Event Manager for Snort (Legacy) |
Release Notes |
Date Published: May 2009 |
|
Event Manager for IDS (Intrusion Detection Systems) allows you to collect, evaluate, and present data collected by Snort in real-time. By detecting, alerting on, and automatically responding to critical events in real-time, Event Manager for IDS helps indicate and prevent possible intrusions or attacks. Event Manager for IDS provides embedded expertise so you can proactively manage Snort environments and identify issues before they become critical. Event Manager for IDS gathers events, alerts, and other information for Snort into a secure, central repository that you can monitor from a single console. Monitoring this information from a single console aids the IT team in correlating events to determine the nature of a potential security threat. Event Manager for IDS highlights events that may indicate external attacks so you can quickly take corrective or preventive actions. For example, Event Manager for IDS enables you to perform the following tasks:
Supported ProductsThis release supports the following products:
Why Install This Module?Event Manager for IDS provides the following important new capabilities:
Improvements are made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. System RequirementsThe following table lists additional requirements for a Windows agent acting as the proxy agent for Snort devices. For more information about agent requirements, see the Installation Guide for NetIQ Security Manager.
Installing This ModuleYou can install this module using the Module Installer. After you install the module, run the Configuration Wizard to configure the module. For more information about how to follow the Configuration Wizard, click the Help icon in the lower left of the wizard. Configuring the ModuleYou can configure the modules with the Configuration Wizard. Add operators to the Security Specialists group to receive notifications from the associated rules. For more information about using the Configuration Wizard, see the User Guide for NetIQ Security Manager. Ensure the environment is configured such that the modules will be able to resolve the hostname of the Snort device. If you cannot use a static IP address, the DNS must automatically update and consistently resolve the name.
Configuring SnortSnort devices must be properly configured before Event Manager and Log Manager can begin monitoring or collecting logs from them. Intrusion detection systems use different default settings and offer different ways of configuring Snort. The instructions listed in this section include examples that will apply to many products. However, for information about how to configure your Snort environment, see the Snort documentation. To configure support for Snort:
Known IssuesNetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support. Previous Snort Log Archive Data Not Formatted Properly with New ReportsWith this release, Security Manager records data differently than in previous release. Reports in this release do not properly display data gathered using a previous release. Saved queries using a previous release do not properly render data from this release. Contact InformationPlease contact us with your questions and comments. We look forward to hearing from you. For detailed contact information, see the Support Contact Information Web site. Legal NoticeTHIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. © 2009 NetIQ Corporation. All Rights Reserved. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government's rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. Check Point, FireWall-1, VPN-1, Provider-1, and SiteManager-1 are trademarks or registered trademarks of Check Point Software Technologies Ltd. ActiveAgent, ActiveAnalytics, ActiveAudit, ActiveReporting, ADcheck, Aegis, AppAnalyzer, AppManager, the cube logo design, Change Administrator, Change Guardian, Compliance Suite, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowing is Everything, Knowledge Scripts, Mission Critical Software for E-Business, MP3check, NetConnect, NetIQ, the NetIQ logo, the NetIQ Partner Network design, Patch Manager, PSAudit, PSDetect, PSPasswordManager, PSSecure, Risk and Compliance Center, Secure Configuration Manager, Security Administration Suite, Security Analyzer, Security Manager, Server Consolidator, VigilEnt, Vivinet, Vulnerability Manager, Work Smarter, and XMP are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other jurisdictions. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies. |