Mcafee Database Security 4.7.x Product Guide 1-12-2024
Mcafee Database Security 4.7.x Product Guide 1-12-2024
x
Product Guide
Contents
Product overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Key features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
How it works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
System-wide functionality. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Sort data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Manage filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Filter data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Save a filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Apply a filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Delete a filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Upgrade a license. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Working on alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Resolve an alert. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Handling VA results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Resolve a VA result. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Archive VA results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Enable a rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Disable a rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Rule syntax. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Identifiers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Operators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Rule examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Script configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Application mapping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Create an audit rule to monitor DBMS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Rule revisons. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Managing VA Scans. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Create a VA scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Schedule a VA scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Run a VA scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Stop a VA scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Remove a VA scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Import VA test. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Export VA test. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Regulations and compliance rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Approve a sensor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Sensor management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Stop a sensor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Restart a sensor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Delete a sensor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Setup the Data Access Layer (DAL) connection using TLS 1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Troubleshooting procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Communication errors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Predefined roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Working with the McAfee Database Security server in cluster mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Configure your McAfee Database Security servers to work in cluster mode. . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Reporting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Findings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Product overview
Overview
McAfee® Database Security is an easy-to-deploy and highly scalable software solution that monitors the Database Management
System (DBMS) and protects it from internal and external threats and even intra database exploits.
McAfee Database Security Suite for database includes the following products:
• McAfee® Database Activity Monitoring (McAfee DAM) — Protects data from all threats by monitoring activity locally on
each database server and by alerting or terminating malicious behavior in real time, even when running in virtualized or
cloud computing environments.
• McAfee® Virtual Patching — Detects missing patches, applies vulnerability-specific countermeasures and fixes
misconfigurations (via McAfee Database Security virtual patching technology) found by vulnerability scans to improve
the security posture of databases immediately, without requiring any downtime.
• McAfee® Vulnerability Manager for Databases — Automatically discovers databases on the network, determines if the
latest patches have been applied, and tests for vulnerabilities, such as weak passwords, default accounts, and other
common threats. In addition, it allows for detailed data discovery scans, including PII, PCI-DSS, SOX, and HIPPA.
Note
Product features depend on the product version. When a function is unavailable in the version you are using, the User
Interface informs you that a different license is required to enable the feature.
Key features
McAfee Database Security provides full visibility into DBMS user activity and can issue alerts or terminate suspicious activities
based on predefined vPatch rules and custom rules.
In line with the layered defense strategy employed by leading enterprises, McAfee Database Security complements other security
measures, such as encryption, network security, and other tools, by providing a hardened security layer surrounding the DBMS
itself.
• Monitoring of all DBMS activities, including the activities of authorized and privileged users
• Prevention of intrusion, data theft, and other attacks on the DBMS
• Real SQL Injection Protection
• Rule-based policies for users, queries, and DBMS objects
• Quarantine rogue users
• Enterprise level vulnerability assessment for DBMSs
• Quick and easy deployment and configuration
How it works
McAfee Database Security Suite for databases offers real-time protection for databases from all types of threats, external,
internal, and even intra database exploits.
McAfee Database Security is ideal for servers operating in a physical or virtualized environment, on premises, or in the cloud.
1. The McAfee Database Security sensor enables the monitoring of local and network access to DBMSs in real time. The
sensor operates safely in operating system (OS) user-space, and can either run on the machine hosting the DBMS or on a
separate dedicated system, depending on the selected configuration.
2. The McAfee Database Security server is a J2EE server that communicates with all the installed sensors. It can run on a
dedicated physical machine or a dedicated virtual machine.
3. The web console is the interface in which the administrator can monitor and manage all Database Security products.
The McAfee Database Security sensor monitors access to the DBMS and sends transaction data to the McAfee Database Security
server. Based on the policies defined using the McAfee Database Security Web Console, the server logs the transaction, issues an
alert, and prevents access to the DBMS.
Note
Use of the terms DBMS (database management system) and database vary according to platform vendor. In general, DBMS
refers to the overall database system, including the data and the infrastructure around it, but database can refer to the data
tables. In this document, the terms are used interchangeably.
Note
2. Enter the administrator user name and password as configured in the installation, then click Login.
System-wide functionality
Sort data
Customize the view criteria in the McAfee Database Security web console by setting various criteria for sorting data.
Note
You can sort a list by a single criterion at any time by clicking the head of the column according to which you want to sort the
data. Click again to reverse the order (ascending or descending).
For example, you can set the primary sort criteria as the level of the alert in descending order (high severity first); the secondary
sort criteria as the time stamp, in descending order (most recent first).
Task
1. Expand the Edit Filters and click Sort Options.
The Sort By page is displayed with available columns listed in the Table Columns pane.
2. To sort by a specific data column, do the following:
a. Select the column name in the Table Columns pane.
b. Click to apply the sort criteria in ascending order or click to apply the sort criteria in descending order.
The selected column name in the Table Columns pane is moved to Sort By pane.
The current sorting criteria are listed in the Sort By pane, in the order in which they take precedence. The sort order is
indicated by (a) in which they take precedence for ascending or (d) for descending.
3. (Optional) To change the position of the sort criteria, select the column name in the Sort By pane, then click or to
move the column name up or down.
4. (Optional) To remove a column name from the sort criteria, select the column name in the Sort By pane, then click .
5. Click OK to apply the sort criteria.
Manage filters
Filter data
Although the process for defining a filter varies by page, the basic instructions are the same throughout the system.
Task
1. On the Alerts page, expand Edit Filters.
2. Set one or more filter criteria by selecting the relevant values in the drop-down list, such as, Sensor, DBMS, Resolution,
Rule Type, Archives, Level, DBMS Groups, Time, or Compliance.
Note
Any free text field filters also seek a match for the string entered as a substring of the field's value. For example, if you
enter General SQL in the Rule Name field, all alerts triggered by all General SQL injection rules are shown.
3. From the Display alerts per page drop-down list, select the number of alerts to be displayed on each page.
4. (Optional) To sort the results according to specific criteria, click Sort Options, then set the sort criteria.
5. In the other fields, such as, Module, Client ID, OS User, User, Host Name, and Application fields, enter one or more of
these symbols to define the matching criteria.
For example, consider filtering alerts for users, namely user1, user2, john_, and sys.
There are two wildcards used in conjunction with the LIKE operator:
Results
Note
The alert list displays only those alerts that match the filter criteria.
To deselect all filter selections, click Clear.
Save a filter
Create and save multiple filter criteria to reuse the filters when needed. This eliminates the need to redefine the filter criteria
each time you view a page.
Task
1. Expand Edit Filters, define the filter criteria, and then click Save Filter.
2. Enter the name of the filter in the Save filter details dialog box.
3. Click Save.
Results
Apply a filter
Task
1. Select the filter from the Edit Filters drop-down list.
The filter criteria area is refreshed to reflect the values of the customized view.
2. Click Apply.
Note
By default, the most recently used filter is applied each time you access a page.
Task
1. Expand Edit Filters, then select the required filter from the Edit Filters drop-down list.
The details are displayed for the selected filter.
2. Edit the filter criteria, then click Save Filter.
3. In the Save filter details dialog box, provide the same filter name.
4. When prompted to save, click Save.
Delete a filter
Task
1. Select the filter from the Edit Filters drop-down list, then click Delete Filter.
2. Click OK in the confirmation dialog box.
Results
The filter is deleted and is no longer available in the Edit Filters drop-down list.
For security purposes, it is recommended that you change your password from time to time or according to your company
policy.
Task
1. Choose one of the ways to change the password:
• Click the McAfee Database Security account name that is displayed on the top right corner of any page.
• On the Permissions page, click Users tab.
The Users tab displays the User Properties.
2. Click Change Password.
The Change Password dialog box is displayed.
3. Type the current password in the Old Password field.
4. Type the new password in the New Password and Confirm Password fields.
Note
5. Click OK.
Note
McAfee Database Activity Monitoring and Vulnerability Manager for Databases versions enable you to use an external
LDAP server (such as Active Directory) to manage the system users. If you are using an external LDAP server, you do not
have to manage your passwords in McAfee Database Security.
View the status of your license, as well as third-party license and the end-user license agreement (EULA).
Task
1. Click License at the bottom of any page.
The McAfee Database Security License information is displayed.
2. To view third-party license information, click View third-party licenses.
3. To view end-user license agreement, click EULA.
Upgrade a license
You must download the license data file from the McAfee Product Downloads site using their grant number.
Task
1. Click License at the bottom of any page, then click Upgrade License From a File.
2. Click Browse, then select the license file.
3. Click Upload.
Working on alerts
Alerts can be handled in various ways in keeping with company policy and constraints. You can resolve an alert or you can
immediately close a potentially dangerous DBMS session in response to an alert. In addition, you can create a rule based on the
scenario that triggered the alert (particularly useful in preventing future false positives) or establish trust for a specific current
session.
Task
1. On the Alerts page, in the alert list, click the expand icon beside the alert you want to view.
The alert details are displayed. The details displayed vary according to the type of database that is monitored.
2. To view more advanced details for the selected alert, click Detailed View.
Resolve an alert
When an alert is first triggered, the alert is displayed in the alert list with a default status of Unresolved. You can review the
details of the alert and depending on the properties, change its resolution state to either Resolved or False Alarm.
Alerts are triggered based on the rules defined and applied to SQL statements sent to the DBMS. You can also change the state
of a resolved alert back to unresolved.
Task
1. On the Alerts page, click the expand icon beside the required alert.
2. Review the alert details, then select the alert.
3. To resolve an alert, choose one of these options:
4. In the Resolve Alert dialog box, select the applicable resolution option.
Note
McAfee Database Security is provided with preconfigured resolve types. McAfee Database Activity Monitoring users can
define more resolve types to meet their specific needs.
Results
The alert details are updated to reflect the new resolution status.
Note
For easier monitoring, you can filter the alerts list to show only Unresolved alerts.
Task
1. On the Alerts page, select the alerts to be resolved in one of these ways:
3. In the Resolve multiple alerts dialog box, select the applicable resolve option from the drop-down list, then enter a brief
summary of the reason for resolving the alerts.
4. Click Resolve.
Results
The selected alerts are updated to reflect the new resolution status.
Task
1. On the Alerts page, expand the alert that needs to serve as the basis of a rule.
2. Review the alert details, then click Create Rule icon in the Action(s) column.
The Create Rule From Alert dialog box is displayed, with default selected fields. You can edit these fields if required.
3. Click Create.
The Rules → Custom Rules tab is displayed, with an automatically generated condition based on the details of the
originating alert. By default, this is an Allow rule.
4. Edit the rule details to refine its properties, then select the DBMSs where the rule is installed.
5. Click Save.
6. To reorder the rule to the appropriate location in the Custom Rules list, select the rule and move the directional arrow .
Note
Exceptions are typically placed immediately above the rule that triggered the alert.
7. Click Save.
Results
Rule created status appears in the Resolution column of the alerts list.
Task
1. On the Alerts page, expand the required alert in the alert list.
2. Review the alert details, then click the Add Exception icon in the Action column.
The Create Exception From Alert dialog box is displayed with default selected fields. You can edit these fields if required.
Note
If the alert was triggered by several rules, you are prompted to select the rule for which you want to create an exception.
3. Click Create.
The Rules → Custom Rules tab is displayed, with an automatically generated condition based on the details of the
originated alert.
4. Edit the rule details to refine its properties, such as, to allow a specific IP address, and configure actions when the rule
matches.
5. Click Save.
McAfee Database Security Integrity Monitor and McAfee Database Activity Monitoring are provided with a simple mechanism for
creating reports from alerts in PDF format.
You can apply filter to the alerts list and then generate report to the filtered alert list. For example, to generate a report that
contains only alerts that have resolution state of False Alarm, filter the list accordingly before printing the report.
Task
1. On the Alerts page, apply the appropriate filter criteria.
2. In the alert list, select the alerts for which the report needs to be generated.
3. Click Generate Report.
4. In the Generate Report dialog box, choose the required fields that you want to include in the generated report.
5. From the Report format drop-down list, select as PDF or Excel.
If Excel is selected, the report will be generated as XML file, which is a .zip file (archive file).
6. Click Generate.
The report is generated and downloaded as a PDF or XML file, which contains detailed entries for each of the alerts. The
generated XML file can be viewed with Microsoft Excel or PDF reader.
Archive alerts
Archiving the alerts at regular intervals ensures that the size of the alerts does not increase significantly. Archived alerts are
compressed and then stored in an archive file.
McAfee Integrity Monitor and McAfee Database Activity Monitoring are provided with a mechanism for archiving alerts. Archived
alerts do not appear in the alerts list unless the archive file is reloaded.
Task
1. On the Alerts page, apply the appropriate filter criteria.
2. Select the alerts you want to archive.
3. Click Archive before the table header.
4. In the Archive Results dialog box, provide the reason for archiving, and click Archive.
Results
The alerts are sent to the archive configured in the System → Archives section.
Assigning a meaningful resolve type when you resolve an alert makes it easier to monitor the system for recurring problems.
McAfee Database Security has seven preconfigured, system resolve types - Created Rule, False Alarm, Released From
Quarantine, Resolved, Sensor Deleted, Test disabled, and Unresolved. System resolve types can't be edited or deleted.
Task
1. On the System page, click the Resolve Types tab.
2. Click New Type.
3. In the Properties of resolve type, enter a new name for the resolve type in the Name field.
4. Click Save.
Results
Task
1. On the System page, click the Resolve Types tab.
2. For the respective resolve type, click the Properties icon .
The Properties of resolve type dialog box is displayed.
3. Edit the resolve type name, then click Save.
Results
Note
Task
1. On the System page, click the Resolve Types tab.
2. For the respective resolve type, click the Remove icon .
3. When prompted for confirmation, click OK.
Results
Alerts previously resolved using this resolve type are not affected, but the deleted resolve type is no longer available for
selection.
Task
1. On the VA Results page, in the VA result list, click the expand icon beside the required scan result.
The scan result details are displayed. The specific details displayed vary according to the type of database that is monitored.
2. Click Detailed View to view more details for the selected result.
Handling VA results
Resolve a VA result
After analyzing and fixing the VA result, you can change the resolution state to either Resolved or False Positive.
Task
1. On the VA Results page, click the expand icon beside the required VA result.
2. Review the result details, then select the VA result.
3. To resolve a VA result, choose one of these options:
4. In the Resolve multiple results dialog box, select the applicable resolution option from the drop-down list.
Note
McAfee Database Security is provided with preconfigured resolve types. Vulnerability Manager users can define more
resolve types to meet their specific needs.
Results
The result details are updated to reflect the new resolution status.
You can change the resolution state of multiple VA results after analyzing and fixing the VA results.
Note
For easier monitoring, you can filter the VA result list to show only Unresolved alerts.
Task
1. On the VA Results page, select the VA results to be resolved in one of these ways:
3. In the Resolve Multiple VA Results dialog box, select the applicable resolve option from the drop-down list, then enter a
brief summary of the reason for resolving the VA results.
Note
McAfee Database Security is provided with preconfigured resolve types. Vulnerability Manager users can define more
resolve types to meet their specific needs.
4. Click Resolve.
Results
The selected results are updated to reflect the new resolution status.
Archive VA results
Archiving the scan results at regular intervals ensures that the size of the scan results does not increase significantly. Archived
scan results are compressed and stored in the archive file.
Archived results do not appear in the VA Results list unless the archive file is reloaded.
Task
1. On the VA Results page, apply the appropriate filter criteria.
2. Select the scan results you want to archive.
3. Click Archive before the table header.
4. In the Archive Results dialog box, provide the reason for archiving, and click Archive.
Results
The selected results are sent to the archive configured in the system or archive section.
Generate a report that contains detailed information about each of the VA results displayed in the VA result list.
McAfee Database Security Integrity Monitor and McAfee Database Activity Monitoring are provided with a simple mechanism for
creating reports from alerts in PDF format.
You can apply filters to the VA result list and generate a report of the filtered list. For example, to generate a report that contains
only VA results that have resolution state of False Alarm, filter the list accordingly before printing the report.
Task
1. On the VA Results page, apply the appropriate filter criteria.
2. In the VA results list, select the VA results for which the report needs to be generated.
3. Click Generate Report.
4. In the Generate Report dialog box, choose the required fields that you want to include in the generated report.
5. From the Report format drop-down list, select PDF or Excel.
When you select Excel, the report is generated as an XML archive file.
6. Click Generate.
The report is generated and downloaded as a PDF or XML file, which contains detailed entries for each of the VA results.
The generated XML file can be viewed with Microsoft Excel or PDF reader.
Task
1. Click the Dashboard page.
2. Click the required time period such as, Last 10 min, Last hour, Last day, Last 7 days, or Last 30 days on the top right of the
page.
You can view the data available for the selected time period.
Task
1. Click the Dashboard page.
2. Click Recalculate chart data at the top left of the page.
Chart data is refreshed with the latest update.
Task
1. On the Alerts per DBMSs header, click Choose DBMSs.
2. Select the DBMSs for which you want to view alert statistics. You can select up to five DBMSs.
Task
1. On the Most Active vPatch Rules header or Most Active Custom Rules header, click Settings.
The Number of rules selection dialog box is displayed for the selected type of rule.
2. From the Select upto drop-down list, select the number of rules to be include in the respective most active rules list.
3. Click Save.
McAfee Database Security also enables McAfee Database Activity Monitoring users to apply compliance rules.
DBMSs are manipulated by SQL statements and queries on an ongoing basis. Incoming statements are compared to the rules
enabled for the DBMS and action is taken based on the first rule that is matched. If a statement does not match any of the
existing rules, the statement is allowed.
McAfee Database Security provides enhanced DBMS security based on vPatch rules and custom rules. vPatch rules are included
in the installation of the Database Activity Monitoring version and help prevent attacks against known vulnerabilities. In addition,
you can define custom rules to define the level of monitoring and alerts, and further protect your DBMSs against potential
threats. For example, custom rules can be used to limit access to specific tables in the DBMS, or to limit access to the DBMS by
specific users or at specific times of day.
Rules are defined and is enabled for one or more DBMSs. Rules for each DBMS are managed in the various tabs of the DBMS
properties page. vPatch rules are listed on the vPatch Rules tab of the DBMS properties page. Custom rules are listed on the
Custom Rules tab of the DBMS properties page. Incoming statements are checked against the vPatch Rules list before they are
checked against the Custom Rules list.
vPatch rules address known attacks and therefore should not be overruled by custom rules. Nonetheless, you can disable all
vPatch rules or specific rules if the need arises, for example, for false positives where exceptions are unable to resolve the issue.
Enable a rule
You can enable vPatch rules and Custom rules at any time. A rule must be enabled before it can be processed by the sensor.
Task
1. On the Rules page, click the vPatch Rules or Custom Rules tab.
2. In the rules list, click the disable icon in the required row.
Results
Tip
To enable multiple rules, filter the rules list to display all rules or only the rules that you want to enable. Click Enable all rules
in the Actions drop-down list.
Disable a rule
You can disable a rule if you have started to define but have not completed it. Disabled rules are not processed by the sensor
until they are enabled.
• If you have started to define a rule, but have not completed it.
• If you would like to confirm the rule first with another administrator.
• If you need to temporarily allow an action that is normally forbidden.
Task
1. On the Rules page, click the vPatch Rules or Custom Rules tab.
2. In the rules list, click the enable icon in the required row.
The rule is disabled and disable icon is displayed.
Tip
To disable multiple rules, filter the rules list to display all rules or only the rules that you want to disable. Click Disable all
rules in the Actions drop-down list.
Note
A red exclamation point is displayed in the left margin to indicate that a vPatch rule is not installed on any DBMS or DBMS
group.
You can view the details of a vPatch rule, including the DBMSs and DBMS groups where the rule is installed.
Task
1. On the Rules page, click the vPatch Rules tab.
2. In the rules list, click the Properties icon in the required row.
Define the alert level and the action to be taken when the conditions of a specific vPatch rule are met.
Note
Task
1. On the Rules page, click the vPatch Rules tab.
2. In the rules list, click the Properties icon in the required row.
3. In the Action area of the rule properties, set the action as follows:
• To configure email notification in addition to the alert in the log, select Send alert to email, then select the priority
to assign to the email message (Low, Medium, or High). You can also define the email addresses. By default, the
administrator's email address is selected. The email settings must be configured on the System page to route email
alerts correctly.
• To send an alert as an SNMP trap if the rule is matched, select SNMP Trap.
Note
If SNMP is not enabled on the System page in the SNMP tab, this option is disabled.
Note
This option should be used sparingly because terminating sessions can disrupt legitimate business transactions.
Depending on environmental variables (such as command type and table size), session termination might not
stop the current SQL command. Stronger termination capability is provided for DCL and DDL commands that
use a before trigger (see DDL triggers).
If you select Terminate user session, the Quarantine user for option is displayed. To quarantine a user, select
Quarantine, then enter the number of minutes the user is prevented from reconnecting. For the purposes of
quarantine, user represents the database user, OS user, host name, IP address and more, or a combination of
these parameters. The user definition for quarantine purposes is defined in the System → Quarantine → Settings.
• To run an action script if the rule is matched, expand the Advanced actions, then set the script to run on the host
DBMS. You can use all parameters that McAfee Database Security monitors within the script, by using $ as a prefix.
For example, if you want to use the user parameter in a script, enter $user.
For example, revoke dba from $user as part of a script revokes the DBA permissions of the database user who
executed the SQL command.
Note
Configure an action to be taken per DBMS when the conditions of a specific vPatch rule are met.
Alerts are enabled per rule; You can define only how the alert is handled for the selected DBMS.
Note
Actions that are not enabled in the system properties are not available for selection.
Task
1. On the Rules page, click the vPatch Rules tab.
2. In the rules list, click the Properties icon in the required row.
3. In the DBMSs and Groups area, click Change Actions in the row for the DBMS for which you want to define a specific
action.
The vPatch Rule Action Per DBMS page is displayed.
4. To send an alert, select Send Alert, then select the relevant actions:
• McAfee Database Security Console — Generates an alert on the alert screen, according to the selected alert
priority, such as, LOW, MEDIUM, or HIGH.
• SNMP Trap — Sends an alert as an SNMP trap when the rule is matched.
• To Archive — Sends the alert only to the archive (without displaying it in the console or any other location). This
option is suitable for auditing information that does not require monitoring on a day-to-day basis.
• Syslog — Sends an alert to the Syslog when the rule is matched.
• Windows event log — Sends an alert to the Windows event log when the rule is matched.
• Log to file — Sends the alert to a log file.
• Send alert to email — Sends the alert to the specified email addresses.
Note
This option should be used sparingly because terminating sessions can disrupt legitimate business transactions.
Depending on environmental variables (such as command type and table size), session termination might not stop
the current SQL command. Stronger termination capability is provided for DCL and DDL commands that use a before
trigger (see DDL triggers).
If you select Terminate user session, the Quarantine user for option is displayed. To quarantine a user, select Quarantine,
then enter the number of minutes the user is prevented from reconnecting. For the purposes of quarantine, user
represents the database user, OS user, host name, IP address and more, or a combination of these parameters. The
user definition for quarantine purposes is defined in the System → Quarantine → Settings area.
6. To run an action script if the rule is matched, set the script to run on the host DBMS. You can use all parameters that
McAfee Database Security monitors within the script, by using $ as a prefix. For example, if you want to use the user
parameter in a script, enter $user.
For example, revoke dba from $user as part of a script revokes the DBA permissions of the database user who executed
the SQL command.
Note
• From the Limit alerts per second drop-down list, select the maximum number of alerts to generate per second.
• From the Limit alerts per session drop-down list, select the maximum number of alerts to generate per session or
select Unlimited.
Note
The session is uniquely identified by the Session ID and Serial fields in Oracle, and by the Serial ID and Logon
time in MSSQL.
• Select Apply action when rule triggers for which the selected action in the rule is not executed unless the alert
happens the specified number of time in the specified period.
• Select Automatically resolve to to automatically resolve an alert when triggered.
• To prevent the triggering of alerts by signed scripts, select the Ignore Signed Scripts checkbox.
8. (Optional) To prevent the display of sensitive data in alerts, select Mask Sensitive Data and enter a regular expression in
the Regular Expressions text box using standard regular expression syntax.
Note
9. Click Save.
Select the security levels you want to apply to virtual patches. This determines which vPatch rules are in effect in your database.
For example, you can decide whether to receive alerts from low confidence rules or alerts about attacks relevant to Oracle
8i only, even when Oracle 10g is the target. This feature enables you to control the tradeoff between security level and
performance. By default, Security Level (HIGH) is selected. High security was designed as the optimal high security and high
performance combination.
You can view the current security level at the top right corner of the vPatch Rules page.
Task
1. On the Rules page, click the vPatch Rules tab, then click the Security Level (HIGH).
2. In the Security Level, select the security level you want to apply, then click Save.
Tip
You can create and enable custom rules that determine how statements received by the DBMS are handled. Rules can be used to
allow statements that match (whitelist), or they can be used to generate alerts regarding statements that do not match the policy
(blacklist). A rule can also be used to automatically terminate potentially dangerous sessions.
Based on your organization's ongoing monitoring of potential risks, custom rules can be defined to provide protection against
activity that is considered suspicious per your IT policy and to help you protect specific DBMSs according to their functionality.
For example, you might want to monitor access to sensitive tables in an HR DBMS, such as tables with employee compensation
information, or you might want to protect against the usage of specific SQL query tools on production databases. Before trying to
create custom rules, familiarize yourself with the Application Mapping functionality, which can save considerable time in creating
custom rules.
Each rule consists of one or more comparator statements. The relationship between multiple comparator statements is based
on Boolean logic, using AND, OR, or NOT.
You can define exceptions to a rule by creating an Allow rule for the exception case and placing it before the rule in the Rules list.
You can also create an exception in the rule itself.
The rule creation wizard breaks down the rule definition process into individual steps, making it easy to create custom rules to
meet the specific needs of your enterprise.
If you are new to the rule creation process, you follow the wizard guided process when creating your first rules.
Task
1. On the Rules page, select the Custom Rules tab.
2. In the Actions drop-down list, click Create New Rule with Wizard.
3. In the Name field, enter a name for the rule.
We recommend that the name selected clearly reflect the nature of the rule, for example, Sensitive HR tables or PCI-DSS
password protection.
• In the first field, type the first letter of the identifier name, then select the required identifier from the
drop-down list.
• In the second field, select the required operator from the drop-down list.
• In the third field, enter the literal component to be matched. If the literal component is a string, the text must
be enclosed in single quotation marks.
Note
Alternatively, you can enter the comparator statement directly into the text box under the If fields, entering a
space to access the respective drop-down lists.
b. Click Add.
If the rule includes more than one comparator statement, enter the relevant Boolean operator (AND, OR, or NOT)
in the fourth field, then define the next comparator statement. Repeat for additional comparator statements as
required.
Note
If there is a problem with the rule syntax, validation fails and a message is displayed. For example, if you fail to
enclose a text string in single quotation marks, a message is displayed regarding an unexpected token.
c. (Optional) To turn off the auto-completion feature, select Disable auto completer.
Note
You can define rule objects, which can then be used as components in other rules. For example, a rule object
might be used in the definition of a rule intended to allow a specific range of IP addresses.
d. To create an exception to this rule, click Add Exception. Then, in the Exception(s) text box, enter a comparator
statement that defines the conditions which when matched are treated as an exception to this rule. Repeat to define
additional exceptions as required.
6. Click Next to display the Rule Action.
7. In the Rule Action, select the required actions that the rule should trigger.
Caution
The Terminate option should be used sparingly because terminating sessions can disrupt legitimate business
transactions. Use the terminate option only in the following conditions:
• You are certain that the rule will not create false positives. We recommended to use the rule first in alert only
mode to make sure that legitimate traffic is not affected).
• The risk involved with the rule condition is high.
• Terminating a session causes only minimal disruption to other transactions.
Note
Quarantine is done based on the quarantine settings in the System tab. Make sure that you edit the quarantine settings
before you enable quarantine on any of your rules.
8. To allow the statement to be processed if the rule is matched, select Allow. This enables you to create an exception to a rule
that appears later in the policy.
9. To stop the matching process if a rule is matched, select Stop Verifying Additional Rules. This is the default setting when
the Rule Action is set to Allow. If this option is not selected, the matching process continues.
10. (Optional) Expand the advanced actions to configure the script and other alert parameters.
11. To select the DBMSs where the rule is applied:
a. In the Install On, click DBMSs & Groups.
b. In the Install on DBMSs and DBMS Groups , select one or more relevant DBMSs or DBMS groups, then click Save to
return to the rule definition.
The selected DBMSs and DBMS groups are listed in the DBMSs & Groups fields respectively.
12. To assign a tag to the rule, enter the tag name in the Tags field or enter a space in the field to select the tag from the
drop-down list.
13. (Optional) By default, all users can edit the properties of a custom rule. To limit the ability to edit the properties of this
rule to specific users or users assigned a specific role, enter the user names or role names in the Grant edit permission to
role/s field.
14. Click Next.
15. In the Comments field, enter a free text description or comment, then click Next.
16. To enable the rule, select Enable Rule.
Note
You can enable or disable the rule at any time by selecting or deselecting the Enable Rule checkbox.
Note
If you are new to the rule creation process, you follow the wizard guided process when creating your first rules.
Task
1. On the Rules page, select the Custom Rules tab, then click Create New Rule.
2. In the Name field, enter a name for the rule. It is recommended that the name selected clearly reflect the nature of the rule,
for example, Sensitive HR tables or PCI-DSS password protection.
3. In the If fields, define the first rule comparator statement as follows:
a. In the first field, type the first letter of the identifier name, then select the required identifier from the drop-down list.
b. In the second field, select the required operator from the drop-down list.
c. In the third field, enter the literal component to be matched. If the literal component is a string, the text must be
enclosed in single quotation marks.
Note
Alternatively, you can enter the comparator statement directly into the text box under the If fields, entering a
space to access the respective drop-down lists.
4. Click Add.
If the rule includes more than one comparator statement, enter the relevant Boolean operator (AND, OR, or NOT) in the
fourth field, then define the next comparator statement. Repeat for additional comparator statements as required.
Note
If there is a problem with the rule syntax, validation fails and a message is displayed. For example, if you fail to enclose a
text string in single quotation marks, a message is displayed regarding an unexpected token.
5. (Optional) To turn off the auto-completion feature, select Disable auto completer.
Note
You can define rule objects, which can then be used as components in other rules. For example, a rule object might be
used in the definition of a rule intended to allow a specific range of IP addresses.
6. To create an exception to this rule, click Add Exception. Then, in the Exception(s) text box, enter a comparator statement
that defines the conditions which when matched are treated as an exception to this rule. Repeat to define additional
exceptions as required.
7. In the Then area, select the required actions that the rule should trigger.
Caution
The Terminate option should be used sparingly because terminating sessions can disrupt legitimate business
transactions. Use the terminate option only in the following conditions:
• You are certain that the rule will not create false positives (we recommended to use the rule first in alert only
mode to make sure that legitimate traffic is not affected).
• The risk involved with the rule condition is high.
• Terminating a session causes only minimal disruption to other transactions.
Note
Quarantine is done based on the quarantine settings in the System tab. Make sure that you edit the quarantine settings
before you enable quarantine on any of your rules.
8. To allow the statement to be processed if the rule is matched, select Allow. This enables you to create an exception to a rule
that appears later in the policy.
9. To stop the matching process if a rule is matched, select Stop Verifying Additional Rules. This is the default setting when
the rule is set to Allow. If this option is not selected, the matching process continues.
10. To select the DBMSs where the rule is applied:
a. In the Install On, click DBMSs & Groups.
b. In the Install on DBMSs and DBMS Groups , select one or more relevant DBMSs or DBMS groups, then click Save to
return to the rule definition.
The selected DBMSs and DBMS groups are listed in the DBMSs & Groups fields respectively.
11. To assign a tag to the rule, enter the tag name in the Tags field or enter a space in the field to select the tag from the
drop-down list.
12. (Optional) By default, all users can edit the properties of a custom rule. To limit the ability to edit the properties of this
rule to specific users or users assigned a specific role, enter the user names or role names in the Grant edit permission to
role/s field.
13. In the Comments field, enter a free text description or comment.
14. To enable the rule, select Enable Rule.
Note
You can enable or disable the rule at any time by selecting or deselecting the Enable Rule checkbox.
15. To prevent the triggering of alerts by signed scripts, select the Ignore Signed Scripts checkbox.
16. Click Save to save the rule.
Clone a rule
Create a rule by cloning an existing rule. This eliminates the need to define all rule properties from scratch while creating rules
that share many common properties.
Task
1. On the Rules page, select the Custom Rules tab.
2. In the Custom Rules list, click in the row for the rule you want to clone.
3. When prompted, click OK.
The rule is added in the Custom Rules list and it's disabled.
4. Change the rule name and change specific rule properties as required.
The order of the rules in the Custom Rules list is important. The first rule that is matched is the rule that is applied to the
statement. If a statement does not match any of the existing rules, the statement is allowed.
The McAfee Database Security system enables you to create a policy according to your preferences and security requirements in
various ways.
• Whitelist approach — Resembles the approach of firewalls, whereby you determine the allowed actions first and then
alert on all other actions (assuming that all other actions are suspect).
• Blacklist approach — Resembles the approach of IDS/IPS systems, whereby everything is allowed except actions that are
considered suspect.
McAfee Database Security users normally create a policy that integrates elements of both approaches, for example, using a
Blacklist approach for all known attacks, while using a Whitelist approach for the use of development SQL tools.
Note
Incoming statements are checked against the vPatch Rules list before they are checked against the Custom Rules list.
Task
1. On the Rules page, select the Custom Rules tab.
2. Select the rule in the Custom Rules list and then drag the position indicator on the slider to a new location as required.
Task
1. On the Rules page, select the Custom Rules tab.
2. In the Custom Rules list, click the Edit Rule icon in the required row.
3. In the rule properties, edit the rule comparator statements, actions, and other parameters, as required.
4. Click Save.
Remove a rule that you no longer use, from the Custom Rules list.
Note
Tip
Only remove a rule if you are sure that you will not need it in the future. If you might need it again, you can temporarily
disable it.
Task
1. On the Rules page, select the Custom Rules tab.
2. In the Custom Rules list, click in the required row.
3. When prompted for confirmation, click OK.
Results
You can install all or a filtered group of vPatch or custom rules on specific DBMSs or DBMS groups.
By default, vPatch rules are automatically installed on all DBMSs during the installation process.
Task
1. On the Rules page, click the vPatch Rules or Custom Rules tab.
2. Filter the vPatch Rules or Custom Rules list to display all rules or only the rules that you want to install on the DBMSs.
3. In the Actions drop-down list, click Install Rules on DBMSs.
4. In Install on DBMSs and DBMS Groups, select the DBMSs or DBMS groups to which you want to attach the rule or select All
DBMSs to install the rules on all DBMSs.
Note
5. Click Done.
Results
All rules currently displayed in the vPatch Rules or Custom Rules list are attached to the selected DBMSs.
Note
Rules that are not displayed in the filter criteria are not attached to the selected DBMS.
You can manually install or remove vPatch rules or custom rules on all or specific DBMSs or DBMS groups. By default, vPatch
rules are automatically installed on all DBMSs during the installation process.
By default, vPatch rules are automatically installed on all DBMSs during the installation process.
Task
1. On the Rules page, click the vPatch Rules or Custom Rules tab.
2. Click the Properties icon in the required row.
3. In the rules properties page, click DBMSs and Groups.
4. In Install on DBMSs and DBMS Groups, select the DBMSs or DBMS groups to which you want to attach the rule or select All
DBMSs to install the rules on all DBMSs.
Note
5. Click Save.
Results
You can remove all or a filtered group of vPatch rules or custom rules from specific DBMSs or DBMS groups.
By default, vPatch rules are automatically installed on all DBMSs during the installation process.
Task
1. On the Rules page, click the vPatch Rules or Custom Rules tab.
2. Filter the vPatch Rules or Custom Rules list to display all rules or only the rules that you want to remove from the DBMSs
or DBMS groups.
3. In the Remove DBMSs and DBMS Groups, select the DBMSs or DBMS groups from which you want to remove the rules.
Note
4. Click Done.
Results
All rules currently displayed in filter criteria are removed from the DBMSs or DBMS groups.
Task
1. On the Rules page, click the vPatch Rules or Custom Rules tab.
2. In the Actions drop-down list, select Apply actions.
3. In the Rule Actions dialog box, select required actions and click Apply.
Results
The selected rule actions are applied to all the rules in vPatch Rules or Custom Rules list.
Task
1. On the Rules tab, click the vPatch Rules or Custom Rules tab.
2. In the Actions drop-down list, click Import Rule.
3. Select the file you want to import, then click Import.
Results
Note
If identical rule objects exist in the system, the Duplicate Rule Object dialog box is displayed. Select the checkboxes for the
rules that you want to overwrite, then click Continue. The selected rules are overwritten.
Task
1. On the Rules tab, click the vPatch Rules or Custom Rules tab.
2. In the Actions drop-down list, click Export Rule.
3. In the File Download dialog box, click Save, then select the location where you want to save the file.
4. Click Save again.
Results
Note
The file is saved in the specified location.
The location where the file is saved depends on the default settings.
Rule syntax
Each rule consists of one or more comparator statements, which comprise Identifiers, Operators, and Literals.
The relationship between multiple comparator statements is based on Boolean logic, using AND, OR, or NOT. Comparator
statements can be grouped using parentheses.
• NOT
• AND
• OR
Identifiers
Identifiers are the names given to database objects such as tables, columns, indexes, views, other objects, and the database
itself.
session_state string
• session_state=NEW_SESSION
for monitoring session logons
• session_state=END_SESSION
for logoffs
• session_state=NEW_LOGIN and
session_state=END_LOGIN for
monitoring change of user
during transaction execution
(Specifically for Microsoft SQL
Server)
• session_state=CHANGE_SCHEMA
for monitoring changes in
schema during the session
• session_state=EXECUTE for all
other statements
Note
All rules are case insensitive. An identifier can be specified in lowercase letters, uppercase letters, or a combination of both.
For example, user, User, USER, uSEr are all legal for the user identifier. In addition, constant values are case insensitive so
SUNDAY and SunDAy are equivalent.
Operators
An operator performs on separate data items and returns a result. The data items are called operands or arguments. Operators
are mentioned by special characters or by keywords.
Operator Description
(not)? contains Perform a simple and fast string match (string types
only).
Rule examples
Example 1
OSUSER = 'mycompany\john' AND APPLICATION CONTAINS 'sqlplus' AND HOST = 'johnlaptop.localdomain' AND IP =
192.168.1.7
Action: Allow
The above rule allows john to use SQL*Plus from his station (defined by host name and IP address), thereby bypassing many of
the rules that come later (such as preventing SQL*Plus from being used).
Example 2
APPLICATION CONTAINS 'sqlplus' OR APPLICATION CONTAINS 'toad'
This rule terminates any access by the applications Toad or SQL*Plus. It also sends a high-severity alert and email message to the
McAfee Database Security administrator.
Example 3
STATEMENT CONTAINS 'emps'
Action: log-medium
This example assumes that the emps.* columns include sensitive data that require protection, and that emps.salary and emps.cc
are particularly sensitive.
This rule provides an alert every time an SQL statement includes the string emps, alerting on any access attempt to columns
containing the name emps (or any other SQL statement component that includes the string emps). Even when the user is not
actually accessing the objects (for example, the DBMS prohibits access based on authorization rules), this rule generates alerts
(in contrast to using object, see example 4 below).
Example 4
OBJECT = 'emps.salary' OR OBJECT = 'emps.cc'
This example assumes that the tables emps.salary and emps.cc are particularly sensitive.
This rule provides a high-level alert and an email each time the specified objects are accessed. An alert appears whether the
object is accessed in a view, a stored procedure, a trigger, or another database. In this case, if the DBMS successfully restricts the
user from accessing the objects, an alert is not generated because the object is not accessed.
Example 5
Statement contains 'drop session' Alert low
In this example, the user receives alerts when various DDL commands are executed, and a high importance e-mail is sent to the
administrator when someone other than the DBA attempts to stop auditing.
This can be particularly helpful when working with Allow rules. For example, a rule object might be used in the definition of a
rule intended to allow a specific range of IP addresses.
Rule objects are managed on the Rule Objects tab of the Rules page.
McAfee Database Security is provided with several predefined rule objects. These predefined objects are used in the predefined
rules and are listed on the Rule Objects tab.
Define a rule object for a static or active directory and then use that object as components in multiple rules.
Task
1. On the Rules page, select the Rule Objects tab, then click New Object.
2. From the Type list, select the type of identifier for the rule object.
3. In the Name field, enter a name for the rule object.
4. In the Value field, enter the object value (according to the selected type).
5. In the Comment field, enter a brief comment or description.
6. If you want to define a dynamic object and enable the use of LDAP security groups for this rule object in creating rules,
select Dynamic Object.
Note
7. If you want to upload a list of values from an existing file, browse the file and click Upload to upload the list.
Note
8. Click Save.
Results
The rule object is automatically added to the list of available values according to identifier type and can be used in rule
definitions.
Task
1. On the Rules page, select the Rule Objects tab.
2. Click the Properties icon in the required row.
3. In the Properties of rule object dialog box, edit the rule object properties, then click Save.
Delete a rule object, after making sure that it is not included in the definition of existing enabled rules.
Task
1. On the Rules page, select the Rule Objects tab.
2. Click the Remove icon in the required row.
3. When prompted for confirmation, click OK.
Results
The rule object is removed from the Rule Objects list. Any existing rules that incorporate the rule object are automatically
invalidated.
DVM rule objects are based on specific findings that include result sets. Once defined, the rule object is updated each time the
test is executed.
• Specific DVM rule object — A rule object is distinct to a specific test on a specific database instance.
• Global DVM rule object (distributed) — A rule object can be defined to contain values for all database instances where
the test is executed. The rule object values for each database instance are populated by the result of the check on the
instance. With this rule object, you can create a single rule object definition, with a single custom rule that refers to it.
You can then apply the rule to multiple database. The rule object values per instance is populated by the relevant values
retrieved by the check from the instance, when last executed.
• Global DVM rule object (Master Repository) — A rule object can be defined from a single result set, but contain
values for different database instances. This rule object retrieves the values for each database instance from a Master
Repository (table) and behaves similarly to the Global DVM rule Objects (distributed) type. The rule object values for a
specific instance are populated by values retrieved from the Master Repository query (DVM check) when last executed,
based on the filtering criteria and values.
You can add a rule object to a specific test on a specific database instance.
Task
1. In the VA Results, select the result you want to add the rule object.
Note
7. In the Empty List Behavior, you can define whether to ignore rules that rely on the rule object when there are no values or
set a static value.
8. Click Save.
Add a rule object that contains values for all database instances where a test is run.
Task
1. In the VA Results, select the result you want to add the rule object.
7. Click Create.
8. In the Properties of rule object, select the appropriate rule object type based on the values, then enter a name for the rule
object.
Note
9. (Optional) To view the values for a specific instance, enter the instance name in the Show values field (auto-complete is
available for instance names), then click Show to view the list of values linked to that instance.
10. Based on the Empty List Behavior, you can define whether to ignore rules that rely on the rule object when there are no
values or set a static value.
11. Click Save.
Add a rule object from a single result set that contains values for different database instances.
Task
1. In the VA Results, select the result you want to add the rule object.
Note
11. (Optional) To view the values for a specific instance, enter the instance name in the Show values field (auto-complete is
available for instance names), then click Show to view the list of values linked to that instance.
12. In the Empty List Behavior, you can define whether to ignore rules that rely on the rule object when there are no values or
set a static value.
13. Click Save.
Script configuration
Configure a signed script
A signed script enables you to run the script on one or more database without triggering alerts. Create signed scripts for specific
time frames or specific database.
Note
If the signed script does trigger an alert, the script appears in the Print View of the alert details.
Task
1. On the Rules page, select the Signed Scripts tab, then select Create New Script.
2. In the Name field, enter the script name.
3. In the Comment field, enter a brief description in the designated fields.
4. From the Type drop-down list, select the type of script (MSSQL or Oracle).
5. Click Choose File to browse and upload the script file.
6. In the From Date and To Date fields, set the time period for the validity of the signed script.
7. Click DBMSs & Groups to select the DBMSs to run the script on.
8. Select one or more relevant DBMSs or DBMS groups, then click Select.
The selected DBMSs and DBMS groups are listed in the Script Configuration.
9. To enable the script, select the Enabled checkbox.
10. Click Save.
Results
Edit the name, type or date settings of signed script configuration. You cannot modify the script in anyway.
Task
1. On the Rules page, select the Signed Scripts tab.
2. In the Signed script list, click the Properties icon in the required row.
3. (Optional) In the Script Configuration, edit the name of the script.
4. (Optional) In the Script Configuration, change the type of script, MS SQL or Oracle according to the database.
5. (Optional) In the Script Configuration, set the time period for the validity of the signed script in the From Date and To Date
fields.
6. (Optional) To disable the script, deselect the Enabled checkbox.
7. Click Save.
Task
1. On the Rules page, select the Signed Scripts tab.
2. In the Signed Scripts list, click the Delete icon in the required row.
3. When prompted for confirmation, click OK.
Results
Task
1. On the Rules page, select the Signed Scripts tab.
2. In the Signed Scripts list, click the Download signed script icon in the required row.
Results
The signed script is downloaded and the location where the file is saved depends on your default settings.
Application mapping
Create an audit rule to monitor DBMS
When you identify an activity in the DBMS that should be monitored or audited, create a rule to monitor such actions in the
future.
Application mapping is performed on every DBMS and provides information about activities taking place on the DBMS, including
which applications are being run and by which users.
Note
The sensor needs to run for some time (normally a day or two) to collect enough information to use application mapping
effectively.
Task
1. On the Rules page, click the Application Mapping tab, then click Audit Wizard.
2. From the Select DBMS drop-down list, select the DBMS for which you want to create an audit rule.
Basic statistics are displayed indicating the application actions collected for the selected DBMS.
3. In the Audit by area, select Full Audit to monitor all elements on the DBMS or select one of the available options from the
drop-down list.
The page is refreshed according to the selected option type. The options available are Application, Host, IP, and Schema.
For example, if Application is selected, the page is refreshed to enable you to select one or more applications.
4. Select the checkboxes where the rule is to apply. For example, if you select audit by Application, you can select one or more
applications.
5. (Optional) To create an exception to the rule, click Edit Filters in the Rule Exceptions area.
The Rule Exceptions area is expanded to display the available exception categories in a tree like hierarchy.
6. Select the exception category, then select the checkboxes for which the audit needs to be ignored. The resulting exception
is displayed in the Exceptions selected text box.
Note
Click Clear exception to deselect the checkbox. You can choose multiple exception categories as required.
7. Click Create Rule. The rule is validated and added to the Custom Rules list.
The rule configuration is displayed in the Custom Rules tab.
8. Click Save.
If you would like to refine the rule further, in the Rule statement field, enter the rule comparator statements.
Use the sample information collected by McAfee Database Security about the access to the DBMS, to create exception rules.
After McAfee Database Security collects sampled information about the access to the DBMS, the DBMS Access Info tab shows
detailed information about the most commonly used clusters of applications, users, IP addresses, and more, which have
accessed the DBMS during the sampling period, including a count for each cluster
• Create exception rules For example, if a rule is created with an exception for a certain combination of IP address,
application and user, then this rule will not generate alert or event when the syntax of a rule exception is matched.
• Create monitoring rules For example, alert or audit each time the combination of user x, application y and IP z is
detected.
You can define exceptions to your custom rules by creating an Allow rule and placing it before the relevant rules in the Custom
Rules list. This option is normally used when you identify an activity that happens often and does not require monitoring. You
can also create an Alert rule for a specific combination. This option is used when you identify activity that should be monitored.
Task
1. On the Rules page, select the Application Mapping tab, then select DBMS Access Info.
2. From the Select DBMS drop-down list, select the DBMS whose application mapping information you would like to review.
Click Apply.
The application mapping information for the selected DBMS is displayed in the Display Settings table.
3. (Optional) To filter the display settings for the DBMS, enter the relevant criteria in the filter area, then click Apply.
The use of tags is intended for advanced users of the enterprise version and is purely optional.
Tags are created in the rule definition process. Existing tag assignments can be edited in the rule definition at any time.
Use the tags applied to specific rules to allow bulk application of these rules to your DBMS. Assign these tags to existing custom
rules by creating or selecting the tags in the rule definition.
Task
1. On the Rules page, click the Custom Rules tab.
2. In the Custom Rules list, click the Edit Rule icon in the required row.
The rule properties are displayed.
3. To assign a tag to the rule, enter the tag name in the Tags field or enter a space in the field to select the tag from the
drop-down list.
4. Click Save.
Assign rules with specific tags to DBMS after checking the extent to which the rules with these tags have been applied.
Task
1. On the Rules page, select the Tags-DBMSs tab, then click the View Tags icon on the top right corner.
Note
This option is enabled only if you have at least one custom rule that includes a tag.
Note
To remove the tagged rules from the DBMS, click Remove All.
Task
1. On the Rules page, select the Tags-DBMSs tab, then click View DBMSs.
2. From the DBMS Groups and DBMSs drop-down list, select the DBMS or DBMS group.
The Tag per DBMS Groups and DBMSs list indicates the extent to which the available tags have been applied to the
selected DBMS or DBMS group.
Rule revisons
Rule revisions and history are important for several reasons. For example, if you need to roll back changes after mistakes are
made in the policy or to comply with various standards and best practices. You can view the state of rules at any specific point in
time and the revisions made to rules over time.
View the version and history of rules at any specific point in time. Each rule revision entry reflects the existing rules at a given
point in time, providing a virtual snapshot of the state of rules in the system. The rule revision details provide information on
the changes made from one revision to the next, indicating whether changes have been made to the rules since the previous
snapshot was recorded.
In addition, you can view the details of a previous revision and roll back to that previous revision if necessary.
Task
1. On the Rules page, select the Rule Revisions tab.
2. In the Rule Revisions list, select the required rule revision, then click the Properties icon in the required row.
The Custom Rules Revision or vPatch Rules Revision is displayed based on the selected rule revision, listing the
parameters for each rule.
3. To view the rule modification details in th rule revision, click the icon in the required row.
Note
Select two revisions in the Rule Revisions list and compare their details.
Task
1. On the Rules page, select the Rule Revisions tab.
2. In the Rule Revisions list, select the checkboxes for two revisions, then click Compare.
Note
You can only compare revisions of the same type. For example, you cannot compare a vPatch revision with a custom
rule revision.
The Custom Rules Revision or vPatch Rules Revision is displayed based on the selected rule revision.
3. (Optional) To get rule revision comparator report, click Generate report.
4. To roll back the rule details to the older rule revision, click the Roll back to revision link.
You cannot roll back rule objects.
You can configure McAfee Database Security to notify you whenever a rule is modified.
If application mapping is enabled, you can also configure the system to automatically purge application mapping alerts when a
configured number of alerts is exceeded.
Task
1. On the Rules page, select the Settings tab.
2. Select the Send notification when rule changed checkbox, then enter the email address where the notification is to be sent
in the Send email to field.
Note
The email server settings must be configured on the System page to route email alerts correctly.
3. In the Subject field, enter the text that appears in the subject line of the notification email.
4. In the Quiet Period field, enter the number of minutes during which no further notifications are sent.
5. In the When Application Mapping alerts exceed fields:
6. (Optional) To purge all saved mapping alerts for all DBMSs, click Purge All.
Note
To purge all application mapping data for a specific DBMS only, click Purge in the DBMS Configuration tab for that
DBMS.
7. Click Save.
You can configure multiple VA scans to run against one or more databases.
Managing VA Scans
Create a VA scan
A VA scan runs one or more groups of tests on the database. Schedule a newly created VA scan at set intervals or choose to run
an on-demand scan.
The available test groups are preconfigured, except for the custom test group that contains any customized tests defined in the
VA Tests page. You can disable specific tests in a test group for a specific scan.
Task
1. On the VA Scans page, in the VA Scan Configuration tab, click Create New Scan.
2. In the Scan Name field, enter a name for the scan. The name typed must clearly reflect the nature of the scan. For example,
Monthly vulnerability scan of production databases.
3. In Scan by level, select the severity levels to be included in the scan.
4. (Optional) Select Rebuild password scan to recheck the database connections for the databases associated with the test
group.
5. To determine which tests are to be performed as part of the scan:
a. In the Test Groups area, click Select Test Groups.
b. In the Test Groups dialog box, select one or more test groups.
c. Click Done to return to the scan properties page.
Note
6. (Optional) To view the list of all tests or disable specific tests in the selected test groups:
a. Click Select Planned Tests.
b. In the Edit/View planned tests dialog box, click to disable a specific test for this scan. The icon toggles to .
Note
7. In the Actions area, select the actions to be taken when a scan result is returned:
• McAfee Database Security Console — Generates a result on the VA Results page based on the selected result
priority.
• Syslog — Sends the result to the Syslog.
• Windows Event Log — Sends the result to the Windows event log.
• Log to file — Sends the result to the log file.
• Automatically resolve to — Resolves the result and assigns it as defined in the resolve type.
• Send result to email — Sends an email notification in addition to the alert in the log, with the specified importance,
low, medium, or high.
Note
Results
Tip
If the scan configuration is partially done, you can disable the scan to temporarily prevent the scan from running.
Task
1. On the VA Scans page, in the VA Scan Configuration tab, click the Edit VA Scan icon in the required row.
2. In the VA scan properties page, select or deselect the Enable scan option as required.
Note
To disable all VA scans in the VA scans list, click the Actions drop-down list and then select Disable VA Scans.
Clone an existing VA scan. This eliminates the need to define all the scan properties from scratch while creating scans that share
many common properties.
Task
1. On the VA Scans page, in the VA Scan Configuration tab, click the Clone Scan icon in the required row.
2. When prompted for confirmation, click OK.
The new scan is added in the VA scan list and it is disabled. To enable the new scan, click the icon that toggles to
icon.
3. To edit the scan name and modify specific scan properties, click the Edit VA Scan icon .
4. Edit the scan name and modify the scan properties as required.
5. Click Save.
Results
Schedule a VA scan
Schedule a scan to run on the database at regular intervals according to your requirement.
Task
1. On the VA Scans page, in the VA Scan Configuration tab, click the Edit VA Scan icon in the required row.
2. In the scan properties page, you must select Enable scan to schedule a scan.
3. To schedule the scan to run at regular intervals, select the Schedule enabled checkbox and configure one of these
scheduling intervals:
• To run a scan at intervals, select by hour every, then select the time interval between scans.
• To run the scan on the required days, select by day, then select the days of the week and the time to run the scan.
• To run the scan on a monthly basis, select by month every, select the number of months between scans and the
time to run the scan.
• To run the scan on an advance scheduling, select advanced cron, enter the expression based on the cron syntax.
• To run the scan only once, select Run only once.
4. Click Save.
Results
The scan properties are updated to include the new scheduling information.
Run a VA scan
Task
1. On the VA Scans page, in the VA Scan Configuration tab, click the Run icon in the required row.
2. In the confirmation dialog box, click OK.
Results
Note
The vulnerability scanning starts and the state of the scan is viewed in VA scan configuration list.
You can also run or rerun the vulnerability scan from the VA Scan Result Summary tab.
Stop a VA scan
Task
1. On the VA Scans page, in the VA Scan Configuration tab, click the Stop icon in the required row.
2. In the confirmation dialog box, click OK.
The state of the scan is updated to Stopped.
Remove a VA scan
Tip
If you think you might need the scan in the future, you can disable it for now and re-enable it later.
Task
1. On the VA Scans page, in the VA Scan Configuration tab, click the Remove icon in the required row.
2. In the confirmation dialog box, click OK.
Results
View the VA scan results for the database and apply specific actions for a set of VA scans.
Task
1. On the VA Scans page, in the VA Scan Configuration tab, apply appropriate filter criteria.
2. Click the Actions drop-down list, then select Apply actions.
3. In Scan Actions, select the required actions and click Apply.
Results
The selected actions are applied to the VA scans and it can be viewed under scan properties of each scan.
Task
1. On the VA Scans page, in the VA Scan Configuration tab, apply appropriate filter criteria.
2. Click the Actions drop-down list, then select Remove actions.
3. In the Scan Actions, select the required actions and click Remove.
Results
Task
1. On the VA Scans page, in the VA Scan Configuration tab, apply appropriate filter criteria.
2. Click the Actions drop-down list, then select Install on DBMSs.
3. To add VA scans for DBMSs , click Install on DBMS.
Note
To exclude VA scans for particular DBMSs, click Exclude DBMSs and select the required DBMSs.
Note
Results
The selected DBMSs or DBMS groups are configured for VA scans and it can be viewed under scan properties of each VA scan.
Remove the DBMSs or DBMS groups from the VA scans that are no longer required.
Task
1. On the VA Scans page, in the VA Scan Configuration tab, apply appropriate filter criteria.
2. Click the Actions drop-down list, then select Remove from DBMSs.
3. To remove VA scans for DBMSs, click Remove DBMS.
Note
To exclude VA scan for particular DBMSs, click Exclude DBMSs and select the required DBMSs.
Note
Results
The VA Scan Result Summary indicates the number of results of each level of severity, for each test category, and for all
databases included in the scan.
Task
1. On the VA Scans page, click the VA Scan Results Summary tab.
2. In the VA summary list, click the Details icon in the required row.
The VA scan result summary details page displays the DBMS category and the total number of results (all tests) for each
severity for that database. Expand the DBMS scan result by clicking the plus sign to view the breakdown of results according
to test category.
Task
1. On the VA Scans page, click the VA Scan Results Summary tab.
2. Click the Report icon in the required row.
3. In the Select DBMSs For Report, select the DBMS for which the scan report needs to be generated.
4. From the Report type drop-down list, select Scan summary.
Note
Results
In addition to using the predefined (out-of-the-box) VA tests, you can create customized VA tests to suit the needs of your
organization. These custom tests can be added to the preconfigured test groups.
VA tests are normally created by advanced users only. We recommended to create VA tests only after running VA scans several
times and becoming deeply familiar with Vulnerability Manager capabilities.
Task
1. On the VA Tests page, click Create New VA Test.
2. In the Test Name field, enter a name for the test.
3. From the Result Type drop-down list, select the type of test results to return.
4. In the Test field, enter the test parameters in SQL command format.
For example, this DBMS Result Set test would return a list of users granted the DBA role when run on an Oracle database:
This Yes/No command would return a Yes result if dynamic SQL is detected in Oracle outside of SYS:
select 'yes' from dual where exists (select 1 from dba_source where upper(text) like '%EXECUTE IMMEDIATE%'
and owner <> 'SYS');
5. From the Level drop-down list, select the level of severity to assign to test results.
6. From the Test Category drop-down list, select Custom or Data Discovery.
Data Discovery is used when the rule is designed to discover particular tables or columns in the database. Choosing this
category is essential so that you can later turn the results into rule objects.
7. In the Test Groups field, enter the test groups name or enter a space in the field to select test groups from the drop-down
list.
8. In the System Test Groups, under All System Groups list, select one or more test groups to include in the operating system
test, then click to move them to the Selected System Groups list.
Note
To remove a test group from the Selected System Groups list, select it, then click to move it to the All System
Groups list.
9. (Optional) To exclude the test from running on one or more DBMSs, click Remove test from DBMS, then select the DBMSs
to exclude. Click Select.
10. (Optional) Select the Report test failures to VA scan error log.
11. (Optional) In the Description field, enter a free text/description or test.
12. (Optional) In the Memo field, add a advisory memo or an action note.
13. Click Save.
Results
Note
Task
1. Click the VA Tests page.
2. (Optional) Filter the custom VA tests.
3. In the VA test list, click the Delete Test icon in the required row.
4. When prompted for confirmation, click OK.
Results
Import VA test
Import the VA tests into VA Tests list and it is saved in the default location.
Task
1. On the VA Tests page, click Actions drop-down list.
2. Click Import Tests.
3. In the Import Tests dialog box, browse the required .xml file. and click Import.
Results
Export VA test
Export the VA tests from the VA Tests list and it is saved in the default location.
Task
1. On the VA Tests page, click Actions drop-down list.
2. Click Export tests.
Results
The VA tests are exported to an XML file and it is saved in a default location.
Usually, it is important to enable vPatch rules on all in-scope databases (if they are not already enabled).
A compliance rule can be applied to all DBMSs or to specific DBMSs and DBMS groups. The Compliance page lists the regulations
for which compliance rules can be configured.
The specific definitions required in defining a compliance rule vary based on the type of regulation, so the parameters set in the
configuration and the number of pages in the compliance wizard vary accordingly. Follow the on-screen instructions to configure
a compliance wizard.
The following procedure explains how to create custom rules for GLBA compliance.
Task
1. On the Compliance page, click More to view different regulation.
2. Select the type of regulation for which you want to verify compliance, then click Select.
The Compliance page is displayed, indicating that the selected compliance wizard has not been completed and provides
information required to configure a compliance rule for the selected type of regulation.
3. Click Configuration Wizard to begin the process of configuring the compliance rule.
4. Select the DBMSs and DBMS groups where you want to apply the compliance rule, and click Next.
Note
If a red message appears after clicking Next, there is a problem with the values entered. Fix the settings, then click Next
again.
5. In Application OS Users, enter or upload the OS user names that are used by application database users and click Next.
You can upload the details in the .csv file format.
Note
If you need to exit the wizard and continue the configuration later from the point where you stopped, click Proceed
Later.
6. In Application Database User Name, enter or upload all user names that are used by your approved applications to access
the databases, and click Next.
7. In Approved Application, enter or upload all applications that are allowed to access customer information records on the
database and click Next.
8. In Approved IP Addresses, enter the list of all IP addresses that are allowed to access customer information records on the
database, and click Next.
9. In the Customer Information Records Tables, enter the database tables that contain cardholder data or sensitive data in
any of the selected DBMSs and click Next.
10. In DCL Commands, view the DCL commands and click Next.
You do not need to change the DCL command list. If you want to modify the DCL commands, enter or upload the DCL
commands.
Note
Clicking Reset resets the default values for that step only.
11. In the DDL Commands, view the DDL commands and click Next.
You need not change the DDL command list. If you want to modify the DDL commands, enter or upload the DDL
commands.
12. In DML Commands, view the DML commands and click Next.
You need not change the DML command list. If you want to modify the DML commands, enter or upload the DML
commands.
13. In Privileged OS Users, enter or upload all OS user names used by the privileged database users, and click Next.
14. In Privileged Database Users, enter or upload all privileged database users, which include the DBA user names and any
other database user name that has high permission in any of the selected databases.
Note
Do not include user names that the applications use, these are added elsewhere.
Note
If this option is not selected, the rule is created but it is not enabled. Make sure that vPatch rules are enabled on all
in-scope databases.
A GLBA tab is added for the new regulation, showing the set of rules created based on predefined rule templates for that
regulation type, including level and defined action.
In addition, you can now filter alerts and other data according to the compliance type. When applicable, you can select the
required regulation type in the Compliance drop-down list.
Task
1. Click Configuration Wizard.
2. In the compliance wizard, click Proceed Later.
A pop-up message indicates that the data has been saved, and you can complete the configuration later.
3. Click OK.
To return to the wizard, select the regulation type and click Configuration Wizard. Although the wizard contains the values
you previously configured, review your settings and continue from where you left off.
Task
1. On the Compliance page, click the type of compliance rule regulation to be edited.
2. Click Edit Configuration.
3. In the Compliance Rules Configuration dialog box, select the required action:
• Reconfigure rules
• Enable rules
Note
If the compliance rules are enabled, the Disable rules option is displayed.
Caution
Exercise caution in selecting Remove configuration completely; this action cannot be reversed. This action totally
deletes the existing configuration. The compliance wizard is automatically displayed, prompting you to completely
redefine the regulation.
Task
1. Click the Sensor page.
2. Select the required sensor in the Sensor list.
The DBMSs monitored by the selected sensor are listed under DBMSS detected by.
Task
1. Click the Sensors page.
2. In the sensor list, click the Properties icon in the required row.
These sensor details are displayed on the Details tab of the sensor properties page.
3. To view the statistics for the DBMSs monitored by the selected sensor, click DBMS details tab.
Task
1. Click the Sensors page.
2. In the Sensors list, click the Properties icon in the required row.
3. Click the DBMS details tab.
4. Click Add a DBMS manually.
5. In the Database Properties dialog box, configure these mandatory parameters:
a. Select New for a new DBMS (when adding a DB2 with multiple partitions, add the first partition. If you have already
added a partition for the DBMS, select Cluster then select the first partition that was already added).
b. In the Type field, select the type of database.
c. In the SID field, enter the database instance identifier.
d. In the DBMS Home field, enter the name of the DBMS home directory.
e. In the Architecture field, enter database architecture, 32-bit or 64-bit.
6. Click Save.
Results
The DBMS is added and it can be viewed in the DBMS details list.
Approve a sensor
Approve a sensor before it can actively start monitoring a database.
On the Sensors page, if the sensor is approved, the name of the user who approved the sensor appears in the Approved By field.
If the sensor is not approved, the button appears.
Task
1. Click the Sensors page.
2. In the sensor list, click the Approve icon in the required row to approve the sensor.
If a new sensor reports that it is monitoring a DBMS that is already recognized by McAfee Database Security, you are
prompted to select the DBMSs to monitor.
If the sensor ID exists in the system, the Approve Sensor page is displayed.
3. From the Available actions drop-down list, select how you want to handle this sensor:
• New — Indicates this is a new sensor. If you select New, you need to change the sensor ID to a unique one.
• Merge — Indicates this is the same sensor, for example, following reinstallation, and both instances should be
treated as a single sensor.
• Delete — Indicates this sensor was added in error and should be removed from the configuration.
4. Click OK.
Task
1. On the Approve DBMS page, select the DBMSs to be monitored by the sensor.
You can filter the list of DBMSs by selecting All DBMSs, New DBMSs, or Existing DBMSs from the drop-down list
2. If more than one DBMS has the same name, select one of these from the adjacent drop-down list:
• New — Indicates this is a new DBMS that needs to be monitored separately from the existing DBMS.
• Merge — Indicates this DBMS is the same DBMS and the entries should be merged.
• Cluster — Indicates that the DBMS is included in a cluster (and your policy for the DBMS will be installed on all
cluster members). If you select Cluster, the display expands to show details for the DBMS.
You can choose whether you want to install triggers on each DBMS. It is highly recommended to use triggers (chosen by
default) with Oracle DBMSs. Triggers used by McAfee Database Security are highly efficient and have minimal impact on
the DBMS performance. Use triggers with MS SQL servers when you intend to use McAfee Database Security's prevention
capabilities (allowing you to stop DDL actions before they take place). You can always change your choice later by selecting
DBMS properties on the DBMSs tab, or by selecting Manage DBMSs on the Sensors page.
Results
Task
1. Click the Sensors page.
2. Select the sensor in the Sensors list.
The DBMSs monitored by the selected sensor are listed in DBMSs detected by.
3. In the required DBMS row, set one of these monitoring actions:
• Click Start Monitoring to set the sensor to monitor a DBMS, then select the DBMSs to be monitored on the
Approve DBMS page.
• Click Manage DBMS, select the DBMSs to be monitored and click Save.
4. Click Stop Monitoring to set the sensor to stop monitoring a DBMS.
Sensor management
Stop a sensor
Stop a sensor that is no longer used for monitoring a database or when you need to change the advance properties of a sensor.
This results in the database not being monitored by that particular sensor.
Task
1. Click the Sensors page.
2. In the sensor list, click the stop icon in the required row.
3. When prompted for confirmation, click OK.
Results
Note
The sensor is stopped and no longer monitors the DBMS.
Click Enable to resume its monitoring activities.
Restart a sensor
You can restart the sensor process as long as the sensor is connected. Use this function if you suspect that the sensor is
malfunctioning or asked to do so by tech support. This action is not available when a sensor is stopped or disconnected.
Task
1. Click the Sensors page.
2. In the sensor list, click the Restart sensor icon in the required row.
3. When prompted for confirmation, click OK.
Results
Delete a sensor
A deleted sensor is not deleted from the web console, or from the DBMS itself, but its status is set to DELETED.
If you want to uninstall the sensor from the DBMS, you must access the DBMS host and uninstall the sensor, such as, using rpm
-e in Linux machines, or uninstall in MS Windows.
Task
1. Click the Sensors page.
2. In the Sensors list, click the Delete icon in the required row.
3. When prompted for confirmation, click OK.
Results
Note
The sensor no longer monitors the DBMS.
The resolution state of alerts previously generated by the removed sensor is automatically updated to Sensor Deleted in the
alerts list.
Setup the Data Access Layer (DAL) connection using TLS 1.2
When configuring the additional sensor connection (DAL), McAfee Database Security is able to connect to MS SQL servers which
only have TLS 1.2 enabled.
Task
1. Click the Sensors page.
2. In the sensors list, select the required sensor properties .
If you encounter problems while installing the sensor, for example, if you have installed a sensor and No sensors detected is
displayed when you log in to the web console, follow the steps outlined.
If the sensor service is down and does not come up after you run it, check that the McAfee Database Security server has a valid
license. If the sensor was connected to the server before applying the license, you need to manually restart the sensor.
If you are still unable to run the McAfee Database Security sensor, contact McAfee support after running the diagnostic tool.
If the McAfee Database Security sensor is not on the McAfee Database Security server sensors' list:
1. Verify that the server IP address and port are set correctly in the McAfee Database Security sensor's configuration
file (located in Linux: /etc/sysconfig/mfe-dbs-sensor; Solaris: /etc/default/mfe-dbs-sensor; AIX: /etc/mfe-dbs-sensor;
HPUX: /etc/rc.config.d/mfe-dbs-sensor; and on Windows, run McAfeeDBSConfig.exe). If they are not set correctly,
update the configuration file and restart the McAfee Database Security sensor service.
2. Verify that the sensor can reach the server port, using ping <server ip> and telnet <server ip> <port number>.
• If it is not reachable, verify that there is no firewall blocking the communication (check that McAfee Database
Security sensor communication port is open for TCP). If it is blocked, enable TCP communications on that port and
restart the McAfee Database Security sensor service.
• If the McAfee Database Security server IP address and port are reachable from the McAfee Database Security
sensor computer and you still do not see the sensor on the sensors list on the McAfee Database Security server,
run the diagnostic tool, then contact McAfee support for assistance.
• If you are still unable to reach the McAfee Database Security server from the McAfee Database Security sensor
server, contact your system administrator for support.
• On Windows platforms, run the diagnostic tool and then contact McAfee support for assistance.
• On non-Windows platforms, verify that:
You have group read and execute permissions on $ORACLE_HOME and $ORACLE_HOME/dbs, and group read
permissions on $ORACLE_HOME/dbs/sp*.ora and $ORACLE_HOME/dbs/init*.ora.
Your ORACLE_HOME group is either dba or oinstall. If not, add the relevant Oracle group to the mcafee OS
user.
Your oratab file (under /etc/oratab or /var/opt/oracle/oratab) points to the correct ORACLE SID and
ORACLE_HOME (entries in the file are in this format: $ORACLE_SID:$ORACLE_HOME:<N|Y>:). If the entries are
incorrect, fix them and restart the McAfee Database Security sensor service. Otherwise, contact McAfee
Support after running the diagnostic tool.
If your oratab file is in a different location, you can configure the sensor by editing the startup script
accordingly (on Linux or Solaris: /etc/init.d/mfe-dbs-sensor; on AIX: /etc/rc.d/init.d/mfe-dbs-sensor;
on HPUX: /sbin/init.d/mfe-dbs-sensor) by adding "-r <oratab full path>/oratab" to the start
function.
After editing the startup script, run the McAfee Database Security sensor.
• Verify that Oracle is version 8.1.7 or later, or MS SQL Server 2000 or later, or Sybase ASE 12.5. If you are trying to
monitor another DBMS version, verify with McAfee support that the version is already supported.
• If the McAfee Database Security sensor is still unable to monitor your DBMSs, run the diagnostic tool, then contact
McAfee support.
Running the diagnostic tool creates an output file for you to provide to McAfee support when requesting assistance.
You can change the sensor log level and remotely create an Analytic package.
Task
1. On the Sensors page, click the Properties icon in the row for the sensor.
2. From the Log Level drop-down list, select DEBUG.
3. Run the McAfee Database Security sensor for five minutes (no sensor restart is required).
4. Click Generate.
5. Restore the log level to INFO after troubleshooting is complete.
The analytic package output file name is displayed when the process is complete. Send the file by email to the McAfee
support team.
If you are running an earlier version or having trouble connecting to the sensor, perform these steps:
6. Change the log level from INFO to DEBUG in the sensor configuration file as follows:
• On Linux — /etc/sysconfig/mfe-dbs-sensor
• On Solaris — /etc/default/mfe-dbs-sensor
• On AIX — /etc/mfe-dbs-sensor
• On HPUX — /etc/rc.config.d/mfe-dbs-sensor
• On Windows — McAfeeDBSConfig.exe
Results
The Analytic package output file name is displayed when the process is complete. Send the file by e-mail to the McAfee support
team.
Sensor log files use a base name (referred to later as <BASE_NAME>). The name on Linux and Unix is dbs.log and on Windows it
is logfile.log.
• Sensor main log — Name: <BASE_NAME>. This log file contains general logging regarding the sensor. This includes
communication flow, database detection, statistics and management of monitored DBMSs.
• Sensor DBMS instance log — Name: <BASE_NAME>_<DBMS Unique Name>. The sensor maintains a log file per
monitored DBMS instance. The log file contains information for the specific monitored DBMS instance. This includes
DBMS details, statistics and alerts.
• Standard output log — Name: <BASE_NAME>.std. This log file contains the standard output and standard error output
of the Sensor process. The file contains a log line every time the Sensor is started and may contain sparse periodic
information output. This file should not contain errors and should not grow in size. The file is not rolled over. If it grows
beyond 1 MB it is recommended to review the file and, if needed, report it to McAfee support.
• Cache Statistics log — Name: <BASE_NAME>.log_caches. This log file contains statistics about internal caches used by
the sensor. This file can help help in the analysis of sensor resource utilization.
When a log file reaches it maximum size, the log file is backed up by adding the number 1 after its file name extension and a new
log file is created. The extension numbering of any exising backup files are incremented sequentially. For example, when dbs.log
reaches it maximum size, it is renamed to dbs.log.1; the file dbs.log.1 is renamed to dbs.log.2, and so on, up to the maximum
number of log files configured (the default setting is 13).
When the maximum number of files is reached, the oldest file is deleted.
Sensor log file size and maximum number of log files are configured on the Sensor properties page in the management console.
The sensor main log and sensor DBMS instance logs use this format: <DATE> T[<THREAD ID>] F[<FILE NAME>] L[<LINE
NUMBER>] <SEVERITY> <MESSAGE>.
Tue May 27 2014 19:22:11.056 T[6504] F[Profile.cpp] L[935] NOTICE Loading profile
• DATE — The time and date the log line was written. Time is formatted according to the local time zone of the machine
where the sensor runs.
• THREAD ID — Operating system thread ID. The sensor is a multi-threaded process. This field can be used to monitor the
activity of a single thread.
• FILE NAME, LINE NUMBER — Source file name and line number where the log line was called in the code. This helps
McAfee Support and engineering to identify the code the log entry was generated from.
• SEVERITY — Severity of the log entry. These are the available log severity levels in order of severity:
ERROR — Represents an unexpected error or conditions that the sensor has encountered. Log lines with the
ERROR severity indicate a problem that requires review.
WARNING — Represents transient conditions that might later lead to an error. These log entries can provide
insight into subsequent errors. These log entries do not require review if not accompanied by ERROR entries.
NOTICE — Sensor's default log level, useful information about the proper operation of the sensor.
INFO — Medium level of detailed information about sensor operation. This log level might be requested by
McAfee Support for troubleshooting if DEBUG is generating too many log entries and logs are rolling over.
DEBUG — High level of detailed information about sensor operation. This log level is used by support and
engineering teams for troubleshooting.
TRACE — Low level tracing information that might be requested by development teams. This log level is intensive
and should not be set unless explicitly requested by McAfee Support.
Note
The minimum severity level to write to the log file is configured on the Sensor properties page in the management
console. The default and recommended level is NOTICE, meaning that NOTICE, WARNING and ERROR log lines are
written to the log file. Changing to a log level below NOTICE can cause extensive logging and affect sensor resource
utilization.
When the sensor starts, it writes a special header in the log file in the following format: *************************** Security
Sensor Started [ <DATE> ]***********
Monitoring the sensor logs for this header can indicate when the sensor experienced a restart. Multiple sensor restarts in a
short time period can indicate an issue that requires further investigation. On Unix/Linux systems, the sensor DBMS instance log
also contains the start header as the instance is monitored by a child process that can be started and stopped. A process that
experiences multiple restarts in a short time period can also indicate an issue that requires further investigation.
Starting from version 4.4.7, the sensor will log periodically (hourly) into a special file statistics about its cache usage. This file
can assist to analyze resource utilization of the sensor. The file contain statistics for these sensor caches: rule cache, stored
procedure cache, prepared statement cache, session per NIC, and the network session buffers.
The format of each log entry beyond the standard header is:
• MONITORING_COMPONENT — Either NETWORK or MEMORY. Indicates the monitoring technology that the statistics info
entry is related to.
• SUB_COMPONENT — One of the following depending on the stats info entry:
DB instance name - Format: DB[<full_db_name>]
A network interface name - Format: NIC[<full_nic_name>]
GLOBAL - A global stats info entry not related to a specific network interface or DB instance
Sat Nov 8 2014 20:42:19.349 T[2484] F[CacheStatisticsFileManager.cpp] L[120] NOTICE NETWORK: GLOBAL: Network
Session Buffer: Global cache used[8192] out of [268435456] bytes,rate[~0%] : Global cache in limits: OK
Cache[maxSize[81920KB],load[22%],elements[2695],averElemSize[6881B],access[139],misCount[34],misRate[24%],hitCount[105],
[access[0]] Rule
Cache[maxSize[52428800],used[80%],nodes[165],totalAccessCount[7261],totalHitCount[3730],totalHitRate[51%],totalMissCount
You can use the "] ERROR " search string to identify errors in the sensor logs.
For example, to search for errors using the Linux/Unix grep utility:
For example, to search for errors using the Windows find utility:
Data access layer (DAL) errors are identified by a file name of the form: Dal*.cpp.
For example: DalOracle.cpp, DalTeradata.cpp, DalMSSQL.cpp. They usually occur when the sensor fails to connect or execute a
statement on the database. If the failure is critical, the sensor sends a message box notification (Error 9 - DAL_ERROR) to the
server with details of the failure. These errors can also appear in the log in non-critical situations, such as when the database is
shutting down or restarting. In such cases, it is best to examine the log and see if the situation is resolved once the database is
up and running.
An error log indicating failure to delete the failed login trace during a database restart:
Sat Jun 14 2014 01:43:34.202 T[4016] F[DalMSSQL.cpp] L[1574] ERROR Failed to delete failed login trace
[<INSTANCE NAME>]
Sat Jun 14 2014 01:45:08.943 T[3760] F[DalMSSQL.cpp] L[1542] NOTICE Successfully switch off failed login trace
[<INSTANCE NAME>]
Communication errors
Communication errors are identified by the file names: ServerConnection.cpp and ServerTransportTCPSSL.cpp.
They usually occur when the sensor has a problem communicating with the server. The problem might be transient (such as a
network disconnect). It is best to examine the log to see if the communication resumed following the error.
An error log entry (followed by warning message with more info) indicating failure to communicate:
Mon Aug 26 2013 03:50:40.258 T[2072] F[ServerConnection.cpp] L[249] ERROR Failed to send message now
Mon Aug 26 2013 03:51:10.259 T[2072] F[ServerTransportTCPSSL.cpp] L[530] WARNING Unable to connect to
server xx.xx.xx.xx(host.com):1996 (Resource temporarily unavailable) randStatus(1), errno is 10035, ssl err:
error:00000000:lib(0):func(0):reason(0)
Mon Aug 26 2013 03:51:20.480 T[2072] F[ServerTransportTCPSSL.cpp] L[609] NOTICE Connected to server: xx.xx.xx.xx
local IP: xx.xx.xx.xx(host.com)
The monitoring policy for a DBMS comprises of various rules that are enabled and applied on that DBMS. After installing a
McAfee Database Security sensor on a DBMS host server, if more than one DBMS is installed on the host, the DBMS must be
approved in the McAfee Database Security configuration before a monitoring policy can be applied to it.
The DBMSs page lists the DBMSs where McAfee Database Security sensors have been installed, and enables you to view the
properties of each DBMS.
Task
1. On the DBMSs page, click the DBMS tab.
2. Click Add VA DBMS.
3. From the DBMS type drop-down list, select the database type, such as, Oracle, MSSQL, MYSQL, SQL Azure, or Sybase.
Due to MySQL licensing restrictions, you need to download the MySQL JDBC driver from the MySQL website:
• Download the Platform Independent (Architecture Independent), ZIP Archive file from http://dev.mysql.com/
downloads/connector/j/
• Extract the file and copy mysql-connector-java-<version no>.jar to <Server Installation Directory>\common\lib
• Restart the McAfee Database Security server
4. In the Host/IP field, enter the name of the host server or IP address, then click test to verify the validity of the host name or
IP address.
5. Configure these host parameters:
• In the Port filed, enter the number of the port for connecting to the database. Click test to check its validity.
• In the Sid, Database Name, or Instance Name field, enter the respective service name or database instance ID on
the server. Click test to check its validity.
Note
The field varies based on the type of database selected in the DBMS type.
6. On the DBMS Connection, enter the user name and password to be used to connect to the DBMS. Scripts that create a user
with the correct and minimal permissions for scanning are available in the screen.
7. (Optional) Click Advanced to configure more VA parameters (used for troubleshooting purposes only):
• Connection String — (Optional) The connection string used to connect the DBMS.
• Connection Properties — (Optional) Properties typically used by Technical Support for troubleshooting the DBMS
connection.
• Enable alternative DBMS connection (advanced users only, for DAM only): When selected, alternative
connections can be made using these parameters:
8. Click Test DBMS Connection to check the connectivity between the VA server and the database.
9. (Optional) To view users that were excluded from weak password tests, expand the Exclude Users from test section. The
listed users are exempt from weak password tests based on exceptions in the VA Results page. You can manually delete a
user from the list if needed.
10. (Optional) Click OS Connection and select Enable os check to configure the connection and test the operating system:
• OS User Name — The user name to be used to log on to the operating system.
• OS Password — The password to be used to log on to the operating system.
• Test OS Connection — Check the connection of operating system.
11. Click Save.
View and edit the properties of a DBMS, such as its name, description, and DBMS group assignment.
The DBMS properties also include the trigger settings for the DBMS. A Data Definition Language (DDL) trigger can be added to
the monitored database to prevent DDL actions before they happen.
Stopping a DDL action requires relevant custom rules, for example, cmdtype = drop table and user <> $privileged_users.
The DDL trigger was designed to have minimal impact on the DBMS. But, with heavy DDL traffic, the delay that the DDL trigger
introduces can cause unwanted latency.
Task
1. On the DBMSs page, click the DBMS tab.
2. In the DBMS list, click the Edit Configuration icon in the required row.
Results
The DBMS Configuration tab displays the properties of the selected DBMS.
The DML trigger delays DML actions so that they can be prevented. DML trigger is available for customers who want to audit
before and after values when data changes occur. The DML trigger introduces latency, so it is recommended to use this feature
sparingly.
Task
1. On the DBMSs page, click the DBMS tab.
2. In the DBMS list, click the Edit Configuration icon in the required row.
3. Click the DML Triggers Configuration tab, then click Add New Trigger.
4. Select Use VA Credentials or provide username and password for the new trigger.
5. In the Trigger Display Name, enter the name to be displayed.
6. In Select DB drop-down list, select the database to apply the trigger.
7. In the Select Table drop-down list, select the table to apply the trigger.
8. In the Select Columns, select the column to apply the trigger.
9. In the Select DML CMD Type To Audit, select the Insert, Update and Edit to audit.
10. (Optional) In the Select Trigger Actions, select the Delay Transactions By and provide the required time period.
11. Click Create Triggers.
For the added DML trigger, you can view the results of the DML actions on the VA Results page.
Note
The DML triggers are created in the properties of a VA DBMS. The DML trigger is available only for DBMSs where VA is
enabled.
Task
1. On the VA Scans page, create a VA scan that includes the test group DML Audit.
2. In the Run on area, select the database for which the DML trigger is created.
3. Click Save.
4. Run the VA scan as scheduled or manually.
Results
Task
1. On the DBMS page, click the DBMS tab.
2. In the DBMS list, click the Edit Configuration icon in the required row.
3. In the DBMS Configuration tab, expand DDL/DCL Monitoring.
4. Select Enable Triggers.
Redo buffer monitoring enables McAfee Database Security to obtain DDL statements without installing triggers and it is available
for Oracle databases. This monitoring technique monitors the Oracle redo-log.
Note
Task
1. On the DBMSs page, click the DBMS tab.
2. In the DBMS list, click the Edit Configuration icon in the required row.
3. In the DBMS Configuration tab, select or deselect the Monitor Redo Buffer option as required.
Determine the number of failed logons in a set time period that is considered abnormal for the DBMS.
Note
Task
1. On the DBMSs page, click the DBMS tab.
2. In the DBMS list, click the Edit Configuration icon in the required row.
3. In the DBMS Configuration tab, expand Failed Login Monitoring and select Enable Failed Login Monitoring checkbox.
4. In the Failed Login Count field, set the number of failed attempts to log on a single DBMS in the defined Failed Login
Measure Period that triggers an alert.
5. In the Failed Login Measure Period field, set the time period (in seconds) in which, if the Failed Login Count is exceeded, an
alert is triggered by the vPatch rules.
6. Click Save.
Configure the mapping of application access per DBMS. Application Mapping is enabled by default for every new monitored
DBMS.
Task
1. On the DBMSs page, click the DBMS tab.
2. In the DBMS list, click the Edit Configuration icon in the required row.
3. In the DBMS Configuration tab, expand Application Mapping, then select Enable Application Mapping checkbox.
4. In the Limit Application Mapping Alerts per Second field, set the maximum number of application mapping alerts are
sampled per second.
5. In the Notify When Database Events Count Exceeds field, set the number of database events, which when exceeded,
triggers notification.
6. Click Save.
Note
To purge all application mapping data for the DBMS, click Purge in the DBMS Configuration tab. To purge all saved
mapping data for all DBMSs, click Purge on the Settings tab of the Rules page.
Task
1. On DBMSs page, click the DBMS tab.
2. Select the required DBMSs from the DBMS list.
3. From the Actions drop-down list, select Add actions.
4. In the DBMS Actions, select the required actions and edit their properties.
5. Click Apply.
Results
The action that is applied are updated in the respective DBMS properties and it can be viewed under DBMS Configuration tab.
Set the correct character set from the DBMS properties page. The correct character sets are pre-configured, by default.
Sometimes (such as if the DBMS is configured with one character set but another character set is being used), manual
configuration of the character set is required.
Task
1. On the DBMSs page, click the DBMS tab.
2. Select the required DBMSs from the DBMS list.
3. From the Actions drop-down list, select Add actions.
4. In the DBMS Actions, select the Charset and change the required character set from the drop-down list.
5. Click Apply.
Oracle databases can be added for vulnerability assessment by uploading their tnsnames.ora file.
Task
1. On the DBMSs page, click the DBMS tab.
2. From the Actions drop-down list, select Add DBMS from TNS.
3. In the Create DBMS from TNS file dialog box, choose the required .ORA file and click Upload.
4. Select the DBMS instance.
5. Provide the username and password to configure a VA DBMS and click Create VA DBMSs.
Results
The Oracle database is added to the DBMS list for vulnerability assessment.
View the list of sensors used to monitor a DBMS on the DBMSs page.
Task
1. On the DBMSs page, click the DBMS tab.
2. Select the required DBMS in the DBMS list.
Results
The sensors that monitor the selected DBMS are listed, including the name and status of the sensor.
You can monitor clustered databases by installing sensors on the cluster nodes.
Task
1. Finish the installation of the first sensor, approve the sensor and the database.
2. Install the second sensor, approve the sensor without approving the database.
3. In the Sensors page, select the second sensor, then click Start Monitoring on the sensors detected database.
A dialog box is displayed with the DBMS details.
4. Select Cluster from the drop-down list.
5. Select the database that is part of this cluster, then click Save.
Results
DBMS network scans are configured on the DBMS Network Scanner tab.
Create multiple network scans to search your network for database that has not yet been added to the DBMSs list.
Discovered DBMSs can be added to VA scans. To monitor the database, install a sensor on the database server host.
Task
1. On the DBMSs page, select the DBMS Network Scanner tab, then click Create Network Scan.
The Update Network Scan dialog box is displayed.
2. In the IP Ranges field, set the range of IP addresses to be scanned on the network.
3. In the Network Timeout field, set the timeout for IP connectivity.
4. In the Number of scanning thread fields, set the maximum number of concurrent scans.
5. To check the IP connectivity before scanning the ports, select the Check ICMP/Echo before ports checkbox.
6. To schedule the network scan, expand Schedule Network Scan, then select the Schedule enabled checkbox and configure
one of these scheduling intervals:
a. To run the scan more than once a day, select by hour, then indicate the interval between scans.
b. To run the scan on the required days, select by day, then select the days of the week and the time to run the scan.
c. To run the scan on a monthly basis, select by month every, select the number of months between scans and the time
to run the scan.
d. To run the scan on an advance scheduling, select advanced cron, enter the expression based on the cron syntax.
e. To run the scan only once, select Run only once and this will not rerum as per schedule.
7. To scan for Oracle servers, expand Advanced Scan Configuration for Oracle, then set these parameters:
a. Select the Check Oracle checkbox.
b. To automatically add the default Oracle ports, select the Add Oracle default ports checkbox.
c. In the Ports to scan field, specify the ports to be scanned on the Oracle servers.
d. To guess the Oracle SID names, select the Brute force Oracle names checkbox.
8. To scan for MS SQL servers, expand Advanced Scan Configuration for MssqL, then set these parameters:
a. Select the Check MS SQL Server checkbox.
b. To automatically add the default MS SQL ports, select the Add MS SQL Server default ports checkbox.
c. In the Ports to scan field, specify the ports to be scanned on the MS SQL servers.
d. To guess the MS SQL instance names, select the Brute force MS SQL Server names checkbox.
9. To scan for Sybase servers, click Advanced Scan Configuration for Sybase, then set these parameters:
a. Select the Check Sybase checkbox.
b. To automatically add the default Sybase ports, select the Add Sybase Server default ports checkbox.
c. In the Ports to scan field, specify the ports to be scanned on the Sybase servers.
d. To guess the Sybase instance names, select the Brute force Sybase instance names checkbox.
10. To scan for DB2 servers, expand Advanced Scan Configuration for DB2, then set these parameters:
a. Select the Check DB2 checkbox.
b. To automatically add the default DB2 ports, select the Add DB2 Server default ports checkbox.
c. In the Ports to scan field, specify the ports to be scanned on the DB2 servers.
d. To guess the DB2 instance names, select the Brute force DB2 Server names checkbox.
11. To scan for MySQL servers, expand Advanced Scan Configuration for Mysql, then set these parameters:
a. Select the Check MySQL checkbox.
b. To automatically add the default MySQL ports, select the Add Mysql default ports checkbox.
c. In the Ports to scan field, specify the ports to be scanned on the MySQL servers.
12. To scan for PostreSQL servers, expand Advanced Scan Configuration for Postgresql, then set these parameters:
a. Select the Check Postgresql checkbox.
b. To automatically add the default Postgresql ports, select the Add Postgresql default ports checkbox.
c. In the Ports to scan field, specify the ports to be scanned on the Postgresql servers.
13. Click Save Network Scan.
Results
The DBMS Network Scanner tab lists the configured network scans and their results.
Task
On the DBMSs page, click the DBMS Network Scanner tab.
You can view the details of a scan in the network scan list and create a VA DBMS for a database instance in the scan results.
Task
1. In the network scan list, click the Scan Results icon in the required row.
The Create VA DBMS From Scan Results is displayed, listing the detected database instances, including IP addresses, ports,
instance names, and database type.
2. Select the database instance for which you want to create a VA DBMS.
3. In the Username and Password fields, specify the user name and password used to connect the database.
4. Click Create VA DBMSs.
Results
You can rerun a scan to check for new database that are not added to the DBMS.
Task
1. On the DBMSs page, click the DBMS Network Scanner tab.
2. Click the Run icon in the required row.
3. When prompted for confirmation, click OK.
Results
The network scanning starts and the status of the scan is viewed in network scan list.
Task
1. On the DBMSs page, click the DBMS Network Scanner tab.
2. Click the Stop icon in the required row.
3. When prompted for confirmation, click OK.
The status of the scan is updated to CANCELED.
If a scan is no longer required, you can remove it from the Network Scan Results list.
Task
1. On the DBMSs page, click the DBMS Network Scanner tab.
2. Click the Delete icon in the required row.
3. When prompted for confirmation, click OK.
Create DBMS groups for easily assigning rules to a group of DBMSs. Define multiple DBMS groups to suit your enterprise needs.
Rules that are applied to a DBMS group are applied to all group members.
A DBMS group can comprise any number of DBMSs. A specific DBMS can be a member of more than one DBMS Group. Rules
that are installed on a DBMS group are applied to all group members.
Task
1. On the DBMSs page, click the DBMS Group tab.
2. Click New DB Group.
3. In the Properties of DBMS Group, enter the name of the DBMS group in the Name field.
4. Enter a brief informative description of the group in the Description field.
5. Select the DBMSs to include in the group from the All DBMSs list, then click to move it to the Selected DBMSs list.
Note
To remove a DBMS from the Selected DBMSs list, select the DBMS and then click .
6. Click Save.
Task
1. On the DBMSs page, click the DBMS Group tab.
2. Click the Properties icon in the row for the rule object.
3. In the Properties of DBMS Group, edit the DBMS group properties.
4. Click Close.
Delete a DBMS group that is no longer needed, by exercising caution in doing so.
Deleting a DBMS group does not delete the DBMSs that were included in the group. But, if you delete a DBMS group that is used
in a rule, the rule is automatically disabled for all members of that DBMS group. As a result, if the rule was applied only to that
DBMS group, the rule must be assigned to specific DBMSs or other DBMS groups in the rule definition for it to have any impact.
Task
1. On the DBMSs page, click the DBMS Group tab.
2. Click Remove DBMS Group icon in the required row.
3. When prompted for confirmation, click OK.
Note
If the system detects specific problems related to the proposed deletion, an additional message describes the potential
consequences and prompts you to again confirm that you want to delete the DBMS group.
Predefined roles
McAfee Database Security is provided with a set of predefined roles. You can assign users to predefined roles or you can create
and assign new roles.
• Read_Only — Enables the user to view all screens and settings, but cannot perform operations like, create or edit rules,
and resolve alerts.
• McAfee Database Security_Operator — Enables the user to perform operations in the system, but cannot change the
security policy and related objects.
• Policy_Creator — Enables the user to create and edit rules, and configure other system components, but the policy
creator is not authorized to view alerts.
• Read_Only Alerts_And_Dashboard — Provides the user with read-only access to the Dashboard and the Alerts list.
Task
1. On the Permissions page, select the Roles tab.
2. In the Roles list, click the Properties icon of the required role.
3. In the Role Properties, edit the detail as required, and click Save.
A role can also be based on the permissions set of another role, eliminating the need to define each permission set separately.
This enables you to conveniently create a specialized group of users with the combined permissions of one or more groups or
specific permissions.
Task
1. On the Permissions page, select the Roles tab, then click Create New Role.
2. In the Name field, enter a name for the role.
3. In the Description field, enter a brief description of the new role.
4. (Optional) To use an existing system of defined users, select the LDAP checkbox. The LDAP server must be configured first
on the System page. A drop-down list is displayed, listing all LDAP roles detected in the system. Select an LDAP role that
matches an existing security group in the Active Directory and configure the permissions this LDAP role should have in the
McAfee Database Security system.
To use more than one LDAP role, create separate roles for each LDAP security group.
Note
Allow 60 seconds between the first configuration of the LDAP server and the definition of the LDAP roles.
5. Select the required permissions for the new role from the All Permissions list, then click right arrow icon to move it to
the Selected permissions list.
Note
To remove a permission from the Selected permissions list, select the permission, then click the left side arrow icon
.
6. To include the permission set of an existing role in the new role, select the role in the All roles list, then click right arrow icon
to move it to the Selected roles list.
Note
To remove a role from the Selected roles list, select the role, then click .
7. In the View Alert permissions by Rules area, select the rules for which the role is authorized to view alerts.
8. Click Save.
Task
1. On the Permissions page, select the Roles tab.
2. In the Roles tab, click the Properties icon in the required row.
The Role Properties displays the properties of the selected role.
3. Edit the role permissions as required by moving specific permissions or roles to and from the Selected permissions list and
Selected roles list, respectively, as required.
4. Click Save.
Remove a role
Remove a role that is no longer needed.
When a role is removed, users assigned to that role automatically lose the corresponding permissions set. But, if the user is
assigned with additional roles or specific permissions, those permissions are not affected.
Task
1. On the Permissions page, select the Roles tab.
2. Click the Remove Role icon in the required role.
3. When prompted for confirmation, click OK.
Results
Users
Users are assigned roles with specific permissions, which define the ways in which they can use the McAfee Database Security
system.
Access to the McAfee Database Security web console is restricted to authorized users (administrators).
Add a user
Add authorized users to the system and define the ways in which they are allowed to use the system.
You can assign more than one role to a user. In addition, you can assign specific permissions to a user.
Task
1. On the Permissions page, click the Users tab.
2. Click Create New User.
The User Properties page is displayed.
3. In the User Name field, enter a user name for the user.
The maximum length for a username must be 15 characters and minimum length must be 4 characters.
4. In the First Name field, enter the first name of the user.
The maximum length for the first name must be 30 characters and minimum length must be 1 character.
The maximum length for the last name must be 30 characters and the minimum length must be 1 character.
6. From the Status drop-down list, select the status, ACTIVE, or INACTIVE to be assigned to users.
7. Enter the user password in the Password field, then enter again in the Confirm Password field.
8. To apply the system password policy on this user's password, select Enforce password policy.
Note
The password policy is configured on Password Policy tab of the Permissions page.
9. (Optional) To force the user to change the password when they logon for the first time, select Change password on next
login.
10. If one or more specific permissions are to be assigned to the user, select the required permissions from the All Permissions
list, then click to move them to the Selected permission list.
Note
To remove permissions from the Selected permissions list, select the permissions, then click .
11. To assign the permission set of an existing role to the new user, select the required role from the All Roles list, then click
to move the role to the Selected Roles list.
The permission sets of the selected roles are assigned to the user.
Note
To remove a role from the Selected Roles list, select the role, then click
12. In the Default Login Page drop-down list, select the required page.
13. In the View alert/result permissions by DBMSs, select the DBMS groups and DBMSs for which the user is authorized to
view alerts.
14. In the View alert permissions by Rules, select the rule for which the user is authorized to view alerts.
15. Click Save.
Task
1. On the Permissions page, click the Users tab.
2. Click the Properties icon in the required row.
3. In the User Properties, edit the detail as required, and click Save.
Task
1. On the Permissions page, select the Users tab.
2. Click the Properties icon in the required row.
The User Properties page is displayed.
3. In the User Properties, edit the user permissions as required by moving specific permissions or roles to and from the
Selected permissions list and Selected roles list, respectively.
4. Click Save.
Task
1. On the Permissions page, click the Users tab.
2. Click the Properties icon in the required row.
3. In the User Properties, click Change Password.
4. In the Change Password dialog box, enter a new password in the New Password field, and Confirm Password field.
The password must contain at least four characters.
5. (Optional) To force the user to change the password when they log on for the first time, select Change password on next
login.
6. Click OK.
Remove a user
Remove a user from the Users list, thereby revoking all user permissions.
A user that has been removed can no longer access the application or any of its functionalities.
Task
1. On the Permissions page, click the Users tab.
2. Click Remove icon in the required row.
3. When prompted for confirmation, click OK.
Results
The user is removed from the list and is no longer authorized to access the application.
Export users
Export the list of McAfee Database Security users or administrators into an XML file.
Note
This option is intended for advanced McAfee Database Security users only. It is available only to authorized users.
Task
1. On the Permissions page, click the Users tab.
2. Click Export Users.
A Note dialog box is displayed with the information that Alert DBMS permissions and Alert Rule permissions are not
exported.
3. Click OK.
Results
The displayed users are exported to an XML file and it can be saved in the preferred location. The password in the exported XML
are encrypted.
Import users
Import a previously defined list of users into the Users list.
Task
1. On the Permissions page, click the Users tab.
2. Click Import Users.
An Import Users dialog box is displayed.
3. Browse the required .xml file, then click Import.
Note
A Duplicate Users and Roles dialog box is displayed if the roles exist in the system. Select the required roles to import.
Results
The users contained in the .xml file are added to the Users list.
The default password policy requires that a user password includes at least one uppercase letter, at least one lowercase letter,
and at least one digit or special character (printable ASCII non-alphanumeric character).
Note
Task
1. On the Permissions, select the Password Policy tab.
2. To enforce the use of special characters in user passwords, select Yes in the Enforce special characters drop-down list.
3. From the Password minimum length drop-down list, select the minimum number of characters to be included in a
password.
4. To force users to change their passwords at regular intervals, from the Enforce password change every drop-down list,
select how often the users must change their passwords.
Note
5. From the New password minimum lifetime drop-down list, select the minimum time after which users are prompted to
change their passwords.
6. To prevent users from resetting their passwords to previously used passwords, select the time period from the Prevent
password repetition drop-down list.
7. To temporarily block the failed logon attempts from the same IP address, select Yes from the Prevent brute force attack
drop-down list.
8. To prevent username and password matches, select Yes from the Prevent user equals password drop-down list.
9. To lockout a user after multiple failed logon attempts, select the number of failed logons after which the user is locked out
of the system in the Lockout after failed logins drop-down list.
10. From the adjacent lock duration drop-down list, select the duration of the lockout period.
11. Click Save.
System
The System page provides several system functions, including interface configuration, custom rule groups, resolve types, and a
history of actions taken by users in the graphical user interface.
The outgoing email settings defined in the Email tab determine the mailbox that is used by McAfee Database Security to send
notifications, alerts, and traps.
Task
1. On the System page, select the Interfaces tab.
2. Click Email and configure the email parameters.
3. Click Save.
Note
To send test mail to the configured mail address, click Test email.
Configure LDAP
Use LDAP to search existing Active Directory groups, making role and user setup easier.
Task
1. On the System page, click the Interfaces tab.
2. Click LDAP, and then select Use LDAP to enable the feature.
3. Configure the LDAP parameters.
4. Click Save.
Once you have finished configuring the LDAP settings, you can configure McAfee Database Security roles based on your
LDAP roles.
Multiple-LDAP functionality enables you to configure additional LDAP servers and retrieve rule object values from other LDAP
servers.
Additional LDAP servers are configured in the custom properties file, with this structure and content:
multi.ldap.<N>.password=<Encrypted password3>
After configuring the LDAP servers, the McAfee Database Security management server must be restarted.
When you configure the LDAP server credentials, the LDAP server password is encrypted using the migration tool. Run
migration_tool.bat (located in the bin directory), then follow the on-screen instructions.
Note
This configuration allows using the additional LDAP servers only as rule object data sources. You can log on to the
McAfee Database Security management servers with an AD user using only the primary configured LDAP server (the server
configured on the interface Systems → Interfaces → LDAP ).
Once additional LDAP servers are configured, rule object values can be populated using those servers. To reference a group in
an additional LDAP server, the fully qualifying name of the group is required (groups from the primary LDAP server can still be
addressed using the short names).
Auto-complete is available for both the primary LDAP server and other configured servers.
Configure SNMP
Configure McAfee Database Security to use SNMP for internal communication and to send traps to third-party applications.
Task
1. On the System page, click the Interfaces tab.
2. Click SNMP, and select Use SNMP to enable McAfee Database Security to use SNMP for internal communications.
3. Configure the SNMP parameters.
4. (Optional) Click View SNMP MIB file to view the .mib file in an external browser as .txt file.
5. Select Use SNMP Trap and configure these SNMP trap parameters to send traps to a third-party application.
6. Click Save.
Task
1. On the System page, click the Interfaces tab.
2. Click Syslog, then select Use Syslog.
3. Configure the Syslog parameters.
4. Click Save.
McAfee Database Security provides CEF format configured by default. This proprietary alert format can be configured in the
properties file.
Task
1. On the server machine, go to <install dir>/conf.
2. Click the server-custom.properties file and modify it as required.
3. Save the file and restart the server.
Results
If the custom format is selected on the Syslog Configuration page, the respective file configuration is displayed.
Configure McAfee Database Security to use the Windows event log to monitor alerts.
Note
Windows event log is supported on Windows XP or later, and Windows Server 2003 or later.
Task
1. On the System page, click the Interfaces tab.
2. Click Windows Log and select Use Windows Event Log to enable monitoring alerts.
3. Configure the parameters in the Windows Event Log Configuration.
4. Click Save.
Task
1. On the System page, click the Interfaces tab.
2. Click Log to File and select the option Log to File.
3. Configure the parameters in Log to File Configuration page.
4. Click Save.
Configure Insights
McAfee Database Security Insights provides users with the ability to collect and analyze large amounts of data, as well as
visualization capabilities and data-exploration interfaces.
To use Insights, you have to configure the McAfee Database Security server to export alerts and VA results to the server where
Insights is installed.
Task
1. On the System page, click the Interfaces tab.
2. Click Insights and select Use Insights.
3. In the Hostname/IP field, enter the IP address of the server where Insights is installed in the designated fields.
4. In the Port field, enter the port number of the server where Insights is installed in the designated fields.
Note
When Insights is used, a default user, sngimport, is created and the user name and password fields are automatically
populated. If you have manually changed the password on the Insights server, you must also set that password in the
Password field.
5. In the Transfer Interval field, enter how often to send the data (in milliseconds). The minimum value is 30,000 milliseconds
(30 seconds).
6. Select one or more of the following types to export:
Note
The Restore Default Values option resets the user name, password, and transfer interval for Insights.
Archiving alerts
Archive alerts automatically or manually to view them later and to reduce the overall size of the alerts list.
You can also unarchive the existing archives to view the alerts they contain, or remove alert archives that are no longer required.
Existing archives are listed in the Archives tab of the System page.
Configure McAfee Database Security to automatically archive alerts in a specific location and at preset intervals.
Task
1. On the System page, click the Archives tab.
2. Click Settings and in the Archive Folder Path field, set the location where the archived files are to be stored.
Note
By default Auto archive by number of alerts, is enabled and alerts are archived when the number of alerts exceeds
10,000 (by default the 30,000 oldest alerts are archived).
3. To disable automatic archiving (not recommended), deselect the Auto Archive Enabled checkbox.
4. Select the Auto archive by time and schedule the archiving process as follows:
• To schedule archiving at hourly intervals, select by hours, then set the interval between each archive.
• To schedule daily archiving, select by day, then select the day of the week and time period for archiving to take
place.
• To schedule monthly archiving, select by month every, then set the number of months between each archive and
the time period.
• To run the archive process once, select Run Only Once. After executing, the scheduler property is deleted.
5. Enter the age of alerts to be archived in the Archive Alerts older than fields, by setting the number and time unit (days,
weeks, months).
6. Select Enable Archive RuleAction to archive alerts directly instead of storing the alerts in the database.
7. From the Archive RuleAction Rolling Period drop-down list, select the rolling period as DAY or HOUR.
8. Click Save.
Task
1. On the System page, click the Archives tab.
2. Enter the age of alerts to be archived in the Archive Alerts older than fields, by setting both the number and time unit
(days, weeks, months).
3. Click Archive Now.
Results
Reload an archive
Task
1. On the System page, click the Archives tab, then select Archive History.
2. In the Archives list, click Reload Archive in the required row.
The archived alerts are reloaded to the Alerts page.
3. To view the alerts for a specific archive, select the archive file from the Archives drop-down list, then click Apply.
Note
Filter the alerts that are contained in an alerts archive and unarchive only the data that meets specific criteria.
Task
1. On the System page, click the Archives tab.
2. Click Archive History and expand the Archive Load Filter.
3. From the Archive Type drop-down list, select the type of archive.
4. From the Filter by drop-down list, select Execution Time, and then enter From and To information.
5. Click Add.
6. Set additional filter properties as required, then click Upload to load the data that meets the filter criteria.
Rearchive alerts
You can remove unarchived alerts from the Alerts page by rearchiving them.
Task
1. On the System page, click the Archives tab.
2. Click Archive History and in the archives list, click Unload Archive in the required row.
Results
The Archives drop-down list in the Alerts page no longer shows the respective archived alert.
Note
To rearchive the entire archive list, click Unload All Archives before the Archive list header.
To conserve space, remove archives that are no longer relevant on the server.
Caution
The removal of an archive might not be permitted under company or legal regulations. Check your organization's security
policy before trying to remove an archive.
Task
1. On System page, click the Archives tab.
2. Click Archive History and in the archives list, click Remove Archive icon in the required row.
3. When prompted for confirmation, click OK.
Viewing clusters
The Cluster tab is used when the McAfee Database Security server is deployed in cluster mode. It displays view-only information
regarding the servers, including the sensors installed on each server. It is intended for the use of McAfee Database Activity
Monitoring users only.
Quarantining users
If a rule action is set to Terminate user session and the Quarantine user for option is selected, then a user can be placed
in quarantine for a predefined period. While in quarantine, the user cannot reconnect to the DBMSs for which the rule was
triggered.
Task
1. On the System page, click the Quarantine tab.
2. Click Settings and select or deselect the checkboxes for the parameters that define when a user can be quarantined.
For example, if you select User and IP address, when triggered by a rule, the system checks the user name and the IP
address (for example, Scott and 192.168.7.7). The system denies access to any subsequent SQL statements that comes
from 192.168.7.7 and the user Scott. Statements coming from 192.168.7.7 where the user Jerry is allowed.
3. Click Save.
Remove a user from quarantine so that they can access the DBMS.
Task
1. On the System page, click the Quarantine tab.
2. In the Quarantine list, click Unquarantine in the required row.
3. Enter the reason for removing the user from quarantine, then click Unquarantine.
Results
The user is removed from both the quarantine and the Quarantine list, and is again able to access the DBMS.
Set the period of time after which actions are automatically deleted from the Actions History.
Task
1. On the System page, click the History tab.
2. In the Actions History list, select the Delete actions older than checkbox, and enter the number of days after which actions
have to be deleted.
3. Click Save.
Task
1. On the System page, click the History tab.
2. In the Actions History list, click the Properties icon in the required row.
The Properties for action displays the action details.
Determine the types of server logs created as well as the maximum size of the log file.
Task
1. On the System page, click the Troubleshooting tab.
2. From the Log Level drop-down list, select the type of logs to be created.
3. In the Log file size field, set the maximum size of the log file.
4. Click Save.
Download and view the server logs files for troubleshooting purposes. You can also send these server log files to the McAfee
support .
Task
1. On the System page, click the Troubleshooting tab.
2. Click Download Logs.
Results
The server logs are downloaded as .zip file. The location where the file is saved depends on your default settings.
Task
1. On the System page, click the Troubleshooting tab.
2. Select Resolve IP from Host for Alert and click Save.
Note
By default, this feature is selected. Disabling of this feature is only needed in cases of severe network load.
System messages
View system message details
View the system messages generated by the system in response to various conditions and events in the system. You can view the
properties of a message on the Message Details.
The Messages list displays the messages like, when a sensor stops communicating with the server or when a license is about to
expire. These messages displays the level of severity.
You can also view the number of unread high severity messages under Severe Messages, which appears at the top of each page.
Task
1. On the System page, select the Messages tab.
2. In the Messages list, click the Properties icon in the required message row.
The Message Details page is displayed.
3. (Optional) To stop receiving this type of message, click the Click here to stop receiving link.
Unread messages appear in bold type; read messages appear in regular type.
Task
1. On the System page, click the Messages tab.
2. In the Messages list, click Mark all as Read or Mark all as Unread as required.
Task
1. On the System page, click the Messages tab.
2. In the Messages list, click the Delete icon in the required row.
3. When prompted for confirmation, click OK.
The message is removed from the list.
Configure the system to generate alerts for all system messages, when sensors are disconnected, when specific number of
custom rule alerts are received, or when specific number of vPatch alerts are received.
Task
1. On the System page, click the Messages tab.
2. Click Configuration and select the required options for the system to generate alerts for the system messages.
The read-only DBMS details vary according to database type, such as, HSQLDB, Oracle, or MS SQL.
On the System page, click the Backend DBMS details tab to view the back-end DBMS details.
Task
1. On the System page, click the Backend DBMS details tab.
2. To schedule a backup for DBMS details, select the Schedule enabled checkbox and configure one of these scheduling
intervals:
• To back up DBMS details on specific days, select by day, then select the days of the week and the time to start the
backup.
• To back up DBMS details on a monthly basis, select by month every, select the number of months between back
ups and the time to start the backup.
• To back up DBMS details on an advance scheduling, select advanced cron, enter the expression based on the cron
syntax.
• To back up DBMS details only once, select Run only once. The scheduler property will be deleted after execution.
3. Click Run or Save.
The following files need to be copied into this file from the <install dir>/webapps/ROOT/WEB-INF/config/application/
server.properties file. You can view this file to see how CEF and Sentinel are configured.
Note
Do not change the server.properties file. All changes should be made in the server-custom.properties file.
You can then change log.format.body.custom to fit your format. The format is flexible. Each keyword identified by $<key word>$
is replaced with its value from the alert. It is also possible to specify a maximum length for the field.
Keyword Description
Keyword Description
$agent.hostname$ Host name of the sensor the alert was received from
(string, maximum: 255)
Keyword Description
$rules.ruleTags.name$ Tags used in the rules that triggered the alert (string,
unlimited).
Keyword Description
The server must be restarted after modifying the server-custom.properties file before the changed properties can take effect.
vPatch rules and VA tests are provided by McAfee Database Security to help monitor and prevent attacks against known
vulnerabilities and to scan databases for security issues, respectively.
Task
1. On the Update page, click the Update Settings tab.
2. To automatically check for all updates, select Check for available updates automatically.
3. Select the required auto-installation option as follows:
• To install the updates only once on specific day and time, on a one-off basis, select Run Only Once. When this
one-off installation event has occurred, the Security Update Auto-Installation will revert to No auto-installation.
4. Click Save.
Task
1. On the Update page, click the vPatch Security Updates tab.
The currently installed version is indicated in the vPatch Security Updates tab.
Note
If you try to install an earlier version of vPatch security updates, your are prompted to confirm that you really want to
install it.
Task
1. On the Update page, click the VA Security Updates tab.
The VA Security Update dialog box displays the list of available updates. If no updates are available, a message is displayed
accordingly.
Note
If you try to install an earlier version of VA security, your are prompted to confirm that you really want to install it.
Task
1. On the Update page, click the Software Updates tab.
2. Click Check for new McAfee Database Security releases.
The Server Software Update dialog box displays the list of available updates.
Note
Task
1. On the Update page, click the Software Updates tabs.
2. Click Check for new sensor updates.
A list of available sensor updates are displayed for each platform.
Note
Task
1. On the Update page, click the vPatch Security Updates, VA Security Updates, or Software Updates tab as required.
2. To install an update from a local file (offline installation), click For offline installation upload an update file.
3. Click Browse to locate and select the installation file with a file extension .SUP.
4. Click Upload.
Task
1. On the Update page, click the Security Updates, or Server Updates tab as required.
2. Click Updates History.
Generating reports
You can generate a wide range of reports using McAfee Database Activity Monitoring. By default, McAfee Database
Security reports are displayed in HTML format in an external browser window. Alternatively, you can generate reports
in .doc, .pdf, .rtf, .xml, or .xls formats.
You can generate System Reports and Dynamic Reports as you require.
Different reports are available in the System Report tab and these can be generated in the available formats.
The following procedure explains how to generate report for Alerts Per DBMS:
Task
1. On the Reports page, click the System Reports tab.
2. For the required category of report, click the Run report icon in the Run column.
3. In the Alerts Per DBMS, set the report criteria:
a. Select the required DBMS for which the reports to be generated.
b. Enter From and To date for the reports to generate.
c. (Optional) Enter a brief description or comment in the Comments field. This comment is displayed at the top of
report.
4. (Optional) To generate the report as a PDF, select PDF view.
Note
Results
Note
The report is generated and displayed.
The procedure remains similar to generate other System Reports.
Dynamic reports can present data in summary or detailed formats. The dynamic report options are available in the Dynamic
Alert Reports, Dynamic VA Result Reports, and Dynamic System Reports tabs of the Report page.
Create dynamic reports for alerts or for test results. The dynamic report options are available in the Dynamic Alert Reports,
Dynamic VA Result Reports and Dynamic System Reports tab of the Report page.
You can create multiple dynamic reports to meet the needs of your organization. For each report, you can define one or more
filters that determine which alerts or results are included in the dynamic report.
Unless you choose the HTML format, you can configure the report to run automatically at scheduled intervals and send the
report as an email attachment.
Procedure for creating a detailed report remains same for Dynamic Alert Reports, Dynamic VA Result Reports, and Dynamic
System Reports.
The following procedure explains how to create a detailed Dynamic Alert Reports:
Task
1. On the Reports page, in the Dynamic Alert Reports tab, click New Report.
2. In the Name field, enter a name for the dynamic report.
Tip
• To define a filter, select the required criteria from the Filter by drop-down lists, then click Add. The filter is added to
the Selected Filter Fields table.
Note
In Dynamic System Reports, when you define a filter for Database Groups, you can add multiple database
group names separated only with comma.
• To remove a filter from the Selected Filter Fields table, click Remove in the corresponding row.
• To filter the report to include only data from the most recent scan, select Last Run Results (This option is available
for Dynamic VA Result Reports only).
6. From the Report Format drop-down list, select the format in which the report needs to be generated.
7. From the Group B (x axis) drop-down list, select the criteria, such as, Level, DBMS, or Sensor for grouping data in the
report.
8. Set the criteria for sorting data:
• To sort by a specific parameter in ascending order, select the parameter in the left column of Sort by list, then click
to move it to the right column.
• To sort by a specific parameter in descending order, select the parameter in the left column of Sort by list, then click
to move it to the right column.
• To remove a parameter from the Sort by list, select the parameter, then click to move it to the left column list.
The parameter is sorted by selected criteria in the order in which they appear in the right column of Sort By list.
Select a parameter, then click or to reposition it in the Sort By list.
• To include a field in the report, select the parameter in the Available Report Fields, then click to move it to the
Selected Report Fields list.
• To exclude a field from the report, select the parameter in the Selected Report Fields list, then click to move it
to the Available Report Fields list.
10. To run the report based on a schedule (available only for .xls and .pdf report formats), select Schedule Enabled and
configure these parameters:
a. Select the interval at which you want the report to run, by hours, by day, or by month, and set the relevant frequency.
b. In the Start Time field, set the time of day to run the report. This option is available when you select by day or by
month every.
c. (Optional) Select advanced cron to run the report on an advance scheduling, and enter the expression based on the
cron syntax.
d. (Optional) Select Run Only Once to run the report only once on the scheduled time.
11. (Optional) Configure the report notification settings:
a. Enter the email address in the Send notification by email to send a notification when the report is ready.
b. Select Attach report, to send the report as an attachment to the given email message.
12. Click Save to save the report without running it or click Run to generate the report.
A summary dynamic report displays key report data in a bar or pie chart, accompanied by a table with the corresponding data.
Summary reports can be generated in .html, .doc, .pdf, .rtf, or .xls format.
Unless you choose the HTML format, you can configure the report to run automatically at scheduled intervals and send the
report as an email attachment.
Note
Procedure for creating a summary report remains same for Dynamic Alert Reports and Dynamic VA Result Reports.
The following procedure explains how to create a detailed Dynamic Alert Reports:
Task
1. On the Reports page, in the Dynamic Alert Reports tab, click New Report.
2. In the Name field, enter a name for the dynamic report.
Tip
• To define a filter, select the required criteria from the Filter by drop-down lists, then click Add. The filter is added to
the Selected Filter Fields table.
• To remove a filter from the Selected Filter Fields table, click Remove the corresponding row.
6. From the Report Format drop-down list, select the format in which the report needs to be generated.
7. From the Graph type drop-down list, select the type of graphic such as, Bar, Multi-Bar or Pie to display the data summary.
Note
A Multi-Bar graph stacks data based on two different variables. For example, you can create a Multi-Bar graph that
groups the data according to both DBMS and severity levels to view the distribution of alerts across the databases. If
Multi-Bar is selected, you must define the properties assigned to the two axes in Group (subtotal) by.
8. From the Group B (x axis) drop-down list, select the criteria such as, Level, DBMS, or Sensor for grouping data in the report.
9. To run the report based on a schedule (available only for .pdf, .doc, or .rtf report formats), select Schedule Enabled check
box, and configure one of these parameters:
• To run a report at intervals, select by hour every, then select the interval between each report generation.
• To run the report on the required days, select by day, then select the days of the week and the time to run the
report.
• To run the report on a monthly basis, select by month every, then select the number of months between each
report generation and the time to run the scan.
• To run the report on an advance scheduling, select advanced cron, and enter the expression based on the cron
syntax.
• To run the report only once on the scheduled time, select Run Only Once.
10. Configure the report notification settings as follows:
• If you want to send a notification when the report is ready, enter the email address in the Send notification by
email to field.
• If you want the report to be sent as an attachment to an email message, enter the email address in the Send
notification by email to field, then select Attach report.
11. Click Save to save the report without running it, or click Run to generate the report.
View or edit the properties of a dynamic report on the Dynamic Alert Reports tab, Dynamic VA Result Reports tab, or Dynamic
System Reports tab according to the required dynamic report type (alerts or results).
Procedure for viewing dynamic report remains same for Dynamic Alert Reports, Dynamic VA Result Reports, and Dynamic
System Reports.
The following procedure explains how to view the Dynamic Alert Reports.
Task
1. On the Reports page, in the Dynamic Alert Reports tab, click the properties icon in the required row.
2. Change the report properties as required.
3. Click Save.
Note
Procedure for scheduling a dynamic report remains same for Dynamic Alert Reports, Dynamic VA Result Reports, and Dynamic
System Reports.
Task
1. On the Reports page, in the Dynamic Alert Reports tab, click the Properties icon in the required row.
2. In the Dynamic Reports list, click the properties icon in the row for the report. The properties of the dynamic report are
displayed in the dynamic reports tab.
3. To schedule the report generation at regular intervals, select the Schedule enabled checkbox and configure one of these
scheduling intervals:
• To run a report at intervals, select by hour every, then select the interval between each report generation.
• To run the report on the required days, select by day, then select the days of the week and the time to run the
report.
• To run the report on a monthly basis, select by month every, then select the number of months between each
report generation and the time to run the scan.
• To run the report on an advance scheduling, select advanced cron, enter the expression based on the cron syntax.
• To run the report only once on the scheduled time, select Run Only Once.
4. Set the email address to receive the report output file. You need to configure the email server on the System tab first.
5. Click Save.
Results
The scheduled report output is saved in the McAfee Database Security server machine to the path specified in the properties
file <Server root>\webapps\ROOT\WEB-INF\config\reports\britConfig.properties in the server.reports.xls Directory
property, which is by default located in the <Server root>\webapps\ROOT\export\ folder.
Allowed Special
Field Name Mandatory Allowed Values Characters
Allowed Special
Field Name Mandatory Allowed Values Characters
Expression Schedule
Manually run a dynamic report rather than waiting for the scheduled report to initiate.
Procedure to run a report remains same for Dynamic Alert Reports, Dynamic VA Result Reports, and Dynamic System Reports.
The following procedure explains how to create a detailed Dynamic Alert Reports:
Task
1. On the Reports page, click the Dynamic Alert Reports tab.
2. In the Reports List, click the Run icon in the required report.
Results
You can view the generated report (.pdf, .rtf, .doc, or .xls) in the defined location. The HTML report is viewed in the browser.
Procedure for deleting a detailed report remains same for Dynamic Alert Reports, Dynamic VA Result Reports, and Dynamic
System Reports.
The following procedure explains how to delete a detailed Dynamic Alert Reports:
Task
1. On the Reports page, click the Dynamic Alert Reports tab.
2. In the Reports List, click the Remove report icon in the required row.
3. When prompted for confirmation, click OK.
Task
1. On the Reports page, click the Settings tab.
2. Select one of these options:
• Use Default Logo — The logo that appears in the user interface is displayed in the reports.
• Use Custom Logo — A different logo is displayed in the reports. If you select this option, select the graphic file with
the logo.
3. Click Save.
Note
• There is an expectation of a large volume of alerts (more than 100 k alerts between archive events).
• There is a requirement to create backups of the back-end database.
McAfee Database Security supports the use of following external database:
• Migrating the internal database to the external database. If at any stage, you revert to the internal database, the data
stored on the external database is no longer accessible to the McAfee Database Security server.
• Changing the password used to authenticate the server to the database.
The migration procedure varies based on the database types (Oracle or MSSQL). When migrating to an external database, any
existing data is automatically moved from the internal database to the external database when it is created.
Migrate the internal database to MSSQL database using the migration tool. Configure the MSSQL database user before using
the migration tool to migrate. A user name and password are required to complete the process. The user must have sufficient
permissions to create a database.
If you do not want to grant create database permissions to the database user to access the McAfee Database Security server
database, you can migrate the database manually.
Task
1. Manually create the databases SNTRSRV and SNTRSRV_BACKUP using a user with create database permissions.
2. Run the migration script and provide it with a database user that is now only required to have these permissions on the
SNTRSRV and SNTRSRV_BACKUP databases:
• db_datareader
• db_datawriter
• db_ddladmin
3. Start the migration tool in one of these ways:
• On a Windows system, open a command prompt (cmd), then go to the bin directory under the root install directory.
For example: C:\Program Files\Mcafee\McAfee Database Security\bin Then, run the bat file, migration_tool.bat.
• On a Linux system, run: /etc/init.d/mfe-dbs-server db-migrate
Note
If the external database is on the local host, the external IP address or host name of the server should be used. Do not
use local host or 127.0.0.1.
8. When prompted to enter the MSSQL Listening Port, type in the number of the MSSQL port of the database host used for
listening, for example, 1433. Verify that TCP/IP communication is enabled for that IP address and port.
Results
After the process is completed, a message is displayed indicating the duration of the process and whether the process
completed successfully.
When the process completes successfully, the server-custom.properties file is modified to contain properties that enable McAfee
Database Security to connect to the external database.
Note
If the process fails, examine and verify that the properties listed on the screen are correct. For further assistance, contact
McAfee support with the process output.
Migrate the internal database to Oracle database using migration tool. Define two new Oracle database users before using the
migration tool to migrate. The resulting user names and passwords are required to complete the process. Both users should
have the permissions: resource and connect. Only the first user is used by the McAfee Database Security server; the second user
is used for backup during upgrade scenarios.
• On a Windows system, open a command prompt, then go to the bin directory under the root install directory. For
example, C:\Program Files\Mcafee\McAfee Database Security\bin Then, run the bat file, migration_tool.bat.
• On a Linux system, run: /etc/init.d/mfe-dbs-server db-migrate
Results
After the process is completed, a message is displayed indicating the duration of the process and whether the process is
completed successfully.
When the process completes successfully, the server-custom.properties file is changed to contain properties for enabling McAfee
Database Security to connect to the external database.
<installation directory>/conf
Note
If the process fails, examine and verify that the properties listed on the screen are correct. For further assistance, contact
McAfee support with the process output.
Typically, all database user passwords change periodically. When the external database is subject to such changes, the McAfee
Database Security server will not be able to connect to the external database. The back-end migration tool provides a way to
change the configured password. This process is also useful for checking connectivity to the external database.
The McAfee Database Security back-end migration tool's validation option is intended to create an encrypted password for
accessing the external database. The resulting encrypted value is displayed on the standard output. This value can then be
copied into the McAfee Database Security server, server-custom.properties file, to change the authentication password to
connect to the external database.
Note
The process for validating connectivity depends on the target platform where the server is installed.
Task
1. Start the migration tool in one of these ways:
• On a Windows system, open a command prompt, then go to the bin directory under the root install directory. For
example, C:\Program Files\Mcafee\McAfee Database Security\bin Then, run the bat file, migration_tool.bat.
• On a Linux system, run: /etc/init.d/mfe-dbs-server db-migrate
2. Select an action, type validate. This loads the properties specified in the file server-custom.properties.
3. Type the user name and password. If validating an Oracle database, type in the second user name and password when
prompted.
4. Type the database driver or press enter to accept the default.
After the validation process completes, a message is displayed indicating whether the properties are correct and listing a
summary of the properties.
When prompted, indicate if you want to save the connection properties to the configuration file.
6. If you choose not to save the new configuration, you can do so later by editing the server-custom.properties file located in
the following location:
• If you are working with an Oracle database, copy the last two lines of the summary and replace the corresponding
lines in the server-custom.properties file. The properties are database.password and database.backup.password.
• If you are working with an MSSQL database, copy the last line of the summary and replace the corresponding line in
the server-custom.properties file. The property is database.password.
Note
The exact order of the properties in the server-custom.properties file can vary.
If you need restrictive permissions for the external database user and want to create the database before running the migration
tool, use the advanced configuration option.
This section describes the guidelines for independently creating an external MSSQL database.
If you choose to create the database on your own, these conditions must be met:
• You need to create two databases, named SNTRSRV and SNTRSRV_BACKUP, respectively.
• On each database, enable the READ_COMMITTED_SNAPSHOT, transaction isolation level by running these commands:
ALTER DATABASE SNTRSRV SET READ_COMMITTED_SNAPSHOT ON
ALTER DATABASE SNTRSRV_BACKUP SET READ_COMMITTED_SNAPSHOT ON
• Both databases should be owned by the user created for the McAfee Database Security server, for example, DBSS.
• The user must be the dbowner who has all permissions for the databases.
Configuring the McAfee Database Security servers to work in cluster mode improves system availability and performance.
Cluster mode is configured in the server-cluster.xml file for each server in the cluster.
Task
1. Install McAfee Database Security server and configure one of the McAfee Database Security servers to work with an
external database.
2. Install McAfee Database Security server on the other systems in the cluster computers.
3. Stop all McAfee Database Security servers.
4. Rename the file server-cluster-example.xml to server-cluster.xml located in the following location:
5. Edit the file so it contains information about all servers you intend to use in the cluster in this format:
<!--
This is an example server-cluster.xml file. It is used for configuring the server cluster. Each server
element host and port configurations should match the Server configuration. Id field must be in the
range of 0 to 999. Each server should have a unique id and the id shouldn't be changed onced assigned
to a server.
In none cluster mode the server uses id 0. Thus, if migrating to cluster mode (for example you have a
server running and you wish to move to a cluster configuration) the migrated server should receive id
0.
––>
<servers>
<server>
<!––
either ip or host name
-->
<host>cluster1.sample.com</host>
<!--
https listen port of the server
-->
<port>8443</port>
<id>0</id>
</server>
<server>
<host>cluster2.sample.com</host>
<port>8443</port>
<id>1</id>
</server>
<server>
<host>192.168.1.101</host>
<port>8443</port>
<id>2</id>
</server>
</servers>
• host — The host name or the IP address of the McAfee Database Security server.
• Port — The https port of the McAfee Database Security server.
• id — A unique ID for each server, in the range 0-999. The McAfee Database Security server that has been migrated
to work with an external database should be assigned ID of 0.
6. Copy the file server-cluster.xml from <McAfee Database Security Server install dir>\conf to all the servers in the
cluster.
7. On the server working with an external database, edit your server-custom.properties file located in <McAfee Database
Security Server install dir>\conf directory. You can add to it these optional parameters:
• server.server.address — If the server has different internal and external IP addresses, configure here the internal IP
address (as the server sees itself). For example, server.server.address=192.168.150.111
• server.cluster.ip.whitelist — A list of IP addresses, which are the only ones allowed to connect to the cluster,
separated by semicolons. For example, server.cluster.ip.whitelist=127.0.0.1;192.168.150.23
• server.cluster.secret — A shared secret for all the computers in the cluster. Each server will agree to receive connect
requests only from other servers in the cluster that have the same secret. If not specified, a default internal secret
is used. For example, server.cluster.secret=mysecret
• server.cluster.keystore — An alternative keystore location, if you want to use a location other than the one
in the server.xml file located in the <McAfee Database Security Server install dir>\conf directory. For example,
server.cluster.keystore=C:\Program Files\McAfee\server\httpsKeystore\.keystore
• server.cluster.keystore.type — The type of the alternative keystore used. For example,
mcafee.cluster.keystore.type=JKS
• server.cluster.keepalive — The time in milliseconds after which the server assumes another cluster computer
is down, if it does not receive a connection request from it. The default value is 60000. For example,
server.cluster.keepalive=100000
The cluster configuration details can be viewed on the Cluster tab of the System page.
If you encounter problems in a cluster, you must troubleshoot the cluster mode configuration.
If you are still unable to work with your server in the cluster mode configured, contact McAfee support .
You can back up the database server and no other backup is needed (sensors do not store any data and this need not be backed
up or restored).
A complete backup of the server is performed in three stages. The recovery process uses the backup files to restore the system.
Note
In addition, we recommended saving the installation files of the latest installed server version where you can easily find them
in case you need to reinstall the application.
The configurations stored in these files include listening ports, cluster configuration, external database configuration, and
customer-specific custom configurations. Changes in the configuration files are made manually. We recommend backing up all
configuration files each time a configuration change is made.
The server also stores a unique server identifier in the file unique.txt at Windows:
This file is generated when the server runs for the first time.
The server uses a back-end database to store system configurations, including policy profiles for each sensor and alerts.
Database Definition
Internal backend database (evaluation only) The server comes bundled with an in-process back-
end database. The database is only supported in
product evaluations and must store a maximum of
100,000 alerts between archive events.
External backend database The server can work with Oracle or MSSQL external
databases. The use of an external database is
required when the server is used in production and
was designed to handle a large volume of alerts.
Additionally, the use of an external database enables
the use of standard DBMS tools to manage the
database.
On Windows platforms, all data files reside in the hsqldb_data directory at:
To back up the internal database, all files in the specified hsqldb_data directory must be copied.
Configure McAfee Database Security to automatically archive alerts in a specific location and at preset intervals.
Archive files storage directory is configured through the web console on the System → Archives → Settings page.
Note
Archiving to an external shared storage mount point can be configured through a Windows UNC path, enabling you to use
the same backup procedure as for the external storage.
In the event of a system failure or disaster (such as disk failure), use the backed up files to restore the system.
Task
1. Resolve the issue that caused system failure, for example, replace a failed disk.
2. Reinstall the server.
Note
We recommended you to install the same version as previously installed. If you need an installation file, then contact
McAfee support .
XML API
The XML API enables you to query the DAM server for data through an XML interface.
Note
Some parameters were added in the latest product version. To ensure all parameters are supported, upgrade your product to
the latest version. For more information about XML API, see McAfee Knowledge Base article KB72411.
Task
1. On the System page, click the Interfaces tab, and select XML API.
2. Select XML API enabled.
3. Click Save.
Results
Task
1. On the Permissions page, select Users, then Create New User to add a user.
2. Assign the new user Xml api permissions only.
The Xml api and the related sub-permissions are added to the Selected permissions list.
The administrator can assign selected sub-permissions, rather than all Xml api permissions.
Results
The XML API uses a Representational State Transfer (REST) format for request response processing. The XML REST API receives
requests through standardized HTTP GET/POST parameters and the response is an XML response.
Task
1. Enable the service through the System tab.
2. Access the service by authenticating with a user that has the XML API permission (default administrator user has the
relevant permission). Authentication is done via HTTP Basic Auth.
3. Use the following base URL for a request: <server URL>/xmlapi.svc.
The XML API allows you to perform queries regarding alerts, VA results, DBMSs, sensors and others.
To test the XML API, a simple browser request can be used. For example, to get a list of sensors and their current state,
issue the following request in a browser (replace localhost with relevant domain name or IP address):
https://localhost:8443/xmlapi.svc?service=sensor
Note
The port number mentioned here varies depending on the McAfee Database Security configuration.
The web browser test displays a dialog box asking for a username and password in order to successfully submit the XML
API request.
A successful request then results in an XML response that enumerates the sensors known to McAfee Database Security.
These sensor details are not limited to current instances, but also deleted sensor instances.
Each service supports a set of parameters that can be used to limit the request. For example, the alert service supports the
HH$TimeBackPeriod parameter, which specifies the time back in milliseconds that an alert was executed at. For example, to
get all alerts from the last five minutes, issue the following request:
https://127.0.0.1:8443/xmlapi.svc?service=alert&HH$TimeBackPeriod=300000
Retrieves sensor information, start or stop monitoring database, and updates specific sensor properties.
Service Sensor
Parameter Definition
HH$Name String
HH$Id Long
HH$Sid String
HH$ApprovedBy User ID
HH$Hostname String
HH$Ip String
HH$Database Database ID
Parameter Definition
HH$Server Server ID
Examples
Note
The port number mentioned here varies depending on the McAfee Database Security configuration.
Retrieves alerts information. The parameter are used to filter the alerts.
Service alert
Parameter Definition
HH$ResolveReason String
HH$Id Long
HH$TagName String
HH$DbGroupName String
HH$ExecutionTimeTo Date
Parameter Definition
HH$Operation String
HH$OsUser String
HH$ResolvedBy User ID
HH$SourceHost String
HH$SourceIP String
HH$RuleName String
HH$QuarantineId String
HH$ReleaseTimeAfter Date
HH$ReleaseTimeBefore Date
HH$ExecUser String
HH$ExecProgram String
HH$Module String
HH$ModifyDateFrom Date
Parameter Definition
HH$ModifyDateTo Date
HH$Sid Integer
HH$TimeBackPeriod Long
Note
For example, to get maximum of 5000 unresolved alerts from host myhost, issue the following request:
https://127.0.0.1:8443/xmlapi.svc?service=alert&HH$SourceHost=myhost&HH$ResolveNames=Unresolved&HH$pageSize=5000
Service varesult
Parameter Definition
HH$ResolveReason String
Parameter Definition
HH$Id Long
HH$TagName String
HH$DbGroupName String
HH$ExecutionTimeTo Date
HH$ResolvedBy User ID
For example, to get VA results with severity HIGH from scan name, myscan, issue the following request:
https://127.0.0.1:8443/xmlapi.svc?service=varesult&HH$Severities=HIGH&HH$ScanNames=myscan
Service dbms
Parameter Definition
HH$Id Long
HH$Name String
HH$Description String
Parameter Definition
Examples
Note
The port number mentioned here varies depending on the McAfee Database Security configuration.
Note
The parameters HH$$RuleStats and HH$$ScanStats are helpful when the time consumed for the completion of service call
is very high. It eliminates rules and scans statistics from the database output, since these operation can take long time when
the network connection to the back-end database is slow.
Service scans
Parameter Definition
HH$name String
HH$tags String
Parameter Definition
HH$Deleted Boolean
HH$Valid Boolean
HH$Enabled Boolean
HH$Modified Boolean
For example, to get the list of active scans, issue the request:
https://127.0.0.1:8443/xmlapi.svc?service=scans&HH$Valid=true
Adds a VA database.
Service add-db
Note
Depending on the database type, you must provide either an instance name or a port number. For advanced scenarios, it is
possible to provide a full connection URL.
Note
In MSSQL, you are not allowed to provide both parameter, instance and port number.
Parameter Definition
HH$Description String
• ORACLE
• MSSQL
• MYSQL
• SYBASE
• DB2
• DB2AS400
• DB2ZOS
• TERADATA
• POSTGRESQL
• SAPHANA
• MSSQL2000
• SQLAZURE
• MongoDb
HH$Host String
HH$Port Integer
HH$Instance String
HH$EnableVA Boolean
Enable or disable VA section. The default value is
true
HH$Password String
Parameter Definition
HH$validateCredentials Boolean
Enable or disable verify connection. The default
value is true for add db
Parameter Definition
HH$OSUsername String
HH$OSPassword String
HH$OSCert String
HH$OSCertPassword String
Parameter Definition
HH$OSTunnelUsername String
Parameter Definition
HH$OSTunnelPassword String
HH$OSTunnelCertificate String
HH$OSTunnelCertificatePassword String
HH$OSTunnelHost String
HH$OSTunnelPort Integer
For example, to add a new MSSQL database name SQL_DB, issue the request:
https://127.0.0.1:8443/xmlapi.svc?service=add-
db&HH$Name=SQL_DB&HH$DbType=MSSQL&HH$Host=127.0.0.1&HH$Instance=SQL2005&HH$Username=uname&HH$Password=pword
Updates a database.
Service update-db
Parameter Definition
HH$Description String
Parameter Definition
HH$Host String
HH$Port Integer
HH$Instance String
HH$Password String
Parameter Definition
Parameter Definition
Note
The port number mentioned here varies depending on the McAfee Database Security configuration.
• https://127.0.0.1:8443/xmlapi.svc?service=update-
db&HH$Id=10000000&HH$EnableAlternative=true&HH$AltUsername=sa&HH$AltPassword=somepassword&HH$AltConnectionString=
MOBL In this particular example, the update-db action is applied only for the database instance 10000000.
• https://127.0.0.1:8443/xmlapi.svc?service=update-
db&HH$Id=10000000&HH$EnableNetMonitor=true&HH$NetMonitorPorts=1443,2443&HH$EnableMemMonitor=true
Service batchupdate-db
Parameter Definition
Parameter Definition
For example, to enable network monitoring for all databases of type MSSQL and version less than 2008 (SQL Server version=10),
submit a request:
https://127.0.0.1:8443/xmlapi.svc?service=batchupdate-
db&HH$DbType=MSSQL&HH$DbVersion=10&HH$DbVersionCompare=LT&HH$EnableNetMonitor=true
Deletes a VA database.
Service delete-db
Parameter Definition
https://127.0.0.1:8443/xmlapi.svc?service=delete-db&HH$Id=10006000
Service add-db-to-group
Parameter Definition
For example, in order to add a database with ID#10007000 to the groups DB-Group1 and DB-Group2, submit the request:
https://127.0.0.1:8443/xmlapi.svc?service=add-db-to-group&HH$Id=10007000&HH$Groups=DB-Group1,DB-Group2
Note
If a database group name contains the comma character (,) then the name must be URL encoded twice to make sure the
comma character will not be considered as a separator. You can use an online URL encoder service, www.urlencoder.org. For
example, if the database group name is test,more%test, then after encoding it, the result is twice the input, for example,
test%252Cmore%2525test.
Service remove-db-from-group
Parameter Definition
For example, to remove database with id #10007000 from groups DB-Group1 and DB-Group2, submit the request:
https://127.0.0.1:8443/xmlapi.svc?service=remove-db-from-group&HH$Id=10007000&HH$Groups=DB-Group1,DB-Group2
Note
If a database group name contains the comma character, then the name must be URL encoded twice to ensure the
comma character is not considered as a separator. You can use an online URL encoder service: www.urlencoder.org. For
example, if the database group name is test,more%test, then after encoding it, the result is twice the input, for example,
test%252Cmore%2525test.
Adds a VA scan.
Service add-scan
Parameter Definition
HH$Name String
HH$Description String
Parameter Definition
HH$Enabled Boolean
For example, to add a new scan on database with ID#10007000 on category Audit, submit the request:
https://127.0.0.1:8443/xmlapi.svc?service=add-scan&HH$Name=newScan&HH$DatabasesAdd=10007000&HH$TagsAdd=Audit
Updates a VA scan.
Service update-scan
Parameter Definition
HH$Name String
HH$Description String
Parameter Definition
HH$Enabled Boolean
For example, to update scan with ID#10009000 and add database with IDs #10006000 and 10007000 submit the request:
https://127.0.0.1:8443/xmlapi.svc?service=update-scan&HH$Id=10009000&HH$DatabasesAdd=10006000,10007000
Starts a VA scan.
Service start-scan
Parameter Definition
https://127.0.0.1:8443/xmlapi.svc?service=start-scan&HH$Id=10008000
Deletes a VA scan.
Service delete-scan
Parameter Definition
For example, to delete the scan with ID#10008000, submit the request:
https://127.0.0.1:8443/xmlapi.svc?service=Delete-scan&HH$Id=10008000
Service ruleobject
object-type — String (Mandatory). The rule object type. common values: STATEMENT, ip, object (provide one of
value-set, value-append, and value-delete).
value-set — Sets values for the rule object. If the rule object does not exist, it gets created.
value-append - Appends the specified values to the rule object. Multiple values may be specified in a comma-
separated list.
value-delete - Delete all specified values from the rule object. Multiple values may be specified in a comma-
separated list.
object-api-restricted - true or false (default = false). Mandatory when creating new rule object which is API
restricted (manipulated only via XML API).
db-ids — Mandatory. The list of database IDs (DAM). Multiple values may be specified in a comma-
separated list, for example, db-ids=10200000,10201000.
value-set, value-append, or value-delete — Mandatory, provide group of values.
object-default-value — Alternative or default value for the case of missing mapping otherwise
rule is ignored.
— Optional only on value-set. Multiple values may be specified in a comma-separated list (for
example, object-default-value=Windows, Linux, Mac).
— in order to reset value provide empty value (object-default-value=).
Note
Interaction with such an API restricted object involve providing mapping of keys (via parameter: db-ids) and values (via
parameters: value-set/value-append/value-delete). Therefore, order is important and also the number of db-ids should be
equal to number of groups of values. Keep your values non-empty for the set operation to reset values. You may use a pair of
brackets ().
For example, the parameter line:
db-ids=12600000,12601000&value-set=(WIN,LINUX)(MAC1,MAC2)is actually mapping 12600000 => WIN,LINUX and
12601000 => MAC1,MAC2
Group of values — The collection of multiple elements, each one is surrounded with special brackets: [(' , ')] whereas each
element is constructed from multiple non-empty values specified as comma-separated list.
Format: [(V1,V2,...Vn)][(W1,W2,...Wm)]
Examples
Note
Only one value action (append, set or delete) is allowed per a single request
Resolves alerts.
Service resolve-alerts
Parameter Definition
HH$ResolveReason String
HH$Id Long
HH$TagName String
HH$DbGroupName String
HH$ExecutionTimeTo Date
Parameter Definition
HH$Operation String
HH$OsUser String
HH$ResolvedBy User ID
HH$SourceHost String
HH$SourceIP String
HH$RuleName String
HH$QuarantineId String
HH$ReleaseTimeAfter Date
HH$ReleaseTimeBefore Date
HH$ExecUser String
HH$ExecProgram String
HH$Clientid String
HH$Module String
Parameter Definition
HH$ModifyDateFrom Date
HH$ModifyDateTo Date
HH$Sid Integer
HH$TimeBackPeriod Long
SET parameters are used to pass the values to be set for the alerts subset selected by the above parameters.
Parameter Definition
HH$$resolveReason String
For example, to resolve all the unresolved alerts received during the past five minutes, submit the request:
https://127.0.0.1:8443/xmlapi.svc?service=resolve-alerts&HH$ResolveNames=Unresolved&HH$TimeBackPeriod=300000&HH$
$resolveName=Resolved
Resolves VA Results.
Service resolve-results
QUERY parameters are used to select the results that has to be resolved.
Parameter Definition
HH$ResolveReason String
HH$Id Long
HH$TagName String
HH$DbGroupName String
HH$ExecutionTimeTo Date
HH$ResolvedBy User ID
SET parameters are used to pass the values to be set for the results subset selected by the above parameters:
Parameter Definition
HH$$resolveReason String
Parameter Definition
For example, to resolve all the results received during the past 24 hours, submit the request:
https://127.0.0.1:8443/xmlapi.svc?service=resolve-results&HH$TimeBackPeriod=86400000&HH$
$resolveName=Resolved&HH$$resolveReason=DONE
Restarts a sensor.
Service sensor-restart
Parameter Definition
For example, to restart sensors 10100000 and 1020000, submit the request:
https://127.0.0.1:8443/xmlapi.svc?service=sensor-restart&HH$Id=10100000,10200000
Manage or list the custom rules like adding, updating, deleting, and batch updating.
Service rules
Parameter Definition
HH$NewName The new rule name when updating the rule. Valid
only for the update operation. Optional but cannot
be empty.
Parameter Definition
{
allow_rule : {
global_allow,
}
|
send_alert :
{
severity: INFO|NOTICE|LOW|MEDIUM|HIGH¹,
to_archive |
console : {
snmp_trap, terminate_session:{quarantine_user_for:10}
},
syslog: TRACE|DEBUG|INFO|WARN|ERROR|FATAL,
event_log:TRACE|DEBUG|INFO|WARN|ERROR|FATAL,
log_file: TRACE|DEBUG|INFO|WARN|ERROR|FATAL,
email:
{
severity: INFO|NOTICE|LOW|MEDIUM|HIGH,
addresses: “list_of_email_addresses”²
},
stop_processing_rules
}
}
¹ Action Severities (INFO, NOTICE, LOW, MEDIUM, HIGH) and Log Levels (TRACE, DEBUG, INFO, WARN, ERROR, and FATAL) should
be in upper case
² list_of_email_addresses is a list of email addresses separated by a semicolon. The entire list should be enclosed in double
quotes.
Parameter Definition
HH$EditRoles The roles that are granted edit permission for this
rule
Parameter Definition
Note
You can use the HH$Id parameter and specify the rule ID. However, note that the rules use revisions and the ID might change
with a new revision. The best option to identify a rule is by its name.
Examples
https://127.0.0.1:8443/xmlapi.svc?
service=rules&HH$RuleType=custom
List all predefined rules:
https://127.0.0.1:8443/xmlapi.svc?
service=rules&HH$RuleType=predefined
Get specific rule with ID=210:
https://127.0.0.1:8443/xmlapi.svc?
service=rules&HH$Id=210
Get specific rule with name=MyRule:
https://127.0.0.1:8443/xmlapi.svc?
service=rules&HH$Name=MyRule
• Name: big-rule
• Expression: Statement contains 'credit'
• Rule Action: {send_alert: {severity: MEDIUM,
console: {}}}
• Exception list: cmdtype NOT IN ('update') $AND$
client_ip = 1.2.3.4 AND client_host_name LIKE 'host'
• Install On DB Groups: All DBMSs
• Install On DBs: 10500000
• Exclude DBs: 10300000,10301000
• Tags: t1,t3,t5
• Comment: This is just a comment
• Roles: Read_Only
• Advanced Options: {monitoring_source:AUTO}
• Action script: select * from dual
• Mask sensitive data regex: (\d\d\d\d\d)+
• Limit alerts per second: 100
• Limit alerts per session: Unlimited
• Minimum rows for alert: 666
• Apply actions when rule triggers 9 times in 2
seconds.
• Auto resolve: False Alarm
• Ignore Signed: True
For the sake of simplicity, the parameters and their
values are listed. Parameters needs to be https://
www.urlencoder.org/.
Parameter Definition
HH$Operation add
HH$Name big-rule
HH$Expression statement%20cont
ains%20%27credit
%27
HH$RuleAction %7Bsend_alert%3
A%20%7Bseverity
Parameter Definition
%3A%20MEDIUM
%2C%20console%
3A%20%7B%7D%7
D%7D
HH$Exceptions cmdtype%20NOT
%20IN%20(%27up
date%27)%20%24
AND%24%20client
_ip%20%3D%201.2
.3.4%20AND%20cli
ent_host_name%2
0LIKE%20%27host
%27
HH$InstallOnDBGr All%20DBMSs
oups
HH$InstallOnDBs 10500000
HH$InstallOnDBsE 10300000,1030100
xclude 0
HH$Tags t1,t3,t5
HH$Comment this%20is%20just
%20a%20commen
t
HH$EditRoles Read_Only
HH$AdvancedOpti %7Bmonitoring_so
ons urce%3AAUTO%7
D
HH$AdvActionScri select%20%2A%20
pt from%20dual
Parameter Definition
HH$AdvSensitiveR %28%5Cd%5Cd%5
egex Cd%5Cd%5Cd%29
%2B
HH$AdvLimitAlerts 10
Sec
HH$AdvLimitAlerts -1
Session
HH$AdvMinRowsF 666
orAlert
HH$AdvApplyActio 9,2
nsRuleTrigger
HH$AdvAutoResol FalseAlarm
ve
HH$AdvIgnoreSign true
ed
Sort order The custom rule Monitor Credit Table has a sort
order of 8, and it needs to be moved to the end of
the list which has 65 rules.
Parameter Definition
HH$Operation update
HH$Name Monitor%20Credit
%20Table
Parameter Definition
HH$SortOrder 65
https://localhost:8443/xmlapi.svc?
service=rules&HH$Operation=update&HH$Name=Moni
tor%20Credit%20Table&HH$SortOrder=65
Update Update the rule with the name: Big-rule and set new
values. Note that the Exclude DBs value is erased
HH$Operation update
HH$Name big-rule
HH$RuleAction %20%7Bsend_aler
t%3A%20%7Bseve
rity%3A%20INFO%
2C%20to_archive%
7D%7D
HH$InstallOnDBsE
xclude=
HH$Tags t8
https://localhost:8443/xmlapi.svc?
service=rules&HH$Operation=update&HH$Name=big-
rule&HH$RuleAction=%7Bsend_alert%3A%20%7Bsever
ity%3A%20INFO%2C%20to_archive%7D%7D&HH$Install
OnDBsExclude=$HH$Tags=t8
Batch update Batch update all the vPatch rules with Severity=HIGH
by adding Terminate action and Quarantine = 12.
Parameter Definition
HH$Operation batchupdate
HH$AddTerminate true
Session
HH$AddQuarantin 12
eUserFor
HH$Severity HIGH
HH$RuleType PREDEFINED
https://LOCALHOST:8443/xmlapi.svc?
service=rules&HH$Operation=batchupdate&HH$AddT
erminateSession=true&HH$AddQuarantineUserFor=1
2&HH$Severity=HIGH&HH$RuleType=PREDEINED
Note
When updating the rule, if you want to reset the value of a specific parameter, then the value of that parameter should be left
empty.
Performs operations like add, remove, update, and list on a database group.
Service dbgroups
Parameter Definition
Note
If the HH$Action parameter is not specified, the list action is used as default. Also, if the HH$Name is missing when listing
database groups then all the db groups are listed.
Example
Note
The port number mentioned here varies depending on the McAfee Database Security configuration.
Note
Service app-mapping
Parameter Definition
HH$pageSize Long
The maximum number of results per call
HH$pageNum Long
The number of the page to return. The default value
is 0
Note
TERMINAL terminal
HOST soutceHost
IP sourceIP
APPLICATION execProgram
MODULE module
OSUSER osUser
USER execUser
SCHEMA scheams.name
For example, to list the application mapping for a database name with all available columns, use:
https://127.0.0.1:8443/xmlapi.svc?service=app-mapping&HH$Name=SalesDB&HH$Schema
Service sensor-mgmt
Parameter Definition
Examples
https://127.0.0.1:8443/xmlapi.svc?service=sensor-mgmt&HH$Action=delete&HH$Id=-1
To approve a sensor:
https://127.0.0.1:8443/xmlapi.svc?service=sensor-mgmt&HH$Action=approve&HH$Id=10002000
https://127.0.0.1:8443/xmlapi.svc?service=sensor-mgmt&HH$Action=approve&HH$Id=10002000,1002300,10002500
McAfee Database Security Insights provides users with the ability to collect and analyze large amounts of data, as well as
visualization capabilities and data-exploration interfaces.
Key features
Insights provides improved visibility into DBMS user activity and vulnerability.
• Advanced filtering
Free text search
Ability to save and reapply filters
Timeline options - predefined and configurable intervals and resolutions
McAfee Database Security supports simple, single DBMS installations and complex, multi-server, multi-DBMS installations. When
the add-on is installed, McAfee Database Security pushes all events and alerts to the add-on user interface, regardless of where
they are stored in McAfee Database Security.
Note
Only new alerts and findings are forwarded from McAfee Database Security server to Insights. Existing alerts and findings are
not imported.
Task
1. In your web browser, enter the URL of the server configured in the installation in this format:
https://<servername>:<port number>
Note
2. Enter your user name and password, then click Log in.
You can configure the system to use your own security certificate instead of the default one. For details, see PD25035.
• Filters area — Enables you to determine the time frame and filter criteria for the displayed data.
• Widgets — Displays data for a specific property in list, chart, or graphical format. You can add multiple widgets to focus
on specific data.
• Table — Displays the relevant data in tabular form. You can add or remove columns from the table to focus on specific
aspects of your investigation.
Set the time period for the data displayed on any page by selecting an option from the Time frame drop-down list.
You can select an interval relative to the present (for example, Last Hour, Last 12 Hours, Last Day, Last Week, or All) or select
Custom to select a specific time and date range using a calendar control.
Table options
Select the columns that appear in tables, adjust their width, and sort the data that they contain.
Sort data
Sort a table by a criterion at any time by clicking the column head. Click again to reverse the order (ascending or descending).
Select columns
Add or remove columns from tables by clicking columns above the table, then selecting or deselecting the column names.
Increase or decrease the width of a column by dragging the header divider to the left or right.
Select rows within a table and export the data they contain into to a CSV, XML, or PDF file.
Task
1. Select one or more rows in the table, then select Actions → Export.
2. In the Export dialog box, select the required type of output file (CSV, XML, or PDF) and select the fields that you want to
include the exported data.
3. Click OK.
You can set the filter criteria that determine the items that appear. You can then save the filter criteria as customized filters,
eliminating the need to redefine the filter criteria each time you view the page.
Define a filter
You can filter lists and tables to display data that match specific criteria.
Note
The search function is based on the elastic approach. For more about elastic queries, see https://www.elastic.co/guide/en/
kibana/3.0/queries.html.
Task
1. In the first filter field, set the filter criteria in any of these ways:
a. Type your query using simple syntax (as you would in a standard search engine).
b. Select items from a list or widget.
c. If you select an item in a list, it is added to the filter as an inclusion. If you click the box at the end of a row and select
Filter Out, the item is entered into the filter as an exclusion (preceded by a minus sign).
d. If you select items in more than one widget, the items are added with the AND operator.
2. Click Apply.
Results
All lists and widgets are filtered to display only the entries that match the filter criteria.
Filter syntax
keyword: (value)
execUser:(dvm root admin) && execProgram: Items where dvm root admin is included in the
(vascan) execUser field AND the execProgram is vascan.
Filter keywords
Save a filter
You can create and save multiple filters, then alternate between the saved filters as needed. This eliminates the need to redefine
the filter criteria each time you view a page.
Task
1. From the Saved Filters drop-down list, select Save Current.
2. Name the filter, then click OK.
Results
Apply a filter
By default, the most recently applied filter is applied each time you access a page, however you can apply a different saved filter
instead.
Task
1. From the Saved Filters drop-down list, select the saved filter.
The filter criteria appear in the Filter field.
2. Click Apply.
Delete a filter
Task
1. On the Saved Filters drop-down list, click the X next to the filter name.
2. When prompted for confirmation, click Yes.
Widgets help put events and findings into context by aggregating the displayed data into specific elements.
• List — Displays the top 10 items of the selected type, based on their occurrences.
• Graph — Displays data in a timeline based line graph. The Y axis shows each timeline point's events/findings count.
You can filter widgets to explore data and view it in different formats and resolutions.
Add a widget
You can add widgets on all main web console pages. The available widgets are based on context.
Task
In the Widgets area, click Add Widget, then select a widget from the drop-down list.
Remove a widget
Task
In the Widgets area, click the X on the widget pane.
When you add a widget list item to the filter or exclude an item, the data on the page is automatically refreshed.
Task
1. To include an item in query results, click the box at the end of the row and select Add to a Query.
The item is added to the filter definition.
2. To exclude an item from query results, click the box at the end of a row and select Add to a Query (exclude).
The item added to the filter definition as an exclusion (preceded by a minus sign).
Log out
When you are not actively using the web console, we recommend that you log out of the system.
For security purposes, the system automatically logs you out if it does not detect activity for several minutes.
Task
Click Log Out at the top of any page.
Reporting
The Reporting presents extensive data on the security events and findings detected by McAfee Database Security to enable
monitoring and remediation, as well as the generation of reports.
The data displayed on these pages can be filtered by various criteria, such as time frame, event properties, Finding properties,
and workflow status.
Workflow management
Workflow management enables you to distribute task monitoring among team members.
The assigned user is then responsible for following up and taking any required actions to remediate risks. Users can change the
workflow status of an item (for example, from unresolved to resolved or false positive), or assign an item to another user.
For easier viewing, users can filter the displayed data to view only items assigned to them or items with a specific workflow
status.
A workflow can include multiple steps based on changes in status and assignee. The details of each step appear in the Workflow
area at the bottom of the Event Details or VA Finding Details page.
Events
View events
The Events page displays event-related data for the selected time frame.
Task
1. From the navigation pane, select Reporting → Events.
User-configurable widgets appear near the top of the page. The Events table appears below the widgets.
Tip
To add or remove columns from Events table, click Columns, then select or deselect the names as required.
2. To view the details of a specific event, click an event in the Events table.
The Event Details page displays the main properties of the selected event, including severity, database details, command
type, rules, SQL statements, connection information, and workflow details.
3. From the Actions menu, you can:
You can update the status of events from the Event Details page or Events table.
Task
1. On the Event Details page, click Actions → Workflow.
2. From the Status drop-down list, select the event status or type in a new status name, then click OK.
You can assign events to another user from the Event Details page or Events table.
Task
1. On the Event Details page, click Actions → Workflow.
2. From the Assign to drop-down list, assign an Insights user to handle the event, then click OK.
Export events
You can export event details into a CSV, PDF, or XML file for further analysis. You can include all event fields in the exported file or
select specific fields based on your analysis needs.
Task
1. Select one or more events in the Events table, then click Actions → Export to display the Export dialog box.
2. From the Export to drop-down list, select the type of output (CSV, PDF, or XML).
3. From the Select fields list, select the fields that you want to include in the output or Select All to include all available data
for the selected events.
4. Click OK.
Event properties
You can add these event properties to the Events table or display them as widgets on the Events page.
Option Definition
Accessed Object Full Name The full name of the DBMS object accessed as a
result of the operation.
Accessed Object Name The short name of the DBMS object accessed as a
result of the operation.
Accessed Object Owner The owner of the DBMS object accessed as a result
of the operation.
Accessed Object Type The type of the DBMS object accessed as a result of
the operation.
Option Definition
Client Name The name of the client that triggered the event.
Client Workstation Name The name of the client workstation that triggered the
event.
Option Definition
Database Name The name of the database for which the event was
generated.
Execution Time The date and time of the scan that detected the
event.
Inflow Object Full Name The full name of the original PL/SQL program unit
within the DBMS that originated the SQL command.
Inflow Object Name The full name of the original PL/SQL program unit
within the DBMS that originated the SQL command.
Inflow Object Owner The owner of the original PL/SQL program unit
within the DBMS that originated the SQL command.
Inflow Object Type The type of PL/SQL program unit within the DBMS
that originated the SQL command.
Option Definition
Log-On Time (MSSQL only). The time when the user logged on to
the application. This field, when taken together with
the Session ID, provides a unique session identifier.
Real Exec User The real user behind the execution request.
Row Number The row number of the data requested from within a
table.
Rule Name The name of the rule that generated the event.
Sensor Host The host server of the sensor that generated the
event.
Option Definition
Sensor Name The name of the sensor that generated the event.
Note
Findings
View findings
The Findings page displays relevant data for the selected time frame.
Task
1. From the navigation pane, select Reporting → Findings.
User-configurable widgets appear near the top of the page. The Findings table appears below the widgets.
2. To add or remove columns from the Findings table, click Columns, then select or deselect the names as required. For
complete list of available properties, see Finding properties.
3. To view the details of a specific finding, click the finding in the Findings table.
The Finding Details page displays the main properties of the selected finding, including severity, check names, check
history, scan information, and workflow details.
You can update the status of findings from the Finding Details page or Findings table.
Task
1. On the Finding Details page, click Actions → Workflow.
2. From the Status drop-down list, select the finding status or type a new status name, then click OK.
You can assign findings to another user from the VA Finding Details page or VA Findings table.
Task
1. On the VA Finding Details page, click Actions → Workflow.
2. From the Assign to drop-down list, assign an Insights user to handle the findings, then click OK.
Export findings
You can export finding details into a CSV, PDF, or XML file for further analysis. You can include all findings fields in the exported
file or select specific fields based on your analysis needs.
Task
1. Select one or more findings in the Findings table, then click Actions → Export to display the dialog box.
2. From the Export to drop-down list, select the type of output (CSV, PDF, or XML).
3. From the Select fields list, select the fields that you want to include in the output, or Select All to include all available data
for the selected findings.
4. Click OK.
Finding properties
You can add these properties to the Findings table or display them as widgets on the Findings page.
Option Definition
Check Category The category of the check that detected the findings.
Database Name The name of the database for which findings were
detected.
Detected Time The date and time when the finding was detected.
First Detection If True, indicates that this is the first time this finding
was detected.
Fixed Time The date and time when SQL fix is applied.
Scan Name The name of the scan that detected the finding.
Scan Time The date and time of the scan that detected the
finding.
Option Definition
SQL Fix If available, the SQL fix that can be used to resolve
the reported issue.
Workflow Assignee Name The team member assigned to handle the finding.
Reports
McAfee Database Security reports are based on filter criteria. Each report consists of one or more sections, each containing the
results of a different filter.
Reports can be generated in CSV, XML, or PDF formats. You can run a report on demand or schedule a report to run a regular
intervals.
Task
From the navigation pane, select Reporting → Reports.
Results
Option Description
Option Description
Last Run Date The date and time when the report was last run.
Last Run Report Click the View link to download the most recent
report output.
Create a report
Each report contains the results of at least one filter. Each filter has a single object type (event or finding). You define the filter
criteria and the scope of the data included, including which fields are included and the time frame. You can also define how the
data is sorted and grouped.
Task
1. From the navigation pane, select Reporting → Reports.
2. Click Create Report to display the Report Details page.
3. In the General section, set these general parameters:
• Daily at — Runs the report each day at the hour selected from the drop-down list.
• Weekly on — Runs the report on each of the selected weekdays. Runs the report on each of the selected
weekdays.
• Monthly every — Runs the report on the selected month.
• By Cron expression — Runs the report according to the input timing expression.
• Run Only Once — Runs the report one time only.
c. (Optional) To receive an email when the report is ready, select Send Notification by Email to, then enter the recipient
email addresses. Use semicolons to separate multiple addresses To attach the report to the email message, select
Attach Report.
5. In the Filter section, set the filter criteria:
a. In the Headline field, enter a brief name for the filter.
b. From the Object Type drop-down list, select the type of objects to include in the report ( Events or Findings).
c. From the Detail Level drop-down list, select the report type:
Note
Click Estimate for an indication of the number of items the report would return.
e. In the Limit Report items field, set the maximum number of items to include in the report.
Note
By default, the maximum number of items for each filter section is 5,000.
f. Click Sort by, then select the field according to which you want the data to be sorted and select Ascending of
Descending to set the sort direction.
g. Click Group by, then select the field according to which you want to group the data.
Note
If you use the Group by option with a Summary filter, the report returns a count of the results for each group. If
you use the Group by option with a Summary filter and widgets, a single widget is returned for each filter (and not
for each group within the filter).
6. (Optional) Click Add Filter to define an additional filter section to the report.
7. Click Save.
8. (Optional) Click Run.
Results
The report and its run status are listed in the Reports table.
Duplicate a report
You can use an existing report definition as the basis for creating a new report, for example, if you want to produce a report with
the same filter criteria but in a different format.
Task
1. From the navigation pane, select Reporting → Reports.
2. Select the report to duplicate, then select Actions → Duplicate Report.
3. On the Report Details page, edit the report settings as required.
4. Click Save.
You can run a report at any time, regardless of its scheduled settings.
Task
1. From the navigation pane, select Reporting → Reports.
2. Select the report to run, then select Actions → Run Report.
Delete a report
Task
1. From the navigation pane, select Reporting → Reports.
2. Select the report to run, then select Actions → Delete Report.
Analytics
Insights enables the configuration of LDAP parameters, index management, and troubleshooting.
Application mapping
Application mapping provides a visual representation of the events that take place in your system based on the specific filter
criteria.
The number of events that link each level is indicated on the lines (edges) that connect them.
Task
From the navigation pane, select Analytics → Application Mapping.
Database risk
The database risk feature provides an overview of the risk level associated with your databases. The risk level ranges from 0
(lowest) to 100 (highest). You can view the aggregated risk across your databases or the risk factors for a specific database.
The database risk summary indicates the aggregated risk level for your databases based on the type and quantity of events.
Task
1. From the navigation pane, select Analytics → Database Risk.
The Risk Level, Database Type, and Database Verion widgets appear at the top of the page. The databases table appears
below the widgets.
2. (Optional) Enter a query to restrict the data to a specific subset of databases, then click Apply.
3. (Optional) Select Actions → Recalculate Risk to refresh the risk data.
Database risk details include the calculated risk level of the database instance, based on the various data points available. The
risk level ranges from 0 (lowest) to 100 (highest).
Task
On the Database Risk page, in the Databases table, click the database row.
The information on the Database Risk Details page is organized into logical sections.
Section Description
Finding explorer
The Finding Explorer displays the findings per database based on a query, according to the check category that returned the
findings.
Task
1. From the navigation pane, select Analytics → Finding Explorer.
2. Enter a query, then click Apply.
Administration
Insights enables the configuration of LDAP parameters, index management, and troubleshooting.
Access control
McAfee Database Security facilitates teamwork by enabling multiple users to access the console.
Add a user
If you have global administrator permissions, you can add users to the system.
Task
1. On the Administration → Users, click Add New User.
2. Enter a user name, the user's given name, and password in the designated fields, then click Save.
If you have the necessary permissions, you can change a user's password.
Task
1. On the Administration → Users, click the name of the user.
2. In the Password dialog box, click Change password.
3. In the Password and Confirm Password fields, enter the new password, then click Save.
Delete a user
If you have the necessary permissions, you can delete users from the system.
Task
On the Administration → Users page, select a user, then select Actions → Delete User.
Troubleshooting logs
The information in logs can play an important role in the troubleshooting process.
The system logs can be set to the Error, Info, Debug, or Trace levels. The system's default log level is INFO, which has a minimal
impact on performance.
Some scenarios require an increase in the log level, to provide additional details as part of the support process. In addition, you
can set the maximum log file size and other log properties.
Task
1. From the navigation pane, select Administration → Troubleshooting.
2. Edit the log settings, then click Save.
You can generate and download an analytic package to send to McAfee technical support for troubleshooting purposes.
Task
1. From the navigation pane, select Administration → Troubleshooting, then click Generate Analytic Package.
After the package is generated, it appears in the Existing Package list.
2. Click Download Package to download the .zip file.
Index management
Index management shows the structure of the Alerts (Events) and VA Results (Results) stored in the backend database
(ElasticSearch). Each events index represents one day and contains the events from that day. Each Results index represents
one month, and contains the results from that month.
The Index Management page provides an overview of the index health, the number of closed/open indices, and the distribution
by index type. You can filter the indices using the static widgets or by entering a filter query.
Indices can be defined as Open or Closed. Open indices appear in search results in the Events or Findings pages. Closed indices
remain in the back-end database, but do not show up in search results.
The Index Management page provides an overview of the index health, the number of closed/open indices, and the distribution
by index type. You can filter the indices using the static widgets or by entering a filter query.
Task
1. From the navigation pane, select Administration → Index Management.
2. (Optional) Enter a query to restrict the data to a specific subset, then click Apply.
Widgets at the top of the page indicate the aggregated health, state, and types of indices.
Results
Option Description
Option Description
• Green
• Red
• N/A - Not available
Open an index
You can open a closed index so that it again appears in search results.
Task
On the Index Management page, select one or more closed indices, then select Actions → Open Indices.
Close an index
You can close an index so that it no longer appears in search results. Closed indices remain in the back-end database.
Task
On the Index Management page, select one or more open indices, then select Actions → Close Indices.
Delete an index
Closed indices can be deleted to remove them from the back-end database.
Task
On the Index Management page, select one or more closed indices, then select Actions → Delete Indices.
LDAP configuration
You can configure an LDAP server to use for the purpose of logging in to the system.
Note
Task
1. Select Administration → Interfaces → LDAP Configuration, then click Add Server.
2. Enter the LDAP server base, domain and URL in the designated fields.
Note
Results
To delete a server, select the corresponding checkbox in the LDAP Configuration table, then selectDelete from the Actions
menu.
Trellix and FireEye are the trademarks or registered trademarks of Musarubra US LLC, FireEye Security Holdings US LLC and their affiliates in the
US and /or other countries. McAfee is the trademark or registered trademark of McAfee LLC or its subsidiaries in the US and /or other countries.
Skyhigh Security is the trademark of Skyhigh Security LLC and its affiliates in the US and other countries. Other names and brands are the
property of these companies or may be claimed as the property of others.