Log Manager for Imperva SecureSphere |
|
Release Notes |
Date Published: September 2009 |
Configuring Log Manager for Imperva SecureSphere |
Log Manager for Imperva SecureSphere allows you to collect, evaluate, and present data reported by an Imperva SecureSphere device. Log Manager for Imperva SecureSphere collects data from the Imperva SecureSphere device and stores the data in secure repositories so you can archive it, create reports for management or auditing purposes, and analyze critical events to research issues. Log Manager for Imperva SecureSphere collects all syslog data you configure the Imperva SecureSphere device to send to the Windows agent. Improvements are made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the Security Manager forum on Qmunity, our community Web site that also includes product notifications, blogs, and the Security Manager user group. This document outlines why you should install this module, lists any installation requirements, and provides configuration information. Supported ProductsThis release supports Imperva SecureSphere device 6.00.2.x. Why Install This Module?With this release of Log Manager for Imperva SecureSphere, Security Manager now provides support for the Imperva SecureSphere Intrusion Prevention System. Log Manager for Imperva SecureSphere archives all data the Imperva SecureSphere device sends to the Windows agent computer. This data may include activity and changes to any database the device is monitoring. The data that Log Manager for Imperva SecureSphere collects is determined by how the device is configured and the policies created on the device. Log Manager for Imperva SecureSphere has the capability to archive the following events:
You can use the data Security Manager collects to produce various reports. For example, you can report on the largest number of failed logins to monitored databases from a given source. System RequirementsThe following table lists additional requirements for a Windows agent acting as the proxy agent for Imperva SecureSphere. For more information about agent requirements, see the Installation Guide for NetIQ Security Manager.
Installing This ModuleInstall this module using the Module Installer utility. If this is the first time you have installed the module, ensure you also add a license. You can verify successful installation of the module in the Module Installer. After the installation completes, verify the Status column indicates the module is current and the module version listed in the Installed Version column is the same as the version in the Available Version column. For more information about installing modules, see the Installation Guide for NetIQ Security Manager. Configuring the AgentAdd the name and IP address of the Imperva SecureSphere device to the Hosts file on the Windows agent computer. For more information about the Hosts file, see the Windows documentation. Configuring Log Manager for Imperva SecureSphereYou can configure this module with the Configuration Wizard. Specify the Windows agent computer to receive syslog data from the Imperva SecureSphere device, and specify the IP address or host name of the Imperva SecureSphere device. For more information about using the Configuration Wizard, see the User Guide for NetIQ Security Manager. This module contains processing rules you can customize with the Development Console. Processing rules configure Security Manager to process events, alerts, and responses. Review processing rules that contain the word Customize to see if you want to customize them for your environment. You can perform a search for these rules in the Development Console, and then read the Knowledge Base for each rule. For more information about finding processing rules you can customize, see the Installation Guide for NetIQ Security Manager. Configuring the Imperva SecureSphere DeviceSet up the Imperva SecureSphere device in your environment and configure the appropriate policies, action sets, and action interfaces for your organization. Security Manager collects all data received from the Imperva SecureSphere device and archives the data for analysis and reporting, but the data that the Imperva SecureSphere device sends is determined by the set of policies you configure on the device. For more information about setting up the Imperva SecureSphere device and configuring appropriate policies and action sets, see the Imperva SecureSphere documentation. Once you have set up and configured the Imperva SecureSphere device, complete the following required steps on the Imperva SecureSphere device. These steps ensure the Imperva SecureSphere device sends syslog data to the Windows agent in the required format so Security Manager logs events and responds with custom actions where appropriate. To configure the Imperva SecureSphere device to work with Security Manager:
Use the following syslog strings to assign the syslog format to the action sets you want to send to Security Manager:
LAImpervaLogOnly AlertNumber=${Alert.dn} CreateTime=${Alert.createTime} Description=${Alert.description} Username=${Alert.username} AlertType=${Alert.alertType} ServerGroup=${Alert.serverGroupName} Severity=${Alert.severity} Action=${Alert.immediateAction} Service=${Alert.serviceName} Application=${Alert.applicationName} SourceIP=${Event.sourceInfo.sourceIp} SourcePort=${Event.sourceInfo.sourcePort} Protocol=${Event.sourceInfo.ipProtocol} ServerIP=${Event.destInfo.serverIp} ServerPort=${Event.destInfo.serverPort} RuleName=${Rule.parent.displayName} ImpervaWarning AlertNumber=${Alert.dn} CreateTime=${Alert.createTime} Description=${Alert.description} Username=${Alert.username} AlertType=${Alert.alertType} ServerGroup=${Alert.serverGroupName} Severity=${Alert.severity} Action=${Alert.immediateAction} Service=${Alert.serviceName} Application=${Alert.applicationName} SourceIP=${Event.sourceInfo.sourceIp} SourcePort=${Event.sourceInfo.sourcePort} Protocol=${Event.sourceInfo.ipProtocol} ServerIP=${Event.destInfo.serverIp} ServerPort=${Event.destInfo.serverPort} RuleName=${Rule.parent.displayName} ImpervaError AlertNumber=${Alert.dn} CreateTime=${Alert.createTime} Description=${Alert.description} Username=${Alert.username} AlertType=${Alert.alertType} ServerGroup=${Alert.serverGroupName} Severity=${Alert.severity} Action=${Alert.immediateAction} Service=${Alert.serviceName} Application=${Alert.applicationName} SourceIP=${Event.sourceInfo.sourceIp} SourcePort=${Event.sourceInfo.sourcePort} Protocol=${Event.sourceInfo.ipProtocol} ServerIP=${Event.destInfo.serverIp} ServerPort=${Event.destInfo.serverPort} RuleName=${Rule.parent.displayName} ImpervaCritical AlertNumber=${Alert.dn} CreateTime=${Alert.createTime} Description=${Alert.description} Username=${Alert.username} AlertType=${Alert.alertType} ServerGroup=${Alert.serverGroupName} Severity=${Alert.severity} Action=${Alert.immediateAction} Service=${Alert.serviceName} Application=${Alert.applicationName} SourceIP=${Event.sourceInfo.sourceIp} SourcePort=${Event.sourceInfo.sourcePort} Protocol=${Event.sourceInfo.ipProtocol} ServerIP=${Event.destInfo.serverIp} ServerPort=${Event.destInfo.serverPort} RuleName=${Rule.parent.displayName} ImpervaSecurityBreach AlertNumber=${Alert.dn} CreateTime=${Alert.createTime} Description=${Alert.description} Username=${Alert.username} AlertType=${Alert.alertType} ServerGroup=${Alert.serverGroupName} Severity=${Alert.severity} Action=${Alert.immediateAction} Service=${Alert.serviceName} Application=${Alert.applicationName} SourceIP=${Event.sourceInfo.sourceIp} SourcePort=${Event.sourceInfo.sourcePort} Protocol=${Event.sourceInfo.ipProtocol} ServerIP=${Event.destInfo.serverIp} ServerPort=${Event.destInfo.serverPort} RuleName=${Rule.parent.displayName} Contact InformationPlease contact us with your questions and comments. We look forward to hearing from you. For detailed contact information, see the Support Contact Information Web site. For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and user groups. Legal NoticeTHIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. © 2009 NetIQ Corporation. All Rights Reserved. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government's rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. Check Point, FireWall-1, VPN-1, Provider-1, and SiteManager-1 are trademarks or registered trademarks of Check Point Software Technologies Ltd. ActiveAgent, ActiveAnalytics, ActiveAudit, ActiveReporting, ADcheck, Aegis, AppAnalyzer, AppManager, the cube logo design, Change Administrator, Change Guardian, Compliance Suite, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowing is Everything, Knowledge Scripts, Mission Critical Software for E-Business, MP3check, NetConnect, NetIQ, the NetIQ logo, the NetIQ Partner Network design, Patch Manager, PSAudit, PSDetect, PSPasswordManager, PSSecure, Risk and Compliance Center, Secure Configuration Manager, Security Administration Suite, Security Analyzer, Security Manager, Server Consolidator, VigilEnt, Vivinet, Vulnerability Manager, Work Smarter, and XMP are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other jurisdictions. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. |