Smart Conn Installand User Guide
Smart Conn Installand User Guide
ArcSight SmartConnector
Software Version: 8.2.0
Legal Notices
Micro Focus
The Lawn
22-30 Old Bath Road
Newbury, Berkshire RG14 1QN
UK
https://www.microfocus.com
Copyright Notice
© Copyright 2021 Micro Focus or one of its affiliates
Confidential computer software. Valid license from Micro Focus required for possession, use or copying. The
information contained herein is subject to change without notice.
The only warranties for Micro Focus products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.
Micro Focus shall not be liable for technical or editorial errors or omissions contained herein.
No portion of this product's documentation may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose other
than the purchaser's internal use, without the express written permission of Micro Focus.
Notwithstanding anything to the contrary in your license agreement for Micro Focus ArcSight software, you may
reverse engineer and modify certain open source components of the software in accordance with the license terms for
those particular components. See below for the applicable terms.
U.S. Governmental Rights. For purposes of your license to Micro Focus ArcSight software, “commercial computer
software” is defined at FAR 2.101. If acquired by or on behalf of a civilian agency, the U.S. Government acquires this
commercial computer software and/or commercial computer software documentation and other technical data subject
to the terms of the Agreement as specified in 48 C.F.R. 12.212 (Computer Software) and 12.211 (Technical Data) of the
Federal Acquisition Regulation (“FAR”) and its successors. If acquired by or on behalf of any agency within the
Department of Defense (“DOD”), the U.S. Government acquires this commercial computer software and/or
commercial computer software documentation subject to the terms of the Agreement as specified in 48 C.F.R.
227.7202-3 of the DOD FAR Supplement (“DFARS”) and its successors. This U.S. Government Rights Section 18.11 is in
lieu of, and supersedes, any other FAR, DFARS, or other clause or provision that addresses government rights in
computer software or technical data.
Trademark Notices
Adobe™ is a trademark of Adobe Systems Incorporated.
Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
Documentation Updates
The title page of this document contains the following identifying information:
l Software Version number
l Document Release Date, which changes each time the document is updated
l Software Release Date, which indicates the release date of this version of the software
To check for recent updates or to verify that you are using the most recent edition of a document, go to:
https://www.microfocus.com/support-and-services/documentation
Support
Contact Information
Phone A list of phone numbers is available on the Technical Support
Page: https://softwaresupport.softwaregrp.com/support-contact-
information
Contents
Overview of SmartConnectors 9
SmartConnector Features 10
Data Collection 11
Data Encryption 11
Caveats 12
Event Filtering and Aggregation 12
Filtering 12
Aggregation 13
Unique Generator ID 13
Data Mapping to Vendor Events 14
FIPS Compliance 14
FIPS Suite B 15
FIPS Compliant Connectors 15
FIPS Non-Compliant SmartConnector 15
SmartConnector Not Certified as FIPS Compliant 15
Types of SmartConnectors 16
API Connectors 16
Database Connectors 16
File Connectors 17
FlexConnectors 17
Microsoft Windows Event Log Connectors 18
Model Import Connectors 19
Other Connectors 19
Connectors that Use Multiple Mechanisms 19
Connectors that Use TCP in Special Formats 19
Scanner Connectors 19
SNMP Connectors 20
Syslog Connectors 21
Types of Destinations 23
ArcSight Manager (encrypted) 23
ArcSight Logger SmartMessage (encrypted) 23
ArcSight Logger SmartMessage Pool (encrypted) 24
Sending Events from Logger to a Manager 24
Sending Events to Both Logger and a Manager 25
Sending Events to Logger 26
Page 4 of 148
SmartConnector Installation and User Guide
Page 5 of 148
SmartConnector Installation and User Guide
CEF Syslog 52
CEF Encrypted Syslog (UDP) 53
CSV File Installation 54
Microsoft Azure Event Hub 55
Transformation Hub 56
Raw Syslog 58
Installing and Configuring SmartConnectors by Using the Wizard 59
Installing the Core Software 59
Configuring the SmartConnector 59
Completing Installation and Configuration 60
Installing SmartConnectors From the Command Line 60
Installing the SmartConnectors in Silent Mode 61
Recording the Configuration Parameters 61
Setting GEID while installing in Silent Mode 62
Using the Properties File for Unattended Installation 63
Instant Connector Deployment from ArcMC 65
Running SmartConnectors 66
Running in Standalone Mode 66
Running as a Windows Service 66
Running Connectors as a UNIX Daemon 67
Managing SmartConnectors with ArcSight Management Center 68
Benefits of Using ArcMC to Manage SmartConnector 68
Remotely Managing Software-Based Connectors 69
Login Credentials for Software-Based Connector Remote Management 70
Grouping of Connectors 70
Managing SmartConnector Destinations 72
Configuring Additional Destinations 72
Adding a Failover Destination 72
Re-registering a Destination 73
Removing a Destination 73
Configuring Destination Settings 75
Configuring Batching 75
Configuring Time Correction 76
Configuring Device Time Auto-Correction 77
Configuring Time Checking 78
Configuring Caching 79
Configuring Network 80
Configuring Connector Networks and Zones 87
Page 6 of 148
SmartConnector Installation and User Guide
Page 7 of 148
SmartConnector Installation and User Guide
Page 8 of 148
SmartConnector Installation and User Guide
Overview of SmartConnectors
SmartConnectors intelligently collect a large amount of heterogenous raw event data from
security devices in an enterprise network, process the data into ArcSight security events, and
transport data to destination devices. The values such as severity, priority, and time zone are
normalized into a common format and the data structure is normalized into a common
schema. This allows you to find, sort, compare, and analyze all events using the same event
fields.
SmartConnectors are built on a connector framework, which offers advanced features such as
throttling, bandwidth management, caching, state persistence, filtering, encryption, and event
enrichment, to ensure reliability, completeness, and security of log collection, while also
optimizing the network usage.
The granular normalization of log data allows for the deterministic correlation that detects the
latest threats including Advanced Persistent Threats and prepares data to be fed into machine
learning models. SmartConnector technology supports over 400 different device types, such as
routers, e-mail servers, anti-virus products, firewalls, intrusion detection systems (IDS), access
control servers, VPN systems, anti-DoS appliances, operating system logs, and other sources
that detect and report security or audit information.
SmartConnectors leverage ArcSight’s industry-standard Common Event Format (CEF) for both
Micro Focus and certified device vendors. This partner ecosystem keeps growing not only with
the number of supported devices but also with the level of native adoption of CEF from device
vendors.
SmartConnector Features
Connectors both receive and retrieve information from network devices. If the device sends
information, the connector becomes a receiver. But, if the device does not send information,
the connector can retrieve it.
SmartConnectors are also available to forward events between Micro Focus ArcSight systems
such as Transformation Hub and ESM, enabling the creation of multi-tier monitoring and
logging architectures for large organizations and Managed Service Providers.
Data Collection
Connectors are specifically developed to work with network and security products by using
multiple techniques such as simple log forwarding and parsing, direct installation on native
devices, SNMP, and syslog.
The connectors support the following data collection and event reporting formats:
l Log File Readers (including text and log file)
l Syslog
l SNMP
l Database
l XML
l Proprietary protocols, such as OPSEC
The ArcSight ESM Console, ESM Manager, and connectors communicate using HTTP over
Secure Sockets Layer (SSL also referred to as HTTPS).
Different connectors are available for the following types of vendor devices:
l Network and host-based IDS and IPS
l VPN, Firewall, router, and switch devices
l Vulnerability management and reporting systems
l Access and identity management
l Operating systems, Web servers, content delivery, log consolidators, and aggregators
For more information about the types of SmartConnectors, see "Types of SmartConnectors" on
page 16.
Data Encryption
Connectors provide SecureData format-preserving encryption to adhere to the regulatory
requirement, which mandates that data leaving the connector machine to another destination
must be encrypted. This feature is supported only on Linux and Windows 64-bit platforms. For
more information about the format preserving parameters for connectors, refer to the
Configuration Guide for the specific connector.
You can enable data encryption either during installation or while configuring a connector. You
must provide the URL of the encryption server, the identity and shared secret configured for
SecureData, and the fields to be encrypted when configuring the connector. If a proxy is
enabled for the machine, you need a proxy host and port for an HTTP connection.
Caveats
l If you enable encryption, you cannot change any of the encryption parameters later. To
change any parameters, you must reinstall the connector.
l To enable encryption on a connector that is already installed, use the wizard to select the
Modify Connector Parameters option.
l In deployments where multiple connectors are chained or cascaded before reaching the
destination, the encryption must only be enabled at the very first connector.
l Encryption of address fields including the IP addresses and MAC addresses are not
supported.
l If the input data to be encrypted is in digits, then it must be at least three characters long.
l Additional data fields cannot be selected for encryption.
l For event data transfer, although the connector and the destination can be set to FIPS-
compliant mode, if encryption is enabled, the communication between the connector and
the secure server is not FIPS-compliant.
l Derived event fields cannot be chosen for encryption. If any of the derived fields need
encryption, include the parent field for encryption.
l For optimum performance, the number of encrypted fields must be limited to 20.
Aggregation
The Connector can be configured to aggregate (summarize and merge) events that have the
same values in a specified set of fields, either for a specified number of times or within a
specified time limit.
Connector aggregation compiles events with matching values into a single event. The
aggregated event contains only the values that are common to events, and the earliest start
time and latest end time. This reduces the number of individual events that must be evaluated.
An event that repeats every 500 ms, for example, can be represented by a single event that is
generated every 10 seconds, producing a 20:1 event compression. Individual connectors can be
configured to aggregate events, thus reducing event traffic to the ESM Manager and the
storage requirements in the ESM database.
For example, if the connector is configured to aggregate events with a certain Source IP and
Port, Destination IP and Port, and Device Action whenever the events occur 10 times in 30
seconds. If 10 events with these matching values are received by the connector within that
time frame, they are grouped into a single event with an aggregated event count of 10.
If the 30-seconds time frame expires and the connector receives only two matching events, the
connector creates a single aggregated event with an aggregated event count of two. If 900
matching events are generated during 30 seconds, the connector creates 90 aggregated
events, each with an aggregated event count of 10.
Firewalls are a good candidate for aggregation because of the volume of events with similar
data coming in from multiple devices.
Unique Generator ID
Globally unique event ID (GEID) is an optional feature that can be enabled by updating certain
parameters. Ideally, each event passing through an ArcSight product must be assigned a GEID.
GEIDs are a value between 1 to 16383, and follow a sequential order that can register up to
one million instances per second. Previous SmartConnector versions must be upgraded so that
the events are properly assigned with GEIDs. GEIDs cannot be unassigned.
Note: If internal and audit events are generated in a destination or in a connector, each of them
are unique events with unique GEIDs. If an internal or audit event is duplicated, the GEID and the
Event ID will be the same.
l The GEID generated by the connector sets zero as the default value.
l The connector wizard displays a message, indicating that the Unique Generator ID has not
been set.
l The agent.log file displays a message, indicating that the Unique Generator ID has not been
set.
l When you create the silent-properties file, the value for the
containeroptionsconfig.agent.generator.id property will be empty.
l Events will not be processed for any destinations in certain configurations, such as Amazon
S3 as one of the destinations or the Check Event Integrity Method parameter is selected as
Recon for any destination.
FIPS Compliance
Under the Information Technology Management Reform Act (Public Law 104-106), the
Secretary of Commerce approves standards and guidelines that are developed by the National
Institute of Standards and Technology (NIST) for Federal computer systems. These standards
and guidelines are issued by NIST as Federal Information Processing Standards (FIPS) for use
government-wide. NIST develops FIPS when there are compelling Federal government
requirements such as for security and interoperability and there are no acceptable industry
standards or solutions.
FIPS Suite B
FIPS Suite B includes cryptographic algorithms for hashing, digital signatures, and key
exchange. The entire suite of cryptographic algorithms is intended to protect both classified
and unclassified national security systems and information.
Types of SmartConnectors
Depending on your requirement, you can select any of the following SmartConnector types:
l API Connectors
l Database Connectors
l File Connectors
l FlexConnectors
l Microsoft Windows Event Log Connectors
l Model Import Connectors
l Other connectors
l Scanner Connectors
l SNMP Connectors
l Syslog Connectors
API Connectors
API connectors use a standard or proprietary API to pull events from devices. In most cases, a
certificate must be imported from the device to authenticate connector access to the device.
There are also several configuration steps required on the device side. For more information,
refer to the respective connector configuration guides.
Database Connectors
Database connectors support event collection from databases. They use SQL queries to
periodically poll for events. Connectors support major database types, including MS SQL, MS
Access, MySQL, Oracle, DB2, Postgres, and Sybase.
The database user must have adequate permission to access and read the database. For Audit
database connectors, such as SQL Server Audit DB and Oracle Audit DB, system administrator
permission is required.
Some database connectors such as the Microsoft SQL Server Multiple Instance DB connector
support multiple database events. Connectors such as the connector for McAfee Vulnerability
Manager DB collect events from scanner databases.
Note: Refer to FIPS Compliance Limitation to understand the limitations for some of the database
SmartConnectors.
File Connectors
File connectors are normally installed on the device machine, but when the monitored files are
accessible through network shares or NFS mounts, the connectors can be installed on remote
machines as well.
FlexConnectors
FlexConnectors allow you to create custom connectors that can read and parse information
from third-party devices and map that information to the ArcSight event schema. When
creating a custom connector, you define a set of properties (a configuration file) that identify
the format of the log file or other source that is imported into the ESM Manager or Logger.
The FlexConnector framework is a software development kit (SDK) that lets you create a
connector tailored to the devices on your network and their specific event data. For more
information about FlexConnectors and how to use them, see the FlexConnector Developer's
Guide.
The following connectors are available for Microsoft Windows Event Log:
l SmartConnector for Microsoft Windows Event Log
l SmartConnector for Microsoft Windows Event Log – Native
For more information about the Native connector, see the configuration guide for the
SmartConnector for Microsoft Windows Event Log - Native.
For mappings, see SmartConnector for Microsoft Windows Event Log Native Windows
Security Event Mappings document.
l SmartConnector for Microsoft Windows Event Log – Unified
For more information about the Unified connector, see the configuration guide for the
SmartConnector for Microsoft Windows Event Log – Unified.
For mappings, see the Microsoft Windows Event Log–Unified Windows 2008/2012 Security
Event Mappings document.
These connectors provide support for partial event parsing based on the Windows event header
for all System and Application events. It also provides support for a FlexConnector-like
framework that lets users create and deploy their parsers to parse event description for all
System and Application events.
Some individual Windows Event Log applications are supported by the connectors for Microsoft
Windows Event Log, Microsoft Windows Event Log – Unified and Microsoft Windows Event Log
– Native connectors, for which Windows Event Log application or system support has been
developed. See the configuration guides for specific connectors for a list of application and
system events supported.
Other Connectors
Connectors that Use Multiple Mechanisms
Some connectors use multiple mechanisms. For example, the connector for Oracle Audit
Database monitors both the database tables and audit files.
Scanner Connectors
There are two types of scanner connectors, those whose results are retained within a file, and
those retrieved from a database.
Results for XML scanner connectors are retained in a file, making them log file connectors.
Other scanners deposit their scanned events in a database and are treated as database
connectors, and require the installation parameters used by the database connectors.
Scan reports are converted into base events, which for ESM destinations, can be viewed on the
Console. The aggregated meta events are not displayed in the Console. Meta events create
assets, asset categories, open ports, and vulnerabilities on the Console.
SNMP Connectors
SNMP Traps contain variable bindings, each of which holds a different piece of information for
the event. They are usually sent over UDP to port 162, although the port can be changed.
SNMP connectors listen on port 162 by default or any other configured port and process the
received traps. They can receive multiple trap types from the device but process traps only
from one device with a unique Enterprise object identifier (OID).
SNMP is based on UDP, so there is a minor possibility of events being lost over the network.
Although there are several SNMP connectors for individual connectors, most SNMP support is
provided by the SmartConnector for SNMP Unified. Parsers use the knowledge of the
Management Information Base (MIB) to map the event fields, but, unlike some other SNMP-
based applications, the connector itself does not require the MIB to be loaded.
Syslog Connectors
Syslog messages are free-form log messages prefixed with a Syslog header consisting of a
numerical code (facility + severity), timestamp, and host name. Unlike file connectors, a Syslog
connector can receive and process events from multiple devices. There is a unique regular
expression that identifies the device.
TCP is a supported protocol for Syslog connectors. If UDP is used, there might be a possibility of
missing Syslog messages over the network.
Syslog connectors can be installed as a Syslog daemon, pipe, or file connector.
secure (encrypted) TLS channel from another connector, where the destination is configured
as CEF Syslog over TLS, and can also receive events from devices.
l CEF Encrypted Syslog (UDP) connectors: They allow connector-to-connector
communication through an encrypted channel by decrypting events previously encrypted
through the CEF Encrypted Syslog (UDP) destination. The CEF connector lets ESM connect to
aggregate, filter, correlate, and analyze events from applications and devices that deliver
their logs in the CEF standard, by using the Syslog transport protocol.
UNIX supports all types of Syslog connectors. If a Syslog process is already running, you can end
the process or run the connector on a different port. The connector for UNIX OS Syslog provides
the base parser for all Syslog sub-connectors.
For Syslog connector deployment information, see the connector Configuration Guide for UNIX
OS Syslog. For device-specific configuration information and field mappings, see the connector
configuration guide for the specific device. Each Syslog sub-connector has its own configuration
guide.
Types of Destinations
You can configure a connector to send events to one or more destinations. A destination is a
Manager or device that can receive events from a connector. In addition to the selections
configured during connector configuration, events can also be sent to additional or failover
destinations.
Depending on your requirement, you can select any of the following destinations:
For more information about the parameters to be selected during installation, see ArcSight
Logger SmartMessage Parameters.
You can also configure the SmartMessage transport to be persistent to achieve higher
throughput for Logger destinations. For more information, see Configuring Persistent
SmartMessage Transport.
Note: Use Syslog connector to forward events from Logger to ESM. If a different method such as
Netcat is used, the events are forwarded to Logger, but not to ESM.
Note: The SmartMessage secure channel uses HTTPS (secure sockets layer protocol) to send
encrypted events to Logger. This is similar to, but different from, the encrypted binary protocol
used between Connectors and the ESM Manager.
Use port 443 (rather than ArcSight traditional port 8443) because the secure channel uses HTTPS.
Parameter Description
Port The destination port 443 for Logger Appliance or 9000 for Software Logger.
9. If you have not already imported the certificate, the Logger certificate message is
displayed to import the certificate to connector.
10. Select the Import the certificate to connector from destination option and click Next.
11. Navigate through the subsequent windows until you receive a message that confirms the
configuration was successful. Click Exit, then click Next to exit the wizard.
12. Restart the connector for changes to take effect.
Port The destination port 443 for Logger Appliance or 9000 for Software Logger.
Parameter Description
CEF Version Select any of the following options from the drop-down menu:
l 0.1 - The Device Address, Source Address, Destination Address, and Agent Address fields
will always be IPv4 or will be omitted. If there are any IPv6 addresses, they will be in the
Device Custom IPv6 Address fields. The Bytes In and Bytes Out fields are limited to the
size of an integer (up to 2^31-1).
Note: Select 0.1 if you are not sure the chosen destination can handle CEF 1.0, which
supports both IPv4 and IPv6modes.
l 1.0 - Any of the address fields can be either IPv4 or IPv6 and the Bytes In and Bytes Out
fields can be long values (up to 2^63-1).
6. If you have not already imported the certificate, the Logger certificate message is
displayed to import the certificate to connector.
7. Select the Import the certificate to connector from destination option and click Next.
8. Navigate through the subsequent windows until you receive a message that confirms the
configuration was successful. Click Exit and click Next to exit the wizard.
9. Restart the connector for changes to take effect.
Note: The Forwarding Connector is a separate installable file, named similarly to this: ArcSight-
6.x.x.<build>.x-SuperConnector-<platform>.exe .
Use Forwarding Connector build 4810 or later for compatibility with Logger 1.5 or later.
1. Install the connector component (see the Connector Configuration Guide for your device).
2. Using the $ARCSIGHT_HOME\current\bin\runagentsetup script, restart the connector
configuration program.
3. Navigate through the windows, select ArcSight Logger SmartMessage (encrypted), and
then click Next.
4. Enter the destination parameter details and click Next.
Parameter Description
Port The destination port 443 for Logger Appliance or 9000 for Software Logger.
5. If you have not already imported the certificate, the Logger certificate message is
displayed to import the certificate to connector.
6. Select the Import the certificate to connector from destination option and click Next.
7. Navigate through the subsequent windows until you receive a message that confirms the
configuration was successful. Click Exit and click Next to exit the wizard.
8. Restart the connector for changes to take effect.
To configure the Forwarding Connector to send CEF output to Logger and send events to
another Manager at the same time, see Sending Events to Both Logger and ESM.
Amazon S3
If SmartConnectors are configured to use Amazon S3 (Amazon Simple Storage Service) as a
destination, they send security events in the Avro format to Amazon S3. The Connector
generates Avro output by using static Avro schema which is bundled with the Connector
package. The generated Avro output will be in the snappy compressed format. For more
information, refer to Avro Documentation.
This destination is also supported for all the cloud-native Connectors, such as AWS Security
Hub, AWS CloudWatch, and Azure Event Hub.
For more information about the parameters to be selected during installation, see Amazon S3
Parameters.
CEF File
The Common Event Format (CEF) is an open log management standard that improves the
interoperability of security-related information from different security and network devices
and applications. The CEF destination allows you to capture security events in a CEF file rather
than forwarding them to a Manager.
For more information about the parameters to be selected during installation, see CEF File
Parameters.
CEF Syslog
If SmartConnectors are configured to use CEF Syslog as a destination, they send events in CEF
(converted to bytes using the UTF-8 character encoding), by using UDP, TCP, or TLS protocol.
The TCP and UDP protocols can be used to send events to Logger, where data is received using
a TCP or UDP Receiver. One receiver can receive events from more than one connector. The
protocols can also be used to send events to a Syslog Daemon connector or non-ArcSight syslog
receivers.
The TLS protocol sends events through a secure channel (an option that does not apply to
Logger), and allows for one-way or two-way authentication. This data can be received by any
application that supports TLS syslog reception, which includes ArcSight's Syslog NG Daemon
connector.
For more details about the Syslog NG Connector, see the SmartConnector for Syslog NG
Daemon.
For more information about the parameters to be selected during installation, see CEF Syslog
Parameters.
CSV File
Use this destination to capture events that a connector sends to ESM Manager into a CSV file.
Typical ArcSight configurations do not require the use of external files to communicate events
to the ESM Manager.
Event data is written to a file in Excel-compatible comma-separated values (CSV) format, with
comments prefixed by ‘#.’ A connector can be configured to preface the data with a comment
line that describes the fields found on a subsequent line.
Event data is written to files in the specified folder and can be configured to rotate
periodically.
Following are the contents of an example event file:
#event.eventName,event.attackerAddress,event.targetAddress
"Port scan detected","1.1.1.1","2.2.2.2"
"Worm ""Code red"" detected","1.1.1.1","2.2.2.2"
"SQL Slammer detected","1.1.1.1","2.2.2.2"
"Email virus detected","1.1.1.1","2.2.2.2"
Using the properties file, the configuration of your CSV Connector can be customized to filter
and aggregate events as desired.
A Connector can also be configured to send events to a CSV file and an ESM Manager at the
same time.
For more information about the parameters to be selected during installation, see CSV File
Parameters
Azure Event Hub requires SSL or TLS for communication purposes and uses Shared Access
Signatures (SAS) for authentication. In the same way, this requirement must be met for a Kafka
endpoint within Event Hubs. To be compatible with Kafka, Event Hub uses SASL PLAIN for
authentication and SASL SSL for transport security.
For more information about the parameters to be selected during installation, see Microsoft
Azure Event Hub Parameters
Transformation Hub
If SmartConnectors are configured to use Transformation Hub as a destination, they send
events to Transformation Hub's Kafka cluster, from where the events are further distributed to
real-time analysis and data warehousing systems.
The Transformation Hub destination is used to send events to a Transformation Hub cluster in
in Avro, binary, or CEF format, which can then further distribute events to real-time analysis
and data warehousing systems. Any application that supports retrieving data from
Transformation Hub can receive these events (for example, ESM, ArcSight Investigate, Hadoop
and Logger).
The SmartConnector Acknowledgments ("acks") ensure that Transformation Hub received the
event before the SmartConnector removes it from its local queue. Acknowledgments do not
indicate that consumers, such as Logger, have received the event data, only that
Transformation Hub itself has. You can disable acknowledgments, enable to receive
acknowledgment only from the primary replica, or enable every replica to acknowledge the
event.
Supported SmartConnector versions encode their own IP address as meta-data in the Kafka
message for consumers that require that information such as Logger Device Groups.
For instructions about setting up FIPS with Transformation Hub and SmartConnectors, see
Configuring FIPS for Transformation Hub and SmartConnectors.
Note : The configuration settings for ESM must be done on the Connector side, not the ESM
Console.
For the content format Avro, the SmartConnector uses Avro schema to emit the Avro output.
Avro schema resides in the Schema Registry of Transformation Hub. The SmartConnector
makes an HTTPS call to Transformation Hub to get and save the schema in its user/agent
folder. The SmartConnector captures the Schema Registry details during the installation and
fetches schema during its every restart.
Note : SmartConnector 8.1.0 supports Transformation Hub 3.4. Ensure that you use
Transformation Hub 3.4 to install the SmartConnector for emitting Avro output.
Note: During the SmartConnector upgrade, ensure that you install or upgrade to Transformation
Hub 3.4 that hosts the schema of the desired version in its Schema Registry.
Specify the event topic name. All connectors that use the same logger pool need to be
configured to use the same event topic name, so the events from these connectors will be
published to the same event topic.
For Content Types CEF 0.1 and CEF 1.0, the key is sent on events with the Connectors IP address
and a flag. The flag format is a single byte value. For ESM, the key is the agent ID.
The key format is: one byte flags + (4 or 16 bytes) IP (v 4 or v 6) address. Based on the value of
the IP version bit, 4 or 16 additional bytes should be examined. This is used in case the key is
made longer in a non-breaking fashion in the future.
0 IP version:
0 = IPv4
1 = IPv6
1 Key version:
Must be 0. If there are future versions of key that are not backward compatible with this
definition, it changes to 1.
For CEF 0.1 and 1.0, the events are delivered to Transformation Hub in their own messages,
which are distributed to the partitions of the topic defined in Transformation Hub in a round-
robin manner. For ESM, the events are sent in batches in a binary format. TLS encryption is
supported, as is client certificate authentication.
When TLS is enabled by setting the Kafka Broker on SSL/TLS parameter to true during
destination configuration, a Java KeyStore-format (.jks) file containing the certificates of the
Transformation Hub's Kafka cluster, or a certificate that has signed them, will be required. The
location of this Trust Store file will be required during destination configuration. See Kafka
documentation at https://kafka.apache.org/documentation.html#security_ssl for instructions.
Also, when client certificate authentication is enabled by setting the Use SSL/TLS Client
Authentication parameter to true, a .jks file containing the private key and certificate to use
must be provided. The Transformation Hub cluster must have the certificate (or a certificate
that has signed it) in its trust store. The location of the keystore file and authentication
information is to be provided in the SSL/TLS Keystore File Path, SSL/TLS Keystore Password,
and SSL/TLS Key Password parameters. The key and keystore passwords are created when you
set up Transformation Hub.
For instructions about configuring TLS between Transformation Hub and SmartConnector, see
Configuring TLS between Transformation Hub and SmartConnector on
https://community.softwaregrp.com/t5/ArcSight-Connectors/tkbp/connector-documentation.
For more information about the parameters to be selected during installation, see
Transformation Hub Parameters.
Raw Syslog
Although normalized data is faster and easier to parse and access, many IT professionals prefer
having the raw data available for review, forensics, and litigation. This destination sends raw
syslog events through the UDP, TCP, or TLS protocol.
It works in conjunction with the Raw Syslog connector, which captures raw, unparsed security
events for further processing. If you are transporting data to ArcSight Logger, you can use
specific configuration parameters to provide minimal normalization of the syslog data (for
source and timestamp). For more information, see the SmartConnector for Raw Syslog Daemon
Configuration Guide.
For more information about the parameters to be selected during installation, see Raw Syslog
Parameters.
Deployment Scenarios
The best deployment scenario for your system depends upon the connector type, your network
architecture, and your operating system.
l Scenarios for syslog deployment are documented in the Connector for UNIX OS Syslog
Configuration Guide.
l Scenarios for deploying Windows Event Log connectors are documented in the configuration
guides for the SmartConnector for Microsoft Windows Event Log Unified and Native and
SmartConnector for Windows Event Log.
This section has the following scenarios:
After the events are received by the Manager, it cross-correlates the events using rules, and
sends meta-events to the database and to any Consoles that access the database.
The ESM Manager also can perform preset actions. Events and meta-events within the
database can be played using the Replay channel to investigate, analyze, or create a report
about event history.
ArcSightLogger
Logger receives events from device and sends to Connectors, but lacks the depth of Connector
management found in ESM.
l A Logger-only deployment benefits from ArcSight Management Center in many ways, and
provides most, but not all, ESM’s management function (for example, it does not contain the
filter designer). ArcSight Management Center also offers features that ESM does not, such
as bulk operations (enabling control of many Connectors at one time).
l ArcSight Management Center also can configure Connectors with failover destinations,
providing central failover control when redundant Loggers are deployed. All or some
Connectors can be configured to send events to a second Logger or to an event file in the
case of communication failure with the primary destination.
For more detailed information about Logger, see ArcSight Logger SmartMessage Pool
(encrypted).
ArcSight ESM
Deploying ArcSight Management Center in an ESM environment centralizes connector
upgrade, log management, and other configuration issues.
Although each connector has specific destination parameters, Management Center allows
“bulk” management of connectors, eliminating the need to manually access each remote
connector host to add or change destinations.
For detailed information and instructions for using Management Center, see the Micro Focus
ArcSight Management Center Administrator’s Guide.
Installation Checklist
Task See
1. Learn about the product features, latest updates, known issues, and ArcSight
workarounds. SmartConnector
Release Notes
3. Make sure that the ArcSight products with which the connectors will ArcSight
communicate have already been installed correctly (such as ArcSight ESM Documentation
or ArcSight Logger).
4. Review and decide on the destination that you want to select SmartConnector
Destinations
Naming convention l Use a standard naming convention to specify directory locations, file
names, and menu option names for the connectors you install.
l If you install multiple connectors on a particular machine, install each
connector in a separate directory.
User credentials Before installing the SmartConnector, ensure that you have:
l Local access to the machine where the SmartConnector is to be installed
l Administrator passwords
SmartConnector 64-Bit Support The 64-bit installation executable contains a subset of available
SmartConnector. See the 64-bit SmartConnector installer for your platform
from the list of available connectors.
For more information, refer to the SmartConnector Configuration Guides
.Zip Files available on the Micro Focus Community page.
User Privileges when Installing on SmartConnectors can be run as a non-root user, such as arcsight. A
Unix SmartConnector that listens on port less than 1024 needs a root privilege to
listen to a restricted port. For example, a Syslog Daemon connector needs a
root privilege to bind to a restricted port such as port 514. For more
information, see User Privileges when Installing on Unix.
ArcSight Management Center If you decide to use ArcSight Management Center to manage
SmartConnectors, see Identifying ArcMC Deployment Scenario.
The following sections describe the recommended options for two concepts:
l Connectors that require to be configured to listen to low numbered ports
l Connectors that are run as a service
Note: When you install a connector as the arcsight user, the ArcSight connector files will be
owned by arcsight user.
After installing ArcSight connector, run the connector setup wizard as arcsight user.
l If a Syslog Daemon connector is selected, then the configured port number must be 1024 or
greater. If the configured port number is less than 1024, then see "User Privileges When
Installing (UNIX only)" on the previous page
l When running as a service, the setup wizard displays a dialog that states:
The Connector Setup Wizard is not able to modify the service configuration
because the Wizard is not running as root. Please run this Wizard as root.
Or to manually install, logged on as root, execute the following script:
$ARCSIGHT_HOME/current/bin/arcsight agentsvc -i -u user
To manually remove the service, execute the following script as a root
user:
$ARCSIGHT_HOME/current/bin/arcsight agentsvc -r
We do not recommend running the wizard as root. Instead, run the wizard as arcsight user and
then manually install the service. Execute the following script while logged on as root to install
the connector as a service:
$ARCSIGHT_HOME/current/bin/arcsight agentsvc -i -u arcsight
The -u arcsight option ensures that the service runs as arcsight user.
Option 2: Install as arcsight user, run as arcsight user with port forwarding
This option allows a Syslog Daemon to receive events that are sent to ports below 1024. After
installing ArcSight connector, run the connector setup wizard as arcsight user and use the
procedure mentioned in "Option 1: Install as arcsight user, run as arcsight user" on the
previous page. In addition, use another program that forwards traffic from a low number port
to the port configured for the connector.
For example, if the syslog events are being sent to port 514 and the connector is configured to
receive on port 6000, the forwarder re-routes from port 514 to port 6000. There are several
programs that can do port forwarding including iptables, ncat, and socat. The iptables
program is packaged with some versions of Linux/Unix.
logged on as root. If the connectors are to be run as a service, the service configuration is done
by the connector setup wizard and no additional steps are required.
Note: When you install a connector as the arcsight user, the ArcSight connector files will be
owned by arcsight user.
After installing ArcSight connector, run the connector setup wizard as arcsight user.
If a Syslog Daemon connector is selected, then the configured port number must be 1024 or
greater for this option.
Option 2: Install as arcsight user, run as arcsight user with port forwarding
This option allows a Syslog Daemon to receive events that are sent to ports below 1024. After
installing ArcSight connector, run the connector setup wizard as arcsight user and use the
procedure mentioned in "Option 1: Install as arcsight user, run as arcsight user" on page 41. In
addition, use another program that forward traffic from a low number port to the port
configured for the connector. For example, if the Syslog events are being sent to port 514 and
the connector is configured to receive on port 6000, the forwarder re-routes from port 514 to
port 6000. There are several programs that can do the port forwarding including iptables,
ncat, and socat. The iptables program is packaged with some versions of Linux/Unix.
Mode Description
Faster (Mode 2) ESM Manager default. Eliminates all but a core set of event attributes to
achieve the best through put. Because the event data is smaller, it
requires less storage space and provides the best performance.
Complete (Mode 3) Connector default. All event data arriving at the connector, including
additional data, is maintained.
When a turbo mode is not specified, Mode 3, Complete, is the default. ESM versions earlier
than 3.0 run in turbo mode Complete.
The ESM Manager uses its own turbo mode setting when processing event data. If a connector
is set at a higher turbo mode than the ESM Manager, it reports more event data than the ESM
Manager requires. The ESM Manager ignores these extra fields.
However, if an ESM Manager is set at a higher turbo mode than the connector, the connector
has less event data to report to the ESM Manager. The ESM Manager maintains fields that
remain empty of event data.
Both situations are normal in real-world scenarios because the ESM Manager configuration
must reflect the requirements of a diverse set of connectors.
Installing SmartConnectors
This chapter describes the different installation methods in which the SmartConnector can be
installed. You can install connectors in GUI Mode, Console Mode, or Silent Mode.
Important: Before installing any connector, ensure that the random number pool (also known as
entropy pool) of Operating System must not be less than the ideal lower limit of 3290. For more
information, see SmartConnector or Collector Remote Connections Failing Due to Low Entropy.
Global Parameters
You can set the following optional global parameters, either during installation or after the
installation:
Unique Generator ID
FIPS Mode
Remote Management Listener Port The remote management device will listen to the port
specified in this field. The default port number is 9001.
When queried by the remote management device, the
values you specified here will be used.
Preferred IP Version If both IPv4 and IPv6 addresses are available for the local
host, you can select the preferred version.
Format Preserving Host URL Enter the URL where the Micro Focus SecureData server is
installed.
Proxy Server (https) Enter the proxy host for https connection if any proxy is
enabled for this machine.
Proxy Port Enter the proxy port for https connection if any proxy is
enabled for this machine.
Format Preserving Identity The Micro Focus SecureData client software allows client
applications to protect and access data based on key names.
This key name is referred to as the identity. Enter the user
identity configured for Micro Focus SecureData.
Format Preserving Secret Enter the secret configured for Micro Focus SecureData to
use for authentication.
Event Fields to Encrypt Displays recommended fields for encryption. You can add or
delete any fields for encryption. Encrypting more fields can
affect performance, with 20 fields being the maximum
recommended. Also, because encryption changes the value,
rules or categorization might be affected. You cannot edit the
event fields after you have enabled encryption.
Destination Parameters
Depending on the destination selected, you might enter any of the following parameters:
Manager This is the local host name, IP address, or fully-qualified domain name of the machine where the
Hostname ArcSight Manager is installed. This name is what all clients (such as ArcSight Console) specify to talk
to the Manager. Using a host name and especially a fully-qualified domain name instead of an IP
address is recommended for flexibility.
The Manager host name is used to generate a self-signed certificate. The Common Name (CN) in
the certificate is the Manager host name that you specify in this screen. Although the Manager
uses a self-signed certificate by default, you can switch to using a CA signed certificate if needed.
See the ESM Administrator's Guide for more information.
Manager 8443
Port
AUP Default: false. A connector can send events to ESM and non-ESM destinations simultaneously. In
Master this configuration, it is helpful to use the AUP Master Destination feature. See ArcSight Content
Destination AUPs for more information.
Note: Set this to True for ESM to use zone information from the Manager for non-Manager destinations,
such as SmartMessage (Logger) or Transformation Hub.
Filter Out Default: false. If AUP Master Destination is set to true, you may or may not want to send this
All Events connector's events to that Manager. If the Manager should not get the events, set this to true. In
that case the manager will only be used as a source of zone information. An example of when this
would be a useful case is if the connector is sending events to the Transformation Hub, and ESM is
reading those events from there.
Port The destination port 443 for Logger Appliance or 9000 for Software
Logger.
Port The destination port 443 for Logger Appliance or 9000 for Software Logger.
Compression The data compression mode checkbox. Select to enable or leave as default for disable.
Mode
CEF Version Select 0.1 or 1.0 from the drop-down menu. Select 0.1 if you are not sure the chosen destination
can handle CEF 1.0, which supports both IPv4 and IPv6 modes.
0.1 - The Device Address, Source Address, Destination Address, and Agent Address fields will
always be IPv4 or will be omitted. If there are any IPv6 addresses, they will be in Device
Custom IPv6 Address fields. Bytes In and Bytes Out fields are limited to the size of an integer
(up to 2^31-1).
1.0 - Any of the address fields can be either IPv4 or IPv6 and the Bytes In and Bytes Out fields can
be long values (up to 2^63-1).
Button Description
Add Adds a row to the table to add a logger to a pool. Fill in the information manually. Use the checkbox
for Compression Mode to enable or disable it. The default is unchecked for disabled. The default port
for logger is 443.
Remove Removes the row corresponding to the logger from the loggersecure pool.
Import Opens a dialog window to import the .csv file type containing the pre-recorded information for
loggersecure pool.
Export Opens a dialog window where you can export and save the data entered in the panel. Use a .csv file
extension for export. The file lists Disabled for default Compression Mode and TRUE for enabled.
Amazon S3
Parameters Description
Avro File Storage Path The path to the location where the Avro files will be stored.
Number of Events in a The number of events that can be stored in each Avro file.
File
The maximum number is 10000.
Proxy Host If proxy is enabled for your machine, the IP address or host name of the proxy
server for HTTPS connection.
Proxy Port If proxy is enabled for your machine, the port number of the proxy server for HTTPS
connection.
Proxy User Name If proxy is enabled for your machine, the user name for the proxy server.
This value is optional for additional proxy authentication. If you enter the proxy user
name, you must provide the proxy password.
Proxy Password If proxy is enabled for your machine, the password for the proxy server user.
Amazon Access Key The access key that is used to access Amazon S3.
Amazon Secret Key The secret key that is used to access Amazon S3.
Amazon S3 Bucket The name of Amazon S3 bucket that is created on the Amazon account to which the
Name Avro output files will be sent.
Amazon S3 Bucket The name of the folder in the Amazon S3 bucket. This is an optional field.
Folder Name
Note: If the folder is not present in the Amazon S3 bucket, then it will be
automatically created with the name specified in this field.
Amazon S3 Region Code The Amazon S3 region code in which the Amazon S3 bucket was created on Amazon
account with the name specified in the Amazon S3 Bucket Name field.
Note: To use the Default Credential Provider Chain for Amazon Access Key and Amazon Secret
Key, see AWS Credentials.
CEF File
Parameter What to enter or select
File The desired file rotation interval, in seconds. The default is 3,600 (one hour).
Rotation
Interval
CEF Select 0.1 or 1.0 from the drop-down menu. Select 0.1 if you are not sure the chosen destination
Version can handle CEF 1.0, which supports both IPv4 and IPv6 modes. The destination could be Logger,
another SmartConnector, or a non-ArcSight product.
0.1 - The Device Address, Source Address, Destination Address, and Agent Address fields will
always be IPv4 or will be omitted. If there are any IPv6 addresses, they will be in Device
Custom IPv6 Address fields. Bytes In and Bytes Out fields are limited to the size of an integer
(up to 2^31-1).
1.0 - Any of the address fields can be either IPv4 or IPv6 and the Bytes In and Bytes Out fields can
be long values (up to 2^63-1).
CEF Syslog
Parameter What to enter or select
Forwarder The default is set to False. If the destination is a Syslog Daemon connector and you want to
preserve information about the original connector, then the CEF Forwarder mode should be
set to True both in this destination and in the receiving connector. In other words, if you have
a chain of connectors connected by Syslog, Syslog NG, or CEF encrypted Syslog (UDP), and you
want to preserve information about the original connector, the destinations should all have the
CEF Forwarder mode set to True (which is implicitly true for CEF Encrypted Syslog (UDP)), and
the connectors receiving from them should also have the CEF Forwarder mode set to True.
For example, you can configure several forwarders for Microsoft Windows Event Log Unified,
all sending events using the CEF Syslog destination type to one Syslog Daemon connector,
which then sends to ESM. For the events arriving at ESM to retain information about the
specific Unified connector that collected the event, the connector's CEF Syslog destinations
should have the Forwarder mode set to true, and the Syslog Daemon connector should also
set the Forwarder mode to true. The information will display in the original agent fields of the
events.
Select 0.1 if you are not sure the chosen destination can handle CEF 1.0,
which supports both IPv4 and IPv6 modes. The destination could be
Logger, another SmartConnector, or a non-ArcSight product.
l 1.0 - Any of the address fields can be either IPv4 or IPv6 and the Bytes In and Bytes Out
fields can be long values (up to 2^63-1).
Shared Key Enter a 16 character shared key for encryption (Shared Secret). The same Shared Key must be
(16 used when configuring the CEF Encrypted Syslog (UDP) connector on the receiving side.
characters)
CSV Path The path to the output folder. If it does not exist, the folder is created.
Fields A comma-delimited list of field names to be sent to the CSV file. The default is:
event.deviceReceiptTime,event.name,event.deviceAddress,
event.deviceHostName,event.sourceAddress,
event.sourceHostName,event.sourcePort,
event.destinationAddress,event.destinationHostName,
event.destinationPort
To modify the list, each entry needs to begin with either:
l “event.” and the name of a normal pre-defined event field, or
l “additionaldata.” and the name of some additional data field that applies to this particular
connector. These names are not common across all connectors.
There are no spaces allowed around the commas in the field names. For example:
“event.deviceReceiptTime,event.name” is correct. But, “event.deviceReceiptTime, event.name” is
not correct.
File Enter the desired file rotation interval, in seconds. The default is 3,600 (one hour).
rotation
interval
Write Select true to send a header row with labels for each column, as described above.
format
header
Request timeout The timeout of the request, make sure that your request.timeout.ms reaches at least the
recommended value of 60000.
Connection String The connection string from “Shared access policies” of the event hub.
Transformation Hub
Parameters What to specify or select
Content Format Select any of the following topics for the corresponding content format:
Avro th-arcight-avro
ESM th-binary_esm
Binary
Supports all versions of ESM.
For more information, refer to the Support Matrix for ArcSight ESM guide,
available on the ArcSight Enterprise Security Manager (ESM) Documentation
page.
Selecting ESM Binary allows to configure content format for ESM.
Note: The default Content Format is CEF (for IPv4 and IPv6) and Kafka Topic is th-
cef .
Compression Type Compression reduces disk space and network bandwidth requirements.
Select the compression algorithm used (gzip, zstd, none) when Transformation Hub
copies events, such as when routing events between Topics.
l gzip - is the default value.
Note: The zstd algorithm performs better than gzip, but requires Kafka client
library version 2.1.0 or later.
l Zstd - only is supported in Transformation Hub 3.3 and SmartConnector 8.0.0. If
your Transformation Hub version is 3.2, use gzip as a compression type. This
compression type works only for Logger 7.0, ESM 7.2, IDI 1.1, or their later
versions.
ESM Version for ESM Select the ESM version number of the desired ESM topic. If you do not select any
Topic value, the latest version of ESM is considered.
This field is mandatory when the Content Format is selected as ESM Binary.
Schema Registry Specify the host:port of the Schema Registry node to fetch schema using HTTPS.
Host:Port
Use the FQDN or the IP address for the Virtual IP of the master node of the
Transformation Hub to achieve high availability. In this case, if the primary node fails,
the Virtual IP will automatically migrate to a failover master node and the connector
will still be able to access the schema registry without having to reconfigure the
connector. If Transformation Hub is configured with only a single master node, use
the FQDN or IP address of that master node.
This field is mandatory when the Content Format is selected as Avro.
SSL/TLS Truststore File Specify the location of the SSL/TLS truststore file. This is required to access HTTPS
Path Schema Registry for Avro or the TLS-based secure communication for the Kafka
brokers.
It is optional for Text-based communication with Kafka brokers.
This field is mandatory when the Content Format is selected as Avro or when Kafka
Broker on SSL/TLS is set to true.
SSL/TLS Truststore Specify the password for the SSL/TLS truststore file.
Password
This field is mandatory when the SSL/TLS Truststore File Path is specified.
Use SSL/TLS Client Determines whether a client certificate is used for TLS to identify the Connector.
Authentication Select one of the following options:
l false - (default)
l true - Select true if client authentication is enabled for Kafka broker, Schema
Registry, or both.
If you select true, ensure that the Kafka Broker on SSL/TLS is enabled. You must also
provide values for the SSL/TLS Keystore File Path, SSL/TLS Keystore Password, and
SSL/TLS Key Password parameters.
SSL/TLS Keystore File Specify the location of the SSL/TLS keystore file path for client authentication.
Path
Raw Syslog
Parameter Description
Parameter Description
Protocol Select either UDP, Raw TCP, or TLS as the protocol to be used
by the co nnector to send events. The default value is UDP.
l Format Preserving parameters, if you are using Micro Focus SecureData solutions to
provide encryption. See the Micro Focus SecureData Architecture Guide for more
information.
3. Click Next to confirm the connector setup parameters.
4. From the Type drop-down, select the type of connector to install.
5. Specify the parameters for the selected connector. For configurations specific to the
connector, see the configuration guide specific to that connector.
6. Select a destination and configure parameters.
7. Configure the relevant destination settings.
8. Specify a connector details such as name and other information identifying the connector's
use in your environment. Click Next. The connector starts the registration process.
9. Click Next in the Add connector Summary window.
/ArcSight-x.XXXX.bin –i console.
3. Specify the installation location. The default installation location is the root folder:
/ArcSight.
./runagentsetup.sh
Tip: ArcSight recommends creating and testing the Properties file on a system other than your in-
service, production environment.
1. Run the SmartConnector Configuration Wizard to extract and install the core files.
2. When you are prompted to select the Add a Connector or Set Global Parameters options,
click Cancel.
3. Open a command prompt, browse to ARCSIGHT_HOME\current\bin directory, then
enter the following command to launch the SmartConnector configuration wizard in record
mode:
l On Unix and Linux: ./runagentsetup.sh –i recorderui
Note: The properties file that you create will show passwords in readable text.
Note: The gi parameter differences the Unique Generator Id from the one in the silent
template. The values will only be differentiated when the installation on the connector core
is extracted from the connector installer file.
Ensure that the configuration on the system on which you want to install the
SmartConnector in silent mode matches that of the machine on which you created the
properties file. Otherwise, the installation fails.
2. Open the Properties file, locate the USER_INSTALL_DIR property and make sure that the
path value is the absolute path to the location where you want to install the current
system.
USER_INSTALL_DIR=C\:\\Program Files\\ArcSightSmartConnectors
Note: The colon (:) and backslash (\) characters must be preceded by a backslash (\).
3. Find the ARCSIGHT_AGENTSETUP_PROPERTIES property in the file and make sure that the
path value is the absolute path to the location where you copied the Properties file on this
system.
For example, if you copied the Properties file to C:\properties_
files\silent.properties, the path value should be as follows:
ARCSIGHT_AGENTSETUP_PROPERTIES=C\:\\properties_files\\silent.properties
4. Modify the properties as needed. For example, modify the connectordetails.name
property in the file and change its value to the name of the SmartConnector you are going
to install in silent mode. The following is an example of a properties file:
#======================================================
# Panel 'connectordetails'
#======================================================
# Enter the connector details.
#
# Name
connectordetails.name=The Name
# Location
connectordetails.location=The Location
# DeviceLocation
connectordetails.devicelocation=The Device Location
# Comment
connectordetails.comment=The Comment
#===============================================
Modify any property in the Properties file if needed
Definitions of properties:
l connectordetails.name: The name of the connector in ESM.
l connectordetails.location: The name of the folder that contains the connector in ESM.
l connectordetails.devicelocation: The location of the machine on which ESM is installed.
l connectordetails.comment: Comments that were added about the connector.
5. Save the Properties file.
6. Download the SmartConnector installation file appropriate for your platform.
7. Run the following command to install the new SmartConnector in silent mode:
ArcSight_Agent_install_file -i silent –f <path_to properties_
file>\properties_filename
The command launches the InstallShield program and installs the SmartConnector
Appliance silently.
Example: To install a SmartConnector on Windows platform with the property file name as
silent_properties, enter: ArcSight-3.5.x.nnnn.y-Agent-Win.exe –i silent –f
silent_properties
Note: After running the silent install, the original command in the runagentsetup.bat file is
modified after specifying the Silent Install answer file.
To correct the problem, manually edit and remove the entries between the double quotation
marks (" ") and return to the default setting. There should be no entries between the second
double quotation marks (" "). Here is an example of the script before modifying:
call arcsight.bat agentsetup -c -i "SILENT" -f "C:\ArcSight\silent_
properties_AD" %*
Then, the runagentsetup.bat file would not contain the silent_ properties and the path
will be correct.
Running SmartConnectors
SmartConnector can be run in stand-alone mode or as a service, depending on the mode
selected during installation.
Caution: Some SmartConnectors require that you restart your system before the configuration
changes take effect.
To run a scanner SmartConnector in interactive mode, run in standalone mode and not as a
Windows service or UNIX daemon.
To verify that a connector is running, you can check the ArcSight Console Navigator in the
Resources tab, under Connectors. If the connector is running, you will see <connector_name>
(running) listed.
For more information about modifying the connector settings, see Modifying Connector
Settings.
Note: Busy on-board connectors might impact the performance of the ArcSight Management
Center web-based interface.
manages, and this allows for management of many connectors at one time. The
Management Center does not affect working connectors unless it is used to change their
configuration. In some cases, the connector is commanded to restart.
ArcSight produced two solutions for the central management of multiple connectors:
Connector Appliance and ArcSight Management Center. Connector Appliance is an ArcSight
legacy product that enabled central management and monitoring of multiple connectors. Its
successor, ArcSight Management Center (ArcSight Management Center) includes all the
Connector Appliance management functionality, but its capabilities also include management
and monitoring of an additional range of ArcSight products, such as Loggers and other ArcSight
Management Centers. For more information about ArcSight Management Center, see the
ArcSight Management Center Administrator’s Guide.
Connectors that forward events to ESM can be managed using the Console, so ArcSight
Management Center is not required if all connectors have ESM as their only destination.
Note: You do not need to do the following processes for ESM or Express. These processes are
only done for SmartConnectors running as a service, not for standalone SmartConnectors
because they cannot be restarted automatically.
To manage software-based connectors with ArcSight Management Center, you need to enable
remote management on them. Add the following property to the
user/agent/agent.properties file in the installation directory of each connector that you
want to manage with ArcSight Management Center:
remote.management.enabled=true
remote.management.listener.port=9002
Caution: Only fifth- generation connectors support remote management, so you will need
connector build 4855 (4.0.5.4878.0) or later to use this feature. Remote Management is not
supported on connectors running AIX. This limitation is due to elements within the AIX platform.
Tip: Multiple software-based connectors installed on the same host require a separate port
assignment. The default port for connectors is 9001, so the second connector installed on the
same host must use an alternate port. Micro Focus recommends using port 9002, 9003, 9004,
and so on.
For a complete list of all connectors supported by ArcSight Management Center, see the
ArcSight Management Center Release Notes. You can also visit the Community site at
https://community.softwaregrp.com/t5/ArcSight/ct-p/arcsight. ArcSight adds new connectors
regularly.
Note: Load Balancer only works with connectors that use default remote management user
name and password values.
Verify with your administrator what are the correct credentials for your environment.
The default connector remote management credentials are:
l Username: connector_user
l Password: change_me
Grouping of Connectors
The Connector logical grouping feature enables you to logically group the Connectors so that
you can track the licensed EPS counts per group. You can enable this feature only from ArcMC.
To group Connectors:
1. For the standalone installation, open agent.properties and enter a valid value for the
following property:
agent[0].connector.group.name=<group name>
2. Update the agent[0].connector.group.name agent property in ArcMC.
For more information about updating container properties (located in the
agent.properties file), refer to the ArcSight Management Center Administrator's Guide
available at the ArcSight Management Center (ArcMC) page.
To add a destination:
1. Run the installation wizard, select Modify Connector , then click Next.
2. Select Add, modify, or remove destinations.
3. Select Add destination to add another destination.
4. Click Next; the window for adding, modifying, or removing destinations will be displayed.
5. Specify the relevant details to add a destination.
Re-registering a Destination
When the Manager recognizes a connector, it generates an ID token to identify its security
events. If the Manager stops accepting events from a connector for an unknown reason, or if
you have upgraded a connector but its resource was removed from the database, then you
must re-register the connector.
To re-register destination:
1. After running the wizard, Modify Connector is selected by default. Do not change this
selection. Click Next.
2. Select Add, modify, or remove destinations and click Next.
3. Select the destination to re-register and click Next.
4. Select Reregister destination and click Next.
5. Specify the required credentials, if prompted.
6. After the reregistration completes, restart the connector to apply the new ID token.
Removing a Destination
1. Run the installation wizard, select Modify Connector, then click Next.
2. Select Add, modify, or remove destinations.
3. Select Add destination to add another destination and click Next.
The window for adding, modifying, or removing destinations will be displayed.
4. Specify the relevant details to add a destination and click Next.
5. From the list of destination selections, select the destination to remove, and then click
Next.
6. Select Remove destination to start the destination removal process and click Next.
7. Complete the destination removal process and click Next.
Enable Batching (per event) The SmartConnector creates batches with the specified number
of events. (100,200, 300, 400, 500, or 600 events).
Default is 100.
Enable Batching (in seconds) The SmartConnector sends the events if the specified timer
expires (1, 5, 10, 15, 30, 60).
Default is 5.
Enable Device The SmartConnector adjusts the time reported by the connector, using this setting. This is
Time useful when a remote device's clock isn't synchronized with the ArcSight Manager. This
Correction (in should be a temporary setting. The recommended way to synchronize clocks between
seconds) Manager and devices is the NTP protocol. This parameter also affects the startTime and
endTime fields.
Default is 0.
Enable The SmartConnector can also adjust the time reported by the Connector Time
Connector SmartConnector itself, using this setting. This is for informational purposes only and lets
Time you to modify the local time on the SmartConnector. This should be a temporary setting.
Correction (in The recommended way to synchronize clocks between Manager and SmartConnectors is
seconds) the NTP protocol.
Default is 0.
Configurable Settings
Name Field Value Field
Configurable Settings
Name Field Value Field
Configuring Caching
SmartConnectors use a compressed disk cache to hold large volumes of events when the
ArcSight Manager is down or when the SmartConnector receives bursts of events.
Changing these settings does not affect the events cached, it only affects new events sent to
the cache.
To configure Caching:
1. Run the runagentsetup.bat file.
2. Select Modify Connector, then click Next.
3. Select Add, Modify, or Remove Destinations, then click Next.
4. Select the destination for which you want to configure batching, then click Next.
5. Select Modify destination settings, then click Next.
6. Select Caching, then click Next.
7. Specify the following information, then click Next.
Configurable Settings
Name Field Value Field
Cache Size This parameter specifies the disk space for caching events.
The default is 1 GB depending on the connector, the cache can hold
about 15 million events, but it also can go down to 200 MB. When this
disk space is full, the SmartConnector drops the oldest events to free
up disk cache space. Select the option available in the drop-down list.
Notification Threshold The number of events in the cache that triggers a notification.
Default is 10,000 events.
Notification Frequency Indicates how often a notification must be sent when the notification
threshold is reached. Select the option available in the drop-down list.
Default is 10 min.
Maximum File Count The value set in the user properties represents the maximum
number of cache files that guarantees no events dropping, and not
the actual amount of cache files created for ingestion. Cache enters in
Event drop mode after the number of cache files reache the limit set.
Alternatively, when the number of cache files reaches double the
amount set, caching enters the File drop mode.
Configuring Network
To configure network:
1. Run the runagentsetup.bat file.
2. Select Modify Connector, then click Next.
3. Select Add, Modify, or Remove Destinations, then click Next.
4. Select the destination for which you want to configure batching, then click Next.
5. Select Modify destination settings, then click Next.
6. Select Network, then click Next.
7. Specify the following information, then click Next.
Configurable Settings
Name Field Value Field
Heartbeat Frequency This setting controls how often the connector sends a
heartbeat message to the ArcSight Manager. The default is 5
seconds, but it can vary from 5 seconds to 10 minutes.
Note that the heartbeat is also used to communicate with the
SmartConnector; therefore, if its frequency is set to 10
minutes, then it could take as much as 10 minutes to send
any configuration information or commands back to the
SmartConnector. Select from the options available in the
drop-down list.
Default is 10 seconds.
IPv6 Name Resolution Control l IPv4 Only: for Legacy Events . This is the default option.
l IPv6 (Prefer IPv4 for reverse resolution) : for Legacy
Events .
l IPv6 (Prefer IPv6 for reverse resolution): for Legacy
Events.
Name Resolution TTL (Secs) This is the amount of time (Time to Live) the name resolution
is to be in effect. The name resolution entries are cached for
this time .
Default is 3600.
Name Resolution Host Name Options l Set host name only (lowercase)
l Set host and domain names
l Set host and domain names (lowercase)
For reverse resolution (IP Address to Host name), only the
host name field is set. If host name only is not used, the host
name is split up and put into both the DNS domain and the
host name fields. This affects the source, destination, device
and agent address. If one of the (lowercase) choices is made,
then the name is changed to lowercase before it is put into
the host name (and possibly DNS domain) field(s).
Default is Set host name only.
Don't Resolve Host Names Matching By default, host names are resolved to their IP addresses. You
have the option to specify a regular expression for all or part
of a host name for which you do not want the system to
attempt host name resolution to an IP address.
When this option is configured, the system cannot resolve
host names matching this expression.
Don't Reverse-Resolve IP Ranges By default, IP addresses are resolved to their domain names.
You have the option to specify IP address ranges for which
you do not want the system to attempt reverse-resolution to
domain names.
Click in the field to enter the IP address range. To enter a
single IP address, enter the address under the From column
and leave the To column blank, then click Apply. For an
address range, enter the starting IP address under From and
the ending address under To , then click Apply. This field
allows you to enter a list of ranges.
When this option is configured, the system cannot reverse-
resolve IP addresses that fall within any of the specified
ranges.
Remove Unresolvable Names/IPs from (Yes | Yes (w/ negative cache) | No)
Cache l If set to No, unresolvable host names or IP addresses
continue to be in the cache.
l If set to Yes, unresolvable host names or IP addresses are
removed from the cache.
l If set to Yes (w/negative cache), the connector
remembers what names/IPs have been unresolvable so
that time is not wasted trying to resolve them frequently.
Default is No.
Limit Bandwidth To Select from a list of bandwidth options you can use to
constrain the connector's output over the network.
Default is Disabled.
Transport Mode (Normal | Cache | Cache but send Very High severity
events).
You can configure the SmartConnector to cache to disk all the
processed events it receives. This is equivalent to pausing the
SmartConnector. However, you can use this setting to delay
event-sending during particular periods. For example, you
could use this setting to cache events during the day and
send them at night. You can also set the connector to cache
all events, except for those marked with a high severity,
during business hours, and send the rest at night.
Default is Normal.
Address Based Zone Population If specified in setup or ArcMC, this is a comma-separated list
that must contain a multiple of three items.
l The first of each three is the starting IP address of a zone.
l The second is the ending IP address of the zone.
l The third is the URI of the zone to assign to addresses in
that range.
These zones are only used if a network model has not been
sent by ESM or ArcMC, or if that network model does not
cover some addresses. If Address-Based Zone Population
Defaults Enabled is set to Yes, the zones specified here take
precedence over those.
For example, for two zones, this can be:
15.0.0.0,15.255.255.255,/All Zones/ArcSight System/Public
Address Space Zones/Hewlett-Packard
Company,17.0.0.0,17.255.255.255,/All Zones/ArcSight
System/Public Address Space Zones/Apple Computer Inc.
Customer URI Applies the given customer URI to events emanating from the
connector. Provided the customer resource exists, all
customer fields are populated on the ArcSight Manager. If
this connector is reporting data that might apply to more than
one customer, you can use Velocity templates in this field to
conditionally identify those customers.
Source Zone URI When populated, this field shows the URI of the zone
associated with the SmartConnector's source address. How
this field gets populated is discussed in the Zones section of
the SmartConnectors topic.
This field is available for ESM v3.0 compatibility. It is not
relevant in post ESM 3.0 releases because of integral zone
mapping.
Source Translated Zone URI When populated, this field shows the URI of the zone
associated with the SmartConnector's translated source
address. The translation is presumed to be NAT (network
address translation). How this field gets populated is
discussed in the Zones section of the SmartConnectors topic.
This field is present for ESM v3.0 compatibility. It is not
relevant in post ESM 3.0 releases because of integral zone
mapping.
Destination Zone URI When populated, this field shows the URI of the zone
associated with the SmartConnector's destination address.
How this field gets populated is discussed in the Zones
section of the SmartConnectors topic.
This field is present for ESM v3.0 compatibility. It is not
relevant in post ESM 3.0 releases because of integral zone
mapping.
Agent Zone URI When populated, this field shows the URI of the zone
associated with the SmartConnector's translated destination
address. The translation is presumed to be NAT (network
address translation). How this field gets populated is
discussed in the Zones section of the SmartConnectors topic.
This field is present for ESM v3.0 compatibility. It is not
relevant in post ESM 3.0 releases because of integral zone
mapping.
Agent Translated Zone URI When populated, this field shows the URI of the zone
associated with the SmartConnector's translated address. The
translation is presumed to be NAT (network address
translation). How this field gets populated is discussed in the
Zones section of the SmartConnectors topic.
This field is present for ESM v3.0 compatibility. It is not
relevant in post ESM 3.0 releases because of integral zone
mapping.
Device Zone URI When populated, this field shows the URI of the zone
associated with the device's address. How this field gets
populated is discussed in the Zones section of the
SmartConnectors topic.
This field is present for ESM v3.0 compatibility. It is not
relevant in post ESM 3.0 releases because of integral zone
mapping.
Device Translated Zone URI When populated, this field shows the URI of the zone
associated with the device's translated address. The
translation is presumed to be NAT (network address
translation). How this field gets populated is discussed in the
Zones section of the SmartConnectors topic.
This field is present for ESM v3.0 compatibility. It is not
relevant in post ESM 3.0 releases because of integral zone
mapping.
The following networks.csv and zones.csv files are applicable for ArcMC-pushed
Network Model:
Networks CSV:
The networks.csv file defines the networks used in the zones.csv file.
Tip: While creating zones, enter the exact URI for each network. Any zones connected to
unknown networks (or most likely to networks incorrectly specified) cannot be used.
Zones CSV:
The zones.csv file defines the zones within the networks already populated in the
networks.csv file.
To Add Zones:
Add the header with no extra space in the following format:
#Name,Start Address,End Address,Parent Group URI,Network URI
Note: Events with addresses that fall outside the zones defined by the network model cannot be
changed, so defining a network model does not necessarily affect all events.
To discard incoming zones and apply new ones, if applicable, go to Destination Settings >
Network Group > Population Mode and set SmartConnector to Rezone (override) instead of
Normal. You can also set this from ArcMC.
Debugging tips:
l From your destination, search for AddrBasedSysZonePopRows and
AddrBasedUsrZonePopRows in get status results or check the logs in logStatus. To look for
errors and consider the time range in which the network model was pushed, or when the
connector was started.
l For additional information on ArcMC network models, go to Chapter 7: Managing
Configuration of Micro Focus Security ArcSight Management Center Administrator´s Guide
available at: https://community.softwaregrp.com/t5/ArcSight-Management-Center-
ArcMC/tkb-p/arcsight-management-center.
Note: Field- based aggregation creates a new alert that contains only the fields that were
specified, so the rest of the fields are ignored, unless “Preserve Common Fields” is set to “Yes”.
SmartConnector aggregation significantly reduces the amount of data received, and should be
applied only when you use less than the total amount of information the event offers. For
example, you could enable field-based aggregation to aggregate "accepts" and "rejects" in a
firewall, but you should use it only if you are interested in the count of these events, instead of
all the information provided by the firewall.
Configuring Processing
To configure processing:
1. Run the runagentsetup.bat file.
2. Select Modify Connector, then click Next.
3. Select Add, Modify, or Remove Destinations, then click Next.
4. Select the destination for which you want to configure batching, then click Next.
5. Select Modify destination settings, then click Next.
6. Select Processing, then click Next.
7. Specify the following information, then click Next.
Configurable Settings
Name Field Value Field
Check Event Integrity Method This parameter enables you to specify a method that you want to use to
verify the integrity of events.
It is recommended to configure this parameter for only one destination.
Because, for a given set of events, a verification event (also known as an
agent:040 event) is generated per destination and transmitted to all the
configured destinations. If you configure the parameter for only one
destination, then it avoids duplication of verification event on all the
destinations and reduces the extra load on the connector.
If the Preserve Raw Event parameter is selected as Yes and a valid event
integrity algorithm is selected, the connector will generate additional
verification events that contain a crypto signature field. This crypto
signature field can be used to verify whether the raw event field of a
normal event was tampered with, after the normal event was generated
by the connector.
The crypto signature field has the following format:
"#seq(alg):digest"
where,
l seq is a persistent event sequence number.
Turbo Mode If your configuration, reporting, and analytic usage permits, you can
greatly accelerate the transfer of a sensor's event information through
SmartConnectors by choosing one of two "turbo" (narrower data
bandwidth) modes.
Complete is the default transfer mode, which passes all the data arriving
from the device, including any additional data (custom, or vendor-
specific). This corresponds to turbo.enabled=false on the Manager.
Since this value is not the default, be sure to add this property to the
Manager’s <ARCSIGHT_HOME>/config/server.properties file.
After making changes to this file, you need to restart the Manager.
The first level of Turbo acceleration is called Faster and drops just
additional data, while retaining all other information. The Fastest mode
eliminates all but a core set of event attributes, in order to achieve the
best throughout. Consider the possible effects such a restricted data set
might have from a given device (for example, on reports, rules, threat
resolution) before selecting it.
The specific event attributes that apply to these modes in your
enterprise are defined in the <ARCSIGHT_
HOME>/config/server.default.properties file for the ArcSight
Manager. Because these properties may have been adjusted in the
corresponding server.properties file for your needs, you can refer
to this server.properties file for definitive lists. For more information,
refer to the “Managing and Changing Properties File Settings” section in
the ESM Administrator’s Guide.
Only scanner SmartConnectors must run in Complete mode, to capture
the additional data.
Enable Aggregation (in secs) Note: If you have already used this settings for setting up previous
SmartConnectors, you can continue to do so. However, ArcSight
recommends that you use the new Field-Based Aggression feature as a
more flexible option.
Here is the description of the legacy “Enable Aggregation” feature, for
those who are still using it:
When enabled, Enable Aggregation (in seconds) aggregates two or more
events based on the selected time value. (Disabled, 1, 2, 3, 4, 5, 10, 30,
60)
The aggregated event shows the event count (how many events were
aggregated into the displayed event) and event type. The rest of the
fields in the aggregated event take the values of the first event in the set
of aggregated events.
Default is Disabled.
Limit Event Processing Rate You can moderate the SmartConnector's burden on the CPU by reducing
its processing rate. This can also be a means of dealing with the effects of
event bursts.
The choices range from Disabled (no limitation on CPU demand) to 1eps
(pass just one event per second, making the smallest demand on the
CPU).
Be sure to note that this option's effect varies with the category of
SmartConnector in use, as described in the SmartConnector Processing
Categories table.
Fields to Obfuscate Using MD5 hashing, this option lets you to specify a list of fields for
obfuscation in a security event. In FIPS mode, SHA-256 is used.
Store Original Time In (Disabled | Flex Date 1) This parameter lets you to move the original
device receipt time to a specified field if altered by the time correction.
Default is Disabled.
Enable Port-Service Mapping (No | Yes) If set to Yes and one of the two fields destination port and
application protocol is set, and the other is not, the one that is set is used
to set the other. For example, if the destination port is 22 and application
protocol is not set, then the application protocol is set to ssh.
Default is No.
Uppercase User Names (Disabled | Enabled (orig to ID) | Enabled(orig to ID or Flex) | Enabled
(orig to Add. Data))
If set to any of the enabled settings, the two user name fields are
automatically changed to uppercase.
The original values are saved as follows:
l Enabled (orig to ID) saves the original values to the sourceUserID and
destinationUserID fields, respectively, overwriting any values that
may have been there previously.
l Enabled(orig to ID or Flex) saves the original values in the same fields
if they do not already contain values, or to the flexString1 (source)
and flexString2 (destination) fields if the ID fields do contain values.
l Enabled(orig to Add. Data) saves the original values to additional data
fields called OrigSrcUsrName and OrigDstUsrName , respectively.
Default is Disabled.
Enable User Name Splitting (Yes | No) If this is set to yes and the destination user name contains
commas in the event, this parameter duplicates that event. Each user
name in the list is placed in one of the events.
For example, if the destination user name in an event is “User 123, User
456”, then that event is sent twice, with the destination user name set to
“User 123” in the first and “User 456” in the second.
Default is No.
Split File Name into Path and (Yes | No) If this is set to yes and an event’s file name field is set but its
Name file path field is not, this parameter splits the file name into a path and a
name, placing each part into appropriate fields.
For example, if the file name field is set to C:\dir\file.ext and the
file path is not set, then the file path is set to C:\dir and the file name
to file.ext. The separator character can be either \ or / as the system
looks to the SmartConnector to determine its platform.
Default is No.
Generate Unparsed Events (Yes | No) If set to yes and some incoming event data cannot be parsed
(perhaps because a device has been upgraded since the SmartConnector
parser was written), then a special event named “Unparsed Event” is
generated. The raw event appears in the event message field.
If set to No, the SmartConnector log files indicate the unparsed events.
Default is No.
Preserve System Health Events (Yes | No) If set to yes, internal system health events are preserved.
SmartConnectors generate system health events that provide
information about the systems on which they are installed (for example,
disk usage, network memory, JVM memory, percentage of processing of
CPU memory usage, and so forth). By default, these events are not
retained or passed on to ArcSight destinations and, therefore, not
available for viewing. Setting this option to yes makes them available in
the Console or any destination like Logger.
Default is No.
Configuring Filters
Agent severity is the translation of the device severity into normalized values. For example,
some connectors use a device severity scale of 1-10, whereas others use a scale of high,
medium and low. These values are normalized into a single agent severity scale. The default
scale is Low, Medium, High, and Very High. An event can also be classified as Unknown if the
data source did not provide a severity rating.
To configure Filters:
1. Run the runagentsetup.bat file.
2. Select Modify Connector, then click Next.
3. Select Add, Modify, or Remove Destinations, then click Next.
4. Select the destination for which you want to configure batching, then click Next.
5. Select Modify destination settings, then click Next.
6. Select Filtering, then click Next.
7. Specify the following information, then click Next.
Configurable Settings
Name Field Value Field
Very High Severity Event Definition A filter condition to sort for very high severity
events.
High Severity Event Definition A filter condition to sort for high severity events.
Medium Severity Event Definition A filter condition to sort for medium severity
events.
Low Severity Event Definition A filter condition to sort for low severity events.
Unknown Severity Event Definition A filter condition to sort for unknown severity
events.
Note: When selecting Aggregrate Events, the Preserve Raw Event feature is disabled.
For all other destinations, the filter must be expressed in text. For example, you can write
filtering strings such as:
Name EQ “Agent”
(name Contains “Super”) Or (name EQ “Agent”)
attackerAddress Between (“10.0.0.1”, “10.0.0.10”)
destinationAddress Is “NOT NULL”
EQ equal to
NE not equal to
LT less than
GT greater than
Like standard CCE operator for simple pattern matching for string type:
_ wildcard for single character, % wildcard for any number of
characters
InGroup for asset in the specified asset category or zone in the specified
zone group
Is tests true for the selected state, “NULL” or “NOT NULL” . Do not
use all uppercase of “Is”.
For more information about data fields, event mappings, and CEF fields, see the “Data Fields,”
“Audit Events,” “Cases,” and “Events” sections in ArcSight ESM User’s Reference.
Note:
1. If the feature is enabled and both patterns are inadvertently defined, the exclude pattern
takes precedence and the include pattern is ignored.
2. Enabling the filter through an include pattern filters out all the events in the raw event field
that do not have the pattern in question. Therefore, be certain of the outcome that you
want to achieve before enabling the include filter.
3. All properties are considered unique to the agent. Therefore, avoid defining any property
multiple times for either the include or exclude patterns.
If the feature is enabled and the pattern specified for both include and exclude pattern fields is
invalid, then the Get Status command shows a message similar to the following for the filtering
state:
Custom Filtering: Events Filtering State............Events Filtering Disabled
Due to Syntax Error in User Defined Regex
The following table shows the various states of the filter under different user entry
combinations:
customeventsfilter.regex. customeventsfilter.
customeventsfiler.regex.enabled pattern.exclude pattern.include Result
false Any pattern (valid, invalid, Any Pattern (valid, The filtering is disabled.
or empty) invalid, or empty)
true Valid and non-empty Any Pattern (valid, The filtering is enabled
pattern invalid, or empty) with exclude filter.
Include pattern has no
impact.
Get Status
Examples of Patterns
Patterns are compiled through the java.util.regex.Pattern class. Any non-empty pattern
that can be compiled is considered a valid pattern. The following table shows a few examples
of valid patterns and their results:
The following 10 messages are actual raw events. Examples of how the filtering can be used to
include or exclude events from these 10 raw events are provided in the four cases that follow
this list.
1. Nov 28 22:03:21 10.0.111.2 Nov 28 2016 22:02:17: %PIX-6-106015: Deny TCP (no
connection) from 101.102.103.104/3671 to 10.0.111.22/80 flags RST ACK on interface
inside
2. Nov 28 22:03:21 10.0.111.2 Nov 28 2016 22:02:17: %PIX-2-106006: Deny inbound UDP
from 10.0.65.116/2908 to 10.0.126.55/123 on interface outside
3. Nov 28 22:03:53 10.0.111.2 Nov 28 2016 22:02:49: %PIX-2-106020: Deny IP teardrop
fragment (size = 32, offset = 0) from 101.102.103.104 to 10.0.126.55
The following cases describe the results of four distinct filtering cases on the above raw events.
Case 1:
customeventsfilter.regex.enabled=true
customeventsfilter.regex.pattern.exclude=Deny IP.*from \\d+\.\\d+\.\\d+\.\\d+
Events #3, #8, and #9 will be dropped (excluded) from the flow. This pattern is meant to
exclude all raw events that have both the patterns <Deny IP> and <from IPaddress> in the same
raw event.
Case 2:
customeventsfilter.regex.enabled=true
customeventsfilter.regex.pattern.exclude=(10.11.12.13)|(101.102.103.104)
Events #1, #3, #6, #8, and #10 will be dropped (excluded) from the flow. The pattern is meant
to exclude raw events that have the IPs 10.11.12.13 or 101.102.103.104.
Case 3:
customeventsfilter.regex.enabled=true
customeventsfilter.regex.pattern.include=(10.11.12.13)|(101.102.103.104)
Events #2, #4, #5, #7, and #9 will be dropped (excluded) from the flow. The pattern is meant to
include raw events that have the IPs 10.11.12.13 and 101.102.103.104 in them (both IPs do not
need to be in the same pattern). All other events that do not have either of the IPs will be
dropped.
Case 4:
customeventsfilter.regex.enabled=false
customeventsfilter.regex.pattern.include=(10.11.12.13)|(101.102.103.104)
be different from the previous tier 2 connector. This distributes the load evenly across the tier
2 connectors over time.
Note: Changing the persistent value to true is not recommended if there are more than 250
Logger connections.
transport.loggersecurepool.connection.persistent=true
Specifying IP Address on Devices with Multiple Network Interfaces Page 111 of 148
SmartConnector Installation and User Guide
ranges during the day. For example, you can define a configuration for 8 am to 5 pm time
range and another configuration for the 5 pm to 8 am time range.
If the time ranges of the combined alternate configurations do not span 24 hours, the default
parameters will be used to cover the time intervals not already defined in the alternates.
Defining Default and Alternate Configurations from ArcSight Console Page 112 of 148
SmartConnector Installation and User Guide
For more information about ArcSight Management Center implementations, see the ArcSight
Management Center Administrator’s Guide, “Managing Alternate Configurations”.
Note: The example above shows a “Password” column within the Configuration Wizard that
does not appear in the original .csv file. This private column does not contain actual
password data and will not be included in an exported file.
Note: For REST API connector, ensure that the events URL is correct.
1. For stand alone installations: Open the following files from the current\bin\script
folder, then set the -Djsse.enableSNIExtension property to True:
l connectors.bat
l jvmcommonparams.bat
To fix this issue, see Certificate Issue while Integrating Connector with Third-party Application.
Managing Compression
Compression lowers the overall network bandwidth used by connectors dramatically without
impacting their overall performance. By default, all connectors have compression enabled.
Connectors send event information to the Manager in a compressed format using HTTP
compression. The compression is provided at the rate of 1 to 10 or greater, depending on the
input data or the events sent by the connector.
To disable compression, add the following line to the ARCSIGHT_
HOME\current\user\agent\agent.properties file:
http.transport.compressed = false
Important: Before installing any connector, ensure that the random number pool (also known as
entropy pool) of Operating System must not be less than the ideal lower limit of 3290. For more
information, see SmartConnector or Collector Remote Connections Failing Due to Low Entropy.
To enable FIPS mode during installation, you can select Global Parameters > FIPS Mode. You
can also enable this option after installation, by running the <Installation_
directory>/Current/Bin/runagentsetup.bat file.
Note : Refer to FIPS Compliance Limitation to understand the limitations for some of the
SmartConnectors.
Limitations
There are certain limitations in implementing FIPS compliance for the following connector
destinations:
Password Management
Use the commands below to change your key and trust store passwords. Then update the
agent.properties file with the new value.
Note: Keystore files will not exist unless client authentication has been setup.
Store Values
Key Store (for Client Authorization) Trust Store
agentkeys agentcerts
agent.generator.id=<generator_id>
ESM provides the ability to upgrade SmartConnector remotely. Use the Upgrade command on
the Console to launch, manage, and review the status of upgrades for all connectors. All
communication and upgrade processes between components such as Console, Manager, and
connectors) take place over secure connections.
The Console reflects current version information for all your connectors.
Client Authentication
Follow these steps to configure a SmartConnector with a Transformation Hub (TH) destination
with client authentication in FIPS mode.
Upgrading Connectors Remotely from ArcSight Management Center Page 119 of 148
SmartConnector Installation and User Guide
Upgrading Connectors
You can upgrade a smart connector to implement the newly implemented features, mapping
improvements and overall functionality of a smart connector. You can upgrade connectors
either locally or remotely. Connectors automatically determine their upgrade status when they
start.
Note: For connectors running on Windows platforms, there is a known limitation for upgrading
the connector from its ESM destination.
As part of the connector upgrade, some folders or files are moved from the old to the new
version. Because, Microsoft Windows locks the folders or files even they are opened for a read,
upgrades could fail if locked folders or files associated with the connector installation are
accessed during the upgrade. To prevent this issue, start the connector from Start > Programs,
so that no windows are opened to run the connector, thus reducing the possibility of locked
folders or files.
Important: If you are running a 32-bit version of a SmartConnector, you upgrade it to the 64-bit
version. To run the 64-bit implementation of the connector, you must install the 64-bit version of
the SmartConnector.
Upgrade Considerations
l The versions of connectors that you want to upgrade must be available on the Manager to
which you are connected. The remote upgrade option is available only for ESM 4.0 or later
and connectors 4.0.2 or later.
l Both the Manager and the connectors you want to upgrade must be running.
l You must download current versions of the Connectors Configuration Guides from the
support website and review information specific to the connector device that you are
planning to upgrade.
l You must have the required administrative permissions.
After Upgrading
l If the upgrade is successful, the new connector starts and reports successful upgrade status.
l If the upgraded connector fails to start, the original connector restarts automatically as a
failover measure.
Note: If you are upgrading from a Connector version that does not support GEID to a version that
supports, add the following line to the agent.properties file before upgrading the connectors:
agent.generator.id=<generator_id>
Caution:
l If you have installed multiple connectors in a single JVM, select the first connector
installed in the JVM and launch the upgrade command to upgrade all connectors in the
JVM. If you select any other connector, the upgrade fails.
l If your connector has multiple Manager destinations, you must perform this process
from the primary Console. Any attempt to upgrade from a secondary or non-primary
Console destination fails.
4. The selected connectors upgrade themselves, restart, and send upgrade results (success or
failure) back to the Console through the Manager.
Note: If you are upgrading from a connector version that does not support GEID to a version that
supports it, add the following line to the agent.properties file before upgrading the
connectors:
agent.generator.id=<generator_id>
ESM provides the ability to upgrade SmartConnector remotely. Use the Upgrade command on
the Console to launch, manage, and review the status of upgrades for all connectors. All
communication and upgrade processes between components such as Console, Manager, and
connectors) take place over secure connections.
The Console reflects current version information for all your connectors.
To upgrade the connector from both source and destination to 8.2.0 or higher:
1. Go to $ARCSIGHT_HOME$\current\user\agent\agent.properties.
2. Find your destination configuration. For example:
agents[0].destination[0].params=<?xml version\="1.0" encoding\="UTF-
8"?>\n<ParameterValues>\n <Parameter Name\="cefver" Value\="0.1"/>\n
<Parameter Name\="sharedKey"
Value\="OBFUSCATE.4.9.0\:YRav1HUqxp8+D0V+oEbyRv11noZhnMzjUwdfIhDcmE1HGM/6H
qymDOu8dYk\="/>\n <Parameter Name\="protocol" Value\="Encrypted UDP"/>\n
<Parameter Name\="reconnect" Value\="-1"/>\n <Parameter Name\="port"
Value\="514"/>\n <Parameter Name\="host" Value\="<Your host>"/>\n
<Parameter Name\="forwarder" Value\="true"/>\n <Parameter
Name\="encryptionScheme" Value\="AES-GCM"/>\n</ParameterValues>\n
Upgrading to the New AES-GCM Data Encryption Scheme Page 123 of 148
SmartConnector Installation and User Guide
Note: ArcSight Management Center does not support the automatic deployment of an AUP.
As shown below, the method of uploading an AUP varies depending on the ArcSight product.
ESM
ESM or Logger
A Connector can send events to ESM and Logger simultaneously. In this configuration, it’s
helpful to use the AUP Master Destination feature. AUP Master Destination allows ESM to push
AUP content to the Connector used for its Logger destination(s). Logger is not capable of
storing or pushing its AUP content.
1. Using the Connector Configuration Wizard, add the ESM destination and set the AUP
Master Destination parameter to true (the default is false).
2. If you have not already done so, you can also add the Logger destination.
3. Copy the .aup file to ARCSIGHT_HOME\updates\ on the running ESM Manager you added
in step 1.
Connector
The AUP content is pushed from ESM to the connector, which then sends an internal event to
confirm. If the AUP Master Destination flag was set for the ESM destination, that AUP content
is used by the connector for Logger or any other non-ESM destinations.
Caution: The AUP Master Destination flag should be set to true for only one ESM destination at a
time. If more than one ESM destination is set and the flag is true for more than one, only the first
is treated as master.
Failover ESM destinations cannot be AUP Masters.
Logger
Logger has no facility to store or forward AUPs to connectors.
As System Zones are always present, all connectors connected to ESM routinely receive them
as an AUP.
Uninstalling a SmartConnector
Before uninstalling a connector that is running as a service or daemon, stop the service or
daemon. Also, be sure to remove the service files using the following command: $ARCSIGHT_
HOME/current/bin/arcsight agentsvc -r
The Uninstaller does not remove all the files and directories under the connector home folder.
After completing the uninstall procedure, manually delete these folders.
To uninstall on Windows:
1. Open the Start menu.
2. Run the Uninstall SmartConnectors program found under All Programs > ArcSight
SmartConnectors (or the name you used for the folder during connector installation).
3. If connectors were not installed on the Start menu, locate the $ARCSIGHT_
HOME/current/UninstallerData folder and run the following command: Uninstall_
ArcSightAgents.exe
Note: To perform a silent uninstall, run the command with the following parameters:
Uninstall_ArcSightAgents.exe -i silent
Note:
l The UninstallerData directory contains file .com.zerog.registry.xml with Read, Write,
and Execute permissions for everyone. On Windows platforms, these permissions are
required for the uninstaller to work. However, on UNIX platforms, you can change the
permissions to Read and Write for everyone (that is, 666).
l To perform a silent uninstall, run the command with the following parameters:
./Uninstall_ArcSightAgents -i silent
Troubleshooting
This section includes the following troubleshooting information:
...
...
The following steps will be useful in debugging this DNS resolution issue. The key is that the
bootstrap host name given should be resolvable from within the pod, which can be verified as
follows. Find the schema registry pod name:
# kubectl get pods -n eventbroker1 | grep schemaregistry
bootstrap.servers = [<hostname>]
Use the ping command to check if the host name is DNS resolvable. If it is resolvable, you will
see an output similar to the following example:
# kubectl exec eb-schemaregistry-2567039683-9l9jx -n eventbroker1 -- ping -
c 1 n15-214-137-h51.arst.usa.microfocus.com | grep transmitted
If the host name is not resolvable, please check the DNS configuration on the system.
Stream Processor metric will be lower than the connector EPS. Check that you have sufficient
resources, memory, CPU.
Continuous network failures: This may be related to the management of TCP/IP resources.
TIME_WAIT is the parameter that indicates the amount of time the node will take to finish
closing a connection and the amount of time before it will kill a stale connection. Try reducing
the value from its default. Edit the file /etc/sysctl.conf and add these lines to the end
of it (or edit the existing values):
Decrease TIME_WAIT seconds
net.ipv4.tcp_fin_timeout = 10
net.ipv4.tcp_tw_recycle = 1
net.ipv4.tcp_tw_reuse = 1
278e86760803 localhost:5000/arcsightsecurity/atlas_web-
service@sha256:c25b023afa7b7054de6aa188ed2802d24312f3c5de87b6537aa3e937476376
d8 "/bin/bash -c 'source"
2. Copy the script archive from web service container. (In this example 278e86760803)
$ docker cp 278e86760803:/eb/ws/eb_diag/eb_diag.tgz
vertica-diag.sh
eb-diag.sh
eb-sys-diag.sh
$ sh eb-diag.sh
The path is changed to a non-existing folder and .att files are no longer generated. For more
information, see the Oracle Documentation.
SmartConnector Installed on Windows Servers Taking Up Disk Space Page 133 of 148
SmartConnector Installation and User Guide
4. Check the entropy availability in the system, after starting the rngd service by the
following command:
cat /proc/sys/kernel/random/entropy_avail
storage. They will be available for event processing with some limitation.
o The beta feature Connector in TB (CTB) will be affected, since it depends on NFS storage,
which is configured on master server.
l DNS service (kube-dns) runs on the master server will become unavailable.
o Worker nodes will lose the ability to resolve host names, except for those that had already
o Likewise, the c2av-processor may cease if the worker node containing the eb-c2av-
processor goes down and system resources prevent Kubernetes from automatically
rescheduling processing on another worker node.
o If automatic re-scheduling of service instances does not occur for the Zookeeper, Kafka, or
eb-c2av-processor (that is, the node is not recoverable), run the following manual
command from the master node to delete all service instances from the failed node and
force Kubernetes to move the services to other nodes:
# kubectl delete node <Failed_Node_IP>
Note: There must be another node available in the cluster, with the zookeeper and kafka
labels, for the service instances to be migrated from the failed node.
Note: This change will increase the number of pods. You will see this difference when you run
the kubectl get pods --all-namespaces command.
l Check whether the offset is increasing in the status output. If not, then there might no data
in the Avro topic, or if Avro contains data there may be a problem.
l Verify the topic partition count and distribution.
l Check that the configured partition count matches its expected value.
l Check the partition count or replication factor for the topic using Transformation Hub
Manager.
Verifying the Health of the Transformation Hub Cluster Page 136 of 148
SmartConnector Installation and User Guide
New Properties
l unparsed.events.self.healing.enabled — The default value is False. Set to True to turn
on the functionality.
l unparsed.events.self.healing.threshold.limit— The default value is 60%. The
functionality is enabled when the limit is reached.
Note: The limit refers to the percentage of unparsed events in a given time.
To enable Self-Healing:
From the agent.properties file, ensure the unparsed.events.self.healing.enabled flag
in is set to True.
Any other commands Low conflict probability, unless another process is running the same
command.
Event Flow Commands Change the connector status (start, stop, pause).
For example, China and France would have the following locales:
agent.parser.locale.name=zh_CN
agent.parser.locale.name=fr_FR
To use the default locale for the connector machine, you can leave the locale blank. For
example:
agent.parser.locale.name=
To install a Syslog connector, select Syslog Daemon, Syslog Pipe, or Syslog File during the
installation process.
Also, if the settings dictate that certain event severities are not sent at the time connection is
restored, those events are never sent. This is true even if they were originally generated (and
cached) at a time when they would ordinarily go out.
Kiwi adds a prefix with the original address. For example, the message:
Jan 01 10:00:00 myhostname SSH connection open to 1.1.1.1
is converted to
Jan 01 10:00:00 myhostname KiwiSyslog Original Address myoriginalhost: SSH
connection open to 1.1.1.1
The Connector strips out the prefix and uses myoriginalhost as the Device Host Name.
The property related to AIX is
syslog.aix.forwarded.prefixes=Message forwarded from,Forwarded from
status.watermark.stdoutkeys=AgentName,Events
Processed,Events/Sec(SLC),Estimated Cache
Size,status,throughout(SLC),hbstatus,sent
status.watermark.stdoutkeys.alias=N,Evts,Eps,C,ET,T,HT,S
The SLC stands for Since Last Check, which means "in the last minute," assuming
status.watermark.sleeptime=60 has not been overridden.