Security Manager for Windows |
Release Notes |
Date Published: May 2011 |
|
Security Manager for Windows helps secure your enterprise from internal and external attacks. In real time, the product monitors, analyzes, and consolidates events from log files on monitored Windows computers to detect a variety of occurrences and alert you to them. For example, if Security Manager for Windows detects an unauthorized service running on a monitored Windows computer, Security Manager for Windows can send an alert to the Security Manager Control Center and notify a security team member with the location of the incident. Security Manager for Windows collects Windows event log entries, allowing you to use archived data to create Forensic Analysis and Trend Analysis reports using the Control Center as well as custom Summary reports using Microsoft SQL Server Reporting Services. The Security Manager for Windows module collects data from the following Windows event logs:
This module for the Security Manager product includes several new features. This version also improves usability and resolves several previous issues. Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the Security Manager forum on Qmunity, our community Web site that also includes product notifications, blogs, and the Security Manager user group. This document outlines why you should install this module, lists any installation requirements, and identifies any known issues. Supported ProductsFor the latest information about supported software versions and the availability of module updates, visit the Security Manager Supported Products page. If you encounter problems using this module with a later version of your application, contact NetIQ Technical Support. This release supports the following products:
Why Install This Module?Security Manager for Windows monitors, analyzes, and consolidates events from log files on monitored Windows computers to detect a variety of occurrences and alert you to them. The following sections outline the key features and functions provided by this version, as well as issues resolved in this release.
Provides Improved Log Archive Logon Activity CollectionIn this release, Security Manager for Windows supports the following new fields in the cross-platform Forensic Analysis report type: This release also supports the following new Forensic Analysis queries:
Adds "Pre-Authentication Type" Field for Logon EventsIn this release, Security Manager for Windows supports the new "Pre-Authentication Type" field for logon events in the cross-platform Forensic Analysis report type. Events 672, 675, 4771, and 4768 now collect pre-authentication field data, which you can display in Forensic Analysis reports. (ENG275867) Resolves Expired Password Alert IssueThis release resolves an issue where the existing "Logon has failed because password has expired" rule does not correctly generate an alert when a user's password has expired. Security Manager now correctly generates alerts both when a user's password has expired and when a user attempts to log on to a monitored computer using an expired password. (ENG288984) Filters Noisy Windows Event from Log ArchiveThis release resolves an issue where the agent unnecessarily sends a large number of Windows Security Log events with the event ID 5156 to the log archive server. Security Manager now filters out events with event ID 5156 when sending data to the log archive. If you want Security Manager to store all Windows Security Log events with this ID, use the Development Console to disable the "Archival Filter Windows Filtering Platform Success Events (5156)" log filter rule. (ENG303236) System RequirementsThe following table lists additional requirements for a Windows agent. For more information about agent requirements, see the Installation Guide for NetIQ Security Manager.
Installing This ModuleInstall the module using the Module Installer utility. For more information about installing modules, see the User Guide for NetIQ Security Manager. You can verify successful installation of the module in the Module Installer. After the installation completes, verify the Status column indicates the module is current and the module version listed in the Installed Version column is the same as the version in the Available Version column. After you install the module, run the Configuration Wizard to configure logon/logoff monitoring and network port monitoring. For more information about using the Configuration Wizard, see the User Guide for NetIQ Security Manager. Upgrading This ModuleThe steps required to upgrade your environment to the latest version of Security Manager for Windows are different depending on what you currently have installed. Select the appropriate upgrade path from the following scenarios. To upgrade your environment:
Known IssuesNetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support.
Cross-Platform Forensic Analysis Report Type No Longer Uses source.process.name Field
The cross-platform Forensic Analysis report type no longer uses the Duplicate Microsoft Sites and Services Rules with CGAD 1.7If you install Change Guardian for Active Directory version 1.7 and install the latest version of Security Manager for Windows, Security Manager Control Center displays the Microsoft Sites and Services rules in both processing rule groups. To prevent this issue, NetIQ recommends installing the latest versions of both modules. (DOC292551) Microsoft Sites and Services Alert Views Removed After Installing CGAD 1.7If you install the latest version of the Security Manager for Windows module and then install Change Guardian for Active Directory version 1.7, the Security Manager Control Center no longer displays alerts and events generated by Microsoft Sites and Services rules in Security Manager for Windows views. To resolve this issue, perform the following steps:
(DOC295327) Using Spaces with Regular Expressions for Service AccountsA known issue exists where entering spaces in regular expressions for service accounts in the Configuration Wizard breaks the regular expression. The Security Manager for Windows module supports entering spaces in service account names, but not in regular expressions representing service account names. Security Manager for Windows uses the following rules when monitoring service account logins:
Using a space in a regular expression can cause these rules to behave opposite of the expected behavior. (ENG273461) Duplicate AlertsA known issue exists where Security Manager for Windows raises two alerts for the same event. When any user with a locked-out account attempts to log in, Security Manager for Windows generates an alert. Security Manager for Windows also raises an alert if the built-in administrator account is locked out and attempts to log in. As a result, the module generates two alerts when a locked-out built-in administrator account attempts to log in. (ENG264309) "Session Name" Field ModifiedIn this release, the meaning of the "Session Name" field has changed for all logon/logoff events collected by the Security Manager for Windows module. The "Session Name" field now contains the name of the session in which the event occurred, which can be a session or login identifier. (ENG304141) Contact InformationOur goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you. For detailed contact information, see the Support Contact Information Web site. For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and product user groups. Legal NoticeTHIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. © 2011 NetIQ Corporation. All rights reserved. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government's rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. Check Point, FireWall-1, VPN-1, Provider-1, and SiteManager-1 are trademarks or registered trademarks of Check Point Software Technologies Ltd. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the USA. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This product claims FIPS compliance by use of one or more of the Microsoft cryptographic components listed below. These components were certified by Microsoft and obtained FIPS certificates via the CMVP. 893 Windows Vista Enhanced Cryptographic Provider (RSAENH) 894 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 989 Windows XP Enhanced Cryptographic Provider (RSAENH) 990 Windows XP Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 997 Microsoft Windows XP Kernel Mode Cryptographic Module (FIPS.SYS) 1000 Microsoft Windows Vista Kernel Mode Security Support Provider Interface (ksecdd.sys) 1001 Microsoft Windows Vista Cryptographic Primitives Library (bcrypt.dll) 1002 Windows Vista Enhanced Cryptographic Provider (RSAENH) 1003 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 1006 Windows Server 2008 Code Integrity (ci.dll) 1007 Microsoft Windows Server 2008 Kernel Mode Security Support Provider Interface (ksecdd.sys) 1008 Microsoft Windows Server 2008 1009 Windows Server 2008 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 1010 Windows Server 2008 Enhanced Cryptographic Provider 1012 Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) This product may also claim FIPS compliance by use of one or more of the Open SSL cryptographic components listed below. These components were certified by the Open Source Software Institute and obtained the FIPS certificates as indicated. 918 - OpenSSL FIPS Object Module v1.1.2 - 02/29/2008 140-2 L1 1051 - OpenSSL FIPS Object Module v 1.2 - 11/17/2008 140-2 L1 1111 - OpenSSL FIPS Runtime Module v 1.2 - 4/03/2009 140-2 L1 Note: Windows FIPS algorithms used in this product may have only been tested when the FIPS mode bit was set. While the modules have valid certificates at the time of this product release, it is the user's responsibility to validate the current module status. | ||||||||||||||||