Novell SENTINEL 6.1 SP2 - 02-2010 User Manual page 161

Table of Contents

Advertisement

Supported Products
ISS RealSecure Network
ISS RealSecure Server
ISS RealSecure Guard
Sourcefire* Snort*/Phalanx
Symantec* Network Security 4.0
(ManHunt*)
Symantec Intruder Alert
McAfee* IntruShield*
TippingPoint*
eEYE* Retina*
Foundstone* Foundscan*
ISS Database Scanner
ISS Internet Scanner
ISS System Scanner
ISS Wireless Scanner
Nessus*
nCircle IP360*
Qualys* QualysGuard*
Cisco IOS Firewall
To enable exploit detection, the Sentinel Collectors must populate several variables as expected.
Collectors built by Novell populate these variables by default.
In intrusion detection systems and vulnerability Collectors, the RV31 (DeviceName) variable
in the event must be set to the value in the RV31 column in
sensitive.
In the intrusion detection systems Collector, the DIP (Destination or Target IP) must be
populated with the IP address of the machine that is being attacked.
In the intrusion detection systems Collector, RT1 (DeviceAttackName) must be set to the attack
name or attack code for that intrusion detection system.
In the intrusion detection systems and vulnerability Collectors, RV39 (MSSPCustomerName)
value must be populated. For a standard corporation, the value can be anything. For a Managed
Security Service Provider (MSSP), the customer name should be set for the individual
customer. For either type of company, the value in the intrusion detection systems Collector
must exactly match with the value in the vulnerability Collector.
These values are used by the Mapping Service to populate the VULN field in the event. This value is
used to evaluate the incoming events to determine whether a vulnerability is exploited or not. When
the vulnerability field (VULN) equals 1, the asset or destination device is exploited. If the
vulnerability field equals 0, the asset or destination device is not exploited.
Device Type
IDS
IDS
IDS
IDS
IDS
IDS
IDS
IPS
VULN
VULN
VULN
VULN
VULN
VULN
VULN
VULN
VULN
FW
RV31 Value
XForce
XForce
XForce
Snort
ManHunt
Intruder
IntruShield
TippingPoint
Retina
Foundstone
XForce
XForce
XForce
XForce
Nessus
nCircle IP360
QualysGuard
Secure
Table
8-1. This string is case
Advisor Usage and Maintenance 161

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentinel 6.1 sp2

Table of Contents