Usm Appliance Deployment Guide
Usm Appliance Deployment Guide
Deployment Guide
Copyright © 2023 AT&T Intellectual Property. All rights reserved.
AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T
Intellectual Property and/or affiliated companies. All other marks are the property of their
respective owners.
System Overview 8
About USM Appliance 9
About USM Appliance System Architecture and Components 16
Event Collection, Processing, and Correlation Workflow 18
System Overview
This is a basic overview of AlienVault USM Appliance as it is deployed and used in your
environment. Individual subjects covered in the System Overview include the following:
l About USM Appliance — describes current risks in the business environment due to secur-
ity threats and vulnerabilities, the role of risk assessment, an overview of USM Appliance
security management capabilities for organizations to assess and mitigate risks, to detect
threats and prioritize response, and to achieve compliance.
l About USM Appliance System Architecture and Components — provides description of the
USM Appliance architecture, including major system components and functionality.
l USM Appliance Deployments — provides description of best practices for installation and
configuration of USM Appliance.
l Event Collection, Processing, and Correlation Workflow — describes the overall
USM Appliance workflow, from collection of raw log data from networked devices to ana-
lyzing and determining risk from various threats and vulnerabilities.
Although the goal of security solutions is to detect and prevent such threats, no network can
be completely protected from them all. For this reason, USM Appliance focuses on mitigating
risk, identifying vulnerabilities, detecting threats, and prioritizing response to the highest
priority threats and vulnerabilities. Measures for mitigating risk, identifying vulnerabilities, and
detecting threats include the following:
Strong security policies focus on how best to protect your most vital and at-risk assets. For
example, if a network resource is critical and the likelihood of an attack against it is high,
focus your efforts on creating security policies that monitor for such attacks, and develop
response plans to them.
The importance given to any given security event depends on three factors:
These factors are the building blocks for the traditional definition of risk: a measure of the
potential impact of a threat on your assets and the probability a threat will be carried out.
Each event generated in USM Appliance is evaluated in relation to its associated risk; in other
words, in proportion to the assets at risk, the threat represented by the event, and the
probability the threat is real. Accordingly, USM Appliance provides you the capability to
identify all high risk events, some of which will result in alarms, and allow you to properly
prioritize your response.
Asset Discovery — Combines core discovery and inventory technologies to give you visibility
into the devices that are on your network. Features include:
Performing asset discovery and inventory are the first essential steps to knowing what
systems and devices are on your network. USM Appliance combines core discovery and
inventory technologies to give you visibility into the devices you want to monitor.
Note: Before scanning a public network space, see Addendum Notice Regarding
Scanning Leased or Public Address Space.
The integrated internal vulnerability scanning keeps you abreast of vulnerabilities on your
network, so you can prioritize patch deployment and remediation. Continuous correlation of
your dynamic asset inventory with our vulnerability database provides you with up-to-date
information on the vulnerabilities in your network, in-between your scheduled scans.
Note: Before scanning a public network space, see Addendum Notice Regarding
Scanning Leased or Public Address Space.
Intrusion Detection — Coordinates incident response and threat management across your
network with built-in security monitoring technologies, emerging threat intelligence from
AT&T Alien Labs™, and seamless closed-loop workflow for rapid remediation. Features
include:
Built-in file integrity monitoring in host-based agents installed on servers alerts you to
unauthorized modification of system files, configuration files or content. Monitoring of
network access using host- and network-based detection systems identifies who tried to
access those systems, files, and content.
Behavioral Monitoring — Identifies anomalies and other patterns that signal new, unknown
threats in your network, as well as suspicious behavior and policy violations by authorized
users and devices. Features include:
l NetFlow Analysis
l Service Availability Monitoring
l Network Protocol Analysis / Packet Capture
Integrated behavioral monitoring gathers data to help you understand “normal” system and
network activity, which simplifies incident response when investigating a suspicious
operational issue or potential security incident. Full packet capture enables complete
protocol analysis of network traffic, providing a comprehensive replay of the event that
occurred during a potential breach.
Security Information and Event Management (SIEM) — Identify, contain, and remediate
threats in your network by prioritizing your risk and response. Features include:
l Log Management
l Integrated OTX Threat Data
l SIEM Event Correlation
l Incident Response
You can automatically correlate log data with actionable security intelligence to identify
policy violations and receive contextually relevant and workflow-driven response procedures.
You can also conduct forensic analysis of events using digitally signed raw logs. The raw logs
also can be used to satisfy compliance requirements for evidence preservation.
A web-based user interface provides access to all the security management functions
provided by AlienVault USM Appliance. The USM Appliance User Guide provides information on
accessing and using all of the tools in USM Appliance and performing specific security
management operations from this user interface.
In addition, the "Using USM Appliance for PCI Compliance" section in the USM Appliance User
Guide provides detailed information on using USM Appliance to help achieve PCI DSS
compliance. This information can also be useful in meeting compliance regulations for other
standards as well.
Alien Labs
Alien Labs is an internal security research team at AT&T Cybersecurity, consisting of security
experts who perform ongoing research and analysis of emerging global threats and
vulnerabilities. This team constantly monitors, analyzes, reverse-engineers, and reports on
sophisticated zero-day threats, including malware, botnets, and phishing campaigns.
The team regularly publishes threat intelligence updates to the USM Appliance platform in
the form of correlation directives, IDS signatures, vulnerability signatures, asset discovery
signatures, IP reputation data, data source plugins, and report templates. The team also
provides up-to-the-minute guidance on emerging threats and context-specific remediation
guidance, which accelerates and simplifies threat detection and response.
The Alien Labs team also leverages the collective resources of OTX, the world’s largest crowd-
sourced repository of threat data to provide global insight into attack trends and malicious
actors. The security experts at AT&T Cybersecurity analyze, validate, and curate the global
threat data collected by the OTX community.
The Security Research Team improves the efficiency of any security monitoring program by
delivering the threat intelligence necessary to understand and address the most critical
issues in your networks. They perform the analysis, allowing you to spend your scarce time
remediating and mitigating the threats, rather than researching them.
The OTX community and corresponding threat data is one of the critical data sources used by
the Alien Labs team to generate AlienVault Threat Intelligence. Alien Labs leverages the
collective resources of the OTX by analyzing, validating, and curating the global threat data
contributed by the OTX community.
AlienVault OSSIM Limitations: AlienVault OSSIM doesn't include the USM Appliance
Logger.
AlienVault USM Appliance are built to provide customers with an easy-to-use solution to help
monitor the security of their infrastructures. They are delivered in three form factors:
l Hardware appliances,
l Virtual appliances, and
l Amazon appliances.
These appliances include the AlienVault operating system and USM Appliance software
necessary to provide the built-in Unified Security Management® (USM) security capabilities.
The appliances include an option to access the CLI of the appliance from the AlienVault
Console. This is done by selecting the "Jailbreak System" option from the AlienVault Setup
menu, which provides limited shell access to the appliance. This option is available to help
customers troubleshoot network issues, data collection issues, and to help the AlienVault
Support team work with you to resolve any issues you encounter with the product while
working on a support case.
As per the AlienVault Terms and Conditions, AlienVault does not allow modification of system
level configuration files, database, or the underlying tools used to provide the functional
capabilities offered by the product. Although AlienVault has integrated various open source
tools, the configurations used by USM Appliance are designed to provide explicit functionality
as described in the product documentation. Changes made to the operating system, tool
configurations, or software can destabilize the appliance and prevent the appliance from
working properly.
Our goal is to provide a simple, stable, easy-to-use security platform to help you monitor your
environment for threats. Keeping the system stable and free from such modifications will
prevent unnecessary downtime, performance issues, and maintenance.
If you have any questions, please contact AT&T Cybersecurity Technical Support.
AlienVault USM Appliance and AlienVault OSSIM® contain a number of built-in tools for asset
and network discovery, enumeration, and vulnerability scanning. These tools utilize various
methods for discovery, often by mimicking the behavior of the traffic which they are
attempting to protect you from in order to ascertain your exposure to such traffic. This
leaves the potential for legitimate scans to be misinterpreted as malicious traffic.
In an effort to combat malicious behavior on the internet, several internet service providers
and hosting providers have added scanning restrictions in their contracts. And a number of
countries have written laws regarding these practices. In many cases, the response for
violation of these rules may range from a written warning to contract cancellation and even
civil or criminal charges. As a result, it is very important to check with your internet service
providers, hosting providers, and local government to establish any legal or contractual
restrictions before attempting to scan hosts or networks outside of your internal network
space.
As a unified security platform, USM Appliance combines several critical security technologies
in one integrated platform. USM Appliance can be deployed as a single appliance or
distributed across multiple servers (either virtual or hardware) to provide additional scalability
and availability. The following figure presents a high-level overview of the AlienVault
USM Appliance system architecture.
The three components of the USM Appliance architecture that work together to monitor and
provide security in your environment are
l USM Appliance Sensor(s) — Deployed throughout the network to collect and normalize
information from any devices in your network environment that you want to manage with
USM Appliance. A wide range of plugins are available to process raw logs and data from
various types of devices such as firewalls, routers, and host servers.
l USM Appliance Server — Aggregates and correlates information that the USM Appliance
Sensors gather. (This is USM Appliance’s SIEM capability.) Provides single pane-of-glass
management, reporting, and administration through a web-based user interface.
l USM Appliance Logger — Securely archives raw event log data for forensic research and
compliance mandates. (This archive of raw event data is also referred to as cold storage.)
1. USM Appliance Sensors passively collect logs and mirrored traffic, and actively probe assets
in the network, to obtain information about the current network activity going on in your
environment..
2. The USM Appliance Sensor parses the raw data from different sources and transforms it
into a stream of events, each having a common set of data fields. It then sends the events to
the USM Appliance Server.
3. The USM Appliance Server correlates the events and assesses their risk.
4. The USM Appliance Server sends the events to the USM Appliance Logger, which signs
them digitally and stores them for forensic analyses, archival, and regulatory compliance.
For a more in-depth description of event collection and processing, see Log Collection and
Normalization in USM Appliance. Also refer to the "About the Use of Policies in USM Appliance"
and "About Correlation" topics in the USM Appliance User Guide.
l Simple Deployment Model — All USM Appliance components (Sensor, Server, and Logger)
are combined in a USM Appliance All-in-One appliance. This configuration is most often
used in smaller environments, as well as for demonstrations and proof-of-concept deploy-
ments.
l Multi-tier, Distributed Deployment Model — This model deploys each AlienVault
USM Appliance component (Sensor, Server, and Logger) as an individual virtual or hard-
ware appliance to create a distributed system topology.
The distributed deployment model also comes in two versions, USM Appliance Standard and
USM Appliance Enterprise, that increase scalability and performance by provisioning
dedicated systems for each USM Appliance component. See USM Appliance Deployment
Examples for more details on USM Appliance deployment models and examples.
AlienVault OSSIM Limitations: AlienVault OSSIM doesn't include the USM Appliance
Logger.
All AlienVault USM Appliance's security monitoring and management capabilities stem from
its overall ability to collect data from devices, transform the data into a common set of data
fields that define events, and then process, filter, and correlate those events to identify
potential threats and vulnerabilities, or real occurrences of attacks. USM Appliance also
assesses the importance and priority of events by assigning risk values based on the value of
the underlying assets, the source and nature of the identified threat, and the likelihood of
successful attack. More detail on this overall workflow is provided in this section for the
following topics:
the USM Appliance Sensor. For other devices, USM Appliance goes out and retrieves the logs.
In both cases, data in the logs is normalized to extract and store information in common data
fields that define an event: IP addresses, host names, user names, interface names, and so on.
These are the events that a security analyst can analyze in USM Appliance to uncover threats
and vulnerabilities, and assess an organization's risk.
The logs are broken down into their message type, and the information from them is used to
populate a standard set of fields that define an event (for example, date, sensor, plugin_id,
priority, src_ip, src_port, dst_ ip, dst_port, username, userdata1).
Note: For a complete list of normalized event fields, see "Event Details – Fields" in the
USM Appliance User Guide.
l Parsing the event priority and reliability — Each event type is assigned a priority, which
indicates how urgently the event should be investigated, and a reliability score, which
assesses the chance the event is a false positive.
l Checking asset values to calculate a risk score — The USM Appliance Server maintains an
inventory of known devices on the network, with an associated asset value for each
device, defining their importance to the organization. This asset value is then weighed
against the event’s priority and reliability score to produce a risk value. Higher risk scores
help analysts know what is most important to examine first.
For more information on how USM Appliance calculates risk, see "USM Appliance Network
Security Concepts and Terminology" in the USM Appliance User Guide.
l Application of the event taxonomy — There are system and network events common
across many system types, no matter the source of the event or its original data format.
AlienVault maintains a hierarchical categorization of event types (referred to as a tax-
onomy) to which USM Appliance can match events in policies and correlation directives.
l Cross-checking reputation data — The USM Appliance Server checks the IP addresses spe-
cific to each event against a reputation database of Internet addresses. IP addresses that
match are flagged for future reference and follow-up.
After performing these operations, and based on specified user policy and filter conditions,
the USM Appliance Server will save selected or qualified events in a SIEM events database for
further analysis and correlation. The events database commonly resides on the same host as
the USM Appliance Server, but in large deployments, the database can be installed on a
separate host for increased performance and capacity.
l Alarm processing starts when the conditions of a correlation directive are met.
l Alarms may trigger on a single event matching certain conditions, or may require a specific
sequence of events to trigger.
l Alarm processing may continue over a matter of hours. Alarms that appear in the system
may indicate they are still processing additional incoming events to further corroborate
detection.
l Alarms are themselves events (directive events), that can feed into other correlation dir-
ectives once they are triggered, so you can create cascading levels of alarms.
In addition, when you sign up for the Open Threat Exchange® (OTX™), USM Appliance is
configured to receive raw “pulse” data and indicators of compromise (IoCs), from OTX.
USM Appliance correlates that data and alerts you to any related OTX pulse and IP
reputation-related security events and alarms when it detects those same IoCs interacting
with assets in your environment.
As soon as you log into USM Appliance, you can see from the USM Appliance dashboard which
OTX indicators are active in your environment. You will receive immediate notification in the
form of an event or an alarm when a malicious IP address identified in OTX communicates
with any of your system assets, or when USM Appliance identifies any other IoCs seen in OTX
are active in your network.
Note: For more information about how USM Appliance alarms are processed and
correlated, see "Alarm Management" in the USM Appliance User Guide.
l View of security events with options to search, filter, and group events based on specific
event field values. To use this option, select Analysis > Security Events (SIEM) from the
web UI.
l View of raw log events displayed with a specific time frame. To use this option, select Ana-
lysis > Raw Events from the web UI.
For more information on viewing events and performing other security management
operations from the USM Appliance web UI, see "Reviewing Security Events (SIEM)" and
"Reviewing the Raw Logs" in the USM Appliance User Guide.
Firewall Permissions 34
In addition to being easier to set up and operate than most alternative systems,
USM Appliance also has a modular architecture that provides flexibility in configuring both
performance and capacity. The USM Appliance All-in-One combines all components of the
USM Appliance solution in a single virtual or hardware machine. In addition, based on the
present or future needs of your specific environment, you can also scale individual
components in the USM Appliance architecture to run on dedicated machines, add sensors to
collect logs from more devices and networks, and implement other features such as high
availability, monitoring of devices on remote networks, and remote management of
USM Appliance.
Note: For more information and a summary of deployment and configuration options,
refer to USM Appliance Deployment Types. This section also provides examples of
different size and scale deployment configurations of USM Appliance.
In addition, you may need to consider other aspects of the specific security management use
cases you plan to address with your USM Appliance deployment, which may include but is not
limited to
l Specific requirements for event correlation, data storage, and archiving you may have
Your AlienVault technical representative can help you analyze your environment to determine
system requirements and can provide you with a questionnaire that lists different factors
affecting system sizing and scaling, which can help you choose the right system
configuration.
Note: The AlienVault USM Appliance data sheet describes typical event handling
performance and capacity benchmarks for a number of different USM Appliance system
configurations and options.
Some of the high level steps in performing USM Appliance configuration include
You can use the AlienVault Setup menu to perform most of these tasks. Information on
performing these tasks is provided in the USM Appliance Initial Setup section.
This section introduces the various USM Appliance components and explains the different
deployment types.
There must be at least one USM Appliance Sensor. Depending on your corporate
requirements, more may be desirable. This is particularly true if you have distributed branches
on subnets subordinate to the network at your headquarters.
There is usually just one USM Appliance Logger. However, under some circumstances, two
may be used. For information, contact AlienVault Technical Support.
Simple Deployment
Deploys all AlienVault USM Appliance components — Sensor, Server, and Logger — in a single
machine called USM Appliance All-in-One.
This deployment model has most applicability for smaller environments, for testing, and for
demonstrations.
Complex/Distributed Deployment
This model deploys each AlienVault USM Appliance component — Sensor, Server, and Logger
— as an individual virtual or hardware machine to create a distributed topology.
This deployment model comes in two versions that increase scalability and performance by
provisioning dedicated systems for each component.
l USM Appliance Enterprise Server — includes the Enterprise Server and Enterprise Data-
base
l USM Appliance Enterprise Sensor
l USM Appliance Enterprise Logger
Note: The USM Appliance Enterprise solution is not available as a virtual machine.
USM Appliance
USM Appliance Standard USM Appliance Enterprise
All-in-One
Virtual x x
Appliance
Hardware x x x
Appliance
In this example, a USM Appliance All-in-One virtual or hardware appliance is deployed behind
the corporate firewall.
The USM Appliance Sensor component on the USM Appliance All-in-One collects logs from
the following networks:
l Office network
l Wireless network
l DMZ
l Firewalls
The USM Appliance All-in-One also monitors the network traffic through the connected
switches.
This model differs from the Simple Deployment example in that it uses a USM Appliance
Remote Sensor for monitoring at a remote office that operates on a subnet. USM Appliance
All-in-One is deployed on the main network.
USM Appliance Remote Sensor collects logs and monitors traffic specific to the subnet. It
then sends these data to USM Appliance All-in-One on the main network for correlation and
risk assessment.
Extended simple deployment example: USM Appliance All-in-One and a remote sensor
In this deployment example, each office subnet has a remote sensor deployed to collect logs
and monitor traffic.
On the main network at headquarters, a single USM Appliance Server, a Logger, and at least
one Sensor install as individual appliances to increase scalability and performance.
All USM Appliance Sensors connect to one USM Appliance Server where correlation and risk
assessment occur.
The USM Appliance Server forwards the events and alarms to the USM Appliance Logger for
long-term storage.
Warning: In USM Appliance version 5.4, AlienVault updated its Network IDS to include
the Hyperscan library, which requires the CPU to support SSSE3 (Supplemental
Streaming SIMD Extensions 3) instruction set. To check if your CPU contains SSSE3, see
our knowledge base article.
Name Value
Important: The virtual machines must operate in Hardware Virtualization Mode (HVM).
Paravirtualization is not supported at this time as the device requires SCSI device Bus
(SDx) connectors.
Total Cores1 8 4 8
RAM (GB)2 16 8 24
Virtualization VMware virtual hardware version 10+ (ESXi 5.5 and later)3
Environment
Hyper-V 3.0+ (Windows Server 2008 SP2 and later)
Supported Browsers
AlienVault supports the following browsers. All USM Appliance releases are tested on the
most recent version of the browsers and one version prior to the most recent.
Supported Browsers
Firewall Permissions
USM Appliance components must use particular URLs, protocols, and ports to function
correctly.
Note: If deploying USM Appliance All-in-One, you only need to open the ports
associated with the monitored assets, because All-in-One includes both USM Appliance
Server and USM Appliance Sensor, therefore the communication between them
becomes internal.
If your company operates in a highly secure environment, you must change some permissions
on your firewall(s) for USM Appliance to gain access.
AlienVault
Port Applicable
Server URL Features in
Number Release
Use
External URLs and port numbers used by USM Appliance features (Continued)
AlienVault
Port Applicable
Server URL Features in
Number Release
Use
7 This rule is more granular than the default one in msauth_rules.xml, because it matches the
different failure reasons reported by event 4625.
The following diagram shows the port numbers used by the USM Appliance components to
communicate with each other and with the monitored assets. The direction of the arrows
indicate the direction of the network traffic.
l On the hosts you plan to deploy the AlienVault HIDS agents, to allow for initial deploy-
ment, you must open TCP port 135, either TCP port 139 or TCP port 445, and high TCP
ports (1024 or above). See Microsoft's documentation on port requirements for Dis-
tributed File System Namespaces (DFSN).
l You also need to open UDP port 1514 for ongoing communication between the Ali-
enVault HIDS agent and the USM Appliance Sensor. For assistance on deployment,
see Deploy AlienVault HIDS Agents.
l To use SNMP in USM Appliance, you need to open UDP port 161 on the SNMP agent
and UDP port 162 on the USM Appliance Sensor. For more details, see SNMP Con-
figuration in USM Appliance.
l If running USM Appliance versions prior to 5.6.5, you also need to open TCP port 9391
on the Sensor for the vulnerability scanner. But starting from version 5.6.5, vul-
nerability scans are conducted using the UNIX domain sockets, so port 9391 is no
longer used.
Note: When enabling the VPN, you do not need to open the other ports between the
USM Appliance Sensor and the USM Appliance Server, because all communication goes
through the VPN tunnel.
If you enable VPN, in addition to having port 33800/TCP open for the VPN tunnel, you also
need to allow TLS transport for that port in case you use a firewall/security device that can
perform inspection or interception of TLS traffic.
You can manage the USM Appliance hardware either locally or remotely, through the IPMI or
HPE iLO interface. Enabling remote management adds the ability to access the appliance if
the operation system is not responsive or does not allow access from the network.
Starting from version 5.4, AlienVault ships USM Appliance hardware built on Hewlett Packard
Enterprise (HPE) ProLiant Gen9 or Gen10 Servers. All prior versions of USM Appliance
hardware are built on Supermicro servers. For detailed hardware specifications, see the
USM Appliance data sheet on the AlienVault website.
The power switch is located on the opposite side of the appliance from the cable ports.
2. On the rear of the appliance, connect the monitor cable to the VGA port, as applicable.
l Rear view of USM Appliance on HPE ProLiant DL360 Gen10 Servers with 1Gb interfaces
l Rear view of USM Appliance on HPE ProLiant DL360 Gen10 Servers with 10Gb
interfaces
The monitor displays the USM Appliance login screen. See USM Appliance Initial Setup for
details.
l IPMI on USM Appliance hardware uses IP address 192.168.200.200 by default, and it does
NOT failover to a shared LAN port (eth0 or eth1). This effectively makes it inaccessible to
anyone who is not on that internal network.
l AlienVault recommends that you deploy IPMI on an isolated network segment or virtual
LAN (VLAN). In addition, configure the IPMI port to be dedicated. See Configuring a VLAN
for IPMI Access.
l If the IPMI port must be accessed outside of the network security perimeter, set up a VPN
server to provide that access.
For more best practices on managing servers with IPMI features, see Supermicro's
documentation.
Follow these steps to configure IPMI on each USM Appliance hardware installation except the
Remote Sensor, which is on a different IPMI firmware version. You should have connected a
monitor and a keyboard to USM Appliance and an Ethernet cable to the IPMI port on the rear
of the machine.
For IPMI configuration on the Remote Sensor, see Configuring USM Appliance Remote Sensor
for IPMI.
3. Use Tab or the Up/Down and Right/Left Arrow keys to navigate to the Advanced tab.
l If you have a DHCP server in the same network as the USM Appliance hardware, use
the Arrow keys to select IP Address Source, and then use plus (+) or minus
(-) to change IP Address Source to DHCP.
l If you do not have a DHCP Server, use the arrow keys to select Static.
7. (Static IP address users only) Use the Arrow keys to access the IP Address, Subnet Mask,
and Gateway Address fields and type the appropriate values in each for your device.
Note: Each machine comes with a default IP address; you may either use this IP
address or configure a new one.
8. Save the changes by pressing F10, and then press ESC to exit the BIOS SETUP UTILITY.
9. You must restart the machine for your changes to take effect.
The USM Appliance Remote Sensor requires its own IP address, netmask, and gateway IP
addresses.
5. Use Down Arrow to select Update IPMI LAN configuration and press Enter.
6. Use Tab or Right Arrow to go to the column labeled [No]; toggle it to [Yes] by using plus
(+)or minus (-) and press Enter.
l If you have a DHCP server in the same network as USM Appliance Remote Sensor:
b. Toggle Static to DHCP, using plus (+) or minus (-), and press Enter.
l If you do not have a DHCP Server, use Tab or Arrow to go to Static; press Enter.
8. (Static IP address users only) Use Tab to access the Station IP address, subnet mask, and
gateway IP address fields, and type the values applicable to your device in each; press
Enter.
Note: Each machine comes with a default IP address; you may either use this IP
address or configure a new one.
You must restart the machine for your changes to take effect.
After you have configured IPMI on USM Appliance, you can connect to USM Appliance through
a browser from any computer that is connected to the same network.
1. Open a browser on the computer that can access USM Appliance and type the IPMI IP
address assigned in the configuration step.
2. Type the default factory username "ADMIN" and password "4L13NV4ULT_0", then click
Login.
3. After you have successfully logged in, change the default password for security purposes.
4. After logging in again, enable display of the remote USM Appliance console and configure
redirection:
Note: If the browser blocks it, click the top of the menu bar and select Download
File. Then open it from your Downloads folder.
5. When you receive the Java prompt asking whether you want to run the application, click
Run.
Note: If you receive a warning that the application is untrusted and asking if you
want to make an exception, click Continue.
1. Log into the machine through the browser and enter the IPMI IP address you previously
configured.
2. Go to Configuration > Network.
3. Within the VLAN section of the page, click enable.
4. In the VLAN ID field, type a value between 1 and 4095 to identify the VLAN.
By selecting Dedicate, you configure IPMI to connect over the IPMI port at all times.
Otherwise, it fails over automatically to the two shared LAN ports (eth0 and eth1).
6. Click Save.
AlienVault recommends that you keep the IPMI firmware up-to-date. See the table below for
the IPMI firmware versions on USM Appliance. You can download the firmware files directly
from Supermicro Products. Search for the motherboard model to locate the files.
X10SLH-F REDFISH_X10_381_unsigned.zip
1. Open a browser and type the IPMI IP address of your USM Appliance in the navigation bar.
The firmware update displays a message about how the update mode affects the device.
Important: After USM Appliance is in the firmware update mode, the update
process resets the IPMI device, even if you cancel the update.
4. Click Browse to choose the firmware file. Make sure that the firmware version is correct
before proceeding.
6. Select Preserve Configuration on the following page, so that the system does not
change your configuration during reboot.
The update process displays a message showing what percentage of the upload has
completed.
Warning: Do not interrupt the process. After the upgrade completes, the device will
automatically reboot, and you will need to log in again.
10. Click Configuration > Date and Time to update the date and time.
For more details on IPMI, see the IPMI User's Guide on the Supermicro website.
All USM Appliance hardware provided by HPE includes the HPE iLO 4 standard features with
no additional cost or license requirements.
Before configuring HPE iLO on USM Appliance, you must have performed the following:
l Connect an Ethernet cable to USM Appliance through the HPE iLO management port.
l Connect USM Appliance to a power outlet.
l Make sure you can reach USM Appliance over the network from the machine you are on.
l Install the Java version recommended by HPE on your machine. See the vendor website for
up-to-date information.
l If not using DHCP, acquire the IP address you want to assign to HPE iLO.
The USM Appliance hardware provided by HPE has iLO disabled by default. You need to enable
HPE iLO from the BIOS before you can use it.
The HPE iLO on the USM Appliance hardware is pre-configured to obtain the IP address from
a DHCP server. If you want to use a static IP address instead, you have to change the
configuration from the system BIOS.
You can use the HPE iLO web interface to manage iLO.
1. Open a web browser and type the IP address assigned to HPE iLO.
The IP address is displayed at the top right corner of the console during a system Power-
On Self-Test (POST).
2. Enter the user name and password shown on the sticker label of the appliance.
Each USM Appliance appliance includes a sticker label from the manufacturer, where you
can see the HPE iLO's default settings, including the serial number, user name, DNS name,
and password.
For security reasons, AlienVault recommends that you change the password after you have
successfully logged in. You can also add, delete, or edit users from the HPE iLO web interface.
AlienVault recommends that you restrict access to HPE iLO by configuring a VLAN, and make
sure that the VLAN is connected to a secure network.
Note: According to the 4 User Guide, when the Shared Network Port is active and
VLAN is enabled, the iLO Shared Network Port becomes part of a VLAN. All network
devices with different VLAN tags will appear to be on separate LANs, even if they are
physically connected to the same LAN.
5. In the VLAN Tag field, type a value between 1 and 4094 to identify the VLAN.
All VLANs must have a VLAN ID, and all network devices that you want to communicate
with each other must have the same VLAN tag.
6. Click Submit.
The USM Appliance hardware provided by HPE has iLO disabled by default. You need to enable
HPE iLO from the BIOS before you can use it. Should you decide to disable it later on, you can
do so from the BIOS again.
AlienVault recommends that you keep the HPE iLO firmware up to date. See the table below
for the HPE iLO firmware versions on USM Appliance.
HPE provides different ways to update the iLO firmware, but AlienVault recommends using
the HPE iLO web interface method. It contains two main steps:
1. Download the HPE iLO firmware image file. See Obtaining the iLO firmware image file by
the vendor.
2. Update the firmware from the HPE iLO web interface. See Updating iLO or server firm-
ware by using the iLO web interface by the vendor.
For more details on HPE iLO, see the HPE iLO 4 User Guide on the Hewlett Packard Enterprise
website.
AlienVault offers USM Appliance for VMware in a Open Virtual Appliance (OVA) package,
which is a tar archive file with the OVF (Open Virtualization Format) directory inside. You can
deploy USM Appliance using VMware vSphere Desktop Client, which this document entails.
For instructions specific to a different VMware client, consult the vendor documentation
directly.
Prerequisites
Before deploying the USM Appliance virtual machine, make sure you have met the Minimum
Hardware Requirements for Virtual Machines as well as the Minimum Virtual Machine
Requirements.
You must also have downloaded the VMware image file from AlienVault and unzip it to a
location where you can access from the VMware vSphere Client.
Note: The deployment steps are the same for USM Appliance free trials and licensed
versions.
3. On each of the following screens, click Next to keep the default values:
4. On the Ready to Complete screen, select Power on after deployment, located below the
list of deployment settings and click Finish.
Deployment of the virtual image requires several minutes. After deployment is finished,
VMware displays:
Important: If deploying the OVA file fails and you receive the following error:
5. Click Close.
6. Connect to the USM Appliance virtual machine in one of the following ways:
l On the Inventory screen, click Virtual Machine and in its submenu; click Open
Console.
l In the console toolbar, click the console icon.
Note: Since USM Appliance Sensors do not have a web UI, you cannot access them
through a browser. Follow Configure the USM Appliance Sensor after Deployment to
finish the configuration.
USM Appliance virtual machines have six network interfaces: one for management (eth0) and
the other five for log collection and/or traffic capture on the network segment monitored.
Connecting the monitoring interface(s) to a SPAN (Switched Port Analyzer) port, sometimes
also called a mirror port, provides the following capabilities:
l Network IDS
l NetFlow and traffic monitoring
l Passive asset identification
For USM Appliance to monitor traffic from your physical network, you need to allocate a
spare NIC (Network Interface Card) on your VMware server to pass the SPAN port traffic to
the virtual network. AlienVault recommends that you SPAN your internal firewall ports,
connect the SPAN port to the spare NIC, and then associate the spare NIC with a vSwitch.
Note: The following procedure is based on the ESXi 6.5 Web Client. If you are using a
different client or an earlier version of VMware products, please consult the vendor
documentation accordingly.
a. Enable port mirroring on the network you want USM Appliance to monitor.
b. Allocate a spare NIC on your VMware server to receive the mirrored traffic.
c. Associate your spare NIC with the vSwitch.
2. In the ESXi 6.5 Web Client, click Networking in the Navigator and select the Port groups
tab.
Note: In VMware terminology, a port group acts like a network hub, making the
network traffic undergoing the vSwitch visible to all interfaces connected to this
port group.
b. In VLAN ID, select 4095 for the VGT (Virtual Guest Tagging) mode.
See VLAN Configuration in the VMware documentation for more information about
VLAN tagging modes.
c. In Virtual switch, select the vSwitch associated with the spare NIC configured in Step 1.
This setting assures any virtual interface connected to this port group will be able to
enter promiscuous mode and capture traffic from any other virtual interfaces
connected to the vSwitch.
5. Next, you need to edit the USM Appliance node you have deployed and connect one or
more interfaces to the port group.
And lastly, you need to configure network monitoring in the AlienVault Console:
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
4. Use the keyboard arrow keys to move to the interface assigned to the SPAN port group
configured previously, select the interface by pressing the spacebar, and then press Enter
(<OK>).
5. Press <Back> until you are on the AlienVault Setup menu again. Select Apply all Changes.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
Repeat the steps for every listening interface you want to enable.
Microsoft Hyper-V is a hypervisor that lets you create and manage virtual machines by using
virtualization technology built into Windows Servers. Starting from USM Appliance version
5.3.4, AlienVault offers USM Appliance for Hyper-V in a Virtual Hard Disk (VHD) format, tested
on the latest version of the following Windows operating systems
You can deploy USM Appliance using Microsoft Hyper-V Manager, an administrative tool for
managing local and remote Hyper-V hosts.
Prerequisites
The requirements for deploying USM Appliance in Hyper-V are the same as for the other
virtual appliances that AlienVault supports. See Minimum Virtual Machine Requirements for
details. However, to meet the requirements, you must enable hyper-threading from the
system BIOS first. Refer to this virtualization blog post from Microsoft for explanation.
You must also have downloaded the Hyper-V image file from AlienVault and unzip it to a
location where you can access from the Hyper-V Manager.
Note: Due to the size of the image file, the built-in zip utility on Windows Server 2008 (all
versions) cannot unzip the file. You can use 7-Zip or WinZip instead.
3. Go to Specify Name and Location and type a name for your new virtual machine
4. Click Next.
5. Choose Generation 1 for this virtual machine and click Next.
l For USM Appliance Standard deployment options (including Standard Server, Standard
Logger, and Standard Sensor), type 24576 MB.
l For USM Appliance All-in-One, type 16384 MB.
l For USM Appliance Remote Sensor, type 8192 MB.
7. Click Next.
8. Select the network adapter to the network you want to monitor and click Next.
9. Select Use an existing virtual hard disk and click Browse to locate the Hyper-V VHD file.
10. Click Next and on the summary page, click Finish.
1. Select the USM Appliance virtual machine that you created and click Settings.
l For USM Appliance All-in-One and USM Appliance Standard deployment options
(including Standard Server, Standard Logger, and Standard Sensor), select 8 number of
virtual processors.
l For USM Appliance Remote Sensor, select 4 number of virtual processors
3. Click Apply.
4. Click Add Hardware > Network Adapter > Add to add network interfaces.
Note: USM Appliance All-in-One supports 6 network interfaces and USM Appliance
Remote Sensor supports 2 network interfaces. AlienVault recommends that you
have at least two network interfaces, one for management and the other for
network IDS.
5. (Optional) If using VLAN, in VLAN ID, select Enable virtual LAN identification and specify
the VLAN ID in the box.
7. Click Apply.
8. Repeat Steps 4 through 7 to add more network interfaces.
To configure port mirroring, follow the steps below when adding network adapters
1. In the left panel, click the plus sign (+) next to the network adapter you are adding, and
then click Advanced Features.
2. Locate Mirroring mode in the Port mirroring section, select Destination, and then click
OK.
4. To setup virtual switches in promiscuous mode for monitoring external traffic, run the
following:
where
With this example, all traffic going through the virtual switch will be mirrored to any VM
whose mirroring mode has been set to "Destination".
Note: The -ManagementOS option does not allow you to specify a switch, so all
virtual switches, including the shared management NIC port, will be set in monitoring
mode.
6. To setup virtual switches in promiscuous mode for monitoring both internal and external
traffic, run the following:
1. Select your virtual machine and click Start on the right panel.
2. The system initialization screen appears and you will see the console to access
USM Appliance from the command line.
l ap-northeast-1
l ap-northeast-2
l ap-south-1
l ap-southeast-1
l ap-southeast-2
l eu-central-1
l eu-west-1
l eu-west-2
l us-east-1
l us-west-1
l us-west-2
7. Click the square to the left of an instance, and then click Next: Configure Instance
Details.
8. Select Launch as EBS-optimized instance to improve the disk performance.
9. Click Next: Add Storage.
10. Click Volume Type and choose "Provisioned IOPS". For optimal performance, set the
IOPS value to "20000". See Amazon documentation for more details.
11. Click Next: Tag Instance.
12. In the Value field, type a name for your appliance, and then click Next: Configure Secur-
ity Group.
13. Click Add Rule to add HTTPS. This protocol allows Internet traffic to reach your
USM Appliance instance.
Note: You do not need to add this rule if you are configuring a USM Appliance
Sensor, which does not have a web interface.
14. (Optional) Click Add Rule to add HTTP. This protocol allows web traffic redirection to work
in your USM Appliance instance.
Note: You do not need to add this rule if you are configuring a USM Appliance
Sensor, which does not have a web interface.
1/2 checks. The image has been deployed, but it is not accessible. The image is still
configuring.
Note: Wait a few minutes before trying to log in for the first time. The database may
need more time to finish initializing. If you try to log in before, you may see a Database
Connection error in the browser.
SSH root@<publicDNS>
where
3. After logging in for the first time, the system will request a password change.
You'll want to set up and configure the USM Appliance Server first. If you purchased
USM Appliance Standard, Enterprise, or Remote Sensors, next you will want to configure the
sensor by providing the USM Appliance Server IP address and Framework IP address through
the AlienVault Setup menu. Then, there are some final configuration steps on the web UI.
Prerequisites
l USM Appliance All-in-One — You must have already configured the USM Appliance All-in-
One before you can complete the sensor configuration.
l USM Appliance Standard or Enterprise — You must have already configured the
USM Appliance Server and have its IP address available.
l If you intend to configure VPN in your USM Appliance deployment, you must set up a VPN
tunnel for the client beforehand. This provides you with a VPN IP address that you use in
this configuration task. For details, see VPN Configuration.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
4. Type the IP address of the USM Appliance Server the sensor should contact and press
Enter (<OK>).
Important: If this USM Appliance deployment will use VPN, substitute the VPN IP for
the physical IP address.
6. Type the same IP address you did for the server and press Enter (<OK>).
7. Press <Back> until you are on the AlienVault Setup menu again. Select Apply all Changes.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
A new screen containing a form appears. To answer the monitor network question, see
About Correlation Contexts for assistance.
You will need to configure the USM Appliance Logger if you are deploying one of the
following:
Unlike the Standard/Enterprise USM Appliance Server and Sensors, the USM Appliance
Logger can only be configured through the USM Appliance web UI.
Prerequisites
l You must have already deployed the USM Appliance Server and USM Appliance Logger,
and completed the initial setup tasks.
l If using USM Appliance version 5.5.1 or later, you must set a remote key on the USM Appli-
ance Server for the USM Appliance Logger to authenticate the system. To set the key, go
to Configuration > Administration > Main > Login Methods/Options > Remote login
key. While there is no constraint on the key, AlienVault recommends that you use some-
thing difficult to break, such as a GUID (Globally Unique Identifier).
l If you intend to configure VPN in your USM Appliance deployment, you must set up the
VPN tunnel beforehand. This provides you with a VPN IP address that you use in this con-
figuration task. For details, see VPN Configuration.
l If you do not plan to use a VPN, be aware that USM Appliance Logger receives events
through TCP/40001. Make sure traffic can go through that port on your network.
Important: Because the USM Appliance Server forwards events to the USM Appliance
Logger, the logger is considered the parent server. For this reason, you must add the
USM Appliance Server as a child to the USM Appliance Logger, and then configure event
forwarding on the USM Appliance Server.
3. Type the IP address and root password of the USM Appliance Server; click Save.
Important: If this USM Appliance deployment uses VPN, substitute the VPN IP for
the physical IP address.
4. Return to the Servers screen, and select the USM Appliance Logger; click Modify.
5. On the next page, click No for all the options on the form except Log; click Yes there.
6. Click Save.
You should now see both the USM Appliance Server and the USM Appliance Logger listed.
4. On the next page, type the credentials for the Remote Admin User and the Remote
Password.
These are the admin user credentials to log into the Logger.
5. To populate the remote URL field automatically, click anywhere within the field.
Warning: Starting from version 5.5.1, the remote key cannot be empty. You need to
use the same key on every USM Appliance Server connecting to the USM Appliance
Logger. A warning displays if the key is not set. See Prerequisites for more details.
7. Return to the Servers page, select the USM Appliance Server and click Modify.
8. Set the option for Log to No.
10. Select the USM Appliance Logger and click Add New.
13. To verify that you added the USM Appliance Logger successfully, click Server Hierarchy.
You should now see that there is an arrow extending from the USM Appliance Server to
the USM Appliance Logger, where previously they were each floating freely in the graph.
The Logger becomes active immediately. To view logger activity on the USM Appliance Server
or USM Appliance All-in-One, go to Analysis > Raw Logs.
Note: The Server column displays the name of the USM Appliance Logger, indicating
these events are not stored locally.
1. Log into the USM Appliance Logger using the web UI.
2. Go to Configuration > Deployment > AlienVault Center.
3. Double click the logger for which you want to check the status.
The System Details page of the logger displays, where you can find disk usage, as well as
RAM, Swap, and CPU usage:
In addition to checking the System Details page, USM Appliance issues a warning when the
system has less than 25% or 10% of the total disk space available. You can find these
warnings in the Message Center on the USM Appliance Logger.
The AlienVault USM Appliance Enterprise Server component is hardware only, and ships with
two devices: an Enterprise Server and an Enterprise Database.
The Enterprise Server needs to know the IP address and password of the Enterprise
Database. Likewise, the Enterprise Database needs to know the IP address of the Enterprise
Server. This information ensures that the two devices can communicate with each other.
1. On the AlienVault Setup menu, use the Tab key to go to Configure Enterprise Server;
press Enter (<OK>).
2. When the AlienVault MySQL Setup menu appears, move it to the background temporarily
while you proceed with configuring the USM Appliance Enterprise Database.
1. On the AlienVault Setup menu, use the Tab key to go to Configure Database; press Enter
(<OK>).
2. On the Configure Database menu, use the Tab key to select Configure AlienVault Server
IP; press Enter (<OK>).
3. In the Enter Server IP Address field, enter the IP address of the USM Appliance Enterprise
Server; press Enter (<OK>).
4. Use the Tab key to select Configure AlienVault Framework IP; press Enter (<OK>).
5. In the Enter Framework IP Address field, type the same IP address you did for the server
in step 3. ; press Enter (<OK>).
6. Select Back and press Enter until you progress back to the AlienVault Setup menu.
7. On the AlienVault Setup menu, use the Tab key to select Apply all Changes; select OK.
A progress screen appears showing you that the services are restarting and the percentage
of job completion.
10. On the AlienVault Setup menu, use the Tab key to select Jailbreak System; press Enter
(<OK>).
1. On the AlienVault MySQL Setup menu, in the Enter MySQL Server IP address field,
type the IP address of the USM Appliance Enterprise Database; press Enter (<OK>).
2. In the Enter MySQL Server password field, enter the password recorded from step Write
down the password to be entered on the Enterprise Server. above.
4. On the AlienVault Setup menu, use the Tab key to select Jailbreak System; press Enter
(<OK>).
Important: When using DHCP configuration, you should create an address reservation
for USM Appliance prior to configuration. To ensure proper functionality, USM Appliance
requires a static IP address.
2. USM Appliance displays the network settings assigned by your DHCP server. Press Enter
to apply.
Note: If you have multiple DNS servers, type each of their IP addresses separated by
a comma.
With the exception of the USM Appliance Sensor, you can register USM Appliance through the
web UI. USM Appliance Sensor registration must occur through the AlienVault Console.
1. Open a web browser and type the USM Appliance IP address into the address bar.
3. On the welcome screen, type the license key in the Product License Key field and click
Send.
An information box displays telling you that AlienVault USM Appliance activated
successfully.
4. Click Finish.
The Welcome screen appears and contains a form that you must fill out to create the
default admin account for the web UI. See Create the Default Admin User for details.
USM Appliance Sensor registration must occur through the AlienVault Console. You can
register other USM Appliance from the console as well.
The registration process can take several seconds. A status message displays a
registration progress bar.
The AlienVault Setup menu appears again, but this time without the Register this
Appliance menu option.
AlienVault recommends that you register USM Appliance using one of the online methods
because it is easier and faster. However, if you do not have access to the Internet or you are in
a confined environment, you can also register USM Appliance offline.
l A license key file called alienvault-license.deb specific to each USM Appliance instance,
obtained from AlienVault Technical Support.
Before AlienVault Support can generate and send you the license key file, you must first send
them the system_id of each USM Appliance system that you want to register.
Connect to the AlienVault Console through SSH and use your credentials to log in.
1. Save the license file you received from AlienVault, alienvault-license.deb, to a com-
puter desktop or other location where you can easily retrieve it.
2. Insert a FAT32-formatted USB flash drive into the same computer, and then copy the
license file to the root directory of the formatted USB flash drive.
The AlienVault Setup menu appears with "Register this Appliance" as the default selection.
6. Connect the flash drive to the USB port of the machine and press Enter (<OK>).
Alternatively, you can choose to register USM Appliance offline without using the USB flash
drive.
1. Save the license file you received from AlienVault, alienvault-license.deb, to a com-
puter desktop or other location where you can easily retrieve it.
For example, use the command below to copy alienvault-license.deb to the /root
directory in USM Appliance
5. Run the following command from the root directory, where the alienvault-
license.deb file exists
dpkg -i alienvault-license.deb
Your system will be registered after this process completes successfully.
If you need to update the license key after registration, see Update Your AlienVault License
Key.
l Local Management — By using a monitor, keyboard, and mouse connected directly to the
USM Appliance hardware.
l Virtual Management — Virtual Appliance users access the console as a vSphere client or
through an SSH client such as PuTTY.
l Remote Management — After IPMI or HPE iLO configuration, you can access the console
by any computer connected to the same subnet in which the appliance runs, through the
remote connection.
For procedural simplicity, the following task steps reference the user interface (UI) of the SSH
client PuTTY as means to explain how to access the AlienVault console.
1. Launch PuTTY or any other SSH client, and in the Host Name (or IP address) field, type
the IP address of the appliance.
3. Click Open.
4. Enter the user credentials you use to log into the SSH client.
The AlienVault splash screen for USM Appliance appears. If this is the first time, it displays
the root username and a randomly generated password for you to enter.
7. When prompted whether you would like to change your password, click Yes.
After initial login using the default username and randomly generated password,
USM Appliance prompts you to change the password.
Important: If you want to configure high availability (HA) for a USM Appliance Standard
or Enterprise component, you must give both the primary and secondary node the same
root password. See High Availability Configuration.
1. On the first Change Root Password panel, type your new password in the New root
password field and press Enter.
Note: The cursor is not visible on the field. To verify that your cursor is in the right
location, look for a black left border at the start of the field. This tells you that your
cursor is where it should be.
2. On the second Change Root Password panel, type the password you entered previously
and press Enter.
3. On the third, and final, Change Root Password panel, a confirmation message appears,
showing that you have successfully updated the password.
The application now prompts you to log in again, using the newly created password.
USM Appliance All-in-One comes with six network interfaces, numbered eth0 to eth5.
USM Appliance uses these interfaces to perform the following functions:
Based on functionality, you can classify the interfaces into the following categories:
Management
By default, USM Appliance uses the management interface to perform network monitoring,
log collection, and scanning. So, for this reason, you do not need to configure any additional
interfaces, as long as they are all on the same subnet as the management interface.
The management interface lets you communicate with the AlienVault console, as well as
connect to the web UI.
Note: The default port for the management interface is eth0. However, you may
configure a different port for this interface, if desired.
Network Monitoring
When the administrator configures an interface for network monitoring, the interface
operates in passive listening mode (also known as promiscuous mode). A network tap or span
is set up that allows the interface to monitor all packet traffic passing through it for threats.
Because USM Appliance's built-in IDS capability uses the network monitoring interface, you
must dedicate at least one of the network interfaces to it.
You use the Log Collection and Scanning interface to reach the networks and systems from
which you want to collect data. You also use it to scan the systems, using USM Appliance's
built-in asset discovery, vulnerability assessment, and availability monitoring tools.
Setting up this interface requires assignment of an IP address and network mask to the
interface.
Not in Use
This is the default option for all the interfaces except the management interface. It applies to
any network interface that is not in use and not configured.
If you need to modify the management interface configuration, follow the steps below.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
4. Use the keyboard arrow keys to move to the interface, select the interface by pressing
the spacebar, and then press Enter (<OK>).
5. Press <Back> until you are on the AlienVault Setup menu again. Select Apply all Changes.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
For DNS (Domain Name System) lookup and reverse DNS resolution to work correctly, USM
Appliance requires that you configure the search domain after you have completed the
deployment.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
5. Type the domain name of your network and press Enter. The default is alienvault.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
9. Return to the AlienVault Setup main menu and select Reboot Appliance.
You should always configure a hostname for USM Appliance. This helps you identify each one
uniquely, which is particularly important if you need to contact AlienVault Support for
technical assistance.
Your PCI DSS 3.1 compliance audit will fail when a certificate whose Common Name (CN) or
whose entries in the X509 Subject Alternative Name do not match the Fully Qualified Domain
Name (FQDN) of the system in AlienVault USM Appliance.
Certificates, whose CN is not equal to the FQDN, cannot be verified through a Public Key
Infrastructure (PKI). A service using such a certificate cannot authenticate itself towards a
user, unless the user can determine its trustworthiness through another channel. If there is no
additional channel available, a user cannot distinguish between a genuine and a forged
certificate, which benefits the man-in-the-middle attack.
Therefore, AlienVault recommends that you use the FQDN when naming USM Appliance and
to also use this FQDN as the CN or as X509 Subject Alternative Name (type DNS) to reduce
the risk of man-in-the-middle attacks and to avoid failure in PCI compliance audits.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
Note: Any name you choose must not have spaces in it. For guidance on choosing a
name, see RFC 1178.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
8. Return to the AlienVault Setup main menu and select Reboot Appliance.
The default time zone for USM Appliance is Pacific Time (UTC -7h). If you are not operating in
that time zone, you must change it. Otherwise, USM Appliance does not accurately timestamp
events.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
An information panel advises you that the time zone, as well as your profile and the mysql
services, will be changed.
The Package Configuration panel appears, where America is the default setting.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
Use of a Domain Name Service (DNS) helps USM Appliance to resolve host names against
IP addresses. When processing logs from different assets, or hosts, to generate events, if the
IP address of the asset can be identified, USM Appliance stores it in the Device IP field of the
event. This enriches the event data, making searches faster and more accurate. When USM
Appliance is not able to resolve the host name, it assigns the IP address of the USM Appliance
Sensor to the Device IP field instead.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
5. Type the IP address of the server you want to use. If using more than one server, separate
them with a comma without any spaces. For example:
1.1.1.1,8.8.8.8
6. Press Enter (<OK>).
7. Press <Back> until you are on the AlienVault Setup menu again. Select Apply all Changes.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
Use of an NTP server in your network helps ensure that all system components are correctly
synchronized. This is particularly important for timestamp accuracy and auditability in your
efforts to comply with certain regulatory standards.
If you plan to configure high availability (HA) in a USM Appliance Standard or Enterprise
deployment you must set up one NTP server for your primary nodes and another for your
secondary nodes, and synchronize each node to its respective NTP server. See High
Availability Configuration.
Important: The NTP server requires use of port 123 over UDP.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
8. Press <Back> until you are on the AlienVault Setup menu again. Select Apply all Changes.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
Follow this procedure if your keyboard does not use a United States key layout.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
5. Use the keyboard arrow keys to scroll the list and find your selection, and then press
Enter (<OK>).
You will be able to select the Keyboard model, Keyboard layout, Key to function as AltGr,
and Compose key.
6. Press <Back> until you are on the AlienVault Setup menu again. Select Apply all Changes.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
You can secure USM Appliance by providing your own SSL certificates from a Certificate
Authority (CA), and you can upload them through the web UI.
1. Log into the USM Appliance web UI and go to Configuration > Administration > Main.
2. Extend USM Framework.
3. Click the Browse button to upload your custom web server SSL certificate and private
key files in Privacy Enhanced Mail (PEM) format:
Important: Make sure that your certificate file includes both the "begin" and "end"
lines.
4. (Optional) If your SSL certificate requires any intermediate certificates, upload it in Web
Server SSL CA Certificates (PEM format).
If you need help generating a certificate, see How to Generate a Certificate Signing Request
for USM Appliance.
If your certificate is not in the PEM format, you can use OpenSSL to convert it. OpenSSL is
installed on USM Appliance by default. The following procedure illustrates how to convert a
certificate from PFX to PEM format using USM Appliance.
Note: For example, Linux and macOS users can use the scp command while
Windows users can use a program called WinSCP.
3. Connect to the AlienVault Console through SSH and use your credentials to log in.
4. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
a. Certificate:
10. If you have configured a certificate in the past, click Remove to delete the old certificate,
and then Update Configuration to apply the changes.
Allow 2-5 minutes for reconfiguration to run in the background. After the web browser
refreshes, you may receive a warning about custom self-signed certificate in use. You can
ignore this message.
11. Browse to and upload the certificate files generated in step #5.
12. Verify that the new certificate is installed and ready to be used.
When you connect to the USM Appliance web UI for the first time after installation and setup,
USM Appliance prompts you to create the default admin user.
After you create the default admin, you can log in and use USM Appliance.
The Welcome screen appears when you access the web UI for the first time.
If you plan to have multiple administrators to help administer USM Appliance, you should
create one or more admin users.
For instructions to create additional administrators locally on USM Appliance, see "Creating
New Accounts for Local Users" or to create additional administrators using LDAP, see
"Creating New Accounts for LDAP Users" under User Administration in the USM Appliance User
Guide.
You can configure to receive emails from USM Appliance. For example, if you want to receive
an email when an alarm appears, you can create a policy for the email to be sent. For details,
see Tutorial: Create a Policy to Send Emails Triggered by Events. But first, you need to
configure mail relay in USM Appliance.
USM Appliance uses Postfix, an open-source mail transfer agent (MTA), as Simple Mail
Transfer Protocol (SMTP) server for outgoing messages.
Port
Protocol Notes
Number
SMTP 25 This is the port number assigned to SMTP and used for mail server relay.
Note that most Internet service providers (ISPs) block this port to curb
the amount of spam they receive.
TLS 587 This is the default port number that USM Appliance uses to send
(Transport outgoing messages. The connection is encrypted by executing the
Layer STARTTLS command.
Security)
smtp_sasl_auth_enable = yes
smtp_sasl_security_options = noanonymous
smtp_sasl_tls_security_options = noanonymous
This means USM Appliance enables Simple Authentication and Security Layer (SASL)
authentication for SMTP, denying anonymous authentication.
You perform this task on either a USM Appliance All-in-One or a USM Appliance Server.
1. Log in to the USM Appliance web UI, and then go to Configuration > Deployment.
2. Under AlienVault Components Information, click the icon of the system you want to
change.
3. On the next page, click General Configuration, located above the System Status.
4. In the General Configuration form, select Yes for Mail Server Relay.
5. Enter the Server IP, the username and password used for the mail server, and the port
number in the respective fields.
For Gmail:
o Server IP: smtp.gmail.com
o User: <your user>@gmail.com or <your user>@<your domain>.tld if <your
domain>.tld is managed by Google Professional Services
o Pass/Confirm Pass: <your password>
o Port: 587
Note: If your Office 365 admin has set up two-step verification for your
organization, you may need to create an app password allowing USM Appliance to
access your Office 365 account.
8. Extend USM Framework and update Sender's Email Address for Notification.
Note: USM Appliance uses this email address to send notifications in the following
occasions:
o A report is distributed via email.
o USM Appliance informs you about open tickets.
o USM Appliance creates a ticket based on a vulnerability it discovers.
o A comment has been added to or modified in an existing ticket.
By default, USM Appliance does not need to go through any proxy server, so proxy
configuration is disabled. However, should you need to use a proxy in your environment, USM
Appliance provides two options: manual (external) and alienvault-proxy (built-in), for proxy
configuration.
If your company requires all network traffic to go through a proxy server before reaching the
Internet, you can configure the proxy in USM Appliance.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
Additionally, USM Appliance includes a built-in proxy that you may find useful, especially if you
have more than one USM Appliance deployed. You can dedicate a USM Appliance All-in-One
or USM Appliance Server to be the proxy server and the other USM Appliance instances will
go through it to reach the Internet. For example, you can use this setup to control how
updates are received from AlienVault. Only the dedicated USM Appliance (the proxy)
downloads the updates from AlienVault, the other instances download the updates from the
proxy instead, increasing performance and security.
You need to perform the same configuration in every USM Appliance instance deployed
in your network.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
l Set up networks
l Run an asset discovery scan
l Deploy HIDS agents
l Configure external data sources
We recommend that you perform the tasks in the listed order, because you will not be able to
configure certain tasks before the previous one is completed.
To skip it at any time, click Skip AlienVault Wizard on the Welcome page (shown), or
subsequent pages.
If you skip the wizard, each time you log in as administrator, a banner appears above the
primary navigation bar that reads:
Until you click Finish, after completing the last task in the wizard, the reminder banner will be
available.
An AlienVault USM Appliance All-in-One comes with six network interfaces, numbered eth0 to
eth5. USM Appliance uses these interfaces to perform the following functions:
Management
You cannot configure the management interface from the Getting Started Wizard; it is
configured during initial setup from the AlienVault console. For more information, see Set Up
the Management Interface.
Note: The default port for the management interface is eth0. However, you may
configure a different port for this interface, if desired.
Network Monitoring
When the administrator configures an interface for network monitoring, the interface
operates in passive listening mode (also known as promiscuous mode). A network tap or span
is set up that allows the interface to monitor all packet traffic passing through it for threats.
Because USM Appliance's built-in IDS capability uses the network monitoring interface, you
must dedicate at least one of the network interfaces to it.
You use the Log Collection and Scanning interface to reach the networks and systems from
which you want to collect data. You also use it to scan the systems, using USM Appliance's
built-in asset discovery, vulnerability assessment, and availability monitoring tools.
Setting up this interface requires assignment of an IP address and network mask to the
interface.
Not in Use
This is the default option for all the interfaces except the management interface. This applies
to any network interface that is not in use and not configured.
1. Choose the network interface you want to use for network monitoring
Once selected, USM Appliance immediately configures the network interface to listen for
incoming traffic.
3. Configure your virtual machine to get traffic from your physical network.
Once the network is forwarding data to the selected network interface, the Status indicator
changes from red to green. This means that the interface is both configured and receiving
data as expected.
After you've configured the network monitoring interface, verify that it's receiving network
traffic. If you are on a virtual network, make sure that you are receiving network traffic and
not just virtual switch traffic. Follow the instructions in Monitor VMware Standard Virtual
Switches.
1. Choose the network interface that will be used for log collection and scanning.
A screen pops up asking for an IP address and netmask. This information will be used to
configure the network interface with a static IP address.
3. On the IP Address & Netmask box, enter an IP address and netmask for a different
subnet.
The Configure Network Interfaces screen displays again. The IP address you supplied
shows as the IP address for the interface. This indicates that the interface configuration
is successful.
4. Configure the other interfaces as needed for additional log collection and scanning.
Note: In some situations the network that you want to monitor may not be
accessible from the IP address provided without setting up a route in the routing
table. This is an extreme case and should not happen often. If a route is required,
you will need to jailbreak the system using the AlienVault console and configure the
route using the command line.
After you have finished configuring the network interfaces, click Next at the bottom-right
corner to proceed.
Understanding what is in your environment is a critical step towards identifying threats and
vulnerabilities.
When you complete the Asset Discovery task in the Getting Started Wizard, you can use the
built-in asset discovery capability to do the following:
Note: Before scanning a public network space, see "Addendum Notice Regarding
Scanning Leased or Public Address Space" under System Overview in the USM Appliance
Deployment Guide.
This task informs AlienVault USM Appliance about the network topology. This enables you to
successfully run asset scans, vulnerability scans, and use other built-in capabilities.
1. From the Asset Discovery page of the Getting Started Wizard, click Scan Networks.
2. On the Scan Networks page, choose one or more networks to scan.
You should already have one or more networks defined, based on either the default
management interface or on any additional networks that you defined that were not on
the same subnet. See Configuring Network Interfaces.
If you do not see the desired network, you can add or import them on this page, see
Adding More Networks Manually or Importing Networks From a CSV File, respectively.
The confirmation page displays the number of assets that can be scanned, based on the
network defined.
Note: If you created a large network (for example, 10.10.10.0/16), the scan may take
a long time. We suggest that you create smaller networks. You can stop the scan
while it is running, but no asset data will be retained if you do so, and you must run
the scan again.
5. After the scan has finished, USM Appliance prompts you to schedule a recurring scan. This
periodic scan helps you discover any changes in the environment promptly.
6. To change the frequency to either daily or monthly, expand the list box. To select no scan,
click the "x."
7. Click OK to accept and continue.
1. On the Scan Networks page, type a meaningful name into the Add Networks field to
describe the network, for example, DMZ or Employee Office.
2. Type the CIDR notation for the network.
3. (Optional) Type a description for the network to distinguish it, if helpful.
4. Click +Add.
Note: If you make a mistake and define the network incorrectly, use the delete icon
(trash icon) to delete and re-enter the network.
Note: Pay attention to the formats allowed in the CSV files. The CIDR field is required. It
can be a comma-separated list. The delimiter for the columns is a semicolon.
A confirmation screen displays showing the number of hosts that have been imported.
If you do not have access to a list of assets in the form of a CSV file, you can quickly add them
manually.
1. On the Scan & Add Assets page, type a meaningful name for the asset (for example,
domain controller).
2. Type the IP address in the field provided.
3. Choose the asset type from the list.
4. Click +Add.
5. After you have finished adding all the assets, click Next at the bottom-right corner to pro-
ceed.
The Getting Started Wizard provides two options for HIDS agent deployment.
Windows — HIDS agent is installed locally on specified hosts. All Windows hosts must meet
the prerequisites described in the Asset Management topic, Deploying HIDS Agents, of the
USM Appliance User Guide.
UNIX/Linux — HIDS agents are not installed on hosts but provide agentless operation.
UNIX and Linux systems are monitored remotely for file integrity only. For information on
installing HIDS agents on UNIX/Linux hosts, see Deploy the AlienVault HIDS Agents to Linux
Hosts.
Before you can deploy a HIDS agent to the Windows machine, make sure that it meets the
following requirements.
l If using any network accelerator devices in the environment, you must add USM Appliance
Sensor to their allowlist. This is because the USM Appliance Sensor utilizes SMB (Server
Message Block) to transfer the HIDS agent installation package to the Windows machine. If
the network accelerator tries to optimize the traffic from the USM Appliance Sensor, it
may cause the HIDS deployment to fail.
l The operating system must be one of the following
o Microsoft Windows XP
o Windows 7, 8, or 10
o Windows Server 2003, 2008R2, or 2012R2
l You need to use a user account that belongs to the same Administrators group as the
local Administrator account.
Note: For security reasons, the local Administrator account is disabled by default on
all versions of Windows currently in mainstream support. In order for the HIDS
deployment to succeed, you need to enable the local Administrator account (not
recommended), or create a user account and add it to the built-in Administrators
group.
l You must have changed the target Windows machine based on the steps below.
To change the settings on Windows Server 2003, 2008 R2, and 2012 R2
1. Go to Control Panel > Windows Firewall > Advanced Settings > Inbound Rules.
2. Enable File and Printer Sharing (SMB-In).
3. To allow NTLMv2 security, run gpedit.msc.
4. Go to Local Security > Computer Configuration > Windows Settings > Security
Settings > Local Policies > Security Options and change these settings.
Note: The Winexe installation utility may trigger a false positive alert as a “potential
hacking tool” during an authorized application installation, even though the Winexe
remote installation is an authorized action. In this instance, the best practices are to
either allowlist the IP address of USM Appliance, or temporarily disable the antivirus
software during the installation.
To deploy HIDS
5. Click Deploy.
6. Click Continue.
After the deployment finishes, a message displays the number of devices successfully
deployed with HIDS.
7. Click OK.
8. After you finish deploying the HIDS agents, click Next at bottom-right to proceed.
One of the key capabilities provided by USM Appliance is the ability to collect external data
from network devices, security devices, and your servers. The data collected allows
USM Appliance to correlate events to see patterns of activity and issue alarms.
The Getting Started Wizard makes it painless and fast to configure each of the assets you
discovered or added as part of the Asset Discovery task with the appropriate data collection
plugin.
Note: You cannot collect data from those assets that do not have a plugin enabled. See
Enable Plugins for more information.
On the Log Management page in the Getting Started Wizard, you will see a list of the network
devices discovered as part of the Configuring Network Interfaces task. You should enable one
or more plugins for each of these assets.
1. Select the correct Vendor, Model, and Version number corresponding to the data that
you want to collect from that asset.
All three fields are required. The Version field defaults to ‘-‘ if no other selection is
available. The Add Plugin button is enabled.
2. If you want to enable another plugin for the same asset, click Add Plugin.
Another row is added for you to select the Vendor, Model, and Version number for a
different plugin.
3. Repeat step 1 and 2 for each plugin you want to enable. You can enable up to 10 plugins
per asset.
The Log Management Confirmation page, shown in the following illustration, displays the
plugins that you enabled. The Receiving Data value turns green when the Source,
Destination, or Device IP field of an event matches the IP address of the asset. Gray
means that no data is being received.
6. To learn how to configure your assets to send data to USM Appliance, click Instructions
to forward logs.
After you have enabled plugins for your assets, click Next at the bottom-right corner to
proceed.
AlienVault Open Threat Exchange® (OTX™) is an open information sharing and analysis
network, created to put effective security measures within the reach of all organizations.
Unlike invitation-only threat sharing networks, OTX provides real-time, actionable
information to all who want to participate.
Enabling AlienVault OTX in your installation will allow you to automatically share anonymous
threat information with the OTX community. In return you will receive crowd-sourced threat
updates every 30 minutes. The image below shows a sample of the data being sent from an
AlienVault USM Appliance installation to OTX.
After you finish installing and configuring AlienVault USM Appliance (with OTX enabled), you
will be able to quickly see which alarms indicate malicious activity from a known bad actor on
the Alarms page. For more information, see Using OTX in USM Appliance.
To enable OTX in your USM Appliance installation, you must enter the OTX key and connect to
your OTX account. If you do not have an OTX account and would like to sign up for it, you can
do so from the Getting Started Wizard.
2. Fill out the information (username, emaill address, and password) and click Sign Up.
A page appears informing you that a verification email with a link to OTX was sent to the
email address you provided.
3. After you receive the email, click the link and, on the confirmation page for logged-in
USM Appliance users, click Login.
A USM Appliance key page appears, displaying your OTX key and stating that the
username you used to register for OTX is logged in.
4. Copy the OTX key and paste it into the Enter OTX Key field shown in the following illus-
tration.
5. Click Next.
The Thank You for Joining the Open Threat Exchange page appears.
6. Click Finish.
Important: After you click Finish, you cannot run the Getting Started Wizard again.
An Intrusion detection system (IDS) monitors networks and hosts in searching for malicious
activities or policy violations, such as compromise of confidentiality, of system security, or of
integrity. Some IDS systems may be capable of stopping an intrusion attempt but this is
neither required nor expected of an IDS system. IDS systems primarily focus on identifying
possible intrusions, logging information about them, and reporting attempts, which security
analysts can further analyze.
Classic network firewalls analyze network and transport layer headers, such as source and
destination IP address, protocol, and source and destination ports. However, attackers today
do not only aim at network and transport layers any more, since network firewalls protect
them well; instead, they focus on exploiting vulnerabilities in operating systems, applications,
and protocols. Network firewalls cannot detect such attacks. Therefore, you need additional
security systems, such as IDS, in order to detect them. Other examples of attacks that IDS can
detect but firewall cannot include:
l Attacks that use tunneling, also known as "port forwarding", inside legitimate traffic or
encryption
l Attacks within internal networks
USM Appliance provides both network and host-based intrusion detection capabilities.
You can use the following devices to forward network traffic to a NIDS:
l Network hubs
l Network switches with mirrored or spanned ports
Advantages of NIDS:
Limitations of NIDS:
While a NIDS detects attacks sent over a network that the NIDS monitors, a HIDS detects
those against the hosts on the network. NIDS cannot detect events in packet flows that use
encryption, but HIDS can after the host decrypts the traffic. Ideally, a HIDS should work side-
by-side with a NIDS. You can correlate events detected by both systems to determine if an
attack was successful. For example, a detected network attack followed by the creation of an
administrator account on a server could mean that the attack was successful.
Advantages of HIDS:
Limitations of HIDS:
AlienVault HIDS
l AlienVault HIDS
l Deploy AlienVault HIDS Agents
l File Integrity Monitoring
l Agentless Monitoring
l Working with AlienVault HIDS Rules
l Tutorial: Reading a Log File with a HIDS Agent on Windows
AlienVault HIDS
The AlienVault HIDS included in the USM Appliance provides the following features:
AlienVault HIDS uses a server/agent architecture, where the HIDS agent resides on hosts you
want to monitor; and the HIDS server resides on the USM Appliance Sensor. The
USM Appliance Sensor receives events from the HIDS agents, normalizes them, and sends
them to the USM Appliance Server for analysis, correlation, and storage. AlienVault HIDS also
has some limited support for agentless operation on Linux for log retrieval only.
You need to deploy the HIDS agents to client systems. The HIDS agent runs as a continuous
in-memory service, interacting with the USM Appliance Sensor through UDP port 1514. The
USM Appliance Sensor generates and distributes a pre-shared key to the HIDS agents, which
then use the key to authenticate the communication between the HIDS agents and the
USM Appliance Sensor.
While HIDS agents are ideal for collecting Windows Security and System event logs, it is more
effective to use NXLog to collect Application logs on Windows. AlienVault provides NXLog
plugins for Microsoft IIS, Microsoft DHCP Server, Microsoft Exchange Server, and Microsoft
SQL Server. For a complete list, see NXLog Plugins.
This option supports deployment to Windows hosts and agentless deployment to Linux
hosts. For instructions, see Deploying HIDS to Servers, in the Getting Started Wizard topic.
This option supports deployment to Microsoft Windows servers only. For instructions, see
Deploying HIDS Agents, in Asset Management.
For Microsoft Windows hosts, USM Appliance generates a binary file containing the
appropriate server configuration and authentication key. You can choose to let
USM Appliance install the file for you, or download the file and install it on the host yourself.
Before you can deploy a HIDS agent to the Windows machine, make sure that it meets the
following requirements.
l If using any network accelerator devices in the environment, you must add USM Appliance
Sensor to their allowlist. This is because the USM Appliance Sensor utilizes SMB (Server
Message Block) to transfer the HIDS agent installation package to the Windows machine. If
the network accelerator tries to optimize the traffic from the USM Appliance Sensor, it
may cause the HIDS deployment to fail.
l The operating system must be one of the following
o Microsoft Windows XP
o Windows 7, 8, or 10
o Windows Server 2003, 2008R2, or 2012R2
l You need to use a user account that belongs to the same Administrators group as the
local Administrator account.
Note: For security reasons, the local Administrator account is disabled by default on
all versions of Windows currently in mainstream support. In order for the HIDS
deployment to succeed, you need to enable the local Administrator account (not
recommended), or create a user account and add it to the built-in Administrators
group.
l You must have changed the target Windows machine based on the steps below.
To change the settings on Windows Server 2003, 2008 R2, and 2012 R2
1. Go to Control Panel > Windows Firewall > Advanced Settings > Inbound Rules.
2. Enable File and Printer Sharing (SMB-In).
3. To allow NTLMv2 security, run gpedit.msc.
4. Go to Local Security > Computer Configuration > Windows Settings > Security
Settings > Local Policies > Security Options and change these settings.
Note: The Winexe installation utility may trigger a false positive alert as a “potential
hacking tool” during an authorized application installation, even though the Winexe
remote installation is an authorized action. In this instance, the best practices are to
either allowlist the IP address of USM Appliance, or temporarily disable the antivirus
software during the installation.
3. On New HIDS Agent, select the host from the asset tree.
USM Appliance populates Agent Name with the host name, and IP/CIDR with the host IP
address automatically.
4. Click Save.
6. In Automatic Deployment for Windows, type the Domain (optional), User, and Password
of the host; then click Save.
USM Appliance assembles a preconfigured binary file and deploys it to the host.
7. Alternatively, to download the preconfigured binary file, click the button in the
Actions column.
Your browser downloads the file automatically or prompts you for the download.
The installer runs in a console briefly, then displays a progress bar until completion.
Important: For Linux hosts, depending on which distribution of Linux you use, AT&T
Cybersecurity recommends that you download the corresponding ossec-hids-agent
installer file from the OSSEC's Downloads page directly, and then follow their
instructions to complete the installation.
After you have successfully installed the HIDS agent on the Linux host, perform the steps
below to connect it to USM Appliance.
3. On New HIDS Agent, select the host from the asset tree.
USM Appliance populates Agent Name with the host name, and IP/CIDR with the host
IP address automatically.
4. Click Save.
5. To extract the key for the agent, click the button in the Actions column, and then copy
the key that displays.
6. Login to the Linux host, run /var/ossec/bin/manage_agents, and then enter I to import
the key you copied in the previous step.
Note: On some installations, Centos, for example, the command may be manage_
client instead of manage_agents.
Deployment Verification
You can verify the deployment both on the HIDS agent and in USM Appliance.
On the HIDS agents, you can check the ossec.log file to make sure that a message similar to
the following exists:
more /var/ossec/logs/ossec.log
On the USM Appliance, make sure there are AlienVault HIDS events.
2. Ensure that the Status column for the deployed agents display Active, and the Trend
chart is not empty.
3. To see the AlienVault HIDS events from a specific agent, go to Analysis > Security
Events (SIEM).
4. In Data Sources, select AlienVault HIDS; change Event Name to Src IP, enter the IP
addresses of the HIDS agent, and then click Go.
By default, USM Appliance updates the HIDS Agent information in its database every 60
minutes. If you want to increase the frequency, you can change the refresh rate under
Configuration > Administration > Main > Detection.
You may see the following messages in the web UI when deploying AlienVault HIDS agents in
USM Appliance.
Message Explanation
Agent ID '<agent_id>' is not valid. Agent ID has to be The HIDS agent ID provided is not valid.
1-4 digital characters.
Cannot create HIDS agent '<agent_name>' on the The HIDS agent cannot be added to the given
sensor '<sensor_id}>'. sensor.
Message Explanation
Cannot get HIDS agents related to asset <asset_id>. The HIDS agent information cannot be
retrieved.
Cannot resolve the given asset <asset_id>. The asset ID is not a valid UUID.
Cannot resolve the given sensor <sensor_id>. The sensor ID is not found in the database.
Deployment IP '<ip_address>' is not valid IP address. The IP address provided is not a valid IP
address.
HIDS Agent cannot be deployed. Reason: <error_ The errors received from the commands used
msg>. to deploy the HIDS agent in the target host.
Invalid Credentials: '<username>' is not valid The username contains characters that are
username. not allowed.
Invalid Credentials: Password is not valid. The password contains characters that are
not allowed.
Sorry, deployment job cannot be launched due to an The job to deploy the HIDS agent cannot be
error when sending the request. Please try again. launched.
You can configure AlienVault HIDS to perform File Integrity Monitoring (FIM), which identifies
changes in system files, folders, and Microsoft Windows registries. The process that identifies
these changes is syscheck. The syscheck process scans the host at user-defined intervals and
stores checksums of watched files. The system then generates an event when a checksum
changes.
In addition to using syscheck, you can also configure Windows systems so that AlienVault
HIDS agents forward object access audit events for USM Appliance to process. These events
provide more information on operations affecting file and folder objects, such as who
performed specific actions or operations on an object. For more information, see Configuring
Windows Systems to View Windows Audit Object Access Events.
When you make changes through the USM Appliance web interface, USM Appliance records
your modifications in the agent.conf file and stores it for distribution. When the agent
authenticates, it will download the shared configuration and merge it with the local copy. The
shared file will take precedence, overwriting any local configuration.
Default settings for the ossec.conf file stored on a host system are configured when the
HIDS agent is first installed or deployed on a host system. In addition, an ossec.conf file
containing syscheck and other global options is defined and stored on theUSM Appliance
Server. For more information on viewing and configuring this file, see To
configureUSM Appliance server-side (global) ossec.conf settings.
4. You can also view the contents of the server ossec.conf file in XML format by selecting
the Config >Configuration option.
The following table describes syscheck options that you can specify through the
USM Appliance web interface.
Syscheck options
Alert New Files Whether to alert on new files created. (Global agent No
option; not configurable for individual hosts.)
Scan on Start Whether to do the first scan as soon as the agent Yes
starts.
Registry Entries Microsoft Windows registries not to monitor. See the ossec.conf
Ignored file on a Windows
host
Chk Sum Check the md5 and sha1 hashes of the files. No
With Auto Ignore set to No, you receive alerts on every file change, regardless how many
times it is changed. If you also select the Realtime option, the alert stops after the third
change, equivalent to setting Auto Ignore to Yes.
You can configure AlienVault HIDS to alert on new files, but it does not report in real time,
because AlienVault HIDS can only detect new files on a full scan.
The report_changes option is only available on UNIX-like systems. Setting this option
globally, or reporting on changes to the root file system, will likely create a large number of
events, which could potentially fill up all available disk space and impact USM Appliance
operation.
You can configure different syscheck options for different hosts, by entering them in the
agent.conf file manually. Ensure that you
l Use a separate <agent_config> element for each host you need to configure.
l Use the name attribute to denote the name of the host. (This is the agent name used when
adding the agent to the detection section.)
l Specify the options you want to change inside the <syscheck> element.
l Repeat all every host you want to configure.
The following example shows different syscheck options for host AD2012 and Win2008:
<agent_config name="AD2012">
<syscheck>
<frequency>21600</frequency>
<scan_on_start>yes</scan_on_start>
<directories check_all="yes">C:\temp</directories>
</syscheck>
</agent_config>
<agent_config name="Win2008">
<syscheck>
<frequency>3600</frequency>
<scan_on_start>yes</scan_on_start>
<directories check_all="yes">C:\topsecret</directories>
</syscheck>
</agent_config>
Instead of making these changes on the hosts one-by-one, you can configure them in the
USM Appliance web interface.
5. (Optional) Click Syscheck. Notice that a list appears towards the upper-right corner with
6. To apply your changes immediately, click HIDS Control, and then Restart.
4. Click Go.
Note: You can only set up file and folder auditing on NTFS drives.
2. Go to Computer Configuration > Windows Settings > Security Settings > Local
Policies > Audit Policy.
3. Edit the Audit object access policy and enable auditing of Success and Failure attempts.
1. Open Windows Explorer and navigate to the file or folder you want to audit.
o To set up auditing for a new user or group, click Add. In the Enter the object name to
select field, type the name of the user or group that you want to audit, then click OK.
o To remove auditing for an existing group or user, highlight the group or user name,
click Remove, and then click OK. You can skip remaining steps.
o To view or change auditing for an existing group or user, click its name and then click
Edit.
6. In the Apply onto box, click the location that you want to audit.
7. In the Access box, indicate what actions you want to audit by selecting the appropriate
check boxes.
8. If you want to prevent subordinate files and subfolders of the original object from inher-
iting audit settings, select the Apply these auditing entries to objects and/or con-
tainers within this container only check box.
Note: Because the Windows security log is limited in size, select the files and folders
to be audited carefully, since new audit events will be stored there. Also, consider
the amount of disk space that you want to devote to the security log. The maximum
size for the security log is set in Event Viewer.
After enabling object access auditing, you can view the security log in Event Viewer to see
that the audit events are now collected. The AlienVault HIDS agent will forward those
events to USM Appliance.
In AlienVault USM Appliance version 5.3, Host Intrusion Detection System (HIDS) rules and
plugins have been updated to capture USB device events on Windows machines.
If you are updating to USM Appliance version 5.3 or later from a previous version, and you
want to use the USB device detection feature, you need to do one of the following:
l On the host you wish to monitor, remove the existing HIDS agent and redeploy it. For
instructions, see Deploy AlienVault HIDS Agents to Windows Hosts.
l Alternatively, you can change the configuration on Windows manually, as detailed below.
3. Locate the line "<ossec_config>" and add the following configuration right below that
line:
<localfile>
<log_format>full_command</log_format>
<command>wmic logicaldisk where drivetype=2 get deviceid, description,
FileSystem, Size, VolumeSerialNumber</command>
<frequency>60</frequency>
</localfile>
Your configuration file should look similar to this:
Some customers have reported that the wmic command above does not work in their
environment. AlienVault has not been able to reproduce the problem but suspect that it
may be related to newer HIDS versions or older Windows versions. If you run into the
same issue, try using the following command instead:
a. Select Manage.
b. Click Restart.
Verification
Once USB activity has been detected on that host, you should be able to see new AlienVault
HIDS events with the event name AlienVault HIDS: New USB Device Found. And the Event
Details pane includes information about Drive, FileSystem, Size, and Serial Number:
Agentless Monitoring
AlienVault HIDS allows you to run integrity checking without agents installed on hosts,
network devices, routers, firewalls, or switches. Agentless monitoring detects checksum
changes in files or runs diffs to shows what exactly has changed.
Prerequisites
Before enabling agentless monitoring, make sure you have done the following:
n Open the SSH daemon on your device listening on TCP port 22.
n Set up firewall rules to allow SSH traffic between USM Appliance and your device.
AlienVault HIDS runs checks periodically, communicating with monitored devices through TCP
port 22 using the SSH protocol.
4. Fill out the Monitoring Entries Options information on the right, then click Add.
Supported Arguments
Fields Values Explanation
by Type
Supported Arguments
Fields Values Explanation
by Type
Important: USM Appliance can only process one argument for every entry. If you
need to run multiple commands, put them in separate entries. The added entries
appear in Monitoring Entries Added.
5. Click Update.
6. To apply your changes immediately, click HIDS Control, and then Restart.
You can verify that you have successfully deployed the agentless monitoring in the following
ways:
n On Environment > Detection > Agentless, the status of the host displays a green check
mark and the Agentless Status: displays Running.
n On Environment > Detection > HIDS Control, make sure that you see "Agentless is
running" in green.
n On Environment > Detection > HIDS Control > HIDS Log, make sure that you see the
periodic checks performed.
n On Analysis > Security Events (SIEM), make sure that you see events coming from the
monitored host or device.
AlienVault HIDS expands from the open source project, OSSEC, by providing additional rules
that are essential to identifying HIDS issues. The table below lists all the AlienVault-specific
rules that USM Appliance provides out of the box.
Enabled
Rule File Windows Event
Rule File Name Rules Purpose by
Dependency ID Matched
Default
Enabled
Rule File Windows Event
Rule File Name Rules Purpose by
Dependency ID Matched
Default
Enabled
Rule File Windows Event
Rule File Name Rules Purpose by
Dependency ID Matched
Default
alienvault- Detect user logon/off Yes msauth_ 528, 540, 672, 673,
windows- attempts on Windows rules.xml 4624, 4672, 4768,
workstation-logon- 4769, 4771
logoff_rules.xml
2To guarantee stable operation, you should increase the RAM if the swap space on the hard
disk exceeds 1 GB for extended amount of time. Otherwise data collection and normalization,
OTX integration, or vulnerability scanning might fail.
3To deploy USM Appliance version 5.7.3 or later, you must be running ESXi 5.5 or later. Previous
version of USM Appliance can be deployed on ESXi 4.0 or later.
4Due to the way that OTX™ is managed, otx.alienvault.com does not have a fixed IP address and AT&T
Cybersecurity cannot provide the IP range.
5The USM Appliance API tries to access www.google.com every five minutes to ensure that the system
has an Internet connection.
6USM Appliance assumes the component to be offline if no response is received from ping.
7 This rule is more granular than the default one in msauth_rules.xml, because it matches the
different failure reasons reported by event 4625.
AlienVault delivers new HIDS rules or fixes to existing rules through the bi-weekly The Threat
Intelligence Updates. For a complete list of rules enabled by default, go to Environment >
Detection > HIDS > Config > Rules. USM Appliance displays the enabled rules on the left and
disabled rules on the right.
You can enable more rules based on your business needs. See Enabling / Disabling AlienVault
HIDS Rules.
Additionally, you can edit existing rules or create your own so that they work better in your
environment. See Editing / Creating Custom Rules for AlienVault HIDS.
Note: AlienVault HIDS rules are read-only. You cannot change them.
4. Alternatively, click the Rule Editor tab to see the rule file in XML format.
Some rules depend on other rules to find their matching events first. Therefore, before you
enable a rule, make sure that the dependent rule (as shown in the Rule File Dependency
column in the AlienVault HIDS Rules table) has been enabled. For example, the alienvault-
windows-defender_rules.xml file depends on both msauth_rules.xml and ms-se_rules.xml
files. While msauth_rules.xml is enabled by default, ms-se_rules.xml is not. Therefore, you
must enable ms-se_rules.xml first, and then alienvault-windows-defender_rules.xml.
2. To enable a rule, type the name of the rule in the search box.
The number of available rules reduces as you type and USM Appliance finds the match.
3. To locate the rule, either drag the file to the left column or click the plus (+) sign next to
the rule.
4. To disable a rule, locate the file in the left column. Either drag the file to the right column
or click the minus (-) sign next to the rule.
5. Click Save.
6. You must restart the HIDS Service for the changes to take effect:
o On the same page, click the HIDS Control tab, and then click Restart on the resulting
page.
5. Click Save.
6. Click the edit rule icon ( ) next to the newly created rule.
Important: A valid custom rule ID for AlienVault HIDS is between 190,000 and
199,999. AlienVault reserves other ranges for its internal usage.
8. Change the other attributes as needed. Use the add icon ( ) to add an attribute or a
In the example below, we have changed the rule id to 150001 and srcip to 2.2.2.2. We have
updated the description as well.
9. If you need to add an attribute for any of the nodes, click the show icon ( ) to display
10. Alternatively, if you prefer to use the XML format, click the Rule Editor tab and enter your
rule directly.
11. Click Save after you have made all the changes.
12. You must restart the HIDS Service for the changes to take effect:
o On the same page, click the HIDS Control tab, and then click Restart on the resulting
page.
The procedure above shows how to add a new rule to the existing group. If you want to add a
new group instead, use the Rule Editor and enter the XML codes directly. For example:
Important: Do not add a group without a rule in it. AlienVault HIDS will not restart with
an empty group in local_rules.xml.
In this process we will configure an HIDS Agent, installed on a Windows system, to read logs
from a file. This can be useful when we try to grab data from an application that logs directly
into a file. For this purpose we have created a sample file
C:\Users\WIN7PRO\Desktop\Test.txt with the following log line:
1. In the USM Appliance web UI, go to Environment > Detection > HIDS > Config > Con-
figuration.
You can check for log line by running the following command:
Task 4. Create a new decoder on USM Appliance to parse the incoming log lines
1. On USM Appliance edit /var/ossec/alienvault/decoders/local_decoder.xml (same
as decoder.xml but this one is not overwritten when updating the system).
If this file does not exist you can create it with the following command:
touch /var/ossec/alienvault/decoders/local_decoder.xml
2. In local_decoder.xml add a new decoder to parse first part of the log message and save
your changes:
<decoder name="myapplication">
<prematch>^myapplication: </prematch>
</decoder>
3. In the USM Appliance web UI, go to Environment > Detection > HIDS > Config > Con-
figuration.
Task 5. Create a new rule on USM Appliance to parse lines processed by the
decoder
Important: Use a number between 190,000 and 199,999 as the rule id.
<group name="myapplication">
<rule id="196000" level="0">
<decoded_as>myapplication</decoded_as>
<description>myapplication is enabled</description>
</rule>
You will see Phase 3 of the Log Test has completed and matched our new rule:
touch /etc/ossim/agent/plugins/ossec-single-line.cfg.local
chown root:alienvault /etc/ossim/agent/plugins/ossec-single-line.cfg.local
chmod 644 /etc/ossim/agent/plugins/ossec-single-line.cfg.local
2. Insert or add the following translation to the ossec-single-line.cfg.local file:
[translation]
196001=7999
3. Insert a new plugin_sid with value "196001" for the ossec-single-line plugin. This can be
done using the following command:
alienvault-reconfig
You should see the newly created events with the event name: AlienVault HIDS: my_
application_test_rulematch.
USM Appliance and AlienVault OSSIM provide host intrusion detection services (HIDS)
functionality using AlienVault HIDS Services. The service is extended through HIDS agents
installed on Linux or Windows hosts. USM Appliance simplifies the installation of these
HIDS agents by providing an automatic deployment script for Windows Hosts. However, due
to the nature of how remote install is executed on Windows systems, this functionality can't
be extended to uninstalling the agents.
l On Windows:
If you wish to remove the HIDS agent from multiple hosts, you'll need to use a third-party tool
or script to facilitate bulk removal. If your organization is using any group policy for
administration, you may want to discuss using a Windows Management Instrumentation
Command-line (WMIC) script governed by a group policy object (GPO). Please contact your
Active Directory administrator or consultant for more information on how to use this
Windows feature.
Agent removal for Linux hosts may also be managed by a number of package installation
utilities. Please contact your Linux Administrator to determine if your organization is utilizing
a package management solution that can facilitate bulk removal.
AlienVault NIDS
l AlienVault NIDS
l Configuring AlienVault NIDS
l Viewing AlienVault NIDS Events
l Customize AlienVault NIDS Rules
l Updating AlienVault NIDS Rules and Signatures
AlienVault NIDS
AlienVault NIDS plays an important role in the USM Appliance. By detecting malicious network
events, it provides vital information for correlation directives and cross-correlation rules.
Combining this information with the events collected from other devices, USM Appliance
presents a complete picture of the malicious activity.
The AlienVault NIDS functionality, including monitoring network traffic and detecting
malicious events, takes place on the USM Appliance Sensor. You should configure at least two
network interfaces on a USM Appliance Sensor or USM Appliance All-in-One:
n Management interface — Configure the interface with an IP address, which you can reach
from the network. Use this interface for administrative purposes and communication with
other USM Appliance components. See Set Up the Management Interface.
n Network monitoring interface — Do not configure an IP address on the interface. Instead,
connect the interface to a spanned or mirrored port on a network switch , so that
USM Appliance can examine the throughput. You can use more than one network mon-
itoring interface to observe several networks from a single USM Appliance Sensor. See Con-
figuring AlienVault NIDS.
The USM Appliance Server consumes the NIDS signatures through plugins, which generates
the AlienVault NIDS events. The correlation engine processes and correlates the normalized
events, then stores them in the SIEM database.
USM Appliance comes with AlienVault NIDS already enabled, but you need to perform the
steps below in order to monitor network traffic.
3. Using SPAN or mirror ports, configure your network devices to send traffic to the
monitoring interface.
Otherwise, you can configure the network interface by using the web UI (recommended) or
the AlienVault Setup menu.
4. Click Detection.
5. In the Listening Interfaces area, click the plus (+) sign next to the interface you want to
add.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
4. Use the keyboard arrow keys to move to the interface, select the interface by pressing
the spacebar, and then press Enter (<OK>).
5. Press <Back> until you are on the AlienVault Setup menu again. Select Apply all Changes.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
4. Type the network addresses you want to monitor, separating with comma, and then
press Enter (<OK>).
5. Press <Back> until you are on the AlienVault Setup menu again. Select Apply all Changes.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
You can view AlienVault NIDS events the same way as you do any other security events. For
reference, see "Security Events (SIEM) Views" in the Event Management section of the
USM Appliance User Guide.
AlienVault NIDS events suggest that an attack may have occurred, but they don't guarantee
that such attack has occurred. Therefore, you must examine the traffic that triggered the
signature and validate the malicious intent, before proceeding with your investigation.
At the bottom of the event details page, all AlienVault NIDS events include a payload and the
rule that identified the issue. You can examine the payload of the offending packet, study the
rule, or download the PCAP file for off-line analysis.
Occasionally you may want to customize the AlienVault NIDS rules or enable a rule that is
disabled by default, so that the detection works better in your network. This section describes
how to accomplish both.
Important: The steps below have been written for the USM Appliance All-in-One.
If running the USM Appliance Server and USM Appliance Sensor separately, you must
perform step #1 through #7, step #9, and step #10 on each Sensor. You must perform
step #8 on the USM Appliance Server, after copying the local.rules file from the
Sensor to the Server. This is because the database only exists on the Server.
4. Place the rule you want to enable into /etc/suricata/rules/local.rules and save
your changes. One way to do this is to copy the rule(s) from the original rule file and paste
it into local.rules, making sure to remove the "#" at the beginning of the line.
# cat /etc/suricata/rules/local.rules
alert ip any any > any any (msg:"ET POLICY Credit Card Number Detected in
Clear (15 digit dashed 2)"; pcre:"/ (3[4|7]\d{2}|2014|2149|2131|1800)-\d
{6}-\d{5} /"; reference:url,www.beachnet.com/~hstiles/cardtype.html;
reference:url,doc.emergingthreats.net/2009294; classtype:policy-violation;
sid:2009294; rev:1;)
Note: To ensure that the rule doesn't conflict with existing rules, you should use a
SID between 5,000,000 and 5,999,999.
5. Repeat the command for all the rules you want to enable.
6. Modify the rule(s) if needed and save your changes.
7. Using a command line text editor of your choice, add a reference to local.rules at the
bottom of /etc/suricata/rule-files.yaml
%YAML 1.1
---
default-rule-path: /etc/suricata/rules
rule-files:
- emerging_pro-activex.rules
- emerging_pro-attack_response.rules
- emerging_pro-chat.rules
[...]
- suricata-smtp-events.rules
- suricata-stream-events.rules
- local.rules
8. Run the following script to import the rules to the database
9. Restart the AlienVault NIDS service for your changes to take effect
Warning: If you are using USM Appliance version 5.3.3 or earlier, running threat
intelligence or plugin feed updates will overwrite any changes you made to the
local.rules file. To avoid this issue, upgrade to USM Appliance version 5.3.4 or later.
The AT&T Alien Labs™ Security Research Team provides threat intelligence updates, such as
new Intrusion Detection System (IDS) rules and signatures, to customers running
USM Appliance version 5.4.3 or later.
To detect the latest threats with AlienVault NIDS, you should keep the IDS signatures in
USM Appliance up-to-date. USM Appliance checks for threat intelligence updates every 15
minutes. Once an update becomes available, a message appears in the Message Center. For
details, see "About the Message Center" in the USM Appliance Deployment Guide.
After you have reviewed the information in a threat intelligence update and decided to install
it, you need to run the update manually either through the web interface (recommended) or
the AlienVault Setup menu.
Note: This updates signatures and rules for all packages listed in the update
summary, not just the IDS signatures.
The upgrade process can take several minutes. After completion, the page displays a
message indicating a successful update.
Note: The AlienVault console does not show the list of available updates, but you
can check the update progress.
The upgrade process can take several minutes. After completion, the console displays a
message indicating a successful update.
Important:
l A USM Appliance system cannot serve both as a VPN server and a VPN client at the
same time.
l You cannot configure a USM Appliance Enterprise Server to be the VPN client.
Prerequisites 178
Prerequisites
You must have already set up your USM Appliance Server, USM Appliance Sensor, or
USM Appliance Logger, with one exception. If you intend for your Sensor or Logger to act as
the VPN client, you only complete setup up to, but not including, the tasks in Configure the
USM Appliance Sensor after Deployment or Configure the USM Appliance Logger after
Deployment, as applicable.
Before completing that configuration task, you must have first created a VPN tunnel between
the VPN server and VPN client. This gives you the VPN IP address required to configure the
Sensor or Logger in that role.
To set up a VPN between two USM Appliance components, for example, between a
USM Appliance All-in-One and a USM Appliance Sensor, or between a USM Appliance Server
and a USM Appliance Logger, you need to configure through the AlienVault Setup menu, on
the System Preferences > Configure Network > Setup VPN screen:
Note: You must have completed the USM Appliance registration to see the VPN-related
configuration options in the AlienVault Setup menu.
If setting up VPN in USM Appliance version 5.0 or earlier, you first enable VPN, then configure
the VPN server.
If setting up VPN in USM Appliance version 5.1 or later, these tasks are reversed, with the VPN
server configuration first, then VPN enablement.
When you configure a VPN server, you create the VPN interface by specifying the following
parameters:
1. Log in either locally or remotely to the AlienVault appliance that you want to act as the VPN
server.
2. From the Setup Main menu, go to System Preferences > Configure Network > Setup
VPN > Configure VPN server, then press Enter (<OK>).
7. Use the <Back> option and press Enter until the AlienVault Setup menu reappears.
The system applies the changes and restart the services, then console displays: Changes
Applied.
10. Press Enter (<OK>).
Enabling VPN
1. From the AlienVault Setup Main menu, go to System Preferences > Configure Network
> Setup VPN > Enable/Disable VPN, then press Enter (<OK>).
2. Use the arrow keys to move the asterisk(*) to "yes", press the spacebar to select, and then
press Enter (<OK>).
You must complete the following VPN client creation tasks in the order presented:
This task builds a tunnel between the configured VPN server and the node intended to act as
the VPN client.
The system confirms that the VPN client node was successfully contacted:
Note: Make note of the VPN IP address, because you will need it for the client
configuration task.
If the tunnel creation process does not finish successfully, the following message appears
instead:
If the VPN client you are configuring is a USM Appliance Sensor or USM Appliance Logger, you
need to finish the configuration by performing some additional steps. Click the corresponding
link below for details.
Important: Make sure to use the VPN IP address you noted from the output in step 6 in
creating the VPN client.
If there is no connection between the VPN server and the client, which is often the case in an
MSSP (Managed Security Service Provider) environment, an error occurs when you try to
configure the client:
a. On the VPN server, go to the AlienVault Setup Main menu and select Jailbreak Sys-
tem, press Enter twice to confirm.
b. Go to /etc/openvpn/nodes/ and locate the <client_IP>.tar.gz file, where <cli-
ent_IP> is the VPN client IP address you specified in step 4 when creating the VPN cli-
ent.
c. Using scp, or a similarly secure copy method, transfer the <client_IP>.tar.gz file to
d. Confirm that the configuration file is the correct one, the file copied in Step 3 of this
procedure, then press Enter (<Yes>).
Additional Step When the VPN server and VPN client Reside in Different
Networks
Please be aware that if the VPN client and VPN server are in different private networks and
the connection from the VPN client to the VPN server is only allowed through their public IP
addresses, you need to change the IP address in the configuration file manually.
Let's consider the following example, where the VPN server and VPN client have different
private the public IP addresses:
When configuring the VPN client, enter the public IP address for the client, in this case
145.156.44.33. Extract the resulting /etc/openvpn/nodes/145.156.44.33.tar.gz file and
locate the VPN client configuration file, 145.156.44.33.conf. Observe that the private IP
address of the VPN server (192.168.0.1) is added instead of the public IP address, as
indicated in line 4 below:
client
dev tun
proto tcp
remote 192.168.0.1 33800
resolv-retry infinite
nobind
user nobody
group nogroup
verb 3
ca /etc/openvpn/145.156.44.33/ca.crt
cert /etc/openvpn/145.156.44.33/145.156.44.33.crt
key /etc/openvpn/145.156.44.33/145.156.44.33.key
script-security 2 system
up "/etc/init.d/fprobe stop || true"
comp-lzo
persist-key
persist-tun
This causes the VPN tunnel not be established. Changing the IP address to 88.132.33.11 in
the file above resolves this issue.
1. Open a browser window, using the VPN server IP, and log into USM Appliance with admin-
istrator credentials.
2. Go to Configuration > Deployment > Components and verify that the components
display a VPN IP address:
When you disable a VPN tunnel, it does not remove the configuration files and system-
generated certificates from the appliance. You can enable the same tunnel again, if needed.
If you decide instead to establish a new VPN tunnel on the same AlienVault appliance, repeat
the procedures. The system then overwrites the existing configurations.
You can disable a VPN configuration from either the VPN server or a VPN client.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
6. Use the arrow keys to move to "no", press the spacebar to select, and then press Enter
(<OK>).
7. Press <Back> until you are on the AlienVault Setup menu again. Select Apply all Changes.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
AlienVault strongly recommends that you configure USM Appliance for high availability,
particularly, for compliance requirements, so that no data are lost.
Note: AlienVaultUSM Appliance supports HA only in its USM Appliance Standard and
USM Appliance Enterprise products.
This HA system remains operational, with the primary (master) instance being active and the
secondary (slave) instance, passive. If the primary instance fails, the secondary instance
becomes active automatically, replacing the failed node.
Active (left) and passive (right) nodes for a USM Appliance system component
When you are ready to bring the failed node back on line, it again becomes the active node
and the node that took its place reverts to being the passive node. Users must make the
switch manually.
Each node has a unique IP address, but shares the same virtual IP address with its clone.
The HA deployment always starts with the USM Appliance Server and the USM Appliance
Sensor. If the USM Appliance Logger is part of your USM Appliance deployment, you should
configure it last.
Before you start, review the prerequisites and restrictions in setting up a high availability (HA)
USM Appliance system.
l Because this HA feature does not work across dispersed locations (due to their different IP
addressing), both the primary and secondary systems must be on the same subnet.
l To avoid any network failures that could affect USM Appliance high availability, nodes
must be connected through a dedicated network cable, without any networking equip-
ment.
l Use isolated interfaces (for example, eth1) at each node.
l Make sure that the primary and secondary nodes are running the same image of Ali-
enVault USM Appliance. For example, if the primary node is updated to USM Appliance ver-
sion 5.3 from a previous version but the secondary node is a fresh install of
USM Applianceversion 5.3, HA will not work properly.
l When setting up HA in USM Appliance Enterprise systems, the root user password must
not contain the following characters: ? * [ ] { } ! \ ^ $ " / ' ` < > |
Important: Any network latency or network disconnection issues that can lead to
replication failure must be fixed promptly.
The USM Appliance Standard Server is the first USM Appliance component that you must
configure for HA.
See also Example: Configuring High Availability for USM Appliance Standard Servers.
You must first deploy and configure the node you intend to act as the passive node, or slave.
You configure the active, or master, node, second. Both procedures appear below.
4. When you see the command line prompt, access and edit the file /etc/ossim/ossim_
setup.conf as indicated in the angle-bracketed variables below:
ha_heartbeat_start=yes
ha_local_node_ip=<slave_appliance_IP>
ha_other_node_ip=<master_appliance_IP>
ha_other_node_name=<master_appliance_name>
ha_password=<password>
**This password must be the same for both slave and master.**
ha_role=slave
ha_virtual_ip=<virtual_IP>
Important: The ha_role value must always equal "slave" for the secondary node.
screen alienvault-ha-assistant -e
Note: Use screen to keep the process running in the background even when the
session disconnects.
alienvault-ha-assistant –s
8. When prompted, enter the remote (master) root user password.
4. When you see the command line prompt, access the file /etc/ossim/ossim_setup.conf
and edit it as indicated within the angle-bracketed variables, as shown below:
ha_heartbeat_start=yes
ha_local_node_ip=<master_appliance_IP>
ha_other_node_ip=<slave_appliance_IP>
ha_other_node_name=<slave_appliance_name>
ha_password=<password>
**This password must be the same for both slave and master.**
ha_role=master
ha_virtual_ip=<virtual_IP>
5. Save the changes.
screen alienvault-ha-assistant -e
Note: Use screen to keep the process running in the background even when the
session disconnects.
alienvault-ha-assistant –s
8. When prompted, enter the remote (slave) root user password.
After about five minutes, you see output confirming that the node is running.
9. Launch a web browser and verify that you can access the USM Appliance system, using
the HA virtual IP specified in the ossim_setup.conf file.
This topic provides an example of how to configure two USM Appliance Standard Servers in a
high availability environment.
The primary appliance has the name MasterAppliance, and the secondary appiiance has the
name SlaveAppliance.
1. If not already done, deploy the USM Appliance Standard Server according to the instruc-
tions in USM Appliance Deployments.
2. Change the root user password in both appliances, as described in "Reset Password for
the Root User" in the USM Appliance User Guide, making sure that the password is the
same in each.
a. On the AlienVault Setup Main menu, go to System Preferences > Configure Host-
name.
MasterAppliance
c. Press Enter (<OK>).
SlaveAppliance
c. Press Enter (<OK>).
5. Configure each failover pair to communicate and synchronize with its respective
NTP server.
See High Availability Prerequisites and Restrictions and Configure Synchronization with
an NTP Server.
9. When you see the command line prompt, edit the file /etc/ossim/ossim_setup.conf as
below
screen alienvault-ha-assistant -e
Note: Use screen to keep the process running in the background even when the
session disconnects.
alienvault-ha-assistant –s
13. When prompted, enter the root user password for the primary (master) server.
After about five minutes, you see output, showing HA status for the secondary (slave)
heartbeat status should be Running.
14. On the primary (master) appliance, log into the AlienVault console.
15. On the AlienVault Setup Main menu, choose Jailbreak System.
screen alienvault-ha-assistant -e
Note: Use screen to keep the process running in the background even when the
session disconnects.
alienvault-ha-assistant –s
20. When prompted, enter the root user password for the secondary server.
After about five minutes, you see output, showing HA status for the secondary (slave)
heartbeat status as Running.
21. Launch a web browser, check that you can access the USM Appliance Standard Server
through the ha_virtual_ip assigned in the ossim_setup.conf file.
This process has three tasks you perform in the following order:
ha_heartbeat_start=yes
ha_local_node_ip=<slave_appliance_IP>
ha_other_node_ip=<master_appliance_IP>
ha_other_node_name=<master_appliance_name>
ha_password=<password>
**Password must be same for both slave and master**
ha_role=slave
ha_virtual_ip=<virtual_appliance_IP>
Important: The ha_role value must always equal "slave" for the secondary
node.
screen alienvault-ha-assistant -e
Note: Use screen to keep the process running in the background even when the
session disconnects.
alienvault-ha-assistant -s
7. When prompted, enter the password for the primary (master) root user.
You must wait about five minutes until you see output, as shown in Step 8 of Configuring
the Secondary Standard Server for HA.
ha_role=master
ha_virtual_ip=<virtual_appliance_IP>
3. Save the changes.
screen alienvault-ha-assistant -e
Note: Use screen to keep the process running in the background even when the
session disconnects.
5. Swap the token with the secondary node, effectively making the primary node active:
alienvault-ha-assistant –w
6. Check that the primary node is up and running:
alienvault-ha-assistant –s
7. When prompted, enter the remote (slave) root user password.
After about five minutes, you see output, as shown in Step 8 of Configuring the
Secondary Standard Server for HA
Configuring Communication Between the Primary Sensor and the Primary Server
To configure communication between the primary sensor and the primary server
Note: If you are still logged into the appliance from the previous task and in
command line mode, return to the Setup Main menu by entering alienvault-
setup.
2. From the AlienVault Setup Main menu, select Configure Sensor > Configure AlienVault
Server IP.
3. Enter the virtual IP address of the USM Appliance Standard Server pair and press Enter
(<OK>).
4. Select Configure AlienVault Framework IP, then enter the same IP address; press Enter
(<OK>).
5. Launch the AlienVault USM Appliance web interface and go to Configuration > Deploy-
ment > Components > Sensors.
6. Insert the primary USM Appliance Standard Sensor.
Configuring Communication Between the Secondary Sensor and the Primary Server
1. Log into the primary Standard Server and select Jailbreak System, press Enter (<OK>), and
again Enter (<Yes>).
Configuring Communication Between the Primary Sensor and the Secondary Server
1. Log into the secondary Standard Server, repeat step 1. (jailbreak the system) of the
previous task.
Configuring Communication Between the Secondary Sensor and the Secondary Stand-
ard Server
1. On the secondary Standard Server, repeat step 1. (jailbreak the system) of the previous task.
Whenever you add one or more USM Appliance Standard Sensors to the USM Appliance
Standard Server in a system, you must add server-specific firewall rules to the sensors. This
preserves the ability to execute remote scans.
This topic describes how to add firewall rules and also how to disable them when you need to
disable HA, for example, during an upgrade.
l On each USM Appliance Standard Sensor, enter the following command, even if not all
sensors are part of the HA configuration:
l Run the following command in the USM Appliance Standard Sensor(s) to remove the
configuration:
alienvault-ha-assistant -d
l Run the following command in the USM Appliance Standard Sensor(s) to restore firewall
rules:
Prerequisites
l You must have already deployed and configured the USM Appliance Standard Logger as
described in USM Appliance Deployments minus the task of Configure the USM Appliance
Logger after Deployment.
l You must have already configured the USM Appliance Standard Servers for HA.
l You may configure the USM Appliance Standard Loggers for HA either before or after the
USM Appliance Standard Sensors.
2. From the AlienVault Setup Main menu, select Jailbreak System, press Enter (<OK>), and
Enter again.
3. After you see the prompt, configure HA in the secondary node, or slave in
/etc/ossim/ossim_setup.conf as indicated by the angle-bracketed text:
ha_heartbeat_start=yes
ha_local_node_ip=<slave_appliance_IP>
ha_other_node_ip=<master_appliance_IP>
ha_other_node_name=<master_appliance_name>
ha_password=<password>
**The password for both slave and master must be the same.**
ha_role=slave
ha_virtual_ip=<virtual_appliance_IP>
Important: The ha_role value must always equal "slave" for the secondary node.
screen alienvault-ha-assistant -e
Note: Use screen to keep the process running in the background even when the
session disconnects.
alienvault-ha-assistant –s
7. When prompted, enter the remote (master) user password.
After about five minutes, you see output, as shown in Step 8 of Configuring the Secondary
Standard Server for HA.
ha_heartbeat_start=yes
ha_local_node_ip=<master_appliance_IP>
ha_other_node_ip=<slave_appliance_IP>
ha_other_node_name=<slave_appliance_name>
ha_password=<password>
**This password must be the same for both slave and master.**
ha_role=master
ha_virtual_ip=<virtual_appliance_IP>
3. Save the changes.
4. Enable HA in the primary node by entering the following:
screen alienvault-ha-assistant -e
Note: Use screen to keep the process running in the background even when the
session disconnects.
7. Launch a web browser and verify that you can access the USM Appliance system, using
the virtual IP specified in the ossim_setup.conf file.
You configure communication between the remaining nodes solely through the AlienVault
console.
Complete this task only after you have added the primary Standard Server to the primary
(active) logger through the USM Appliance web interface.
2. Repeat steps 2. and 3. of Adding the Secondary Server to the Primary Logger.
Note: Keep the session open and in command line mode for completion of the next
task.
l From the command line of the secondary Standard Logger, add the secondary Standard
Server:
Unlike the USM Appliance Standard Server topology, the USM Appliance Enterprise Server
consists of two separate devices, an Enterprise Server and an Enterprise Database.
Configuration consists of configuring the Enterprise Servers to communicate with their
Enterprise Databases, and for one Enterprise Server to fail over to another.
Prerequisites
l You must have already deployed and configured each appliance, as described in Configure
the USM Appliance Hardware.
l You must have configured the following:
o The same root password in both the Enterprise Server and Enterprise Database.
o A hostname for each failover node pair that makes it obvious which is the master and
1. Log into the secondary Enterprise Server, jailbreak the console, and set HA values, as
described in Configuring High Availability for USM Appliance Standard Servers.
a. Log into the Enterprise Database node intended for the secondary Enterprise Server
node and jailbreak the console.
ha_heartbeat_start=yes
ha_local_node_ip=<slave_database_admin_IP>
ha_other_node_ip=<master_database_admin_IP>
ha_role=slave
c. Save the changes.
3. Log back into the secondary Enterprise Server node and jailbreak the console.
screen alienvault-ha-assistant -e
Note: Use screen to keep the process running in the background even when the
session disconnects.
alienvault-ha-assistant -s
The system prompts you for the primary (master) root user password.
6. Enter the password, then wait approximately five minutes until a screen appears, showing
a value of Heartbeat status=Running.
1. Follow the steps in Configuring HA in the Secondary Enterprise Server and Database, but
in /etc/ossim/ossim_setup.conf, make the changes shown in the angle-bracketed
variables below:
ha_heartbeat_start=yes
ha_local_node_ip=<master_database_admin_IP>
ha_other_node_ip=<slave_database_admin_IP>
ha_role=master
2. Save the changes.
3. Log into the primary, or master, Enterprise Server, jailbreak the console, and, at the
command line prompt, enter:
screen alienvault-ha-assistant -e
Note: Use screen to keep the process running in the background even when the
session disconnects.
3. Add the primary Enterprise Database to the secondary Enterprise Server node, using the
command:
4. Log into the primary Enterprise Server node as previously described, and add the
secondary Enterprise Database:
1. Using the virtual IP address referenced in ossim-setup.conf, launch the USM Appliance
web interface in a browser.
Both databases should be visible, including the one functioning as a secondary, or slave,
database.
4. Sensor pair
Important: If you fail to do this, you can introduce a vulnerability into the network.
1. Log into the secondary (slave) node and launch the AlienVault console.
2. In the AlienVault Setup Main menu, select Jailbreak System, press Enter (<OK>), then
Enter (<Yes>) again.
alienvault-ha-assistant -d
4. Exit the command line mode:
exit
5. In the primary (master) node, repeat steps 1. through 4.
exit
7. Repeat the foregoing steps for all of the component pairs in your HA deployment the
previously mentioned order.
Prerequisites
To upgrade USM Appliance to a new version, you must first temporarily disable HA. See
Disabling High Availability .
l Loggers
l Servers
l Sensors
1. Connect to the AlienVault Console on the secondary node through SSH and use your
credentials to log in.
2. Update the node by selecting System Preferences > Update AlienVault System >
Update System.
3. Press Enter (<Yes>) and wait until you see the following message:
5. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
Note: You need to do this step because ha_heartbeat_start was set to no when
disabling HA before the update.
8. Re-enable HA.
Run this command first on the secondary node, then on the primary node:
screen alienvault-ha-assistant -e
Note: Use screen to keep the process running in the background even when the
session disconnects.
9. (If and only if upgrading the Standard Sensors) On the primary node, swap the token
with the secondary node, effectively making the primary node active:
alienvault-ha-assistant –w
AlienVault provides more than one way to enable plugins in USM Appliance. You can enable
plugins on specific discovered assets, or you can enable plugins globally on USM Appliance
Sensors. In addition, based on the plugin types, you can enable plugins using different tools,
including the USM Appliance web UI, the Getting Started Wizard, or the AlienVault Console.
Most of the plugins in USM Appliance do not require additional configuration after they are
enabled, especially if you enable the plugin on an asset. But if you choose to enable the plugin
at the sensor level and USM Appliance does not have the required configuration files on the
sensor; or if you are enabling a database plugin, an SDEE plugin, or a WMI plugin, you will need
to perform some extra steps before the plugin can operate correctly.
In a limited number of environments, the built-in plugins may not quite fit specific needs or
provide enough intelligence to normalize data and extract required information from all logs
received. In such cases, you may be able to customize an existing plugin. You can also create
your own custom plugins, choosing from various options available to create plugins by
scratch, and directly editing plugin configuration file; or use the plugin builder provided in the
USM Appliance web UI, to create a plugin using an interactive program wizard.
Plugin Fundamentals
The USM Appliance Sensor uses plugins to extract and normalize data received from different
data sources.
Note: You can examine which data sources are supported by default by examining the
content of the /etc/ossim/agent/plugins directory, or by examining listed data
sources in the AlienVault Console or in the USM Appliance web UI.
During data normalization, a plugin evaluates each log file line and translates it to an event
that identifies the event’s type and subtype within the USM Appliance Event Taxonomy.
The Plugin File Header — lead-in section that provides basic information on relevant vendor,
product, version, and per asset information associated with a plugin.
The DEFAULT Section — Provides plugin ID and default values of fields for every event
parsed by the plugin. In the example, default values are set for the destination IP address and
destination port.
The Config Section — Defines the plugin type, whether a plugin is enabled, source of the
plugin, location of a log file the plugin is reading from, and associated processes and start and
stop functions.
The Translation Section — Provides translation and conversion of extracted log token and
other text and numeric data to values stored in the SIEM database.
The Rules Section — Used to define one rule for each event that may come from a data
source. Each rule is composed of a regular expression that defines how to extract information
from log events, and mapping between extracted information and the normalized event
fields. In the example, only one rule is shown on the right side of the slide for the sake of
readability.
l Product and Vendor Information — Express the product name and vendor information
for the plugin, using the following format: Fortinet:Fortigate. In this example, Fortigate
is the product and Fortinet is the vendor of that product.
l Version Information — The version information allows you to select the right plugin
when multiple plugins exist for any one version, or when there are multiple plugins, based
on log format or intended output.
All plugins set version information to "-" out of the box, because not all applications use
versions. Should this be the case for your plugin, you can just maintain the default setting
of the version field. When customizing or creating new plugins, verify whether or not your
plugin is versioned and, if so, add the version information.
l Per Asset Information — Some plugins must be activated for each asset in your network.
If Per Assets is not set, USM Appliance defaults to "Yes" (Y) and activates the plugin on
each asset.
If your plugin should not be activated per asset (the AlienVault HIDS plugin, for example),
Per Asset must read "No" (N).
The [DEFAULT] section of the plugin configuration file specifies the plugin_id, which is a
unique ID for the plugin data source. For example, plugin_id=4003 is a plugin for OpenSSH.
The plugin ID is also used when referring to plugins in correlation rules, and when defining
policies in USM Appliance.
Users can use the range of 9001 to 2147483647 as plugin IDs, except for the following values,
which are reserved
90003, 90005, 90007, 90008, 10002, 12001, 19004, 19005, 19006, 20505
The [config] section of the plugin configuration file specifies the basic settings for this plugin.
For example
Note: Location is present only in plugins that use a log as a source. Plugins that use
other sources contain other plugin-specific information (for example, how to
connect to a MySQL database).
The [translation] section translate token values of a source log and assign them to a
normalized event field. Translations are useful when you have similar log messages that
describe different events, such as when the difference between messages is only in the value
of a token and not the structure of the message itself. In this situation, you can use only one
rule to parse different messages and use translations to translate (non-numeric)values from
messages to numeric values that can be used as plugin_sid (event type ID) values.
l Translation table — Defines the mapping between values in log messages and values in
normalized event.
l translate() function — Translates values from tokens into values in normalized event
fields by following the translation table.
In the sample configuration file (shown in the ssh.cfg illustration), the “sid” token in the log
message can take the following non-numeric values: none, opened, publickey, version,
throughput, closed, and password. Different values of the sid token indicate different log
messages. Values of the sid token are translated into numeric values as defined by the
translation table, and then used as the plugin_sid value for individual events. Translations can
also be defined to convert other text values to numbers as well.
The rest of the plugin configuration file belongs to the rules section. It contains rules that
define the format of each event and how data extracted by a regular expression for each
event will be normalized into standard event fields. Each rule in a plugin is defined with a
name and the event type, which is defined using the event_type=event line in the plugin
configuration file.
The regexp field contains the regular expression that defines the format of the events, and
extracts the information to normalize it. The regular expressions are written using Python
regular expression syntax.
Note: For more information about the syntax or construction of regular expressions,
refer to resources on the subject available on the Internet. You may also want to check
out AlienVault® Training courses that provide more information and hands-on labs
covering plugin development and, in particular, regular expressions used to define plugin
rules.
In the figure
l Fields that are shown in italics are mandatory in each normalized event.
l Fields that are shown in blue (★ ) include values that always have to be defined in the plu-
gin file.
l Fields that are shown in green (♦) include values that will be filled automatically in case the
values are not found in the log (for example, source IP address is set to 0.0.0.0, and source
and destination ports are set to 0, if not found in the log).
l Fields that are shown in grey (ᴑ) are optional and can be left empty if the values are not
found in the log.
It is recommended that specific rules be defined with a low numerical value in the name and
general rules be defined with a large numerical value in the name. Naming specific rules with
lower values allows them to be processed before the general rules, which are defined to catch
all events that were not previously matched.
For example
l Plugin ID
l Event type ID
l Database fields written for each event
l Name assigned to the event
l Priority and reliability values
The following illustration shows the ssh.sql file associated with the ssh.cfg file described in
previous sections.
If you have , you need to import the corresponding plugin .sql file to the SIEM database using
the following command:
The USM Appliance plugins process data collected from different data sources, parse and
normalize the data, and save that data as standard format events in the SIEM database. Users
can then view and analyze these events in the USM Appliance web UI.
Plugins define
A plugin is a software component that provides logic specific to extracting data collected
from external applications and devices. Plugins are enabled in USM Appliance Sensors, which
receive data from remote hosts using the following sources or protocols
l Syslog
l Windows Management Instrumentation (WMI)
l Security Device Event Exchange (SDEE)
l Database
l Other protocols
Any system that processes logs requires a parser to read them, and to extract and convert
their data into standard event fields. The following illustration shows the way in which a
USM Appliance Sensor collects syslog messages from different devices, where enabled
plugins can then process and normalize the event data contained in specific log files.
During data normalization, a plugin evaluates information from each line of a log file and
translates it to an event that identifies the event's type and subtype within the USM Appliance
taxonomy. (See USM Appliance Event Taxonomy.) Normalization also converts portions of
each log line into common data fields such as user, date and time, and source or destination
IP address.
Normalizing information into standard event data fields lets USM Appliance display
information uniformly and also correlate events from various individual systems to generate
alarms.
Plugin Types
The plugins included in USM Appliance are called detector plugins. They receive and extract
events from logs, which include
USM Appliance uses rsyslog as its default syslog implementation. The configuration files
of all external devices reside in /etc/rsyslog.d.
l Logs retrieved using other mechanisms such as SDEE (Security Device Event Exchange) or
WMI (Windows Management Instrumentation).
Note: For a current list of all AlienVault provided plugins, see the data sheet.
The Source field of each plugin file indicates the type of detector plugin.
[config]
type=detector
enable=true
source=log
There are four types of detector plugins in USM Appliance, which are summarized in the
following table.
Plugin
Description Examples
Source
Database Monitors the content of external databases. Database plugins extract mcafee-epo
data from an external database and turn them into USM Appliance
events. Supported databases are MySQL and Microsoft SQL Server. The
database plugin configuration file provides information on how USM
Appliance should connect to and query the database. See Configure
Database Plugins for an example of database plugin configuration file
and to obtain more information on configuring database plugins.
Log Monitors a log file, usually receiving data through syslog. Log plugins cisco-asa
extract events from log files by matching each line in a log file using a
regular expression. The plugin then normalizes the information in the
text to create events containing event field data from the text. See
Configure Log Plugins for an example of log plugin configuration file
and to obtain more information on configuring log plugins.
SDEE Monitors Cisco devices, using SDEE protocol. Cisco Systems IPS Sensor cisco-ips
5.0 uses the Security Device Event Exchange (SDEE) protocol to specify
the format of messages used to communicate events generated by
certain Cisco security devices. See Configure SDEE Plugins for an
example of SDEE plugin configuration file and to obtain more
information on configuring SDEE plugins.
WMI Remotely connects to Microsoft Windows events and data without an wmi-
agent. Windows Management Instrumentation (WMI) plugins collect application-
Microsoft Windows events and data remotely. These plugins collect the logger
information, without an agent, using the Windows Management
Instrumentation Command Line (WMIC). See Configure WMI Plugins for
an example of WMI plugin configuration file and to obtain more
information on configuring WMI plugins.
Most detector plugins work automatically, without additional configuration, after you enable
them. (See Enable Plugins.)
IDM Plugins
IDM Plugins are a special type of detector plugin that collect additional information about
devices and applications. This information is used to enhance the metadata of individual
events when USM Appliance processes event data collected from other plugins. The IDM
plugins in USM Appliance include
l arpalert-idm
l cisco-acs-idm
l linuxdhcp-idm
l nmap-hosts
l ossec-idm-single-line
l prads
l snare-idm
Note: The prads plugin, which identifies and collects information on network services
running on hosts, is automatically enabled at startup, by default. Thus, no additional
setup or configuration is required before you can start taking advantage of IDM
information. Although not required, you can enable additional IDM plugins to gather
information from different sources. For more information, see Enable Plugins.
Scheduled inventory tasks such as asset discovery scans, WMI scans, and availability
monitoring can also collect IDM information. Information collected by the IDM plugins and
other scheduled processes is stored in an internal database, which also maintains historical
data retrieved for the same hosts.
USM Appliance queries this data to enrich the metadata for events that are processed from
other device and application-specific plugins. In addition, if values have changed in the
historical data maintained for IDM data sources, the USM Appliance will generate an anomaly
event that shows the change between the new and previous values. For more information on
viewing anomaly events containing IDM information, see Reviewing Security Events.
Plugin Updates
AlienVault USM Appliance notifies users when there is an update to the existing plugins,
accessible from the USM Appliance Message Center.
These updates typically occur every two months. Starting with release version 5.4, plugin
updates can also be scheduled and you can configure threat intelligence and plugin updates
to run automatically. See Update USM Appliance Online.
Note: The USM Appliance Sensor and USM Appliance Server must be updated
independently.
If you see a message similar to "Plugins Feed Update - <YYYY-MM-DD>," it means that you
have a plugin feed update. The Plugins Feed Update message displays the release notes, as
shown.
Update Plugins
To install the latest plugin updates
2. Review information about what the plugin package contains by clicking the Arrow icon (
)
Note: If you choose the Update All option, instead of Update Feed Only,
USM Appliance applies a full system upgrade, which will include any plugin updates
that are available.
Enable Plugins
AlienVault provides more than one way to enable plugins in USM Appliance. First, you can
enable plugins on specific discovered assets, or you can enable plugins globally on USM
Appliance Sensors. In addition, based on the specific plugin, you can enable plugins using
different tools, including the USM Appliance web UI, the Getting Started Wizard, or the
AlienVault console.
The following topics provide more information about the two choices available for enabling
plugins.
Important: Be careful not to enable the same plugin twice, because this will generate
duplicate events.
Below is a list of plugins that can only be enabled at the sensor level.
For those plugins that allow it, enabling plugins on specific assets is generally recommended
over enabling plugins on the USM Appliance Sensor. Plugins enabled at the asset level are
automatically configured, whereas plugins enabled at the sensor level must often be
configured first. For log-based plugins, this means setting up rsyslog collection and
processing, and log rotation. (See Configure the USM Appliance Sensor to Receive Logs
Through Syslog.)
Convenience and performance may also be factors in choosing whether to enable plugins on
individual assets, or to enable them on the USM Appliance Sensor. Enabling plugins on
individual assets can help distribute the load of handling heavy traffic by running copies of the
plugin on multiple processors or cores, rather than on a single one. However, if you want to
use the same plugin with a large number of assets, and volume of traffic is not an issue, you
may find it easier to enable and configure the plugin on the sensor.
Note: In addition to enabling the plugin, you must also configured the application or
device that the plugin is intended for to forward its log to USM Appliance. For your
convenience, AlienVault has composed a list of most commonly used devices and how
to configure log forwarding on them. See Configure Log Forwarding on Commonly Used
Data Sources.
After you run a scan of your network to discover assets, the discovered assets are saved in
the USM Appliance database. (For information on asset discovery, see Adding Assets by
Scanning for New Assets.) You can then select and enable plugins on the discovered assets.
You can enable up to 10 plugins per asset.
You can enable all plugins on an asset, except for the sensor-only ones, from the USM
Appliance web UI.
6. Select a vendor, a model, and a version of the plugin you want to enable.
7. Click Add Plugin.
8. If you want to add another plugin, select another plugin in the same way as before and
click Add Plugin; otherwise, click Save.
Enabled plugins now appear in the plugin display for the current asset:
The Receiving Data value turns green when the Source, Destination, or Device IP field of
an event matches the IP address of the asset.
Note: Incoming syslog messages for each asset are saved on the USM Appliance Sensor
in individual /var/log/alienvault/devices/<asset_IP_address> folders, one folder
per asset IP address.
You can enable all plugins, except for the sensor-only ones, from the Getting Started Wizard,
as long as you have USM Appliance All-in-One.
Note: The Getting Started Wizard is only available for USM Appliance All-in-One.
The Getting Started Wizard takes you through the initial setup tasks needed to configure
USM Appliance after deployment.
After the wizard guides you through the network scan, you will see a list of discovered assets
on the Log Management page. This page lets you enable up to 10 plugins for each of these
discovered assets and up to 100 plugins per USM Appliance Sensor.
1. Select the correct Vendor, Model, and Version number corresponding to the data that
you want to collect from that asset.
All three fields are required. The Version field defaults to ‘-‘ if no other selection is
available. The Add Plugin button is enabled.
2. If you want to enable another plugin for the same asset, click Add Plugin.
Another row is added for you to select the Vendor, Model, and Version number for a
different plugin.
3. Repeat step 1 and 2 for each plugin you want to enable. You can enable up to 10 plugins
per asset.
The Log Management Confirmation page, shown in the following illustration, displays the
plugins that you enabled. The Receiving Data value turns green when the Source,
Destination, or Device IP field of an event matches the IP address of the asset. Gray
means that no data is being received.
6. To learn how to configure your assets to send data to USM Appliance, click Instructions
to forward logs.
After you have enabled plugins for your assets, click Next at the bottom-right corner to
proceed.
You can enable up to 100 plugins on a USM Appliance Sensor from the USM Appliance web UI
or from the AlienVault Console.
The USM Appliance web UI provides the fastest way to enable plugins on the sensor,
particularly, if you have USM Appliance All-in-One.
To enable a plugin on the sensor configuration page in the USM Appliance web UI
1. In the USM Appliance web UI, go to Configuration > Deployment > Components
> AlienVault Center.
2. Click one of the USM Appliance Sensors.
The left column of the Sensor Configuration page shows the enabled plugins. The right
column shows the plugins available for enablement.
4. Move a plugin from one side to the other in either of these ways:
l Drag a plugin from one column to the other.
l Use the links [+] or [-] next to a specific item.
5. Click Apply Changes.
6. Configure rsyslog and logrotate. For instructions, see Configure the USM Appliance
Sensor to Receive Logs Through Syslog.
You can enable all plugins on the sensor from the AlienVault Console. However, you may find
it's faster to enable plugins through the USM Appliance web UI, if you have USM Appliance All-
in-One.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
4. Use the keyboard arrow keys to move to the plugin, select the plugin by pressing the
spacebar, and then press Enter (<OK>).
5. Press <Back> until you are on the AlienVault Setup menu again. Select Apply all Changes.
USM Appliance applies the changes and restarts all the services, which may take several
minutes.
7. Configure rsyslog and logrotate. For instructions, see Configure the USM Appliance
Sensor to Receive Logs Through Syslog.
Note: If you want to confirm that the correct plugin has been enabled, jailbreak the
system and open /etc/ossim/agent/config.cfg. The new plugin will appear inside the
[plugins] section.
It's good practice to test whether or not a plugin is working correctly, after you have enabled
it in USM Appliance and configured the application or device to forward logs to USM
Appliance.
Note: You can confirm the plugins enabled at the sensor level by viewing the [plugin]
section of the /etc/ossim/agent/config.cfg file. Per-asset plugin configurations are
stored in the /etc/ossim/agent/config.yml file.
1. In the USM Appliance web UI, go to Analysis > Security Events (SIEM).
2. In Data Sources, select the plugin for which you expect to see events.
If there are no events, you can troubleshoot by following the steps below.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
3. Validate that you are receiving syslog packets from the source device.
If no packets appear in the output, then USM Appliance is not receiving data from your device.
Please make sure that you have configured your device or application to forward logs to the
USM Appliance Sensor.
If the output shows the captured packets, it suggests that the issue is not the connection.
Next, you can check if the syslog messages arrive in the correct log locations.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
Messages from your device appear in different files depending on how the plugin is
enabled.
l If the plugin is enabled on a per-asset basis, incoming syslog messages are saved in
/var/log/alienvault/devices/<asset_IP>, one folder per asset IP address.
tail -f /var/log/alienvault/devices/<asset_IP>/<asset_IP>.log
l If the plugin is enabled at the sensor level, rsyslog is often configured to forward
messages to a unique file, which is defined in the location parameter under the
[config] section of the plugin file. After you have identified the file, type the following
tail -f /path/to/<data-Source-name>.log
l If syslog messages do not appear in either files mentioned above, you can check the
default location for all syslog messages.
tail -f /var/log/syslog
If you do not find new messages in the corresponding log file, but you have confirmed that
USM Appliance is receiving packets from your device through UDP port 514, verify that the
rsyslog configuration directs the messages to the correct file. Restart rsyslog if needed.
/etc/init.d/rsyslog restart
If you see new messages in the log files, but there are no events, the error is in either the
plugin or the agent configuration.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
For example, type "/ssh" and press Enter. If the plugin is running, you should see output
similar to the following
l Total lines [12759] shows the number of lines (in the data source log file) that the
plugin has processed after it is enabled.
l TotalEvents: [643] shows the number of events that the plugin has generated
from those lines.
l EPS: [0.00] means Event Per Second and it is calculated every 10 seconds.
EPS 0.00 indicates that zero event has been generated in the last 10 seconds; EPS 4.00
indicates that 40 events (683 - 643) have been generated in the last 10 seconds.
Total lines and TotalEvents may not be the same because not every line can be turned
into an event. If TotalEvents is 0, it means that the plugin has not generated any event. If
Total lines is also 0, it means that the data source log file is empty, so the plugin has no
data to process. But if Total lines is not 0, it means that the plugin does not turn those lines
into events. You can look at the plugin configuration file to investigate further or contact
AT&T Cybersecurity Technical Support.
Configure Plugins
Most of the plugins in USM Appliance do not require additional configuration after they are
enabled, especially if you enable the plugin on an asset. But if you choose to enable the plugin
at the sensor level and USM Appliance does not provide the required configuration files on
the sensor, or if you are enabling a database plugin, an SDEE plugin, or a WMI plugin, you will
need to perform some extra steps before the plugin can operate correctly.
This section describes the minimal configuration tasks for these plugin types. Most of the
tasks require that you connect to the AlienVault Console through SSH and jailbreak the
system to gain command line access. It is recommended that you are familiar with some basic
Linux commands as well as a terminal-based text editor, such as vim or nano.
Log plugins extract events from log files by matching each line in a log file using a regular
expression. The plugin then normalizes the information to create events containing the data
fields from the text.
[DEFAULT]
plugin_id=4003
dst_ip=\_CFG(plugin-defaults,sensor)
dst_port=22
[config]
type=detector
enable=true
source=log
location=/var/log/auth.log
create_file=true
process=sshd
start=no
stop=no
startup=/etc/init.d/ssh start
shutdown=/etc/init.d/ssh stop
[translation]
none=1
opened=25
publickey=2
version=22
throughput=23
closed=26
password=1
username={$user}
userdata1={$info}
userdata2={$dst}
device={resolv($dst)}
[config]
...
location=/var/log/auth.log
Log plugins extract events from logs by matching each line in the log according to a regular
expression. The plugin then normalizes the data fields from the text. For example, when a log
message arrives, as shown
Feb 8 10:09:06 server1 sshd[24472]: Failed password for dgil from 192.168.6.69
port 33992 ssh2
The SSH plugin matches it with a regular expression (regex) in the rule of
regexp=(?P<date>\w{3}\s+\d{1,2}\s\d\d:\d\d:\d\d)\s+(?P<dst>\S+) sshd\[\d+\]:
Failed password for\s(?P<info>invalid user\s)?(?P<user>\S+)\sfrom\s
(?P<src>\S+)\sport\s(?P<sport>\d{1,5})
As soon as a rule matches a log line, matching stops, no matter how many remaining rules
may match. The regular expression also extracts the relevant information from the matched
log line. The regex fields, shown in boldface in the above example, identify the text to be
mapped to the Security Event fields.
As a second step, the plugin normalizes that information for presentation within the
USM Appliance Security Event view.
The field plugin_sid identifies each individual event. This field is assigned either to every rule
or it can be based on a field captured from a log line.
Important: This task is only required if you enable the Log plugin through Enable Plugins
from the Sensor Configuration. AlienVault strongly recommends that you enable Log
plugins through assets for ease of use and maintenance, unless you want to use the
same plugin for a large number of devices.
For text logs received through the rsyslog service running on USM Appliance, you need to
define the syslog routing rules in the rsyslog configuration file, located in /etc/rsyslog.d/.
You also need to add a configuration file for logrotate, located in /etc/logrotate.d/, to
rotate the logs.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
nano –w /etc/rsyslog.d/01_<dataSource_name>.conf
Where <dataSource_name> is the name of the plugin. The prefix of 01_ ensures that the
file is processed before the default USM Appliance configurations.
4. Add the following line to the configuration file to identify the devices from which you
should receive logs.
Where
o <path>/<dataSource_name>.log matches the file listed in the location parameter of
the plugin file
o <IP_Address_1> is the IP address of the first device and <IP_Address_2> is the IP
address of the second device.
o If you want to receive logs from more devices in different subnets, add more 'or'
clauses using the same syntax, ($fromhost-ip == ‘<IP_Address>’).
o If you want to filter for a subnet or a range of IP addresses, you can use the ($from-
host-ip startswith ‘<partial_IP>’) syntax. For example, ($fromhost-ip
startswith ‘192.0.1.’).
o You can also use($fromhost == ‘<hostname>’) if DNS resolution is enabled in your
network.
5. Save the file by pressing Crtl+W and exit the editor by pressing Crtl+X.
/etc/init.d/rsyslog restart
The USM Appliance Sensor should now process the incoming logs as soon as you enable
the plugin.
nano –w /etc/logrotate.d/<dataSource_name>
8. Add the following lines of code to the file
<path>/<dataSource_name>.log
{
# save 4 days of logs
rotate 4
# rotate files daily
daily
missingok
notifempty
compress
delaycompress
sharedscripts
# run a script after log rotation
postrotate
invoke-rc.d rsyslog rotate > /dev/null
endscript
}
You do not need to keep the source log files on USM Appliance for more than a few days.
Rotating these files regularly maintains enough free disk space on USM Appliance for
standard operations.
Database plugins extract data from an external database and turn them into Events.
USM Appliance supports MySQL and Microsoft SQL Server using the UTF-8 character set
encoding.
The database plugin configuration file provides information on how USM Appliance should
connect to and query the database.
# Accepted products:
# mcafee - epo_mcafee_virtual_technician 1.0.9
# Description:
# McAfee EPO plugin
# MSSQL connection can be configured using a static port or
# a dynamic port (using instances)
# Static port config:
# source_ip=database_addr_or_hostname
# source_port=database_port (empty = default port 1433)
#
# Dynamic port config:
# source_ip=database_addr_or_hostname\database_instance (note: only one '\')
# no source_port
#
[DEFAULT]
plugin_id=4008
[config]
type=detector
enable=yes
custom_functions_file=/etc/ossim/agent/plugins/custom_functions/mcafee_epo_
custom_functions.cfg
source=database
source_type=mssql
source_ip=
source_port=1433
user=db_user
password=db_pass
db=db_epo
sleep=60
process=
start=no
stop=no
[start_query]
query="SELECT TOP 1 AutoID FROM EPOEvents ORDER BY AutoID DESC"
regexp=
[query]
query="SELECT AutoID, CONVERT(nvarchar(40), AutoGUID), ServerID, DetectedUTC,
SourceIPV4, TargetIPV4, TargetUserName, TargetFileName, ThreatCategory,
ThreatEventID, ThreatSeverity, ThreatName FROM EPOEvents where AutoID > $1
ORDER BY AutoID"
regexp=
ref=0
plugin_sid={$9}
date={normalize_date($3)}
src_ip={:mcafeeIP($4)}
dst_ip={:mcafeeIP($5)}
filename={$8}
username={$6}
userdata1=GUID {$2}
userdata2=ServerID {$2}
userdata3=Severity {$10}
userdata4={$9}
userdata5={$11}
userdata6={$1}
In the database plugin configuration file example, the section that starts with [config] tells
USM Appliance how to connect to the database. This consists of the following parameters.
[config]
type=detector
source=database
source_type=
source_ip=
source_port=
user=
password=
db=
sleep=
Parameter Description
source_type Database type that USM Appliance supports, which is mssql or mysql.
To find the point where the database plugin should begin capturing data, USM Appliance uses
a query called start_query. This query obtains the last row in a table identified by a sequence
number. The following code example initiates a query to select the largest AutoID number
from the EPOEvents table.
[start_query]
query="SELECT TOP 1 AutoID FROM EPOEvents ORDER BY AutoID DESC"
The Query Section
USM Appliance queries the database as soon as a database plugin is loaded and, thereafter,
every few seconds.
The duration between queries depends on the value of sleep in each plugin's configuration
file. Default values range from 2 to 60 seconds and are configurable. For information about
customizing existing or developing new plugins, see Customize and Develop New Plugins and
its related topics.
This query starts with [query] and also references the [start_query] code line, shown in
bold below.
[query]
query="SELECT AutoID, CONVERT(nvarchar(40), AutoGUID), ServerID, DetectedUTC,
SourceIPV4, TargetIPV4, TargetUserName, TargetFileName, ThreatCategory,
ThreatEventID, ThreatSeverity, ThreatName FROM EPOEvents where AutoID > $1
ORDER BY AutoID"
regexp=
Important: You must leave the regexp field empty (shown below the query), because
database plugins use it in operation.
And you can map them to any of the event fields, like this
username={$6}
userdata1=GUID {$2}
userdata2=ServerID {$2}
userdata3=Severity {$10}
userdata4={$9}
userdata5={$11}
userdata6={$1}
Warning: For Microsoft SQL Servers, you must use SQL Server Authentication. You will
receive a "Connection refused" error if you use Windows Authentication instead.
This task enables communication with the external database from which the plugin receives
data. You will need command line access to USM Appliance to complete this task.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
For example, to configure the mcafee-epo plugin, you need to create the mcafee-
epo.cfg.local file.
4. In the .local file, add the fields shown below and replace the angle bracket part
(including the brackets) with your database settings.
[config]
source_ip=<database_IP>
source_port=<database_port>
user=<username>
password=<user_password>
db=<database_name>
sleep=<number_of_seconds_between_sending_queries>
5. Save the file.
alienvault-reconfig -c -v -d
Important: If connecting to multiple databases, you must repeat this task for every
external database you want to receive data from. In other words, you must create a
different <database-plugin>.cfg.local file for each database you want to connect to.
If you do not see any events in Analysis > Security Events (SIEM) after you have modified
the plugin configuration file and enabled the plugin, you can troubleshoot the database
connection using tcpdump or ngrep. The following example examines the traffic to a MSSQL
database.
If the database connection cannot be established, you will receive an error instead.
Cisco Systems IPS Sensor 5.0 uses the Security Device Event Exchange (SDEE) protocol to
specify the format of messages used to collect events generated by certain Cisco security
devices. AlienVault supports this type of log collection and USM Appliance captures events
specifically from
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
3. Enter
Normally, when the session finishes, the AlienVault Agent service closes the session
automatically. If it does not, you should do it manually.
l Enter
l Enter
This procedure describes how to configure the AlienVault Agent service to accept events
from an SDEE-capable device. You will need command line access to USM Appliance to
complete this task.
[config]
source_ip=<source_IP>
user=<your_user>
password=<your_password>
Where
To configure the AlienVault Agent service to accept events from multiple SDEE-capable
devices, you will need command line access to USM Appliance to complete this task.
Important: You must not have any empty lines after the credentials.
4. In the cisco-ips.cfg.local file add the following lines. The # means to comment out
those three lines.
[config]
#source_ip=
#user=
#password=
credentials_file=/etc/ossim/agent/cisco_sdee.csv
5. Save the file.
You can now enable the SDEE plugin. See Enable Plugins on Assets.
Occasionally you may download or receive new signatures for your Cisco IPS devices. If you
want to use those signatures in USM Appliance, you will need to update the USM Appliance
database manually. You will need command line access to USM Appliance to complete this
task.
This script generates the sql needed to update the USM Appliance database.
Windows Management Instrumentation (WMI) plugins collect Microsoft Windows events and
data remotely. These plugins collect the information without an agent, using the Windows
Management Instrumentation Command Line (WMIC) .
Note: Currently, WMIC does not support samba4/NTLMv2. Nor does WMIC work on
more recent Windows versions, like Windows Server 2012 or later, because these
versions authenticate with NLTMv2 only by default.
To use a WMI plugin with a Windows host that uses NTLMv2, you must manually enable
NTLMv1 authentication. For information about this, see the Microsoft Support web pages.
userdata3={$3}
userdata4={$4}
userdata5={$5}
userdata6={$6}
username={$7}
[start_cmd]
[cmd]
You use [start_cmd] and [cmd] to return the last WMI Application event, and start reading
from that event.
This configuration procedure is for users who must contact the WMI plugin remotely from a
Windows host. The procedure is appropriate for production.
1. Create a new user in the Windows host (without any administrator privileges) who can
connect remotely. In this example, we use “wmiuser” as the username and “wmi” as the
password.
2. Enable remote access and activation permissions for the user account you just created.
a. In the Windows Start menu, type Dcomcnfg in the empty field and press Enter.
b. In the Component Services dialog box, right-click My Computer and select Prop-
erties.
3. Click the COM Security tab, then Edit Limits under Access Permissions.
4. Click ANONYMOUS LOGON, enable Allow Remote Access, and then click OK.
5. Click Apply.
6. On the COM Security tab, under Launch and Activation Permissions, select Edit Limits,
then click Add.
7. In the empty field of the popup that appears, type the username for the new user account
and click OK.
8. On the Launch and Activation Permissions dialog box, select Remote Launch, Local Activ-
ation, and Remote Activation. Click OK.
Follow this procedure to create a file with your Windows IP and credentials on USM Appliance.
You will need command line access to USM Appliance to complete this task.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
vim /etc/ossim/agent/wmi_credentials.csv
4. Add IPs, users, and password with the following formats.
xxx.xxx.x.x,<domain_name>\\<wmiuser>,<password>
Example
233.200.7.0, mydomain_name\\mr_big,uguessed1t
If you do not use a domain, enter the following instead.
xxx.xxx.x.x, <username>,<password>
5. Save the file.
In order for the WMI plugin to work correctly, you must update the plugin with the path to the
wmi_credentials.csv file you just created. You will need command line access to
USM Appliance to complete this task.
1. Depending on which plugin you've enabled, locate the WMI configuration file or files in
your USM Appliance instance. Potential file locations might be any of the following.
/etc/ossim/agent/plugins/wmi-application-logger.cfg
/etc/ossim/agent/plugins/wmi-monitor.cfg
/etc/ossim/agent/plugins/wmi-security-logger-srv2008.cfg
/etc/ossim/agent/plugins/wmi-security-logger.cfg
/etc/ossim/agent/plugins/wmi-system-logger.cfg
2. Create the file <wmi-xxxx-plugin>.cfg.local based on your choice and enter the path
to your wmi_credentials.csv file in the credentials_file field.
Example
[config]
credentials_file=/etc/ossim/agent/wmi_credentials.csv
3. Save the file.
You can now enable the WMI plugin. See Enable Plugins on Assets.
AlienVault provides a large number of plugins as part of its default installation. In most
environments this should cover the external applications and devices that you want to
integrate. However, sometimes you may need a plugin with special properties or handling of
events. Customizing a plugin refers to repurposing a particular type of existing plugin to
better suit your needs. In most cases, customization does not change the plugin type.
Developing a plugin refers to creating a new plugin from scratch, typically to collect event
from a particular device type for which no plugin currently exists. To create a new plugin, you
can edit and configure all the plugin's configuration and regex settings by hand, or you can
use the plugin builder wizard built into the USM Appliance web UI to simplify the process.
This section provides more information using each of these methods of customizing or
creating new USM Appliance plugins.
You may want to customize an existing plugin, for example, if you need to update
configuration file settings, add or update rules, exclude events, or make regex expression
changes.
<filename>.cfg.local
You can then add your changes to the plugin in the .local file. Only include the delta, or
items you want to change from the original plugin file, along with the section name that it
belongs to. For example, if you want the plugin to read from a different log file, you can
specify the location for the log file like this:
[config]
location=/path/to/file
Changes in your .local file takes precedence over any settings defined in the original plugin
file. The .local file will not be overwritten by system updates. You can change anything
within a plugin file except the header or the plugin ID, enable, type, and source parameters.
If you want to modify an existing rule, either the regexp parameter or any of the event field
mappings, you must use the same rule ID. For example, if you want to modify the [ssh -
Failed password] rule in the SSH plugin , you must include the [ssh - Failed password]
section in your .local file and specify your changes underneath.
Important: AT&T Cybersecurity recommends that you keep any plugin file that you
customized or developed until you can verify that AT&T Cybersecurity has included your
requested revision in one of its biweekly updates.
After enabling a plugin, the USM Appliance Sensor processes the plugin's log data and sends
events it collects to the USM Appliance Server, where they are stored in the SIEM database.
You can then view the events in the USM Appliance web UI by selecting the Analysis
> Security Events (SIEM) option.
After using the plugin for a while, you may find a number of events that you don't find useful
to display or track, and just create noise and take up space in the SIEM database. Rather than
creating USM Appliance policies to filter out these events, which incurs some processing
overhead, you can include the exclude_sids parameter in a .local copy of the plugin's
configuration file to achieve the same result.
[CONFIG]
exclude_sids=200,302,404,403
5. Save the file and restart ossim-agent:
/etc/init.d/ossim-agent restart
The SIDs you specify with the exclude_sids parameter are the Event Type IDs that
USM Appliance assigns to each event that matches a specific rule in the plugin configuration
file. The quickest way to locate the SID number of a specific event type is to go to the
Analytics > Security Events (SIEM) page, and click on the row of a particular event you want
to exclude. From the Event Detail display that is shown, you can locate the Event Type ID
associated with the event. Use that value for the exclude_sids parameter in the plugin's
configuration file.
Another way, in which you can view all the event type IDs associated with every plugin, is to
go to the Configuration > Threat Intelligence page and select the Data Source tab. From
there, each row of the display lists information about a plugin, and you can double-click on a
specific row to view all the associated event type IDs for the selected plugin.
If you have a plugin that processes logs from an asset located in a different timezone than
your sensor, sometimes due to the source device using an incorrect timezone or a timezone
that cannot be changed, you can modify the timezone in the plugin file instead. The following
task shows how to do this using the SSH plugin as an example.
[DEFAULT]
tzone=Australia/Melbourne
where
Australia/Melbourne represents the timezone of the asset you are collecting logs.
/etc/init.d/ossim-agent restart
7. Check the agent log to make sure the new timezone has been applied:
Different devices often use different date and time formats in their logs. USM Appliance
solves this issue by providing a built-in function, normalize_date(), which converts different
date formats to ISO 8601, the format accepted by the USM Appliance Server. For a list of
formats that the function recognizes, see Supported Formats by the normalize_date()
Function.
If the date and time format is not supported by the normalize_date() function, for example,
DD/MM/YYYY HH:MM:SS, you can create a custom function to handle the specific date and time
format that you need.
Note: Existing date formats are defined in the date_formats.json file. Modifying this
file is NOT recommended, since USM Appliance updates will overwrite any changes you
make to the file.
The following example provides a template for a custom function named normalize_date_
not_american(), in which you can define the patterns of date and time you want to format.
#
# Description:
# This function should only be called when a date
# is in this format:
# 12/08/2016 21:44:47
# dd/mm/yyyy hh:mm:ss
#
# Usage:
# date={:normalize_date_not_american( $date_log )}
#
Start Function normalize_date_not_american
from re import compile
from datetime import datetime
def normalize_date_not_american( self, string = "" ):
pattern = compile( r'(?P<day>\d{1,2})/(?P<month>\d+)/
(?P<year>\d{4})\s(?P<hour>\d+):(?P<minute>\d+)
:(?P<second>\d+)' )
result = pattern.search(string)
groups = result.groupdict()
date = datetime(year=int(groups['year']),
month=int(groups['month']), day=int(groups['day']),
hour=int(groups['hour']), minute=int(groups['minute']),
second=int(groups['second'])).isoformat(' ')
return date
End Function
After creating and saving the custom function, you can use it in the plugin configuration file.
For more information on using custom functions in plugins, see Define and Use Custom
Functions.
In addition to the built-in functions that USM Appliance supports, you may also create your
own custom functions to convert extracted data to the format required by specific event
field types.
1. In the Config section, specify the location of a new file containing one or more new
function definitions.
[config]
custom_functions_file=/etc/ossim/agent/plugin/custom.cfg
2. Create a text file that matches the custom function's file name. In the new file, define the
operation of each new custom function you want to create. Each new function must start
with Start Function <function_name> and end with End function.
The following example shows the definition of two new functions , log_hello and log_
hello_data.
End Function
In this example, the log_hello() function returns the string "Hello log!" and the value
assigned to a normalized event field. The second function returns the "Hello log!" string
concatenated with the extracted user name value.
4. To use the new custom functions, you can simply include as part of any event field
assignment corresponding to extracted data returned for a specific rule or log event. For
example
Important: You are not allowed to use a custom function in a built-in function, for
example, translate(:log_hello()), as custom functions are the last functions to be
executed in a rule.
The following task shows how to change an existing rule and add a new rule to a plugin, in this
case, for Cisco ASA.
4. (As needed) Change any existing regex mappings or rules needed for the re-purposed
plugin.
The following example shows the changed rule, in bold, as the value of the regexp
parameter. The commented section shows the mapping target of the regexp parameter.
/etc/init.d/ossim-agent restart
7. Check regular expressions and also field assignments within the file /var/log/cisco-
asa.log.
We recommend that you use any of the utilities available on the Internet to test that the
Python regular expressions you added match the logs.
After creating a new rule, you will also need to define a new event type ID to assign to events
matching the new rule.
However, if you have many new event types to add, you should use the plugin .sql file
instead, because it is much faster. The web UI is better when you have only one or two event
types to add.
Note: If you do not perform this task, these events will not appear in the Security Events
view in the USM Appliance web UI.
This procedure adds a custom event type to an existing or newly developed plugin, using the
USM Appliance web UI.
4. Fill in the fields, make value selections from the lists, and then click Update.
Field/List Description
The text you introduce here refers to the event name, which appears in the Event
Name column on the Security Events (SIEM) page.
Note that you may not use a plugin_sid already in use. If you use the same
ID twice, USM Appliance returns an error.
Field/List Description
Subcategory Select a subcategory for the new event type. For example, an event type ID might
have subcategories such as Attack, Brute Force, or Policy.
Reliability* Values range from 0 to 10, with 10 being the greatest reliability.
The USM Appliance Server must receive normalized events in a predefined format.
USM Appliance provides a number of built-in functions you can used to convert the extracted
data obtained from matching the regular expressions to the format expected in normalized
USM Appliance event fields.
For example, time and date in USM Appliance is in the format of YYYY-MM-DD HH:MM:SS (for
example, 2013-12-31 22:57:00), but different data sources may use different formats for
time and date. You can use the normalize_date() function, which simplifies the process of
normalizing events, by converting different time formats into the format accepted by the
server.
Another function often used is resolv(), which translates hostnames into IPv4 addresses by
performing DNS queries.
date={normalize_date($date)}
dst_ip={resolv($dst_ip)}
src_ip={resolv($src_ip)}
The following table provides a list of the built-in USM Appliance functions.
Function Description
geoip_getCity Returns the corresponding city name according to the built-in GeoIP database.
(addr)
geoip_ Returns the corresponding country according code to the built-in GeoIP
getCountryCode database.
(addr)
Function Description
geoip_ Returns the country name of the location this IP address is in.
getCountryName
(addr)
geoip_ Returns the metro code of the location this IP address is in.
getMetroCode
(addr)
geoip_ Returns the postal code of the location this IP address is in.
getPostalCode
(addr)
geoip_ Returns the region code of the location this IP address is in.
getRegionCode
(addr)
geoip_ Returns the region name of the location this IP address is in.
getRegionName
(addr)
resolv (host) Returns the IP address of a host. The lookup is first performed on a local copy
of the asset database on the sensor, then the configured resolver (usually DNS)
is tried. A host not found will result in a value of 0.0.0.0.
resolv_port (port_ Takes a network service name and returns the port number on which the
name) service is defined by /etc/services.
Function Description
normalize_date Returns a UNIX epoch date not in the American date format.
(string_date,
american_
format=False)
When the USM Appliance plugins parse logs received from various devices, they use a built-in
function, normalize_date(), to convert different date formats to ISO 8601, the format
accepted by the USM Appliance Server.
The table below shows the date formats that the normalize_date() function supports. The
normalize_date() function compares the date format in the log with the supported formats,
in the order presented in this table, until it finds a match.
If the date format of your device is not listed in this table, you can write a custom function to
parse it yourself. See Customize Plugin Date and Time Formats for instructions.
DC 2/15/2012 12:00:36 PM
Apache 29/Jan/2007:17:02:20
Snort 11/08-19:19:06
Suricata-http 03/20/2012-12:12:24.376349
Heartbeat 2006/10/19_11:40:05
Citrix 02/28/2013:12:00:00
HP Eva 2 18 2009 14 9 52
Exchange 2011-07-08T14:13:42.237Z
Sonnicwall 2011-05-12 07 59 01
CSV 09/30/2011,10:56:11
Honeyd 2011-05-17-09:42:24
WMI 20180121084344.000000-000
*Lilian is the number of days since the beginning of the Gregorian Calendar on October 15,
1582
In addition to the other methods described for customizing or creating new USM Appliance
plugins, you can also use the Plugin Builder provided in the USM Appliance web UI to create
new custom plugins. The plugin builder provides an interactive smart wizard program that
guides you through the process of automatically creating and configuring a new plugin to
deploy with the USM Appliance.
1. Select the Configuration > Deployment option from the USM Appliance web UI.
The USM Appliance web UI displays a list of any custom plugins previously created with
the Plugin Builder.
Note: The Plugin Builder display only shows new plugins created using the Plugin
Builder. It does not show any other custom plugins that may have been created or
customized outside of the Plugin Builder. However, you can locate those plugins by
viewing the contents of the USM Appliance plugin configuration folder:
/etc/ossim/agent/plugins.
You can also view and enable the custom plugins by establishing an SSH connection
to the AlienVault Console and selecting the Configure Sensor > Configure data
source plugin option from the AlienVault Setup menu.
The USM Appliance web UI displays the first step of the Plugin Builder wizard. You are
prompted to select a sample log file the Plugin Builder will use to identify data that can be
normalized into USM Appliance event fields.
4. Click the Browse button to navigate to the location of the sample log file you want to use
to identify possible event field mapping.
After you choose a log file, the Plugin Builder determines whether it can upload the file for
event field mapping and displays a green checkmark if successful.
5. Click Next.
The Plugin Builder advances to step 2 in which you are prompted to enter information
about the source of the log file.
Note: Vendor and Model entries may not contain spaces or special characters. Only
the plugin ID is included in the plugin configuration filename. Vendor, model, and
version information is included into the plugin file header.
6. For the Product Type field, select the product type from options displayed in the popup
list. (The categories list match the USM Appliance SIEM taxonomy. When you have fin-
ished the Plugin Properties entries, click Next.
The Plugin Builder now displays the initial mapping of log file entries to USM Appliance
event fields for specific named event rules.
The top portion of the display shows data contained in the sample log file you submitted
and the bottom portion displays corresponding event field mapping that the Plugin
Builder identified for one or more named event rules.
The Plugin Builder displays a set of fields in which you can edit the name, category (and
subcategory) that will be used in USM Appliance when events matching specific rules will
be generated by the plugin.
In the area below the event property fields, the Edit Tokens section lets you edit or
update data tokens assigned or mapped to USM Appliance event fields.You can also map
additional unassigned data patterned after the log data and assign those data tokens to
new event fields.
l In the Edit Tokens section, clicking on highlighted keywords shows the mapping of
token data to assigned event fields. The Plugin Builder shows the current token
mapping in a dialog box at the bottom of the display. You can adjust the slider at the
bottom to change the token mapping and change other attributes of the event field
mapping.
l Clicking on non-highlighted token data in the upper portion of the display lets you
create additional log data to event field mappings in the dialog box shown at the
bottom of the display.
You can use the sliding bar at the bottom of the display to adjust the beginning and
ending points of data tokens taken from the sample log file that are mapped to event
fields.
8. Click the Return ( ) link after revising or adding any additional log data you want to map
to event fields.
9. Click Save & Close and then click Next.
10. Click the Finish button to complete creation of the new plugin.
When you click the Finish button, the Plugin builder creates both the configuration (.cfg)
file and the .sql file for the new plugin.
After creating the new plugin, the USM Appliance Plugin Builder wizard returns to the
main custom plugins display page where it shows the new plugin you just created.
Note: The current Plugin Builder does not allow re-editing of custom plugins from the
USM Appliance web UI. You can, however, open the plugin configuration file directly with
a text editor and make additional configuration changes. (Custom plugins are saved in
the /etc/alienvault/plugins/custom folder.) You can also delete the existing plugin
from the Plugin Builder's tabular list view, delete an existing plugin, and then start over
to make a new plugin using the Plugin Builder wizard.
Note: Export or manual copying of plugin .cfg configuration and .sql files is only
necessary if you want to deploy a new custom plugin to other USM Appliance
installations deployed in your environment. Exporting a new custom plugin only exports
the plugin .cfg configuration file. So, you will still need to manually download the plugin
.sql file and apply it to the databases associated with any other USM ApplianceServer
installations you have deployed in your environment.
This section provides an overview of the process you can follow to create a new plugin, from
scratch, directly editing and updating the plugin configuration (cfg) and .sql files needed to
collect and normalize events from specific data sources.
1. Create a <filename>.cfg file for the new plugin. You may want to make a copy of an
existing .cfg file that is similar to the type of plugin you want to create, to save time.
2. Specify a unique plugin ID (9001 and above) for the plugin and also specify the location of
the log file the plugin will read from. The range of values available for user-defined plugins
is 9001 to 2147483647, except for the following values, which are also reserved.
90003, 90005, 90007, 90008, 10002, 12001, 19004, 19005, 19006, 20505
3. Create event rules using regular expressions to match events coming in from a source log
file.
4. Create the .sql file that specifies the data written to the SIEM database for all events/rules
field mapping of extracted data. You may want to make a copy of an existing .sql file that
is similar to the new plugin you want to create, and change the fields to describe events
defined in the new plugin.
5. Activate the plugin.
6. Import your .sql file to the SIEM database using the following command
l Use a log sample as large as possible to identify events and data patterns. This helps to
ensure that a sufficient number of data variations have been accounted for.
l Extract data from the log by issuing the command, grep -v sequentially until no more
data are returned.
l Identify all of the values in the log data that may be included in an event.
l Discard any repeated log data.
l Look for data patterns as a way to group them into categories. One organizing principle
might be, for example, having the same data field distribution.
l Estimate the frequency with which any event type would be generated from the log by
counting the number of times each log line repeats.
In the latter example, you run the risk of making a rule too complex to be effective,
because of the number of matches needed.
l Only capture the fields that will be used for correlation later on.
l You may find that you need to create a more generic rule to capture any events that
remain after specific rules have all been applied.
l Choose a pre-check string. The plugin uses this string to search the log line before
applying the rule. This acts as a filter to avoid applying the rule to a line that cannot match,
improving plugin performance. For an example, see the example following step 3 in Add a
New Rule to a Plugin. The fourth statement from the top shows Pre-check="Teardown",
followed by the regex.
l Order the rules starting with 0001 and finishing with 9999. Create groups numbered 0002,
0003, and so forth, leaving room for future expressions.
l Your rules based on specific matching criteria should always be the lowest numbers and
the more generic rules, the highest. This helps avoid event masking, which can occur when
USM Appliance loads generic rules before specific rules.
When a log line matches a rule, USM Appliance generates an event and does not match it
to any other the rule in the queue.
l The plugin_sids in a sql file do not need to be continuous. You may insert gaps, if
needed, to make the file more maintainable. For instance, you can reserve Plugin_sids
for each group of event types in the following way
o 1000 to 1999
o 2000 to 2999
This method works even if you do not have 1000 different events.
l USM Appliance supports a number of built-in functions to simplify the process of con-
verting information extracted from logs into normalized events. In addition, you can create
your own custom functions. (See Define and Use Custom Functions).
l
Note: Be careful if you add a custom function to a plugin or if you access a
proprietary database. This can degrade performance if not well designed. Custom
plugins might take up to five minutes to appear in the USM Appliance web interface
after you add them.
In this tutorial, we use Microsoft Exchange to show how to develop a log plugin. The preferred
method of collecting logs from the Exchange Server is through NXLog. See Microsoft
Exchange Server through NXLog for details.
1. Examine the log file from the data source from which you want to create a plugin. Identify
all the types of log messages, as well as messages sharing a common structure, but using
different values.
2. Create the <filename>.cfg file, either by writing a new file or by copying an existing and
similar file, then rewriting it.
3. Give the plugin a numeric ID. (See Creating a Plugin Configuration File for available values.)
4. Specify the location of the file from which the plugin should read.
5. Write regular expressions to parse individual messages from the log file.
6. Test your regular expressions to see if they perform as they should, using a testing tool
such as the one available at regex101.com.
7. Create the .sql file by copying an existing and similar .sql file. Change the fields to
describe events included in the custom plugin.
9. Enable the plugin through either the AlienVault Setup menu, the USM Appliance web UI, or
a USM Appliance asset. (See Enable Plugins.)
10. Test the plugin by sending logs from the data source to USM Appliance. (See Verify that
an Enabled Plugin Is Working Properly.)
This task creates a plugin configuration file for a data source called "exchangews," and which
uses SNMP for data transfer.
1. (Optional) Use an existing plugin as a template for the new one by copying an existing plu-
gin file like SSH.cfg and renaming it exchangews.cfg.
2. Write the new plugin configuration settings:
a. Change the plugin_id field, using any value in the range from 9001 to 2147483647
except for the following:
90003, 90005, 90007, 90008, 10002, 12001, 19004, 19005, 19006, 20505
Note: Because you have copied SSH.cfg, you do not need to create a header. If
you created a file from scratch, you would need to create one at this juncture.
See The Plugin File Header.
HELLO=1
MAIL=2
RCPT=3
DATA=4
QUIT=5
xxxx=6
DEFAULT_=9999
e. Create new rules, filling up the fields below.
f. Create two regular expressions to parse the data, because there are two different
formats in the log file.
[exchangews - Generic rule]
#2011-10-09 05:00:15 1.1.1.1 36A42160 SMTPSVC1 MEE-PDC 192.168.1.2 0
HELO - +36A42160 250 0 48 13 0 SMTP - - - -
#2011-10-09 05:00:16 1.1.1.1 36A42160 SMTPSVC1 MEE-PDC 192.168.1.2 0
MAIL - +FROM:+<[email protected]> 250 0 57 45 0 SMTP - - - -
event_type=event
regexp="(?P<date>\d{4}-\d{2}-\d{2}\s\d{2}:\d{2}:\d{2})\s(?P<src_
ip>\IPV4)\s(?P<userdata2>\S+)\s(?P<hostname>\S+)\s(?P<userdata3>\S+)\s
(?P<dst_IP>\IPV4)\s\d\s(?P<type>\w+)"
date={normalize_date($date)}
plugin_sid={translate($type)}
dst_ip={resolv($dst_ip)}
src_ip={resolv($src_ip)}
hostname={$hostname}
userdata2={$userdata2}
userdata3={$userdata3}
[exchangews = Generic rule 2 NCSA Format]
#1.1.1.10 - 1.1.1.9 [11/Oct/2011:13:16:40 -0600] "HELO -?+1.1.1.9 SMTP"
250 46
#1.1.1.10 - 1.1.1.9 [11/Oct/2011:13:16:41 -0600] "MAIL
-?+FROM:+<[email protected]> SMTP" 250 46
event_type=event
regexp="(?P<src_ip>\IPV4)\s-\s(?P<dst_ip>\S+)\s\[(?P<date>\d\d\/\w
{3}\/\d{4}:\d\d:\d\d:\d\d)\s-\d{4}\]\s\"(?P<type>\w+)"
date={normalize_date($date)}
plugin_sid={translate($type)}
dst_ip={resolv($dst_ip)}
src_ip={resolv($src_ip)}
g. Check regular expressions with logs inside the file /var/log/exchangews.log.
There are several utilities on the Internet to test regular expressions written in
Python. It is recommended to use one of these utilities to check that the created
regular expressions match the logs.
The following example shows the plugin .sql file corresponding to the plugin configuration
file example.
USM Appliance must store all the plugin IDs and event types in its database before it can
store any events. For this reason, if you develop a new plugin and you don't first update the
database with that data, the USM Appliance Server drops those events, even though the
ossim-server restart
Update Process
This section covers the following subtopics:
Error Codes When Updating from Version 5.8.0 to Version 5.8.x 303
AT&T Cybersecurity strongly recommends that you keep the USM Appliance installation up-
to-date and on the same version if you have deployed multiple USM Appliance instances.
While USM Appliance are backward-compatible, the difference between versions can cause
you to miss security events.
Follow the order below while updating different USM Appliance components.
By following this order, you ensure that the USM Appliance Server/All-in-One correctly
processes any data received from the USM Appliance Sensor, should the update contain any
formatting changes.
Similarly, while updating the USM Appliance Enterprise Server, which consists of an Enterprise
Server and an Enterprise Database, you must update the Enterprise Server first, followed by
the Enterprise Database. In doing so, you ensure that the Enterprise Server understands any
database changes the update incurs.
To find out the details of each product release, see the "New Update: AlienVault <version> has
been released" messages in the Message Center or the USM Appliance release notes.
l Correlation rules
l Cross-correlation rules
l Network IDS signatures
Note: Since the threat intelligence update refreshes the vulnerability threat database
used by vulnerability scans, it will not finish if any scan job is running.
To find out the details of each threat intelligence update, check Message Center for the
AlienVault Labs Threat Intelligence Update Summary messages.
l New plugins
l Fixes to existing plugins
l AlienVault HIDS decoders and rules (USM Appliance version 5.3.2 and later)
l Common Platform Enumeration (CPE) dictionary for plugins
To find out the details of each plugin feed update, check Message Center for the Plugins Feed
Update messages.
In USM Appliance version 5.4 and later, you can configure threat intelligence and plugin
updates to run automatically. See Configuring Automatic Updates for Threat Intelligence and
Plugins for instructions.
You need to update USM Appliance manually after a release becomes available. You can
perform the update either from the USM Appliance web UI or the AlienVault Setup menu.
In USM Appliance version 5.4 and later, you can configure threat intelligence and plugin
updates to run automatically, but you still need to run the product updates manually.
Important: To ensure performance, based on the USM Appliance data sheet, the update
process terminates when you have more than 200 million events in the database.
To download the latest packages, make sure USM Appliance can connect to
data.alienvault.com through port 80.
The easiest way to find out the version of your USM Appliance is from the web UI.
1. Log into the USM Appliance web UI using an account with administrative privileges.
The pages shows the current version of your system, threat intelligence, and plugins, as
well as the date and time of your latest system update.
Note: If your USM Appliance is already on the latest version, the list of AlienVault
packages will be empty. You will see "System Updated" instead. If you are not on the
latest version, however, the web UI displays the list of packages you can update to.
You can update USM Appliance from the USM Appliance web UI or the AlienVault Setup menu.
AlienVault recommends the web UI for its ease of use.
1. Log into the USM Appliance web UI using an account with administrative privileges.
3. Check the New Updates column for the USM Appliance component of interest. If an
update is available, a downward-pointing arrow icon displays:
The process can take several minutes. The system displays a success message when the
update process completes without issues.
You can also update USM Appliance from the AlienVault Setup menu. Some updates,
especially those that require a system restart, must be run from the AlienVault Setup menu,
because the system loses connection to the web UI during a restart. AlienVault will specify, in
the release notes, if you need to run the update from the AlienVault Setup menu.
Although login via SSH is supported, AT&T Cybersecurity recommends using a phys-
ically connected monitor and keyboard, or a direct connection via the VMWare or
Hyper-V virtual console. If your SSH connection is interrupted during the update,
your USM Appliance may become irreparably corrupted.
Note: AT&T Cybersecurity recommends using a direct console connection via the
VMWare or Hyper-V management interface, or directly connected keyboard and
monitor instead of an SSH connection, though both are supported. If your SSH
connection is interrupted during the update, your USM Appliance may become
irreparably corrupted.
An update pre-check will show a warning if it detects an SSH connection before you
apply your update.
The AlienVault Setup menu appears with System Preferences as the default selection.
l To update to a new product release, tab to Update System and press Enter.
l To update threat intelligence or plugin feeds only, tab to Update Threat Intelligence
and press Enter.
The process can take several minutes. The system displays a success message when the
update process completes without issues.
When connecting to the USM Appliance instance through a console (not using SSH), a reboot
is needed after an update. The console then displays a splash screen after the post message
and through the boot process. If you wish to see boot messages, you can press the up arrow
key to display them, or the down arrow key to return to the splash screen.
In USM Appliance version 5.4 and later, you can configure threat intelligence and plugin
updates to run at a certain hour every day. USM Appliance will execute the update as it
becomes available. You will see a message in the Message Center to confirm the success or
failure of the update.
Important: Do not schedule the update to run when a vulnerability scan is in progress,
because the update may change the rule the scan uses, causing the scan to fail.
1. Log into the USM Appliance web UI using an account with administrative privileges.
2. Go to Configuration > Administration > Main.
3. Click Automatic Updates.
4. Change Automatically run Plugin updates and Threat Intelligence updates to Yes.
5. In Schedule automatic updates to run, select the hour for USM Appliance to check
(daily) and run the update when available.
The schedule is based on the time zone you have configured for this USM Appliance
instance.
Updating your USM Appliance offline requires use of the following items
In order to perform an offline update on AlienVault USM Appliance, you first need to
download the ISO image of the version you desire. For instructions, see Download a
USM Appliance ISO Image.
Then you need to burn the ISO image to a USB drive. For instructions, see Burn the
USM Appliance ISO Image to a USB Drive.
Using an ISO image burned to a USB drive is the preferred way to update USM Appliance
offline. However, the USM Appliance VMware image does not contain a USB controller,
therefore you cannot connect a USB drive to it. For instructions on how to add a USB
controller in a virtual machine, see VMware's knowledge base article about USB support.
If using a USB drive is not an option, you can upload the ISO image to a datastore and then
access it through a CD or DVD drive. Click the following links for instructions from VMware
documentation respectively
Note: Select "Datastore ISO File" as the device type and "Connect At Power On" to
connect the device when the virtual machine turns on.
Finally, you can follow the procedure below to update your USM Appliance.
Important: To ensure performance, based on the USM Appliance data sheet, the update
process terminates when you have more than 200 million events in the database.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
5. Insert the USB drive into the machine now, or connect the CD/DVD drive with the
USM Appliance ISO image, and then press Enter (<OK>).
The update process scans for any connected file system, either USB or CD/DVD, and
mounts it automatically.
4. Locate the USM Appliance version you want to download and click the link.
5. Verify your download by comparing its MD5 checksum against the one listed in the
md5.txt file, available on the same site.
Warning: Running an antivirus scan on the downloaded image will produce hundreds of
false positives due to the virus and malware signatures included in NIDS.
Next ...
This procedure is a prerequisite to updating USM Appliance offline or restoring the software
on a hardware appliance to its factory settings. For details, see Update USM Appliance Offline
or Restore Software on a USM Appliance Hardware.
Important: This process deletes all files stored on the USB device.
The procedure is different based on the operating system you use. Follow the steps
accordingly.
Linux
1. Insert the USB drive into the USB port on your computer.
2. To copy the ISO image, open a terminal and run the following command
Replace <USM_image.iso> with the full path of the downloaded ISO image file, and <USM_
device> with the USB device location.
For example, if you save the image file in /home/user/temp/image.iso and the USB
device location is /dev/sdb, the command would be
Mac OS X
1. Insert the USB drive into the USB port on your computer.
2. To list the devices connected to your computer, open a terminal and run the following
command
diskutil list
3. To identify the USB device, look for DOS_FAT_32 as the disk type.
For example, if you save the image file in /home/user/temp/image.iso and the USB
device location is /dev/disk1, the command would be:
Windows
2. If you haven't already, download Win32 Disk Imager from SourceForge and install it on
your computer.
Win32 Disk Imager populates the Device field with the USB drive automatically.
4. To verify that the ISO image is the correct one, select MD5 Hash.
Win32 Disk Imager checks the image file and displays its MD5 checksum. Confirm that it
matches the one received from Support.
5. Click Write.
USM Appliance version 5.8.0 includes an operating system (OS) upgrade to improve the
performance and security of your deployment. The upgrade process consists of three parts:
l Perform Pre-Checks: Runs a set of diagnostic checks to ensure that your deployment
meets AT&T Cybersecurity's requirements.
l Update OS Packages: Brings the OS packages to the designated versions.
l Update USM Appliance Packages: Brings the USM Appliance specific packages to the des-
ignated versions.
The upgrade process aborts if any of the pre-checks fail. The following table lists the various
errors you may receive. If you need help passing these checks, please contact AT&T
Cybersecurity Technical Support.
Error
Error Message
Code
2 System cannot be updated because a vulnerability scan is currently running. Try again
later.
3 The system must be rebooted. Please, reboot the system before starting the update
process.
4 The verification process could not be completed. Signature file not found.
Error
Error Message
Code
27 It seems that there are more than 200M events in the database or your indexes are
corrupted.
50 Parsing error: Some command line arguments are unknown. Please, type alienvault-update
--help for more information.
52 System is unstable, some packages are not correctly installed and configured.
53 Your system does not meet the minimum requirements (For more information, review
https://cdn-cybersecurity.att.com/docs/data-sheets/usm-appliance.pdf).
54 Your system has less partitions than required in /dev/sda, please contact with support.
55 System is running in HA mode. If you want to update your system, please disable the HA
system by running alienvault-ha-assistant -d, and then update.
56 CPU usage is above 90%, the OS update requires CPU usage to be below the threshold.
Error
Error Message
Code
60 The command apt-get update failed. Please, check your internet connection.
61 You don't have enough disk space. Please, free up space on your hard drive.
62 A problem occurred checking your USM Appliance license. Please, check the update log for
more information.
65 Packages cannot be downloaded. Please, check the update log for more information.
68 System is unstable, some packages have not been updated to the latest version.
69 bash script was executed isolatedly. Please, use alienvault-update command instead.
You may also receive some warnings from running these pre-checks. See the following table
for details.AT&T Cybersecurity recommends that you review the warning messages and
correct as many issues as possible, but you can proceed with the upgrade by entering y when
the system asks if you want to continue.
Pre-Check Warnings
1 SSH Session detected. AlienVault recommends updating the system from a terminal to
prevent possible connection problems during the update.
2 The verification process could not be completed. User agent signature is invalid.
6 No event backup with less than 14 days found. It's recommended creating a new backup
and copying it to an external device.
7 No configuration backup with less than 14 days found. It's recommended creating a new
backup and copying it to an external device.
18 More than 3 partitions has been detected in /dev/sda. It's recommended contacting
with support before proceeding.
Because USM Appliance needs to reboot during the OS upgrade, you cannot perform this
particular update from the browser. For the same reason, it is not recommended to run the
upgrade from an SSH session either. Please run the update from a terminal or a virtual
machine (VM) console.
To upgrade the OS
1. Launch the AlienVault Console and use your credentials to log in.
4. Select Upgrade Operating System or Upgrade Operating System (Offline), and then
press Enter. If choosing offline, see Update USM Appliance Offline on how to prepare the
ISO image.
Important: These two options are only available in USM Appliance version 5.7.6.
You can check the log file periodically to monitor the progress. This upgrade can take
more than 30 minutes to finish.
To ensure that your deployment meets AT&T Cybersecurity's requirements, USM Appliance
runs a set of diagnostic checks before updating to a new version. The update process aborts
if any of the pre-checks fail.
The following table lists the various errors you may receive when updating from USM
Appliance version 5.8.0 to later versions. (If you are updating from version 5.7.6 to 5.8.0, see
the error codes in Operating System Upgrade in Version 5.8.0 instead.) Should you need help
passing these checks, please contact AT&T Cybersecurity Technical Support.
Error
Error Message
Code
2 System cannot be updated because a vulnerability scan is currently running. Try again
later.
3 The system must be rebooted. Please, reboot the system before starting the update
process.
4 The verification process could not be completed. Signature file not found.
27 It seems that there are more than 200M events in the database or your indexes are
corrupted.
50 Parsing error: Some command line arguments are unknown. Please, type alienvault-update
--help for more information.
52 System is unstable, some packages are not correctly installed and configured.
53 Your system does not meet the minimum requirements (For more information, review
https://cdn-cybersecurity.att.com/docs/data-sheets/usm-appliance.pdf).
54 Your system has less partitions than required in /dev/sda, please contact with support.
Error
Error Message
Code
55 System is running in HA mode. If you want to update your system, please disable the HA
system by running alienvault-ha-assistant -d, and then update.
56 CPU usage is above 90%, the OS update requires CPU usage to be below the threshold.
60 The command apt-get update failed. Please, check your internet connection.
61 You don't have enough disk space. Please, free up space on your hard drive.
62 A problem occurred checking your USM Appliance license. Please, check the update log for
more information.
68 System is unstable, some packages have not been updated to the latest version.
69 bash script was executed isolatedly. Please, use alienvault-update command instead.
You may also receive some warnings from running these pre-checks. See the following table
for details.AT&T Cybersecurity recommends that you review the warning messages and
correct as many issues as possible, but you can proceed with the upgrade by entering y when
the system asks if you want to continue.
Pre-Check Warnings
1 SSH Session detected. AlienVault recommends updating the system from a terminal to
prevent possible connection problems during the update.
6 No event backup with less than 14 days found. It's recommended creating a new backup
and copying it to an external device.
7 No configuration backup with less than 14 days found. It's recommended creating a new
backup and copying it to an external device.
18 More than 3 partitions has been detected in /dev/sda. It's recommended contacting
with support before proceeding.
If you need to transfer backup files from one USM Appliance to another, for example, from a
defective USM Appliance to its RMA (Return Merchandise Authorization) replacement, you
can use either an SFTP client on Windows, such as WinSCP; or the SCP protocol on Linux.
By default, USM Appliance stores alarms in the database until you delete them manually. To
save disk space, AlienVault encourages that you delete alarms after they have been
investigated or mediated, especially if the alarm is a false positive. You can also configure the
alarms to expire after a certain time, then USM Appliance will purge the alarms automatically.
The recommendation is to store alarms for 90 days for compliance and 30 days for data
forensics.
1. From the USM Appliance web interface, go to Configuration > Administration > Main >
Backup.
The Alarms Lifetime defaults to 0 (days), which means the alarms never expires.
3. Change Alarms Lifetime to a suitable number based on your environment and your
company's requirement. For example, 90 days for compliance or 30 days for data
forensics.
Note: In new installations of USM Appliance version 5.8.6 or later, the default value
for Alarms Expire is Yes and the default value for Alarms Lifetime is 90. This means
that alarms older than 90 days are removed from the system.
After the alarms reach the Alarms Lifetime, USM Appliance removes them from the database
every day and create a backup file in /var/lib/ossim/backup_alarm. The name of the file
reads alarm_restore_yyyy-mm-dd.sql.gz.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
screen
We recommend using the screen session so that you can keep the program running even
after you log out.
3.
4. Stop the following services so that they do not interfere with the process:
/etc/init.d/monit stop
/etc/init.d/ossim-server stop
/etc/init.d/ossim-agent stop
/etc/init.d/ossim-framework stop
/etc/init.d/alienvault-api stop
5. Back up the alarms:
Restoring Alarms
You can restore all the alarms using the output file generated from the procedure above
(alienvault-alarms-(timestamp>.sql.gz) or one of the daily backup files in
/var/lib/ossim/backup_alarm.
Note: AlienVault recommends that you only restore the relevant alarms to avoid filling
up the database.
Before following the procedure below, you should have deployed the SAME version of
USM Appliance. You should have transferred the backup files to the target system and place
them in the root directory.
To restore alarms
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
screen
We recommend using the screen session so that you can keep the program running even
after you log out.
4. Stop the following services so that they do not interfere with the process:
/etc/init.d/monit stop
/etc/init.d/ossim-server stop
/etc/init.d/ossim-agent stop
/etc/init.d/ossim-framework stop
/etc/init.d/alienvault-api stop
5. Restore the alarms:
alienvault-reconfig -c -v -d
USM Appliance uses internal caches to ensure that communication interruptions between the
USM Appliance Sensor and USM Appliance Server do not result in event loss. The USM
Appliance Sensor collects parsed log data using the agent_event cache, which is stored in
/var/ossim/agent_events/, to ensure data consistency. If a sensor loses connectivity to the
server, it will continue to write to these cache files to prevent event loss. Once the sensor
reconnects, it will begin forwarding from this cache again, submitting events to the server for
correlation.
USM Appliance Server, on the other hand, stores security events in two different tables:
The backup and restore procedure described below only affects the event table. The events
in the alarm table remain unchanged, therefore they remain visible in the alarm that they are
associated with.
By default, USM Appliance stores security events for up to 90 days or 40 million events. When
either limit is reached, USM Appliance purges older events from the database to save disk
space. You can change those limits based on how many events you receive every day. You can
also filter events through policies. For instructions, see "Configuring a Policy to Discard
Events" in the Policy Management section of the USM Appliance User Guide.
1. From the USM Appliance web UI, go to Configuration > Administration > Main >
Backup.
2. Change the Allowed free disk space for the SIEM backups, if desired.
USM Appliance keeps one backup file per day for event backups. Default is 30.
0 means that there is no limit to store events in the database. Default is 40,000,000
Important: AlienVault discourages setting either limit to 0 because you may soon
run out of disk space.
Restoring Events
USM Appliance backs up events every day and place the backup files in
/var/lib/ossim/backup. By default, it keeps 30 backup files, which correspond to 30 days of
events. You can restore the events generated on a certain day.
Important: If you are running USM Appliance version 5.6 or later, you cannot restore
event backup files from an earlier version. This is due to a schema change in the SIEM
database introduced in USM Appliance version 5.6, making the backup files from earlier
versions incompatible.
3. Click Restore.
You can click View Backup Logs to see the latest logs concerning backups. For example:
If the Dates to Restore is empty, that means all events are already in the SIEM database. You
shall see the dates listed under Dates in Database instead.
This makes data integration for certain types of applications faster and easier. MongoDB is
built for scalability, high availability, and performance from a single server deployment to
large and complex multi-site infrastructures.
Backing Up MongoDB
To back up MongoDB
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
screen
We recommend using the screen session so that you can keep the program running even
after you log out.
3.
rm -rf ./dump
Restoring MongoDB
Before following the procedure below, you should have deployed the SAME version of
USM Appliance. You should have transferred the backup files to the target system and place
them in the root directory.
To restore MongoDB
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
screen
We recommend using the screen session so that you can keep the program running even
after you log out.
4. Stop the following services so that they do not interfere with the process:
/etc/init.d/monit stop
/etc/init.d/ossim-server stop
/etc/init.d/ossim-agent stop
/etc/init.d/ossim-framework stop
/etc/init.d/alienvault-api stop
5. Extract the file:
rm -rf ./dump
8. Restart all services for changes to apply:
alienvault-reconfig -c -v -d
NetFlow is a protocol designed and published by Cisco Systems that has become the
accepted industry standard for recording and transmitting information about network flows.
Through AlienVault USM Appliance you can back up and restore the information about flows
in a network.
1. From the USM Appliance web interface, go to Configuration > Administration > Main >
Backup.
2. Set the number of days to store flows in the Active NetFlow Window field. Default is 45
days.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
screen
We recommend using the screen session so that you can keep the program running even
after you log out.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
screen
We recommend using the screen session so that you can keep the program running even
after you log out.
4. Stop the following services so that they do not interfere with the process:
/etc/init.d/monit stop
/etc/init.d/ossim-server stop
/etc/init.d/ossim-agent stop
/etc/init.d/ossim-framework stop
/etc/init.d/alienvault-api stop
5. Extract the backup file into the '/' directory:
alienvault-reconfig -c -v -d
By default, USM Appliance stores raw logs in the file system until they are deleted. AlienVault
recommends that you export these files to an offline persistent storage site periodically and
remove them from USM Appliance manually. You can also configure the raw logs to expire
after a certain time so USM Appliance can purge them from the system automatically.
1. From the USM Appliance web interface, go to Configuration > Administration > Main >
Backup.
The Active Logger Windows defaults to 365 (days). This value refers to the number of
days to keep the logs. 0 means that the logs never expire.
3. Change Active Logger Window to a suitable number based on your environment and
your company's requirement.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
screen
We recommend using the screen session so that you can keep the program running even
after you log out.
3.
4. For efficiency, use the rsync protocol to transfer the raw logs to the destination:
Syntax:
Important: Leave out the trailing slash ('/') on the source so that the corresponding
directory will be created at the destination.
The raw logs should be transferred to the destined machine, in this case, 10.10.10.10, and
store in the /var/ossim/logs directory.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
USM Appliance will delete any raw logs older than the date specified.
You can also restore raw logs that were archived and purged from the same USM Appliance
instance in the past.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
screen
We recommend using the screen session so that you can keep the program running even
after you log out.
4. If not done already, use the rsync protocol to transfer the raw logs to /var/ossim/logs
directory.
Using "Example 2: Transferring all raw logs of 2017" from the backup steps above, type
Using "Example 2: Transferring all raw logs of 2017" from the backup steps above, type
In USM Appliance, you can back up and restore system configurations including system
profile, network configuration, inventory data, policies, plugins, correlation directives and
other basic settings. You can restore the configurations on a different USM Appliance system
from a backup file through the AlienVault Console. You can also manage the configuration
backups from the USM Appliance web user interface (UI).
Note: It is not possible to upgrade from AlienVault OSSIM® to USM Appliance, but you
can restore AlienVault OSSIM configurations to USM Appliance or vice versa if they are
the same version.
Each configuration backup file contains the following, which does not include events, alarms,
or raw logs:
Important: Be aware that if your VPN certificate changes after the backup has taken
place, you must reconfigure the VPN connection after restoring the backup file.
Backing Up Configurations
By default, USM Appliance backs up the system configurations at 7:00 am local time every
day. These display as "Auto" under the Type column in the web UI. You can also manually run a
backup at any time.
USM Appliance stores its configuration backup files locally, in the following location:
/var/alienvault/backup/configuration_<hostname>_<timestamp>.tar.gz
For example, configuration_VirtualUSMAllInOne_1429616586.tar.gz
The integer string represents epoch time, therefore, the backup with the highest number
denotes the most recent one. USM Appliance maintains 10 backups on each system, based on
their time stamp.
Note: AlienVault recommends keeping a copy of the latest backup file outside of USM
Appliance because you may not be able to retrieve these backup files when the system
is down.
USM Appliance aborts the backup process if any of these checks fails.
Starting from version 5.2.5, USM Appliance will not generate any configuration backups,
automatic or manual, until you set a password to encrypt the backup files. And you need to
provide the same password to decrypt the file before a restoration.
1. In the web UI, go to Configuration > Administration > Main > Backup.
1. In the web UI, go to Configuration > Administration > Backups > Configuration.
A message appears showing when the last backup was run and asking if you want to
continue.
l Each USM Appliance Server (whether a child or federated server) only triggers automatic
backups of itself and directly connected sensors. In other words, the federated server does
not trigger automatic backups to its child servers.
l Each USM Appliance stores its own backup file.
You can select the child server on the federated server, but not the reverse. You can run a
manual backup of the child server from the federated server by following the standard
backup procedure.
You can only restore a USM Appliance system from a backup file through the AlienVault
Console.
Before running a restoration, USM Appliance verifies the following and aborts the restoration
process if any of these checks fails:
Note: You can restore an AlienVault OSSIM backup on a USM Appliance or vice versa,
as long as they are the same version.
Before restoring a backup file, you must transfer the file to the target system and place it in
the /var/alienvault/backup/ directory. You can use either an SFTP client on Windows, such
as WinSCP; or the SCP protocol on Linux.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
5. Select the backup file you want to restore, click <OK> or press Enter.
Note: Your SSH connection will drop if the IP address of USM Appliance changes as a
result of the restoration.
You can manage the configuration backups on Configuration > Administration > Backups
> Configuration.
By default, USM Appliance sorts the backups by their time stamps, with the latest one at the
top.
configuration_VirtualUSMAllInOne_1429616586.tar.gz
Because the integer string represents epoch time, the backup with the highest number
denotes the most recent one.
1. Select the backups by checking the square(s) to the left of each backup.
2. Click the delete icon ( ) above the table towards the right.
Staring from version 5.2.5, USM Appliance and AlienVault OSSIM® offer the option to reset the
AlienVault API key from the AlienVault Setup menu.
This option is available in all version 5.2.5 appliances by connecting through SSH and selecting
System preferences > Reset AlienVault API key:
In USM Appliance version 5.2.5 and later releases, the AlienVault API key is no longer included
in the configuration backup. Since the avapi user performs many critical tasks in
USM Appliance, we recommend that you reset the API key in every appliance if you have
updated USM Appliance from a previous version.
This operation is immediate. There is no need to provide root password as it is a local change.
Just select the option from the AlienVault Setup menu and select Yes when prompted to
regenerate the new AlienVault API Key.
This operation should be executed in all USM Appliance instances in order to fully reset the
AlienVault API Key.
This should be executed from bottom-up considering the deployment hierarchy, in other
words, USM Appliance Sensors first, followed by USM Appliance Servers or USM Appliance All-
in-Ones, followed by Federated Servers or USM Appliance Loggers.
The reasoning behind this is because choosing "Reset AlienVault API Key" will rewrite the
authorized_keys file completely. Thus, after resetting API key on a USM Appliance Sensor, it
will no longer have the corresponding USM Appliance Server's key, therefore the
USM Appliance Server will not be able to communicate with the USM Appliance Sensor
through the AlienVault API. But if you reset the AlienVault API key on the USM Appliance
Server next, the USM Appliance Server sends it's new key to the USM Appliance Sensor thus
restoring the API connectivity.
Note: In distributed deployments, where you have more than one USM Appliance
deployed, ensure that you know the password of the root user to the directly
connected appliances as they are required to reset the AlienVault API keys.
In some scenarios, such as disaster recovery, upgrades, or platform changes, you may choose
to move your deployed USM Appliance to a new platform or deployment.
You need to apply a new license when migrating from one USM Appliance hardware to
another, such as a RMA. The replacement license key will be provided when the new hardware
ships.
If you are migrating from a USM Appliance hardware to a virtual machine, or from one virtual
platform to another (VMware to Hyper-V or VMware to AWS), the license may only need to be
reset. In such cases you can contact AlienVault Support to obtain the appropriate image, and
have your license reset so that it can be applied to the new installation.
USM Appliance does not provide a tool to back up the system as a whole. You need to back up
your data and system configurations separately, and then transfer them to the other
USM Appliance deployment for restoration.
1. Generate a configuration backup from the web UI. For instructions, see Backing Up
Configurations.
Note: You need to perform the following steps from the command line, through the
AlienVault Console.
2. Connect to the AlienVault Console through SSH and use your credentials to log in.
3. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
screen
We recommend using the screen session so that you can keep the program running even
after you log out.
5. Stop the following services so that they do not interfere with the process:
/etc/init.d/monit stop
/etc/init.d/ossim-server stop
/etc/init.d/ossim-agent stop
/etc/init.d/ossim-framework stop
/etc/init.d/alienvault-api stop
6. Back up the alarms:
Note: The example below illustrates how to transfer files from USM Appliance to a
machine on your network. If you have the new USM Appliance instance already
deployed, you can transfer the files to the new system directly.
b. Using the rsync protocol, transfer the old events to the destination:
Syntax:
Important: Leave out the trailing slash ('/') on the source so that the
corresponding directory will be created at the destination.
8. Back up MongoDB:
rm -rf ./dump
9. Back up NetFlow Data, if using:
Note: The example below illustrates how to transfer files from USM Appliance to a
machine on your network. If you have the new USM Appliance instance already
deployed, you can transfer the files to the new system directly.
For efficiency, use the rsync protocol to transfer the raw logs to the destination:
Syntax:
Important: Leave out the trailing slash ('/') on the source so that the corresponding
directory will be created at the destination.
/root/alienvault-alarms-<timestamp>.sql.gz
/root/alienvault-events-<timestamp>.sql.gz
/root/alienvault-mongodb-<timestamp>.tgz
/root/alienvault-netflow-<timestamp>.tgz
You should also have a file similar to below generated by the configuration backup:
/var/alienvault/backup/configuration_<hostname>_<timestamp>.tar.gz
12. Transfer all backup files to your new USM Appliance deployment or an interim system.
You can use either an SFTP client on Windows, such as WinSCP; or the SCP protocol on
Linux.
Before following the procedure below, you should have deployed the SAME version of
USM Appliance. You should have transferred the backup files to the target system and place
them in the root directory.
Important: If you are restoring USM Appliance to a different platform such as from
VMware to Hyper-V, you must acquire a new license. Please contact AlienVault Support
for your request.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
2. On the AlienVault Setup main menu, select Jailbreak System to gain command line
access.
screen
We recommend using the screen session so that you can keep the program running even
after you log out.
4. Stop the following services so that they do not interfere with the process:
/etc/init.d/monit stop
/etc/init.d/ossim-server stop
/etc/init.d/ossim-agent stop
/etc/init.d/ossim-framework stop
/etc/init.d/alienvault-api stop
5. Restore the alarms:
rm -rf ./dump
8. Restore NetFlow data, if using:
a. If not done already, use the rsync protocol to transfer the raw logs to
/var/ossim/logs directory.
Using "Example 2: Transferring all raw logs of 2017" from the backup steps above, type
Using "Example 2: Transferring all raw logs of 2017" from the backup steps above, type
f. Select the backup file you want to restore, click <OK> or press Enter.
Note: Your SSH connection will drop if the IP address of USM Appliance changes
as a result of the restoration.
11. Return to the AlienVault Setup main menu, select Reboot Appliance, click <OK> or press
Enter.
Sometimes you may want to restore the software on a USM Appliance hardware appliance to
its factory status. To do this,
For instructions, see Burn the USM Appliance ISO Image to a USB Drive.
l Change the boot sequence so that USM Appliance boots from the USB.
For instructions, see Changing the Boot Sequence of a USM Appliance Hardware.
By default, the USM Appliance hardware appliance boots from its hard disk. When trying to
restore the software on a USM Appliance to its factory status, you need to configure
USM Appliance to boot from the USB drive instead. This section provides instructions for
performing this task.
Starting from version 5.4, AlienVault ships USM Appliance hardware built on Hewlett Packard
Enterprise (HPE) ProLiant Gen9 Servers. All prior versions of USM Appliance hardware are built
on Supermicro servers. Follow the instructions pertaining to the USM Appliance hardware you
have.
If the rear view of your USM Appliance hardware looks similar to the below, it is built on a
Supermicro server.
1. Reboot USM Appliance, and press Del or Delete to launch the BIOS Setup Utility.
3. On Boot Settings, move the cursor to Boot Device Priority and press Enter.
4. On Boot Device Priority, move the cursor to 1st Boot Device and select your USB device
by using the + and – keys.
If the rear view of your USM Appliance hardware looks similar to the below, it is built on an
HPE ProLiant Server.
DL120 Gen9:
Note: The USM Appliance Remote Sensor hardware is built on HPE ProLiant DL20 Gen9
Servers, but you can follow the same procedure above to change the boot sequence.
Prerequisite
Warning: The process deletes all the data stored in your USM Appliance.
1. If not done already, insert the USB drive to your USM Appliance hardware appliance.
2. Reboot USM Appliance.
Customers restoring to USM Appliance versions 5.2.3 and later see the following screen:
Customers restoring to USM Appliance versions up to 5.2.2 see screen below instead:
4. To continue, enter y.
6. After the restoration process finishes, disconnect your USB drive before the system
reboots.
Note: If you forget to remove it, USM Appliance will boot from the USB drive again.
USM Appliance reboots and displays the initial login screen of the version you restore to.
7. Login as the root user using the system-generated password displayed on the screen.
8. Change the root user password as prompted.
After the second reboot, the appliance is ready for you to use.
For other instructions regarding initial configurations, see USM Appliance Initial Setup.
Occasionally, you may need to replace the AlienVault license key in your USM Appliance
instance. For example, you may need to replace a trial license with a perpetual license, or you
have migrated USM Appliance from VMware to Hyper-V, therefore you must use a different
license key.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
4. Select Online Registration if you have Internet access. You will be prompted to enter the
new license key:
Important: To continue, you must have received a license file from AlienVault
Support, see Registering USM Appliance Offline for more details.
The Remote Support feature in USM Appliance opens a secure, encrypted connection to the
AlienVault Support Server through the web UI or the AlienVault Console. This allows the
AlienVault Support staff to access, diagnose, and resolve any problems occurring in a
USM Appliance component. Remote Support allows the AlienVault Support staff to work on
solving the issues independently, after you have connected your USM Appliance components
to the Support Server. All data exchanged with AlienVault Support is encrypted for security.
The information exchanged is only available to AlienVault Support or the Engineering teams.
You should delete USM Appliance system logs and/or old event logs on a regular basis,
otherwise the appliance may run out of space. Starting from version 5.2.1, USM Appliance adds
a pre-check to its update script so that the update fails if the machine does not have enough
disk space.
You may need to replace a power supply or hard disk drive on an AlienVault USM Appliance
hardware should either one fail. These two components represent the most common cause
of hardware failures, and can be replaced if necessary.
Message Center
AlienVault USM Appliance uses the Message Center to centralize all in-system errors,
warnings, and messages. They also include external messages sent by AlienVault about
product releases and feed updates. You can only access the Message Center through the web
UI. All messages are displayed in the timezone configured for the user, but there are stored in
the database as UTC (Universal Time Coordinated). You may see both displayed in some
messages, as shown in the image below.
l
Click the message icon ( ) in the header menu.
The envelope icon shows the number of unread messages. If the number exceeds 99
messages, the icon displays 99+.
If a new message arrives while you are on the Message Center page, USM Appliance displays
an alert.
Message Types
These are the types of messages you might see in the Message Center.
Message
Description Examples
Type
Message Priorities
Message
Description Examples
Priority
Warning These messages specify that something in the l Configuration backup could
environment has changed, and that USM Appliance not be completed.
is no longer functioning as it was configured. l Log management disrupted.
Warnings are also generated as precursors to
Errors when USM Appliance detects a situation that
l Sensor connection lost.
could potentially disrupt normal operation if
allowed to continue.
Message
Description Examples
Priority
The message filters that appear beneath the search box allow you to focus on a subset of
messages. See table below for description on what each filter means.
Filters Description
Unread (n) Use this filter to show messages that have not been read or all
messages. The table of messages displays the unread messages
All Messages (n) in bold until the user clicks on them. The number between
parentheses indicates the number of messages for each option.
Message Type Use this filter to choose which message type to display. See
Message Types for more information.
Priority Use this filter to choose which message priority to display. See
Message Priorities for more information.
Note: You can select several filters at the same time by clicking the checkbox next to
each filter. The table of messages displays the messages that match the checkbox(es)
selected.
View a Message
Messages are displayed in a table format. By default, this table is sorted by date, from the
newest to the oldest. All columns, except for the Actions column, can be sorted in ascending (
) or descending ( ) order by clicking the ( ) icon. The triangle icon indicates which column is
being sorted currently.
l External server — These messages are sent from AlienVault. Every hour the system checks
if there are new messages. The server hosting the message is messages.alienvault.com,
which uses port 443. The external server signs all messages and USM Appliance checks the
signature to verify the authenticity.
l System status — These messages correspond to the operation of USM Appliance in real
time. For this reason, they update frequently.
l User Activity — These messages correspond to user activities within USM Appliance. For
example, when a user executes a backup on Configuration > Administration > Backups,
and the backup ends with an error, this will generate a message.
The message details appear below the table, as shown in the previous illustration.
Delete a Message
In version 5.2 and earlier, only USM Appliance admin users can delete messages in Message
Center. Starting from version 5.3, a normal user can delete a message after the admin user
has granted him the Message Center - > Delete Messages permission in a template. For
instructions on how to use a template, see Configuring User Authorization with Templates.
To delete a message
Important: Deleting a message deletes it from the system. There is no way to recover
the message.
Remote Support
The Remote Support feature in USM Appliance opens a secure, encrypted connection to the
AlienVault Support Server through the web UI or the AlienVault Console. This allows the
AlienVault Support staff to access, diagnose, and resolve any problems occurring with a
USM Appliance component. Remote Support allows the AlienVault Support staff to work on
solving the issues independently, after you have connected your USM Appliance components
to the Support Server.
All data exchanged with AlienVault Support is encrypted for security. The information
exchanged is only available to AlienVault Support or the Engineering teams.
Typically, you open a ticket with AlienVault Support first and only establish a remote support
connection upon their request. You can establish multiple sessions using the same ticket
number for different USM Appliance components. But a support engineer may ask you to
open a new ticket if it is an unrelated issue. During the remote support session you can
communicate with the AlienVault Support team by phone or email at any time.
Prerequisites
To use Remote Support, you will need
This connection allows for communication between the Support Server and the
USM Appliance component being diagnosed. Your Domain Name System (DNS) must be
able to resolve the IP address of tractorbeam.alienvault.com within 20 seconds,
otherwise the connection will fail.
Important: Because SSH does not support a proxy configuration, you cannot use a
proxy server for remote support.
1. At the top menu, go to Support > Support Tools > Remote Support.
2. From the Add Connection list, select the component you want AlienVault Support to dia-
gnose.
Important: Be careful not to include any spaces before or after the ticket number.
4. Click Connect.
Note: If the Support Server cannot validate the ticket number, USM Appliance
displays an error message. If this occurs, contact AlienVault Support again.
After the Support Server establishes a connection, the Open Connections table displays
the active connections to the components being diagnosed, and their respective ports.
The Support Server also sends you an automated email that it has made a connection.
When AlienVault Support completes work on the issue, they communicate their results
and update the ticket. You can request a log of all their activity at this point, or you can
request it later by phone or email.
5. After the troubleshooting session ends, click Disconnect next to the active connection
you want to end.
You should receive another automated email informing you that the connection has
ended.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
3. On the Remote Support screen, type the 8-digit ticket number, and click OK.
Important: Be careful not to include any spaces before or after the ticket number.
A black screen appears and your request begins processing. This may take several
seconds.
When the connection is established with the Support Server, the following message
appears:
4. Press Enter.
When AlienVault Support completes work on the issue, they communicate their results,
and update the ticket. You can request a log of all their activity at this point, or you can
request it later by phone or email.
The Manage Connectivity information screen appears and prompts you with the following
message:
Are you sure you want to disconnect from AlienVault Remote Support?
6. Click Yes.
The black screen reappears. After several seconds you receive a notification that the
secure connection has disconnected.
You will also receive another automated email informing you that the connection has
ended.
When contacting AlienVault Technical Support, you are often asked to provide the AlienVault
license or system ID of your USM Appliance so that we can verify the authenticity of the
installation or reset the license if needed.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
o AlienVault Version denotes the USM Appliance version installed on the system. The
name in the parentheses, alienvault-vmware-aio-6x1gb, provides details on the
comparable hardware package, which in this case is the USM Appliance All-in-One with
six 1GbE network interfaces.
Note: USM Appliance upgraded from version 4.8 or earlier may be missing some
important hardware profile packages, causing issues for updating to later
versions. For details, see our knowledge-base article: Known Issue: AlienVault
"profile" meta package is missing from units installed prior to version 4.9.
You should delete USM Appliance system logs and/or old event logs on a regular basis,
otherwise the appliance may run out of space. Starting from version 5.2.1, USM Appliance adds
a pre-check to its update-script so that the update fails if the machine does not have enough
disk space.
1. Connect to the AlienVault Console through SSH and use your credentials to log in.
You may need to replace a power supply or hard disk drive on an AlienVault USM Appliance
hardware should either one fail. These two components represent the most common cause
of hardware failures, and can be replaced if necessary.
AlienVault Support must confirm that your appliance needs a new disk drive or power supply
before you can receive a replacement. Open a support ticket to report the issue and make
your request.
You can determine if an appliance has a failed disk drive by checking for a red-colored LED on
the front panel of the appliance or by using the RAID management software.
2. Use the black lever to pull the carrier out of the drive bay.
3. After you remove the disk drive from the carrier, you need to remove four screws.
4. Confirm the replacement is the same size or larger than the failed drive.
5. Remove the defective disk drive from the tray.
6. Insert the new drive with the SATA connections facing the rear of the tray.
7. Make sure the screw holes are aligned before hand-tightening the screws.
8. Slide the drive into the bay and press the black lever to lock it.
State Indication
1. On the front panel of the appliance, look for the illuminated "i."
2. On the back of the appliance, check the power supplies for an amber-colored or un-
illuminated LED that indicates a power supply has failed.
1. After you identify the failed power supply, unplug its power cord.
2. Push the red-colored lever to the left and then pull the metal handle to release the power
supply.
4. Confirm the power supply is locked in place by gently pulling on its metal handle.
5. Plug the power cord into the replacement power supply and make sure that the LEDs are
green for both power supplies.