Anda di halaman 1dari 355

Symantec Security Information Manager 4.

8 User Guide

Symantec Security Information Manager User Guide


The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: 4.8

Legal Notice
Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (Third Party Programs). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1

Technical Support
Symantec Technical Support maintains support centers globally. Technical Supports primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantecs support offerings include the following:

A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services

For information about Symantecs support offerings, you can visit our Web site at the following URL: www.symantec.com/business/support/ All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy.

Contacting Technical Support


Customers with a current support agreement may access Technical Support information at the following URL: www.symantec.com/business/support/ Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available:

Product release level

Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description:

Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes

Licensing and registration


If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: www.symantec.com/business/support/

Customer service
Customer service information is available at the following URL: www.symantec.com/business/support/ Customer Service is available to assist with non-technical questions, such as the following types of issues:

Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs, DVDs, or manuals

Support agreement resources


If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows:
Asia-Pacific and Japan Europe, Middle-East, and Africa North America and Latin America customercare_apac@symantec.com semea@symantec.com supportsolutions@symantec.com

Contents

Technical Support ............................................................................................... 4

Section 1
Chapter 1

Introducing Symantec Security Information Manager .......................................... 15


Overview ................................................................................ 17
About Symantec Security Information Manager ................................ About workflow in Information Manager .......................................... About Information Manager components ......................................... About security products and devices .......................................... About event collectors ............................................................ About Information Manager servers .......................................... About the Symantec DeepSight ................................................ About the Information Manager Web service .............................. 17 18 19 20 20 21 22 22

Chapter 2

Symantec Security Information Manager Console ............................................................................ 23


About the Information Manager console ........................................... About the Dashboard view ...................................................... About the Intelligence view ...................................................... About the Incidents view ......................................................... About the Events view ............................................................ About the Tickets view ............................................................ About the Assets view ............................................................. About the Reports view .......................................................... About the Rules view .............................................................. About the System view ............................................................ About the Statistics view ......................................................... About the features of the Information Manager console ...................... About the incident and the alert monitors .................................. About the event activity monitor .............................................. About the Notes feature .......................................................... Creating and editing notes ....................................................... Searching the notes ................................................................ 23 24 25 26 29 31 34 36 38 56 57 58 58 59 59 60 61

Contents

About user actions ................................................................. Creating and modifying user actions .......................................... Opening the Information Manager console from the command line ................................................................................ Changing a password ..............................................................

63 63 64 65

Chapter 3

Symantec Security Information Manager Web configuration interface ................................................ 67


About the Information Manager Web interface ................................. 67 Accessing the Web configuration interface ....................................... 68 About the features of the Web configuration interface ........................ 68

Section 2
Chapter 4

Planning for security management

................. 73

Managing the correlation environment .......................... 75


About the Correlation Manager ....................................................... 75 About the Correlation Manager knowledge base ................................. 76 About the default rules set ............................................................ 76

Chapter 5

Defining rules strategy ....................................................... 81


About creating the right rule set for your business ............................. 81 About defining a rules strategy ....................................................... 83 About correlation rules ................................................................. 83 About rule conditions ................................................................... 84 About rule types .................................................................... 85 About event criteria ................................................................ 89 About the Event Count, Span, and Table Size rule settings ................... 92 About the Tracking Key and Conclusion Creation fields ....................... 92 About the Correlate By and Resource fields ....................................... 94 Importing existing rules ................................................................ 95 Creating custom correlation rules ................................................... 96 Creating a multicondition rule ................................................ 100 Creating a correlation rule based on the X not followed by Y rule type ............................................................................. 105 Creating a correlation rule based on the X not followed by X rule type ............................................................................. 107 Creating a correlation rule for the Y not preceded by X rule type ............................................................................. 108 Creating a correlation rule for the Lookup Table Update .............. 110 Enabling and disabling rules ......................................................... 112 Working with the Lookup Tables window ........................................ 112

Contents

Creating a user-defined Lookup Table ...................................... 117 Importing Lookup Tables and records ...................................... 119

Section 3
Chapter 6

Getting started with the Information Manager ..................................................................... 121


Configuring the Console ................................................... 123
About configuring Information Manager ........................................ Identifying critical systems .......................................................... Adding a policy .......................................................................... Specifying networks ................................................................... About customizations for a Service Provider Master console .............. 123 124 126 126 127

Chapter 7

Managing roles and permissions ................................... 129


About managing roles ................................................................. About the administrator roles ................................................. About the default roles in the Information Manager server .......... About planning for role creation ............................................. Creating a role ..................................................................... Editing role properties ........................................................... Deleting a role ..................................................................... About working with permissions ................................................... About permissions ................................................................ About the propagation of permissions ...................................... Modifying permissions from the Permissions dialog box .............. 129 130 130 131 132 135 147 147 148 149 150

Chapter 8

Managing users and user groups ................................... 153


About users and passwords .......................................................... Customizing the password policy .................................................. Creating a new user .................................................................... Creating a user group .................................................................. About editing user properties ....................................................... Changing a users password .................................................... Specifying user business and contact information ...................... Managing role assignments and properties ............................... Managing user group assignments ........................................... Specifying notification information ......................................... About modifying user permissions ................................................. Modifying a user group ................................................................ Deleting a user or a user group ...................................................... 153 155 156 158 159 160 160 161 162 164 166 166 167

10

Contents

About integrating Active Directory with the Information Manager server ................................................................................. Managing Active Directory configurations ...................................... Changing the password for Linux accounts ..................................... Changing the password for symcmgmt Linux account .................

168 168 170 171

Chapter 9

Managing organizational units and computers .......... 173


About organizational units ........................................................... About managing organizational units ............................................ Creating a new organizational unit .......................................... About determining the length of the organizational unit name ................................................................................... Editing organizational unit properties ...................................... About modifying organizational unit permissions ...................... Deleting an organizational unit ............................................... About managing computers within organizational units .................... Creating computers within organizational units ......................... About editing computer properties .......................................... Distributing configurations to computers in an organizational unit .............................................................................. Moving a computer to a different organizational unit .................. About modifying computer permissions ................................... Deleting a computer from an organizational unit ....................... 173 173 174 175 176 176 177 177 178 179 192 193 194 194

Section 4
Chapter 10

Understanding event collectors ........................ 197


Introducing event collectors ........................................... 199
About Event Collectors and Information Manager ............................ Collectors .................................................................................. About Symantec Universal Collectors ............................................. About Custom Log Management .................................................... Downloading and installing the Symantec Universal Collectors .......... Correlating the logs collected in a file from a proprietary application .......................................................................... 199 200 201 201 203 204

Chapter 11

Configuring collectors for event filtering and aggregation ................................................................... 207


Configuring the event filtering rules .............................................. 207 Configuring event aggregation ...................................................... 210

Contents

11

Section 5
Chapter 12

Working with events and event archives ...................................................................... 215


Managing event archives ................................................. 217
About events, conclusions, and incidents ........................................ About the Events view ................................................................. About the event lifecycle ............................................................. About event archives .................................................................. About multiple event archives ...................................................... Creating new event archives ......................................................... Specifying event archive settings .................................................. Creating a local copy of event archives on a network computer ........... Restoring event archives .............................................................. Viewing event data in the archives ................................................ About the event archive viewer right pane ................................ Manipulating the event data histogram .................................... Setting a custom date and time range ....................................... About viewing event details .................................................... Modifying the format of the event details table .......................... Searching within event query results ....................................... Filtering event data .............................................................. About working with event queries ................................................. Using the Source View query and Target View query ................... Creating query groups ........................................................... Querying across multiple archives ........................................... Creating custom queries ........................................................ Editing queries ..................................................................... Managing the color scheme that is used in query results .............. About querying for IP addresses .............................................. Importing queries ................................................................. Exporting queries ................................................................. Publishing queries ................................................................ Scheduling queries that can be distributed as reports .................. Deleting queries ................................................................... 217 218 218 220 220 221 222 224 225 226 227 227 228 229 229 231 231 236 236 237 237 238 244 245 246 246 247 247 248 249

Chapter 13

Forwarding events to the Information Manager Server ............................................................................. 251


About forwarding events to an Information Manager server ............... About registering a security directory ............................................ Registering Collectors ................................................................. Registering with a security domain ................................................ 251 253 254 255

12

Contents

Activating event forwarding ......................................................... 256 Stopping event forwarding ........................................................... 259

Chapter 14

Understanding event normalization .............................. 261


About event normalization ........................................................... 261 About normalization (.norm) files .................................................. 263

Chapter 15

Collector-based event filtering and aggregation ................................................................... 265


About collector-based event filtering and aggregation ....................... About identifying common events for collector-based filtering or aggregation ......................................................................... About preparing to create collector-based rules ............................... Accessing event data in the Information Manager console ................. Creating collector-based filtering and aggregation specifications ...................................................................... Examples of collector-based filtering and aggregation rules ............... Filtering events generated by specific internal networks .............. Filtering common firewall events ............................................ Filtering common Symantec AntiVirus events ........................... Filtering or aggregating vulnerability assessment events ............. Filtering Windows Event Log events ........................................ 265 267 268 270 271 273 273 274 277 278 279

Section 6
Chapter 16

Working with incidents ........................................... 283


Managing Incidents ........................................................... 285
About incident management ......................................................... Incident identification ........................................................... Example: Information Manager automates incident management during a Blaster worm attack ............................................ Threat containment, eradication, and recovery .......................... Follow-up ............................................................................ Viewing incidents ...................................................................... About the incident list ........................................................... Viewing and modifying the incident list ................................... About creating and modifying incidents ......................................... Creating incidents manually ................................................... Modifying incidents ............................................................. Merging incidents ................................................................ Closing an incident ..................................................................... Reopening a closed incident ......................................................... 285 286 287 287 287 287 287 289 290 291 292 293 294 295

Contents

13

Printing incident details .............................................................. Printing the incident, ticket, or asset list ......................................... Exporting the incident, ticket, or asset list ...................................... Assigning incidents automatically to the least busy member in a user group .................................................................................

295 296 296 298

Chapter 17

Working with filters in the Incidents view .................... 301


About filtering incidents .............................................................. Modifying a custom filter ............................................................. Creating a custom filter ............................................................... Deleting a custom filter ............................................................... Searching within incident filtering results ...................................... 301 301 302 302 303

Section 7
Chapter 18

Working with tickets ................................................ 305


Managing tickets
............................................................... 307 307 308 308 309 310 310 311 312 312 313 313 314 About tickets ............................................................................. About creating tickets ................................................................ Creating a ticket manually ........................................................... Creating a ticket category ............................................................ Viewing tickets .......................................................................... About the Ticket Details window ................................................... Viewing tickets associated with a specific incident ............................ Setting ticket task dispositions ..................................................... Changing the priority of a ticket .................................................... Adding a ticket note .................................................................... Closing a ticket .......................................................................... Printing the ticket list .................................................................

Chapter 19

Working with filters in Tickets view ............................... 315


Filtering tickets .......................................................................... 315 Modifying a custom ticket filter .................................................... 316 Deleting a custom ticket filter ....................................................... 317

Chapter 20

Working with Assets .......................................................... 319


About the Assets view ................................................................. 319 Importing assets into the Assets table ............................................ 321

14

Contents

Section 8
Chapter 21

Working with reports and dashboards ......... 323


Managing reports .............................................................. 325
Working with reports .................................................................. About reports ...................................................................... Creating custom reports ........................................................ Creating a report group or folder ............................................. Editing tabular queries in reports ............................................ Publishing reports ................................................................ Enabling the email distribution of reports ................................. Scheduling and distributing reports ......................................... Modifying the report distribution ............................................ Viewing reports ................................................................... Configuring a report for portrait or landscape mode ................... Printing and saving reports .................................................... Exporting reports ................................................................. Importing reports ................................................................. Performing a drill-down on reports ................................................ 325 325 325 328 329 329 330 331 335 335 337 337 338 339 339

Chapter 22

Managing dashboards ...................................................... 343


About the dashboard ................................................................... Viewing dashboards .................................................................... Viewing queries in the Dashboard ................................................. Performing a drill-down on dashboards .......................................... Refreshing the dashboard ............................................................ Customizing the dashboard .......................................................... 343 344 346 346 347 348

Index ................................................................................................................... 349

Section

Introducing Symantec Security Information Manager

Chapter 1. Overview Chapter 2. Symantec Security Information Manager Console Chapter 3. Symantec Security Information Manager Web configuration interface

16

Chapter

Overview
This chapter includes the following topics:

About Symantec Security Information Manager About workflow in Information Manager About Information Manager components

About Symantec Security Information Manager


Information Manager provides real-time event correlation and data archiving to protect against security threats and to preserve critical security data. Information Manager collects and archives security events from across the enterprise. These events are correlated with the known asset vulnerabilities and current security information from Symantec DeepSight. The resulting information provides the basis for real-time threat analysis and security incident identification. Information Manager archives the security data for forensic and regulatory compliance purposes. Information Manager collects, analyzes, and archives information from security devices, critical applications, and services, such as the following: Information Manager provides the following features to help you recognize and respond to threats in your enterprise:

Normalization of events from multiple vendors. Normalization and correlation of events from multiple vendors. Event archives to retain events in both their original (raw) and normalized formats. Distributed event filtering and aggregation to ensure that only relevant security events are correlated.

18

Overview About workflow in Information Manager

Real-time security intelligence updates from Symantec DeepSight. These updates keep you apprised of global threats and let you correlate internal security activity with external threats. Customizable event correlation rules to let you fine-tune threat recognition and incident creation for your environment. Security incident creation, ticketing, tracking, and remediation for quick response to security threats. Information Manager prioritizes incidents based upon the security policies that are associated with the affected assets. An Event Viewer that lets you easily mine large amounts of event data and identify the computers and users that are associated with each event. A client-based console from which you can view all security incidents and drill down to the related event details. These details include affected targets, associated vulnerabilities, and recommended corrective actions. Predefined and customizable queries to help you demonstrate compliance with the security and the data retention policies in your enterprise. A Web-based interface that lets you view and customize the dashboard, configure settings, and manage events, incidents, and tickets remotely. You can download various utilities and perform routine maintenance tasks such as backup and restore. You can use the custom logs feature with the universal collectors to collect and map information from devices for which standard collectors are not available.

About workflow in Information Manager


The Symantec Security Information Manager workflow includes the following steps:

Event collectors gather events from Symantec and third-party point products. See About Event Collectors and Information Manager on page 199. Events are filtered and aggregated. See Configuring the event filtering rules on page 207. See Configuring event aggregation on page 210. Symantec Event Agent forwards both the raw and the processed events to the Information Manager server. See About forwarding events to an Information Manager server on page 251. See Activating event forwarding on page 256. The Information Manager server stores the event data in event archives. See About event archives on page 220.

Overview About Information Manager components

19

The Information Manager server correlates the events with threat and asset information based on the various correlation rules. See About the Correlation Manager on page 75. Information Manager security events trigger a correlation rule and create a security incident. See About incident management on page 285.

About Information Manager components


Symantec Security Information Manager has the following components:

Security products and devices See About security products and devices on page 20. Symantec Event Agent Event collectors See About event collectors on page 20. Information Manager servers See About Information Manager servers on page 21. DeepSight See About the Symantec DeepSight on page 22. Web service See About the Information Manager Web service on page 22.

20

Overview About Information Manager components

Figure 1-1

Components in an Information Manager setup

About security products and devices


The security products and devices in your enterprise can generate overwhelming amounts of security data. Many firewalls can generate over 500 GB of security data per day; intrusion detection systems can trigger over 250,000 alerting incidents per week. Most security products store event data in a proprietary format, accessible only by the tools that the security products provide. To secure your enterprise effectively, you need to collect, normalize, and analyze the data from all parts of your enterprise. See About Information Manager components on page 19.

About event collectors


Event collectors gather security events from a variety of event sources, such as databases, log files, and syslog applications. Event collectors translate the event data into a standard format, and optionally filter and aggregate the events. The event collectors then send the events to Symantec Security Information Manager. You can configure event collectors to also send the event data in its original format. You install event collectors either on the security product computer or at a location with access to the security product events. To facilitate installation and setup, event collectors for third-party firewalls are preinstalled on the Information Manager server. After the event collector is registered with Information Manager, you can configure event collector settings from the Information Manager console.

Overview About Information Manager components

21

The event collector settings include the event source specification and any event filter or aggregation rules. Symantec provides event collectors for the following types of products:

Firewalls Routers, switches, and VPNs Intrusion detection and prevention systems Vulnerability scanners Web servers, filters, and proxies Databases Mail and groupware Enterprise antivirus Microsoft authentication services Windows and UNIX system logs

For access to the extensive library of event collectors, visit Symantec support at the following Web site: http://www.symantec.com/enterprise/support/ See About Information Manager components on page 19.

About Information Manager servers


Information Manager server can be installed on any approved hardware that meets the minimum system requirements. You can deploy one or more Information Manager servers in various roles to satisfy the event gathering, archiving, and event correlation requirements for your enterprise. To account for traffic variation, a single Information Manager is only recommended for a security environment that generates up to 1,000 events per second (EPS) on average and that requires a maximum of 4 MB to 8 MB per day of event data storage. To increase the overall event processing rate, you can add multiple load sharing Information Managers to your deployment. You can configure each server for dedicated event collection, event archiving, or event correlation. In most cases, a combination of multiple servers that share the event and the incident processing load is preferred. See About Information Manager components on page 19.

22

Overview About Information Manager components

About the Symantec DeepSight


Information Manager has access to current vulnerability, attack pattern, and threat resolution information from the Threat and Vulnerability Management Service. The Symantec DeepSight powers the Threat and Vulnerability Management Service. The Symantec DeepSight is a comprehensive collection of vendor-neutral security data sources. The service is an authoritative source of information about known and emerging vulnerabilities, threats, risks, and global attack activity. See About Information Manager components on page 19.

About the Information Manager Web service


The Web service of Symantec Security Information Manager lets you securely access and update the data that is stored on a server. You can use the Web service to publish event, asset, incident, ticket, and system setting information. You can also use the Web service to integrate Information Manager with help desk, inventory, or notification applications. See About Information Manager components on page 19. For more information on interfacing your application to use the Web service, see the application documentation or your application vendor.

Chapter

Symantec Security Information Manager Console


This chapter includes the following topics:

About the Information Manager console About the features of the Information Manager console

About the Information Manager console


You must install the Java client of the Information Manager on a Microsoft Windows, 2003, XP, Vista, Windows 2008 R2, or Windows 7 computer to access the console. The client can be downloaded from the Home > Downloads view of the Information Manager Web interface. The console of the Information Manager client enables you to perform the following security monitoring functions:

Define rules to identify security incidents. Identify critical network hosts. View Symantec Global Intelligence Network information Manage incidents Manage tickets Create reports Connect Symantec Information Manager with Symantec Managed Security Services (MSS).

24

Symantec Security Information Manager Console About the Information Manager console

MSS combines global threat intelligence, enterprise-wide monitoring, advanced analytics, and expert staff to provide 24x7 security monitoring and protection for enterprises from known and emerging threats.

Perform Service Provider management tasks

The console consists of the following views that help you manage the Information Manager Server:

Dashboard view Intelligence view Incidents view Events view Tickets view Assets view Reports view Rules view System view Statistics view

See About Information Manager components on page 19.

About the Dashboard view


The Dashboard view on the console of the Information Manager client provides a high-level view of the critical security information in your environment. Information Manager users can customize the dashboard to display the required event, ticket, and incident information. The Dashboard view provides an overview of the incident activity that is presented in the following default set of queries:

Closed incident count for each assignee by priority Closed incident count for each assignee by severity Open incident count for each assignee by severity Open incident count for each assignee by priority Count of both open incident and closed incident by assignee Incidents count for each of the last seven days

The toolbar of the Dashboard view presents the following options:

Symantec Security Information Manager Console About the Information Manager console

25

Refresh Turn Auto Refresh On

Refreshes the queries Toggles the automatic refresh of the dashboard queries. When Auto Refresh is on, the dashboard queries are refreshed every five minutes, by default.

Add Delete

Lets you add a new query to the dashboard. Lets you remove a query from the dashboard. You can also remove the query by closing the query window.

Tile Cascade

Tiles the dashboard charts. Cascades the dashboard charts.

See Viewing dashboards on page 344. See Customizing the dashboard on page 348.

About the Intelligence view


The Intelligence view displays the security information that the Symantec Global Intelligence Network gathers. The Symantec Global Intelligence Network is a comprehensive collection of vendor-neutral security data sources. The service is an authoritative source of information about known and emerging vulnerabilities, threats, risks, and global attack activity. The Intelligence view provides information about the current ThreatCon level. It also provides advice and instructions on how to guard against and respond to the current threats. The Intelligence view presents detailed information under the following tabs:
Analyst Watch The AnalystWatch tab provides information about IP addresses and URLs known to be involved in malicious activity. The IDS Statistics tab displays the five most frequently occurring intrusion detection events. It also lists offending ISPs, IP addresses, destination ports, attack products, and source and destination countries.

IDS Statistics

26

Symantec Security Information Manager Console About the Information Manager console

Firewall Statistics

The Firewall Statistics tab displays the top five ports on the rise and lists offending ISPs, IP addresses, destination ports, and source and destination countries. The AntiVirus Statistics tab displays the five most frequent corporate and consumer virus sample submissions. The Honeynet tab displays up-to-date information from the Symantec Global Intelligence Network and data analysis of threats in the wild.

AntiVirus Statistics

Honeynet

Note: The features that appear on the Intelligence view may vary depending on the type of Global Intelligence Network services subscription that you have purchased. Contact your Symantec sales representative for more information. See About the Information Manager console on page 23.

About the Incidents view


The Incidents view lets you look at and manage Information Manager incidents. You can customize the Incidents view by selecting from the security filters or the alert filters or by creating your own custom filter. When you select an incident filter, the incident list displays only the incidents that satisfy the filter criteria. Selecting an incident in the list updates the incident pane with the detailed information for the selected incident. To update the incident, modify the incident attributes and click Save. To maximize or minimize the display area for the incident pane, click the expand and collapse arrows correspondingly in the upper-left corner. Double-clicking an incident in the list opens the Incident Details dialog box. To update the incident, modify the incident information and then click the Save icon. To export the incident details, click the Export icon. The incident details are exported to a CSV file that you can save to the desired location on your computer. To edit multiple incidents, highlight the incidents, and edit settings in the Details tab. From the Incidents view, you can perform the following tasks:

Select a filter to apply to the Incidents view. The filters available for you depend on the roles to which you are assigned. The filters are grouped by Security Incidents, Alerts, and Custom filters in various states.

Symantec Security Information Manager Console About the Information Manager console

27

See Table 2-1 on page 27.


Create a custom incident view filter. Search for an incident by incident Reference ID. Create a new incident. Open the Incident Details dialog box for the selected incident. Create a ticket for the selected incident or incidents. Export the incident list to a file. You can export the list in HTML, CSV, and XML format, as required. Merge the selected incidents. Close the selected incidents. You must provide the disposition (for example, normal, false-positive, resolved, duplicate, or merged) and provide notes when you close an incident. Lock the incident list. You can lock the incident list to prevent the display of newly created or recently assigned incidents in the list. When you unlock the list, it is updated with the latest incidents.

Table 2-1 describes the Logical Groups for the filters. Table 2-1
My Incidents

Logical Groups for filters


The incidents that are assigned to the current user. Following are the states of this group of incidents: Open, New, In-Work, Waiting, and Closed. The incidents that are assigned to the current user's teams. Teams are created in the User Groups section of the System view, on the Administration tab. Following are the states of this group of incidents: Open, New, In-Work, Waiting, and Closed. All incidents that have been created, both assigned and unassigned. Following are the states of this group of incidents: Open, New, In-Work, Waiting, and Closed.

My Team Incidents

All Incidents

Unassigned Open Incidents All incidents which are open and unassigned. My Alerts The incident alerts assigned to the current user. Following are the states of this group of incidents: Open, New, In-Work, Waiting, and Closed.

28

Symantec Security Information Manager Console About the Information Manager console

Table 2-1
My Team Alerts

Logical Groups for filters (continued)


The incident alerts assigned to the current user's teams. Teams are created in the User Groups section of the System view, on the Administration tab. Following are the states of this group of incident: Open, New, In-Work, Waiting, and Closed. All incident alerts that have been created, both assigned and unassigned. Following are the states of this group of incidents: Open, New, In-Work, Waiting, and Closed. All incident alerts that are open and unassigned. All user-defined incident and alert filters.

All Alerts

Unassigned Open Alerts Custom Filters

The Incidents view details pane contains tabs from which you can view or update the selected incident. Table 2-2 lists the details pane tabs and their functions. Table 2-2 Tab
Details

Incident view details pane tabs Description


Displays the incident details that include the ID, status, severity, description, creator, assignee, and priority. Displays the event conclusions that are associated with the incident. To view the details of a conclusion that is associated with the incident, select a conclusion and click the Conclusion Details icon. You can also select an event from the list and view the particular event details.

Conclusions

Events

Displays the events that are associated with the incident. To view the details of an event that is associated with the incident, select the event and click the Event Details icon. Displays the target computers that are associated with the incident. To view the details for a target computer, select the target computer and click the Details icon. To create an asset from a target computer, select the target computer and click the Create Asset icon. Displays the source computers that are associated with the incident. To view details for a source computer, select the source computer and click the Details icon. Displays a visual representation of the progress of the attack that generated the incident along with the Symantec Event Code.

Targets

Sources

Attack Diagram

Symantec Security Information Manager Console About the Information Manager console

29

Table 2-2 Tab


Intelligence

Incident view details pane tabs (continued) Description


Displays Symantec signature information, including the malicious code or vulnerability information that may be associated with the event. You can view the intelligence information that is organized by associated signatures or by target computers. Displays the tickets that have been created for the incident. To view the details of the tickets that are associated with the incident, select the ticket and click the Ticket Details icon. To create a ticket based on this incident, click the Create Ticket icon. When you create a ticket, the Create Ticket dialog box includes the following tabs: Details: Provides the fields that describe the characteristics of the ticket: A summary description, the priority, the ticket category, the creator of the ticket, the assignee of the ticket, and the related incidents. Instructions: Lets you correlate Intelligence data from the Global Intelligence Network with the ticket, if information is available. Tasks: Provides the fields to describe any additional remediation tasks that the creator of the ticket recommends. Note that the Tasks tab of the Create Ticket dialog differs from the steps that are listed in the Remediation tab for the incident. The Remediation tab contains the instructions that are automatically created when the incident is created, based on settings in the rule that triggered the incident.

Tickets

Remediation

Displays the remediation suggestions that have been associated with the rule that triggered the incident. Remediation entries can be added to a rule on the Rules view. Displays the information that is available on the history of the incident. The incident history contains entries for incident creation, modifications, and closure. You can add entries to the log to record the information and the activities that are related to the incident.

Log

See About the Information Manager console on page 23.

About the Events view


The Events view lets you explore the Information Manager event archives. Event archives contain correlated and uncorrelated event data from the security products that are set up to forward events to Symantec Security Information Manager. You can create multiple event archives that can be stored on any instance of

30

Symantec Security Information Manager Console About the Information Manager console

Information Manager. When you perform an event query, you can search across any available combination of archives, regardless of on which instance of Information Manager the archive is stored. The archives that are visible on the Events view are created with an ordered series of event storage rules. These rules are created on the System view. To view the events that are stored in the event archives, you can use templates and queries to search for events you need to view. Templates are generally more complex preconfigured queries that can be customized with chosen parameters. System queries are the queries that focus on specific products or common aspects of security management. When you run a template or a query, you set the parameters for the query, including which archives to search. Each template and query contains the parameters specific to data that the query harvests: for example, a specific IP address or a time range in which the search is to be conducted. After you run the query, the results are displayed in the right pane of the Events view. The presentation of data depends on each query, and can include graphs, pie charts, and lists of events. If a query returns a list of events, you can click on a particular event to see the event details. You can change table columns if you want to see different information about the events. You can view details about a particular event by double-clicking the table row. You can also filter data in the table so that it displays only the events that interest you. You can filter on a particular event parameter by right-clicking a cell and clicking Filter on cell. You can also filter results based on a unique column value. Alternatively, you can use the advanced filtering option to create a more complex query. You can also use the Query Builder Wizard to query the event archives. This wizard helps you create the following types of queries:

Event queries Trending queries The trending feature is available only after you select the Event Query option. Summary queries Advanced SQL queries

Note: The Query Builder Wizard icon is available only when the folder for My Queries or Published Queries is selected. Table 2-3 describes the items that are in the left pane of the Events view.

Symantec Security Information Manager Console About the Information Manager console

31

Table 2-3 Item


Local Event Archives

Events view left pane items Description


Access the static copies of the events that are archived and that are stored somewhere other than the Information Manager server. Local event archives are often created as a backup copy of an active archive. Local event archives are not updated after the copy of the archive has been made. Provides a set of preconfigured query templates that generally provide a system-wide view of event activity. The templates use the parameters you choose, such as the event archives or the time period from which the query gathers information. A template can be customized by placing a copy in either the My Queries or the Published Queries folder and then adjusting the copy. Access to the Template queries are controlled based on the roles.

Templates

My Queries

Displays a list of queries that you have created for your own use. You can move any of these queries into the Published Queries folder to make them available to others.

PublishedQueries Displays a list of the queries that have been created at your site and that you want some or all of your users to be able to use. System Queries Displays a list of queries that are included in the Information Manager package. You can use any of these queries as a template for a customized query. To create a customized query, export the selected query as a QML file, and then copy or import the query in the My Queries folder or the Published Queries folder. You can modify it as required.

You can schedule queries to be distributed in a report as a CSV file. See About working with event queries on page 236. See Viewing event data in the archives on page 226.

About the Tickets view


The Tickets view lets you view and manage Information Manager tickets. You can customize the ticket view by selecting from one of several ticket filters, or by creating a custom ticket filter. The filters that are available to you depend upon the roles to which you have been assigned. When you select a ticket filter, the ticket list displays only the tickets that satisfy the filter criteria.

32

Symantec Security Information Manager Console About the Information Manager console

Selecting a ticket in the ticket list updates the ticket pane with the detailed information for the selected ticket. To update the ticket, modify the ticket attributes and click Apply. Double-clicking a ticket in the ticket list opens the Ticket Details dialog box. To update the ticket, modify the ticket information, and click Save or OK. You can edit multiple tickets simultaneously by opening a Ticket Details dialog box for each ticket to view or modify. The Tickets view toolbar contains icons for the following tasks:

Select a filter to apply to the ticket view. The filters that are available to you depend upon the roles to which you are assigned, and may include one or more of the following:
My Open Tickets Lists the open tickets that are associated with the incidents assigned to the current user. Lists the closed tickets that are associated with the incidents assigned to the current user. Lists all the open tickets. Lists all the closed tickets. Lists all the unassigned tickets.

My Closed Tickets

All Open Tickets All Closed Tickets All Unassigned Tickets

Create a custom ticket view filter. Search for a ticket by ticket ID. Refresh the tickets view. Open the Ticket Details dialog box for the selected ticket. Export the list of tickets to a file.

The ticket preview pane contains tabs from which you can view or update the selected ticket. Table 2-4 lists the preview pane tabs and their functions. Table 2-4 Tab
Details

Ticket preview pane tabs Description


Displays the ticket details such as the ID, summary, category, status, priority, timestamp, creator, and help desk assignee.

Symantec Security Information Manager Console About the Information Manager console

33

Table 2-4 Tab


Incidents

Ticket preview pane tabs (continued) Description


Displays the incidents that are associated with the ticket. To associate a new incident with a ticket, click the Add icon. To disassociate an incident from the ticket, select the incident and click the Remove icon. To view the incident details, click the Incident Details icon. To close the incident from the tickets view, select the incident and click the Close icon.

Tasks

Displays the user tasks that are assigned to each ticket. To add a new task to the ticket, click the Add icon. To remove a task from the ticket, select the task and click the Remove icon. To edit tasks, select the task and click the Edit icon. To add intelligence to the task, click the Intelligence icon.

Instructions

Displays the instructions that are associated with the ticket. To add or modify the instructions, edit the field and click Save. The instruction field accepts a maximum of 3000 characters. The Instructions tab also displays the Reset icon. You can also use the Add Intelligence to Instructions icon.

Log

Displays the ticket history that contains entries for ticket creation, ticket modifications, and ticket closure. To add log entries to record information and the activities that are related to the ticket, click the Add icon.

See About the Information Manager console on page 23.

34

Symantec Security Information Manager Console About the Information Manager console

About the Assets view


The Assets view lets you view and manage Information Manager assets. Use the Assets view to identify critical assets in your environment, and track the incidents and the tickets that are related to those assets. Identify the network assets that have one or more of the following attributes:

Host critical information or services Host confidential information Have specific roles on the network, such as firewall or vulnerability scanning devices Require high availability Comply with regulatory policies

The correlation manager uses the asset information to identify and prioritize incidents. The correlation manager creates an incident when a threat exploits an asset's vulnerabilities. The correlation manager sets the incident priority based upon the confidentiality, integrity, and availability ratings that you assign to the asset. The correlation rules depend upon the asset information, so identifying key network assets on the Assets view is a critical configuration step. You can populate the list of assets in any of the following ways:

Manually add entries in the Assets view. On the Incidents view, in the Targets tab for an incident, create assets based upon computers. On the Events view, under System Queries > SSIM > SSIM System, create assets from the query results of the Source view query and Target view query. On the Assets view, import a list of assets in XML or CSV format. For example, you can export a list of network computers from Microsoft Active Directory, convert the file to CSV format, and then import the file into the Information Manager. Create assets by integrating Information Manager with a policy compliance assessment tool, such as Symantec Control Compliance Suite or Symantec Enterprise Security Manager. Create assets by integrating Information Manager with a network vulnerability scanner. Use the Asset Detector rule under Monitor > System Monitors on the Rules view to choose the vulnerability scan products that automatically populate the assets table.

Symantec Security Information Manager Console About the Information Manager console

35

If you run vulnerability scans periodically on your network, lock the asset information for particular computers. If you lock an asset, the vulnerability scan does not modify the list of the services that are hosted on the asset. A vulnerability scan always updates the asset vulnerabilities, regardless of the asset lock status. You can filter the view of the assets in your environment using the filtering options or asset groups. Search for an asset from each of the views by entering the IP address host name in the Search Asset field, and then clicking the Search icon. Double-clicking an asset in the asset list opens the Asset Details dialog box. To update the asset, modify the asset fields and then click the Save icon. You can update multiple assets simultaneously by opening the Asset Editor dialog box for each asset to modify. Table 2-5 lists the Assets view tabs and their functions. Table 2-5 Tab
Details

Assets view tabs Description


Displays the network identification, description, priority, organization, operating system, and lock information for the selected asset. Displays any policy that is applied to the selected asset. You can add policies to an asset from a customizable list of regulatory policies. To customize the list of available policies, select the Administration tab on the System view. You can also delete policies from the asset. Displays the network services that the selected computer hosts. You can add services to an asset from a customizable list of well-known services. To customize the list of services, select the Administration tab on the System view. You can also delete services from the asset. Lists any incidents that pertain to the selected asset. Using the incident list is a convenient way to monitor the security activity that is related to an asset. Lists any tickets that pertain to the selected asset. The ticket list is a convenient way to monitor the work-order activity that is related to an asset.

Policies

Services

Incidents

Tickets

36

Symantec Security Information Manager Console About the Information Manager console

Table 2-5 Tab


Vulnerabilities

Assets view tabs (continued) Description


Displays the discovery date, CVE ID, BugTraq ID, and description of any vulnerability that is discovered on the asset. The vulnerability information is tracked when the assets are imported from a vulnerability scanner.

See About the Information Manager console on page 23.

About the Reports view


The Reports view lets you create and manage Information Manager reports. To create a report, you insert one or more queries into a report template. You can also add graphic elements and text, including a header and footer. Reports can span multiple views, or you can subdivide a single view and insert multiple queries on that view. You can distribute a report immediately, or you can schedule it to be generated at a specific time and then distributed automatically. You can also export and import reports in RML format. The Reports toolbar contains icons for report management tasks. The tasks available to you depend upon the roles to which you have been assigned, and may include one or more of the following:

Refresh the Explorer pane. Create a folder. Create a report. Save a report. Remove the selected report or folder. Import a report from an RML format file. Export the selected report to an RML format file. Adjust the view settings for a report, including the view size and orientation. Publish the selected report by placing the report in the Published Reports folder.

The Reports view has the following panes:

Explorer The Explorer pane lets you manage the My Reports folder and the Published Reports folders, as well as any new folders that you create. When you create

Symantec Security Information Manager Console About the Information Manager console

37

a report in the My Reports folder, it is only available to the user who created it. When you create a report in the Published Reports folder, it is available to all of the users who have the applicable permissions for the contents of the report. To publish a report, drag it from your private folder to the Published Reports folder. When you publish a report by dragging it into the Published Reports folder, the two reports are not linked. In addition to creating, publishing, and deleting reports, you can create and delete report folders. You can also import reports, export reports, and move reports from one folder to another.

Properties The Properties pane lets you view and edit the selected report property values, such as the background color or line thickness. Report The Report pane provides the tabs that let you design, preview, and distribute the selected report.

Table 2-6 describes the tabs that appear in the right pane when you create a new report or select an existing report from the list in the left pane. Table 2-6 Tab
Design

Report pane tabs Description


Lets you specify and format the contents of your report. You can include multiple data queries, images, annotation text, and grids in your report. The queries that are available to you depend upon the roles to which you are assigned. For example, you may have access to queries that pertain to firewall and VPN data, but may not have access to queries on antivirus data. Displays a preview of the report. You can also save or print the report from the Preview tab. You can also drill down on the following query types by clicking on the reports that are displayed:

Preview

Top N by Field Trending for Top N by Field Summary Data Queries

See Performing a drill-down on reports on page 339.

38

Symantec Security Information Manager Console About the Information Manager console

Table 2-6 Tab


Distribute

Report pane tabs (continued) Description


Lets you schedule the report and specify report recipients. You can compose an email report notification message, attach the report as a PDF and RTF, or include a URL link to the report.

Note: When the recipient clicks on the URL link, the report can be
accessed directly if the user has already logged on to the Web configuration interface using the host name of Information Manager. However if the user has logged on using the IP address of Information Manager, then the user is prompted for authentication to access the report. You can also test the report distribution configuration with the Test option. The reports are immediately distributed after you perform the testing. To schedule a report for distribution, you must first publish the report by placing it in the Published Reports folder.

Note: The Distribute option is available only for the Published Reports. See About the Information Manager console on page 23.

About the Rules view


The Rules view lets you create, test, and manage the rules that Information Manager uses to filter known false positives and declare security incidents. Default rules provide a starting point for determining the most common kinds of security incidents, including denial-of-service attacks and blended threats. The default filtering rules provide a set of common filters that can also be used to create customized filters. You can enable, disable, and fine-tune the default rules and filters based on the needs of your organization and the security products that are running. The Rules view also includes folders for monitors and lookup tables. Monitoring rules are used to detect unexpected security-related changes to systems or periods of inactivity from the systems that are monitored. The lookup tables provide a set of tables that can be configured to list known malicious IP addresses, sensitive files, sensitive URLs, services, Trojan horses, and Windows events that can be used to fine-tune rules and filters. For example, if you have detected a set of IP addresses that routinely attempt to maliciously infiltrate your network, you can add these IP addresses to an IP address lookup table. You can then create a custom rule that checks the table for these known malicious IP addresses during rules processing.

Symantec Security Information Manager Console About the Information Manager console

39

When you define the actions that take place when an incident is triggered, you can create remediation notes. These notes appear on the Remediation tab for an incident that is created. When you add remediation information to a rule and save the changes, the remediation information is updated for the new and the existing incidents. The Rules view toolbar contains icons for the following tasks:

Refresh the Rules list. Create a rule. Create a new folder. Delete a rule. Import rules Export rules Copy a rule. Deploy a rule. Revert changes to a rule. Enable rules. Disable rules.

Each folder in the navigation tree includes two subfolders: a System subfolder and a User subfolder. By default, the System subfolder contains the predefined rules, filters, monitors, and lookup tables that are included with Information Manager. You can enable or disable the items in the System subfolders However, you cannot make changes to these predefined elements. To create a modified version of a preconfigured rule, filter, monitor, or lookup table, you can create a custom version of the rule and save it in the corresponding User folder. If you create a custom rule or lookup table, you must deploy and enable the new element before it can be used during event processing. Table 2-7 describes the items that are displayed in the Event Filters list in the left pane. It also describes the tabs that appear in the right pane when you make a selection from this list.

40

Symantec Security Information Manager Console About the Information Manager console

Table 2-7 Item


Event Filters list

Event filters Description


Displays the list of default filters in the System Filters folder and custom filtering rules in the User Filters folder. Use the checkboxes to turn on the rules and turn off the rules. Displays the event criteria that the filtering rules use to filter events. If you create a custom filter, you can add or remove event criteria from this pane. Lets you test filtering rules with saved event data so that you can evaluate whether the rule filters when it should. This tool helps you fine-tune a rule to filter out the events that cause false positives. You can also debug the errors that prevent the rule from filtering events. Shows the date and the time that a user last edited a rule.

Conditions tab

Testing tab

History tab

Table 2-8 describes the items that are displayed in the Monitors list in the left pane. It also describes the tabs that appear in the right pane when you make a selection from this list. Table 2-8 Category
Monitors list

Monitors Description
Displays the list of default monitors in the System Monitors folder and custom monitors in the User Monitors folder. Use the checkboxes to turn on the rules and turn off the rules Lists the monitor properties that let you configure the system monitors. Lets you specify the follow-up actions that are required to resolve the incident. You can also specify the user or the team that is assigned to investigate and resolve the incident. See About automatically assigning incidents on page 55. See Assigning incidents automatically to the least busy member in a user group on page 298.

Properties tab

Actions tab

History tab

Shows the date and time when a user last edited a monitoring rule.

Table 2-9 describes the items that are displayed in the Correlation Rules list in the left pane. It also describes the tabs that appear in the right pane when you make a selection from this list.

Symantec Security Information Manager Console About the Information Manager console

41

Table 2-9 Category


Rules list

Correlation rules Description


Displays the list of default rules in the System Rules folder and custom rules in the User Rules folder. Use the checkboxes to turn on the rules and turn off the rules. Displays the event criteria that the rules use to declare a security incident. If you create a custom rule, you can add or remove event criteria from this pane. Specify the follow-up actions that are required to resolve the incident. You can specify the user or the team that is assigned to investigate and resolve the incident. See About automatically assigning incidents on page 55. See Assigning incidents automatically to the least busy member in a user group on page 298. You can also create the remediation notes that are associated with each incident that this rule creates. You can also configure the notifications when the rule conditions are triggered.

Conditions tab

Actions tab

Testing tab

Lets you test rules with saved event data to let you evaluate whether the rule declares incidents when it should. This tool helps you fine-tune a rule to filter out the events that cause false positives. You can also debug the errors that prevent the rule from declaring incidents when it should. Shows the date and time when a user last edited a rule.

History tab

Table 2-10 describes the items that are displayed in the Lookup Tables list in the left pane. It also describes each of the lookup tables that are listed under System Lookup Tables. Table 2-10 Tables
Lookup Tables list

Lookup tables Description


Lists the default lookup tables in the System Lookup Tables folder and custom tables in the User Lookup Tables folder. Lists the users who can perform administrative activities.

Administrative Users

42

Symantec Security Information Manager Console About the Information Manager console

Table 2-10 Tables

Lookup tables (continued) Description


Lists the authorized ports through which incoming traffic is allowed as per the policies. Lists the authorized ports through which outgoing traffic is allowed as per the policies. Lists the IP addresses of the servers that are critical from business perspective. Lists the authorized users. Lists the IP addresses of known attackers. An incident is created if an event is detected from one of these IP addresses. A configurable table that is available for manually tracking known bad IP addresses. DeepSight and LiveUpdate updates maintain separate internal IP Watch List. The list contains IP addresses known to be malicious in the larger Internet environment.

Authorized Ports Inbound

Authorized Ports Outbound

Critical Servers

default usernames IP Watch List

IP Whitelist

Lists the Whitelist IP addresses. These IP addresses and domain names are reputed and can be trusted. You can add your trusted domain names and IP addresses to the list. Lists the logging devices that must be monitored after a specific time span for idle state. Provides a table for the user to describe the organizational domains that are monitored. Lists the P2P programs. Lists the IP addresses of the hosts that can potentially violate the policy.

Monitored Logging Devices

Organization Domains

P2P Programs Potential Policy Violation IPs

Rapid Response Monitored Address Traffic Lists of all of the bad IP addresses on which your sensitive data can communicate. sensitive files Lists the file names to monitor during FTP transfers.

Symantec Security Information Manager Console About the Information Manager console

43

Table 2-10 Tables


sensitive urls

Lookup tables (continued) Description


Lists the text strings that are often included in malicious URLs. Lists the services that are associated with each port number. Lists the known Trojan horse exploits. Provides a table in which you can list users and the user names that formerly had access to the network. Lists the days of the week to allow further refinement of queries based on the day or days associated with an event. Lists the days of the weekend to allow further refinement of queries based on the day or days associated with an event. Lists the Windows events that may indicate violations of security policies or other malicious activities.

services

trojans user watchlist

Weekdays

Weekend

Windows events

The following tables list the event criteria available and their descriptions. Table 2-11 Field
Agent Host

Event Criteria: Common tab Description


The host name of the computer on which the agent is installed. The IP address of the computer on which the agent is installed. The MAC address of the computer on which the agent is installed. The numeric IP address of the computer on which the agent is installed. The subnet to which the agent computer belongs.

Agent IP

Agent Mac

Agent Numeric IP

Agent Subnet

44

Symantec Security Information Manager Console About the Information Manager console

Table 2-11 Field


Category ID

Event Criteria: Common tab (continued) Description


Lets you select the criteria on category of the event from among Application, Communication, Device, Diagnostics, Environment, QS, and Security. The host name of computer on which the product (collector) is installed. The IP address of computer on which the product (collector) is installed. The device ID of computer on which the product (collector) is installed. The MAC address of computer on which the product (collector) is installed. The numeric IP of computer on which the product (collector) is installed. Identifies the sensor that recorded the event that a collector sent. The ID of the configuration. The date that the event was created. Server Time - When the event occurs, the time zone of the server is considered for the event correlation. Source Network Time Zone - When the event occurs, the time zone of the source network is considered for the event correlation. Destination Network Time Zone - When the event occurs, the time zone of the destination network is considered for the event correlation.

Collection Device Host

Collection Device IP

Collection Device ID

Collection Device Mac

Collection Device Numeric IP

Collector Sensor

Configuration ID Created Date

If the time zone is not specified, by default the time zone of the server is considered for the event correlation. The valid format to enter the date is mm/dd/yyyy. The valid format to enter the time is HH:MM [AM] [PM]. CVSS The numeric value that describes the CVS score for the vulnerability, if detected. A description of the event. The destination host name.

Description Destination Host name

Symantec Security Information Manager Console About the Information Manager console

45

Table 2-11 Field


Device Action

Event Criteria: Common tab (continued) Description


Describes the action that the point product took (the event was prevented, permitted, failed, successful, or denied ). The domain from which the data object originated. The effects of malicious activity. The date when event ended. Server Time - When the event occurs, the time zone of the server is considered for the event correlation. Source Network Time Zone - When the event occurs, the time zone of the source network is considered for the event correlation. Destination Network Time Zone - When the event occurs, the time zone of the destination network is considered for the event correlation.

Domain Effects Event ending date

If the time zone is not specified, by default the time zone of the server is considered for the event correlation. The valid format to enter the date is mm/dd/yyyy. The valid format to enter the time is HH:MM [AM] [PM]. Event Archive ID The ID of the archive to which the event belongs (used in summarizers). The possible values: symc_hdr_tkt_update_class or symc_hdr_task_update_class. The number of times that an event occurred to cause the event to be logged.

Event class ID

Event Count

46

Symantec Security Information Manager Console About the Information Manager console

Table 2-11 Field


Event Date

Event Criteria: Common tab (continued) Description


The date when the event occurred. Server Time - When the event occurs, the time zone of the server is considered for the event correlation. Source Network Time Zone - When the event occurs, the time zone of the source network is considered for the event correlation. Destination Network Time Zone - When the event occurs, the time zone of the destination network is considered for the event correlation.

If the time zone is not specified, by default the time zone of the server is considered for the event correlation. The valid format to enter the date is mm/dd/yyyy. The valid format to enter the time is HH:MM [AM] [PM]. Event Day The day when the event occurred. Server Time - When the event occurs, the time zone of the server is considered for the event correlation. Source Network Time Zone - When the event occurs, the time zone of the source network is considered for the event correlation. Destination Network Time Zone - When the event occurs, the time zone of the destination network is considered for the event correlation.

If the time zone is not specified, by default the time zone of the server is considered for the event correlation. The valid format to enter the date is mm/dd/yyyy. The valid format to enter the time is HH:MM [AM] [PM]. Event Type ID The event type such as Host Intrusion Event, or Vulnerability Detected. The domain of the computer on which the product is installed. The IP address of the destination. The port of the destination or target. The IP address of the source. The port address of the source.

Host Domain

IP Destination Address IP Destination Port IP Source Address IP Source Port

Symantec Security Information Manager Console About the Information Manager console

47

Table 2-11 Field


Logged at

Event Criteria: Common tab (continued) Description


The location where the event was created. Server Time - When the event occurs, the time zone of the server is considered for the event correlation. Source Network Time Zone - When the event occurs the time zone of the Source Network is considered for the event correlation. Destination Network Time Zone - When the event occurs the time zone of the Destination Network is considered for the event correlation.

If the time zone is not specified, by default the time zone of the server is considered for the event correlation. The valid format to enter the date is mm/dd/yyyy. The valid format to enter the time is HH:MM [AM] [PM]. Logging Device IP Logging Device Mac Logging Device Name Logging Device Numeric IP Logging User Mechanisms The IP of the device that logged the event. The MAC of the device that logged the event. The name of the device that logged the event. The numeric IP of the device that logged the event. The account name that was used to log the event. The comma-separated integer values that represent the mechanisms categorization. Contains a normalized protocol value. This field is populated by the developer based on mapping the value of nw_protocol or network_protocol_id to a standardized protocol identifier such as TCP, UDP, ICMP, IGMP, or ARP. The direction of the network traffic such as external, internal, inbound, outbound, or unknown.

Network Protocol

Network Traffic Direction

NumericIPDestinationAddress The numeric IP of the destination address. Numeric IP Source Address Organizational Unit The numeric IP of source address. The Information Manager organizational unit of the computer.

48

Symantec Security Information Manager Console About the Information Manager console

Table 2-11 Field

Event Criteria: Common tab (continued) Description


The data that the event ended if the event end date was replaced during normalization. The date that the event occurred if the event date was replaced during normalization Server Time - When the event occurs, the time zone of the server is considered for the event correlation. Source Network Time Zone - When the event occurs, the time zone of the source network is considered for the event correlation. Destination Network Time Zone - When the event occurs the time zone of the Destination Network is considered for the event correlation.

Original Ending Event Date

Original Event Date

If the time zone is not specified, by default the time zone of the server is considered for the event correlation. The valid format to enter the date is mm/dd/yyyy. The valid format to enter the time is HH:MM [AM] [PM]. Point Product Version The version of the point product from which you collect logs. The timestamp that the agent sets before it sends the event to the event service. The name of the product from which you collect logs. The raw event as it is received from the logging device or application. The comma-separated integer values that represent the resources categorization. Severity of the event being reported. The value is in parentheses. The software feature ID as defined for the collector. Each collector must have at least one software feature that is defined for logging and configuration purposes. The host name of the source of the event.

Posted at

Product Raw Event

Resources

Severity ID

Software Feature ID

Source Host Name SSIM Event Insert

Symantec Security Information Manager Console About the Information Manager console

49

Table 2-11 Field

Event Criteria: Common tab (continued) Description


A standard ID event code that Symantec has approved Information Manager use to report the associated event.

Symantec Event Code

Symantec Vendor Signature ID The signature ID that is used to identify Symantec vendors. Target Resource The target of the attack. This information can be the URL for an HTTP or an FTP connection, or a file name or server name. The number of seconds to adjust the event date that was logged on the agent when events are collected from another time zone. Unique ID assigned to each event. Contains the user name or group account of the user or group at which the event is targeted. The Global Intelligence Network cross-reference of the vendor product. This ID is a two-digit code that is only available in certified, Tier 1, and Premium collectors. The event severity identifier that the point product uses. Contains the unique event signature from the point product. This signature is used in retrieving data from the Global Intelligence Network integration. The version of the collector.

Time adjustment in seconds

Unique Event ID User name

Vendor Device ID

Vendor Severity Vendor Signature

Version

Note: For an event criteria that involves an IP address you can enter either the IPv6 address or the IPv4 address. Table 2-12 Field
Bugtraq ID List

Events Criteria: Derived tab Description


A security mailing list that includes a detailed discussion and announcement of computer security vulnerabilities,. The list describes what they are, how to exploit them, and how to fix them.

50

Symantec Security Information Manager Console About the Information Manager console

Table 2-12 Field


CVE ID List

Events Criteria: Derived tab (continued) Description


A publicly known list of information security vulnerabilities and exposures. Contains the Availability setting for the destination host at which the event was targeted. List of Bugtraq IDs that are known for the destination address (asset). Contains the Confidentiality setting for the destination host at which the event was targeted. The Confidentiality values include the following:

Destination Host Availability

Destination Host Bid List

Destination Confidentiality

1 - Non-critical 2 - 3 - Medium 4 - 5 - Critical

Destination CVE List

List of the common vulnerabilities and the exposures that are known for the destination address (asset). Contains the Integrity setting for the destination host at which the event was targeted. The Integrity values include the following: 1 - Non-critical, 2 and 3 - Medium, and 4 and 5 - Critical. The Boolean value that describes whether the destination host is internal. The string value that describes the destination host location. The string value that describes the destination host operating system. The string value that describes the operating system version. Contains the host policy for the destination host. Policies are added in the Systems view, under the Policies tab. Contains the destination host service that the event affected. Services are added in the Systems pane, under the Services tab.

Destination Host Integrity

Destination Host is internal

Destination Host Location

Destination Host OS

Destination Host OS Version

Destination Host Policies

Destination Host Services

Symantec Security Information Manager Console About the Information Manager console

51

Table 2-12 Field

Events Criteria: Derived tab (continued) Description


The Boolean value that describes whether the target of the event has been categorized as critical. This value is set to True if the Asset exists in the Assets table. The string value that describes the logical location of the destination of the event (as opposed to the physical location). The string value that contains the descriptive name of the destination network. The string value that describes the physical location of the destination of the event. The Boolean value that describes whether the port that was affected is still open. The Effects values describe the effects of the event from the detector's point of view (for example, Degradation or Reconnaissance). The Mechanisms values describe the method of attack that was used to generate an event from the detector's point of view: for example, Virus or Port Sweep. The EMR resource value indicates the type or types of resources that the event is like to affect: for example, Mail or Host. Contains the Availability setting for the host from which the event originated. The Availability values include the following: 1 - Non-critical, 2 and 3 - Medium , and 4 and 5 - Critical. List of Bugtraq IDs that are known for source address (asset). Contains the Confidentiality setting for the host from which the event originated. The Confidentiality values include the following: 1 - Non-critical, 2 and 3 - Medium, and 4 and 5 - Critical List containing the Common Vulnerabilities and Exposures ID for the source.

Destination is critical

Destination Network Logical Location

Destination Network Name

Destination Network Physical Location Destination Port is open

Effects

Mechanisms

Resources

Source Host Availability

Source Host Bid List

Source Host Confidentiality

Source Host CVE List

52

Symantec Security Information Manager Console About the Information Manager console

Table 2-12 Field

Events Criteria: Derived tab (continued) Description


Contains the Integrity setting for the host from which the event originated. This value is set in the Asset table by the user. The Availability values include the following: 1 - Non-critical, 2 and 3 - Medium, and 4 and 5 - Critical. Boolean value that describes whether the source host is internal. String value that describes the host location. This value is set in the Network table by the user. String value that describes the host operating system. This value is set in the Asset table by the user. Contains the host policy for the source. Policies are added in the Systems pane, under the Policies tab. For a rule to use this value, the policy must be added to the asset that is referenced as the source IP in the event. Contains the service that the event affected. Services are added in the Systems pane, under the Services tab. For a complete list of the services available, see the drop-down list for this event field. Boolean value that describes whether the source of the event has been categorized as critical. This value is set in the Asset table by the user. String value that describes the logical location of the source of the event (as opposed to the physical location). String value that contains the descriptive name of the source network. Value that determines whether the system that is specified in the Target IP field is listed as vulnerable in the Asset table. The possible values for this field include the following: True, False, and Can't Determine.

Source Host Integrity

Source Host is internal

Source Host Location

Source Host OS

Source Host Policies

Source Host Services

Source Host is critical

Source Network Logical Location Source Network Name

Vulnerable

Symantec Security Information Manager Console About the Information Manager console

53

Table 2-13 Field

Events Criteria: Events tab Description


Application update is used for indicating the status of updates in versions. Possible values are current version and previous version. Lets you set the type of audit activity that is carried out. Examples are Audit Authentication, Audit Result, and so forth. Lets you select the device type, session name, integrity marker, or any other additional information under options 1, 2, and 3. Lets you select and set a value for from the common event types such as those available under the Common tab.. Lets you set a value for the compliance events that are logged by software components to determine if they meet certain security criteria. Lets you enter values for configuration change source, name, and revision. Lets you set the values for classes and event IDs for logging an incident in a top-level data object or one of its subcomponents. The single event that describes the top-level data object, the subcomponent name (if applicable), the incident rule that was triggered, why the incident rule was triggered, and the status of the top-level data object and the subcomponent (if applicable). Lets you enter the values for quarantine server, definition number, QS, or type of a known virus, unknown virus, worm, Trojan horse, or other type of malware that the virus scanner detected. Lets you set the values for the version, date, and information of the current and the previous versions. Lets you set the values about the events that provide details about a connection, for reporting on byte counts, services used, and connection durations.

Application Update

Audit Activity

Backup and Recovery Activity

Common Event

Compliance Activity

Configuration Update

Data Incident

Data Virus Incident

Definition Update

Firewall Connection Statistics

54

Symantec Security Information Manager Console About the Information Manager console

Table 2-13 Field

Events Criteria: Events tab (continued) Description


Lets you set the values for the base set of the fields that allow common data to be logged by all firewalls in a consistent manner. Lets you set the values for the information fields that are specific to activity that is detected at the host.

Firewall Network Event

Host Intrusion Activity

Incident Message Intrusion Activity Lets you set the values for the information that is common to the intrusion activity that is detected at both the network and the host levels.

Network Event Network Intrusion Activity Lets you enter the values for type, MAC ID of source, and destination.

SAV Catalog SAV Snapshots Scan Events System Information VPN Connection Statistics VPN Network Event Vulnerability Lets you enter the values for scan name, type, and GUID. Lets you enter the information about the system. Lets you enter the values for VPN index and ID. Lets you set the type of VPN network event. Lets you set the values for the fields that are associated with vulnerability. Lets you set the values for the vulnerability audit ID or the human readable name of the audit. Lets you enter a description of the error. Lets you enter the values for the fields that are related to all of the events that the Windows and Novell event logs generate.

Vulnerability Audit

Vulnerability Audit Error Windows and Novell Event

See About the Information Manager console on page 23.

Symantec Security Information Manager Console About the Information Manager console

55

About automatically assigning incidents


In Information Manager, an incident is created when an event matches a criterion that is specified in the Rules and Monitors. Based on the rules that are set, these incidents can be automatically assigned to a specific user group or an individual user. Rules or Monitors can be set to assign incidents automatically to the least busy member in a user group. See Assigning incidents automatically to the least busy member in a user group on page 298. Incidents are automatically assigned to the individual with the lowest load factor. The load factor is calculated based on the incident count and the incident state. Each incident state is assigned a value. Incidents that are in the New state are assigned the highest value, whereas incidents in the Waiting state are assigned the lowest value. A user group member who has many incidents in the New state is considered busy. Therefore the incidents in the New state have the highest value. The incidents in the Working state have lower value and the incidents in the Waiting state has the lowest value. The number of incidents that are already assigned to a user and the value that is assigned to the incident state determines the load factor. The members with the lowest load factor are given priority when they assign an incident. When two or more users have the same load factor, Information Manager uses the timestamp to determine which user is the least busy. Table 2-14 shows how Information Manager calculates the incident load factor. Three users are assigned the same count of incidents in different incident states. Although each user has the same number of incidents, their load factors are different because the values of their incidents are different. In the example, Information Manager automatically assigns incidents to User C because User C has the lowest load factor. Table 2-14 User Incident load factor Load Factor

Incidents: Incidents: Incidents: Formula New Working Waiting (incident count * value of incident state)
4 2 1 2 4 2 1 1 4 (4*3) + (2*2) + (1*1) (2*3) + (4*2) + (1*1) (1*3) + (2*2) + (4*1)

A B C

17 15 11

56

Symantec Security Information Manager Console About the Information Manager console

About the System view


The System view includes information about the Information Manager configuration, the security products that you manage, and the event management. The System view also lets you create and maintain the objects such as users, roles, and policies. Table 2-15 lists the System view tabs and their functions. Table 2-15 Tab
Administration

System view tabs Description


Lets you view and maintain administrative information, such as user accounts and roles, policies, and paging services. Lets you manage correlation, whether events are stored locally, whether Information Manager agent bootstrapping is enabled, and whether the server is designated as a Service Provider master. You can also configure event storage rules, event forwarding, and incident forwarding. Further, you can enable log forwarding to Symantec Managed Security Services.

Server Configurations

Product Configurations

Displays a list of all the security products that can be managed on your network. Right-click a product name to view or modify its properties and permissions. Displays an illustration that represents your Information Manager network. Right-click an object in the graphic to view or modify the properties.

Visualizer

See About the Information Manager console on page 23.

Symantec Security Information Manager Console About the Information Manager console

57

About the Statistics view


The Statistics view provides information about the health and performance of the Information Manager server. You can display statistics for the server to which the console is connected. Alternatively, you can select to view the statistics for an alternate server that shares the same directory. Table 2-16 lists the Statistics view tabs and their functions. Table 2-16 Tab
System Status

Statistics view tabs Description


Displays the server's memory and CPU utilization, database statistics, and the status of any database jobs, such as backup and purge. Displays the processing rate statistics for processes such as correlating events, declaring conclusions, and inserting incident data into the Information Manager database. Displays the filtering statistics for the correlation engine. You can monitor the Filter tab to determine how many events are excluded from the correlation engine. Displays trigger statistics for each correlation rule. You can monitor the Rules tab to confirm that rules are triggered as expected. Displays the rate statistics for the following event services:

Correlation

Filters

Rules

Event Service

Events received Event normalization Event archiving Event correlation forwarding

In the upper right corner of the console, a graph is displayed. The graph displays the events being processed per second by the server. You can always see the overall event activity from any view in the console. See About the Information Manager console on page 23.

58

Symantec Security Information Manager Console About the features of the Information Manager console

About the features of the Information Manager console


You can download and install the Java client for Information Manager from the Web configuration interface. The console of the Information Manager client lets you perform the following tasks:

Monitor the incident or the alert count for either the current user or all users. See About the incident and the alert monitors on page 58. Monitor event activity. See About the event activity monitor on page 59. Attach a note to a column-and-value pair in tabular data. See Creating and editing notes on page 60. Search for the notes that you or other users have created. See Searching the notes on page 61. Change your password. See Changing a password on page 65. Execute a predefined set of user actions. See About user actions on page 63. Create new user actions and edit existing user actions. See Creating and modifying user actions on page 63.

About the incident and the alert monitors


The incident and the alert monitors display in real time the number of incidents or alerts as they are created. The incident and the alert monitors appear at the bottom of the Information Manager console. You can choose which count you want to monitor using the right-click menu. The right-click menu also provides shortcuts to view details. The incident monitor and the alert monitor offer the following options:
View My Open Incidents Displays the Incident details for the open incidents for the current user. Displays the incident details for the open incidents for all users. Displays the incident details for the open alerts for the current user.

View All Open Incidents

View My Open Alerts

Symantec Security Information Manager Console About the features of the Information Manager console

59

View All Open Alerts Count My Open Incidents Count All Open Incidents Count My Open Alerts Count All Open Alerts

Displays the incident details for the open alerts for all users. Displays the open incident count for the current user. Displays the open incident count for all users. Displays the open alert count for the current user. Displays the open alert count for all users.

See About the features of the Information Manager console on page 58.

About the event activity monitor


The event activity monitor provides a real-time display of event activity. The display includes the option to view real-time event statistics, and a shortcut option to open a standalone event details dialog. The event activity monitor appears at the bottom of the Information Manager console. To configure the event activity monitor, right-click the monitor and choose from the available options. The event activity monitor options include the following:
Open Details Panel Display Total Received Events Display Average Rate Display Rate Color options Opens the Statistics view in a standalone dialog box. Displays the total number of events that have been received.

Displays the average event rate. Displays the actual event rate. Provides you with options to customize the color of the graph that displays. Lets you choose the visual representation of the event count as follows:

Select view type

Bar graph Line graph

See About the features of the Information Manager console on page 58.

About the Notes feature


The Information Manager console includes the Notes feature. This feature lets you create the notes that you associate with data fields on the console views that display tabular data. For example, you can create notes to explain the meaning

60

Symantec Security Information Manager Console About the features of the Information Manager console

of each incident severity level. You can later search for these notes, using several search criteria. The Notes feature is enabled on the following console views:

Incidents Events Tickets Assets

See About the features of the Information Manager console on page 58.

Creating and editing notes


When you create a note, you can attach it to a particular value in a table column. For example, in the Event details table, you can annotate the value Host Intrusion Event in the Event Type ID column. The note is then associated with each instance of that particular value in any table that includes the Event Type ID column. These notes provide additional reference information about any column-and-value pair. See About the Notes feature on page 59. To create or edit a note

In the Information Manager console, open the view where you want to create a note. You can create a note on any of the following views:

Incidents Events Tickets Assets

2 3 4

In the displayed table, identify the column-and-value pair that you want to annotate. Right-click a table cell that contains the desired value, and then click Notes. In the Notes dialog box, take any of the following actions:

To add a note, click Add. In the Add Comment dialog box, type the note, and click OK. To edit an existing note, select the note in the text area, and then click Edit. In the Edit Comment dialog box, revise the note, and click OK.

Symantec Security Information Manager Console About the features of the Information Manager console

61

To remove an existing note, select the note in the text area, and then click Remove. Click Yes to confirm your intention to remove the note.

When you finish adding and editing notes, click OK. If you added any notes, the table displays a red triangular flag in each cell that contains the value that you selected.

Searching the notes


The Search Notes feature lets you search for specific notes, using a variety of search criteria. To search for notes

In the Information Manager console, open any of these views:


Incidents Events Tickets Assets

On the Tools menu, click Search Notes.

62

Symantec Security Information Manager Console About the features of the Information Manager console

Define the search criteria by using any of the following non-case-sensitive data fields:
Category Type or use the drop-down menu to select the column name to search on. Clicking the drop-down arrow displays a list of all table columns for which notes exist. You must select the exact column name. For example, selecting Severity yields different results than selecting Severity ID. Type the full text of the value from the annotated column-and-value pair. For example, if the value in the Severity ID column is 2 - Warning, you must type it exactly this way, including the space before and after the hyphen. Type the user name of the person who created the note: for example, Administrator. Type all or any portion of the note text. For example, to find the note This severity level is for informational messages only, you can type this severity or information or any other text string from the note. Use the default start date and time or change it by using the calendar icon. The Search Notes feature looks for the notes that were created on or after this date and time. Use the default end date and time or change it by using the calendar icon. The Search Notes feature looks for the notes that were created on or before this date and time.

Value

Author

Note Text

Start Date

End Date

Click Search. The bottom pane displays a list of the notes that meet the search criteria. A recently created note may not appear in the list because the server clock time is different from the client clock time. To remedy this situation, expand the time range by using the Start Date and End Date fields, and click Search again.

Take one of the following actions:

To further narrow the search, type additional search criteria in the fields that are described in step 3, and click Search. You can also clear the search fields and type different search criteria. To access the dialog box where you can add, edit, and remove notes, select a note and click Comment Details.

When you click Comment Details, you can take of the following actions:

Symantec Security Information Manager Console About the features of the Information Manager console

63

To add a note, click Add. In the Add Comment dialog box, type the note, and click OK. To edit an existing note, select the note in the text area, and click Edit. In the Edit Comment dialog box, revise the note, and click OK. To remove an existing note, select the note in the text area, and click Remove. Click Yes to confirm your intention to remove the note.

When you finish adding and editing notes, click OK. If you have added any notes, the table now displays a red triangular flag in each cell that contains the value that you selected.

To finish, click Close.

About user actions


Information Manager includes several predefined user actions. These actions can help you find the information that is related to IP addresses and the host names that are included in some tabular data. If you right-click a cell that contains an IP address or a host name, you can select from one of the following options:
Finger Displays the information about a user on the specified computer. Note that the output varies based on the remote system; therefore, the command is of limited value. Sends a ping message to the computer and reports the reply in a command window. Traces a route to the host, but does not perform DNS lookups on the hops from host to host. Reports the results in a command window.

Ping

Trace route

User actions are available in any table that displays IP addresses or host names. User actions are available in the tables on the Assets view and on the queries on the dashboard that include this type of data. You can also modify the existing user actions and create your own user actions. See Creating and modifying user actions on page 63.

Creating and modifying user actions


You can create your own user actions, and you can customize the standard user actions. You can create and modify user actions by using the Events view or the Tools menu on the console view. See About user actions on page 63.

64

Symantec Security Information Manager Console About the features of the Information Manager console

To create a user action

1 2 3 4 5

In the Information Manager console, click Events. From the Tools menu, select Preferences. Click + (the plus icon). Type a name for the user action in the Name box and the command to be executed in the Command box. Select one or both of the following options:

To make the user action available to all users, select Public. To provide a command-line window in which to view the command output, select Use Output Viewer.

6 7

Click OK. In the Preferences dialog box, click OK. The new user action now appears in the pop-up menu that appears when you right-click on a table cell.

To modify a user action

1 2 3 4

In the Information Manager console, click Events. From the Tools menu, select Preferences. Select the user action that you want to modify, and then click the Edit icon. You can modify any of the following:

Change the user action name in the Name box. Change the command syntax in the Command box. Select Public to make the user action available to all users. Select Use Output Viewer if you want Information Manager to provide a command-line window in which to view the command output.

5 6

Click OK. In the Preferences dialog box, click OK. The modified user action now appears in the pop-up menu when you right-click a table cell.

Opening the Information Manager console from the command line


You can open the Information Manager console using the command line. See About the Information Manager console on page 23.

Symantec Security Information Manager Console About the features of the Information Manager console

65

To open the Information Manager console from the command line

1 2

On the client computer, open the command-line interface. Change the directory to the location in which the console was installed. For example:
C:\Program Files\Symantec\Security Information Manager

Type the following command and press Enter, where [user] is the user name for the console and [password] is the password for that account. Do not include the brackets.
>"Security Information Manager.exe" -user [user] -pw [password] -address 10.0.30.140 -autologin

Changing a password
You can use the Information Manager console to change your own password at any time. If the administrator has changed the password settings to a stronger authentication policy, you may be required to change your password. You can change your password by logging out and then logging back in to the console. See About the features of the Information Manager console on page 58. To change your password

1 2 3 4 5 6

In the Information Manager console, open any view. On the Tools menu, click Change Password. In the Change Password text box, type your current password. Type a new password in the New password text box, and then type exactly the same characters in the Confirm new password text box. Click Save. Click OK.

66

Symantec Security Information Manager Console About the features of the Information Manager console

Chapter

Symantec Security Information Manager Web configuration interface


This chapter includes the following topics:

About the Information Manager Web interface Accessing the Web configuration interface About the features of the Web configuration interface

About the Information Manager Web interface


The Information Manager Web interface provides several control features to help you work with ease and efficiency. You can use an Internet browser to access the Information Manager Web interface. You can use the Information Manager Web interface to view security information and manage critical tasks on the Information Manager server remotely. See Accessing the Web configuration interface on page 68. The Information Manager Web interface lets you perform various tasks:

Monitor the vital parameters and perform maintenance tasks. Configure the Information Manager server. View reports remotely. Download the report templates, universal collectors, and other utilities. Install the licenses for Information Manager and Symantec DeepSight .

68

Symantec Security Information Manager Web configuration interface Accessing the Web configuration interface

Use the Custom Logs feature to correlate the information from the devices that Information Manager does not support.

Accessing the Web configuration interface


You can use a Web browser to access the Web configuration interface of the Information Manager server. The Web configuration interface lets you view security information and manage critical tasks on the Information Manager server remotely. See About the features of the Web configuration interface on page 68. To access the Web configuration interface of the Information Manager server

Open a Web browser, and in the address bar, type the IP address of the Information Manager server. For example: https://192.168.0.10 By default, the server uses self-signed certificates, which cannot be verified by certificate authentication services such as VeriSign. If you are prompted, click Yes to accept the server certificate.

Log on to the Web configuration interface using the administrator credentials that you created during the Symantec Security Information Manager installation.

About the features of the Web configuration interface


The Web configuration interface of the Information Manager server provides several control features to help you work with ease and efficiency. See About the Information Manager Web interface on page 67. The Web configuration interface provides the following control features:
Status bar The status bar appears across the top of the Web configuration interface. The status bar displays the name of the Information Manager server to which the Web configuration interface is connected. The status bar also displays the role of the connected user.

Symantec Security Information Manager Web configuration interface About the features of the Web configuration interface

69

View bar

The view bar contains links to the views that allow access to the options that are outlined under that view. The following main views are available in the console:

Home Monitor Manage Settings Maintenance

Navigation bar

The navigation bar appears on the top across the console. The navigation bar displays the links to available views under the selected parent view.

Tree pane

The tree pane appears on the left side of the console window under the navigation bar. The tree pane displays a hierarchical, folder-based structure of the options available under the view.

View indicator

The view indicator appears across the top of the tree pane and the details pane. The view indicator displays the selected task in the hierarchical structure.

Details pane

The details pane appears in the right side of the console window under the taskbar. This pane displays details about the selected option. The timestamp bar appears at the lower end across the console. The timestamp displays the date and timestamp for the generated page.

Timestamp bar

The Web configuration interface provides the views that allow control of the features of the Information Manager server. ??? describes the various tasks that you can perform from each view.

70

Symantec Security Information Manager Web configuration interface About the features of the Web configuration interface

View
Home

Menu Items
Todays Status

Description
Provides detailed information on the status of Incidents, Alerts, and Device health for the current day. Provides statistics that are related to security events. A graphical interface that provides information related to events that are obtained as input and on the DSX user interface. The Symantec Threat Level rating is a measurement of the global threat exposure, delivered as part of Symantec DeepSight Threat Management System. Symantec DeepSight Threat Management System provides actionable intelligence covering the complete threat life-cycle, from initial discovery, and disclosure of a vulnerability to active attack. With personalized notification triggers and expert analysis, the system enables enterprises to prioritize IT resources to better protect critical information assets against a potential attack. As the first early warning solution provider to deliver spyware and adware alert and warning information, Symantec also helps organizations mitigate and remove these security risks. Lists the top five corporate security threats. Lets you monitor various SSIM services, the system statistics, and the network statistics.

Event Statistics

Event Monitor

Threat level

Deepsight

Top Corporate Threats

Monitor

SSIM System Statistics Network Statistics

Symantec Security Information Manager Web configuration interface About the features of the Web configuration interface

71

View
Manage

Menu Items
Reports

Description
Lets you view and download the standard reports that are scheduled on the Information Manager Server. You can view the Scheduled Query Reports on this view. Lets you configure the Information Manager Server.

Settings

Deepsight Database Directory Registration Collector Registration Custom Logs Active Directory External Storage. Backup and Restore

Maintenance

Incident Synchronization LiveUpdate

Lets you perform various maintenance tasks such as LiveUpdate, Backup and Restore and purge on the Information Manager database.

System Update

72

Symantec Security Information Manager Web configuration interface About the features of the Web configuration interface

View
System

Menu Items
Administration

Description
Lets you start or shut down the Information Manager Server remotely. Lets you manage the licenses for the Information Manager server.

Certificate

Lets you manage certificates for the Information Manager. Lets you download the installers for Symantec Event Agent and the Information Manager client. You can also download the log files, Universal collectors, and other utilities. Lets you register Symantec Security Information Manager with Symantec Security Operations Center to forward security events. Lets you change the date and time of the Information Manager Server Lets you change the network card settings for all the network cards that are installed on the Information Manager server. Lets you edit the Hosts File on the Information Manager server.

Downloads

Managed Security Services

Date Time

Network

Password

Lets you change the password of Linux accounts on server. Lets you set the password policy for the system.

Note: The Web configuration interface does not support the use of Back and Refresh browser options. Using these options may produce unpredictable results.

Section

Planning for security management

Chapter 4. Managing the correlation environment Chapter 5. Defining rules strategy

74

Chapter

Managing the correlation environment


This chapter includes the following topics:

About the Correlation Manager About the Correlation Manager knowledge base About the default rules set

About the Correlation Manager


The Correlation Manager component of Information Manager performs automated real-time event correlation, aggregation, filtering, and incident creation. To perform these functions, it uses a set of rule files and a knowledge base to compare events to patterns of common network security threats. See About the Correlation Manager knowledge base on page 76. To facilitate security analysis, the Correlation Manager filters false positive events from networks, including the events that your company security policy permits. The Correlation Manager also identifies attacks based on patterns of firewall, Intrusion Detection System, and antivirus activity across desktops, gateways, and servers. The Correlation Manager can then declare the incidents that warrant further action and closure. The Correlation Manager can provide conclusions regarding the overall analysis or cause of attacks. It also aggregates information about source, destination, attack types, and all related events into the incident record for forensic analysis. See About the default rules set on page 76.

76

Managing the correlation environment About the Correlation Manager knowledge base

About the Correlation Manager knowledge base


The Correlation Manager knowledge base consists of the tables that contain information about the network, security policies, and normalized event categories and subcategories. The Information Manager default rules reference this information to allow the correlation engine to make a more effective evaluation of incoming security events. Custom rules can also reference the information in the Correlation Manager knowledge base tables. The information in the knowledge base is a combination of the following: Updated information from Symantec DeepSight Threat Management System and the information that you can edit from the Lookup Tables option of the Rules view. If you have a valid DeepSight license, you can receive frequent updates directly from DeepSight. If you do not have a license, you receive updates to security content through LiveUpdate packages. See About the Correlation Manager on page 75.

About the default rules set


Information Manager includes a set of rules that identify the most common security threats. Information Manager also provides default filters to help reduce common false positives. New rules are developed regularly and are distributed through the LiveUpdate process. You can also create your own rules from the Rules view of the Information Manager console. See About the Correlation Manager on page 75. See About the Correlation Manager knowledge base on page 76. Table 4-1 lists the default rules and the types of security products with which they are usually associated.

Managing the correlation environment About the default rules set

77

Table 4-1 Security product


Antivirus

Correlation Manager rules by security product type Associated rules


AntiVirus Disabled Critical Malicious Code Detection Incomplete AV Scan Malicious Code via Email Not Quarantined Malicious Code Not Quarantined Malicious Code Outbreak Malicious Code Propagation Outbound Spam Zombie Spyware Not Quarantined Spyware Outbreak Worm Activity Block Scan Check FTP Transfers Distributed DoS High Volume DoS High Volume External Port Sweep Internal Port Sweep IP Watchlist Destination IP Watchlist Source IRC Bot Net Malicious URL Organization IP in Watchlist Activity Outbound Spam Zombie Ping Scan Detector Port Scan Detector Potential Staged Attack Scan Followed By Exploit Single Event DoS Smurf Attack Firewall Traffic to a Monitored Address Trojan Connections Unauthorized Outbound Email Domain Unauthorized Port Inbound Unauthorized Port Outbound Traffic to a Monitored Address Watchlist Potential Policy Violators

Firewall

78

Managing the correlation environment About the default rules set

Table 4-1 Security product

Correlation Manager rules by security product type (continued) Associated rules


Network intrusion detection system (NIDS)

Attempted DNS Exploit Attempted FTP Exploit Attempted WWW Exploit Attempted Service Exploit Block Scan Departed Employee Username DoS High Volume Distributed DoS High Volume Intrusion Threshold (Disabled by default) IP Watchlist Destination IP Watchlist Source IRC Bot Net Malicious Code Propagation NULL Login Authentication Violation Ping Scan Detector Return Trojan Traffic Scan Followed By Exploit Single Event DoS Smurf Attack IDS TFTP from WebServer Traffic to a Monitored Address Vulnerability Scan Vulnerability Scan Detector Watchlist Potential Policy Violators Web Vulnerability Scan

Managing the correlation environment About the default rules set

79

Table 4-1 Security product

Correlation Manager rules by security product type (continued) Associated rules

Host intrusion detection system (HIDS) Account Guessing Attack


Departed Employee Username DoS High Volume IP Watchlist Destination IP Watchlist Source Multiple Files Modified NULL Login Authentication Violation Password Guessing Attack Potential Staged Attack Scan Followed By Exploit Single Event DoS Trojan Connections Vulnerability Scan Vulnerability Scan Detector Watchlist Potential Policy Violators Web Vulnerability Scan Potential Staged Attack Vulnerability Scan Departed Employee user name Activity Policy Compliance Violation Account guessing attack Non Business Hours Logins Password guessing attack Potential Staged Attack

Vulnerability assessment

Policy compliance

Windows Events

Windows Account Lockout (Disabled by default) Windows Audit Log Cleared


Windows Privileged Activities by user Windows Privileged User Created

Windows Security Violation (Disabled by default) Windows Sensitive File Access

80

Managing the correlation environment About the default rules set

Table 4-1 Security product

Correlation Manager rules by security product type (continued) Associated rules


Information Manager System

Agent Queue Monitor Cert Expiration Warning Incident Creation Alert (Disabled by default) Invalid Event Date Alert Low Disk Space Warning MultiEvent Rule Example Negative Rule Type Example Password Guessing Attack Validate Archive

Chapter

Defining rules strategy


This chapter includes the following topics:

About creating the right rule set for your business About defining a rules strategy About correlation rules About rule conditions About the Event Count, Span, and Table Size rule settings About the Tracking Key and Conclusion Creation fields About the Correlate By and Resource fields Importing existing rules Creating custom correlation rules Enabling and disabling rules Working with the Lookup Tables window

About creating the right rule set for your business


A good approach to creating custom rules is to start with the generalized rules provided by Symantec and fine-tune them. Another good approach is to add new rules based upon real event data from your network. See About defining a rules strategy on page 83. The customizations usually belong to one of the following categories:

82

Defining rules strategy About creating the right rule set for your business

Incidents stemming from machine-generated events

These include all of the security devices on your network that generate the events that you collect. For example, firewall products such as Checkpoint Firewall generate a huge amount of event data. In most cases, you should edit default rules or create new rules to filter out false positive incidents.

Incidents relating to human These incidents include your corporate IT security policies events or policies and regulatory compliance requirements. They also include any unique characteristics about user activity in your network that machine-generated events would typically miss, or that result in false positive incidents.

The following is a general overview of the process for developing rules:


Set up Information Manager in a lab environment. Update the Assets view to include the IP addresses of hosts that are mission-critical or that host sensitive information. Collect event data from your network for a week. This data should include events from all of the security products that you want Information Manager to correlate. For example, antivirus, host intrusion detection systems, network intrusion detection systems, and firewalls. Run the default rules and review the incidents created. Look for any false positives that you can easily filter out. Following are examples of good candidates for filtering: Incidents from the failed connections that the firewall reports, and the Windows-only attacks that computers running Linux report. Look at any known security incidents that occurred during the week that you collected the data. Adjust the filters and rules if there are any incidents that should have been created and were not. Look for the incidents that are the result of firewall rules being too lax. Tuning firewall and Information Manager rules is an on-going process based upon the changes in your network. Opening a firewall port to enable an essential line-of-business application may suddenly result in a huge number of false-positive incidents. When that occurs, you need to create a new rule to filter out events from an approved use of that application. You may also discover that there is a port that is still open long after the application that required it has been retired. Create rules to support security practices in your company. For example, you can create a rule to assign a weekly help desk ticket for security IT to contact users who are not running antivirus software.

Defining rules strategy About defining a rules strategy

83

As you change rules, use the Information Manager rule test feature to assess whether the customizations work. Of particular concern should be any rules that never create conclusions or those that create conclusions too often. With your Information Manager server still in a test environment, forward live network events to it. Continue to refine your rules. After you are satisfied with the incidents that are declared, migrate the server to your live network.

About defining a rules strategy


To develop a security plan that incorporates correlation rules and filters, you must understand the business needs of your organization from a security perspective. See About creating the right rule set for your business on page 81. For example, if your implementation protects and monitors network resources relating to financial transactions, you can develop and refine your rule set accordingly. Your area of concern might focus on authentication on the servers that contain sensitive financial data. In addition, you may need to evaluate the rules that you deploy based on regulatory compliance concerns. This evaluation ensures that the event data that is evaluated is handled in a way that meets the requirements of the policies.

About correlation rules


Correlation rules describe the logic that is applied to an event or a set of events to detect possible security concerns. See About creating the right rule set for your business on page 81. Conceptually, correlation rules can be classified into the following general categories:

An event identifies an attacker who attempts to intrude on a specific computer or resource. Some unknown system or a number of systems that attempts to cause a specific system to malfunction or cease functioning. The organization or analyst wants to group events into particular types of incidents to make viewing and analysis simpler. For example, these types of rules may aggregate the events that are related to policies or products.

Correlation rules consist of the following:

84

Defining rules strategy About rule conditions

Rule type

Identifies the pattern that best describes the event. See About rule types on page 85.

Event criteria

The specific values or threats that the rule applies to, including the number of events that occurs over a specified period of time. See About event criteria on page 89.

Rule settings

The event count, span, table size, tracking keys, and description of an event. The fields that are used to correlate existing event conclusions with new events as they occur within the specified time period. If the number of events that are specified in the Count field is met, the conclusion is escalated to an incident. In addition, the incident is then correlated with existing incidents where applicable. Additionally the severity of a match for the rule is determined. Additional details are also available by the variables that you can specify in the Description field. Describes how alert and incident assignment tasks are handled when an incident is created. The Auto Assignment area incidents can be assigned to a specific user or user group (team). The Notification area let you notify to the additional recipients that the incident has occurred. For example, an Antivirus Disabled incident might be assigned to a response technician who is responsible for immediately assessing the event. An additional notification can be sent to the network administrator who monitors the overall health of the network segment from which the incident occurred.

Conclusion and correlation settings (Actions tab)

Auto assignment and notification settings

About rule conditions


The rule conditions describe the fields and conditions that the rule is processed against to determine if the event applies to a conclusion. See About correlation rules on page 83.

Defining rules strategy About rule conditions

85

The Rule Conditions panel provides access to all available event and schema field data. The analyst can use this data to further identify and define the events that should be escalated as a potential security threat.

About rule types


A rule type determines the underlying behavioral patterns that a rule uses to identify a match. For example, if the rule type is set to Single Event, the rule evaluates each event for a criteria match. It only requires a single event to trigger a conclusion. A rule that uses the Many to One rule type evaluates each event against the criteria. However, it then creates a conclusion when a specified number of matching events have aggregated over a predetermined period of time. See About rule conditions on page 84. Conclusions that involve more than one event use the One to Many and Many to One event correlation tables. In addition, the Tracking field is provided. It identifies the element that is used as the basis for additional events to be correlated to existing events and conclusions. Table 5-1 describes the rule types that are available and provides examples. Table 5-1 Rule Type
Many Sources, One Target

Rule types Possible Scenarios


Denial-of-service events can often be identified using this rule type. A Smurf attack uses ICMP Echo Reply events from a large number of source computers to a single target. Predefined rule examples: Distributed DoS High Volume, Smurf Attack

Trigger Condition
Creates a conclusion when the events that match the specified criteria are detected from multiple unique source IP addresses to a single destination IP address within the specified period.

Many Symantec Creates a conclusion when the events Signatures, One Source of different types that match the specified criteria are detected from a single source IP address within the specified period.

A rule that detects a vulnerability scan can use this rule type. Within the criteria for that rule, EMR values can be set to identify multiple exploit events (such as Mechanism: Buffer Overflow, or Application Exploitation). In this example, the criteria for this rule includes multiple types of Mechanisms. Therefore, the rule would track multiple types of exploit events coming from the same source. Predefined rule example: Vulnerability Scan Detector

86

Defining rules strategy About rule conditions

Table 5-1 Rule Type


Many Symantec Signatures, One Target

Rule types (continued) Possible Scenarios


A rule that detects malicious IP hopping activity can use this rule type. To conceal scanning activity, an attacker may attempt one type of attack from one IP address. The attacker then changes to a different IP address to try a different attack until the most useful vulnerabilities have been identified. Attackers use this method to avoid detection as a vulnerability scan. Attackers know that vulnerability scanners often operate from a single source. Using this rule type, you can detect conditions where multiple attack types are targeted at a single host, regardless of the attack origin. A rule that detects a Malicious Code Outbreak can use this rule type. To identify a Malicious Code Outbreak, a rule can be configured to identify instances of a particular virus on multiple targets. Using the EMR fields, the criteria can be set to Virus. Since the rule looks for the same event type, this rule would trigger only if it was the same virus event on each target. A rule that identifies a reconnaissance attack on multiple targets (such as a port scan) can use this rule type. To configure this example, you would choose the Many Targets, One Source rule type, and then set the EMR criteria value to Portscan. Predefined rule examples: Block Scan, IRC Bot Net, Ping Scan Detector

Trigger Condition
Creates a conclusion when events of different types matching the specified criteria are detected to a single destination IP address within the specified period.

Many Targets, One Event

Creates a conclusion when events of the same type matching the specified criteria are detected from many unique destination IP addresses within the specified period.

Many Targets, One Source

Creates a conclusion when events matching the specified criteria are detected from a single source IP address to multiple unique destination IP addresses within the specified period.

Defining rules strategy About rule conditions

87

Table 5-1 Rule Type


Many to One

Rule types (continued) Possible Scenarios


A rule to create a port sweep can use this rule type.

Trigger Condition
Creates a conclusion when events matching the specified criteria are detected in a pattern that is set using the Many To One Fields, and the One To Many Field options.

A port sweep is typically described as a single IP address that scans for a specific port on multiple computers. After you choose this rule type and set the event criteria for the rule, you set the In addition to the Event Criteria, the One-Many and the Many-One field options. In the fields that must contain the same One-Many Fields area, select IP Source Address information for each event (One-Many and IP Destination Port. This selection means that Fields) and the fields that can contain the event originates from the same IP address that different values in each event is evaluating the same port). In the Many-One (Many-One Fields) are used to Fields area select the IP Destination Address correlate similar events occurring option. (Note that the event destination can be a within a predetermined timeframe. different IP address for each event.) The Many to One rule requires the Tracking field to be populated. For this type of rule, the Tracking field generally matches a One-Many Fields entry. Predefined rule examples: Malicious Code Outbreak, Spyware Outbreak, DoS High Volume, External Port Sweep, Internal Port Sweep, Port Scan Detector, Intrusion Threshold, MultipleFilesModified, AccountGuessingAttack, Password Guessing Attack User logs on to a Windows computer and establishes an SSH connection to a UNIX computer. The user then logs on the FTP server, and downloads files from the FTP location.

Multi-condition

Creates a conclusion when a sequence of specified patterns is detected for one combination of one-to-many fields within a specified time period.

Single Event

Creates a conclusion if an event Predefined rule examples: matches the specified criteria. This rule AntiVirus Disabled, Malicious Code Not type requires the Tracking field to be Quarantined, Spyware Not Quarantined, Check populated. FTP Transfers, Malicious URL, Trojan Connections, Attempted DNS Exploit, Attempted FTP Exploit, Attempted WWW Exploit, TFTP from WebServer, WindowsSecurityViolationWindows Account Lockout, Windows Audit Log Cleared, Windows Privileged Activities by User

88

Defining rules strategy About rule conditions

Table 5-1 Rule Type


Symmetric Traffic

Rule types (continued) Possible Scenarios


A rule that identifies BackOrifice exploit traffic between a single target and source can use this rule type. To monitor for BackOrifice symmetric traffic events, after you choose the Symmetric Traffic rule type, set the criteria to Symantec Signature for BackOrifice (attackID 1414). The rule triggers if an Intrusion Detection System logs both the connection from a source to a target, and from that target back to the source as being BackOrifice traffic. Predefined rule example: Return Trojan Traffic

Trigger Condition
Creates a conclusion when the specified pattern of events is detected from a single source IP address to a single destination IP address, then from that destination IP address back to the original source IP address within the specified period.

Transitive Traffic

Creates a conclusion when the specified pattern of events is detected from a single source IP address to a single destination IP address. Then, the pattern is detected from that destination IP address to a new destination IP address within the specified period.

A rule that identifies the BackOrifice exploit traffic that moves from one source to a target backdoor, and then the targeted computer becomes the source that accesses the backdoor of a new target can use this rule type. To monitor for BackOrifice transitive traffic events, after you choose the Transitive Traffic rule type, set the criteria to Symantec Signature for BackOrifice (attackID 1414). The rule triggers if an Intrusion Detection System logs both the connection from a source to a target as BackOrifice traffic and then identifies the target connecting to a new target with the same event signature. Predefined rule example: Malicious Code Propagation

X followed by Y

Creates a conclusion when a specified pattern is detected from a single source IP address to a single destination IP address. This pattern is followed by a different pattern from the same source IP address to the same destination IP address within the specified time period.

Predefined rule examples: Scan Followed by Exploit, Null Login Authentication Violation

Note: This rule is deprecated and is not supported.


Use a Multi-condition rule type.

Defining rules strategy About rule conditions

89

Table 5-1 Rule Type


X not followed by X

Rule types (continued) Possible Scenarios


A rule to monitor user authentication failure for a specific period of time can use this rule type. User logon fails for a specific period of time and the user does not log in again.

Trigger Condition
Creates a conclusion when an event that matches the defined criteria cannot be detected in a pattern during a predefined number of times during timeout.

X not followed by Y

Creates a conclusion when an event A rule to detect a non-occurrence of a user action occurs that is defined by an X rule after a valid user action can use this rule type. criteria. However, an event that is User logs on to a critical server but does not log off defined by the Y rule criteria does not. for a long time. Creates a conclusion when an event A rule to detect a deletion of user before the user that is defined by an X rule criteria does is added can use this rule type. not occur. However, the next event that is defined by the Y rule criteria occurs. Updates the configured lookup table if A rule to dynamically update the lookup table with an event matches the specified criteria. the configured event field values for the specified event criteria.

Y not preceded by X

Lookup Table Update

About event criteria


The Event Criteria field contains a vast array of possible values that a rule can use to identify an event pattern. The Event Criteria field includes event data and schema information. See About rule conditions on page 84. Table 5-2 describes the tabs available in the drop-down list. Table 5-2 Name
Common

Event Criteria tabs

Description
Contains the data from the Normalization fields, the Symantec DeepSight Threat Management System database (using the Symantec Signature), and the Asset and the Network tables.

90

Defining rules strategy About rule conditions

Table 5-2 Name


Derived

Event Criteria tabs (continued)

Description
Contains the customized data from the Normalization fields, the DeepSight database (using the Symantec Signature), and the Asset and the Network tables. The system applies logic to the source and the destination IP addresses that results in several fields or flags being added to the event. For fields, this information is primarily data from the Asset and Network table. For flags, this information includes: traffic direction, Source is Internal, Destination is Internal, service info, Destination Port is Open, whether the Asset entry has the destination_port value that is listed as available, whether the asset is Vulnerable, or whether the Asset entry for the events destination_ip value is listed as being vulnerable to one or more of the BugTraq IDs associated with the events Symantec Event Code. Includes all of the events that have been identified for each product that is associated with your installation of Information Manager. This information is based on a combination of the default set of events (the Information Manager schema) and any SIPs that have been installed. These fields do not contain the Information Manager normalized values. Provides a means of creating a product-specific field that uses a string or an integer value that may not be accessible through the schema provided. Event data is included with some of the events that are sent to Information Manager that a specific point product uses. However, this data is not accounted for as an identified field in the Information Manager schema that the collector uses (also known as out-of-band data). This data can be included either by the collector or it can be added during normalization. Provides access to the fields that are associated with the knowledge base tables that Information Manager and the environment provide. Also provides access to the resource-specific data that the user provides. For example, the Asset and Network tables. These fields are dynamically generated based on the current state of each of the knowledge base tables.

Events

Other Fields

Table Lookups

The Event Criteria rows include a logical decision field that provides the operator that is used to determine how the event criteria are evaluated. Table 5-3 describes the decision option operators available. Note: The available operators vary with each criteria type. Table 5-3 Name
Equal Not Equal Greater than

Event Criteria operators

Description
The field value is an exact match to the criteria value. The field value does not match the criteria value. The field value is greater than the specified value.

Defining rules strategy About rule conditions

91

Table 5-3 Name


Less than Greater than or equal to Less than or equal to Null Not Null Is in Is not in True False Contains

Event Criteria operators (continued)

Description
The field value is less than the specified value. The field value is greater than or equal to the specified value.

The field value is less than or equal to the specified value.

The field is empty. The field contains a value. The field value contains a value that is contained in the specified table. The field value does not match a value that is contained in the specified table. The field value is True. The field value is False. The field value contains the specified string. The usage of this operator varies with the field against which the data is compared. For example, if you use EMR values, a drop-down list of possible values appears. However, if you evaluate the string data in a field such as target_resource, the value that you type is used to perform a substring search. For example, if you want to find out if the string root.exe was contained in the target_resource field, if target_resource field contained http://www.example.com/cgi-bin/root.exe?blah, root.exe is identified and causes a match. The field value does not contain the specified string. The usage of this operator varies with the field that the data is compared with. For example, if you use EMR values, a drop-down list of possible values appear. However, if you evaluate the string data in a field such as target_resource, the value that you type is used to perform a substring search. For example, if you wanted to verify that the string root.exe was not included in the target_resource field, if target_resource field contained http://www.domain.com/cgi-bin/root.exe?blah, root.exe is identified and indicates that Doesn't contain condition is not met. The field value matches the value that is specified as a regular expression. The field value does not match the value that is specified as a regular expression.

Doesn't contain

Matches Doesn't match

92

Defining rules strategy About the Event Count, Span, and Table Size rule settings

About the Event Count, Span, and Table Size rule settings
The Rules Editor includes the settings that let you specify how many events must occur within a specified period of time to meet the criteria for the rule. In addition, you can also determine the table size for the event data that is stored. See About correlation rules on page 83. Table 5-4 Setting
Event Count

Event Count, Span, and Table Size rule settings

Description
Determines the number of events that must occur within a specific time period to trigger an incident. The time period is specified in the Span settings. This setting is used primarily with the Many-One Field area on the Actions tab. Indicates the time period for the number of events that are specified in the Event Count field to occur. Specifies the state table size, in rows, that is maintained in memory for each rule. For example, the Account Guessing Attack predefined rule requires that two events be identified within 10 minutes for the rule to trigger an incident. After the first event matches the rule criteria, an internal aggregation table is created that contains the event details. When the second matching event occurs, data from the second event is added to the same aggregation table. In this case, the Table Size setting is relatively small. However, if the Event Count were raised to a much larger number, the aggregation table could potentially run out of space. In that case, the table wraps (the new event data begins to overwrite the original event data in sequential order). To prevent the data from being overwritten, the Table Size should be adjusted according to the event size expectations for the rule. Event data sizes vary widely with each implementation, but using the predefined rules as a starting point helps to identify general size parameters.

Span

Table Size

About the Tracking Key and Conclusion Creation fields


The Tracking Key and Conclusion Creation fields are used to further refine rules settings. Use these fields to establish whether an event should be correlated to the existing events that are tracked in aggregation tables. In addition, the Tracking Key and Conclusion Creation fields include the Severity and the Description fields. These fields provide a means for security analysts to escalate conclusions based on severity, and to include additional extracted information within the Conclusion Description. Table 5-5 describes the Tracking Key fields on the Conditions tab.

Defining rules strategy About the Tracking Key and Conclusion Creation fields

93

Table 5-5 Field


One-Many Fields

Tracking Key fields (Conditions tab)

Description
Describes the elements that must remain consistent across each event in order for the event to be correlated to an existing event aggregation table. For example, to define a rule that tracks a single user name connecting to multiple target IP addresses (in other words, one user name to many IP addresses), set the rule type to One to Many, and in the One-Many Fields area, select User Name. This field must be the same in each event for any subsequent events to be correlated with previous events.

Many-One Fields

Describes the elements that must be different for each event in order for the event to be correlated to an existing event aggregation table. This field is used with the Event Count field to determine when the conditions for a One to Many rule have been met. For example, you want to define a rule that tracks a single user name connecting to multiple target IP addresses: in other words, one user name to many IP addresses. Set the rule type to One to Many, and in the Many-One Fields select Target IP. The IP address in this field must be different in each event for any subsequent events to be correlated with previous events.

Tracking Fields

Describes the field upon which a matching event is correlated to an existing conclusion. If an event matches the criteria for a rule, it is compared against the tracking fields for any existing conclusion. If the event matches an existing conclusion it is correlated to that event rather than being considered for a new conclusion. Required with the Many to One and Single Event rule types. With One to Many rules, this field is typically used to track the same value as in the One-Many Field area. The event field data that must remain the same across each new event that is to be added to the aggregation table.

Table 5-6 describes the Conclusion Creation fields on the Actions tab. Table 5-6 Field
Alerting Incident

Conclusion Creation fields (Actions tab)

Description
Describes whether an incident should be treated as an alert rather than a security incident.

94

Defining rules strategy About the Correlate By and Resource fields

Table 5-6 Field


Severity

Conclusion Creation fields (Actions tab) (continued)

Description
Describes the severity of the event conclusion which can determine whether an incident is created. The Severity values include the following:

1- Informational: Purely informational events. 2 - Warning: User decides if any action is needed. 3 - Minor: Action is required, but the situation is not serious at this time. 4 - Major/Critical: Action is required immediately and the scope may be broad. 5 - Fatal: An error occurred, but it is too late to take remedial action and the scope is broad.

Description

Provides a user input area for security analysts to further define the conditions that led to the creation of the conclusion. This field also supports the use of field name variables that can be populated with event data. Provides a user input area for security analysts to include remediation notes for each incident that is created. The notes appear on the Remediation tab for the incident.

Remediation

About the Correlate By and Resource fields


The Correlate By field determines whether a conclusion that is created should be mapped to an existing incident. See About correlation rules on page 83. For example, if a Virus Outbreak incident is in progress, using the appropriate setting in the Correlate By field causes each Virus Outbreak conclusion with the same virus name to be mapped to the existing incident. In addition, you can use the Resource field drop-down list to further refine the characteristics of the correlation requirements for the incident. Table 5-7 describes the Correlation types available in the Correlate By field. Table 5-7 Type
None Resource and Conclusion Type

Correlate By fields

Description
Correlation does not occur for the new incidents that match this rule. Correlation is based on the Resource and the Conclusion type. For example, the same Virus Outbreak Conclusion type occurs on the same host that is specified in the Resource field. Therefore, the new conclusion is correlated to an existing incident.

Defining rules strategy Importing existing rules

95

Table 5-7 Type


Source and Destination

Correlate By fields (continued)

Description
Correlation is based on the Source and the Destination fields. For example, a new conclusion is created and the source IP and destination IP are the same. Therefore, the conclusion is correlated to the existing incident. Correlation is based on the Source and the Conclusion type. For example, the same IP address causes Port Scan conclusions. Therefore, any new Port Scan conclusion that originates from the same source is mapped to the existing incident. Correlation is based on the Source field. If the Source matches, any conclusion that originates from that source is correlated to the existing incident. Correlation is based on the Destination and the Conclusion type. For example, the conclusion is a denial-of-service attack that targets the same destination IP. Therefore, the conclusion is mapped to the existing incident. Correlation is based on the Destination field. If the Destination is the same, any conclusion that applies to that destination is correlated to the existing incident. Correlation is based on the Conclusion type. For example, all AntiVirus Disabled conclusions are mapped to the existing incident regardless of source or destination values.

Source and Conclusion Type

Source

Destination and Conclusion Type

Destination

Conclusion Type

Importing existing rules


You can import rules from separate instances of Information Manager using the Import and the Export features available in each version. If import a rule that references custom lookup tables, you must also import those tables. See About correlation rules on page 83. If you import a rule from a previous supported version of Information Manager, use the Rules view to delete any imported policy information. Then, apply the current policies. Java-based rules are imported as jar files. Note: In the User Monitor folder, you can import only those monitors that are created by using Information Manager version 4.5. When you import rules from a previous version of Information Manager that include user, team, or role assignments, verify that the assignments are configured correctly after the import completes. Sometimes a user, team, or role that existed in a previous version is not identical to the version that exists in the upgraded version. If so, you may need to reconfigure the rule assignment values to match the assignee information in the upgraded version.

96

Defining rules strategy Creating custom correlation rules

To import an existing rule

1 2 3 4 5

In the console from which you want to export the rules, navigate to the Rules view. Then, export the rules you want to apply to the new console. In the current Information Manager console, on the Rules view, expand the Correlation Rules folder. Under the Correlation Rules folder, expand the User Rules folder. Click Import from disk. In the Select File(s) to Import dialog box, locate the file or files to import, and click Import....

To import a Java-based rule

1 2 3

In the Information Manager console, on the Rules view, click the User Monitors folder and then click Import from disk. In the Select File(s) to Import dialog box, locate the jar file or files to import. Click Import....

Creating custom correlation rules


The correlation rules describe the logic that is applied to an event or a set of events to detect possible security concerns. See About creating the right rule set for your business on page 81. You can create correlation rules from the Rules view of the console of the Information Manager client. See About correlation rules on page 83. The process for creating the correlation rules is as follows:

Define a name for the rule. See To define a name for the rule on page 97. Configure rule condition. See To configure the rule conditions on page 97. Configure the rule action. See To configure the rule actions on page 98. Deploy the rule on the server. See To deploy the rule on the server on page 100.

Defining rules strategy Creating custom correlation rules

97

To define a name for the rule

1 2 3 4

On the Information Manager console, click Rules. In the left navigation pane, under the Correlation Rules folder, click User Rules. On the Rules tab, click Create new filter or rule (+). In the Input dialog box, type a name for the rule.

You can now define a rule condition. A conclusion is generated if the set of events satisfies the defined conditions. Note: You can configure multi-conditioned rules. Multi-conditioning lets you define the rules that support up to five user activities in a sequence. You can create a conclusion when a sequence of specified pattern is detected for one combination of one-to-many fields within a specified time period. See Creating a multicondition rule on page 100. To configure the rule conditions

1 2

On the Conditions tab, in the Description window, type a description for the rule. On Conditions > Rule Type, click the entry that best matches the type of event and target combination that applies to the new rule. For example, to declare an incident whenever a specific event is detected, select Single Event. To declare an incident after a specific number of events are detected from a specific IP address, select Many Targets, One Source. See About rule types on page 85.

3 4 5 6 7

In the Event Criteria area, click Add. Select the left column of the new entry, and then choose an event field. Select the center column and specify the operator. Select the right column. Based on the operator that you chose, specify the value that must be true for the event type. Repeat steps 3 through 6 for any other event criteria that you want applied to the rule. You can select multiple event criteria and apply logical operators (AND/OR) to them.

In Event Count, specify the number of times that the event criteria that you specified must be true for an incident to be declared.

98

Defining rules strategy Creating custom correlation rules

In Span, specify the time that is required for the number of events that are specified in the Event Count to occur. For example, you can specify that 30 events of a specific type must occur within 60 minutes, before an incident is declared. In case you specify a higher value of time in hours, the hours gets automatically rounded to 999.

10 In Table Size, specify the maximum number of events that the rule can track
at any one time. The table size should generally be a multiple of the Event Count setting. The Table Size setting divided by the Event Count setting is equal to the maximum number of event groups that the rule can manage.

11 In the Tracking Keys area, specify the fields to include in the incident. This
field can be any of the One-Many, Many-One, or Tracking fields that are associated with the incident. You can now define the rule actions. A conclusion is generated if the set of events satisfies the defined conditions. Note: You can create rules to detect threats based on the absence of the events that you expect to occur. See Creating a correlation rule based on the X not followed by Y rule type on page 105. To configure the rule actions

On the Actions tab, check Alerting Incident (not a Security Incident) to specify that an incident is an alert incident and not a security incident. Alerting incidents notify about a situation that requires your attention if there is a discrepancy on a system. Security incidents notify about a situation where there is a potential threat due to a security breach in the organization.

2 3

From the Severity options, select the severity that you want to be associated with the incident. In the Description area, type a description of the problem. This information appears to users who are assigned the incidents or the tickets based upon the incidents that this rule triggers. (Optional) Click Insert to include the fields from the final event that triggered the conclusion. When a conclusion is generated, these fields are replaced with their corresponding values in the description.

Defining rules strategy Creating custom correlation rules

99

(Optional) Click Remediation to populate the Custom Remediation library for this conclusion and to instruct the analysts with a remedy that is specific for your organization. In the Correlate By list box, select the method by which conclusions are grouped into incidents. If you selected Resource and Conclusion Type from the Correlate By list box, you can select a field in Resource Field. This field is used to correlate conclusions within an incident. Conclusions can be correlated together into incidents based on the value of the resource field. To specify that a user or team is automatically assigned to incidents that this rule creates, do the following:

5 6

Turn on Enable Auto Assign and then click Add. If you want to assign incidents based upon the IP address of the affected target computer, select IP Address or Network options from the Criteria column. Type an IPv4 or IPv6 address. Any Address is the default option. Retain the default option to ensure that all the occurrences of the incident get assigned irrespective of the IP address. To assign incidents to an individual user, in the User column, select the user who should be assigned with the incidents. To assign incidents to a group of users, in the User Group column, select the team that should be assigned with the incidents. At any time, you can click Clear to clear the selections. If you want to automatically assign incidents to the least busy member in a user group, check Assign to least busy user and then select the corresponding user group.

See About automatically assigning incidents on page 55.

In the Notification area, check Enable if you want to notify users about the incident activity. If you want to notify users only when an incident is created, check Send notification for incident creation only.

Click Recipients to select the method of notification for each recipient. The options are Email Address Entry, User, User Group, Syslog, SNMP Trap. Once the method of notification is selected, you are prompted to enter details corresponding to the option that you selected.

100

Defining rules strategy Creating custom correlation rules

10 Type the subject of the email in the Subject area.


(Optional) Click Insert to include any of available fields in the subject. When the email notification is sent these fields are replaced with their corresponding values.

11 Type the email message in the Body area.


(Optional) Click Insert to include any of the available fields in the email message. When the email notification is sent these fields are replaced with their corresponding values. After you specify the condition and the action, you can test the rule and then deploy it on the server. To deploy the rule on the server

1 2 3

On the Testing tab, select the archive containing event data, and then click Start Test. When you are satisfied with the incidents and the conclusions that the rule creates, turn on the rule in the Rules list. On the top toolbar, click Deploy to the server.

See Enabling and disabling rules on page 112.

Creating a multicondition rule


Consider a sample scenario for creating an event when a combination of conditions is fulfilled. See About rule conditions on page 84. If the following conditions are met, then an event must be triggered:

The user logs on to a Windows domain controller. The user creates a new user. The user modifies the privileges for the newly created user. (For example, the user gives the new user domain admin privileges.) The user logs out.

Note: The event codes in the procedures are applicable to Microsoft Windows 2000. They may vary for other operating systems.

Defining rules strategy Creating custom correlation rules

101

To create a new rule

1 2 3 4

On the console of the Information Manager client, click Rules. In the left navigation pane, under the Correlation Rules folder, click User Rules. On the Rules tab, click Create new filter or rule (+). In the Input dialog box, type a name for the rule. The rule name appears in red color under the User Rules folder.

In the description box, type the description for the rule. (For example, monitor for the events that occur when all the conditions that are specified are fulfilled.)

Once you create a new rule, you must configure the rule conditions that are required based on the scenario. Add the conditions that are required to trigger the rule. To add Condition 1

Select the left column of the new entry. From the drop-down list that appears, select the Events tab and click on the Host Intrusion Activity folder. From the collapsible list that is displayed, select Intrusion Action ID.

2 3 4

Select the center column and select the = operator. Select the right column, and then select Login. This value corresponds to the logon action. If the events must occur more than once for an incident to be declared, specify the count of events in the Event Count list that is located in the Event Criteria area. This specification determines the number of events that must occur within the timeframe that is specified in the Span settings for the rule to trigger an incident.

Add the other conditions that are required to trigger the rule. To add Condition 2

1 2 3

Under Rule Type, click Add to add a second condition. Select the left column of the new entry for Condition 2. From the drop-down list that appears, click the Common tab and select Symantec Event Code. Select the center column and select the = operator.

102

Defining rules strategy Creating custom correlation rules

4 5

Select the right column, and then select 722. This value corresponds to a new user account created. If the events must occur more than once for an incident to be declared, in the Event Criteria area, specify the count of events in the Event Count. This specification determines the number of events that must occur within the timeframe that is specified in the Span settings for the rule to trigger an incident.

Add the other conditions that are required to trigger the rule. To add Condition 3

1 2 3

Under Rule Type, click Add to add a third condition. Select the left column of the new entry for Condition 3. From the drop-down list that appears, click the Common tab and select Vendor Signature. Select the center column and select the = operator. Select the right column, and then select 632. This value corresponds to a new user account being added to domain admin group for the third condition.

If the events must occur more than once for an incident to be declared, in the Event Criteria area, specify the count of events in the Event Count list. This specification determines the number of events that must occur within the timeframe that is specified in the Span settings for the rule to trigger an incident.

Add the other conditions that are required to trigger the rule. To add Condition 4

1 2 3 4 5

Under Rule Type, click Addto add a fourth condition. Select the left column of the new entry for Condition 4. From the drop-down list that appears, click the Common tab and select Symantec Event Code. Select the center column and select the = operator. Select the right column, and then select 720. This value corresponds to the user account Log-off for the fourth condition. In the Tracking Keys area, under the One-Many field, click Add and select Agent Host. Under the Tracking field, click Add and select IP destination address.

If the events must occur more than once for an incident to be declared, in the Event Criteria area, specify the count of events in the Event Count list. This specification determines the number of events that must occur within the timeframe that is specified in the Span settings for the rule to trigger an incident.

Defining rules strategy Creating custom correlation rules

103

In Span, set the time span equal to 20 minutes. In case you specify a higher value of time in hours, the hours gets automatically rounded to 999.

In Table Size, specify the maximum number of events that the rule can track at any one time.

Note: The Strict check box works only in three or more condition rules. It resets the collected sequence of events if an unexpected (in proper order) strict event is received. After you configure the rule conditions you must configure the rule actions. To configure the rule actions

On the Actions tab, check Alerting Incident (not a Security Incident) to specify that an incident is an alert incident and not a security incident. Alerting incidents notify about a situation that requires your attention if there is a discrepancy on a system. Security incidents notify about a situation where there is a potential threat due to a security breach in the organization.

2 3

From the Severity options, select the severity that you want to be associated with the incident. In the Description area, type a description of the problem. This information appears to users who are assigned the incidents or the tickets based upon the incidents that this rule triggers. (Optional) Click Insert to include the values of fields from the final event that triggered the conclusion. When a conclusion is generated, these fields are replaced with their corresponding values in the description.

(Optional) Click Remediation to populate the Custom Remediation library for this conclusion and to instruct the analysts with a remedy that is specific for your organization. In the Correlate By drop-down list, specify the method by which conclusions are grouped into incidents. If you selected Resource and Conclusion Type from the Correlate By list box, you can select a field in Resource Field. This field is used to correlate conclusions within an incident. Conclusions can be correlated together into incidents based on the value of the resource field. To specify that a user or team is automatically assigned to incidents that this rule creates, do the following:

5 6

104

Defining rules strategy Creating custom correlation rules

Turn on Enable Auto Assign and then click Add. If you want to assign incidents based upon the IP address of the affected target computer, select IP Address or Network options from the Criteria column. Type an IPv4 or IPv6 address. Any Address is the default option. Retain the default option to ensure that all the occurrences of the incident get assigned irrespective of the IP address. To assign incidents to an individual user, in the User column, select the user who should be assigned with the incidents. To assign incidents to a group of users, in the User Group column, select the team that should be assigned with the incidents. At any time, you can click Clear to clear the selections. If you want to automatically assign incidents to the least busy member in a user group, check Assign to least busy user and then select the corresponding user group.

In the Notification area, check Enable if you want to notify users about the incident activity. If you want to notify users only when an incident is created, check Send notification for incident creation only.

Click Recipients to select the method of notification for each recipient. The options are Email Address Entry, User, User Group, Syslog, SNMP Trap. Once the method of notification is selected, you are prompted to enter details corresponding to the option that you selected.

10 Type the subject of the email in the Subject area.


(Optional) Click Insert to include any of available fields in the subject. When the email notification is sent these fields are replaced with their corresponding values.

11 Type the email message in the Body area.


(Optional) Click Insert to include any of the available fields in the email message. When the email notification is sent these fields are replaced with their corresponding values. After you specify the conditions and the actions, you can test the rule and then deploy it on the server.

Defining rules strategy Creating custom correlation rules

105

To deploy the rule on the server

1 2 3

On the Testing tab, specify the location of a file containing event data, and then click Start Test. When you are satisfied with the incidents and conclusions that this rule creates, turn on the rule in the Rules list. On the top toolbar, click Deploy to the server.

Creating a correlation rule based on the X not followed by Y rule type


Consider a sample scenario wherein a user logs on to a critical system and carries out some activity. However, the user fails to log off within an hour. Normally such a logon should last for less than an hour. If the user does not log off within an hour, this suspicious activity results in an event with a conclusion. This sample scenario is an example of Y not following X. See About rule types on page 85. To create a correlation rule for X not followed by Y

1 2 3 4

On the console of the Information Manager client, click Rules. In the left navigation pane, under the Correlation Rules folder, click User Rules. On the Rules tab, click Create new filter or rule (+). In the Input dialog box, type a name for the rule. The rule name appears in red color under the User Rules folder. Example: Rule for Event Definition with negatives

In the Descriptions box, type the description for the rule. Example: Monitor for the events that have not occurred in a defined sequence. You can now define the required rule condition. An event is generated if the set of user actions satisfies the defined condition. In this example, X is the normal activity of a logon. Y is an activity of a logoff. Normally, Y follows X. However, in this example the logoff does not happen even after an hour. Therefore, use the rule type of X not followed by Y to trigger an event.

To configure the rule conditions and actions

1 2

On the Conditions tab, on the Rule Type menu, click the rule X not followed by Y. In the Event Criteria area, click + to add a criteria for X.

106

Defining rules strategy Creating custom correlation rules

3 4 5 6 7 8 9

Select the left column of the new entry, and then choose the event type as Mechanisms. Select the center column and select the operator contains. Select the right column, and then specify the value Login. To add the criteria for Y, in the Event Criteria Postcondition area, select the left column of the new entry, and then choose the Mechanisms event type. Select the center column and select the operator contains. Select the right column, and then specify the value Logout. In the Tracking Keys area under the One-Many fields, click Add to specify the fields that you want to track: for example, the Source IP address. Under the Tracking field's column, if you want to track the date of the event, you can add Event Date. that you specified must be true for an incident to be declared.

10 In the Event Count box, specify the number of times that the event criteria 11 In the Span box, specify the amount of time for the two events X and Y that
are specified to occur. For example, you can specify that the two events X and Y must occur within 60 minutes, failing which an incident is declared.

12 In the Table Size box, specify the maximum number of events that the rule
can track at any one time. The table size should generally be a multiple of the Event Count setting.

13 On the Actions tab, you can specify whether the incident is an Alerting
incident and not a security incident. You can add the description and the remediation for that incident.

14 In the following areas for Auto assignments you can specify whether the
incident should be assigned automatically to the users or groups selected.

15 In the Notification area, you can enable the notifications and specify the
details of the email notification. You can add one or more recipients to receive the notifications and edit the subject and the body of the email notification. You must deploy the rule after you have created and configured the rule. To deploy the rule

1 2 3

On the console of the Information Manager client, click Rules. In the left navigation pane, place a check mark in the box next to the rule that you want to deploy. In the top toolbar, click Deploy.

Defining rules strategy Creating custom correlation rules

107

Creating a correlation rule based on the X not followed by X rule type


Consider a sample scenario wherein a user tries to log on, fails, and does not attempt to log on again for 30 minutes. Normally, an authorized user tries to log on again within 30 minutes. However, this user waits for more than 30 minutes before attempting to log on again. This behavior indicates the suspicious activity that results in an event with a conclusion. This sample scenario is an example of X not following X. See About rule conditions on page 84. To create a correlation rule for X not followed by X

1 2 3 4 5

On the console of the Information Manager client, click Rules. In the left navigation pane, under the Correlation Rules folder, click User Rules. On the Rules tab, click Create new filter or rule (+). In the Input dialog box, type a name for the rule. Example: Rule for Event Definition with negatives In the Descriptions box, type a brief description for the rule. Example: Monitors for predefined behavior of events. You can now define the required rule condition. An event is generated if the set of user actions satisfies the defined condition. In this example, X is the normal activity of a logon. Normally, a failed logon attempt is followed by another logon attempt within a 30-minute period. However, in this example the user does not attempt to log on for more than 30 minutes. Therefore, you can use the rule type X not followed by X to trigger an event.

To configure the rule conditions and actions

1 2 3 4 5 6

On the Conditions tab, on the Rule Type menu, click the rule X not followed by X. In the Event Criteria area, click + to add a criteria for X. Select the left column of the new entry, and then choose the event type as Mechanisms. Select the center column and select the operator contains. Select the right column and then specify the value Login. Click Add to add the second criteria for X. Then select the left column of the new entry, and in the drop-down list under Events, collapse the Intrusion Activity folder. Select Intrusion Outcome ID.

108

Defining rules strategy Creating custom correlation rules

7 8 9

Select the center column and select the operator =. Select the right column, and then specify the value Failed. In the Tracking Keys area under the One-Many fields, click Add to specify the fields to track: for example, the Source IP address. Under the Tracking fields column, if you want to track the date of the event, add Event Date. that you specified must be true for an incident to be declared.

10 In the Event Count box, specify the number of times that the event criteria 11 In the Span box, specify the amount of time for the event. For example, you
can specify 30 minutes, failing which an incident is declared.

12 In the Table Size box, specify the maximum number of events that the rule
can track at any one time. The table size should generally be a multiple of the Event Count setting.

13 On the Actions tab, specify whether the incident is an Alerting incident and
not a security incident. Add the description and the remediation for that incident.

14 In the following areas for Auto assignments, specify whether the incident
should be assigned automatically to the users or groups selected.

15 In the Notification area, you can enable the notifications and specify the
details of the email notification. You can add one or more recipients to receive the notifications and edit the subject and the body of the email notification. You must deploy the rule after you have created and configured the rule. To deploy the rule

1 2 3

On the console of the Information Manager client, click Rules. In the left navigation pane, place a check mark in the box next to the rule to deploy. In the top toolbar, click Deploy.

Creating a correlation rule for the Y not preceded by X rule type


Consider a sample scenario wherein a user logs on to a Linux system. The user uses putty or another secure connection mode to log on the su (superuser) role and creates another user. Normally, to create a new user role, you log on as the root. However, this uses bypasses the root logon and a new user account is created. This sample scenario is an example of X not preceding Y.

Defining rules strategy Creating custom correlation rules

109

To create a correlation rule for Y not preceded by X

1 2 3 4

On the console of the Information Manager client, click Rules. In the left navigation pane, under the Correlation Rules folder, click User Rules. On the Rules tab, click Create new filter or rule (+). In the Input dialog box, type a name for the rule. Example: Rule for Event Definition with negatives

In the Descriptions box, enter a brief description for the rule. Example: Monitors for the events occurring in correct sequence.

In this example, X is an activity of the root logon. Y corresponds to the creation of a new user account. Normally, a new user is created by logging on as root. However, in this example, the user does not log on as root but as a normal user. The user is able to create a new user account. Therefore, you can use the rule type of Y not preceded by X to trigger an event. You can now define the required rule condition. An event is generated if the set of user actions satisfies the defined condition. To configure the rule conditions and actions

1 2 3 4 5 6

On the Conditions tab, on the Rule Type menu, click the rule Y not preceded by X. In the Event Criteria area, click + to add a criteria for X. Select the left column of the new entry, and then choose the event type as Symantec Event Code. Select the center column and then select the operator =. Select the right column, and then specify the value 733 which correspond to the user action. Click Add to add the second criteria for X. Then select the left column of the new entry, and in the drop-down list under the Events tab, collapse the folder for Intrusion Activity. Select Intrusion Outcome ID. Select the center column and select the operator =. Select the right column, and then specify the value Failed. In the Tracking Keys area under the One-Many fields, click Add to specify the fields to track: for example, the source IP address. Under the Tracking fields column, to track the date of the event, add Event Date. that you specified must be true for an incident to be declared.

7 8 9

10 In the Event Count box, specify the number of times that the event criteria

110

Defining rules strategy Creating custom correlation rules

11 In the Span box, specify the amount of time for the event. For example, you
can specify 30 minutes, failing which an incident is declared.

12 In the Table Size box, specify the maximum number of events that the rule
can track at any one time. The table size should generally be a multiple of the Event Count setting.

13 On the Actions tab, you can specify whether the incident is an Alerting
incident and not a security incident. You can add the description and the remediation for that incident.

14 In the following areas for Auto assignments you can specify whether the
incident should be assigned automatically to the users or groups selected.

15 In the Notification area, you can enable the notifications and specify the
details of the email notification. You can add one or more recipients to receive the notifications and edit the subject and the body of the email notification. You must deploy the rule after you have created and configured the rule. To deploy the rule

1 2 3

On the console of the Information Manager client, click Rules. In the left navigation pane, place a check mark in the box next to the rule to deploy. In the top toolbar, click Deploy.

Creating a correlation rule for the Lookup Table Update


The Lookup Table Update rule is set to dynamically collect information in the lookup tables. Any rule can refer to this information to generate incidents, tickets, and assets. You can create a correlation rule which refers to an existing lookup table that gets dynamically updated. After you create a rule, you can configure the rule conditions and actions and deploy it. This rule is created only for updating the lookup table. Therefore, conclusions are not created for the Lookup Table Update rule. See About rule types on page 85. Consider a sample scenario wherein a stack of intentionally bad credit cards is distributed to serve as bait for malicious users. A malicious user intending to commit fraud can use one of the bait cards that have been distributed. A list of such baited credit cards is maintained in a lookup table. Whenever a credit card usage event contains any of these baited credit card numbers, the source IP address of this event is immediately stored in the lookup table of the Information Manager. Later, if a legitimate usage event originates from the stored source IP address, it indicates fraudulence by the malicious user.

Defining rules strategy Creating custom correlation rules

111

A correlation rule that is set to refer to the dynamically updated lookup table generates an incident for the events that occur from the stored source IP address. Here a lookup table must be configured with a Lookup Table Update rule to get updates of the source IP address. To create a correlation rule for Lookup Table Update

1 2 3 4

In the console of the Information Manager client, click Rules. In the left navigation pane, under the Correlation Rules folder, click User Rules. On the Rules tab, click Create new rule (+). In the Descriptions box, enter a brief description for the rule.

You can now configure the required rule conditions and actions. An event is generated whenever the lookup table is updated with the specified event criteria. To configure the rule conditions and actions

1 2 3

On the Conditions tab, on the Rule Type menu, select Lookup Table Update Rule. In the Event Criteria area, click + and specify the event criteria. On the Actions tab, configure the actions for the Lookup Table Update rule by editing any of the following properties:
Lookup Table Lets you select the User Lookup Table that is modified dynamically if the event satisfies the specified event criteria. Automatically updates the key column in the Lookup Table. Lets you select the existing event fields. If an event satisfies the specified event criteria, the value of this event field is used to populate the key column in the Lookup Tables. Lets you specify the period after which an entry in the configured Lookup Tables is removed. The value can be specified in hours. If the value specified is 0, entries in the Lookup Tables do not expire.

Table Column Event Field

Timeout in hours

After configuring the rule conditions, you must enable and deploy the rule.

112

Defining rules strategy Enabling and disabling rules

To deploy the rule

1 2 3

In the console of the Information Manager client, click Rules. In the left navigation pane, place a check mark in the box next to the rule to deploy. In the top toolbar, click Deploy.

Enabling and disabling rules


By enabling or disabling rules in the Rules view of the Information Manager console, you can temporarily filter certain network events. You can also change the way the Correlation Manager declares incidents. See About correlation rules on page 83. Note: In some cases, such as when the server is under a heavy event load, disabling or deleting a rule may not take effect immediately. To enable or disable a rule

1 2

From the Information Manager console, click Rules. In the left navigation pane, check or uncheck the box next to a rule. A check mark against the rule indicates that the rule is selected to be enabled.

In the top toolbar, click Deploy.

Working with the Lookup Tables window


You can view and update the lookup table information from the Rules view. List entries change over time due to updates from LiveUpdate. You can also create user-defined lookup tables under the User Lookup Tables folder. See About correlation rules on page 83. The Lookup Tables provide a set of configurable tables that let you extend the functioning of rules. To ensure that some correlation rules function properly, you must populate the Lookup Tables with the information that is applicable to your network and resources. Key settings include the email domains that apply to your network, files to be monitored, and users to be monitored. If required, additional user tables can be added based on your specifications. Table 5-8 lists the Lookup Tables and the types of information that they contain.

Defining rules strategy Working with the Lookup Tables window

113

Table 5-8 Category

Lookup Tables Description


List of users who can perform administrative activities. List of authorized ports through which incoming traffic is allowed as per the policies. List of authorized ports through which outgoing traffic is allowed as per the policies. List the IP addresses of the servers that are critical from business perspective. List of authorized users. Lists the IP addresses of known attackers. An incident is created if an event is detected from one of these IP addresses. The IP Watch List table is a configurable table that is available for manually tracking known bad IP addresses. DeepSight and LiveUpdate updates maintain separate internal IP Watch List. The list contains IP addresses known to be malicious in the larger Internet environment.

Administrative Users

Authorized Ports Inbound

Authorized Ports Outbound

Critical Servers

default usernames ip watchlist

IP Whitelist Table

Lists the Whitelist IP addresses. These IP addresses and domain names are reputed and can be trusted. You can add your trusted domain names and IP addresses to the list. Lists the logging devices that must be monitored after a specific time span for idle state. Provides a table for the user to describe the organizational domains monitored. Lists the P2P programs. Lists the IP addresses of the hosts that can potentially violate the policy.

Monitored Logging Devices

Organization Domains

P2P Programs Potential Policy Violation IPs

Rapid Response Monitored Address Lists of all the bad IP addresses on which your Traffic sensitive data can communicate. sensitive files Lists the file names to monitor during FTP transfers.

114

Defining rules strategy Working with the Lookup Tables window

Table 5-8 Category


sensitive urls

Lookup Tables (continued) Description


Lists the text strings that are often included in malicious URLs. Lists the services that are associated with each port number. Lists known Trojan horse exploits. Provides a table in which you can list users and the user names that formerly had access to the network. Lists the days of the week to allow further refinement of queries based on the day or days associated with an event. Lists the days of the weekend to allow further refinement of queries based on the day or days associated with an event. Lists the windows events that may indicate violations of security policies or other malicious activities.

services

trojans user watchlist

Weekdays

Weekend

windows events

Note: Additional lookup tables can be downloaded into the system through LiveUpdates. To add an entry to the Organization Domains watchlist

1 2 3 4 5 6 7 8

On the Information Manager console, click Rules. In the left navigation pane, expand the Lookup Tables folder. Expand the System Lookup Tables folder. Click Organization Domains. Click New Record (+). In the spaces provided, type a name and description. Click Deploy to Server. In the Deployed Modified Items dialog box, enter a comment which describes the addition of the entry and then click OK to deploy the change.

Defining rules strategy Working with the Lookup Tables window

115

To add an entry to the IP watchlist

1 2 3 4 5 6 7 8

On the Information Manager console, click Rules. In the left navigation pane, expand the Lookup Tables folder. Expand the System Lookup Tables folder. Click ip watchlist (if it is not selected). Click New Record (+). In the spaces provided, type the desired IP address and description. Click Deploy to Server. In the Deployed Modified Items dialog box, enter a comment which describes the addition of the entry and then click OK to deploy the change.

To add an entry to the sensitive files list

1 2 3 4 5 6 7 8

On the Information Manager console, click Rules. In the left navigation pane, expand the Lookup Tables folder. Expand the System Lookup Tables folder. Click sensitive files. Click New Record (+). In the space that is provided, type the name of the file. Click Deploy to Server. In the Deployed Modified Items dialog box, enter a comment which describes the addition of the entry and then click OK to deploy the change.

To add an entry to the sensitive urls list

1 2 3 4 5 6 7 8 9

On the Information Manager console, click Rules. In the left navigation pane, expand the Lookup Tables folder. Expand the System Lookup Tables folder. Click sensitive urls. Click New Record (+). In the URL Substring column, type the URL. In the Attack Type column, type the kind of attack that is associated with this URL. Click Deploy to Server. In the Deployed Modified Items dialog box, enter a comment which describes the addition of the entry and then click OK to deploy the change.

116

Defining rules strategy Working with the Lookup Tables window

To add an entry to the services list

1 2 3 4 5 6 7 8 9

On the Information Manager console, click Rules. In the left navigation pane, expand the Lookup Tables folder. Expand the System Lookup Tables folder. Click services. Click New Record (+). In the Service column, type a description. In the Port column, type the port number to add. Click Deploy to Server. In the Deployed Modified Items dialog box, enter a comment which describes the addition of the entry and then click OK to deploy the change.

To add an entry to the Trojan horses list

1 2 3 4 5 6 7 8 9

On the Information Manager console, click Rules. In the left navigation pane, expand the Lookup Tables folder. Expand the System Lookup Tables folder. Click trojans. Click New Record (+). In the Port column, type the port number that is associated with the attack. In the Protocol column, type the network protocol (such as TCP or UDP) that is associated with the attack. In the Trojan Name(s) column, type the name of the Trojan horse. Click Deploy to Server. the addition of the entry and then click OK to deploy the change.

10 In the Deployed Modified Items dialog box, enter a comment which describes
To add an entry to the user watchlist

1 2 3 4 5 6

On the Information Manager console, click Rules. In the left navigation pane, expand the Lookup Tables folder. Expand the System Lookup Tables folder. Click user watchlist. Click New Record (+). In the spaces provided, type the user name, name, and departure date of the employee or account to add.

Defining rules strategy Working with the Lookup Tables window

117

7 8

Click Deploy to Server. In the Deployed Modified Items dialog box, enter a comment which describes the addition of the entry and then click OK to deploy the change.

To add an entry to the Windows Events list

1 2 3 4 5 6 7 8 9

On the Information Manager console, click Rules. In the left navigation pane, expand the Lookup Tables folder. Expand the System Lookup Tables folder. Click windows events. Click New Record (+). In the ID column, type the desired Microsoft Windows event type. In the Category column, type the kind of activity that is associated with the event. In the Description column, type a description for this kind of event. Click Deploy to Server. the addition of the entry and then click OK to deploy the change.

10 In the Deployed Modified Items dialog box, enter a comment which describes
To delete an entry from the Lookup Tables

1 2 3 4 5 6 7 8 9

On the Information Manager console, click Rules. In the left navigation pane, expand the Lookup Tables folder. Expand the System Lookup Tables folder. Click the table with the entry to be deleted and select the entry. Click Delete Records. Click Yes to confirm the deletion. Click Deploy to Server. In the Deployed Modified Items dialog box, enter a comment which describes the deletion of the entry. Click OK to deploy the change.

Creating a user-defined Lookup Table


To create a user-defined lookup table, you first define the columns in the table, and then you add the data. See Working with the Lookup Tables window on page 112.

118

Defining rules strategy Working with the Lookup Tables window

To create a user-defined lookup table

1 2 3 4

On the Information Manager console, click Rules. In the left navigation pane, expand the User Lookup Tables folder. Click Create new filter or rule (+). In the Input dialog that appears, type the name of the table you want to create, and click OK. The name of the table must not match the name of an existing table or rule. On the Content tab, click Add Records (+). Enter the Name, Type, and Description values for a column that you want to use in your table. You can select any of the following types of values for a record in a column:

Float IP Mask Date String IP address Integer

6 7 8 9

For each additional column, repeat step 5. After creating the columns, select the Key option button corresponding to the column that forms the primary column in the table. Click Done. To add data to the table that you have created, do one of the following:

Click Add Records and enter the information in the available fields. Click Import Records. After you choose the file that you want to import, a wizard guides you through the steps to map the data that is stored in the file to the columns that you have added in the Lookup Table.

10 When you are finished, click Deploy. 11 In the Deploy Modified Items dialog box, choose the items that you want to
deploy. You can enter an optional comment in the available field.

12 Click OK.

Defining rules strategy Working with the Lookup Tables window

119

Importing Lookup Tables and records


You can import a previously exported Information Manager Lookup Table from a file. Alternatively, you can import the records that are stored in comma-separated or tabbed format into an existing Lookup Table. See Working with the Lookup Tables window on page 112. Note: When you import records into an existing Lookup Table, you can import a maximum of 1024 entries. To import an exported Lookup Table

1 2 3 4

On the Information Manager console, click Rules. In the left navigation pane, click the User Lookup Tables folder. Click Import from Disk. In the Select File(s) to Import dialog, choose the file, and click Import.

To import records into an existing Lookup Table

1 2 3 4 5

On the Information Manager console, click Rules. In the left navigation pane, expand the User Lookup Tables folder. In the table into which you want to import records, on the Content tab, click Import Records. In the Open dialog box, choose the file that contains the data to be imported, and click Open. In the Import Lookup Table Records wizard, choose the delimiter that is used in the file, and the appropriate options. The preview pane displays a representation of your choices. Click Next. In the next pane, use the Field Options area to specify how the data in the file maps to the columns in the Lookup Table. Click Next. In the next pane, click Start. When the import process is finished, click Finish.

6 7 8 9

120

Defining rules strategy Working with the Lookup Tables window

Section

Getting started with the Information Manager

Chapter 6. Configuring the Console Chapter 7. Managing roles and permissions Chapter 8. Managing users and user groups Chapter 9. Managing organizational units and computers

122

Chapter

Configuring the Console


This chapter includes the following topics:

About configuring Information Manager Identifying critical systems Adding a policy Specifying networks About customizations for a Service Provider Master console

About configuring Information Manager


For the correlation rules to function properly, it is essential that you specify the information that is used to determine incident severity. Key settings include specifying the systems that host critical or sensitive information and the systems that require high availability. You can also specify the networks that exist in your organization so that you can increase the priority of incidents based on the affected network. For example, the incidents that affect the networks that reside within your firewall can be assigned a higher priority than those that reside outside the firewall. See Identifying critical systems on page 124. You can specify the policies that are used within your network. Symantec Security Information Manager includes default policies. You can also add custom policies. Once you have defined the available policies, you can associate them with network computers when you add entries to the Assets list. See Adding a policy on page 126. See Specifying networks on page 126.

124

Configuring the Console Identifying critical systems

You should also create your list of response teams so that Information Manager can automatically assign incidents to these teams based on the rules settings. You use the Information Manager console to create the teams. However, the list of members that you can assign to those teams is maintained on the System view. Another key factor that lets you determine incident severity and the functioning of rules is the information that is stored in the knowledge base. The Global Intelligence Network Integration Manager provides some of this information. You can configure some settings. For example, you can add entries to the IP watchlist. See About customizations for a Service Provider Master console on page 127. Note: When you add a new policy or service to the Policies or Services lists, the new entries appear in the Event Criteria on the Rules view after you restart the console for the Information Manager.

Identifying critical systems


For the correlation rules to function properly, you must specify the information that is used to determine incident severity. Key settings include specifying the systems that host critical or sensitive information and the systems that require high availability. See About configuring Information Manager on page 123. Complete the following steps to identify critical systems in your organization. To identify critical systems

1 2 3

In Information Manager console, click Assets. On the toolbar, click + (the plus icon). In the Asset Editor dialog box, enter the IP address details in any one of the following fields.

IPv4 If the system has an IPv4 address, specify the address here. IPv6 (1) If the system has an IPv6 address, specify the address here. IPv6 (2) If the system has an alternate IPv6 address, specify the address here.

Fill in the following optional information, if you want:

In the Host Name box, type the host name of the system.

Configuring the Console Identifying critical systems

125

In the MAC Address box, type the MAC address of the system. In the DN box, type the Distinguished Name of the system. In the Description box, type a description of the system.

(Optional) In the Asset Priority area, select values for Confidentiality, Integrity, and Availability as follows:
Confidentiality Value range 15, where level 5 means that the computer hosts content that must be maintained with the highest level of confidentiality. Value range 15, where level 5 means that the computer hosts content that must be maintained with the highest level of integrity. Value range 15, where level 5 means that the computer hosts applications and the content that must always be available for your business.

Integrity

Availability

Note: Different assets can have different Confidentiality, Integrity, and Availability values. Therefore, you can select these values only for a single asset at a time.

(Optional) In the Additional Information area, provide in the following information:


The name of the organization that uses this system The physical location of the system The name of the operating system that is running on the system The version of the OS that is running on the system The owner of the system External ID information if used

Select Lock for Auto Update if you do not want the Assets list entry for this host to be overwritten when new information is imported from a vulnerability scanner. Click the Save Asset icon.

126

Configuring the Console Adding a policy

Adding a policy
You can add a policy against which you want to check the compliance. See About configuring Information Manager on page 123. You can add a policy from the Assets view. The policy is added for the specific asset that you select from the Assets view. To add a policy from the Assets view

1 2 3 4 5

In the console of the Information Manager client, click Assets. Select an asset to which you want to add the policy. Double-click the asset or go to the details pane in the Assets view. In the Asset Details dialog box, under the Policies tab, click the (+) plus icon. Select a policy and click OK.

You can add an entirely new policy from the System view. To add a new policy from the System view

1 2 3 4 5

In the Information Manager console, click System. On the Administration tab, click Policies. On the toolbar, click + (the plus icon). Type a name and description in the spaces that are provided. Click OK.

Specifying networks
You can specify the networks that exist in your organization to be associated with the Information Manager server. See About configuring Information Manager on page 123. To specify a network

1 2 3 4 5

In the Information Manager console, click System. On Administration tab, click Networks. On the toolbar, click + (the plus icon). In the Create New Network dialog box, type a name for the network in the Name box. Select any of the following options for Netmask/Prefix:

IPv4

Configuring the Console About customizations for a Service Provider Master console

127

Type the subnet IPv4 address and subnet mask for the network.

IPv6 Type the decimal value that is the contiguous, higher-order bits of the address that form the network part of the IPv6 address. The prefix can be any integer value between 0 and 128. For example, 10FA:6604:8136:6502::/64

(Optional) In the Physical Location box, type the location of the network. Further details of the physical location can be provided such as, city, state, region, latitude, longitude, and country.

(Optional) From the Time Zone list, select a time zone to specify the time zone in which this network is situated. You can also type the time zone details in the GMT +/- HH:MM format. When the time zone is specified, the time information from where an event has originated can be tracked. (Optional) In the Logical Location box, type the logical location or select the logical location of the network. (Optional) In the Description box, type a description of the network. the new network information is imported from a vulnerability scanner.

8 9

10 Check Auto-Updateable if you want the new entry to be overwritten when 11 Click OK.

About customizations for a Service Provider Master console


Customizations to the Incidents view include the following:

Contacts, Tickets, and Remediation tabs are available from within the incident details. The Contacts tab is not available for clients having the same domain as the Service Provider Master. Incident details are displayed in a separate Information Manager console window.

See About configuring Information Manager on page 123.

128

Configuring the Console About customizations for a Service Provider Master console

Chapter

Managing roles and permissions


This chapter includes the following topics:

About managing roles About working with permissions

About managing roles


A role is a group of access rights for a product. Users who are members of a role have access to the event viewing and management capabilities that are defined for that role. A user can be a member of more than one role. See About planning for role creation on page 131. You create new roles in the Symantec Security Information Manager. When you click Roles on the System view of the Information Manager console, you can perform the following tasks:

Create a role. See Creating a role on page 132. Edit role properties. See Editing role properties on page 135. Delete a role. See Deleting a role on page 147.

Note: Only members of the SES Administrator role and the Domain Administrator role can add or modify roles. See About the administrator roles on page 130.

130

Managing roles and permissions About managing roles

About the administrator roles


When you install the Information Manager, the following default administrator roles are created:
SES Administrator This role has full authority over all of the domains in the environment. This role has full authority over one specific domain in the environment.

Domain Administrator

If you have only one domain, the rights of the SES Administrator role and the Domain Administrator role are the same. If you have multiple domains (for example one for each geographic region of your company), each domain has a Domain Administrator. Members of this role can perform functions such as creating users and additional roles within that domain. The SES Administrator role can perform these functions for all of the domains that you configure. The default user, administrator, is also created when Information Manager is installed. The administrator is automatically a member of the SES Administrator and Domain Administrator roles. To access Information Manager for the first time, you must log on as this default user. The password for the administrator user account is specified at the time of installation. You can add users to the administrator roles, but you cannot change any other characteristics of these roles. If a user is a member of the SES Administrator role, that user should not be assigned to any other roles. See Editing role properties on page 135.

About the default roles in the Information Manager server


The Information Manager server has the following predefined roles by default:

SES Administrator This role grants ownership to the entire Symantec Enterprise Security directory tree. Top-level administrators use this role. Domain Administrator This role grants ownership to a Symantec Enterprise Security domain and its subdomains. Domain administrators use this role. External Users Role This role grants base access permissions for the users that are imported from an external LDAP server. You can integrate Active Directory with the Information Manager server and add the Active Directory users. After Active Directory synchronizes with

Managing roles and permissions About managing roles

131

Information Manager, the Active Directory users can access the Information Manager server. Members of the External Users role do not have any automatic Information Manager privileges. Only Active Directory users use this role for Pass-through Authentication. The user must be assigned another Information Manager role to log on to the Information Manager server. See About managing roles on page 129.

About planning for role creation


Roles control user access; therefore, before you create roles you should plan carefully. You need to identify the tasks that are done in your security environment, and who performs them. The tasks determine the type of roles that you must create. The users who perform these tasks determine which users should be members of each role. See About managing roles on page 129. Consider the following issues:

Who allocates responsibilities within your security environment? If these users need to create roles, they must be members of the Domain Administrator role.

Who administers your security network by creating management objects such as users and organizational units? These users must be members of the roles that provide management access and the ability to access the System view.

Which products are installed, and who is responsible for configuring them? These users must be members of management roles for the products for which they are responsible. They may need access to the System view only.

Who is responsible for monitoring events and incidents? These users must be members of event viewing roles for the products for which they are responsible. Users who monitor events must have access to the Events view. Users who monitor incidents must have access to the Events view and the Incidents view.

Who responds to problems and threats? These users must have access to the Events view and the Incidents view. Users who create and manage help desk tickets must also have access to the Tickets view.

132

Managing roles and permissions About managing roles

Table 7-1 lists the common roles in a security environment and the responsibilities that belong to each role. Table 7-1 Role name
Domain Administrator System Administrator

Typical roles and responsibilities Responsibilities


Defines the user roles and role authority. Manages Information Manager. Verifies that events flow into the system and that the system functions normally.

User Administrator

Creates the correlation rules and collection filters. Performs the user and the device administration.

Information Manager Report Writer

Views all incidents, events, reports, and actions. Views the incidents, events, and reports for assigned devices. Reviews and validates incident response.

Provides the affirmation of incident review and response by administrators to GAO and others.

Report User Rule Editor

Views the events and reports for assigned devices. Creates, edits, and deploys rules.

Creating a role
You can create roles using the Role Wizard in the Information Manager Web interface. Only a user who has either the Domain Administrator role or the SES Administrator role can create roles. See About planning for role creation on page 131. Note: If the Role members will have access to all archives option is selected, role members can access new archives automatically. If the Role members will have access to only the selected archives option is selected, role members cannot access new archives automatically. To create a role

1 2 3

In the Information Manager console, clickSystem. On the Administration tab, in the left pane, navigate to the relevant domain, and click Roles. On the toolbar, click + (the plus icon).

Managing roles and permissions About managing roles

133

4 5

In the first panel of the Role Wizard, click Next. In the General panel, do the following, and click Next:

In the Role name text box, type a name for the role. In the Description text box, type a description of the role (optional).

In the Products panel, do one of the following:

To give the role members access to all of the listed products, click Role members will have access to all products, and click Next. To limit the role member's access to certain products, click Role members will have access to only the selected products and select the appropriate products. Then click Next. Symantec Security Information Manager is checked by default in the Product List.

In the SSIM Permissions panel, do one of the following:

To give role members all permissions that apply to Information Manager, click Enable all Permissions, and click Next. To give role members a limited set of permissions, click Enable specific Permissions. From the permissions list, uncheck the permissions that you do not want to enable and click Next.

In the Console Access Rights panel, do one of the following:

To give role members the ability to see all components of the Information Manager, click Role members will have all console access rights, and click Next. To give members of the role the ability to view only limited components of the Information Manger, click Role members will have only the selected console access rights. From the list, enable at least one of the console access rights, and click Next.

See Modifying Information Manager console access rights on page 137.

In the Organizational Units panel, do one of the following:

To give role members access to all organizational units, click Role members will have access to all organizational units, and click Next. To give role members access to specific organizational units, click Role members will have access to only the selected organizational units. In the organizational unit tree, select at least one organizational unit to associate with this role, and click Next.

When you select an organizational unit that has additional organizational units, users of the role are given access to those additional organizational units also.

134

Managing roles and permissions About managing roles

If you add an organizational unit to a role, the following users can see the events that are generated by the security products:

Users who are role members Users who have event viewing access

These users can view only those events that are generated by the security products that are installed on the computers of that organizational unit. Role members can see events only from computers in the organizational units that have been added to their roles.

10 In the Servers panel, do one of the following:

To give role members access to all of the Information Manager servers in your security environment, click Role members will have access to all servers, and click Next. To limit role members' access to certain servers, click Role members will have access to only the selected servers. In the server tree, select at least one server to associate with this role, and click Next.

Members of the role can modify configurations on the selected servers. The role members can also view event archives that reside on the selected servers.

11 In the Members panel, do one of the following:

To add individual users to the role now, click Add Members. In the Find Users dialog box, add one or more users, from the Available Users list to the Selected Users list and click OK. In the Members panel, click Next. To add the users who are members of a specific user group, click Add Members From Groups. In the Find User Groups dialog box, add one or more user groups, and click OK. The users that are associated with the groups you selected are added to the Selected Users list. When you are finished, click Next. To continue without adding users to the role, click Next. You can add users to the role later by editing the roles properties. See Adding a user to a role on page 135. You can also associate a role with a user by editing the users properties.

You can assign users to a role only if you have already created those users. See Creating a new user on page 156.

Managing roles and permissions About managing roles

135

12 In the Role Summary panel, review the information that you have specified,
and click Finish. The role properties that are created are shown in the list at the bottom of the panel. A green check mark next to a task indicates that it was successfully completed.

13 Click Close.

Editing role properties


After you create a role in Information Manager, you can modify it by editing its properties. For example, as you create new organizational units or users, you can add them to existing roles. You can edit the properties of a role by selecting the role in the right pane. You can also edit the role properties from any dialog box that displays the roles properties. To edit role properties

1 2 3 4 5

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to edit, and select Properties. Use the Editing Role Properties dialog box to make changes to the role. To save changes and close the dialog box, click OK.

See Adding a user to a role on page 135. See Modifying Information Manager console access rights on page 137. See Modifying product access rights on page 138. See Modifying server access rights on page 139. See Modifying access permissions in roles on page 141.

Adding a user to a role


When a user logs on to Information Manager, the users role membership determines the user's access to the various products and event data. You can assign a user to a role in the following ways:

Assign each user individually to one or more roles. Assign users to groups, and assign user groups to roles.

When you assign a user group to a role, all of the users who are currently in the group are assigned to that role. However, if you later add more users to the user

136

Managing roles and permissions About managing roles

group, those users are not automatically added to the role. You must assign each user to the role individually. Note: Before you assign users and user groups to roles, you must create users and user groups in the Directory. See Creating a new user on page 156. See Creating a user group on page 158. To add a user to a role

1 2 3 4 5 6

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to edit, and select Properties. In the Editing Role Properties dialog box, in the left pane, click Members. Click Add Members. In the Find Users dialog box, in the list of available users, search for a user within a domain or a user group. You can also search for a user by entering the logon name, last name, or first name and then click Start Search. All of the users who meet the criteria you entered appear in the available users list. Select a user name (or Ctrl + click multiple user names), and click Add. The user name appears in the Selected users list.

7 8 9

To view or edit the properties of a user, click the user name, and click Properties. In the User Properties dialog box, view or make changes to the properties, and click OK. In the Find Users dialog box, click OK.

10 In the Editing Role Properties dialog box, click OK.


To add a user group to a role

1 2 3 4 5 6

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to edit, and select Properties. In the Editing Role Properties dialog box, in the left pane, click Members. Click Add Members From Groups. In the Find User Groups dialog box, select the domain of the group from the drop-down list.

Managing roles and permissions About managing roles

137

In the list of available user groups, click a user group name (or Ctrl + click multiple user names), and click Add. The user group name appears in the Selected user groups list.

8 9

To view or edit the properties of a user group, click the user group name, and click Properties. In the User Group Properties dialog box, view or make changes to the properties, and click OK.

10 In the Find User Groups dialog box, click OK. 11 In the Editing Role Properties dialog box, click OK.
See Editing role properties on page 135.

Modifying Information Manager console access rights


Console access rights control the views that a role member can access when they log on to the Information Manager console. You can modify the Console access rights that you assigned when you created the role. Based on the Console access rights, various views of the console are visible to the role members whenever they log on to Information Manager. To modify console access rights

1 2 3 4 5

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to edit, and select Properties. In the left pane, click Console Access Rights. Do one of the following:

To give members of the role the ability to see all components of the Information Manager, click Role members will have all console access rights. To give members of the role the ability to view only limited components of the Information Manger, click Role members will have only the selected console access rights. From the list that appears, enable or disable console access rights as you want. The following table describes the tiles (views in the Information Manager) that are available to members:
Show Assets Tile Show Dashboard Tile Displays the Assets view. Displays the Dashboard view.

138

Managing roles and permissions About managing roles

Show Events Tile Show Incidents Tile Show Intelligence Tile Show Reports Tile Show Rules Tile Show Statistics Tile Show System Tile Show Tickets Tile

Displays the Events view. Displays the Incidents view. Displays the Intelligence view. Displays the Reports view. Displays the Rules view. Displays the Statistics view. Displays the System view. Displays the Tickets view.

Modifying access permissions in roles lists the console access rights that the users who perform specific functions need.

Click OK.

See Editing role properties on page 135.

Modifying product access rights


The Products property lets you select and modify the products to which role members have access. To modify product access rights

1 2 3 4 5

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to edit, and select Properties. In the left pane, click Products. Do one of the following:

To give the role members access to all of the listed products, click Role members will have access to all products. To limit the role members' access to specified products, click Role members will have access to only the selected products. Enable (check) or disable (uncheck) access to individual products in the list. Consider the tasks that role members perform as you select products from the list. Modifying access permissions in roles describes the access requirements of typical enterprise security roles.

Click OK.

Managing roles and permissions About managing roles

139

See Editing role properties on page 135.

Modifying server access rights


Use the Servers property to select the servers to which role members have access. The selections for this property determine the servers that the role members can see on the following locations:

The Testing tab on the Rules view that can be used for testing a specific rule. The servers and archives that are available for each query on the Events view. The Server Configurations tab on the System view.

To modify server access rights

1 2 3 4 5

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to edit, and select Properties. In the left pane, click Servers. Do one of the following:

To give role members access to all Information Manager servers in the network configuration, click Role members will have access to all servers. To limit role members' access to certain servers, click Role members will have access to only the selected servers. In the server tree, select at least one server to associate with this role, and click OK.

See Editing role properties on page 135.

Modifying SIM permissions


Use the SIM Permissions property to enable or disable several types of Information Manager permissions that are assigned to a role. See About managing roles on page 129. To modify SIM permissions

1 2 3 4 5

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to edit, and select Properties. In the left pane click SIM Permissions. Do one of the following:

140

Managing roles and permissions About managing roles

To assign all Information Manager permissions to the role, click Enable all Permissions. To limit the permissions that are assigned to the role, click Enable specific Permissions. Then click the check boxes as needed to enable or disable permissions for the role. Table 7-2 lists the permissions that the users who perform specific functions need.

Click OK.

About the Bypass Event RBAC option


When you create or modify a role, you can choose to enable the Bypass Event RBAC option. Bypass Event RBAC gives unrestricted access to all of the event archives for which role a user has been granted access. When a user with this role performs an event query, the query bypasses any additional permission settings based on Organizational Unit, Domain, or Product settings. The query returns a complete data set from the archives for which the user has been given access. Enabling Bypass Event RBAC enhances query performance by reducing the set of permissions criteria against which the query must be processed. See About managing roles on page 129.

Enabling access to the Event Query Templates


The View Event Query Templates permission in a role controls the access to the Templates folder in the Events view. If this permission is enabled for a role, the user who is assigned with the role can access the Event Query Templates. For example, the Information Manager administrator creates two roles, IncidentAnalyst and EventAnalyst. The View Event Query Templates permission is disabled for the IncidentAnalyst role, and enabled for the EventAnalyst Role. The IncidentAnalyst role is assigned to user A and the EventAnalyst role is assigned to user B. From the Events view, user A who is assigned with the IncidentAnalyst role cannot view the Event Query Templates. User B who is assigned with the EventAnalyst role can view the Event Query Templates and run the corresponding queries. You can edit the existing roles to enable the View Event Query Templates permission. To enable View Event Query Templates permission for existing roles

1 2

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click Roles.

Managing roles and permissions About managing roles

141

3 4 5 6 7

On the right panel, right-click the role that you want to edit and select Properties. In the Editing Role Properties dialog box, select SIM Permissions. Click Enable specific permissions. From the permissions list, check View Event Query Templates. Click Save and then click OK.

By default, this permission is enabled for new roles. While creating a role, you can disable the View Event Query Templates permission for a new role. Select the Enable specific permissions option from the SIM Permissions panel and then uncheck View Event Query Templates. See Creating a role on page 132.

Modifying access permissions in roles


Roles include the permissions that determine the types of access (for example, Read and Delete) for a role member. Based on these permissions a role member can access various functions in the Information Manager. Permissions are assigned to roles on various functions and the users belonging to those roles can perform tasks accordingly. You can change the access permissions for the following types of objects:

Container objects that were created when you installed Information Manager, such as organizational units. The new objects that you create within the container objects.

When you view the properties of a role, you can view and modify the permissions by selecting tabs in the Editing Role Properties dialog box. Warning: Permission modification is an advanced feature. You should customize permissions only if you have a clear understanding of how access control works. See About working with permissions on page 147. Table 7-2 describes the access requirements of typical enterprise security roles.

142

Managing roles and permissions About managing roles

Table 7-2 Role Products

Access requirements for roles Symantec Security Information Manager permissions


All

Console access

Access permissions

SES Administrator and Domain Administrator

All

All

All

Note: You cannot modify


access permissions of the SES Administrator and Domain Administrator roles. Information Manager

System Administrator

Allow Asset Edits Move Computers

Show Dashboard Read and Search on Tile Published / System Query groups Show Intelligence Tile Show Statistics Tile

Show System Tile Read and Search on Published /System Query groups Read and Write on users and user groups Read and Write on rules and roles

User Administrator

All

Allow Dashboard Auto Show Assets Tile Refresh Show Dashboard Move Computers Tile Allow Asset Edits Show Intelligence Tile Manage Networks Show Rules Tile Manage Policies

Manage Services

Show System Tile

Managing roles and permissions About managing roles

143

Table 7-2 Role Products

Access requirements for roles (continued) Symantec Security Information Manager permissions

Console access

Access permissions

Information Manager

Information Manager

Create Incidents Write My Incidents Write All Incidents Change Assignee and Team on My Incidents Change Assignee and Team on All Incidents Change Assignee/Team to self or own team on unassigned incidents Change Status My Incidents Change Status All Incidents Read My Incidents Read All Incidents

Show Assets Tile

Show Dashboard Tile Show Events Tile


Read and Write on Published/System Query groups. In addition, Read and Write on Report Show Incidents Tile groups based on the Symantec Security Show Intelligence Information Manager Tile permissions that are Show Reports Tile granted to the role. Show Tickets Tile

Read Unassigned Incidents View Event Query Templates Create new queries

Create new reports Publish queries Publish reports

Allow Dashboard Auto Refresh Move Computers


Allow Asset Edits Manage Networks Manage Policies Manage Services

144

Managing roles and permissions About managing roles

Table 7-2 Role Products

Access requirements for roles (continued) Symantec Security Information Manager permissions

Console access

Access permissions

Report Writer

Information Manager

Write My Incidents Write All Incidents

Read and Write on Published /System Query groups Change Assignee and Team on My Incidents Show Incidents Tile Read and Write on Report groups Change Assignee and Show Intelligence Team on All Incidents Tile Change Show Reports Tile Assignee/Team to self Show Tickets Tile or own team on unassigned incidents Change Status My Incidents Change Status All Incidents Read My Incidents

Show Dashboard Tile Show Events Tile

Read All Incidents

Read Unassigned Incidents Create new queries


Create new reports Publish queries Publish reports

Allow Dashboard Auto Refresh Move Computers


Allow Asset Edits Manage Networks Manage Policies Manage Services Create new queries Create new reports

Report User

Information Manager

Show Dashboard Tile Show Events Tile Allow Dashboard Auto Show Reports Tile Refresh

Read and Search on Published /System Query groups Read and Write on Report groups

Managing roles and permissions About managing roles

145

Table 7-2 Role Products

Access requirements for roles (continued) Symantec Security Information Manager permissions
Create new queries

Console access

Access permissions

Rule Editor

Information Manager

Read and Write on Rules and Roles Show Statistics Tile Read and Search on Published /System Query groups Read and Search on Report groups

Show Events Tile Show Rules Tile

Note: When a roles access permissions to a Published Query Group or a System Query Group are changed, the roles database permissions may be incorrectly modified. If a user cannot view queries on the Events view, it may be because the users role lacks the necessary database permissions. To correct this problem, do the following: Log on as a Domain Administrator or SES Administrator and open the Editing Role Properties dialog box for the users role. On the DataStores tab, check the roles database permissions. If the role does not have both Read and Search permissions, add the missing permissions. See To modify access permissions in roles on page 145. To modify access permissions in roles

1 2 3 4

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to edit, and select Properties. In the Editing Role Properties dialog box, in the left pane, click the type of permissions to modify. For example, to change the role members' directory permissions, choose Directories. When you finish setting permissions, click OK.

See Editing role properties on page 135.

Using examples of modifying permissions in roles


You can modify permissions for the following purposes, among others:

To hide a query group from members of a role. When members of this role open the Query Chooser on the dashboard, they cannot see the restricted query group in the query tree.

146

Managing roles and permissions About managing roles

To hide all users from members of a role. When members of this role view the System view, they do not see users in the left pane.

To prevent role members from adding and deleting user groups Role members can view and modify user groups, but they cannot add and delete user groups.

See About permissions on page 148. To hide a query group from members of a role

1 2 3 4 5 6 7 8 9

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to restrict, and select Properties. In the left pane, click System Query Groups. Click Add. In the Find System Query Groups window, select Product Queries.Symantec Client Security, and click Add. Click OK. On the Product Queries.Symantec Client Security row, uncheck Read and Search. Click OK. Members of this role cannot view Symantec Client Security queries. If a role member selects System Queries > Product Queries in the Query Chooser on the dashboard, the role member cannot view Symantec Client Security in the tree.

To hide all users from members of a role

1 2 3 4 5 6

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to restrict, and select Properties. In the left pane, click Users. Under Default permissions for all users, uncheck all permission types (for example, Read and Add). Click OK. When role members click Users in the left pane of the System view, they see only their own details in the right pane. Other users are not listed.

Managing roles and permissions About working with permissions

147

To prevent role members from adding and deleting user groups

1 2 3 4 5 6

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to restrict, and select Properties. In the left pane, click User Groups. On the top line of permissions, check Read, Write, and Search. Make sure that Add and Delete are not checked. Click OK. Role members can view, search, and modify all user groups in the domain. They cannot create new user groups or delete user groups.

Deleting a role
You can delete roles when they are no longer in use. Before you delete a role, you can view the properties of the role to ensure that none of your users requires it. To delete a role

1 2 3 4 5 6

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain, and click Roles. In the right pane, right-click the role to delete, and select Properties. Review the role properties to make sure that no users require this role. Click Cancel. If you still want to delete the role, on the toolbar, click - (the minus symbol). A message warns you that all members of the selected role would be removed. Then, although the user accounts are not deleted, the users no longer have access to the role.

In the confirmation dialog box, click Yes to delete the role.

See About managing roles on page 129.

About working with permissions


Permissions define the access that members of a role have to specific objects. Along with other role properties, permissions control what users can see and do when they log on to Information Manager.

148

Managing roles and permissions About working with permissions

As with roles, you can work with permissions only if you are a member of the SES Administrator or Domain Administrator role. The permissions of objects are defined initially when you create roles and when you create new objects. You can then modify the permissions to fine-tune your roles. Warning: You should customize permissions only if you have a clear understanding of how access control works in the security (LDAP) directory. See About permissions on page 148.

About permissions
Permissions are always associated with roles and are applied when a member of a specific role logs on to Information Manager. Table 7-3 shows the permissions that role members can have to view and work with objects. Table 7-3 Permission
Read

Object permissions Description


Lets the role members see the attributes of objects. Read must be enabled for the other access permissions to work.

Write Add

Lets the role members modify objects. Lets the role members create a new child object within the selected container. Lets the role members delete objects. Lets the role members search the database or the LDAP directory for objects. Search must be enabled for the other access permissions to work.

Delete Search

The following objects have permissions:

Container objects Container objects are created when the Datastore (database) and Directory are installed. These objects contain all of the new objects that you create.

Managing roles and permissions About working with permissions

149

In the Information Manager, container objects appear in the left pane of the Administration tab on the System view. Examples of the container objects that have permissions are users, user groups, roles, and organizational units.

Objects that you create within container objects When you create new objects to represent your security environment, they are stored within the container objects. On the System view, the objects that you create appear in the right pane when you select their container object in the left pane. For example, when you select Users in the left pane, the individual users that you have created within the Users container are displayed. These created objects are sometimes known as child or leaf objects.

You must understand the relationship between the permissions of container objects and the permissions of the objects you create within these containers. See About the propagation of permissions on page 149.

About the propagation of permissions


As you create new management objects, it is important to understand the relationship between the permissions of container objects and the permissions of the objects you create within these containers. In most cases, the permissions of a container object propagate to all new objects that you create within the container. When you create new objects on a role-by-role basis, the current permissions of the container object are propagated to the new objects. For example, in Role A, on the Users tab, you disable Write permission for the Users container. In Role B, you disable Delete permission for the Users container. When you create new users, members of Role A do not have Write permission, so they cannot modify the properties of the new users. Members of Role B do not have Delete permission, so they cannot delete the new users. However, if a user is assigned to two roles A and B. Role A that has the Add access for users and Role B that do not have Add access for users. In this case, the user who is assigned to these roles can add new users. Permissions of Role A take precedence over permissions of Role B

150

Managing roles and permissions About working with permissions

Note: Most roles should have at least Read and Search permissions for all objects. These permissions allow role members to view information about the objects and perform searches for the objects. For example, if you enable Write access for a container object and disable Read access, the role members cannot modify the objects, because they cannot view the objects. Propagation occurs only when you create new objects. For example, you may create several users and assign them to role A before you disable the Write permission in role A. These permissions are not disabled for the original users unless you disable them explicitly for the existing user's of Role A. See About permissions on page 148.

Modifying permissions from the Permissions dialog box


You can use the following methods to modify permissions:

Edit the role using the Editing Role Properties dialog box. Use this method to modify permissions for several objects within one role. See Modifying access permissions in roles on page 141. You can edit the permissions of software products and their configurations through the Products Tab on the Editing Role Properties dialog box.

Use the Permissions dialog box for a particular object. Use this method to modify the permissions for a specific object. Note: Some objects do not have permissions.

To modify permissions for a container object

1 2 3

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain. In the left pane, right-click the container object (for example, Users) and select Permissions. In the Permissions dialog box, roles are listed if they have already been assigned to this object. Some container objects do not have permissions.

Do any of the following:

To modify permissions for this object, check (enable) or uncheck (disable) the permissions corresponding to the listed roles, as needed.

Managing roles and permissions About working with permissions

151

You should not disable the Search permission.

To add a role to this object, click Add. In the Find Roles dialog box, select a role, then click Add, and click OK. The role you added appears in the Permissions dialog box, where you can then enable or disable its permissions.

To remove a role, click the role name, and click Remove. To edit a roles properties, click the role name, and click Properties.

Click OK when you finish modifying permissions.

To modify permissions for a created object

1 2 3 4

In the Information Manager console, click System. On the Administration tab, navigate to the relevant domain. In the left pane, click the container that contains the created object. For example, click Users. In the right pane, right-click the object whose permissions you want to modify, and select Permissions. In the Permissions dialog box, roles are listed if they have already been assigned to this object. Some created objects do not have permissions, such as Policies.

Do any of the following:

To modify permissions for this object, check (enable) or uncheck (disable) the permissions corresponding to the listed roles, as needed. You should not disable the Search permission.

To add a role to this object, click Add. In the Find Roles dialog box, select a role, then click Add, and click OK. The role you added appears in the Permissions dialog box, where you can then enable or disable its permissions.

To remove a role, click the role name, and click Remove. To edit a roles properties, click the role name, and click Properties.

Click OK when you finish modifying permissions.

152

Managing roles and permissions About working with permissions

Chapter

Managing users and user groups


This chapter includes the following topics:

About users and passwords Customizing the password policy Creating a new user Creating a user group About editing user properties About modifying user permissions Modifying a user group Deleting a user or a user group About integrating Active Directory with the Information Manager server Managing Active Directory configurations Changing the password for Linux accounts

About users and passwords


The Symantec Security Information Manager server uses accounts from Linux and the IBM DB2 Service. Both types of accounts use the password that is specified during installation. The default password is password. By default, the installation program creates the following Linux accounts:

154

Managing users and user groups About users and passwords

root

Default Linux administrative account Used by the Information Manager text console process Used by the HTTP and the Tomcat processes Used by the database process Used for the DB2 Admin Tools database Used by the database process

simuser

sesuser

db2admin dasusr1

symcmgmt

Warning: For security, change the Linux passwords periodically, according to your company's security policy. The password for all Linux accounts must be changed using the Change Password option (available under Settings > Passwords) from the Information Manager Web interface. Do not change these account passwords or permissions by standard Linux commands as it may result in errors with server operation. The password for the symcmgmt Linux account cannot be changed from the Information Manager Web interface. The password for a symcmgmt Linux account can be changed by using the standard Linux commands. This change in the password must be followed with an update in the Information Manager Web interface under System > Administration > Data Stores. See Changing the password for Linux accounts on page 170. See Changing the password for symcmgmt Linux account on page 171. Usually, you are not required to create new Linux accounts. However, you may want to create an account with limited permissions to a file share to allow a user or process to copy LDAP backups. Refer to your Linux documentation for information on how to create Linux accounts. By default, the installation program also creates the administrator account in the IBM LDAP directory. This account is used for logging in to the Information Manager console and Information Manager Web interface initially. With the proper permissions, you can also create new LDAP directory accounts for users who use the Information Manager console and Information Manager Web interface. These accounts are for the administrators of your security products, contacts for notifications, or both. Users who are administrators are members of the roles that define their administrative permissions. All users who need access to the Information Manager must be members of one or more roles. If a user tries

Managing users and user groups Customizing the password policy

155

to log on to the Information Manager using an account that is not a member of a role, an error message is displayed. Users who only receive notifications do not have to be members of a role. See Creating a new user on page 156. See About editing user properties on page 159. See About modifying user permissions on page 166. See Deleting a user or a user group on page 167. See Creating a user group on page 158. See Modifying a user group on page 166. See Deleting a user or a user group on page 167.

Customizing the password policy


The Information Manager includes the ability to enforce strong password requirements for all users. As an administrator, you can customize the password policy for Information Manager to match the password standards that apply to your environment. You must provide the LDAP cn=root password to change the password settings. When the password policy changes, users whose existing passwords are non-compliant with the new policy are prompted to change their password at the next logon. Note: When you enable the EAL4 password policy and a user locks their account the same day that they change it, you cannot reset the password for 24 hours. This behavior is a result of the value that is defined for the setting Minimum time between password changes (seconds). This setting is set at 24 hours in the EAL4 password policy. This behavior is expected due to the strict EAL4 password policy definition. If you do not want to enable the EAL4 policy, you can choose the Custom password policy option, change the Minimum time between password changes (seconds) setting to a lower value, and save the configuration. You can configure the password policy by using any of the following methods:
Default The default settings that Information Manager uses.

156

Managing users and user groups Creating a new user

EAL4

The settings that comply with Evaluation Assurance Level 4 (EAL4) standards. User-defined settings.

Custom

Note: If you choose this column but do not change


any settings, clicking Save reverts to the policy that was previously enabled.

To change the Information Manager password policy

Log on to the Information Manager Web interface using administrator credentials, and click System > Password. In the tree pane, click Password Policy. In the LDAP cn=root Password field, type the password, and click Enter Admin Mode. In the User Password Settings and Administrator Password Settings tables, choose the type of password management you want to use. If you choose Custom, configure each option, and check Password policy enabled:. Click Save. Click Leave Admin Mode.

2 3

4 5

See About users and passwords on page 153.

Creating a new user


Use the Create a new User wizard to create a user. The wizard prompts you for the required information that the user needs to log on to Symantec Security Information Manager. It also lets you specify notification information, permissions, and other user properties. You can provide all the information at the time that you create the user. Alternatively, you can provide only the required information and add more information later by editing the users properties. See About editing user properties on page 159. To create a new user

1 2 3

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click Users. On the toolbar, click + (the plus symbol) or right-click the Users node and select New.

Managing users and user groups Creating a new user

157

4 5

In the first panel of the Create a new User wizard, click Next. In the General panel, do the following:
Logon name Last name First name Type the logon name for the new user. Type the users last name. Type the users first name.

The other fields on this panel are optional. Click Next after you enter the details.

In the Password panel, type a password in the Password text box and type the same characters in the Confirm password box. Click Next. The password that you choose must comply with the policy settings chosen by the administrator. The password must be 8 to 24 characters and is case sensitive. Green check marks under Password rules indicate that your password meets the requirements.

(Optional) In the Business panel, specify business information for the user, and click Next. See Specifying user business and contact information on page 160.

8 9

(Optional) In the Contact Information panel, specify contact information for the user, and click Next. (Optional) In the Notifications panel, specify email addresses and pager numbers for the user, and times when those contacts can be used for notifications. Click Next. See Specifying notification information on page 164.

10 In the Roles panel, you can assign the user to one or more roles that define
the users permissions, and click Next. You can also assign or change a user's roles later. A new user cannot log on unless a role is assigned to the user. See Managing role assignments and properties on page 161. You must create roles before you can assign users to roles. See Creating a role on page 132.

158

Managing users and user groups Creating a user group

11 In the User Groups panel, you can assign the user to one or more user groups,
and click Next. You can also assign users to groups later. See Managing user group assignments on page 162. You must create user groups before you can assign users to groups. If no groups appear on the Find User Groups panel, you have not yet created any groups. See Creating a user group on page 158.

12 In the User Summary panel, review the information that you have specified,
and click Finish. The user properties that are created are shown in the task status list at the bottom of the panel. A green check mark next to a task indicates that it was successfully completed.

13 Click Close.

Creating a user group


After you create users, you can assign them to groups. User groups are particularly useful when you have large numbers of users who need to have the same system roles. You can assign an entire user group to a role. All of the users in the group inherit the rights and the permissions that are assigned to that role. Implementing user groups also facilitates the auto-assignment of incidents, using correlation rules. The Create a new User Group wizard enables you to create user groups and add users to the groups. You can assign users at the time you create a group, or you can add users to the group later. Note: If you create a user group and assign it to a role, the users who are currently in the group are assigned to that role. However, if you later add more users to the user group, those users are not automatically added to the role. You must assign each user to the role individually. To create a user group

1 2 3 4

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click User Groups. On the toolbar, click + (the plus symbol). In the first panel of the Create a new User Group wizard, click Next.

Managing users and user groups About editing user properties

159

5 6

In the General panel, type a name and (optional) description for the user group, and click Next. In the Members panel, click Add. In the Find Users dialog box, the Available Users list shows all users for the domain, up to the number of users that the Maximum search count text box indicates.

Select one or more users from the Available Users list, and click Add. The users appear in the Selected users list.

If you want to review information about a specific user, click the user name, and click Properties. You can view or change the user's properties, and click OK. When you finish adding users to the group, click OK.

10 In the Members panel, click Next. 11 In the User Group Summary panel, click Finish.
Properties for the created user group are shown in the task status list at the bottom of the panel. A green check mark next to a task indicates that it was successfully completed.

12 Click Close.
See Modifying a user group on page 166.

About editing user properties


User properties are the attributes that can be added for a user when you create a new user or edit the user properties. User properties include general information about the user, change password facility, and the role that can be assigned to a user. User properties also include the user group to which a user can be assigned, business and contact information about the user, and contact methods and schedule for alert notifications. After you create a user, you can edit the user properties to perform the following tasks:

Change a user's password. See Changing a users password on page 160. Specify user business and contact information. See Specifying user business and contact information on page 160. Assign roles to a user. See Managing role assignments and properties on page 161. Assign user to a user group.

160

Managing users and user groups About editing user properties

See Managing user group assignments on page 162.

Specify contact methods and schedule for alert notifications. See Specifying notification information on page 164.

Changing a users password


Passwords can be changed in the following ways:

Users can change their own passwords by using the Change Password option on the Tools menu in the Information Manager console. Administrators can change a users password by editing the users properties.

To change a users password

1 2 3 4

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click Users. In the right pane, right-click the user whose password you want to change, and select Properties. In the User Properties dialog box, on the Password tab, in the Password text box, type a new password. The password that you choose must comply with the policy settings that the administrator chooses.

5 6

In the Confirm password text box, type the password again to confirm it. Click OK.

See About editing user properties on page 159.

Specifying user business and contact information


In the User Properties dialog box, the Business tab and the Contact Information tab let you supply detailed information about the user. You can specify this information when you create a user or by editing an existing users properties. See About editing user properties on page 159. To specify user business and contact information

1 2 3

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click Users. In the right pane, right-click the user whose information you want to change, and select Properties.

Managing users and user groups About editing user properties

161

4 5

In the User Properties dialog box, on the Business tab, type the business information for the user. To identify the users manager, click the browse button (...) next to the Manager text box to display the Find Users dialog box. The manager must exist as a user in the LDAP directory.

In the Find Users dialog box, select the user who is the manager, and click OK. The Available users list shows all users for the domain, up to the number of users that the Maximum search count text box indicates.

To identify the users administrative assistant, click the browse button (...) next to the Administrative assistant text box. In the Find Users dialog box, select the administrative assistant. The administrative assistant must exist as a user in the LDAP directory.

8 9

On the Contact Information tab, type the contact information for the user. Click OK.

Managing role assignments and properties


The roles that a user is assigned define the users permissions in the console. Roles are product-specific and are created as one or both of the following:

Roles that allow the management of policies and configurations for a product. Users who are members of these roles can change the security configurations of an integrated product and distribute them to specific computers and organizational units.

Roles that allow the viewing of the events that a product generates. Users who are members of these roles can view alerts and events for a product, and create alerts and customized reports.

Note: You must be a member of the Domain Administrator role to make a user a member of a role. Also, the role must exist in the LDAP directory before you can add a user to the role. See Creating a role on page 132.

162

Managing users and user groups About editing user properties

To manage role assignments and properties

1 2 3 4 5

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click Users. In the right pane, right-click the user whose information you want to change, and select Properties. In the User Properties dialog box, on the Roles tab, click Add. In the Find Roles dialog box, from the Look in drop-down list, select the domain in which to find the role. Users can have access to roles in multiple domains.

In the Available roles list, select one or more roles, and click Add. The Find Roles dialog box displays a list of roles only if you are a member of the Domain Administrator role.

7 8

Click OK. To remove a user from a role, click the role name and click Remove. This action does not remove the role from the LDAP directory.

To view or edit the properties of a role, click the role name and click Properties. the role. See Editing role properties on page 135.

10 (Optional) Use the Editing Role Properties dialog box to make changes to

11 Click OK until you return to the System view.

Managing user group assignments


You can modify the composition of a user group by adding users to the group and removing users from the group. You can also view and modify user group properties. You can manage user group assignments in the following ways:

Manage one user's assignment by adding to or removing from one or more user groups. Manage a single user group by adding or removing multiple users at one time.

See About editing user properties on page 159.

Managing users and user groups About editing user properties

163

To manage a single user's user group assignments

1 2 3 4 5 6

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click Users. In the right pane, right-click the user whose user group assignment you want to manage, and select Properties. In the User Properties dialog box, on the User Groups tab, click Add. In the Find User Groups dialog box, from the Look in drop-down list, select the domain in which to find the user group. In the Available user groups list, select one or more user groups, and click Add. The user groups that you selected appear in the Selected user groups list.

7 8

Click OK. To remove a user from a user group, click the user group name and click Remove. This action does not remove the user group from the LDAP directory.

To view or edit the properties of a user group, click the user group name and click Properties. user group. For example, you can add members to the group and remove users from the group.

10 (Optional) Use the User Group Properties dialog box to make changes to the

11 Click OK until you return to the System view.


To manage multiple users' user group assignments

1 2 3 4 5 6

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click User Groups. In the right pane, right-click the user group whose membership you want to manage, and select Properties. In the User Group Properties dialog box, on the Members tab, click Add. In the Find Users dialog box, from the Look in drop-down list, select the domain in which to find the users. In the Available users list, select one or more users, and click Add. The users that you selected appear in the Selected users list.

Click OK.

164

Managing users and user groups About editing user properties

To remove a user from a user group, click the user name and click Remove. This action does not remove the user from the LDAP directory.

To view or edit the user's properties, click the user name and click Properties.

10 (Optional) Use the User Properties dialog box to make changes to the user. 11 Click OK until you return to the System view.

Specifying notification information


When you create custom correlation rules, you can identify users to notify when particular incidents or alerts occur. See Creating custom correlation rules on page 96. For each user, you can specify the email addresses and pager numbers that are used to send these notifications. You can also specify when the user is notified. For example, you can specify one email address to be used Monday through Friday from 8:00 A.M. to 5:00 P.M., and a pager to be used during off-hours. You can specify the following:

Email addresses Pager numbers The day and the time ranges when the contact method can be used to send user notifications of alerts.

Note: The number of email addresses and pager numbers cannot exceed five for a single rule. To specify a users email address

1 2 3 4 5 6

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click Users. In the right pane, right-click the user whose email address you want to change, and select Properties. In the User Properties dialog box, on the Notifications tab, in the drop-down list, click Email. Click Add. In the Email dialog box, in the Email address text box, type an email address.

Managing users and user groups About editing user properties

165

If the user receives email on a device with a small screen, such as a handheld device, check Send shortened email message. This option sends an abbreviated email message that is easier to read.

8 9

Click OK. (Optional) Specify notification times.

10 Do any of the following:


To add additional email addresses, repeat steps 5 through 9. To edit an existing email address, click it and click Properties. To remove an existing email address, click it and click Delete.

11 When you finish, click OK.


To specify a users pager number

1 2 3 4 5 6 7

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click Users. In the right pane, right-click the user whose pager number you want to change, and select Properties. In the User Properties dialog box, on the Notifications tab, in the drop-down list, click Pager. Click Add. In the Pager dialog box, in the Number text box, type a pager number. In the Notification service drop-down list, select the notification service to use. If you do not see the service that you want to select, you can add it using the Paging Services node. This node is located in the left pane of the System view.

8 9

Click OK. (Optional) Specify notification times.

10 Do any of the following:


To add more pager numbers, repeat steps 5 through 8. To edit an existing pager number, click it and click Properties. To remove an existing pager number, click it and click Delete.

11 Click OK.

166

Managing users and user groups About modifying user permissions

To specify notification times

1 2 3 4 5

In the User Properties dialog box, on the Notifications tab, click an email address or pager number. Using the Day controls, check the days when the contact method can be used to contact the user. Using the From and To controls, specify the range of time when the contact method can be used. Repeat these steps to establish notification times for other email addresses and pager numbers. When you finish, click OK.

About modifying user permissions


When you create a role, permissions are assigned for each user with regard to that role. These permissions control whether role members who log on to the console can view, modify, or delete the user. You can modify these permissions in the following ways:

By displaying and editing the roles that contain the permissions. See Modifying access permissions in roles on page 141.

By displaying the Permissions dialog box for the User container object or an individual user. See Modifying permissions from the Permissions dialog box on page 150.

Note: To modify permissions, you must be logged on as a member of the Domain Administrator role.

Modifying a user group


You can modify a user group by adding and removing members, and by changing the user group name and description. You can also modify individual group members' properties. To modify a user group

1 2

In the Information Manager console, click System. On Administration tab, in the left pane, navigate to the relevant domain, and then click User Groups.

Managing users and user groups Deleting a user or a user group

167

3 4 5

In the right pane, right-click the user group to modify, and click Properties. On the General tab, add or change the user group's name and description. On the Members tab, you can do the following:
Add members

Click Add.

In the Find Users dialog box, select one or more users from the Available Users list, and click Add. When you finish adding members, click OK. Remove members Modify a member's properties

Select the member name, and click Remove. Select the member name, and click Properties.

In the User Properties dialog box, use the tabs to modify the properties of individual user group members. When you finish modifying properties, click OK.

Click OK.

See Creating a user group on page 158.

Deleting a user or a user group


You can delete users who are no longer participants in your security network. You can also delete the user groups that are no longer needed. See Creating a new user on page 156. See Creating a user group on page 158. To delete a user or a user group

1 2 3 4

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click Users or User Groups. In the right pane, right-click the user or the user group to delete, and click Delete. In the confirmation dialog box, click Yes.

168

Managing users and user groups About integrating Active Directory with the Information Manager server

About integrating Active Directory with the Information Manager server


The Active Directory Integration feature on the Information Manager Web interface lets you synchronize the Information Manager server with an Active Directory server. This integration enables Active Directory users to access the Information Manager server. You can create and add more than one Active Directory configuration to the Information Manager server. You can set the synchronization schedule for each configuration as required so that the users are periodically refreshed with each synchronization cycle. The synchronized Active Directory users can log on to the Information Manager server through the console as well as the Information Manager Web interface. Members of the External Users role do not have any Information Manager privileges. This role is used only by Active Directory users for Pass-through Authentication. The Active Directory user must be assigned another Information Manager role to log on to the Information Manager server. See Managing Active Directory configurations on page 168.

Managing Active Directory configurations


The Active Directory Integration feature on the Settings view of the Information Manager Web interface lets you create and synchronize Information Manager with Active Directory servers. The view also lets you create, add, edit, or synchronize the Active Directory configurations as required. See About integrating Active Directory with the Information Manager server on page 168. Prerequisites for creating an Active Directory configuration are as follows:

If the Active Directory server and Symantec Security Information Manager are not in the same DNS, you must add the FQDN and the IP address of the Active Directory server to the Information Manager hosts file. The root certificate that is issued by the Certificate authority (CA) must be installed on the domain controller with which Information Manager is to integrate. A third-party CA or the internal CA can issue the root certificate. If the internal CA issues the root certificate, a certificate request should be generated for the AD domain controller. This request must be sent to the CA. Refer to any of the following links to generate the certificate request: http://support.microsoft.com/kb/321051 http://wiki.servicenow.com/index.php?title=Configuring_Microsoft_Active_Directory_for_SSL_Access

Managing users and user groups Managing Active Directory configurations

169

The CA root certificate of the Active Directory that you want to synchronize must be added on the Information Manager server. Note: This step is required only if you are using the root certificate issued by an internal or an unknown CA. For more details on obtaining an Active Directory root certificate, refer to the Microsoft Web site.

To create a new Active Directory configuration

1 2 3

In the Information Manager Web interface, click Settings > Active Directory. On the details pane, click Create Configuration. Fill in the required details of the host name, IP address, user name, and password. If possible, keep the port number as 636 ( the LDAP service runs on Port 636 by default).

In a scenario in which the Active Directory domain name and Information Manager domain name are identical, check the box for Active Directory overrides SSIM. This setting gives the Active Directory user a preference over the Information Manager user when the user logs on to the Information Manager server. Enter the users and groups that you want to synchronize or exclude in the respective boxes. The default Active Directory group domain users cannot be added to the Information Manager because it is a special group that does not have member attributes for the users.

6 7 8 9

Enter the password. The user name appears by default and cannot be modified. Check the Disable Scheduling box if you want to disable the synchronization. Enter the synchronization schedule in minutes, hours, or days as required. Click Save to apply. Configurations are saved and listed by the domain name. You can edit or delete the configurations that are listed. The ibmldap service of the Information Manager server restarts when you save the Active Directory configuration.

170

Managing users and user groups Changing the password for Linux accounts

Note: The External Users Role on Information Manager grants access permission to Active Directory domain users. Therefore, this role must not be removed for Active Directory users. Members of the External Users Role do not have any Information Manager privileges. Therefore, the Active Directory user must be assigned another Information Manager role to log on to the Information Manager server. To edit an Active Directory configurationx

1 2 3 4 5 6

In the Information Manager Web interface, click Settings > Active Directory. On the details pane, click List Configurations. Select the configuration that you want to work with. Click the Edit icon. Change the details in appropriate fields as required. Click Save.

To remove an Active Directory configuration

1 2 3 4 5

In the Information Manager Web interface , click Settings > Active Directory. On the details pane, click List Configurations. Select the configuration that you want to remove. Click the Remove icon. Enter the cn=root password in the Remove Active Directory Configurations dialog box, and click Ok.

To synchronize an Active Directory configuration

1 2 3 4 5

On the Information Manager Web interface, click Settings > Active Directory. On the details pane, click List Configurations. Select the configuration with which you want to synchronize Information Manager. Click the Synchronize Now icon. Click View Synchronization Log to see the results.

Changing the password for Linux accounts


You can use the Information Manager Web interface to change the password that is used for Linux administrative accounts of root and simuser. Console

Managing users and user groups Changing the password for Linux accounts

171

administrator accounts and other Information Manager accounts are changed in the Information Manager console. The current password for Linux accounts is the same password that is given during the Information Manager installation. To change system settings such as account passwords, do not a run the scripts that are included on the Information Manager server maually. You should use the Information Manager Web interface to accomplish system level tasks. Note: If you need to perform an operation on an Information Manager server that is not available through the Information Manager Web interface or the Information Manager console, contact technical support. To change the password for Linux accounts

1 2 3 4 5 6

On the Information Manager Web interface, click System > Password. On the left pane, click Change Password. In the details pane of the Change Password view, type the name of a user account on the Information Manager server in the box provided. Type the current password for the account in the box provided. Type the new password and then confirm the new password in the boxes that are provided. Click Change Password.

Note: The password for the symcmgmt Linux account cannot be changed from the Information Manager Web interface. You can change the symcmgmt password by using the standard Linux commands. Later, the symcmgmt password must be updated from the Information Manager console. See Changing the password for symcmgmt Linux account on page 171.

Changing the password for symcmgmt Linux account


The symcmgmt account is a Linux account, but must also have its password changed in the Information Manager client. You can change the symcmgmt password by using the standard Linux commands. Later, the symcmgmt password must be updated from the Information Manager console under Manage > System > Administration > Data Stores.

172

Managing users and user groups Changing the password for Linux accounts

To change the symcmgmt account in Linux

1 2 3 4

Log on to Information Manager server as root or connect using db2admin credentials and then obtain the root environment. Run the command passwd symcmgmt. Enter the new password when prompted. Confirm the new password.

To update the symcmgmt account password in the Information Manager Client

1 2 3 4 5

From the Information Manager client, log on to the Directory server using the Administrator privileges. Go to System > Administration and navigate to DataStores. In the right pane, right-click the datastore for the appropriate Information Manager server and then click Properties. Go to the Connection tab and type the new password in the Password text box. Confirm the new password in the Confirm password text box.

See Changing the password for Linux accounts on page 170.

Chapter

Managing organizational units and computers


This chapter includes the following topics:

About organizational units About managing organizational units About managing computers within organizational units

About organizational units


Organizational units are a useful way to structure your security environment in Symantec Security Information Manager. Before you create organizational units, it is important that you understand your security network and create a security plan. See About managing organizational units on page 173. Organizational units let you group the computers and servers that you manage. You can then add configurations for the Information Manager components that may be installed on those computers. These capabilities enable the distribution of the configurations to all computers and servers in the organizational unit.

About managing organizational units


In the Information Manager console, click System. On the Administration tab of the System view, select Organizational Units to perform the following tasks:

Create a new organizational unit. See Creating a new organizational unit on page 174.

174

Managing organizational units and computers About managing organizational units

Edit organizational properties. See Editing organizational unit properties on page 176. Delete an organizational unit. See Deleting an organizational unit on page 177.

Creating a new organizational unit


Organizational units are logical groupings. You can create them to organize the computers that are in the same physical location or belong to structural groups within your corporation: for example, divisions or task groups. However, it is not required that an organizational unit reflect these relationships. See About organizational units on page 173. You can create all the organizational units that you require at a single level, or you can create a hierarchy of nested organizational units. The combined maximum length of the distinguished name of an organizational unit must be no longer than 170 bytes. Keep in mind that some characters, such as accented characters or Japanese characters, take more space to store. The distinguished name of an organizational unit is a concatenation of the names that precede it in the hierarchy. Therefore, nesting organizational units with long names can exceed this limit. A screen message informs you if you exceed the limit. To create a new organizational unit

1 2 3

In the Information Manager Web interface, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and click Organizational Units. Take one of the following actions:

To create a new organizational unit at the top level of the tree, click + (the plus icon) on the toolbar. Go to step 5. To create a new organizational unit within an existing organizational unit, expand the organizational unit tree and select the level that you want. Then click + (the plus icon) on the toolbar. Go to step 4.

4 5 6

In the Computer or Organizational Unit dialog box, click Organizational Unit, and click OK. In the first panel of the Create a new Organizational Unit wizard, click Next. In the General panel, do the following:

In the Organizational Unit Name text box, type a name for the organizational unit.

Managing organizational units and computers About managing organizational units

175

(Optional) In the Description text box, type a description of the organizational unit.

7 8 9

Click Next. In the Organizational Unit Summary panel, review the information that you have specified, and click Finish. Click Close.

About determining the length of the organizational unit name


Information Manager imposes limits on the length of the name of an organizational unit. It also imposes limits on the total length of the distinguished name that is stored in the LDAP directory. These limits become important when you nest organizational units. See About organizational units on page 173. The distinguished name for a nested organizational unit includes the following:

The name you give the organizational unit when you create it The names of each organizational unit that precedes it in the hierarchy The name of the top node in the organizational unit tree The name of the domain within which you create the organizational unit hierarchy Additional bytes of overhead

You can view the distinguished name of an organizational unit by looking at the organizational units properties. The maximum length of the name you assign in the Create a new Organizational Unit wizard is 64 UTF-8 bytes. For the Roman character set, this means that the name cannot exceed 64 characters. Some characters take more space to store. For example, accented characters take two bytes to store, and Japanese characters take three bytes or four bytes to store. When these characters are used, fewer characters are allowed in the name. Information Manager adds other information for internal use to the distinguished name. Therefore, the maximum recommended length of the distinguished name of an organizational unit in the security directory is 170 bytes. If a distinguished name is longer than 256 characters, performance issues occur. Table 9-1 describes how to calculate the UTF-8 byte length of the distinguished name of the organizational unit.

176

Managing organizational units and computers About managing organizational units

Table 9-1 Name string

Determining the organizational unit name length Formula and example


sum(4+domain component name length) + 17 bytes Example: usa.SES 4 + length(usa) + 4 +length(SES) + 17 bytes overhead or 4 + 3 + 4 + 3 + 17 = 31 bytes

Domain name length

Organizational unit (OU) name length

sum(4 + OU name length) + domain name length + 13 bytes For example: Paris OU under the Sales OU in the usa.ses domain 4 + length(Paris) + domain name length + 13-bytes overhead or 4 + 5 + 31 + 13 = 53 bytes

Editing organizational unit properties


You can modify an existing organizational unit's description. You cannot change the name or the distinguished name of the organizational unit. See About organizational units on page 173. To edit organizational unit properties

1 2 3 4 5

In the Information Manager Web interface, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and expand the Organizational Units navigation tree. Right-click the name of the organizational unit to edit, and click Properties. In the Organizational Unit Properties dialog box, change the description. When you finish, click OK.

About modifying organizational unit permissions


When you create a role, permissions are assigned for each organizational unit with regard to that role. These permissions control whether role members who log on to the Information Manager can view, modify, or delete the organizational unit. You can modify these permissions in the following ways:

By displaying and editing the roles that contain the permissions.

Managing organizational units and computers About managing computers within organizational units

177

See Modifying access permissions in roles on page 141.

By displaying the Permissions dialog box for the organizational unit container object or an individual organizational unit. See Modifying permissions from the Permissions dialog box on page 150.

Note: To modify permissions, you must be logged on as a member of the SES Administrator role or the Domain Administrator role.

Deleting an organizational unit


Before you can delete an organizational unit, you must move or delete all computers that belong to the organizational unit. See Moving a computer to a different organizational unit on page 193. See Deleting a computer from an organizational unit on page 194. Note: When you delete an organizational unit, all of the organizational units that are below it in the navigational structure are also deleted. To delete an organizational unit

1 2 3 4

In the Information Manager Web interface, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and expand the Organizational Units navigation tree. Right-click the name of the organizational unit to delete, and click Delete. To confirm to delete the organizational unit and its subgroups, click Yes.

About managing computers within organizational units


Organizational units contain computer objects representing the computers that run your security products. Note: The term computer covers a variety of equipment, from traditional desktop computers to servers and handheld devices. In the context of the Information Manager, a computer is any device that you manage as part of your enterprise security environment.

178

Managing organizational units and computers About managing computers within organizational units

Computers are placed in organizational units in the following ways:

When an agent is installed. When you install Symantec Event Agent on a computer, it is represented as a computer within an organizational unit. Symantec Event Agent is added to the default organizational unit. You can move the agent to a different organizational unit later.

When you create the computer using the Create a new Computer wizard. You can use this method to create computers other than the agent computers.

Note: Do not create a computer using the wizard if you plan to install the Symantec Event Agent on the computer at a later time. If you do, a duplicate instance of the computer is added to the LDAP directory. A computer can belong to only one organizational unit at a time. However, based on the requirements of your network, you can easily move computers from one organizational unit to another. When you select a computer in the right pane, you can perform the following tasks:

Create computers within organizational units. Creating computers within organizational units Edit computer properties. About editing computer properties Move a computer to a different organizational unit. Moving a computer to a different organizational unit Modify computer permissions. About modifying computer permissions Delete a computer from an organizational unit. Deleting a computer from an organizational unit

Creating computers within organizational units


Computers are defined in the LDAP directory as part of the organizational units in which you create them. If you delete a computer from an organizational unit, it is permanently removed from the LDAP directory. See About managing computers within organizational units on page 177.

Managing organizational units and computers About managing computers within organizational units

179

To create a computer within an organizational unit

1 2 3 4 5

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and expand the Organizational Units navigation tree. Right-click the name of the organization unit, and click New > Computer. In the first panel of the Create a new Computer wizard, click Next. In the General panel, do the following, and click Next:

In the Computer name text box, type the computer name. (Optional) In the Description text box, type a description.

In the Information panel, do one of the following:


Type information in some or all of the optional text boxes, and click Next. Supply the information later by editing the computers properties.

In the Identification panel, do one of the following:

Provide the host name, IP addresses, and MAC addresses of the computer, and click Next. You can provide the IPv4 address or the IPv6 address whichever is applicable. Provide the identification information later by editing the computers properties.

In the Configurations panel, do one of the following:

To directly associate configurations with the computer, click Add. When you are finished, click Next. Add configurations later by editing the computers properties.

In the Computer summary panel, review the information that you have specified, and click Finish.

10 Click Close.

About editing computer properties


The computer properties that you can view and change depend on whether Symantec Event Agent is installed on the computer. If the computer has Symantec Event Agent, you can associate configurations with the computer and view the services running on the computer. However, you cannot change the identification information for the computer.

180

Managing organizational units and computers About managing computers within organizational units

See Editing the agent computer on page 180. See Viewing the services running on a computer on page 188. If the computer does not have an agent, you can edit the network identification information for the computer. However, you cannot view services running on the computer. See Editing a computer that does not have an agent on page 181. See Providing identification information for a computer on page 182.

Editing the agent computer


When a computer has an agent installed, most of the identification information about the computer is captured during the installation. You can learn about the computer by viewing the information that the agent provides. This information includes the state of the services running on the computer and the computers heartbeat status. You can also specify configurations to be associated with the computer. If the computer is an Information Manager server, you can add access to other domains. To edit the agent computer

1 2 3 4 5 6

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and expand the Organizational Units navigation tree. Click the name of the organizational unit that contains the computer to be edited. In the right pane, right-click the name of the computer, and click Properties. In the Computer Properties dialog box, on the General tab, you can type a new description. On the Information tab, you can modify the Primary Owner and Owner contact information text boxes. The remaining information is provided during the agent installation.

On the Configurations tab, do any of the following:

To directly associate configurations with the computer, click Add. See Associating configurations directly with a computer on page 183.

To remove a configuration, select it, and click Remove. To view a configurations properties, select it, and click Properties.

You can view information on any of the following tabs:

Managing organizational units and computers About managing computers within organizational units

181

On the Identification tab, view the host name, IP addresses, and MAC addresses of the computer. On the Services tab, view information about the services running on the computer. See Viewing the services running on a computer on page 188.

Click OK.

Editing a computer that does not have an agent


When you create a computer using the Create a New Computer wizard, you can modify most of the computers properties. Services are reported only if an agent is installed on the computer. To edit a computer that does not have an agent

1 2 3 4 5 6

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and expand the Organizational Units navigation tree. Click the name of the organizational unit that contains the computer to be edited. In the right pane, right-click the name of the computer, and click Properties. In the Computer Properties dialog box, on the General tab, you can type a new description. On the Information tab, modify the text boxes as you want. To enable the Other OS Type text box, select OTHER from the operating system type drop-down list.

On the Identification tab, change the host name and add or remove IP addresses and MAC addresses, as needed. See Providing identification information for a computer on page 182.

On the Configurations tab, do any of the following:

To directly associate configurations with the computer, click Add. See Associating configurations directly with a computer on page 183.

To remove a configuration, select it, and click Remove. To view a configurations properties, select it, and click Properties.

182

Managing organizational units and computers About managing computers within organizational units

On the Services tab, view information about the services running on the computer. See Viewing the services running on a computer on page 188.

10 Click OK.

Providing identification information for a computer


After you create a computer using the Create a new Computer wizard, you can provide the network identification information for the computer by editing its properties. When you create a computer by installing a collector, the identification information is supplied automatically by the installation. See About editing computer properties on page 179. To provide identification information for a computer

1 2 3 4 5 6 7 8 9

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and expand the Organizational Units navigation tree. Click the name of the organizational unit that contains the computer to be edited. In the right pane, right-click the name of the computer, and click Properties. In the Computer Properties dialog box, on the Identification tab, in the Host name text box, type an FQDN or a DNS host name. To add an IP address, under IP addresses, click Add. In the IP addresses dialog box, type the IP address of the computer, and click OK. If the computer has multiple network interface cards, repeat steps 6 and 7 for each IP address. To add a MAC address, under MAC addresses, click Add. and click OK. The MAC address must consist of six hexadecimal pairs.

10 In the MAC addresses dialog box, type the MAC address of the computer,

11 If the computer has multiple network interface cards, repeat steps 9 and 10
for each MAC address.

12 Click OK.

Managing organizational units and computers About managing computers within organizational units

183

Associating configurations directly with a computer


Configurations control the behavior of Information Manager components. To distribute configurations to a computer, you can associate a configuration with the computer. You can then distribute the configuration either immediately or at a later date, depending on your needs. See About editing computer properties on page 179. Associating configurations directly with a computer defines each of the available configurations that can be associated directly with a computer. Note: Only those configurations that are shipped with the default installation of Information Manager are listed here. If additional collectors or products are added to your Information Manager, the configurations list may be different. Configuration
Symantec Event Agent and Manager Manager Configurations

Description
Contains the common Information Manager server settings, which may affect one or more components on an Information Manager server. For example, configuration settings define which directory service and database the server should use. Contains the settings for services within the Information Manager server, such as the event logging subsystem or the configuration service. Lets you control how failover is performed from the Information Manager server to directory service and Information Manager server to database.

Symantec Event Agent and Manager Manager Component Configurations

Symantec Event Agent and Manager Manager Connection Configurations

Symantec Event Agent and Manager Agent Sets the agent to Information Manager Connection Configurations server failover. Failover is the ability of Information Manager components to automatically switch to designated secondary resources if the primary resource fails or terminates abnormally.

184

Managing organizational units and computers About managing computers within organizational units

Configuration

Description

Symantec Event Agent and Manager Agent Lets the agent communicate with the Configurations corresponding Information Manager server. They include which primary and secondary server to connect to and how to get configuration information and report inventory. In addition, they include how these computers should receive LiveUpdate information. LiveUpdate 1.0 LiveUpdate Configures LiveUpdate to obtain software updates for the various software components of Information Manager, such as event collectors, relays, security content, rules, and filters. Configures Java LiveUpdate to obtain software updates for the various software components of Information Manager, such as event collectors, relays, security content, rules, and filters.

LiveUpdate 1.0 Java LiveUpdate

Symantec Critical System Protection Event Configures Symantec Critical System Collector Protection Event Collector to collect DB sensor data from various platforms. Arcsight CEF Event Collector Configures ArcSight Common Event Format Event Collector to collect Syslog sensor data from various platforms. Configures the Internet Security Systems RealSecure SiteProtector Event Collector to collect DB sensor data from various platforms. Configures Cisco ASA Event Collector to collect Syslog sensor data from various platforms. Configures Cisco Internetwork Operating System Event Collector to collect Syslog sensor data from various platforms. Configures Check Point Log Export API Event Collector to collect OpsecLea sensor data from various platforms.

ISS SiteProtector Event Collector

Cisco ASA Event Collector

Cisco(R) IOS Event Collector

Check Point(R) LEA Event Collector

Managing organizational units and computers About managing computers within organizational units

185

Configuration
Generic Syslog Event Collector

Description
Configures Generic Syslog Event Collector to collect Syslog sensor from various platforms. Configures Juniper Networks NetScreen Security Manager Event Collector to collect Syslog sensor data from various platforms. Configures Juniper NetScreen Event Collector to collect Syslog sensor data from various platforms. Configures Snare for Windows Event Collector to collect Syslog sensor data from various platforms. Configures Snort Event Collector to collect SyslogFile sensor data from various platforms. Configures Sourcefire eStreamer Event Collector to collect Sourcefire eStreamer sensor data from various platforms. Configures Symantec Control Compliance Suite 10 Database Event Collector to collect DB sensor data from various platforms.

Juniper NSM Event Collector

Juniper Netscreen Firewall Event Collector

Snare for Windows Event Collector

Snort Syslog Event Collector

Sourcefire eStreamer Event Collector

Symantec Control Compliance Suite 10 Database Event Collector

Symantec Critical System Protection Event Configures Symantec Critical System Collector Protection Event Collector to collect DB sensor data from various platforms. Symantec Endpoint Protection Event Collector Configures Symantec Endpoint Protection Event Collector to collect DB sensor data from various platforms. Configures Endpoint Protection State Event Collector to collect DB sensor data from various platforms. Configures Symantec Messaging Gateway Event Collector to collect SMS sensor data from various platforms. Configures the Universal Logfile Event Collector to collect events from the products that log to text files.

Symantec Endpoint Protection State Event Collector

Symantec Messaging Gateway Event Collector

Universal Logfile Event Collector

186

Managing organizational units and computers About managing computers within organizational units

Configuration
UNIX(R) OS Logfile Event Collector

Description
Configures UNIX OS Logfile Event Collector to collect Logfile sensor data from UNIX platforms. Configures UNIX OS Event Collector to collect syslog data from various platforms. In addition, the UNIX Event Collector collects data from ISC BIND9, Linux iptables, and the Linux Audit daemon AUDITD.

UNIX OS Event Collector

Universal WS Management Event Collector Configures Universal WS Management Event Collector to collect WS Management sensor data from Windows platforms. Universal Syslog Event Collector Configures the Universal Syslog Event Collector to collect events from the products that log events by using the Syslog protocol. Configures Universal Event Collector for Microsoft Windows to collect events from Microsoft Windows event logs. Configures VMware vSphere Event Collector to collect VMware vSphere sensor data from VMware platform. Configures WS Management Event Collector to collect WS Management sensor data from Windows platforms.

Universal Event Collector for Microsoft Windows

VMware vSphere Event Collector

WS Management Event Collector

For more details about the Collectors you must refer to the specific Collector guides. To associate configurations directly with the computer

1 2 3 4 5

In the Information Manager Web interface, click Mange > System. On the Administration tab, in the left pane, navigate to the relevant domain, and expand the Organizational Units navigation tree. Click the name of the organizational unit that contains the computer that you want to edit. In the right pane, right-click the name of the computer, and click Properties. In the Computer Properties dialog box, on the Configurations tab, click Add.

Managing organizational units and computers About managing computers within organizational units

187

In the Find Configurations dialog box, in the Look-in drop-down list, select the product whose configurations you want to associate with the computer. The configurations are displayed in the Available configurations list. See Associating configurations directly with a computer on page 183.

In the Available configurations list, select a configuration, and click Add. The selected configuration is listed in the Selected configuration list. If the computer already contains a configuration, and you now select a different configuration, the new configuration replaces the old one.

8 9

To select a configuration for a different product, repeat steps 6 and 7. When you finish adding configurations, click OK.

10 In the Computer Properties dialog box, do one of the following:


To remove a configuration, select it, and click Remove. To view a configurations properties, select it, and click Properties.

11 Click OK.

Making a computer a member of a configuration group


In addition to belonging to an organizational unit, a computer can be a member of a configuration group. Configuration groups are used to distribute special configurations to their member computers. A computer can belong only to one configuration group. To make a computer a member of a configuration group

1 2

In the Information Manager console, click System. iOn the Administrator tab, expand the Organizational Units navigational tree until you can select the organizational unit containing the computer that you want to edit. In the right pane, select the computer. On the Selection menu, click Properties. In the Computer Properties dialog box, on the Configuration Groups tab, click Add. In the Available Configuration Groups list, select a configuration group. If the computer is already a member of a configuration group, the configuration group you select here replaces the original configuration group.

3 4 5 6

Click Add.

188

Managing organizational units and computers About managing computers within organizational units

8 9

Click OK. On the Configuration Groups tab, do any of the following, as needed:

To remove a computer from configuration group membership, select the configuration group, and click Remove. To view a configuration groups properties, select it, and click Properties.

10 Click OK.

Viewing the services running on a computer


You can view information about the services running on a computer: for example, which configurations are in use and whether the configurations are up-to-date. See About editing computer properties on page 179. To view the services running on a computer

1 2 3 4 5

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and expand the Organizational Units navigation tree. In the left pane, select the organizational unit that contains the computer whose services you want to view. In the right pane, right-click the computer name, and click Properties. In the Computer Properties dialog box, on the Services tab, review the In Sync column to determine whether the correct configurations are in use.

If the value for a specific service is Yes, the current configuration and the expected configuration are synchronized. That is, they are identical. If the value for a specific service is No, the configurations are not synchronized. Double-click the row to view the information on the Configuration tab of the Service Properties dialog box. You may need to distribute the latest configurations to this computer.

Take any of the following actions:

In the Computer Properties dialog box, to notify the computer that it should download new configurations, click Distribute. Then click Yes to confirm your intention to distribute configurations. To refresh the Computer Properties dialog box display, click Refresh.

Managing organizational units and computers About managing computers within organizational units

189

Click Details to open the Service Properties dialog box and view the details of services.

When you finish, click OK.

About the Visualizer


The Visualizer provides a convenient way to view your Symantec Security Information Manager environment, including the computers that are assigned to organizational units. You can use it to monitor events per second (EPS) rates and CPU usage on your network devices. You can also view and modify properties of elements such as the Information Manager server and agents. See About using the Visualizer on page 189. See Viewing and modifying element properties on page 191.

About using the Visualizer


The Visualizer provides a graphical view of your Information Manager environment. When you click the Visualizer tab on the System view, you see a set of icons. The icons represent such elements as correlation servers, collection servers, agents, and directories. The Icons tab in the Legend pane illustrates and defines each type of icon that can appear in the diagram. See About the Visualizer on page 189. The Overview pane that is located on the top left corner provides a visual summary of the layout in which the various components are arranged in your Information Manager environment. You can click a specific item in the overview and easily reach the selected item in the graphical view. Colored lines join elements to indicate the nature of their interactions. For example, a green line appears between an Information Manager server and its event archive. A blue line indicates that event forwarding is configured between a collection server and the correlation server. The arrow shows the direction in which the event data flows. To see an explanation of each color, click the Edges tab in the Legend pane. You can place the icons where you want them by dragging them with the mouse. The associated text moves with the icon. You can also move the text to a different position relative to its icon. Click and hold the mouse over the text, and then move the mouse. Empty text boxes appear on each side of the icon. Drag the text into one of the boxes and release the mouse. The toolbar includes tools to help you examine the graphic.

190

Managing organizational units and computers About managing computers within organizational units

The colored dots that appear next to an element indicate the activity level of these elements. Some dots reflect the volume of EPS, and other dots reflect the percentage of appliance CPU in use. The meaning of each color is as follows:
EPS

Green = less than or equal to 2.5 K Yellow = 2.5 K to 5 K Red = greater than 5 K Green = less than 60% Yellow = 60% to 80% Red = greater than 80%

CPU usage

Note: The EPS display on the Visualizer tab depends on the value of the Agent Queue Statistics Report Interval setting under System > Product Configuration > SSIM Agent and Manager > Agent Configurations > Logging. By default, this value is set to 300 seconds and the EPS is updated after that interval only. You can configure it to a lower interval. However, setting a lower value may result in a lower performance by the agent. You must update (push) the configuration to the agent for the change to take effect. Table 9-2 describes the tools in the toolbar. Table 9-2 Tool
Layout menu

Visualizer tools Purpose


This option lets you view your network topology using the following layouts:

Organic Circular Hierarchic Orthogonal Tree

Refresh

This option lets you update the display after you make configuration changes. For example, after you add a collector, click Refresh to re-draw the diagram and show a new icon for the added collector. This option lets you expand the diagram view. This option lets you minimize the diagram view.

Zoom in Zoom out

Managing organizational units and computers About managing computers within organizational units

191

Table 9-2 Tool


Zoom selected

Visualizer tools (continued) Purpose


This option lets you enlarge the view of a selected portion in the diagram. Select a portion of the diagram by clicking the mouse and dragging a box around the required area. Then click the Zoom Selected icon to enlarge the area that you selected. This option returns the diagram to its original size, to fit the entire diagram in the right pane of the System view. This option lets you save the information in the diagram as an XML file. Symantec Technical Support may request this file to assist in troubleshooting. This option lets you export the Visualizer image as a .gif or .jpg file. You can also adjust the image width and height, and define the clip area as a view or a graph. This option lets you print the diagram. On the Print Options dialog box, you can select the height (Poster Rows) and width (Poster Columns) if you print a very large diagram. The default setting (one poster row and one poster column) prints the entire diagram on a single page. This option displays a table with one row for each element that is involved in processing events. The table dynamically displays such information as EPS and the total number of events that the element has processed since it was last started. The details that are displayed in the table view can be saved into CSV format. A green check mark means that the element is running; a red X means that the element is not responding.

Fit to window

Save as

Export Image

Print

Table view

Use Magnifier

This option lets you magnify any selected portion of the diagram.

Viewing and modifying element properties


You can view the properties of many of the elements in the Visualizer diagram. You can also modify some of these properties. See About using the Visualizer on page 189. The same properties are also accessible through other tabs on the System view. You use these tabs to add and delete elements, such as collectors. After you add an element, you distribute it; the element appears in the Visualizer. Table 9-3 explains how to access each of the element categories on other System view tabs.

192

Managing organizational units and computers About managing computers within organizational units

Table 9-3 Category


Computers

Accessing element properties on System view tabs How to access


This category includes appliances, agents, and collectors.

Select Administration > Organizational Units. Select an organizational unit. In the list in the right pane, double-click the name of a computer. A dialog box displays the computer's properties. Select Administration > Directories. In the list in the right pane, double-click the name of a directory. A dialog box displays the directory's properties.

Directories

Products

This category includes products such as collectors and firewalls.


Select Product Configurations. In the left pane, click the name of a product. The right pane displays the product's properties.

To view and modify element properties

1 2

On the System view of the Information Manager console, click the Visualizer tab. Right-click on an icon in the diagram, and then click Properties. A dialog box displays a set of tabs that let you access the element's properties. The displayed properties depend on the type of element that you selected. For example, a collection appliance has different properties than an agent.

3 4

View and modify any of the available properties in the dialog box, using the tabs to navigate through the properties. When you finish viewing and modifying properties, click OK.

Distributing configurations to computers in an organizational unit


Information Manager includes a Distribute option, which sends a message to all the computers in an organizational unit to check for new configurations. When a computer receives this message, it contacts Information Manager to request a download of the configurations. See About managing computers within organizational units on page 177. Using the Distribute feature is optional. When you change a product configuration or move a computer to a different organizational unit, the change is distributed when you click Save.

Managing organizational units and computers About managing computers within organizational units

193

You can do the following to distribute configurations to computers in an organizational unit:

You can distribute the configurations that are associated with an organizational unit to all computers that belong to the organizational unit. You can select specific computers to receive the latest configurations.

Note: The timing of configuration distribution varies depending on the amount of Information Manager traffic. To distribute configurations to all computers in an organizational unit

1 2 3 4

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and then expand the Organizational Units navigation tree. Right-click the name of the organizational unit to which you want to distribute configurations, and then click Distribute. In the confirmation message box, click Yes.

To distribute configurations to selected computers in an organizational unit

1 2 3 4 5 6

In the Information Manager Web interface, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and then expand the Organizational Units navigation tree. In the left pane, select the organizational unit that contains the computer or computers to which you want to distribute configurations. In the right pane, select only those computers that you want to notify. Right-click on the selected computers, and then click Distribute. To confirm your intention to distribute configurations, click Yes.

Moving a computer to a different organizational unit


Although a computer can only belong to one organizational unit, you can move computers from one organizational unit to another. See About organizational units on page 173. Warning: Before you move a computer, make sure that the security products you manage let you move computers.

194

Managing organizational units and computers About managing computers within organizational units

To move a computer to a different organizational unit

1 2 3 4

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and then expand the Organizational Units navigation tree. In the left pane, select the organizational unit that contains the computer or computers that you want to move. In the right pane, right-click a computer, and then click Move. You may select multiple computers if you want to move all of them to the same organizational unit.

5 6 7

To confirm that you want to move the computers, click Yes. In the Find Organizational Units dialog box, select the organizational unit to which you want to move the computers, and then click OK. To verify that the move was successful, in the left pane, select the organizational unit to which you moved the computers. Look at the right pane to see if the computers that you moved are now in the list. If you move a computer that is an Information Manager server, you may have to log on again before you see the computer in the organizational unit. Agents that connect to the Information Manager server may need to be restarted.

About modifying computer permissions


When you create a role, permissions are assigned for each computer with regard to that role. These permissions control whether role members who log on to the Information Manager console can view, modify, or move the computer. To modify the permissions for a computer, you must display the Permissions dialog box for the computer. You cannot modify permissions for computers using the Role Properties dialog box. See Modifying permissions from the Permissions dialog box on page 150. Note: To modify permissions, you must be logged on as a member of the Domain Administrator role.

Deleting a computer from an organizational unit


If you want to delete an organizational unit, you must first remove any computers within the organizational unit by moving them or deleting them. You may also want to delete a computer that you no longer want to have under Information Manager management.

Managing organizational units and computers About managing computers within organizational units

195

If the computer was created by installing an agent as part of a security product installation, you should uninstall the collectors and agent from the computer before you delete the computer from the Organizational Units container in the Information Manager console. See Creating computers within organizational units on page 178. Deleting a computer from an organizational unit removes it from the LDAP directory. Warning: If you delete a computer that is an Information Manager server, you must perform extra steps to add it to an organizational unit again. To restore a deleted Information Manager server to the LDAP directory, you must do one of the following: re-register the deleted server with the LDAP directory in which it was previously registered, or reinstall the Information Manager on the server. To delete a computer from an organizational unit

1 2 3 4 5

In the Information Manager console, click System. On the Administration tab, in the left pane, navigate to the relevant domain, and then expand the Organizational Units navigation tree. In the left pane, select the organizational unit that contains the computer that you want to delete. In the right pane, right-click the computer name, and then click Delete. To confirm your intention to delete the computer from the organizational unit, click Yes.

196

Managing organizational units and computers About managing computers within organizational units

Section

Understanding event collectors

Chapter 10. Introducing event collectors Chapter 11. Configuring collectors for event filtering and aggregation

198

Chapter

10

Introducing event collectors


This chapter includes the following topics:

About Event Collectors and Information Manager Collectors About Symantec Universal Collectors About Custom Log Management Downloading and installing the Symantec Universal Collectors Correlating the logs collected in a file from a proprietary application

About Event Collectors and Information Manager


Security products and operating systems generate many kinds of events. Some events are informational, such as a user logging on, and others may indicate a security threat, such as antivirus software being disabled. Symantec Event Collectors gather, filter, and aggregate these events and forward both the raw and the processed events to Information Manager.After you install an event collector, you must first register it and then configure it before you can use it. Event Collectors collect information from security devices, critical applications, and services, such as the following product types:

Firewalls Routers, switches, and VPNs Enterprise Antivirus Intrusion detection and intrusion prevention

200

Introducing event collectors Collectors

Vulnerability scanners Authentication servers Windows and UNIX system logs

Information Manager stores the event data in event archives and correlates the events with threat and asset information. If a security event triggers a correlation rule, Information Manager creates a security incident. Information Manager provides real-time event correlation and data archiving to protect against security threats and to preserve critical security data. For more details on event collectors, refer to Symantec Event Collectors Integration Guide.

Collectors
Event collectors gather, filter, and aggregate security events and forward both the raw and the processed events to Information Manager. See About Event Collectors and Information Manager on page 199. Table 10-1 Component
Information Manager

Roles played by different components Description


Refers to the Symantec Security Information Manager where events are processed, filtered, and stored. Allows for the centralized collection, classification, and normalization of events to enable alerts and reports across managed security products. Refers to the Agent that sends the data that is collected by the Symantec Event Collector to the Information Manager server. Refers to an application that collects events from security products, processes them, and passes them to the Agent. Refers to the component that reads events from a file, database, syslog, Windows event log, or other medium. The sensor then passes the events to the remaining collector components. The information is then delivered to the Agent to be sent to Information Manager.

Symantec Event Agent

Collector

Sensor

Introducing event collectors About Symantec Universal Collectors

201

Table 10-1 Component

Roles played by different components (continued) Description


Refers to the software product, such as a firewall, antivirus software, or an operating system. The security product ensures that data is not vulnerable to unauthorized use or access and is the source of events to the collector.

Security or Point product

See About Event Collectors and Information Manager on page 199.

About Symantec Universal Collectors


Symantec provides universal collectors. These universal collectors gather, filter, and aggregate events from security devices, critical applications, and services. The collectors then forward both the raw and the processed events to Information Manager. Universal collectors are used in scenarios where standard options are not available. You can use the Custom Logs view on the Web configuration interface to map the log information to the fields that the Information Manager supports. Universal collectors are installed on an Information Manager by default. To install the universal collectors on an off-box system, you can download the following universal collectors from the Downloads option on the Home view of the Web configuration interface:

Universal Collector for Windows Universal Collector for Windows Vista Universal Collector for Syslog Universal Collector for Log file

See Downloading and installing the Symantec Universal Collectors on page 203.

About Custom Log Management


Information Manager uses the event collectors that can be installed on the Information Manager server or on a computer that runs Symantec Event Agent. The collectors translate the collected data before it is handed over to the event service for archival and correlation service for correlation. Information Manager provides collectors for over 250 products. If a collector does not exist for an application in an environment, it is not possible to collect and normalize the data for the application.

202

Introducing event collectors About Custom Log Management

The custom log management feature lets you collect logs from an application from which Information Manager does not support collection. You can analyze the received log data and adjust the fields where necessary to prepare the data for interpretation by Information Manager. To collect the logs, you can download and install the universal collectors that are available on the Web configuration interface. You can install universal collectors on the computers on which Symantec Event Agent is installed. Custom log management works with the following components:
Universal log collector Transports the log data that is collected from a point product or application to Information Manager. The universal log collectors can be installed on the Information Manager server on other computers that have Symantec Event Agent installed on them. See Downloading and installing the Symantec Universal Collectors on page 203. You can download the following universal collectors from the Home > Download view of the Web configuration interface of Information Manager. Universal Collector for Log File Collects the events that are from different log files. Universal Collector for Windows Collects the events that are from Windows logs. Universal Collector for Syslog Collects the events that are from syslog. Universal Collector for Windows Vista Collects the events that are from Windows Vista

Note: The universal collectors are preinstalled on the


Information Manager server. The Universal Collector for Windows is not installed on the Information Manager server because it cannot run on Linux.

Introducing event collectors Downloading and installing the Symantec Universal Collectors

203

Collector mapping tool

Maps the log data that the universal collectors collect to the event fields that are defined within Information Manager. The mapping is done with the .norm files that are used for event normalization within Information Manager. See About normalization (.norm) files on page 263. You can provide the log data mappings in the following ways: Pattern mapping Lets you map the entire pattern of the log entries. The fields from the pattern are mapped to fields that Information Manager supports. Direct mapping Lets you map a field to another field. The mapped field is used to create new rules. In this case, both the fields have the same value. For example, you can map the Agent IP to Source IP. In this case, the value of the Source IP field always corresponds to the value of the Agent IP field. Literal mapping Lets you assign the Literal constant values to the output event fields. For example, you can assign a constant value <###> to the Source Host field.

Downloading and installing the Symantec Universal Collectors


To collect logs from a proprietary application, first download and install the universal collectors on the computer on which Symantec Event Agent is installed. See About Symantec Universal Collectors on page 201. To download the universal collectors

1 2

Log on to the Web configuration interface as an administrator. In the Web configuration interface of Information Manager, click Home > Downloads.

204

Introducing event collectors Correlating the logs collected in a file from a proprietary application

3 4

Click the download link for the universal collector that you want to download. Save the installation zip file for the universal collector on the computer where you want to install the collector.

To install the universal collector on a remote computer that has Symantec Event Agent installed

1 2

On the computer on which Symantec Event Agent is installed, log on as administrator. Unzip the installation package. The installation package includes a subdirectory that is named install. The installation files are located in a temporary directory. You must install some collectors on the same computer as the product for which it collects events.

On the command prompt, do one of the following:

On Windows, type the following command:


install.bat

On UNIX, type the following command:


sh ./install.sh

Follow the installation wizard prompts.

All the universal collectors are installed by default on the Information Manager server. The universal log file and syslog collectors are also installed by default on the Information Manager server.

Correlating the logs collected in a file from a proprietary application


By using the Custom Logs feature, you can correlate the logs that are collected from a proprietary application with the fields that Information Manager supports. Consider an example of a log entry from a Linux system. The log entry should be in the following format:
<ip address>,<source host>,<user name> <operating system>.

Assume that the log entry is as follows:


1.23.45.67,ssim2,john,Linux

Introducing event collectors Correlating the logs collected in a file from a proprietary application

205

You can analyze the application log data that is collected from the Linux system in Information Manager. The custom log management feature lets you map the collected logs with the fields that Information Manager supports. Ensure that the following requirements are met before you begin the analysis of the application log data:

Symantec Event Agent is installed on the computer on which the application logs are saved. The Universal Collector for Log Files is downloaded and installed from Home > Downloads view of the Web configuration interface. In a multi-server setup, Information Manager must be registered with the Correlation Manager.

To achieve the objective of collecting and mapping the logs from a proprietary application, you must complete the following steps:

Download and install the universal collector. See Downloading and installing the Symantec Universal Collectors on page 203. Create a new sensor configuration. Configure a reporting sensor from which the logs are collected. See Downloading and installing the Symantec Universal Collectors on page 203. Map the log fields to the fields that the Information Manager supports.

206

Introducing event collectors Correlating the logs collected in a file from a proprietary application

Chapter

11

Configuring collectors for event filtering and aggregation


This chapter includes the following topics:

Configuring the event filtering rules Configuring event aggregation

Configuring the event filtering rules


You can use event filtering to exclude events from being forwarded to Information Manager. Event filters let you reduce the event traffic and the number of events that are stored in the event database. Filters also let you discard the data that is less important to your organizations security. You can also import and export filtering configurations. Filtering configurations are exported in an XML file format; you must use the same XML file format to import the configuration. Event filtering is not advisable for all collectors. The XML file for filtering should be in the following format:
<?xml version="1.0" encoding="UTF-8"?> <filter> <filter-spec enabled="false" index="0" name="Specification 0"> <filter-field comparator="EQ" name="queue_product_id">1</filter-field> </filter-spec> <filter-spec enabled="true" index="1" name="Specification 1">

208

Configuring collectors for event filtering and aggregation Configuring the event filtering rules

<filter-field comparator="EQ" name="server">33</filter-field> </filter-spec> </filter>

Event filter configuration consists of the following actions:

Adding and enabling the event filtering rules See To add and enable event filtering rules on page 208. Changing the existing event filtering rules See To change existing event filtering rules on page 209. Importing and exporting the event filtering rules See To import and export event filtering rules on page 210.

Some collectors include predefined filtering rules. Some of these predefined filtering rules are also pre-enabled. To add and enable event filtering rules

1 2 3 4 5

In the Information Manager console, in the left pane, click System. On the Product Configurations tab, in the middle pane, expand the tree until you reach the sensor configuration of a collector. In the right pane, on the Filter tab, click Add. Double-click Specification n (where n is 0, 1, 2, and so on), type a name for the rule, and click OK. Under the rule properties table, click Add, and perform the following tasks in the order shown:

In the Name column, type a name for the event filter property (for example, IP Destination Port). You can also double-click in the Name text box to bring up an Information Manager fields window. You can choose from the list of items that are presented in the expanded directories of the Information Manager fields window. For all the IP address associated fields, you are prompted to select either an IPv4 address or an IPv6 address. In the Operator column, select an operator from the drop-down list (for example, equal to). In the Value column, type a value or select a preset value for the event filter property (for example, 80 for the port number). You can filter events by pattern by using a regular expression function. For example, to filter all events that contain "SUCCESS", enter the following in the Value column:
regex(.*SUCCESS.*)

Configuring collectors for event filtering and aggregation Configuring the event filtering rules

209

Where all characters within the parentheses are part of the regular expression "." and "*" are both metacharacters "." matches any character "*" matches zero or more occurrences of the preceding element. Therefore, match zero or more occurrences of any character, followed by the literal string SUCCESS, followed by zero or more occurrences of any character. To rephrase, match the literal string SUCCESS anywhere within the field.

Repeat step 5 to add more event filtering information for the rule. All rules within a given specification use the Boolean AND to determine whether an event is a candidate for filtering. If there are multiple specifications, each specification uses the Boolean OR.

7 8 9

When you are finished adding information for the rule, in the filter list, check the filter name. Click Save. In the left pane, right-click the appropriate configuration, and then click Distribute.

10 When you are prompted to distribute the configuration, click Yes. 11 In the Configuration Viewer window, click Close.
To change existing event filtering rules

1 2 3

In the Information Manager console, in the left pane, click System. On the Product Configurations tab, in the middle pane, expand the tree until you reach a sensor configuration of a collector. In the right pane, on the Filter tab, perform any of the following tasks:

To add a specification, click Add. To delete a specification, select the specification, and then click Remove. To delete all specifications, click Remove All.

Perform any of the following tasks:

To determine the order in which Information Manager invokes the event filters, next to the list of specifications, click the arrow icons. To change the name of the specification, double-click the specification in the specification list, and then, in the Name text box, type a new name. If you want to disable a specification, but you do not want to delete it, in the filter list, uncheck the filter name.

210

Configuring collectors for event filtering and aggregation Configuring event aggregation

In the rule properties table, change the information in any of the following columns:

Name Operator Value

Under the rule properties table, perform any of the following tasks:

To add a rule property, click Add. To delete a rule property, select the rule property, and click Remove. To delete all rule properties, click Remove All.

7 8 9

Click Save. In the left pane, right-click the appropriate collector configuration, and then click Distribute. When you are prompted to distribute the configuration, click Yes.

10 In the Configuration Viewer window, click Close.


To import and export event filtering rules

1 2 3

In the Information Manager console, in the left pane, click System. On the Product Configurations tab, in the middle pane, expand the tree until you reach a sensor configuration of a collector. In the right pane, on the Filter tab, perform one of the following tasks:

If you want to import, click Import configuration from XML file. If you want to export, click Export configuration to XML file.

Perform one of the following tasks:

In the Import Configuration From File window that appears, specify the XML file to import into the collector. In the Export Configuration to File window that appears, specify a file name to export the configurations.

Configuring event aggregation


Collectors include a feature that lets you group similar events. By grouping events, you reduce event traffic and the number of events that are stored in the event datastore. The first event of a given type is sent to Symantec Security Information Manager immediately. All subsequent events of the same type are sent as one

Configuring collectors for event filtering and aggregation Configuring event aggregation

211

aggregated event. Aggregated events contain start and end times, but all other event fields are taken from the first event in the aggregated set. Not all collectors should use event aggregation. You can also import and export aggregation configurations. Aggregation configurations are exported in an XML file format; you must import configurations in the same XML file format. See About Event Collectors and Information Manager on page 199. The XML file for aggregation should be in the following format:
<?xml version="1.0" encoding="UTF-8"?> <aggregator maxbuffer="0"> <aggregator-spec enabled="true" index="0" name="Specification 0" time="124"> <aggregator-fields> <aggregator-field name="display_id" operator="EQ">15</aggregator-field> </aggregator-fields> <similarity-fields> <similarity-field name="data_scan_guid"/> </similarity-fields> </aggregator-spec> <aggregator-spec enabled="false" index="1" name="Specification 1" time="234"> <aggregator-fields> <aggregator-field name="connection_type_name" operator="NEQ">1 </aggregator-field> </aggregator-fields> <similarity-fields/> </aggregator-spec> </aggregator>

Event aggregation configuration includes the following actions:

Adding and enabling event aggregation rules See To add and enable event aggregation rules on page 212. Changing existing event aggregation rule configurations See To change existing event aggregation rule configurations on page 213. Importing and exporting event aggregation rules See To import and export event aggregation rules on page 214. This feature is not advisable with all collectors.

Event aggregation rules are not configured by default. You must add the rules before you can enable or configure them.

212

Configuring collectors for event filtering and aggregation Configuring event aggregation

To add and enable event aggregation rules

1 2 3 4 5

In the Information Manager console, in the left pane, click System. On the Product Configurations tab, in the middle pane, expand the tree until you reach the sensor configuration of a collector. In the right pane, on the Aggregator tab, click Add. Double-click Specification n (where n is 0, 1, 2, and so on), type a name for the rule. Under the rule properties table, click Add, and perform the following tasks in the order shown:

In the Name column, select or type a name for the event aggregation property (for example, Event Date). You can also double-click in the Name text box to open an Information Manager fields window. You can choose a name from the list of items that are presented in the expanded directories of the Information Manager fields window. For all the IP address associated fields, you are prompted to select either an IPv4 address or an IPv6 address. In the Operator column, select an operator from the drop-down list (for example, greater than). In the Value column, type a value or select a preset value for the event aggregation property (for example, 2004-03-30 19:18:31).

Repeat step 5 to add more event aggregation information for the rule. All rules within a given specification use the Boolean AND to determine whether or not an event is a candidate for aggregation. If there are multiple specifications, each specification uses the Boolean OR.

In the Aggregation time (ms) text box, type the time in milliseconds by which a subsequent event should occur to be aggregated by this rule. The default value is 100. This property applies to all aggregation rules.

8 9

When you are finished adding information for the rule, in the aggregator list, check the aggregator name. Click Save.

10 In the left pane, right-click the appropriate configuration, and click Distribute. 11 When you are prompted to distribute the configuration, click Yes.

Configuring collectors for event filtering and aggregation Configuring event aggregation

213

To change existing event aggregation rule configurations

1 2 3

In the Information Manager console, in the left pane, click System. On the Product Configurations tab, in the middle pane, expand the tree until you reach a sensor configuration of a collector. In the right pane, on the Aggregator tab, under the list of rules, perform any of the following tasks:

To add a specification, click Add. To delete a specification, select the rule, and click Remove. To delete all specifications, click Remove All.

To determine the order in which Information Manager follows the event aggregation specifications, next to the list of specifications, click the arrow icons. To change the name of the specification, double-click the specification in the specification list, and, in the Name box, type a new name. To change the time by which a subsequent event should occur for aggregation by this rule, in the Aggregation time (ms) box, type the new time in milliseconds. The default value is 100. This property applies to all aggregation rules.

5 6

7 8

To disable a specification without deleting it, in the aggregator list, uncheck the aggregator name. In the rule properties table, change information in any of the following columns:

Name Operator Value

Under the rule properties table, perform any of the following tasks:

To add a rule property, click Add. To delete a rule property, select the rule property, and click Remove. To delete all rule properties, click Remove All.

10 Click Save. 11 In the left pane, right-click the appropriate collector configuration, and click
Distribute.

12 When you are prompted to distribute the configuration, click Yes.

214

Configuring collectors for event filtering and aggregation Configuring event aggregation

To import and export event aggregation rules

1 2 3 4

In the Information Manager console, in the left pane, click System. On the Product Configurations tab, in the middle pane, and expand the tree until you see a sensor configuration of a collector. In the left pane, select the appropriate configuration. In the right pane, on the Aggregator tab, perform one of the following tasks:

If you want to import, click Import configuration from XML file. If you want to export, click Export configuration to XML file.

Perform one of the following tasks:

If you want to import, in the Import Configuration From File window that appears, specify the XML file you want to import into the collector. If you want to export, in the Export Configuration to File window that appears, specify a file name to which to export the configurations.

Section

Working with events and event archives

Chapter 12. Managing event archives Chapter 13. Forwarding events to the Information Manager Server Chapter 14. Understanding event normalization Chapter 15. Collector-based event filtering and aggregation

216

Chapter

12

Managing event archives


This chapter includes the following topics:

About events, conclusions, and incidents About the Events view About the event lifecycle About event archives About multiple event archives Creating new event archives Specifying event archive settings Creating a local copy of event archives on a network computer Restoring event archives Viewing event data in the archives About working with event queries

About events, conclusions, and incidents


Security products and operating systems generate many kinds of events. Some events are informational, such as a user logging on, and others may indicate a security threat, such as antivirus software being disabled. A conclusion occurs when one or more events match a correlation rule pattern. Information Manager normalizes events from multiple security products and looks for the patterns that indicate potential threats. An incident is the result of one or more conclusions that are identified as a type of an attack. There can be many conclusions that are mapped to a single incident.

218

Managing event archives About the Events view

For example, if a single attacker causes a number of different patterns to be matched; those are grouped into a single incident. Similarly, if a vulnerability scan uncovers a computer that suffers from a number of different vulnerabilities; these are all grouped into a single incident. Or, if a number of different computers report the same virus, Information Manager creates a single outbreak incident. See About security products and devices on page 20.

About the Events view


The Events view provides access to all of the event archives used by Information Manager server. Each archive stores events that are based on the Event Storage Rules that you configure on the System view. To view the events that are stored in any archive, you can do the following:

Use the preconfigured query templates or system queries. The preconfigured templates and queries provide the parameters that you can set. You can choose the archive that you want to search, the time period within which you want to search for events, and so forth. Some templates and queries have more parameters than others depending on the purpose of the query. Save a copy of any preconfigured template query with the parameters that you have chosen, and customize the copy. Create a new query using the Query Wizard. Schedule queries to be distributed as CSV reports.

When a template or query is run, the results are displayed in the results pane of the Events view. The results pane enables you to view and search for information about archived events in both graphical formats and text formats. You select the archive you want to research, and the viewer displays a histogram that represents the data that are stored in that archive. You can then narrow the display to a particular historical period (for example, the previous month or a specific one-hour period). You can display event details in a table and drill down to get all details about one event at a time. You can also filter the results in this view. See About events, conclusions, and incidents on page 217.

About the event lifecycle


Figure 12-1 shows the lifecycle of an Information Manager event.

Managing event archives About the event lifecycle

219

Figure 12-1

Event lifecycle

Information Manager processes security event data in the following manner:


The event collector collects the raw event data from the security product. The event collector normalizes the event data and filters and aggregates the events according to the event collector configuration settings. The agent sends the normalized events and if configured, the raw event data to the designated Information Manager. Information Manager stores the event in the event archive. Information Manager updates the event summary tables with the event information. Information Manager correlates the event, and, if the event triggers a correlation rule, creates an incident. Information Manager stores the incident in the incident database. Information Manager console users view incident and event reports.

See About events, conclusions, and incidents on page 217.

220

Managing event archives About event archives

About event archives


Event archives provide a compact, convenient way to store event data for regulatory compliance, forensic research, and long-term data retention. Event archives contain event data from the security products that are set up to forward events to a Symantec Security Information Manager Server. Note: By default, newly created event archives are stored for seven days, but you can adjust this period to meet your requirements. However, when the available server disk space runs low, the server purges event archives. The default maximum quota is 90%, and the default free space quota is 1%. If your company requires long-term retention of event data, you can use scp or rsync over an SSH connection to copy the event archives from the server. See About events, conclusions, and incidents on page 217.

About multiple event archives


You can create multiple event archives to organize events into the logical folders that Information Manager stores. You can create up to 16 archives on any server. Multiple event archives lets you distribute the events Information Manager receives into separate folders and across multiple servers based on the criteria that you choose. For example, you can create an individual archive for each product that you monitor, such as an antivirus product. You can store the product generates events in a separate archive. You can create multiple archives on a single instance of Information Manager, on an attached storage device such as a DAS. You can also spread out the archives across multiple servers. To query the event data for further analysis, you can perform a query on any or all of the event archives that you have created. That includes the archives that are stored on separate instances of Information Manager. For example, if you created an archive that is exclusively used for antivirus events, you can choose to search the contents of that single archive or any combination of archives. By organizing events into individual archives, you can improve the performance of the queries used. When an event is received, the event is evaluated against the filter criteria in the order that is listed for the event filters in the console. Beginning with the first filter in the list, the event is passed through the filter to see if there is a match. If a match is found, the event is stored in the archive that you have specified for that filter, and event storage is complete. If the event does not match, it moves to the next filter in the list for evaluation. If no match is found in any of the filters that you have created, the event falls into the default archive.

Managing event archives Creating new event archives

221

To create a new event archive, you use create a set of event filters that are used to distribute the events into the appropriate archive. When you define a filter that specifies an archive in which the events are stored, you define a subfolder on the server that behaves as a separate archive. See About event archives on page 220.

Creating new event archives


When you install the Information Manager, two archives are created namely SSIM Logs and Default Archive. Note: An archive ID must be unique throughout the entire Information Manager domain. You cannot use the same archive ID in any other Event Storage Rule on any other server in the Information Manager domain. See About event archives on page 220. To create a new event archive

1 2

On the console of the Information Manager client, click System. In the left pane of the Server Configurations tab, expand the tree for the Information Manager server you want to configure, and click Event Storage Rules. Click the Add (plus sign) icon. In the Archive Rule Properties dialog box, in the Rule name field, type a name for the new archive. In the Inclusion Filter area, add the criteria for the events that you want to store. For example, to store all Information Manager System events in this archive, the filter would be Product = SSIM System. If you do not select any filter criteria, the archive stores all events by default. In the Enter data retention (days) field, type the number of days that you want the archive the data. Events that are outside of this range are purged. A setting of 0 for retention days means that events are purged based on their age.

3 4 5

7 8 9

In the Max archive quota drop-down list, choose a percentage. In the Free space quota drop-down list, choose a percentage. In the Archive ID field, type an ID if you use customized IDs for archives, or accept the default setting.

222

Managing event archives Specifying event archive settings

10 In the Archive Path field, you can specify a path relative to the Events folder
on the server or accept the default path. The path name that you specify cannot start with a slash, and must be alpha-numeric. The path is created in the servers file system from the /eventarchive folder. For example, if a user entered the archive path as collectors/pix, then a folder in the file system will exist as /eventarchive/collectors/pix.

11 Click OK and then click Apply.


To be able to view new archives in the Events view in the console, you must first log out then log on again.

Specifying event archive settings


The event archive feature has several settings that determine how much data is stored and how long the data is stored. You can change the default settings in the Information Manager console. Event archiving is automatically enabled during Information Manager installation. The name of the Information Manager server appears in the left pane of the System view. If you have multiple Information Manager servers or multiple archives, each one appears in the tree. If you also use direct-attached storage for off-box storage, use the Information Manager Web interface to specify the event archive settings for it. See About event archives on page 220. After you have configured the event archives, you should verify that the necessary summarizers have been enabled. You can enable the summarizers from the Database option under the Settings view of the Information Manager Web interface. To specify event archive settings

1 2 3 4

In the Information Manager console, click System. In the left pane of the Server Configurations tab, expand the tree, including the Information Manager server to configure. Under the Information Manager server, click Event Storage Rules. In the Event Storage Rules area of the details pane, double-click the archive to configure.

Managing event archives Specifying event archive settings

223

In the Archive Rule Properties dialog box, change the following as required:
Archive ID You can change the Archive ID. However, the ID must be unique across the Information Manager domain. You can change the name of the rule. Lets you add the criteria for the events that you want to store. For example, to store all Information Manager System events in this archive, the filter would be Product = SSIM System. If you do not select any filter criteria, the archive stores all events by default. Lets you specify the number of days that you want to archive the data. Events that are outside this range are purged. A setting of 0 for retention days means that events should be retained forever, unless there are any space constraints. Lets you specify the proportion of server disk space that can be used for storing event archives.

Rule name Inclusion filter

Enter the data retention (days)

Max archive quota

Note: You should modify the default setting only under


the guidance of Symantec personnel. Choosing the wrong setting can cause the server to run out of disk space. Free space quota Specify the proportion of server disk space that must be available to continue storing event archives.

Note: You should modify the default setting only under


the guidance of Symantec personnel. Choosing the wrong setting can cause the server to run out of disk space.

6 7 8 9

Click OK. To enable the rule, in the Event Storage Rules area select the rule using the checkbox under Enabled column. Click Apply. Close the Information Manager console, and then logon to the Information Manager server again. Events are filtered through the list of archives based on the order of the event archive rules. The first archive in the list that matches the characteristics of the event stores the event, and event archive rules evaluation for that event stops.

224

Managing event archives Creating a local copy of event archives on a network computer

Creating a local copy of event archives on a network computer


You can copy event archives from the Information Manager server to another computer. Later you can access these archives through an instance of the Information Manager console on that computer. Use this procedure to create a local event archive on a computer on your network. Warning: Do not copy individual files, because they do not work as expected. You must follow the steps in this procedure to preserve the directory structure, which contains necessary date information. You should also perform this procedure during lower event and incident periods. See About event archives on page 220. To create a local event archive

1 2

Make sure that you have sufficient space on the Information Manager server for the .tar file that this procedure generates. In a command window, type the following command:
cd /

Type the following command:


tar -cz eventarchive >eventarchive.tar.gz

Information Manager creates a gzip.tar file in the root directory on the server. This file contains the all of the event archives on a server, and the archive directory structure. You can also create a copy of a single archive by identifying the archive in the /eventarchive folder and specifying that archive in the command in this step.

4 5

Transfer the gzip.tar file to the desired location, by using SCP or another method of your choice. Unzip the gzip.tar file. The events in the new local archive are now viewable in the Information Manager console. The user can view the events only if the user has access to the location where the local archive resides. See To view the events that are stored in a local copy of an archive on page 227.

Managing event archives Restoring event archives

225

Restoring event archives


You can view events from the archives that were copied from other computers. To view the archives that were copied from another computer you must copy the entire archive folder to the appropriate location. When you copy archives from another computer, only the owner has read and write permissions on the archive folder. Group users and other users do not have any permission on the files and folders. To be able to view events from the archives that were copied from another computer, you must grant read permissions to group and other users. To grant appropriate permissions, you must do the following: See About event archives on page 220.

Change the permissions on the files in the destination archive folder from 600 to 644. All folders under the /eventarchive partition should have permissions 755 or (drwxr-s). You must also change the ownership of the folder to sesuser.

To restore archives from another computer

1 2

Copy the archive folder that you want to the /eventarchive partition into its appropriate location (archive path). All folders under the eventarchive partition should have the owner and group as sesuser:ses. Run the following commands to change the ownership of the folders:
cd /eventarchive chown -R sesuser:ses default chown -R sesuser:ses ssimlogs

226

Managing event archives Viewing event data in the archives

All folders under the eventarchive partition should have permissions 755 or (drwxr-sr-x). You must change the permissions on the folders to 755 as shown in the following example:
cd /eventarchive chmod /R 755 default chmod /R 755 ssimlogs

All the files in the archive folders must have the permissions as 644 (-rw-r--r--). You must change the permissions on all the files in the archive folders to 644 as given in the following example:
chmod 644 /eventarchive/default/2009/08/01/1249139954617.edx

You must change the permissions for all the files in the folder.

Viewing event data in the archives


You can view the events for each archive that is created for each Information Manager server in your network. You can also view the events that are stored on the local event archive of the computer on which the console is installed. You can view event archives in the following ways:

Use the preinstalled templates and queries to view the events that are stored in any of the archives that you choose. See To view the events that are stored in a local copy of an archive on page 227. Use the Query Wizard to create a query to be executed on a particular archive or set of archives. See About working with event queries on page 236.

To view the events that are stored in the event archives

1 2 3 4 5

In the Information Manager console, click Events. Expand the tree in the left pane to view the events template and query folders. Choose an event query that returns the event data that you want to view. For example, in the Templates folder, click the All Events template. In the details pane, select the archives that contain the events that you want to view. Click Run Template, or if you use a query from one of the Query folders, click Run Query.

Managing event archives Viewing event data in the archives

227

To view the events that are stored in a local copy of an archive

In the Information Manager console, click Events. The tree in the left pane displays the ID of the Information Manager server, where the live archive is stored.

2 3 4 5

To access a local archive, click Local Event Archives, click the + icon (the plus sign) on the toolbar, and then navigate to the location of the archive. Select Add Archive. Click All Events under the appropriate address in the left pane. Select Local archive, and click Run template. Archived event data is displayed in a histogram in the right pane.

To save displayed data to a file

1 2 3

After you have run the template or query, click the Export icon on the toolbar. Navigate to the location where you want to save the file, and type a name in the File name box. Click Save.

To remove a local archive from the viewer

1 2

In the left pane, click the name of the local archive that you want to remove. Click the icon (the minus sign) on the toolbar. Information Manager removes the event archive from the viewer. You can now use the left pane to navigate to a different event archive.

About the event archive viewer right pane


The right pane of the event archive viewer contains the following components, which you can manipulate to display the data that you want:

Event data histogram Event details table

See Viewing event data in the archives on page 226.

Manipulating the event data histogram


The X-axis of the event data histogram is the time dimension, and the Y-axis is the event count (by default). To identify specific time periods, move the mouse over the histogram and hover (without clicking) on one bar at a time. A label displays the date, time, and number of events that correspond to that bar.

228

Managing event archives Viewing event data in the archives

Note: The histogram is available only for the All Events Query. See Viewing event data in the archives on page 226. The toolbar above the histogram includes several tools to change the appearance of the histogram to help you access the information that you want. You can manipulate the histogram in the following ways:

To change the timeframe of the view, select an option from the View drop-down list; for example, select Last 12 hours. You can also choose a custom view. See Setting a custom date and time range on page 228. To expand the amount of data that is displayed in the current view of the histogram, click the Zoom Out icon. If you keep clicking, you gradually display the entire dataset in this window. To gradually narrow the amount of data that is displayed in the current view of the histogram, click the Zoom In icon. To change the time resolution on the x-axis, make a selection from the Resolution drop-down list. For example, select Hours to group the data in hour-long units. To search for a specific time period and event type, click the Filter icon. The Event Filter dialog box that appears lets you choose a time range and filter criteria. See To filter with the advanced filter option on page 234. To move forward and backward in time, click the right-facing and left-facing arrows beside the histogram. To change the y-axis to display events per second, select Events per second. To return to the event count, select Event Count.

Setting a custom date and time range


If you want to fine-tune the period of time that is displayed in the histogram, select a custom view. See Viewing event data in the archives on page 226. To set a custom date and time range

1 2

On the toolbar, click the calendar icon, next to the View selection box. In the Archive Time Range dialog box, in the Between: box, choose the start date and time of the time range. You can type the information in the box or use the up and down arrows. You can also click the calendar icon and then set the date and time on the Calendar dialog box.

Managing event archives Viewing event data in the archives

229

In the and: box, choose the end date and time of the time range. You can type the information in the box or use the up and down arrows. You can also click the calendar icon and then set the date and time on the Calendar dialog box.

Click OK.

The event data histogram now displays data for the time range that you selected.

About viewing event details


In the lower area of the right pane, you can display a table that contains details for the entire range of events in the histogram. The table can also display a selected portion of the events. See Viewing event data in the archives on page 226. You can show details in the following ways:

To display details for the entire set of events in the histogram, click the Select All (green check) icon on the toolbar. To remove all event details from the table, click the Deselect (red X) icon on the toolbar. Click one of the bars in the histogram to display event details for the time period that is displayed in the bar. To select a time range, click any bar on the histogram, and then press the Shift key and click another bar on the histogram. The table displays details for all of the events in that time range.

In the lower-right corner of the details table, you can see the total number of events that are selected within the displayed subset. You also can see the total number of events in the displayed subset. To view the next group of events, click the forward arrow in the lower-right corner of the table. To view all of the details in one event record, double-click one row in the table.

Modifying the format of the event details table


Each column in the event details table represents one field from the event record. You can add, delete, and reorganize the columns in the table. Note: An event record may include several date fields. Most events have a single event date, which is the time when the event occurred (not the date when Information Manager captured the event). In this case, the Event Date value and the Ending Event Date value are identical.

230

Managing event archives Viewing event data in the archives

Note: If an event represents an aggregation of activity that takes place over a period of time, Event Date is the beginning of the time period. Ending Event Date is the end time. Occasionally the event service registers an event with an incorrect Event Date or Ending Event Date. Information Manager corrects the times in these fields and replaces the original (incorrect) times in the Original Event Date and Original Ending Event Date fields. See Viewing event data in the archives on page 226. To add, delete, and organize table columns

Right-click on a column heading, and click Add Column. In the Column Filter dialog box that appears, the Selected Columns box shows all of the fields currently in the table. Occasionally a collector sends data to Information Manager that does not correspond to any fields that are defined in the existing schema. When this scenario occurs, the Column Filter dialog box displays the raw field name from the collector: for example bugtraq_ids. This scenario may also occur if a collector's SIP is not installed on the server.

Complete any of the tasks:

To add a column, click a field name in the Available Columns box, and click Add. You may also use the Ctrl key to select multiple field names, and click Add. To add all of the available columns, click Add All. To delete a column, click one or more field names in the Selected Columns box, and click Remove. To delete all of the columns, click Remove All. To change the position of a column, click a field name and click Move Up or Move Down until the name is in the desired position. You can also click Move To Top or Move To Bottom.

When you finish making changes, click OK. The changes are reflected in the event details table.

After you have modified the event details table to display the data that you want, you must save it as a query. By saving it as a query, you can see the same data and the same format the next time you log on to the Information Manager server. See To save the modified table format on page 231.

Managing event archives Viewing event data in the archives

231

To save the modified table format

1 2

After you finish modifying the table format, click the Save View icon. Type a query name, and click OK. The query is saved in the My Queries folder in the tree pane. The next time that you log on to Information Manager, you can select that query. The table format appears the way that you modified and saved it.

Searching within event query results


When you perform an event query, you can search for a specific event that is within the initial query results. You can perform a text search or use regular expressions to further refine the search. You can choose whether the search spans all of the available event fields or a specific field. See Viewing event data in the archives on page 226. To search within event query results

1 2 3 4

After you run the query, in the Events table in the bottom pane, click Search for events. In the Search Events dialog, in the Text Search field, type the text or regular expression. In the Options area, place a check next to the appropriate options. If the text is a regular expression, ensure that Regular Expression is checked. In the Look in area, take the following action:

If you want to search in all of the available fields for the set of events, click All fields. If you want to search for a value that is stored in a specific field, click Selected field, and from the drop-down list, choose the field.

5 6 7

Click Search. The results are displayed in the events table. In the Search Events dialog, click Close. After you have analyzed the search results, to return to the original query data, click Reset event search.

Filtering event data


You can filter event data in the following ways:

Filter on an individual cell in the event details table. You can filter on a cell that has data in it. Information Manager displays only the rows that have the same value in that column. You can also filter on an

232

Managing event archives Viewing event data in the archives

empty cell, and Information Manager displays only the rows in which that column is not empty.

Use the advanced filter option to select multiple filtering conditions in one operation. Filter based on unique column value. This filter creates a snapshot of the events that were returned for the query based on the column that you chose for the filter. For example, in the query results for an All Events query, if you right-click any value in the Product column and choose Filter on unique column value, Information Manager creates a condensed view of the results that shows which product names occur in that column. If you had 5000 events returned that only involved three products, filtering on unique column value in the Products column creates a snapshot that shows that those three products were the only products that are returned in the results.

An additional filtering method is a sort of hybrid of an advanced filter and filtering on a cell. It is called filtering manually on a cell, and it lets you create a more complex query than the cell filtering method. However, it presets the first filtering condition for you. See To filter manually on a table cell on page 233. To filter on a table cell

Right-click the cell that you want use as the filter condition. For example, to display only level 3 events, right-click a cell with severity level 3 in the Severity ID column.

Click Filter on cell. If you right-clicked an empty cell, click Filter where cell is not empty. One of the following occurs:

If you clicked Filter on cell, a new table displays only the events that have the same value as the cell where you clicked: For example, severity level 3. The table has a tab at the top that is labeled Untitled. If you clicked Filter where cell is not empty, a new table displays all rows in which this cell is not empty.

Take any of the following actions:

To save the displayed view as a query, click the Save View icon. Then type the query name and click OK. If you view event data from a local archive, you cannot save the view as a query. Saving a query works only when you view event data from the live archive on the Information Manager server.

Managing event archives Viewing event data in the archives

233

To filter the displayed data even further, repeat steps 1 and 2, or use the advanced filter option. See To filter with the advanced filter option on page 234. To delete the table, click the red X in the upper right corner.

If no events meet the filter criteria, Information Manager displays a blank table. If a very large number of events meet the filter criteria, it may take a long time for the data to display. If you want to stop the search and view the events that Information Manager has found so far, click Cancel. To filter manually on a table cell

Right-click a cell that you want use as a filter condition. For example, to display only level 3 events, right-click a cell with severity level 3 in the Severity ID column.

Click Manually filter on cell. If you right-clicked an empty cell, click Manually filter where cell is not empty. The Event Filter dialog box appears. One of the following occurs:

If you clicked Manually filter on cell, the first condition in the Filter criteria area contains the value of the cell in which you clicked. In this example, the condition would display Severity ID = 3. If you clicked Manually filter where cell is not empty, the Filter criteria area displays the column name with the condition null.

3 4 5 6 7

To add more filter conditions, click the + icon (the plus symbol). Click the first drop-down box, and then click an event field that you want to use as a filter. Click the drop-down box to the right of the event field, and then click an operator: for example, the equals (=) symbol. Click the drop-down box at the far right, and then click or type a value. Take any of the following actions:

To add more conditions, repeat steps 3 through 6. Use the AND and OR logical operators as needed. The default operator is AND. To change it to OR, press Ctrl, and then click on the desired boxes, then click OR. To remove a field, click on the row and then click the icon (the minus sign). To ungroup conditions, select two or more rows (Ctrl + click) and then click Ungroup.

234

Managing event archives Viewing event data in the archives

In the Time range area, select the desired time range.

8 9

Click Preview if you want to view the filtering statement that you created. Click Preview again if you want to add or change filtering criteria. When you finish creating the query, click OK. A new table displays only the events that meet the criteria in the query. The table has a tab at the top that is labeled Untitled.

10 Take one of the following actions:

To save the displayed view as a query, click the Save View icon. Then type the query name and click OK. If you view event data from a local archive, you cannot save the view as a query. Saving a query works only when you view event data from the live archive on the Information Manager server. To filter the displayed data even further, repeat the previous steps, or use the procedure for filtering on a table cell. See To filter on a table cell on page 232. To delete the table, click the X in the upper right corner.

If no events meet the filter criteria, Information Manager displays a blank table. If the number of events that meet the filter criteria is large, it may take a long time for the data to display. If you want to stop the search and view the events that Information Manager has found so far, click Cancel. To filter with the advanced filter option

1 2 3 4 5 6 7

Click Filter at the top of the table. In the Event Filter dialog box, select the desired time range. In the Filter criteria area, click the + icon (the plus symbol). Click the first drop-down box, and then click an event field that you want to use as a filter. Click the drop-down box to the right of the event field, and then click an operator: for example, the equals (=) symbol. Click the drop-down box at the far right, and then click or type a value. Take any of the following actions:

To filter on only one field, go to step 8. To add more conditions, repeat steps 2 through 6. Use the AND and OR logical operators as needed. The default operator is AND. To change it to OR, press Ctrl, and then click on the desired boxes, then click OR.

Managing event archives Viewing event data in the archives

235

To remove a field, click on the row and then click the icon (the minus sign). To ungroup conditions, select two or more rows (Ctrl + click) and then click Ungroup.

8 9

Click Preview if you want to view the filtering statement that you created. Click Preview again if you want to add or change filtering criteria. When you finish creating the query, click OK. A new table displays only the events that meet the criteria in the query. The table has a tab at the top that is labeled Untitled.

10 Take one of the following actions:

To save the displayed view as a query, click the Save View icon. Then type the query name and click OK. If you view event data from a local archive, you cannot save the view as a query. Saving a query works only when you view the event data from the live archive on the Information Manager server. To filter the displayed data even further, repeat the previous steps, or use the procedure for filtering on a table cell. See To filter on a table cell on page 232. To delete the table, click the red X in the upper right corner.

If no events meet the filter criteria, Information Manager displays a blank table. If the number of events that meet the filter criteria is large, it may take a long time for the data to display. If you want to stop the search and view the events that Information Manager has found so far, click Cancel. To filter within the results of a query

1 2 3

Click Filter at the top of the table. In the Event Filter dialog box, select the desired time range. In the Filter criteria area, on the Filter Within Results tab, create the filter criteria using the table provided. See To filter with the advanced filter option on page 234.

When you are finished creating the criteria, click OK.

To filter on unique column values

1 2

After you run an event query, Right-click a column that you want use as a filter condition. Click Filter on unique column values.

236

Managing event archives About working with event queries

About working with event queries


You can query the event archives in the following ways:

Import a query from another location and save it in the My Queries folder or the Published Queries folder. See To import a query on page 246. Use the Query Wizard to create a query against the event archives (event query). See To create an event query on page 239. Use the Query Wizard to create a query against the summarized event data (summary query). See To create a summary query on page 241. Use the Query Wizard to create a custom SQL query against the summarized event data (SQL query). See To create an SQL query on page 243.

After you create and save a query, you can insert it on the dashboard and use it in reports. You can also schedule queries to be distributed as reports in the CSV format. See Scheduling queries that can be distributed as reports on page 248.

Using the Source View query and Target View query


The Source View query and Target View query replace the Source and the Target views that were available in previous versions of Information Manager. These queries return the IP address and host name of each system that Information Manager identifies. To run either query, double-click an entry in the list to view the incidents and the tickets that are associated with that host. If the host is not already an asset, you can add the host to the assets table by selecting the host and clicking Create Asset. Note: The Source View query and Target View query cannot be modified in the My Queries or the Published Queries folders. See About working with event queries on page 236. To use the Source View query or the Target View query

1 2

In the Information Manager console, click Events. In the left pane, click System Queries > SSIM > SSIM.

Managing event archives About working with event queries

237

3 4 5

Select either the Source View query or the Target View query. Select the database to query, and click Run Query. When you view the results, you can do the following:

To create an asset from a host in the list, click the host, and click Create Asset. To view the incidents or the tickets that are associated with a host, click Details. You can also double-click the entry. To refresh the view, click Refresh. To export the current view to a file, click Export current view.

Creating query groups


You can create query groups in the My Queries and the Published Queries folders of the Events view of the Information Manager console. You can also create query group subfolders in each of these folders. See About working with event queries on page 236. To create a query group

1 2

In the left pane of the Events view, right-click either My Queries or Published Queries, and click Add Query Group. (Optional) Type the group name and the group description, and click OK. The name of the new query group appears as a subfolder under the folder you selected in step 1.

Querying across multiple archives


When you run a query, you can choose to retrieve event data from multiple archives. The query description includes a list of all of the known archives in the right pane of each query. In some cases, the query that you run may include the archives that are unavailable. For example, if you save a query and then run it later, a change may have been made that makes an archive unavailable. If you run a query using Run Query on the Events view and an archive is unavailable, when the query runs you are prompted to choose from the following options:
OK Allows the query to continue to run on any other archives that are part of the query and that are available

238

Managing event archives About working with event queries

Ignore

Same as OK, except that you are not prompted again in the current session for that archive if it continues to be unavailable. Same as OK, except that you are not prompted for any of the unavailable archives in the current session.

Ignore all

Note: When you run a scheduled report, Information Manager generates the report using the available archives if an archive is unavailable. You are not notified of an unavailable archive when the report is created, and no indication is given in the generated report. When scheduled reports are executed, queries run on all available archives and skip the archives that are not accessible. Therefore, results can be inaccurate. The user is not warned that some archives were not processed. To query across multiple archives

1 2 3 4

In the Information Manager console, click Events. In the left pane, navigate to the desired query and select it. In the right pane, under Please select archives to query, place a check in the checkbox for each archive that you want to include. If necessary, configure any of the other required fields, and then click Run Query. Some queries may take longer than others to return the expected results. If a query may return a large amount of data, create a scheduled report to run the query at a specified time. See About working with event queries on page 236.

Creating custom queries


You can create a custom query using different methods and save it for reuse. When you create a query, you must assign it a unique name. Be sure to follow these rules for assigning a valid query name:

It must not be null. It must have at least one alphanumeric character. It must consist only of alphanumeric characters and the white spaces that are created with the space bar. It must not exceed 64 characters, including alphanumeric characters and white spaces.

Managing event archives About working with event queries

239

See About working with event queries on page 236. To create an event query

In the left pane of the Events view, navigate to the location where you want to save the query. You can save the query in My Queries folder or the Published Queries folder. The My Queries folder is available only to you. The Published Queries folder is available to you and other users. You can also save the query in a query group folder under either of these folders. Right-click the name of the folder where you want to save the query, click Query Wizard. On the first panel of the Query Builder Wizard, select Event Query, and click Next. Select the event query type, and then click Next. Select a query from the following query types that are displayed:

2 3 4

Event Details Generates a table that contains all of the fields in the event archive. Event Counts by Field Generates a Top N summary query that is sorted by the field that you select in the By box. You also select the event count value in the Top box. Trending Event Counts by Field Generates a trend of the events over the selected time period

In the Archives area, you can select the archive that you want to query. By default, the Prompt at run-time option is selected. This option lets you select the archives at run-time. You can uncheck the default option and select the archive that you want to query. Specify the time range and filter criteria in one of the following options:

If you select View, select a time-period option from the drop-down list. If you select Between, use the calendar drop-down lists to set the time range. If you select Complete, Information Manager queries the entire event archive. If you select Prompt at runtime, Information Manager queries on the time interval at runtime. If you select Logged Date/Time, Information Manager queries on the login date and time. If you select Event Data/Time, Information Manager queries on the date and time of the event occurence.

240

Managing event archives About working with event queries

If you want to filter the data, specify the filter criteria. See To filter with the advanced filter option on page 234.

7 8

Click Next and then choose the columns that must be displayed. Click Next. One of the following panels appears:

If you selected Event Details in step 4, the Archive Events panel appears. Go to step 12. If you selected Event Counts by Field in step 4, the Chart Presentation panel appears. Go to step 9.

A panel displays a sample table that is based on the filtering options that you selected.

Click Chart Properties and use the Chart Type drop-down box to select a type. For example, you can select a pie chart or a table. You may also change the chart's orientation, and you may choose to show the legend for chart types other than Table. Optionally, you may assign the following labels:

A title to appear above the table or graph (not necessarily the same as the query name) Labels for the y-axis and the x-axis, for some chart types A footer, for table charts

10 If you want to see a preview of the query results, click Preview. 11 When you finish customizing the appearance of the chart, click Next.
A chart sample appears, displaying the title and any labels that you assigned.

12 In the Query Name box, type the name that you want to appear in the left
pane. Be sure to use only alphanumeric characters in the query name. If this query is an Event Details query, you can click Preview to see a preview of the query results.

13 Click Finish.
The query is saved, and its name appears under the folder that you selected in the left pane. The query results appear in the right pane.

Managing event archives About working with event queries

241

To create a summary query

In the left pane of the Events view, navigate to the location where you want to save the query. You can save the query in My Queries folder or the Published Queries folder. The My Queries folder is available only to you. The Published Queries folder is available to you and other users. You can also save the query in a query group folder under either of these folders. Right-click the name of the folder where you want to save the query, and click Query Wizard. On the first panel of the Query Builder Wizard, select Summary Query, and click Next. Select a database and then click Next. In the Summary Table box, expand Events, and select a table from the list of presummarized tables in the database. A description of the table appears in the Table Description box. The icon next to the table name indicates its type, which is spelled out in the Legend box.

2 3 4 5

6 7

After you select the table that you want, click Next. Select a column index from the drop-down list. A list of indexed fields from the database index appears in the Display Columns area.

8 9

Click to select one or more columns to display in the query, and click Next. Specify the time range:

If you select View, select a time-period option from the drop-down list. If you select Between, use the calendar drop-down lists to set the time range. If you select Complete, Information Manager queries the entire event archive.

10 If you want to filter the data, specify the filter criteria, and click Next.
See To filter with the advanced filter option on page 234.

11 Sort the columns in the query (optional for use with the Table format).
See To sort columns in a summary query on page 242.

12 Click Chart Properties and use the Chart Type drop-down box to select a
type. For example, a pie chart or a table. You may also change the chart's orientation, and you may choose to show the legend for chart types other than Table. Optionally, you may assign the following labels:

242

Managing event archives About working with event queries

A title to appear above the table or graph (not necessarily the same as the query name) Labels for the y-axis and the x-axis, for some chart types A footer, for table charts

13 Click Next.
A query sample appears, displaying the title and any labels that you assigned.

14 In the Query Name box, type the name that you want to appear in the left
pane. Be sure to use only alphanumeric characters in the query name.

15 Click Finish.
The query is saved, and its name appears under the folder that you selected in the left pane. The query results appear in the right pane. When you view the results of a Summary query, clicking chart elements to view the details for that portion of the chart is not supported. Symantec recommends that you disable summarizers on the Web configuration interface if you do not use summary queries. The summarizers are maintained in Symantec Security Information Manager 4.7 only to provide backward compatibility to previous versions of Information Manager. The summarizers re listed under Settings > Database > Event Summarizers. To sort columns in a summary query

1 2 3 4 5 6

On the right side of the Column Sorting panel, click Add Column. Click in the Sort Column, and select a field to be sorted in the query table. Click Asc (ascending) or Desc (descending) to determine the way the data in the column must appear. Repeat steps 1 through 3 if you want to sort more fields. Use the other icons (for example, Move Up) until you have the columns arranged in the proper order. For Max Rows Return, take one of the following actions:

To return every row in the database, click All. To return a specific number of rows, click Top, and select a number.

Click Next to continue creating a summary query. Return to the step in which you select the format for the query results. See To create a summary query on page 241.

Managing event archives About working with event queries

243

To create an SQL query

In the left pane of the Events view, navigate to the location where you want to save the query. You can save the query in My Queries folder or the Published Queries folder. The My Queries folder is available only to you. The Published Queries folder is available to you and other users. You can also save the query in a query group folder under either of these folders. Right-click the name of the folder where you want to save the query, and click Query Wizard. On the first panel of the Query Builder Wizard, select Advanced SQL Query, and click Next. Note: You must be a member of the Domain Administrators group to create and execute Advanced SQL Queries.

2 3

4 5

Select a database and then click Next. In the text box, type or paste an SQL statement. The following actions are optional:

In the Maximum rows box, select the maximum number of rows to appear in the table. View a list of tables and fields in the database by clicking Show Schema.

Click Test Query. Information Manager runs the SQL query and displays the result in table form. While the query runs, you may stop it by clicking Stop Query.

7 8

Repeat steps 5 and 6 until you are satisfied with the query, and click Next. Click Chart Properties and use the Chart Type drop-down box to select a type. For example you can select a pie chart or a table. You may also change the chart's orientation, and you may choose to show the legend for chart types other than Table. Optionally, you may assign the following labels:

A title to appear above the table or graph (not necessarily the same as the query name) Labels for the y-axis and the x-axis, for some chart types A footer, for table charts

If you want to see actual data in a preview chart, click Preview.

10 When you finish customizing the appearance of the chart, click Next.
A chart sample appears, displaying the title and any labels that you assigned.

244

Managing event archives About working with event queries

11 In the Query Name box, type the name that you want to appear in the left
pane. Be sure to use only alphanumeric characters in the query name.

12 Click Finish.
The query is saved, and its name appears under the folder that you selected in the left pane. The query results appear in the right pane.

Editing queries
You can edit any query in the My Queries folder or the Published Queries folder. If you want to edit a predefined query or use one as a template, you can make a copy of the predefined query and then paste it into the My Queries folder or the Published Queries folder. See About working with event queries on page 236. Note: If you cannot view queries on the Events view, your role may lack the necessary permissions. You must have Read and Search permission for the appropriate query groups and the database. A user who is a member of an Administrator role can assign permissions. Table 12-1 provides some examples of the methods with which you can edit predefined queries to suit your needs. Table 12-1 Query group in System Queries
Product Queries > MS SQL Server Security Queries > Firewall

Predefined query editing examples Field Sample modifications


In the Filter criteria, change the Product code to create an identical query for Oracle.

Query

Database Failed Product Logins Blocked Connections on Port 80 or 443 by IP address

Time range To increase the queried time period, change (View) the time range from Last week to Last month. Filter criteria To query a different port, change the value for IP Destination Port in the Filter criteria. After changing the port, rename the query to reflect the new port number. Right-click the query name, and then select Rename. Filter criteria In the Filter criteria, add a filter to show only events with Severity ID=4.

SSIM > SSIM system

SSIM Failed Logins

Managing event archives About working with event queries

245

Note: In a tabular query, you can add and remove columns from the table in which data is displayed. However, if you place the modified query in a report, the column changes do not persist. You must insert the query in the report, and then add and remove table columns. To edit a predefined query

1 2 3 4 5

In the Information Manager console, click Events. In the left pane, navigate to the desired query in the System Queries folder and select it. Drag and drop the query into the My Queries folder or the Published Queries folder. A customizable copy of the query is created. In the new folder, right-click the query name, and then select Edit Query. Modify the desired query parameters, and then click OK.

Managing the color scheme that is used in query results


When you run a query, you can use a customized color scheme for the queries that are displayed in chart format. You can add or remove colors, and change the order in which they appear in the query results view. You can then save your changes as template. To create a customized color template

1 2 3 4 5 6 7 8 9

In the Information Manager console, click System. Click the Administration tab. Expand the domain tree, and then click Reporting. Click Add Color. In the Add Color box, on the Swatches tab, make your selection. You can make additional adjustments to the color on the HSB and the RGB tabs. Click OK. If you want to move up the color in the reporting list, click Move Up. When you have finished making your modifications, click Create Template. Type a name for the template, and then click OK.

To adjust the color configuration in an existing template

1 2

In the Information Manager console, click System. Click the Administration tab.

246

Managing event archives About working with event queries

3 4 5 6

Expand the domain tree, and then click Reporting. From the drop-down menu, select the template you want to modify. After you make your changes, click Create Template. Type the name of the template modify, and then click OK.

See About working with event queries on page 236.

About querying for IP addresses


When you create a custom SQL query for an IP address, Information Manager returns an integer value of the address. To return an IP address in the more familiar nnn.nnn.nnn.nnn format, use the following macro in your SQL query.
SELECT CASE WHEN E.SOURCE_IP >= 0 THEN rtrim(char(mod(E.SOURCE_IP/16777216,256))) || '.' || rtrim(char(mod(E.SOURCE_IP/65536,256))) || '.' || rtrim(char(mod(E.SOURCE_IP/256,256))) || '.' || rtrim(char(mod(E.SOURCE_IP,256))) ELSE rtrim(char(mod((4294967296 + E.SOURCE_IP) / 16777216, 256))) || '.' || rtrim(char(mod((4294967296 + E.SOURCE_IP) / 65536, 256))) || '.' || rtrim(char(mod((4294967296 + E.SOURCE_IP) / 256, 256))) || '.' || rtrim(char(mod(4294967296 + E.SOURCE_IP, 256))) END as "Source IP" FROM SYMCMGMT.SYMC_SIM_EVENT E WHERE <Parameter to filter events>

See About working with event queries on page 236. For more information, refer to your SQL manual.

Importing queries
Information Manager lets you import a query (a file with the .qml extension) from a folder on your computer. You can place the query in the My Queries folder, the Published Queries folder, or in any query group in one of those folders. To import a query

In the left pane of the Events view, click on the location where you want to save the query. You can save the query in My Queries (available only to you) or Published Queries (available to you and other users). You can also save the query in a query group folder under either of these folders. On the toolbar, click Import Query.

Managing event archives About working with event queries

247

3 4

Browse to the location where the query resides, and click the name of the query file. Click Open. The name of the query appears in the left pane under the folder that you selected. The results of the query appear in the right pane.

See About working with event queries on page 236.

Exporting queries
You can save a query in a different location. For example, you can save a query as a file on a computer hard drive or CD. You can then attach the query to an email message or copy it to another computer. The export feature also lets you export a System Query, which you can then import into the My Queries folder or the Published Queries folder for editing. To export a query to a file

In the left pane of the Events view, click the name of the query that you want to export. The query parameters appear in the right pane.

2 3 4

On the toolbar, click Export Query. In the Save dialog box, navigate to the location where you want to save the file and type a name in the File Name box. Select the file type from the Files of Type drop-down list. If you want to be able to edit the file, select QML Files as the file type.

Click Save. Information Manager saves the query in the location that you specified.

See About working with event queries on page 236.

Publishing queries
You are the only user who can access the queries in the My Queries folder and its subfolders. If you want to make a query available to other users, you can copy it to the Published Queries folder. To publish a query

1 2

In the left pane of the Events view, locate the query under My Queries that you want to publish. Right-click the query name, and then click Publish Query.

248

Managing event archives About working with event queries

Click Yes to confirm that you want to publish the query. The query name appears under the Published Queries folder in the left pane.

If you want to move the query into a query group under Published Queries, use the mouse to drag the query name to the desired group.

See About working with event queries on page 236.

Scheduling queries that can be distributed as reports


You can now schedule queries to be distributed in a report as a CSV file. The Schedule option is available on the Events view when you select a query from the Published and System queries. On saving the scheduled queries in the Events view, the scheduled query reports are created under the Published Reports folder under the Reports view. You can send the scheduled query reports by email as a compressed CSV file, and make them available by a URL link within the mail. You can also download these reports from the Web configuration interface under Manage Reports > Scheduled Query Reports in CSV format in a compressed file. The maximum row limit of the CSV file is 1 million rows corresponding to 1 million events. The maximum size of the CSV file that you can send by email is limited to 15 MB. Note: Scheduled queries are limited to one query only. If the scheduled query contains a chart, it is converted to a table in the created reports.

Note: The Design option is not available for scheduled query reports. See About working with event queries on page 236. You can schedule the following types of queries:

Summary data query Event detail query Custom SQL query

Note: Top N by Field and Trending Event Count by Field queries cannot be scheduled from the Events view as scheduled query reports.

Managing event archives About working with event queries

249

To schedule a query as a report

1 2 3 4 5

In the console of the Information Manager client, click Events. In the Explorer pane, under Published Queries or System Queries, click the name of the query that you want to schedule and distribute as a report. In the right pane, click Schedule. Type the name of scheduled query. In the Set Schedule for Query dialog box, specify the time, date, and recipients for the generated reports. Set the message subject and body text as required.

Select the option for CSV attachment or a URL link as required. When the recipient clicks the link, the report is directly accessible. Note that the user must be logged on to the Web configuration interface using the host name of Information Manager. If the user has logged on using the IP address of Information Manager, then the user is prompted for authentication. The report becomes accessible.

Take one or more of the following actions as required:

To save the query report to the Published Reports folder and close the Set Schedule for Query dialog box without scheduling the query, click OK. To enable the Schedule and Test icons and save the query report in the Published Reports folder, click Save. To ignore any changes that were made since the last save and exit the dialog box, click Cancel. To verify the entered details, click Test to send the query to the specified recipients. To schedule the query, click Schedule.

The published query report is also available under the Scheduled Query Reports option under Manage > Reports on the Web configuration interface.

Deleting queries
If you no longer need a query, you can delete it. Note: You can delete only the queries under My Queries folder and Published Queries folder. You cannot delete the System Queries folder or its contents.

250

Managing event archives About working with event queries

To delete a query

1 2 3

In the left pane of the Events view, navigate to the query to delete. Right-click the query name, and then click Delete Query. Click Yes to confirm. The query name is removed from the list in the left pane.

See About working with event queries on page 236.

Chapter

13

Forwarding events to the Information Manager Server


This chapter includes the following topics:

About forwarding events to an Information Manager server About registering a security directory Registering Collectors Registering with a security domain Activating event forwarding Stopping event forwarding

About forwarding events to an Information Manager server


Event forwarding lets you create the distributed configurations that can handle higher event loads more efficiently by allowing events to be forwarded to multiple servers. Event forwarding lets you forward events to multiple servers. For example, you can set up one event forwarding rule to send all events to Information Manager server A. You can set up another event forwarding rule to send all events to Information Manager server B. This setup is good for redundancy. You can also archive different event types on different systems. You specify different event criteria on each event forwarding rule and point them to the appropriate Information Manager server. A Collection Server is an instance of the Information Manager server that collects and forward events from multiple sources to another server. A Correlation Server

252

Forwarding events to the Information Manager Server About forwarding events to an Information Manager server

is an instance of Information Manager on which correlation is enabled and events are received. For example, you can have multiple Information Manager servers store events from security products. You can then forward only those events that are needed for determining security incidents to a Correlation Server. The Collection Servers store the uncorrelated events (when archiving is enabled) to support compliance with policies such as Sarbanes-Oxley. The Correlation Server processes the forwarded events to allow monitoring of the security incidents in your network. See About event archives on page 220. During the Information Manager installation process, one default event forwarding rule is created. This rule is created on the Information Manager server to forward events from the event service to the correlation manager at 127.0.0.1. If you have multiple Information Manager servers, you may need to configure this forwarding rule. You can configure the rule to specify the destination Information Manager server to which to forward events. You may also choose to forward events to an event service (port 10012) on the destination server, instead of the correlation manager (port 10010). You can create additional event forwarding rules on a single instance of Information Manager for backup purposes. You can also create these rules if you want to store certain types of events separately. For example, you can set up one forwarding rule to send events to Information Manager A. You can set up another forwarding rule to send events to Information Manager B. You can define event criteria to filter certain events to be forwarded to Information Manager A. Then you can specify that other types of events are forwarded to Information Manager B. To configure event forwarding from one server to another, you must do the following:

Register the collector of each security product that you want to monitor with the destination Information Manager server. See Registering Collectors on page 254. Use the Web configuration interface of the Information Manager to join the Collection Server with the security directory of the Correlation Server. Configure the Collection Server to forward events. See Activating event forwarding on page 256.

Note: You cannot create incidents manually on an Information Manager server that is configured as a Collection Server. After you set up an instance of Information Manager as a Collection Server, you cannot reconfigure Information Manager to correlate events using software settings.

Forwarding events to the Information Manager Server About registering a security directory

253

To forward events through a firewall, make sure to open the ports that are required for the Information Manager servers to communicate. When the Correlation Server is unavailable, by default the forwarding server continues to queue events until the Correlation Server is available again. If the queue on the forwarding server fills up, the forwarding server stops receiving events. When the forwarding server stops receiving events, the collectors try to queue events until the forwarding server is able to accept events again. The event criteria determine which events are forwarded to the destination Information Manager server. You set event criteria in the Information Manager Web interface, on the System view, Server Configurations tab. If the Event Criteria pane is empty, all events are sent to the Information Manager server. If you add a condition to the event criteria, only the events that match those criteria are sent. To view forwarded events, a user must have sufficient rights to view those types of events. The product, domain, or organizational unit might not match those allowed by the role that is assigned to the user. However, the events do not appear. The ability to view the forwarded events also depends on whether archiving is enabled. Note: Information Manager Event Services cannot forward events to a Correlation Server if they cannot resolve the host name that generates the Correlation Server's SSL certificate. To resolve this problem, add a DNS entry for the IP address and host name of the Correlation Server. You can also generate a new certificate for the Information Manager server that is based on its IP address. If you forward events to an event service on the destination Information Manager server, you can enable data encryption. The data encryption option is not available when you forward events to a correlation manager.

About registering a security directory


You can register the security directory of an Information Manager server with the security directory of another Information Manager server. The registration can be performed from the Directory Registration view of the Information Manager Web interface. Using the Register option on the Directory Registration view configures a Collection Server to use the same LDAP directory as the Correlation Server. After you register, the Collection Server also inherits the same LDAP configuration as the Correlation Server. If the Correlation Server is configured to use a local or a remote LDAP, then the Collection Server uses that database to store event

254

Forwarding events to the Information Manager Server Registering Collectors

information. However, if the Correlation Server is configured as a Correlation-only Server (event pass-through enabled, events not stored), the Collection Server inherits similar settings. In that case, you must create a new database configuration on the Collection Server if you want to store events in its database. Note: You can perform a directory registration of an Information Manager server with another Information Manager server. However, the User Filters, User Monitors, User Rules, and User Lookup Tables that existed on the first Information Manager server before registration become unavailable. For information on creating database configurations, refer to the Help of the Information Manager Web interface. When you specify the name of the remote directory to which you register, ensure that you specify the correct domain name. In addition, make sure that you use the correct case (for example, symantec.ses instead of symantec.SES). LDAP directory connections are not case-sensitive, but database connections are. If you use the wrong case, the Collection Server connects to the LDAP directory of the Correlation server but not to the database. When this situation occurs, no events appear in queries and reports. See About events, conclusions, and incidents on page 217.

Registering Collectors
The Information Manager Web configuration interface provides a page to register and to unregister the configuration settings and event schema. The Information Manager server requires these settings and schema to recognize and to log events from the point product. You must register the collector for all remote installations. If you use a collector that resides on the Information Manager server, you do not need to install the agent and you do not need to register the collector.

Forwarding events to the Information Manager Server Registering with a security domain

255

To register a collector

Launch the Information Manager Web configuration interface at the following URL:
https://Information_Manager_Host_Name_or_IP_address

Symantec recommends that you use the Fully Qualified Domain Name of the Information Manager. If you have the Information Manager Client console open, you should close it.

2 3 4

From the Information Manager Web configuration interface, click Settings > Collector Registration. On the page that appears, click Register. In the first box provided, type (or click Browse to select) the path to the collector_name.SIP file that was provided with your collector installation package. You can select paths for up to 5 files. The default location for this file is the sip/ subdirectory of the collector installation package.

Click Begin Registration.

Registering with a security domain


The Directory Registration option on the Settings view of the Information Manager Web interface lets you add an Information Manager server to the directory of another Information Manager server. Registering an Information Manager server with the security directory of another instance of Information Manager server can take 10 minutes or more. To register an Information Manager server with security domain of another Information Manager server

Log on to the Information Manager Web interface of the Information Manager server that you want to register to another Information Manager server as an administrator. Click Settings > Directory Registration.

In the left pane of the Directory Registration view, click Register.

256

Forwarding events to the Information Manager Server Activating event forwarding

In the details pane, type the following information in the provided boxes:
Host name or IP address The host name or IP address of the external security directory. The LDAP communications port that the security directory uses. The default is 636. The password for the cn=root account. The domain administrator account on the remote Information Manager server. The Information Manager domain administrator password for the remote Information Manager server. The name of the remote security directory.

LDAP port

LDAP cn=root password Administrator

Password

Domain

4 5

Click Register. Configure the Information Manager server to forward events to the destination Information Manager server. See Activating event forwarding on page 256.

Activating event forwarding


You can modify the default event forwarding rule, and can create additional event forwarding rules. You can also delete or modify an existing event forwarding rule. When an Information Manager server receives the forwarded events, it stores the events according to the Event Storage Rules that are configured for that server. To specify the archive in which the forwarded events are stored, you must do the following:

Configure the forwarding Information Manager server to send the events to the receiving Information Manager server. Configure the receiving Information Manager server to store the events in the appropriate archive.

Note: Before completing the following steps, make sure that you have connected network cabling between the collection and the correlation Information Manager server.

Forwarding events to the Information Manager Server Activating event forwarding

257

See About forwarding events to an Information Manager server on page 251. To configure the default event forwarding rule

1 2

In the Information Manager console, click System. On the Server Configurations tab, expand the Information Manager server that forwards the events to the Correlation Server and click Event Forwarding Rules. In the right pane, double-click the rule. In the Event Forwarding Rules dialog box, in the Inclusion filter area, do not insert any filter criteria. Leaving this area empty ensures that all events are forwarded to the default correlation Information Manager server. You can create additional event forwarding rules to specify forwarding criteria. Under Primary and Failover Servers, type the host name or IP address of the correlation Information Manager server. You may choose not to configure the failover server. You can also forward to the servers that are not Correlation Servers. Usually, the failover is configured to fail over to another collection server.

3 4

Under Select the service to forward to, select one of the following:

To forward events to a Correlation Server, select Correlation Service. To save the events in the destination Information Manager server's event archive, select Event Service. If you want the forwarded event data to be encrypted between the collection servers and the correlation servers, go to step 7

To encrypt the event data between the collection servers and the correlation Information Manager servers, select Event Service (Encrypted). If you choose to encrypt event data, the data is sent using HTTPS (port 443).

By default, event forwarding rules queue events on the host if the destination Information Manager server is not available. If you do not want Information Manager to queue events, uncheck Queue events if target service is unavailable. You can enable the Use Persistent Queues option. This option enables all events to be written on the hard disk queue and then forwarded to the specified destination. If the destination is not available, the event service continues to write events to the disk queue (without blocking the event stream). It flushes the queue when it detects that the destination is back online. Enabling the Persistent Queues may affect the event forwarding performance.

258

Forwarding events to the Information Manager Server Activating event forwarding

10 Click OK. 11 Make sure that the appropriate event forwarding rule is selected (enabled)
in the pane. For example, to enable the default event forwarding rule on a collection Information Manager server named Denver, select the Correlation Forwarding box under the Denver folder.

12 Click Apply.
To create a new event forwarding rule

1 2

In the Information Manager console, click System. On the Server Configurations tab, expand the Information Manager server to which you want to add an event forwarding rule. Click Event Forwarding Rules. On the toolbar, click + (the Add icon). In the Rule name box, type the name of the new rule. By default, all events are forwarded. To limit the types of events forwarded, complete the following steps in order:

3 4 5

In the Inclusion filter area, click Add (+). In the left column, click an entry in the Common, Events, or Other Fields tabs. In the middle column, specify a logical operator. In the right column, specify the value that you filter on. Repeat these steps for any other conditions that you want to include.

6 7

To complete the configuration, click OK. To apply, click Apply.

To delete an event forwarding rule (stop event forwarding to an Information Manager server)

1 2

In the Information Manager console, click System. On the Server Configurations tab, expand the Information Manager server for which you want to delete an event forwarding rule. Click Event Forwarding Rules. Select the rule to delete. In the toolbar, click Remove (-). Click Apply.

3 4 5

Forwarding events to the Information Manager Server Stopping event forwarding

259

Stopping event forwarding


To stop event forwarding, disable the event forwarding rule from the Server Configurations tab of the System view on the console of the Information Manager server. See About forwarding events to an Information Manager server on page 251.

260

Forwarding events to the Information Manager Server Stopping event forwarding

Chapter

14

Understanding event normalization


This chapter includes the following topics:

About event normalization About normalization (.norm) files

About event normalization


Normalization occurs when the server receives an event after the collector has harvested the raw data. The normalization process analyzes received event data and adjusts the fields to prepare the data for interpretation by Information Manager, including any applicable rules. A normalization configuration file with a .norm file extension is used to adjust the fields where necessary. The .norm file maps the event fields that the collectors provide to the event fields that Information Manager requires. Normalization accomplishes tasks such as populating empty fields and locating information about source and target. For example, if you try to trap a consistent target IP address, the point product that harvested the data may have placed the IP address in a field that does not indicate the nature of the contents of the field. For example, the field name may be ip_address, which may not indicate whether the IP is the address of the source or the target. Information Manager includes a set of mapping files that identify and parse the data in the fields that the supported products provide. It maps these values to the appropriate database schema fields. Symantec creates and updates the .norm files using LiveUpdate as more information from each of the point products becomes available. Normalization adds information to events using a standardized set of fields that can be used to refine rules processing. For example, a unique event identifier can

262

Understanding event normalization About event normalization

be mapped to a Standard Event Code (Symantec Signature). This information allows multiple product events to be correlated despite unique identifiers for each product. Normalization also uses the information that you provided in the Asset and Network tables. It uses this information to uniquely identify the elements that are related to the event which can be used during rules creation. Additional fields from the Asset table include the assigned Confidentiality, Integrity, and Availability (CIA) values and the host name. These fields also identify who owns the system, the current operating system and what policies or roles apply to the computer. In addition, the fields identify what services are open by a computer (populated by a vulnerability scanner). They also identify what vulnerabilities are on that computer (for example, if specific patches have not been rolled out to a computer). For example, if a system has been assigned the role of a vulnerability scanner, the events that vulnerability scanners usually generate can be filtered if they are associated with that computer. The Network table information is used to identify the location and directional flow of the event. Normalization can help to identify whether an event is internal only (contains IP addresses within your network). Normalize can also help identify whether the traffic is inbound, outbound, traveling to or from specific locations. For example, if the source of a virus event is an internal source, the event can be flagged as an internal virus infection. Normalization also adds any information available with the Symantec Signature using the Symantec DeepSight Threat Management System database. For example, when a security incident occurs that is mapped to a Symantec Signature, the following pieces of information may be provided:

The Symantec Event Code, which facilitates cross-product correlation EMR categorization, helping the analyst to aggregate attack data to better understand the outbreak Vulnerability IDs (BugTraq) that include information on the vulnerabilities that are typical to this type of security threat Exposure IDs that include the potential attack exposure information that Information Manager provides. For example, telnet is enabled or weak passwords are used. Malicious code IDs that include the information that Symantec Security Response creates to describe the known malicious code activity that is associated with an attack

See About normalization (.norm) files on page 263.

Understanding event normalization About normalization (.norm) files

263

About normalization (.norm) files


When you create a rule, it is often helpful to view the mapping that takes place during normalization by using the normalization (.norm) files. Normalization files are included in the file system of the server. They are not available from the Information Manager Web configuration interface. Collectors usually populate the event fields with the data that matches the descriptive name that is specified in the schema. However, the event fields the collector provides may contain additional information that Information Manager can parse. In these cases, you can view the normalization (.norm) file to understand from where the event data comes, and how Information Manager interprets it. The Information Manager server contains a default .norm file. It also contains the .norm files that are specific to the collectors that are used on your network. The mapping in a .norm file may be a direct one-to-one mapping. In this mapping, the value in the collector field can be directly imported into the field that Information Manager expects. In other cases, the collector field may contain more data than the Information Manager field expects. In these cases, regular expressions are commonly used to parse the collector field for the data that Information Manager expects. Note: Although you can alter the contents of the .norm files, do not rely on this method as a means of modifying how data is normalized and accessed through the rule set. If you have LiveUpdate or Symantec DeepSight Threat Management System updates enabled, the default .norm file is often refreshed during the update process. Any changes you make to the .norm file are lost. In the following example, the first line of each block specifies the schema used. The field name to the left is the field name that the collector uses. The values on the right indicate the data and the field name that is the Information Manager server uses. The parsed data may include a data type in parentheses, followed by the name of the field that Information Manager uses. The right side may also include the regular expressions that are used to parse the event data from the collector field.

(intrusion_data ^ "Failure Audit") & (intrusion_data ^ "User Name") intrusion_symc_sig -> (string)deviceAlert machine_ip -> (ip)sourceIp (ip)targetIp machine -> (string)sourceHost (string)targetHost intrusion_data -> /User\s+Name:\s+(\S+)/ (string)eventResource intrusion_target_type_id := 1037112 intrusion_outcome_id := 1027204 vendor_device_id := 36

264

Understanding event normalization About normalization (.norm) files

See About event normalization on page 261.

Chapter

15

Collector-based event filtering and aggregation


This chapter includes the following topics:

About collector-based event filtering and aggregation About identifying common events for collector-based filtering or aggregation About preparing to create collector-based rules Accessing event data in the Information Manager console Creating collector-based filtering and aggregation specifications Examples of collector-based filtering and aggregation rules

About collector-based event filtering and aggregation


Information Manager lets you filter and aggregate security events before they are sent to the server. Information Manager provides the filtering and aggregation capabilities that can be used at the collector. Filtering and aggregating event data before it reaches the server can improve network and server performance. Collector-based filtering and aggregation can also effectively increase event storage capacity on the server. Collector-based filtering and aggregation discards unnecessary events or stores summaries of events, which typically use less storage space. When an event collector gathers events from security products, it parses the event for the information that can be sent to the server. When relevant data is identified, it is translated into fields in the Information Manager schema. Information Manager uses the schema to correlate existing events, create incidents, and so forth.

266

Collector-based event filtering and aggregation About collector-based event filtering and aggregation

Security products are responsible for identifying security breaches and threats. In many cases, these products also act as event identification and storage devices for any event that may be used for forensics research. Some products store these events locally. Others offload the event data to a storage device such as a Syslog server or a Windows event log. In general, Information Manager collectors monitor these devices, databases, and log files for security-related events. The collectors then forward all of these events to the Information Manager server. By default, event collectors gather all security-related events, and do not discriminate based on event severity or relevance. This feature is useful for policy compliance. However, many organizations prefer to use the powerful event reporting and correlation features of Information Manager on the security events that are more threat-related. You can limit (or restrict) the events that are sent to the server to those events that represent potential security threats and incidents. In contrast to event filtering and correlation at the server, collector-based filtering lets you exclude events from forwarding to Symantec Security Information Manager. Similarly, collector-based aggregation lets you group similar events to reduce event traffic. Grouping also lets you reduce the number of single events that are stored in the event database. Event aggregation groups the events that contain identical event information into a single summary event which is forwarded to the server. This summary event includes a count of the events that matched the aggregation criteria. Note: When aggregation occurs, the summary event that is created and sent to the server does not contain the raw event data for each individual event. A summary event cannot be separated into the individual events that comprise the aggregated event. Collector-based event filtering and aggregation rules (also referred to as specifications) are created using the Information Manager console, and then deployed to the corresponding collectors. When you filter events at the collector, you remove the events from the event storage, correlation, and incident creation processes. Use caution when you determine which events you want to filter at the collector. Note: Collector-based filtering or aggregation should not be used if you use Information Manager as your primary tool for policy compliance. Filtering or aggregating event data may exclude the events or the event details that are unnecessary for security monitoring but are necessary for compliance.

Collector-based event filtering and aggregation About identifying common events for collector-based filtering or aggregation

267

See About identifying common events for collector-based filtering or aggregation on page 267.

About identifying common events for collector-based filtering or aggregation


Table 15-1 describes filtering and aggregation guidelines for specific security device types. Table 15-1 Device type
All

Filter and aggregation guidelines

Suggestions
Test networks can generate the security events that do not indicate any actual threat. Consider filtering all events originating from isolated test networks. Firewalls generate many events that are not required for correlation. Consider filtering or aggregating the following types of events: Connection rejected. These indicate that the firewall operates as it is configured. These events do not ordinarily pose a security threat and can be filtered at the Event Collector. Connection accepted. Typically, legitimate network traffic generates these events. These events can be filtered entirely or they can be aggregated according to IP address. If an individual unwanted connection is accepted, the Intrusion Detection System identifies and reports the attack. Possible attack. Not all possible attack events indicate a true security threat. Consider filtering or aggregating possible attack events based upon specific attack IDs.

Firewall

Enterprise Antivirus

Enterprise antivirus systems customarily report a number of informational events for each protected system. If you use a product such as Symantec Client Security, consider filtering or aggregating the following types of events: Scan start and scan stop These events do not pose a security threat and can be filtered or aggregated. Virus repaired These events indicate that the antivirus software has repaired infected systems. If there are infections in your environment that are commonly repaired, consider aggregating virus repaired events by the virus name. Irreparable virus These events may indicate a virus outbreak. The spread of a virus can generate many redundant events. To avoid unwanted event traffic during an outbreak, consider aggregating irreparable virus events.

268

Collector-based event filtering and aggregation About preparing to create collector-based rules

Table 15-1 Device type


Vulnerability

Filter and aggregation guidelines (continued)

Suggestions
Typically, all vulnerability scan events should be sent to Information Manager for correlation. Vulnerability assessment events in some cases can be aggregated to reduce network traffic. Typically, all intrusion detection and intrusion prevention events should be sent to Information Manager for correlation. The Windows event log stores both operating system events and application events. Because each Windows system may have different applications installed, broad filtering or aggregation is not advised. All aggregation and filtering must be based upon specific event criteria. Consider filtering or aggregating the following types of events: Application Some applications generate an excessive number of informational and warning events. These events can be filtered or aggregated based upon the specific event source and event identifier. Security Success audit events do not indicate a security threat and can be aggregated based upon the specific user. System System event sources such as the Service Control Manager generate many informational events. These events can be filtered or aggregated based upon the event source and identifier.

Intrusion Detection Windows Event Log

See About collector-based event filtering and aggregation on page 265.

About preparing to create collector-based rules


Before you create collector-based filtering and aggregation rules, you need to understand the event data that is generated on your network. You need to gather event data over a period of time and evaluate the event fields that are included in each event. In the Information Manager console, you can use the Event Viewer to view a summary of the events that the enabled collectors identified. The Event Viewer may give you an idea of the categories or types of data that can be used. However, the event field is the most accurate source of information for creating event filters. Each product has customized event fields specific to that product. Therefore, you should create filtering and aggregation rules based on the events that are specifically related to that product. You can view the event fields by double-clicking an event in the Event Viewer. You can then analyze the fields that appear in the Event Details window. Informational firewall events may be good filtering candidates. The firewall events that are classified as informational can often be filtered at the collector to reduce traffic to the server. The firewall events that are categorized as informational are generally used for accounting purposes. These events usually do not indicate an

Collector-based event filtering and aggregation About preparing to create collector-based rules

269

attempted security breach. However, the collector correctly detects these events as security-related events. The collector sends them to Information Manager by default. It may be unnecessary to analyze these events to maintain the security policies of your organization. If analysis is unnecessary, you can filter the events at the collector to reduce event traffic. To filter these events, analyze the event details to find the fields on which the filter for this specific event can be created. To understand the event data and create a filtering rule to filter informational firewall events, you perform the following tasks:

With the collector enabled, generate a series of informational firewall events. In most cases, bringing a firewall online and performing connection tasks through the firewall generates these types of events. To make the event data more useful, generate the common firewall events that might more accurately resemble a live network environment: For example, FTP sessions and failed connection attempts. After you generate a series of events, use the Event Viewer or an available event report in the Dashboard. Double-click an event to open the Event Details window. In the Event Details window, analyze the field names that are included in the event. Many of these fields are added at the server rather than at the collection point as part of the normalization process. Therefore, the most effective fields to base a filter on are generally the fields that are generated in the raw event data: For example, the fields that contain event IDs that are specific to the monitored device. For example, if you use the Cisco Pix collector, the firewall generates a unique value in the Event Info 4 field. Make note of the field and value pair that you want to base your filter on and open the configuration on the Product Configurations tab.

To create a new specification

On the System view, in the Product Configurations tab, find the collector for the product that you want to monitor. For example, if you use the Check Point Firewall, navigate to the settings for Check Point FireWall-1 Collector. Note: You cannot edit the default configuration. You must create a new configuration and specify the settings for that configuration.

2 3 4

Select the product and right-click to create a new configuration. Type a name and description for the new configuration, and then click Next. Add computers to the configuration using the + icon. Then click Next. Click Finish. Click Close to save and exit the Configuration Wizard .

270

Collector-based event filtering and aggregation Accessing event data in the Information Manager console

5 6

Select the newly created configuration. In the right pane, on the Filter tab, create a new specification. In the new specification, double-click the name field and find the field name in the list. Alternatively, type the name of the field exactly as it appears in the event details. In the operator column, choose the appropriate operator. In most cases, this value is the equal to operator. In the Value field, type the value exactly as it appears in the event details. Enable the specification, save, and then distribute using the Distribute settings to computers icon.

7 8 9

See About collector-based event filtering and aggregation on page 265.

Accessing event data in the Information Manager console


The Information Manager console provides several different ways to access the event data that each collector gathers. To gain an understanding of the events that can be filtered, you should analyze the event data that is viewable in the Event Details view. You can also create custom reports for specific events. For more information on how to create custom reports, see the documentation that is provided with each collector. Accessing event data using the Events view

1 2 3

In the Information Manager console, click Events. In the Events view, expand the Templates folder. Under the Templates folder, click All Events. Note: This example uses the All Events query. However, you can use any of the event queries in the Events view that return the event data for which you search.

4 5

In the right pane, select the archives that contain the event data that you want to review, and then click Run Template. After the query completes, use the results view to find the event you want to analyze.

Collector-based event filtering and aggregation Creating collector-based filtering and aggregation specifications

271

6 7

Find the event that you want to analyze, and click View the event details. In the Event Details window, analyze the event fields and data. Many events have unique event IDs that can be used to create the filters that are specific to the event that you want to filter.

See About identifying common events for collector-based filtering or aggregation on page 267.

Creating collector-based filtering and aggregation specifications


After you analyze your event data, you can create filtering and aggregation specifications based on the fields that are viewable in the Event Details window. The Filters and Aggregation tabs let you create, enable, and edit filters to exclude events from being forwarded to the server (filtering). You can also use these tabs to create, enable, and editor filters to gather multiple events into a single event (aggregation). No event filtering or aggregation rules are configured by default. You must add the rules before you can enable or configure them. See About collector-based event filtering and aggregation on page 265. To create a collector-side filtering rule

1 2

In the Information Manager console, on the System view, click Product Configurations. In the left pane, expand the product to which you want to add a filtering rule. Expand the folders until you reach the configurations that are available for the product. If the only configuration available is Default, you must create a new configuration. The Default configuration cannot be edited. If necessary, to create a new configuration, click the folder of the product, and then click Add. Follow the on-screen instructions. Select the configuration you want to modify, and then in the right pane, on the Filter tab, under the list of filters, click Add. Double-click Specification n (where n is 0, 1, 2, and so on), type a name for the rule, and then press Enter. Under the rule properties table, click Add, and then do the following:

3 4 5

In the Name column, double-click the name field and find the value in the event fields list that appears. If you know the exact name of the field that the collector created you can also type a name for the event filter property. Fields are case-sensitive. In the Operator column, select an operator from the drop-down list.

272

Collector-based event filtering and aggregation Creating collector-based filtering and aggregation specifications

In the Value column, type a value for the event filter property.

To add more event filtering information for the rule, repeat this step.

6 7 8 9

When you are finished, in the filter list, check the filter name. Click Save. In the left pane, right-click the appropriate default folder, and then click Distribute. When you are prompted to distribute the configuration, click Yes.

To create a collector-based aggregation rule

1 2

In the Information Manager console, on the System view, click Product Configurations. In the left pane, expand the product to which you want to add an aggregation rule. Expand the folders until you reach the configurations that are available for the product. If the only configuration available is Default, you must create a new configuration. The default configuration cannot be edited. If necessary, to create a new configuration, click the folder of the product, and then click Add. Follow the on-screen instructions. In the right pane, on the Aggregator tab, under the list of filters, click Add. Double-click Specification (where n is 0, 1, 2, and so on), type a name for the rule, and then press Enter. Under the rule properties table, click Add, and then do the following:

3 4 5

In the Name column, select the name for the event aggregation property. In the Operator column, select an operator from the drop-down list. In the Value column, type a value for the event aggregation property.

To add more event aggregation information for the rule, repeat this step.

In the Aggregation time (ms) box, type the time in milliseconds in which the aggregated events should correspond to the rule property. The default value is 100. This property applies to all aggregation filters.

7 8 9

When you are done, in the aggregation list, check the aggregation name. Click Save and enable the rule before you distribute. In the left pane, right-click the appropriate default folder, and then click Distribute.

10 When you are prompted to distribute the configuration, click Yes.

Collector-based event filtering and aggregation Examples of collector-based filtering and aggregation rules

273

Examples of collector-based filtering and aggregation rules


As you begin to understand the details of the event fields populated, you would discover the common filtering and aggregation candidates. These candidates can be safely implemented at the collector level. You are provided with general guidelines for filtering and aggregation. Before you deploy these examples, each configuration should be carefully evaluated to ensure that the configuration conforms to the specific needs of your security environment. The examples that are provided are common to many deployments, but may not be in compliance with your security policies. Creating filtering and aggregation specifications is an iterative process. This process is based on a careful evaluation of the event data that is specific to your security environment. Filtering at the collector prevents event data from being sent to the Information Manager server for evaluation. Consequently, analysts do not have access to this data for forensic analysis unless the events are stored separately from Information Manager. For example, the events that are classified as informational can be good candidates for event filtering or aggregation at the collector. In some cases, a network may generate a large number of informational events that may not constitute an immediate security threat. From a threat perspective, these events may not be as useful in evaluating a high priority security incident in progress. The informational event details may subsequently help to gain a better understanding of the series of events that led to the security breach. For this reason, an event filter or aggregation specification at the collector should be carefully evaluated before it is deployed. When you determine which events can be safely filtered or aggregated, base your collector-based filtering or aggregation specification on specific event criteria. Basing a filter on a broad field such as severity level may have unintended results. When you create filtering rules, specificity helps to prevent unexpected gaps in the information that is available to the analyst. For example, you should use the event IDs generated by the monitored product to control the information that is discarded from Information Manager. This option is more effective than using a broader severity category to control that information. See About collector-based event filtering and aggregation on page 265.

Filtering events generated by specific internal networks


You can filter events from the particular subnets that generate a high volume of events that do not pose a threat. For example, a network that is dedicated to testing and developing software applications may generate many events that do not

274

Collector-based event filtering and aggregation Examples of collector-based filtering and aggregation rules

threaten internal network resources. These events can be filtered at the collector to reduce this type of false positive. See Examples of collector-based filtering and aggregation rules on page 273. To filter network events generated by a specific subnet and acquired by the Windows event log collector

On the System view, on the Product Configurations tab, expand the default configuration for the Snare for Windows Event Log collector. On the Filters tab, add a new specification. Add a new entry for the specification, and then double-click the Name field. In the Event fields list, choose Machine Numeric Subnet. Set the Operator to equal to, and in the Value field, enter the subnet that you want to filter against. Save and enable the rule, and then distribute the configuration.

2 3

Filtering common firewall events


Firewall products typically generate a large number of events. Many of these events are recorded primarily for lower priority, informational purposes. Depending on the security policies that you have in place, you may be able to safely filter these events at the collector. By filtering at the collector, you can reduce network traffic and increase overall performance. See Examples of collector-based filtering and aggregation rules on page 273.

Filtering Connection Rejected events


Events that are classified as Connection Rejected events can often be filtered based on the severity of the event and the event ID. For example, in many cases, TCP Connection Rejected events that the Cisco PIX collector (PIX-6-106015) detects can be filtered at the collector. Depending on the security policies of your organization, you may decide to filter or aggregate these events to reduce the amount of data to evaluate. If you want to filter additional events, you can add additional event types to the specification. For example, you can use the Event Info 4 field to identify No route to dest_addr from src_addr (PIX-6-110001) or HTTP daemon interface int_name: connection denied from IP_addr (PIX-6-605001) PIX events. To filter Cisco PIX TCP Connection Rejected events

1 2

On the System view, on the Product Configurations tab, navigate to the product to configure. On the Filters tab, create a new specification.

Collector-based event filtering and aggregation Examples of collector-based filtering and aggregation rules

275

In the new filtering specification, double-click the Name field, and in the Event fields list that appears, expand the list. From the list of categories, choose Firewall Network Event > Event Info 4. For the Cisco PIX collector, the Event Info 4 field contains the name of the event that PIX uses. Set the Operator to equal to, and then in the Value field, enter the PIX event code (PIX-6-106015). Save and enable the rule, and then distribute the configuration.

4 5

Filtering Connection Accepted events


Events that are classified as Connection Accepted can often be filtered based on the severity of the event and specifically the event ID. For example, the Connection Accepted events that the Cisco PIX collector detects can be filtered at the collector. The user user_name executed cmd: command (PIX-7-111009). PIX-7-111009 events are generally used for accounting purposes only. These events indicate that the command that the user entered was not capable of modifying the configuration. Depending on the security policies of your organization, you may decide to filter or aggregate these events to reduce the amount of data to evaluate. To filter Cisco PIX Connection Accepted events

1 2 3

On the System view, on the Product Configurations tab, navigate to the product to configure. On the Filters tab, create a new specification. In the new filtering specification, double-click the Name field, and in the Event fields list that appears, expand the list. From the list of categories, choose Firewall Network Event > Event Info 4. For the Cisco PIX collector, the Event Info 4 field contains the name of the event that PIX uses. After you have selected the field name, set the Operator to equal to, and then in the Value field, enter the PIX event code (PIX-7-111009). Save and enable the rule, and then distribute the configuration.

4 5

Filtering Possible Attack events


In many cases, events that are classified as possible attacks can be either filtered or aggregated. For example, if you use the Cisco PIX collector, the collector gathers events such as failed telnet session attempts as possible attacks. It displays them in the console. . Based on your policies, you can filter or aggregate these events at the collector to reduce the amount of data to evaluate. If you want to filter similar events (or the events that carry a similar severity), you can add additional event types to the specification. For example, you can use

276

Collector-based event filtering and aggregation Examples of collector-based filtering and aggregation rules

the Event Info 4 field to identify Telnet Login Session Failed (PIX-6-307003) events, or Retrieved IP address for FTP session (PIX-6-303002). To filter Cisco PIX failed telnet session events

1 2 3

On the System view, on the Product Configurations tab, navigate to the product to configure. On the Filters tab, create a new specification. In the new filtering specification, double-click the Name field, and in the Event fields list that appears, expand the list. From the list of categories, choose Firewall Network Event > Event Info 4. For the Cisco PIX collector, the Event Info 4 field contains the name of the event that PIX uses. After you have selected the field name, set the Operator to equal to, and then in the Value field, enter the PIX event code (PIX-6-307001). Save and enable the rule, and then distribute the configuration.

4 5

Filtering Remote Management Connection events


Remote Management Connection events can often be aggregated if you expect remote management connections to take place from trusted sources or on an expected host computer. Remote Management Connection events often include the events that are classified as Informational, and in many cases can be safely aggregated. For example, if you use the Juniper Netscreen Firewall collector, you can create an aggregation specification that gathers specific types of Remote Management Connection events into a single summary event that is sent to the server. For example, you may have a host computer that manages remote connections for which you expect many Remote Management events to take place. You can aggregate these events into a single event summary. To aggregate events for the Juniper Netscreen Firewall collector based on a specific host computer

1 2 3

On the System view, on the Product Configurations tab, navigate to the product to configure. Expand the default configuration for the Juniper Netscreen Firewall Event Collector. On the Aggregation tab, add a new specification. Add a new entry for the specification, and then double-click the Name field. In the Event fields list, navigate to Common Event > Destination Host Name. Set the Operator to equal to, and then enter the host name in the value field.

Collector-based event filtering and aggregation Examples of collector-based filtering and aggregation rules

277

5 6

In the Aggregation time (ms) box, type the time in milliseconds in which the aggregated events should correspond to the rule property. Save and enable the rule, and then distribute the configuration.

Filtering common Symantec AntiVirus events


Symantec AntiVirus generates the events that can often be filtered or aggregated. For example, most antivirus products provide proactive event notifications of maintenance tasks such as data scan start and stop events. As these security-related events indicate expected behavior, they can often be safely filtered or aggregated at the collector. To filter the events that Symantec AntiVirus generates, edit the configuration file (.conf) that is included when the collector is installed on the Symantec AntiVirus parent server. The collector monitors the parent server for events, and uses the configuration files to determine which events are forwarded to the server. See Examples of collector-based filtering and aggregation rules on page 273. The following events are common Symantec AntiVirus events that can be filtered at the collector:

Unscannable Violation Data Scan Start Data Scan End Data Scan Cancel Data Scan Pause Data Scan Resume Application Start Application Stop

Note: Application Stop events can indicate that Symantec AntiVirus has been disabled. The AntiVirus Disabled event correlation rule on the server detects this event. If you filter Application Stop events at the collector, this rule does not trigger during correlation. Symantec AntiVirus and Symantec Client Security configuration files are stored on the parent server on which the collector is installed. The files are stored by default in the following locations:

Symantec AntiVirus: C:\Program Files\Symantec\Collector\Plugins\SAVSesa\savsesa.cfg

278

Collector-based event filtering and aggregation Examples of collector-based filtering and aggregation rules

Symantec Client Firewall: C:\Program Files\Symantec\Collector\Plugins\SCFSesa\scfsesa.cfg Symantec Client Security: C:\Program Files\Symantec\Collector\Plugins\SCSState\scsstate.cfg

You can also filter the events that are forwarded from individual clients or servers using the Log Event Forwarding wizard. The wizard is available through the Symantec System Center interface that is provided with Symantec AntiVirus and Symantec Client Security. The Log Event Forwarding wizard lists a complete set of events that can be forwarded to parent servers. For more information on using Symantec System Center, see the documentation that is provided with Symantec AntiVirus and Symantec Client Security. To enable event filtering on a Symantec AntiVirus parent server

On the parent server that you are monitoring, use a text editor such as Notepad to open the following file: C:\Program
Files\Symantec\Collector\Plugins\SAVSesa\savsesa.cfg.

2 3 4

In the conf file, find the ExcludeEvents section. From the list of events in this section, remove the comment symbol (;) from before the event type or types you want to filter. Save the file as a .cfg file. You may need to restart the collector.

Filtering or aggregating vulnerability assessment events


Typically all vulnerability assessment scans should be sent to the Correlation Manager for analysis. However, vulnerability assessment events in some cases can be aggregated to reduce the number of events that are sent individually to the Information Manager server. For example, the Symantec ESM collector detects the vulnerability assessment events that are related to whether files are backed up on the systems that it scans (Backup Integrity events). This information is useful for a variety of network analysis tasks. However, based on the policies of your organization, this information may not represent an immediate security threat. A Different ACL entry event is another potential candidate for aggregation of vulnerability assessment events. A Different ACL entry event typically indicates a permissions misconfiguration rather than an actual security breach. See Examples of collector-based filtering and aggregation rules on page 273.

Collector-based event filtering and aggregation Examples of collector-based filtering and aggregation rules

279

To aggregate Backup Integrity events for the Symantec ESM collector

1 2 3

On the System view, on the Product Configurations tab, navigate to the product to configure. On the Aggregation tab for that product, create a new specification. In the new aggregation specification, double-click the Name field, and in the Aggregation list that appears, expand the list. From the list of categories, choose Vulnerability > Vulnerability Custom 2. For the Symantec ESM collector, the Vulnerability Custom 2 field contains the type of event that the vulnerability assessment scan generates. Set the Operator to equal to. Then in the Value field, type Backup Integrity exactly as it appears in the Event Details entry for the Vulnerability Custom 2 field. In the Aggregation time (ms) box, type the time (milliseconds) in which the aggregated events should correspond to the rule property. Save and enable the rule, and then distribute the configuration.

5 6

To aggregate Different ACL entry events

1 2 3

On the System view, on the Product Configurations tab, navigate to the product to configure. On the Aggregation tab for that product, create a new specification. In the new aggregation specification, double-click the Name field, and in the Event fields list that appears, expand the list. From the list of categories, choose Vulnerability > Vulnerability Name. For the Symantec ESM collector, the Short Descriptive Name field contains a brief description of the event that the vulnerability assessment scan generates. After you have selected the field name, set the Operator to equal to. Then in the Value field, type Different ACL entry exactly as it appears in the Event Details entry for the Vulnerability Name field. In the Aggregation time (ms) box, type the time (milliseconds) in which the aggregated events should correspond to the rule property. Save and enable the rule, and then distribute the configuration.

5 6

Filtering Windows Event Log events


If you use the Windows event log collector, you can reduce traffic by filtering the common network events that generally do not pose a threat. The Windows event logs generate a large number of events that track a variety of activities, including those related to security. These events produce the unique event codes that are

280

Collector-based event filtering and aggregation Examples of collector-based filtering and aggregation rules

included in the raw event data. You can use these event codes to create collector-based filters to reduce the number of events that has passed to the server. For example, Successful Network Logon events (Windows event ID 540) do not typically pose a security risk if the appropriate security measures are in place: For example, secure passwords, multiple layers of access defense, and limiting administrator privileges. Another example of a Windows event log event that can be filtered is the successful login Application event. As an alternative, you can also choose the Event ID field with a value of 17055. See Examples of collector-based filtering and aggregation rules on page 273. To filter Windows Successful Network Logon events (540)

1 2 3

On the System view, on the Product Configurations tab, navigate to the product to configure. On the Filters tab, create a new specification. In the new filtering specification, double-click the Name field, and in the Event fields list that appears, expand the list. From the list of categories, choose Windows and Novell Event > Option 8. For this type of event, Option 8 contains the event ID. Note that the option fields vary with each event for Windows event log entries. For more information on the Windows Event Log option fields, see the documentation that Microsoft provides. Set the Operator to equal to. In the Value field, type Security:540 exactly as it appears in the Event Details entry for the Option 8 field. As an alternative, you can also choose the Event ID field with a value of 540.

Save and enable the rule, and then distribute the configuration.

To filter Windows successful login Application events

1 2 3

On the System view, on the Product Configurations tab, navigate to the product to configure. On the Filters tab, create a new specification. In the new filtering specification, double-click the Name field, and in the Event fields list that appears, expand the list. From the list of categories, choose Windows and Novell Event > Option 8. For this type of event, Option 8 contains the event ID. Note that the option fields vary with each event for Windows event log entries. For more information on the Windows Event Log option fields, see the documentation that Microsoft provides.

Collector-based event filtering and aggregation Examples of collector-based filtering and aggregation rules

281

4 5

Set the Operator to equal to. In the Value field, type Application:17055 exactly as it appears in the Event Details entry for the Option 8 field. Save and enable the rule, and then distribute the configuration.

282

Collector-based event filtering and aggregation Examples of collector-based filtering and aggregation rules

Section

Working with incidents

Chapter 16. Managing Incidents Chapter 17. Working with filters in the Incidents view

284

Chapter

16

Managing Incidents
This chapter includes the following topics:

About incident management Viewing incidents About creating and modifying incidents Closing an incident Reopening a closed incident Printing incident details Printing the incident, ticket, or asset list Exporting the incident, ticket, or asset list Assigning incidents automatically to the least busy member in a user group

About incident management


Symantec Security Information Manager facilitates efficient and appropriate management of security incidents and alerting (non-security) incidents. An incident is derived from one or more events that are logged in the event database. For example, when a firewall-down event occurs, an alerting incident can be generated. A security incident may be created when an internal port sweep event occurs. Incidents include both security incidents and alerting incidents. Incident management begins when an incident is created. Information Manager provides the following methods of incident creation:

286

Managing Incidents About incident management

Automated incident creation

The Correlation Manager creates incidents from events, and then the events are assigned according to automatic assignment rules. The analyst determines which events are related and manually correlates the events by grouping them as a single incident.

Manual incident creation

When you create a custom rule on the Rules view, you can specify the type of incident that the rule generates. If you check the Alerting Incident box on the Actions tab of the rule form, the Correlation Manager generates an alerting incident. If this box is unchecked, the Correlation Manager generates a security incident. You can also set the incident type manually. See the Symantec Security Information Manager Administrator's Guide for information about creating custom rules. After an event or group of events is selected and identified as an incident, the incident is assigned to an analyst for investigation and resolution. Information Manager provides the analyst with recommended actions to be completed, including the remediation options that are associated with the incident type. A history log tracks any changes to the incident and lets the analyst note important facts. See About creating and modifying incidents on page 290.

Incident identification
The Blaster worm attack begins with a series of sweeps to ports 135, 445, and 4444. Using the default rules, Information Manager detects each of these sweeps as suspicious, and creates a conclusion for each. At the same time, events from intrusion detection software such as Symantec IDS, lead to other conclusions that are related to the source IP address. Information Manager may also create further conclusions if the source IP address for the attack is on the IP watch list. This list is updated automatically to provide up-to-date protection from the computers that are known to be used in attacks. Based upon all of these conclusions that are related to the same IP address, Information Manager generates a security incident. A security analyst would find out about the new incident by email alert, or while monitoring the Incidents tab in the Information Manager console. The incident contains all the information that the analyst needs to determine the source and target of the attack.

Managing Incidents Viewing incidents

287

Example: Information Manager automates incident management during a Blaster worm attack
Symantec Security Information Manager tracks the entire incident response cycle through the following phases:

Incident identification Threat containment, eradication, and recovery Follow-up

Threat containment, eradication, and recovery


When Information Manager alerts the security analyst about the incident, the analyst can use Information Manager to better understand the scope of the problem and to investigate eradication options. Information Manager facilitates the containment phase by providing the event data with the incident declaration. Rather than searching through countless log files, the analyst knows which events triggered the security incident, and which systems are affected. The incident also includes recommended corrective action from Symantec DeepSight. This information enables the security analyst to quickly identify the corrective actions. The analyst can now create a ticket that describes the tasks necessary to eradicate the threat. The ticket includes the incident information, the event details, and the recommended corrective actions. Ticket information can be made accessible to an external help desk by the Information Manager Web Service.

Follow-up
After the threat has passed, the analyst can further analyze the effect of the incident. The analyst can fine-tune the correlation rules, event filters, and firewall rules to prevent the threat from occurring again. The analysts can also mine the event archive data if necessary and create the reports that document the scope of the incident and the security team's efforts to resolve it.

Viewing incidents
The incident list displays summarized information about incidents in the database. It also provides access to more detailed information about individual incidents.

About the incident list


Information Manager lets you view any combination of logged incidents and the details that are associated with those incidents. This flexible capability facilitates

288

Managing Incidents Viewing incidents

straightforward management of incidents. By viewing incident details and incident logs, you gain access to the history of the incident as well as the analyst's notes. Using the filtering feature, you can view a subset of the incidents in the database. For example, you can view all open security incidents or only the open security incidents that are assigned to you. You can search for a specific incident by typing the Reference ID of the incident in the Look for box. You can also type part of the Reference ID number, and Information Manager displays all the incidents that contain that sequence of numbers. If you do not type in the Reference ID box, based on the selected filter, the search returns all incidents that you have permission to see. The Incidents view consists of the incident list (the top portion of the window) and the incident preview pane. You can select an incident view from the Incident Filter drop-down list. The incident views that are available to select depend on the roles (permissions) that were assigned to you. When you click an incident in the list, the incident preview pane displays additional information about that incident. This pane contains a series of tabs on which you can perform incident management tasks. See Viewing and modifying the incident list on page 289. The following table lists the incident preview tabs and their functions. When you double-click an incident in the list, Information Manager displays the Incident Details window. This window contains the same information that is in the incident preview pane. You can have more than one Incident Details window open at one time, so you can easily switch between incidents. Table 16-1 Tab
Details

Incident preview tabs Description


Displays the incident details. You can view incident history and change several settings, such as the status, priority, and description. Displays the conclusions of the events that are associated with the incident. You can view details about a conclusion and about the associated events.

Conclusions

Managing Incidents Viewing incidents

289

Table 16-1 Tab


Events

Incident preview tabs (continued) Description


Displays the events that are associated with the incident. You can view details about an event; you can also remove one or more events, that is, disassociate events from the selected incident. You can view additional information about some of the fields for a particular event. To see this information, right-click any of these fields: Event Code Includes attack effects, mechanisms, and resources. Also provides details about each type of vulnerability, malicious code, and exposure that is associated with the event code. Source IP Lists the incidents that are associated with the asset that uses this IP address. You can also view details about the asset and a list of any associated tickets. Destination IP Lists the incidents that are associated with the asset that uses this IP address. You can also view details about the asset and a list of any associated tickets.

Targets

Displays the information about the target computers that are associated with the incident. Displays a visual representation of the attack. Displays the vulnerability information and target information about the computers that are associated with the incident. Displays summary information about the help desk tickets that have been created for the incident. You can also view ticket details. Displays the remediation suggestions that are associated with an incident. Remediation information is associated with the rule that was triggered. Displays an incident's log file. You can view the change history of the incident, and you can add notes to the file. You may not change or delete log notes.

Attack Diagram Intelligence

Tickets

Remediation

Log

Viewing and modifying the incident list


The incident list displays the first 5,000 incidents that are in the database. For example, if 10,000 incidents come in, only the first 5,000 incidents are displayed. Therefore, it is important to assign or auto-assign incidents to keep the queue of all open incidents moving and current. See About the incident list on page 287.

290

Managing Incidents About creating and modifying incidents

Information Manager updates the list as new incidents are created. You do not need to manually refresh the list. If you want to freeze the list while you view it or when you modify the incident records, click Lock View on the toolbar. When Lock View is checked, no new incidents are added to the list, but the list is updated when you uncheck Lock View. To view incidents

1 2

In the Information Manager console, click Incidents. Take one or both of the following actions:

From the incident filters list, select a view. For example, to view only your open security incidents, under Security Incident Filters, click My Open Incidents. To view the open alerting incidents not yet assigned, under Alerting Incident Filters, click Unassigned Open Alerts. All of the incidents that meet the filter criteria appear in the incident list. In the Search by table box, type a portion or the complete reference ID of a specific incident that you want to view. You do not have to type the leading zeroes. Then click the Search icon. All of the incidents that contain the numerals you typed appear in the incident list.

You can modify the appearance of the incident list by adding or removing columns (fields). To add or remove columns from the incident list

1 2 3 4

From the Security Incident filters drop-down list, select a view. In the incident list, right-click any column heading. In the drop-down menu, check a field name that you want to add to the list. Alternatively, uncheck a field name that you want to remove from the list. Repeat steps 2 and 3 until the list contains the columns that you want. The list modifications persist across sessions. Therefore, the next time that you log in to the Information Manager console, the list has the column headings that you selected in this procedure.

About creating and modifying incidents


Information Manager is populated with incidents by using the following methods:

Automatic creation of incidents by the Correlation Manager Manual creation of incidents

Managing Incidents About creating and modifying incidents

291

The Correlation Manager automatically analyzes and correlates events to create incidents. Correlation Manager uses information from various sources to determine when to create an incident. Sources include correlation rules, the asset table, and Symantec DeepSight. See the Symantec Security Information Manager Administrator Guide for information about the Correlation Manager. You can manually create incidents in Information Manager. This capability is typically used for tracking the physical security threats that an intrusion detection product would not identify. When you create a new incident, Information Manager automatically generates the values for the information that is stored in the log: for example, Incident ID number, Incident Creator, and Rule Name. See Creating incidents manually on page 291.

Creating incidents manually


You can create incidents manually from the Incidents view as well as from the Events view. Incidents that are created manually from the Events view gets associated with the event. By default, Information Manager assigns a severity of 1 to incidents that are manually entered because the confidentiality, integrity, and availability values are unknown. To create an incident manually from the Incidents view

1 2 3

In the Information Manager console, click Incidents. On the toolbar, click Add Incident. In the Add Incident dialog box, set the following values or accept the default settings:

From the Type list, select the incident type. From the State list, select the incident state. In the Assignee field, click Find Users (...) to open the Find Users dialog box. Select a user from a specific user group. Select a user group from the Look in Group list and then select a user within that user group. You can also enter the details of a user and search the user who can be assigned the incident. In the Team field, click Find User Groups (...) to open the Find User Groups dialog box, and then select the team that is responsible for resolving the incident. You can create teams with the user groups function on the System view.

292

Managing Incidents About creating and modifying incidents

From the Priority drop-down list, select a priority for the incident from 1 to 5 (5 is the highest priority). From the Severity drop-down list, select the severity of the incident from 1 to 5 (5 is the highest severity). In the Description box, enter a description of the incident. (Optional) Check Domain Tracking to continue to track the events that are associated with this incident. If you use the default settings, you can change any of the values later.

Click OK.

See Modifying incidents on page 292. To create an incident manually from the Events view

1 2 3 4

In the Information Manager console, click Events. Run the query that returns the event from which you want to create the incident. In the events table, locate one or more events that you want to assign to an incident. Right-click the event row, and then click Create Incident. If you want to assign more than one event to a single incident, use the Ctrl or Shift key to select the desired rows. You may select a maximum of 500 events per incident. If you want to assign more than 500 events to a single incident, create multiple incidents and then merge them. See Merging incidents on page 293.

Click Yes to confirm. The Create New Incident dialog box appears. The event (or events) that you selected is listed on the Events tab in the lower section of the dialog box.

In the Create New Incident dialog box, specify the settings that you want for the new incident. See To create an incident manually from the Incidents view on page 291.

Click OK.

Modifying incidents
You can modify the details that were set when the incident was created. For example, you can change the user to whom an incident is assigned.

Managing Incidents About creating and modifying incidents

293

See About creating and modifying incidents on page 290. To modify an incident

1 2

In the Information Manager console, click Incidents. From the incident filters list select the category of incidents that you want to modify. In the incident list, click the incident that you want to modify. You can select more than one incident using the Shift or Ctrl key. In the preview pane, do any of the following:

Change the incident type by using the Type list. You can convert an alerting incident to a security incident, and you can convert a security incident to an alerting incident. Change the incident's state by using the State list. Change the user to whom the incident is assigned by clicking Find Users (...) to open the Find Users dialog box. In the Look in Group list, select a user group and then select the corresponding assignee from the group. You can also enter the details of a user and search for the user who can be assigned the incident. To change the Assignee field to Unassigned, click Clear. Change the team to whom the incident is assigned by clicking Find User Groups (...) and selecting the user group. To change the Team field to Unassigned, click Clear. Change the incident's priority or severity, or both, by using the Priority and Severity lists. Stop tracking the events that are associated with an incident. If you uncheck the Domain Tracking check box, you can no longer track the incident. This action is irreversible once you save and exit the Incident Details dialog box.

Click OK.

Merging incidents
If you decide that multiple incidents are about the same issue, you can merge them to reduce your system overhead. When you merge incidents, Information Manager closes the original incidents and creates a new incident. The new incident contains the reference IDs of all of the merged incidents. You can see the list of reference IDs in the new incident's log. When you merge incidents, you have the option of saving the original incidents or deleting them. If you save the original incidents, Information Manager assigns them to the Closed Incident list. You can then view them using the appropriate

294

Managing Incidents Closing an incident

Closed Incident filter: for example, the My Closed Security Incidents filter. Each closed incident includes the reference ID of the new incident into which it was merged. You can see this information in the closed incident's log. To merge incidents

1 2 3 4 5

In the Information Manager console, click Incidents. From the incident filters list, select the view that you want. In the incident list, select the incidents that you want to merge. Click Merge Incidents on the toolbar. In the Create Merged Incident dialog box, change any of the parameters that you want. You must at least select values in all fields that are blank. Blank fields occur when the selected incidents have differing values. For example, if all incident priority values are not the same, the Priority field is blank. You must select a priority for the new incident. You should also type a description for the new incident. To change the Assignee or Team field to Unassigned, click Clear.

If you want to delete the original incidents after the merge, check Delete incidents after merge. If you select this option, the original incidents are closed and deleted from the system. If you do not select this option, the original incidents remain in the system after the merge, and they appear in the Closed Incidents list.

Click OK. A new incident appears at the top of the incident list, and the original incidents are removed from the list. They are either deleted or moved to the Closed Incidents list, depending on your selection in step 6.

See About incident management on page 285.

Closing an incident
You can close an incident when all recommended actions are complete. You can also close multiple incidents at the same time. The history log indicates that those multiple incidents were closed outside of the normal workflow. After you have closed an incident, you can reopen it. Information Manager also lets you close an incident before all actions are complete. In some cases, when you close an incident, correlation may continue for a short period of time until the closing process completes.

Managing Incidents Reopening a closed incident

295

To close an incident

1 2 3 4 5

In the Information Manager console, click Incidents. From the incidents filter list, select the incident view that contains the incident to close. In the incident list, click the incident to close, and then click Close Incident on the toolbar. In the Close Incident window, select a disposition type from the Disposition drop-down list. For example, click Resolved. In the Notes box, type a note regarding the resolution of the incident in the space provided (optional). Information Manager stores your comments in the log.

Click OK. The incident is now closed, and you can view it using the All Closed Incidents view.

See About incident management on page 285.

Reopening a closed incident


Occasionally, you may need to reopen an incident that was previously closed. To reopen a closed incident

1 2 3 4 5

In the Information Manager console, click Incidents. From the incidents filter list, select the incident view that contains the incident that you want to reopen. For example, you may select All Closed Incidents. In the incident list, double-click the incident to reopen. In the State drop-down list, click the appropriate state, such as In-Work. Click the Save icon on the toolbar.

See Closing an incident on page 294.

Printing incident details


Use this procedure to print the details for a specific incident.

296

Managing Incidents Printing the incident, ticket, or asset list

To print incident details

1 2 3 4

In the Information Manager console, click Incidents. Using the Filter drop-down list, select the incident view that contains the incident that you want to print. In the incident list, double-click the incident. In the Incident Details window, click the Print icon on the toolbar. The print output appears in a new browser window.

5 6

On the File menu, click Print. Select your print options, and click Print.

See Printing the incident, ticket, or asset list on page 296.

Printing the incident, ticket, or asset list


Printing an incident, ticket, or asset list is a two-part process:

First, you export the view that you want to a CSV file or an XML file. If you have applied a filter to the list, Information Manager exports only those records that the filter displays. See Exporting the incident, ticket, or asset list on page 296. Then, you print the exported file from another application, such as a Web browser or a spreadsheet program.

Exporting the incident, ticket, or asset list


You can export data from the incidents list to an HTML, a CSV, or an XML file. You can now export selected incidents as well as all the incidents that are displayed in the list. To export the incidents list

1 2 3 4 5

In the Information Manager console, click Incidents. From the incident filters list, select the view that contains the list of incidents that you want to export. To export selected incidents only, select the incidents by holding down the Ctrl key and click on each incident that you want to export. On the top toolbar, click Export. You can select the option for Selected Incidents if you want to export selected incidents only. Else select the default option for All Incidents.

Managing Incidents Exporting the incident, ticket, or asset list

297

In the Export window, select the format for the exported file. You can export the incidents list to an HTML, a CSV, or an XML file on your desktop.

7 8

Click OK. Enter the name for the file and navigate to the destination folder on your desktop. You can also select the character set before you save the list.

Click Save to save the incidents list on your desktop computer.

You can export data from the tickets list to an XML file or a CSV file. After the data is exported to a file, you can print it from a program such as a Web browser or spreadsheet program. To export the tickets list

1 2 3 4

In the Information Manager console, click Tickets. Using the Filter drop-down list, select the view that contains the list of tickets that you want to export. On the top toolbar, click Export. In the Export window, select the format for the exported file. You can export the tickets list to a CSV or an XML file on your desktop.

5 6

Click OK. Enter the name for the file and navigate to the destination folder on your desktop. You can also select the character set before you save the list.

Click Save to save the tickets list on your desktop computer.

You can export data from the assets list to an XML file or a comma-separated values (CSV) file. After the data is exported to a file, you can print it from a program such as a Web browser or spreadsheet program. To export the assets list

1 2 3 4

On the console of the Information Manager, click Assets. Using the Filter drop-down list, select the view that contains the list of assets that you want to export. On the top toolbar, click Export. In the Export window, select the format for the exported file. You can export the assets list to a CSV or an XML file on your desktop.

298

Managing Incidents Assigning incidents automatically to the least busy member in a user group

5 6

Click OK. Enter the name for the file and navigate to the destination folder on your desktop. You can also select the character set before you save the list.

Click Save to save the assets list on your desktop computer.

See About incident management on page 285.

Assigning incidents automatically to the least busy member in a user group


Rules and Monitors can be set to assign incidents automatically to a user group or a user within the user group. You can also set rules and monitors to automatically assign incidents to the least busy member in a user group. Only user groups are considered when incidents are automatically assigned to the least busy member. The member with the lowest incident load factor is considered the least busy member in a user group. See About automatically assigning incidents on page 55. When incidents are assigned automatically to a user group for the first time, the first user in the user group becomes eligible for incident assignment. When an incident gets assigned to a member in the user group, a log entry is created for that incident. In the Incident log, this entry is listed as SSIM against the user name of that member. To assign incidents automatically to the least busy user

1 2 3 4

In the Information Manager console, click Rules. Select a rule or a monitor that must be automatically assigned. On the Actions tab, check Enable Auto Assign. If you want to assign incidents based upon the IP address of the affected target computer, select IP Address or Network options from the Criteria column. Type either an IPv4 or IPv6 address. Any Address is the default option. Retain the default option to ensure that all the occurrences of the incident get assigned irrespective of the IP address.

Managing Incidents Assigning incidents automatically to the least busy member in a user group

299

To assign incidents to an individual user, in the User column, select the user who should be assigned with the incidents. To assign incidents to a group of users, in the User Group column, select the team that should be assigned with the incidents. Check Assign to least busy user. When the rule is deployed, the incidents are automatically assigned to the least busy member in the user group.

300

Managing Incidents Assigning incidents automatically to the least busy member in a user group

Chapter

17

Working with filters in the Incidents view


This chapter includes the following topics:

About filtering incidents Modifying a custom filter Creating a custom filter Deleting a custom filter Searching within incident filtering results

About filtering incidents


You can filter the incident list to display only the incidents that meet specific criteria. In this way, you can use the filter as a query. For example, you can create a filter to find all incidents with a severity of 5. You can also create a filter to find all incidents that are assigned to a particular analyst. All criteria that are selected in the filter must be met for the query to report positive results. Only you can view the filters that you create. Other users are not able to view your filters. See About incident management on page 285.

Modifying a custom filter


After you create a custom filter, you can modify the filter criteria when needed.

302

Working with filters in the Incidents view Creating a custom filter

To modify a custom filter

1 2 3 4

In the Information Manager console, click Incidents. In the left pane, select Custom Filters. In the Custom Incident Filter Editor window, click the name of the filter that you want to change. Modify the filter criteria as you want, and click OK.

See About filtering incidents on page 301.

Creating a custom filter


You can create custom filters, or views, to find and view the incidents that meet user-specified criteria. When you select a custom filter or another view from the Filter drop-down list, Information Manager displays the incidents that match the filter criteria. To create a custom filter

1 2 3 4

In the Information Manager console, click Incidents. In the left pane, click Custom filter. In the Custom Incident Filter Editor window, click Add. In the New Filter dialog box, select either Incident or Alert. This setting determines the filter type.

In the Filter Criteria dialog box, select the filter criteria, and then click OK. The name of the new filter appears in the Filter dialog box, and the incident list displays only the incidents that meet the filter criteria. The name of the new filter also appears under Custom Filters in the Filter drop-down list. An icon next to the filter name indicates whether it is an alerting incident filter or a security incident filter.

In the Enter Filter Name dialog box, type a name for the filter, and click OK.

See About filtering incidents on page 301.

Deleting a custom filter


You can delete a custom filter when it is no longer needed.

Working with filters in the Incidents view Searching within incident filtering results

303

To delete a custom filter

1 2 3 4 5 6

In the Information Manager console, click Incidents. In the left pane, click Custom Filters. In the left pane of the Custom Incident Filter Editor window, click the name of the filter that you want to delete. Click Remove. In the confirmation dialog box, click Yes. Click OK.

See About filtering incidents on page 301.

Searching within incident filtering results


When you display a set of incidents on the Incidents view, you can search for specific incidents within the results. You can use the Look For field to search for the strings and IP addresses that may be used for a particular incident. When you perform a substring search, the search looks in any field in the incident table that uses a string value or IP address. You can also use the Find Incident or Alert dialog to search for a specific incident ID or alert ID. The Find Incident or Alert dialog is opened when you click Search on the top menu of the Incidents view. Each time you perform a substring search using the Search in table field, the search evaluates the original set of data that was returned when the filter was initially applied. To search for a substring or IP address within incident filtering results

In the Information Manager console, click Incidents and display the incidents for which you want to perform the search. You can use the filtering options to identify the dataset. In the Look For text box, type the substring for which you want to search. Click Search, next to the Look For field.

2 3

To search for a specific incident ID or alert ID

In the Information Manager console, click Incidents and display the incidents for which you want to perform the search. You can use the filtering options to identify the dataset. In the top menu bar, click Search.

304

Working with filters in the Incidents view Searching within incident filtering results

3 4

In the Find Incident or Alert dialog box, in the Search for Specific ID: text box, type the ID. Click Search.

See About filtering incidents on page 301.

Section

Working with tickets

Chapter 18. Managing tickets Chapter 19. Working with filters in Tickets view

306

Chapter

18

Managing tickets
This chapter includes the following topics:

About tickets About creating tickets Creating a ticket manually Creating a ticket category Viewing tickets About the Ticket Details window Viewing tickets associated with a specific incident Setting ticket task dispositions Changing the priority of a ticket Adding a ticket note Closing a ticket Printing the ticket list

About tickets
Tickets let you track the work items necessary to resolve an incident. When you create a ticket for an incident, you can designate the tasks that you want to be performed. You can select the tasks that the Symantec Global Intelligence Network suggests, or you can manually enter your own tasks. Tickets are only associated with assets when a task has been entered for the ticket. See About the Ticket Details window on page 310.

308

Managing tickets About creating tickets

About creating tickets


Creating a ticket consists of selecting the incident and entering the ticket information, adding ticket tasks, and adding task instructions. You can also add your own custom tasks.

Creating a ticket manually


Complete these steps to create a ticket manually. To create a ticket

1 2

In the Information Manager console, click Incidents. In the incident list, click the incident for which you want to create a ticket. If you want to assign multiple incidents to the ticket, use the Ctrl key or the Shift key to select the incidents. On the top toolbar, click Create Ticket. In the Create Ticket window, type a summary in the Summary box. From the Priority drop-down list, select a priority for the ticket. In the Category field, click the selection icon and select a category for the ticket. In the Creator area, type your name, email address, and telephone number (optional). In the Assignee area, select the ID of the user to whom you assign the ticket. You can also type the user's name, email address, and telephone number (optional). Add instructions and tasks to the ticket.

3 4 5 6 7 8

To add instructions

1 2

On the Instructions tab, click inside the text pane and type the instructions for the task. If you want to use Global Intelligence Network information to help you write the instructions, click the Add Intelligence to Instructions icon on the toolbar. Then do the following:

In the View by drop-down list, select Target or Vulnerability. If intelligence is available, it appears in the panes at the bottom of the dialog box. Select the appropriate intelligence, and then click Add to Instructions.

Managing tickets Creating a ticket category

309

Click Close.

When you finish adding instructions, click OK.

To add custom tasks

1 2 3 4

On the Tasks tab, click + (the plus icon) on the toolbar. In the Add New Task dialog box, type a task summary in the Summary box. In the Description box, type a description of the task (optional). You may do one of these optional steps:

In the Host Name box, type the host name of the computer where the task should be performed. In the IP Address area, type the IP address of the computer where the task should be performed. You can type an IPv4 address or an IPv6 address. In the MAC address box, type the MAC address of the computer where the task should be performed.

If you want to use Global Intelligence Network information to help you define the task, click the Add Intelligence to Instructions icon on the toolbar. Then do the following:

In the View by drop-down list, select Target or Vulnerability. If intelligence is available, it appears in the panes at the bottom of the dialog box. Select the appropriate intelligence, and then click Add to Tasks. Click Close.

Click OK.

See About tickets on page 307.

Creating a ticket category


By default, you can assign the following categories to a ticket:

Default Patch System Research System

You can also create custom categories using the System view.

310

Managing tickets Viewing tickets

To create a ticket category

1 2 3 4 5

On the System view, in the left pane of the Administration tab, navigate to the relevant domain. Click Help Desk. On the toolbar, click + (the plus icon). In the dialog box, type the name for the new ticket category. Click OK.

See About tickets on page 307.

Viewing tickets
The ticket list provides a convenient preview pane that displays information about the selected ticket. The Details box and several tabs provide all of the information about a ticket. You can also double-click a ticket and view the same information in the Ticket Details window. With proper access rights, you can change information such as status or priority from either the preview pane or Ticket Details window. To view a ticket

1 2

In the Information Manager console, click Tickets. On the top toolbar, select the ticket view from the Filter drop-down list. For example, to view only your open tickets, click My Open Tickets. Note that you can create a custom view by clicking the custom filter (funnel-shaped) icon. See Filtering tickets on page 315.

Double-click a ticket to display detailed information in a new window. See About the Ticket Details window on page 310.

About the Ticket Details window


The Details pane at the top of the Ticket Details window displays the following information:
Ticket ID Summary The unique ID number that is assigned to the ticket when it is created. A summary description of the ticket.

Managing tickets Viewing tickets associated with a specific incident

311

Category

The category of the ticket. The category can be one of the default types, such as Patch System, or a custom category. The status of the incident (Open, Closed, or Not Applicable). A number between 1 and 5 (inclusive) that indicates the level of urgency that is assigned to the ticket (5 is the most serious priority). The time when the ticket was created. The time is displayed in the current client's local time zone and stored in coordinated universal time (UTC) format in the database.

State Priority

Created Time

Modified Time

The time when the ticket data was last edited.

The Creator pane displays the logon ID of the ticket creator and contact information. The Help Desk Assignee pane displays the ID of the person to whom the ticket is assigned, along with contact information. At the bottom of the window, you can see the Incidents, Tasks, Instructions, and Log panes, which are accessible by clicking on their respective tabs:
Incidents Displays the information about the incidents that are associated with the ticket. You can also add and remove incidents by clicking the + and - icons in the taskbar. Displays any required tasks that have been associated with the ticket. When you associate a task with a specific IP address of an asset, the asset displays the ticket on the Tickets tab. You can also add and remove tasks by clicking the + and - icons in the taskbar. Displays any additional user-defined instructions that have been associated with the ticket. You can also add and remove instructions by clicking the + and - icons in the taskbar. Displays the history of activity that is related to the ticket. Some activities such as ticket creation are automatically logged. You can also add a note to the ticket by clicking the + icons in the taskbar.

Tasks

Instructions

Logs

See About tickets on page 307.

Viewing tickets associated with a specific incident


You can search for a ticket by using the Search by Ticket ID box on the Tickets view. You do not have to type the entire ID number; Information Manager searches for substrings.

312

Managing tickets Setting ticket task dispositions

Another way to view tickets information is to use the Incidents view. The Tickets tab in the Incident preview pane lets you view the tickets that are associated with a specific incident. See About the Ticket Details window on page 310. To view the tickets associated with a specific incident

1 2 3 4

In the Information Manager console, click Incidents. In the incident list, click the incident. In the Incident preview pane, click the Tickets tab. To view detailed information about a ticket, double-click the row that you want in the list of tickets.

Setting ticket task dispositions


You can set a disposition to indicate the completion status of a task for a ticket. This field helps you track the progress that has been made to resolve the incident. To set a ticket task disposition

1 2 3 4 5

In the Information Manager console, click Tickets. In the ticket list, click the ticket. In the Ticket Details view, on the Tasks tab, double-click the task for which you want to set a disposition. In the Edit Task Disposition window, select a disposition from the drop-down list. Click Apply. The new disposition appears in the Disposition column.

Click OK.

See Viewing tickets associated with a specific incident on page 311.

Changing the priority of a ticket


You can change the priority of a ticket when ticket tasks are completed or when new incidents occur. To change the priority of a ticket

1 2

In the Information Manager console, click Tickets. In the ticket list, click the ticket.

Managing tickets Adding a ticket note

313

3 4

In the Ticket Details view, in the Priority box, select the priority. Click Save.

See About tickets on page 307.

Adding a ticket note


Information Manager automatically keeps a log of the creation or modification of a ticket. You can add notes or comments to a ticket's log. This is helpful in tracking the progress of a ticket task. To add a ticket note

1 2 3 4 5 6

In the Information Manager console, click Tickets. In the ticket list, click the ticket. In the Ticket Details view, on the Log tab, click Add a note to the log for this ticket. In the Add Ticket Note window, type the note. Click Save. In the Ticket Details window, click OK.

Closing a ticket
You can close a ticket when you are finished working on it. You can view closed tickets by selecting one of the Closed Tickets views in the Filter drop-down list. You can also reopen a closed ticket. To close a ticket

1 2 3 4 5 6 7

In the Information Manager console, click Tickets. In the ticket list, click the ticket. In the Ticket Details view, in the State pull-down menu, click Closed. Click OK. In the Ticket Disposition window, select a disposition for the ticket from the Disposition drop-down list. Optionally, type a note in the Notes box. Click Save.

314

Managing tickets Printing the ticket list

Printing the ticket list


Printing the ticket list is a two-part process:

First you export the view that you want to a file. If you have applied a filter to the ticket list, Information Manager exports only those tickets that the filter displays. Then you print the exported file from another application, such as a Web browser or a spreadsheet program.

See Exporting the incident, ticket, or asset list on page 296. See Viewing tickets on page 310.

Chapter

19

Working with filters in Tickets view


This chapter includes the following topics:

Filtering tickets Modifying a custom ticket filter Deleting a custom ticket filter

Filtering tickets
When you manage tickets, you need to search for a specific set of data. You can use the ticket list filter as a query to display only those tickets that meet your criteria. For example, you can create a filter to find all tickets with a severity of 5. You can create a filter to find all tickets that are assigned to a particular analyst. The query reports positive results if all of the selected criteria is met. You can view only the filters that you create. Other users are not able to view your filters. Additionally, note that filters are not case sensitive and do not support wildcard characters. See About tickets on page 307. To create a custom ticket filter

1 2 3

In the Information Manager console, click Tickets. On the top toolbar, click the custom filter (funnel-shaped) icon. In the Custom Ticket Filter Editor dialog box, click Add.

316

Working with filters in Tickets view Modifying a custom ticket filter

In the New Filter dialog box, select the filter criteria for the following options:
Assignee Category The name of the person who is assigned to the ticket. The category of the ticket. The category can be one of the default types (such as Patch System), or a custom category. The date range when the ticket was created. The individual who created the ticket. A word or group of words from the ticket's overall instructions. The date range when the ticket was modified. A number between 1 and 5 indicating the priority that is assigned to the ticket (5 is the most serious). A word or group of words from the ticket's summary box. The status of the ticket. The ID of the ticket.

Created Time Creator Instructions

Modified Time Priority

Summary State Ticket ID

5 6

In the New filter name dialog box, type the name of the custom filter, and then click OK. Click OK.

Modifying a custom ticket filter


Complete the following steps to modify a custom ticket filter. To modify a custom ticket filter

1 2 3 4 5

In the Information Manager console, click Tickets. On the top toolbar, click the custom filter (funnel-shaped) icon. In the left pane, click the filter that you want to modify. In the right pane, modify the filter criteria. Click OK.

See Filtering tickets on page 315.

Working with filters in Tickets view Deleting a custom ticket filter

317

Deleting a custom ticket filter


You can delete a custom filter when it is no longer needed. To delete a custom ticket filter

1 2 3 4

In the Information Manager console, click Tickets. On the top toolbar, click the custom filter (funnel-shaped) icon. In the left pane, click the filter that you want to delete. Click Remove.

See Filtering tickets on page 315.

318

Working with filters in Tickets view Deleting a custom ticket filter

Chapter

20

Working with Assets


This chapter includes the following topics:

About the Assets view Importing assets into the Assets table

About the Assets view


The Assets view lets you view and manage Information Manager assets. You can use the Assets view to identify critical assets in your environment and to track the incidents and the tickets that are related to those assets. You can export the assets data in CSV and XML formats by using the export icon. You can identify the network assets that have one or more of the following attributes:

Host critical information or services Host confidential information Have specific roles on the network, such as firewall or vulnerability scanning devices. Require high availability Comply with policies such as Sarbanes-Oxley or HIPAA.

The Correlation Manager uses the asset information to identify and prioritize incidents. The Correlation Manager creates an incident when an asset's vulnerabilities are exploited by a threat. The Correlation Manager sets the incident priority based upon the confidentiality, integrity, and availability ratings that you assign to the asset. The correlation rules depend upon the asset information, so identifying key network assets on the Assets view is a critical configuration step.

320

Working with Assets About the Assets view

You can populate the list of assets in any of the following ways:

Manually add entries in the Assets view. Create assets based upon computers in the Targets tab for an incident on the Incidents view. Create assets from the query results of the Source View query and Target view query that are under the System Queries on the Events view. On the Assets view, import a list of assets in XML or CSV format. For example, you can export a list of network computers from Active Directory, convert the file to Information Manager format, and then import the file. Create assets by integrating Information Manager with a policy compliance assessment tool, such as Control Compliance Suite. Create assets by integrating Information Manager with a network vulnerability scanner. You can use the Asset Detector rule under Monitor > System Monitors on the Rules view to choose the vulnerability scan products that automatically populate the assets table. Because you may run vulnerability scans periodically on your network, you may want to lock the asset information for particular computers. If you lock an asset, the vulnerability scan does not modify the list of the services that are hosted on the asset. A vulnerability scan updates the asset vulnerabilities, regardless of the asset lock status.

You can filter the view of the assets in your environment using the filtering options or asset groups. From each of the views, you can search for an asset by its IP address host name by entering the information in the Search Asset field, and then clicking the search icon. Double-clicking an asset in the asset list opens the Asset Details dialog box. To update the asset, modify the asset fields and click the Save icon. You can update multiple assets simultaneously by opening an Asset Editor dialog box for each asset that you want to modify. Table 20-1 lists the Asset view tabs and their functions. Table 20-1 Tab
Details

Assets view tabs Description


Displays the network identification, description, priority, organization, operating system, and lock information for the selected asset.

Working with Assets Importing assets into the Assets table

321

Table 20-1 Tab


Policies

Assets view tabs (continued) Description


Displays any policies that apply to the selected asset. You can add policies to an asset from a customizable list of regulatory policies. To customize the list of available policies, select the Administration tab on the System view. You can also delete policies from the asset. Displays the network services that are hosted by the selected computer. You can add services to an asset from a customizable list of well-known services. To customize the list of services, select the Administration tab on the System view. You can also delete services from the asset. Lists any incidents that pertain to the selected asset. The incident list provides a convenient way to monitor the security activity that is related to an asset. Lists any tickets that pertain to the selected asset. The ticket list provides a convenient way to monitor work-order activity that is related to an asset. Displays the discovery date, CVE ID, BugTraq ID, and description of the vulnerabilities that are discovered on the asset. The vulnerability information is tracked when the assets are imported from a vulnerability scanner.

Services

Incidents

Tickets

Vulnerabilities

Importing assets into the Assets table


You can use a comma-separated value (CSV) file or an.XML file to import asset information into the Assets table. Note: If you import assets using a CSV file, policy and services information is not included during the import. To retain this information for the assets that are already listed in the console, export the assets to an XML file. Use the XML file to re-import the assets. The XML files that Information Manager generates include any existing policy and services data that is available for each asset. The CSV files do not include this information.

322

Working with Assets Importing assets into the Assets table

To import assets into the Assets table

Create a CSV file containing comma-separated values using the appropriate format. To see the correct format, create an asset in the Asset table, and then export the asset list as a CSV file. Use the exported list as a template for adding assets to the file. If you use the Active Directory Users and Computers snap-in that Microsoft provides, export the list of computers that Active Directory tracks. Save the file as a CSV file.

2 3

In the Information Manager console, on the Assets view, click Import. In the Import Assets dialog box, navigate to the folder in which you saved the assets file, select the file, and click Open. If you import a set of assets that includes non-UTF-8 character data, you must select the appropriate set from the Character Set drop-down list.

Follow the on-screen instructions.

See About the Information Manager console on page 23.

Section

Working with reports and dashboards

Chapter 21. Managing reports Chapter 22. Managing dashboards

324

Chapter

21

Managing reports
This chapter includes the following topics:

Working with reports Performing a drill-down on reports

Working with reports


You can create your own customized reports by inserting queries, graphics, and other elements in a report template. Then you can publish, print, and schedule them for email delivery to specified recipients. You can also import and export reports.

About reports
You can create your own customized reports by inserting queries, graphics, and other elements in a report template. Then you can publish, print, and schedule them for email delivery to specified recipients. You can also import and export reports. You can also schedule the queries that can be distributed as reports in the CSV format. See Scheduling queries that can be distributed as reports on page 248.

Creating custom reports


You can place a single query in a report, or you can insert multiple queries. Each query can be on a separate page, or you can divide a single page into sections and insert one query in each section. You can also insert other elements, such as text and graphics. Reports are limited to 1,000 pages. If the report is longer than 1,000 pages, the results are truncated.

326

Managing reports Working with reports

Note: If you plan to publish and distribute the report to other users, you must select a query from Published Queries. In the Query Chooser window, you can drag a query from the My Queries folder to the Published Queries folder. Table 21-1 describes the formatting options that you can use when you create a custom report. The options appear on a menu when you right-click the report template. Each menu option has a corresponding icon on the report design toolbar. Table 21-1 Option
Insert Text

Report building options Description


To include generated text, such as the date the report was generated, make a selection from the Report Parameters drop-down list, and click Add. To include your own text, type in the text box.

When you finish, click OK. Browse to the location of the image. After you select the desired image, click OK.

Insert Image

Note: You may insert only the JPG and the GIF files that
are 100 KB or less. Information Manager does not support BMP or other image files in reports. Insert Line This option inserts a horizontal line in the center of the selected area of the report. In the Query Chooser window, navigate to the name of the desired query, and select it. Click Insert. (This option is not available when the cursor is in the header or the footer area.)

Insert Query

Note: If you plan to publish and distribute the report to other


users, you must select a query from Published Queries. In the Query Chooser window, you can drag a query from My Queries to Published Queries. If the query that you want is not available, you can use the Query Wizard on the Events view to create a query. See the section on managing event archives for more information. Add Grid Select the number of rows and columns, and then click OK. An empty grid appears in the selected area. You can select any section of the grid and insert text, images, and so on. You can also size any section of the grid by dragging the borders of the section.

Managing reports Working with reports

327

Table 21-1 Option


Add Row

Report building options (continued) Description


This option subdivides the selected area by inserting a blank row. You can also size the row by dragging its borders. This option subdivides the selected area by inserting a blank column. You can also size the column by dragging its borders. This option toggles the header or the footer from on to off or from off to on. The cursor must be in the header or the footer area. This option changes the orientation of the report to Portrait mode. This option changes the orientation of the report to Landscape mode.

Add Column

Toggle Header/Footer

Portrait

Landscape

To create a custom report

1 2 3

In the Information Manager console, click Reports. In the Explorer pane, right-click the folder where you want to create the new report, and select New > Report. Type the name for the report, and click OK. The name can contain only alphanumeric characters. An empty report template appears, with three sections: header, footer, and body in the center.

Do any of the following:

To insert a header, right-click in the header area, and then use the formatting options that are described in Table 21-1. To insert the query (or multiple queries) and any desired images and text, right-click the body area. Then use the formatting options that are described in Table 21-1. To insert a footer, right-click in the footer area, and then use the formatting options that are described in Table 21-1. To add a new page to the report template, click the Add a Page icon on the report design toolbar. To return to a previous page, click the View All Pages icon, and then double-click the page that you want to display.

328

Managing reports Working with reports

To modify any of the properties of the report, use the Properties pane in the lower-left area of the Reports page. Click the Value column for the property that you want to change. The available properties depend on the elements that you have placed in the report area. The following are examples of the properties that you can modify:

If you insert a query, the available properties depend on whether the data displays as a graphical chart or as a table. If the query is graphical, you can select the type, for example, bar or pie. If the query is tabular, you can select the columns that you want to include in the table. You also can select the desired font and type size of the text. If you insert text in the report body, header, or footer, you can modify the font size of the text. If you insert a line, you can modify the default thickness, color, direction (orientation), and alignment of the line. If you add a grid, you can specify the background color of each segment of the grid.

To execute the query and preview the appearance of the report, click the Preview tab. While on the Preview tab, you can print or save the report with the data that is currently displayed. See Printing and saving reports on page 337.

When you finish creating the report, click the Save icon on the top toolbar.

See Viewing reports on page 335.

Creating a report group or folder


You can create new folders under the existing folder hierarchy to save the reports. To create a report group or folder

1 2 3 4

In the Reports view, select the folder under which you want to create another folder. Click the New Folder icon on the menu bar. In the New Folder dialog box, type the name of the folder and its description. Click OK.

See Creating custom reports on page 325.

Managing reports Working with reports

329

Editing tabular queries in reports


A tabular query displays data in table form. When you create or edit a query, you can specify the columns that you want the table to display. However, if you later place that query in a report, the column changes do not persist. You must insert the query in the report, and then add and remove table columns. After you save the report, the column changes persist in that report. Note: If you add columns to a tabular query, the columns on the rightmost side of the table may become illegible due to lack of space. You can view more columns by reducing the size of the text in the table. To reduce the size of the text in the Table, in the Properties pane, click the Value column next to Content Font. Then select a smaller font. Do the same action for the Header Font value. To edit a tabular query in a report

1 2

To design the report, perform the steps in the procedure After you insert the query in the report, double-click the query icon in the body of the report (on the Design tab). The Edit Display Properties dialog box appears.

Do one of the following:

In the Choose Columns pane, select the names of the columns that you want to add to the query table and click Add. In the Columns to Display pane, select the names of the columns that you want to remove from the query table and click Remove. Use the Move Up and Move Down icons to arrange the columns in the desired sequence. The column at the top of the list appears on the far-left side of the table.

4 5 6

When you finish selecting and sequencing the columns, click OK. To preview the appearance of the report, click the Preview tab. When you finish designing the report, click the Save icon on the top toolbar.

See Creating custom reports on page 325.

Publishing reports
To publish a report, you must place it in the Published Reports folder or in a subfolder under Published Reports. If you create the report in the Published Reports folder, it is already available for distribution. If you create the report in the My Reports folder, use the following procedure to publish it.

330

Managing reports Working with reports

Note: If a report contains any private queries, you cannot publish it. The queries in publishable reports must be from the Published Queries folder. To publish a report

1 2 3

In the Information Manager console, click Reports. In the Explorer pane, navigate to the report in the My Reports folder that you want to publish. Do one of the following:

Right-click the report name, and then select Publish. To place the report in a subfolder within the Published Reports folder, drag the report from My Reports to the desired folder under Published Reports.

Click Yes to confirm that you want to publish the report. The report is removed from the private folder and placed in the published folder that you selected.

See Creating custom reports on page 325.

Enabling the email distribution of reports


To distribute reports, you must have an Information Manager configuration that is set up to send email notifications. This setup process includes the following components:

Creating a configuration Defining a mail server in the configuration

Note: Web-based email accounts and the accounts that require authentication are not supported. To create a configuration

1 2 3

In the Information Manager console, click System. On the Product Configurations tab, expand the tree in the left pane to SSIM Agent and Manager > Manager Components Configurations. On the toolbar, click + (the plus icon).

Managing reports Working with reports

331

Follow the on-screen instructions in the Create a new Configuration wizard. When you are prompted, in the Computers panel, add the Information Manager server that is used. When the wizard finishes, click Close. The new configuration appears in the tree in the left pane, under Manager Components Configurations.

To define a mail server in an Information Manager configuration

1 2 3 4 5 6

On the System view, in the left pane of the Product Configurations tab, click the name of the new configuration. In the right pane, click the Notifications tab. In the Value column next to Email server, type the name of the mail server. Next to Email from user in the Value column, type an email address to receive messages in case of any notification failures. Click Save at the bottom of the right pane. In the left pane, right-click the configuration name, and then click Distribute. The configuration changes are distributed to the Information Manager server.

See Scheduling and distributing reports on page 331.

Scheduling and distributing reports


After you create and publish a report, you can distribute it immediately. You can also schedule it for distribution in the future. You specify the recipients and the frequency to receive the reports. For example, the frequency can be once each week. You can distribute the reports as a PDF and an RTF attachment. You can send the URL link for accessing the reports from the server in an email. Reports for scheduled queries can be distributed as an attachment only in the CSV format. When you distribute a report on a schedule or immediately, a copy of the report is posted on the Web configuration interface of Information Manager. A valid user can view that report by selecting the Standard Reports option under Manage > Reports on the Web configuration interface of Information Manager. See To view a report in the Information Manager Web interface on page 336.

332

Managing reports Working with reports

Note: To distribute reports to users by email, Information Manager must be properly configured to send notifications to a valid mail server. To distribute a report immediately

1 2 3 4

In the console of the Information Manager client, click Reports. In the Explorer pane, under Published Reports, click the name of the report that you want to distribute. In the right pane, click the Distribute tab. In the Distribute Report area, click Recipients, and then click one of the following:
Email address In the Email Entry dialog box, type an email address, and then click OK. In the Find Users dialog box, select one or more names from the Available users list. Click Add.

User

When you finish adding user names to the Selected users list, click OK.

Note: The user must have an email address defined on the


Notifications tab in the user profile. See the chapter on managing users in the Symantec Security Information Manager Administrator Guide. User group In the Find User Groups dialog box, select one or more names from the Available user groups list. Click Add.

When you finish adding user names to the Selected user groups list, click OK.

Note: Each user in the user group must have an email address
defined on the Notifications tab in the user profile. See the chapter on managing users in the Symantec Security Information Manager Administrator Guide.

The report is always posted and available on the Web configuration interface of Information Manager under Manage > Reports > Standard Reports. It is available in this location even if you do not specify any recipients. Users who have access to this view can view the reports in a Web browser.

In the Subject and Body text boxes, type text if desired.

Managing reports Working with reports

333

Select from the following options as required:


URL Link Places a link in the email message. When the recipient clicks the link, the report is displayed in a browser window.

Note: When the recipient clicks the URL link, the report can
be accessed directly. Note that the user must already be logged on to the Web configuration interface using the host name of the Information Manager. If the user has logged on using the IP address of the Information Manager, the user is prompted for authentication; the report is then accessible. PDF Attachment Sends the report, in Portable Document Format (PDF), as an attachment to the email. To send the report by email, be sure that the PDF file is no more than 15 MB in size. RTF attachment Sends the report, in RTF format as an attachment to the email. To send the report by email, be sure that the compressed RTF file is no more than 15 MB in size.

Click Test. A dialog box confirms that the report was sent to the selected recipients.

Click OK.

Note: No restriction exists regarding the size of the compressed RTF files or the PDF files that are available under Manage > Reports > Standard Reports. To schedule a report

1 2 3 4

In the console of the Information Manager client, click Reports. In the Explorer pane, under Published Reports, click the name of the report that you want to schedule for distribution. In the right pane, click the Distribute tab. In the Create a report area, do the following:

Select the frequency of distribution: Day, Week, or Month. Select the time of distribution by using the drop-down lists and by selecting either AM or PM.

Use the spinner boxes or the calendar icons to select the Starts on date and time, and the Ends by date and time.

334

Managing reports Working with reports

In the Distribute Report area, click Recipients, and then click one of the following:
Email address In the Email Entry dialog box, type an email address, and then click OK. In the Find Users dialog box, select one or more names from the Available users list. Click Add.

User

When you finish adding user names to the Selected users list, click OK.

User group

In the Find User Groups dialog box, select one or more names from the Available user groups list. Click Add.

When you finish adding user names to the Selected user groups list, click OK.

7 8

In the Subject and Body text boxes, type text if desired. Select from the following options as required:
URL Link Places a link in the email message. When the recipient clicks the link, the report is displayed in a browser window.

Note: When the recipient clicks on the URL link, the report
can be accessed directly. Note that the user must already be logged on to the Web configuration interface using the host name of the Information Manager. If the user has logged on using the IP address of the Information Manager, the user is prompted for authentication; the report is then accessible. PDF Attachment Sends the report, in Portable Document Format (PDF), as an attachment to the email. Sends the report, in RTF format as an attachment to the email.

RTF attachment

Click Schedule.

10 Click OK.
Note: Reports for scheduled queries can be distributed only as follows: as an attachment in the CSV format and a URL link that lets you access the report from the server.

Managing reports Working with reports

335

Modifying the report distribution


You can change the recipients and the schedule for report distribution. To modify the report distribution

1 2 3 4 5

On the Reports view, in the Explorer pane, navigate to the report whose distribution plan you want to modify. Select the report, and click the Distribute tab. At the bottom of the right pane, click Cancel to cancel the existing report distribution plan. Modify the schedule and the recipients, as necessary. You can also change any other fields. When you finish making changes, click Schedule.

See Scheduling and distributing reports on page 331.

Viewing reports
You can view a report in the following ways:

In the console of the Information Manager client (as a preview) In the Information Manager Web interface under Manage > Reports > Standard Reports In the Information Manager Web interface under Manage > Reports > Scheduled Query Reports In PDF format, if you received the report as an attachment to an email message In RTF format, if you received the report as an attachment to an email message In HTML format In a compressed CSV file, if you received the report as an attachment These reports are generated as a result of scheduled queries. By accessing a URL link that is received through email

336

Managing reports Working with reports

Note: The chosen display type for a group or a system query may affect the results that are displayed on the console of Information Manager and the Information Manager Web interface. For example, you may run a query that is copied from the System Queries folder of the type Count by Condition, such as Open Incidents by Assignee Priority. The chart type is table and the Rotate Data chart property is selected. The condition column name (Assignee Priority) does not appear in the results table. Therefore, you must deselect the Rotate Data option for the query to ensure that the results are displayed properly.

Note: When you access standard reports in the Information Manager Web interface, the RTF format is not supported for certain reports. The RTF format is not supported for the reports that have been distributed on the Information Manager versions that were released before 4.6 MP4. To obtain these reports in RTF format, manually click the Test option that is available in the Distribute tab on the console. Alternatively, wait until the next scheduled run of the report. To view a report in the console of the Information Manager client

1 2 3 4

In the console of the Information Manager client, click Reports. In the Explorer pane, click the report that you want to view. For multipage reports, use the navigation icons on the Preview tab to move between the pages. To refresh the data in a report, click the Refresh icon in the top toolbar. By default, the report presents the data from the time when it was created or last refreshed.

To view a report in the Information Manager Web interface

1 2

In the Information Manager Web interface go to Manage > Reports. Click Standard Reports if you want to view the standard published reports. If you want to view the reports for scheduled queries, then click Scheduled Query Reports. In the list of reports, navigate to the row that corresponds to the report that you want to view. You can use the Search in table field to filter the report list. Place a checkmark next to the file name in the box provided.

On the navigation bar, click one of the following:

View HTML icon.

Managing reports Working with reports

337

This option lets you view the report in an HTML format.

View PDF icon. This option lets you view the report in PDF format. View RTF icon. This option lets you view the report in RTF format.

If you have selected Scheduled Query Reports in the previous step, the reports are available only in a compressed CSV file after you click the View CSV icon.

When you finish viewing the report, close the browser window.

See Configuring a report for portrait or landscape mode on page 337.

Configuring a report for portrait or landscape mode


You can configure the orientation of a report to be in either portrait mode or landscape mode. When you configure the orientation for a report, the setting applies to all of the pages in that report. To configure a report for portrait or landscape mode

1 2 3 4

In the Information Manager console, click Reports. In the Explorer pane, click the name of report that you want to adjust. On the Design tab, click either the Portrait or Landscape icon. If you are in View All Pages mode, you must first open a single page to enable the icons. Click Save.

See Viewing reports on page 335.

Printing and saving reports


After you create a report, its name is displayed in the Explorer pane, under the appropriate folder name. You can run a report and then save the output as a file. You can also print the output. To print or save a report

1 2 3 4

In the Information Manager console, click Reports. In the Explorer pane, click the name of report that you want to print or save. To execute the query or queries in the report, click the Preview tab. To save the report with the displayed data, do the following actions:

On the Preview toolbar, click the Save icon.

338

Managing reports Working with reports

In the Save dialog box, type a name in the File Name box. In the Files of Type box, select PDF or HTML. Click Save.

To print the report with the displayed data, do the following:


On the Preview toolbar, click the Print icon. In the Print dialog box, select your print options. Click OK.

See Viewing reports on page 335.

Exporting reports
You may export a report as an RML file. This feature enables you to send the report to another user: for example, as an email attachment. The user can then import the report, edit it, and save it as a private or a published report. It also enables you to save a report under a different name, and then import it to use as a template for another similar report. See Importing reports on page 339. Note: Information Manager does not support exporting reports to a different Information Manager domain. Each query has a unique ID that points to the Information Manager server on which it was created. If you export a report and import it to a different server, the queries are not attached to the report. If you design a report on one Information Manager server, you can export it as a template. After you import it to a different server, you can insert the desired query or queries. To export a report

1 2 3 4

In the Information Manager console, click Reports. In the Explorer pane, select the report that contains the data that you want to export. Right-click the report name, and then click Export. In the Export Report dialog box, do the following:

Navigate to the location where you want to save the report. In the File Name box, type the name of the report.

Managing reports Performing a drill-down on reports

339

If you want to use this report as a template for a new report, change the report name.

Click Save.

Importing reports
You can import a report that was exported as an RML file. You can then modify the report and save it in My Reports or Published Reports. See Exporting reports on page 338. Note: Information Manager does not support importing the reports that were created in a different Information Manager domain. Each query has a unique ID that points to the Information Manager server on which it was created. If you export a report and import it to a different server, the queries are not attached to the report. If you design a report on one Information Manager server, you can export it as a template. After you import it to a different server, you can insert the desired query or queries. To import a report

1 2 3 4

In the Information Manager console, click Reports. In the Explorer pane, select the folder into which you want to import the report. Right-click the folder name, and click Import. In the Import Report dialog box, navigate to the location where the report is stored, and select it. You can import multiple reports by using the Shift or Ctrl keys. Click Open. If you selected a report with the same name as another report in the folder you selected, Information Manager prompts you to rename the report. Assign a new name, and click OK.

5 6

Performing a drill-down on reports


To identify the critical incidents and threats in your environment, Information Manager lets you drill down into the reports. Use the drill-down feature to view the resources and the parts of the organization that are associated with an incident.

340

Managing reports Performing a drill-down on reports

The drill-down feature lets you search and prioritize specific assets. This capability simplifies organization and helps you monitor identity and access activities. The drill-down feature is supported only on the following types of queries in the reports:

Top N by Field Trending for Top N by Field Summary Data Queries

The drill-down feature for reports is available only on the console of the Information Manager client. To drill down on reports

1 2

In the console for the Information Manager client, click Reports. Select the report that you want to run from the folders that are displayed. The report queries are executed and the results are displayed on the details pane. Preview the report using the Preview tab.

3 4

In the graphs that are displayed, double click on the graph that you want to drill down. The details are displayed in a tabular view in the details pane.

You can use a filter to get further details based on the filter criteria selected. To filter the results using a filter criteria

Click the graph that is displayed when you select a report to run. The query results table is displayed under the graph in a new window. Click the Filter icon on the taskbar.

2 3 4 5 6 7

In the Filter dialog box, select the time criteria in the Time range area. In the Date/Time area, select Logged Date/time or Event Date/Time. In the Query filter criteria area, click the + icon, which lets you add and select the fields for the filter criteria. If you have specified more than one criteria, use the first drop-down list to select the OR or the AND criteria. In the next column, select or enter the value for the condition specified. Click OK.

Managing reports Performing a drill-down on reports

341

To add more than one criteria, click the + icon to add another criteria. Click the - icon if you want to remove a selected criterion.

Click OK. Click Cancel if you want to cancel the filter criteria process. The filter query is run and the results are displayed.

342

Managing reports Performing a drill-down on reports

Chapter

22

Managing dashboards
This chapter includes the following topics:

About the dashboard Viewing dashboards Viewing queries in the Dashboard Performing a drill-down on dashboards Refreshing the dashboard Customizing the dashboard

About the dashboard


The Information Manager dashboard provides an at-a-glance summary of the status of security products on your network. You can also track the status of mission-critical network resources. You can add the default queries or custom queries that use events and the other data that is stored in the server database. The dashboard provides a high-level view of the critical security information in your environment. Information Manager users can customize the dashboard to display the event, ticket, and incident information that they require. The Dashboard view provides an overview of the incident activity that is presented in the following default set of queries:

Closed incident count for each assignee by priority Closed incident count for each assignee by severity Open incidents count for each assignee by severity Open incident count for each assignee by priority

344

Managing dashboards Viewing dashboards

Count of both open incidents and closed incidents by assignee Count of incidents for each of the last seven days

The toolbar of the Dashboard view presents the following options:


Refresh Turn Auto Refresh On Refreshes the queries Toggles the automatic refresh of the dashboard queries. When Auto Refresh is on, the dashboard queries are refreshed every five minutes, by default. Add Delete Lets you add a new query to the dashboard. Lets you remove a query from the dashboard. You can also remove the query by closing the query window. Tile Cascade Tiles the dashboard charts. Cascades the dashboard charts.

See Viewing dashboards on page 344. See Customizing the dashboard on page 348. See Refreshing the dashboard on page 347. See Viewing queries in the Dashboard on page 346. See Performing a drill-down on dashboards on page 346.

Viewing dashboards
You can view the dashboards in the Dashboard view. To view the dashboards

1 2

In the console of the Information Manager client, click Dashboard. For some bar and pie charts based on event data, you can click on each section to view the events that are related to that section of the query. To determine whether a query is drillable, hold the cursor over a region of the graph (for example, a bar in a bar chart). If a hand symbol appears, you can click on the bar to drill down. The events appear in a table under the chart. When working with event data, you can do any of the following:

Managing dashboards Viewing dashboards

345

View details on a single event by right-clicking the event. Then click Event Details. Filter the events that are shown in the display by right-clicking on an event and then clicking one of the filtering options. See To filter event data based on a single event on page 345. See To create a custom filter based on an event on page 345. Create an incident based on an event by right-clicking the event and then clicking Create Incident.

To filter event data based on a single event

In a table containing event data, right-click on the cell that has the information that you want to filter on, and then click Filter on cell. For example, if you want to filter on all events that have a severity 4 - Major severity, click a cell that has that rating in the Severity column.

The list of events that meet the criteria of your filter appears in a new tab. Note that you can filter again on the events in the new tab. To create a custom filter based on an event

In a table containing event data, right-click on the cell that has the information that you want to filter on, and then click Manually filter on cell. For example, if you want to filter on all events that have a severity 4 - Major severity, click a cell that has that rating in the Severity column. The Event Filter window appears, showing the current filter conditions.

In the Time Range area, specify the period of time that you want the filter to cover. Choose Complete if you want to select from all of the events in the query. In the Filter Criteria area, specify the query conditions:

To change an existing condition, click in the cell, and then choose a value from the drop-down list. To add a condition, click + (the plus sign), and then click in each cell to select or type the desired value. To remove a condition, click anywhere in the row, and then click - (the minus sign). To change the grouping of criteria, use the Ctrl key to select the relevant rows, and then click AND, OR, or Ungroup.

Click OK. The list of events that meet the criteria of your filter appears in a new tab. Note that you can filter again on the events in the new tab.

346

Managing dashboards Viewing queries in the Dashboard

See About the dashboard on page 343.

Viewing queries in the Dashboard


Complete the steps in this section to view a query and insert it on the dashboard. To view a query

1 2 3 4

In the Information Manager console, click Dashboard. On the toolbar, click + (the plus icon). In the Query Chooser window, navigate through the tree and click the query that you want to display. For the query you choose, set any of the required parameters, such as selecting the archives that you want to gather information from, and click Run Query. The data graph appears in the Query Chooser window.

Do any of the following:


To place the query on the dashboard, click Insert. To try a different query, click the query name in the left pane. To see if there are any changes to the list of available queries, click the Refresh icon on the toolbar.

Performing a drill-down on dashboards


To identify the critical incidents and threats in your environment, Information Manager lets you drill down into the reports and dashboards. Using the drill-down feature, you can view the resources that are associated with an incident. The drill-down provides insights into the parts of the organization that an incident affects and the background of the resources that are implicated. The drill-down feature helps simplify organizing, searching, and prioritizing specific assets or sets of assets. This information helps in monitoring identity and access activities. The drill-down feature is supported only on the following types of queries in the reports and dashboards:

Top N by Field Trending for Top N by Field Summary Data Queries

The drill-down feature for reports is available only on the console of the Information Manager client.

Managing dashboards Refreshing the dashboard

347

To drill down on dashboard results

1 2 3

In the console of the Information Manager client, on the Dashboard view, click on the dashboard to view. In the graphs displayed, double click the graph that you want to examine. The details are displayed in a tabular view in the details pane.

See About the dashboard on page 343.

Refreshing the dashboard


By default, the dashboard updates when you open the console or when you click the Refresh icon. You can also turn on Auto Refresh so that dashboards are automatically refreshed at a regular interval. To enable the automatic refresh function, click the Auto Refresh icon on the toolbar. If a query is running when the Auto Refresh interval expires, the query continues to run, even though the dashboard is refreshed. The same is true if you do a manual refresh. The default Auto Refresh interval is five minutes. You can change this interval. However, refreshing more frequently can cause performance issues on the server because system resources are used every time a query is executed. Note: You must close all the Information Manager console sessions before setting the Auto Refresh interval. To change the Auto Refresh interval

Access the clientproperties.xml file in the usersettings folder located at


C:\Documents and Settings\<username>\Application Data\Symantec\Security Information Manager.

Add or edit the following entry:


<dashboard> <auto_refresh>interval</auto_refresh> </dashboard>

where interval is the number of seconds between refreshes.

3 4

Save and close the clientproperties.xml file. Restart the Information Manager console to enable the change.

See About the dashboard on page 343.

348

Managing dashboards Customizing the dashboard

Customizing the dashboard


You can customize your dashboard by adding and removing queries. You can also rearrange the queries by moving them on the dashboard and by using the Tile and Cascade options. See Viewing queries in the Dashboard on page 346. To remove a query from the dashboard

1 2 3

In the console of the Information Manager client, click Dashboard. Scroll within the dashboard until you find the query that you want to remove, and click within the query to select it. Click x (the cross icon) that appears on the upper right side of the query window to close the query.

To rearrange the dashboard

1 2

In the console of the Information Manager client, click Dashboard. To move a query, click in the query's title bar, and then drag it with the mouse to the desired location on the dashboard. You can place the query in a blank space on the dashboard, or you can place in on top of another query.

Click the Tile icon on the toolbar. The queries rearrange themselves in a tiled configuration, and all are visible.

To arrange the queries in an overlapping configuration, click the Cascade icon on the toolbar. The queries rearrange themselves in a cascaded configuration, with one query in front. To bring a different query to the front, click its header.

See About the dashboard on page 343.

Index

A
access rights 137 See also permissions Information Manager console 137 account Administrator 155 default password 153 Linux 153 Active Directory about integrating 168 configuration creating 168 removing 168 synchronize 168 Active Directory configurations creating editing 168 list remove 168 agent editing agent computer 180 aggregation exporting 210 importing 210 aggregation tables 92 alerting incidents 285 See also incidents creating 286 example 285 archives. See event archives viewing event data 226 assets exporting list 296 identifying 124 printing list 296 Assets table 262 importing assets 321 Auto Refresh option 347 interval setting 347

B
BugTraq 262 business information users 160 Bypass Event RBAC 140

C
closing incidents 294 See also merging incidents closing tickets 313 collector filtering and aggregation antivirus examples 277 creating specifications 271 events generated by specific internal networks 273 examples 273 firewall examples 274 overview 265 policy compliance 266 preparing to create 268 suggestions 267 vulnerability assessment examples 278 Windows Event Log examples 279 collectors. See event collectors components of 200 overview 199 registration 254 universal 201 downloading and installing 203 column sorting in queries 242 columns in tabular queries 329 computers adding configuration groups 187 configurations 183 adding to organizational units 178 creating 178 defined 177 deleting 194 distributing configurations 193

350

Index

computers (continued) editing agent with agent 180 editing properties 179 editing without agent 181 identification information 182 modifying permissions 194 moving 193 specifying IP addresses 182 MAC addresses 182 viewing service properties 188 services 188 with agents 177 conclusions about 217 escalating based on severity 92 configuration groups adding to computers 187 configurations adding to computers 183 organizational units 174 distributing by way of computer Service properties 188 to computers 193 using organizational units 193 console about features 58 configuring 123 opening 64 contact information users 160 Correlation Manager about 75 knowledge base 76 rule set 76 correlation rules 83. See rules about 83 creating custom 96 critical systems. See assets

dashboard (continued) refreshing 347 dashboards customizing 348 performing drill-down 346 viewing 344 data retention 220 data retention entry(days) 223 date values for events 230 Deepsight. See Global Intelligence Network DeepSight Threat Management normalization and 263 default roles administrator 130 Distribute menu option 193 Domain Administrator role 130 permissions 148

E
email address notification 164 email distribution of reports 330 Ending Event Date column 230 environment diagram. See Visualizer event archive specifying settings 222 event archive viewer right pane 227 event archives about 220 about multiple 220 adding and removing table columns 230 calendar setting 228 creating incidents 292 creating new 221 date and time range 228 event details 229 event date values 230 filtering 231234 modifying table columns 230 exporting a query 247 graph 228 histogram 228 importing a query 246 live 226 local 226 local client copy creating 224

D
dashboard about 343 adding queries 346 Auto Refresh 347

Index

351

event archives (continued) querying Event Query wizard 239 naming rules 238 SQL Query wizard 243 Summary Query wizard 241 removing an archive from event viewer 227 restoring 225 saving data from event viewer 227 settings 222 zooming 228 event collectors 20 functions 20 installing and configuring 21 types 21 Event Count rule setting 92 Event Criteria field 89 operators 90 Event Date column 230 event forwarding activating 256 configuring default forwarding rule 257 creating a rule 258 deleting a forwarding rule 258 described 251 stopping 259 Event Logger 251 event queries about working with 236 color scheme managing used in query results 245 creating groups 237 deleting 249 editing 244 importing 246 IP addresses 246 multiple archives 237 publishing 247 scheduling to be distributed as reports 248 using Source view 236 using Target View 236 event query searching within 231 Event Query wizard 239 Event to Conclusion Correlation fields 92 events 261 See also normalization about 217 about normalization 261

events (continued) accessing data in the console 270 aggregation 210 filtering 207 lifecycle 219 mapping during normalization 263 role for viewing 132 events view about 218 exporting asset list 296 incident list 296 queries 245 ticket list 296

F
fields Event Criteria 89 Event to Conclusion Correlation 92 operators for event criteria 90 filter configurations exporting 207 importing 207 filtering events 207 filters about incident 301 event data 231 incident creating 302 deleting 302 modifying 301 tickets creating 315 deleting 317 modifying 316 finger 63 forwarding events. See event forwarding Free space quota setting 223

G
Global Intelligence Network 2223

H
help desk viewing tickets 310 histogram manipulating the 227 viewing event details 229

352

Index

host criticality. See assets

I
importing queries 245 reports 339 incidents about 217, 285 about creating and modifying 290 about filtering 301 automatic assigment to least busy member 298 automatic assignment 55 closing 294 creating from events 292 creating manually 291 creation methods 285 details 288 exporting list 296 filters creating 302 deleting 302 modifying 301 list adding and removing columns 290 modifying 290 managing 288 merging 293 modifying 292 printing details 295 printing list 296 reopening 294295 searching filtering results 303 ticket viewing 311 viewing 287 viewing and modifying 289 viewing associated tickets 311 Information Manager about 17 components 19 event lifecycle 218 overview 17 workflow 18 Information Manager components event collectors 20 Global Intelligence Network 22 Information Manager server 21 security products and devices 20 Web service 22

Information Manager console modify access rights 137 Move menu option 193 Information Manager console access rights adding to roles 137 Information Manager server 21 Information Manager Web service 22 Information Manager workflow 18 instructions adding to a ticket 308 intelligence adding to a ticket task 309 adding to ticket instructions 308 IP address specifying for computers 182 IP addresses querying for 246

K
knowledge base Correlation Manager 76

L
LDAP directory accounts 155 Linux account 153 LiveUpdate normalization and 263 local event archives viewing 227 Lookup Table Update create rule 110 Lookup Tables 112 records 119 user-defined 117

M
MAC addresses specifying for computers 182 Max archive quota setting 223 merging incidents 293

N
Network table 262 networks specifying 126 normalization described 261 example 263

Index

353

normalization (continued) files 263 modifying 263 normalization files about 263 notes about 59 creating and editing 60 searching 61 notification email address 164 user information 164 email address 164 pager numbers 165 times 166

O
operators Event Criteria 90 organizational units adding computers to 178 creating 174 deleting 177 deleting computers 194 description 173 distributing configurations 193 editing 176 managing 173 modifying permissions 176 moving computers 193 name length limits 175 Original Ending Event Date column 230 Original Event Date column 230

permissions (continued) modifying 150 computers 194 organizational units 176 propagating 149 user 166 Permissions dialog box 150 ping 63 policy adding a 126 preferences. See user actions printing asset list 296 incident details 295 incident list 296 reports 337 ticket list 296 Properties pane 328329 publishing queries 247 reports 329

Q
queries adding to the dashboard 348 column sorting 242 columns in tables 329 editing 245 event 239 exporting 245, 247 importing 245 naming rules 238 SQL 243 summary 241 tables in 245, 329 viewing 346 query groups 237

P
pager numbers 165 Passwords changing the 170 passwords 153 changing 65, 160 customizing policies 155 security recommendation 154 permissions 137 See also access rights description 148 examples of modifying permissions 145 in roles 139, 141

R
refreshing the dashboard 347 registering collectors 254 report folder creating 328 report group creating 328 reports creating cutom 325 distributing 331

354

Index

reports (continued) enabling email distribution 330 exporting 338 HTML format 337 importing 339 modifying distribution 335 PDF format 337 performing drill-down 339 portrait or landscape mode 337 printing 337 Properties pane 328329 publishing 329 saving as PDF or HTML 337 scheduling 331 viewing 335 role membership assigning to users 161 roles adding user groups 135 adding users 135 administrator roles 130 creating 132 definition 129 deleting 147 Domain Administrator 130 permissions 148 editing role properties 135 Information Manager console access rights 137 management of policies and configurations 132 managing 129 permissions 141, 148 examples 145 planning 131 product access assignment modifying 138 SES Administrator 130 permissions 148 SIM permissions 139 viewing events 132 rsync 220 rule creating multicondition 100 importing existing 95 X not followed by X 107 X not followed by Y 105 Y not preceded by X 108 rule set creating 81

rule type Lookup Table Update 110 rules categories 83 Correlate By field 94 creating correlation rule for lookup table update 110 creating multicondition 100 criteria 85 default 76 editor 92 enabling/disabling 112 generating incidents 286 query naming 238 Resource field 94 settings 92 types 85 rules strategy defining strategy 83

S
scp 220 security directory registering a collection server 253 Security domain registering with 255 security environment diagram. See Visualizer server access modifying 139 services viewing for a computer 188 viewing properties 188 SES Administrator role 130 permissions 148 Span rule setting 92 SQL Query wizard 243 standard event code 262 Summary Query wizard 241 Symantec Event Code 262 Symantec Signature incident mapped to 262 system criticality. See assets

T
Table Size rule setting 92 tables aggregation 92 Lookup 112

Index

355

tables in queries 245, 329 tasks adding to a ticket 309 template queries enable role-based access 140 tickets about 307308 adding a note 313 adding instructions 308 adding intelligence to a task 309 adding intelligence to instructions 308 adding tasks 309 categories 309 closing 313 creating manually 308 dispositions 312 exporting list 296 filters 315 creating 315 deleting 317 modifying 316 printing list 296 priority changing 312 searching by ticket ID 311 task dispositions 312 viewing 310 viewing on Incidents view 311 trace route 63

users (continued) notification information 164 email addresses 164 notification times 166 pager numbers 165 permissions 166 properties 159

V
views Assets 319 Dashboard 24 Events 29 Incidents 26 Intelligence 25 Reports 36 Rules 38 Statistics 57 System 56 Tickets 31 Visualizer about 189 about using 189 modifying properties 191 tools 191

W
Web configuration interface accessing 68 features 68 wizards Event Query 239 SQL Query 243 Summary Query 241

U
user actions about 63 creating 64 modifying 64 user groups adding to a role 135 creating 158 deleting 167 managing the composition of 162 modifying 166 users adding to a role 135 assigning role membership 161 business information 160 contact information 160 creating 156 deleting 167 description 155