Download eTrust Audit Getting Started

Document related concepts

Clusterpoint wikipedia , lookup

Database model wikipedia , lookup

Oracle Database wikipedia , lookup

Object-relational impedance mismatch wikipedia , lookup

Transcript
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
eTrust Audit

Getting Started
1.5
MAN12093912E
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
This documentation and related computer software program (hereinafter referred to as the
“Documentation”) is for the end user’s informational purposes only and is subject to change or
withdrawal by Computer Associates International, Inc. (“CA”) at any time.
This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole
or in part, without the prior written consent of CA. This documentation is proprietary information
of CA and protected by the copyright laws of the United States and international treaties.
Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this
documentation for their own internal use, provided that all CA copyright notices and legends are
affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user
who are bound by the confidentiality provisions of the license for the software are permitted to
have access to such copies.
This right to print copies is limited to the period during which the license for the product remains
in full force and effect. Should the license terminate for any reason, it shall be the user’s
responsibility to return to CA the reproduced copies or to certify to CA that same have been
destroyed.
To the extent permitted by applicable law, CA provides this documentation “as is” without
warranty of any kind, including without limitation, any implied warranties of merchantability,
fitness for a particular purpose or noninfringement. In no event will CA be liable to the end user or
any third party for any loss or damage, direct or indirect, from the use of this documentation,
including without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is
expressly advised of such loss or damage.
The use of any product referenced in this documentation and this documentation is governed by
the end user’s applicable license agreement.
The manufacturer of this documentation is Computer Associates International, Inc.
Provided with “Restricted Rights” as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.22719(c)(1) and (2) or DFARS Section 252.227-7013(c)(1)(ii) or applicable successor provisions.
 2003 Computer Associates International, Inc.
All trademarks, trade names, service marks, and logos referenced herein belong to their respective
companies.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Contents
Chapter 1: Arm Your Enterprise
Monitor Your Enterprise With Our Leading Auditing Tool ......................... 1-1
The Purpose of This Guide .................................................. 1-2
Enterprise-wide Security: Bridging the Information Gap........................ 1-3
New With This Service Pack ................................................. 1-6
CA Services: Enabling Solutions Through Experience .......................... 1-6
CA Education Services ...................................................... 1-6
Computer Associates: The Software That Manages eBusiness ................... 1-7
For More Information ....................................................... 1-7
Chapter 2: The Essentials
What You Need to Know to Get Started .......................................... 2-1
The Basics ..................................................................... 2-1
Flexible Architecture ........................................................ 2-2
Firewall Friendly ........................................................... 2-2
Secure Transport ........................................................... 2-2
Wide Range of Configurations ............................................... 2-3
Versatile Filtering .......................................................... 2-3
Components ............................................................... 2-3
How eTrust Audit Works ....................................................... 2-8
Pre-Installation Considerations ................................................. 2-10
Firewall Considerations .................................................... 2-10
Encryption ................................................................ 2-11
Contents
iii
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Security of the eTrust Audit Database Access Credentials .....................
Identify the Policy Management and Security Monitor Machines ..............
Installing eTrust Audit on Windows ............................................
Order of Installation .......................................................
Sample Installation on Windows ...............................................
Starting the Product Explorer ..............................................
Sample Client Installation ..................................................
Sample Policy Manager Installation .........................................
Sample Data Tools Installation .............................................
Verifying Your Installation ....................................................
What’s Next? .................................................................
2-11
2-12
2-13
2-13
2-14
2-15
2-17
2-25
2-31
2-37
2-38
Chapter 3: Creating Audit Node Groups
Implement Enterprise-wide Security Policies (Part 1) .............................. 3-1
Scenario ................................................................... 3-2
About the Policy Manager .................................................. 3-4
Start the Policy Manager........................................................ 3-5
Switch to Audit Node View ..................................................... 3-6
Step 1: Create an Audit Node Group ............................................. 3-8
Step 2: Add Members to the Audit Node Group ................................. 3-11
What’s Next? ................................................................. 3-17
Chapter 4: Creating Policies
Implement Enterprise-wide Security Policies (Part 2) .............................. 4-1
Step 3: Create Policies .......................................................... 4-1
Create a Policy Folder ...................................................... 4-2
Add Windows Policy to the Policy Folder .................................... 4-6
Specify Properties for the Windows Policy................................... 4-10
Add UNIX Policy to Policy Folder .......................................... 4-15
Specify Events to Harvest .................................................. 4-19
What’s Next? ................................................................. 4-20
iv
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Chapter 5: Creating Rules and Associations
Implement Enterprise-wide Security Policies (Part 3) .............................. 5-1
Step 4: Specify Rules ............................................................ 5-2
Review Default Policies ..................................................... 5-4
Copy Default Policy Rules to Your Sample Policy .............................. 5-6
Specify Actions ............................................................ 5-10
Step 5: Create Associations ..................................................... 5-23
What’s Next .................................................................. 5-26
Chapter 6: Activating and Monitoring Policies
Implement Enterprise-wide Security Policies (Part 4) .............................. 6-1
Step 6: Activate the Policy ....................................................... 6-2
Step 7: Monitor Deployment of the Policies ....................................... 6-6
Step 8: Viewing the Results ...................................................... 6-8
eTrust Audit Viewer ........................................................ 6-8
eTrust Audit Security Monitor ............................................... 6-9
What’s Next? ................................................................. 6-10
Chapter 7: Viewing, Monitoring, and Reporting on
Events
Viewer: Organize, Filter, and View Audit Data .................................... 7-2
Starting the Viewer ......................................................... 7-2
Filtering Events ............................................................ 7-3
Applying a Viewer Filter .................................................... 7-4
Saving a Viewer Filter....................................................... 7-5
Applying a Viewer Filter .................................................... 7-7
Deleting a Viewer Filter ..................................................... 7-7
Reporter: Customize Reports to Suit Your Organization ............................ 7-8
Starting the Reporter ........................................................ 7-8
Displaying and Printing Reports ............................................. 7-9
Scheduling Reports ........................................................ 7-10
Contents
v
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Security Monitor: Critical Audit Data Delivered in Near-Real-time ................
Starting the Security Monitor ...............................................
Viewing Event Details .....................................................
What’s Next? .................................................................
7-14
7-15
7-16
7-17
Chapter 8: Frequently Asked Questions
Answers To Common Questions
................................................
8-1
Appendix A: Installing the Client Components on
UNIX
Pre-Installation Considerations .................................................. A-1
General Information ........................................................ A-1
Unicenter Information ...................................................... A-2
Check Point FireWall-1 Information.......................................... A-2
Netscape (iPlanet) Information .............................................. A-2
Pre-Installation Tasks .......................................................... A-3
Collect Oracle Information .................................................. A-3
Review Logging of UNIX Events ............................................ A-4
Installation Steps .............................................................. A-8
Appendix B: Installing the Data Tools Components
on UNIX
About the Data Tools Components ..............................................
Pre-Installation Considerations ..................................................
Pre-installation Tasks ..........................................................
Prepare the Oracle Database Environment ....................................
Installation Steps ..............................................................
Create Oracle Database Tables ..............................................
Install the eTrust Audit Data Tools...........................................
vi
Getting Started
B-1
B-2
B-2
B-3
B-7
B-8
B-9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Appendix C: Installing the Data Tools on SQL Server
Installation Steps .............................................................. C-2
Troubleshooting Problems with Data Tools and Microsoft SQL Server ............. C-12
Connection Failed ........................................................ C-12
Login Failed ............................................................. C-14
Appendix D: Installing the Data Tools on Oracle
Pre-Installation Tasks .......................................................... D-1
Prepare the Oracle Database Environment ................................... D-2
Installation Steps .............................................................. D-7
Troubleshooting Problems with Data Tools and Oracle .......................... D-17
Connection Failed ........................................................ D-17
Login Failed ............................................................. D-19
Appendix E: Performing a Custom Installation of the
Client Components
Installation Steps ............................................................... E-2
Appendix F: Performing a Custom Installation of the
Data Tools
Installation Steps ............................................................... F-1
Installing a Collection-Only Machine ......................................... F-6
Installing a Data Management Machine ...................................... F-11
Installing a Monitor-only Machine .......................................... F-17
Contents
vii
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Appendix G: Manually Starting eTrust Audit
Services
Windows Platforms ............................................................ G-1
Using the Computer Management or Control Panel GUIs ...................... G-1
Using a Command Prompt Session .......................................... G-2
UNIX Platforms ............................................................... G-4
On Solaris ................................................................. G-4
On AIX ................................................................... G-5
On HP-UX ................................................................ G-6
On Tru64 and Linux ........................................................ G-7
viii
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Chapter
1
Arm Your Enterprise
Monitor Your Enterprise With Our Leading Auditing
Tool
A fundamental requirement for system security is the ability to
detect and monitor activity. Recognizing this fundamental
requirement, many systems and applications generate audit trail
information. However, these important tasks are typically
considered of secondary importance (at best). As such, they are
not done properly, and do not provide adequate facilities for
managing, consolidating, retaining or reporting on this valuable
information.
eTrust™ Audit addresses these requirements with a superior
audit collection mechanism that can marshal a wide range of
audit trail data from a diverse set of systems, applications and
appliances. In addition, eTrust Audit lets you create and manage
a centralized policy regarding the retention of this valuable
information and also provides the following:
■
Consolidated views of the audit information collected
■
Versatile reporting
■
Highly customizable support for creating policies that can be
used to initiate alert or other actions in response to events
■
Integration with Unicenter® Event Management
■
Integration with the eTrust™ Security Command Center
Arm Your Enterprise
1–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Monitor Your Enterprise With Our Leading Auditing Tool
With eTrust Audit, you can collect security event data from a
wide range of sources throughout your enterprise, such as the
following:
■
UNIX servers
■
Windows NT servers
■
Windows 2000 servers
■
Web servers
■
eTrust open systems products
■
eTrust mainframe security products such as eTrust™
CA-ACF2® Security and eTrust™ CA-Top Secret® Security
■
IBM mainframe security products such as RACF
■
And other sources as well
Plus, eTrust Audit stores this information in a central database
for easy access and reporting.
Administrators use eTrust Audit to monitor, respond to alerts,
and create reports for historical and forensic analysis. Most
importantly, administrators can collect the audit information
created by the diverse set of security tools in the enterprise, so
that they can reference a single source to support the important
tasks of security analysis (sometimes referred to as analytics)
required to effectively monitor and manage security in the
enterprise.
The Purpose of This Guide
This guide is intended to introduce you to eTrust Audit. When
you finish reading this guide, you will be familiar with the
capabilities of the product. More importantly, you will have a
basic functioning eTrust Audit system installed and running,
and you will have a basic understanding of to use eTrust Audit
to collect and manage security-related events across your
enterprise.
1–2
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Monitor Your Enterprise With Our Leading Auditing Tool
Enterprise-wide Security: Bridging the Information Gap
As corporate computer networks expand to include more
machines and applications, managing security-related events
becomes an increasingly complex task. While native operating
systems provide basic logging facilities, those facilities alone are
not sufficient to address the needs of the enterprise.
A Clear, Concise View of Security Related Data
eTrust Audit gives security and systems management teams the
unique ability to collect information from a wide variety of event
data sources into a single database and, in the process, place all
collected information into a common, intuitive format—
regardless of the event’s source, thus facilitating more rapid
analysis.
Innovative Design
eTrust Audit components are extremely flexible, and you can
deploy them in a wide variety of configurations. However,
regardless of their configuration, these components will work
together to provide you with comprehensive access to the audit
event information you require.
Support for Custom Pattern Recognition
Using its advanced tailoring and configuration facilities, you can
define criteria that eTrust Audit uses to recognize event patterns.
When it detects events that match a pattern, eTrust Audit can
automatically trigger actions. Included with eTrust Audit are
several examples of predefined pattern recognition
configurations that you can use as examples to help you quickly
and correctly develop settings that meet your needs.
Arm Your Enterprise
1–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Monitor Your Enterprise With Our Leading Auditing Tool
Scalability and Cross-Platform Performance
eTrust Audit includes store-and-forward capabilities that help
ensure the guaranteed delivery of audit messages to their final
locations. eTrust Audit uses technologies specifically designed
and tested to scale to the needs of today’s enterprise class
environments.
Open Design with SNMP Traps and Submit API Function Calls
To support rapidly evolving technology, eTrust Audit has an
open design that can accept event data submitted by many
systems, applications, and appliances.
The two primary ways to get information into eTrust Audit are
as follows:
Direct
eTrust Audit recorders are available for a variety of
applications and systems. These recorders are specifically
designed to “tap into” the event data sources created by a
given system, application, or appliance.
Indirect
While eTrust Audit includes a rich set of specific recorders (a
set that continues to expand), there are many applications,
systems, and appliances for which there might not be
specific eTrust Audit event recorders available. However,
that does not mean that the event data generated by those
applications, systems, and appliances is unavailable to
eTrust Audit.
1–4
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Monitor Your Enterprise With Our Leading Auditing Tool
eTrust Audit includes the following generic recorders that
you can use to indirectly access the audit trail event data
created by applications:
SNMP Trap Recorder
If your application, system, or appliance can issue
SNMP traps in response to detecting an event, those
events can be sent to a machine where the eTrust Audit
SNMP trap recorder is running, which in turn directs
that information to eTrust Audit.
System Log Recorder
Many applications direct their audit event information
to logging facilities that are provided by the operating
system. For example, on UNIX, it is common for events
to be sent to syslog, and on Windows platforms, it is
common to direct events to the Windows Event Log.
You can access data sent to either of these facilities using
the eTrust Audit System Log Recorder.
Generic Log Scraper
Some applications maintain their own log files, typically
as flat files. eTrust Audit also includes a log scraper
recorder (available on Windows and UNIX platforms)
that you can use to harvest event data from those types
of log files.
Custom Recorders Built Using SAPI
In addition to the variety of mechanisms previously
described that you can use to enable eTrust Audit to
harvest event data, eTrust Audit also includes the
Submit Application Programming Interface (SAPI).
Using SAPI, you can optionally create your own custom
recorders that tap into whatever event sources you
require, and can then provide that event data to eTrust
Audit. Through the direct and indirect audit event data
access mechanisms provided, you can easily customize
eTrust Audit to meet your organizational needs.
Arm Your Enterprise
1–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Monitor Your Enterprise With Our Leading Auditing Tool
New With This Service Pack
eTrust Audit 1.5 Service Pack 2 provides many enhancements.
To see a complete list, see the Release Summary.
CA Services: Enabling Solutions Through Experience
When it comes to getting on the information fast track, CA
Services can recommend and install a full suite of portal and
knowledge management solutions to keep your business
moving. And our associates offer the proprietary know-how on
custom-fitting your enterprise for solutions ranging from life
cycle management, data warehousing, and next-level business
intelligence. Our experts will leave you with the technology and
knowledge tools to fully collect, exploit, and leverage your data
resources and applications.
CA Education Services
Computer Associates Global Education Services (CA Education)
offerings include instructor-led and computer-based training,
product certification programs, third-party education programs,
distance learning, and software simulation. These services help
to expand the knowledge base so you are better able to use our
products more efficiently, contributing to your greater success.
CA Education has been developed to assist today’s technologists
in everything from understanding product capabilities to
implementation and quality performance.
Because the vast community of education seekers is varied, so
too are our methods of instruction. CA Education is committed
to provide a variety of alternatives to traditional instructor-led
training, including synchronous and asynchronous distance
learning, as well as Unicenter simulation.
For training that must be extended to a wider audience—for a
fraction of the cost and logistical hassle of sending everybody
away to a class—CA Education offers excellent distance learning
options.
1–6
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Monitor Your Enterprise With Our Leading Auditing Tool
Computer Associates: The Software That Manages eBusiness
The next generation of eBusiness promises unlimited
opportunities by leveraging existing business infrastructures and
adopting new technologies. At the same time, extremely
complicated management presents challenges—from managing
the computing devices to integrating and managing the
applications, data, and business processes within and across
organizational boundaries. Look to CA for the answers.
CA has the solutions available to help eBusinesses address these
important issues. Through industry-leading eBusiness Process
Management, eBusiness Information Management, and
eBusiness Infrastructure Management offerings, CA delivers the
only comprehensive, state-of-the-art solutions, serving all
stakeholders in this extended global economy.
For More Information
After walking through this Getting Started guide, you can refer to
the numerous resources available to you for additional
information. The online help system offers procedural
information and answers to questions you may encounter. You
can also press F1 on your keyboard for context-sensitive help on
the current dialog.
Your eTrust Audit CD contains useful instructional
documentation that showcases your software, as well as detailed
explanations about the product’s comprehensive, feature-rich
components.
In addition to the online help system, http://esupport.ca.com
offers procedural information and answers to any questions you
might have.
Arm Your Enterprise
1–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Chapter
2
The Essentials
What You Need to Know to Get Started
This chapter describes the basic concepts and key components of
eTrust Audit, and provides an overview of how it works. As you
read these topics, you will learn what these components do, and
how they interact with one another so that you can quickly gain
an understanding of how to put eTrust Audit to work for you.
At the end of the chapter, we provide sample installation
scenarios that you can follow to establish a basic, but working
eTrust Audit environment.
The Basics
To ensure the best results, we strongly encourage you to review
the topics described in this chapter before you try to install
eTrust Audit.
The Essentials
2–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
The Basics
Flexible Architecture
eTrust Audit was designed with a highly flexible, multi-tiered
architecture capable of supporting large numbers of clients,
servers, and database stations that together serve as an
enterprise-wide auditing hierarchy. Every computer in your
network can potentially participate in the hierarchy as an audit
event source, and any user in your network can potentially
receive alerts, mail, and system status notifications from eTrust
Audit.
Firewall Friendly
eTrust Audit services can be configured to transmit events
securely through firewalls without requiring you to open a wide
range of ports (also known as services).
Secure Transport
Some enterprises might have to send sensitive audit event
information across the network and, in some cases, across the
Internet. Facilities included with eTrust Audit provide for the
secure transport of these important messages, which includes
the encryption of these messages in transit.
For information about encryption, firewalls, and ports, see the
Reference Guide.
2–2
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
The Basics
Wide Range of Configurations
The flexible architecture of eTrust Audit makes a wide range of
configuration choices available to you. Some implementations
might be simple, involving a single machine or a small set of
machines. Others might be highly complex, enterprise-scale
deployments, involving hundreds or thousands of machines.
The more advanced configurations take advantage of the
architectural elements of eTrust Audit that were specifically
designed to support hierarchical deployment. These hierarchies
are employed to route audit events from sources to collectors
across all manner of boundaries to be stored in the eTrust Audit
Collector database for analysis and management.
Versatile Filtering
Advanced filtering capabilities help you to dramatically improve
your “signal to noise ratio.” In other words, using the versatile
filtering capabilities of eTrust Audit, you can identify the audit
events that are of most interest to you and identify others that
are of little or no use to you. The events of interest are forwarded
to the appropriate collectors; those that are not can be discarded
or alternatively directed to lower priority collectors.
For information about using the filtering capabilities of eTrust
Audit, see the Policy Management Guide.
Components
The three primary eTrust Audit components are as follows:
■
Client
■
Policy Manager
■
Data Tools
The following topics briefly describe each of these components.
For more detailed information about these components, see the
Policy Management Guide.
The Essentials
2–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
The Basics
Client
The Client component is comprised of several subcomponents
that provide services that collect and forward audit event data,
which can in turn result in the generation of actions and alerts.
The following list describes the subcomponents:
Standard System Recorder
This recorder taps into the event data sent to the Windows
Event Log (on Windows platforms) and into event data sent
into the syslog daemon on UNIX and on Linux platforms.
This recorder enables any events sent to these standard
system logging facilities to be harvested by eTrust Audit for
processing.
Generic Log Scraper
The Generic Log Scraper is another recorder that can be
configured to harvest (clear text) events from third party
products that maintain their own logs as external “flat files.”
Other eTrust Audit Recorders (Available using Custom
Installation)
eTrust Audit includes a long and growing list of supported
recorders, including ones that can tap into event data from
Check Point FireWall-1, SNMP traps, and from the
mainframe security products, eTrust CA-Top Secret Security
and CA-ACF2 Security from Computer Associates, and
RACF from IBM. For more information about the currently
available eTrust Audit recorders, visit us at
http://esupport.ca.com.
Portmapper
The portmapper (Windows platforms only) manages the
logical communications channels required to provide a
standard way for a Client to access RPC services that it
might require.
Redirector
The Redirector (Windows platforms only) taps into local
eTrust Audit logs (created by the eTrust Audit Standard
System Recorder service) or logs created by eTrust™ Access
Control running on Windows systems, and automatically
redirects that audit data to a Router component on the same
or on another machine.
2–4
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
The Basics
Router
The Router acts primarily as a filtered message forwarder. It
analyzes the policies you create using the Policy Manager
(which will eventually be deployed as .cfg files found in the
installation_path\eTrust Audit\cfg directory), and then
follows those policy imperatives to examine audit events
that are sent to its attention. Based on the configuration
instructions you provide, the router identifies those records
that should be as follows:
■
Filtered out
■
Forwarded to the Action Manager
■
Forwarded to other eTrust Audit components for
additional processing or storage
Action Manager
The Action Manager processes events sent to it by the router.
You can instruct the Action Manager to automatically
perform a wide range of actions in response to receiving
specific audit events. The Action Manager gets its
instructions from the policies you create using the Policy
Manager and executes those actions as necessary and
appropriate to a specific audit event.
Distribution Agent
The Distribution Agent receives policy imperatives from the
Policy Manager, and places these policies into effect. These
policy imperatives are sent to the Distribution Agent by the
Distribution Server.
The Essentials
2–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
The Basics
Policy Manager
The Policy Manager component (available on Windows
platforms only) includes the following subcomponents:
Policy Manager
The Policy Manager interface is a Windows GUI that you
use to centrally manage eTrust Audit policies. Using the
Policy Manager, you can create, implement, and distribute
your organization’s eTrust Audit policies.
Distribution Server
The Distribution Server communicates with the Distribution
Agent and coordinates the delivery of eTrust Audit policies.
Data Tools
The Data Tools component is comprised of two major
components:
■
The Data Tools interface
■
The Collector database
The Data Tools GUI
The Data Tools interface is available only on Windows platforms
and is comprised of the following:
Viewer
The Viewer displays, sorts, and filters audit events retrieved
from a Collector database. The viewer also lets you save
your own customized filters for future use.
Reporter
The Reporter lets you view, create, and schedule detailed,
graphic reports from information extracted from the
Collector databases.
2–6
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
The Basics
Security Monitor
The Security Monitor lets you do the following:
■
■
Monitor specific events that you designate important
enough to monitor in near real time. The events can be
sent from a variety of different recorders.
Monitor eTrust Audit status and “self help” events.
These are events related to the status of eTrust Audit
components (for example, whether the Action Manager
is started).
The Collector Database
The Collector database is where eTrust Audit stores all of the
audit event data directed to it. eTrust Audit supports the
following underlying databases:
■
Microsoft SQL Server 7
■
Microsoft SQL Server 2000
■
Microsoft Access Database
■
Oracle (on NT, Windows 2000, and UNIX)
For the most up-to-date information about supported databases,
see readme_etrust_audit.html or http://esupport.ca.com.
The Essentials
2–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
How eTrust Audit Works
How eTrust Audit Works
The following illustrates the basic flow of data between the
eTrust Audit components in a typical configuration:
Policy
Manager
Policy
Manager
GUI
Policies
Distribution
Queue
Distribution Server
Administrator Workstation
Client
Distribution Agent
Events
Client
Recorder
Router
Policy Filters
Filtered Events
SNMP
Program
Action
Queue
File
Program
Action Manager
Other Actions
Router
Action Collector
Screen
Event
Database
Action Monitor
E-mail
Unicenter
Security Monitor
Viewer
Data Tools
2–8
Getting Started
Reporter
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
How eTrust Audit Works
The illustration describes the following flow:
■
■
■
An administrator uses the Policy Manager to create, activate,
and distribute policies that are stored in the policy
distribution queue and routed to Distribution Agents on
clients.
As events occur on clients, the Recorder harvests them and
sends them to the Router for processing. Using the policies
and filters created by the administrator, the Router stores
events in the action queue for processing by the Action
Manager.
The Action Manager, based on the policies you specify, can
do the following:
–
Take a direct action, such as executing a program,
sending an email, or routing the message to Unicenter.
–
Send the event to the Security Monitor so that an
administrator can determine what action to take.
–
Send the event to the Collector database where an
administrator can use the Viewer to display events or
use the Reporter to generate reports for later analysis.
The Essentials
2–9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-Installation Considerations
Pre-Installation Considerations
The flexibility of the eTrust Audit architecture makes it possible
to deploy eTrust Audit in a wide variety of ways. Consider the
following “rules of thumb” when planning your eTrust Audit
implementation.
Note: eTrust Audit components can be installed in a Windows
or a UNIX environment. The components available for
installation, and the installation process itself, differ for each
environment. In this chapter, we guide you through a typical
installation on Windows 2000 using the default Microsoft Access
database. Additional documentation on performing installation
tasks on UNIX and other custom installation tasks on Windows
are available in appendixes of this guide.
Firewall Considerations
When using recorders to collect information from machines that
need to be directed to other eTrust Audit components on
opposite sides of a firewall, you should consider installing a
Router component on the same side of the firewall as the
Recorders. The Router will then be configured to forward events
through the firewall.
Taking this approach significantly reduces the number of ports
that would otherwise have to be opened through the firewall.
If for whatever reason it is not possible to install an Router on
the same side of the firewall as the Recorders, you will need to
open the firewall ports necessary to enable the Recorders to
communicate across the firewall using RPC, which typically
represents a wide range of ports.
Important note for users of Windows NT 4.0, Windows 2000,
and Windows XP! eTrust Audit makes extensive use of RPCs.
Therefore, we automatically install a version of the Sun RPC
portmapper to facilitate easy communication setup. Do not remove or
disable the Sun RPC portmapper we provide, unless you already have a
fully SUN RPC compatible portmapper installed on those machines.
2–10
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-Installation Considerations
Encryption
eTrust Audit provides facilities to encrypt information
transferred by eTrust Audit components across the network.
Your installation can implement your own encryption keys or
eliminate the use of encryption entirely.
For instructions about changing the encryption key or
eliminating encryption, see the Reference Guide.
Security of the eTrust Audit Database Access Credentials
The user name and password used to connect to the Collector
database are stored in an encrypted format and can only be
updated using the ENCUP utility included as part of your eTrust
Audit product.
For more information about the ENCUP utility, see the Reference
Guide.
The Essentials
2–11
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-Installation Considerations
Identify the Policy Management and Security Monitor Machines
When you install the Client components on Windows platforms,
you are asked to identify the machines that will serve as:
Security Monitor
The Client components send notifications about their status
(such as whether they are running) to the Security Monitor
machine you are asked to identify. The Security Monitor
machine is the focal point for determining whether all the
components of your eTrust Audit implements are properly
functioning.
Audit Policy Manager
The Client components receive policies from the Policy
Manager machine you are asked to identify. The Client
components use the host name to authenticate the identity of
the Policy Manager. The system you specify as the Policy
Manager pushes policy information to the client
components. Knowing the name of the Policy Manager
machine enables the eTrust Audit components to detect
when some other (unauthorized) system attempts to send
policies to the client components, and they would then
appropriately reject the policies. Only policies sent by the
Policy Manager you identify during the client components’
installation will be processed by those Client components.
SMTP Mail Server
You can configure the client components to optionally route
emails alerts to an administrator or operator by identifying
an SMTP mail server during the client components’
installation.
2–12
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installing eTrust Audit on Windows
Installing eTrust Audit on Windows
To install eTrust Audit, we recommend that you close any
applications you have running before you insert the CD-ROM.
After the installation media is mounted in the CD-ROM drive,
the installation should begin automatically.
Tip: If you are installing eTrust Audit in a Windows Domain
configuration, we recommend that you install the Client
components on your primary domain controllers (PDCs) so
that eTrust Audit can “tap into” domain administration
events that are logged only on the PDCs.
Order of Installation
We recommend that the eTrust Audit components be installed in
the following order:
1.
Client
2.
Audit Policy Manager
3.
Audit Data Tools
Note: The guided tour chapters included later in this guide
assume that the following have been installed using the sample
installation procedures described in the topics that follow:
■
Client
■
Policy Manager
■
Data Tools, specifically:
–
Reporter
–
Security Monitor
–
Viewer
–
Collector database
The Essentials
2–13
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
Sample Installation on Windows
The following topics present a sample installation of the major
eTrust Audit components on a Windows system. Your
installation and implementation of eTrust Audit will likely vary
somewhat from the installation presented in these topics.
Tip: We recommend that you install the eTrust Audit
components as described in the topics that follow, and then
proceed through the guided tour chapters that follow. Later
you can return to this guide and perform any other
installation tasks required to meet the needs of your
enterprise. These installations are described in the
appendixes.
2–14
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
Starting the Product Explorer
eTrust Audit provides an easy-to-use product explorer to install
components on Windows systems. To use the product explorer,
follow these steps:
1.
Insert the product installation CD into the CD-ROM drive.
The product explorer automatically starts, and the following
window appears:
Note: If this window does not appear, use Windows
Explorer, and execute the program PE_I386.exe located in
the root directory of the CD.
The Essentials
2–15
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
2.
Click the plus sign (+) to expand the eTrust Products branch
of the tree, and then expand the eTrust Audit V1.5SP2
branch to display the three major components as follows:
The first components that you install are the eTrust Audit
Client components.
2–16
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
Sample Client Installation
Follow these steps to install the Client components on Windows:
1.
Expand the Client branch.
After you expand the Client branch, your window looks as
follows:
For the purpose of this sample installation, install the eTrust
Audit Client components on a Windows 2000 platform.
The Essentials
2–17
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
2.
To do this, select the item eTrust Audit Client for Windows
NT/2000/XP.
The product explorer appears as follows:
After you select the product, two buttons become available
at the bottom of the window: Product Information and
Install. Use them as follows:
Product Information
Click the Product Information button to view special
installation notes, systems requirements, and so on. We
recommend that you review the product information
before you begin the installation.
Install
Initiate installation of the component.
3.
After reviewing the product information, click Install to
initiate the installation of the Client components.
When you click Install, the eTrust Audit Client component
installation starts.
2–18
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
4.
Accept the License Agreement by clicking Yes, and then
click Next until the Setup Type window appears:
5.
For the purpose of this sample installation, select Standard
from the list above, and then click Next.
6.
What follows are several standard installation windows that
let you specify alternative installation locations, and the
locations in the Start Menu to be used by eTrust Audit.
Accept the default by clicking Next, or enter your own
values.
The Essentials
2–19
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
The next window of particular interest asks you to specify
the name of the Security Monitor machine as follows:
7.
Specify the name of the Security Monitor machine. For the
purpose of this sample, install the Security Monitor
components on the current machine. To do this, enter
localhost in the Host field, and then click Next.
Note: If you are installing the Security Monitor components
on a machine other than the machine where you are
currently installing the Client components, specify that
machine name in the Host field, and then click Next.
After you specify the name of the Security Monitor machine
and click Next, the following warning appears because you
have not yet installed the Security Monitor on your machine
(localhost):
8.
2–20
Getting Started
Do not worry. You will install the Security Monitor later in
this chapter. Click OK to close the warning.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
When you do, the Specify the Name of the eTrust Audit
Policy Manager Machine window appears:
9.
Specify the name of the Policy Manager machine. For the
purpose of this sample, install the Policy Manager
components on the current machine. To do this, enter
localhost in the Host field, and then click Next.
Note: If you are installing the Policy Manager components
on a machine other than the machine where you are
currently installing the Client components, specify that
machine name in the Host field, and then click Next.
After you click Next, the following window appears:
10. Do not worry. You will install the Policy Manager later in
this chapter. Click OK to close the warning.
The Essentials
2–21
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
When you do, the SMTP Server window appears:
11. The Client components can send alerts through a variety of
mechanisms, including email. You can do either of the
following:
■
■
To use this feature, enter the name of the email server to
which the Client components running on this machine
should route emails, and then click Next.
If you do not want to use this feature now, or if you are
not certain what machine name to enter here, leave the
Server field blank, and then click Next.
Note: You can configure email support at any time. See the
Reference Guide for details.
2–22
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
After you click Next, the eTrust Audit Services
Configuration window appears:
12. This window lets you change the account under which the
Client component services run. For the purpose of this
sample, accept the default of LocalSystem by clicking Next.
After you click Next, the Installation Verification window
appears:
The Essentials
2–23
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
This window lets you install template policies to route failed
login attempts to the machine you identified as the Security
Monitor (localhost). Viewing these events in the Security
Monitor verifies that you have successfully installed these
components. See Verifying Your Installation later in this
chapter for an example of the type of information the
Security Monitor should display after a successful
installation.
13. Click the check box, and then click Next.
As a final check, the installation displays a window listing
the choices that you have made. Click Continue after you
review your selections.
The installation begins displaying various status windows
that describe the progress of the eTrust Audit Client install.
When finished, the following window appears, indicating
that the install of the eTrust Audit Client component has
completed:
14. For the purpose of this sample installation, click Yes to start
the eTrust Audit Client Services.
2–24
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
Sample Policy Manager Installation
The next eTrust Audit component that you should install is the
Policy Manager. You can install this component only on
Windows systems.
To install the Policy Manager, use the product explorer again.
Note: In the sample window that follows, the eTrust Audit
Client for Windows NT/2000/XP is bold. This means that it is
already installed.
Perform the following steps:
1.
Expand the Policy Manager branch, and then select eTrust
Audit Policy Manager for Windows NT/2000/XP.
Important! As with any component you choose to install, click
Product Information to review special installation notes before you
click Install to begin the installation.
2.
After you review the product information, click Install. The
eTrust Audit Policy Manager installation begins.
The Essentials
2–25
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
3.
As in the previous installation, the next few windows ask
you to accept the License Agreement, and to shut down any
other products running on your system. After you do so, the
Authorized User window appears:
4.
Enter the Windows user name that is authorized to use the
Policy Manager, and then click Next.
The user name you specify here is the only user name that is
initially able to access the Policy Manager. By default, it
displays the name of the administrative user performing the
installation. You can grant access to more users after Policy
Manager is installed. See the Policy Management Guide for
more information.
2–26
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
The Database Password Protection window appears:
5.
Enter the password for the user name that has initial access
to the Policy Manager in the Password and Confirm fields,
and then click Next.
Tip: The first time you start the Policy Manager, you must
provide this user name and password to gain access.
You can change the password for the current user by using
the encup utility. See the Reference Guide for more
information.
The Essentials
2–27
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
The Specify Name of Monitor Machine window that follows
asks for the name of the Security Monitor machine to which
the Policy Manager sends notifications:
6.
For the purpose of this sample, you are going to install the
Security Monitor components on the same machine on
which you are now installing the Policy Manager. Enter
localhost in the Host field, and then click Next.
Note: If you are installing the Security Monitor components
on a machine other than the machine where you are
currently installing the Policy Manager, specify that machine
name in the Host field, and then click Next.
After you specify the name of the Security Monitor machine
and click Next, the following warning appears because you
have not yet installed the Security Monitor on your machine
(localhost):
7.
2–28
Getting Started
Do not worry. You will install the Security Monitor later in
this chapter. Click OK to close the warning.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
When you do, the eTrust Audit Policy Manager Services
Administration window appears:
8.
Use this window to specify whether the Policy Manager
services should be automatically started when this machine
is rebooted. Unless you have a reason why you want to start
the services manually, choose Configure Services for
Automatic Startup, and then click Next.
The Essentials
2–29
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
After you click Next, the eTrust Audit Services
Configuration window appears:
9.
This window lets you change the account under which the
eTrust Audit Distribution Server service runs. For the
purpose of this sample, accept the default of LocalSystem by
clicking Next.
10. As a final check, the installation displays a window listing
the choices that you have made. Click Continue after you
review your selections.
The installation proceeds. At the end of the installation, the
following window appears:
11. For the purpose of this sample, click Yes to start the eTrust
Audit Policy Manager services.
2–30
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
Sample Data Tools Installation
To install the Data Tools, use the product explorer again.
Perform the following steps:
1.
Expand the Data Tools branch, and then select eTrust Audit
Data Tools for Windows NT/2000/XP.
Important! As with any component you choose to install, click
Product Information to review special installation notes before you
click Install to begin the installation.
2.
After you review the product information, click Install. The
eTrust Audit Data Tools installation begins.
The Essentials
2–31
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
2–32
Getting Started
3.
The next few windows ask you to accept the License
Agreement, and choose the installation path. After you do
so, the Setup Type window appears:
4.
For the purpose of this sample, select Standard, and then
click Next.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
The Database Type window asks you to choose the type of
database that you want eTrust Audit to use as the Collector
database:
5.
For the purpose of this sample, choose Microsoft Access,
running on this machine, and then click Next.
Note: A version of the Microsoft Access database is
automatically provided for your use. Using Microsoft SQL
Server or Oracle as the underlying database requires that
you properly install and license these databases before you
install the Data Tools.
Tip: If you have an existing SQL Server or Oracle database
and would like to use it with eTrust Audit, see the
“Installing the Data Tools on SQL Server” or the “Installing
the Data Tools on Oracle” appendix.
The Essentials
2–33
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
After you click Next, the SMTP Server window appears:
6.
The Data Tools components can send alerts through a
variety of mechanisms, including email. You can do either of
the following:
■
■
To use this feature, enter the name of the email server to
which the Data Tools components running on this
machine should route emails.
If you do not want to use this feature now, or if you are
not certain what machine name to enter here, leave the
Server field blank, and then click Next.
Note: You can configure email support at any time. See the
Reference Guide for details.
2–34
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
The Specify Name of Monitor Machine window asks you to
specify the name of the Security Monitor machine to which
the Data Tools should send notifications:
7.
For the purpose of this sample, the Security Monitor
components are installed on the same machine on which you
are installing the Data Tools. Enter localhost in the Host
field, and then click Next.
The Essentials
2–35
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Sample Installation on Windows
After you click Next, the eTrust Audit Services
Configuration window appears:
8.
This window lets you change the account under which the
Data Tools services run. For the purpose of this sample,
accept the default of LocalSystem by clicking Next.
9.
As a final check, the installation displays a window listing
the choices that you have made. Click Continue after you
review your selections.
The installation proceeds. At the end of the installation, the
following window appears:
10. For the purpose of this sample, click Yes to start the eTrust
Audit Data Tools services.
Congratulations! You have successfully created a sample eTrust
Audit environment.
2–36
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Verifying Your Installation
Verifying Your Installation
After you complete the installation of the Data Tools
components, a light bulb appears in the system tray in the lower
right corner of your task bar. This icon represents the Security
Monitor. Double-click it to open the Security Monitor to ensure
that the installation verification messages are being properly
delivered.
A window that contains data similar to the following sample
appears:
This window shows that all the eTrust Audit services
successfully started.
The Essentials
2–37
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
What’s Next?
What’s Next?
With this basic introduction to eTrust Audit complete, the next
step is to get more familiar with the eTrust Audit Policy
Manager.
The next chapter starts the guided tour, which helps you learn
about the Policy Manager as you configure a sample working
eTrust Audit environment. The guided tour assumes you have
installed the Client components on a UNIX system, too. If you
would like to do so, see the “Installing the Client Components
on UNIX” appendix, and follow the steps to install the Client
components on UNIX. Otherwise, proceed with the sample as
though you installed onto a UNIX system. Of course, when
sample screens appear showing data from UNIX, you should
ignore the UNIX-related results.
2–38
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Chapter
3
Creating Audit Node
Groups
Implement Enterprise-wide Security Policies (Part 1)
Now that you have installed and activated eTrust Audit, the next
step in the process is to put eTrust Audit to work for you.
In other words:
■
■
Each of the machines on which you have installed eTrust
Audit components will have several different sources of
audit event data available on them. For each of these event
sources, which events do you want to harvest? All or just a
subset?
For the events that you want to harvest, what do you want
eTrust Audit to do with them? Store them locally, forward
them somewhere, or initiate some kind of action?
In this chapter, you will proceed step by step through the
process of defining the policies required to put eTrust Audit to
work, using a common real-world requirement as the basis for
this scenario.
Note: The guided tour assumes you have installed the Client
components on a Windows and a UNIX system. Information
about how to install the Client components is described in the
“Installing the Client Components on UNIX” appendix of this
guide. You can use the tour that follows even if you do not have
any UNIX systems in your current eTrust Audit configuration.
Simply skip those tasks associated with UNIX systems, which
are easily identifiable.
Creating Audit Node Groups
3–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Implement Enterprise-wide Security Policies (Part 1)
Scenario
In this scenario, you want to get audit event data harvested from
UNIX sources and from Windows 2000 sources, and store this
event data in the Collector database running on Windows 2000.
Task Preview
The following process describes the major steps you will take to
configure your eTrust Audit system to harvest event data from
the Windows and UNIX sources and deliver it the Collector
database:
1.
Define an audit node group.
2.
Define audit nodes that are members of the audit node
group.
3.
Create policies that identify the events that should be
harvested from the Windows and UNIX sources.
4.
Specify rules that identify specific event record matching
criteria and actions to be taken.
5.
Associate the policies created in Steps 3 and 4, to the audit
node group that was created in Steps 1 and 2.
6.
Activate the policies.
7.
Monitor the deployment of the policies.
8.
View the results.
When you complete the sample steps, you will have a basic and
fully operational eTrust Audit environment and be familiar with
the major components of eTrust Audit that you will regularly
use.
3–2
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Implement Enterprise-wide Security Policies (Part 1)
Machine Configuration
The scenario involves two machines:
Machine 1
A Windows 2000 machine named SYSTEMA on which the
following eTrust Audit components are installed:
■
Client components
■
Data Tools (including the Collector database)
■
Policy Manager
Machine 2
A Solaris machine, named SYSTEMB on which the following
eTrust Audit components have been installed:
■
Client components
Objectives
This scenario guides you through the steps required to get the
eTrust Audit components that have been previously installed
working together to do the following:
1.
Enable you to work with messages written to the Windows
Event Logs as follows:
a.
The Client components running on the Windows
machine will harvest messages from the Windows Event
Logs.
b. The Data Tools components will store the messages in
the Collector database on the Windows machine, and
you can view them using other Data Tools components
(such as the Viewer or the Reporter) installed on that
machine.
Creating Audit Node Groups
3–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Implement Enterprise-wide Security Policies (Part 1)
2.
Enable you to work with messages written to the UNIX
syslog and sulog as follows:
a.
The Client components running on the Solaris machine
will harvest messages written to syslog and sulog.
b. The Client components running on the Solaris machine
will forward those harvested messages to the local
router on that UNIX machine.
c.
The local router will forward the messages to the
Collector database on the Windows machine, and you
can view them using the Data Tools installed on that
machine.
About the Policy Manager
You will use the Policy Manager to accomplish most of the
objectives in this scenario. The Policy Manager lets you define
and maintain eTrust Audit policies and runs only on Windows
systems.
3–4
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Start the Policy Manager
Start the Policy Manager
To start the Policy Manager, go to the Windows machine where
you installed the Policy Manager components, and do the
following:
■
From the Start menu, choose Programs, Computer
Associates, eTrust, Audit, Policy Manager.
The Policy Manager window appears:
You use the Policy Manager to create the policies required to
complete the objectives of the scenario.
Creating Audit Node Groups
3–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Switch to Audit Node View
Switch to Audit Node View
Before you can create a policy, you must identify the objects to
which the policy applies. In other words, you must identify the
event sources on the specific machines that you want to target.
To do this, you create an audit node group (also known as an
AN group), and then identify the audit nodes (the specific
machines) that are part of that group.
■
Click Audit Nodes
3–6
Getting Started
To create an audit node group, click the Audit Nodes icon
on the left side of the Policy Manager window:
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Switch to Audit Node View
After you click the Audit Nodes icon, the window changes to
display the Audit Nodes view as follows:
In this initial Audit Nodes view, there are no defined target
audit node groups.
Creating Audit Node Groups
3–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 1: Create an Audit Node Group
Step 1: Create an Audit Node Group
To begin, you must create an audit node group to represent the
machines and event sources from which you want to harvest
audit events.
To create a new audit node group, follow these steps:
1.
3–8
Getting Started
Right-click Targets, and choose New Group from the pop-up
menu as shown in the following illustration:
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 1: Create an Audit Node Group
After you click New Group, the New Group dialog appears:
Use this dialog to create an audit node (AN) group. This AN
group serves as a single reference point for the eTrust Audit
recorders that you are going to use on the Windows and
UNIX platforms in this scenario.
2.
For the purpose of this sample scenario, enter
SampleScenario in the field at the top of the window, and
then enter a brief description in the Description field, such as
Audit Node Group that will represent the eTrust Audit
machines in the scenario.
Tip: When defining your eTrust Audit policies, we
recommend that you take advantage of the Description field
to record the purpose of each AN group. Some months from
now when you are updating policies, you will have a record
of your original intent.
Creating Audit Node Groups
3–9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 1: Create an Audit Node Group
3.
Click OK.
The Policy Manager window appears as follows with the
new AN group, SampleScenario, displayed in the tree and
its contents in the table on the right side of the window:
3–10
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 2: Add Members to the Audit Node Group
Step 2: Add Members to the Audit Node Group
Now that you have created the AN group, you must add
individual audit nodes to the AN group. These individual audit
nodes represent the audit event data sources (the Recorders) that
will participate as part of this AN group.
To add audit nodes to the AN group, follow these steps:
1.
Right-click the AN group object that you just created
(SampleScenario), and choose New AN from the pop-up
menu as shown in the following illustration:
Creating Audit Node Groups
3–11
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 2: Add Members to the Audit Node Group
After you choose New AN, the New Audit Node (AN)
dialog appears:
2.
Complete the fields on the dialog as follows to add the first
member to the AN group:
Host Name
For the purpose of this scenario, the first machine to add
to this AN group is the Windows 2000 machine,
SYSTEMA. Enter the name of the Windows system onto
which you installed the Client tools in the Host name
field.
Note: From this point forward, sample screens will
show SYSTEMA as the name of the Windows system.
Your screens should show the name of your Windows
system.
AN Type
The AN type identifies the type of audit node. An AN
type describes the class of Recorder running on the host
machine.
In this case, leave the AN Type as NT representing the
class of Recorders that is associated with the Windows
NT and Windows 2000 platforms (which includes the
recorder required to tap into the Windows Event Logs).
3–12
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 2: Add Members to the Audit Node Group
AN Name
As you entered characters into the Host name field, the
AN Name field was automatically filled for you. You
can ignore this field for now, as its value is not typically
used except when doing advanced policy
administration.
Add to Group
The name of the AN group that you are adding a
member to. The value of this field is already specified for
you.
Description
We recommend that you use the Description field to
record the reasons why you are adding this member to
this AN group.
When you finish entering values into the fields, your dialog
should resemble the following sample:
3.
Click OK.
Creating Audit Node Groups
3–13
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 2: Add Members to the Audit Node Group
After you click OK, the Policy Manager is updated with the
new AN, and looks similar to the following sample:
The audit node you just defined appears in the right pane,
meaning you successfully added this entry to the AN group.
However, you have done more than just add a machine to
this AN group; you added a machine and identified a class
of recorders that are going to be used on this machine (the
AN Type field was used to identify the class of recorders).
Now, you are ready to add the second audit node in the
scenario to this AN group.
4.
Right-click the AN group object that you just created
(SampleScenario), and choose New AN from the pop-up
menu.
After you choose New AN, the New Audit Node (AN)
dialog appears.
3–14
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 2: Add Members to the Audit Node Group
5.
Complete the fields on the dialog as follows to add the
second member to the AN group:
Host Name
For the purpose of this scenario, the second machine to
add to this AN group is the Solaris machine. Enter the
name of the UNIX system onto which you installed the
Client tools in the Host name field.
Note: From this point forward, sample screens will
show SYSTEMB as the name of the UNIX system. Your
screens should show the name of your UNIX system in
the Host name field.
AN Type
The AN type identifies the type of audit node. An AN
type describes the class of Recorder running on the host
machine.
In this case, you are adding a Solaris machine to this AN
group. Therefore, specifying this Solaris machine with
an AN Type of NT is not correct.
Rather, use the drop-down arrow (as shown in the
following sample dialog) to choose Unix. Unix
represents the class of Recorders associated with UNIX
platforms, which include the recorders required to tap
into syslog and sulog events.
Creating Audit Node Groups
3–15
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 2: Add Members to the Audit Node Group
AN Name
As you entered characters into the Host name field, the
AN Name field was automatically filled for you. You
can ignore this field for now, as its value is not typically
used except when doing advanced policy
administration.
Add to Group
The name of the AN group to which you are adding a
member. The value of this field is already specified for
you.
Description
We recommend that you use the Description field to
record the reasons why you are adding this member to
this AN group.
6.
When you finish entering values, click OK.
After you click OK, the Policy Manager is updated with the new
AN, and looks similar to the following sample:
3–16
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
What’s Next?
What’s Next?
You have learned how to perform some important tasks using
the Policy Manager including the following:
1.
Define an audit node group.
2.
Define audit nodes that are members of the audit node
group.
Moreover, you have learned these skills on the road to creating a
working eTrust Audit environment.
In the next chapter, you continue completing the objectives in
the scenario while learning how to perform the following tasks:
3.
Create policies that identify the events that should be
harvested from the Windows and UNIX sources.
4.
Specify rules that identify specific event record matching
criteria and actions to be taken.
Creating Audit Node Groups
3–17
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Chapter
4
Creating Policies
Implement Enterprise-wide Security Policies (Part 2)
In the previous chapter, you created an AN group and added
members to it. These are the first two steps in the sample
scenario:
1.
Define an audit node group.
2.
Define audit nodes that are members of the audit node
group.
You will complete the following steps in this chapter:
3.
Create policies that identify the events that should be
harvested from the Windows and UNIX sources.
Step 3: Create Policies
So far you have created an AN group and added two ANs to the
group. The ANs identify both the systems on which the
Recorders have been installed and the class of recorder to use to
read the events. In this next step, you identify the specific types
of events that you want the previously installed Recorders to
harvest from the various system logs.
You do this by creating a policy folder and then creating policies
within that folder.
Creating Policies
4–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
Create a Policy Folder
To create a policy folder, follow these steps:
1.
Click Policies on the left side of the Policy Manager, as
shown in the following illustration:
Click Policies
After you click Policies, the Policy view appears as follows:
First, create a policy folder to hold the specific policies that
you are about to create.
4–2
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
2.
Right-click the white space area under the Default Policies
folder, and choose New from the pop-up menu as shown in
the following illustration:
After you choose New, the Policy Wizard appears:
Creating Policies
4–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
3.
Specify a name and description for the new folder as
follows:
a.
Enter SampleScenario in the Name field.
b. Enter a description in the Description field, such as
Policy Folder that is to be used for the sample scenario.
Your wizard should resemble the values in the following
sample:
4.
4–4
Getting Started
Click Finish.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
The Policy Manager is updated and appears as follows with the
new policy folder you just created in the left pane:
Creating Policies
4–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
Add Windows Policy to the Policy Folder
The next step is to add specific policies to the policy folder that
you just created.
To add a policy to a policy folder, follow these steps:
1.
4–6
Getting Started
Right-click the SampleScenario policy folder, and choose
New Policy from the pop-up menu as shown in the
following sample:
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
The Policy Wizard appears:
For the purpose of this scenario, the first policy object to add
to this policy folder is for the Windows NT platform.
2.
Choose Policy by AN type, and then use the drop-down to
choose NT as shown in the following sample:
Creating Policies
4–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
The NT audit node type is the class associated with the
standard Windows NT and Windows 2000 recorders.
3.
Next, enter a name and description for this policy item as
follows:
a.
Enter a name for this policy item in the Name field, such
as SampleScenarioPolicyForWindows.
b. Enter a description for this policy item in the
Description, such as Windows policy that we will use to
support this sample scenario.
Your Policy Wizard should resemble the following sample:
4.
Click Finish.
The Policy Manager is updated.
5.
4–8
Getting Started
Expand the SampleScenario branch.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
The new policy you just created appears in the left pane
beneath the SampleScenario policy folder:
Creating Policies
4–9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
Specify Properties for the Windows Policy
The next step is to specify properties for the policy item that you
just created. Policy properties identify the types of events that
you want to monitor.
To specify the audit events to be monitored by this policy:
1.
4–10
Getting Started
Right-click the policy item you just created, and then choose
Properties from the pop-up menu as shown in the following
sample:
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
After you click Properties, the Properties dialog appears:
2.
To edit the policy settings, click the Audit tab.
Creating Policies
4–11
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
The following options appear on the Audit tab:
3.
4–12
Getting Started
To specify the events that you want to harvest click the
Audit These Events radio button.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
The check boxes for the various audit events become enabled
as shown in the following sample:
4.
For the purpose of this scenario turn on all of these events,
except File and Object Access.
Creating Policies
4–13
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
To do this, check all of the boxes in the Success and Failure
columns except those for File and Object Access as shown in
the following sample:
Note: Setting up the File and Object Access auditing is easy
to do, but does introduce some additional policy
configuration steps that are not covered as part of this
scenario, which is why we ask you not to select them at this
time. For more information about File and Object Access
auditing, see the Policy Management Guide.
4.
Click OK to save your changes.
The Policy Manager is updated.
4–14
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
Add UNIX Policy to Policy Folder
Next, you must define a policy item for the Solaris system that is
part of the scenario.
To add a policy to a policy folder, follow these steps:
1.
Right-click the SampleScenario policy folder, and choose
New Policy from the pop-up menu as shown in the
following sample:
Creating Policies
4–15
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
The Policy Wizard appears:
For the purpose of this scenario, the second policy object to
add to this policy folder is for the Solaris platform.
2.
4–16
Getting Started
Choose Policy by AN type, and then use the drop-down to
choose Unix as shown in the following sample:
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
The UNIX audit node type is the class associated with the
standard UNIX recorders.
3.
Next, enter a name and description for this policy item as
follows:
a.
Enter a name for this policy item in the Name field, such
as SampleScenarioPolicyForUNIX.
b. Enter a description for this policy item in the
Description, such as UNIX policy that we will use to
support this sample scenario.
Your Policy Wizard should resemble the following sample:
4.
Click Finish.
Creating Policies
4–17
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
The Policy Manager is updated and appears as before with the
new policy you just created in the left pane beneath the
SampleScenarioPolicyForWindows policy as follows:
4–18
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 3: Create Policies
Specify Events to Harvest
For eTrust Audit to harvest events, those events must be there in
the first place. In other words, the Recorders cannot harvest
events from a Windows NT Event Log if Windows NT is not
generating those events. Similarly, Recorders cannot harvest
events from the UNIX event sources, if those sources are not
configured properly.
Windows
As part of the eTrust Audit Commit process, the Client
components deployed on the Windows platforms automatically
update the Windows Local Security Policies settings on the
machine where they are executing to ensure that the events that
you have indicated you want to harvest are being generated.
This is accomplished automatically for you by eTrust Audit by
using standard Windows interfaces.
UNIX
However, on UNIX platforms, where there are no standard
interfaces available to automatically update these settings on
your behalf, you might have to perform some manual
configuration tasks to ensure that the data that you want eTrust
Audit to harvest is actually being generated.
Most UNIX systems administrators are familiar with the process
of configuring syslog, sulog, and other facilities. However, if you
are not familiar with these UNIX configuration tasks, see the
“Installing the Data Tools Components on UNIX” appendix. It
includes examples of how to configure these systems
appropriately so that the event data that you want eTrust Audit
to harvest for you is available.
Creating Policies
4–19
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
What’s Next?
What’s Next?
You have now completed the first three steps of the scenario.
Specifically, you have done the following:
1.
Defined the AN group.
2.
Defined audit nodes that are members of the AN group.
3.
Created policies to identify the events that should be
harvested from the Windows and UNIX sources.
In the next chapter, you complete the next two steps:
4–20
Getting Started
4.
Specify rules that identify specific event record matching
criteria and the actions to be taken when the criteria is met.
5.
Associate the policies created in Steps 3 and 4 to the AN
group that you created in Steps 1 and 2 by attaching the
policy folder to the AN group.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Chapter
5
Creating Rules and
Associations
Implement Enterprise-wide Security Policies (Part 3)
In the previous chapters, you created an AN group, added
members to it, and created policies for a Windows and a UNIX
system from which you want to harvest event data. These are the
first three steps in the sample scenario:
1.
Define an audit node group.
2.
Define audit nodes that are members of the audit node
group.
3.
Create policies that identify the events that should be
harvested from the Windows and UNIX sources.
You will complete the following steps in this chapter:
4.
Specify rules that identify specific event record matching
criteria and actions to be taken.
5.
Associate the policies created in Steps 3 and 4 to the audit
node group that was created in Steps 1 and 2.
Creating Rules and Associations
5–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
Step 4: Specify Rules
Return to the Policy Manager and switch back to Policy view.
Your Policy Manager should look like the following sample:
So far you have identified the event sources that you want to tap
into (standard Windows events, and standard UNIX events). The
next step is to further qualify the types of events that you want
to harvest from those sources, and what actions you want eTrust
Audit to perform.
For example, when eTrust Audit detects a particular event, you
can tell it to do any of the following:
■
Forward the event to an alternate Router
■
Forward the event to the Collector database
■
5–2
Getting Started
Send the event to the Security Monitor to alert the user that
the event has occurred
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
■
■
Send the event to the Unicenter Event Management
components
Perform another action of your choice
You do this by defining rules.
Important! Defining rules is a very important policy configuration
task because the default rule under which eTrust Audit operates is to
ignore all of the events it encounters. In other words, if you do not
specify a rule for how an event should be handled, eTrust Audit
assumes that you are not interested in the event and ignores it.
When you define a rule, do two things:
■
■
Specify criteria—that is, a filter—that eTrust Audit uses to
determine which events are subject to the action described in
the rule
Specify the action you want eTrust Audit to take
In this scenario, rather than construct your own criteria, you are
going to take advantage of the extensive set of predefined rules
that are provided with eTrust Audit as default policies (also
known as sample templates).
Creating Rules and Associations
5–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
Review Default Policies
To view the set of default policies, follow these steps:
1.
Expand the Default Policies branch of the tree, by clicking
the plus sign as shown in the following illustration:
Click the plus sign
(+) to expand the
tree
For the purpose of this scenario, you will use some of the
default NT and UNIX rules, specifically the collectionrelated rules.
2.
5–4
Getting Started
To access these collection-related rules, expand the Default
Policy branch until the NT and UNIX Collection Events
branches are visible in the tree on the left portion of the
Policy Manager.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
Your Policy Manager should look as follows:
Creating Rules and Associations
5–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
Copy Default Policy Rules to Your Sample Policy
To use the collection-event related rules from the Default Policies
area, copy and paste them on top of the policies in the
SampleScenario folder.
The default rules that you will use in this scenario appear in the
tree as follows:
NT Policy
Collection Events
NT-Application
Criteria to select all messages from the Windows
Event Viewer Application Log
NT-Security
Criteria to select all messages from the Windows
Event Viewer Security Log
NT-System
Criteria to select all messages from the Windows
Event Viewer System Log
UNIX Policy
Collection Events
5–6
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
To copy policies, follow these steps:
1.
Right-click the policy item, and the choose Copy from the
pop-up menu as shown in the following sample:
For example, right-click the NT-Application default policy
item, and then choose Copy from the pop-up menu.
Creating Rules and Associations
5–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
2.
Right-click the policy item into which you want to paste the
default policy item, and choose Paste from the pop-up menu
as shown in the following sample:
For example, right-click the
SampleScenarioPolicyForWindows policy item, and choose
Paste from the pop-up menu.
5–8
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
After you complete the paste operation, the NT-Application
default policy appears under the
SampleScenarioPolicyForWindows policy item. Double-click
the SampleScenarioPolicyForWindows policy item to make
it appear as follows:
3.
Repeat this copy and paste operation on the NT-Security and
NT-System events so that they are both copied to the
SampleScenarioPolicyForWindows item.
4.
Next, copy the Collection Events item beneath Unix Policy,
and paste it into the SampleScenarioPolicyForUNIX item.
5.
When you finish, click the minus sign (-) to the right of
Default Policies to collapse that tree branch.
Creating Rules and Associations
5–9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
The Policy Manger window looks as follows:
Now that you have added filters to your policies, you can
specify actions.
Specify Actions
Let’s zoom in on the items in the policy tree:
The white bell to the left of the items in the tree, such as
NT-Application, indicates that while a valid rule exists, the rule
does not actually do anything because you have not provided an
action.
5–10
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
To specify actions, follow these steps:
1.
Right-click a rule, and choose Properties from the pop-up
menu as shown in the following sample:
For example, right-click NT-Application, and choose
Properties from the pop-up menu.
Creating Rules and Associations
5–11
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
The Properties dialog appears:
2.
5–12
Getting Started
To specify an action, click the Actions tab.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
The Actions tab appears:
Use the Actions tab to select the action you want performed
when an audit event record is detected that matches the
criteria specified in this rule. As you can see, several
different actions are available.
For the purpose of this scenario, you will specify the
following actions:
■
■
The Collector action for all of the rules you have defined.
The Collector action indicates that you want the event
records that match the criteria specified in this rule to be
sent to the Collector database.
The Security Monitor action for Windows Security
related events. This action indicates that you want the
event records that match the criteria specified in this
rule, to be sent to the Security Monitor.
Creating Rules and Associations
5–13
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
Add the Collector Action
To specify the Collector action, follow these steps:
3.
Click the checkbox to the left of Collector, and then click
Add as shown in the following illustration:
Check Collector
Click Add
After you click Add, the Add Target dialog appears:
4.
5–14
Getting Started
Enter the host name (or IP address) of the machine where
the Collector database components are installed in the Host
Name or IP Address field, and then click OK. The target
machine is the system that you want this message sent to for
storing in a Collector database.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
For the purpose of this scenario, the Collector database was
installed on a machine named SYSTEMA. Therefore, enter
SYSTEMA in the Host Name or IP Address field, and then
click OK.
Note: Substitute the name (or IP address) of the machine on
which you installed the Collector database components for
SYSTEMA.
When you click OK, the Actions tab appears as follows:
5.
Click OK again to save the action and target Collector
database information.
You just defined a Collector action, which indicates that
audit events that match the criteria specified in this rule are
sent to the Collector running on SYSTEMA.
Creating Rules and Associations
5–15
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
After you click OK, the Policy Manager appears as follows:
The color of the bell next to the rule that you just added an
action to is blue. The blue bell indicates that you have an
action associated with this rule.
6.
5–16
Getting Started
Repeat Steps 1-6 for each of the other rules, so that each of
the rules have an action of Collector, with the same host
name as you just specified for the NT-Application rule.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
When you finish defining these actions, the Policy Manager
looks as follows:
Notice that the bells are blue for all the policies indicating that
you have defined actions for them.
Add the Security Monitor Action
Now that you have assigned the Collector action to the policies,
it is time to add the Security Monitor action. The Security
Monitor action sends events to the Security Monitor. For the
purpose of this scenario, you will add a Security Monitor action
to the NT-Security policy object, and only that object. This will
result in those events (in addition to being sent to the Collector
database components) being sent to the Security Monitor.
Creating Rules and Associations
5–17
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
To add an action to the NT-Security policy, follow these steps:
1.
5–18
Getting Started
Right-click the NT-Security policy item, and then choose
Properties from the pop-up menu as follows:
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
After you choose Properties, the following Properties dialog
appears:
2.
Click the Actions tab.
Creating Rules and Associations
5–19
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
The Actions tab appears:
3.
5–20
Getting Started
In the top part of the window, use the scroll bar to scroll
down until you see Security Monitor, and then check
Security Monitor.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
Your window should look as follows:
4.
In the Details portion of the window, click Add.
After you click Add, the Add Target dialog appears:
5.
Enter the host name (or IP address) of the machine where
the Security Monitor component (part of the Data Tools) is
installed in the Host Name or IP Address field, and then
click OK. The target machine is the system that you want
these messages sent to for display on the Security Monitor.
For the purpose of this scenario, the Security Monitor was
installed on a machine named SYSTEMA. Therefore, enter
SYSTEMA in the Host Name or IP Address field, and then
click OK.
Creating Rules and Associations
5–21
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 4: Specify Rules
Note: Substitute the name (or IP address) of the machine on
which you installed the Data Tools components for
SYSTEMA.
When you click OK, the Actions tab appears as follows:
6.
Click OK again to save the action and target Security
Monitor information.
The Policy Manager is visible again on the desktop.
5–22
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 5: Create Associations
Step 5: Create Associations
The next step is to establish a link or association between the AN
group object you created and populated in Steps 1 and 2 and the
policy folder that you created and populated in Steps 3 and 4.
If you do not create the association, eTrust Audit does not know
which policies apply to which groups.
To create the required associations, follow these steps:
1.
Collapse the SampleScenario item on the tree by clicking the
minus sign (-).
2.
Right-click the Sample Scenario item on the tree and choose
Attach AN Group from the pop-up menu as follows:
Creating Rules and Associations
5–23
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 5: Create Associations
After you choose Attach AN Group, the Attach AN Groups
dialog appears:
5–24
Getting Started
3.
Check the SampleScenario AN group item, and then click
OK.
4.
Expand all levels of the SampleScenario policy folder.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 5: Create Associations
The Policy Manager window appears as follows:
The associations between the AN group and the policy folder are
now in place.
Creating Rules and Associations
5–25
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
What’s Next
What’s Next
You have now completed the first five steps of the scenario.
Specifically, you have done the following:
1.
Defined the AN group.
2.
Defined audit nodes that are members of the AN group.
3.
Created policies to identify the events that should be
harvested from the Windows and UNIX sources.
4.
Specified rules that identify specific event record matching
criteria, and the actions to be taken when the criteria is met.
5.
Associated the policies created in Steps 3 and 4 to the AN
group that you created in Steps 1 and 2 by attaching the
policy folder to the AN group.
In the next chapter, you complete the final three steps:
5–26
Getting Started
6.
Activate the policy.
7.
Monitor the deployment of the policy you just activated.
8.
View the results.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Chapter
6
Activating and Monitoring
Policies
Implement Enterprise-wide Security Policies (Part 4)
In the previous chapters, you completed the following steps in
the scenario:
1.
Defined an audit node group.
2.
Defined audit nodes that are members of the audit node
group.
3.
Created policies that identified the events that should be
harvested from the Windows and UNIX sources.
4.
Specified rules that identify specific event record matching
criteria and actions to be taken.
5.
Associated the policies created in Steps 3 and 4 to the audit
node group that was created in Steps 1 and 2.
In this chapter, you complete the final three steps:
6.
Activate the policy.
7.
Monitor the deployment of the policy we just activated.
8.
View the results.
Activating and Monitoring Policies
6–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 6: Activate the Policy
Step 6: Activate the Policy
Now that you have associated a policy to an AN group, you
must activate the policy so that eTrust Audit starts harvesting
the events and sending them to the appropriate places.
To activate the policy, follow these steps:
1.
Expand the SampleScenario policy by clicking the plus sign
(+) so that your Policy Manager window looks as follows:
Notice that next to each of the policies that you defined there
is a blue bell. The blue bell indicates that the policies are
defined properly but are currently not eligible to be
activated. Therefore, you must “toggle” the eligibility setting
of these policies so that they are eligible for activation.
2.
Click the blue bell icon to the left of a policy item, for
example, NT-Application.
The color of the bell immediately changes to red, which
means that the policy is eligible for activation.
6–2
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 6: Activate the Policy
3.
Click each of the blue bell icons, one by one, until all of the
policies have red bell icons next to them as shown in the
following sample:
Now that you have made the individual rules eligible for
activation, (as indicated by the red bells), the next step is to
activate the entire policy folder object.
Activating and Monitoring Policies
6–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 6: Activate the Policy
4.
Right-click the policy folder object that you want to activate,
and then choose Activate from the pop-up menu as shown
in the following sample:
When you choose Activate, the following dialog appears:
5.
6–4
Getting Started
Click Yes.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 6: Activate the Policy
After you confirm your intention to activate the policies, the
Policy Manager changes as shown in the following illustration to
show the results of policy compilation:
The last line visible in the Compilation window indicates the
policy compilation successfully finished, which means that the
policies have been successfully processed by the Policy Manager
compiler to determine that they are suitable for deployment and
that the distribution policy is starting.
Activating and Monitoring Policies
6–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 7: Monitor Deployment of the Policies
Step 7: Monitor Deployment of the Policies
When the policy compilation is completed, the eTrust Audit
Policy Manager automatically distributes the policies to the
appropriate machines (the machines you earlier identified as
members of the AN group).
To view the results of this activation and deployment, follow
these steps:
■
Click Policy Activation Log
6–6
Getting Started
Click the Policy Activation Log icon as shown in the
following illustration:
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 7: Monitor Deployment of the Policies
After you click Policy Activation Log, the Policy Manager
looks as follows:
If any errors are encountered in the distribution of the policies,
those errors will be reported here. See the online help for the
Policy Manager for additional information about these
distribution messages.
Activating and Monitoring Policies
6–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 8: Viewing the Results
Step 8: Viewing the Results
The next step is to view the results of your efforts in the Viewer
and the Security Monitor.
eTrust Audit Viewer
The easiest way to view events routed to the Collector database
is to start the Viewer.
To start the Viewer, follow these steps:
■
From the Start menu, choose Program, Computer Associates,
eTrust, Audit, Viewer.
The Viewer looks like the following sample:
You should already see events from the sources you specified as
part of this sample scenario.
6–8
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Step 8: Viewing the Results
eTrust Audit Security Monitor
Remember that in addition to defining a Collector action, you
also defined a Security Monitor action and told eTrust Audit that
any events from the NT Security logs should be sent to the
Security Monitor.
To start the Security Monitor, follow these steps:
■
From the Start menu, choose Program, Computer Associates,
eTrust, Audit, Security Monitor.
The Security Monitor looks like the following sample:
You should already see events from the sources you specified as
part of this sample scenario.
Activating and Monitoring Policies
6–9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
What’s Next?
What’s Next?
Congratulations! You have defined the eTrust Audit policies
required to put eTrust Audit to work: you can now harvest audit
event data from UNIX sources and from Windows 2000 sources;
you can get this event data into a Windows 2000 Collector
database where that data is then available to you through eTrust
Audit Viewer; and you have directed eTrust Audit to direct
NT-Security related events to the Security Monitor.
Specifically, you have accomplished the following:
1.
Defined the AN group.
2.
Defined audit nodes that are members of the AN group.
3.
Created policies to identify the events that should be
harvested from the Windows and UNIX sources.
4.
Specified rules that identify specific event record matching
criteria, and the actions to be taken when the criteria is met
5.
Associated the policies created in Steps 3 and 4 to the AN
group that you created in Steps 1 and 2 by attaching the
policy folder to the AN group.
6.
Activated the policy.
7.
Monitored the deployment of the policy you just activated.
8.
Viewed the results.
The next chapter describes how to filter records in the Viewer
and how to generate reports.
6–10
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Chapter
7
Viewing, Monitoring, and
Reporting on Events
This chapter provides a brief overview of the following Data
Tools components:
■
Viewer
■
Reporter
■
Security Monitor
Viewing, Monitoring, and Reporting on Events
7–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Viewer: Organize, Filter, and View Audit Data
Viewer: Organize, Filter, and View Audit Data
The Viewer is a versatile tool that lets you organize and view
audit data according to your specific needs.
With the Viewer, you can view, filter, and print your audit logs
as you can from any other database. The filter is a special utility
that lets you focus on particular audit information.
Starting the Viewer
To start the Viewer, click Start in the taskbar, and then choose
Programs, Computer Associates, eTrust, Audit, Viewer.
Note: If you are using Oracle or SQL Server, when you start the
Viewer, you might be asked for the server name, user name, and
password information required to connect to the database. See
the Reference Guide for further information.
7–2
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Viewer: Organize, Filter, and View Audit Data
Filtering Events
You use filters to streamline the kind of information you are
interested in viewing. Filter options are divided into three
categories:
■
■
■
Filter by Field
lets you filter by specific criteria and also
lets you perform a search in the Details/Info field.
Filter by Events
lets you filter according to different
types of events, such as Logon or Administration.
Filter by File
lets you track down sets of activities
performed on files according to the file name.
You invoke a filter by clicking the appropriate icon in the
toolbar, and then by selecting fields in the dialog that opens. The
filtered information is automatically displayed on screen.
When you open the Viewer, you might see a list of records. You
will apply a filter to streamline the information on screen.
Viewing, Monitoring, and Reporting on Events
7–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Viewer: Organize, Filter, and View Audit Data
Applying a Viewer Filter
The first filter we will describe is the Filter by Field.
1.
Click the Filter by Field
icon in the toolbar to open the
Filter by Fields dialog as follows:
2.
Under View From, click Events On and specify yesterday’s
date. Then, under View Through, click Events On and
specify today’s date.
3.
Under Types, uncheck all the options except Information.
4.
Click OK.
The Viewer will automatically update its contents to display
only those records that match the criteria.
7–4
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Viewer: Organize, Filter, and View Audit Data
Tip: You can save the filter for future use for all users or just
the current user.
Saving a Viewer Filter
The following example shows you how to create a filter for all
warnings and error message events and save it for subsequent
use.
1.
In the left pane of the Viewer, select the filter group for
which you want to create a new filter. You can add a new
filter to any group other than the Pre-defined filters group.
Right-click the group and select New Filter, then choose By
Fields as shown in the following:
Viewing, Monitoring, and Reporting on Events
7–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Viewer: Organize, Filter, and View Audit Data
The new Filter by Fields dialog appears:
2.
Under View From, leave the default First Event. Under View
Through, leave the default Last Event.
3.
Under Types, uncheck all the options except Warning and
Error.
4.
Click Save this filter definition for later use.
The Filter Name dialog appears:
7–6
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Viewer: Organize, Filter, and View Audit Data
5.
Enter the name WarningsAndErrors, click Current user only
as shown in the following dialog, and then click OK.
Your new filter appears in the left pane:
Applying a Viewer Filter
To apply a filter, simply double-click the filter in the left pane.
The filter will be automatically applied and the results of the
filter will appear automatically in the Viewer.
Deleting a Viewer Filter
To delete a filter, right-click it in the left pane and choose Delete.
Viewing, Monitoring, and Reporting on Events
7–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Reporter: Customize Reports to Suit Your Organization
Reporter: Customize Reports to Suit Your
Organization
eTrust Audit makes it easy to schedule and tailor a wide range of
reports that keep you up to date on the security of your business.
Starting the Reporter
To start the Reporter, select Start Programs, Computer
Associates, eTrust, Audit, Reporter. The Reporter opens as
follows:
7–8
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Reporter: Customize Reports to Suit Your Organization
Displaying and Printing Reports
You can customize the Reporter to meet your needs. For
example, you can do the following:
■
■
■
■
■
■
Select from various display formats for your reports.
Select from several predefined schedules on which the
report will run.
Assign a user-defined file that the report will overwrite each
time it is transferred.
Tell eTrust Audit to notify you by email once the report is
complete.
Choose to limit the report using constraints such as time
frame or computer and user name.
Select the database from which eTrust Audit will gather the
report data.
Viewing, Monitoring, and Reporting on Events
7–9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Reporter: Customize Reports to Suit Your Organization
Scheduling Reports
To schedule and view reports:
1.
In the folder General Reports, click the plus sign to view all
the reports.
The list expands to display all the general reports as follows:
2.
Right-click the report Details of Logon/Logoff events, and
then choose Add to Schedule from the drop-down menu.
The Add to Schedule dialog appears:
7–10
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Reporter: Customize Reports to Suit Your Organization
3.
Under Task, Format, choose HTML 3.0 document from the
drop-down menu. Leave the default value Schedule Next
and under Days, select the current day of the week. (In this
example, we chose Thursday.)
4.
To customize the data displayed in the report, click Options.
The following screen appears.
5.
In Query Dates, select Today only, and then click OK.
The Add to Schedule dialog reappears.
6.
In the Add to Schedule dialog, set the value of the At field to
one minute later than the actual computer time. Click OK
again to close the Add to Schedule dialog.
The report is automatically generated into the queue. A
message to indicate successful scheduling is displayed; click
OK.
Viewing, Monitoring, and Reporting on Events
7–11
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Reporter: Customize Reports to Suit Your Organization
7–12
Getting Started
7.
Select the tab Scheduled Reports to view the report name
and details:
8.
To immediately view the report, click the View Reports tab.
Then, in the right pane under Creation Time double-click the
report you want to open.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Reporter: Customize Reports to Suit Your Organization
A new window opens displaying the selected report in this
particular case, using Internet Explorer, as follows:
Viewing, Monitoring, and Reporting on Events
7–13
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Security Monitor: Critical Audit Data Delivered in Near-Real-time
Security Monitor: Critical Audit Data Delivered in
Near-Real-time
System administrators and security personnel can use the
Security Monitor to receive heads-up notification of potentially
significant events. The Security Monitor displays events that you
have indicated (through policy definition) that you want
brought to the specific attention of users of the Security Monitor.
The Security Monitor also doubles as an internal “messenger”
for eTrust Audit Services. During installation, you can configure
one Security Monitor to “hold or receive” all eTrust Audit
internal services messages.
Events that appear in the Security Monitor are events that you
specified should be directed to it, and they are sent directly to
the Security Monitor. These events are not stored by the Security
Monitor in a Collector database. (If you want these events stored
in a Collector database, you must specify that action using the
Policy Manager.)
Using facilities included with the Security Monitor, you can do
the following:
■
■
■
Specify how many records the monitor will display in its
“wrap around” buffer.
Save the records to a file.
Export selected events into any application using a Windows
copy command.
Note: The Security Monitor has no report generation, no
filtering, no multiple-windowing capabilities, and no ability to
display events that might have been sent to it while it was not
running. It is a (near) real-time monitor only.
7–14
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Security Monitor: Critical Audit Data Delivered in Near-Real-time
Starting the Security Monitor
To start the Security Monitor, click Start, then choose Programs,
Computer Associates, eTrust, Audit, Security Monitor.
In the Windows system tray, a light bulb icon
the Security Monitor is running.
appears when
Tip: Glow lines appear around the yellow light bulb when a
new alert arrives; otherwise, the light bulb is white with no
glow lines.
You can open the Security Monitor by double-clicking the light
bulb icon. The Security Monitor window looks similar to the
following:
Viewing, Monitoring, and Reporting on Events
7–15
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Security Monitor: Critical Audit Data Delivered in Near-Real-time
Viewing Event Details
To view detailed information about an event, double-click the
desired event to open the corresponding Event Detail window.
The event details display provides a full description of the event
selected. You can view the previous event (record) or the next
event from this window by clicking Previous or Next. You can
also print the event details.
This is an example of an Event Detail window:
7–16
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
What’s Next?
What’s Next?
Organizing, filtering, and viewing audit data is easy. You have
learned the basics about the Viewer, the Reporter and the
Security Monitor. In the following chapter, you will find answers
to common questions about eTrust Audit. Take a moment to
read through the material, as it provides valuable information to
increase your knowledge about your new software.
Viewing, Monitoring, and Reporting on Events
7–17
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Chapter
8
Frequently Asked Questions
Answers To Common Questions
In this chapter, you will find answers to common questions
about eTrust Audit.
Question: Does eTrust Audit archive the audit collection?
Answer: Not directly; however, eTrust Audit sends events to a
commercial relational database (Oracle, SQL Server, and
Microsoft Access) and the data from those databases can be
managed and archived with standard database administration
tools.
Question: What is the overhead on the network caused by
eTrust Audit?
Answer: The overhead depends on the amount of data you want
to collect, on the type of events your system generates, and so
on. The average amount of data sent by Distribution Agent for
each audit record is approximately 300 bytes.
Question: How much disk space and memory are required for
the Collector system?
Answer: A Collector system needs a processor with a minimum
speed of 350 MHz and at least 128 MB of RAM. The event
database requires 0.6 KB to 2 KB per record.
Frequently Asked Questions
8–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Answers To Common Questions
Question: Where does filtering occur? Does filtering occur at the
initial recording point, where the routing agent is placed, or at
the Collector or later?
Answer: The filtering can be applied at any level of event
routing. It may be applied at the recorder service that defines
which events are submitted to eTrust Audit. It might be applied
on the client machine to define what events are sent to the
Collector.
Question: Does eTrust Audit pass information in clear text over
the wire?
Answer: Data transferred from the Recorder and SAPI client
(recorder) to router, from router to router, and from router to
Collector is protected by pluggable encryption. DES encryption
is the default.
Question: If I have an application that is not currently supported
by eTrust Audit, can I still route the application events to the
Collector?
Answer: You can provide the bridge between your application
and the Collector in several ways:
■
■
8–2
Getting Started
SNMP traps—You can use the eTrust Audit SNMP traps to
send standardized event information to the eTrust Audit
SNMP Recorder. Many products are readily available to
send such event information. This routing path must be
properly configured so that eTrust Audit will be able to
receive and handle this application information.
Submit API—This is a powerful and thorough method to
send event information to the Collector. By programming
with eTrust Audit Submit API function calls, applications
can send complete, detailed messages to eTrust Audit and in
turn eTrust Audit can perform more granular and more
intelligent analysis on the collected data, and activate alerts
when needed.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Answers To Common Questions
■
■
Standard System Logs—If your application sends messages
to the standard Windows Event Logs, or to the UNIX syslog,
eTrust Audit can harvest messages from those facilities’
generic “flat” log files. Included with eTrust Audit is a
facility known as the generic recorder. The generic recorder
can be configured to harvest messages from flat files, which
are used as log files by many applications. If your
application generates “flat file logs,” using the eTrust Audit
generic recorder might be another viable way of harvesting
event information from that application.
eTrust Products—You can send your application event
information from eTrust products to eTrust Audit. eTrust
Audit provides full support to most of the eTrust products
and can consolidate collected information for analysis and
pattern matching. In this way, application activities that are
tied to eTrust products or that can be captured by eTrust
products can send events to eTrust Audit through its related
eTrust product. For example, certain firewall products can
generate events based on network connections or application
sessions. In this case, firewall information can be captured
by eTrust™ Intrusion Detection, and be collected and sent to
eTrust Audit for analysis or archiving.
Question: Are there predefined rules that can be deployed right
away?
Answer: eTrust Audit provides several predefined rules that can
be deployed right away. Each policy is divided into two sections,
each with associated rules. The two sections include:
■
■
Collection rules: all the events from that source type
Suspicious events rules: security and system related events
that include:
–
Logon (successful/failure)
–
Critical objects tampering
–
Network connections
Frequently Asked Questions
8–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Answers To Common Questions
8–4
Getting Started
–
“Touching” OS/Application Super User
–
Account Management
–
Changing permissions or security policies
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Appendix
A
Installing the Client
Components on UNIX
This is an optional installation step and is necessary only if you
plan to harvest audit data from UNIX or Linux servers.
Pre-Installation Considerations
This installation process requires you to provide answers to
several questions. To ensure proper results, we encourage you to
have answers prepared for these questions before beginning the
installation.
General Information
You should have answers to the following general questions
before beginning the installation of the Client components on
UNIX:
■
■
Name of the machine that will be serving as the Self-Monitor
host (also know as the Security Monitor)
Name of the Policy Manager machine (also known as the
Trusted Server)
Installing the Client Components on UNIX
A–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-Installation Considerations
Unicenter Information
eTrust Audit can forward designated audit events to Unicenter.
If you plan to enable this feature you will need to have the
following information available:
■
Path (directory name) where the Unicenter Event
Management components are installed.
Check Point FireWall-1 Information
If you are installing the eTrust Audit Recorder for Checkpoint
FireWall-1, you need the following information available:
■
Check Point server logical name
■
Check Point server host name or IP address
■
OPSEC port number
■
OPSEC connection type
Note: If you do not have the information above, check with your
Check Point FireWall-1 administrator, who should be able to
provide you this information.
Netscape (iPlanet) Information
If a Netscape (iPlanet) server is installed on this machine, and
you want eTrust Audit to tap into the Netscape (iPlanet) log, you
need the following information available:
■
A–2
Getting Started
Fully qualified path (file name) of the Netscape (iPlanet) log
file
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-Installation Tasks
Pre-Installation Tasks
When installing the Collector database, a separately licensed
version of Oracle must already be installed and properly
configured to run.
You must perform the following pre-installation tasks before
you try to install the Data Tools for use with an Oracle database.
Collect Oracle Information
If you will be installing the eTrust Audit Oracle Recorder, have
the following information available:
■
■
■
■
Oracle Home path; that is, where the Oracle client software
is installed on this machine
Oracle SID, if the Oracle database is running on this machine
Oracle service name, if the Oracle database is running on a
remote machine.
User name and password of an Oracle user ID with database
database administrator (DBA) privileges.
Note: If you do not have the information above, check with your
Oracle database administrator.
Installing the Client Components on UNIX
A–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-Installation Tasks
Review Logging of UNIX Events
The Recorder that you install on your UNIX system reviews the
information in syslog.conf and sulog to determine the names
and locations of the log files. Therefore, you should carefully
review the information in syslog.conf and sulog to be sure that
you are instructing your UNIX system to log events that you
want to harvest, view, and analyze using eTrust Audit.
Reviewing syslog.conf
This topic provides a brief overview of syslog.conf and some
guidelines for the types of entries you might find useful. You
should review the syslog.conf file on each of your UNIX systems
and the man pages for your UNIX systems for more information.
If you are familiar with syslog.conf conventions, skip to
Guidelines for syslog.conf Entries.
syslog.conf is the configuration file used by the syslogd system
log daemon, which reads messages and routes them to log files
and users. syslog.conf specifies the types and levels of messages
to write to a log file or route to a user.
syslog.conf consists of a number of entries with two fields
separated by a tab character:
selector
action
where:
selector
Is a list facilities and severity levels as follows:
facility.level;faciltyn.leveln…
See the UNIX man pages for a description of each of the
facilities and levels supported.
A–4
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-Installation Tasks
Some important facilities that you might choose to monitor
are as follows:
user
Messages generated by the user process
kern
Messages generated by the kernel
mail
Messages generated by the mail subsystem
daemon
Messages generated by the system daemons
auth
Messages generated by the authorization system,
including login and su
*
A mask that represents messages from all facilities
Some of the important levels (in order of descending
importance) that you might choose are described in the list
that follows. When you specify a level, such as alert, all
levels above that level are logged, too.
emerg
Conditions that would normally be broadcast to all users
alert
Conditions that should be corrected immediately, such
as a corrupted system database
crit
For warnings about critical conditions, such as device
errors
err
Conditions for other errors
warning
Warning messages
notice
Conditions that are not error conditions, but might
require special handling
Installing the Client Components on UNIX
A–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-Installation Tasks
info
Informational messages
debug
Messages that are used only to debug a program
none
No messages
action
Indicates where to forward the message. You can forward
the message to the following:
■
■
■
A file, such as /var/log/auth
The name of a remote host in the form @server so that
the syslog.conf file on that server determines the action
for the message
An asterisk (*), which means the message is written to all
logged-in users
Guidelines for syslog.conf Entries
Consult your enterprise security policy to determine what types
of messages you want to log. You might consider these
recommendations:
■
Write all messages issued by the login system at the info
level and above to a file. For example:
auth.info
/var/adm/syslog
You can specify any name for the file. eTrust Audit will
locate the file and harvest the messages in it.
■
Write all system messages to a file. For example:
*.err;kern.notice;auth.notice
*.err;kern.debug;daemon.notice;mail.crit
/dev/sysmsg
/var/adm/messages
The first line contains three specifications that log messages
to the /dev/sysmsg file. The file contains all messages at the
error level and above, all kernel messages at the notice level
and above, and all auth messages at the notice level and
above.
A–6
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-Installation Tasks
The second line contains four specifications. The file contains
all messages at the error level and above, all kernel messages
at the debug level and above, all daemon messages at the
notice level and above, and all mail messages at the critical
level and above.
Tip: Do not worry about logging the same facility and level
of messages to more than one file. eTrust Audit reviews the
timestamp and text of all messages and harvests only one
version of the message.
■
eTrust Audit ignores messages routed to users such as the
following:
*.alert;kern.err;daemon.err
*.alert
*.emerg
■
operator
root
*
Check the syslog.conf on other servers to make sure
messages routed to another server are written to a file. For
example, the following entry routes all auth facility
messages at the info level and above to the server named
systemq:
auth.info
@systemq
Review the syslog.conf file on systemq to ensure that these
messages are written to a file.
Reviewing sulog
sulog is a log file of all the attempts by users to issue the su
command, which is the command to become the superuser.
eTrust Audit harvests all events in sulog.
Installing the Client Components on UNIX
A–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Installation Steps
Use the following procedure to install the Client components on
UNIX:
1.
Login to the UNIX machine as root.
2.
Place the eTrust Audit Installation media into the CD-ROM
drive, and change to the installation directory for the Client
components for the version of UNIX you want to install as
follows:
cd
/CDROM_MOUNT_POINT/eTrust/Audit/Client/version_of_UNIX
where version_of_UNIX is one of the following:
3.
■
Aix
■
Hpux
■
Linux
■
Solaris
■
Tru64
Use the ls command to view the contents of that directory.
You will find three files in that directory, as follows:
■
A tar archive that contains the product install image:
_xxxxxxxxxxxxxxxxxx.tar.Z
where xxxxxxxxxxxxxx in the above will be substituted
for platform and build designation.
A–8
Getting Started
■
An installation shell script named install_eAuditClient.
■
An installation notes file named Install.txt.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
4.
While still logged in as root, begin installation by executing
the install_eAuditClient shell script. From the shell prompt,
enter the following command:
./install_eAuditClient
The installation script begins.
Tip: You might need to use the chmod a+x
install_eAuditClient command if the installation script fails
to start.
5.
Follow the instructions provided by the installation script.
Installing the Client Components on UNIX
A–9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Appendix
B
Installing the Data Tools
Components on UNIX
This is an optional installation step and is necessary only if you
plan to have the Collector running on UNIX using an Oracle
database.
About the Data Tools Components
As described in the chapter, “The Essentials,” the Data Tools are
comprised of two major components
1.
The Data Tools interface (Windows only)
2.
The Collector (Windows and UNIX)
This following topics guide you through the process of
preparing for installation of the Collector running on a UNIX
machine.
Installing the Data Tools Components on UNIX
B–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-Installation Considerations
Pre-Installation Considerations
The installation process requires you to provide answers to
several questions. To ensure proper results, you should have the
answers for these questions before beginning the installation of
the Collector on UNIX:
■
The name of the machine that will be serving as the SelfMonitor host (also known as the Security Monitor machine)
Pre-installation Tasks
When installing the Collector, a separately licensed version of
Oracle must already be installed and properly configured to run.
You or your Oracle DBA must perform the following tasks
before you try to install the Data Tools for use with an Oracle
database.
B–2
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-installation Tasks
Prepare the Oracle Database Environment
The following administrative tasks must be performed by an
Oracle database administrator (DBA) before you begin the
installation of the Collector:
Create Oracle Tablespace
Create an Oracle tablespace for the Collector to use as a database
to store events.
The following sample illustrates the syntax for creating the
required tablespace using the Oracle tools.
create tablespace ca_audit datafile
'/oracle/oradata/YYY/ca_audit.dbf' size 100M;
where:
create tablespace
Is the action you want the Oracle tools to perform.
ca_audit
Is the name of the Oracle database tablespace being created.
datafile ‘/oracle/oradata/YYY/ca_audit.dbf’
Is the name to be assigned to the file that will contain the
tablespace being created. Substitute for
‘/oracle/oradata/YYY/ca_audit.dbf’ with whatever
filename your Oracle DBA determines.
size 100M
Is the initial size of the tablespace, 100 megabytes. The 100
MB size provided in this example is a reasonable value to
start with for most installations, but depending on the
amount of audit data you will be collecting, you may want
to increase or decrease this size.
Installing the Data Tools Components on UNIX
B–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-installation Tasks
Define Oracle User ID with DBA Privileges
Define an Oracle user ID with database administrator (DBA)
privileges that will be used by the Collector to write to the
tablespace. The tablespace just defined for use by the Collector
must be the default tablespace for this user.
The following sample illustrates the syntax for creating the
requisite Oracle user ID with DBA privileges.
create user AuditDBA identified by AuditDBA default tablespace
ca_audit temporary tablespace temp;
where:
create user
Is the action you want the Oracle tools to perform.
AuditDBA
Is the user ID about to be created. You can substitute for
AuditDBA as you deem appropriate, but this is the user ID
that must be specified when asked for by the installation
process of the Data Tools.
default tablespace ca_audit
Specifies that this user’s default tablespace is the ca_audit
tablespace. The user ID must have this tablespace defined as
its default tablespace.
temporary tablespace temp;
Specifies that this user’s temporary (work) tablespace is the
temp table. Substitute for temp with whatever tablespace
your Oracle DBA indicates should be used for temp.
B–4
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-installation Tasks
Collect Oracle Information
To complete installation of the Collector, have the following
information available:
■
■
■
■
Oracle Home path; that is, where the Oracle client software
is installed on this machine
Oracle SID, if the Oracle database is running on this machine
Oracle service name, if the Oracle database is running on a
remote machine
User name and password of an Oracle database user ID that
has the Oracle tablespace that you earlier created for use by
the Collector, defined as that user’s default workspace
Note: If you do not have the information above, check with your
Oracle database administrator.
Update tnsnames.ora
The Collector must have its own Oracle database service created
for it. You do this by modifying the Oracle configuration file
tnsnames.ora.
The following steps describe how to accomplish this task:
1.
Change to the Oracle home directory.
cd $ORACLE_HOME/network/administration/
In that directory, you will find a file named tnsnames.ora.
2.
Using an ASCII text editor, open the file tnsnames.ora, and
add the required configuration section to define the Oracle
service that will be used by the Collector.
Installing the Data Tools Components on UNIX
B–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Pre-installation Tasks
Use the following sample code as a model:
NewServiceName =
(DESCRIPTION =description
)
(ADDRESS_LIST =
(ADDRESS = (PROTOCOL = TCP)(HOST = IPAddr)(PORT = port))
)
(CONNECT_DATA =
SERVICE_NAME = (SID =sid))
where:
NewServiceName
The name you want to assign to this new Oracle service. This
field is required.
description
A description for the new Oracle service. The keyword is
required, but you can leave the data field empty.
IPAddr
The IP address of the machine where the Oracle Database
Server physically resides and runs. This field is required.
port
The port number to be used by the Oracle client components
to attach to the Oracle server instance. Typically, this is port
1521. This field is required.
sid
The SID for the Oracle instance associated with this service.
This field is required.
Note: If you do not have the information above, or need help
configuring tnsnames.ora, check with your Oracle database
administrator.
B–6
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Installation Steps
Use the following procedure to install the Data Tools
components on UNIX:
1.
Log into the UNIX machine as root.
2.
Place the eTrust Audit installation media into the CD-ROM
drive.
3.
Change to the installation directory for the Data Tools for
the version of UNIX you want to install.
cd
/CDROM_drive/eTrust/Audit/DataTools/version_of_UNIX
where CD-ROM_drive is the path representing the CD-ROM
where the eTrust Audit installation media is mounted, and
version_of_UNIX is the version of UNIX onto which you
want to install the Data Tools, for example:
cd d:/eTrust/Audit/DataTools/Solaris
4.
Enter the ls command to view the contents of that directory.
You should find the following files in that directory:
■
A tar file that contains the product install image in the
form xxxxxxxxxxxxxx.tar.z for the platform and build
designation, for example:
SOLARISAC152.53.tar.Z
■
■
■
An installation shell script named install_eAuditDatSrv
An Oracle SQL script that is used to create the database
tables required named oracle.sql
Installation notes named Install.txt
Installing the Data Tools Components on UNIX
B–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Create Oracle Database Tables
Before you install the Data Tools, you must create the database
tables in Oracle as follows:
1.
Log in with a user ID that is a member of the group sys, and
is also defined to Oracle as a user ID with DBA privileges
(typically, the root user ID has both of these privileges), and
execute the Oracle utility, SQLPLUS.
2.
After the utility starts, instruct it to execute the oracle.sql
script on the installation media using the following
command:
@file_name.sql
or
START file_name.sql
where file_name is the fully-qualified file name of the
oracle.sql script on the installation media, for example:
CDROM_drive/eTrust/Audit/DataTools/Solaris/oracle.sql
B–8
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Install the eTrust Audit Data Tools
After the database tables are created, you can install the Data
Tools as follows:
1.
While still logged in as root, execute the
install_eAuditDatSrv shell script, by entering the following
command:
CDROM_drive/eTrust/Audit/DataTools/version_of_UNIX/install_eAuditDatSrv
For example, the following command entered from the shell
prompt starts the installation shell script for the Solaris
version of UNIX:
./eTrust/Audit/DataTools/Solaris/install_eAuditDatSrv
The installation script begins.
Tip: You might need to use the chmod a+x
install_eAuditClient command if the installation script fails
to start.
2.
Follow the instructions in the installation script.
Installing the Data Tools Components on UNIX
B–9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Appendix
C
Installing the Data Tools on
SQL Server
This appendix describes how to install the Data Tools on
Windows for use with an existing Microsoft SQL Server
database. It also describes how to troubleshoot common errors
experienced during the installation.
Installing the Data Tools on SQL Server
C–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Installation Steps
To configure the Data Tools to work with a local or remote
Microsoft SQL Server database, follow these steps:
1.
Insert the product installation CD into the CD-ROM drive.
The product explorer automatically starts, and the following
window appears:
Note: If this window does not appear, use Windows
Explorer, and execute the program PE_I386.exe located in
the root directory of the CD.
C–2
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
2.
Click the plus sign (+) to expand the eTrust Products branch
of the tree, and then expand the eTrust Audit V1.5SP2
branch to display the three major components as follows:
Installing the Data Tools on SQL Server
C–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
C–4
Getting Started
3.
Expand the Data Tools branch, and then select eTrust Audit
Data Tools for Windows NT/2000/XP as shown in the
following window:
4.
After you review the product information, click Install. The
eTrust Data Tools installation begins.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
5.
The next few windows ask you to accept the License
Agreement, and that you should close any Windows
applications. After you do so, the Setup Type window
appears:
6.
For the purpose of this sample, select Standard, and then
click Next.
Installing the Data Tools on SQL Server
C–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
The Database Type window asks you to choose the type of
database that you want eTrust Audit to use as the Collector
database:
7.
Select Microsoft SQL Server running on a local or remote
machine, and then click Next.
After you click Next, the Database Configuration window
appears:
C–6
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
8.
Enter the name of the machine where the Microsoft SQL
Server database is running, and the user ID and password of
a Microsoft SQL Server database administrator.
9.
Before you click Next, we strongly recommend that you click
Test to confirm that the information you entered on this
window can connect to the SQL Server database.
If the information provided is correct, and the Microsoft SQL
Server database is running on the machine specified, the
following window appears:
10. Click Close to dismiss the Connection Test window, and
then click Next to continue.
Note: See the Troubleshooting Problems with Data Tools
and Microsoft SQL Server topic later in this chapter for
information about common errors that can result when the
test fails, and what to do to correct these errors.
Installing the Data Tools on SQL Server
C–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the Event Database window appears:
11. On this window, specify whether you want to create a new
Collector database or work with an existing Collector
database, as follows:
■
■
C–8
Getting Started
If you do not already have a Collector database installed
and formatted on the machine, choose Create a New
Event Database, and then click Next.
If you already have a Collector database installed and
formatted on the machine, choose Keep Existing Events
in Database, and then click Next.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the SMTP Server window appears:
12. The Data Tools components can send alerts through a
variety of mechanisms, including email:
■
■
To use this feature, enter the name of the email server to
which the Data Tools components running on this
machine should route emails.
If you do not want to use this feature now, or if you are
not certain what email server name to specify you can
leave the Server field blank, and click Next because you
can enable the email support at any time. See the
Reference Guide for details.
Installing the Data Tools on SQL Server
C–9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
The following window asks you to specify the name of the
Security Monitor machine to which the Data Tools should
send notifications:
13. For the purpose of this sample, the Security Monitor
component is installed on the same machine on which you
are currently installing the Data Tools. Therefore, enter
localhost in the Host field, and then click Next.
C–10
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the eTrust Audit Services
Configuration window appears:
14. This window lets you change the account under which the
eTrust Audit Data Tools services run. For the purpose of this
sample, accept the default of LocalSystem by clicking Next.
15. As a final check, the installation displays a window listing
the choices that you have made. Click Continue after you
review your selections.
The installation proceeds. At the end of the installation, the
following window appears:
16. For the purpose this sample, click Yes to start the eTrust
Audit Data Tools services.
Congratulations! You have successfully installed the Data Tools.
Installing the Data Tools on SQL Server
C–11
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Troubleshooting Problems with Data Tools and Microsoft SQL Server
Troubleshooting Problems with Data Tools and
Microsoft SQL Server
This topic describes the following common errors:
■
Connection Failed
■
Login Failed
You should also see the “Database Considerations” chapter in
the Reference Guide.
Connection Failed
The following window appears when you test the connection
during the installation:
Check for the following causes:
■
■
C–12
Getting Started
The Microsoft SQL Server database is not currently running
on the machine you specified.
You did not spell the name of the machine correctly.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Troubleshooting Problems with Data Tools and Microsoft SQL Server
The Microsoft SQL Server Database is not currently running on the machine you
specified
Probable causes for this condition are as follows:
■
SQL Server might be shut down.
■
SQL Server might not be installed on this machine.
■
The remote machine might not be running.
■
A firewall might be blocking your access to that remote
machine).
Verify the status of these items with your network administrator.
Click Close to dismiss this window, and perform the test again
when the required system is available.
You did not spell the name of the machine correctly
Do either of the following:
■
■
If the machine name is correct, confirm that the machine is
running, and that the Microsoft SQL Server database is
running, and click Test again.
If the machine name is not correct, click Close to dismiss this
window, and correct the machine name in the previous
window.
Installing the Data Tools on SQL Server
C–13
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Troubleshooting Problems with Data Tools and Microsoft SQL Server
Login Failed
The following window appears when you test the connection
during the installation:
You have entered an incorrect user ID and password.
Note: The user ID and password must be valid credentials for
accessing the Microsoft SQL Server database as a database
administrator.
Confirm that the user ID and password are valid and are
credentials for a Microsoft SQL Server database administrator.
C–14
Getting Started
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Appendix
D
Installing the Data Tools on
Oracle
This appendix describes how to install the Data Tools on
Windows for use with an existing Oracle database. It also
describes how to troubleshoot common errors experienced
during the installation.
Pre-Installation Tasks
When installing the Collector, a separately licensed version of
Oracle must already be installed and properly configured to run.
You or your Oracle database administrator (DBA) must perform
the following tasks before you try to install the Data Tools for
use with an Oracle database.
Installing the Data Tools on Oracle
D–1
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Pre-Installation Tasks
Prepare the Oracle Database Environment
The following administrative tasks must be performed by an
Oracle DBA before you begin the installation of the Collector.
Create Oracle Tablespace
Create an Oracle tablespace for the Collector to use as a database
to store events.
The following sample illustrates the syntax for creating the
required tablespace using the Oracle tools.
create tablespace ca_audit datafile
'c:\oracle\oradata\YYY\ca_audit.dbf' size 100M;
where
create tablespace
Is the action you want the Oracle tools to perform.
ca_audit
Is the name of the Oracle database tablespace being created.
‘c:\oracle\datafile\oradata\YYY\ca_audit.dbf’
Is the name to be assigned to the file that will contain the
tablespace being created. Substitute for
‘c:\oracle\datafile\oradata\YYY\ca_audit.dbf’ with
whatever file name your Oracle DBA determines.
size 100M
Is the initial size of the tablespace, 100 megabytes. The 100
MB size provided in this example is a reasonable value to
start with for most installations, but depending on the
amount of audit data you will be collecting, you may want
to increase or decrease this size.
D–2
Getting Started
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Pre-Installation Tasks
Define Oracle User ID with DBA Privileges
Define an Oracle user ID with database administrator (DBA)
privileges that will be used by the Collector to write to the
tablespace. The tablespace just defined for use by the Collector
must be the default tablespace for this user.
The following sample illustrates the syntax for creating the
requisite Oracle user ID with DBA privileges.
create user AuditDBA identified by AuditDBA default tablespace
ca_audit temporary tablespace temp;
where:
create user
Is the action you want the Oracle tools to perform.
AuditDBA
Is the user ID about to be created. You can substitute for
AuditDBA as you deem appropriate, but this is the user ID
that must be specified when asked for by the installation
process of the Data Tools.
default tablespace ca_audit
Specifies that this user’s default tablespace is ca_audit
tablespace. The user ID must have this tablespace defined as
its default tablespace.
temporary tablespace temp;
Specifies that this user’s temporary (work) tablespace is the
temp table. Substitute for temp with whatever tablespace
your Oracle DBA indicates should be used for temp.
Installing the Data Tools on Oracle
D–3
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Pre-Installation Tasks
Collect Oracle Information
To complete installation of the Collector, have the following
information available:
■
■
■
■
Oracle Home path; that is, where the Oracle client software
is installed on this machine
Oracle SID, if the Oracle database is running on this machine
Oracle service name, if the Oracle database is running on a
remote machine
User name and password of an Oracle database user ID that
has the Oracle tablespace that you earlier created for use by
the Collector, defined as that user’s default workspace
Note: If you do not have the information above, check with your
Oracle database administrator.
D–4
Getting Started
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Pre-Installation Tasks
Configure an Oracle Client (If Accessing a Remote Oracle Database)
If the Oracle database that the Data Tools will be using is
installed on a different machine than the machine where you are
installing the Data Tools, then you must install the Oracle client
components and properly configure them on this machine to
access the database on the remote machine.
If the Oracle database resides on the same machine where the
Data Tools are being installed, then these client components are
already available and no additional configuration of the Oracle
client should be necessary.
This pre-installation task is typically required on those machines
where you want to install certain Data Tools components (for
example the Viewer, or the Reporter) to work on a remote Oracle
instance.
At each station where you want the Data Tools to be able to
access the Oracle database instance being used to store the
collected eTrust Audit event data, you must configure an Oracle
client.
To properly configure the Oracle client, you need the following
information:
■
■
■
Name or IP address of the machine where the Oracle Server
is installed (where the database resides)
The port number of the Oracle Server (usually 1521)
User name and password of an Oracle database user ID that
has the Oracle tablespace that you earlier created for use by
the Collector, defined as that user’s default workspace
Note: If you do not have the information above, check with
your Oracle database administrator.
Installing the Data Tools on Oracle
D–5
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Pre-Installation Tasks
To configure an Oracle Client, perform the following steps:
1.
Start the Oracle configuration utility (Oracle Net8 Easy
Config utility for Oracle 8, or Net8 Configuration Assistant
for Oracle 8i and 9i), and then follow the utility instructions.
Choose Add New Service.
Any name is acceptable as a name of the new service, but we
recommend you use the same name for all users.
3.
Select TCP/IP as protocol for connection to the service.
4.
Specify the host name where the Oracle database server is
executing (where the database physically resides).
5.
Specify the port number (typically 1521).
6.
Specify the database SID.
7.
Check the new connection by clicking the Test Service
option.
8.
Enter the username and password, and then click Test. If the
result is positive, the connection is properly defined.
If the test fails, or you encounter other problems setting up the
Oracle client components, check with your Oracle database
administrator.
D–6
Getting Started
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Installation Steps
Installation Steps
To configure the Data Tools to work with a local or remote
Oracle database, follow these steps:
1.
Insert the product installation CD into the CD-ROM drive.
The product explorer automatically starts, and the following
window appears:
Note: If this window does not appear, use Windows
Explorer, and execute the program PE_I386.exe located in
the root directory of the CD.
Installing the Data Tools on Oracle
D–7
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Installation Steps
2.
D–8
Getting Started
Click the plus sign (+) to expand the eTrust Products branch
of the tree, and then expand the eTrust Audit V1.5SP2
branch to display the three major components as follows:
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Installation Steps
3.
Expand the Data Tools branch, and then select eTrust Audit
Data Tools for Windows NT/2000/XP as shown in the
following window:
4.
After you review the product information, click Install. The
eTrust Data Tools installation begins.
Installing the Data Tools on Oracle
D–9
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Installation Steps
D–10
Getting Started
5.
The next few windows ask you to accept the License
Agreement, and that you should exit all Windows programs.
After you do so, the Setup Type window appears:
6.
For the purpose of this sample, select Standard, and then
click Next.
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Installation Steps
The Database Type window asks you to choose the type of
database that you want eTrust Audit to use as the Collector
database:
7.
Choose Oracle running on a local or remote machine, and
then click Next:
After you click Next, the Database Configuration window
appears:
Installing the Data Tools on Oracle
D–11
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Installation Steps
8.
Enter the name of the Oracle database service, and the user
ID and password of an Oracle user with DBA privileges.
9.
Before you click Next, we strongly recommend that you click
Test to confirm that the information you entered on this
window can connect to the Oracle database.
If the information provided is correct, and the Oracle
database is running on the machine specified, the following
window appears:
10. Click Close to dismiss the Connection Test window, and
then click Next to continue.
Note: See the Troubleshooting Problems with Data Tools
and Oracle topic later in this chapter for information about
common errors that can result when the test fails, and what
to do to correct these errors.
D–12
Getting Started
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Installation Steps
After you click Next, the Event Database window appears:
11. On this window, specify whether you want to create a new
Collector database or work with an existing Collector
database, as follows:
■
■
If you do not already have a Collector database installed
and formatted on the machine, choose Create a New
Event Database, and then click Next.
If you have a Collector database installed and formatted
on the machine, choose Keep Existing Events in
Database, and then click Next.
Installing the Data Tools on Oracle
D–13
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Installation Steps
After you click Next, the SMTP Server window appears:
12. The Data Tools components can send alerts through a
variety of mechanisms, including email:
■
■
D–14
Getting Started
To use this feature, enter the name of the email server to
which the Data Tools components running on this
machine should route emails.
If you do not want to use this feature now or if you are
not certain what email server name to specify, you can
leave the Server field blank, and click Next because you
can enable the email support at any time. See the
Reference Guide for details.
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Installation Steps
The following window asks you to specify the name of the
Security Monitor machine to which the Data Tools should
send notifications:
13. For the purpose of this sample, the Security Monitor is
installed on the same machine onto which you are currently
installing the Data Tools on. Therefore, enter localhost in the
Host field, and then click Next.
Installing the Data Tools on Oracle
D–15
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Installation Steps
After you click Next, the eTrust Audit Services
Configuration window appears:
14. This window lets you change the account under which the
Data Tools services run. For the purpose of this sample,
accept the default of LocalSystem by clicking Next.
15. As a final check, the installation displays a window listing
the choices that you have made. Click Continue after you
review your selections.
The installation proceeds. At the end of the installation, the
following window appears:
16. For the purpose this sample, click Yes to start the eTrust
Audit Data Tools services.
Congratulations! You have successfully installed the Data Tools.
D–16
Getting Started
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Troubleshooting Problems with Data Tools and Oracle
Troubleshooting Problems with Data Tools and
Oracle
This topic describes the following common errors:
■
Connection Failed
■
Login Failed
Connection Failed
The following windows might appear when you test the
connection during the installation:
Installing the Data Tools on Oracle
D–17
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Troubleshooting Problems with Data Tools and Oracle
Check for the following causes:
■
■
The Oracle database is not currently running on the machine
you specified.
You did not spell the name of the machine correctly.
The Oracle Database is not currently running on the machine you specified
Probable causes for this condition are as follows:
■
Oracle might be shut down.
■
Oracle might not be installed on this machine.
■
The remote machine might not be running.
■
■
A firewall might be blocking your access to that remote
machine.
Your Oracle database might not be properly configured.
Write down the Oracle error message and provide this
information to your Oracle database administrator.
Verify the status of these items with your network administrator.
Click Close to dismiss this window, and perform the test again
when the required system is available.
You did not spell the name of the service correctly
Do either of the following:
■
■
D–18
Getting Started
If the service name is correct, confirm that the machine is
running, and that the Oracle database is running, and click
Test again.
If the service name is not correct, click Close to dismiss this
window, and correct the service name in the previous
window.
14_oracle_dt_app.doc, printed on 12/18/2002, at 1:44 PM
Troubleshooting Problems with Data Tools and Oracle
Login Failed
The following window appears when you test the connection
during the installation:
You have entered an incorrect user ID and password.
Note: The user ID and password must be valid credentials for
accessing the default Oracle tablespace as a database
administrator.
Confirm that the user ID and password are valid and are
credentials for an Oracle database administrator whose default
access is to the tablespace created for use with eTrust Audit.
Installing the Data Tools on Oracle
D–19
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Appendix
E
Performing a Custom
Installation of the Client
Components
This appendix describes how to perform a custom installation of
the Client components. If you are installing the Client
components on more than one system, perform this installation
on each system.
Performing a Custom Installation of the Client Components
E–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Installation Steps
To install the Client components, perform the following steps
using the product explorer:
1.
Insert the product installation CD into the CD-ROM drive.
The product explorer automatically starts, and the following
window appears:
Note: If this window does not appear, use Windows
Explorer, and execute the program PE_I386.exe located in
the root directory of the CD.
E–2
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
2.
Click the plus sign (+) to expand the eTrust Products branch
of the tree, and then expand the eTrust Audit V1.5SP2
branch to display the three major components as follows:
The first components that you install are the eTrust Audit
Client components.
Performing a Custom Installation of the Client Components
E–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
3.
Expand the Client branch.
After you expand the Client branch, your window looks as
follows:
For the purpose of this sample installation, install the eTrust
Audit Client components on a Windows 2000 platform.
E–4
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
4.
To do this, select the item for eTrust Audit Client for
Windows NT/2000/XP.
The product explorer appears as follows:
After you select the product, two buttons become available
at the bottom of the window, Product Information and
Install. Use them as follows:
Product Information
Click the Product Information button to view special
installation notes, systems requirements, and so on. We
recommend that you review the product information
before you begin the installation.
Install
Initiates installation of the component.
After having reviewed the information that is available by
clicking Product Information, click Install to initiate the
installation of the Client components.
Performing a Custom Installation of the Client Components
E–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
5.
Accept the License Agreement by clicking Yes, and then
click Next until the Setup Type window appears:
6.
For the purpose of the example, select Custom, and then
click Next.
On the following window, select the optional components
you want to install:
E–6
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Note: In this example, other eTrust Audit features are
already installed on this machine (such as Policy Manager),
so the destination folder is already set and cannot be
modified. If no eTrust Audit features were already installed,
you could browse for a different folder.
7.
For this example, select all components except
Documentation, and then click Next.
Note: In the sample, you selected the eTrust Audit SNMP
Recorder. You must perform additional installation and
configuration steps to properly enable the eTrust Audit
SNMP Recorder on Windows. See the Reference Guide.
The next window lets you select the NT event logs that you
want to audit. You can also choose to process all existing
events that reside in these logs. If you choose this option, all
events that already exist in these event logs, regardless of
how old they might be, are processed as soon as the eTrust
Audit services start. If you do not choose this option, only
new events are processed.
8.
For now, use the default settings, and then click Next to
continue.
Performing a Custom Installation of the Client Components
E–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
The next window lets you specify the name of the Security
Monitor machine to which the Client components should
send notifications:
9.
For the purpose of this example, the Security Monitor
components are on the same machine onto which you are
now installing the Client components. Therefore, enter
localhost in the Host field.
Note: If you are installing the Security Monitor components
on a machine other than the machine onto which you are
currently installing the Client Components, specify that
machine name in the Host field.
E–8
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you specify the name of the Security Monitor machine
and click Next, the following warning appears if you have
not yet installed the Security Monitor on your machine
(localhost):
10. Do not worry. For more information on installing the
Security Monitor, see Sample Data Tools Installation in the
“eTrust Audit Essentials” chapter. Click OK to close the
warning.
A Client receives its policy configuration from a machine
where the Policy Manager is running. For proper
management of policy distribution, each client is configured
to work with a specific policy-source machine. After you
complete the Specify the Name of Monitor Machine and the
Warning (if it appears), the Specify Name of the eTrust
Audit Policy Manager Machine window appears:
Performing a Custom Installation of the Client Components
E–9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
11. For the purpose of this example, the Policy Manager
components are on the same machine on which you are now
installing the Client components. Therefore, enter localhost
in the Host field.
Note: If you are installing the Policy Manager components
on a machine other than the machine where you are
currently installing the Client components, specify that
machine name in the Host field, and then click Next.
After you click Next, the following window appears:
12. Do not worry. For more information about installing the
Policy Manager, see Sample Policy Manager Installation in
the “eTrust Audit Essentials” chapter. Click OK to close the
warning.
Next, configure the eTrust Audit Recorder for Check Point
Firewall-1. (This dialog appears because you selected this
component earlier in the procedure.)
E–10
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
13. This dialog lets you manage a list of up to 10 Check Point
Firewall-1 servers from which this eTrust Audit Recorder
can receive events. Use the Add, Edit, Remove, and Remove
All buttons to modify the list of servers.
For example, if you click Add, the New Server dialog
appears:
14. Assuming you have a Check Point Firewall-1 server
running, use this dialog to specify its host name, OPSEC
port, connection type, and the types of logs (Secure or
Account) to audit. See your Check Point Firewall-1
documentation for information about these properties. Click
OK to accept these values, and then click Next to continue
the installation.
Performing a Custom Installation of the Client Components
E–11
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the Generic Recorder Configuration
window appears:
15. Support for harvesting events from IIS, iPlanet, and other
log files is provided by a component known as the Generic
Recorder. To configure a Generic Recorder, select the
recorder that you want to configure, and then click
Configure. (If you want to add a new type of recorder to the
list, click Add.)
For example, suppose you check IIS, and then click
Configure. To configure the Generic Recorder to harvest
records from IIS, you must identify the log files that you
want the Generic Recorder to process.
E–12
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
The Configure Generic Log Recorder window appears:
This screen is used to configure the Generic Recorder to
work with IIS. This screen is used to configure the Generic
Recorder to work with IIS. The first three fields are
automatically filled in for you and cannot be altered using
this window. These fields are filled in with correct values
necessary for the Generic Recorder to work with IIS.
Note: The Browse button to the right of the MP File field lets
you select a different MP file. We highly recommend that
you use the default MP file for IIS.
Tip: The support for harvesting messages from IIS is limited
to IIS logs that are produced in Microsoft IIS Log File
Format. The Generic Recorder harvests messages from “flat
log files,” and the only IIS log file format that the eTrust
Audit generic recorder can support is Microsoft IIS Log File
Format.
Performing a Custom Installation of the Client Components
E–13
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Use this window to add the log files that you want to
monitor as follows:
a.
Click the New File button
.
A Browse button appears.
b. Click it and choose the log file that you want to add to
the list, and then click Open.
c.
You can add as many log files as you like. However, if
you want to mask the name of the log file so that the
Generic Recorder will harvest the records from all files,
click the entry in the list.
Now, you can edit the entry.
d. Use an asterisk character as a mask. By default, IIS log
files in Microsoft IIS Log File Format are named
inmmddyy.log. If you want to harvest events from all log
files named like this, use the following mask:
C:\WIN2K\system32\LogFiles\W3SVC1\in*.log
16. When you have finished making changes, click OK.
E–14
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
The Generic Recorder Configuration window reappears:
17. If you want the Generic Recorder to automatically start
processing IIS logs whenever the system is restarted, check
the box to the left of the Microsoft IIS entry, and then click
Next.
Performing a Custom Installation of the Client Components
E–15
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
The SMTP Server window appears:
18. The Client components can send alerts through a variety of
mechanisms, including email. You can do either of the
following:
■
■
To use this feature, enter the name of the email server to
which the Client components running on this machine
should route emails, and then click Next.
If you do not want to use this feature now or if you are
not certain what machine name to enter here, leave the
Server field blank, and then click Next.
Note: You can configure email support at any time. See the
Reference Guide for details.
E–16
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Next, choose how to administer the eTrust Audit Client
services using the following window:
19. Select whether you want the eTrust Audit Client services to
start automatically at system startup or to have them started
manually by an administrator.
For the purpose of this example, accept the default setting,
Configure services for automatic startup, and then click
Next.
Performing a Custom Installation of the Client Components
E–17
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the eTrust Audit Services
Configuration window appears:
20. This window lets you change the account under which the
Client component services run. For the purpose of this
sample, accept the default of LocalSystem by clicking Next.
After you click Next, the Installation Verification window
appears:
E–18
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
This window lets you install template policies to route failed
login attempts to the machine you identified as the Security
Monitor (localhost). Viewing these events in the Security
Monitor verifies that you have successfully installed these
components. See Verifying Your Installation later in this
chapter for an example of the type of information the
Security Monitor should display after a successful
installation.
21. Click the check box, and then click Next.
As a final check, the installation displays a window listing
the choices that you have made. If you like, click Back to
make any changes. Otherwise, click Continue to start the
installation.
The installation begins displaying various status windows
that describe the progress of the eTrust Audit Client
installation.
The installation proceeds. At the end of the installation, the
following window appears:
22. For the purpose of this sample installation, click Yes to start
the eTrust Audit Client Services.
Performing a Custom Installation of the Client Components
E–19
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Appendix
F
Performing a Custom
Installation of the Data Tools
This appendix describes how to perform a custom installation of
the Data Tools. If you are installing the Data Tools on more than
one system, you will perform this installation on each system.
Installation Steps
Begin by following these steps:
1.
Insert the product installation CD. The product explorer
automatically starts, and the following window appears:
Performing a Custom Installation of the Data Tools
F–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Note: If this window does not appear, use Windows
Explorer, and execute the program PE_I386.exe located in
the root directory of the CD.
2.
F–2
Getting Started
Expand the eTrust Audit V1.5SP2 product tree to display the
three major components as follows:
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
3.
Expand the Data Tools branch, and then select eTrust Audit
Data Tools for Windows NT/2000/XP as shown in the
following illustration:
After you select the product, two buttons become available
at the bottom of the window, Product Information and
Install. Use them as follows:
Product Information
Click the Product Information button to view special
installation notes, systems requirements, and so on. We
recommend that you review the product information
before you begin the installation.
Install
Initiates installation of the component.
After having reviewed the information that is made
available by clicking Product Information, click Install to
initiate the installation of the Data Tools.
Performing a Custom Installation of the Data Tools
F–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
4.
Accept the License Agreement, and then click Next a few
times, until the following window appears:
5.
For the purpose of the example, select Custom, and then
click Next.
The next window lets you select the optional components
you want to install:
F–4
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
In this example, other eTrust Audit features are already
installed on this machine (such as Policy Manager), so the
destination folder is already set and cannot be modified. If
no eTrust Audit features were already installed, you could
browse for a different folder.
Selecting all components is equivalent to using the Standard
Setup option. For the purpose of this example, we will
examine several popular custom configurations:
■
■
■
A collection-only machine (select Collector only)
A data management machine (select everything except
Collector)
A monitor-only machine (select Security Monitor only)
Performing a Custom Installation of the Data Tools
F–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Installing a Collection-Only Machine
A collection-only machine has only the Collector running. It
collects auditing events from Client components and stores them
in the Collector database.
To install a collector-only machine, follow these steps:
1.
F–6
Getting Started
Check Collector in the Optional Components window (as
follows), and then click Next.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
The Database Type widow appears. Choose the type of
database that you want eTrust Audit to use as the Collector
database:
2.
For the purpose of this sample, choose Microsoft Access
running on this machine, and then click Next.
Note: A version of the Microsoft Access database is
automatically provided for your use. Using Microsoft SQL
Server, or Oracle as the underlying database requires that
you separately license and properly install these databases
before you install the Data Tools.
Tip: For information about installing the Collector database
components running over SQL Server or Oracle databases,
see the “Installing the Data Tools on SQL Server” or the
“Installing the Data Tools on Oracle” appendix.
Performing a Custom Installation of the Data Tools
F–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the Specify Name of Monitor Machine
window appears. It asks you to specify the name of the
Security Monitor machine to which the Data Tools should
send notifications:
3.
F–8
Getting Started
For the purpose of this sample, the Security Monitor
components are (or will be) installed on a machine named
systemq. Therefore, enter systemq in the Host field, and then
click Next.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the following window appears. Use it
to specify startup options for the Data Tools services:
4.
Select whether you want the Data Tools services (eTrust
Audit Collector and eTrust Audit Portmap) to start
automatically at system startup, or to have them started
manually by an administrator.
For the purpose of this example, accept the default,
Configure services for automatic setup, and then click Next.
Performing a Custom Installation of the Data Tools
F–9
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the following window appears:
5.
This window lets you change the account under which the
Data Tools component services run. For the purpose of this
sample, accept the default of LocalSystem by clicking Next.
6.
As a final check, the installation displays a window listing
the choices that you have made. Click Continue after you
review your selections.
The installation proceeds. At the end of the installation, the
following window appears:
7.
F–10
Getting Started
For the purpose of this sample, click Yes to start the eTrust
Audit Data Tools services.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Installing a Data Management Machine
A data management machine is a Windows machine that has all
of the Data Tools installed on it except the Collector database.
To install a data management machine, follow these steps:
1.
From Check Viewer, Security Monitor, and Reporter in the
Optional Components window (as follows), and then click
Next.
Performing a Custom Installation of the Data Tools
F–11
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the Database Type window appears:
You might find it odd that we’re asking you to specify a
database type when you just indicated that you did not want
to install the Collector database components. The reason you
are asked to specify the database type is because the
mechanisms that the Data Tools components use to access
the Collector database are different depending on the type of
underlying database.
For the purpose of this sample, the Data Collector database
is installed locally, and it is a Microsoft Access database.
2.
F–12
Getting Started
Select Microsoft Access running on a local or remote
machine and click Next.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the Database Configuration dialog
appears:
3.
The Database Configuration window asks you to identify
where the underlying Microsoft Access database that is
being used by the Collector components is installed. Specify
the fully qualified path to the database, and then click Next.
Important! When performing a custom installation of the Data Tools
components of this type, you are telling the Data Tools that they are to
interface to a Collector database that has been previously installed on
this or some other machine.
Performing a Custom Installation of the Data Tools
F–13
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the following window appears:
4.
The Data Tools components can send alerts through a
variety of mechanisms, including email:
■
■
F–14
Getting Started
To use this feature, enter the name of the email server to
which the Data Tools components running on this
machine should route emails.
If you do not want to use this feature now or if you are
not certain which email server name to specify, you can
leave the server field blank, and click Next, because you
can enable the email support at any time. See the
Reference Guide for details.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
The following window asks you to specify the name of the
Security Monitor machine to which the Data Tools should
send notifications:
5.
For the purpose of this sample, the Security Monitor is
installed on the same machine onto which you currently
installing the Data Tools. Therefore, enter localhost in the
Host field, and then click Next.
Performing a Custom Installation of the Data Tools
F–15
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the eTrust Audit Services
Configuration window appears:
6.
This window lets you change the account under which the
eTrust Audit Data Tools services run. For the purpose of this
sample, accept the default of LocalSystem by clicking Next.
7.
As a final check, the installation displays a window listing
the choices that you have made. Click Continue after you
review your selections.
The installation proceeds. At the end of the installation, the
following window appears:
8.
F–16
Getting Started
For the purpose of this sample, click Yes to start the eTrust
Audit Data Tools services.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
Installing a Monitor-only Machine
A monitor-only machine has only one of the Data Tools
components installed on it, the Security Monitor. Typically
monitor-only machines are used by administrators to monitor
key events related to the status of eTrust Audit itself, such as
services starting or shutting down.
To install a monitor-only machine, follow these steps:
1.
Check Security Monitor in the Optional Components
window (as shown), and then click Next.
Performing a Custom Installation of the Data Tools
F–17
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Installation Steps
After you click Next, the eTrust Audit Services
Configuration window appears:
2.
This window lets you change the account under which the
eTrust Audit Data Tools services run. For the purpose of this
sample, accept the default of LocalSystem by clicking Next.
3.
As a final check, the installation displays a window listing
the choices that you have made. Click Continue after you
review your selections.
The installation proceeds. At the end of the installation, the
following window appears:
4.
F–18
Getting Started
For the purpose of this sample, click Yes to start the eTrust
Audit Data Tools services.
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Appendix
G
Manually Starting eTrust
Audit Services
This appendix describes how to manually start the eTrust Audit
services on Windows and daemons on UNIX platforms.
Windows Platforms
You can manually start the eTrust Audit services on Windows
platforms using a GUI or from a command prompt.
Using the Computer Management or Control Panel GUIs
If you did not configure the services to start automatically, you
can start them from the Computer Management interface in
Windows 2000 or the Windows Control Panel Services applet.
The following services might be installed on your system:
■
eTrust Audit Action Manager
■
eTrust Audit Collector
■
eTrust Audit Distribution Agent
■
eTrust Audit Distribution Server
■
eTrust Audit Generic Recorder
■
eTrust Audit Log Router
■
eTrust Audit Portmap
■
eTrust Audit Recorder
Manually Starting eTrust Audit Services
G–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Windows Platforms
■
eTrust Audit Redirector
■
eTrust Audit SNMP Recorder
To manually start a service, do one of the following steps:
■
Right-click a service and choose Start from the pop-up
menu.
The service starts.
■
Alternatively, you can right-click a service and choose
Properties from the pop-up menu. Then you can choose
Automatic as the startup type.
The service starts and the next time you reboot the system,
the service automatically starts.
Using a Command Prompt Session
You can also start the eTrust Audit services from a command
prompt session. The executables for the services are located in
the following directory:
installation_path\audit\bin
where installation_path is where you installed eTrust Audit.
To start these services manually, follow these steps:
1.
Open a command prompt session (cmd.exe).
2.
Change the directory to the location to where the eTrust
Audit services executables are installed, for example:
cd installation_path\eTrust\audit\bin
where installation_path is where you installed eTrust Audit.
G–2
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Windows Platforms
3.
At the command prompt, enter the following command:
servicename -start
where servicename is one of the following:
acactmgr
The eTrust Audit Action Manager
acdistagn
The eTrust Audit Distribution Agent
acdistsrv
The eTrust Audit Distribution Server
aclogrd
The eTrust Audit Log Router
acrecorderd
The eTrust Audit Generic Recorder
selogrcd
The eTrust Audit Collector
selogrd
The eTrust Audit Redirector
selogrec
The eTrust Audit Recorder
snmprec
The eTrust Audit SNMP Recorder
The service starts.
Manually Starting eTrust Audit Services
G–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
UNIX Platforms
UNIX Platforms
If you did not configure the eTrust Audit daemons (services) to
start automatically, you can start them manually using the
following instructions:
1.
Log in as root.
2.
Using the Bourne or Korn shells, use the steps in the topic
for your UNIX platform.
On Solaris
From the shell prompt, enter the following command:
/etc/rc2.d/S77servicename start
where servicename is one of the following:
acactmgr
The eTrust Audit Action Manager
acdistagn
The eTrust Audit Distribution Agent
aclogrd
The eTrust Audit Log Router
acrecorderd
The eTrust Audit Generic Recorder
snmprec
The eTrust Audit SNMP Recorder
aclogrcd
The eTrust Audit Collector
The service starts.
G–4
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
UNIX Platforms
On AIX
From the shell prompt, follow these steps:
1.
Enter the following command to set environment variables
in preparation for starting the eTrust Audit daemons:
. /usr/eaudit/bin/ac_set_env.sh
2.
Enter the following command to start a service:
/usr/eaudit/bin/servicename start
where servicename is one of the following:
acactmgr
The eTrust Audit Action Manager
acdistagn
The eTrust Audit Distribution Agent
aclogrcd
The eTrust Audit Collector
aclogrd
The eTrust Audit Log Router
acrecorderd
The eTrust Audit Generic Recorder
snmprec
The eTrust Audit SNMP Recorder
The service starts.
Manually Starting eTrust Audit Services
G–5
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
UNIX Platforms
On HP-UX
From the shell prompt enter the following command:
/sbin/rc2.d/S770servicename start
where servicename is one of the following:
acactmgr
The eTrust Audit Action Manager
acdistagn
The eTrust Audit Distribution Agent
aclogrcd
The eTrust Audit Collector
aclogrd
The eTrust Audit Log Router
acrecorderd
The eTrust Audit Generic Recorder
snmprec
The eTrust Audit SNMP Recorder
The service starts.
G–6
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
UNIX Platforms
On Tru64 and Linux
From the shell prompt, enter the following command:
/sbin/rc2.d/S77servicename start
where servicename is one of the following:
acactmgr
The eTrust Audit Action Manager
acdistagn
The eTrust Audit Distribution Agent
aclogrcd
The eTrust Audit Collector
aclogrd
The eTrust Audit Log Router
acrecorderd
The eTrust Audit Generic Recorder
snmprec
The eTrust Audit SNMP Recorder
The service starts.
Manually Starting eTrust Audit Services
G–7
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Index
A
Action Manager, 2-5
actions
Collector, 5-13
Security Monitor, 5-13
specifying for policies, 5-10
Collector
actions, 5-13
described, 2-7
installating a Collector-only machine,
F-6
custom components
Client, E-6
Data Tools, F-4
administrator
identifying at Policy Manager
installation, 2-26
custom installation steps
for Client, E-1
for Data Tools, F-1
AN Type, 3-12
D
audit node groups
associating with policies, 5-23
creating, 3-8
audit nodes
creating, 3-11
switching to, 3-6
B
bells, 5-16
C
Check Point Firewall-1
installing support for, E-10
Client components
described, 2-4
installation steps, 2-17
installation steps on on UNIX, A-8
daemons
starting and stopping, G-4
starting and stopping on AIX, G-5
starting and stopping on HP-UX, G-6
starting and stopping on Solaris, G-4
starting and stopping on Tru64, G-7
Data Management
installating a Data Management
machine, F-11
Data Tools
components, B-1
installation steps, 2-31
installing on Oracle, D-7
installing on SQL Server, C-2
database
selecting type, 2-33
database security, 2-11
Index–1
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Distribution Agent, 2-5
M
Distribution Server, 2-6
E
Microsoft ISA
installing support for, E-12
email
identifying the SMTP mail server at
installation time, 2-12
encryption, 2-11
encup utility, 2-11
MS Proxy
installing support for, E-12
MS-IIS
installing support for, E-12
N
event details, 7-16
Netscape information, A-2
F
New Group dialog, 3-9
filters
types of, 7-3
firewalls
considerations, 2-10
G
Generic Log Scraper, 2-4
Generic Recorder
automatic start, E-15
described, E-12
installing, E-12
selecting log files, E-13
I
installation verification, 2-37
iPlanet
installing support for, E-12
O
Oracle
Client components preinstallation tasks,
A-3
collecting information about, A-3
configuring Oracle clients, D-5
creating database tables, B-8
database considerations, B-3, D-2
preinstallation tasks, B-2, D-1
P
policies
activating, 6-2
adding to a policy foloder, 4-6
associating with AN group, 5-23
confirming deployment, 6-6
copying and pasting, 5-6
deploying, 6-5
specifying properties, 4-10, 4-15
L
Policy Activation Log
starting, 6-6
Log Router, 2-5
policy folders
adding policies to, 4-6
creating, 4-2
Index–2
Getting Started
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
Policy Manager
described, 2-6
identifying at installation time, 2-12
identifying during Client install, 2-21
installation steps, 2-25
starting, 3-5
during Data Tools installation, 2-35
identifying at installation time, 2-12
identifying during Client install, 2-20
identifying during Policy Manager
install, 2-28
installating a monitor-only machine,
F-17
starting, 6-9, 7-15
verifying the installation, 2-37
viewing event details, 7-16
policy properties, 4-10, 4-15
Portmapper, 2-4
and firewalls, 2-10
product explorer, 2-15
R
Recorder for Check Point Firewall-1, E-10
Recorders, 2-4
Redirector, 2-4
remote databases, D-5
report
scheduling, 7-10
Reporter
described, 2-6, 7-9
starting, 7-8
RPCs and firewalls, 2-10
rules
copying and pasting, 5-6
described, 5-2
parts of, 5-3
specifying action for, 5-10
S
scenario
basic steps, 3-2
described, 3-2
objectives, 3-3
services
using a command prompt to start and
stop, G-2
using the Control Panel to start and
stop, G-1
SMTP mail server
identifying during Client install, 2-22
identifying during Data Tools install,
2-34
SQL Server
installing the Data Tools, C-2
Standard System Recorder, 2-4
status
of eTrust Audit components, 2-12
sulog
review, A-7
syslog.conf
guidelines, A-6
review, A-4
system overview, 2-8
system requirements, 2-18
T
tablespace on Oracle, D-2
Security Monitor
actions, 5-13
described, 2-7, 7-14
Index–3
etaudit_gs.doc, printed on 12/18/2002, at 9:34 AM
U
event logging, A-4
installation steps, B-7
installing the Data Tools, B-9
UNIX
Client component installation steps, A-8
Client components Check Point
Firewall-1 preinstallation
considerations, A-2
Client components general
preinstallation considerations, A-1
Client components Netscape
preinstallation considerations, A-2
Client components Unicenter
preinstallation considerations, A-2
Data Tools preinstallation
considerations, B-2
Index–4
Getting Started
user ID with DBA privileges, D-3
V
Viewer
described, 2-6, 7-2
starting, 6-8, 7-2
Viewer filters
deleting, 7-7
saving, 7-5