentication will be denied
and will result in an error.
AS4
General Tab
Only enable the AS4 Service if you plan to use it.
Server
Listener
Server Header
Set the Server Header name to something generic (such as 'Null', 'None', or 'Web
Server'). Information gathered from the header name can help attackers in
malicious activities.
SSL Tab
SSL Enabled
Enable. It is best practice enable SSL on Listeners unless redirecting from HTTP
to HTTPS.
SSL Protocol
Use the default, TLS protocol. SSL is a deprecated protocol. This field is inherited
from the System Security Settings.
Client Authentication
If all users are authenticating with certificates, set this option to 'Required'. If only
some users are authenticating with certificates, use 'Optional'. Otherwise, use
'None'.
Certificate Location
Import your company's private SSL key into the Key Management System and
apply them to the HTTPS listener. If a signed certificate is not available, create an
SSL certificate and apply it. Use the latest version of SSL certificate as possible
and the largest key size possible. If using certificate version 3, be sure that the
certificate extended key usage is set to an SSL/TLS server. See the HTTPS
Certificate Quick Start Guide in the GoAnywhere Admin User Guide for more
information.
Redirection Tab
HTTP/HTTPS traffic can be automatically redirected to the intended protocol, host
and/or port. The redirect process substitutes the appropriate portion of the URL
([protocol]://[host][:port]).
To securely redirect from HTTP to HTTPS, set up an HTTP listener and enable
redirection on that listener. Configure the redirection fields as necessary, set the
redirection protocol as HTTPS, and redirect to the existing HTTPS listener.
FTP
The following section provides all recommended settings for hardening the FTP Service.
Only fields and options with recommended settings will be addressed.
1. Log in as an Admin User with the Product Administrator role. If your user account
is assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services and then click the Service Manager link.
3. Click Action next to the FTP Service, and then click Edit .
Upload Restrictions
Fortra recommends that you disable this feature, as this could help prevent the
upload of malicious files.
Fortra recommends that you enable this feature. Most valid file uploads will
include a file extension. In addition, enabling this feature along with choosing a
File Extension Filter allows GoAnywhere MFT to prevent unwanted files from
being uploaded.
This text area allows you to list the file types that are allowed to be uploaded via
GoAnywhere MFT. Limiting allowed file types can help prevent the upload of
malicious files.
NOTE: Type all file extensions without a period (.), separate them with
commas, and do not add line breaks or spaces (for example, if you want to
allow only .txt, .xls, .xlsx and .csv files, type: txt,xls,xlsx,csv).
Server
Listener
The listener specifies on which port the FTP service will monitor traffic.
Idle Timeout
Consult your security team to determine the optimal Idle Timeout setting.
Explicit SSL
An Explicit SSL connection will start on any available FTP port. The Explicit SSL
configuration verifies a connection is made and then requests and verifies an SSL
connection before transmitting login or file data.
Client Authentication
If all users are authenticating with certificates, set this option to 'Required'. If only
some users are authenticating with certificates, use 'Optional'. Otherwise, use
'None'.
CCC Enabled
Disable unless otherwise requested by your security team. If a Web User sends
the CCC command, it terminates the encryption on the command channel and all
subsequent FTP communication on the command channel will be transmitted in
plain text.
Certificate Location
Import your company's private SSL key into the Key Management System and
apply them to the FTP listener. If a signed certificate is not available, create an
SSL certificate and apply it. Use the latest version of SSL certificate as possible
and the largest key size possible. If using certificate version 3, be sure that the
certificate extended key usage is set to an SSL/TLS server.
Data Connection
Active
With an "active" Data Connection, the client computer connects to the server on the control
port and specifies to the server which port it is listening on for the data. This can cause
issues with a firewall on the client side as it may block the incoming data connection from
the server.
Enabled
It is strongly recommended to use a passive data connection unless absolutely
necessary.
Validate IP
Set to Yes. This option specifies if the server should check if the IP address for the
data connection is the same as for the control port. If the IP is not valid, the
connection will fail.
Passive
In a passive Data Connection, the client computer initiates the connection while the host
decides the control port, using a port range within the firewall rules.
Validate IP
Set to Yes. This option specifies if the server should check if the IP address for the
data connection is the same as for the control port. If the IP is not valid, the
connection will fail.
FTPS
The following section provides all recommended settings for hardening the FTPS Service.
Only fields and options with recommended settings will be addressed.
1. Log in as an Admin User with the Product Administrator role. If your user account
is assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services and then click the Service Manager link.
3. Click Action next to the FTPS Service, and then click Edit .
Upload Restrictions
Fortra recommends that you disable this feature, as this could help prevent the
upload of malicious files.
Fortra recommends that you enable this feature. Most valid file uploads will
include a file extension. In addition, enabling this feature along with choosing a
File Extension Filter allows GoAnywhere MFT to prevent unwanted files from
being uploaded.
This text area allows you to list the file types that are allowed to be uploaded via
GoAnywhere MFT. Limiting allowed file types can help prevent the upload of
malicious files.
NOTE: Type all file extensions without a period (.), separate them with
commas, and do not add line breaks or spaces (for example, if you want to
allow only .txt, .xls, .xlsx and .csv files, type: txt,xls,xlsx,csv).
Server
Listener
The listener specifies on which port the FTPS service will monitor traffic.
Idle Timeout
Consult your security team to determine the optimal Idle Timeout setting.
Implicit SSL
An Implicit SSL connection will start on any available FTP port. The Implicit SSL
configuration verifies a connection is made and then requests and verifies an SSL
connection before transmitting login or file data.
SSL Protocol
Use the default, TLS protocol. SSL is a deprecated protocol. This field is inherited
from the System Security Settings.
Client Authentication
If all users are authenticating with certificates, set this option to 'Required'. If only
some users are authenticating with certificates, use 'Optional'. Otherwise, use
'None'.
CCC Enabled
Disable unless otherwise requested by your security team. If a Web User sends
the CCC command, it terminates the encryption on the command channel and all
subsequent FTPS communication on the command channel will be transmitted in
plain text.
Certificate Location
Import your company's private SSL key into the Key Management System and
apply them to the FTPS listener. If a signed certificate is not available, create an
SSL certificate and apply it. Use the latest version of SSL certificate as possible
and the largest key size possible. If using certificate version 3, be sure that the
certificate extended key usage is set to an SSL/TLS server.
Data Connection
Force Encrypted Data Channels
Set to Yes. This setting forces SSL/TLS encryption on the data channels and
rejects any attempts at plain text data transfers.
Active
With an "active" Data Connection, the client computer connects to the server on the control
port and specifies to the server which port it is listening on for the data. This can cause
issues with a firewall on the client side as it may block the incoming data connection from
the server.
Enabled
It is strongly recommended to use a 'Passive' data connection unless absolutely
necessary.
Validate IP
Set to Yes. This option specifies if the server should check if the IP address for the
data connection is the same as for the control port. If the IP is not valid, the
connection will fail.
Passive
In a passive Data Connection, the client computer initiates the connection while the host
decides the control port, using a port range within the firewall rules.
Validate IP
Set to Yes. This option specifies if the server should check if the IP address for the
data connection is the same as for the control port. If the IP is not valid, the
connection will fail.
SFTP
The following section provides the recommended settings for hardening the SFTP
Service. Only fields and options with recommended settings will be addressed.
1. Log in as an Admin User with the Product Administrator role. If your user account
is assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services and then click the Service Manager link.
Upload Restrictions
Configuring a maximum upload size can help prevent attacks that consume server
resources. Therefore, limit the maximum upload size according to your company's
needs and security policy. Fortra also recommends limiting disk space for Web
Users and Web User Groups to help prevent this type of attack.
Fortra recommends that you disable this feature, as this could help prevent the
upload of malicious files.
Fortra recommends that you enable this feature. Most valid file uploads will
include a file extension. In addition, enabling this feature along with choosing a
File Extension Filter allows GoAnywhere MFT to prevent unwanted files from
being uploaded.
This text area allows you to list the file types that are allowed to be uploaded via
GoAnywhere MFT. Limiting allowed file types can help prevent the upload of
malicious files.
NOTE: Type all file extensions without a period (.), separate them with
commas, and do not add line breaks or spaces (for example, if you want to
allow only .txt, .xls, .xlsx and .csv files, type: txt,xls,xlsx,csv).
Server
SCP Enabled
Disable this option unless you are using it. Reducing the number of endpoints
helps administrators focus security efforts.
NOTE:
Enable ECDSA keys to allow for more Public Key Signature Algorithms.
Software Version
The software name or version should be something generic such as 'Null', 'None',
'SFTP Server', etc. Information gathered from server header can help attackers in
malicious activities.
Listener
The listener specifies on which port the SFTP service will monitor traffic.
Host Keys
Generate a new SSH RSA or ECDSA key under the System Key Vault of size
2048 or greater and use it for the SFTP Service. Remove any DSA key in the
configuration. DSA keys are not allowed when FIPS 140-2 mode is enabled.
GoFast
The following section provides all recommended settings for hardening the GoFast
Service. Only fields and options with recommended settings will be addressed.
1. Log in as an Admin User with the Product Administrator role. If your user account
is assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services and then click the Service Manager link.
3. Click Action next to the GoFast Service, and then click Edit .
Upload Restrictions
Fortra recommends that you disable this feature, as this could help prevent the
upload of malicious files.
Fortra recommends that you enable this feature. Most valid file uploads will
include a file extension. In addition, enabling this feature along with choosing a
File Extension Filter allows GoAnywhere MFT to prevent unwanted files from
being uploaded.
This text area allows you to list the file types that are allowed to be uploaded via
GoAnywhere MFT. Limiting allowed file types can help prevent the upload of
malicious files.
NOTE: Type all file extensions without a period (.), separate them with
commas, and do not add line breaks or spaces (for example, if you want to
allow only .txt, .xls, .xlsx and .csv files, type: txt,xls,xlsx,csv).
Client Authentication
If all users are authenticating with certificates, set this option to 'Required'. If only
some users are authenticating with certificates, us 'Optional'. Otherwise, use
'None'.
Certificate Location
Import your company's private SSL key into the Key Management System and
apply it. If a signed certificate is not available, create an SSL certificate and apply
it. Use the latest version of SSL certificate as possible and the largest key size
possible. If using certificate version 3, be sure that the certificate extended key
usage is set to an SSL/TLS server.
Agent Service
The following section provides all recommended settings for hardening the Agents
Service. Only fields and options with recommended settings will be addressed.
1. Log in as an Admin User with the Product Administrator role. If your user account
is assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services and then click the Service Manager link.
3. Click Action next to the Agent Service, and then click Edit .
Registration
Require Approval
It is best practice to require approval for all Agent registrations. This allows for a
two-step process before an Agent can connect to the server.
Server
SSL
SSL Protocol
Leave this field blank.
NOTE:
Add other algorithms as needed from the Security Settings page.
PeSIT
The following section provides all recommended settings for hardening the PeSIT Service.
Only fields and options with recommended settings will be addressed.
1. Log in as an Admin User with the Product Administrator role. If your user account
is assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services and then click the Service Manager link.
3. Click Action next to the PeSIT Service, and then click Edit .
SSL
SSL Enabled
Enable.
NOTE:
Add other algorithms as needed from the Global Security Settings page.
Client Authentication
If all users are authenticating with certificates, set this option to 'Required'. If only
some users are authenticating with certificates, us 'Optional'. Otherwise, use
'None'.
Key Name
Import your company's private SSL key into the Key Management System and
apply them to the PeSIT listener. If a signed certificate is not available, create an
SSL certificate and apply it. Use the latest version of SSL certificate as possible
and the largest key size possible. If using certificate version 3, be sure that the
certificate extended key usage is set to an SSL/TLS server.
GoAnywhere Gateway
The following section provides all recommended settings for hardening GoAnywhere
Gateway. Only fields and options with recommended settings will be addressed.
1. Log in as an Admin User with the Product Administrator role. If your user account
is assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services and then click the Gateway Manager
link.
Gateway Manager
Gateway IP Filter and Log Rejected IP Addresses
Gateway IP Filter
Enable the Gateway IP Filter. This allows the gateway to filter client connections
based on the IP Filter Allow List and Block List managed by GoAnywhere.
Gateway Configuration
Control Channel Security
SSL Enabled
Enable. It is best practice enable SSL on Listeners unless redirecting from HTTP
to HTTPS.
Implicit SSL
Disable. This helps prevent man-in-the-middle attacks.
NOTE:
Connecting to outdated GoAnywhere Gateway servers may cause
connectivity issues.
1. Log in as an Admin User with the Secure Mail Manager role. If your user account
is assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services and then click the Secure Mail, Settings
link.
General
Secure Mail Enabled
Enable Secure Mail only if it is actively being used.
Send Package
Protection Level
Disable URL Protected and enable Password Protected and Certified Delivery.
Set the Default to Certified Delivery. When Certified Delivery is enabled, Web
Users will be given an option to require recipients to register before they can
access the message.
Password Generation
Password Notification
Set the Default to Text Message (SMS) if SMS has been configured.
Package Expiration
Set the Default to a number of days less than the desired enforced range.
Maximum Downloads
Set the Default to a number of days less than the desired enforced range.
Reply
Disable Allowed.
Set the Default to No. This prevents Web Users from receiving potentially risky
files. In addition, enabling data loss prevention scanning using Triggers can
further mitigate risk.
Request Files
Set the Default to the Certified Delivery. When Certified Delivery is enabled, Web
Users will be given an option to require recipients to register before they can
access the message.
Request Expiration
Set the Default to a number of days less than the desired enforced range.
Enforcing a range prevents links from being used in the future should a user's
inbox be compromised.
Disable Ask Before Sending and enable Enforce These Settings. Enforcing
setting through the plugin policy ensures that all users adhere to the same settings
when sending messages from Outlook.
Address Rules
Address Rules are used to define the Web User email addresses that are
permitted to send Secure Mail, and to which recipient email addresses can be sent
to.
Configure the address rules to permit the least number of email addresses
necessary.
1. Log in as an Admin User with the Secure Forms Manager role. If your user
account is assigned to a custom Admin User Role, your ability to view, modify, or
execute actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services and then click the Secure Forms,
Settings link.
Hardening Recommendations
If you plan to use Secure Forms, set a Public Form Session Timeout. If you are not using
Secure Forms, uncheck Secure Forms Enabled.
1. Log in as an Admin User with the Secure Forms Manager role. If your user
account is assigned to a custom Admin User Role, your ability to view, modify, or
execute actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services > Secure Forms > Form Manager.
Access
Web Users
Web Groups
Components
Utilize the Mask Input option to hide user input and the Encrypt Data option to
ensure that sensitive data will not be shown in plaintext anywhere within the
application.
Agent Manager
The following section provides all recommended settings for Agent Manager. Only fields
and options with recommended settings will be addressed.
WARNING: Selecting "Force Restart" will restart the Agent immediately and
force the Agent to begin using the new authentication key. Any jobs or
transfers will be terminated.
WARNING: If you are rotating your Agent’s authentication key because you
suspect the Agent has been compromised, you should immediately unregister
and reregister the Agent. The reregistration process can help reestablish the
identity and legitimacy of the Agent. Simply rotating the Agent’s
authentication key may not be enough to recover a compromised Agent.
Agent Configuration
The following section provides all recommended settings for Agent Configuration. Only
fields and options with recommended settings will be addressed.
To manage Agents:
1. Log in as an Admin User with the Agent Manager role. If your user account is
assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Services and then click the Agents, Agent
Settings link.
General
Use a unique registration code for each Agent. To automate for larger
deployments, configure Agent settings through the Agent Service Listener. See
the GoAnywhere MFT User Guide for more information.
Alerts
While not directly security related, alerting Agent Managers when an Agent goes
offline can call attention to security issues.
1. Log in as an Admin User with the Security Officer role. If your user account is
assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Users, and then click the Admin Users or the
Admin User Templates link.
Fortra recommends creating a service account for all automated aspects of the application
- Secure Forms, Triggers, Monitors, SLAs, etc. Avoid using 'root' or 'administrator'
accounts for this purpose.
Roles
Assign roles using the principle of least privilege.
Groups
Assign groups using the principal of least privilege.
Domains
Assign domains using the principle of least privilege.
File Permissions
Limit Admin User folder access through the File Manager Settings. Use the
principle of least privilege.
NOTE:
Fortra recommends providing ‘Read Only’ access to Admin Users and only on
an as-needed basis. Create Web Users (even for internal employees) for fully
managed and audited access to files. Due to the sensitive nature of the
ghttpsroot and adminroot directories, Fortra recommends practicing caution
when determining who has access to these locations.
2. From the main menu bar, select Users, and then click the Admin Users link.
Be advised that any permissions given will be passed to all Admin Users within the Admin
User Group.
Group Domains
Assign group member domains using the principle of least privilege.
2. From the main menu bar, select Users, and then click Admin Security Settings.
General
Session Timeout
Set the session timeout according to company policy. OWASP recommends high
risk applications be set from 120 to 300 seconds and 900 to 1800 for low risk
applications.
Include Header
Enabled
Maximum Age
Leave this on the default setting unless your security team requires otherwise.
Include Subdomains
Enable this option.
Policy
Start with the 'Default' setting and customize as needed. Consider consulting your
internal security team and testing changes to the CSP before applying changes to
a production environment.
Password Policy
NOTE:
These settings only apply when using the GoAnywhere login method. If you
use Active Directory to authenticate users, your password policy is managed
by Active Directory.
Password Strength
Enforce Settings
Enforce password strength settings.
Password Age
NOTE:
Applying a Maximum Password Age can affect automated and service level
accounts that use the internal login method.
Password History
Web Users
The following section provides all recommended settings for the Web Users. Only fields
and options with recommended settings will be addressed.
2. From the main menu bar, select Users, and then click the Web Users link.
Authentication
Password Options
Enable 'Allow User to Change Password' if secure password polices are in place.
Authentication Types
It is best practice to use two-factor authentication, regardless of the protocol.
Enable 'SAN/DN' whenever possible.
Groups
Features
Folders
NOTE:
Disk space limits can cause negative performance impacts in large scale
environments.
Forms
IP Filter
Enable IP Filter
Enable this feature. These filters control which IP addresses or address ranges
have access to the various protocols.
Filter Type
Enable 'Allow List'.
Time Limits
Disable Account When No Activity
Set to 'Default (As defined in the web user security settings).
AS4
Message Options
Enable Reception Awareness. Reception Awareness allows GoAnywhere to
report whether a message has been successfully received or not.
Receipt Signature
Enable Sign Receipt. Signed receipts help ensure nonrepudiation. Use the
highest agreed upon algorithm possible. Signed receipts help ensure
nonrepudiation.
Message Decryption
Use a unique key pair for each trading partner.
Message Options
Set the Reply Mode to 'Synchronous'. This ensure that the message receipt
arrives at the correct endpoint.
Uploads
Ensure that the upload directory is pointing to an encrypted folder where files will
be encrypted at rest.
Require
Set Encryptionand Signature to 'Yes'. This allows GoAnywhere to throw an error if
either are missing from a message.
1. Log in as an Admin User with the Security Officer role. If your user account is
assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Users, and then click the Web User Settings link.
General
Disable Inactive Web User Accounts After
Do not set this value to '0' as this disables the setting. Consult your internal
security team for recommendations.
Password Policy
NOTE:
If you use Active Directory to authenticate users, you password policy is
managed by Active Directory.
Password Strength
Enforce Settings
Enforce password strength settings.
Password Age
NOTE:
Applying a Maximum Password Age can affect automated and service level
accounts that are not LDAP managed.
Password History
NOTE:
If you use Active Directory to authenticate users, your password policy is
managed by Active Directory.
Device Policy
PIN Verification Required
Enable PIN verification.
PIN Length
Set a PIN length of at least 6 digits.
Reauthenticate Every
Set reauthentication to every 7 days. Consult your internal security team for
recommendations.
Profile
Anonymous
2. From the main menu bar, select Users, and then click the Web User Self-
Registration link.
NOTE:
If using Certified Delivery, users will need to be manually created or sync'd
with LDAP/SAML if this setting is disabled.
Email Pattern
Limit the email patterns allowed to self register.
Permission
Allow only the emails necessary to register. Deny all others.
NOTE:
When configuring the Home Directory for created Web Users, it is
recommended to generate the users' home folders based upon the user.name
variable. The default setting for Home Directory will use this value to create
the Web Users home directory under the configured webdocs location. Using
the other offered variable values is not recommended, as these values are not
required to be unique within GoAnywhere. Ensure that careful consideration is
given to any folder access given to a Web User, to ensure that selected
variable values do not unintentionally give Web Users access to the same
directory locations.
Requires Approval
Enable Requires Approval
Domains
The following section provides all recommended settings for GoAnywhere Domains. Only
fields and options with recommended settings will be addressed.
To manage Domains:
2. From the main menu bar, select Users, and then click the Domains link.
The File Access Restrictions options determine if Web Users, Admin Users, and
Resources in this Domain are restricted to specific folders. Use the principle of least
privilege.
Login Settings
The following section provides all recommended settings for user Login Settings. Only
fields and options with recommended settings will be addressed.
1. Log in as an Admin User with the Security Officer role. If your user account is
assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu bar, select Users, and then click the Login Settings link.
Enable two-factor authentication. If you are using LDAP or SAML SSO, enable
multi-factor authentication through your authentication provider.
Reporting
Logs, reports, and log settings are available to authorized Admin Users from the Reporting
drop-down menu.
Logs are useful for troubleshooting errors and monitoring events such as file transfers and
server activity. The logs can be sorted by column, as well as exported to a CSV formatted
file.
Log Settings
The following section provides all recommended settings for Log Settings. Only fields and
options with recommended settings will be addressed.
To administer Logs, log in as an Admin User with the Product Administrator role.
From the main menu bar, point to Reporting and then click Log Settings.
General Tab
Tamper-Evident Logging
Enable Tamper-Evident Logging
NOTE:
If you have any log exemptions configured, those events will not be logged.
1. Log in as an Admin User with the Product Administrator role. If your user account
is assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu, select Encryption, and then click the Encrypted Folders link.
Folder Restrictions
To prevent encryption of vital GoAnywhere system resources, GoAnywhere has
restrictions on which folders can be encrypted:
l You cannot encrypt a root drive. For example, you would not be able to encrypt C:\.
l You cannot encrypt the GoAnywhere install directory, or any parent directory of the
install directory.
l The WebDocs and Workspace directories are the only directories within the
GoAnywhere install directory where encryption is allowed. The locations of these
folders are configured on the Domain.
l You cannot encrypt a child folder of a directory that is already encrypted.
l You cannot encrypt a parent folder of a directory that contains an encrypted child
directory.
NOTE:
When using encrypted folders in GoAnywhere, data at rest can only be accessed
through the GoAnywhere application.
1. Log in as an Admin User with both Product Administrator and Security Officer
roles. If your user account is assigned to a custom Admin User Role, your ability to
view, modify, or execute actions on this page is based on the permissions specified
for that role.
2. Select Encryption from the main menu bar and then click the Master Encryption
Keys link.
IMPORTANT: Fortra recommends creating a new Master Encryption Key. Rotate Master
Encryption Keys as directed by your organization’s security policy.
These settings can be viewed and modified by an Admin User with the Product
Administrator role. If your user account is assigned to a custom Admin User Role, your
ability to view, modify, or execute actions on this page is based on the permissions
specified for that role.
From the main menu, select System, and then click the Global Settings link.
SMTP Tab
Connect to an SSL enabled port. Configure the SMTP settings to use User Name
and Password whenever possible.
SMS Tab
When using SMS, refer to your SMS provider for best practices.
Security Settings
The following section provides all recommended settings for the Security Settings page.
Only fields and options with recommended settings will be addressed.
The Security Settings option is only available to Admin Users with the Security Officer
role.
Any changes to Security Settings are implemented globally throughout GoAnywhere MFT.
From the main menu bar, select System, and then click Security Settings.
Cryptography Tab
Protocols
Enable only TLSv1.2 and TLSv1.3, if available.
NOTE:
Connecting to outdated servers may cause connectivity issues.
Cipher Suites
Consult with your Security Team to determine which cipher suites should be
allowed globally. For more information on cipher suite support, please review the
‘Security Settings’ section of the GoAnywhere MFT User Guide.
Certificate Validation
Date Validation
Enable all certificate checks.
NOTE:
If running in a clustered system with Agents, rotate the Agent server key to an
SSL certificate that has been generated with the Client and Server Extended
Key Usage attributes defined.
NOTE:
If enabling client SSL certificate validation, make sure that any users
authenticating with SSL certificates are using certificates that have the Client
Extended Key Usage attribute defined.
Hostname Verification
Implicit Trust
Antivirus Settings
The following section provides all recommendations for Antivirus Settings. This section
will only address fields and options that have recommended settings.
Antivirus Settings are used to configure automatic antivirus scanning for files uploaded to
GoAnywhere Services.
These settings can be viewed and modified by an Admin User with the Product
Administrator role. If your user account is assigned to a custom Admin User Role, your
ability to view, modify, or execute actions on this page is based on the permissions
specified for that role.
From the main menu, select System, and then click the Antivirus Settings link.
Enabled
Enabling antivirus scanning can help prevent the upload of malicious or unwanted data to
your GoAnywhere server.
Upload Options
The maximum file size GoAnywhere will store in memory while awaiting a response from
the ICAP server. Therefore, limiting the file buffer size according to your company's needs
and security policy can help prevent attacks that consume server resources. Fortra also
recommends limiting disk space for Web Users and Web User Groups to help prevent this
type of attack.
Service Limits
It is best practice to scan all uploads made to GoAnywhere Services with an ICAP
Solution.
File Actions
Default file actions have been configured with best practices in mind. If your team
needs to adjust these rules, ensure that uploads which receive an ICAP response
signifying the discovery of unwanted data within the file are denied.
Fortra recommends selecting deny if the ICAP server is unavailable. This will
ensure that no malicious data is uploaded to your server in the event the ICAP
server becomes inaccessible to GoAnywhere.
File Exemptions
Do not configure file exemptions. File Exemptions help narrow the scope of the
ICAP configuration (for example, by a particular user or file size). Therefore,
uploads that meet exemption criteria will not be scanned by ICAP.
Admin Server
The following section provides all recommended settings for the Admin Server page. Only
fields and options with recommended settings will be addressed.
IMPORTANT: Fortra recommends not making the admin web portal publicly available.
1. Log in as an Admin User with the Product Administrator role. If your user account
is assigned to a custom Admin User Role, your ability to view, modify, or execute
actions on this page is based on the permissions specified for that role.
2. From the main menu, select System and then click the Admin Server link. From
the Admin Server page, click Edit to edit the Admin Server.
Listener
General Tab
Server Header
Set the Server Header name to something generic (such as 'Null', 'None', or 'Web
Server'). Information gathered from the header name can help attackers in
malicious activities.
SSL Tab
SSL Enabled
Enable. It is best practice to enable SSL on Listeners unless redirecting from
HTTP to HTTPS.
SSL Protocol
Use the default, TLS protocol.
Client Authentication
If all users are authenticating with certificates, set this option to 'Required'. If only
some users are authenticating with certificates, use 'Optional'. Otherwise, use
'None'.
Certificate Location
Import your company's private SSL key into the Key Management System and
apply them to the HTTPS listener. If a signed certificate is not available, create an
SSL certificate and apply it. Use the latest version of SSL certificate as possible
and the largest key size possible. If using certificate version 3, be sure that the
certificate extended key usage is set to an SSL/TLS server. See the HTTPS
Certificate Quick Start Guide in the GoAnywhere Admin User Guide for more
information.
Redirection Tab
HTTP/HTTPS traffic can be automatically redirected to the intended protocol, host
and/or port. The redirect process substitutes the appropriate portion of the URL
([protocol]://[host][:port]).
To securely redirect from HTTP to HTTPS, set up an HTTP listener and enable
redirection on that listener. Configure the redirection fields as necessary, set the
redirection protocol as HTTPS, and redirect to the existing HTTPS listener.
Database Configuration
The Database Configuration page displays the current database configuration and
provides options to edit the current database configuration or migrate the embedded
GoAnywhere database to an external database.
2. From the main menu, select System, and then click the Database Configuration
link.
WARNING:
Only perform the database switch when no other users are using GoAnywhere. The
migration will stop Monitors, Scheduled Jobs, Service Level Agreements, and Projects
from executing. Additionally, all services, Web User sessions, and the GoAnywhere
Gateway connection will be stopped.
See the Switch Database topic in the GoAnywhere User Guide for instructions on how to
switch databases.
NOTE:
You need to export the internal database’s certificate to a local file-based trust store,
then specify that trust store in your JDBC URL Example: &trustStore=C:\Program
Files\HelpSystems\GoAnywhere\userdata\keys\x509\trustedCertificates.jks&trustStor
ePassword=goanywhere
System Alerts
The following section provides recommendations for System Alerts settings. Only fields
and options with recommended settings will be addressed. The System Alert settings do
not directly affect the security of the application, however they can alert administrators to
potential security issues.
When system alerts are enabled, GoAnywhere can email Product Administrators when the
system is started, shut down, when memory is reaching a set threshold, the GoAnywhere
license is set to expire, or when changes are made to a GoAnywhere Cluster. System
Alerts are useful in pointing to stability and security issues.
2. From the main menu, select System, and then click the System Alerts link.
General Settings
System Alerts Enabled
Enable.
Administration
GoAnywhere Started
GoAnywhere Shutdown
JVM Memory
License Expiring
Web Users
Certificates
Certificate Expiring
PGP Keys
Triggers
Trigger Failed
Gateway
Gateway Connected
Gateway Disconnected
Clustering
IP Filter
The IP Filter page provides the options to create and configure the global IP filter list. To
manage IP filters, log in as an Admin User with the Security Officer role.
From the main menu, select System, and then click the IP Filter link.
Filter Entries
As a best practice, create a list of allowed addresses to limit who can connect to
GoAnywhere's Admin Client and hosted services.
IP Block Listing
The following section provides all recommendations for IP Block Listing settings. Only
fields and options with recommended settings will be addressed.
The Automatic IP Block List feature in GoAnywhere monitors the active services for
repeated unsuccessful access attempts. The Automatic IP Block List can detect brute-
force and denial of service (DoS) attacks, as well as monitor for malicious user names.
2. From the main menu, select System, and then click the Automatic IP Block List
link.
WARNING: Some networking devices may mask the true remote IP address of a client
connection. Please work with your networking team to ensure GoAnywhere MFT is
receiving the correct remote IP address. Receiving an incorrect IP may negatively
affect GoAnywhere’s IP Filter and IP Block Listing functionality.
To manage Automatic IP Block Lists Exemptions, log in as an Admin User with the
Security Officer role. If your user account is assigned to a custom Admin User
Role, your ability to view, modify, or execute actions on this page is based on the
permissions specified for that role.
From the main menu, select System, and then click the Automatic IP Block List
link. Click the Exemptions icon Exemptions button on the Automatic IP Block List
page.
For each security setting, the report will indicate if the setting meets the PCI-DSS standard
using one of the following statuses:
NOTE:
Running the Security Settings Audit Report requires the Advanced Reporting Module.
If you do not have access to this feature, reach out to your sales rep for temporary
access.
nonrepudiation
Creating a proof of the origin or delivery of data, thus preventing the recipient from
falsely denying that data has been received and preventing the sender from falsely
asserting that data has been sent.