Page 2
Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes.
Page 3
Novell Trademarks For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/ trademarks/tmlist.html). Third-Party Materials All third-party trademarks are the property of their respective owners.
The documentation for this product is available at http://www.novell.com/documentation/ sentinel61/index.html (http://www.novell.com/documentation/sentinel61/index.html) Additional documentation on developing collectors (proprietary or JavaScript) and JavaScript correlation actions is available at the Novell Developer Community web site: http:// developer.novell.com/wiki/index.php?title=Develop_to_Sentinel (http://developer.novell.com/ wiki/index.php?title=Develop_to_Sentinel) Documentation Conventions The following are the conventions used in this manual: ...
Page 14
For more information, see “Section Name” in “Chapter Name”, Name of the Guide (if in a different Guide). In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. ®...
Sentinel User Reference Introduction The Sentinel User Reference Guide is your reference for: Collector administrator functions Sentinel correlation engine Collector and Sentinel meta tags Sentinel command line options Sentinel console user permissions Sentinel server database views This guide assumes that you are familiar with Network Security, Database Administration and UNIX operating systems.
WARNING: Changing the default label for any variables other than Customer Variables may cause confusion when working with Novell Technical Services or other parties who are familiar with the default names. In addition, JavaScript Collectors built by Novell refer to the default labels described in this chapter and are not automatically updated to refer to new labels.
date: Collector Variable must be set with date as number of milliseconds from January 1, 1970 00:00:00 GMT. When displayed in Sentinel Control Center, meta-tags of type date are displayed in a regular date format. IPv4: IP address in dotted decimal notation (that is – xxx.xxx.xxx.xxx) ...
Filter Wizard displaying labels in drop-down and free-form language Figure 2-2 The representation of fields in the free-form RuleLG language is usually prefaced by “e.” for example, “e.InitUserName” or “e.sun” can refer to the Initiator User Name for the incoming or current event.
Page 20
Configuration Action - Select Event Attributes window Figure 2-3 When you type the label or short tag for a field to be used in an action, the name can be enclosed in percent signs (%tag%) or dollar signs ($tag$). For example: %sun% in a correlation action refers to the value of InitUser in the correlated event ...
Figure 2-4 2.1.3 Proprietary Collectors Proprietary Collectors, written in Novell’s own language, always use variables based on the short tag to refer to event fields. The short tag name must be prefaced by a letter and underscore, where the letter indicates the data type for the field (i_ for integer, s_ for string).
Page 22
Labels and Meta-tags used in Sentinel Control Center and proprietary Collector language Table 2-1 Filters and Menu and Proprietary Data Default Label Correlation Correlation Collector Description Type Rules Actions Language DeviceEventTimeString e.et %et% s_ET string The normalized date and time of the event, as reported by the sensor.
Page 23
Filters and Menu and Proprietary Data Default Label Correlation Correlation Collector Description Type Rules Actions Language CollectorScript e.agent %agent% string The name of the Collector Script used by the Collector to generate this event. Resource e.res %res% s_Res string Compliance monitoring hierarchy level 1 SubResource e.sres...
Page 24
Device specific attack name that matches attack name known by Advisor. Used in Exploit Detection. e.rt2 %rt2% s_RT2 string Reserved by Novell for expansion. Ct1 thru Ct2 e.ct1 thru %ct1% s_CT1 string Reserved for use by e.ct2 thru...
Page 25
CustomerHierarchyId e.rv1 %rv1% s_RV1 integer Used for MSSPs. ReservedVar2 thru e.rv2 thru %rv2% s_RV2 integer Reserved by Novell for thru expansion. ReservedVar10 e.rv10 thru %rv10% s_RV10 ReservedVar11 thru e.rv11 thru %rv11% s_RV11 date Reserved by Novell for thru expansion.
Page 26
InitDomain e.rv42 %rv42% s_RV42 string Domain portion of the initiating system's fully- qualified hostname. ReservedVar43 e.rv43 %rv43% s_RV43 string Reserved by Novell for expansion. TargetThreatLevel e.rv44 %rv44% s_RV44 string Target threat level. TargetUserDomain e.rv45 %rv45% s_RV45 string Domain (namespace) in which the target account exists..
Page 27
%rv62% s_RV62 string Criticality of the initiating system (0-5). Variables reserved for future e.rv63 thru %rv63% s_RV63 string Variables not currently in use by Novell e.rv75 thru thru s_rv75 %rv75% InitAssetDepartment e.rv76 %rv76% s_RV76 string Department of the initiating system.
Page 28
Default Label Correlation Correlation Collector Description Type Rules Actions Language Variables reserved for future e.rv101 %rv101% s_rv101 various Variables not currently in use by Novell thru thru thru e.rv200 %rv200% s_rv200 CustomerVar1 e.cv1 thru %cv1% s_CV1 integer Number variable reserved e.cv10 thru for customer use.
Page 29
Filters and Menu and Proprietary Data Default Label Correlation Correlation Collector Description Type Rules Actions Language CustomerVar111 thru e.cv111 %cv111% s_CV111 string Date variable reserved for CustomerVar120 thru thru thru customer use. Stored in e.cv120 %cv120% s_CV120 database. CustomerVar121 thru e.cv121 %cv121% s_CV121...
Sentinel Control Center User Permissions Sentinel allows administrators to set user permissions in the Sentinel Control Center at a granular level. The only user created by default is the esecadm, or Sentinel Administrator. All other users are created by the Sentinel Administrator, or someone with similar permissions. To change user permissions: 1 Log into the Sentinel Control Center as a user with “User Management”...
Page 32
6 Uncheck the checkboxes for which you want to restrict user. 7 Click OK. The permissions in the User Manager are grouped into several major categories: General (page 33) Active Views (page 34) iTRAC (page 35) Incidents (page 35) ...
Solution Pack (page 39) Identity (page 39) Each of these groups of setting is described in more detail below. 3.1 General Permissions-General Table 3-1 Permission Name Description Save Workspace Allows user to save preferences. If this permission is unavailable, user will never be prompted to save changes to preferences when logging out or exiting the Sentinel Control Center.
3.1.3 General – Integration Actions Permissions-General-Integration Actions Table 3-4 Permission Name Description Send to Remedy Help Desk Allows user to send events, incident and associated objects to Remedy. (requires the optional Remedy integration component) 3.2 Active Views Permissions-Active Views Table 3-5 Permission Name Description View Active Views Tab...
3.3 iTRAC Permissions-iTRAC Table 3-8 Permission Name Description View iTRAC Tab Allows user to see and use the iTRAC tab, menu and other related functions associated with the iTRAC tab. Activity Management Allows user to access the Activity Manager. Manage Work Items Of Users Gives user administrative control over all workitems, including those assigned to other users 3.3.1 iTRAC - Template Management...
Permission Name Description Create Incident(s) Allows user to create Incidents in the in the Incident View window or by right clicking on the incident and select Modify option. Alternatively you can select Create Incident menu item in the Incidents menu bar and clicking Create Incident option in the tool bar.
3.7 Event Source Management Permissions-Event Source Management Table 3-14 Permission Name Description View Status Allows user to view the status of ESM components. View Scratchpad Allows user to design and configure ESM components. Configure ESM Components Allows you to configure ESM components. Control ESM Components Allows you to control and manage ESM components.
3.10 Administration Permissions-Administration Table 3-17 Permission Name Description View Administration Tab Allows user to see and use the View Administration tab, menu and other related functions associated with the View Administration tab. DAS Statistics Allows user to view DAS activity (DAS binary and query). Event Configuration Allows user to rename columns, set mappings from mapping files.
Permission Name Description Control Servers Allows user to start, restart and stop processes. 3.11 Correlation Permissions-Correlation Table 3-20 Permission Name Description View Correlation Tab Allows user to use the Correlation functions. View/Use Correlation Rule Manager Allows user to start or stop the Correlation Rules. View/Use Correlation Engine Manager Allows user to deploy/undeploy the Correlation Rules.
Sentinel Correlation Engine RuleLG Language This section is about Sentinel correlation engine Rule LG language. 4.1 Correlation RuleLG Language Overview The Sentinel Correlation Engine runs rules that are written in the Correlation RuleLg language. Rules are created in the Sentinel Control Center. Users can create rules using a wizard for the following rule types: Simple Rule ...
WARNING: If you rename the label of a metatag, do not use the original label name when creating a correlation rule. 4.3 Event Operations Event operations evaluate, compare, and count events. They include the following operations: Filter: Evaluates the current to determine whether they could potentially trigger a rule to fire Window: Compares the current event to past events that have been stored in memory ...
Page 43
In addition to Boolean operators, filter supports the following operators. Standard Arithmetic Operators Standard arithmetic operators can be used to build a condition that compares the value of a Sentinel metatag and a user-specified value (either a numeric value or a string field). The standard arithmetic operators in Sentinel are =, <, >, !=, <=, and >=.
filter(e.evt="File Access" and not(e.sun inlist AuthorizedUsers)) ISNULL Operator The isnull operator returns true if the metatag value is equal to NULL. Example: Filter(isnull(e.SIP)) Output Sets The output of a filter is either the empty set (if the Boolean expression evaluates to false) or a ...
As another example, this rule is a domino type of rule. An attacker exploits a vulnerable system and uses it as an attack platform. window((e.sip = w.dip AND e.dp = w.dp AND e.evt = w.evt), 1h) This rule identifies a potential security breach after a denial of service attack. The rule fires if the destination of a denial of service attack has a service stopped within 60 seconds of the attack.
<number of events> is an integer value specifying the number of matching events that are necessary for the rule to fire <evaluation period> specifies the duration for which past events matching the filter expression are maintained, specified in seconds (s), minutes (m), or hours (h).
Subrule Rulelgs are the rulelg definitions for 1 to n subrules mode = all | any | 1 | 2 | … | n, which is the number of subrules that must be triggered in order for the gate rule to trigger <evaluation period>...
filter(e.sev = 5) flow trigger(3, 60) The output of the filter operation is the input of the trigger operation. The trigger only counts events with severity equal to 5. 4.5.2 Union Operator The union of the left side operation output set and the right side operation output set. The resulting output set contains events from either the left-hand side operation output set or the right-hand side operation output set without duplicates.
Operator Precedence Table 4-2 Operator Meaning Operator Type Associativity flow Output set becomes input set binary left to right intersection Set intersection (remove duplicates) binary left to right union Set union (remove duplicates) binary left to right 4.7 Differences between Correlation in 5.x and There are several new functionalities updated / included in 6.0 to widen the usage of Correlation to meet user’s requirements and for the ease-of-use.
Sentinel Data Access Service The Data Access Service (DAS) process is Sentinel Server's persistence service and provides a message bus interface to the database. Some of the services it provides are event storage, Historical Query, event drill down, vulnerability and Advisor data retrieval, and configuration manipulation. 5.1 DAS Container Files DAS is a collection of services provided by five different processes.
To Reconfigure Database Connection Properties: 1 Login to the machine where DAS is installed as the esecadm user on UNIX or a user with administrative rights on Windows. 2 Go to: For Windows: %ESEC_HOME%\bin For UNIX: $ESEC_HOME/bin 3 Provide the following command: For Windows: dbconfig –a %ESEC_HOME%\config [[-u username] [-p password] | [-winAuth]] [-h hostname] [-t portnum] [-d database] [-s server] [-help] [-version]...
Page 53
For UNIX: $ESEC_HOME/config These files contain the configuration that determines how the DAS processes will log messages. The most important part of the configuration is the logging levels, which indicate how verbose the log messages should be. The section of the file to configure these settings is: ###### Configure the logging levels # Logging level rules are read from the top down.
Replacing the default certificate with a CA-signed certificate Novell provides a self-signed certificate for the DAS_Proxy SSL Server to use. To improve security, you can replace the default, self-signed certificate that gets installed with a certificate signed by a Certificate Authority (CA).
Page 55
The basic steps are to get a CA to sign your certificate and then import that certificate into the keystore for DAS_Proxy to use. To import the certificate, the CA that signed the certificate must be “known” to the keytool utility. Keytool usually recognizes the major certificate authorities, but for other CA’s you may need to import a certificate or chain of certificates for the certificate authority before you can successfully import the certificate that DAS_Proxy uses.
Page 56
$ESEC_HOME/config/.proxyServerKeystore -file <cer_filename.cer> This will replace the self-signed certificate installed with Sentinel. 9 Restart Sentinel Server. Novell also recommends that you change the keystore and keyEntry passwords after replacing the certificate. Changing default keystore and keyEntry passwords By default, the passwords used for keystore and the keyEntry are both set to star1111. It is a good practice to change these to something new.
Page 57
3 Verify the keyEntry alias using the following command: $ESEC_HOME/jre/bin/keytool -list -keystore $ESEC_HOME/config/ .proxyServerKeystore Provide the current keystore password. The contents of the keystore file display: Keystore type: jks Keystore provider: SUN Your keystore contains 1 entry 10.0.0.1, Jan 8, 2008, keyEntry, Certificate fingerprint (MD5): 22:B4:19:63:AC:2D:F9:C0:66:7F:7C:64:85:68:89:AB The keyEntry alias is the IP address in the example above.
Page 58
Using a new .proxyServerKeystore location By default the certificate and private key are stored in the file located at .proxyServerKeystore . To change the location of file, you can edit the $ESEC_HOME/config .proxyServerKeystore value of the property “keystore” in the file $/ESEC_HOME/config/das_proxy.xml.
Sentinel Accounts and Password Changes This section discusses users that are created or used during Sentinel installation and normal Sentinel operations. Unless you create domain users in advance in order to use Windows Authentication, these users are created by the Sentinel installer. These user accounts are used for Sentinel’s normal operations, such as event inserts into the Sentinel database.
6.2 Password Changes Corporate policy might require that passwords be changed on a regular schedule. Sentinel user passwords can be changed using database utilities. After changing a password, some Sentinel components need to be updated to use the new password. 6.2.1 Changing Password This section discusses about changing password SQL Server Accounts...
Request a password change from a Windows administrator. 2 Follow the procedures in Sentinel updates after a password change. Sentinel Control Center Accounts (Native DB Authentication) This procedure can be used to change the password for the Sentinel Administrator account or any other Sentinel Control Center user.
Page 62
For more information on usage of the dbconfig utility, see Chapter 5, “Sentinel Data Access Service,” on page dbconfig –a {$ESEC_HOME/config | %ESEC_HOME%\config} -p <password> To update the Sentinel Application User password (Windows Authentication): 1 Change the password for the Sentinel Application User domain account as described in Section 6.2.1, “Changing Password,”...
Page 63
5 Click Set password. Provide the new password twice and click OK. Click Apply and click OK. Updating Sentinel Database User Password These password change procedures are only necessary if extra Sentinel Data Manager jobs have been created and scheduled or the Sentinel Data Manager command line interface is being used. To change Sentinel DB Administrator password (Windows Authentication): 1 Use the Windows Operating System to change the password as described in Section 6.2.1,...
Page 64
2 In order for automated SDM command line tasks to continue to work (if applicable in your environment), update the dbPass in the sdm.connect file with the new esecdba password using the SDM GUI or command line. For more information, see “Sentinel Data Manager” in Sentinel 6.1 User Guide.
(Crystal Reports*). Sentinel defines an event schema that is used to hold the parsed data received from event sources. For more information on the Sentinel Event schema, see Event schema (http://developer.novell.com/wiki/index.php/Event_schema). 7.1 Views Listed below are the views available with Sentinel. 7.1.1 ACTVY_PARM_RPT_V This view contains information about iTRAC activities.
Column Name Datatype Comment ACTVY_ID varchar2(36) Activity identifier ACTVY_PARM_ID varchar2(36) Activity parameter identifier CREATED_BY number(38,0) User who created the object DATE_CREATED Date Date the entry was created DATE_MODIFIED Date Date the entry was modified MODIFIED_BY number(38,0) User who last modified the object PARM_VAL varchar2(1000) Activity parameter value...
Column Name Datatype Comment OUTPUT_FORMATTER varchar2 (255) Output formatter APP_NAME varchar2 (25) Application name DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number (38,0) User who created object MODIFIED_BY number (38,0) User who last modified object 7.1.5 ADV_NXS_FEED_V This view contains information about the Advisor feed files that are processed on a regular schedule.
7.1.6 ADV_NXS_PRODUCTS_V ® This view contains information about all the products that are supported by Novell for Advisor, which include the Intrusion Detection System (IDS), Vulnerablility Scanners, and Knowledge Base (OSVDB, CVE, and Bugtraq). Column Name Datatype Comment PRODUCT_ID number The unique ID of the product.
Sentinel database. 7.1.8 ADV_NXS_MAPPINGS_V This view contains the mapping information for the products supported by Novell for Advisor. It provides information about the type of mapping between each product including the IDS product signatures, Vulnerability product signatures, and Knowledge Base product signatures.
Sentinel database. 7.1.9 ADV_OSVDB_DETAILS_V This view contains information about the known vulnerablities from the OSVDB for the products supported by Novell for Advisor. It also stores the classifications to which the vulnerability applies. Column Name Datatype Comment...
Page 71
Column Name Datatype Comment ATTACK_TYPE_CRYPT number (1, 0) This value is if the attack type is cryptographic. For example, weak encryption (implementation or algorithm), no encryption (plaintext), and sniffing. ATTACK_TYPE_DOS number (1, 0) This value is if the attack type is denial of service.
Page 72
Column Name Datatype Comment IMPACT_AVAILABLE number (1, 0) This value is if the impact of the attack is loss of availability of a service or information. IMPACT_UNKNOWN number (1, 0) This value is if the impact of the attack is unknown. EXPLOIT_AVAILABLE number (1, 0) This value is...
Column Name Datatype Comment PUBLISHED date Time stamp indicating when the vulnerability was published in the OSVDB. INSERTED date Time stamp indicating when the vulnerability was inserted in the vendor database. UPDATED date Time stamp indicating when the vulnerability was updated in the vendor database.
7.1.11 ADV_NXS_KB_PRODUCTSREF_V This view contains the information about the products that are affected by the vulnerability. Column Name Datatype Comment number The unique ID for the row. OSVDB_ID number The ID of the vulnerability in the OSVDB. VENDOR_NAME varchar2 (128 char) Name of the vendor of the product that is affected by the vulnerability.
7.1.13 ASSET_HOSTNAME_RPT_V This view references ASSET_HOSTNAME table that stores information about alternate host names for assets. Column Name Datatype Comment ASSET_HOSTNAME_ID varchar2(36) Asset alternate hostname identifier PHYSICAL_ASSET_ID varchar2(36) Physical asset identifier HOST_NAME varchar2(255) Host name CUST_ID number(38) Customer identifier DATE_CREATED date Date the entry was created DATE_MODIFIED...
Column Name Datatype Comment ADDRESS_LINE_2 varchar2(255) Address line 2 CITY varchar2(100) City STATE varchar2(100) State COUNTRY varchar2(100) Country ZIP_CODE varchar2(50) Zip code DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38) User who created object MODIFIED_BY number(38) User who last modified object...
Column Name Datatype Comment ASSET_VALUE_ID number(38) Asset value code ASSET_VALUE_NAME varchar2(50) Asset value name DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38) User who created object MODIFIED_BY number(38) User who last modified object 7.1.18 ASSET_X_ENTITY_X_ROLE_RPT_V This view references ASSET_X_ENTITY_X_ROLE table that associates a person or an organization to an asset.
Column Name Datatype Comment DATE_MODIFIED date Date the entry was modified CREATED_BY number User who created object MODIFIED_BY number User who last modified object 7.1.20 ATTACHMENTS_RPT_V This view references ATTACHMENTS table that stores attachment data. Column Name Datatype Comment ATTACHMENT_ID number Attachment identifier NAME...
Column Name Datatype Comment EVT_NAME varchar2(255) Event name varchar2(255) Event resource SRES varchar2(255) Event sub-resource varchar2(500) Event message CREATED_BY number(0) User who created object MODIFIED_BY number(0) User who last modified object DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified 7.1.22 CONFIGS_RPT_V This view references CONFIGS table that stores general configuration information of the...
Column Name Datatype Comment EMAIL varchar2(255) Contact e-mail PAGER varchar2(64) Contact pager CELL varchar2(64) Contact cell phone DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number User who created object MODIFIED_BY number User who last modified object 7.1.24 CORRELATED_EVENTS_RPT_V (legacy view) This view is provided for backward compatibility.
Column Name Datatype Comment DATE_MODIFIED date Date the entry was modified CREATED_BY number(38) User who created object MODIFIED_BY number(38) User who last modified object 7.1.27 CUST_HIERARCHY_V This view references CUST_HIERARCHY table that stores information about MSSP customer hierarchy. Column Name Datatype Comment CUST_HIERARCHY_ID...
Column Name Datatype Comment ENTITY_TYPE_CODE varchar2(5) Entity type code ENTITY_TYPE_NAME varchar2(50) Entity type name DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38) User who created object MODIFIED_BY number(38) User who last modified object 7.1.30 ENV_IDENTITY_RPT_V This view references ENV_IDENTITY_LKUP table that stores information about asset environment identity.
7.1.32 ESEC_CONTENT_GRP_RPT_V This view contains information about Solution Packs. Column Name Datatype Comment CONTENT_GRP_ID varchar2(36) Content group identifier CONTENT_GRP_NAME varchar2(255) Content group name CONTENT_GRP_DESC Clob Content group description CTRL_ID varchar2(36) Control identifier CONTENT_EXTERNAL_ID varchar2(255) Content external identifier DATE_CREATED Date Date the entry was created DATE_MODIFIED Date Date the entry was modified...
Column Name Datatype Comment CONTENT_TYP varchar2(100) Content type CONTENT_DESC Clob Content description CONTENT_CONTEXT Clob Content context CONTENT_HASH varchar2(255) Content hash DATE_CREATED Date Date the entry was created DATE_MODIFIED Date Date the entry was modified MODIFIED_BY number(38,0) User who last modified object CREATED_BY number(38,0) User who created object...
Column Name Datatype Comment CONTENT_EXTERNAL_ID varchar2(255) Content external identifier DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38,0) User who created object MODIFIED_BY number(38,0) User who last modified object 7.1.37 ESEC_DISPLAY_RPT_V This view references ESEC_DISPLAY table that stores displayable properties of objects. Currently used in renaming meta-tags.
7.1.38 ESEC_PORT_REFERENCE_RPT_V This view references ESEC_PORT_REFERENCE table that stores industry standard assigned port numbers. Column Name Datatype Comment PORT_NUMBER number http://www.iana.org/assignments/port-numbers (http://www.iana.org/assignments/port-numbers), the numerical representation of the port. This port number is typically associated with the Transport Protocol level in the TCP/IP stack. PROTOCOL_NUMBER number http://www.iana.org/assignments/protocol-...
Column Name Datatype Comment MODIFIED_BY number User who last modified object 7.1.40 ESEC_SEQUENCE_RPT_V This view references ESEC_SEQUENCE table that’s used to generate primary key sequence numbers for Sentinel tables. Column Name Datatype Comment TABLE_NAME varchar2(32) Name of the table. COLUMN_NAME varchar2(255) Name of the column SEED...
7.1.43 EVENTS_ALL_RPT_V1 (legacy view) This view is provided for backward compatibility. New reports should use EVENTS_RPT_V2. View contains current events. 7.1.44 EVENTS_RPT_V (legacy view) This view is provided for backward compatibility. New reports should use EVENTS_RPT_V2. View contains current and historical events. 7.1.45 EVENTS_RPT_V1 (legacy view) This view is provided for backward compatibility.
Reserved for future use by Novell. This field is used for Advisor information concerning attack descriptions. RESERVED_TAG_2 varchar2(255) Reserved for future use by Novell. Use of this field for any other purpose might result in data being overwritten by future functionality. RESERVED_TAG_3 integer Reserved for future use by Novell.
Page 90
User who last modified object RV01 - 10 integer Reserved Value 1 - 10 Reserved for future use by Novell. Use of this field for any other purpose might result in data being overwritten by future functionality. RV11 - 20...
Page 91
RV40 - 43 varchar2(255) Reserved Value 40 - 43 Reserved for future use by Novell. Use of this field for any other purpose might result in data being overwritten by future functionality. RV44...
Use of this field for any other purpose might result in data being overwritten by future functionality. RV49 varchar2(255) Reserved Value 49 Reserved for future use by Novell. Use of this field for any other purpose might result in data being overwritten by future functionality. TAXONOMY_ID integer...
Column Name Datatype Comment EVENT_DATETIME date EVENT_DEVICE_TIME date Event device time SENTINEL_PROCESS_TIME date Sentinel process time BEGIN_TIME date Events begin time END_TIME date Events end time REPEAT_COUNT number(38,0) TARGET_SERVICE_PORT number(38,0) Target service port INIT_SERVICE_PORT number(38,0) BASE_MESSAGE varchar2(4000) EVENT_NAME varchar2(255) EVENT_TIME varchar2(255) Event time CUST_ID...
Page 94
Column Name Datatype Comment RESERVED_TAG_1 varchar2(255) RESERVED_TAG_2 varchar2(255) RESERVED_TAG_3 number(38,0) VULNERABILITY_RATING number(38,0) CRITICALITY_RATING number(38,0) DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38,0) User who created object MODIFIED_BY number(38,0) User who last modified object RV01 number(38,0) EVENT_METRIC...
Page 95
Column Name Datatype Comment TARGET_OPERATIONAL_CONEXT varchar2(255) Target operational context RV49 varchar2(255) TAXONOMY_ID number(38,0) Taxonomy identifier REFERENCE_ID_01- number(38,0) REFERENCE_ID_20 CV01-CV10 number(38,0) CV11-CV20 date CV21- CV29 varchar2(255) CV30- CV34 varchar2(4000) CV35- CV100 varchar2(255) INIT_USER_ID varchar2(255) The initiating account's source-specific identifier as determined by the Collector based on raw device data.
7.1.49 EVT_AGENT_RPT_V3 View references EVT_AGENT table that stores information about Collectors. The column names in this view reflects the name change of Sensor to Observer. This view is designed for use in Sentinel 6.1. Column Name Datatype Comment AGENT_ID number(38,0) Collector identifier CUST_ID number(38,0)
Column Name Datatype Comment MAC_ADDRESS varchar2(100) MAC address RACK_NUMBER varchar2(50) Rack number ROOM_NAME varchar2(100) Room name BUILDING_NAME varchar2(255) Building name CITY varchar2(100) City STATE varchar2(100) State COUNTRY varchar2(100) Country ZIP_CODE varchar2(50) Zip code ASSET_CATEGORY_NAME varchar2(100) Asset category name NETWORK_IDENTITY_NAME varchar2(255) Asset network identity name ENVIRONMENT_IDENTITY_NAME varchar2(255)
Column Name Datatype Comment ASSET_DEPARTMENT varchar2(100) Asset department DATE_CREATED Date Date the entry was created DATE_MODIFIED Date Date the entry was modified CREATED_BY number(38,0) User who created object MODIFIED_BY number(38,0) User who last modified object 7.1.52 EVT_DEST_EVT_NAME_SMRY_1_RPT_V View summarizes event count by destination, taxonomy, event name, severity and event time. Column Name Datatype Comment...
Column Name Datatype Comment EVENT_NAME_ID number(38) Event name identifier RESOURCE_ID number(38) Resource identifier AGENT_ID number(38) Collector identifier PROTOCOL_ID number(38) Protocol identifier SEVERITY number(38) Event severity CUST_ID number(38) Customer identifier EVENT_TIME date Event time EVENT_COUNT number(38) Event count DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified...
Column Name Datatype Comment EVENT_NAME_ID number(38) Event name identifier EVENT_NAME varchar2(255) Event name DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38) User who created object MODIFIED_BY number(38) User who last modified object 7.1.56 EVT_PORT_SMRY_1_RPT_V View summarizes event count by destination port, severity and event time.
7.1.58 EVT_PRTCL_RPT_V3 View references EVT_PRTCL table that stores event protocol information. Column Name Datatype Comment PROTOCOL_ID number(38,0) Protocol identifier PROTOCOL varchar2(255) Protocol name DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38,0) User who created object MODIFIED_BY number(38,0) User who last modified object...
Column Name Datatype Comment DATE_MODIFIED date Date the entry was modified 7.1.63 EVT_SRC_MGR_RPT_V View contains information about the Event Source Management configuration. Column Name Datatype Comment EVT_SRC_MGR_ID varchar2(36) Event source manager identifier SENTINEL_ID varchar2(36) Sentinel identifier EVT_SRC_MGR_NAME varchar2(255) Event source manager name SENTINEL_HOST_ID varchar2(36) Sentinel host identifier...
Column Name Datatype Comment EVT_SRC_NAME varchar2(255) Event source name EVT_SRC_GRP_ID varchar2(36) Event source group identifier STATE_IND number(1,0) State indicator MAP_FILTER clob Map filter EVT_SRC_CONFIG clob Event source configuration CREATED_BY number(38,0) User who created object MODIFIED_BY number(38,0) User who last modified object DATE_CREATED date Date the entry was created...
Column Name Datatype Comment USER_NAME varchar2(255) User name USER_DOMAIN varchar2(255) CUST_ID number(38) Customer identifier DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38) User who created object MODIFIED_BY number(38) User who last modified object 7.1.70 EVT_XDAS_TXNMY_RPT_V Column Name Datatype...
Column Name Datatype Comment EXTERNAL_DATA_TYPE varchar2(10) External data type DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number User who created object MODIFIED_BY number User who last modified object 7.1.72 HIST_CORRELATED_EVENTS_RPT_V (legacy view) This view is provided for backward compatibility.
Average of all the event severities that comprise an incident. VULNERABILITY_RATING varchar2(32) Reserved for future use by Novell. Use of this field for any other purpose might result in data being overwritten by future functionality. CRITICALITY_RATING varchar2(32) Reserved for future use by Novell. Use of this field for any other purpose might result in data being overwritten by future functionality.
Column Name Datatype Comment MODIFIED_BY number User who last modified object INC_DESC varchar2(4000) Incident description INC_CAT varchar2(255) Incident category INC_PRIORITY number Incident priority INC_RES varchar2(4000) Incident resolution 7.1.78 INCIDENTS_VULN_RPT_V View references INCIDENTS_VULN table that stores information about the vulnerabilities that makeup incidents created in the Sentinel Console.
Column Name Datatype Comment TEXT varchar2(4000) Log text 7.1.81 MSSP_ASSOCIATIONS_V View references MSSP_ASSOCIATIONS table that associates an number key in one table to a UUID in another table. Column Name Datatype Comment TABLE1 varchar2(64) Table name 1 number(38) TABLE2 varchar2(64) Table name 2 varchar2(36) DATE_CREATED...
Column Name Datatype Comment CUST_ID number(38) Customer identifier DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38) User who created object MODIFIED_BY number(38) User who last modified object 7.1.84 PERSON_RPT_V View references PERSION table that stores personal (asset) information. Column Name Datatype Comment...
Column Name Datatype Comment ROOM_NAME varchar2(100) Room name DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38) User who created object MODIFIED_BY number(38) User who last modified object 7.1.86 PRODUCT_RPT_V View references PRDT table that stores asset product information. Column Name Datatype Comment...
Column Name Datatype Comment SENTINEL_HOST_ID varchar2(36) Sentinel host identifier SENTINEL_ID varchar2(36) Sentinel identifier SENTINEL_HOST_NAME varchar2(255) Sentinel host name HOST_NAME varchar2(255) Host name IP_ADDR varchar2(255) Host IP address HOST_OS varchar2(255) Host operating system HOST_OS_VERSION varchar2(255) Host operating system version MODIFIED_BY number(38,0) User who last modified object CREATED_BY number(38,0)
Column Name Datatype Comment TERMINAL_FLAG varchar2(1) Indicates if state of incident is resolved. DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified MODIFIED_BY number User who last modified object CREATED_BY number User who created object 7.1.94 UNASSIGNED_INCIDENTS_RPT_V View references CASES and INCIDENTS tables to report on unassigned cases.
Column Name Datatype Comment STT_ID number State ID. Status is either active or inactive. DESCRIPTION varchar2(512) Comments DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number User who created object MODIFIED_BY number User who last modified object PERMISSIONS varchar2(4000) Permissions currently assigned to the Sentinel user...
Column Name Datatype Comment IDENTITY_GUID varchar2(36) Identity identifier ATTRIBUTE_NAME varchar2(255) Attribute name ATTRIBUTE_VALUE varchar2(1024) Attribute value 7.1.98 USR_IDENTITY_RPT_V View contains user identity information from an identity management system. Column Name Datatype Comment IDENTITY_GUID varchar2(36) Identity identifier varchar2(255) Distinguished name CUST_ID number(38,0) Customer identifier SRC_IDENTITY_ID...
Column Name Datatype Comment VENDOR_ID number(38) Vendor identifier VENDOR_NAME varchar2(255) Vendor name DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38) User who created object MODIFIED_BY number(38) User who last modified object 7.1.100 VULN_CALC_SEVERITY_RPT_V View references VULN_RSRC and VULN to calculate eSecurity vulnerability severity rating base on current vulnerabilities.
Column Name Datatype Comment MODIFIED_BY number User who last modified object 7.1.102 VULN_INFO_RPT_V View references VULN_INFO table that stores additional information reported during a scan. Column Name Datatype Comment VULN_INFO_ID varchar2(36) Vulnerability info identifier VULN_ID varchar2(36) Vulnerability identifier VULN_INFO_TYPE varchar2(36) Vulnerability info type VULN_INFO_VALUE varchar2(2000)
Column Name Datatype Comment DETECTED_OS_VERSION varchar2(64) Operating system version of scanned machine SCANNED_APP varchar2(64) SCANNED_APP_VERSION varchar2(64) VULN_USER_NAME varchar2(64) Username used by scanner VULN_USER_DOMAIN varchar2(64) Domain of user used by scanned VULN_TAXONOMY varchar2(1000) SCANNER_CLASSIFICATION varchar2(255) VULN_NAME varchar2(300) VULN_MODULE varchar2(64) DATE_CREATED date Date the entry was created DATE_MODIFIED date...
Column Name Datatype Comment MODIFIED_BY number User who last modified object 7.1.105 VULN_RSRC_SCAN_RPT_V View references VULN_RSRC_SCAN table that stores each resource scanned for a particular scan. Column Name Datatype Comment RSRC_ID varchar2(36) Resource identifier SCAN_ID varchar2(36) Vulnerability scan identifier DATE_CREATED date Date the entry was created DATE_MODIFIED...
Column Name Datatype Comment VULN_ID varchar2(36) Vulnerability identifier DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number User who created object MODIFIED_BY number User who last modified object 7.1.108 VULN_SCANNER_RPT_V View references VULN_SCANNER table that stores information about vulnerability scanners. Column Name Datatype Comment...
7.1.110 WORKFLOW_INFO_RPT_V Column Name Datatype Comment INFO_ID number(38,0) Info identifier PROCESS_DEF_ID varchar2(100) Process definition identifier PROCESS_INSTANCE_ID varchar2(150) Process instance identifier DATE_CREATED date Date the entry was created DATE_MODIFIED date Date the entry was modified CREATED_BY number(38,0) User who created object MODIFIED_BY number(38,0) User who last modified object...
(Crystal Reports). Sentinel defines an event schema that is used to hold the parsed data received from event sources. For more information on Sentinel Event schema, see Event schema (http://developer.novell.com/wiki/index.php/Event_schema). 8.1 Views Listed below are the views available with Sentinel. 8.1.1 ACTVY_PARM_RPT_V...
Column Name Datatype Comment ACTVY_PARM_ID uniqueidentifier Activity parameter identifier PARM_VAL varchar/nvarchar(1000) Activity parameter value DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.3 ACTVY_REF_RPT_V Column Name Datatype Comment...
ID of the user who modified the feed file information in the Sentinel database. 8.1.6 ADV_NXS_PRODUCTS_V This view contains information about all the products that are supported by Novell® for Advisor, which include the Intrusion Detection System (IDS), Vulnerablility Scanners, and Knowledge Base (OSVDB, CVE, and Bugtraq).
ID of the user who modified the product information in the Sentinel database. 8.1.7 ADV_NXS_SIGNATURES_V This view contains the information about the list of signatures for each product that is supported by Novell for Advisor. Column Name Datatype Comment PRODUCT_ID numeric The unique ID of the product.
Sentinel database. 8.1.8 ADV_NXS_MAPPINGS_V This view contains the mapping information for the products supported by Novell for Advisor. It provides information about the type of mapping between each product including the IDS product signatures, Vulnerability product signatures, and Knowledge Base product signatures.
ID of the user who modified the mapping information in the Sentinel database. 8.1.9 ADV_OSVDB_DETAILS_V This view contains information about the known vulnerablities from the OSVDB for the products supported by Novell for Advisor. It also stores the classifications to which the vulnerability applies. Column Name Datatype Comment OSVDB_ID The unique ID of the vulnerability in the OSVDB.
Page 131
Column Name Datatype Comment ATTACK_TYPE_MISS_CONFIG This value is 1 if the attack type is misconfiguration. For example, default files, debugging enabled, and directory indexing. ATTACK_TYPE_RACE This value is 1 if the attack type is race condition. For example, symlink. ATTACK_TYPE_OTHER This value is 1 if the attack type does not fall under any of the above attack types.
Column Name Datatype Comment ATTACK_SCENARIO text Description of how a vulnerability can be exploited. SOLUTION_DESCRIPTION text Description of the solution that is used to fix the vulnerability. FULL_DESCRIPTION text The complete description of the vulnerability. LOCATION_PHYSICAL This value is 1 if the vulnerability can be exploited with only physical system access.
Column Name Datatype Comment REF_VALUE text The URL that has the patch information. DATE_CREATED datetime Time stamp indicating when the patch information was entered in the Sentinel database. DATE_MODIFIED datetime Time stamp indicating when the patch information was modified in the Sentinel database.
Column Name Datatype Comment ACTION varchar/nvarchar(255) Action DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified MODIFIED_BY User who last modified object CREATED_BY User who created object 8.1.13 ASSET_CATEGORY_RPT_V View references ASSET_CTGRY table that stores information about asset categories. Column Name Datatype Comment...
Column Name Datatype Comment ASSET_IP_ID uniqueidentifier Asset alternate IP identifier PHYSICAL_ASSET_ID uniqueidentifier Physical asset identifier IP_ADDRESS Asset IP address CUST_ID bigint Customer identifier DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.16 ASSET_LOCATION_RPT_V...
Column Name Datatype Comment ENTITY_TYPE_CODE varchar/nvarchar(5) Entity type code PERSON_ROLE_SEQUENCE Order of persons under a particular role DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.20 ASSOCIATIONS_RPT_V View references ASSOCIATIONS table that associates users to incidents, incidents to annotations and so on.
Column Name Datatype Comment DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.22 AUDIT_RECORD_RPT_V View reference AUDIT_RECORD table that stores Sentinel internal audit data. Column Name Datatype Comment AUDIT_ID uniqueidentifier Audit record identifier AUDIT_TYPE varchar/nvarchar(255)
Column Name Datatype Comment VALUE varchar/nvarchar(255) Text value if any DATA ntext XML data DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.24 CONTACTS_RPT_V View references CONTACTS table that stores contact information.
Column Name Datatype Comment PARENT_EVT_ID uniqueidentifier Event Universal Unique Identifier (UUID) of parent event CHILD_EVT_ID uniqueidentifier Event Universal Unique Identifier (UUID) of child event PARENT_EVT_TIME datetime Parent event time CHILD_EVT_TIME datetime Child event time DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified...
Column Name Datatype Comment CUST_HIERARCHY_LVL2 varchar/nvarchar (255) Customer hierarchy level 2 CUST_HIERARCHY_LVL3 varchar/nvarchar (255) Customer hierarchy level 3 CUST_HIERARCHY_LVL4 varchar/nvarchar (255) Customer hierarchy level 4 DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object...
Column Name Datatype Comment ENVIRONMENT_IDENTITY_ID bigint Environment identity code ENV_IDENTITY_NAME varchar/nvarchar(255) Environment identity name DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.32 ESEC_CONTENT_GRP_CONTENT_RPT_V Column Name Datatype Comment...
8.1.34 ESEC_CONTENT_PACK_RPT_V Column Name Datatype Comment CONTENT_PACK_ID uniqueidentifier Content pack identifier CONTENT_PACK_DESC text Content pack description CONTENT_PACK_NAME varchar/nvarchar(255) Content pack name CONTENT_EXTERNAL_ID varchar/nvarchar(255) Content external identifier DATE_MODIFIED datetime Date the entry was modified DATE_CREATED datetime Date the entry was created CREATED_BY User who created object MODIFIED_BY...
Column Name Datatype Comment CONTENT_EXTERNAL_ID varchar/nvarchar(255) Content external identifier DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.37 ESEC_CTRL_RPT_V Column Name Datatype Comment CTRL_ID uniqueidentifier Control identifier...
Column Name Datatype Comment ENABLED Indicates if the tag is shown. TYPE Indicates datatype of tag. 1 = string 2 = ulong 3 = date 4 = uuid 5 = ipv4 DESCRIPTION varchar/nvarchar(255) Textual description of the tag DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime...
Column Name Datatype Comment CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.40 ESEC_PROTOCOL_REFERENCE_RPT_V View references ESEC_PROTOCOL_REFERENCE table that stores industry standard assigned protocol numbers. Column Name Datatype Comment PROTOCOL_NUMBER http://www.iana.org/assignments/ protocol-numbers (http://www.iana.org/ assignments/protocol-numbers), the numerical identifiers used to represent protocols that are encapsulated in an IP packet.
8.1.42 ESEC_UUID_UUID_ASSOC_RPT_V Column Name Datatype Comment OBJECT1 varchar/nvarchar(64) Object 1 uniqueidentifier UUID for object 1 OBJECT2 varchar/nvarchar(64) Object 2 uniqueidentifier UUID for object 2 DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.43 EVENTS_ALL_RPT_V (legacy view)
Page 148
Column Name Datatype Comment RESOURCE_NAME varchar/nvarchar(255) Resource name SUB_RESOURCE varchar/nvarchar(255) Subresource name SEVERITY The normalized Sentinel event severity (0- EVENT_PARSE_TIME datetime The absolute time, according to Sentinel, that this event occurred EVENT_DATETIME datetime Event time EVENT_DEVICE_TIME datetime A timestamp representation of the time the event occurred, according to the event source SENTINEL_PROCESS_TIME...
Page 149
Column Name Datatype Comment DESTINATION_USER_NAME varchar/nvarchar(255) Destination user name FILE_NAME varchar/nvarchar(1000) The name of the data object (file, database table, directory object, etc) that was affected by this event. EXTENDED_INFO varchar/nvarchar(1000) A name-value pair field that holds extra information about the event, which does not fit into the existing event schema CUSTOM_TAG_1 varchar/nvarchar(255)
Page 150
Column Name Datatype Comment RV26 - 31 varchar/nvarchar(255) Reserved Value 26 - 31 Reserved for future use by Sentinel. Use of this field for any other purpose might result in data being overwritten by future functionality. RV33 varchar/nvarchar(255) Reserved Value 33 Reserved for EventContex Use of this field for any other purpose might result in data being overwritten by...
Page 151
Column Name Datatype Comment RV40 - 43 varchar/nvarchar(255) Reserved Value 40 - 43 The ID or code used by the vendor to reference that specific event type. Reserved for future use by Sentinel. Use of this field for any other purpose might result in data being overwritten by future functionality.
Column Name Datatype Comment REFERENCE_ID 01 - 20 bigint Reserved for future use by Sentinel. Use of this field for any other purpose might result in data being overwritten by future functionality. CV01 - 10 Custom Value 1 - 10 Reserved for use by Customer, typically for association of Business relevant data CV11 - 20...
Page 153
Column Name Datatype Comment End_Time datetime The time the event completed, if the event represents a lengthy transaction Target_Service_Port The numeric network port accessed on the target Event_Time varchar/nvarchar(255) A string representation of the time the event occurred, according to the event source Init_Asset_id bigint...
Page 154
Column Name Datatype Comment Target_Trust_Sys_Id varchar/nvarchar(255) Target trust ID Target_Trust_Domain varchar/nvarchar(255) The domain (namepsace) within which the target trust exists Observer_Ip The IP address of the observer (sensor) that detected the event Reporter_Ip The IP address of the reporter (the system that delivered the event to Sentinel) Observer_Host_Domain...
Page 155
Column Name Datatype Comment RV21-RV28 varchar/nvarchar(255) Init_IP_Country varchar/nvarchar(255) The country where the IPv4 address of the initiating system is located Target_IP_Country varchar/nvarchar(255) The country where the IPv4 address of the target system is located RV31 varchar/nvarchar(255) RV33 RV36 RV40 RV43 RV46 RV49 Init_Threat_Level...
Column Name Datatype Comment CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.51 EVT_AGENT_RPT_V3 Column Name Datatype Comment Agent_ID bigint Collector identifier Cust_ID bigint Customer identifier Agent varchar/nvarchar(64) Collector Port varchar/nvarchar(64) Port Reporter_Host_Name varchar/nvarchar(255) The unqualified hostname of the reporter of the event (ReporterName) Sensor_Type varchar/nvarchar(5)
Column Name Datatype Comment Reference_Asset_IDvarchar/ Reference asset identifier, links to Reference_Asset_IDvarchar/ nvarchar(100) source asset management nvarchar(100) system. Mac_Address varchar/nvarchar(100) MAC address Rack_Number varchar/nvarchar(50) Rack number Room_Name varchar/nvarchar(100) Room name Building_Name varchar/nvarchar(255) Building name City varchar/nvarchar(100) City State varchar/nvarchar(100) State Country varchar/nvarchar(100) Country Zip_Code...
Asset_Department varchar/nvarchar(100) Asset department DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.54 EVT_DEST_EVT_NAME_SMRY_1_RPT_V View summarizes event count by destination, taxonomy, event name, severity and event time. Column Name Datatype Comment Destination_IP Destination IP address...
Column Name Datatype Comment Event_Count Event count Date_Created datetime Date the entry was created Date_Modified datetime Date the entry was modified Created_By User who created object Modified_By User who last modified object Destination_Host_Name varchar/nvarchar(255) Destination host name 8.1.57 EVT_NAME_RPT_V View references EVT_NAME table that stores event name information. Column Name Datatype Comment...
8.1.59 EVT_PORT_SMRY_1_RPT_V View summarizes event count by destination port, severity and event time. Column Name Datatype Comment Destination_Port varchar/nvarchar(32) Destination port Severity The normalized Sentinel event severity (0-5) Cust_ID bigint Customer identifier Event_Time datetime A string representation of the time the event occurred, according to the event source Event_Count...
Column Name Datatype Comment DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.62 EVT_SEV_SMRY_1_RPT_V View summarizes event count by severity and event time. Column Name Datatype Comment...
Column Name Datatype Comment OFFSET_VAL ntext Offset value OFFSET_TIMESTAMP datetime Offset timestamp CREATED_BY User who created object MODIFIED_BY User who last modified object DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified 8.1.67 EVT_SRC_RPT_V Column Name Datatype Comment EVT_SRC_ID...
Column Name Datatype Comment Agent_ID bigint Collector identifier Protocol _ID bigint Protocol identifier Severity The normalized Sentinel event severity (0- CUST_ID bigint Customer identifier Event_Time datetime A string representation of the time the event occurred, according to the event source XDAS_Taxonomy_id bigint XDAS taxonomy id...
Column Name Datatype Comment Xdas_Provider The XDAS Provider ID; refer to XDAS specifications Xdas_Class The XDAS Event Class ID; refer to XDAS specifications Xdas_Identifier The XDAS Event Identifier; refer to XDAS specifications Xdas_Outcome The XDAS major outcome; success, failure, or denial Xdas_Detail The XDAS outcome detail;...
Column Name Datatype Comment CHILD_EVT_ID uniqueidentifier Event Universal Unique Identifier (UUID) of child event PARENT_EVT_TIME datetime Parent event created time CHILD_EVT_TIME datetime Child event created time DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY...
Page 170
Column Name Datatype Comment END_TIME datetime The time the event completed, if the event represents a lengthy transaction REPEAT_CNT The number of times the identical event occurred DP_INT SP_INT varchar/nvarchar(255) Resolution SRES varchar/nvarchar(255) Severity varchar/nvarchar(255) Events varchar/nvarchar(255) varchar/nvarchar(255) varchar/nvarchar(32) varchar/nvarchar(255) varchar/nvarchar(32) varchar/nvarchar(255) varchar/nvarchar(255)
Page 171
Column Name Datatype Comment TRGT_USR_SYS_ID varchar/nvarchar(255) TRGT_USR_IDENTITY_GUID uniqueidentifier EFFECTIVE_USR_NAME varchar/nvarchar(255) EFFECTIVE_USR_SYS_ID varchar/nvarchar(255) EFFECTIVE_USR_DOMAIN varchar/nvarchar(255) TRGT_TRUST_NAME varchar/nvarchar(255) TRGT_TRUST_SYS_ID varchar/nvarchar(255) TRGT_TRUST_DOMAIN varchar/nvarchar(255) OBSRVR_IP RPTR_IP OBSRVR_HOST_DOMAIN varchar/nvarchar(255) RPTR_HOST_DOMAIN varchar/nvarchar(255) OBSRVR_ASSET_ID varchar/nvarchar(255) RPTR_ASSET_ID varchar/nvarchar(255) INIT_SRVC_COMP varchar/nvarchar(255) TARGET_SRVC_COMP varchar/nvarchar(255) EVT_GRP_ID varchar/nvarchar(255) DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified...
Column Name Datatype Comment CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.80 INCIDENTS_EVENTS_RPT_V View references INCIDENTS_EVENTS table that stores information about the events that makeup incidents created in the Sentinel Console. Column Name Datatype Comment INC_ID Incident identifier –...
Column Name Datatype Comment VULNERABILITY_RATING varchar/nvarchar(32) Reserved for future use by Sentinel. Use of this field for any other purpose might result in data being overwritten by future functionality. CRITICALITY_RATING varchar/nvarchar(32) Reserved for future use by Sentinel. Use of this field for any other purpose might result in data being overwritten by future functionality.
8.1.84 LOGS_RPT_V View references LOGS_RPT table that stores logging information. Column Name Datatype Comment LOG_ID Sequence number TIME datetime Date of Log MODULE varchar/nvarchar(64) Module log is for TEXT varchar/nvarchar(4000) Log ntext 8.1.85 MSSP_ASSOCIATIONS_V View references MSSP_ASSOCIATIONS table that associates an integer key in one table to a uuid in another table.
8.1.87 ORGANIZATION_RPT_V View references ORGANIZATION table that stores organization (asset) information. Column Name Datatype Comment ORGANIZATION_ID uniqueidentifier Organization identifier ORGANIZATION_NAME varchar/nvarchar(100) Organization name CUST_ID bigint Customer identifier DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY...
Column Name Datatype Comment IP_ADDRESS IP address NETWORK_IDENTITY_ID bigint Network identity code MAC_ADDRESS varchar/nvarchar(100) MAC address RACK_NUMBER varchar/nvarchar(50) Rack number ROOM_NAME varchar/nvarchar(100) Room name DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.90 PRODUCT_RPT_V...
8.1.95 SENTINEL_PLUGIN_RPT_V Column Name Datatype Comment SENTINEL_PLUGIN_ID uniqueidentifier Sentinel plugin identifier SENTINEL_PLUGIN_NAME varchar/nvarchar(255) Sentinel plugin name SENTINEL_PLUGIN_TYPE varchar/nvarchar(255) Sentinel plugin type FILE_NAME varchar/nvarchar(512) The name of the data object (file, database table, directory object, etc) that was affected by this event. CONTENT_PKG ntext Content package...
Column Name Datatype Comment CONTEXT varchar/nvarchar(64) Context of the state. That is case, incident, user. NAME varchar/nvarchar(64) Name of the state. TERMINAL_FLAG varchar/nvarchar(1) Indicates if state of incident is resolved. DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified MODIFIED_BY User who last modified object CREATED_BY...
Column Name Datatype Comment USR_ID User identifier – Sequence number NAME varchar/nvarchar(64) Short, unique user name used as a login CNT_ID Contact ID – Sequence number STT_ID State ID. Status is either active or inactive. DESCRIPTION varchar/nvarchar(512) Comments PERMISSIONS varchar/nvarchar(4000) Permissions currently assigned to the Sentinel user FILTER...
Column Name Datatype Comment VENDOR_ID bigint Vendor identifier VENDOR_NAME varchar/nvarchar(255) Vendor name DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.104 VULN_CALC_SEVERITY_RPT_V View references VULN_RSRC and VULN to calculate eSecurity vulnerability severity rating base on current vulnerabilities.
Column Name Datatype Comment MODIFIED_BY User who last modified object 8.1.106 VULN_INFO_RPT_V View references VULN_INFO table that stores additional information reported during a scan. Column Name Datatype Comment VULN_INFO_ID uniqueidentifier VULN_ID uniqueidentifier Vulnerability identifier VULN_INFO_TYPE varchar/nvarchar(36) VULN_INFO_VALUE varchar/nvarchar(2000) DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime...
Column Name Datatype Comment DETECTED_OS_VERSION varchar/nvarchar(64) SCANNED_APP varchar/nvarchar(64) SCANNED_APP_VERSION varchar/nvarchar(64) VULN_USER_NAME varchar/nvarchar(64) VULN_USER_DOMAIN varchar/nvarchar(64) VULN_TAXONOMY varchar/nvarchar(1000) SCANNER_CLASSIFICATION varchar/nvarchar(255) VULN_NAME varchar/nvarchar(300) VULN_MODULE varchar/nvarchar(64) DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.108 VULN_RSRC_RPT_V...
8.1.109 VULN_RSRC_SCAN_RPT_V View references VULN_RSRC_SCAN table that stores each resource scanned for a particular scan. Column Name Datatype Comment RSRC_ID uniqueidentifier SCAN_ID uniqueidentifier DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.1.110 VULN_SCAN_RPT_V...
Column Name Datatype Comment MODIFIED_BY User who last modified object 8.1.112 VULN_SCANNER_RPT_V View references VULN_SCANNER table that stores information about vulnerability scanners. Column Name Datatype Comment SCANNER_ID uniqueidentifier PRODUCT_NAME varchar/nvarchar(100) The basic name of the product that the Collector processing this event is designed to handle PRODUCT_VERSION varchar/nvarchar(64)
Column Name Datatype Comment PROCESS_INSTANCE_ID varchar/nvarchar(150) Process instance identifier DATE_CREATED datetime Date the entry was created DATE_MODIFIED datetime Date the entry was modified CREATED_BY User who created object MODIFIED_BY User who last modified object 8.2 Deprecated Views The following legacy views are no longer created in the Sentinel 6 database: ADV_ALERT_CVE_RPT_V ...
Page 189
Checklist Table A-1 Checklist Item Information Example Novell Version: V6.0 Novell Platform and OS Version: SuSE Linux Enterprise Server 10 Database Platform and OS Oracle 10.2.0.3 with critical patch Version: #5881721 Sentinel Server Hardware 4 CPU @ 3 GHz...
Page 190
Make sure the Sonic broker is running. Connectivity can be verified using the Sonic management console. Check that the various connections are active from Novell processes. Make sure that a lock file is not preventing Sonic from starting. Optionally telnet to that server on the sonic port (that is telnet sentinel.company.com 10012)
Page 191
Does the database allow a sqlplus login using the Novell dba account into the ESEC schema? Does querying on one of the table succeed? Does a select statement on a database table succeed? Check the JDBC drivers, their locations and class path settings.
Sentinel Service Logon Account The purpose of this document is to describe in detail of how to set up Sentinel service logon account as NT AUTHORITY\NetworkService instead of Domain user account. This has been tested on the Windows 2003 platform only. B.1 Sentinel Services Sentinel Services should be set to run in order to use Sentinel application.
3 If a service account is renamed, locked out, disabled, or deleted, the service cannot start on that computer until the account is reset. Because of the above disadvantages, Novell has tested out running Sentinel service under NT AUTHORITY\NetworkService account. NT AUTHORITY\LocalService account does not have enough privilege for this purpose, because DAS processes need to communicate to database server on the network.
B.3 To Setup NT AUTHORITY\NetworkService as the Logon Account for Sentinel Service To setup NT AUTHORITY\NetworkService as the logon account for Sentinel service, you need to perform the following: Add the machine that runs Sentinel Service as a login account to ESEC and ESEC_WF ...
Page 196
4 In the Login-New window, provide the Login name. Alternatively, you can click the Search button next to the Login name field. The following screen displays: 196 Sentinel 6.1 Reference Guide...
Page 197
5 In the Enter the object name to select field, provide a domain name and user name (secnet\case1$ is provided as an example). This is the machine <domain name>\<name of machine>$ you are adding as a login to the database server. Click OK. 6 Click Server Roles in the Select a page navigation pane.
Click OK. B.3.2 Changing logon account To change the logon for Sentinel Service to NT AUTHORITY\NetworkService: 1 On your remote machine you are connecting to the database, click Start > Programs > Administrative Tools > Services. 2 Stop the Sentinel service, right-click > Properties > Log On tab. 3 Click This account and in the field provide .
4 Click OK. The Services window for the Sentinel Service should indicate Network Service under the Log On As column. B.3.3 Setting the Sentinel Service to Start Successfully In order for the Sentinel Service to start successfully, NT AUTHORITY\NetworkService account should have write permission to %ESEC_HOME%.
Page 200
You must grant write access to %ESEC_HOME% to the Users group. To set the Sentinel Service to start successfully: 1 Open Window’s Explorer and navigate to %ESEC_HOME%. 2 Right-click the Sentinel parent folder (Typically named sentinel6) > Properties > Security tab. 3 Highlight Users group.
Sentinel Service Permission Tables The purpose of this document is to describe in detail various Sentinel Services and the Permissions they require for their functioning. C.1 Advisor Table C-1: Advisor Table C-1 Sentinel Sentinel Function Permission's Permission Sentinel Service Component Process summary required...
C.2 Collector Manager Collector Manager Table C-2 Sentinel Sentinel Function Permissions Permission Sentinel Service Component Process summary required Explanation Collector Sentinel java Manages Network access Manager Connectors and communicates (both outgoing agentengine Collectors. It access and with iSCALE for (child process) spawns off an local access to configuration,...
C.3 Correlation Engine Correlation Engine Table C-3 Sentinel Sentinel Function Permission's Permission Sentinel Service Component Process summary required Explanation Correlation Sentinel java Receives Network access Engine events from the communicates File read Collector over the access to: Manager and network with publishes iSCALE for ...
C.4 Data Access Server (DAS) DATA Access Server (DAS) Table C-4 Sentinel Sentinel Function Permission's Permission Sentinel Service Component Process summary required Explanation Sentinel java Responsible for Network access It connects to (das_binary) event insertion. the database to Database read and insert java Provides Access...
C.5 Sentinel Communication Server Sentinel Communication Server Table C-5 Sentinel Sentinel Sentinel Permission's Permission Function summary Component Service Process required Explanation Communication Sentine java (Sonic) iSCALE: A Network access It binds to local Server (iSCALE / Message Oriented (binds to port ports to accept MOM) Middleware...
C.6 Sentinel Service Sentinel Service Table C-6 Sentinel Sentinel Function Permission's Permission Sentinel Service Component Process summary required Explanation Sentinel Sentinel wrapper Registers as a Network access Service service with the communicates File read operating over the access to: system and, network with when executed, iSCALE for...
Sentinel Database Users, Roles, and Access Permissions The purpose of this document is to provide a detailed breakdown of Sentinel database users, roles and their access permissions. D.1 Sentinel Database Instance Below listed are the Sentinel database instances D.1.1 ESEC This instance have: Users: ...
D.2.4 esecdba Sentinel Database Users-esecdba Table D-4 Login Name DB Name User Name User of Alias Esecdba ESEC db_owner MemberOf Esecdba ESEC esecdba User D.2.5 esecrpt Sentinel Database Users-esecrpt Table D-5 Login Name DB Name User Name User of Alias Esecrpt ESEC ESEC_USER...
Page 210
Role Name Object Name Action Type ESEC_APP ActivityData 193 SELECT U User table ESEC_APP ActivityData 195 INSERT U User table ESEC_APP ActivityData 196 DELETE U User table ESEC_APP ActivityData 197 UPDATE U User table ESEC_APP ActivityDataBLOBs 193 SELECT U User table ESEC_APP ActivityDataBLOBs 195 INSERT...
Page 211
Role Name Object Name Action Type ESEC_APP Counters 193 SELECT U User table ESEC_APP Counters 195 INSERT U User table ESEC_APP Counters 196 DELETE U User table ESEC_APP Counters 197 UPDATE U User table ESEC_APP CreateProcessEventAudits 193 SELECT U User table ESEC_APP CreateProcessEventAudits 195 INSERT...
Page 212
Role Name Object Name Action Type ESEC_APP GroupUserPackLevelParticipant 193 SELECT U User table ESEC_APP GroupUserPackLevelParticipant 195 INSERT U User table ESEC_APP GroupUserPackLevelParticipant 196 DELETE U User table ESEC_APP GroupUserPackLevelParticipant 197 UPDATE U User table ESEC_APP GroupUserProcLevelParticipant 193 SELECT U User table ESEC_APP GroupUserProcLevelParticipant 195 INSERT...
Page 213
Role Name Object Name Action Type ESEC_APP ObjectId 193 SELECT U User table ESEC_APP ObjectId 195 INSERT U User table ESEC_APP ObjectId 196 DELETE U User table ESEC_APP ObjectId 197 UPDATE U User table ESEC_APP OldEventAuditData 193 SELECT U User table ESEC_APP OldEventAuditData 195 INSERT...
Page 214
Role Name Object Name Action Type ESEC_APP PackLevelXPDLAppTAAppUser 193 SELECT U User table ESEC_APP PackLevelXPDLAppTAAppUser 195 INSERT U User table ESEC_APP PackLevelXPDLAppTAAppUser 196 DELETE U User table ESEC_APP PackLevelXPDLAppTAAppUser 197 UPDATE U User table ESEC_APP PackLevelXPDLAppToolAgentApp 193 SELECT U User table ESEC_APP PackLevelXPDLAppToolAgentApp 195 INSERT...
Page 215
Role Name Object Name Action Type ESEC_APP ProcessStateEventAudits 193 SELECT U User table ESEC_APP ProcessStateEventAudits 195 INSERT U User table ESEC_APP ProcessStateEventAudits 196 DELETE U User table ESEC_APP ProcessStateEventAudits 197 UPDATE U User table ESEC_APP ProcessStates 193 SELECT U User table ESEC_APP ProcessStates 195 INSERT...
Page 216
Role Name Object Name Action Type ESEC_APP ResourcesTable 193 SELECT U User table ESEC_APP ResourcesTable 195 INSERT U User table ESEC_APP ResourcesTable 196 DELETE U User table ESEC_APP ResourcesTable 197 UPDATE U User table ESEC_APP StateEventAudits 193 SELECT U User table ESEC_APP StateEventAudits 195 INSERT...
Page 217
Role Name Object Name Action Type ESEC_APP UserPackLevelParticipant 193 SELECT U User table ESEC_APP UserPackLevelParticipant 195 INSERT U User table ESEC_APP UserPackLevelParticipant 196 DELETE U User table ESEC_APP UserPackLevelParticipant 197 UPDATE U User table ESEC_APP UserProcLevelParticipant 193 SELECT U User table ESEC_APP UserProcLevelParticipant 195 INSERT...
Role Name Object Name Action Type ESEC_APP XPDLParticipantPackage 193 SELECT U User table ESEC_APP XPDLParticipantPackage 195 INSERT U User table ESEC_APP XPDLParticipantPackage 196 DELETE U User table ESEC_APP XPDLParticipantPackage 197 UPDATE U User table ESEC_APP XPDLParticipantProcess 193 SELECT U User table ESEC_APP XPDLParticipantProcess 195 INSERT...
Page 219
Role Name Object Name Action Type ESEC_ETL ADV_ATTACK_PLUGIN 193 SELECT U User table ESEC_ETL ADV_CREDIBILITY 193 SELECT U User table ESEC_ETL ADV_FEED 193 SELECT U User table ESEC_ETL ADV_PRODUCT 193 SELECT U User table ESEC_ETL ADV_PRODUCT_SERVICE_PACK 193 SELECT U User table ESEC_ETL ADV_PRODUCT_VERSION 193 SELECT...
Page 220
Role Name Object Name Action Type ESEC_ETL CORRELATED_EVENTS_P_MAX 193 SELECT U User table ESEC_ETL CORRELATED_EVENTS_P_MIN 193 SELECT U User table ESEC_ETL CRIT_LKUP 193 SELECT U User table ESEC_ETL CUST 193 SELECT U User table ESEC_ETL CUST_HIERARCHY 193 SELECT U User table ESEC_ETL ENTITY_TYP_LKUP 193 SELECT...
Page 221
Role Name Object Name Action Type ESEC_ETL EVT_DEST_EVT_NAME_SMRY_1_P_MIN 193 SELECT U User table ESEC_ETL EVT_DEST_SMRY_1_P_MAX 193 SELECT U User table ESEC_ETL EVT_DEST_SMRY_1_P_MAX 195 INSERT U User table ESEC_ETL EVT_DEST_SMRY_1_P_MAX 196 DELETE U User table ESEC_ETL EVT_DEST_SMRY_1_P_MAX 197 UPDATE U User table ESEC_ETL EVT_DEST_SMRY_1_P_MIN 193 SELECT...
Page 222
Role Name Object Name Action Type ESEC_ETL EVT_SRC_SMRY_1_P_MAX 193 SELECT U User table ESEC_ETL EVT_SRC_SMRY_1_P_MAX 195 INSERT U User table ESEC_ETL EVT_SRC_SMRY_1_P_MAX 196 DELETE U User table ESEC_ETL EVT_SRC_SMRY_1_P_MAX 197 UPDATE U User table ESEC_ETL EVT_SRC_SMRY_1_P_MIN 193 SELECT U User table ESEC_ETL EVT_SRC_SRVR 193 SELECT...
Page 223
Role Name Object Name Action Type ESEC_ETL NETWORK_IDENTITY_LKUP 193 SELECT U User table ESEC_ETL NLS_CONFIG 193 SELECT U User table ESEC_ETL NLS_MSG_TRANSLATION 193 SELECT U User table ESEC_ETL NORM_ATTACK_CD_MAP 193 SELECT U User table ESEC_ETL OBJ_STORE 193 SELECT U User table ESEC_ETL OFFLINE_QRY_STS 193 SELECT...
D.3.4 ESEC_USER Sentinel Database Roles-ESEC_USER Table D-8 Role Name Object Name Action Type ESEC_USER ADV_ALERT_CVE_RPT_V 193 SELECT V View ESEC_USER ADV_ALERT_PRODUCT_RPT_V 193 SELECT V View ESEC_USER ADV_ALERT_RPT_V 193 SELECT V View ESEC_USER ADV_ATTACK_ALERT_RPT_V 193 SELECT V View ESEC_USER ADV_ATTACK_CVE_RPT_V 193 SELECT V View ESEC_USER ADV_ATTACK_PLUGIN_RPT_V...
Page 225
Role Name Object Name Action Type ESEC_USER CORRELATED_EVENTS 193 SELECT V View ESEC_USER CORRELATED_EVENTS_RPT_V 193 SELECT V View ESEC_USER CORRELATED_EVENTS_RPT_V1 193 SELECT V View ESEC_USER CRITICALITY_RPT_V 193 SELECT V View ESEC_USER CUST_HIERARCHY_V 193 SELECT V View ESEC_USER CUST_RPT_V 193 SELECT V View ESEC_USER ENTITY_TYPE_RPT_V...
Page 226
Role Name Object Name Action Type ESEC_USER EVT_AGENT_RPT_V 193 SELECT V View ESEC_USER EVT_ASSET_RPT_V 193 SELECT V View ESEC_USER EVT_DEST_EVT_NAME_SMRY_1 193 SELECT V View ESEC_USER EVT_DEST_EVT_NAME_SMRY_1_RPT_V 193 SELECT V View ESEC_USER EVT_DEST_SMRY_1 193 SELECT V View ESEC_USER EVT_DEST_SMRY_1_RPT_V 193 SELECT V View ESEC_USER EVT_DEST_TXNMY_SMRY_1...
Page 227
Role Name Object Name Action Type ESEC_USER INCIDENTS_EVENTS_RPT_V 193 SELECT V View ESEC_USER INCIDENTS_RPT_V 193 SELECT V View ESEC_USER INCIDENTS_VULN_RPT_V 193 SELECT V View ESEC_USER L_STAT_RPT_V 193 SELECT V View ESEC_USER LOGS_RPT_V 193 SELECT V View ESEC_USER MSSP_ASSOCIATIONS_V 193 SELECT V View ESEC_USER NETWORK_IDENTITY_RPT_V...
D.4 Sentinel Server Roles Sentinel Server Roles Table D-9 Server Role Description Sentinel User sysadmin System Administrators esecdba securityadmin Security Administrators esecapp serveradmin Server Administrators esecdba setupadmin Setup Administrators processadmin Process Administrators diskadmin Disk Administrators dbcreator Database Creators bulkadmin Bulk Insert Administrators D.5 Windows Domain Authentication DB users and permissions A domain user will be associated with esecadm, esecapp, esecdba and esecrpt user according to the...
Sentinel Log Locations The purpose of this document is to provide information of the log file locations for the following components of Sentinel. Sentinel Data Manager iTRAC Advisor Event Insertion Database Queries Active ViewsAggregation Wrapper (formerly Sentinel Watchdog) ...
E.3 Advisor Logs activities related to Advisor data download and process. For Windows: %ESEC_HOME%\log\advisor_script.log %ESEC_HOME%\log\advisor0.*.log For UNIX: $ESEC_HOME/log/advisor_script.log $ESEC_HOME/log/advisor0.*.log E.4 Event Insertion Logs activities related to event insertion into the database. For Windows: %ESEC_HOME%\log\das_binary0.*.log For UNIX: $ESEC_HOME/log/das_binary0.*.log E.5 Database Queries Logs activities related to database queries, Collector, Collector Manager health, identity insertion, and all other DAS activities not performed by other DAS components.
E.7 Aggregation Logs activities related to Aggregation. For Windows: %ESEC_HOME%\log\das_aggregation0.*.log For UNIX: $ESEC_HOME/log/das_aggregation0.*.log E.8 Wrapper Logs activities related to Wrapper. NOTE: is for the service wrapper. sentinel_wrapper.log For Windows: %ESEC_HOME%\log\sentinel0.*.log %ESEC_HOME%\log\sentinel_wrapper.log For UNIX: $ESEC_HOME/log/sentinel0.*.log $ESEC_HOME/log/sentinel_wrapper.log E.9 Collector Manager Logs activities related to Collector Manager. For Windows: %ESEC_HOME%\log\collector_mgr0.*.log For UNIX:...
E.11 Sentinel Control Center Logs activities related to the Sentinel Control Center. For Windows: %ESEC_HOME%\log\control_center0.*.log For UNIX: $ESEC_HOME/log/control_center0.*.log E.12 DAS Proxy Logs activities related to Proxy Communication. For Windows: %ESEC_HOME%\log\das_proxy0.*.log For UNIX: $ESEC_HOME/log/das_proxy0.*.log E.13 Solution Designer Logs activities related to Solution Designer. For Windows: %ESEC_HOME%\log\solution_designer0.*.log For UNIX:...
Need help?
Do you have a question about the SENTINEL 6.1 SP2 - REFERENCE GUIDE 02-2010 and is the answer not in the manual?
Questions and answers