Aurorean network gateway-1100 version 2.1 (4 pages)
Summary of Contents for Enterasys Security Information and Event Manager (SIEM)
Page 1
Enterasys ® Security Information and Event Manager (SIEM) Configuring DSMs Release 7.7.0 P/N 9034592-05...
Page 3
Enterasys Networks reserves the right to make changes in specifications and other information contained in this document and its web site without prior notice. The reader should in all cases consult Enterasys Networks to determine whether any such changes have been made.
Page 4
(2) copies of the Licensed Software in whole or in part, including the original media, in your possession for said purposes without Enterasys’ prior written consent, and in no event shall You operate more than one copy of the Licensed Software.
Page 5
Licensed Materials to ensure that no unauthorized personnel shall have access thereto and that no unauthorized copy, publication, disclosure, or distribution, in whole or in part, in any form shall be made, and You agree to notify Enterasys of any unauthorized use thereof.
Page 6
Enterasys in good faith determines that the media and proof of payment of the license fee are returned to Enterasys or the dealer from whom it was obtained within ninety (90) days of the date of payment of the license fee.
Page 7
(g) Enterasys’ waiver of any right shall not constitute waiver of that right in future. This Agreement constitutes the entire understanding between the parties with respect to the subject matter hereof, and all prior agreements, representations, statements and undertakings, oral or written, are hereby expressly superseded and canceled. No purchase order shall supersede this Agreement.
Indicates that the information is critical. A warning alerts you to potential dangers, threats, or potential personal injury. Read any and all warnings carefully before proceeding. Related For more information, refer to the Enterasys Extranet to obtain the latest Enterasys Documentation SIEM documentation including: Installation Guide •...
Enterasys Networks using one of the following methods: World Wide Web http://www.enterasys.com/support Phone 1-800-872-8440 (toll-free in U.S. and Canada) or 1-978-684-1000 For the Enterasys Networks Support toll-free number in your country: http://www.enterasys.com/support Email support@enterasys.com To expedite your message, please type [dragon] in the subject line.
Administration Guide. NOTE Information found in this documentation about configuring Device Support Modules (DSMs) is based on the latest RPM files located on the Enterasys Extranet, located at http://extranet.enterasys.com/downloads. To configure SIEM to receive events from devices, you must: Configure the device to send events to SIEM.
NSTALLING The Enterasys Extranet contains RPM files that allow you to install new or update existing DSMs. Updated DSMs contain improved event parsing for network security products and enhancements for event categorization in the SIEM Identification Map (QIDmap). To install a DSM, perform the following steps: Download the file to your system hosting SIEM.
8800 S ERIES WITCH A SIEM 3Com 8800 Series Switch DSM accepts events using syslog. SIEM records all relevant status and network condition events. Before configuring a 3Com 8800 Series Switch device in SIEM, you must configure your device to send syslog events to SIEM.
MBIRON RUST NGEL A SIEM Ambiron TrustWave ipAngel DSM accepts events using syslog. SIEM records all Snort-based events from the ipAngel console. Before you configure SIEM to integrate with ipAngel, you must forward your cache and access logs to your SIEM system. For information on forwarding device logs to SIEM, see your vendor documentation.
HTTP S PACHE ERVER A SIEM Apache HTTP Server DSM accepts Apache events using syslog or syslog-ng. SIEM records all relevant HTTP status events. The procedure in this section applies to Apache DSMs operating on UNIX/Linux platforms only. Select one of the following configuration methods: •...
HTTP S PACHE ERVER For example, CustomLog “|/usr/bin/logger -t httpd -p local1.info” MyApacheLogs Type the following command to disabled hostname lookup: Step 5 HostnameLookups off Save the Apache configuration file. Step 6 Edit the syslog configuration file. Step 7 /etc/syslog.conf Add the following information to your syslog configuration file: Step 8 <facility>.<priority>...
Page 29
Configuring Apache Using Syslog-ng LogLevel info The LogLevel may already be configured to the info level depending on your Apache installation. Add the following to the Apache configuration file to specify the custom log format: Step 4 LogFormat "%h %A %l %u %t \"%r\" %>s %p %b" <log format name> Where is a variable name you provide to define the custom <log format name>...
Page 30
HTTP S PACHE ERVER SIEM automatically detects syslog-ng events from an Apache HTTP Server. However, if you want to manually configure SIEM to receive events from Apache: From the Log Source Type drop-down list box, select Apache HTTP Server. For more information on Apache, see http://www.apache.org/.
OS X PPLE A SIEM Apple Mac OS X DSM accepts events using syslog. SIEM records all relevant firewall, web server access, web server error, privilege escalation, and informational events. Before you configure SIEM to integrate with Mac OS X, you must: Log in to your Mac OS X device, as a root user.
RUBA OBILITY ONTROLLERS The SIEM Aruba Mobility Controllers DSM accepts events using syslog. SIEM records all relevant events. Before configuring an Aruba Mobility Controller device in SIEM, you must configure your device to send syslog events to SIEM. To configure the Aruba Wireless Networks (Mobility Controller) device to forward syslog events to SIEM: Log in to the Aruba Mobility Controller user interface.
SSL VPN RRAY ETWORKS The SIEM Array Networks SSL VPN DSM collects events from an ArrayVPN appliance using syslog. For details of configuring ArrayVPN appliances for remote syslog, please consult Array Networks documentation. Once you configure syslog to forward events to SIEM, you are now ready to configure the log source in SIEM.
ARITY The SIEM Bit9 Parity DSM accepts events using the Log Enhanced Event Format (LEEF), enabling SIEM to record all relevant events. Before configuring a Bit9 Parity DSM in SIEM, you must configure your Bit9 Parity device to send events to SIEM.
A Blue Coat SG DSM allows you to integrate SIEM with a Blue Coat SG appliance. SIEM records all relevant and available information from the event. The Blue Coat SG DSM supports the following formats: Custom Format • SQUID • NCSA •...
Page 40
Type a format name for the custom format. Step 4 Select Custom format string. Step 5 Type the following custom format for SIEM: Step 6 Bluecoat|src=$(c-ip)|srcport=$(c-port)|dst=$(cs-uri-address)|ds tport=$(cs-uri-port)|username=$(cs-username)|devicetime=$(gmtti me)|s-action=$(s-action)|sc-status=$(sc-status)|cs-method=$(cs- method)|time-taken=$(time-taken)|sc-bytes=$(sc-bytes)|cs-bytes= $(sc-bytes)|cs-uri-scheme=$(cs-uri-scheme)|cs-host=$(cs-host)|c s-uri-path=$(cs-uri-path)|cs-uri-query=$(cs-uri-query)|cs-uri-e xtension=$(cs-uri-extension)|cs-auth-group=$(cs-auth-group)|s-h ierarchy=$(s-hierarchy)|rs(Content-Type)=$(rs(Content-Type))|cs (User-Agent)=$(cs(User-Agent))|cs(Referer)=$(cs(Referer))|sc-fi lter-result=$(sc-filter-result)|filter-category=$(sc-filter-cat egory)|cs-uri=$(cs-uri) Select Log Last Header from the drop-down list box. Step 7 Click OK.
Page 41
Creating a Custom Format Enabling Access To enable access logging on your Blue Coat SG device: Logging Select Configuration > Access Logging > General. Step 1 The Default Logging tab is displayed. Select the Enable Access Logging check box. Step 2 If the Enable Access Logging check box is not selected, logging is disabled globally for all of the formats listed.
Page 42
To configure SIEM to receive events from a Blue Coat SG device: From the Log Source Type drop-down list box, select the Bluecoat SG Step 1 Appliance option. From the Protocol Configuration drop-down list box, select the Log File option. Step 2 When configuring your BlueCoat device to use the Log File protocol configuration, make sure the hostname or IP address configured in the BlueCoat device is the...
Custom Format Addition Key-Value Pairs For more information about configuring syslog, see your Bluecoat SG vendor documentation. Custom Format The custom format allows you to forward specific Blue Coat data or events to SIEM Addition Key-Value using the Extended Log File Format (ELFF). The custom format is a series of pipe Pairs delimited fields starting with and containing...
RIDGEWATER The SIEM Bridgewater System DSM accepts events using syslog. SIEM records all relevant events. Before configuring a Bridgewater Systems device in SIEM, you must configure your device to send syslog events to SIEM. To configure the device to send syslog events to SIEM: Log in to your Bridgewater Systems device command line interface (CLI).
Page 46
RIDGEWATER You are now ready to configure the log source in SIEM. Step 9 To configure SIEM to receive events from a Bridgewater Systems device: From the Log Source Type drop-down list box, select the Bridgewater Systems AAA Service Controller option. For more information on configuring log sources, see the Log Sources User Guide.
Pulling Data Using Log File Protocol Configuring CA ACF2 To integrate CA ACF2 with SIEM: to Integrate with SIEM From the Enterasys Extranet website, download the following compressed file: Step 1 qexacf2_bundled.tar.gz On a Linux-based operating system, extract the file: Step 2...
Page 48
CA T ECHNOLOGIES tar -zxvf qexacf2_bundled.tar.gz The following files are contained in the archive: QexACF2.JCL.txt - Job Control Language file QexACF2.load.trs - Compressed program library (requires IBM TRSMAIN) trsmain sample JCL.txt - Job Control Language for TRSMAIN to decompress the .trs file Load the files onto the IBM mainframe using the following methods: Step 3...
Page 49
CA ACF2 The .trs input file is an IBM TERSE formatted library and is extracted by running the JCL, which calls the TRSMAIN. This tersed file, when extracted, creates a PDS linklib with the program as a member. QexACF2 You can STEPLIB to this library or choose to move the program to one of the Step 5 LINKLIBs that are in LINKLST.
Page 51
CA ACF2 Where: is the IP address or host name of the interim FTP server to receive <IPADDR> the output file. is the user name required to access the interim FTP server. <USER> is the password required to access the interim FTP server. <PASSWORD>...
• Configuring CA Top To integrate CA Top Secret with SIEM: Secret to Integrate with SIEM From the Enterasys Extranet website, download the following compressed file: Step 1 qextops_bundled.tar.gz On a Linux-based operating system, extract the file: Step 2 tar -zxvf qextops_bundled.tar.gz The following files are contained in the archive: qextops_jcl.txt...
Page 53
CA Top Secret qextopsloadlib.trs qextops_trsmain_JCL.txt Load the files onto the IBM mainframe using any terminal emulator file transfer Step 3 method. Upload the sample files qextops_trsmain_JCL.txt qextops_jcl.txt using the TEXT protocol. Upload the file using a BINARY mode transfer. The qextopsloadlib.trs file is a tersed file containing the executable (the qextopsloadlib.trs...
Page 54
CA T ECHNOLOGIES You can STEPLIB to this library or choose to move the program to one of the Step 5 LINKLIBs that are in the LINKLST. The program does not require authorization. After uploading, copy the program to an existing link listed library or add a Step 6 STEPLIB DD statement with the correct dataset name of the library that will contain the program.
Page 56
CA T ECHNOLOGIES is the user name required to access the interim FTP server. <USER> is the password required to access the interim FTP server. <PASSWORD> is the destination of the mainframe or <THEIPOFTHEMAINFRAMEDEVICE> interim FTP server receiving the output. For example: PUT 'Q1JACK.QEXTOPS.OUTPUT.C320' /192.168.1.101/CA/QEXTOPS.OU TPUT.C320...
Page 57
CA Top Secret For more information on configuring log sources and protocols, see the Log Sources User Guide. Configuring DSMs...
HECK OINT This section provides information on the following DSMs: Check Point FireWall-1 • Check Point Provider-1 • Check Point You can configure SIEM to integrate with a Check Point FireWall-1 device using FireWall-1 one of the following methods: Integrating Check Point FireWall-1 Using Syslog •...
Page 60
HECK OINT $FWDIR/bin/fw log -ftn | /usr/bin/logger -p <facility>.<priority> > /dev/null 2>&1 & Where: is a Syslog facility, for example, <facility> local3 is a Syslog priority, for example, <priority> info For example: $FWDIR/bin/fw log -ftn | /usr/bin/logger -p local3.info > /dev/null 2>&1 &...
Page 61
Check Point FireWall-1 For more information on configuring log sources, see the Log Sources User Guide. For more information about Check Point FireWall-1, see the Check Point FireWall-1 documentation. Integrating Check This section describes how to ensure that the SIEM Check Point FireWall-1 DSM Point FireWall-1 accepts events using Open Platform for Security (OPSEC/LEA).
Page 62
HECK OINT Creating an OPSEC Application Object To create the OPSEC Application Object: Open the Check Point SmartDashboard user interface. Step 1 Select Manage > Servers and OPSEC applications > New > OPSEC Step 2 Application Properties. Assign a name to the OPSEC Application Object. Step 3 For example: SIEM-OPSEC...
Page 63
Check Point FireWall-1 NOTE You must know if the Check Point Log Host is a separate object in your configuration from the Check Point Management Server. In most cases, the Check Point Log Host is the same object as the Check Point Management Server. Click Edit.
Page 64
HECK OINT Server IP - Type the IP address of the Check Point host or Check Point Management Server IP. Server Port - Type the port used for OPSEC/LEA. The default is 18184. You must ensure the existing firewall policy permits the LEA/OPSEC connection from your SIEM host or SIEM Event Processor.
Page 65
Check Point FireWall-1 Depending on your Check Point SmartCenter Server’s operating system, open the Step 2 following file: In Linux: $FWDIR\conf\fwopsec.conf In Windows: %FWDIR%\conf\fwopsec.conf The default contents of this file are as follows: # The VPN-1/FireWall-1 default settings are: sam_server auth_port sam_server port...
HECK OINT Remove the hash ( ) marks from both lines. Step 5 For example: lea_server auth_port lea_server port 18184 Save and close the file. Step 6 Type the following command to start the firewall services: Step 7 cpstart You are now ready to configure the log source in SIEM. Step 8 To configure SIEM to receive events from a Check Point Firewall-1 device: From the Log Source Type drop-down list box, select Check Point FireWall-1.
Page 67
Check Point Provider-1 mdsenv <customer name> Type the following command: Step 5 # nohup $FWDIR/bin/fw log -ftn | /usr/bin/logger -p <facility>.<priority> 2>&1 & Where: is a Syslog facility, for example, local3. <facility> is a Syslog priority, for example, info. <priority> You are now ready to configure the log source in SIEM.
Page 68
HECK OINT The name you type must be different than the name used in Step From the Host drop-down menu, select the SIEM host object that you just created. Step 7 From Application Properties, select User Defined as the Vendor type. Step 8 From Client Entries, select LEA.
ISCO Type the hostname or IP address of the destination host and port in the First Step 4 Syslog Server field. Click OK. The system restarts with new settings. When finished, the Syslog server window displays the host you have configured. Click OK.
Cisco ACS Enable timestamp on log messages: Step 7 service timestamp log datatime Return to privileged EXEC mode: Step 8 View your entries: Step 9 show running-config Save your entries in the configuration file: Step 10 copy running-config startup-config You are now ready to configure the log source in SIEM. Step 11 To configure SIEM to receive events from a Cisco ACS device: ...
Page 72
ISCO Nas-IP-Address • • Authen-Failure-Code Caller-ID • NAS-Port • • Author-Data Group-Name • Filter Information • • Logged Remotely Configure the following syslog parameters: Step 7 IP - Type the IP address of SIEM. • • Port - Type the syslog port number of SIEM. The default is port 514. Max message length (Bytes) - Type 1024 as the maximum syslog message •...
Cisco ASA Add the following Logged Attributes: Step 6 Message-Type • User-Name • • Nas-IP-Address Authen-Failure-Code • Caller-ID • • NAS-Port Author-Data • Group-Name • • Filter Information Logged Remotely • Configure a time frame for Cisco ACS to generate a new csv file. Step 7 Click Submit.
Page 74
ISCO Integrating Cisco This section describes how to configure Cisco ASA to forward syslog events. ASA Using Syslog Log in to the Cisco ASA device. Step 1 Type the following command to access privileged EXEC mode: Step 2 enable Type the following command to access global configuration mode: Step 3 conf t Enable logging:...
Page 75
Cisco ASA For more information on forwarding NetFlow to SIEM, see your vendor documentation. Integrating Cisco This section describes how to configure Cisco ASA to forward NetFlow events ASA for NetFlow using NSEL. using NSEL Log in to the Cisco ASA device command line interface (CLI). Step 1 Type the following command to access privileged EXEC mode: Step 2...
ISCO Type the following command to define a class for the flow-export action: Step 9 class flow_export_class Type the following command to configure the flow-export action: Step 10 flow-export event-type all destination <IP address> Where <IP address> is the IP address of SIEM. NOTE If you are using a version of Cisco ASA prior to v8.3 you may skip Step 10...
Cisco CSA set logging timestamp enable Type the IP address of the SIEM server: Step 4 set logging server <IP address> Limit messages that are logged by selecting a severity level: Step 5 set logging server severity <server severity level> Configure the facility level that should be used in the message.
ISCO Click Save. Step 9 For more information on forwarding logs to SIEM, see your vendor documentation. You are now ready to configure the log source in SIEM. Step 10 To configure SIEM to receive events from a Cisco CSA device: ...
Cisco IronPort only supports direct SDEE connections to the device and not the management software, which controls the device. NOTE You must have security access or web authentication on the device before connecting to SIEM. Once you configure your Cisco IDS/IPS device, you must configure the SDEE protocol in SIEM.
ISCO Log Name - Type a log name. • • File Name - Use the default configuration value. Maximum File Size - Use the default configuration value. • Log Level - Select Information (Default). • Retrieval Method - Select Syslog Push. •...
Cisco IOS Before configuring a Cisco NAC device in SIEM, you must configure your device to send syslog events to SIEM. To configure the device to send syslog events to SIEM: Log in to the Cisco NAC user interface. Step 1 In the Monitoring section, select Event Logs.
ISCO logging trap warning logging console warning Where is the priority setting for the logs. warning Configure the syslog facility: Step 5 logging facility syslog Save and exit the file. Step 6 Copy running-config to startup-config: Step 7 copy running-config startup-config You are now ready to configure the log source in SIEM.
Cisco VPN 3000 Concentrator To integrate Cisco Pix: Log into the Cisco PIX using a console connection, telnet, or SSH. Step 1 Type the following command to access Privileged mode: Step 2 enable Type the following command to access Configuration mode: Step 3 conf t Enable logging and timestamp the logs:...
ISCO set logging server facility server_facility_parameter set logging server severity server_severity_level You are now ready to configure the log source in SIEM. Step 5 To configure SIEM to receive events from a Cisco VPN Concentrator device: From the Log Source Type drop-down list box, select Cisco VPN 3000 Series Concentrator.
Page 86
ISCO to Warnings (severity level 4), only those messages whose severity is between 0 and 4 are logged. Select the File Info check box if you want the message logs to include information Step 8 about the source file. The default value is enabled. Select the Proc Info check box if you want the message logs to include process Step 9 information.
ITRIX CALER A SIEM Citrix NetScaler DSM accepts events using syslog. SIEM records all relevant audit log events from Citrix NetScaler. Before you configure SIEM to integrate with Citrix NetScaler, you must: Log in to your Citrix NetScaler device as a root user. Step 1 Type the following command to add a remote syslog server: Step 2...
Page 88
ITRIX CALER For example: bind system global policy-SIEM -priority 30 When multiple policies have priority assigned to them as a numeric value the lower priority value is evaluated before the higher value. Type the following command to save the Citrix NetScaler configuration. Step 5 save config Type the following command to verify the policy is saved in your configuration:...
CRYPTOC CRYPTO-S HIELD The SIEM CRYPTOCard CRYPTO-Shield DSM accepts events using syslog. SIEM records all relevant events. Before configuring a CRYPTOCard CRYPTO-Shield device in SIEM, you must configure your device to send syslog events to SIEM. To configure the device to send syslog events to SIEM, you must: Configure the following System Configuration parameters: Step 1 NOTE...
YBER AULT The SIEM Cyber-Ark Vault DSM accepts events using the Log Enhanced Event Protocol (LEEF). SIEM records both user activities and safe activities from the Cyber-Ark Vault in the audit log events. Cyber-Ark Vault integrates with SIEM to forward audit logs using syslog to create a complete audit picture of privileged account activities in SIEM.
/VPN YBER UARD IREWALL PPLIANCE A SIEM CyberGuard Firewall VPN Appliance DSM accepts CyberGuard events using syslog. SIEM records all relevant CyberGuard events. SIEM supports the CyberGuard KS series of appliances. Before you configure SIEM to integrate with a CyberGuard device, you must: Log in to the CyberGuard user interface.
EMC VMW The SIEM EMC VMWare DSM accepts events from virtual environments using either the VMWare protocol or syslog. SIEM records all relevant events from the VMWare Web service. Select one of the following configuration methods: • Configuring Syslog for VMWare Configuring the VMWare Protocol •...
Page 96
You are now ready to configure the log source in SIEM. SIEM automatically detects syslog events from your EMC VMWare server. However, if you want to manually configure SIEM to receive events from your VMWare ESX server: From the Log Source Type drop-down list box, select EMC VMWare. Configuring the When configuring the EMC VMWare DSM to use the VMWare protocol, we VMWare Protocol...
Page 97
Configuring the VMWare Protocol Click Add. Step 6 Click OK. Step 7 You are now ready to set the account permission for the user you created. Configuring Account For security reasons, we recommend you configure your SIEM user account as a Permissions member of your root or admin group, but select an assigned role of read-only permissions.
Page 98
EMC VMW Table 19-3 VMWare Parameters Parameter Description Log Source Identifier Type the IP address or hostname for the log source. This value must match the value configured in the ESX IP field. ESX IP Type the IP address of the VMWare server. User Name Type the username required to access the VMWare server.
A SIEM Enterasys Dragon DSM accepts Enterasys events using either syslog or SNMPv3. SIEM records all relevant Enterasys Dragon events. Before you configure SIEM to integrate with Enterasys Dragon, you must create an Alarm Tool policy using either an SNMPv3 or Syslog notification rule.
Page 100
NTERASYS To configure Enterasys Dragon with an Alarm Tool policy using an SNMPv3 notification rule: Log in to the Enterasys Dragon EMS. Step 1 Click the Alarm Tool icon. Step 2 Configure the Alarm Tool Policy: Step 3 In the Alarm Tool Policy View > Custom Policies menu tree, right-click and select Add Alarm Tool Policy.
Page 101
Type values for the following parameters: - Name - Type Enterasys Networks-Alarm - Type - Select Real Time. - Event Group - Select Dragon-Events. - Notification Rule - Select the Enterasys Networks-Rule check box. Click OK. Click Commit. Navigate to the Enterprise View. Step 9 Right-click on the Alarm Tool and select Associate Alarm Tool Policy.
Page 102
Dragon Network Defense when the notification rate is very high or when IPv6 addresses are displayed. If you prefer not to use syslog notifications in LEEF format, refer to your Enterasys IPS documentation for more information. NOTE Use SNMPv3 notification rules if you need to transfer PDATA, which is a binary data element.
Page 103
Click the Notification Rules tab. Click New. In the name field, type Enterasys Networks-RuleSys Click OK. In the Notification Rules panel, select the newly created Enterasys Networks-RuleSys item. Click the Syslog tab. Click New. The Syslog Editor is displayed. Update the following values: - Facility - Using the Facility drop-down list box, select a facility.
Page 104
Configuring SIEM You are now ready to configure the log source within SIEM: To configure SIEM to receive events from the Enterasys Dragon device, you must Step 1 select the Enterasys Dragon Network IPS from the Log Source Type drop-down list box.
Page 105
The Enterasys Dragon EMS configuration is complete. Step 7 Configuring syslogd Using Enterasys Dragon EMS v7.4.0 and below If your Dragon Enterprise Management Server (EMS) is using a version earlier than v7.4.0 on the appliance, you must use syslogd for forwarding events to a Security and Information Manager such as SIEM.
Page 106
The Enterasys Dragon EMS configuration is complete. Step 4 Enterasys HiGuard The Enterasys HiGuard Wireless IPS DSM accepts events using syslog. SIEM Wireless IPS records all relevant events. Before configuring the Enterasys HiGuard Wireless IPS device in SIEM, you must configure your device to send syslog events to SIEM.
Page 107
Step 6 You are now ready to configure the log source in SIEM. Step 7 To configure SIEM to receive events from the Enterasys HiGuard Wireless IPS device: From the Log Source Type drop-down list box, select the Enterasys HiGuard option.
Page 108
To configure SIEM to receive events from the Enterasys HiPath Wireless Controller device: From the Log Source Type drop-down list box, select the Enterasys HiPath option. For more information on configuring log sources, see the Log Sources User Guide.
Page 109
You are now ready to configure the log source in SIEM. Step 3 To configure SIEM to receive events from an Enterasys Stackable and Standalone Switch device: From the Log Source Type drop-down list box, select one of the following...
Page 110
Step 3 To configure SIEM to receive events from an Enterasys Matrix device: From the Log Source Type drop-down list box, select Enterasys Matrix E1 Switch. For more information on configuring log sources, see the Log Sources User Guide.
Page 111
Step 13 You are now ready to configure the log source in SIEM. Step 14 To configure SIEM to receive events from an Enterasys NetSight Automatic Security Manager device: From the Log Source Type drop-down list box, select Enterasys NetsightASM.
Page 112
NTERASYS Enterasys Matrix A SIEM Enterasys Matrix Series DSM accepts events using syslog. SIEM records K/N/S Series Switch all relevant Matrix K-Series, N-Series, or S-Series standalone device events. Before you configure SIEM to integrate with a Matrix K-Series, N-Series, or S-Series, you must: Log in to your Enterasys Matrix device command line interface (CLI).
Enterasys NAC To configure SIEM to receive events from an Enterasys Matrix Series device: From the Log Source Type drop-down list box, select Enterasys Matrix K/N/S Series Switch. For information on configuring log sources, see the Log Sources User Guide.
XTREME ETWORKS XTREME A SIEM ExtremeWare DSM accepts Extreme events from using syslog. SIEM records all relevant events from Extreme Networks ExtremeWare and Extremeware XOS devices. Before you configure SIEM to integrate with an ExtremeWare device, you must configure syslog within your Extreme device. You are now ready to configure the log source in SIEM.
F5 N ETWORKS This section provides information on the following DSMs: • F5 Networks BIG-IP LTM F5 Networks BIG-IP ASM • F5 Networks BIG-IP APM • F5 Networks FirePass • F5 Networks BIG-IP The SIEM F5 Networks BIG-IP Local Traffic Manager (LTM) DSM collects networks security events from a BIG-IP device using syslog.
Page 118
F5 N ETWORKS bigpipe syslog remote server {BIGIPsyslog {host 10.100.100.100}} Save the configuration changes: Step 3 bigpipe save NOTE F5 Networks modified the syslog output format in BIG-IP v10.x to include the use before the hostname in the syslog header. The syslog header format local/ containing is not supported in SIEM, but a workaround is available to...
Page 119
F5 Networks BIG-IP ASM F5 Networks BIG-IP The SIEM F5 Networks BIG-IP Application Security Manager (ASM) DSM collects web application security events from a BIG-IP ASM device using syslog. Before receiving events in SIEM, you must configure your F5 Networks ASM device with a logging profile to forward application events to SIEM.
Page 120
F5 N ETWORKS You are now ready to configure the log sources and protocol in SIEM. Step 7 To configure SIEM to receive events from an F5 Networks BIG-IP ASM device: From the Log Source Type drop-down list box, select the F5 Networks BIG-IP ASM option For more information on configuring log sources, see the Log Sources User Guide.
Page 121
F5 Networks FirePass must configure your F5 Networks FirePass device to forward system events to SIEM as a remote syslog server. To configure a remote syslog server: Log in to the F5 Networks FirePass Admin Console. Step 1 In the navigation pane, select Device Management > Maintenance > Logs. Step 2 The Logging Option is displayed.
ARNING A SIEM Fair Warning DSM retrieves event files from a remote source using the log file protocol source. SIEM records event categories from the Fair Warning log files about user activity related to patient privacy and security threats to medical records.
The SIEM FireEye DSM accepts rsyslog events in Log Event Extended Format (LEEF). This DSM applies to FireEye MPS, eMPS and MA appliances. SIEM records all relevant notification alerts sent by FireEye appliances. Before configuring a FireEye appliance in SIEM, you must configure your device to send events to SIEM.
COUT OUNTER A SIEM ForeScout CounterACT DSM accepts CounterACT events using syslog. SIEM records all relevant and available information from the event. Before configuring a CounterACT device in SIEM, you must configure your device to send syslog to your SIEM installation. For more information on configuring your CounterACT device, consult your vendor documentation.
ORTINET ORTI A SIEM Fortinet FortiGate DSM accepts FortiGate IPS/Firewall events using syslog. SIEM records all relevant events. Before you configure SIEM to integrate with the device, you must configure syslog within your FortiGate device. For more information on configuring a Fortinet FortiGate device, see your vendor documentation.
OUNDRY You can integrate a Foundry FastIron device with SIEM. A Foundry FastIron device accepts events using syslog. Before you configure SIEM to integrate with a Foundry FastIron RX device, you must: Log in to the Foundry FastIron device command line interface (CLI). Step 1 Type the following command to enable logging: Step 2...
ENERIC IREWALL A SIEM generic firewall server DSM accepts events using syslog. SIEM records all relevant events. Before you configure SIEM to integrate with generic firewall, you must: Forward all firewall logs to your SIEM system. Step 1 For information on forwarding firewall logs from your generic firewall to SIEM, see your firewall vendor documentation.
Page 134
ENERIC IREWALL For example, if your device generates the following log messages for accepted packets: Aug. 5, 2005 08:30:00 Packet accepted. Source IP: 192.168.1.1 Source Port: 80 Destination IP: 192.168.1.2 Destination Port: 80 Protocol: tcp The pattern for accepted packets is Packet accepted Add the following to the file: Step 6...
Page 135
destination_port_pattern=<destination port pattern> protocol_pattern=<protocol pattern> Where <source ip pattern>, <source port pattern>, <destination , and ip pattern>, <destination port pattern> <protocol pattern> are the corresponding patterns identified in Step NOTE Patterns are case insensitive and you can add multiple patterns. For multiple patterns, separate using a # symbol.
ENERIC UTHORIZATION ERVER A SIEM generic authorization server DSM accepts events using syslog. SIEM records all relevant events. Before you configure SIEM to integrate with generic authorization server, you must: Forward all authentication server logs to your SIEM system. Step 1 For information on forwarding authentication server logs to SIEM, see your generic authorization server vendor documentation.
Page 138
ENERIC UTHORIZATION ERVER For example, if your authentication server generates the following log message for accepted packets: Jun 27 12:11:21 expo sshd[19926]: Accepted password for root from 10.100.100.109 port 1727 ssh2 The pattern for successful login is Accepted password Add the following entry to the file: Step 6 login_success_pattern=<login success pattern>...
Page 139
For example, if your authentication server generates the following log message: Jun 27 12:11:21 expo sshd[19926]: Accepted password for root from 10.100.100.109 port 1727 ssh2 The pattern for source IP address is and the pattern for source port is from port Add an entry to the file for source IP address and source port: Step 12...
This section provides information on the following DSMs: HP ProCurve • HP Tandem • • Hewlett Packard UNIX (HP-UX) HP ProCurve You can integrate an HP ProCurve device with SIEM. An HP ProCurve switch DSM accepts events using syslog. Before you configure SIEM to integrate with an HP ProCurve device, you must: Log into the HP ProCurve device.
A log file protocol source allows SIEM to retrieve archived log files from a remote host. The HP Tandem DSM supports the bulk loading of log files using the log file protocol source. When configuring your HP Tandem device to use the log file protocol, make sure the hostname or IP address configured in the HP Tandem device is the same as configured in the Remote Host parameter in the Log File Protocol configuration.
Page 143
Hewlett Packard UNIX (HP-UX) Type the following command to ensure that syslogd enforces the changes to the Step 5 syslog.conf file. kill -HUP ‘cat /var/run/syslog.pid‘ NOTE The above command is surrounded with back quotation marks. You are now ready to configure the log source in SIEM. Step 6 To configure SIEM to receive events from an HP-UX device: ...
This section provides information on the following DSMs: IBM AIX • • IBM AS/400 iSeries • IBM Lotus Domino • IBM Proventia Management SiteProtector IBM ISS Proventia • IBM RACF • IBM DB2 • IBM WebSphere Application Server • IBM Informix Audit •...
Page 146
Where is the IP address of the SIEM system. <IP address> Save and exit the file. Step 4 Restart syslog: Step 5 refresh -s syslogd For example, a typical /etc/syslog.conf file can resemble the following: ##### begin /etc/syslog.conf mail.debug /var/adm/maillog mail.none /var/adm/maillog auth.notice /var/adm/authlog lpr.debug /var/adm/lpd-errs...
IBM AS/400 iSeries Type the path to the Remote Directory. Step 4 This is the default directory path storing your IBM AIX log files. Type the FTP File Pattern. Step 5 The FTP File Pattern parameter must use a regular expression that matches the log files of your IBM AIX server.
Page 148
Pulling Data Using Log File Protocol. Configuring an IBM iSeries to Integrate with SIEM To integrate an IBM iSeries with SIEM: From the Enterasys Extranet website, download the following files: Step 1 AJLIB.SAVF Copy the file onto a computer or terminal that has FTP access to the Step 2 AJLIB.SAVF...
Page 149
IBM AS/400 iSeries The execution of the setup function sets a default start date and time for data collection from the Audit Journal to 08:00:00 of the current day. NOTE To preserve your previous start date and time information for a previous installation you must run Record the previous start date and AJLIB/DATETIME.
SIEM to read iSecurity events using the Log Enhanced Event Protocol (LEEF). Before configuring your device in SIEM, you must: Configure the Raz-Lee iSecurity user interface to forward syslog events to SIEM. For more information, see Configuring iSecurity to Forward Syslog Events.
Page 151
IBM Lotus Domino Set up the SNMP servers. See Setting Up SNMP Services. • Start the Domino Server add-in tasks. See Starting the Domino Server Add-in • Tasks. Configure the SNMP services. See Configuring SNMP Services • Setting Up SNMP To set up the SNMP services on the IBM Lotus Domino server: Services Install the Lotus Domino SNMP Agent as a service.
Page 152
Configuring SNMP To configure SNMP services: Services NOTE Configurations may vary depending on your environment. See your vendor documentation for more information. Open the Domino Administrator utility and authenticate with administrative Step 1 credentials. Click on the Files tab, and the Monitoring Configuration (events4.nsf) document. Step 2 Expand the DDM Configuration Tree and select DDM Probes By Type.
IBM Proventia Management SiteProtector To configure SIEM to receive events from as IBM Lotus Domino device: From the Log Source Type drop-down list box, select the IBM Lotus Domino option. For more information on configuring log sources, see the Log Sources User Guide. For more information about IBM Lotus Domino see your vendor documentation.
Page 154
Table 31-4 JDBC Parameters Parameter Description Log Source Type the identifier for the log source. Type the log source identifier Identifier in the following format: <database>@<hostname> Where: <database> is the database name, as defined in the Database Name parameter. The database name is a required parameter. <hostname>...
Page 155
IBM Proventia Management SiteProtector Table 31-4 JDBC Parameters (continued) Parameter Description Database If you select MSDE as the Database Type and you have multiple Instance SQL server instances on one server, define the instance to which you want to connect. Note: If you use a non-standard port in your database configuration, or have blocked access to port 1434 for SQL database resolution, you must leave the Database Instance...
Page 156
Table 31-4 JDBC Parameters (continued) Parameter Description Polling Interval Type the polling interval, which is the amount of time between queries to the event table. The default polling interval is 10 seconds. You may define a longer polling interval by appending H for hours or M for minutes to the numeric value.
IBM RACF Select Services. Step 3 The Service Configuration page is displayed. Click the SNMP tab. Step 4 Select SNMP Traps Enabled. Step 5 In the Trap Receiver field, type the IP address of your SIEM system you wish to Step 6 monitor incoming SNMP traps.
Page 158
• Configuring IBM To integrate an IBM mainframe RACF with SIEM: RACF to Integrate with SIEM From the Enterasys Extranet website, download the following compressed file: Step 1 qexracf_bundled.tar.gz On a Linux-based operating system, extract the file: Step 2 tar -zxvf qexracf_bundled.tar.gz The following files are contained in the archive: qexracf_jcl.txt...
Page 159
IBM RACF You must update the file with your installation specific information for parameters, such as, jobcard, data set naming conventions, output destinations, retention periods, and space requirements. The .trs input file is an IBM TERSE formatted library and is extracted by running the JCL, which calls the TRSMAIN.
Page 160
//************************************************************* //IRRADU00 EXEC PGM=IFASMFDP //SYSPRINT DD SYSOUT=* //ADUPRINT DD SYSOUT=* //OUTDD DD DSN=&SMFOUT,SPACE=(CYL,(100,100)),DISP=(,CATLG), DCB=(RECFM=FB,LRECL=8192,BLKSIZE=40960), UNIT=SYSALLDA //SMFDATA DD DISP=SHR,DSN=&SMFIN //SMFOUT DD DUMMY //SYSIN DD * INDD(SMFDATA,OPTIONS(DUMP)) OUTDD(SMFOUT,TYPE(30:83)) ABEND(NORETRY) USER2(IRRADU00) USER3(IRRADU86) //EXTRACT EXEC PGM=QEXRACF,DYNAMNBR=10, TIME=1440 //*STEPLIB DISP=SHR,DSN=<the loadlib containing the QEXRACF program if not in LINKLST> //SYSTSIN DUMMY //SYSTSPRT...
IBM DB2 configured to serve files through FTP or SFTP, or allow SCP, then no interim server is required and SIEM can pull those files directly from the mainframe. If an interim FTP server is needed, SIEM requires a unique IP address for each IBM RACF log source or they will be joined as one system.
Page 162
If you are using DB2 v9.5 and above, see Extracting Audit Data: DB2 v9.5 and • Above. • If you are using DB2 v8.x to v9.4, see Extracting Audit Data: DB2 v8.x to v9.4 Use the log file protocol source to pull the output instance log file and send that Step 3 information back to SIEM on a scheduled basis.
Page 163
IBM DB2 Move the .del files to a storage location where SIEM can pull the file. The Step 5 movement of the comma-delimited (.del) files should be synchronized with the file pull interval in SIEM. You are now ready to configure SIEM to receive DB2 log files. See Pulling Data Using Log File Protocol.
configured in the Remote Host parameter in the Log File protocol configuration. For more information, see the Log Sources User Guide. You are now ready to configure the log source and protocol within SIEM: To configure SIEM to receive events from an IBM DB2, you must select the IBM Step 1 DB2 option from the Log Source Type drop-down list box.
Page 165
IBM WebSphere Application Server Description - Type a description for the variable (optional). • Value - Type a directory path for the log files. • For example: {SIEM_LOG_ROOT} = /opt/IBM/WebSphere/AppServer/profiles/Custom01/logs/SIEM NOTE You must create the target directory specified in Step 5 before proceeding.
Page 166
NOTE If the JVM Logs changes affect the cell, you must restart all of the WebSphere Application Servers in the cell before you continue. You are now ready to import the file into SIEM using the Log File Protocol, see Pulling Data Using Log File Protocol.
IBM Informix Audit IBM Informix Audit The IBM Informix Audit DSM allows you to integrate IBM Informix audit logs into SIEM for analysis. SIEM retrieves the IBM Informix archived audit log files from a remote host using the Log File protocol configuration. SIEM records all configured IBM Informix Audit events.
Page 168
Pulling Data Using Log File Protocol • Configuring IBM IMS To integrate IBM IMS with SIEM: to Integrate with SIEM From the Enterasys Extranet, download the following compressed file: Step 1 QexIMS_bundled.tar.gz On a Linux-based operating system, extract the file: Step 2 tar -zxvf qexims_bundled.tar.gz...
Page 169
IBM IMS //TRSMAIN JOB (yourvalidjobcard),Q1labs, MSGCLASS=V //DEL EXEC PGM=IEFBR14 //D1 DISP=(MOD,DELETE),DSN=<yourhlq>.QEXIMS.TRS UNIT=SYSDA, SPACE=(CYL,(10,10)) //TRSMAIN EXEC PGM=TRSMAIN,PARM='UNPACK' //SYSPRINT DD SYSOUT=*,DCB=(LRECL=133,BLKSIZE=12901,RECFM=FBA) //INFILE DD DISP=SHR,DSN=<yourhlq>.QEXIMS.TRS //OUTFILE DD DISP=(NEW,CATLG,DELETE), DSN=<yourhlq>.LOAD, SPACE=(CYL,(1,1,5),RLSE),UNIT=SYSDA The .trs input file is an IBM TERSE formatted library and is extracted by running the JCL, which calls the TRSMAIN.
Page 170
DCB=(RECFM=VB,LRECL=1028,BLKSIZE=6144) //EXTRACT EXEC PGM=QEXIMS,DYNAMNBR=10, TIME=1440 //STEPLIB DISP=SHR,DSN=Q1JACK.C.LOAD //SYSTSIN DUMMY //SYSTSPRT SYSOUT=* //SYSPRINT SYSOUT=* //IMSIN DISP=SHR,DSN=&IMSIN //IMSOUT DISP=SHR,DSN=&IMSOUT //*FTP EXEC PGM=FTP,REGION=3800K //*INPUT DD * //*<target server> //*<USER> //*<PASSWORD> //*ASCII //*PUT '<IMSOUT>' /TARGET DIRECTORY>/<IMSOUT> //*QUIT //*OUTPUT DD SYSOUT=* //*SYSPRINT DD SYSOUT=* After the output file is created, you must choose one of the following options: Step 7 Schedule a job to transfer the output file to an interim FTP server.
Page 171
IBM IMS PUT 'Q1JACK.QEXIMS.OUTPUT.C320' /192.168.1.101/IMS/QEXIMS.OUT PUT.C320 NOTE You must remove commented lines beginning with //* for the script to properly forward the output file to the interim FTP server. You are now ready to configure the Log File protocol. See Pulling Data Using Log File Protocol.
ISC B You can integrate an Internet System Consortium (ISC) BIND device with SIEM. An ISC BIND device accepts events using syslog. Before you configure SIEM to integrate with an ISC BIND device, you must: Log in to the ISC BIND device. Step 1 Open the following file to add a logging clause: Step 2...
Page 174
ISC B For Example: logging { channel SIEM { syslog local3; severity info; category queries { SIEM; category notify { SIEM; category network { SIEM; category client { SIEM; Save and exit the file. Step 3 Edit the syslog configuration to log to your SIEM system using the facility you Step 4 selected in Step...
Page 175
To configure SIEM to receive events from an ISC BIND device: From the Log Source Type drop-down list box, select the ISC BIND option. For more information on configuring log sources, see the Log Sources User Guide. For more information about ISC BIND, see your vendor documentation. Configuring DSMs...
MPERVA ECURE PHERE The SIEM Imperva SecureSphere DSM accepts events using syslog. SIEM records all relevant events. Before configuring an Imperva SecureSphere device in SIEM, you must configure your device to send syslog events to SIEM. To configure the device to send syslog events to SIEM: Log in to your SecureSphere device user interface using administrative privileges.
Page 178
MPERVA ECURE PHERE Go to Policies > Security > Firewall Policy. Select the policy you want to edit to use the alert action. Click the Policy tab. From the Followed Action drop-down list box, select your new action. Ensure your policy is configured as enabled and is applied to the appropriate server groups.
Page 179
You are now ready to configure the log source in SIEM. Step 8 To configure SIEM to receive events from a SecureSphere device: From the Log Source Type drop-down list box, select the Imperva SecureSphere option. For more information on configuring log sources, see the Log Sources User Guide. For more information about your Imperva SecureSphere device, see your vendor documentation.
NIOS NFOBLOX The SIEM Infoblox NIOS DSM accepts events using syslog, enabling SIEM to record all relevant events from an Infoblox NIOS device. Before configuring SIEM, you must configure your Infoblox NIOS device to send syslog events to SIEM. For more information on configuring logs on your Infoblox NIOS device, see your Infoblox NIOS vendor documentation.
TRON MART ETER The SIEM Itron Smart Meter DSM collects events from an Itron Openway Smart Meter using syslog. The Itron Openway Smart Meter sends syslog events to SIEM using Port 514. For details of configuring your meter for syslog, see your Itron Openway Smart Meter documentation.
UNIPER ETWORKS This section provides information on the following DSMs: Juniper Networks AVT • Juniper DX Application Acceleration Platform • • Juniper EX-Series Ethernet Switch • Juniper NetScreen IDP Juniper Networks Secure Access • Juniper Infranet Controller • Juniper Networks Firewall and VPN •...
Page 186
UNIPER ETWORKS Where is the IP address of the Event Collector you want to <IP address> connect to the database. Reload the Postgres service: Step 4 su - nsm -c "pg_ctl reload -D /var/netscreen/DevSvr/pgsql/data" As the Juniper Networks NSM user, create the view: Step 5 create view strm_avt_view as SELECT a.name, a.category, v.srcip,v.dstip,v.dstport, v."last", u.name as userinfo, v.id,...
Juniper DX Application Acceleration Platform Juniper DX The Juniper DX Application Acceleration Platforms off-load core networking and Application I/O responsibilities from web and application servers to improve the performance Acceleration of web-based applications, increasing productivity of local, remote, and mobile Platform users.
Page 188
UNIPER ETWORKS is the IP address of your SIEM system. <IP address> is info, error, warning, or any, <level> is one of the following options from Table 36-5. <option> Table 36-5 Juniper Networks Ex-Series Switch Options Option Description All facilities authorization Authorization system change-log...
Juniper NetScreen IDP Juniper NetScreen A SIEM NetScreen IDP DSM accepts NetScreen IDP events using syslog. SIEM records all relevant NetScreen IDP events. To integrate SIEM with a Juniper NetScreen IDP device, you must: Configuring the IDP Sensor • Configuring SIEM to Collect IDP Events •...
Page 190
UNIPER ETWORKS Configuring SIEM to Juniper NSM is a central management server for Juniper IDP. You can configure Collect IDP Events SIEM to collect and represent the Juniper IDP alerts as coming from a central NSM, or SIEM can collect syslog from the individual Juniper IDP device. To configure SIEM to receive events from Juniper Networks Secure Access device: ...
Juniper Networks Secure Access In the Server name/IP field, type the name or IP address of the syslog server. From the Facility drop-down list box, select the facility. From the Filter drop-down list box, select WELF:WELF. Click Add, then click Save Changes. Configure syslog server information for user access: Step 3 If a WELF:WELF file is configured, go to Step e.
Page 192
UNIPER ETWORKS Click New Filter. Select WELF. Click Save Changes. From the left pane, select System > Log/Monitoring > Client Logs > Settings. From the Select Events to Log pane, select the events that you wish to log. In the Server name/IP field, type the name or IP address of the syslog server. From the Facility drop-down list box, select the facility.
Juniper Infranet Controller From the left pane, select System > Log/Monitoring > Client Logs > Settings. From the Select Events to Log section, select the events that you wish to log. In the Server name/IP field, type the name or IP address of the syslog server. You are now ready to configure the log source in SIEM.
UNIPER ETWORKS Type the IP address of your SIEM system hosting the Event Collector. Step 4 Click Apply. Step 5 You are now ready to configure the log source in SIEM. Step 6 To configure SIEM to receive events from a Juniper Networks Firewall and VPN device: ...
Juniper JunOS Configuring Juniper To configure SIEM to integrate with a Juniper Networks NSM device: Networks NSM in SIEM From the Log Source Type drop-down list box, select Juniper Networks Step 1 Network and Security Manager. From the Protocol Configuration drop-down list box, select Juniper NSM. Step 2 Configure the following values for the Juniper NSM protocol: Step 3...
Page 196
UNIPER ETWORKS For information on configuring PCAP data using a Juniper Networks SRX-series appliance, see Configuring Juniper Networks SRX-series PCAP Protocol. NOTE For more information about structured-data syslog, see RFC 5424 at the Internet Engineering Task Force: http://www.ietf.org/ Before you configure SIEM to integrate with a Juniper device, you must forward data to SIEM using syslog or structured-data syslog to SIEM.
Page 197
Juniper JunOS Table 36-1 List of Syslog Configuration Setting Variables (continued) Parameter Description Facility <severity> Define the severity of the messages that belong to the named facility with which it is paired. Valid severity levels are: • • none • emergency •...
Page 198
Step 4 The Log Sources window is displayed. NOTE You must install the latest PCAP Protocol from the Enterasys Extranet before configuring the PCAP log source. For information on installing a protocol, see the Log Sources User Guide. Click Add.
Juniper Steel-Belted Radius The Add a log source window is displayed. From the Log Source Type drop-down list box, select Juniper SRX-series Step 6 Services Gateway. From the Protocol Configuration drop-down list box, select PCAP Syslog Step 7 Combination. Type the Log Source Identifier. Step 8 Type the Incoming PCAP Port.
Page 200
UNIPER ETWORKS Configuring Juniper To integrate a Juniper Steel-Belted Radius DSM with SIEM using the Adaptive Log Steel-Belted Radius Exporter: for the Adaptive Log Exporter From the Start menu, select Start > Programs > Adaptive Log Exporter > Step 1 Configure Adapter Log Exporter.
Juniper Networks vGW Virtual Gateway Configuring Juniper To integrate a Juniper Steel-Belted Radius DSM with SIEM using syslog on a Steel-Belted Radius Linux-based operating system: for Syslog Using SSH log in to your Juniper Steel-Belted Radius device, as a root user. Step 1 Edit the following file: Step 2...
Page 202
UNIPER ETWORKS If you select the option Send Syslog from vGW management server, all events forwarded to SIEM contain the IP address of the vGW management server. • Send Syslog from Firewalls - Distribute logging with each Firewall Security VM providing syslog events. Type values for the following parameters: Step 5 Syslog Server - Type the IP address of your vGW management server if you...
IEBERMAN ANDOM ASSWORD ANAGER The SIEM Lieberman Random Password Manager DSM allows you to integrate SIEM with Lieberman Enterprise Random Password Manager and Lieberman Random Password Manager software using the LEEF protocol. The Lieberman Random Password Manager sends syslog events in the LEEF protocol to SIEM using Port 514.
INUX This section provides information on the following DSMs: Linux DHCP • Linux IPtables • • Linux OS Linux DHCP A SIEM Linux DHCP Server DSM accepts DHCP events using syslog. SIEM records all relevant events from a Linux DHCP Server. Before you configure SIEM to integrate with a Linux DHCP Server, you must configure syslog within the server.
Page 206
INUX -A INPUT -i eth0 --dport 31337 -j DENY Insert a matching rule immediately before each rule you want to log: Step 3 -A INPUT -i eth0 --dport 31337 -j DENY -A INPUT -i eth0 --dport 31337 -j DENY Update the target of the new rule to LOG for each rule you want to log. For Step 4 example: -A INPUT -i eth0 --dport 31337 -j LOG...
Page 207
Linux OS To configure SIEM to receive events from Linux IPtables: From the Log Source Type drop-down list box, select Linux iptables Firewall. For more information on configuring log sources, see the Log Sources User Guide. For more information on Linux IPtables, see the IPtables documentation. Linux OS A SIEM Linux OS DSM records Linux operating system events and forwards the events to SIEM using syslog or syslog-ng.
Page 208
INUX For more information on syslog, see your Linux operating system documentation. Configuring Linux OS To configure Linux OS using the syslog-ng protocol: Using Syslog-ng Log in to your Linux OS device, as a root user. Step 1 Open the file.
This section provides information on the following DSMs: McAfee Intrushield • McAfee ePolicy Orchestrator • • McAfee Application / Change Control • McAfee Web Gateway McAfee Intrushield A SIEM McAfee Intrushield DSM accepts events using syslog. SIEM records all relevant events. Before you configure SIEM to integrate with a McAfee Intrushield device, you must: Log in to the McAfee Intrushield Manager user interface.
Page 210
If you are using a version of McAfee Intrushield that has patches applied from 3.x and above, type the following to customize the message string: |$IV_ALERT_ID$|$IV_ALERT_TYPE$|$IV_ATTACK_TIME$|"$IV_ATTACK_ NAME$"|$IV_ATTACK_ID$|$IV_ATTACK_SEVERITY$|$IV_ATTACK_ SIGNATURE$|$IV_ATTACK_CONFIDENCE$|$IV_ADMIN_DOMAIN$|$IV_ SENSOR_NAME$|$IV_INTERFACE$|$IV_SOURCE_IP$|$IV_SOURCE_PORT$| $IV_DESTINATION_IP$|$IV_DESTINATION_PORT$| The custom message string must be entered as a single line, no carriage returns.
Page 211
McAfee ePolicy Orchestrator Using the Protocol Configuration drop-down list box, select JDBC. Step 6 The JDBC protocol parameters are displayed. NOTE You must refer to the Configure Database Settings on your ePO Management Console to configure the McAfee ePolicy Orchestrator DSM in SIEM. Configure the following values: Step 7 Table 39-2 McAfee ePO JDBC Parameters...
Page 212
Table 39-2 McAfee ePO JDBC Parameters (continued) Parameter Description Authentication If you select MSDE as the Database Type and the database is Domain configured for Windows, you must define the Window Authentication Domain. Otherwise, leave this parameter blank. Database Optional. Type the database instance, if you have multiple SQL Instance server instances on your database server.
Page 213
McAfee ePolicy Orchestrator Table 39-2 McAfee ePO JDBC Parameters (continued) Parameter Description Use Named Pipe Clear the Use Named Pipe Communications check box. Communication When using a Named Pipe connection, the username and password must be the appropriate Windows authentication username and password and not the database username and password.
Page 214
DNS Name - Type the DNS name of SIEM. IPv4 - Type the IPv4 address of SIEM. IPv6 - Type the IPv6 address of SIEM. From the SNMP Version drop-down list box, select the SNMP version to use with Step 7 SIEM.
Page 215
McAfee ePolicy Orchestrator From the list of SNMP servers, select the SNMP server you registered in Step From the Available Types drop-down list box, select List of All Values. Click >> to add to the following Select Types window from Table 39-3based on your McAfee ePolicy Orchestrator version.
Page 216
Configuring the Log Source in SIEM You are now ready to configure the log source and protocol in SIEM: To configure SIEM to receive events from a McAfee ePO device, you must select Step 1 the McAfee ePolicy Orchestrator option from the Log Source Type drop-down list box.
Page 217
McAfee Application / Change Control Table 39-4 McAfee Application / Change Control JDBC Parameters Parameter Description Log Source Type the identifier for the log source. Type the log source identifier Identifier in the following format: <McAfee Change Control Database>@<Change Control Database Server IP or Host Name>...
Page 218
Table 39-4 McAfee Application / Change Control JDBC Parameters (continued) Parameter Description Table Name Type SCOR_EVENTS as the name of the table or view that includes the event records. Select List Type * for all fields from the table or view. You may use a comma-separated list to define specific fields from tables or views, if required for your configuration.
Page 219
McAfee Web Gateway NOTE Selecting a value for the Credibility parameter greater than 5 will weight your McAfee Application / Change Control log source with a higher importance compared to other log sources in SIEM. Click Save. Step 9 On the Admin tab, click Deploy Changes. Step 10 For more information on configuring log sources, see the Log Sources User Guide.
Page 220
Importing the Syslog Log Handler To Import a policy rule set for the syslog handler: From the Enterasys Extranet, download the following compressed file: Step 1 log_handlers.tar.gz Extract the file. Step 2 This will give you the syslog handler file required to configure your McAfee Web Gateway appliance.
Page 221
McAfee Web Gateway This will give you the access handler file required to configure your McAfee Web Gateway appliance. access_log_file_loghandler.xml Log in to your McAfee Web Gateway console. Step 3 Using the menu toolbar, click Policy. Step 4 NOTE If there is an existing access log configuration in your McAfee Web Gateway appliance, you must delete the existing access log from the Rule Set Library before adding access_log_file_loghandler.xml.
Page 222
Pulling Data Using the Log File Protocol A log file protocol source allows SIEM to retrieve archived log files from a remote host. The McAfee Web Gateway DSM supports the bulk loading of access.log files using the log file protocol source. The default directory for the McAfee Web Gateway access logs are You are now ready to configure the log source and protocol in SIEM: To configure SIEM to receive events from a McAfee Web Gateway appliance,...
A SIEM MetaInfo MetaIP DSM accepts MetaIP events using syslog. SIEM records all relevant and available information from the event. Before configuring a MetaIP device in SIEM, you must configure your device to send syslog to SIEM. For more information about your MetaInfo MetaIP device, see your vendor documentation. You are now ready to configure the log source in SIEM.
ICROSOFT This section provides information on the following DSMs: Microsoft Exchange Server • Microsoft IAS Server • • Microsoft DHCP Server • Microsoft IIS Server Microsoft ISA • Microsoft SQL Server • Microsoft Windows Security Event Log • Microsoft Operations Manager •...
Page 226
ICROSOFT Table 41-1 Microsoft Exchange Format and Method of Configuration Version Mail Protocol Method of Import Microsoft Exchange 2003 Outlook Web Adaptive Log Exporter Access (OWA) Microsoft Exchange 2003 SMTP Adaptive Log Exporter Microsoft Exchange 2007 Adaptive Log Exporter Windows Exchange Protocol SMTP Windows Exchange Protocol Microsoft Exchange 2010...
Page 227
Microsoft Exchange Server From the list of properties, select all properties that you want to apply to the Step 7 Microsoft Exchange Server DSM. The selected properties must include the following: Select the Method (cs-method) check box. Select the Protocol Version (cs-version) check box. Click OK.
Page 228
ICROSOFT You are now ready to configure SIEM to receive events from a Microsoft Exchange Step 7 Server. To configure SIEM to receive events from the Microsoft Exchange Server: From the Log Source Type drop-down list box, select the Microsoft Exchange Server option, or configure the Adaptive Log Exporter.
Page 229
Microsoft IAS Server From the Log Source Type drop-down list box, select the Microsoft Exchange Server option, or configure the Adaptive Log Exporter. For information about the Adaptive Log Exporter, see the Adaptive Log Exporter Users Guide. For information about the Microsoft Exchange Protocol, see the Log Sources User Guide.
ICROSOFT Table 41-2 Microsoft DHCP Log File Examples Log Type Example IPv4 DhcpSrvLog-Mon.log IPv6 DhcpV6SrvLog-Wed.log By default Microsoft DHCP is configured to write audit logs to the %WINDIR%\system32\dhcp\ directory. Restart the DHCP service. Step 5 You are now ready to configure the log source and protocol in SIEM: To configure SIEM to receive events from a Microsoft DHCP Server, you must Step 1 select the Microsoft DHCP Server option from the Log Source Type drop-down...
Page 231
Microsoft IIS Server Table 41-1 Microsoft IIS Supported Log Types (continued) Supported Log Version Type Method of Import for SIEM Microsoft IIS 6.0 SMTP, NNTP, Adaptive Log Exporter or Snare FTP, HTTP Microsoft IIS 7.0 HTTP IIS Protocol Microsoft IIS 7.0 SMTP, NNTP, Adaptive Log Exporter or Snare FTP, HTTP...
Page 232
ICROSOFT Table 41-2 Required Properties for IIS Event Logs IIS 6.0 Required Properties IIS 7.0 Required Properties User Name (cs-username) User Name (cs-username) Server IP Address (s-ip) Server IP Address (s-ip) Server Port (s-port) Server Port (s-port) Method (cs-method) Method (cs-method) URI Stem (cs-uri-stem) URI Stem (cs-uri-stem) URI Query (cs-uri-query)
Page 233
Microsoft IIS Server Table 41-3 Microsoft IIS Protocol Parameters (continued) Parameter Description Domain Type the domain required to access the Microsoft IIS server. Folder Path Type the directory path to access the IIS log files. The default is /WINDOWS/system32/LogFiles/W3SVC1/ Parameters that support file paths allow you to define a drive letter with the path information.
Page 234
ICROSOFT Right-click on Default Web Sites and select Properties. Step 4 The Default Web Site Properties window is displayed. Select the Web Site tab. Step 5 Select the Enable logging check box. Step 6 From the Active Log Format drop-down list box, select W3C Extended Log File Step 7 Format.
Page 235
Microsoft IIS Server In the Target Host field, type the IP address of your SIEM installation. Step 5 In the Log Directory field type the IIS file location: Step 6 \%SystemRoot%\System32\LogFiles\ By default Snare for IIS is configured to look for logs in C:\WINNT\System32\LogFiles\ For Destination, select Syslog.
ICROSOFT Configuring The Adaptive Log Exporter is a stand-alone application that allows you to integrate Microsoft IIS Using device logs or application event data with SIEM. The Adaptive Log Export supports the Adaptive Log NCSA, IIS, and W3C active log formats. Exporter To integrate the Adaptive Log Exporter with Microsoft IIS, perform the following steps:...
Microsoft SQL Server For more information about your server, see your vendor documentation. Microsoft SQL A SIEM Microsoft SQL Server DSM accepts SQL audit events using syslog. You Server can integrate Microsoft SQL Server with SIEM using the Adaptive Log Exporter. For more information on the Adaptive Log Exporter, see the Adaptive Log Exporter Users Guide.
Page 238
ICROSOFT you must configure the firewall to allow DCOM communication. This includes configuring the firewall to permit port 135 to be accessible on the host, as well as permitting DCOM ports (generally random ports above 1024). If necessary, you can also configure specific ports to be accessible to DCOM. This depends on the version of Windows.
Microsoft Operations Manager You are now ready to configure the log source in SIEM: To configure SIEM to receive events from Windows security event logs, you must Step 1 select the Microsoft Windows Security Event Log option from the Log Source Type drop-down list box.
Page 240
ICROSOFT Table 41-6 Microsoft Operations Manager JDBC Parameters Parameter Description Log Source Type the identifier for the log source. Type the log source identifier Identifier in the following format: <MOM Database>@<MOM Database Server IP or Host Name> Where: <MOM Database> is the database name, as entered in the Database Name parameter.
Page 241
Microsoft Operations Manager Table 41-6 Microsoft Operations Manager JDBC Parameters (continued) Parameter Description Select List Type * for all fields from the table or view. You may use a comma-separated list to define specific fields from tables or views, if required for your configuration. The list must contain the field defined in the Compare Field parameter.
ICROSOFT Click Save. Step 7 On the Admin tab, click Deploy Changes. Step 8 For more information on configuring log sources, see the Log Sources User Guide. Microsoft System A SIEM Microsoft System Center Operations Manager (SCOM) DSM accepts Center Operations SCOM events by polling the OperationsManager database allowing SIEM to Manager record the relevant events.
Page 243
Microsoft System Center Operations Manager Table 41-7 Microsoft SCOM JDBC Parameters Parameter Description Log Source Type the identifier for the log source. Type the log source identifier Identifier in the following format: <SCOM Database>@<SCOM Database Server IP or Host Name> Where: <SCOM Database>...
Page 244
ICROSOFT Table 41-7 Microsoft SCOM JDBC Parameters (continued) Parameter Description Select List Type * for all fields from the table or view. You may use a comma-separated list to define specific fields from tables or views, if required for your configuration. The list must contain the field defined in the Compare Field parameter.
Page 245
Microsoft System Center Operations Manager Click Save. Step 7 On the Admin tab, click Deploy Changes. Step 8 For more information on configuring log sources, see the Log Sources User Guide. Configuring DSMs...
OTOROLA YMBOL The SIEM Symbol AP DSM accepts events using syslog. SIEM records all relevant events. Before configuring a Symbol AP device in SIEM, you must configure your device to send syslog events to SIEM. To configure the device to send syslog events to SIEM, perform the following steps: Log in to your Symbol AP device user interface.
Page 248
OTOROLA YMBOL You are now ready to configure the log source in SIEM. Step 9 To configure SIEM to receive events from a Symbol AP device: From the Log Source Type drop-down list box, select the Motorola SymbolAP option. For more information on configuring log sources, see the Log Sources User Guide.
ONTAP A SIEM NetApp Data ONTAP DSM accepts syslog events from a client running the SIEM Adaptive Log Exporter utility. The Adaptive Log Exporter NetApp Data ONTAP plug-in reads and processes event log messages generated from Common Internet File System (CIFS) auditing on the NetApp Data ONTAP device. The NetApp Data ONTAP plug-in for the Adaptive Log Exporter only supports CIFS.
ALUE The Name Value Pair (NVP) DSM allows you to integrate SIEM with devices that may not natively send logs using syslog. The NVP DSM provides a log format that allows you to send logs to SIEM. For example, for a device that does not export logs natively with syslog, you can create a script to export the logs from a device that SIEM does not support, format the logs in the NVP log format, and send the logs to SIEM using syslog.
Page 252
ALUE Table 44-1 NVP Log Format Tags (continued) Description EventName Type the event name that you want to use to identity the event in the Events interface when using the Event Mapping functionality. For more information on mapping events, see the SIEM Users Guide. This is a required parameter.
Examples Table 44-1 NVP Log Format Tags (continued) Description Identity Type TRUE or FALSE to indicate whether you wish this event to generate an identity event. An identity event is generated if the log message contains the SourceIp (if the IdentityUseSrcIp parameter is set to TRUE) or DestinationIp (if the IdentityUseSrcIp parameter is set to FALSE) and one of the following parameters: UserName,...
Page 254
ALUE SourceIp=172.15.210.113 DestinationIp=172.16.10.10 UserName=root Example 3 The following example provides identity using the source IP address: DeviceType=NVP EventName=Test EventCategory=Accept DeviceTime=2007/12/14 09:53:49 SourcePort=5014 Identity=TRUE IdentityUseSrcIp=TRUE SourceMAC=AA:15:C5:BF:C4:9D SourceIp=172.15.210.113 DestinationIp=172.16.10.10 DestinationMAC=00:41:C5:BF:C4:9D UserName=root Example 4 The following example provides an entry with no identity: DeviceType=NVP EventName=Test EventCategory=Accept...
IKSUN A SIEM Niksun DSM accepts Niksun events using syslog. SIEM records all relevant Niksun events. You can integrate NetDetector/NetVCR2005, version 3.2.1sp1_2 with SIEM. Before you configure SIEM to integrate with a Niksun device, you must configure syslog within your Niksun device. For more information on configuring Niksun, consult your Niksun documentation.
OKIA IREWALL A SIEM Nokia Firewall DSM accepts events using the following methods: Integrating Nokia Firewall Using Syslog • Integrating Nokia Firewall Using OPSEC • You can integrate Nokia Firewall version NG AI R55 with SIEM. Integrating Nokia This method ensures the SIEM Nokia Firewall DSM accepts Nokia events using Firewall Using syslog.
Page 258
OKIA IREWALL To configure SIEM to receive events from an Nokia Firewall device using syslog: From the Log Source Type drop-down list box, select Check Point FireWall-1. For more information on configuring log sources, see the Log Sources User Guide. Integrating Nokia This method ensures the SIEM Check Point FireWall-1 DSMs accepts FireWall-1 Firewall Using...
Page 259
Integrating Nokia Firewall Using OPSEC Select Communication and enter an activation key to configure the Secure Step 10 Internal Communication (SIC) certificate. Select OK and then select Close. Step 11 To install the policy on your firewall, select Policy > Install > OK. Step 12 Configuring DSMs...
ORTEL ETWORKS This section provides information on the following DSMs: Nortel Multiprotocol Router • Nortel Application Switch • • Nortel Contivity • Nortel Ethernet Routing Switch 2500/4500/5500 Nortel Ethernet Routing Switch 8300/8600 • Nortel Secure Router • Nortel Secure Network Access Switch •...
Page 262
ORTEL ETWORKS Type the following command to access syslog configuration: Step 4 syslog Type the following commands: Step 5 log-host address <IP address> Where is the IP address of your SIEM system. <IP address> View current default settings for your SIEM system: Step 6 info For example:...
Page 263
Nortel Multiprotocol Router fault-map critical info-map info name WILDCARD severity-mask {fault warning info trace debug} slot-lower-bound 0 slot-upper-bound 1 state enabled trace-map debug warning-map warning View the currently configured settings for the syslog filters: Step 13 show syslog filters When the syslog and filter parameters are correctly configured, the Operational State indicates For example: syslog# show syslog filters...
Page 264
ORTEL ETWORKS exit Exit the command line session: logout You are now ready to configure the log source in SIEM. Step 16 To configure SIEM to receive events from a Nortel Multiprotocol Router device: From the Log Source Type drop-down list box, select the Nortel Multiprotocol Router option.
Page 265
Nortel Contivity For more information on configuring log sources, see the Log Sources User Guide. For more information about the Nortel Application Switch, see http://www.nortel.com/support. Nortel Contivity A SIEM Nortel Contivity DSM accepts Nortel Contivity events using syslog. SIEM records all relevant events. Before you configure SIEM to integrate with a Nortel Contivity device, you must: Log in to the Nortel Contivity command line interface (CLI).
Page 266
ORTEL ETWORKS config term Type as the severity level for the logs you wish to send to the Step 3 informational remote server: logging remote level {critical|informational|serious|none} Where sends all logs to the syslog server. informational Enable the host: Step 4 host enable Type the remote logging address: Step 5...
Nortel Secure Router host <ID> facility local0 Where is the ID specified in Step <ID> Enable the host: Step 5 host enable Type the severity level for which syslog messages are sent: Step 6 host <ID> severity info Where is the ID specified in Step <ID>...
Page 268
ORTEL ETWORKS To configure the device to send syslog events to SIEM: Log in to the Nortel Secure Router command line interface (CLI). Step 1 Type the following to access global configuration mode: Step 2 config term Type the following command: Step 3 system logging syslog Type the IP address of the syslog server (SIEM system):...
Nortel Secure Network Access Switch qos: warning hdlc: warning local7: warning vpn: warning firewall: warning You are now ready to configure the log source in SIEM. Step 7 To configure SIEM to receive events from a Nortel Secure Router device: ...
ORTEL ETWORKS Nortel Switched A SIEM Nortel Switched Firewall 5100 DSM accepts events using either syslog or Firewall 5100 OPSEC. SIEM records all relevant events. Before configuring a Nortel Switched Firewall device in SIEM, you must configure your device to send events to SIEM. This section provides information on configuring a Nortel Switched Firewall using one the following methods: Integrating Nortel Switched Firewall Using Syslog...
Page 271
Nortel Switched Firewall 5100 Integrating Nortel This method ensures the SIEM Nortel Switched Firewall 5100 DSM accepts Check Switched Firewall Point FireWall-1 events using OPSEC. Using OPSEC NOTE Depending on your Operating System, the procedures for the Check Point SmartCenter Server may vary. The following procedures are based on the Check Point SecurePlatform Operating system.
ORTEL ETWORKS Configure the Log Source within SIEM You are now ready to configure the log source in SIEM. To configure SIEM to receive events from a Nortel Switched Firewall 5100 device Step 1 using OPSEC, you must select the Nortel Switched Firewall 5100 option from the Log Source Type drop-down list box.
Page 273
Nortel Switched Firewall 6000 To configure SIEM to receive events from an Nortel Switched Firewall 6000 using syslog: From the Log Source Type drop-down list box, select the Nortel Switched Firewall 6000 option. For more information on configuring log sources, see the Log Sources User Guide. For more information, see http://www.nortel.com/support.
ORTEL ETWORKS Select Close. Step 4 To create the OPSEC connection, select Manage > Servers and OPSEC Step 5 applications > New > OPSEC Application Properties. Type the Name and optional Comment. Step 6 The name you type must be different than the name in Step From the Host drop-down menu, select the host object you have created in Step...
Nortel VPN Gateway For more information on configuring log sources, see the Log Sources User Guide. For more information about Nortel TPS, see http://www.nortel.com/support. Nortel VPN A SIEM Nortel VPN Gateway DSM accepts events using syslog. SIEM records all Gateway relevant operating system (OS), system control, traffic processing, startup, configuration reload, AAA, and IPsec events.
OVELL E IRECTORY A SIEM Novell eDirectory DSM accepts audit events from Novell eDirectory using syslog. To use the Novell eDirectory DSM, you must have the following components installed: • Novell eDirectory v8.8 with service pack 6 (sp6) Novell iManager v2.7 •...
Page 278
OVELL E IRECTORY log4j.appender.S=org.apache.log4j.net.SyslogAppender To configure the IP address for the syslog destination, remove the comment Step 5 marker (#) and edit the following lines: log4j.appender.S.Host=<IP address> log4j.appender.S.Port=<Port> Where, is the IP address or hostname of SIEM. <IP address> is the port number for the UDP or TCP protocol. The default port for syslog <Port>...
Page 279
auditing. For information on configuring event auditing, see Configuring Event Auditing Using Novell iManager. Loading the XDASv2 on a Linux Operating System Log in to your Linux server hosting Novell eDirectory, as a root user. Step 1 Type the following command: Step 2 ndstrace -c "load xdasauditds"...
Page 280
OVELL E IRECTORY The Audit Configuration panel is displayed. In the NPC Server name field, type the name of your NPC Server. Step 4 Click OK. Step 5 The Audit Configuration for the NPC Server is displayed. Configure the following parameters: Step 6 On the Components panel, select one or both of the following: - DS - Select this check box to audit XDASv2 events for an eDirectory object.
Page 281
Configuring SIEM SIEM automatically detects syslog events from Novell eDirectory. However, if you with Novell want to manually configure SIEM to receive events from Novell eDirectory: eDirectory From the Log Source Type drop-down list box, select Novell eDirectory. For more information on configuring log sources, see the Log Sources User Guide. For more information about Novell eDirectory, Novell iManager, or XDASv2, see your vendor documentation.
A SIEM OpenBSD DSM accepts events using syslog. SIEM records all relevant informational, authentication, and system level events. Before you configure SIEM to integrate with OpenBSD, you must: Log in to your OpenBSD device, as a root user. Step 1 Open the file.
SNORT OURCE A SIEM Open Source SNORT DSM accepts SNORT events using syslog. SIEM records all relevant SNORT events. SourceFire’s VRT certified rules for registered SNORT users are supported, however, Bleeding Edge, Emerging Threat, and other third-party rule sets may not be fully supported by the Open Source SNORT DSM.
Page 286
SNORT OURCE Where is the system to which you want logs sent. <IP Address> Save and exit the file. Step 11 Restart syslog: Step 12 /etc/init.d/syslog restart You are now ready to configure the log source in SIEM. Step 13 To configure SIEM to receive events from a SNORT device: ...
RACLE This section provides information on configuring the following DSMs: Oracle Audit Records • • Oracle DB Listener • Oracle Audit Vault • Oracle OS Audit Oracle BEA WebLogic • Oracle Audit Oracle databases track auditing events, such as, user login and logouts, Records permission changes, table creation, and deletion and database inserts.
Page 288
RACLE To configure an Oracle Audit device to write audit logs to SIEM, see Integrating Oracle Audit Device with SIEM. If your system includes a large Oracle audit table (greater than 1 GB), see Improving Performance With Large Audit Tables. Integrating Oracle To configure the device to write audit logs: Audit Device with...
Page 289
Oracle Audit Records If you are using Oracle v9i or Oracle v10g Release 1, you must create a view, Step 7 using SQLplus to enable the SIEM integration. If you are using Oracle 10g Release 2 or later, you may skip this step: CREATE VIEW SIEM_audit_view AS SELECT CAST(dba_audit_trail.timestamp AS TIMESTAMP) AS SIEM_time, dba_audit_trail.* FROM dba_audit_trail;...
RACLE To create an index and a new view: From the Enterasys Extranet, download the appropriate file for your version of Step 1 Oracle: If you are using Oracle 9i or 10g Release 1, download the following file: oracle_9i_dba_audit_view.sql If you are using Oracle v10g Release 2 and v11g, download the following file: oracle_alt_dba_audit_view.sql...
Page 291
Oracle DB Listener Collecting Events The Oracle Database Listener protocol source allows SIEM to monitor log files Using the Oracle generated from an Oracle Listener database. Before you configure the Oracle Database Listener Database Listener protocol to monitor log files for processing, you must obtain the Protocol directory path to the Oracle Listener database log files.
Page 292
Perl scripts written for Oracle DB listener work on Linux/UNIX servers only. Windows Perl script is not supported. To install and configure the Perl script: Access the Enterasys Extranet: Step 1 http://extranet.enterasys.com/downloads/ Download the script to forward the Oracle DB Listener events.
Page 293
Oracle DB Listener Copy the Perl script to the server that hosts the Oracle server. Step 4 NOTE Perl 5.8 must be installed on the device that hosts the Oracle server. Log in to the Oracle server using an account that has read/write permissions for Step 5 file and the directory.
RACLE Table 51-1 Command Parameters (continued) Parameters Description The -I parameter defines the directory name where you wish to create the lock file. The default is /var/lock. This parameter is ignored if -D is specified. For example, to monitor the listener log on an Oracle 9i server with an IP address of 182.168.12.44 and forward events to SIEM with the IP address of 192.168.1.100, type the following: oracle_dblistener_fwdr.pl –t “tail –f...
Page 295
Oracle Audit Vault event can be mapped to a high-level and low-level category (or QID). Using the Oracle Audit Vault DSM, category mapping can be done by mapping your high or low category alerts directly to an alert name (ALERT_NAME field) in the payload. For information about the Events interface, see the SIEM Users Guide.
To avoid errors, do not delete log files you are actively monitoring unless the script is stopped, or processing is complete. To integrate the Oracle OS Audit DSM with SIEM: Access the Enterasys Extranet: Step 1 http://extranet.enterasys.com/downloads/ Download the following Oracle OS Audit DSM files: Step 2 oracle_osauditlog_fwdr.pl.gz...
Page 297
Oracle OS Audit /var/lock/ /var/run/ Restart the Oracle database instance. Step 10 Start the OS Audit DSM script: Step 11 oracle_osauditlog_fwdr.pl -t target_host -d logs_directory Table 51-2 Oracle OS Audit Command Parameters Parameters Description The -t parameter defines the remote host that receives the audit log files.
RACLE For more information about your Oracle Audit Record, see your vendor documentation. Oracle BEA The Oracle BEA WebLogic DSM allows SIEM to retrieve archived server logs and WebLogic audit logs from any remote host, such as your Oracle BEA WebLogic server. SIEM uses the log file protocol to retrieve events from your Oracle BEA WebLogic server and provide information on application events that occur in your domain or on a single server.
Page 299
Oracle BEA WebLogic Click Save. Step 4 You are now ready to configure application logging for the server. Configuring To configure application logging for Oracle BEA WebLogic: Application Logging From your Oracle WebLogic console, select Server > Logging > General. Step 1 From the Log file name parameter, type the directory path and file name for the Step 2...
Page 300
RACLE Click the Log Sources icon. Step 4 The Log Sources window is displayed. From the Log Source Type drop-down list box, select Oracle BEA WebLogic. Step 5 Using the Protocol Configuration drop-down list box, select Log File. Step 6 Configure the following parameters: Step 7 Table 51-3 Log File Parameters...
Page 301
Oracle BEA WebLogic Table 51-3 Log File Parameters (continued) Parameter Description FTP File Pattern If you select SFTP or FTP as the Service Type, this option allows you to configure the regular expression (regex) required to filter the list of files specified in the Remote Directory.
Page 302
RACLE Table 51-3 Log File Parameters (continued) Parameter Description Ignore Previously Select the check box to track files that have already been Processed File(s) processed and you do not want the files to be processed a second time. This only applies to FTP and SFTP Service Types.
ETWORKS The SIEM Palo Alto PA Series DSM accepts events using syslog. SIEM records syslog threat events forwarded from Palo Alto PA Series firewalls that have been classified into critical, high, medium, low and informational event categories. Before you configure SIEM to integrate with a Palo Alto PA Series firewall, you must: Log in to the Palo Alto Networks user interface.
Page 304
ETWORKS Click OK. Step 11 This saves the candidate configuration, but you must commit your changes to the active configuration. Click the Device tab. Step 12 The Device options menu is displayed. Click Commit from the top of the page to update your Palo Alto PA Series firewall Step 13 with the active configuration.
FTPd SIEM can collect events from a ProFTP server through syslog. By default, ProFTPd logs authentication related messages to the local syslog using the auth (or authpriv) facility. All other logging is done using the daemon facility. To log ProFTPd messages to SIEM, use the SyslogFacility directive to change the default facility.
ADWARE EFENSE A SIEM Radware DefensePro DSM accepts events using syslog. Event traps can also be mirrored to a syslog server. Before you configure SIEM to integrate with a Radware DefensePro device, you must configure your Radware DefensePro device to integrate with SIEM. You must configure the appropriate information using the Device >...
EDBACK The SIEM Redback ASE DSM accepts events using syslog. The Redback ASE device can send log messages to the Redback device console or to a log server that is integrated with SIEM to generate deployment specific reports. Before configuring a Redback ASE device in SIEM, you must configure your device to send syslog events to SIEM.
Page 310
EDBACK asp security default log server 10.172.55.55 log source 10.192.22.24 You are now ready to configure the log sources SIEM. Step 7 To configure SIEM to receive events from a Redback ASE device: From the Log Sources Type drop-down list box, select the Redback ASE option.
RSA A UTHENTICATION ANAGER An RSA Authentication Manager DSM allows you to integrate SIEM with an RSA Authentication Manager using syslog, or using the log file protocol. Before you configure SIEM to integrate with RSA Authentication Manager, select your configuration preference: Configuring RSA Using Syslog •...
Page 312
RSA A UTHENTICATION ANAGER Where is the IP address or hostname of SIEM. <IP address> Save the files. Step 4 ims.properties Open the following file for editing: Step 5 /etc/syslog.conf Type the following command to add SIEM as a syslog entry: Step 6 *.* @<IP address>...
Page 313
To configure SIEM to receive events from your RSA Authentication Manager: From the Log Source Type drop-down list box, select the RSA Authentication Manager option. For more information, see the Log Sources User Guide. For more information on configuring syslog forwarding, see your RSA Authentication Manager documentation.
Page 314
RSA A UTHENTICATION ANAGER You are now ready to configure the log sources and protocol within SIEM: To configure SIEM to receive events from a RSA device, you must select the RSA Step 1 Authentication Manager option from the Log Source Type drop-down list box. To configure the log file protocol, you must select the Log File option from the Step 2 Protocol Configuration drop-down list box.
AMHAIN The Samhain Labs Host-Based Intrusion Detection System (HIDS) monitors changes to files on the system. The Samhain HIDS DSM supports Samhain version 2.4 when used for File Integrity Monitoring (FIM). You can configure the Samhain HIDS DSM to accept one of the following log types: •...
Page 316
AMHAIN Restart syslog: Step 8 /etc/init.d/syslog restart Samhain sends logs using syslog to SIEM. You are now ready to configure Samhain HIDS DSM in SIEM. Step 9 To configure SIEM to receive events from Samhain: From the Log Source Type drop-down list box, select the Samhain HIDS option.
Page 317
Using JDBC Compare Field: log_index IP or Hostname: < Samhain SetDBHost> Port: <Default Port> Username: < Samhain SetDBUser> Password: < Samhain SetDBPassword> Polling Interval: <Default Interval> Where: is the database type used by Samhain (see your <Samhain Database Type> Samhain system administrator). is the database name specified in the samhainrc file.
ENTRIGO EDGEHOG You can integrate a Sentrigo Hedgehog device with SIEM. A Sentrigo Hedgehog device accepts LEEF events using syslog. Before you configure SIEM to integrate with a Sentrigo Hedgehog device, you must: Log in to the Sentrigo Hedgehog command line interface (CLI). Step 1 Open the following file for editing: Step 2...
Page 320
ENTRIGO EDGEHOG Stop and restart your Sentrigo Hedgehog service to implement the log.format Step 5 changes. You are now ready to configure the log source in SIEM. Step 6 To configure SIEM to receive events from a Sentrigo Hedgehog device: ...
ECURE OMPUTING IDEWINDER A SIEM Sidewinder DSM accepts Sidewinder events using syslog. SIEM records and processes all Sidewinder events. Before you configure SIEM to integrate with a Sidewinder device, you must configure syslog within your Sidewinder device. When configuring the Sidewinder device to forward syslog to SIEM, make sure that the logs are exported in Sidewinder Export format (SEF).
WALL ONIC A SIEM SonicWALL UTM/Firewall/VPN Appliance DSM accepts events using syslog. SIEM records all relevant events from SonicOS software. Before you configure SIEM to integrate with a SonicWALL UTM/Firewall/VPN device, you must configure syslog within the appliance. Once you configure SonicWall to forward events to SIEM, you are ready to configure the log source in SIEM.
OPHOS This section provides information on the following: Sophos Enterprise Console • • Sophos PureMessage • Sophos Astaro Security Gateway • Sophos Web Security Appliance Sophos Enterprise SIEM has two options for gathering events from a Sophos Enterprise Console Console using JDBC.
Page 326
OPHOS Click the Log Sources icon. Step 4 The Log Sources window is displayed. Click Add. Step 5 The Add a log source window is displayed. From the Log Source Type drop-down list box, select Sophos Enterprise Step 6 Console. From the Protocol Configuration drop-down list box, select Sophos Enterprise Step 7 Console JDBC.
Page 327
Sophos Enterprise Console Table 61-4 Sophos Enterprise Console JDBC Parameters (continued) Parameter Description Password Type the password required to access the database. The password can be up to 255 characters in length. Confirm Confirm the password required to access the database. The Password confirmation password must be identical to the password entered in the Password parameter.
Page 328
OPHOS Table 61-4 Sophos Enterprise Console JDBC Parameters (continued) Parameter Description Use Named Pipe Clear the Use Named Pipe Communications check box. Communication When using a Named Pipe connection, the username and password must be the appropriate Windows authentication username and password and not the database username and password.
Page 329
Sophos Enterprise Console Once you have created your custom view, you must configure SIEM to receive event information using the JDBC protocol. To configure the Sophos Enterprise Console DSM with SIEM, see Configure SIEM to Receive Events. Configure SIEM to To configure SIEM to access the Sophos database using the JDBC protocol: Receive Events Log in to SIEM.
Page 330
OPHOS Table 61-5 Sophos Enterprise Console JDBC Parameters (continued) Parameter Description Database Type From the drop-down list box, select MSDE. Database Name Type the exact name of the Sophos database. IP or Hostname Type the IP address or host name of the Sophos SQL Server. Port Type the port number used by the database server.
Sophos PureMessage Table 61-5 Sophos Enterprise Console JDBC Parameters (continued) Parameter Description Use Prepared Select the check box to use prepared statements. Statements Prepared statements allows the JDBC protocol source to setup the SQL statement once, and then execute the SQL statement many times with different parameters.
Page 332
OPHOS Sophos PureMessage for Linux - Stores events in a PostgreSQL database • specified as pmx_quarantine. This section provides information on the following: Integrating SIEM with Sophos PureMessage for Microsoft Exchange • Integrating SIEM with Sophos PureMessage for Linux • Integrating SIEM with To integrate SIEM with Sophos PureMessage for Microsoft Exchange: Sophos...
Page 333
Sophos PureMessage From the Log Source Type drop-down list box, select Sophos PureMessage. Step 6 From the Protocol Configuration drop-down list box, select JDBC. Step 7 NOTE You must refer to the database configuration settings on your Sophos PureMessage device to define the parameters required to configure the Sophos PureMessage DSM in SIEM.
Page 334
OPHOS Table 61-1 Sophos PureMessage JDBC Parameters (continued) Parameter Description Confirm Confirm the password required to access the database. The Password confirmation password must be identical to the password entered in the Password parameter. Authentication If you select MSDE as the Database Type and the database is Domain configured for Windows, you must define a Window Authentication Domain.
Page 335
Sophos PureMessage Table 61-1 Sophos PureMessage JDBC Parameters (continued) Parameter Description Use Named Pipe Clear the Use Named Pipe Communications check box. Communication When using a Named Pipe connection, the username and password must be the appropriate Windows authentication username and password and not the database username and password.
Page 336
OPHOS Configure SIEM to Receive Events From Sophos PureMessage for Microsoft Exchange To configure SIEM to access the Sophos PureMessage database using the JDBC protocol: Log in to SIEM. Step 1 Click the Admin tab. Step 2 In the navigation menu, click Data Sources. Step 3 The Data Sources panel is displayed.
Page 337
Sophos PureMessage Table 61-2 Sophos PureMessage JDBC Parameters (continued) Parameter Description Port Type the port number used by the database server. The default port is 1532. The JDBC configuration port must match the listener port of the Sophos database. The Sophos database must have incoming TCP connections enabled to communicate with SIEM.
OPHOS Table 61-2 Sophos PureMessage JDBC Parameters (continued) Parameter Description Polling Interval Type the polling interval, which is the amount of time between queries to the event table. The default polling interval is 10 seconds. You may define a longer polling interval by appending H for hours or M for minutes to the numeric value.
Sophos Web Security Appliance POP3 Proxy - Select this check box. Packet Filter - Select this check box. Intrusion Prevention System - Select this check box. Content Filter(HTTPS) - Select this check box. High availability - Select this check box. FTP Proxy - Select this check box.
Page 340
OPHOS TCP - Encrypted - TCP Encrypted is an unsupported protocol for SIEM. • Click Apply. Step 8 You are now ready to configure the Sophos Web Security Appliance DSM in SIEM. Step 9 SIEM automatically detects syslog data from a Sophos Web Security Appliance. To manually configure SIEM to receive events from Sophos Web Security Appliance: ...
OURCEFIRE This section provides information on the following DSMs: Sourcefire Intrusion Sensor • Sourcefire Defense Center (DC) • Sourcefire A SIEM Sourcefire Intrusion Sensor DSM accepts Snort based intrusion and Intrusion Sensor prevention syslog events from Sourcefire devices. SIEM records all relevant Sourcefire events.
Page 342
Sourcefire Defense Center. Before You Begin Before you can integrate SIEM with Sourcefire Defense Center, you must download and install the latest rpm files from the Enterasys Extranet: • Sourcefire Defense Center DSM For more information about installing DSMs, see Installing DSMs.
Page 343
Sourcefire Defense Center (DC) - If you are using a remote Event Collector to collect eStreamer events, type the IP address or hostname for the remote Event Collector. - If you are using HA, type the virtual IP address. Leave the password field blank. Click Save.
Page 344
OURCEFIRE Table 62-3 Sourcefire Defense Center Import Script Parameters (continued) Parameter Description The -o parameter allows you to overrides the default estreamer name for the keystore and truststore files. The -o parameter is required when using multiple Sourcefire Defense Center devices, as unique key file names are required.
Page 345
Sourcefire Defense Center (DC) Table 62-4 Sourcefire Defense Center Estreamer Parameters Parameter Description Log Source Identifier Type the IP address or hostname to identify the log source. The information in the Log Source Identifier field must be unique to the log source type. Server Address Type the IP address or hostname of the Sourcefire Defense Center device.
QUID ROXY A SIEM Squid Web Proxy DSM accepts events using syslog. SIEM records all cache and access log events. Before you configure SIEM to integrate with Squid Web Proxy, you must forward your cache and access logs to SIEM. To configure Squid to forward your logs using syslog: Log into the Squid device command line interface (CLI).
Page 348
QUID ROXY is the IP address or hostname of your SIEM system. <SIEM_IP_address> For example: info.local4 @172.16.210.50 Squid httpd log emulation must be turned off in syslog.conf. Step 8 For example: emulate_httpd_log off Save and close the file. Step 9 Type the following command to restart the syslog daemon: Step 10 /etc/init.d/syslog restart...
Page 349
TARENT ETWORKS The SIEM Starent Networks DSM accepts Event, Trace, Active, and Monitor events. SIEM records all relevant events. Before configuring a Starent Networks device in SIEM, you must configure your device to send syslog events to SIEM. To configure the device to send syslog events to SIEM: Log in to your Starent Networks device.
TARENT ETWORKS Table 64-1 Syslog Server Parameters (continued) Parameter Description pdu-data <format> Type the output format for the PDU when logged as one of following formats: none - Displays results in raw or unformatted text. • hex - Displays results in hexadecimal format. •...
Page 351
The following table provides the necessary parameters: Table 64-3 Active Log Parameters Parameter Description facility <facility> Type the facility message level. A facility is a protocol or task that is in use by the system. The local facility defines which logging options shall be applied for processes running locally.
Page 352
TARENT ETWORKS Configure the monitor log targets: Step 6 logging monitor {msid <ms_id>|username <username>} The following table provides the necessary parameters: Table 64-4 Monitor Log Parameters Parameter Description msid <md_id> Type an msid to define that a monitor log is generated for a session identified using the Mobile Station Identification (MDID) number.
TONESOFT ANAGEMENT ENTER The SIEM Stonesoft Management Center DSM accepts events using syslog. SIEM records all relevant LEEF formatted syslog events. Before configuring SIEM, you must configure your Stonesoft Management Center to export LEEF formatted syslog events. This document includes the steps required to edit LogServerConfiguration.txt file. Configuring the text file allows Stonesoft Management Center to export event data in LEEF format using syslog to SIEM.
Page 354
TONESOFT ANAGEMENT ENTER Table 65-1 Log Server Configuration Options Parameter Value Description SYSLOG_EXPORT_FORMAT LEEF Type LEEF as the export format to use for syslog. SYSLOG_EXPORT_ALERT YES | NO Type one of the following values: Yes - Exports alert entries to SIEM using syslog. •...
Page 355
Select the type of policy to modify: Step 2 Firewall - Select Firewall Policies > Edit Firewall Policy. • IPS - Select IPS Policies > Edit Firewall Policy. • Add an IPv4 Access rule with the following values to the firewall policy: Step 3 Source - Type the IPv4 address of your Stonesoft Management Center Log Server.
OLARIS This section provides DSM configuration information on the following: Sun Solaris • Sun Solaris DHCP • • Sun Solaris Sendmail • Sun Solaris Basic Security Mode (BSM) Sun Solaris A SIEM Sun Solaris DSM accepts Solaris authentication events using syslog. SIEM records all relevant events.
OLARIS Sun Solaris DHCP A SIEM Sun Solaris DHCP DSM accepts Solaris DHCP events using syslog. SIEM records all relevant events. Before you configure SIEM to integrate with Solaris DHCP, you must: Log in to the Sun Solaris command line interface. Step 1 Open the file.
Sun Solaris Basic Security Mode (BSM) mail.*; @<IP address> Where is the IP address of the SIEM system. Use tabs instead of <IP address> spaces to format the line. NOTE Depending on the version of Solaris you are running, you may need to add additional log types to the file.
Page 360
OLARIS The bsmconv script enables Solaris Basic Security Mode and starts the auditing service auditd. Type the following command to open the audit control log for editing: Step 4 vi /etc/security/audit_control Edit the audit control file to contain the following information: Step 5 dir:/var/audit flags:lo,ad,ex,-fw,-fc,-fd,-fr...
Page 361
Sun Solaris Basic Security Mode (BSM) FILES=$(ls -lrt | tr -s " " | cut -d" " -f9 | grep -v "not_terminated") # We just created a new audit log by doing 'audit -n', so we can # be sure that the last file in the list will be the latest # archived binary log file.
Page 362
OLARIS vi cronfile Add the following information to your cronfile: Step 3 0 0 * * * /etc/security/newauditlog.sh Save the change to the cronfile. Step 4 Type the following command to add the cronfile to crontab: Step 5 crontab cronfile You are now ready to configure the log source in SIEM to retrieve the Sun Solaris Step 6 BSM audit log files.
Page 363
Sun Solaris Basic Security Mode (BSM) Table 66-2 Log File Parameters (continued) Parameter Description Remote Port Type the TCP port on the remote host that is running the selected Service Type. If you configure the Service Type as FTP, the default is 21. If you configure the Service Type as SFTP or SCP, the default is 22.
Page 364
OLARIS Table 66-2 Log File Parameters (continued) Parameter Description FTP Transfer Mode This option only appears if you select FTP as the Service Type. The FTP Transfer Mode parameter allows you to define the file transfer mode when retrieving log files over FTP. From the drop-down list box, select the transfer mode you want to apply to this log source: Binary - Select Binary for log sources that require binary...
Page 365
Sun Solaris Basic Security Mode (BSM) Table 66-2 Log File Parameters (continued) Parameter Description Event Generator From the Event Generator drop-down list box, select LINEBYLINE. Click Save. Step 8 Configuring DSMs...
YBASE You can integrate a Sybase Adaptive Server Enterprise (ASE) device with SIEM. A Sybase ASE accepts events using JDBC. Before you configure SIEM to integrate with a Sybase ASE device, you must: Configure Sybase auditing. Step 1 For information about configuring Sybase auditing, see your Sybase documentation.
Page 368
YBASE union select audit_event_name(event) as event_name, * from sysaudits_03, union select audit_event_name(event) as event_name, * from sysaudits_04 You are now ready to configure the log source SIEM. Step 6 To configure SIEM to receive events from a Sybase ASE device: Log in to SIEM.
YMANTEC This section provides information on the following DSMs: Symantec Endpoint Protection • Symantec SGS • • Symantec System Center • Symantec Data Loss Prevention (DLP) Symantec Endpoint A SIEM Symantec Endpoint Protection DSM accepts events using syslog. SIEM Protection records all Audit and Security log events.
YMANTEC Click OK. Step 8 You are now ready to configure the log source in SIEM. Step 9 To configure SIEM to receive events from a Symantec Endpoint Protection device: From the Log Source Type drop-down list box, select the Symantec Endpoint Protection option.
Page 371
Symantec System Center dbo.actualaction.Actualaction AS [action], dbo.alerts.Alertdatetime AS [date], dbo.clientuser.Clientuser AS user_name FROM dbo.alerts INNER JOIN dbo.virus ON dbo.alerts.Virusname_Idx = dbo.virus.Virusname_Idx INNER JOIN dbo.inventory ON dbo.alerts.Computer_Idx = dbo.inventory.Computer_Idx INNER JOIN dbo.actualaction ON dbo.alerts.Actualaction_Idx = dbo.actualaction.Actualaction_Idx INNER JOIN dbo.clientuser ON dbo.alerts.Clientuser_Idx = dbo.clientuser.Clientuser_Idx Once you have created your custom view, you must configure SIEM to receive event information using the JDBC protocol.
Page 372
YMANTEC Table 68-3 Symantec System Center JDBC Parameters Parameter Description Log Source Type the identifier for the log source. Type the log source identifier Identifier in the following format: <SSC Database>@<SSC Database Server IP or Host Name> Where: <SSC Database> is the database name, as entered in the Database Name parameter.
Page 373
Symantec System Center Table 68-3 Symantec System Center JDBC Parameters (continued) Parameter Description Select List Type * for all fields from the table or view. You may use a comma separated list to define specific tables or views, if required for your configuration. The comma separated list can be up to 255 alphanumeric characters in length.
YMANTEC On the Admin tab, click Deploy Changes. Step 10 SIEMFor information on configuring the JDBC protocol, see the Log Sources User Guide. Symantec Data A SIEM Symantec Data Loss Protection (DLP) DSM accepts events from a Loss Prevention Symantec DLP appliance using syslog. Before configuring SIEM, you must (DLP) configure response rules on your Symantec DLP.
Page 375
Symantec Data Loss Prevention (DLP) On the Conditions panel, select the following conditions: Step 8 From the first drop-down list box, select Protocol or Endpoint Monitoring. • From the second drop-down list box, select Is Any Of. • • From the third drop-down list box, select SMTP. On the Actions panel, click Add Action.
Page 376
YMANTEC Click Add Condition. Step 6 On the Conditions panel, select the following conditions: Step 7 From the first drop-down list box, select Protocol or Endpoint Monitoring. • From the second drop-down list box, select Is Any Of. • • From the third drop-down list box, select None Of SMTP.
(TCP) logs to SIEM before you configure SIEM to integrate with PowerBroker. To configure Symark PowerBroker to forward syslog to SIEM: Access the Enterasys Extranet: Step 1 http://extranet.enterasys.com/downloads/ Download the Perl script for the Symark PowerBroker DSM: Step 2 pbforwarder.pl.gz...
Page 378
Table 69-1 Command Parameters (continued) Parameters Description The -h parameter defines the receiving syslog host (the Event Collector host name or IP address being used to receive the logs). The -p parameter defines the TCP port to be used for sending events. If nothing is specified, 514 is used.
IPPING OINT This section provides information on the following DSMs: TippingPoint Intrusion Prevention System • TippingPoint X505/X506 Device • TippingPoint The SIEM TippingPoint Intrusion Prevention System (IPS) DSM accepts Intrusion TippingPoint events using syslog. SIEM records all relevant events from either a Prevention System Local Security Management (LMS) device or multiple devices with a Security Management System (SMS).
Page 380
IPPING OINT Log Type - Select SMS 2.0 / 2.1 Syslog format from the drop-down list box. Facility - Select Log Audit from the drop-down list box. Severity - Select Severity in Event from the drop-down list box. Delimiter - Select TAB as the delimiter for the generated logs. Include Timestamp in Header - Select Use original event timestamp.
TippingPoint X505/X506 Device NOTE If SIEM resides in a different subnet than your Tipping Point device, you may have to add static routes. For more information, see your vendor documentation. Click Save. Step 8 You are now ready to configure the action set for your LSM, see Configuring an Action Set for LSM.
Page 382
IPPING OINT TippingPoint X505/X506 device in SIEM, you must configure your TippingPoint device to send syslog events to SIEM. To configure the device to send system, audit, VPN, and firewall session log events to SIEM: Log in to the TippingPoint X505/X506 device. Step 1 From the LSM menu, select System >...
AYER A SIEM Top Layer IPS DSM accepts Top Layer IPS events using syslog. SIEM records and processes Top Layer events. Before you configure SIEM to integrate with a Top Layer device, you must configure syslog within your Top Layer IPS device.
REND ICRO This section provides information on the following DSMs: Trend Micro InterScan VirusWall • Trend Micro Control Manager • • Trend Micro Office Scan Trend Micro A SIEM Trend Micro InterScan VirusWall DSM accepts events using syslog. You InterScan VirusWall can integrate InterScan VirusWall logs with SIEM using the SIEM Adaptive Log Exporter.
REND ICRO You are now ready to configure events in the Event Center. Select Administration > Event Center. Step 1 From the Event Category list, expand Alert. Step 2 Click Recipients for an alert. Step 3 In Notification methods, select the SNMP Trap Notification check box. Step 4 Click Save.
Page 387
Trend Micro Office Scan Select Standard Notifications. Click the SNMP Trap tab. Select the Enable notification via SNMP Trap for Virus/Malware Detections check box. Type the following message in the field (this should be the default): Virus/Malware: %v Computer: %s Domain: %m File: %p Date/Time: %y...
Page 388
REND ICRO Click Save. You are now ready to configure the log sources in SIEM. Step 7 To configure the Trend Micro Office Scan device: From the Log Source Type drop-down list box, select the Trend Micro Office Step 1 Scan option.
Page 389
Trend Micro Office Scan Type the following message in the field: Virus/Malware: %v Spyware/Grayware: %T Computer: %s IP address: %i Domain: %m File: %p Date/Time: %y Result: %a User name: %n Click Save. Step 4 You must now configure Outbreak Notifications. See Configuring Outbreak Criteria and Alert Notifications.
Page 390
REND ICRO To configure the Trend Micro Office Scan device: From the Log Source Type drop-down list box, select the Trend Micro Office Step 1 Scan option. From the Protocol Configuration drop-down list box, select the SNMPv2 option. Step 2 For more information on configuring log sources, see the Log Sources User Guide.
Page 391
RIPWIRE A SIEM Tripwire DSM accepts resource additions, removal, and modification events using syslog. Before you configure SIEM to integrate with Tripwire, you must: Log in to the Tripwire interface. Step 1 In the left-hand navigation, click Actions. Step 2 Click New Action.
Page 393
ROPOS ONTROL The SIEM Tropos Control DSM accepts events using syslog, enabling SIEM to record all fault management, login and logout events, provisioning events, and device image upload events. Before configuring SIEM, you must configure your Tropos Control to send syslog events to SIEM. To configure Tropos Control to forward logs using syslog to SIEM: Using SSH log in to your Tropos Control device, as a root user.
Page 395
NIVERSAL SIEM collects and correlates events from network infrastructure and security devices. Once the events are collected and before the correlation can begin, the individual events from these devices must be properly parsed to determine the event name, IP addresses, protocol, and ports. For common network devices (such as, NetScreen Firewalls) predefined DSMs have been engineered into SIEM to properly parse all event messages from the respective devices.
Page 397
360 DSM ERICEPT ONTENT A SIEM Vericept Content 360 DSM accepts Vericept events using syslog. SIEM records all relevant and available information from the event. Before configuring a Vericept device in SIEM, you must configure your device to send syslog to SIEM. For more information on configuring your Vericept device, consult your vendor documentation.
Page 399
EBSENSE ERIES This section provides information on the following DSMs: Websense V-Series Data Security Suite • Websense V-Series Content Gateway • Websense V-Series The SIEM Websense V-Series Data Security Suite DSM supports Websense Data Security Suite V-Series appliances and the Data Security Suite (DSS) software. The SIEM Websense V-Series Data Security Suite DSM accepts events using syslog.
Page 400
EBSENSE ERIES To configure SIEM to receive events from a Websense V-Series appliance: From the Log Source Type drop-down list box, select Websense V Series. For more information on configuring log sources, see the Log Sources User Guide. For more information on configuring your Websense V-Series appliance, consult your vendor documentation.
Page 401
Websense V-Series Content Gateway Click the Custom tab. Step 6 In the Custom Log File Definitions window, type the following text for the LEEF Step 7 format. <LogFormat> <Name = "leef"/> <Format = "LEEF:1.0|Websense|WCG|7.6|%<wsds>|cat=%<wc> src=%<chi> devTime= %<cqtn> devTimeFormat=dd/MMM/yyyy:HH:mm:ss http-username=%<caun> url=%<cquc> method=%<cqhm>...
Page 402
EBSENSE ERIES nohup /bin/bash –c “while [ 1 ] ; do tail -F /opt/WCG/logs/leef.log | nc <IP Address> 514; sleep 1; done” & NOTE You may need to type the logging command in Step 3 or copy the command to a text editor to interpret the quotation marks.
Page 403
Websense V-Series Content Gateway You are now ready to enable event logging for your Websense V-Series Content Gateway. For more information, see Pulling Data Using Log File Protocol. Pulling Data Using Log File Protocol When configuring your Websense V-Series DSM to use the log file protocol, make sure the hostname or IP address configured in the Websense V-Series is the same as configured in the Remote Host parameter in the Log File Protocol configuration.
Page 405
UPPORTED Table 78-1 provides information on the DSMs SIEM supports. SIEM integrates with many manufacturers and vendors of security products. Our list of supported DSMs and documentation is constantly growing. If your DSM doesn’t appear in this document, contact your sales representative. Table 78-1 Supported DSMs Events SIEM Recorded...
Page 406
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information Bridgewater v8.2c1 Syslog All relevant events Bridgewater Systems AAA http://www.bridgewater Systems Service Controller systems.com Access v1.4 Log File All relevant events CA ACF2 http://www.ca.com Control...
Page 407
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information v7.x and Syslog All relevant events Cisco Adaptive Security http://www.cisco.com above Appliance (ASA) v7.x and NSEL All relevant events Cisco Adaptive Security http://www.cisco.com above Protocol...
Page 408
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information IOS, 12.2, Syslog All relevant events Cisco IOS or select your Yes* http://www.cisco.com 12.5, and specific device type: above Cisco 12000 Series •...
Page 409
All relevant Matrix Enterasys K/N/S Series http://www.enterasys.co Series Switch K-Series, N-Series Switch and S-Series device events Stackable and Syslog All relevant events Enterasys Stackable and http://www.enterasys.co Standalone Standalone Switches or Switches select your specific device type: Enterasys A-Series • Enterasys B2-Series •...
Page 410
Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information HiPath V2R2.0.30 Syslog All relevant events Enterasys HiPath http://www.enterasys.co Wireless Controller v3.2 and Syslog All relevant events Enterasys NAC http://www.enterasys.co v3.3 Extreme Extreme v7.7 and...
Page 411
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information Tandem Log File Safe Guard Audit HP Tandem http://www.HP.com Protocol file events ProCurve K.14.52 Syslog All relevant events HP ProCurve http://www.HP.com v11.x and Syslog...
Page 412
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information v8.x and Log File All relevant events IBM DB2 http://www.ibm.com above Protocol WebSphere 5.0.x to Log File All relevant events IBM WebSphere http://www.ibm.com Application...
Page 413
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information Juniper Secure Juniper Syslog All relevant events Juniper Networks Secure http://www.juniper.net Networks Access Access (SA) SSL VPN version 6.1R2 and Juniper IC...
Page 414
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information JunOS v7.x to Syslog or All relevant events Juniper JunOS Platform or Yes** http://www.juniper.net v10.x PCAP select your specific device Syslog*** type: Ex-Series...
Page 415
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information McAfee Intrushield v2.1.x and Syslog All relevant events McAfee IntruShield http://www.mcafee.com above Network IPS Appliance ePolicy v3.5 to JDBC All relevant McAfee ePolicy...
Page 416
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information Microsoft 2000, Syslog or All relevant events Microsoft Windows http://www.microsoft.com Windows 2003, Microsoft Security Event Log Event 2008, XP, Windows Security Log...
Page 417
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information Nokia Firewall NG FP1, Syslog or All relevant events Check Point Firewall-1 http://www.nokia.com FP2, FP3, OPSEC AI R54, AI R55, NGX on IPSO v3.8 and...
Page 418
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information Ethernet v4.1 Syslog All relevant events Nortel Ethernet Routing http://www.nortel.com Routing Switch 8300/8600 Switch 8300 Ethernet v5.0 Syslog All relevant events Nortel Ethernet Routing http://www.nortel.com...
Page 419
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information Oracle Audit Records v9i, v10g, Syslog All relevant Oracle Oracle RDBMS Audit http://www.oracle.com and v11g JDBC events Record Database v9i, v10g,...
Page 420
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information Sophos Astaro v8.x Syslog All relevant events Sophos Astaro Security http://www.sophos.com Gateway Enterprise v4.5.1 Sophos All relevant events Sophos Enterprise http://www.sophos.com Console Enterprise...
Page 421
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information Solaris v5.8, v5.9, Syslog All relevant events Solaris Operating System http://www.sun.com Sun OS Authentication Messages v5.8, v5.9 Solaris DHCP v2.8 Syslog All relevant events Solaris Operating System...
Page 422
Table 78-1 Supported DSMs (Continued) Events SIEM Recorded Auto Includes Manufacturer DSM Version Accepted Events Option in SIEM Discovered Identity For More Information Trend Micro InterScan v6.0 and Syslog All relevant events Trend InterScan VirusWall Yes http://www.trendmicro.co VirusWall above Control v5.0 SNMPv1, All relevant events Trend Micro Control...
Need help?
Do you have a question about the Security Information and Event Manager (SIEM) and is the answer not in the manual?
Questions and answers