Juniper Secure Analytics-configuring-DSMs
Juniper Secure Analytics-configuring-DSMs
Configuring DSMs
Release 2014.3
Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and
other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks,
registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or
otherwise revise this publication without notice.
JavaTM and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
FCC Statement
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following
information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it
is not installed in accordance with Juniper Networks’ installation instructions, it may cause interference with radio and television reception. This
equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC
rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception,
which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following
measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Consult the dealer or an
experienced radio/TV technician for help. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warranty and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT, SUBJECT TO THE MODIFICTAIONS SET FORTH
BELOW ON THIS PAGE, ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED
HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR
JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
Revision History
The information in this document is current as of the date listed in the revision history.
As regards software accompanying the STRM products (the “Program”), such software contains software licensed by Q1Labs and is further
accompanied by third-party software that is described in the applicable documentation or materials provided by Juniper Networks.
2
CONTENTS
1 OVERVIEW
2 INSTALLING DSMS
Scheduling Automatic Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Viewing Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Manually Installing a DSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
9 APPLE MAC OS X
13 ARPEGGIO SIFT-IT
17 BALABIT IT SECURITY
Configuring BalaBIt IT Security for Microsoft Windows Events . . . . . . . . . . . . . . . . .73
Configuring BalaBit IT Security for Microsoft ISA or TMG Events . . . . . . . . . . . . . . .77
18 BARRACUDA
Barracuda Spam & Virus Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Barracuda Web Application Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Configuring Barracuda Web Application Firewall to Send Syslog Events to JSA . . .86
Barracuda Web Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
19 BIT9 PARITY
22 BLUE COAT SG
Creating a Custom Event Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Retrieving Blue Coat Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Creating Additional Custom Format Key-Value Pairs . . . . . . . . . . . . . . . . . . . . . . . 105
23 BRIDGEWATER
24 BROCADE FABRIC OS
25 CA TECHNOLOGIES
CA ACF2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
CA SiteMinder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
CA Top Secret . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
26 CHECK POINT
Check Point FireWall-1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Check Point Provider-1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
27 CILASOFT QJRN/400
28 CISCO
Cisco ACE Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Cisco Aironet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Cisco ACS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Cisco ASA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Cisco CallManager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Cisco CatOS for Catalyst Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Cisco CSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Cisco FWSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Cisco IDS/IPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Cisco IronPort . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Cisco NAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Cisco Nexus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Cisco IOS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Cisco Pix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Cisco VPN 3000 Concentrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Cisco Wireless Services Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Cisco Wireless LAN Controllers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Cisco Identity Services Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
29 CITRIX
Citrix NetScaler. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .201
Citrix Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .203
30 CLOUDPASSAGE HALO
Configuring CloudPassage Halo to Communicate with JSA . . . . . . . . . . . . . . . . . .206
33 CRYPTOCARD CRYPTO-SHIELD
34 CYBER-ARK VAULT
36 DAMBALLA FAILSAFE
38 ENTERASYS
Enterasys Dragon. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .229
Enterasys HiGuard Wireless IPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .236
Enterasys HiPath Wireless Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .238
Enterasys Stackable and Standalone Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . .239
Enterasys XSR Security Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .240
Enterasys Matrix Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .241
Enterasys NetSight Automatic Security Manager. . . . . . . . . . . . . . . . . . . . . . . . . . .242
Enterasys Matrix K/N/S Series Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .243
Enterasys NAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .244
Enterasys 800-Series Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .245
39 EXTREME NETWORKS EXTREMEWARE
40 F5 NETWORKS
F5 Networks BIG-IP AFM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
F5 Networks BIG-IP APM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
F5 Networks BIG-IP ASM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
F5 Networks BIG-IP LTM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
F5 Networks FirePass . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
41 FAIR WARNING
42 FIDELIS XPS
43 FIREEYE
Configuring your FireEye System to Communicate with JSA . . . . . . . . . . . . . . . . . 270
44 FORESCOUT COUNTERACT
45 FORTINET FORTIGATE
Fortinet FortiGate DSM Integration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Configuring a Fortinet FortiGate Log Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
46 FOUNDRY FASTIRON
47 GENERIC FIREWALL
52 HP
HP ProCurve . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
HP Tandem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Hewlett Packard UNIX (HP-UX). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
53 HUAWEI
Huawei AR Series Router. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .301
Huawei S Series Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .303
54 IBM
IBM AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .308
IBM AS/400 iSeries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .319
IBM CICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .322
IBM Lotus Domino . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .326
IBM Proventia Management SiteProtector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .329
IBM ISS Proventia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .333
IBM RACF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .334
IBM DB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .346
IBM WebSphere Application Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .356
IBM Informix Audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .361
IBM IMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .362
IBM Guardium . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .368
IBM Security Directory Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .374
IBM Tivoli Access Manager for E-business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .376
IBM z/Secure Audit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .378
IBM Tivoli Endpoint Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .383
IBM zSecure Alert. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .384
IBM Security Network Protection (XGS). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .385
IBM Security Network IPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .388
57 IMPERVA SECURESPHERE
58 INFOBLOX NIOS
59 ISC BIND
60 IT-CUBE AGILESI
62 JUNIPER NETWORKS
Juniper Networks AVT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .413
Juniper DDoS Secure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .415
Juniper DX Application Acceleration Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . .415
Juniper EX Series Ethernet Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Juniper IDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Juniper Networks Secure Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
Juniper Infranet Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Juniper Networks Firewall and VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Juniper Networks Network and Security Manager . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Juniper Junos OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Juniper Steel-Belted Radius. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Juniper Networks vGW Virtual Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Juniper Security Binary Log Collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
Juniper Junos WebApp Secure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Juniper Networks WLC Series Wireless LAN Controller . . . . . . . . . . . . . . . . . . . . . 438
65 LINUX
Linux DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Linux IPtables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Linux OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
67 MCAFEE
McAfee Intrushield . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
McAfee ePolicy Orchestrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
McAfee Application / Change Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
McAfee Web Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
McAfee Web Gateway DSM Integration Process . . . . . . . . . . . . . . . . . . . . . . . . . . 481
68 METAINFO METAIP
69 MICROSOFT
Microsoft Exchange Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Microsoft IAS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Microsoft DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Microsoft IIS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Microsoft ISA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
Microsoft Hyper-V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
Microsoft SQL Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Microsoft SharePoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .506
Microsoft Windows Security Event Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .511
Microsoft Operations Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .513
Microsoft System Center Operations Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . .516
Microsoft Endpoint Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .519
70 MOTOROLA SYMBOL AP
73 NIKSUN
74 NOKIA FIREWALL
Integrating with a Nokia Firewall Using Syslog. . . . . . . . . . . . . . . . . . . . . . . . . . . . .535
Integrating With a Nokia Firewall Using OPSEC . . . . . . . . . . . . . . . . . . . . . . . . . . .538
75 NOMINUM VANTIO
76 NORTEL NETWORKS
Nortel Multiprotocol Router. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .543
Nortel Application Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .546
Nortel Contivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .547
Nortel Ethernet Routing Switch 2500/4500/5500 . . . . . . . . . . . . . . . . . . . . . . . . . . .547
Nortel Ethernet Routing Switch 8300/8600 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .548
Nortel Secure Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .550
Nortel Secure Network Access Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .551
Nortel Switched Firewall 5100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .552
Nortel Switched Firewall 6000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .554
Nortel Threat Protection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .556
Nortel VPN Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .557
77 NOVELL EDIRECTORY
78 OBSERVEIT
79 OPENBSD
80 OPEN LDAP
82 ORACLE
Oracle Audit Records. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581
Oracle DB Listener. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Oracle Audit Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589
Oracle OS Audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 590
Oracle BEA WebLogic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
Oracle Acme Packet Session Border Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
Oracle Fine Grained Auditing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 600
83 OSSEC
87 PROFTPD
89 RADWARE DEFENSEPRO
90 RAZ-LEE ISECURITY
91 REDBACK ASE
93 SAMHAIN LABS
Configuring Syslog to Collect Samhain Events . . . . . . . . . . . . . . . . . . . . . . . . . . . .637
Configuring JDBC to Collect Samhain Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . .638
94 SAFENET DATASECURE
95 SENTRIGO HEDGEHOG
97 SOLARWINDS ORION
98 SONICWALL
99 SOPHOS
Sophos Enterprise Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .653
Sophos PureMessage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .660
Sophos Astaro Security Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .667
Sophos Web Security Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .668
100 SOURCEFIRE
Sourcefire Defense Center (DC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
Sourcefire Intrusion Sensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
101 SPLUNK
Collect Windows Events Forwarded from Splunk Appliances . . . . . . . . . . . . . . . . . 677
108 SYMANTEC
Symantec Endpoint Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
Symantec SGS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714
Symantec System Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714
Symantec Data Loss Prevention (DLP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
Symantec PGP Universal Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722
109 SYMARK
114 TRIPWIRE
122 VMWARE
VMware ESX and ESXi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .777
VMware vCenter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .782
VMware vCloud Director. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .783
VMware vShield . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .786
INDEX
ABOUT THIS GUIDE
The Juniper Secure Analytics Configuring DSMs guide provides you with
information for configuring Device Support Modules (DSMs).
DSMs allow Juniper Secure Analytics (JSA) to integrate events from security
appliances, software, and devices in your network that forward events to JSA or
Log Manager. All references to JSA or JSA is intended to refer both the JSA and
Log Manager product.
Audience This guide is intended for the system administrator responsible for setting up event
collection for JSA in your network.
This guide assumes that you have administrative access and a knowledge of your
corporate network and networking technologies.
Documentation Table 2-1 lists conventions that are used throughout this guide.
Conventions
Table 2-1 Icons
Technical You can access technical documentation, technical notes, and release notes
Documentation directly from the Juniper Customer Support website at
https://www.juniper.net/support/. Once you access the Juniper Customer Support
Configuring DSMs
18 ABOUT THIS GUIDE
website, locate the product and software release for which you require
documentation.
Your comments are important to us. Please send your e-mail comments about this
guide or any of the Juniper Networks documentation to:
Requesting Technical product support is available through the Juniper Networks Technical
Technical Support Assistance Center (JTAC). If you are a customer with an active J-Care or JNASC
support contract, or are covered under warranty, and need post-sales technical
support, you can access our tools and resources online or open a case with JTAC.
For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you
with the following features:
Configuring DSMs
Requesting Technical Support 19
To verify service entitlement by product serial number, use our Serial Number
Entitlement (SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Configuring DSMs
20 ABOUT THIS GUIDE
Configuring DSMs
1 OVERVIEW
The DSM Configuration guide is intended to assist with device configurations for
systems, software, or appliances that provide events to Juniper Secure Analytics
(JSA).
Device Support Modules (DSMs) parse event information for JSA products to log
and correlate events received from external sources such as security equipment
(for example, firewalls), and network equipment (for example, switches and
routers).
Events forwarded from your log sources are displayed in the Log Activity tab. All
events are correlated and security and policy offenses are created based on
correlation rules. These offenses are displayed on the Offenses tab. For more
information, see the Juniper Secure Analytics Users Guide.
NOTE
Note: Information found in this documentation about configuring Device Support
Modules (DSMs) is based on the latest RPM files located on the Juniper Customer
Support website at http://www.juniper.net/customer/support/.
Configuring DSMs
2 INSTALLING DSMS
You can download and install weekly automatic software updates for DSMs,
protocols, and scanner modules.
After Device Support Modules (DSMs) are installed the Juniper Secure Analytics
(JSA) console provides any rpm file updates to managed hosts after the
configuration changes are deployed. If you are using high availability (HA), DSMs,
protocols, and scanners are installed during replication between the primary and
secondary host. During this installation process, the secondary displays the status
Upgrading. For more information, see Managing High Availability in the Juniper
Secure Analytics Administration Guide.
CAUTION
CAUTION: Uninstalling a Device Support Module (DSM) is not supported in JSA. If
you need technical assistance, contact Juniper Customer Support. For more
information, see Requesting Technical Support.
Scheduling You can schedule when automatic updates are downloaded and installed on your
Automatic Updates JSA console.
If no updates are displayed in the Updates window, either your system has not
been in operation long enough to retrieve the weekly updates or no updates have
been issued. If this occurs, you can manually check for new updates
Procedure
Step 1 Click the Admin tab.
Step 2 On the navigation menu, click System Configuration.
Configuring DSMs
24 INSTALLING DSMS
NOTE
Note: Protocol updates installed automatically require you to restart Tomcat. For
more information on manually restarting Tomcat, see the Log Sources Users
Guide.
Step 6 Using the calendar, select the start date and time of when you want to start your
scheduled updates.
Step 7 Click OK.
The selected updates are now scheduled.
Viewing Updates You can view or install any pending software updates for JSA through the Admin
tab.
Procedure
Step 1 Click the Admin tab.
Step 2 On the navigation menu, click System Configuration.
Step 3 Click the Auto Update icon.
The Updates window is displayed. The window automatically displays the Check
for Updates page, providing the following information:
Table 2-1 Check for Updates Window Parameters
Parameter Description
Updates were Specifies the date and time the last update was installed.
installed
Next Update install Specifies the date and time the next update is scheduled to be
is scheduled installed. If there is no date and time indicated, the update is not
scheduled to run.
Name Specifies the name of the update.
Type Specifies the type of update. Types include:
• DSM, Scanner, Protocol Updates
• Minor Updates
Configuring DSMs
Viewing Updates 25
Parameter Description
Status Specifies the status of the update. Status types include:
• New - The update is not yet scheduled to be installed.
• Scheduled - The update is scheduled to be installed.
• Installing - The update is currently installing.
• Failed - The updated failed to install.
Date to Install Specifies the date on which this update is scheduled to be
installed.
The Check for Updates page toolbar provides the following functions:
Table 2-2 Auto Updates Toolbar
Function Description
Hide Select one or more updates, and then click Hide to remove the
selected updates from the Check for Updates page. You can
view and restore the hidden updates on the Restore Hidden
Updates page. For more information, see the Juniper Secure
Analytics Administrator Guide.
Install From this list box, you can manually install updates. When you
manually install updates, the installation process starts within a
minute.
Schedule From this list box, you can configure a specific date and time to
manually install selected updates on your console. This is useful
when you want to schedule the update installation during
off-peak hours.
Unschedule From this list box, you can remove preconfigured schedules for
manually installing updates on your console.
Search By Name In this text box, you can type a keyword and then press Enter to
locate a specific update by name.
Next Refresh This counter displays the amount of time until the next automatic
refresh. The list of updates on the Check for Updates page
automatically refreshes every 60 seconds. The timer is
automatically paused when you select one or more updates.
Pause Click this icon to pause the automatic refresh process. To
resume automatic refresh, click the Play icon.
Refresh Click this icon to manually refresh the list of updates.
Configuring DSMs
26 INSTALLING DSMS
Manually Installing You can use the Juniper Customer Support website to download and manually
a DSM install the latest RPM files for JSA.
http://www.juniper.net/customer/support/
Most users do not need to download updated DSMs as auto updates installs the
latest rpm files on a weekly basis. If your system is restricted from the Internet, you
might need to install rpm updates manually. The DSMs provided on the Juniper
Customer Support website, or through auto updates contain improved event
parsing for network security products and enhancements for event categorization
in the JSA Identifier Map (QID map).
CAUTION
CAUTION: Uninstalling a Device Support Module (DSM) is not supported in JSA. If
you need technical assistance, contact Juniper Customer Support. For more
information, see Requesting Technical Support.
Installing a Single The Juniper Customer Support website contain individual DSMs that you can
DSM download and install using the command-line.
Procedure
Step 1 Download the DSM file to your system hosting JSA.
Step 2 Using SSH, log in to JSA as the root user.
Username: root
Password: <password>
Step 3 Navigate to the directory that includes the downloaded file.
Step 4 Type the following command:
rpm -Uvh <filename>
Where <filename> is the name of the downloaded file. For example:
rpm -Uvh DSM-CheckPointFirewall-7.0-209433.noarch.rpm
Step 5 Log in to JSA.
https://<IP Address>
Where <IP Address> is the IP address of the JSA console or Event Collector.
Step 6 On the Admin tab, click Deploy Changes.
The installation is complete.
Configuring DSMs
Manually Installing a DSM 27
Installing a DSM The Juniper Customer Support website contains a DSM bundle which is updated
Bundle daily with the latest DSM versions that you can install.
Procedure
Step 1 Download the DSM bundle to your system hosting JSA.
Step 2 Using SSH, log in to JSA as the root user.
Username: root
Password: <password>
Step 3 Navigate to the directory that includes the downloaded file.
Step 4 Type the following command to extract the DSM bundle:
tar -zxvf JSA_bundled-DSM-<version>.tar.gz
Where <version> is your release of JSA.
Step 5 Type the following command:
for FILE in *Common*.rpm DSM-*.rpm; do rpm -Uvh "$FILE"; done
The installation of the DSM bundle can take several minutes to complete.
Step 6 Log in to JSA.
https://<IP Address>
Where <IP Address> is the IP address of JSA.
Step 7 On the Admin tab, click Deploy Changes.
The installation is complete.
Configuring DSMs
3 3COM 8800 SERIES SWITCH
The 3COM 8800 Series Switch DSM for Juniper Secure Analytics (JSA) accepts
events using syslog.
Supported Event JSA records all relevant status and network condition events forwarded from your
Types 3Com 8800 Series Switch using syslog.
Configure Your You can configure your 3COM 8800 Series Switch to forward syslog events to
3COM 8800 Series JSA.
Switch
Procedure
Step 1 Log in to the 3Com 8800 Series Switch user interface.
Step 2 Enable the information center.
info-center enable
Step 3 Configure the host with the IP address of your JSA system as the loghost, the
severity level threshold value as informational, and the output language to English.
info-center loghost <ip_address> facility <severity> language
english
Where:
<ip_address> is the IP address of your JSA.
<severity> is the facility severity.
Step 4 Configure the ARP and IP information modules to log.
info-center source arp channel loghost log level informational
info-center source ip channel loghost log level informational
The configuration is complete. The log source is added to JSA as 3COM 8800
Series Switch events are automatically discovered. Events forwarded to JSA by
3COM 880 Series Switches are displayed on the Log Activity tab.
Configuring DSMs
30 3COM 8800 SERIES SWITCH
Configure a Log JSA automatically discovers and creates a log source for syslog events from
Source 3COM 8800 Series Switches. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select 3Com 8800 Series Switch.
Step 9 Using the Protocol Configuration list box, select Syslog.
The syslog protocol configuration is displayed.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your 3COM 8800 Series Switch.
Configuring DSMs
4 AHNLAB POLICY CENTER
The Juniper Secure Analytics (JSA) DSM for AhnLab Policy Center retrieves
events from the DB2 database that AhnLab Policy Center uses to store their log.
Table 4-1 identifies the specifications for the AhnLab Policy Center DSM.
Table 4-1 AhnLab Policy Center DSM Specifications
Specification Value
Manufacturer AhnLab
DSM AhnLab Policy Center
RPM file names DSM-AhnLabPolicyCenter-QRadar-
Release_Build-Number.noarch.rpm
Supported 4.0
versions
Protocol AhnLabPolicyCenterJdbc
JSA recorded Spyware detection, Virus detection, Audit
events
Automatically No
discovered
Includes identity Yes
More information Ahnlab website
(https://global.ahnlab.com/)
To integrate AhnLab Policy Center DSM with JSA, complete the following steps:
1 Download and install the most recent versions of the following RPMs on your JSA
console:
• JDBC protocol RPM
• AhnLabPolicyCenterJdbc protocol RPM
• AhnLab Policy Center RPM
Note: For more information, see your DB2 documentation.
2 Ensure that your AhnLab Policy Center system meets the following criteria:
• The DB2 Database allows connections from JSA.
Configuring DSMs
32 AHNLAB POLICY CENTER
• The port for AhnLabPolicyCenterJdbc Protocol matches the listener port of the
DB2 Database.
• Incoming TCP connections on the DB2 Database are enabled to communicate
with JSA.
3 For each AhnLab Policy Center server you want to integrate, create a log source
on the JSA Console.
Table 4-2 identifies Ahnlab-specific protocol values.
Table 4-2 IAhnlab-specific Protocol Values
Parameter Description
Log Source Type AhnLab Policy Center APC
Protocol AhnLabPolicyCenterJdbc
Configuration
Access Enables the log source to coalesce (bundle) events.
credentials
Log Source If you use JSA 2014.2 or later, you must select a log
Language source language.
Configuring DSMs
5 AMAZON AWS CLOUDTRAIL
The Juniper Secure Analytics (JSA) DSM for Amazon AWS CloudTrail can collect
audit events from your Amazon AWS CloudTrail S3 bucket.
Table 5-1 provides the specifications of the Amazon AWS CloudTrail DSM.
Table 5-1 Amazon AWS CloudTrail DSM Specifications
Specification Value
Manufacturer Amazon
DSM Amazon AWS CloudTrail
Supported 1.0
versions
Protocol Log File
JSA recorded All relevant events
events
Automatically No
discovered
Includes identity No
More information http://docs.aws.amazon.com/awscloudtrail/latest/use
rguide/whatisawscloudtrail.html
Configuring DSMs
34 AMAZON AWS CLOUDTRAIL
AWS CloudTrail To integrate Amazon AWS CloudTrail with JSA, use the following procedure:
DSM Integration
Process
Related tasks
• Manually Installing a DSM
• Enabling Communication between JSA and AWS CloudTrail
• Configuring an Amazon AWS CloudTrail Log Source in JSA
Enabling A certificate is required for the HTTP connection between JSA and Amazon AWS
Communication CloudTrail.
between JSA and
AWS CloudTrail Procedure
To enable communication between JSA and AWS CloudTrail:
Step 1 Access your Amazon AWS CloudTrail S3 bucket.
Step 2 Export the certificate as a DER-encoded binary certificate to your desktop system.
The file extension must be .DER.
Step 3 Copy the certificate to the /opt/qradar/conf/trusted_certificates
directory on the JSA host on which you plan to configure the log source.
Configuring an To collect Amazon AWS CloudTrail events, you must configure a log source in
Amazon AWS JSA. When you configure the log source, use the location and keys that are
CloudTrail Log required to access your Amazon AWS CloudTrail S3 bucket.
Source in JSA
Before you begin
Ensure that the following components are installed and deployed on your JSA
host:
• PROTOCOL-LogFileProtocol-build_number.noarch.rpm
• DSM-AmazonAWSCloudTrail-build_number.noarch.rpm
Also ensure that audit logging is enabled on your Amazon AWS CloudTrail S3
bucket. For more information, see your vendor documentation.
Configuring DSMs
Configuring an Amazon AWS CloudTrail Log Source in JSA 35
Parameter Description
Bucket Name The name of the AWS CloudTrail S3 bucket where
the log files are stored.
AWS Access Key The public access key required to access the AWS
CloudTrail S3 bucket.
AWS Secret Key The private access key required to access the AWS
CloudTrail S3 bucket.
Remote Directory The root directory location on the AWS CloudTrail S3
bucket from which the files are retrieved, for
example, \user_account_name
FTP File Pattern .*?\.json\.gz
Processor GZIP
Event Generator Amazon AWS JSON
Applies additional processing to the retrieved event
files.
Recurrence Defines how often the Log File Protocol connects to
the Amazon cloud API, checks for new files, and
retrieves them if they exist. Every access to an AWS
S3 bucket incurs a cost to the account that owns the
bucket. Therefore, a smaller recurrence value
increases the cost.
Procedure
To configure Amazon AWS CloudTrail log source in JSA:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 From the Log Source Type list, select Amazon AWS CloudTrail.
Step 7 From the Protocol Configuration list, select Log File.
Step 8 From the Service Type field, select AWS.
Step 9 Configure the remaining parameters.
Step 10 Click Save.
Step 11 On the Admin tab, click Deploy Changes.
Configuring DSMs
6 AMBIRON TRUSTWAVE ipANGEL
The Ambiron TrustWave ipAngel DSM for Juniper Secure Analytics (JSA) accepts
events using syslog.
Supported Event JSA records all Snort-based events from the ipAngel console.
Types
Before You Begin Before you configure JSA to integrate with ipAngel, you must forward your cache
and access logs to your JSA. The events in your cache and access logs that are
forwarded from Ambiron TrustWave ipAngel are not automatically discovered. For
information on forwarding device logs to JSA, see your vendor documentation.
Configure a Log To integrate Ambiron TrustWave ipAngel events with JSA, you must manually
Source configure a log source.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Ambiron TrustWave ipAngel
Intrusion Prevention System (IPS).
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Ambiron TrustWave ipAngel
appliance.
Configuring DSMs
38 AMBIRON TRUSTWAVE IPANGEL
Configuring DSMs
7 APACHE HTTP SERVER
The Apache HTTP Server DSM for Juniper Secure Analytics (JSA) accepts
Apache events using syslog or syslog-ng.
JSA records all relevant HTTP status events. The procedure in this section applies
to Apache DSMs operating on UNIX/Linux platforms only.
CAUTION
CAUTION: Do not run both syslog and syslog-ng at the same time.
Configuring You can configure your Apache HTTP Server to forward events with the syslog
Apache HTTP protocol.
Server with Syslog
Procedure
Step 1 Log in to the server hosting Apache, as the root user.
Step 2 Edit the Apache configuration file httpd.conf.
Step 3 Add the following information in the Apache configuration file to specify the custom
log format:
LogFormat "%h %A %l %u %t \"%r\" %>s %p %b" <log format name>
Where <log format name> is a variable name you provide to define the log
format.
Step 4 Add the following information in the Apache configuration file to specify a custom
path for the syslog events:
CustomLog “|/usr/bin/logger -t httpd -p
<facility>.<priority>” <log format name>
Where:
<facility> is a syslog facility, for example, local0.
Configuring DSMs
40 APACHE HTTP SERVER
Configuring a Log You can configure a log source manually for Apache HTTP Server events in JSA.
Source in JSA JSA automatically discovers and creates a log source for syslog events from
Apache HTTP Server. However, you can manually create a log source for JSA to
receive syslog events. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Configuring DSMs
Configuring Apache HTTP Server with Syslog-ng 41
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Apache installations.
Configuring You can configure your Apache HTTP Server to forward events with the syslog-ng
Apache HTTP protocol.
Server with
Syslog-ng Procedure
Step 1 Log in to the server hosting Apache, as the root user.
Step 2 Edit the Apache configuration file.
/etc/httpd/conf/httpd.conf
Step 3 Add the following information to the Apache configuration file to specify the
LogLevel:
LogLevel info
The LogLevel might already be configured to the info level depending on your
Apache installation.
Step 4 Add the following to the Apache configuration file to specify the custom log format:
LogFormat "%h %A %l %u %t \"%r\" %>s %p %b" <log format name>
Where <log format name> is a variable name you provide to define the custom
log format.
Step 5 Add the following information to the Apache configuration file to specify a custom
path for the syslog events:
CustomLog "|/usr/bin/logger -t 'httpd' -u
/var/log/httpd/apache_log.socket" <log format name>
The log format name must match the log format defined in Step 4.
Configuring DSMs
42 APACHE HTTP SERVER
Where:
<IP address> is the IP address of the JSA console or Event Collector.
<udp|tcp> is the protocol you select to forward the syslog event.
Step 9 Save the syslog-ng configuration file.
Step 10 Type the following command to restart syslog-ng:
service syslog-ng restart
Step 11 You are now ready to configure the log source in JSA.
The configuration is complete. The log source is added to JSA as syslog events
from Apache HTTP Servers are automatically discovered. Events forwarded to
JSA by Apache HTTP Servers are displayed on the Log Activity tab of JSA.
Configuring a Log You can configure a log source manually for Apache HTTP Server events in JSA.
Source
JSA automatically discovers and creates a log source for syslog-ng events from
Apache HTTP Server. However, you can manually create a log source for JSA to
receive syslog events. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Configuring DSMs
Configuring Apache HTTP Server with Syslog-ng 43
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Apache installations.
Configuring DSMs
8 APC UPS
The APC UPS DSM for Juniper Secure Analytics (JSA) accepts syslog events
from the APC Smart-UPS family of products.
NOTE
Note: Events from the RC-Series Smart-UPS are not supported.
Supported Event JSA supports the following APC Smart-UPS syslog events:
Types
• UPS events
• Battery events
• Bypass events
• Communication events
• Input power events
• Low battery condition events
• SmartBoost events
• SmartTrim events
Before You Begin To integrate Smart-UPS events with JSA, you must manually create a log source
to receive syslog events.
Before you can receive events in JSA, you must configure a log source, then
configure your APC UPS to forward syslog events. Syslog events forwarded from
APC Smart-UPS series devices are not automatically discovered. JSA can receive
syslog events on port 514 for both TCP and UDP.
Configuring a Log JSA does not automatically discover or create log sources for syslog events from
Source in JSA APC Smart-UPS series appliances.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Configuring DSMs
46 APC UPS
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your APC Smart-UPS series
appliance.
Configuring Your You can configure syslog event forwarding on your APC UPS.
APC UPD to Forward
Syslog Events Procedure
Step 1 Log in to the APC Smart-UPS web interface.
Step 2 In the navigation menu, select Network > Syslog.
Step 3 From the Syslog list box, select Enable.
Step 4 From the Facility list box, select a facility level for your syslog messages.
Step 5 In the Syslog Server field, type the IP address of your JSA console or Event
Collector.
Step 6 From the Severity list box, select Informational.
Step 7 Click Apply.
The syslog configuration is complete. Events forwarded to JSA by your APC UPS
are displayed on the Log Activity tab.
Configuring DSMs
9 APPLE MAC OS X
The Apple Mac OS X DSM for Juniper Secure Analytics (JSA) accepts events
using syslog.
Supported Event JSA records all relevant firewall, web server access, web server error, privilege
Types escalation, and informational events.
Before You Begin To integrate Mac OS X events with JSA, you must manually create a log source to
receive syslog events.
To complete this integration, you must configure a log source, then configure your
Mac OS X to forward syslog events. Syslog events forwarded from Mac OS X
devices are not automatically discovered. It is recommended that you create a log
source, then forward events to JSA. Syslog events from Mac OS X can be
forwarded to JSA on TCP port 514 or UDP port 514.
Configuring a Log JSA does not automatically discover or create log sources for syslog events from
Source Apple Mac OS X.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Mac OS X.
Step 9 Using the Protocol Configuration list box, select Syslog.
Configuring DSMs
48 APPLE MAC OS X
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Apple Mac OS X device.
Configuring Syslog You can configure syslog on systems running Mac OS X operating systems.
on Your Apple Mac
OS X Procedure
Step 1 Using SSH, log in to your Mac OS X device as a root user.
Step 2 Open the /etc/syslog.conf file.
Step 3 Add the following line to the top of the file. Make sure all other lines remain intact:
*.* @<IP address>
Where <IP address> is the IP address of the JSA.
Step 4 Save and exit the file.
Step 5 Send a hang-up signal to the syslog daemon to make sure all changes are
enforced:
sudo killall - HUP syslogd
The syslog configuration is complete. Events forwarded to JSA by your Apple Mac
OS X are displayed on the Log Activity tab. For more information on configuring
Mac OS X, see your Mac OS X vendor documentation.
Configuring DSMs
10 APPLICATION SECURITY
DBPROTECT
You can integrate Application Security DbProtect with Juniper Secure Analytics
(JSA).
Supported Event The Application Security DbProtect DSM for JSA accepts syslog events from
Types DbProtect devices installed with the Log Enhanced Event Format (LEEF) Service.
Before You Begin To forward syslog events from Application Security DbProtect to JSA requires the
LEEF Relay module.
The LEEF Relay module for DbProtect translates the default events messages to
Log Enhanced Event Format (LEEF) messages for JSA, enabling JSA to record all
relevant DbProtect events. Before you can receive events in JSA, you must install
and configure the LEEF Service for your DbProtect device to forward syslog
events. The DbProtect LEEF Relay requires that you install the .NET 4.0
Framework, which is bundled with the LEEF Relay installation.
Installing the The DbProtect LEEF Relay module for DbProtect must be installed on the same
DbProtect LEEF server as the DbProtect console. This allows the DbProtect LEEF Relay to work
Relay Module alongside an existing installation using the standard hardware and software
prerequisites for a DbProtect console.
NOTE
Note: Windows 2003 hosts require the Windows Imaging Components
(wic_x86.exe). The Windows Imaging Components are located on the Windows
Server Installation CD and must be installed before you continue. For more
information, see your Windows 2003 Operating System documentation.
Procedure
Step 1 Download the DbProtect LEEF Relay module for DbProtect from the Application
Security, Inc. customer portal.
http://www.appsecinc.com
Step 2 Save the setup file to the same host as your DbProtect console.
Step 3 Double click setup.exe to start the DbProtect LEEF Relay installation.
The Microsoft .NET Framework 4 Client Profile is displayed.
Configuring DSMs
50 APPLICATION SECURITY DBPROTECT
Step 4 Click Accept, if you agree with the Microsoft .NET Framework 4 End User License
Agreement.
The Microsoft .NET Framework 4 is installed on your DbProtect console. After the
installation is complete, the DbProtect LEEF Relay module installation Wizard is
displayed.
Step 5 Click Next.
The Installation Folder window is displayed.
Step 6 To select the default installation path, click Next.
If you change the default installation directory, make note of the file location as it is
required later. The Confirm Installation window is displayed.
Step 7 Click Next.
The DbProtect LEEF Relay module is installed.
Step 8 Click Close.
You are now ready to configure the DbProtect LEEF Relay module.
Configuring the After the installation of the DbProtect LEEF Relay is complete, you can configure
DbProtect LEEF the service to forward events to JSA.
Relay
NOTE
Note: The DbProtect LEEF Relay must be stopped before you edit any
configuration values.
Procedure
Step 1 Navigate to the DbProtect LEEF Relay installation directory.
C:\Program Files (x86)\AppSecInc\AppSecLEEFConverter
Step 2 Edit the DbProtect LEEF Relay configuration file:
AppSecLEEFConverter.exe.config
Step 3 Configure the following values:
Parameter Description
SyslogListenerPort Optional. Type the listen port number the DbProtect LEEF
Relay uses to listen for syslog messages from the
DbProtect console. By default, the DbProtect LEEF Relay
listens on port 514.
SyslogDestinationHost Type the IP address of your JSA console or Event
Collector.
SyslogDestinationPort Type 514 as the destination port for LEEF formatted syslog
messages forwarded to JSA.
Configuring DSMs
51
Parameter Description
LogFileName Optional. Type a file name for the DbProtect LEEF Relay to
write debug and log messages. The LocalSystem user
account that runs the DbProtect LEEF Relay service must
have write privileges to the file path you specify.
Configure DbProtect You can configure sensors on your DbProtect console to generate alerts.
alerts
Procedure
Step 1 Log in to your DbProtect console.
Step 2 Click the Activity Monitoring tab.
Step 3 Click the Sensors tab.
Step 4 Select a sensor and click Reconfigure.
Any database instances that are configured for your database are displayed.
Step 5 Select any database instances and click Reconfigure.
Step 6 Click Next until the Sensor Manager Policy window is displayed.
Step 7 Select the Syslog check box and click Next.
Step 8 The Syslog Configuration window is displayed.
Step 9 In the Send Alerts to the following Syslog console field, type the IP address of
your DbProtect console.
Step 10 In the Port field, type the port number you configured in the SyslogListenerPort
field of the DbProtect LEEF Relay.
Configuring DSMs
52 APPLICATION SECURITY DBPROTECT
By default, 514 is the default Syslog listen port for the DbProtect LEEF Relay. For
more information, see Configuring the DbProtect LEEF Relay, Step 3.
Step 11 Click Add.
Step 12 Click Next until you reach the Deploy to Sensor window.
Step 13 Click Deploy to Sensor.
The configuration is complete. Events forwarded to JSA by your DbProtect console
are added as a log source and automatically displayed on the Log Activity tab.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source Application Security DbProtect. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Application Security DbProtect.
Step 9 Using the Protocol Configuration list box, select Syslog.
The syslog protocol configuration is displayed.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Application Security DbProtect
device.
Configuring DSMs
11 ARBOR NETWORKS PEAKFLOW
Juniper Secure Analytics (JSA) can collect and categorize syslog events from
Arbor Networks Peakflow SP appliances that are in your network.
Configuration Arbor Networks Peakflow SP appliances store the syslog events locally.
Overview
To collect local syslog events, you must configure your Peakflow SP appliance to
forward the syslog events to a remote host. JSA automatically discovers and
creates log sources for syslog events that are forwarded from Arbor Networks
Peakflow SP appliances. JSA supports syslog events that are forwarded from
Peakflow V5.8.
Supported Event The Arbor Networks Peakflow DSM for JSA collects events from several
Types for Arbor categories.
Networks Peakflow
SP Each event category contains low-level events that describe the action that is
taken within the event category. For example, authentication events can have
low-level categories of login successful or login failure.
The following list defines the event categories that are collected by JSA from
Peakflow SP appliances:
• Denial of Service (DoS) events
• Authentication events
• Exploit events
• Suspicious activity events
• System events
Configuring DSMs
54 ARBOR NETWORKS PEAKFLOW
Configuring Remote To collect events, you must configure a new notification group or edit existing
Syslog in Peakflow groups to add JSA as a remote syslog destination.
SP
Procedure
To configure Remote Syslog in Peakflow SP:
Step 1 Log in to the configuration interface for your Peakflow SP appliance as an
administrator.
Step 2 In the navigation menu, select Administration > Notification > Groups.
Step 3 Click Add Notification Group.
Step 4 In the Destinations field, type the IP address of your JSA system.
Step 5 In the Port field, type 514 as the port for your syslog destination.
Step 6 From the Facility list, select a syslog facility.
Step 7 From the Severity list, select info.
The informational severity collects all event messages at the informational event
level and higher severity.
Step 8 Click Save.
Step 9 Click Configuration Commit.
Configuring Global Global notifications in Peakflow SP provide system notifications that are not
Notifications Settings associated with rules. This procedure defines how to add JSA as the default
for Alerts in Peakflow notification group and enable system notifications.
SP
Procedure
Step 1 Log in to the configuration interface for your Peakflow SP appliance as an
administrator.
Step 2 In the navigation menu, select Administration > Notification > Global Settings.
Step 3 In the Default Notification Group field, select the notification group that you
created for JSA syslog events.
Step 4 Click Save.
Step 5 Click Configuration Commit to apply the configuration changes.
Step 6 Log in to the Peakflow SP command-line interface as an administrator.
Step 7 Type the following command to list the current alert configuration:
services sp alerts system_errors show
Step 8 Optional. Type the following command to list the fields names that can be
configured:
services sp alerts system_errors ?
Step 9 Type the following command to enable a notification for a system alert:
services sp alerts system_errors <name> notifications enable
Where <name> is the field name of the notification.
Configuring DSMs
55
Configuring Alert To generate events, you must edit or add rules to use the notification group that
Notification Rules in JSA as a remote syslog destination.
Peakflow SP
Procedure
Step 1 Log in to the configuration interface for your Peakflow SP appliance as an
administrator.
Step 2 In the navigation menu, select Administration > Notification > Rules.
Step 3 Select one of the following options:
• Click a current rule to edit the rule.
• Click Add Rule to create a new notification rule.
Step 4 Configure the following values:
Parameter Description
Name Type the IP address or host name as an identifier for events
from your Peakflow SP installation.
The log source identifier must be unique value.
Resource Type a CIDR address or select a managed object from the
list of Peakflow resources.
Importance Select the importance of the rule.
Notification Group Select the notification group that you assigned to forward
syslog events to JSA.
Step 5 Repeat these steps to configure any other rules you want to forward to JSA.
Step 6 Click Save.
Step 7 Click Configuration Commit to apply the configuration changes.
JSA automatically discovers and creates a log source for Peakflow SP appliances.
Events that are forwarded to JSA are displayed on the Log Activity tab.
Configuring a JSA automatically discovers and creates a log source for syslog events forwarded
Peakflow SP Log from Arbor Peakflow. These configuration steps are optional.
Source
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Configuring DSMs
56 ARBOR NETWORKS PEAKFLOW
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 Optional. In the Log Source Description field, type a description for your log
source.
Step 8 From the Log Source Type list box, select Arbor Networks Peakflow.
Step 9 From the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name as an identifier for events
from your Peakflow SP installation.
The log source identifier must be unique value.
Enabled Select this check box to enable the log source. By default,
the check box is selected.
Credibility Select the credibility of the log source. The range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector Select the Event Collector to use as the target for the log
source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Configuring DSMs
12 ARBOR NETWORKS PRAVAIL
The Juniper Secure Analytics (JSA) DSM for Arbor Networks Pravail can collect
event logs from your Arbor Networks Pravail servers.
Table 12-1 provides the specifications of the Arbor Networks Pravail DSM.
Configuring DSMs
58 ARBOR NETWORKS PRAVAIL
Arbor Networks To integrate Arbor Networks Pravail DSM with JSA, use the following procedure:
Pravail DSM
Integration Process
1 If automatic updates are not enabled, download and install the most recent Arbor
Networks Pravail RPM on your JSA console.
2 For each instance of Arbor Networks Pravail, configure your Arbor Networks
Pravail system to enable communication with JSA.
3 If Configuring DSMs automatically discovers the DSM, for each Arbor Networks
Pravail server you want to integrate, create a log source on the JSA console.
Related tasks
• Manually Installing a DSM
• Configuring your Arbor Networks Pravail system for Communication with
JSA
• Configuring an Arbor Networks Pravail Log Source in Configuring DSMs
Configuring your To collect all audit logs and system events from Arbor Networks Pravail, you must
Arbor Networks add a destination that specifies JSA as the syslog server.
Pravail system for
Communication Procedure
with JSA To configure Arbor Networks Prevail System for communication with JSA:
Step 1 Log in to your Arbor Networks Pravail server.
Step 2 Click Settings & Reports.
Step 3 Click Administration > Notifications.
Step 4 On the Configure Notifications page, click Add Destinations.
Step 5 Select Syslog.
Step 6 Configure the following parameters:
Table 12-2 Parameters to Configure Arbor Networks Pravail System
Parameter Description
Host The IP address for the
Configuring DSMs Console
Port 514
Severity Info
Alert Types The alert types that you want to
send to the Configuring DSMs
Console
Configuring DSMs
Configuring an Arbor Networks Pravail Log Source in Configuring DSMs 59
Configuring an To collect Arbor Networks Pravail events, configure a log source in JSA.
Arbor Networks
Pravail Log Source Procedure
in Configuring To configure an Arbor Networks Pravail log source in configuring DSMs:
DSMs
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 From the Log Source Type list, select Arbor Networks Pravail.
Step 7 From the Protocol Configuration list, select Syslog.
Step 8 Configure the remaining parameters.
Step 9 Click Save.
Step 10 On the Admin tab, click Deploy Changes.
Configuring DSMs
13 ARPEGGIO SIFT-IT
The Juniper Secure Analytics (JSA) SIFT-IT DSM accepts syslog events from
Arpeggio SIFT-IT running on IBM iSeries that are formatted using the Log
Enhanced Event Protocol (LEEF).
Supported Versions JSA supports events from Arpeggio SIFT-IT 3.1 and above installed on IBM iSeries
version 5 revision 3 (V5R3) and above.
Supported Events Arpeggio SIFT-IT supports syslog events from the journal QAUDJRN in LEEF
format.
For example,
Jan 29 01:33:34 RUFUS LEEF:1.0|Arpeggio|SIFT-IT|3.1|PW_U|sev=3
usrName=ADMIN src=100.100.100.114 srcPort=543 jJobNam=QBASE
jJobUsr=ADMIN jJobNum=1664 jrmtIP=100.100.100.114 jrmtPort=543
jSeqNo=4755 jPgm=QWTMCMNL jPgmLib=QSYS jMsgId=PWU0000 jType=U
jUser=ROOT jDev=QPADEV000F jMsgTxt=Invalid user id ROOT. Device
QPADEV000F.
Events SIFT-IT forwards to JSA are determined with a configuration rule set file.
SIFT-IT includes a default configuration rule set file that you can edit to meet your
security or auditing requirements. For more information on configuring rule set
files, see your SIFT-IT User Guide.
Configuring a SIFT-IT Arpeggio SIFT-IT is capable of forwarding syslog events in LEEF format with
Agent SIFT-IT agents.
A SIFT-IT agent configuration defines the location of your JSA installation, the
protocol and formatting of the event message, and the configuration rule set.
Procedure
Step 1 Log in to your IBM iSeries.
Step 2 Type the following command and press Enter to add SIFT-IT to your library list:
ADDLIBLE SIFTITLIB0
Step 3 Type the following command and press Enter to access the SIFT-IT main menu:
GO SIFTIT
Configuring DSMs
62 ARPEGGIO SIFT-IT
Step 4 From the main menu, select 1. Work with SIFT-IT Agent Definitions.
Step 5 Type 1 to add an agent definition for JSA and press Enter.
Step 6 Configure the following agent parameters:
a In the SIFT-IT Agent Name field, type a name.
For example, JSA.
b In the Description field, type a description for the agent.
For example, Arpeggio agent for JSA.
c In the Server host name or IP address field, type the location of your JSA
console or Event Collector.
d In the Connection type field, type either *TCP, *UDP, or *SECURE.
The *SECURE option requires the TLS protocol. For more information, see the
Log Sources Users Guide.
e In the Remote port number field, type 514.
By default, JSA supports both TCP and UDP syslog messages on port 514.
f In the Message format options field, type *JSA.
g Optional. Configure any additional parameters for attributes that are not JSA
specific.
The additional operational parameters are described in the SIFT-IT User Guide.
h Press F3 to exit to the Work with SIFT-IT Agents Description menu.
Step 7 Type 9 and press Enter to load a configuration rule set for JSA.
Step 8 In the Configuration file field, type the path to your JSA configuration rule set file.
For example,
/sifitit/JSAconfig.txt
Step 9 Press F3 to exit to the Work with SIFT-IT Agents Description menu.
Step 10 Type 11 to start the JSA agent.
The configuration is complete.
Next steps
Syslog events forwarded by Arpeggio SIFT-IT in LEEF format are automatically
discovered by JSA. In most cases, the log source is automatically created in JSA
after a small number of events are detected. If the event rate is extremely low, then
you might be required to manually create a log source for Arpeggio SIFT-IT in JSA.
Until the log source is automatically discovered and identified, the event type
displays as Unknown on the Log Activity tab of JSA. Automatically discovered log
sources can be viewed on the Admin tab of JSA by clicking the Log Sources icon.
Configuring DSMs
63
Configuring a Log JSA automatically discovers and creates a log source for system authentication
Source events forwarded from Arpeggio SIFT-IT. This procedure is optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Arpeggio SIFT-IT.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Arpeggio SIFT-IT installation.
Additional After you create your JSA agent definition, you can use your Arpeggio SIFT-IT
Information software and JSA integration to customize your security and auditing
requirements.
Configuring DSMs
64 ARPEGGIO SIFT-IT
• Creating multiple configuration rule sets for multiple agents that run
simultaneously to handle specific security or audit events.
For example, you can configure one JSA agent with a specific rule sets for
forwarding all IBM iSeries events, then develop multiple configuration rule sets
for specific compliance purposes. This allows you to easily manage
configuration rule sets for compliance regulations, such as FISMA, PCI. HIPPA,
SOX, or ISO 27001. All of the events forwarded by SIFT-IT JSA agents is
contained in a single log source and categorized to be easily searchable.
Configuring DSMs
14 ARRAY NETWORKS SSL VPN
The Array Networks SSL VPN DSM for Juniper Secure Analytics (JSA) collects
events from an ArrayVPN appliance using syslog.
Supported Event JSA records all relevant SSL VPN events forwarded using syslog on TCP port 514
Types or UDP port 514.
Configuring a Log To integrate Array Networks SSL VPN events with JSA, you must manually create
Source a log source.
JSA does not automatically discover or create log sources for syslog events from
Array Networks SSL VPN.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Array Networks SSL VPN Access
Gateways.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Array Networks SSL VPN
appliance.
Configuring DSMs
66 ARRAY NETWORKS SSL VPN
Next Steps
You are now ready to configure your Array Networks SSL VPN appliance to
forward remote syslog events to JSA. For more information on configuring Array
Networks SSL VPN appliances for remote syslog, please consult your Array
Networks documentation.
Configuring DSMs
15 ARUBA MOBILITY CONTROLLERS
The Aruba Mobility Controllers DSM for Juniper Secure Analytics (JSA) accepts
events using syslog.
Supported Event JSA records all relevant events forwarded using syslog on TCP port 514 or UDP
Types port 514.
Configure Your You can configure the Aruba Wireless Networks (Mobility Controller) device to
Aruba Mobility forward syslog events to JSA.
Controller
Procedure
Step 1 Log in to the Aruba Mobility Controller user interface.
Step 2 From the top menu, select Configuration.
Step 3 From the Switch menu, select Management.
Step 4 Click the Logging tab.
Step 5 From the Logging Servers menu, select Add.
Step 6 Type the IP address of the JSA server that you want to collect logs.
Step 7 Click Add.
Step 8 Optional. Change the logging level for a module:
a Select the check box next to the name of the logging module.
b Choose the logging level you want to change from the list box that is displayed
at the bottom of the window.
Step 9 Click Done.
Step 10 Click Apply.
The configuration is complete. The log source is added to JSA as Aruba Mobility
Controller events are automatically discovered. Events forwarded to JSA by Aruba
Mobility Controller are displayed on the Log Activity tab of JSA.
Configuring DSMs
68 ARUBA MOBILITY CONTROLLERS
Configuring a Log JSA automatically discovers and creates a log source for syslog events from Aruba
Source Mobility Controllers. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Aruba Mobility Controller .
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Aruba Mobility Controller.
Configuring DSMs
16 AVAYA VPN GATEWAY
The Juniper Secure Analytics (JSA) DSM for Avaya VPN Gateway can collect
event logs from your Avaya VPN Gateway servers.
Table 16-1 identifies the specifications for the Avaya VPN Gateway DSM.
Configuring DSMs
70 AVAYA VPN GATEWAY
Avaya VPN To integrate Avaya VPN Gateway DSM with JSA, use the following procedure:
Gateway DSM
Integration Process
1 If automatic updates are not enabled, download and install the most recent version
of the following RPMs on your JSA console:
• Syslog protocol RPM
• DSMCommon RPM
• Avaya VPN Gateway RPM
2 For each instance of Avaya VPN Gateway, configure your Avaya VPN Gateway
system to enable communication with JSA.
3 If JSA automatically discovers the log source, for each Avaya VPN Gateway server
you want to integrate, create a log source on the JSA console.
Related tasks
• Manually Installing a DSM
• Configuring your Avaya VPN Gateway System for Communication with JSA
• Configuring an Avaya VPN Gateway Log Source in JSA
Configuring your To collect all audit logs and system events from Avaya VPN Gateway, you must
Avaya VPN specify JSA as the syslog server and configure the message format.
Gateway System
for Communication Procedure
with JSA To configure your Avaya VPN Gateway system for communication with JSA:
Step 1 Log in to your Avaya VPN Gateway command-line interface (CLI).
Step 2 Type the following command:
/cfg/sys/syslog/add
Step 3 At the prompt, type the IP address of your JSA system.
Step 4 To apply the configuration, type the following command:
apply
Step 5 To verify that the IP address of your JSA system is listed, type the following
command:
/cfg/sys/syslog/list
Configuring DSMs
Configuring an Avaya VPN Gateway Log Source in JSA 71
Configuring an To collect Avaya VPN Gateway events, configure a log source in JSA.
Avaya VPN
Gateway Log Procedure
Source in JSA To configure an Avaya VPN Gateway log source in JSA:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 From the Log Source Type list, select Avaya VPN Gateway.
Step 7 From the Protocol Configuration list, select Syslog.
Step 8 Configure the remaining parameters.
Step 9 Click Save.
Step 10 On the Admin tab, click Deploy Changes.
Configuring DSMs
17 BALABIT IT SECURITY
The BalaBit Syslog-ng Agent application can collect and forward syslog events for
the Microsoft Security Event Log DSM and the Microsoft ISA DSM in Juniper
Secure Analytics (JSA).
To configure a BalaBIt IT Security agent, select a configuration:
• Configuring BalaBIt IT Security for Microsoft Windows Events
• Configuring BalaBit IT Security for Microsoft ISA or TMG Events
Configuring BalaBIt The Microsoft Windows Security Event Log DSM in JSA can accept Log Extended
IT Security for Event Format (LEEF) events from BalaBit’s Syslog-ng Agent.
Microsoft Windows
Events
Supported Event The BalaBit Syslog-ng Agent forwards Windows events to JSA using syslog.
Types
• Windows security
• Application
• System
• DNS
• DHCP
• Custom container event logs
Configuring DSMs
74 BALABIT IT SECURITY
Before You Begin Before you can receive events from BalaBit IT Security Syslog-ng Agents, you
must install and configure the agent to forward events.
Review the following configuration steps before you attempt to configure the
BalaBit Syslog-ng Agent:
1 Install the BalaBit Syslog-ng Agent in your Windows host. For more information,
see your BalaBit Syslog-ng Agent documentation.
2 Configure Syslog-ng Agent Events.
3 Configure JSA as a destination for the Syslog-ng Agent.
4 Restart the Syslog-ng Agent service.
5 Optional. Configure the log source in JSA.
Configuring the Before you can forward events to JSA, you must specify what Windows-based
Syslog-ng Agent events the Syslog-ng Agent collects.
Event Source
Procedure
Step 1 From the Start menu, select All Programs > syslog-ng Agent for Windows >
Configure syslog-ng Agent for Windows.
The Syslog-ng Agent window is displayed.
Step 2 Expand the syslog-ng Agent Settings pane, and select Eventlog Sources.
Step 3 Double-click on Event Containers.
The Event Containers Properties window is displayed.
Step 4 From the Event Containers pane, select the Enable radio button.
Step 5 Select a check box for each event type you want to collect:
• Application - Select this check box if you want the device to monitor the
Windows application event log.
• Security - Select this check box if you want the device to monitor the Windows
security event log.
• System - Select this check box if you want the device to monitor the Windows
system event log.
NOTE
Note: BalaBit’s Syslog-ng Agent supports additional event types, such as DNS or
DHCP events using custom containers. For more information, see your BalaBit
Syslog-ng Agent documentation.
Configuring DSMs
Configuring BalaBIt IT Security for Microsoft Windows Events 75
Configuring a Syslog The Syslog-ng Agent allows you to configure multiple destinations for your
Destination Windows-based events.
To configure JSA as a destination, you must specify the IP address for JSA, and
then configure a message template for the LEEF format.
Procedure
Step 1 From the Start menu, select All Programs > syslog-ng Agent for Windows >
Configure syslog-ng Agent for Windows.
The Syslog-ng Agent window is displayed.
Step 2 Expand the syslog-ng Agent Settings pane, and click Destinations.
Step 3 Double-click on Add new sever.
The Server Property window is displayed.
Step 4 On the Server tab, click Set Primary Server.
Step 5 Configure the following parameters:
a Server Name - Type the IP address of your JSA console or Event Collector.
b Server Port - Type 514 as the TCP port number for events forwarded to JSA.
Step 6 Click the Messages tab.
Step 7 From the Protocol list box, select Legacy BSD Syslog Protocol.
Step 8 In the Template field, define a custom template message for the protocol by
typing:
<${PRI}>${BSDDATE} ${HOST} LEEF:${MSG}
The information typed in this field is space delimited.
Step 9 From the Event Message Format pane, in the Message Template field, type the
following to define the format for the LEEF events:
1.0|Microsoft|Windows|2k8r2|${EVENT_ID}|devTime=${R_YEAR}-${R_M
ONTH}-${R_DAY}T
${R_HOUR}:${R_MIN}:${R_SEC}GMT${TZOFFSET}
devTimeFormat=yyyy-MM-dd'T'HH:mm:ssz cat=${EVENT_TYPE}
sev=${EVENT_LEVEL} resource=${HOST} usrName=${EVENT_USERNAME}
application=${EVENT_SOURCE} message=${EVENT_MSG}
NOTE
Note: The LEEF format uses tab as a delimiter to separate event attributes from
each other. However, the delimiter does not start until after the last pipe character
for {Event_ID}. The following fields must include a tab before the event name:
devTime, devTimeFormat, cat, sev, resource, usrName, application, and message.
You might need to use a text editor to copy and paste the LEEF message format
into the Message Template field.
Configuring DSMs
76 BALABIT IT SECURITY
Restart the Syslog-ng Before the Syslog-ng Agent can forward LEEF formatted events, you must restart
Agent Service the Syslog-ng Agent service on the Windows host.
Procedure
Step 1 From the Start menu, select Start > Run.
The Run window is displayed.
Step 2 Type the following:
services.msc
Step 3 Click OK.
The Services window is displayed.
Step 4 In the Name column, right-click on Syslog-ng Agent for Windows, and select
Restart.
After the Syslog-ng Agent for Windows service restarts, the configuration is
complete. Syslog events from the BalaBit Syslog-ng Agent are automatically
discovered by JSA. The Windows events that are automatically discovered are
displayed as Microsoft Windows Security Event Logs on the Log Activity tab.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from LEEF
Source formatted messages. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your BalaBit Syslog-ng Agent log
source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Microsoft Windows Security Event
Log.
Step 9 Using the Protocol Configuration list box, select Syslog.
Configuring DSMs
Configuring BalaBit IT Security for Microsoft ISA or TMG Events 77
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for events from the BalaBit Syslog-ng Agent.
Configuring BalaBit You can integrate the BalaBit Syslog-ng Agent application to forward syslog events
IT Security for to JSA.
Microsoft ISA or
TMG Events
Supported Event The BalaBit Syslog-ng Agent reads Microsoft ISA or Microsoft TMG event logs and
Types forwards syslog events using the Log Extended Event Format (LEEF).
The events forwarded by BalaBit IT Security are parsed and categorized by the
Microsoft Internet and Acceleration (ISA) DSM for JSA. The DSM accepts both
Microsoft ISA and Microsoft Threat Management Gateway (TMG) events.
Before You Begin Before you can receive events from BalaBit IT Security Syslog-ng Agents, you
must install and configure the agent to forward events.
NOTE
Note: This integration uses BalaBit’s Syslog-ng Agent for Windows and BalaBit’s
Syslog-ng PE to parse and forward events to JSA for the DSM to interpret.
Review the following configuration steps before you attempt to configure the
BalaBit Syslog-ng Agent:
Configuring DSMs
78 BALABIT IT SECURITY
Configure the BalaBit Before you can forward events to JSA, you must specify the file source for
Syslog-ng Agent Microsoft ISA or Microsoft TMG events in the Syslog-ng Agent collects.
If your Microsoft ISA or Microsoft TMG appliance is generating event files for the
Web Proxy Server and the Firewall Service, both files can be added.
Procedure
Step 1 From the Start menu, select All Programs > syslog-ng Agent for Windows >
Configure syslog-ng Agent for Windows.
The Syslog-ng Agent window is displayed.
Step 2 Expand the syslog-ng Agent Settings pane, and select File Sources.
Step 3 Select the Enable radio button.
Step 4 Click Add to add your Microsoft ISA and TMG event files.
Step 5 From the Base Directory field, click Browse and select the folder for your
Microsoft ISA or Microsoft TMG log files.
Step 6 From the File Name Filter field, click Browse and select a log file containing your
Microsoft ISA or Microsoft TMG events.
NOTE
Note: The File Name Filter field supports the wildcard (*) and question mark (?)
characters to follow log files that are replaced after reaching a specific file size or
date.
Step 7 In the Application Name field, type a name to identify the application.
Step 8 From the Log Facility list box, select Use Global Settings.
Step 9 Click OK.
Step 10 To add additional file sources, click Add and repeat this process from Step 4.
Microsoft ISA and TMG store Web Proxy Service events and Firewall Service
events in individual files.
Configuring DSMs
Configuring BalaBit IT Security for Microsoft ISA or TMG Events 79
To forward your TMG and ISA event logs, you must specify the IP address for your
PE relay and configure a message template for the LEEF format. The BalaBit
Syslog-ng PE acts as an intermediate syslog server to parse the events and
forward the information to JSA.
Procedure
Step 1 From the Start menu, select All Programs > syslog-ng Agent for Windows >
Configure syslog-ng Agent for Windows.
The Syslog-ng Agent window is displayed.
Step 2 Expand the syslog-ng Agent Settings pane, and click Destinations.
Step 3 Double-click on Add new sever.
Step 4 On the Server tab, click Set Primary Server.
Step 5 Configure the following parameters:
a Server Name - Type the IP address of your BalaBit Syslog-ng PE relay.
b Server Port - Type 514 as the TCP port number for events forwarded to your
BalaBit Syslog-ng PE relay.
Step 6 Click the Messages tab.
Step 7 From the Protocol list box, select Legacy BSD Syslog Protocol.
Step 8 From the File Message Format pane, in the Message Template field, type the
following format command:
${FILE_MESSAGE}${TZOFFSET}
Step 9 Click Apply, and then click OK.
The destination configuration is complete. You are now ready to filter comment
lines from the event log.
Procedure
Step 1 From the Start menu, select All Programs > syslog-ng Agent for Windows >
Configure syslog-ng Agent for Windows.
The Syslog-ng Agent window is displayed.
Configuring DSMs
80 BALABIT IT SECURITY
Step 2 Expand the syslog-ng Agent Settings pane, and select Destinations.
Step 3 Right-click on your JSA syslog destination and select Event Filters > Properties.
The Global event filters Properties window is displayed.
Step 4 Configure the following values:
• From the Global file filters pane, select Enable.
• From the Filter Type pane, select Black List Filtering.
Step 5 Click OK.
Step 6 From the filter list menu, double-click Message Contents.
The Message Contents Properties window is displayed.
Step 7 From the Message Contents pane, select the Enable radio button.
Step 8 In the Regular Expression field, type the following regular expression:
^#
Step 9 Click Add.
Step 10 Click Apply, and then click OK.
The event messages containing comments are no longer forwarded.
NOTE
Note: You might be required to restart Syslog-ng Agent for Windows service to
begin syslog forwarding. For more information, see your BalaBit Syslog-ng Agent
documentation.
Configuring a BalaBit The BalaBit Syslog-ng Agent for Windows sends Microsoft TMG and ISA event
Syslog-ng PE Relay logs to a Balabit Syslog-ng PE installation, which is configured in relay mode.
The relay mode installation is responsible for receiving the event log from the
BalaBit Syslog-ng Agent for Windows, parsing the event logs in to the LEEF
format, then forwarding the events to JSA using syslog.
NOTE
Note: For a sample syslog.conf file you can use to configure Microsoft TMG and
ISA logs using your BalaBit Syslog-ng PE relay, see
http://www.juniper.net/customers/support/.
The BalaBit Syslog-ng PE formats the TMG and ISA events in the LEEF format
based on the configuration of your syslog.conf file. The syslog.conf file is
responsible for parsing the event logs and forwarding the events to JSA.
Configuring DSMs
Configuring BalaBit IT Security for Microsoft ISA or TMG Events 81
Procedure
Step 1 Using SSH, log in to your BalaBit Syslog-ng PE relay command-line interface
(CLI).
Step 2 Edit the following file:
/etc/syslog-ng/etc/syslog.conf
Step 3 From the destinations section, add an IP address and port number for each relay
destination.
For example,
######
# destinations
destination d_messages { file("/var/log/messages"); };
destination d_remote_tmgfw { tcp("JSA_IP" port(JSA_PORT)
log_disk_fifo_size(10000000) template(t_tmgfw)); };
destination d_remote_tmgweb { tcp("JSA_IP" port(JSA_PORT)
log_disk_fifo_size(10000000) template(t_tmgweb)); };
Where:
JSA_IP is the IP address of your JSA console or Event Collector.
JSA_PORT is the port number required for JSA to receive syslog events. By default,
JSA receives syslog events on port 514.
Step 4 Save the syslog configuration changes.
Step 5 Restart Syslog-ng PE to force the configuration file to be read.
The BalaBit Syslog-ng PE configuration is complete. Syslog events forwarded from
the BalaBit Syslog-ng relay are automatically discovered by JSA as Microsoft
Windows Security Event Log on the Log Activity tab. For more information, see
the Juniper Secure Analytics Users Guide.
NOTE
Note: When using multiple syslog destinations, messages are considered
delivered after they successfully arrived at the primary syslog destination.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from LEEF
Source formatted messages provided by your BalaBit Syslog-ng relay. The following
configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
The Data Sources panel is displayed.
Step 4 Click the Log Sources icon.
The Log Sources window is displayed.
Configuring DSMs
Configuring BalaBit IT Security for Microsoft ISA or TMG Events 82
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for Microsoft ISA or Microsoft Threat Management
Gateway events from the BalaBit Syslog-ng Agent.
Configuring DSMs
18 BARRACUDA
Barracuda Spam & You can integrate Barracuda Spam & Virus Firewall with Juniper Secure Analytics
Virus Firewall (JSA).
Supported Event The Barracuda Spam & Virus Firewall DSM for JSA accepts both Mail syslog
Types events and Web syslog events from Barracuda Spam & Virus Firewall appliances.
Mail syslog events contain the event and action taken when the firewall processes
email. Web syslog events record information on user activity and configuration
changes on your Barracuda Spam & Virus Firewall appliance.
Before You Begin Before you can receive events in JSA, you must configure your Barracuda Spam &
Virus Firewall to forward syslog events. Syslog messages are sent to JSA from
Barracuda Spam & Virus Firewall using UDP port 514. You must verify any
firewalls between JSA and your Barracuda Spam & Virus Firewall appliance allow
UDP traffic on port 514.
Configuring Syslog You can configure syslog forwarding for Barracuda Spam & Virus Firewall.
Event Forwarding
Procedure
Step 1 Log in to the Barracuda Spam & Virus Firewall web interface.
Step 2 Click the Advanced tab.
Step 3 From the Advanced menu, select Advanced Networking.
Step 4 From the Mail Syslog field, type IP address of your JSA console or Event
Collector.
Step 5 Click Add.
Step 6 From the Web Interface Syslog field, type IP address of your JSA console or
Event Collector.
Configuring DSMs
84 BARRACUDA
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source Barracuda Spam & Virus Firewall appliances. The following configuration steps are
optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Barracuda Spam & Virus Firewall.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Barracuda Spam & Virus
Firewall appliance.
Barracuda Web The Juniper Secure Analytics (JSA) DSM for Barracuda Web Application Firewall
Application collects syslog LEEF and custom events from Barracuda Web Application Firewall
Firewall devices.
Table 18-1 identifies the specifications for the Barracuda Web Application Firewall
DSM.
Table 18-1 Barracuda Web Application Firewall DSM Specifications
Specification Value
Manufacturer Barracuda
DSM name Web Application Firewall
Configuring DSMs
Barracuda Web Application Firewall 85
To collect syslog events from Barracuda Web Application Firewall, use the
following steps:
1 If automatic updates are not enabled, download the most recent version of the
following RPMs on your JSA console:
• Barracuda Web Application Firewall DSM RPM
• DSMCommon RPM
2 Configure your Barracuda Web Application Firewall device to send syslog events
to JSA.
3 Add a Barracuda Web Application Firewall log source on the JSA console.
Table 18-2 describes the parameters that require specific values that are required
for Barracuda Web Application Firewall event collection..
Table 18-2 Barracuda Web Application Firewall Log Source Parameters
Parameter Description
Log Source type Barracuda Web Application Firewall.
Protocol Syslog
Configuration
Configuring DSMs
86 BARRACUDA
Configuring Configure your Barracuda Web Application Firewall appliance to send syslog
Barracuda Web events to JSA.
Application
Firewall to Send Before you begin
Syslog Events to Verify that firewalls between the Barracuda appliance and JSA allow UDP traffic on
JSA port 514.
Procedure
To configure Barracuda Web Application Firewall appliance:
1 Log in to the Barracuda Web Application Firewall web interface.
2 Click the Advanced tab.
3 From the Advanced menu, select Export Logs.
4 Click Add Syslog Server.
5 Configure the parameters described in Table 18-3.
Table 18-3 Barracuda Web Application Firewall Appliance to Send Events to JSA
Parameter Description
Name The name of the JSA console or Event Collector
Syslog Server The IP address of your JSA console or Event
Collector.
Port The port that is associated with the IP address of
your JSA console or Event Collector.
If syslog messages are sent by UDP, use the default
port, 514.
Connection Type The connection type that transmits the logs from the
Barracuda Web Application Firewall to the JSA
console or Event Collector. UDP is the default
protocol for syslog communication.
Validate Server No
Certificate
Step 6 In the Log Formats pane, select a format from the list box for each log type.
• If you are using newer versions of Barracuda Web Application Firewall, select
LEEF 1.0 (JSA).
• If you are using older versions of Barracuda Web Application Firewall, select
Custom Format.
Click Save Changes.
Barracuda Web You can integrate Barracuda Web Filter appliance events with JSA.
Filter
Configuring DSMs
Barracuda Web Filter 87
Supported Event The Barracuda Web Filter DSM for JSA accepts web traffic and web interface
Types events in syslog format forwarded by Barracuda Web Filter appliances.
Web traffic events contain the event and action taken when the appliance
processes web traffic. Web interface events contain user login activity and
configuration changes to the Web Filter appliance.
Before You Begin Before you can receive events in JSA, you must configure your Barracuda Web
Filter to forward syslog events.
Syslog messages are forward to JSA using UDP port 514. You must verify any
firewalls between JSA and your Barracuda Web Filter appliance allow UDP traffic
on port 514.
Configuring Syslog You can configure syslog forwarding for Barracuda Web Filter.
Event Forwarding
Procedure
Step 1 Log in to the Barracuda Web Filter web interface.
Step 2 Click the Advanced tab.
Step 3 From the Advanced menu, select Syslog.
Step 4 From the Web Traffic Syslog field, type IP address of your JSA console or Event
Collector.
Step 5 Click Add.
Step 6 From the Web Interface Syslog field, type IP address of your JSA console or
Event Collector.
Step 7 Click Add.
The syslog configuration is complete.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source Barracuda Web Filter appliances. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Barracuda Web Filter.
Step 9 Using the Protocol Configuration list box, select Syslog.
Configuring DSMs
88 BARRACUDA
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Barracuda Web Filter
appliance.
Configuring DSMs
19 BIT9 PARITY
You can integrate Bit9 Parity events with Juniper Secure Analytics (JSA).
Supported Event The Bit9 Parity DSM for JSA accepts syslog events using the Log Enhanced Event
Types Format (LEEF), enabling JSA to record all relevant appliance events.
Configuring Bit9 To collect events, you must configure your Bit9 Parity device to forward syslog
Parity events in the LEEF format.
Procedure
Step 1 Log in to the Bit9 Parity console with Administrator or PowerUser privileges.
Step 2 From the navigation menu on the left side of the console, select Administration >
System Configuration.
The System Configuration window is displayed.
Step 3 Click Server Status.
The Server Status window is displayed.
Step 4 Click Edit.
Step 5 In the Syslog address field, type the IP address of your JSA.
Step 6 From the Syslog format list box, select LEEF (Q1 Labs).
Step 7 Select the Syslog enabled check box.
Step 8 Click Update.
The configuration is complete. The log source is added to JSA as Bit9 Parity
events are automatically discovered. Events forwarded to JSA by Bit9 Parity are
displayed on the Log Activity tab of JSA.
Configure a Log JSA automatically discovers and creates a log source for syslog events from Bit9
Source Parity. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Configuring DSMs
90 BIT9 PARITY
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Bit9 Parity device.
Configuring DSMs
20 BIT9 SECURITY PLATFORM
Use the Juniper Secure Analytics (JSA) DSM for Bit9 Security Platform to collect
events from Bit9 Parity devices.
Table 20-1 identifies the specifications for the Bit9 Security Platform DSM.
Table 20-1 DSM Specifications for Bit9 Security Platform
Specification Value
Manufacturer Bit9
DSM name Bit9 Security Platform
RPM file name DSM-Bit9Parity-build_number.noarch.rpm
Supported V6.0.2 and up
versions
Event format Syslog
Supported event All events
types
Automatically Yes.
discovered?
Includes identity? Yes
Technical risk? Yes
More information Bit9 website
(http://www.bit9.com)
To integrate Bit9 Security Platform with JSA, complete the following steps:
1 If automatic updates are not enabled, download the most recent version of the Bit9
Security Platform DSM RPM.
2 Configure your Bit9 Security Platform device to enable communication with JSA.
You must create a syslog destination and forwarding policy on the Bit9
3 If JSA does not automatically detect Bit9 Security Platform as a log source, create
a Bit9 Security Platform log source on the JSA console.
Configuring DSMs
92 BIT9 SECURITY PLATFORM
Use the Bit9 Security Platform values described in Table 20-2 to configure the log
source parameters.
Table 20-2 Bit9 Security Platform Values to Configure the Log Source Parameters
Parameter Description
Log Source The IP address or host name of the Bit9 Security
Identifier Platform device
Log Source Type Bit9 Security Platform
Protocol Syslog
Configuration
Configuring BIt9 Configure your Bit9 Security Platform device to forward events to JSA in LEEF
Security Platform format.
to Communicate
with JSA Procedure
To configure Bit9 Security Platform device to forward events to JSA:
Step 1 Log in to the Bit9 Security Platform console with Administrator or PowerUser
privileges.
Step 2 From the navigation menu, select Administration > System Configuration.
Step 3 Click Server Status and click Edit.
Step 4 In the Syslog address field, type the IP address of your JSA console or Event
Collector.
Step 5 From the Syslog format list, select LEEF (Q1Labs).
Step 6 Select the Syslog enabled check box and click Update.
Configuring DSMs
21 BLUECAT NETWORKS ADONIS
The BlueCat Networks Adonis DSM for Juniper Secure Analytics (JSA) accepts
events forwarded in Log Enhanced Event Protocol (LEEF) using syslog from
BlueCat Adonis appliances managed with BlueCat Proteus.
Supported Versions JSA supports BlueCat Networks Adonis appliances using version 6.7.1-P2 and
above.
Supported Event JSA is capable of collecting all relevant events related to DNS and DHCP queries.
Types
This includes the following events:
• DNS IPv4 and IPv6 query events
• DNS name server query events
• DNS mail exchange query events
• DNS text record query events
• DNS record update events
• DHCP discover events
• DHCP request events
• DHCP release events
Event Type Format The LEEF format consists of a pipe ( | ) delimited syslog header and a space
delimited event payload.
For example,
Aug 10 14:55:30 adonis671-184
LEEF:1.0|BCN|Adonis|6.7.1|DNS_Query|cat=A_record
src=10.10.10.10 url=test.example.com
If the syslog events forwarded from your BlueCat Adonis appliance are not
formatted similarly to the sample above, you must examine your device
configuration. Properly formatted LEEF event messages are automatically
Configuring DSMs
94 BLUECAT NETWORKS ADONIS
discovered by the BlueCat Networks Adonis DSM and added as a log source to
JSA.
Before You Begin BlueCat Adonis must be configured to generate events in Log Enhanced Event
Protocol (LEEF) and redirect the event output by way of syslog to JSA.
Configuring BlueCat You can configure your BlueCat Adonis appliance to forward DNS and DHCP
Adonis events to JSA.
Procedure
Step 1 Using SSH, log in to your BlueCat Adonis appliance command-line interface.
Step 2 Type the following command to start the syslog configuration script:
/usr/local/bluecat/qradar/setup-qradar.sh
Step 3 Type the IP address of your JSA console or Event Collector.
Step 4 Type yes or no to confirm the IP address.
The configuration is complete when a success message is displayed.
The log source is added to JSA as BlueCat Networks Adonis syslog events are
automatically discovered. Events forwarded to JSA are displayed on the Log
Activity tab. If the events are not automatically discovered, you can manually
configure a log source.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source in JSA BlueCat Networks Adonis. However, you can manually create a log source for JSA
to receive syslog events. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select BlueCat Networks Adonis.
Step 9 Using the Protocol Configuration list box, select Syslog.
Configuring DSMs
95
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your BlueCat Networks Adonis
appliance.
Configuring DSMs
22 BLUE COAT SG
The Blue Coat SG DSM for Juniper Secure Analytics (JSA) allows you to integrate
events from a Blue Coat SG appliance with JSA.
JSA records all relevant and available information from name-value events that are
separated by pipe (|) characters.
JSA can receive events from your Blue Coat SG appliance using syslog or can
retrieve events from the Blue Coat SG appliance using the Log File protocol. The
instructions provided describe how to configure Blue Coat SG using a custom
name-value pair format. However, JSA supports the following formats:
• Custom Format
• SQUID
• NCSA
• main
• IM
• Streaming
• smartreporter
• bcereportermain_v1
• bcreporterssl_v1
• p2p
• SSL
• bcreportercifs_v1
• CIFS
• MAPI
For more information about your Blue Coat SG Appliance, see your vendor
documentation.
Configuring DSMs
98 BLUE COAT SG
Creating a Custom The Blue Coat SG DSM for JSA accepts custom formatted events from a Blue
Event Format Coat SG appliance.
Procedure
Step 1 Using a web browser, log in to the Blue Coat Management console.
Step 2 Select Configuration > Access Logging > Formats.
Step 3 Select New.
Step 4 Type a format name for the custom format.
Step 5 Select Custom format string.
Step 6 Type the following custom format for JSA:
Bluecoat|src=$(c-ip)|srcport=$(c-port)|dst=$(cs-uri-address)|ds
tport=$(cs-uri-port)|username=$(cs-username)|devicetime=$(gmtti
me)|s-action=$(s-action)|sc-status=$(sc-status)|cs-method=$(cs-
method)|time-taken=$(time-taken)|sc-bytes=$(sc-bytes)|cs-bytes=
$(cs-bytes)|cs-uri-scheme=$(cs-uri-scheme)|cs-host=$(cs-host)|c
s-uri-path=$(cs-uri-path)|cs-uri-query=$(cs-uri-query)|cs-uri-e
xtension=$(cs-uri-extension)|cs-auth-group=$(cs-auth-group)|rs(
Content-Type)=$(rs(Content-Type))|cs(User-Agent)=$(cs(User-Agen
t))|cs(Referer)=$(cs(Referer))|sc-filter-result=$(sc-filter-res
ult)|filter-category=$(sc-filter-category)|cs-uri=$(cs-uri)
Step 7 Select Log Last Header from the list box.
Step 8 Click OK.
Step 9 Click Apply.
NOTE
Note: The custom format for JSA supports additional key-value pairs using the
Blue Coat ELFF format. For more information, see Creating Additional Custom
Format Key-Value Pairs.
You are ready to enable access logging on your Blue Coat device.
Creating a Log To use the custom log format created for JSA, you must associate the custom log
Facility format for JSA to a facility.
Procedure
Step 1 Select Configuration > Access Logging > Logs.
Step 2 Click New.
Step 3 Configure the following parameters:
• Log Name - Type a name for the log facility.
• Log Format - Select the custom format you created in Creating a Custom
Event Format,Step 4.
• Description - Type a description for the log facility.
Configuring DSMs
Retrieving Blue Coat Events 99
Enabling Access You must enable access logging on your Blue Coat SG device.
Logging
Procedure
Step 1 Select Configuration > Access Logging > General.
Step 2 Select the Enable Access Logging check box.
If the Enable Access Logging check box is not selected, logging is disabled
globally for all of the formats listed.
Step 3 Click Apply.
You are ready to configure the Blue Coat upload client. For more information, see
Retrieving Blue Coat Events.
Retrieving Blue Events from your Blue Coat SG appliance are forwarded using the Blue Coat
Coat Events upload client.
Log File Protocol To use FTP, you must configure the Blue Coat upload client.
Configuration
Procedure
Step 1 Select Configuration > Access Logging > Logs > Upload Client.
Step 2 From the Log list box, select the log containing your custom format.
Step 3 From the Client type list box, select FTP Client.
Step 4 Select the text file option.
If you select the gzip file option on your Blue Coat appliance, you must configure a
Processor for your log source with the GZIP option.
Step 5 Click Settings.
Step 6 From the Settings For list box, select Primary FTP Server.
Step 7 Configure the following values:
a Host - Type the IP address of the FTP server receiving the Blue Coat events.
b Port - Type the FTP port number.
c Path - Type a directory path for the log files.
d Username - Type the username required to access the FTP server.
Configuring DSMs
100 BLUE COAT SG
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 From the Log Source Type list box, select the Bluecoat SG Appliance option.
Step 8 From the Protocol Configuration list box, select the Log File option.
Step 9 Configure the following values:
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names are recommended as
they allow JSA to identify a log file to a unique event source.
Service Type From the list box, select the protocol you want to use when
retrieving log files from a remote server. The default is SFTP.
• SFTP - SSH File Transfer Protocol
• FTP - File Transfer Protocol
• SCP - Secure Copy
Note: The underlying protocol used to retrieve log files for the
SCP and SFTP service type requires that the server specified
in the Remote IP or Hostname field has the SFTP subsystem
enabled.
Remote IP or Type the IP address or host name of the device storing your
Hostname event log files.
Configuring DSMs
Retrieving Blue Coat Events 101
Parameter Description
Remote Port Type the TCP port on the remote host that is running the
selected Service Type. The valid range is 1 to 65535.
The options include:
• FTP - TCP Port 21
• SFTP - TCP Port 22
• SCP - TCP Port 22
Note: If the host for your event files is using a non-standard
port number for FTP, SFTP, or SCP, you must adjust the port
value accordingly.
Remote User Type the user name necessary to log in to the host containing
your event files.
The username can be up to 255 characters in length.
Remote Password Type the password necessary to log in to the host.
Confirm Password Confirm the password necessary to log in to the host.
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file. When
you provide an SSH Key File, the Remote Password field is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
The FTP file pattern you specify must match the name you
assigned to your event files. For example, to collect files
ending with .log, type the following:
.*\.log
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
Configuring DSMs
102 BLUE COAT SG
Parameter Description
FTP Transfer Mode This option only appears if you select FTP as the Service
Type. The FTP Transfer Mode parameter allows you to define
the file transfer mode when retrieving log files over FTP.
From the list box, select the transfer mode you want to apply
to this log source:
• Binary - Select Binary for log sources that require binary
data files or compressed zip, gzip, tar, or tar+gzip archive
files.
• ASCII - Select ASCII for log sources that require an ASCII
FTP file transfer.
You must select NONE for the Processor parameter and
LINEBYLINE the Event Generator parameter when using
ASCII as the FTP Transfer Mode.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. For
example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files. Type the start time, based on a 24 hour
clock, in the following format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the remote directory to be
scanned every 2 hours from the start time. The default is 1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the Run On Save completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor If the files located on the remote host are stored in a zip, gzip,
tar, or tar+gzip archive format, select the processor that
allows the archives to be expanded and contents processed.
Configuring DSMs
Retrieving Blue Coat Events 103
Parameter Description
Ignore Previously Select this check box to track and ignore files that have
Processed File(s) already been processed by the log file protocol.
JSA examines the log files in the remote directory to
determine if a file has been previously processed by the log
file protocol. If a previously processed file is detected, the log
file protocol does not download the file for processing. All files
that have not been previously processed are downloaded.
This option only applies to FTP and SFTP Service Types.
Change Local Select this check box to define a local directory on your JSA
Directory? system for storing downloaded files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory to
use for storing files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
Syslog Configuration To allow syslog event collection, you must configure your Blue Coat appliance to
forward syslog events.
CAUTION
CAUTION: If your Blue Coat SG appliance is reporting events using syslog (rather
than a file transfer protocol) and the destination syslog server becomes
unavailable, it is possible that other syslog destinations can stop receiving data
until all syslog destinations are again available. This creates the potential for some
syslog data to not be sent at all. If you are sending to multiple syslog destinations,
a disruption in availability in one syslog destination might interrupt the stream of
events to other syslog destinations from your Blue Coat SG appliance.
Procedure
Step 1 Select Configuration > Access Logging > Logs > Upload Client.
Step 2 From the Log list box, select the log containing your custom format.
Step 3 From the Client type drop-down list bow, select Custom Client.
Step 4 Click Settings.
Configuring DSMs
104 BLUE COAT SG
Step 5 From the Settings For list box, select Primary Custom Server.
Step 6 Configure the following values:
a Host - Type the IP address for your JSA.
b Port - Type 514 as the syslog port for JSA.
Step 7 Click OK.
Step 8 Select the Upload Schedule tab.
Step 9 From the Upload the access log, select continuously.
Step 10 Click Apply.
You are now ready to configure a log source for Blue Coat SG events.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Blue Coat SG Appliance.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Blue Coat SG appliance.
Configuring DSMs
Creating Additional Custom Format Key-Value Pairs 105
Creating Additional The custom format allows you to forward specific Blue Coat data or events to JSA
Custom Format using the Extended Log File Format (ELFF).
Key-Value Pairs
The custom format is a series of pipe delimited fields starting with Bluecoat| and
containing $(Blue Coat ELFF Parameter). Custom format fields for JSA must
be separated by the pipe character.
For example:
Bluecoat|src=$(c-ip)|srcport=$(c-port)|dst=$(cs-uri-address)|ds
tport=$(cs-uri-port)|username=$(cs-username)|devicetime=$(gmtti
me)|s-action=$(s-action)|sc-status=$(sc-status)|cs-method=$(cs-
method)
Table 22-3 JSA Custom Format Examples
For more information on the available Blue Coat ELFF parameters, see your Blue
Coat appliance documentation.
Configuring DSMs
23 BRIDGEWATER
The Bridgewater Systems DSM for Juniper Secure Analytics (JSA) accepts events
using syslog.
Supported Event JSA records all relevant events forwarded from Bridgewater AAA Service
Types Controller devices using syslog.
Configuring Syslog You must configure your Bridgewater Systems appliance to send syslog events to
for Your Bridgewater JSA.
Systems Device
Procedure
Step 1 Log in to your Bridgewater Systems device command-line interface (CLI).
Step 2 To log operational messages to the RADIUS and Diameter servers, open the
following file:
/etc/syslog.conf
Step 3 To log all operational messages, uncomment the following line:
local1.info /WideSpan/logs/oplog
Step 4 To log error messages only, change the local1.info /WideSpan/logs/oplog
line to the following:
local1.err /WideSpan/logs/oplog
NOTE
Note: RADIUS and Diameter system messages are stored in the
/var/adm/messages file.
Configuring DSMs
108 BRIDGEWATER
Configuring a Log JSA automatically discovers and creates a log source for syslog events from a
Source Bridgewater Systems appliance. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Bridgewater Systems AAA Service
Controller.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Bridgewater Systems
appliance.
Configuring DSMs
24 BROCADE FABRIC OS
Juniper Secure Analytics (JSA) can collect and categorize syslog system and audit
events from Brocade switches and appliances that use Fabric OS V7.x.
To collect syslog events, you must configure your switch to forward syslog events.
Each switch or appliance must be configured to forward events.
Events that you forward from Brocade switches are automatically discovered. A
log source is configured for each switch or appliance that forwards events to JSA.
Brocade switches or appliance that run Fabric OS V7.x.
Configuring Syslog To collect events, you must configure syslog on your Brocade appliance to forward
for Brocade Fabric events to JSA.
OS Appliances
Procedure
To configure syslog for Brocade Fabric OS appliances:
Step 1 Log in to your appliance as an admin user.
Step 2 To configure an address to forward syslog events, type the following command:
syslogdipadd <IP address>
Where <IP address> is the IP address of the JSA console, Event Processor,
Event Collector, or all-in-one system.
Step 3 To verify the address, type the following command:
syslogdipshow
Result
As events are generated by the Brocade switch, they are forwarded to the syslog
destination you specified. The log source is automatically discovered after enough
events are forwarded by the Brocade appliance. It typically takes a minimum of 25
events to automatically discover a log source.
What to do next
Administrators can log in to the JSA console and verify that the log source is
created on the console and that the Log Activity tab displays events from the
Brocade appliance.
Configuring DSMs
25 CA TECHNOLOGIES
CA ACF2 Juniper Secure Analytics (JSA) includes two options for integrating CA Access
Control Facility (ACF2) events:
• Integrate CA ACF2 with JSA Using IBM Security zSecure
• Integrate CA ACF2 with JSA Using Audit Scripts
Integrate CA ACF2 The CA ACF2 DSM allows you to integrate LEEF events from an ACF2 image on
with JSA Using IBM an IBM z/OS mainframe using IBM Security zSecure.
Security zSecure
Using a zSecure process, events from the System Management Facilities (SMF)
are recorded to an event file in the Log Enhanced Event format (LEEF). JSA
retrieves the LEEF event log files using the log file protocol and processes the
events. You can schedule JSA to retrieve events on a polling interval, which allows
JSA to retrieve the events on the schedule you have defined.
Configuring DSMs
112 CA TECHNOLOGIES
Log files are transferred, one at a time, to JSA for processing. The log file protocol
can manage plain text event logs, compressed files, or archives. Archives must
contain plain-text files that can be processed one line at a time. Multi-line event
logs are not supported by the log file protocol. IBM z/OS with zSecure writes log
files to a specified directory as gzip archives. JSA extracts the archive and
processes the events, which are written as one event per line in the file.
To retrieve these events, you must create a log source using the Log File protocol.
JSA requires credentials to log in to the system hosting your LEEF formatted event
files and a polling interval.
Configuring DSMs
CA ACF2 113
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names are recommended as
they allow JSA to identify a log file to a unique event source.
Configuring DSMs
114 CA TECHNOLOGIES
Parameter Description
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
IBM z/OS mainframe using IBM Security zSecure Audit writes
event files using the pattern ACF2.<timestamp>.gz
The FTP file pattern you specify must match the name you
assigned to your event files. For example, to collect files
starting with ACF2 and ending with .gz, type the following:
ACF2.*\.gz
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only displays if you select FTP as the Service
Type. From the list box, select Binary.
The binary transfer mode is required for event files stored in a
binary or compressed format, such as zip, gzip, tar, or
tar+gzip archive files.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. For
example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files. Type the start time, based on a 24 hour
clock, in the following format: HH:MM.
Configuring DSMs
CA ACF2 115
Parameter Description
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the remote directory to be
scanned every 2 hours from the start time. The default is 1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the Run On Save completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor From the list box, select gzip.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded to JSA. JSA can process files in zip,
gzip, tar, or tar+gzip archive format.
Ignore Previously Select this check box to track and ignore files that have
Processed File(s) already been processed by the log file protocol.
JSA examines the log files in the remote directory to
determine if a file has been previously processed by the log
file protocol. If a previously processed file is detected, the log
file protocol does not download the file for processing. All files
that have not been previously processed are downloaded.
This option only applies to FTP and SFTP Service Types.
Change Local Select this check box to define a local directory on your JSA
Directory? for storing downloaded files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory to
use for storing files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
Configuring DSMs
116 CA TECHNOLOGIES
Integrate CA ACF2 The CA Access Control Facility (ACF2) DSM allows you to use an IBM mainframe
with JSA Using Audit to collect events and audit transactions with the log file protocol.
Scripts
Configuration overview
QexACF2.load.trs is a TERSED file containing a PDS loadlib with the QEXACF2
program. A tersed file is similar to a zip file and requires you to use the TRSMAIN
program to uncompress the contents. The TRSMAIN program is available from
www.juniper.net/customers/support/.
To upload a TRS file from a workstation, you must pre-allocate a file with the
following DCB attributes: DSORG=PS, RECFM=FB, LRECL= 1024,
BLKSIZE=6144. The file transfer type must be BINARY APPEND. If the transfer
type is TEXT or TEXT APPEND, then the file cannot properly uncompress.
After you upload the file to the mainframe into the preallocated dataset the tersed
file can be UNPACKED using the TRSMAIN utility using the sample JCL also
included in the tar package. A return code of 0008 from the TRSMAIN utility
indicates the dataset is not recognized as a valid TERSED file. This error might be
the result of the file not being uploaded to a file with the correct DCB attributes or
due to the fact that the transfer was not performed using the BINARY APPEND
transfer mechanism.
After you have successfully UNPACKED the loadlib file, you can run the QEXACF2
program with the sample JCL file. The sample JCL file is contained in the tar
collection. To run the QEXACF2 program, you must modify the JCL to your local
naming conventions and JOB card requirements. You might also need to use the
STEPLIB DD if the program is not placed in a LINKLISTED library.
Configuring DSMs
CA ACF2 117
Procedure
Step 1 From the Juniper Networks support website
(http://www.juniper.net/customers/support/), download the following compressed
file:
qexacf2_bundled.tar.gz
Step 2 On a Linux-based operating system, extract the file:
tar -zxvf qexacf2_bundled.tar.gz
The following files are contained in the archive:
QexACF2.JCL.txt - Job Control Language file
QexACF2.load.trs - Compressed program library (requires IBM TRSMAIN)
trsmain sample JCL.txt - Job Control Language for TRSMAIN to decompress the
.trs file
Step 3 Load the files onto the IBM mainframe using the following methods:
a Upload the sample QexACF2_trsmain_JCL.txt and QexACF2.JCL.txt files
using the TEXT protocol.
b Upload the QexACF2.load.trs file using a BINARY mode transfer and
append to a pre-allocated data set. The QexACF2.load.trs file is a tersed file
containing the executable (the mainframe program QexACF2). When you
upload the .trs file from a workstation, pre-allocate a file on the mainframe with
the following DCB attributes: DSORG=PS, RECFM=FB, LRECL=1024,
BLKSIZE=6144. The file transfer type must be binary mode and not text.
NOTE
Note: QexACF2 is a small C mainframe program that reads the output of the
TSSUTIL (EARLOUT data) line by line. QexACF2 adds a header to each record
containing event information, for example, record descriptor, the date, and time.
The program places each field into the output record, suppresses trailing blank
characters, and delimits each field with the pipe character. This output file is
formatted for JSA and the blank suppression reduces network traffic to JSA. This
program does not consume CPU or I/O disk resources.
Configuring DSMs
118 CA TECHNOLOGIES
// SPACE=(CYL,(10,10))
//TRSMAIN EXEC PGM=TRSMAIN,PARM='UNPACK'
//SYSPRINT DD SYSOUT=*,DCB=(LRECL=133,BLKSIZE=12901,RECFM=FBA)
//INFILE DD DISP=SHR,DSN=<yourhlq>.QEXACF2.LOAD.TRS
//OUTFILE DD DISP=(NEW,CATLG,DELETE),
// DSN=<yourhlq>.LOAD,
// SPACE=(CYL,(10,10,5),RLSE),UNIT=SYSDA
//
The .trs input file is an IBM TERSE formatted library and is extracted by running
the JCL, which calls the TRSMAIN. This tersed file, when extracted, creates a PDS
linklib with the QexACF2 program as a member.
Step 5 You can STEPLIB to this library or choose to move the program to one of the
LINKLIBs that are in LINKLST. The program does not require authorization.
Step 6 After uploading, copy the program to an existing link listed library or add a
STEPLIB DD statement with the correct dataset name of the library that will
contain the program.
Step 7 The QexACF2_jcl.txt file is a text file containing a sample JCL. You must
configure the job card to meet your configuration.
The QexACF2_jcl.txt sample file includes:
//QEXACF2 JOB (T,JXPO,JKSD0093),DEV,NOTIFY=Q1JACK,
// MSGCLASS=P,
// REGION=0M
//*
//*QEXACF2 JCL VERSION 1.0 OCTOBER, 2010
//*
//************************************************************
//* Change below dataset names to sites specific datasets names*
//************************************************************
//SET1 SET SMFIN='MVS1.SMF.RECORDS(0)',
// QEXOUT='Q1JACK.QEXACF2.OUTPUT',
// SMFOUT='Q1JACK.ACF2.DATA'
//************************************************************
//* Delete old datasets *
//************************************************************
//DEL EXEC PGM=IEFBR14
//DD1 DD DISP=(MOD,DELETE),DSN=&SMFOUT,
// UNIT=SYSDA,
// SPACE=(CYL,(10,10)),
// DCB=(RECFM=FB,LRECL=80)
//DD2 DD DISP=(MOD,DELETE),DSN=&QEXOUT,
// UNIT=SYSDA,
// SPACE=(CYL,(10,10)),
// DCB=(RECFM=FB,LRECL=80)
//*************************************************************
//* Allocate new dataset *
//*************************************************************
//ALLOC EXEC PGM=IEFBR14
Configuring DSMs
CA ACF2 119
//DD1 DD DISP=(NEW,CATLG),DSN=&QEXOUT,
// SPACE=(CYL,(100,100)),
// DCB=(RECFM=VB,LRECL=1028,BLKSIZE=6144)
//*************************************************************
//* Execute ACFRPTPP (Report Preprocessor GRO) to extract ACF2*
//* SMF records *
//*************************************************************
//PRESCAN EXEC PGM=ACFRPTPP
//SYSPRINT DD SYSOUT=*
//SYSUDUMP DD SYSOUT=*
//RECMAN1 DD DISP=SHR,DSN=&SMFIN
//SMFFLT DD DSN=&SMFOUT,SPACE=(CYL,(100,100)),DISP=(,CATLG),
// DCB=(RECFM=FB,LRECL=8192,BLKSIZE=40960),
// UNIT=SYSALLDA
//************************************************************
//* execute QEXACF2 *
//************************************************************
//EXTRACT EXEC PGM=QEXACF2,DYNAMNBR=10,
// TIME=1440
//STEPLIB DD DISP=SHR,DSN=Q1JACK.C.LOAD
//SYSTSIN DD DUMMY
//SYSTSPRT DD SYSOUT=*
//SYSPRINT DD SYSOUT=*
//CFG DD DUMMY
//ACFIN DD DISP=SHR,DSN=&SMFOUT
//ACFOUT DD DISP=SHR,DSN=&QEXOUT
//************************************************************
//FTP EXEC PGM=FTP,REGION=3800K
//INPUT DD *
<IPADDR>
<USER>
<PASSWORD>
PUT '<ACFOUT>' EARL_<THEIPOFTHEMAINFRAMEDEVICE>/<ACFOUT>
QUIT
//OUTPUT DD SYSOUT=*
//SYSPRINT DD SYSOUT=*
//*
Step 8 After the output file is created, you must choose one of the following options:
a Schedule a job to a transfer the output file to an interim FTP server.
Each time the job completes, the output file is forwarded to an interim FTP
server. You must configure the following parameters in the sample JCL to
successfully forward the output to an interim FTP server:
For example:
//FTP EXEC PGM=FTP,REGION=3800K
//INPUT DD *
<IPADDR>
<USER>
Configuring DSMs
120 CA TECHNOLOGIES
<PASSWORD>
PUT '<ACFOUT>' EARL_<THEIPOFTHEMAINFRAMEDEVICE>/<ACFOUT>
QUIT
//OUTPUT DD SYSOUT=*
//SYSPRINT DD SYSOUT=*
Where:
<IPADDR> is the IP address or host name of the interim FTP server to receive
the output file.
<USER> is the user name required to access the interim FTP server.
<PASSWORD> is the password required to access the interim FTP server.
<THEIPOFTHEMAINFRAMEDEVICE> is the destination of the mainframe or
interim FTP server receiving the output.
For example:
PUT 'Q1JACK.QEXACF2.OUTPUT.C320' /192.168.1.101/ACF2/QEXACF2.
OUTPUT.C320
<QEXOUTDSN> is the name of the output file saved to the interim FTP server.
You are now ready to create a log source in JSA. For more information, see
Create a log source.
b Schedule JSA to retrieve the output file from CA ACF2.
If the zOS platform is configured to serve files through FTP, SFTP, or allow SCP,
then no interim FTP server is required and JSA can pull the output file directly
from the mainframe. The following text must be commented out using //* or
deleted from the QexACF2_jcl.txt file:
//FTP EXEC PGM=FTP,REGION=3800K
//INPUT DD *
<IPADDR>
<USER>
<PASSWORD>
PUT '<ACFOUT>' EARL_<THEIPOFTHEMAINFRAMEDEVICE>/<ACFOUT>
QUIT
//OUTPUT DD SYSOUT=*
//SYSPRINT DD SYSOUT=*
You are now ready to configure the a log source in JSA.
The CA ACF2 DSM supports the bulk loading of log files using the log file protocol
source. When configuring your CA ACF2 DSM to use the log file protocol, make
sure the hostname or IP address configured in the CA ACF2 is the same as
configured in the Remote Host parameter in the Log File protocol configuration.
Configuring DSMs
CA ACF2 121
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names are recommended as
they allow JSA to identify a log file to a unique event source.
Configuring DSMs
122 CA TECHNOLOGIES
Parameter Description
Remote Port Type the TCP port on the remote host that is running the
selected Service Type. The valid range is 1 to 65535.
The options include:
• FTP - TCP Port 21
• SFTP - TCP Port 22
• SCP - TCP Port 22
Note: If the host for your event files is using a non-standard
port number for FTP, SFTP, or SCP, you must adjust the port
value accordingly.
Remote User Type the user name necessary to log in to the host containing
your event files.
The username can be up to 255 characters in length.
Remote Password Type the password necessary to log in to the host.
Confirm Password Confirm the password necessary to log in to the host.
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file. When
you provide an SSH Key File, the Remote Password field is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
Configuring DSMs
CA ACF2 123
Parameter Description
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
IBM z/OS mainframe using IBM Security zSecure Audit writes
event files using the pattern zOS.<timestamp>.gz
The FTP file pattern you specify must match the name you
assigned to your event files. For example, to collect files
starting with zOS and ending with .gz, type the following:
ACF2.*\.gz
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only displays if you select FTP as the Service
Type. From the list box, select Binary.
The binary transfer mode is required for event files stored in a
binary or compressed format, such as zip, gzip, tar, or
tar+gzip archive files.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. For
example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files. Type the start time, based on a 24 hour
clock, in the following format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the remote directory to be
scanned every 2 hours from the start time. The default is 1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the Run On Save completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Configuring DSMs
124 CA TECHNOLOGIES
Parameter Description
Processor From the list box, select gzip.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded to JSA. JSA can process files in zip,
gzip, tar, or tar+gzip archive format.
Ignore Previously Select this check box to track and ignore files that have
Processed File(s) already been processed by the log file protocol.
JSA examines the log files in the remote directory to
determine if a file has been previously processed by the log
file protocol. If a previously processed file is detected, the log
file protocol does not download the file for processing. All files
that have not been previously processed are downloaded.
This option only applies to FTP and SFTP Service Types.
Change Local Select this check box to define a local directory on your JSA
Directory? for storing downloaded files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory to
use for storing files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
CA SiteMinder The CA SiteMinder DSM collects and categorizes authorization events from CA
SiteMinder appliances using syslog-ng.
Supported Event The CA SiteMinder DSM accepts access and authorization events logged in
Types smaccess.log and forwards the events to JSA using syslog-ng.
Configure a Log CA SiteMinder with JSA does not automatically discover authorization events
Source forwarded using syslog-ng from CA SiteMinder appliances.
Configuring DSMs
CA SiteMinder 125
NOTE
Note: The Log File protocol is displayed in the Protocol Configuration list box,
however, polling for log files is not a recommended configuration method.
Parameter Description
Log Source Identifier Type the IP address or hostname for your CA SiteMinder
appliance.
Enabled Select this check box to enable the log source. By default,
this check box is selected.
Credibility From the list box, select the credibility of the log source. The
range is 0 to 10.
The credibility indicates the integrity of an event or offense as
determined by the credibility rating from the source device.
Credibility increases if multiple sources report the same
event. The default is 5.
Target Event Collector From the list box, select the Event Collector to use as the
target for the log source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
Automatically discovered log sources use the default value
configured in the Coalescing Events list box in the System
Settings window, which is accessible on the Admin tab.
However, when you create a new log source or update the
configuration for an automatically discovered log source you
can override the default value by configuring this check box
for each log source. For more information on Settings, see
the Juniper Secure Analytics Administration Guide.
Configuring DSMs
126 CA TECHNOLOGIES
Parameter Description
Store Event Payload Select this check box to enable or disable JSA from storing
the event payload.
Automatically discovered log sources use the default value
from the Store Event Payload list box in the System
Settings window, which is accessible on the Admin tab.
However, when you create a new log source or update the
configuration for an automatically discovered log source you
can override the default value by configuring this check box
for each log source. For more information on Settings, see
the Juniper Secure Analytics Administration Guide.
Configure Syslog-ng You must configure your CA SiteMinder appliance to forward syslog-ng events to
for CA SiteMinder your JSA console or Event Collector.
JSA can collect syslog-ng events from TCP or UDP syslog sources on port 514.
Configuring DSMs
CA Top Secret 127
CA Top Secret JSA includes two options for integrating CA Top Secret events:
• Integrate CA Top Secret with JSA using IBM Security zSecure
• Integrate CA Top Secret with JSA Using Audit Scripts
Integrate CA Top The CA Top Secret DSM allows you to integrate LEEF events from a Top Secret
Secret with JSA image on an IBM z/OS mainframe using IBM Security zSecure.
using IBM Security
zSecure Using a zSecure process, events from the System Management Facilities (SMF)
are recorded to an event file in the Log Enhanced Event format (LEEF). JSA
retrieves the LEEF event log files using the log file protocol and processes the
events. You can schedule JSA to retrieve events on a polling interval, which allows
JSA to retrieve the events on the schedule you have defined.
Configuring DSMs
128 CA TECHNOLOGIES
Log files are transferred, one at a time, to JSA for processing. The log file protocol
can manage plain text event logs, compressed files, or archives. Archives must
contain plain-text files that can be processed one line at a time. Multi-line event
logs are not supported by the log file protocol. IBM z/OS with zSecure writes log
files to a specified directory as gzip archives. JSA extracts the archive and
processes the events, which are written as one event per line in the file.
To retrieve these events, you must create a log source using the Log File protocol.
JSA requires credentials to log in to the system hosting your LEEF formatted event
files and a polling interval.
Configuring DSMs
CA Top Secret 129
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names are recommended as
they allow JSA to identify a log file to a unique event source.
Configuring DSMs
130 CA TECHNOLOGIES
Parameter Description
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
IBM z/OS mainframe using IBM Security zSecure Audit writes
event files using the pattern TSS.<timestamp>.gz
The FTP file pattern you specify must match the name you
assigned to your event files. For example, to collect files
starting with TSS and ending with .gz, type the following:
TSS.*\.gz
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only displays if you select FTP as the Service
Type. From the list box, select Binary.
The binary transfer mode is required for event files stored in a
binary or compressed format, such as zip, gzip, tar, or
tar+gzip archive files.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. For
example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files. Type the start time, based on a 24 hour
clock, in the following format: HH:MM.
Configuring DSMs
CA Top Secret 131
Parameter Description
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the remote directory to be
scanned every 2 hours from the start time. The default is 1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the Run On Save completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor From the list box, select gzip.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded to JSA. JSA can process files in zip,
gzip, tar, or tar+gzip archive format.
Ignore Previously Select this check box to track and ignore files that have
Processed File(s) already been processed by the log file protocol.
JSA examines the log files in the remote directory to
determine if a file has been previously processed by the log
file protocol. If a previously processed file is detected, the log
file protocol does not download the file for processing. All files
that have not been previously processed are downloaded.
This option only applies to FTP and SFTP Service Types.
Change Local Select this check box to define a local directory on your JSA
Directory? for storing downloaded files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory to
use for storing files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
Configuring DSMs
132 CA TECHNOLOGIES
Integrate CA Top The CA Top Secret DSM allows you to integrate with an IBM zOS mainframe to
Secret with JSA collect events and audit transactions.
Using Audit Scripts
JSA records all relevant and available information from the event.
Configuring DSMs
CA Top Secret 133
NOTE
Note: Qextops is a small C mainframe program that reads the output of the
TSSUTIL (EARLOUT data) line by line. Qextops adds a header to each record
containing event information, for example, record descriptor, the date, and time.
The program places each field into the output record, suppresses trailing blank
characters, and delimits each field with the pipe character. This output file is
formatted for JSA and the blank suppression reduces network traffic to JSA. This
program does not consume CPU or I/O disk resources.
Configuring DSMs
134 CA TECHNOLOGIES
Configuring DSMs
CA Top Secret 135
//CFG DD DUMMY
//EARLIN DD DISP=SHR,DSN=&TSSOUT
//EARLOUT DD DISP=SHR,DSN=&EARLOUT
//************************************************************
//FTP EXEC PGM=FTP,REGION=3800K
//INPUT DD *
<IPADDR>
<USER>
<PASSWORD>
PUT '<EARLOUT>' EARL_<THEIPOFTHEMAINFRAMEDEVICE>/<EARLOUT>
QUIT
//OUTPUT DD SYSOUT=*
//SYSPRINT DD SYSOUT=*
Step 8 After the output file is created, you must choose one of the following options:
a Schedule a job to a transfer the output file to an interim FTP server.
Each time the job completes, the output file is forwarded to an intermin FTP
server. You must configure the following parameters in the sample JCL to
successfully forward the output to an interim FTP server:
For example:
//FTP EXEC PGM=FTP,REGION=3800K
//INPUT DD *
<IPADDR>
<USER>
<PASSWORD>
PUT '<EARLOUT>' EARL_<THEIPOFTHEMAINFRAMEDEVICE>/<EARLOUT>
QUIT
//OUTPUT DD SYSOUT=*
//SYSPRINT DD SYSOUT=*
Where:
<IPADDR> is the IP address or host name of the interim FTP server to receive
the output file.
<USER> is the user name required to access the interim FTP server.
<PASSWORD> is the password required to access the interim FTP server.
<THEIPOFTHEMAINFRAMEDEVICE> is the destination of the mainframe or
interim FTP server receiving the output.
For example:
PUT 'Q1JACK.QEXTOPS.OUTPUT.C320' /192.168.1.101/CA/QEXTOPS.OU
TPUT.C320
<QEXOUTDSN> is the name of the output file saved to the interim FTP server.
You are now ready to configure the Log File protocol. See Create a log source.
b Schedule JSA to retrieve the output file from CA Top Secret.
If the zOS platform is configured to serve files through FTP, SFTP, or allow SCP,
then no interim FTP server is required and JSA can pull the output file directly
Configuring DSMs
136 CA TECHNOLOGIES
from the mainframe. The following text must be commented out using //* or
deleted from the qextops_jcl.txt file:
//FTP EXEC PGM=FTP,REGION=3800K
//INPUT DD *
<IPADDR>
<USER>
<PASSWORD>
PUT '<EARLOUT>' EARL_<THEIPOFTHEMAINFRAMEDEVICE>/<EARLOUT>
QUIT
//OUTPUT DD SYSOUT=*
//SYSPRINT DD SYSOUT=*
You are now ready to configure the Log File protocol. See Create a log source.
When configuring your CA Top Secret DSM to use the log file protocol, make sure
the hostname or IP address configured in the CA Top Secret is the same as
configured in the Remote Host parameter in the Log File Protocol configuration.
Configuring DSMs
CA Top Secret 137
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names are recommended as
they allow JSA to identify a log file to a unique event source.
Configuring DSMs
138 CA TECHNOLOGIES
Parameter Description
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
The FTP file pattern you specify must match the name you
assigned to your event files.
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only displays if you select FTP as the Service
Type. From the list box, select Binary.
The binary transfer mode is required for event files stored in a
binary or compressed format, such as zip, gzip, tar, or
tar+gzip archive files.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. For
example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files. Type the start time, based on a 24 hour
clock, in the following format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the remote directory to be
scanned every 2 hours from the start time. The default is 1H.
Configuring DSMs
CA Top Secret 139
Parameter Description
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the Run On Save completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor From the list box, select gzip.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded to JSA. JSA can process files in zip,
gzip, tar, or tar+gzip archive format.
Ignore Previously Select this check box to track and ignore files that have
Processed File(s) already been processed by the log file protocol.
JSA examines the log files in the remote directory to
determine if a file has been previously processed by the log
file protocol. If a previously processed file is detected, the log
file protocol does not download the file for processing. All files
that have not been previously processed are downloaded.
This option only applies to FTP and SFTP Service Types.
Change Local Select this check box to define a local directory on your JSA
Directory? for storing downloaded files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory to
use for storing files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
Configuring DSMs
140 CA TECHNOLOGIES
Configuring DSMs
26 CHECK POINT
Check Point You can configure Juniper Secure Analytics (JSA) to integrate with a Check Point
FireWall-1 FireWall-1 device using one of the following methods:
• Integrating Check Point FireWall-1 Using Syslog
• Integrating Check Point FireWall-1 Using OPSEC
NOTE
Note: Depending on your Operating System, the procedures for the Check Point
FireWall-1 device might vary. The following procedures are based on the Check
Point SecurePlatform Operating system.
Integrating Check This section describes how to ensure that the JSA Check Point FireWall-1 DSMs
Point FireWall-1 accepts FireWall-1 events using syslog.
Using Syslog
Configuring Syslog for Check Point FireWall-1
Before you configure JSA to integrate with a Check Point FireWall-1 device:
NOTE
Note: If Check Point SmartCenter is installed on Microsoft Windows, you must
integrate Check Point with JSA using OPSEC. For more information, see
Integrating Check Point FireWall-1 Using OPSEC.
Step 1 Type the following command to access the Check Point console as an expert user:
expert
A password prompt is displayed.
Step 2 Type your expert console password. Press the Enter key.
Step 3 Open the following file:
/etc/rc.d/rc3.d/S99local
Configuring DSMs
142 CHECK POINT
Configuring DSMs
Check Point FireWall-1 143
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Check Point FireWall-1
appliance.
Integrating Check This section describes how to ensure that JSA accepts Check Point FireWall-1
Point FireWall-1 events using Open Platform for Security (OPSEC/LEA).
Using OPSEC
To integrate Check Point OPSEC/LEA with JSA, you must create two Secure
Internal Communication (SIC) files and enter the information in to JSA as a Check
Point Firewall-1 log source.
Configuring DSMs
144 CHECK POINT
To integrate Check Point Firewall-1 with JSA, you must complete the following
procedures in sequence:
1 Add JSA as a host for Check Point FireWall-1.
2 Add an OPSEC application to Check Point Firewall-1.
3 Locate the Log Source Secure Internal Communications DN.
4 In JSA, configure the OPSEC LEA protocol.
5 Verify the OPSEC/LEA communications configuration.
Configuring DSMs
Check Point FireWall-1 145
NOTE
Note: The activation key is a password used to generate the SIC DN. When you
configure your Check Point log source in JSA, the activation key is typed into the
Pull Certificate Password parameter.
f Click Initialize.
The window updates the Trust state from Uninitialized to Initilialized
but trust not established.
g Click Close.
The OPSEC Application Properties window is displayed.
h Write down or copy the displayed SIC DN to a text file.
NOTE
Note: The displayed SIC value is required for the OPSEC Application Object SIC
Attribute parameter when you configure the Check Point log source in JSA. The
OPSEC Application Object SIC resembles the following example:
CN=JSA-OPSEC,O=cpmodule..tdfaaz.
You are now ready to locate the log source SIC for Check Point Firewall-1.
NOTE
Note: You must know if the Check Point Log Host is a separate object in your
configuration from the Check Point Management Server. In most cases, the Check
Point Log Host is the same object as the Check Point Management Server.
NOTE
Note: Depending on your Check Point version, the Communication button might
not be available to display the SIC attribute. You can locate the SIC attribute from
the Check Point Management Server command-line interface. You must use the
cpca_client lscert command from the command-line interface of the
Management Server to display all certificates. The Log Source SIC Attribute
resembles the following example: cn=cp_mgmt,o=cpmodule…tdfaaz. For more
information, see your Check Point Command Line Interface Guide.
You must now install the Security Policy from the Check Point SmartDashboard
user interface.
Configuring DSMs
146 CHECK POINT
Configuring DSMs
Check Point FireWall-1 147
For more information on the OPSEC/LEA parameters, see the Log Sources Users
Guide.
Step 9 Click Save.
Step 10 On the Admin tab, click Deploy Changes.
You are now ready to verify your OPSEC/LEA communications for Check Point
Firewall-1.
Verifing or Editing This section describes how to modify your Check Point FireWall-1 configuration to
Your OPSEC allow OPSEC communications on non-standard ports, configure communications
Communications in a clear text, un-authenticated stream, and verify the configuration in JSA.
Configuration
Changing your Check Point Custom Log Manager (CLM) IP address
If your Check Point configuration includes a Check Point Custom Log Manager
(CLM), you might eventually need to change the IP address for the CLM, which
impacts any of the automatically discovered Check Point log sources from that
CLM in JSA. This is because when you manually add the log source for the CLM
using the OPSEC/LEA protocol, then all Check Point firewalls that forward logs to
the CLM are automatically discovered by JSA. These automatically discovered log
sources cannot be edited. If the CLM IP address changes, you must edit the
original Check Point CLM log source that contains the OPSEC/LEA protocol
configuration and update the server IP address and log source identifier.
After you update the log source for the new Check Point CLM IP address, then any
new events reported from the automatically discovered Check Point log sources
are updated.
NOTE
Note: Do not delete and recreate your Check Point CLM or automatically
discovered log sources in JSA. Deleting a log source does not delete event data,
but can make finding previously recorded events more difficult to find.
Configuring DSMs
148 CHECK POINT
Configuring DSMs
Check Point Provider-1 149
Step 2 Depending on your Check Point SmartCenter Server operating system, open the
following file:
• Linux - $FWDIR\conf\fwopsec.conf
• Windows - %FWDIR%\conf\fwopsec.conf
Step 3 Change the default lea_server auth_port from 18184 to 0.
Step 4 Change the default lea_server port from 0 to 18184.
Step 5 Remove the hash (#) marks from both lines.
For example:
lea_server auth_port 0
lea_server port 18184
Step 6 Save and close the file.
Step 7 Type the following command to start the firewall services:
cpstart
Step 8 You are now ready to configure the log source in JSA.
To configure JSA to receive events from a Check Point Firewall-1 device:
Step 1 From the Log Source Type list box, select Check Point FireWall-1.
Step 2 From the Protocol Configuration list box, select OPSEC/LEA.
For more information on configuring log sources, see the Log Sources Users
Guide.
For more information on configuring your Check Point Firewall-1, see your vendor
documentation.
Check Point You can configure JSA to integrate with a Check Point Provider-1 device.
Provider-1
All events from Check Point Provider-1 are parsed using the Check Point
FireWall-1 DSM. You can integrate Check Point Provider-1 using one of the
following methods:
NOTE
Note: Depending on your Operating System, the procedures for the Check Point
Provider-1 device can vary. The following procedures are based on the Check
Point SecurePlatform operating system.
Integrating Syslog for This method ensures the Check Point FireWall-1 DSM for JSA accepts Check
Check Point Point Provider-1 events using syslog.
Provider-1
JSA records all relevant Check Point Provider-1 events.
Configuring DSMs
150 CHECK POINT
To manually configure a log source for Check Point Provider-1 syslog events:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
The Data Sources panel is displayed.
Step 4 Click the Log Sources icon.
The Log Sources window is displayed.
Step 5 Click Add.
The Add a log source window is displayed.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Configuring DSMs
Check Point Provider-1 151
Step 8 From the Log Source Type list box, select Check Point Firewall-1.
Step 9 Using the Protocol Configuration list box, select Syslog.
The syslog protocol configuration is displayed.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Check Point Provider-1
appliance.
Configuring OPSEC This method ensures the JSA Check Point FireWall-1 DSM accepts Check Point
for Check Point Provider-1 events using OPSEC.
Provider-1
Reconfigure Check Point Provider-1 SmartCenter
This section describes how to reconfigure the Check Point Provider-1
SmartCenter.
In the Check Point Provider-1 Management Domain GUI (MDG), create a host
object representing the JSA. The leapipe is the connection between the Check
Point Provider-1 and JSA.
Configuring DSMs
152 CHECK POINT
Configuring DSMs
Check Point Provider-1 153
Configuring DSMs
27 CILASOFT QJRN/400
Juniper Secure Analytics (JSA) collects detailed audit events from Cilasoft
QJRN/400 software for IBM i (AS/400, iSeries, System i).
Configuration To collect syslog events, you must configure your Cilasoft QJRN/400 to forward
Overview syslog events to JSA. JSA automatically discovers and creates log sources for
syslog events that are forwarded from Cilasoft QJRN/400. JSA supports syslog
events from Cilasoft QJRN/400 V5.14.K and above.
Configuring a Syslog To collect events, you must configure queries on your Cilasoft QJRN/400 to
in Cilasoft QJRN/400 forward syslog events to JSA.
Procedure
Step 1 To start the Cilasoft Security Suite, type the following command:
IJRN/QJRN
The account that is used to make configuration changes must have ADM privileges
or USR privileges with access to specific queries through an Extended Access
parameter.
Step 2 To configure the output type, select one of the following options:
a To edit several selected queries, type 2EV to access the Execution
Environment and change the Output Type field and type SEM.
b To edit large numbers of queries, type the command CHGQJQRYA and change
the Output Type field and type SEM.
Configuring DSMs
156 CILASOFT QJRN/400
Parameter Description
Format Type *LEEF to configure the syslog output to write events in
Log Extended Event Format (LEEF).
LEEF is a special event format that is designed to for JSA.
Output Type *SYSLOG to forward events with the syslog protocol.
IP Address Type the IP address of your JSA system.
If an IP address for JSA is defined as a special value in the
WRKQJVAL command, you can type *CFG.
Events can be forwarded to either the console, an Event
Collector, an Event Processor, or your JSA all-in-one
appliance.
Port Type 514 or *CFG as the port for syslog events.
By default, *CFG automatically selects port 514.
Tag This field is not used by JSA.
Facility This field is not used by JSA.
Severity Select a value for the event severity.
For more information on severity that is assigned to *QRY
destinations, see command WRKQJFVAL in your Cilasoft
documentation.
Configuring a JSA automatically discovers and creates a log source for syslog events that are
Cilasoft QJRN/400 forwarded from Cilasoft QJRN/400. These configuration steps are optional.
Log Source
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Step 5 In the Log Source Name field, type a name for your log source.
Step 6 From the Log Source Type list box, select Cilasoft QJRN/400.
Step 7 From the Protocol Configuration list box, select Syslog.
Configuring DSMs
157
Parameter Description
Log Source Identifier Type the IP address as an identifier for events from your
Cilasoft QJRN/400 installation.
The log source identifier must be unique value.
Enabled Select this check box to enable the log source.
By default, the check box is selected.
Credibility Select the credibility of the log source. The range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector Select the Event Collector to use as the target for the log
source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Configuring DSMs
28 CISCO
Cisco ACE Firewall You can integrate a Cisco ACE firewall with JSA.
Juniper Secure Analytics (JSA) can accept events forwarded from Cisco ACE
Firewalls using syslog. JSA records all relevant events. Before you configure JSA
to integrate with an ACE firewall, you must configure your Cisco ACE Firewall to
forward all device logs to JSA.
Configuring DSMs
160 CISCO
Configure a Log JSA automatically discovers and creates a log source for syslog events from Cisco
Source ACE Firewalls.
However, you can manually create a log source for JSA to receive syslog events.
The following configuration steps are optional.
Configuring DSMs
Cisco Aironet 161
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Cisco ACE Firewall.
Step 9 Using the Protocol Configuration list box, select Syslog.
The syslog protocol configuration is displayed.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco ACE Firewalls.
Cisco Aironet You can integrate a Cisco Aironet devices with JSA.
A Cisco Aironet DSM accepts Cisco Emblem Format events using syslog. Before
you configure JSA to integrate with a Cisco Aironet device, you must configure
your Cisco Aironet appliance to forward syslog events.
Configuring DSMs
162 CISCO
Configure a Log JSA automatically discovers and creates a log source for syslog events from Cisco
Source Aironet. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco Aironet appliance.
Configuring DSMs
Cisco ACS 163
Cisco ACS The Cisco ACS DSM for JSA accepts syslog ACS events using syslog.
JSA records all relevant and available information from the event. You can
integrate Cisco ACS with JSA using one of the following methods:
• Configure your Cisco ACS device to directly send syslog to JSA for Cisco ACS
v5.x. See Configure Syslog for Cisco ACS v5.x.
• Configure your Cisco ACS device to directly send syslog to JSA for Cisco ACS
v4.x. See Configure Syslog for Cisco ACS v4.x.
• A server using the JSA Adaptive Log Exporter (Cisco ACS software version 3.x
or later). See Configure Cisco ACS for the Adaptive Log Exporter.
NOTE
Note: JSA only supports Cisco ACS versions prior to v3.x using a Universal DSM.
Configure Syslog for The configure syslog forwarding from a Cisco ACS appliance with software version
Cisco ACS v5.x 5.x, you must:
Parameter Description
Name Type a name for the remote syslog target.
Description Type a description for the remote syslog target.
Type Select Syslog.
IP Address Type the IP address of JSA or your Event Collector.
Configuring DSMs
164 CISCO
However, you can manually create a log source for JSA to receive Cisco ACS
events.
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for Cisco ACS events.
Configuring DSMs
Cisco ACS 165
Configure Syslog for To configure syslog forwarding from a Cisco ACS appliance with software version
Cisco ACS v4.x 4.x, you must:
NOTE
Note: Cisco ACS provides syslog report information for a maximum of two syslog
servers.
Configuring DSMs
166 CISCO
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for Cisco ACS events.
Configure Cisco ACS If you are using an older version of Cisco ACS, such as v3.x, you can log events
for the Adaptive Log from your Cisco ACS appliance to a comma-seperated file.
Exporter
The Cisco ACS device plug-in for the Adaptive Log Exporter can be used to read
and forward events from your comma-separated file to JSA.
Configuring DSMs
Cisco ASA 167
Cisco ASA You can integrate a Cisco Adaptive Security Appliance (ASA) with JSA.
A Cisco ASA DSM accepts events using syslog or NetFlow using NetFlow Security
Event Logging (NSEL). JSA records all relevant events. Before you configure JSA,
you must configure your Cisco ASA device to forward syslog or NetFlow NSEL
events.
Configuring DSMs
168 CISCO
• Forward events to JSA using NetFlow NSEL. See Integrate Cisco ASA for
NetFlow Using NSEL
NOTE
Note: Using the command show interfaces displays all available interfaces for
your Cisco device.
Configuring DSMs
Cisco ASA 169
The configuration is complete. The log source is added to JSA as Cisco ASA
syslog events are automatically discovered. Events forwarded to JSA by Cisco
ASA are displayed on the Log Activity tab of JSA.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your OSSEC installations.
Configuring DSMs
170 CISCO
NOTE
Note: JSA typically uses port 2055 for NetFlow event data on QFlow Collectors.
You must configure a different UDP port on your Cisco Adaptive Security
Appliance for NetFlow using NSEL.
NOTE
Note: The Access Control List (ACL) must exist on the Cisco ASA device before
defining the traffic match option in Step 7.
Configuring DSMs
Cisco ASA 171
NOTE
Note: If you are using a Cisco ASA version before v8.3 you can skip Step 10 as
the device defaults to the flow-export destination. For more information, see your
Cisco ASA documentation.
Step 11 Type the following command to add the service policy globally:
service-policy flow_export_policy global
Step 12 Exit the configuration:
exit
Step 13 Save the changes:
write mem
You must verify that your collector applications use the Event Time field to
correlate events.
NOTE
Note: Your system must be running the latest version of the NSEL protocol to
integrate with a Cisco ASA device using NetFlow NSEL. The NSEL protocol is
available on Juniper Customer Support, http://www.juniper.net/customers/support/,
or through auto updates in JSA.
Configuring DSMs
172 CISCO
Step 8 From the Log Source Type list box, select Cisco Adaptive Security Appliance
(ASA).
Step 9 Using the Protocol Configuration list box, select Cisco NSEL.
The syslog protocol configuration is displayed.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source.
Collector Port Type the UDP port number used by Cisco ASA to forward
NSEL events. The valid range of the Collector Port
parameter is 1-65535.
Note: JSA typically uses port 2055 for NetFlow event data
on QFlow Collectors. You must define a different UDP port
on your Cisco Adaptive Security Appliance for NetFlow using
NSEL.
Cisco CallManager The Cisco CallManager DSM for JSA collects application events forwarded from
Cisco CallManager devices using syslog.
Before receiving events in JSA, you must configure your Cisco Call Manager
device to forward events. After you forward syslog events from Cisco CallManager,
JSA automatically detects and adds Cisco CallManager as a log source.
Configuring DSMs
Cisco CatOS for Catalyst Switches 173
Configure a Log JSA automatically discovers and creates a log source for syslog events from Cisco
Source CallManager devices. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco CallManager.
Cisco CatOS for The Cisco CatOS for Catalyst Switches DSM for JSA accepts events using syslog.
Catalyst Switches
JSA records all relevant device events. Before configuring a Cisco CatOS device
in JSA, you must configure your device to forward syslog events.
Configuring DSMs
174 CISCO
Configure Syslog To configure your Cisco CatOS device to forward syslog events:
Configure a Log JSA automatically discovers and creates a log source for syslog events from Cisco
Source CatOS appliances. The following configuration steps are optional.
Configuring DSMs
Cisco CSA 175
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco CatOS for Catalyst
Switch appliance.
Cisco CSA You can integrate a Cisco Security Agent (CSA) server with JSA.
Supported Event The Cisco CSA DSM accepts events using syslog, SNMPv1, and SNMPv2. JSA
Types records all configured Cisco CSA alerts.
Configure Syslog for To configure your Cisco CSA server to forward events:
Cisco CSA
Configure a Log JSA automatically discovers and creates a log source for syslog events from Cisco
Source CSA appliances. The following configuration steps are optional.
Configuring DSMs
176 CISCO
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco CSA appliance.
Cisco FWSM You can integrate Cisco Firewall Service Module (FWSM) with JSA.
Supported Event The Cisco FWSM DSM for JSA accepts FWSM events using syslog. JSA records
Types all relevant Cisco FWSM events.
Configure Cisco To integrate Cisco FWSM with JSA, you must configure your Cisco FWSM
FWSM to Forward appliances to forward syslog events to JSA.
Syslog Events
To configure Cisco FWSM:
Step 1 Using a console connection, telnet, or SSH, log in to the Cisco FWSM.
Step 2 Enable logging:
logging on
Configuring DSMs
Cisco FWSM 177
Configure a Log JSA automatically discovers and creates a log source for syslog events from Cisco
Source FWSM appliances. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco FWSM appliance.
Configuring DSMs
178 CISCO
Cisco IDS/IPS The Cisco IDS/IPS DSM for JSA polls Cisco IDS/IPS for events using the Security
Device Event Exchange (SDEE) protocol.
The SDEE specification defines the message format and the protocol used to
communicate the events generated by your Cisco IDS/IPS security device. JSA
supports SDEE connections by polling directly to the IDS/IPS device and not the
management software, which controls the device.
NOTE
Note: You must have security access or web authentication on the device before
connecting to JSA.
After you configure your Cisco IDS/IPS device, you must configure the SDEE
protocol in JSA. When configuring the SDEE protocol, you must define the URL
required to access the device.
For example, https://www.mysdeeserver.com/cgi-bin/sdee-server.
You must use an http or https URL, which is specific to your Cisco IDS version:
• If you are using RDEP (for Cisco IDS v4.0), the URL should have
/cgi-bin/event-server at the end. For example:
https://www.my-rdep-server.com/cgi-bin/event-server
• If you are using SDEE/CIDEE (for Cisco IDS v5.x and above), the URL should
have /cgi-bin/sdee-server at the end. For example:
https://www.my-sdee-server/cgi-bin/sdee-server
JSA does not automatically discover or create log sources for syslog events from
Cisco IDS/IPS devices. To integrate Cisco IDS/IPS device events with JSA, you
must manually create a log source for each Cisco IDS/IPS in your network.
Configuring DSMs
Cisco IDS/IPS 179
Step 8 From the Log Source Type list box, select Cisco Intrusion Prevention System
(IPS).
Step 9 Using the Protocol Configuration list box, select SDEE.
The syslog protocol configuration is displayed.
Step 10 Configure the following values:
Parameter Description
Log Source Type an IP address, hostname, or name to identify the SDEE
Identifier event source. IP addresses or hostnames are recommended as
they allow JSA to identify a log file to a unique event source.
The log source identifier must be unique for the log source type.
URL Type the URL required to access the log source, for example,
https://www.mysdeeserver.com/cgi-bin/sdee-server. You must
use an http or https URL.
The options include:
• If you are using SDEE/CIDEE (for Cisco IDS v5.x and
above), the URL should have /cgi-bin/sdee-server at the end.
For example,
https://www.my-sdee-server/cgi-bin/sdee-serv
er
• If you are using RDEP (for Cisco IDS v4.0), the URL should
have /cgi-bin/event-server at the end. For example,
https://www.my-rdep-server.com/cgi-bin/event
-server
Username Type the username. This username must match the SDEE URL
username used to access the SDEE URL. The username can
be up to 255 characters in length.
Password Type the user password. This password must match the SDEE
URL password used to access the SDEE URL. The password
can be up to 255 characters in length.
Events / Query Type the maximum number of events to retrieve per query. The
valid range is 0 to 501 and the default is 100.
Force Subscription Select this check box if you want to force a new SDEE
subscription. By default, the check box is selected.
The check box forces the server to drop the least active
connection and accept a new SDEE subscription connection for
this log source.
Clearing the check box continues with any existing SDEE
subscription.
Severity Filter Low Select this check box if you want to configure the severity level
as low.
Log sources that support SDEE return only the events that
match this severity level. By default, the check box is selected.
Configuring DSMs
180 CISCO
Parameter Description
Severity Filter Select this check box if you want to configure the severity level
Medium as medium.
Log sources that supports SDEE returns only the events that
match this severity level. By default, the check box is selected.
Severity Filter High Select this check box if you want to configure the severity level
as high.
Log sources that supports SDEE returns only the events that
match this severity level. By default, the check box is selected.
Cisco IronPort The Cisco IronPort DSM for JSA provides event information for email spam, web
content filtering, and corporate email policy enforcement.
Before you configure JSA to integrate with your Cisco IronPort device, you must
select the log type to configure:
IronPort Mail Log The JSA Cisco IronPort DSM accepts events using syslog. To configure your
Configuration IronPort device to send syslog events to JSA, you must:
Step 1 Log in to your Cisco IronPort user interface.
Step 2 Select System Administration\Log Subscriptions.
Step 3 Click Add Log Subscription.
Step 4 Configure the following values:
• Log Type - Define a log subscription for both Ironport Text Mail Logs and
System Logs.
• Log Name - Type a log name.
• File Name - Use the default configuration value.
• Maximum File Size - Use the default configuration value.
• Log Level - Select Information (Default).
• Retrieval Method - Select Syslog Push.
• Hostname - Type the IP address or server name of your JSA system.
• Protocol - Select UDP.
Configuring DSMs
Cisco IronPort 181
• Facility - Use the default configuration value. This value depends on the
configured Log Type.
Step 5 Save the subscription.
You are now ready to configure the log source in JSA.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco IronPort appliance.
IronPort Web Content The Cisco IronPort DSM for JSA retrieves web content filtering events in W3C
Filter format from a remote source using the log file protocol.
Your system must be running the latest version of log file protocol to integrate with
a Cisco IronPort device. To configure your Cisco IronPort device to push web
Configuring DSMs
182 CISCO
content filter events, you must configure a log subscription for the web content filter
using the W3C format. For more information on configuring a log subscription, see
your Cisco IronPort documentation.
You are now ready to configure the log source and protocol JSA.
Step 1 From the Log Source Type drop-down list box, select Cisco IronPort.
Step 2 From the Protocol Configuration list box, select Log File protocol option.
Step 3 Select W3C as the Event Generator used to process the web content filter log
files.
Step 4 The FTP File Pattern parameter must use a regular expression that matches the
log files generated by the web content filter logs.
For more information on configuring the Log File protocol, see the Juniper Secure
Analytics Log Sources User Guide.
Cisco NAC The Cisco NAC DSM for JSA accepts events using syslog.
Supported Event JSA records all relevant audit, error, and failure events as well as quarantine and
Types infected system events. Before configuring a Cisco NAC device in JSA, you must
configure your device to forward syslog events.
Configuring a Log To integrate Cisco NAC events with JSA, you must manually create a log source to
Source receive Cisco NAC events. JSA does not automatically discover or create log
sources for syslog events from Cisco NAC appliances.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Configuring DSMs
Cisco Nexus 183
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco NAC appliance.
Cisco Nexus The Cisco Nexus DSM for JSA supports alerts from Cisco NX-OS devices.
The events are forwarded from Cisco Nexus to JSA using syslog. Before you can
integrate events with JSA, you must configure your Cisco Nexus device to forward
syslog events.
Configuring DSMs
184 CISCO
Step 4 Type the following command to save your current configuration as the start up
configuration:
copy running-config startup-config
The configuration is complete. The log source is added to JSA as Cisco Nexus
events are automatically discovered. Events forwarded to JSA by Cisco Nexus are
displayed on the Log Activity tab of JSA.
Configure a Log JSA automatically discovers and creates a log source for syslog events from Cisco
Source Nexus. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco Nexus appliances.
Configuring DSMs
Cisco IOS 185
Cisco IOS You can integrate Cisco IOS series devices with JSA.
Supported Event The Cisco IOS DSM for JSA accepts Cisco IOS events using syslog. JSA records
Types all relevant events. The following Cisco Switches and Routers are automatically
discovered as Cisco IOS and have their events parsed by the Cisco IOS DSM:
NOTE
Note: Make sure all Access Control Lists (ACLs) are set to LOG.
Configuring DSMs
186 CISCO
Configure a Log JSA automatically discovers and creates a log source for syslog events from Cisco
Source IOS. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco IOS-based device.
Configuring DSMs
Cisco Pix 187
Cisco Pix You can integrate Cisco Pix security appliances with JSA.
The Cisco Pix DSM for JSA accepts Cisco Pix events using syslog. JSA records all
relevant Cisco Pix events.
Step 1 Log in to your Cisco PIX appliance using a console connection, telnet, or SSH.
Step 2 Type the following command to access Privileged mode:
enable
Step 3 Type the following command to access Configuration mode:
conf t
Step 4 Enable logging and timestamp the logs:
logging on
logging timestamp
Step 5 Set the log level:
logging trap warning
Step 6 Configure logging to JSA:
logging host <interface> <ip address>
Where:
<interface> is the name of the interface, for example, dmz, lan, ethernet0, or
ethernet1.
<ip address> is the IP address hosting JSA.
The configuration is complete. The log source is added to JSA as Cisco Pix
Firewall events are automatically discovered. Events forwarded to JSA by Cisco
Pix Firewalls are displayed on the Log Activity tab of JSA.
Configure a Log JSA automatically discovers and creates a log source for syslog events from Cisco
Source Pix Firewalls. The following configuration steps are optional.
Configuring DSMs
188 CISCO
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco Pix Firewall.
Cisco VPN 3000 The Cisco VPN 3000 Concentrator DSM for JSA accepts
Concentrator
Cisco VPN Concentrator events using syslog. JSA records all relevant events.
Before you can integrate with a Cisco VPN concentrator, you must configure your
device to forward syslog events to JSA.
Configuring DSMs
Cisco Wireless Services Module 189
The configuration is complete. The log source is added to JSA as Cisco VPN
Concentrator events are automatically discovered. Events forwarded to JSA are
displayed on the Log Activity tab of JSA.
Configure a Log JSA automatically discovers and creates a log source for syslog events from Cisco
Source VPN 3000 Series Concentrators. These configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco VPN 3000 Series
Concentrators.
Cisco Wireless You can integrate a Cisco Wireless Services Module (WiSM) device with JSA.
Services Module
A Cisco WiSM DSM for JSA accepts events using syslog. Before you can integrate
JSA with a Cisco WiSM device, you must configure Cisco WiSM to forward syslog
events.
Configuring DSMs
190 CISCO
Configuring DSMs
Cisco Wireless Services Module 191
Configuring DSMs
192 CISCO
Configure a Log JSA automatically discovers and creates a log source for syslog events from Cisco
Source WiSM. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco WiSM appliance.
Cisco Wireless LAN The Cisco Wireless LAN Controllers DSM for JSA collects events forwarded from
Controllers Cisco Wireless LAN Controller devices using syslog or SNMPv2.
Before You Begin If you collect events from Cisco Wireless LAN Controllers, you should select the
best collection method for your configuration. The Cisco Wireless LAN Controller
DSM for JSA supports both syslog and SNMPv2 events. However, syslog provides
Configuring DSMs
Cisco Wireless LAN Controllers 193
all available Cisco Wireless LAN Controller events, where SNMPv2 only sends a
limited set of security events to JSA.
Configuring Syslog You can configure Cisco Wireless LAN Controller for forward syslog events to JSA.
for Cisco Wireless
LAN Controller Procedure
Step 1 Log in to your Cisco Wireless LAN Controller interface.
Step 2 Click the Management tab.
Step 3 From the menu, select Logs > Config.
Step 4 In the Syslog Server IP Address field, type the IP address of your JSA console.
Step 5 Click Add.
Step 6 From the Syslog Level list box, select a logging level.
The Information level allows you to collect all Cisco Wireless LAN Controller
events above the debug level.
Step 7 From the Syslog Facility list box, select a facility level.
Step 8 Click Apply
Step 9 Click Save Configuration.
What to do next
You are now ready to configure a syslog log source for Cisco Wireless LAN
Controller.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Cisco Wireless LAN Controllers.
Step 9 Using the Protocol Configuration list box, select Syslog.
Configuring DSMs
194 CISCO
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco Wireless LAN Controller.
Enabled Select this check box to enable the log source. By default,
the check box is selected.
Credibility From the list box, select the credibility of the log source. The
range is 0 to 10. The credibility indicates the integrity of an
event or offense as determined by the credibility rating from
the source devices. Credibility increases if multiple sources
report the same event. The default is 5.
Target Event Collector From the list box, select the Event Collector to use as the
target for the log source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
Automatically discovered log sources use the default value
configured in the Coalescing Events drop-down in the JSA
Settings window on the Admin tab. However, when you
create a new log source or update the configuration for an
automatically discovered log source you can override the
default value by configuring this check box for each log
source. For more information on settings, see the Juniper
Secure Analytics Administration Guide.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable or disable JSA from storing
the event payload.
Automatically discovered log sources use the default value
from the Store Event Payload drop-down in the JSA
Settings window on the Admin tab. However, when you
create a new log source or update the configuration for an
automatically discovered log source you can override the
default value by configuring this check box for each log
source.
Configuring SNMPv2 SNMP event collection for Cisco Wireless LAN Controllers allows you to capture
for Cisco Wireless the following events for JSA:
LAN Controller • SNMP Config Event
• bsn Authentication Errors
• LWAPP Key Decryption Errors
Configuring DSMs
Cisco Wireless LAN Controllers 195
Procedure
Step 1 Log in to your Cisco Wireless LAN Controller interface.
Step 2 Click the Management tab.
Step 3 From the menu, select SNMP > Communities.
You can use the one of the default communities created or create a new
community.
Step 4 Click New.
Step 5 In the Community Name field, type the name of the community for your device.
Step 6 In the IP Address field, type the IP address of JSA.
The IP address and IP mask you specify is the address from which your Cisco
Wireless LAN Controller accepts SNMP requests. You can treat these values as an
access list for SNMP requests.
Step 7 In the IP Mask field, type a subnet mask.
Step 8 From the Access Mode list box, select Read Only or Read/Write.
Step 9 From the Status list box, select Enable.
Step 10 Click Save Configuration to save your changes.
What to do next
You are now ready to create a SNMPv2 trap receiver.
Procedure
Step 1 Click the Management tab.
Step 2 From the menu, select SNMP > Trap Receivers.
Step 3 In the Trap Receiver Name field, type a name for your trap receiver.
Step 4 In the IP Address field, type the IP address of JSA.
The IP address you specify is the address to which your Cisco Wireless LAN
Controller sends SNMP messages. If you plan to configure this log source on an
Event Collector, you want to specify the Event Collector appliance IP address.
Step 5 From the Status list box, select Enable.
Step 6 Click Apply to commit your changes.
Step 7 Click Save Configuration to save your settings.
What to do next
You are now ready to create a SNMPv2 log source in JSA.
Configuring DSMs
196 CISCO
Configure a log source for SNMPv2 for Cisco Wireless LAN Controller
JSA does not automatically discover and create log sources for SNMP event data
from Cisco Wireless LAN Controllers. You must create a log source for each Cisco
Wireless LAN Controller providing SNMPv2 events.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Cisco Wireless LAN Controllers.
Step 9 Using the Protocol Configuration list box, select SNMPv2.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cisco Wireless LAN Controller.
Community Type the SNMP community name required to access the
system containing SNMP events. The default is Public.
Include OIDs in Event Select the Include OIDs in Event Payload check box.
Payload
This options allows the SNMP event payload to be
constructed using name-value pairs instead of the standard
event payload format. Including OIDs in the event payload is
required for processing SNMPv2 or SNMPv3 events from
certain DSMs.
Enabled Select this check box to enable the log source. By default,
the check box is selected.
Credibility From the list box, select the credibility of the log source. The
range is 0 to 10. The credibility indicates the integrity of an
event or offense as determined by the credibility rating from
the source devices. Credibility increases if multiple sources
report the same event. The default is 5.
Target Event Collector From the list box, select the Event Collector to use as the
target for the log source.
Configuring DSMs
Cisco Identity Services Engine 197
Parameter Description
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
Automatically discovered log sources use the default value
configured in the Coalescing Events drop-down in the JSA
Settings window on the Admin tab. However, when you
create a new log source or update the configuration for an
automatically discovered log source you can override the
default value by configuring this check box for each log
source. For more information on settings, see the Juniper
Secure Analytics Administration Guide.
Store Event Payload Select this check box to enable or disable JSA from storing
the event payload.
Automatically discovered log sources use the default value
from the Store Event Payload drop-down in the JSA
Settings window on the Admin tab. However, when you
create a new log source or update the configuration for an
automatically discovered log source you can override the
default value by configuring this check box for each log
source.
Cisco Identity The Cisco Identity Services Engine (ISE) DSM for JSA accepts syslog events from
Services Engine Cisco ISE appliances with log sources configured to use the UDP Multiline
protocol.
Configuration JSA supports syslog events forwarded by Cisco ISE versions 1.1. Before you
Overview configure your Cisco ISE appliance, you should consider which logging categories
you want to configure on your Cisco ISE to forward to JSA. Each logging category
must be configured with a syslog severity and included as a remote target to allow
Cisco ISE to forward the event to JSA. The log source you configure in JSA
receives the event forwarded from Cisco ISE and uses a regular expression to
assemble the multiline syslog event in to an event readable by JSA.
Configuring DSMs
198 CISCO
To integrate Cisco ISE events with JSA, you must perform the following tasks:
1 Configure a log source in JSA for your Cisco ISE appliance forwarding events to
JSA.
2 Create a remote logging target for JSA on your Cisco ISE appliance.
3 Configure the logging categories on your Cisco ISE appliance.
Supported Event The Cisco ISE DSM for JSA is capable of receiving syslog events from the
Logging Categories following event logging categories.
Table 28-1 Supported Cisco ISE Event Logging Categories
Configuring a Cisco To collect syslog events, you must configure a log source for Cisco ISE in JSA to
ISE Log Source in use the UDP Multiline Syslog protocol.
JSA
You must configure a log source for each individual Cisco ISE appliance that
forwards events to JSA. However, all Cisco ISE appliances can forward their
events to the same listen port on JSA that you configure.
Configuring DSMs
Cisco Identity Services Engine 199
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for your log source.
Step 8 From the Log Source Type list box, select Cisco Identity Services Engine.
Step 9 From the Protocol Configuration list box, select UDP Multiline Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address, host name, or name to identify the log
source or appliance providing UDP Multiline Syslog events to
JSA.
Listen Port Type 517 as the port number used by JSA to accept
incoming UDP Multiline Syslog events. The valid port range
is 1 to 65535.
To edit a saved configuration to use a new port number:
1 In the Listen Port field, type the new port number for
receiving UDP Multiline Syslog events.
2 Click Save.
3 On the Admin tab, select Advanced > Deploy Full
Configuration.
After the full deploy completes, JSA is capable of receiving
events on the updated listen port.
Note: When you click Deploy Full Configuration, JSA restarts
all services, resulting in a gap in data collection for events
and flows until the deployment completes.
Message ID Pattern Type the following regular expression (regex) required to
filter the event payload messages.
CISE_\S+ (\d{10})
What to do next
You are now ready to configure your Cisco ISE appliance with a remote logging
target.
Configuring DSMs
200 CISCO
Creating a Remote To forward syslog events to JSA, you must configure your Cisco ISE appliance
Logging Target in with a remote logging target.
Cisco ISE
Procedure
Step 1 Log in to your Cisco ISE Administration Interface.
Step 2 From the navigation menu, select Administration > System > Logging >
Remote Logging Targets.
Step 3 Click Add.
Step 4 In the Name field, type a name for the remote target system.
Step 5 In the Description field, type a description.
Step 6 In the IP Address field, type a the IP address of the JSA console or Event
Collector.
Step 7 In the Port field, type 517 or use the port value you specific in your Cisco ISE log
source for JSA.
Step 8 From the Facility Code list box, select the syslog facility to use for logging events.
Step 9 In the Maximum Length field, type 1024 as the maximum packet length allowed
for the UDP syslog message.
Step 10 Click Submit.
The remote logging target is created for JSA.
What to do next
You are now ready to configure the logging categories forwarded by Cisco ISE to
JSA.
Configuring Cisco To define which events are forwarded by your Cisco ISE appliance, you must
ISE Logging configure each logging category with a syslog severity and the remote logging
Categories target your configured for JSA.
For a list of pre-defined event logging categories for Cisco ISE, see Supported
Event Logging Categories.
Procedure
Step 1 From the navigation menu, select Administration > System > Logging >
Logging Categories.
Step 2 Select a logging category, and click Edit.
Step 3 From the Log Severity list box, select a severity for the logging category.
Step 4 In the Target field, add your remote logging target for JSA to the Select box.
Step 5 Click Save.
Step 6 Repeat this process for each logging category you want to forward to JSA.
The configuration is complete. Events forwarded by Cisco ISE are displayed on the
Log Activity tab in JSA.
Configuring DSMs
29 CITRIX
Citrix NetScaler The Citrix NetScaler DSM for Juniper Secure Analytics (JSA) accepts all relevant
audit log events using syslog.
Configuring Syslog To integrate Citrix NetScaler events with JSA, you must configure Citrix NetScaler
on Citrix NetScaler to forward syslog events.
Procedure
Step 1 Using SSH, log in to your Citrix NetScaler device as a root user.
Step 2 Type the following command to add a remote syslog server:
add audit syslogAction <ActionName> <IP Address> -serverPort 514
-logLevel Info -dateFormat DDMMYYYY
Where:
<ActionName> is a descriptive name for the syslog server action.
<IP Address> is the IP address or hostname of your JSA console.
For example:
add audit syslogAction action-JSA 10.10.10.10 -serverPort 514
-logLevel Info -dateFormat DDMMYYYY
Step 3 Type the following command to add an audit policy:
add audit syslogPolicy <PolicyName> <Rule> <ActionName>
Where:
<PolicyName> is a descriptive name for the syslog policy.
<Rule> is the rule or expression the policy uses. The only supported value is
ns_true.
<ActionName> is a descriptive name for the syslog server action.
Configuring DSMs
202 CITRIX
For example:
add audit syslogPolicy policy-JSA ns_true action-JSA
Step 4 Type the following command to bind the policy globally:
bind system global <PolicyName> -priority <Integer>
Where:
<PolicyName> is a descriptive name for the syslog policy.
<Integer> is a numeric value used to rank message priority for multiple policies
that are communicating using syslog.
For example:
bind system global policy-JSA -priority 30
When multiple policies have priority assigned to them as a numeric value the lower
priority value is evaluated before the higher value.
Step 5 Type the following command to save the Citrix NetScaler configuration.
save config
Step 6 Type the following command to verify the policy is saved in your configuration:
sh system global
NOTE
Note: For information on configuring syslog using the Citrix NetScaler user
interface, see http://support.citrix.com/article/CTX121728 or your vendor
documentation.
The configuration is complete. The log source is added to JSA as Citrix NetScaler
events are automatically discovered. Events forwarded by Citrix NetScaler are
displayed on the Log Activity tab of JSA.
Configuring a Citrix JSA automatically discovers and creates a log source for syslog events from Citrix
NetScaler Log NetScaler. This procedure is optional.
Source
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Citrix NetScaler.
Step 9 Using the Protocol Configuration list box, select Syslog.
Configuring DSMs
Citrix Access Gateway 203
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Citrix NetScaler devices.
Citrix Access The Citrix Access Gateway DSM accepts access, audit, and diagnostic events
Gateway forwarded from your Citrix Access Gateway appliance using syslog.
Configuring Syslog This procedure outlines the configure steps required to configure syslog on your
for Citrix Access Citrix Access Gateway to forward events to the JSA console or an Event
Gateway Collectors.
Procedure
Step 1 Log in to your Citrix Access Gateway web interface.
Step 2 Click the Access Gateway Cluster tab.
Step 3 Select Logging/Settings.
Step 4 In the Server field, type the IP address of your JSA console or Event Collector.
Step 5 From the Facility list box, select a syslog facility level.
Step 6 In the Broadcast interval (mins), type 0 to continuously forward syslog events to
JSA.
Step 7 Click Submit to save your changes.
The configuration is complete. The log source is added to JSA as Citrix Access
Gateway events are automatically discovered. Events forwarded to JSA by Citrix
Access Gateway are displayed on the Log Activity tab in JSA.
Configuring a Citrix JSA automatically discovers and creates a log source for syslog events from Citrix
Access Gateway Log Access Gateway appliances. This procedure is optional.
Source
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Configuring DSMs
204 CITRIX
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Citrix Access Gateway.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Citrix Access Gateway
appliance.
Configuring DSMs
30 CLOUDPASSAGE HALO
The Juniper Secure Analytics (JSA) DSM for CloudPassage Halo can collect event
logs from your CloudPassage Halo account.
Table 30-1 identifies the specifications for the CloudPassage Halo.
Table 30-1 DSM Specifications for CloudPassage Halo
Specification Value
Manufacturer CloudPassage
Log source type CloudPassage Halo
RPM file name DSM-CloudPassageHalobuild_number.noarch.rpm
Supported All
versions
Protocol Syslog
configuration Log file
Supported event All events
types
Automatically Yes
discovered?
Includes identity No
More information CloudPassage website
(www.cloudpassage.com)
Configuring DSMs
206 CLOUDPASSAGE HALO
1 If automatic updates are not enabled, download the latest versions of the following
RPMs:
• DSMCommon RPM
• CloudPassage Halo RPM
2 Configure CloudPassage Halo to communicate with JSA.
3 If JSA does not automatically detect CloudPassage Halo as a log source, create a
CloudPassage Halo log source on the JSA console.
Use the values described in Table 30-2 for the log source parameters.
Table 30-2 CloudPassage Halo Log Source
Log Source Type CloudPassage Halo
Protocol Syslog or Log File
Configuration
Configuring To collect CloudPassage Halo events and send syslog events to JSA, download
CloudPassage Halo and configure the CloudPassage Halo Event Connector script.
to Communicate
with JSA Before you begin
You must create a read-only CloudPassage API key. To create a read-only key, log
in to your CloudPassage Portal and click Add New Key in the Site Administration
window.
The Event Connector script requires Python 2.6 or later to be installed on the host
on which the Event Connector script runs. The Event Connector uses the
CloudPassage Events API, which is available to all Halo subscribers.
Configuring DSMs
Configuring CloudPassage Halo to Communicate with JSA 207
Procedure
Configuring DSMs
208 CLOUDPASSAGE HALO
Configuring DSMs
31 CORRELOG AGENT FOR IBM ZOS
The CorreLog Agent for IBM z/OS DSM for Juniper Secure Analytics (JSA) can
collect event.
Table 31-1 identifies the specifications for the CorreLog Agent for IBM z/OS DSM.
Table 31-1 CorreLog Agent for IBM z/OS DSM specifications
Specification Value
Manufacturer CorreLog
DSM CorreLog Agent for IBM z/OS
RPM file name DSM-CorreLogzOSAgent_qradar-version_build-number.
noarch.rrpm
Supported 7.1
versions 7.2
Protocol Syslog LEEF
JSA recorded All events
events
Auto discovered Yes
Includes identity No
For more Correlog web site
information (https://correlog.com/solutions-and-services/sas-corr
elog-mainframe.html)
Configuring DSMs
210 CORRELOG AGENT FOR IBM ZOS
CorreLog Agentfor To integrate CorreLog Agent for IBM z/OS DSM with JSA, use the following
IBM z/OS DSM procedure:
Integration Process
1 If automatic updates are not enabled, download and install the most recent
CorreLog Agent for IBM z/OS RPM on your JSA console.
2 For each CorreLog Agent instance, configure your CorreLog Agent system to
enable communication with JSA.
3 If JSA does not automatically discover the DSM, for each CorreLog Agent system
you want to integrate, create a log source on the JSA console.
Related tasks
• Manually Installing a DSM
• Configuring your CorreLog Agent System for Communication with JSA
• Configuring a CorreLog Agent for IBM z/OS Log Source in JSA
Configuring your For the procedure to configure your Correlog Agent system for communication with
CorreLog Agent JSA, see the CZA - CorreLog Agent for z/OS manual that you received from
System for CorreLog with your Agent for z/OS software distribution.
Communication Use the following sections of the guide:
with JSA
• General considerations in Section 1: Introduction.
• Procedure in Section 2: Installation.
• Procedure in the Section 3: Configuration.
Ensure that you complete the Tailoring the Installation for a Proprietary Syslog
Extension/JSA instructions.
When you start the CorreLog agent, if JSA does not collect z/OS events, see
the Troubleshooting topic in Section 3 or contact Correlog Customer support.
• If you want to customize the optional CorreLog Agent parameter file, review
JSA normalized event attributes in Appendix G: Fields.
Configuring a To collect CorreLog Agent for IBM zOS events, configure a log source in JSA.
CorreLog Agent for
IBM z/OS Log Procedure
Source in JSA To configure a log source in JSA:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Configuring DSMs
Configuring a CorreLog Agent for IBM z/OS Log Source in JSA 211
Configuring DSMs
32 CONFIGURING BARRACUDA WEB
APPLICATION FIREWALL TO SEND
SYSLOG EVENTS TO JSA
Configure your Barracuda Web Application Firewall appliance to send LEEF
events to Juniper Secure Analytics (JSA).
Verify that firewalls between the Barracuda appliance and JSA allow UDP traffic on
port 514.
Configuring DSMs
214 CONFIGURING BARRACUDA WEB APPLICATION FIREWALL TO SEND SYSLOG EVENTS TO JSA
Procedure
6 In the Log Formats pane, select a format from the list box for each log type.
7 Click Save Changes.
Configuring DSMs
CorreLog Agentfor IBM z/OS DSM Integration Process 215
CorreLog Agentfor To integrate CorreLog Agent for IBM z/OS DSM with JSA:
IBM z/OS DSM
Integration Process
1 If automatic updates are not enabled, download and install the most recent
CorreLog Agent for IBM z/OS RPM on your JSA console.
2 For each CorreLog Agent instance, configure your CorreLog Agent system to
enable communication with JSA.
3 If JSA does not automatically discover the DSM, for each CorreLog Agent system
you want to integrate, create a log source on the JSA console.
Related tasks
• Manually Installing a DSM
• Configuring your CorreLog Agent System for Communication with JSA
• Configuring a CorreLog Agent for IBM z/OS Log Source in JSA
Configuring your For the procedure to configure your Correlog Agent system for communication with
CorreLog Agent JSA, see the CZA - CorreLog Agent for z/OS manual that you received from
System for CorreLog with your Agent for z/OS software distribution.
Communication Use the following sections of the guide:
with JSA
• General considerations in Section 1: Introduction.
• Procedure in Section 2: Installation.
• Procedure in the Section 3: Configuration.
Ensure that you complete the Tailoring the Installation for a Proprietary Syslog
Extension/JSA instructions.
When you start the CorreLog agent, if JSA does not collect z/OS events, see
the Troubleshooting topic in Section 3 or contact Correlog Customer support.
• If you want to customize the optional CorreLog Agent parameter file, review
JSA normalized event attributes in Appendix G: Fields.
Configuring a To collect CorreLog Agent for IBM zOS events, configure a log source in JSA.
CorreLog Agent for
IBM z/OS Log Procedure
Source in JSA To configure a log source in JSA:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Configuring DSMs
216 CONFIGURING BARRACUDA WEB APPLICATION FIREWALL TO SEND SYSLOG EVENTS TO JSA
Configuring DSMs
33 CRYPTOCARD CRYPTO-SHIELD
The Juniper Secure Analytics (JSA) CRYPTOCard CRYPTO-Shield DSM for JSA
accepts events using syslog.
Before You Begin To integrate CRYPTOCard CRYPTO-Shield events with JSA, you must manually
create a log source to receive syslog events.
Before you can receive events in JSA, you must configure a log source, then
configure your CRYPTOCard CRYPTO-Shield to forward syslog events. Syslog
events forwarded from CRYPTOCard CRYPTO-Shield devices are not
automatically discovered. JSA can receive syslog events on port 514 for both TCP
and UDP.
Configuring a Log JSA does not automatically discover or create log sources for syslog events from
Source CRYPTOCard CRYPTO-Shield devices.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select CRYPTOCard CRYPTOShield.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your CRYPTOCard
CRYPTO-Shield device.
Configuring DSMs
218 CRYPTOCARD CRYPTO-SHIELD
Configure Syslog for To configure your CRYPTOCard CRYPTO-Shield device to forward syslog events:
CRYPTOCard
CRYPTO-Shield
Step 1 Log in to your CRYPTOCard CRYPTO-Shield device.
Step 2 Configure the following System Configuration parameters:
NOTE
You must have CRYPTOCard Operator access with the assigned default
Super-Operator system role to access the System Configuration parameters.
Configuring DSMs
34 CYBER-ARK VAULT
The Cyber-Ark Vault DSM for Juniper Secure Analytics (JSA) accepts events using
syslog formatted for Log Enhanced Event Format (LEEF).
Supported Event JSA records both user activities and safe activities from the Cyber-Ark Vault in the
Types audit log events. Cyber-Ark Vault integrates with JSA to forward audit logs using
syslog to create a complete audit picture of privileged account activities.
Event Type Format Cyber-Ark Vault must be configured to generate events in Log Enhanced Event
Protocol (LEEF) and forward these events using syslog. The LEEF format consists
of a pipe ( | ) delimited syslog header and tab separated fields in the event payload.
If the syslog events forwarded from your Cyber-Ark Vault is not formatted as
described above, you must examine your device configuration or software version
to ensure your appliance supports LEEF. Properly formatted LEEF event
messages are automatically discovered and added as a log source to JSA.
Configure Syslog for To configure Cyber-Ark Vault to forward syslog events to JSA:
Cyber-Ark Vault
Procedure
Step 1 Log in to your Cyber-Ark device.
Step 2 Edit the DBParm.ini file.
Step 3 Configure the following parameters:
• SyslogServerIP - Type the IP address of JSA.
• SyslogServerPort - Type the UDP port used to connect to JSA. The default
value is 514.
• SyslogMessageCodeFilter - Configure which message codes are sent from
the Cyber-Ark Vault to JSA. You can define specific message numbers or a
range of numbers. By default, all message codes are sent for user activities and
safe activities.
For example, to define a message code of 1,2,3,30 and 5-10, you must type:
1,2,3,5-10,30.
Configuring DSMs
220 CYBER-ARK VAULT
• SyslogTranslatorFile - Type the file path to the LEEF.xsl translator file. The
translator file is used to parse Cyber-Ark audit records data in the syslog
protocol.
Step 4 Copy LEEF.xsl to the location specified by the SyslogTranslatorFile parameter in
the DBParm.ini file.
The configuration is complete. The log source is added to JSA as Cyber-Ark Vault
events are automatically discovered. Events forwarded by Cyber-Ark Vault are
displayed on the Log Activity tab of JSA.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source Cyber-Ark Vault. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Cyber-Ark Vault.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Cyber-Ark Vault appliance.
Configuring DSMs
35 CYBERGUARD FIREWALL/VPN
APPLIANCE
The CyberGuard Firewall VPN Appliance DSM for Juniper Secure Analytics (JSA)
accepts CyberGuard events using syslog.
Supported Event JSA records all relevant CyberGuard events for CyberGuard KS series appliances
Types forwarded using syslog.
Configure a Log JSA automatically discovers and creates a log source for syslog events from
Source CyberGuard appliances. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select CyberGuard TSP Firewall/VPN.
Configuring DSMs
222 CYBERGUARD FIREWALL/VPN APPLIANCE
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your CyberGuard appliance.
Configuring DSMs
36 DAMBALLA FAILSAFE
The Failsafe DSM for Juniper Secure Analytics (JSA) accepts syslog events using
the Log Enhanced Event Protocol (LEEF), enabling JSA to record all relevant
Damballa Failsafe events.
Event Type Format Damballa Failsafe must be configured to generate events in Log Enhanced Event
Protocol (LEEF) and forward these events using syslog. The LEEF format consists
of a pipe ( | ) delimited syslog header and tab separated fields in the event payload.
If the syslog events forwarded from your Damballa Failsafe is not formatted as
described above, you must examine your device configuration or software version
to ensure your appliance supports LEEF. Properly formatted LEEF event
messages are automatically discovered and added as a log source to JSA.
Configuring Syslog To collect events, you must configure your Damballa Failsafe device to forward
for Damballa Failsafe syslog events to JSA.
Procedure
Step 1 Log in to your Damballa Failsafe Management console
Step 2 From the navigation menu, select Setup > Integration Settings.
Step 3 Click the Q1 QRadar tab.
Step 4 Select Enable Publishing to Q1 QRadar.
Step 5 Configure the following options:
a Q1 Hostname - Type the IP address or Fully Qualified Name (FQN) of your
JSA console.
b Destination Port - Type 514. By default, JSA uses port 514 as the port for
receiving syslog events.
c Source Port - Optional. Type the source port your Damballa Failsafe device
uses for sending syslog events.
Step 6 Click Save.
The configuration is complete. The log source is added to JSA as Damballa
Failsafe events are automatically discovered. Events forwarded by Damballa
Failsafe are displayed on the Log Activity tab of JSA.
Configuring DSMs
224 DAMBALLA FAILSAFE
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source Damballa Failsafe devices. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Damballa Failsafe.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Damballa Failsafe devices.
Configuring DSMs
37 DIGITAL CHINA NETWORKS (DCN)
The Digital China Networks (DCN) DCS/DCRS Series DSM for Juniper Secure
Analytics (JSA) can accept events from Digital China Networks (DCN) switches
using syslog.
Supported Event JSA records all relevant IPv4 events forwarded from DCN switches. To integrate
Types your device with JSA, you must configure a log source, then configure your DCS or
DCRS switch to forward syslog events.
Supported The DSM supports the following DCN DCS/DCRS Series switches:
Appliances
• DCS - 3650
• DCS - 3950
• DCS - 4500
• DCRS - 5750
• DCRS - 5960
• DCRS - 5980
• DCRS - 7500
• DCRS - 9800
Configuring a Log JSA does not automatically discover incoming syslog events from DCN
Source DCS/DCRS Series switches.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Configuring DSMs
226 DIGITAL CHINA NETWORKS (DCN)
Step 8 From the Log Source Type list box, select DCN DCS/DCRS Series.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following value:
Parameter Description
Log Source Identifier Type the IP address, hostname, or name for the log source
as an identifier for your DCN DCS/DCRS Series switch.
Each log source you create for your DCN DCS/DCRS Series
switch should include a unique identifier, such as an IP
address or hostname.
Configure a DCN To collect events, you must configure your DCN DCS/DCRS Series switch in JSA.
DCS/DCRS Series
Switch Procedure
Step 1 Log in to your DCN DCS/DCRS Series switch command-line Interface (CLI).
Step 2 Type the following command to access the administrative mode:
enable
Step 3 Type the following command to access the global configuration mode:
config
The command-line interface displays the configuration mode prompt:
Switch(Config)#
Step 4 Type the following command to configure a log host for your switch:
logging <IP address> facility <local> severity <level>
Where:
<IP address> is the IP address of the JSA console.
<local> is the syslog facility, for example, local0.
<level> is the severity of the syslog events, for example, informational. If you
specify a value of informational, you forward all information level events and
above, such as, notifications, warnings, errors, critical, alerts, and emergencies.
For example,
logging 10.10.10.1 facility local0 severity informational
Configuring DSMs
227
Configuring DSMs
38 ENTERASYS
Enterasys Dragon The Enterasys Dragon DSM for Juniper Secure Analytics (JSA) accepts Enterasys
events using either syslog or SNMPv3 to record all relevant Enterasys Dragon
events.
Configuring DSMs
230 ENTERASYS
Create an Alarm Tool This procedure describes how to configure an Alarm Tool policy using an SNMPv3
Policy for SNMPv3 notification rule. Use SNMPv3 notification rules if you need to transfer PDATA
binary data elements.
Configuring DSMs
Enterasys Dragon 231
NOTE
Note: Verify that the security passwords and protocols match data configured in
the SNMP configuration.
i Click OK.
Step 6 Verify that the notification events are logged as separate events:
a Click the Global Options tab.
b Click the Main tab.
c Make sure that Concatenate Events is not selected.
Step 7 Configure the SNMP options:
a Click the Global Options tab.
b Click the SNMP tab
c Type the IP address of the EMS server sending SNMP traps.
Step 8 Configure the alarm information:
a Click the Alarms tab.
b Click New.
c Type values for the following parameters:
- Name - Type JSA-Alarm.
- Type - Select Real Time.
- Event Group - Select Dragon-Events.
- Notification Rule - Select the JSA-Rule check box.
d Click OK.
e Click Commit.
Step 9 Navigate to the Enterprise View.
Step 10 Right-click on the Alarm Tool and select Associate Alarm Tool Policy.
Configuring DSMs
232 ENTERASYS
Create a Policy for This procedure describes how to configure an Alarm Tool policy using a syslog
Syslog notification rule in the Log Event Extended Format (LEEF) message format.
LEEF is the preferred message format for sending notifications to Dragon Network
Defense when the notification rate is very high or when IPv6 addresses are
displayed. If you prefer not to use syslog notifications in LEEF format, refer to your
Enterasys Dragon documentation for more information.
NOTE
Note: Use SNMPv3 notification rules if you need to transfer PDATA, which is a
binary data element. Do not use a syslog notification rule.
To configure Enterasys Dragon with an Alarm Tool policy using a syslog notification
rule:
Step 1 Log in to the Enterasys Dragon EMS.
Step 2 Click the Alarm Tool icon.
Step 3 Configure the Alarm Tool Policy:
a In the Alarm Tool Policy View > Custom Policies menu tree, right-click and
select Add Alarm Tool Policy.
The Add Alarm Tool Policy window is displayed.
b In the Add Alarm Tool Policy field, type a policy name.
For example:
JSA
c Click OK.
d In the menu tree, select JSA.
Step 4 To configure the event group:
a Click the Events Group tab.
b Click New.
The Event Group Editor is displayed.
c Select the event group or individual events to monitor.
d Click Add.
A prompt is displayed.
e Click Yes.
f In the right column of the Event Group Editor, type Dragon-Events.
g Click OK.
Configuring DSMs
Enterasys Dragon 233
NOTE
Note: The LEEF message format delineates between fields using a pipe delimiter
between each keyword.
i Click OK.
Step 6 Verify that the notification events are logged as separate events:
a Click the Global Options tab.
b Click the Main tab.
c Make sure that Concatenate Events is not selected.
Step 7 Configure the alarm information:
a Click the Alarms tab.
b Click New.
c Type values for the parameters:
- Name - Type JSA-Alarm.
- Type - Select Real Time.
- Event Group - Select Dragon-Events.
- Notification Rule - Select the JSA-RuleSys check box.
d Click OK.
e Click Commit.
Step 8 Navigate to the Enterprise View.
Step 9 Right-click on the Alarm Tool and select Associate Alarm Tool Policy.
Configuring DSMs
234 ENTERASYS
Configure a Log You are now ready to configure the log source in JSA:
Source
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Enterasys Dragon Network IPS.
Step 9 From the Protocol Configuration list box, select either the SNMPv3 or Syslog
option. For more information on configuring a specific protocol, see the Log
Sources Users Guide.
For more information about Enterasys Dragon device, see your Enterasys Dragon
documentation.
NOTE
Note: Using the event mapping tool in the Log Activity tab, you can map a
normalized or raw event to a high-level and low-level category (or QID). However,
you cannot map combination Dragon messages using the event mapping tool. For
more information, see the Juniper Secure Analytics Users Guide.
Configure the EMS to Starting with Dragon Enterprise Management Server (EMS) v7.4.0 appliances, you
Forward Syslog must use syslog-ng for forwarding events to a Security and Information Manager
Messages such as JSA.
Syslogd has been replaced by syslog-ng in Dragon EMS v7.4.0 and above.
To configure EMS to forward syslog messages, you must choose one of the
following:
• If you are using syslog-ng and Enterasys Dragon EMS v7.4.0 and above, see
Configuring syslog-ng Using Enterasys Dragon EMS v7.4.0 and above.
• If you are using syslogd and Enterasys Dragon EMS v7.4.0 and below, see
Configuring syslogd Using Enterasys Dragon EMS v7.4.0 and below.
Configuring DSMs
Enterasys Dragon 235
CAUTION
CAUTION: Do not run both syslog-ng and syslogd at the same time.
Configuring DSMs
236 ENTERASYS
Enterasys HiGuard The Enterasys HiGuard Wireless IPS DSM for JSA records all relevant events
Wireless IPS using syslog
Before configuring the Enterasys HiGuard Wireless IPS device in JSA, you must
configure your device to forward syslog events.
Configuring DSMs
Enterasys HiGuard Wireless IPS 237
NOTE
Note: Configured syslog servers use the DNS names and DNS suffixes configured
in the Server initialization and Setup Wizard on the HWMH Config Shell.
• Port Number - Type the port number of the syslog server to which HWMH
sends events. The default is 514.
• Message Format - Select Plain Text as the format for sending events.
• Enabled? - Select if the events are to be sent to this syslog server.
Step 6 Save your configuration.
The configuration is complete. The log source is added to JSA as HiGuard events
are automatically discovered. Events forwarded to JSA by Enterasys HiGuard are
displayed on the Log Activity tab of JSA.
Configure a Log JSA automatically discovers and creates a log source for syslog events from
Source Enterasys HiGuard. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Enterasys HiGuard.
Configuring DSMs
238 ENTERASYS
Enterasys HiPath The Enterasys HiPath Wireless Controller DSM for JSA records all relevant events
Wireless Controller using syslog.
Supported Event JSA supports the following Enterasys HiPath Wireless Controller events:
Types
• Wireless access point events
• Application log events
• Service log events
• Audit log events
Configure Your To integrate your Enterasys HiPath Wireless Controller events with JSA, you must
HiPath Wireless configure your device to forward syslog events.
Controller
To forward syslog events to JSA:
Step 1 Log in to the HiPath Wireless Assistant.
Step 2 Click Wireless Controller Configuration.
The HiPath Wireless Controller Configuration window is displayed.
Step 3 From the menu, click System Maintenance.
Step 4 From the Syslog section, select the Syslog Server IP check box and type the IP
address of the device receiving the syslog messages.
Step 5 Using the Wireless Controller Log Level list box, select Information.
Step 6 Using the Wireless AP Log Level list box, select Major.
Step 7 Using the Application Logs list box, select local.0.
Step 8 Using the Service Logs list box, select local.3.
Step 9 Using the Audit Logs list box, select local.6.
Step 10 Click Apply.
You are now ready to configure the log source in JSA.
Configure a Log JSA automatically discovers and creates a log source for syslog events from
Source Enterasys HiPath. The following configuration steps are optional.
Configuring DSMs
Enterasys Stackable and Standalone Switches 239
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Enterasys HiPath.
Enterasys The Enterasys Stackable and Standalone Switches DSM for JSA accepts events
Stackable and using syslog.
Standalone
Switches JSA records all relevant events. Before configuring an Enterasys Stackable and
Standalone Switches device in JSA, you must configure your device to forward
syslog events.
Configuring DSMs
240 ENTERASYS
<severity> is the server severity level that the server will log messages. The
valid range is 1 to 8. If not specified, the default value configured with the set
logging default command is applied. This is an optional field. Valid values include:
- 1: Emergencies (system is unusable)
- 2: Alerts (immediate action required)
- 3: Critical conditions
- 4: Error conditions
- 5: Warning conditions
- 6: Notifications (significant conditions)
- 7: Informational messages
- 8: Debugging messages
<description> is a description of the facility/server. This is an optional field.
<port> is the default UDP port that the client uses to send messages to the
server. If not specified, the default value configured with the set logging default
command is applied. This is an optional field.
<enable | disable> enables or disables this facility/server configuration. This is
an optional field. If state is not specified, the server will not be enabled or disabled.
Step 3 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select one of the following options:
Enterasys Stackable and Standalone Switches, Enterasys A-Series,
Enterasys B2-Series, Enterasys B3-Series, Enterasys C2-Series,
Enterasys C3-Series, Enterasys D-Series, Enterasys G-Series, or
Enterasys I-Series.
For more information on configuring log sources, see the Log Source Users Guide.
For more information about your Enterasys Stackable and Standalone Switches,
see your vendor documentation.
Enterasys XSR The Enterasys XSR Security Router DSM for JSA accepts events using syslog.
Security Router
JSA records all relevant events. Before configuring an Enterasys XSR Security
Router in JSA, you must configure your device to forward syslog events.
Configuring DSMs
Enterasys Matrix Router 241
From the Log Source Type list box, select Enterasys XSR Security
Routers.
For more information on configuring log sources, see the Log Sources Users
Guide.
For more information about your Enterasys XSR Security Router, see your vendor
documentation.
Enterasys Matrix The Enterasys Matrix Router DSM for JSA accepts Enterasys Matrix events using
Router SNMPv1, SNMPv2, SNMPv3, and syslog.
You can integrate Enterasys Matrix Router version 3.5 with JSA. JSA records all
SNMP events and syslog login, logout, and login failed events. Before you
configure JSA to integrate with Enterasys Matrix, you must:
Configuring DSMs
242 ENTERASYS
<port> is the default UDP port that the client uses to send messages to the
server. Use port 514 unless otherwise stated.
<severity> is the server severity level 1 to 9 where 1 indicates an emergency
and 8 is debug level.
For example:
set logging server 5 description ourlogserver facility local0
ip_addr 1.2.3.4 port 514 severity 8
Step 3 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select Enterasys Matrix E1 Switch.
For more information on configuring log sources, see the Log Sources Users
Guide.
Enterasys NetSight The Enterasys NetSight Automatic Security Manager DSM for JSA accepts events
Automatic Security using syslog.
Manager
JSA records all relevant events. Before configuring an Enterasys NetSight
Automatic Security Manager device in JSA, you must configure your device to
forward syslog events.
NOTE
Note: You can also access the Automated Security Manager Configuration
window from the Tool menu.
Configuring DSMs
Enterasys Matrix K/N/S Series Switch 243
From the Log Source Type list box, select Enterasys NetsightASM.
For more information on configuring log sources, see the Log Sources Users
Guide.
For more information about your Enterasys NetSight Automatic Security Manager
device, see your vendor documentation.
Enterasys Matrix The Enterasys Matrix Series DSM for JSA accepts events using syslog. JSA
K/N/S Series Switch records all relevant Matrix K-Series, N-Series, or S-Series standalone device
events.
Configuring DSMs
244 ENTERASYS
For more information on configuring the Matrix Series routers or switches, consult
your vendor documentation.
Step 3 You are now ready to configure the log sources in JSA.
From the Log Source Type list box, select Enterasys Matrix K/N/S Series
Switch.
For information on configuring log sources, see the Log Sources Users Guide.
Enterasys NAC The Enterasys NAC DSM for JSA accepts events using syslog. JSA records all
relevant events.
For details on configuring your Enterasys NAC appliances for syslog, consult your
vendor documentation. After the Enterasys NAC appliance is forwarding syslog
events to JSA, the configuration is complete. The log source is added to JSA as
Enterasys NAC events are automatically discovered. Events forwarded by
Enterasys NAC appliances are displayed on the Log Activity tab of JSA.
Configure a log JSA automatically discovers and creates a log source for syslog events from
source Enterasys NAC. The following configuration steps are optional.
Configuring DSMs
Enterasys 800-Series Switch 245
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Enterasys NAC.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Enterasys NAC appliances.
Enterasys The Enterasys 800-Series Switch DSM for JSA accepts events using syslog.
800-Series Switch
JSA records all relevant audit, authentication, system, and switch events. Before
configuring your Enterasys 800-Series Switch in JSA, you must configure your
switch to forward syslog events.
Configuring DSMs
246 ENTERASYS
Configure a log JSA automatically discovers and creates a log source for syslog events from
source Enterasys 800-Series Switches. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Enterasys 800-Series Switch.
Configuring DSMs
39 EXTREME NETWORKS
EXTREMEWARE
The Extreme Networks ExtremeWare DSM for Juniper Secure Analytics (JSA)
records al relevant Extreme Networks ExtremeWare and Extremeware XOS
devices events from using syslog.
To integrate JSA with an ExtremeWare device, you must configure a log source in
JSA, then configure your Extreme Networks ExtremeWare and Extremeware XOS
devices to forward syslog events. JSA does not automatically discover or create
log sources for syslog events from ExtremeWare appliances.
Configuring a Log To integrate with JSA, you must manually create a log source to receive the
Source incoming ExtremeWare events forwarded to JSA.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Extreme Networks ExtremeWare
Operating System (OS).
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your ExtremeWare appliance.
Configuring DSMs
248 EXTREME NETWORKS EXTREMEWARE
Configuring DSMs
40 F5 NETWORKS
F5 Networks BIG-IP The F5 Networks BIG-IP Advanced Firewall Manager (AFM) DSM for Juniper
AFM Secure Analytics (JSA) accepts syslog events forwarded from F5 Networks BIG-IP
AFM systems in name-value pair format.
Supported Event JSA is capable of collecting the following events from F5 BIG-IP appliances with
Types Advanced Firewall Managers:
• Network events
• Network Denial of Service (DoS) events
• Protocol security events
• DNS events
• DNS Denial of Service (DoS) events
Before You Begin Before you can configure the Advanced Firewall Manager, you must verify that
your BIG-IP appliance is licensed and provisions to include Advanced Firewall
Manager.
Procedure
Step 1 Log in to your BIG-IP appliance Management Interface.
Step 2 From the navigation menu, select System > License.
Step 3 In the License Status column, verify the Advanced Firewall Manager is licensed
and enabled.
Configuring DSMs
250 F5 NETWORKS
Step 4 To enable the Advanced Firewall Manager, select System > Resource
Provisioning.
Step 5 From the Provisioning column, select the check box and select Nominal from the
list box.
Step 6 Click Submit to save your changes.
Configure a Logging A logging pool allows you to define a pool of servers that receive syslog events.
Pool The pool contains the IP address, port, and a node name that you provide.
Procedure
Step 1 From the navigation menu, select Local Traffic > Pools.
Step 2 Click Create.
Step 3 In the Name field, type a name for the logging pool.
For example, Logging_Pool.
Step 4 From the Health Monitor field, in the Available list, select TCP and click <<.
This moves the TCP option from the Available list to the Selected list.
Step 5 In the Resource pane, from the Node Name list box, select Logging_Node or the
name you defined in Step 3.
Step 6 In the Address field, type the IP address for the JSA console or Event Collector.
Step 7 In the Service Port field, type 514.
Step 8 Click Add.
Step 9 Click Finish.
Creating a The process to configure logging for BIG-IP AFM requires that you create a
High-Speed Log high-speed logging destination.
Destination
Procedure
Step 1 From the navigation menu, select System > Logs > Configuration > Log
Destinations.
Step 2 Click Create.
Step 3 In the Name field, type a name for the destination.
For example, Logging_HSL_dest.
Step 4 In the Description field, type a description.
Step 5 From the Type list box, select Remote High-Speed Log.
Step 6 From the Pool Name list box, select a logging pool from the list of remote log
servers.
For example, Logging_Pool.
Step 7 From the Protocol list box, select TCP.
Step 8 Click Finish.
Configuring DSMs
F5 Networks BIG-IP AFM 251
Creating a Formatted The formatted log destination allows you to specify any special formatting required
Log Destination on the events forwarded to the high-speed logging destination.
Procedure
Step 1 From the navigation menu, select System > Logs > Configuration > Log
Destinations.
Step 2 Click Create.
Step 3 In the Name field, type a name for the logging format destination.
For example, Logging_Format_dest.
Step 4 In the Description field, type a description.
Step 5 From the Type list box, select Remote Syslog.
Step 6 From the Syslog Format list box, select Syslog.
Step 7 From the High-Speed Log Destination list box, select your high-speed logging
destination.
For example, Logging_HSL_dest.
Step 8 Click Finished.
Creating a Log Creating a publisher allows the BIG-IP appliance to publish the formatted log
Publisher message to the local syslog database.
Procedure
Step 1 From the navigation menu, select System > Logs > Configuration > Log
Publishers.
Step 2 Click Create.
Step 3 In the Name field, type a name for the publisher.
For example, Logging_Pub.
Step 4 In the Description field, type a description.
Step 5 From the Destinations field, in the Available list, select the log destination name
you created in Step 3 and click << to add items to the Selected list.
This moves your logging format destination from the Available list to the Selected
list. To include local logging in your publisher configuration, you can add local-db
and local-syslog to the Selected list.
Configuring DSMs
252 F5 NETWORKS
Creating a Logging Logging profiles allow you to configure the types of events that your Advanced
Profile Firewall Manager is producing and associates your events with the logging
destination.
Procedure
Step 1 From the navigation menu, select Security > Event Logs > Logging Profile.
Step 2 Click Create.
Step 3 In the Name field, type a name for the log profile.
For example, Logging_Profile.
Step 4 In the Network Firewall field, select the Enabled check box.
Step 5 From the Publisher list box, select the log publisher you configured.
For example, Logging_Pub.
Step 6 In the Log Rule Matches field, select the Accept, Drop, and Reject check boxes.
Step 7 In the Log IP Errors field, select the Enabled check box.
Step 8 In the Log TCP Errors field, select the Enabled check box.
Step 9 In the Log TCP Events field, select the Enabled check box.
Step 10 In the Storage Format field, from the list box, select Field-List.
Step 11 In the Delimiter field, type , (comma) as the delimiter for events.
Step 12 In the Storage Format field, select all of the options in the Available Items list and
click <<.
This moves the all Field-List options from the Available list to the Selected list.
Step 13 In the IP Intelligence pane, from the Publisher list box, select the log publisher you
configured.
For example, Logging_Pub.
Step 14 Click Finished.
Associate the Profile The log profile you created must be associated with a virtual server in the Security
to a Virtual Server Policy tab. This allows the virtual server to process your network firewall events,
along with local traffic.
Procedure
Step 1 From the navigation menu, select Local Traffic > Virtual Servers.
Step 2 Click the name of a virtual server to modify.
Step 3 From the Security tab, select Policies.
Step 4 From the Log Profile list box, select Enabled.
Step 5 From the Profile field, in the Available list, select Logging_Profile or the name
you specified in Step 3 and click <<.
This moves the Logging_Profile option from the Available list to the Selected list.
Configuring DSMs
F5 Networks BIG-IP AFM 253
Configuring a Log JSA automatically discovers and creates a log source for syslog events from F5
Source Networks BIG-IP AFM. However, you can manually create a log source for JSA to
receive syslog events. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select F5 Networks BIG-IP AFM.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your F5 BIG-IP AFM appliance.
Configuring DSMs
254 F5 NETWORKS
F5 Networks BIG-IP The F5 Networks BIG-IP Access Policy Manager (APM) DSM for JSA collects
APM access and authentication security events from a BIG-IP APM device using syslog.
Configure Remote To configure your BIG-IP LTM device to forward syslog events to a remote syslog
Syslog source, choose your BIG-IP APM software version:
Configuring DSMs
F5 Networks BIG-IP ASM 255
Configuring a Log JSA automatically discovers and creates a log source for syslog events from F5
Source Networks BIG-IP APM appliances. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select F5 Networks BIG-IP APM.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your F5 Networks BIG-IP APM
appliance.
F5 Networks BIG-IP The F5 Networks BIG-IP Application Security Manager (ASM) DSM for JSA
ASM collects web application security events from BIG-IP ASM appliances using syslog.
Configure F5 To forward syslog events from an F5 Networks BIG-IP ASM appliance to JSA, you
Networks BIG-IP ASM must configure a logging profile.
A logging profile allows you to configure remote storage for syslog events, which
can be forwarded directly to JSA.
Procedure
Step 1 Log in to the F5 Networks BIG-IP ASM appliance user interface.
Step 2 On the navigation pane, select Application Security > Options.
Configuring DSMs
256 F5 NETWORKS
NOTE
Note: If you do not want data logged locally as well as remotely, you must clear the
Local Storage check box.
NOTE
Note: Enabling the Guarantee Logging option ensures the system log requests
continue for the web application when the logging utility is competing for system
resources. Enabling the Guarantee Logging option can slow access to the
associated web application.
h Select the Report Detected Anomalies check box, to allow the system to log
details.
i Click Create.
The display refreshes with the new logging profile. The log source is added to JSA
as F5 Networks BIG-IP ASM events are automatically discovered. Events
forwarded by F5 Networks BIG-IP ASM are displayed on the Log Activity tab of
JSA.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from F5
Source Networks BIG-IP ASM appliances. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Configuring DSMs
F5 Networks BIG-IP LTM 257
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your F5 Networks BIG-IP ASM
appliance.
F5 Networks BIG-IP The F5 Networks BIG-IP Local Traffic Manager (LTM) DSM for JSA collects
LTM networks security events from a BIG-IP device using syslog.
Before receiving events in JSA, you must configure a log source for JSA, then
configure your BIG-IP LTM device to forward syslog events. We recommend you
create your log source before forward events as JSA does not automatically
discover or create log sources for syslog events from F5 BIG-IP LTM appliances.
Configuring a Log To integrate F5 BIG-IP LTM with JSA, you must manually create a log source to
Source receive syslog events.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select F5 Networks BIG-IP LTM.
Step 9 Using the Protocol Configuration list box, select Syslog.
Configuring DSMs
258 F5 NETWORKS
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your BIG-IP LTM appliance.
Configuring Syslog To configure your BIG-IP LTM device to forward syslog events, select your BIG-IP
Forwarding in BIG-IP LTM software version:
LTM
• Configuring Remote Syslog for F5 BIG-IP LTM 11.x
• Configuring Remote Syslog for F5 BIG-IP LTM 10.x
• Configuring Remote Syslog for F5 BIG-IP LTM 9.4.2 to 9.4.8
Configuring DSMs
F5 Networks FirePass 259
Where:
<Name> is the name of the F5 BIG-IP LTM syslog source.
<IP Address> is the IP address of JSA.
For example:
bigpipe syslog remote server {BIGIPsyslog {host 10.100.100.100}}
Step 3 Save the configuration changes:
bigpipe save
NOTE
Note: F5 Networks modified the syslog output format in BIG-IP v10.x to include the
use of local/ before the hostname in the syslog header. The syslog header
format containing local/ is not supported in JSA, but a workaround is available to
correct the syslog header. For more information, see
http://www.juniper.net/customers/support/.
F5 Networks The F5 Networks FirePass DSM for JSA collects system events from an F5
FirePass FirePass SSL VPN device using syslog.
Configuring DSMs
260 F5 NETWORKS
Configuring Syslog To forward syslog events from an F5 Networks BIG-IP FirePass SSL VPM
Forwarding for F5 appliance to JSA, you must enable and configure a remote log server.
FirePass
The remote log server can forward events directly to your JSA console or any
Event Collectors in your deployment.
Procedure
Step 1 Log in to the F5 Networks FirePass Admin console.
Step 2 On the navigation pane, select Device Management > Maintenance > Logs.
Step 3 From the System Logs menu, select the Enable Remote Log Server check box.
Step 4 From the System Logs menu, clear the Enable Extended System Logs check
box.
Step 5 In the Remote host parameter, type the IP address or hostname of your JSA.
Step 6 From the Log Level list box, select Information.
The Log Level parameter monitors application level system messages.
Step 7 From the Kernel Log Level list box, select Information.
The Kernel Log Level parameter monitors Linux kernel system messages.
Step 8 Click Apply System Log Changes.
The changes are applied and the configuration is complete. The log source is
added to JSA as F5 Networks FirePass events are automatically discovered.
Events forwarded to JSA by F5 Networks BIG-IP ASM are displayed on the Log
Activity tab in JSA.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from F5
Source Networks FirePass appliances. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select F5 Networks FirePass.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Configuring DSMs
F5 Networks FirePass 261
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your F5 Networks FirePass
appliance.
Configuring DSMs
F5 Networks FirePass 262
Configuring DSMs
41 FAIR WARNING
The Fair Warning DSM for Juniper Secure Analytics (JSA) retrieves event files
from a remote source using the log file protocol.
JSA records event categories from the Fair Warning log files about user activity
related to patient privacy and security threats to medical records. Before you can
retrieve log files from Fair Warning, you must verify your device is configured to
generate an event log. Instructions for generating the event log can be found in
your Fair Warning documentation.
When configuring the log file protocol, make sure the hostname or IP address
configured in the Fair Warning system is the same as configured in the Remote
Host parameter in the Log File Protocol configuration.
Configuring a Log You can configure JSA to download an event log from a Fair Warning device.
Source
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Fair Warning.
Step 9 Select the Log File option from the Protocol Configuration list box.
Step 10 In the FTP File Pattern field, type a regular expression that matches the log files
generated by the Fair Warning system.
Step 11 In the Remote Directory field, type the path to the directory containing logs from
your Fair Warning device.
Step 12 From the Event Generator list box, select Fair Warning.
Step 13 Click Save.
Configuring DSMs
264 FAIR WARNING
Configuring DSMs
42 FIDELIS XPS
The Fidelis XPS DSM for Juniper Secure Analytics (JSA) accepts events
forwarded in Log Enhanced Event Protocol (LEEF) from Fidelis XPS appliances
using syslog.
Supported Event JSA is capable of collecting all relevant alerts triggered by policy and rule violations
Types configured on your Fidelis XPS appliance.
Event Type Format Fidelis XPS must be configured to generate events in Log Enhanced Event
Protocol (LEEF) and forward these events using syslog. The LEEF format consists
of a pipe ( | ) delimited syslog header and tab separated fields in the event payload.
If the syslog events forwarded from your Fidelis XPS is not formatted as described
above, you must examine your device configuration or software version to ensure
your appliance supports LEEF. Properly formatted LEEF event messages are
automatically discovered and added as a log source to JSA.
Configuring Fidelis You can configure syslog forwarding of alerts from your Fidelis XPS appliance.
XPS
Procedure
Step 1 Log in to CommandPost to manage your Fidelis XPS appliance.
Step 2 From the navigation menu, select System > Export.
A list of available exports is displayed. If this is the first time you have used the
export function, the list is empty.
Step 3 Select one of the following options:
• Click New to create a new export for your Fidelis XPS appliance.
• Click Edit next to an export name to edit an existing export on your Fidelis XPS
appliance.
The Export Editor is displayed.
Step 4 From the Export Method list box, select Syslog LEEF.
Step 5 In the Destination field, type the IP address or host name for JSA.
For example, 10.10.10.100:::514
This field does not support non-ASCII characters.
Configuring DSMs
266 FIDELIS XPS
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source Fidelis XPS. However, you can manually create a log source for JSA to receive
syslog events. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Fidelis XPS.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Fidelis XPS appliance.
Configuring DSMs
267
Configuring DSMs
268 FIDELIS XPS
Configuring DSMs
43 FIREEYE
The FireEye DSM for Juniper Secure Analytics (JSA) accepts rsyslog events in
Log.
This DSM applies to FireEye CMS, MPS, eMPS, and MA appliances. JSA records
all relevant notification alerts that are sent by FireEye appliances.
Table 43-1 identifies the specifications for the FireEye DSM.
Table 43-1 FireEye DSM Specifications
Specification Value
Manufacturer FireEye
DSM name FireEye MPS
RPM file name DSM-FireEyeMPS-QRadar_release-Build_number.n
oarch.rpm
Supported CMS, MPS, eMPS. and MA v5.1 patch level
versions 5
Protocol Syslog
JSA recorded All relevant events
event types
Automatically Yes
discovered?
Includes identity No
More information FireEye website
(www.fireeye.com)
Configuring DSMs
270 FIREEYE
1 If automatic updates are not enabled, download and install the FireEye MPS RPM
on your JSA console.
2 For each instance of FireEye in your deployment, configure the FireEye system to
forward events to JSA.
3 For each instance of FireEye, create an FireEye log source on the JSA console.
Configuring your To enable FireEye to communicate with JSA, you must configure your FireEye
FireEye System to appliance to forward syslog events.
Communicate with
JSA Procedure
Configuring DSMs
Configuring your FireEye System to Communicate with JSA 271
Configuring a JSA automatically creates a log source after your JSA console receives FireEye
FireEye Log Source events. If JSA does not automatically discover FireEye events, you can manually
in JSA add a log source for each instance from which you want to collect event logs.
Procedure
1 Log in to JSA.
2 Click the Admin tab.
3 On the navigation menu, click Data Sources.
4 Click the Log Sources icon.
5 Click Add.
6 From the Log Source Type list, select FireEye.
7 Using the Protocol Configuration list, select Syslog.
8 In the Log Source Identifier field, type the IP address or host name of the FireEye
appliance.
9 Configure the remaining parameters.
10 Click Save.
11 On the Admin tab, click Deploy Changes.
Configuring DSMs
272 FIREEYE
Configuring DSMs
44 FORESCOUT COUNTERACT
The ForeScout CounterACT DSM for Juniper Secure Analytics (JSA) accepts Log
Extended Event Format (LEEF) events from CounterACT using syslog.
Configuring a Log To integrate ForeScout CounterACT with JSA, you must manually create a log
Source source to receive policy-based syslog events.
JSA does not automatically discover or create log sources for syslog events from
ForeScout CounterACT appliances.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select ForeScout CounterACT.
Step 9 Using the Protocol Configuration list box, select Syslog.
Configuring DSMs
274 FORESCOUT COUNTERACT
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your ForeScout CounterACT
appliance.
Configure ForeScout Before configuring JSA, you must install a plug-in for your ForeScout CounterACT
CounterACT appliance and configure ForeScout CounterACT to forward syslog events to JSA.
Procedure
Step 1 From the ForeScout website, download the plug-in for ForeScout CounterACT.
Step 2 Log in to your ForeScout CounterACT appliance.
Step 3 From the CounterACT console toolbar, select Options > Plugins > Install and
select the location of the plug-in file.
The plug-in is installed and displayed in the Plugins pane.
Step 4 From the Plugins pane, select the JSA plug-in and click Configure.
The Add JSA wizard is displayed.
Step 5 In the Server Address field, type IP address of JSA.
Step 6 From the Port list box, select 514.
Step 7 Click Next.
Step 8 From the Assigned CounterACT devices pane, choose one of the following
options:
• Default Server - Select this option to make all devices on this ForeScout
CounterACT forward events to JSA.
• Assign CounterACT devices - Select this option to assign which individual
devices running on ForeScout CounterACT forward events to JSA. The Assign
CounterACT devices option is only available if you have one or more ForeScout
CounterACT server.
Step 9 Click Finish.
Configuring DSMs
275
The plug-in configuration is complete. You are now ready to define the events
forwarded to JSA by ForeScout CounterACT policies.
The plug-in provides an additional action for policies to forward the event to the
JSA using syslog. To forward events to JSA, you must define a CounterACT policy
that includes the JSA update action. The policy condition must be met at least
once to initiate an event to JSA. You must configure each policy to send updates to
JSA for events you want to record.
Procedure
Step 1 Select a policy for ForeScout CounterACT.
Step 2 From the Actions tree, select Audit > Send Updates to JSA Server.
Step 3 From the Contents tab, configure the following values:
a Select the Send host property results check box.
b Choose one of the type of events to forward for the policy:
- Send All - Select this option to include all properties discovered for the
policy to JSA.
- Send Specific - Select this option to select and send only specific properties
for the policy to JSA.
c Select the Send policy status check box.
Step 4 From the Trigger tab, select the interval ForeScout CounterACT uses for
forwarding the event to JSA:
• Send when the action starts - Select this check box to send a single event to
JSA when the conditions of your policy are met.
• Send when information is updated - Select this check box to send a report
when there is a change in the host properties specified in the Contents tab.
• Send periodically every - Select this check box to send a reoccurring event to
JSA on an interval if the policy conditions are met.
Step 5 Click OK to save the policy changes.
Step 6 Repeat this process to configure any additional policies with an action to send
updates to JSA, if required.
The configuration is complete. Events forwarded by ForeScout CounterACT are
displayed on the Log Activity tab of JSA.
Configuring DSMs
45 FORTINET FORTIGATE
The Fortinet FortiGate DSM for Juniper Secure Analytics (JSA) records all relevant
FortiGate IPS/Firewall events using syslog.
Table 45-1 identifies the specifications for the Fortinet FortiGate DSM.
Fortinet FortiGate To integrate Fortinet FortiGate DSM with JSA, use the following procedures:
DSM Integration
Process
1 Download and install the most recent Fortinet FortiGate RPM to your JSA console.
If automatic updates are enabled, this procedure is not required. RPMs need to be
installed only one time.
2 Optional. Install the Syslog Redirect protocol RPM to collect events through
Fortigate FortiAnalyzer. When you use the Syslog Redirect protocol, JSA can
identify the specific Fortigate firewall that sent the event. You can use the
procedure to manually install a DSM to install a protocol.
Configuring DSMs
278 FORTINET FORTIGATE
3 Configure your Fortinet FortiGate system to enable communication with JSA. This
procedure must be performed for each instance of Fortinet FortiGate. For more
information on configuring a Fortinet FortiGate device, see your vendor
documentation.
4 For each Fortinet FortiGate server you want to integrate, create a log source on
the JSA console. If JSA automatically discovers the DSM, this step is not required.
Related tasks
• Manually Installing a DSM
• Configuring a Fortinet FortiGate Log Source
Configuring a JSA automatically discovers and creates a log source for syslog events from
Fortinet FortiGate Fortinet FortiGate. The following configuration steps are optional.
Log Source
Procedure
To configure a Fortinet FortiGate log source:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list, select Fortinet FortiGate Security Gateway.
Step 9 Using the Protocol Configuration list, select one of the following options:
• Select Syslog.
• To configure JSA to receive FortiAnalyzer events, select Syslog Redirect.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier devname=([\w-]+)
RegEx
Listen Port 517
Protocol UDP
Configuring DSMs
46 FOUNDRY FASTIRON
You can integrate a Foundry FastIron device with Juniper Secure Analytics (JSA)
to collect all relevant events using syslog.
Configure Syslog for To integrate JSA with a Foundry FastIron RX device, you must configure the
Foundry FastIron appliance to forward syslog events.
Procedure
Step 1 Log in to the Foundry FastIron device command-line interface (CLI).
Step 2 Type the following command to enable logging:
logging on
Local syslog is now enabled with the following defaults:
• Messages of all syslog levels (Emergencies - Debugging) are logged.
• Up to 50 messages are retained in the local syslog buffer.
• No syslog server is specified.
Step 3 Type the following command to define an IP address for the syslog server:
logging host <IP Address>
Where <IP Address> is the IP address of your JSA.
You are now ready to configure the log source in JSA.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source Foundry FastIron. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Configuring DSMs
280 FOUNDRY FASTIRON
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Foundry FastIron.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Foundry FastIron appliance.
Configuring DSMs
47 GENERIC FIREWALL
The generic firewall server DSM for Juniper Secure Analytics (JSA) accepts events
using syslog. JSA records all relevant events.
Configuring Event To configure JSA to interpret the incoming generic firewall events:
Properties
Step 1 Forward all firewall logs to your JSA.
For information on forwarding firewall logs from your generic firewall to JSA, see
your firewall vendor documentation.
Step 2 Open the following file:
/opt/qradar/conf/genericFirewall.conf
Make sure you copy this file to systems hosting the Event Collector and the JSA
console.
Step 3 Restart the Tomcat server:
service tomcat restart
A message is displayed indicating that the Tomcat server has restarted.
Step 4 Enable or disable regular expressions in your patterns by setting the
regex_enabled property accordingly. By default, regular expressions are disabled.
For example:
regex_enabled=false
When you set the regex_enabled property to false, the system generates regular
expressions based on the tags you entered while attempting to retrieve the
corresponding data values from the logs.
When you set the regex_enabled property to true, you can define custom regex to
control patterns. These regex are directly applied to the logs and the first captured
group is returned. When defining custom regex patterns, you must adhere to regex
rules, as defined by the Java programming language. For more information, see
the following website: http://download.oracle.com/javase/tutorial/essential/regex/
To integrate a generic firewall with JSA, make sure you specify the classes directly
instead of using the predefined classes. For example, the digit class (/\d/)
becomes /[0-9]/. Also, instead of using numeric qualifiers, re-write the
expression to use the primitive qualifiers (/?/,/*/ and /+/).
Configuring DSMs
282 GENERIC FIREWALL
Configuring DSMs
283
NOTE
Note: Patterns are case insensitive and you can add multiple patterns. For multiple
patterns, separate using a # symbol.
Configuring a Log To integrate generic firewalls with JSA, you must manually create a log source to
Source receive the events as JSA does not automatically discover or create log sources
for events from generic firewall appliances.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
The Data Sources panel is displayed.
Step 4 Click the Log Sources icon.
The Log Sources window is displayed.
Step 5 Click Add.
The Add a log source window is displayed.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Configurable Firewall Filter.
Step 9 Using the Protocol Configuration list box, select Syslog.
The syslog protocol configuration is displayed.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your generic firewall appliance.
Configuring DSMs
284
Configuring DSMs
48 GENERIC AUTHORIZATION SERVER
The generic authorization server DSM for Juniper Secure Analytics (JSA) records
all relevant generic authorization events using syslog.
Configuring Event To configure JSA to interpret the incoming generic authorization events:
Properties
Step 1 Forward all authentication server logs to your JSA system.
For information on forwarding authentication server logs to JSA, see your generic
authorization server vendor documentation.
Step 2 Open the following file:
/opt/qradar/conf/genericAuthServer.conf
Make sure you copy this file to systems hosting the Event Collector and the
console.
Step 3 Restart the Tomcat server:
service tomcat restart
A message is displayed indicating that the Tomcat server has restarted.
Step 4 Enable or disable regular expressions in your patterns by setting the
regex_enabled property accordingly. By default, regular expressions are disabled.
For example:
regex_enabled=false
When you set the regex_enabled property to false, the system generates regular
expressions (regex) based on the tags you entered while attempting to retrieve the
corresponding data values from the logs.
When you set the regex_enabled property to true, you can define custom regex to
control patterns. These regex are directly applied to the logs and the first captured
group is returned. When defining custom regex patterns, you must adhere to regex
rules, as defined by the Java programming language. For more information, see
the following website: http://download.oracle.com/javase/tutorial/essential/regex/
To integrate the generic authorization server with JSA, make sure you specify the
classes directly instead of using the predefined classes. For example, the digit
class (/\d/) becomes /[0-9]/. Also, instead of using numeric qualifiers,
re-write the expression to use the primitive qualifiers (/?/,/*/ and /+/).
Configuring DSMs
286 GENERIC AUTHORIZATION SERVER
Configuring DSMs
287
Step 11 Review the file to determine a pattern, if present, for source IP address and source
port.
For example, if your authentication server generates the following log message:
Jun 27 12:11:21 expo sshd[19926]: Accepted password for root
from 10.100.100.109 port 1727 ssh2
The pattern for source IP address is from and the pattern for source port is port.
Step 12 Add an entry to the file for source IP address and source port:
source_ip_pattern=<source IP pattern>
source_port_pattern=<source port pattern>
Where <source IP pattern> and <source port pattern> are the patterns
identified in Step 11 for source IP address and source port.
For example:
source_ip_pattern=from
source_port_pattern=port
Step 13 Review the file to determine if a pattern exists for username.
For example:
Jun 27 12:11:21 expo sshd[19926]: Accepted password for root
from 10.100.100.109 port 1727 ssh2
The pattern for username is for.
Step 14 Add an entry to the file for the username pattern:
For example:
user_name_pattern=for
You are now ready to configure the log source in JSA.
Configure a Log To integrate generic authorization appliance event with JSA, you must manually
Source create a log source to receive the events as JSA does not automatically discover
or create log sources for events from generic authorization appliances.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Configurable Authentication
message filter.
Configuring DSMs
288 GENERIC AUTHORIZATION SERVER
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your generic authorization
appliance.
Configuring DSMs
49 GREAT BAY BEACON
The Great Bay Beacon DSM for Juniper Secure Analytics (JSA) supports syslog
alerts from the Great Bay Beacon Endpoint Profiler.
JSA records all relevant endpoint security events. Before you can integrate with
JSA, you must configure your Great Bay Beacon Endpoint Profiler to forward
syslog event messages to JSA.
Configuring Syslog You can configure your Great Bay Beacon Endpoint Profiler to forward syslog
for Great Bay Beacon events.
Procedure
Step 1 Log in to your Great Bay Beacon Endpoint Profiler.
Step 2 To create an event, select Configuration > Events > Create Events.
A list of currently configured events is displayed.
Step 3 From the Event Delivery Method pane, select the Syslog check box.
Step 4 To apply your changes, select Configuration Apply Changes > Update
Modules.
Step 5 Repeat Step 2 to Step 4 to configure all of the events you want to monitor in JSA.
Step 6 Configure JSA as an external log source for your Great Bay Beacon Endpoint
Profiler.
For information on configuring JSA as an external log source, see the Great Bay
Beacon Endpoint Profiler Configuration Guide.
Configuring a log JSA automatically discovers and creates a log source for syslog events from Great
source Bay Beacon. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Configuring DSMs
290 GREAT BAY BEACON
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Great Bay Beacon appliance.
Configuring DSMs
50 HBGARY ACTIVE DEFENSE
The HBGary Active Defense DSM for Juniper Secure Analytics (JSA) accepts
several event types forwarded from HBGary Active Defense devices, such as
access, system, system configuration, and policy events.
Events from Active Defense are forwarded in the Log Event Extended Format
(LEEF) to JSA using syslog. Before you can configure JSA, you must configure a
route for your HBGary Active Defense device to forward events to a syslog
destination.
Configuring HBGary You can configure a route for syslog events in Active Defense for JSA.
Active Defense
Procedure
Step 1 Log in to the Active Defense Management console.
Step 2 From the navigation menu, select Settings > Alerts.
Step 3 Click Add Route.
Step 4 In the Route Name field, type a name for the syslog route you are adding to Active
Defense.
Step 5 From the Route Type list box, select LEEF (Q1 Labs).
Step 6 In the Settings pane, configure the following values:
• Host - Type the IP address or hostname for your JSA console or Event
Collector.
• Port - Type 514 as the port number.
Step 7 In the Events pane, select any events you want to forward to JSA.
Step 8 Click OK to save your configuration changes.
The Active Defense device configuration is complete. You are now ready to
configure a log source in JSA. For more information on configuring a route in
Active Defense, see your HBGary Active Defense User Guide.
Configuring DSMs
292 HBGARY ACTIVE DEFENSE
Configuring a Log JSA automatically discovers and creates a log source for LEEF formatted syslog
Source events forwarded from Active Defense. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for the log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select HBGary Active Defense.
Step 9 From the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for your HBGary Active
Defense device.
The IP address or hostname identifies your HBGary Active
Defense device as a unique event source in JSA.
For more information on configuring log sources, see the Log Sources Users
Guide.
Step 11 Click Save.
Step 12 On the Admin tab, click Deploy Changes.
The HBGary Active Defense configuration is complete.
Configuring DSMs
51 HONEYCOMB LEXICON FILE
INTEGRITY MONITOR (FIM)
You can use the Honeycomb Lexicon File Integrity Monitor (FIM) DSM with JSA to
collect detailed file integrity events from your network.
Configuration JSA supports syslog events that are forwarded from Lexicon File Integrity Monitor
Overview installations that use Lexicon mesh v3.1 and above. The syslog events that are
forwarded by Lexicon FIM are formatted as Log Extended Event Format (LEEF)
events by the Lexicon mesh service.
To integrate Lexicon FIM events with JSA, you must complete the following tasks:
1 On your Honeycomb installation, configure the Lexicon mesh service to generate
syslog events in LEEF.
2 On your Honeycomb installation, configure any Lexicon FIM policies for your
Honeycomb data collectors to forward FIM events to your JSA console or Event
Collector.
3 On your JSA console, verify that a Lexicon FIM log source is created and that
events are displayed on the Log Activity tab.
4 Optional. Ensure that no firewall rules block communication between your
Honeycomb data collectors and the JSA console or Event Collector that is
responsible for receiving events.
Supported The Honeycomb FIM DSM for JSA can collect events from several categories.
Honeycomb FIM
Event Types Logged Each event category contains low-level events that describe the action that is
by JSA taken within the event category. For example, file rename events might have a
low-level categories of either file rename successful or file rename failed.
The following list defines the event categories that are collected by JSA for
Honeycomb file integrity events:
• Baseline events
• Open file events
• Create file events
• Rename file events
• Modify file events
Configuring DSMs
294 HONEYCOMB LEXICON FILE INTEGRITY MONITOR (FIM)
JSA can also collect Windows and other log files that are forwarded from
Honeycomb Lexicon. However, any event that is not a file integrity event might
require special processing by a Universal DSM or a log source extension in JSA.
Configuring the To collect events in a format that is compatible with JSA, you must configure your
Lexicon Mesh Lexicon mesh service to generate syslog events in LEEF.
Service
Procedure
Step 1 Log in to the Honeycomb LexCollect system that is configured as the dbContact
system in your network deployment.
Step 2 Locate the Honeycomb installation directory for the installImage directory.
For example, c:\Program Files\Honeycomb\installImage\data.
Step 3 Open the mesh.properties file.
If your deployment does not contain Honeycomb LexCollect, you can edit
mesh.properties manually.
For example, c:\Program Files\mesh
Step 4 To export syslog events in LEEF, edit the formatter field.
For example, formatter=leef.
Step 5 Save your changes.
The mesh service is configured to output LEEF events. For information about the
Lexicon mesh service, see your Honeycomb documentation.
Configuring a JSA automatically discovers and creates a log source for file integrity events that
Honeycomb Lexicon are forwarded from the Honeycomb Lexicon File Integrity Monitor. This procedure
FIM Log Source in is optional.
JSA
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 Optional. In the Log Source Description field, type a description for your log
source.
Configuring DSMs
295
Step 8 From the Log Source Type list box, select Honeycomb Lexicon File Integrity
Monitor.
Step 9 From the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Honeycomb Lexicon FIM
installation.
The log source identifier must be unique value.
Enabled Select this check box to enable the log source. By default,
the check box is selected.
Credibility From the list box, select the credibility of the log source. The
range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector From the list box, select the Event Collector to use as the
target for the log source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Configuring DSMs
52 HP
HP ProCurve You can integrate an HP ProCurve device with JSA to record all relevant HP
Procurve events using syslog.
Configuring Syslog You can configure your HP ProCurve device to forward syslog events to Juniper
for HP ProCurve Secure Analytics (JSA)
Procedure
Step 1 Log into the HP ProCurve device.
Step 2 Type the following command to make global configuration level changes.
config
If successful, the CLI will change to ProCurve(config)# as the prompt.
Step 3 Type the following command to logging <syslog-ip-addr>
Where <syslog-ip-addr> is the IP address of the JSA.
Step 4 To exit config mode, press CTRL+Z.
Step 5 Type write mem to save the current configuration to the startup configuration for
your HP ProCurve device.
You are now ready to configure the log source in JSA.
Configuring a Log JSA automatically discovers and creates a log source for LEEF formatted syslog
Source events forwarded from Active Defense. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Configuring DSMs
298 HP
Parameter Description
Log Source Identifier Type the IP address or hostname for your HP ProCurve
device.
HP Tandem You can integrate an HP Tandem device with JSA. An HP Tandem device accepts
SafeGuard Audit file events using a log file protocol source.
A log file protocol source allows JSA to retrieve archived log files from a remote
host. The HP Tandem DSM supports the bulk loading of log files using the log file
protocol source.
When configuring your HP Tandem device to use the log file protocol, make sure
the hostname or IP address configured in the HP Tandem device is the same as
configured in the Remote Host parameter in the Log File Protocol configuration.
You are now ready to configure the log source and protocol in JSA:
Procedure
Step 1 From the Log Source Type list box, select HP Tandem.
Step 2 To configure the log file protocol, from the Protocol Configuration list box, select
Log File.
Configuring DSMs
Hewlett Packard UNIX (HP-UX) 299
NOTE
Note: Your system must be running the latest version of the log file protocol to
integrate with an HP Tandem device:
For the full list of Log File protocol parameters, see the Log Sources Users Guide.
For more information about HP Tandem see your vendor documentation.
Hewlett Packard You can integrate an HP-UX device with JSA. An HP-UX DSM accepts events
UNIX (HP-UX) using syslog.
Configuring Syslog You can configure syslog on your HP-UX device to forward events to JSA.
for HP-UX
Procedure
Step 1 Log in to the HP-UX device command-line interface.
Step 2 Open the following file:
/etc/syslog.conf
Step 3 Add the following line:
<facility>.<level> <destination>
Where:
<facility> is auth.
<level> is info.
<destination> is the IP address of the JSA.
Step 4 Save and exit the file.
Step 5 Type the following command to ensure that syslogd enforces the changes to the
syslog.conf file.
kill -HUP ‘cat /var/run/syslog.pid‘
NOTE
Note: The above command is surrounded with back quotation marks.
Configure a Log JSA automatically discovers and creates a log source for syslog events forwarded
Source from HP-UX. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Configuring DSMs
300 HP
Parameter Description
Log Source Identifier Type the IP address or hostname for your Hewlett Packard
UniX device.
Configuring DSMs
53 HUAWEI
Huawei AR Series The Huawei AR Series Router DSM for Juniper Secure Analytics (JSA) can accept
Router events from Huawei AR Series Routers using syslog.
JSA records all relevant IPv4 events forwarded from Huawei AR Series Router. To
integrate your device with JSA, you must create a log source, then configure your
AR Series Router to forward syslog events.
Supported Routers The DSM supports events from the following Huawei AR Series Routers:
• AR150
• AR200
• AR1200
• AR2200
• AR3200
Configuring a Log JSA does not automatically discover incoming syslog events from Huawei AR
Source Series Routers.
If your events are not automatically discovered, you must manually create a log
source from the Admin tab in JSA.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Configuring DSMs
302 HUAWEI
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Huawei AR Series Router.
Step 9 From the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address, host name, or name for the log source
as an identifier for your Huawei AR Series Router.
Each log source you create for your Huawei AR Series
Router should include a unique identifier, such as an IP
address or host name.
Configuring Your To forward syslog events to JSA, you must configure your Huawei AR Series
Huawei AR Series Router as an information center, then configure a log host.
Router
The log host you create for your Huawei AR Series Router should forward events
to your JSA console or an Event Collector.
Procedure
Step 1 Log in to your Huawei AR Series Router command-line Interface (CLI).
Step 2 Type the following command to access the system view:
system-view
Step 3 Type the following command to enable the information center:
info-center enable
Step 4 Type the following command to send informational level log messages to the
default channel:
info-center source default channel loghost log level
informational debug state off trap state off
Step 5 Optional. To verify your Huawei AR Series Router source configuration, type the
command:
display channel loghost
Step 6 Type the following command to configure the IP address for JSA as the loghost for
your switch:
info-center loghost <IP address> facility <local>
Configuring DSMs
Huawei S Series Switch 303
Where:
<IP address> is the IP address of the JSA console or Event Collector.
<local> is the syslog facility, for example, local0.
For example,
info-center loghost 10.10.10.1 facility local0
Step 7 Type the following command to exit the configuration:
quit
The configuration is complete. You can verify events forwarded to JSA by viewing
events on the Log Activity tab.
Huawei S Series The Huawei S Series Switch DSM for JSA can accept events from Huawei S
Switch Series Switch appliances using syslog.
JSA records all relevant IPv4 events forwarded from Huawei S Series Switches. To
integrate your device with JSA, you must configure a log source, then configure
your S Series Switch to forward syslog events.
Supported Switches The DSM supports events from the following Huawei S Series Switches:
• S5700
• S7700
• S9700
Configuring a Log JSA does not automatically discover incoming syslog events from Huawei S Series
Source Switches.
If your events are not automatically discovered, you must manually create a log
source from the Admin tab in JSA.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Huawei S Series Switch.
Step 9 From the Protocol Configuration list box, select Syslog.
Configuring DSMs
304 HUAWEI
Parameter Description
Log Source Identifier Type the IP address, host name, or name for the log source
as an identifier for your Huawei S Series switch.
Each log source you create for your Huawei S Series switch
should include a unique identifier, such as an IP address or
host name.
Configuring Your To forward syslog events to JSA, you must configure your Huawei S Series Switch
Huawei S Series as an information center, then configure a log host.
Switch
The log host you create for your Huawei S Series Switch should forward events to
your JSA console or an Event Collector.
Procedure
Step 1 Log in to your Huawei S Series Switch command-line Interface (CLI).
Step 2 Type the following command to access the system view:
system-view
Step 3 Type the following command to enable the information center:
info-center enable
Step 4 Type the following command to send informational level log messages to the
default channel:
info-center source default channel loghost log level
informational debug state off trap state off
Step 5 Optional. To verify your Huawei S Series Switch source configuration, type the
command:
display channel loghost
Step 6 Type the following command to configure the IP address for JSA as the loghost for
your switch:
info-center loghost <IP address> facility <local>
Where:
<IP address> is the IP address of the JSA console or Event Collector.
<local> is the syslog facility, for example, local0.
For example,
Configuring DSMs
Huawei S Series Switch 305
Configuring DSMs
54 IBM
Configuring DSMs
308 IBM
IBM AIX IBM offers two DSMs for Juniper Secure Analytics (JSA) that can collect and parse
audit or operating system events from IBM AIX®.
Available DSMs JSA can collect IBM AIX events with two available DSMs:
• IBM AIX Audit DSM - The IBM AIX Audit DSM collects detailed audit
information for events that occur on your IBM AIX appliance. IBM AIX provides
approximately 130 base audit events that you can collect.
JSA can collect audit events using one of the following protocols:
- Syslog - To use syslog to collect audit events in real-time, you must redirect
the audit log output to JSA.
- Log File - To use the log file protocol, you must install the audit.pl script on
your IBM AIX appliance and schedule the script to generate an event log file
that contains JSA readable audit events. You can then configure a log
source in JSA to retrieve your IBM AIX event logs. The shortest time period
you can configure to retrieve events with the log file protocol is a 15 minute
interval. Perl 5.8 or above is required on your IBM AIX appliance to use the
audit script.
• IBM AIX Server DSM - The IBM AIX Server DSM collects operating system
and authentication events using syslog for users that interact or log in to your
IBM AIX appliance. Events can include:
- Login or logoff events
- Session opened or session closed events
- Accepted password and failed password events
- Operating system events
Configuring DSMs
IBM AIX 309
Configuration IBM AIX supports multiple DSMs for events and methods for event collection.
Overview
Consider the following information when configuring JSA:
• To collect audit events using the IBM AIX Audit DSM, you must select one of the
following configuration options:
- Configuring Syslog for the IBM AIX Audit DSM
- Configuring the Log File Protocol for the IBM AIX Audit DSM
• To collect system authentication events using the IBM AIX Server DSM, you
must complete the system authentication syslog configuration. For more
information, see Configuring the IBM AIX Server DSM.
Configuring Syslog To collect audit events with syslog using the IBM AIX Audit DSM, you must redirect
for the IBM AIX Audit your audit log output from your IBM AIX appliance to JSA.
DSM
You can configure the events generated by IBM AIX appliances for JSA and
enable or disable classes in the audit configuration. The default classes configured
in IBM AIX captures a large number of audit events. To prevent performance
issues, you can tune your IBM AIX appliance and reduce the number of classes
collected per your network security policy. For more information on the audit
classes, see your IBM AIX appliance documentation.
Procedure
Step 1 Log in to your IBM AIX appliance.
Step 2 Edit the audit configuration file:
/etc/security/audit/config
Step 3 In the Start section of the audit file, edit the configuration to disable binmode and
enable streammode.
For example,
binmode = off
streammode = on
Step 4 In the Classes section of the audit file, edit the configuration to determine which
classes are audited.
Step 5 Save the configuration changes.
Step 6 Edit the streamcmds configuration file on your IBM AIX appliance:
/etc/security/audit/streamcmds
Step 7 Add the following command to your streamcmds file:
/usr/sbin/auditstream | auditpr -h eclrRdi | /usr/bin/logger -p
local0.debug &
Step 8 Save the configuration changes.
Step 9 Edit the syslog configuration file to include a debug entry and the location of JSA.
Configuring DSMs
310 IBM
For example,
*.debug @<JSA>
Where <JSA> is the IP address of your JSA console or Event Collector. A tab must
separate *.debug and the IP address of JSA.
Step 10 Save the configuration changes.
Step 11 Type the following command to reload your syslog configuration:
refresh -s syslogd
Step 12 Type the following command to start the audit script on your IBM AIX appliance:
audit start
The configuration is complete. The IBM AIX Audit DSM automatically discovers
syslog audit events that are forwarded from IBM AIX to JSA. If the events are not
automatically discovered, you can manually configure a log source.
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your log source.
Step 5 From the Log Source Type list box, select IBM AIX Audit.
Step 6 Using the Protocol Configuration list box, select Syslog.
Step 7 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your IBM AIX.
Enabled Select this check box to enable the log source.
By default, the check box is selected.
Credibility Select the credibility of the log source. The range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector Select the Event Collector to use as the target for the log
source.
Configuring DSMs
IBM AIX 311
Parameter Description
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Configuring the Log The log file protocol retrieves the event log created by the audit.pl script.
File Protocol for the
IBM AIX Audit DSM About this task
You can schedule the audit.pl script to run each time you want to convert your IBM
AIX audit logs to a readable event log format for JSA.
The audit script determines which audit logs to read based on the configuration of
your audit configuration file in the /etc/security/audit/config directory on your IBM
AIX appliance. The audit configuration allows you to identify the event classes that
are audited and folder location for the event log file on your IBM AIX appliance.
The audit script converts binary logs on your IBM AIX appliance to single line
events that are readable by JSA. The log file protocol then retrieves the event log
from your IBM AIX appliance and imports the events to JSA.
The default classes configured in IBM AIX captures a large number of audit
events. You can configure the classes in the audit configuration on your IBM AIX
system to prevent performance issues. For information on configuring audit
classes, see your IBM AIX documentation.
Configuring DSMs
312 IBM
Procedure
Step 1 Log in to your IBM AIX appliance.
Step 2 Edit the following audit configuration file:
/etc/security/audit/config
Step 3 In the Start section of the audit file, edit the configuration to enable binmode.
For example,
binmode = on
Step 4 In the Start section of the audit file, edit the configuration to determine which
directories contain the binary audit logs.
In most cases, you do not have to edit the binary file (bin1 and bin2) directories.
For example, the default configuration for IBM AIX auditing writes binary logs to
the following directories:
trail = /audit/trail
bin1 = /audit/bin1
bin2 = /audit/bin2
binsize = 10240
cmds = /etc/security/audit/bincmds
Step 5 In the Classes section of the audit file, edit the configuration to determine which
classes are audited.
For information on configuring classes, see your IBM AIX documentation.
Step 6 Save the configuration changes.
Step 7 Type the following command to start auditing on your IBM AIX system:
audit start
You are now ready to install the audit script.
Configuring DSMs
IBM AIX 313
Procedure
Step 1 Download the following archive file from http://www.juniper.net/customers/support/
audit.pl.gz
Step 2 Copy the audit script to a folder on your IBM AIX appliance.
Step 3 Type the following command to extract the file:
tar -zxvf audit.pl.gz
Step 4 Type the following command, and include additional command parameters to start
the audit script:
./audit.pl
Table 54-2 Command Parameters
Parameters Description
-r The -r parameter defines the results directory where the audit script
writes event log files for JSA.
If you do not specify a results directory, the script writes the events to
the following directory:
/audit/results/
The directory you specify for your audit result files is required in the
Remote Directory field when you configure a log source using the log
file protocol.
Note: To prevent errors, verify that your results directory exists on your
IBM AIX system.
-n The -n parameter allows you to define a unique name for the event log
file generated by audit.pl. By default, audit files are processed as
AIX_AUDIT_<timestamp>.
The value you specify using the -n parameter is required by the FTP
File Pattern field to identify the event logs the log source must retrieve
in JSA
-l The -l parameter defines the name of the last record file. By default, the
last record file is named lastrecord.txt.
The audit script uses last record file to determine the last event
processed. The last record file ensures duplicate events are not added
to the results file.
-m The -m parameter defines the maximum number of audit files to retain
on your IBM AIX system. By default, the script retains 30 audit files.
When the number of audit files exceeds the value of the -m parameter,
the script deletes the audit file with the oldest timestamp.
-t The -t parameter defines the directory that contains the audit trail file.
The default is /audit/trail.
-h The -h parameter displays the help and usage information.
-v The -v parameter displays the script version information.
Configuring DSMs
314 IBM
You are now ready to configure a log source for IBM AIX in JSA.
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for the log source.
Step 5 In the Log Source Description field, type a description for the log source.
Step 6 From the Log Source Type list box, select IBM AIX Audit.
Step 7 From the Protocol Configuration list box, select Log File.
Step 8 Configure the following values:
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names allow JSA to identify a
log file to a unique event source.
Service Type From the list box, select the protocol you want to use to
retrieve log files from a remote server. The default is SFTP.
• SFTP - SSH File Transfer Protocol
• FTP - File Transfer Protocol
• SCP - Secure Copy
Note: The underlying protocol used to retrieve log files for the
SCP and SFTP service type requires that the server specified
in the Remote IP or Hostname field has the SFTP subsystem
enabled.
Remote IP or Type the IP address or host name of the IBM AIX appliance or
Hostname remote host that contains your event log files.
Configuring DSMs
IBM AIX 315
Parameter Description
Remote Port Type the port number for the protocol selected to retrieve the
event logs from your IBM AIX appliance. The valid range is 1
to 65535.
The options include:
• FTP - TCP Port 21
• SFTP - TCP Port 22
• SCP - TCP Port 22
Note: If the host for your event files is using a non-standard
port number for FTP, SFTP, or SCP, adjust the port value
accordingly.
Remote User Type the user name required to log in to the IBM AIX
appliance that contains your audit event logs.
The username can be up to 255 characters in length.
Remote Password Type the password to log in to your IBM AIX appliance.
Confirm Password Confirm the password to log in to your IBM AIX appliance
SSH Key File If you select SCP or SFTP as the Service Type, use this
parameter to define an SSH private key file. When you
provide an SSH Key File, the Remote Password field is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive parameter is ignored if you configure SCP as
the Service Type.
Configuring DSMs
316 IBM
Parameter Description
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All files that match the regular expression are
retrieved and processed.
The FTP file pattern must match the name you assigned to
your AIX audit files by the -n parameter of the audit script. For
example, to collect files that start with AIX_AUDIT and end
with your timestamp value, type the following value:
AIX_Audit_*
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only displays if you select FTP as the Service
Type. From the list box, select ASCII.
ASCII is required for text event logs retrieved by the log file
protocol using FTP.
SCP Remote File If you select SCP as the Service Type, type the file name of
the remote file.
Start Time Type a time value to represent the time of day you want the
log file protocol to start. Type the start time, based on a 24
hour clock, in the following format: HH:MM.
For example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence parameter
value to establish when and how often the Remote Directory
on your IBM AIX appliance is scanned for new event log files.
Recurrence Type the frequency that you want to scan the remote directory
on your IBM AIX appliance for new event log files. Type this
value in hours (H), minutes (M), or days (D).
For example, type 2H to scan the remote directory every 2
hours from the start time. The default is 1H and the minimum
value is 15M.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the save action completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Configuring DSMs
IBM AIX 317
Parameter Description
Processor From the list box, select NONE.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded. JSA can process files in zip, gzip, tar, or
tar+gzip archive format.
Ignore Previously Select this check box to track and ignore files that are already
Processed File(s) processed.
JSA examines the log files in the remote directory to
determine if a file is already processed by the log file protocol.
If a previously processed file is detected, the log file protocol
does not download the file. Only new or unprocessed event
log files are downloaded by JSA.
This option only applies to FTP and SFTP service types.
Change Local Select this check box to define a local directory on JSA to
Directory? store event log files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory on
JSA to store event log files. After the event log is processed
and the events added to JSA, the local directory deletes the
event log files to retain disk space.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
Configuring the IBM You can configure syslog on your IBM AIX appliance to forward operating system
AIX Server DSM and authentication events to JSA.
Procedure
Step 1 Log in to your IBM AIX appliance as a root user.
Step 2 Open the /etc/syslog.conf file.
Step 3 To forward the system authentication logs to JSA, add the following line to the file:
auth.info @<IP address>
Where <IP address> is the IP address of the JSA. A tab must separate auth.info
and the IP address of JSA.
Configuring DSMs
318 IBM
For example,
##### begin /etc/syslog.conf
mail.debug /var/adm/maillog
mail.none /var/adm/maillog
auth.notice /var/adm/authlog
lpr.debug /var/adm/lpd-errs
kern.debug /var/adm/messages
*.emerg;*.alert;*.crit;*.warning;*.err;*.notice;*.info
/var/adm/messages
auth.info @<10.100.100.1>
##### end /etc/syslog.conf
Step 4 Save and exit the file.
Step 5 Type the following command to restart the syslog service:
refresh -s syslogd
After the syslog server restarts, the configuration is complete as system
authentication syslog events are automatically discovered. If the events are not
automatically discovered, you can manually configure a log source.
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your log source.
Step 5 In the Log Source Description field, type a description for the log source.
Step 6 From the Log Source Type list box, select IBM AIX Server.
Step 7 Using the Protocol Configuration list box, select Syslog.
Step 8 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your IBM AIX.
Enabled Select this check box to enable the log source.
By default, the check box is selected.
Configuring DSMs
IBM AS/400 iSeries 319
Parameter Description
Credibility Select the credibility of the log source. The range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector Select the Event Collector to use as the target for the log
source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
IBM AS/400 iSeries JSA has three options for integrating events from an IBM AS/400® (or IBM
OS/400) iSeries using one of the following software products:
• Integrating an IBM AS/400 iSeries DSM - The IBM AS/400 iSeries DSM uses
the DSPJRN command to write audit journal records to a database file that is
pushed to an FTP server for retrieval by JSA using the Log File protocol source.
For more information, see Integrating an IBM AS/400 iSeries DSM.
For more information on configuring log sources and protocols, see Pulling
Data Using Log File Protocol.
• LogAgent for System i - Accepts all Common Event Format (CEF) formatted
syslog messages. You can integrate an IBM OS/400 device and above using
the LogAgent for System i software. After you configure your LogAgent for
System i software, use the Log File protocol source to pull the syslog CEF
messages.
For more information, see your Patrick Townsend Security Solutions LogAgent
for System i documentation.
Configuring DSMs
320 IBM
For more information on configuring log sources and protocols, see Pulling
Data Using Log File Protocol.
• PowerTech Interact - Accepts all Common Event Format (CEF) formatted
syslog messages. You can integrate an IBM OS/400 device using the
PowerTech Interact software. After you configure your PowerTech Interact
software, use the Log File protocol source to pull the syslog CEF messages.
• RazLee iSecurity - This DSM configuration is provided in a separate chapter.
See Raz-Lee iSecurity.
Integrating an IBM The JSA IBM AS/400 iSeries DSM allows you to integrate with an IBM AS/400
AS/400 iSeries DSM iSeries to collect audit records and event information.
The IBM AS/400 iSeries DSM uses an agent running on the iSeries that manages,
gathers and transfers the event information. The program leverages the DSPJRN
command to write audit journal records to a database file. These records are
reformatted and forwarded to an FTP server where JSA can retrieve the records
using FTP.
Configuring DSMs
IBM AS/400 iSeries 321
cd qgpl
lcd c:\
put ajlib.savf savf
quit
If you are transferring your SAVF file from another iSeries, the file must be sent
with the required FTP subcommand mode BINARY before the GET or PUT
statement.
Step 5 Restore the AJLIB library on the IBM iSeries:
RSTLIB
Step 6 Setup the data collection start date and time for the Audit Journal Library (AJLIB):
AJLIB/SETUP
You are prompted for a username and password. If you start the Audit Journal
Collector a failure message is sent to QSYSOPR.
The setup function sets a default start date and time for data collection from the
Audit Journal to 08:00:00 of the current day.
NOTE
Note: To preserve your previous start date and time information for a previous
installation you must run AJLIB/DATETIME. Record the previous start date and
time and type those values when you run AJLIB/SETUP. The start date and time
must contain a valid date and time in the six character system date and system
time format. The end date and time must be a valid date and time or left blank.
NOTE
Note: If the FTP transfer is successful, the current data and time information is
written into the start time for AJLIB/DATETIME to update the gather time and the
end time is set to blank. If the FTP transfer fails, the export file is erased and no
updates are made to the gather date or time.
Configuring DSMs
322 IBM
NOTE
Note: If you are using the PowerTech Interact or LogAgent for System i software to
collect CEF formatted syslog messages, you must select the Syslog option from
the Protocol Configuration list box.
Step 3 We recommend when you use the Log File protocol option that you select a secure
protocol for transferring files, such as Secure File Transfer Protocol (SFTP).
For more information on configuring log sources and protocols, see the Log
Sources Users Guide.
IBM CICS The IBM CICS® DSM allows you to integrate events from IBM Custom Information
Control System (CICS®) events from an IBM z/OS® mainframe using IBM
Security zSecure.
Using a zSecure process, events from the System Management Facilities (SMF)
are recorded to an event file in the Log Enhanced Event format (LEEF). JSA
retrieves the LEEF event log files using the log file protocol and processes the
events. You can schedule JSA to retrieve events on a polling interval, which allows
JSA to retrieve the events on the schedule you have defined.
Before You Begin Before you can configure the data collection process, you must complete the basic
zSecure installation process.
Configuring DSMs
IBM CICS 323
Create a Log Source The Log File protocol allows JSA to retrieve archived log files from a remote host.
Log files are transferred, one at a time, to JSA for processing. The log file protocol
can manage plain text event logs, compressed files, or archives. Archives must
contain plain-text files that can be processed one line at a time. Multi-line event
logs are not supported by the log file protocol. IBM z/OS with zSecure writes log
files to a specified directory as gzip archives. JSA extracts the archive and
processes the events, which are written as one event per line in the file.
To retrieve these events, you must create a log source using the Log File protocol.
JSA requires credentials to log in to the system hosting your LEEF formatted event
files and a polling interval.
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for the log source.
Step 5 In the Log Source Description field, type a description for the log source.
Step 6 From the Log Source Type list box, select IBM CICS.
Step 7 From the Protocol Configuration list box, select Log File.
Configuring DSMs
324 IBM
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names are recommended as
they allow JSA to identify a log file to a unique event source.
Configuring DSMs
IBM CICS 325
Parameter Description
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file. When
you provide an SSH Key File, the Remote Password field is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
IBM z/OS mainframe using IBM Security zSecure Audit writes
event files using the pattern CICS.<timestamp>.gz
The FTP file pattern you specify must match the name you
assigned to your event files. For example, to collect files
starting with zOS and ending with .gz, type the following:
CICS.*\.gz
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only displays if you select FTP as the Service
Type. From the list box, select Binary.
The binary transfer mode is required for event files stored in a
binary or compressed format, such as zip, gzip, tar, or
tar+gzip archive files.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. For
example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files. Type the start time, based on a 24 hour
clock, in the following format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the remote directory to be
scanned every 2 hours from the start time. The default is 1H.
Configuring DSMs
326 IBM
Parameter Description
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the Run On Save completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor From the list box, select gzip.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded to JSA. JSA can process files in zip,
gzip, tar, or tar+gzip archive format.
Ignore Previously Select this check box to track and ignore files that have
Processed File(s) already been processed by the log file protocol.
JSA examines the log files in the remote directory to
determine if a file has been previously processed by the log
file protocol. If a previously processed file is detected, the log
file protocol does not download the file for processing. All files
that have not been previously processed are downloaded.
This option only applies to FTP and SFTP Service Types.
Change Local Select this check box to define a local directory on your JSA
Directory? for storing downloaded files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory to
use for storing files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line is a single event. For example,
if a file has 10 lines of text, 10 separate events are created.
IBM Lotus Domino You can integrate an IBM Lotus Domino® device with JSA. An IBM Lotus Domino
device accepts events using SNMP.
Setting Up SNMP To set up the SNMP services on the IBM Lotus Domino server:
Services
Configuring DSMs
IBM Lotus Domino 327
Procedure
Step 1 Install the Lotus Domino SNMP Agent as a service. From the command prompt, go
to the Lotus\Domino directory and type the following command:
Insnmp -SC
Step 2 Confirm that the Microsoft SNMP service is installed.
Step 3 Start the SNMP and LNSNMP services. From a command prompt, type the
following commands:
net start snmp
net start lnsnmp
Step 4 Select Start > Program > Administrative Tools > Services to open the Services
MMC
Step 5 Double-click on the SNMP service and select the Traps tab.
Step 6 In the Community name field, type public and click add to list:
Step 7 In the Traps destinations section, select Add and type the IP address of your JSA.
Click Add.
Step 8 Click OK.
Step 9 Confirm that both SNMP agents are set to Automatic so they run upon server boot.
Starting the Domino After you configure the SNMP services, you must start the Domino server add-in
Server Add-in Tasks tasks. Repeat the below procedure for each Domino partition.
Procedure
Step 1 Log in to the Domino Server console.
Step 2 To support SNMP traps for Domino events, type the following command to start the
Event Interceptor add-in task:
load intrcpt
Step 3 To support Domino statistic threshold traps, type the following command to start
the Statistic Collector add-in task:
load collect
Step 4 Arrange for the add-in tasks to be restarted automatically the next time that
Domino is restarted. Add intrcpt and collect to the ServerTasks variable in
Domino's NOTES.INI file.
NOTE
Note: Configurations might vary depending on your environment. See your vendor
documentation for more information.
Configuring DSMs
328 IBM
Procedure
Step 1 Open the Domino Administrator utility and authenticate with administrative
credentials.
Step 2 Click on the Files tab, and the Monitoring Configuration (events4.nsf) document.
Step 3 Expand the DDM Configuration Tree and select DDM Probes By Type.
Step 4 Select Enable Probes, and then select Enable All Probes In View.
NOTE
Note: You might receive a warning after performing this action. This is a normal
result, as some of the probes require additional configuration.
Configuring a Log JSA does not automatically discover incoming syslog events from Huawei AR
Source Series Routers.
If your events are not automatically discovered, you must manually create a log
source from the Admin tab in JSA.
Configuring DSMs
IBM Proventia Management SiteProtector 329
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your log source.
Step 5 From the Log Source Type list box, select IBM Lotus Domino.
Step 6 From the Protocol Configuration list box, select SNMPv2.
Step 7 Configure the following values:
Parameter Description
Log Source Type an IP address, hostname, or name to identify the SNMPv2
Identifier event source.
IP addresses or hostnames are recommended as they allow JSA
to identify a log file to a unique event source.
Community Type the SNMP community name required to access the system
containing SNMP events.
Include OIDs in Clear the value from this check box.
Event Payload When selected, this option constructs SNMP events with
name-value pairs instead of the standard event payload format.
IBM Proventia The IBM Proventia® Management SiteProtector DSM for JSA accepts
Management SiteProtector events by polling the SiteProtector database.
SiteProtector
The DSM allows JSA to record Intrusion Prevention System (IPS) events and audit
events directly from the IBM SiteProtector database.
NOTE
Note: The IBM Proventia Management SiteProtector DSM requires the latest
JDBC Protocol to collect audit events.
The IBM Proventia Management SiteProtector DSM for JSA can accept detailed
SiteProtector events by reading information from the primary SensorData1 table.
The SensorData1 table is generated with information from several other tables in
the IBM SiteProtector database. SensorData1 remains the primary table for
collecting events.
Configuring DSMs
330 IBM
IDP events include information from SensorData1, along with information from the
following tables:
• SensorDataAVP1
• SensorDataReponse1
Audit events are not collected by default and make a separate query to the
AuditInfo and AuditTrail tables when you select the Include Audit Events check
box. For more information about your SiteProtector database tables, see your
vendor documentation.
NOTE
Note: Ensure that no firewall rules are blocking the communication between the
SiteProtector console and JSA.
Configuring DSMs
IBM Proventia Management SiteProtector 331
Parameter Description
Log Source Type the identifier for the log source. The log source identifier must
Identifier be defined in the following format:
<database>@<hostname>
Where:
<database> is the database name, as defined in the Database
Name parameter. The database name is a required parameter.
<hostname> is the hostname or IP address for the log source as
defined in the IP or Hostname parameter. The hostname is a
required parameter.
The log source identifier must be unique for the log source type.
Database Type From the list box, select MSDE as the type of database to use for
the event source.
Database Name Type the name of the database to which you want to connect. The
default database name is RealSecureDB.
IP or Hostname Type the IP address or hostname of the database server.
Port Type the port number used by the database server. The default
that is displayed depends on the selected Database Type. The
valid range is 0 to 65536. The default for MSDE is port 1433.
The JDBC configuration port must match the listener port of the
database. The database must have incoming TCP connections
enabled to communicate with JSA.
The default port number for all options include:
• MSDE - 1433
• Postgres - 5432
• MySQL - 3306
• Oracle - 1521
• Sybase - 1521
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the database username. The username can be up to 255
alphanumeric characters in length. The username can also include
underscores (_).
Password Type the database password.
The password can be up to 255 characters in length.
Confirm Confirm the password to access the database.
Password
Configuring DSMs
332 IBM
Parameter Description
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define a Windows
Authentication Domain. Otherwise, leave this field blank.
The authentication domain must contain alphanumeric characters.
The domain can include the following special characters:
underscore (_), en dash (-), and period(.).
Database If you select MSDE as the Database Type and you have multiple
Instance SQL server instances on one server, define the instance to which
you want to connect.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type the name of the view that includes the event records. The
default table name is SensorData1.
AVP View Name Type the name of the view that includes the event attributes. The
default table name is SensorDataAVP.
Response View Type the name of the view that includes the response events. The
Name default table name is SensorDataResponse.
Select List Type * to include all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type SensorDataRowID to identify new events added between
queries to the table.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values without an H
or M designator poll in seconds.
Use Named Pipe If you select MSDE as the Database Type, select this check box to
Communication use an alternative method to a TCP/IP port connection.
When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Configuring DSMs
IBM ISS Proventia 333
Parameter Description
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
Include Audit Select this check box to collect audit events from IBM
Events SiteProtector.
By default, this check box is clear.
Use NTLMv2 Select the Use NTLMv2 check box to force MSDE connections to
use the NTLMv2 protocol when communicating with SQL servers
that require NTLMv2 authentication. The default value of the check
box is selected.
If the Use NTLMv2 check box is selected, it has no effect on
MSDE connections to SQL servers that do not require NTLMv2
authentication.
Use SSL Select this check box if your connection supports SSL
communication.
Log Source Select the language of the log source events.
Language
IBM ISS Proventia The IBM Integrated Systems Solutions® (ISS) Proventia DSM for JSA records all
relevant IBM Proventia® events using SNMP.
Procedure
Step 1 In the Proventia Manager user interface navigation pane, expand the System
node.
Step 2 Select System.
Step 3 Select Services.
The Service Configuration page is displayed.
Step 4 Click the SNMP tab.
Step 5 Select SNMP Traps Enabled.
Step 6 In the Trap Receiver field, type the IP address of your JSA you wish to monitor
incoming SNMP traps.
Step 7 In the Trap Community field, type the appropriate community name.
Step 8 From the Trap Version list, select the trap version.
Step 9 Click Save Changes.
Configuring DSMs
334 IBM
From the Log Source Type list box, select IBM Proventia Network Intrusion
Prevention System (IPS).
For information on configuring SNMP in the JSA, see the Log Sources Users
Guide. For more information about your ISS Proventia device, see your vendor
documentation.
IBM RACF JSA includes two options for integrating event from IBM RACF®:
• Integrating IBM RACF with JSA Using IBM Security zSecure
• Integrate IBM RACF with JSA Using Audit Scripts
Integrating IBM RACF The IBM RACF DSM allows you to integrate events from an IBM z/OS® mainframe
with JSA Using IBM using IBM Security zSecure.
Security zSecure
Using a zSecure process, events from the System Management Facilities (SMF)
are recorded to an event file in the Log Enhanced Event format (LEEF). JSA
retrieves the LEEF event log files using the log file protocol and processes the
events. You can schedule JSA to retrieve events on a polling interval, which allows
JSA to retrieve the events on the schedule you have defined.
Configuring DSMs
IBM RACF 335
Log files are transferred, one at a time, to JSA for processing. The log file protocol
can manage plain text event logs, compressed files, or archives. Archives must
contain plain-text files that can be processed one line at a time. Multi-line event
logs are not supported by the log file protocol. IBM z/OS with zSecure writes log
files to a specified directory as gzip archives. JSA extracts the archive and
processes the events, which are written as one event per line in the file.
To retrieve these events, you must create a log source using the Log File protocol.
JSA requires credentials to log in to the system hosting your LEEF formatted event
files and a polling interval.
Procedure
Step 5 Click the Admin tab.
Step 6 Click the Log Sources icon.
Step 7 Click Add.
Step 8 In the Log Source Name field, type a name for the log source.
Step 9 In the Log Source Description field, type a description for the log source.
Step 10 From the Log Source Type list box, select IBM Resource Access Control
Facility (RACF).
Step 11 From the Protocol Configuration list box, select Log File.
Configuring DSMs
336 IBM
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names are recommended as
they allow JSA to identify a log file to a unique event source.
Configuring DSMs
IBM RACF 337
Parameter Description
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file. When
you provide an SSH Key File, the Remote Password field is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
IBM z/OS mainframe using IBM Security zSecure Audit writes
event files using the pattern RACF.<timestamp>.gz
The FTP file pattern you specify must match the name you
assigned to your event files. For example, to collect files
starting with zOS and ending with .gz, type the following:
RACF.*\.gz
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only displays if you select FTP as the Service
Type.
The binary transfer mode is required for event files stored in a
binary or compressed format, such as zip, gzip, tar, or
tar+gzip archive files.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. For
example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files. Type the start time, based on a 24 hour
clock, in the following format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the remote directory to be
scanned every 2 hours from the start time. The default is 1H.
Configuring DSMs
338 IBM
Parameter Description
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the Run On Save completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor From the list box, select gzip.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded to JSA. JSA can process files in zip,
gzip, tar, or tar+gzip archive format.
Ignore Previously Select this check box to track and ignore files that have
Processed File(s) already been processed by the log file protocol.
JSA examines the log files in the remote directory to
determine if a file has been previously processed by the log
file protocol. If a previously processed file is detected, the log
file protocol does not download the file for processing. All files
that have not been previously processed are downloaded.
This option only applies to FTP and SFTP Service Types.
Change Local Select this check box to define a local directory on your JSA
Directory? for storing downloaded files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory to
use for storing files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
Configuring DSMs
IBM RACF 339
Integrate IBM RACF The IBM Resource Access Control Facility (RACF®) DSM for JSA allows you to
with JSA Using Audit integrate with an IBM z/OS mainframe using IBM RACF for auditing transactions.
Scripts
JSA records all relevant and available information from the event.
Configuring DSMs
340 IBM
Configuring DSMs
IBM RACF 341
Configuring DSMs
342 IBM
//*************************************************************
//*FTP EXEC PGM=FTP,REGION=3800K
//*INPUT DD *
//*<FTPSERVERIPADDR>
//*<USER>
//*<PASSWORD>
//*ASCII
//*PUT '<QEXRACFOUTDSN>'
/<THEIPOFTHEMAINFRAMEDEVICE>/<QEXRACFOUTDSN>
//*QUIT
//*OUTPUT DD SYSOUT=*
//*SYSPRINT DD SYSOUT=*
//*
//*
Step 8 After the output file is created, you must send this file to an FTP server. This
ensures that every time you run the utility, the output file is sent to a specific FTP
server for processing at the end of the above script. If the z/OS platform is
configured to serve files through FTP or SFTP, or allow SCP, then no interim server
is required and JSA can pull those files directly from the mainframe. If an interim
FTP server is needed, JSA requires a unique IP address for each IBM RACF log
source or they will be joined as one system.
Log files are transferred, one at a time, to JSA for processing. The log file protocol
can manage plain text event logs, compressed files, or archives. Archives must
contain plain-text files that can be processed one line at a time. Multi-line event
logs are not supported by the log file protocol. IBM RACF with z/OS writes log files
to a specified directory as gzip archives. JSA extracts the archive and processes
the events, which are written as one event per line in the file.
To retrieve these events, you must create a log source using the Log File protocol.
JSA requires credentials to log in to the system hosting your event files and a
polling interval.
Procedure
Step 9 Click the Admin tab.
Step 10 Click the Log Sources icon.
Step 11 Click Add.
Step 12 In the Log Source Name field, type a name for the log source.
Step 13 In the Log Source Description field, type a description for the log source.
Step 14 From the Log Source Type list box, select IBM Resource Access Control
Faclilty (RACF).
Step 15 From the Protocol Configuration list box, select Log File.
Configuring DSMs
IBM RACF 343
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names are recommended as
they allow JSA to identify a log file to a unique event source.
Configuring DSMs
344 IBM
Parameter Description
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file. When
you provide an SSH Key File, the Remote Password field is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
The FTP file pattern you specify must match the name you
assigned to your event files. For example, to collect files
starting with zOS and ending with .gz, type the following:
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only displays if you select FTP as the Service
Type.
From the list box, select the transfer mode you want to apply
to this log source:
• Binary - Select Binary for log sources that require binary
data files or compressed zip, gzip, tar, or tar+gzip archive
files.
• ASCII - Select ASCII for log sources that require an ASCII
FTP file transfer.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. For
example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files. Type the start time, based on a 24 hour
clock, in the following format: HH:MM.
Configuring DSMs
IBM RACF 345
Parameter Description
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the remote directory to be
scanned every 2 hours from the start time. The default is 1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the Run On Save completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor From the list box, select gzip.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded to JSA. JSA can process files in zip,
gzip, tar, or tar+gzip archive format.
Ignore Previously Select this check box to track and ignore files that have
Processed File(s) already been processed by the log file protocol.
JSA examines the log files in the remote directory to
determine if a file has been previously processed by the log
file protocol. If a previously processed file is detected, the log
file protocol does not download the file for processing. All files
that have not been previously processed are downloaded.
This option only applies to FTP and SFTP Service Types.
Change Local Select this check box to define a local directory on your JSA
Directory? system for storing downloaded files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory to
use for storing files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
Configuring DSMs
346 IBM
IBM DB2 JSA has two options for integrating events from IBM DB2®:
• Integrating IBM DB2 with LEEF Events
• Integrating IBM DB2 Audit Events
Integrating IBM DB2 The IBM DB2 DSM allows you to integrate DB2 events in LEEF format from an
with LEEF Events IBM z/OS® mainframe using IBM Security zSecure®.
Using a zSecure process, events from the System Management Facilities (SMF)
are recorded to an event file in the Log Enhanced Event format (LEEF). JSA
retrieves the LEEF event log files using the log file protocol and processes the
events. You can schedule JSA to retrieve events on a polling interval, which allows
you to retrieve the events on the schedule you have defined.
Before You Begin Before you can configure the data collection process, you must complete the basic
zSecure installation process.
Configuring DSMs
IBM DB2 347
Creating a Log The Log File protocol allows JSA to retrieve archived log files from a remote host.
Source
Log files are transferred, one at a time, to JSA for processing. The log file protocol
can manage plain text event logs, compressed files, or archives. Archives must
contain plain-text files that can be processed one line at a time. Multi-line event
logs are not supported by the log file protocol. IBM z/OS with zSecure writes log
files to a specified directory as gzip archives. JSA extracts the archive and
processes the events, which are written as one event per line in the file.
To retrieve these events, you must create a log source using the Log File protocol.
JSA requires credentials to log in to the system hosting your LEEF formatted event
files and a polling interval.
Procedure
Step 5 Click the Admin tab.
Step 6 Click the Log Sources icon.
Step 7 Click Add.
Step 8 In the Log Source Name field, type a name for the log source.
Step 9 In the Log Source Description field, type a description for the log source.
Step 10 From the Log Source Type list box, select IBM DB2.
Step 11 From the Protocol Configuration list box, select Log File.
Step 12 Configure the following values:
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names are recommended as
they allow JSA to identify a log file to a unique event source.
Configuring DSMs
348 IBM
Parameter Description
Remote IP or Type the IP address or host name of the device storing your
Hostname event log files.
Remote Port Type the TCP port on the remote host that is running the
selected Service Type. The valid range is 1 to 65535.
The options include:
• FTP - TCP Port 21
• SFTP - TCP Port 22
• SCP - TCP Port 22
Note: If the host for your event files is using a non-standard
port number for FTP, SFTP, or SCP, you must adjust the port
value accordingly.
Remote User Type the user name or userid necessary to log in to the host
containing your event files.
• If your log files are located on your IBM z/OS image, type
the userid necessary to log in to your IBM z/OS. The userid
can be up to 8 characters in length.
• If your log files are located on a file repository, type the
user name necessary to log in to the file repository. The
user name can be up to 255 characters in length.
Remote Password Type the password necessary to log in to the host.
Confirm Password Confirm the password necessary to log in to the host.
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file. When
you provide an SSH Key File, the Remote Password field is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
Configuring DSMs
IBM DB2 349
Parameter Description
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
IBM z/OS mainframe using IBM Security zSecure Audit writes
event files using the pattern DB2.<timestamp>.gz
The FTP file pattern you specify must match the name you
assigned to your event files. For example, to collect files
starting with zOS and ending with .gz, type the following:
DB2.*\.gz
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only displays if you select FTP as the Service
Type. From the list box, select Binary.
The binary transfer mode is required for event files stored in a
binary or compressed format, such as zip, gzip, tar, or
tar+gzip archive files.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. For
example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files. Type the start time, based on a 24 hour
clock, in the following format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the remote directory to be
scanned every 2 hours from the start time. The default is 1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the Run On Save completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Configuring DSMs
350 IBM
Parameter Description
Processor From the list box, select gzip.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded to JSA. JSA can process files in zip,
gzip, tar, or tar+gzip archive format.
Ignore Previously Select this check box to track and ignore files that have
Processed File(s) already been processed by the log file protocol.
JSA examines the log files in the remote directory to
determine if a file has been previously processed by the log
file protocol. If a previously processed file is detected, the log
file protocol does not download the file for processing. All files
that have not been previously processed are downloaded.
This option only applies to FTP and SFTP Service Types.
Change Local Select this check box to define a local directory on your JSA
Directory? for storing downloaded files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory to
use for storing files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
Integrating IBM DB2 The IBM DB2 DSM allows you to integrate your DB2 audit logs into JSA for
Audit Events analysis.
The db2audit command creates a set of comma-delimited text files with a .del
extension that defines the scope of audit data for JSA when auditing is configured
and enabled. Comma-delimited files created by the db2audit command include:
• audit.del
• checking.del
• context.del
• execute.del
• objmaint.del
Configuring DSMs
IBM DB2 351
• secmaint.del
• sysadmin.del
• validate.del
NOTE
Note: The IBM DB2 DSM does not support the IBM z/OS mainframe operating
system.
NOTE
Note: In DB2 v9.5 and above, the archive command replaces the prune command.
The archive command moves the active audit log to a new location, effectively
pruning all non-active records from the log. An archive command must be
complete before an extract can be performed.
Configuring DSMs
352 IBM
Step 4 Extract the data from the archived audit log and write the data to .del files:
db2audit extract delasc from files
db2audit.instance.log.0.200912171528
For example, an archive command response might resemble the following:
AUD00001 Operation succeeded.
NOTE
Note: Double-quotation marks (“) are used as the default text delimiter in the
ASCII files, do not change the delimiter.
Step 5 Move the .del files to a storage location where JSA can pull the file. The movement
of the comma-delimited (.del) files should be synchronized with the file pull interval
in JSA.
You are now ready to configure JSA to receive DB2 log files. See Creating a log
source for IBM DB2.
NOTE
Note: Double-quotation marks (“) are used as the default text delimiter in the
ASCII files, do not change the delimiter.
Configuring DSMs
IBM DB2 353
You are now ready to create a log source in JSA to receive DB2 log files.
The IBM DB2 DSM supports the bulk loading of log files using the log file protocol
source. When configuring your IBM DB2 to use the log file protocol, make sure the
hostname or IP address configured in the IBM DB2 system is the same as
configured in the Remote Host parameter in the Log File protocol configuration.
For more information, see the Log Sources Users Guide.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Step 5 In the Log Source Name field, type a name for the log source.
Step 6 In the Log Source Description field, type a description for the log source.
Step 7 From the Log Source Type list box, select IBM DB2.
Step 8 From the Protocol Configuration list box, select Log File.
Step 9 Configure the following values:
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names are recommended as
they allow JSA to identify a log file to a unique event source.
Configuring DSMs
354 IBM
Parameter Description
Service Type From the list box, select the protocol you want to use when
retrieving log files from a remote server. The default is SFTP.
• SFTP - SSH File Transfer Protocol
• FTP - File Transfer Protocol
• SCP - Secure Copy
Note: The underlying protocol used to retrieve log files for the
SCP and SFTP service type requires that the server specified
in the Remote IP or Hostname field has the SFTP subsystem
enabled.
Remote IP or Type the IP address or host name of the device storing your
Hostname event log files.
Remote Port Type the TCP port on the remote host that is running the
selected Service Type. The valid range is 1 to 65535.
The options include:
• FTP - TCP Port 21
• SFTP - TCP Port 22
• SCP - TCP Port 22
Note: If the host for your event files is using a non-standard
port number for FTP, SFTP, or SCP, you must adjust the port
value accordingly.
Remote User Type the user name necessary to log in to the host containing
your event files.
The username can be up to 255 characters in length.
Remote Password Type the password necessary to log in to the host.
Confirm Password Confirm the password necessary to log in to the host.
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file. When
you provide an SSH Key File, the Remote Password field is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
Configuring DSMs
IBM DB2 355
Parameter Description
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
The FTP file pattern you specify must match the name you
assigned to your event files. For example, to collect
comma-delimited files ending with .del, type the following:
.*.del
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode From the list box, select ASCII for comma-delimited, text, or
ASCII log sources that require an ASCII FTP file transfer
mode.
This option only displays if you select FTP as the Service
Type.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. For
example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files. Type the start time, based on a 24 hour
clock, in the following format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the remote directory to be
scanned every 2 hours from the start time. The default is 1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the Run On Save completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor From the list box, select None.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded to JSA. JSA can process files in zip,
gzip, tar, or tar+gzip archive format.
Configuring DSMs
356 IBM
Parameter Description
Ignore Previously Select this check box to track and ignore files that have
Processed File(s) already been processed by the log file protocol.
JSA examines the log files in the remote directory to
determine if a file has been previously processed by the log
file protocol. If a previously processed file is detected, the log
file protocol does not download the file for processing. All files
that have not been previously processed are downloaded.
This option only applies to FTP and SFTP Service Types.
Change Local Select this check box to define a local directory on your JSA
Directory? for storing downloaded files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory to
use for storing files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
IBM WebSphere The IBM WebSphere® Application Server DSM for JSA accepts events using the
Application Server log file protocol source.
JSA records all relevant application and security events from the WebSphere
Application Server log files.
Configuring IBM You can configure IBM WebSphere Application Server events for JSA.
WebSphere
Procedure
Step 1 Using a web browser, log in to the IBM WebSphere administrative console.
Step 2 Click Environment > WebSphere Variables.
Step 3 Define Cell as the Scope level for the variable.
Step 4 Click New.
Step 5 Configure the following values:
• Name - Type a name for the cell variable.
• Description - Type a description for the variable (optional).
Configuring DSMs
IBM WebSphere Application Server 357
NOTE
Note: If the variable you created affects a cell, you must restart all WebSphere
Application Servers in the cell before you continue.
You are now ready to customize the logging option for the IBM WebSphere
Application Server DSM.
Customizing the You must customize the logging option for each application server WebSphere
Logging Option uses and change the settings for the JVM Logs (Java Virtual Machine logs).
Procedure
Step 1 Select Servers > Application Servers.
Step 2 Select your WebSphere Application Server to load the server properties.
Step 3 Select Logging and Tracing > JVM Logs.
Step 4 Configure a name for the JVM log files.
For example:
System.Out log file name:
${QRADAR_LOG_ROOT}/${WAS_SERVER_NAME}-SystemOut.log
System.Err log file name:
${QRADAR_LOG_ROOT}/${WAS_SERVER_NAME}-SystemErr.log
Step 5 Select a time of day to save the log files to the target directory.
Step 6 Click OK.
Step 7 You must restart the WebSphere Application Server to save the configuration
changes.
NOTE
Note: If the JVM Logs changes affect the cell, you must restart all of the
WebSphere Application Servers in the cell before you continue.
You are now ready to import the file into JSA using the Log File Protocol.
Configuring DSMs
358 IBM
Create a Log Source The log file protocol allows JSA to retrieve archived log files from a remote host.
The IBM WebSphere Application Server DSM supports the bulk loading of log files
using the log file protocol source.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Step 5 In the Log Source Name field, type a name for the log source.
Step 6 In the Log Source Description field, type a description for the log source.
Step 7 From the Log Source Type list box, select IBM WebSphere Application Server.
Step 8 Using the Protocol Configuration list box, select Log File.
Step 9 Configure the following values:
Parameter Description
Log Source Identifier Type an IP address, hostname, or name to identify your IBM
WebSphere Application Server as an event source in JSA. IP
addresses or host names are recommended as they allow
JSA to identify a log file to a unique event source.
Configuring DSMs
IBM WebSphere Application Server 359
Parameter Description
Remote Port Type the TCP port on the remote host that is running the
selected Service Type. The valid range is 1 to 65535.
The options include:
• FTP - TCP Port 21
• SFTP - TCP Port 22
• SCP - TCP Port 22
Note: If the host for your event files is using a non-standard
port number for FTP, SFTP, or SCP, you must adjust the port
value accordingly.
Remote User Type the user name necessary to log in to the host containing
your event files.
The username can be up to 255 characters in length.
Remote Password Type the password necessary to log in to the host.
Confirm Password Confirm the password necessary to log in to the host.
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file.
The Remote Password field is ignored when you provide an
SSH Key File.
Remote Directory Type the directory location on the remote host to the cell and
file path you specified in Step 5. This is the directory you
created containing your IBM WebSphere Application Server
event files.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders. By default, the check box is clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
The FTP file pattern you specify must match the name you
assigned to your JVM logs in Step 4. For example, to collect
system logs, type the following:
System.*\.log
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
Configuring DSMs
360 IBM
Parameter Description
FTP Transfer Mode This option only appears if you select FTP as the Service
Type. The FTP Transfer Mode parameter allows you to define
the file transfer mode when retrieving log files over FTP.
From the list box, select the transfer mode you want to apply
to this log source:
• Binary - Select Binary for log sources that require binary
data files or compressed zip, gzip, tar, or tar+gzip archive
files.
• ASCII - Select ASCII for log sources that require an ASCII
FTP file transfer.
You must select NONE for the Processor parameter and
LINEBYLINE the Event Generator parameter when using
ASCII as the FTP Transfer Mode.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. This
parameter functions with the Recurrence value to establish
when and how often the Remote Directory is scanned for files.
Type the start time, based on a 24 hour clock, in the following
format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D). For example, 2H if you
want the directory to be scanned every 2 hours. The default is
1H.
Note: We recommend when scheduling a Log File protocol,
you select a recurrence time for the log file protocol shorter
than the scheduled write interval of the WebSphere
Application Server log files. This ensures that WebSphere
events are collected by the Log File Protocol before a the new
log file overwrites the old event log.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save. After the Run On Save
completes, the log file protocol follows your configured start
time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor If the files located on the remote host are stored in a zip, gzip,
tar, or tar+gzip archive format, select the processor that
allows the archives to be expanded and contents processed.
Configuring DSMs
IBM Informix Audit 361
Parameter Description
Ignore Previously Select this check box to track files that have already been
Processed File(s) processed. Files that have been previously processed are not
processed a second time.
This check box only applies to FTP and SFTP Service Types.
Change Local Select this check box to define the local directory on your JSA
Directory? that you want to use for storing downloaded files during
processing. We recommend that you leave the check box
clear. When the check box is selected, the Local Directory
field is displayed, which allows you to configure the local
directory to use for storing files.
Event Generator From the Event Generator list box, select WebSphere
Application Server.
The Event Generator applies additional processing, which is
specific to retrieved event files for IBM WebSphere
Application Server events.
IBM Informix Audit The IBM Informix® Audit DSM allows JSA to integrate IBM Informix audit logs into
JSA for analysis.
JSA retrieves the IBM Informix archived audit log files from a remote host using the
Log File protocol configuration. JSA records all configured IBM Informix Audit
events.
For more information about IBM Informix auditing configuration, see your IBM
Informix documentation at the following website:
http://publib.boulder.ibm.com/infocenter/idshelp/v10/index.jsp?topic=/com.ibm.tfg.
doc/tfg26.htm
When configuring your IBM Informix to use the log file protocol, make sure the
hostname or IP address configured in the IBM Informix is the same as configured
in the Remote Host parameter in the Log File protocol configuration.
You are now ready to configure the log source and protocol in JSA:
Step 1 To configure JSA to receive events from an IBM Informix device, you must select
the IBM Informix Audit option from the Log Source Type list box.
Step 2 To configure the log file protocol, you must select the Log File option from the
Protocol Configuration list box.
Configuring DSMs
362 IBM
Step 3 We recommend that you use a secure protocol for transferring files, such as
Secure File Transfer Protocol (SFTP).
For more information on configuring log sources and protocols, see the Log
Sources Users Guide.
IBM IMS The IBM Information Management System (IMS) DSM for JSA allows you to use
an IBM mainframe to collect events and audit IMS database transactions.
Configuration To integrate IBM IMS events with JSA, you must download scripts that allow IBM
Overview IMS events to be written to a log file.
Procedure
Step 1 From the Juniper Networks support website
(http://www.juniper.net/customers/support/), download the following compressed
file:
QexIMS_bundled.tar.gz
Step 2 On a Linux-based operating system, extract the file:
tar -zxvf qexims_bundled.tar.gz
The following files are contained in the archive:
qexims_jcl.txt - Job Control Language file
qeximsloadlib.trs - Compressed program library (requires IBM TRSMAIN)
qexims_trsmain_JCL.txt - Job Control Language for TRSMAIN to decompress the
.trs file
Configuring DSMs
IBM IMS 363
Step 3 Load the files onto the IBM mainframe using the following methods:
a Upload the sample qexims_trsmain_JCL.txt and qexims_jcl.txt files
using the TEXT protocol.
b Upload the qeximsloadlib.trs file using BINARY mode transfer and append
to a pre-allocated data set. The qeximsloadlib.trs file is a tersed file
containing the executable (the mainframe program QexIMS). When you upload
the .trs file from a workstation, pre-allocate a file on the mainframe with the
following DCB attributes: DSORG=PS, RECFM=FB, LRECL= 1024,
BLKSIZE=6144. The file transfer type must be binary mode and not text.
NOTE
Note: QexIMS is a small C mainframe program that reads the output of the IMS
log file (EARLOUT data) line by line. QexIMS adds a header to each record
containing event information, for example, record descriptor, the date, and time.
The program places each field into the output record, suppresses trailing blank
characters, and delimits each field with the pipe character. This output file is
formatted for JSA and the blank suppression reduces network traffic to JSA. This
program does not consume CPU or I/O disk resources.
Configuring DSMs
364 IBM
Step 6 The qexims_jcl.txt file is a text file containing a sample JCL. You must
configure the job card to meet your configuration.
The qexims_jcl.txt sample file includes:
//QEXIMS JOB (T,JXPO,JKSD0093),DEV,NOTIFY=Q1JACK,
// MSGCLASS=P,
// REGION=0M
//*
//*QEXIMS JCL VERSION 1.0 FEBRUARY 2011
//*
//************************************************************
//* Change dataset names to site specific dataset names *
//************************************************************
//SET1 SET IMSOUT='Q1JACK.QEXIMS.OUTPUT',
// IMSIN='Q1JACK.QEXIMS.INPUT.DATA'
//************************************************************
//* Delete old datasets *
//************************************************************
//DEL EXEC PGM=IEFBR14
//DD1 DD DISP=(MOD,DELETE),DSN=&IMSOUT,
// UNIT=SYSDA,
// SPACE=(CYL,(10,10)),
// DCB=(RECFM=FB,LRECL=80)
//************************************************************
//* Allocate new dataset
//************************************************************
//ALLOC EXEC PGM=IEFBR14
//DD1 DD DISP=(NEW,CATLG),DSN=&IMSOUT,
// SPACE=(CYL,(21,2)),
// DCB=(RECFM=VB,LRECL=1028,BLKSIZE=6144)
//EXTRACT EXEC PGM=QEXIMS,DYNAMNBR=10,
// TIME=1440
//STEPLIB DD DISP=SHR,DSN=Q1JACK.C.LOAD
//SYSTSIN DD DUMMY
//SYSTSPRT DD SYSOUT=*
//SYSPRINT DD SYSOUT=*
//IMSIN DD DISP=SHR,DSN=&IMSIN
//IMSOUT DD DISP=SHR,DSN=&IMSOUT
//*FTP EXEC PGM=FTP,REGION=3800K
//*INPUT DD *
//*<target server>
//*<USER>
//*<PASSWORD>
//*ASCII
//*PUT '<IMSOUT>' /TARGET DIRECTORY>/<IMSOUT>
//*QUIT
//*OUTPUT DD SYSOUT=*
//*SYSPRINT DD SYSOUT=*
//*
Configuring DSMs
IBM IMS 365
Step 7 After the output file is created, you must choose one of the following options:
a Schedule a job to transfer the output file to an interim FTP server.
Each time the job completes, the output file is forwarded to an intermin FTP
server. You must configure the following parameters in the sample JCL to
successfully forward the output to an interim FTP server:
For example:
//*FTP EXEC PGM=FTP,REGION=3800K
//*INPUT DD *
//*<target server>
//*<USER>
//*<PASSWORD>
//*ASCII
//*PUT '<IMSOUT>' /TARGET DIRECTORY>/<IMSOUT>
//*QUIT
//*OUTPUT DD SYSOUT=*
//*SYSPRINT DD SYSOUT=*
Where:
<target server> is the IP address or host name of the interim FTP server to
receive the output file.
<USER> is the user name required to access the interim FTP server.
<PASSWORD> is the password required to access the interim FTP server.
<IMSOUT> is the name of the output file saved to the interim FTP server.
For example:
PUT 'Q1JACK.QEXIMS.OUTPUT.C320' /192.168.1.101/IMS/QEXIMS.OUT
PUT.C320
NOTE
Note: You must remove commented lines beginning with //* for the script to
properly forward the output file to the interim FTP server.
Configuring DSMs
366 IBM
//*QUIT
//*OUTPUT DD SYSOUT=*
//*SYSPRINT DD SYSOUT=*
Configure a Log A log file protocol source allows JSA to retrieve archived log files from a remote
Source host.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 From the Log Source Type list box, select IBM IMS.
Step 5 Using the Protocol Configuration list box, select Log File.
Step 6 Configure the following parameters:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source. The log
source identifier must be unique for the log source type.
Service Type From the list box, select the protocol you want to use when
retrieving log files from a remove server. The default is SFTP.
• SFTP - SSH File Transfer Protocol
• FTP - File Transfer Protocol
• SCP - Secure Copy
Note: The underlying protocol used to retrieve log files for the
SCP and SFTP service types requires that the server
specified in the Remote IP or Hostname field has the SFTP
subsystem enabled.
Remote IP or Type the IP address or hostname of the IBM IMS system.
Hostname
Remote Port Type the TCP port on the remote host that is running the
selected Service Type. If you configure the Service Type as
FTP, the default is 21. If you configure the Service Type as
SFTP or SCP, the default is 22.
The valid range is 1 to 65535.
Remote User Type the username necessary to log in to your IBM IMS
system.
The username can be up to 255 characters in length.
Remote Password Type the password necessary to log in to your IBM IMS
system.
Configuring DSMs
IBM IMS 367
Parameter Description
Confirm Password Confirm the Remote Password to log in to your IBM IMS
system.
SSH Key File If you select SCP or SFTP from the Service Type field you
can define a directory path to an SSH private key file. The
SSH Private Key File allows you to ignore the Remote
Password field.
Remote Directory Type the directory location on the remote host from which the
files are retrieved. By default, the newauditlog.sh script writes
the human-readable logs files to the /var/log/ directory.
Recursive Select this check box if you want the file pattern to also search
sub folders. The Recursive parameter is not used if you
configure SCP as the Service Type. By default, the check box
is clear.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
For example, if you want to retrieve all files in the
<starttime>.<endtime>.<hostname>.log format, use the
following entry: \d+\.\d+\.\w+\.log.
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only appears if you select FTP as the Service
Type. The FTP Transfer Mode parameter allows you to define
the file transfer mode when retrieving log files over FTP.
From the list box, select the transfer mode you want to apply
to this log source:
• Binary - Select Binary for log sources that require binary
data files or compressed .zip, .gzip, .tar, or .tar+gzip
archive files.
• ASCII - Select ASCII for log sources that require an ASCII
FTP file transfer. You must select NONE for the Processor
field and LINEBYLINE the Event Generator field when
using ASCII as the transfer mode.
SCP Remote File If you select SCP as the Service Type, you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. This
parameter functions with the Recurrence value to establish
when and how often the Remote Directory is scanned for files.
Type the start time, based on a 24 hour clock, in the following
format: HH:MM.
Configuring DSMs
368 IBM
Parameter Description
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the directory to be scanned
every 2 hours. The default is 1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save. After the Run On Save
completes, the log file protocol follows your configured start
time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File(s) parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor If the files located on the remote host are stored in a .zip,
.gzip, .tar, or tar+gzip archive format, select the processor that
allows the archives to be expanded and contents processed.
Ignore Previously Select this check box to track files that have already been
Processed File(s) processed and you do not want the files to be processed a
second time. This only applies to FTP and SFTP Service
Types.
Change Local Select this check box to define the local directory on your JSA
Directory? system that you want to use for storing downloaded files
during processing. We recommend that you leave the check
box clear. When the check box is selected, the Local Directory
field is displayed, which allows you to configure the local
directory to use for storing files.
Event Generator From the Event Generator list box, select LINEBYLINE.
IBM Guardium IBM Guardium® is a database activity and audit tracking tool for system
administrators to retrieve detailed auditing events across database platforms.
NOTE
Note: These instructions require that you install the 8.2p45 fix for InfoSphere
Guardium. For more information on this fix, see the Fix Central website at
http://www.ibm.com/support/fixcentral/.
Supported Event JSA collects informational, error, alert, and warnings from IBM Guardium using
Types syslog. JSA receives IBM Guardium Policy Builder events in the Log Event
Extended Format (LEEF).
Configuring DSMs
IBM Guardium 369
JSA can only automatically discover and map events the default policies that ship
with IBM Guardium. Any user configured events require are displayed as
unknowns in JSA and you must manually map the unknown events.
Configuration The following list outlines the process required to integrate IBM Guardium with
Overview JSA.
1 Create a syslog destination for policy violation events. For more information, see
Creating a Syslog Destination for Events.
2 Configure your existing policies to generate syslog events. For more information,
see Configuring Policies to Generate Syslog Events.
3 Install the policy on IBM Guardium. For more information, see Installing an IBM
Guardium Policy.
4 Configure the log source in JSA. For more information, see Configure a Log
Source.
5 Identify and map unknown policy events in JSA. For more information, see
Creating an Event Map for IBM Guardium Events.
Creating a Syslog To create a syslog destination for these events on IBM Guardium, you must log in
Destination for to the command-line interface (CLI) and define the IP address for JSA.
Events
Procedure
Step 1 Using SSH, log in to IBM Guardium as the root user.
Username: <username>
Password: <password>
Step 2 Type the following command to configure the syslog destination for informational
events:
store remote add daemon.info <IP address>:<port> <tcp|udp>
For example, store remote add daemon.info 10.10.1.1:514 tcp
Where:
<IP address> is the IP address of your JSA console or Event Collector.
<port> is the syslog port number used to communicate to the JSA console or
Event Collector.
<tcp|udp> is the protocol used to communicate to the JSA console or Event
Collector.
Step 3 Type the following command to configure the syslog destination for warning
events:
store remote add daemon.warning <IP address>:<port> <tcp|udp>
Where:
<IP address> is the IP address of your JSA console or Event Collector.
Configuring DSMs
370 IBM
<port> is the syslog port number used to communicate to the JSA console or
Event Collector.
<tcp|udp> is the protocol used to communicate to the JSA console or Event
Collector.
Step 4 Type the following command to configure the syslog destination for error events:
store remote add daemon.err <IP address>:<port> <tcp|udp>
Where:
<IP address> is the IP address of your JSA console or Event Collector.
<port> is the syslog port number used to communicate to the JSA console or
Event Collector.
<tcp|udp> is the protocol used to communicate to the JSA console or Event
Collector.
Step 5 Type the following command to configure the syslog destination for alert events:
store remote add daemon.alert <IP address>:<port> <tcp|udp>
Where:
<IP address> is the IP address of your JSA console or Event Collector.
<port> is the syslog port number used to communicate to the JSA console or
Event Collector.
<tcp|udp> is the protocol used to communicate to the JSA console or Event
Collector.
You are now ready to configure a policy for IBM InfoSphere Guardium.
Configuring Policies Policies in IBM Guardium are responsible for reacting to events and forwarding the
to Generate Syslog event information to JSA.
Events
Procedure
Step 1 Click the Tools tab.
Step 2 From the left-hand navigation, select Policy Builder.
Step 3 From the Policy Finder pane, select an existing policy and click Edit Rules.
Step 4 Click Edit this Rule individually.
The Access Rule Definition is displayed.
Step 5 Click Add Action.
Step 6 From the Action list box, select one of the following alert types:
• Alert Per Match - A notification is provided for every policy violation.
• Alert Daily - A notification is provided the first time a policy violation occurs that
day.
• Alert Once Per Session - A notification is provided per policy violation for
unique session.
Configuring DSMs
IBM Guardium 371
• Alert Per Time Granularity - A notification is provided per your selected time
frame.
Step 7 From the Message Template list box, select JSA.
Step 8 From Notification Type, select SYSLOG.
Step 9 Click Add, then click Apply.
Step 10 Click Save.
Step 11 Repeat Step 2 to Step 10 for all rules within the policy you want to forward to JSA.
For more information on configuring a policy, see your IBM InfoSphere Guardium
vendor documentation. After you have configured all of your policies, you are now
ready to install the policy on your IBM Guardium system.
NOTE
Note: Due to the configurable policies, JSA can only automatically discover the
default policy events. If you have customized policies that forward events to JSA,
you must manually create a log source to capture those events.
Installing an IBM Any new or edited policy in IBM Guardium must be installed before the updated
Guardium Policy alert actions or rule changes can occur.
Procedure
Step 1 Click the Administration Console tab.
Step 2 From the left-hand navigation, select Configuration > Policy Installation.
Step 3 From the Policy Installer pane, select a policy you modified in Step 3, Configuring
Policies to Generate Syslog Events.
Step 4 From the drop-down list, select Install and Override.
A confirmation is displayed to install the policy to all Inspection Engines.
Step 5 Click OK.
For more information on installing a policy, see your IBM InfoSphere Guardium
vendor documentation. After you have installed all of your policies, you are ready
to configure the log source in JSA.
Configure a Log JSA only automatically discovers default policy events from IBM Guardium.
Source
Due to the configurable nature of policies, we recommend that you configure a log
source manually for IBM Guardium.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Configuring DSMs
372 IBM
Step 5 In the Log Source Name field, type a name for the log source.
Step 6 In the Log Source Description field, type a description for the log source.
Step 7 From the Log Source Type list box, select IBM Guardium.
Step 8 From the Protocol Configuration list box, select Syslog.
Step 9 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for the IBM InfoSphere
Guardium appliance.
For more information on configuring log sources, see the Log Sources Users
Guide.
Step 10 Click Save.
Step 11 On the Admin tab, click Deploy Changes.
The IBM Infosphere Guardium configuration is complete.
Creating an Event Event mapping is required for a number of IBM Guardium events. Due to the
Map for IBM customizable nature of policy rules, most events, except the default policy events
Guardium Events do not contain a predefined JSA Identifier (QID) map to categorize security events.
You can individually map each event for your device to an event category in JSA.
Mapping events allows JSA to identify, coalesce, and track reoccurring events from
your network devices. Until you map an event, all events that are displayed in the
Log Activity tab for IBM Guardium are categorized as unknown. Unknown events
are easily identified as the Event Name column and Low Level Category columns
display Unknown.
Procedure
Step 1 Log in to JSA.
Step 1 Click the Log Activity tab.
Step 2 Click Add Filter.
Step 3 From the first list box, select Log Source.
Step 4 From the Log Source Group list box, select the log source group or Other.
Log sources that are not assigned to a group are categorized as Other.
Configuring DSMs
IBM Guardium 373
Step 5 From the Log Source list box, select your IBM Guardium log source.
Step 6 Click Add Filter.
The Log Activity tab is displayed with a filter for your log source.
Step 7 From the View list box, select Last Hour.
Any events generated by the IBM Guardium DSM in the last hour are displayed.
Events displayed as unknown in the Event Name column or Low Level Category
column require event mapping in JSA.
NOTE
Note: You can save your existing search filter by clicking Save Criteria.
NOTE
Note: Events that do not have a defined log source cannot be mapped to an event.
Events without a log source display SIM Generic Log in the Log Source column.
Procedure
Step 1 On the Event Name column, double-click an unknown event for IBM Guardium.
The detailed event information is displayed.
Step 2 Click Map Event.
Step 3 From the Browse for QID pane, select any of the following search options to
narrow the event categories for a JSA Identifier (QID):
a From the High-Level Category list box, select a high-level event
categorization.
For a full list of high-level and low-level event categories or category definitions,
see the Event Categories section of the Juniper Secure Analytics
Administration Guide.
b From the Low-Level Category list box, select a low-level event categorization.
c From the Log Source Type list box, select a log source type.
The Log Source Type list box allows you to search for QIDs from other log
sources. Searching for QIDs by log source is useful when events are similar to
another existing network device. For example, IBM Guardium provides policy
events, you might select another product that likely captures similar events.
d To search for a QID by name, type a name in the QID/Name field.
The QID/Name field allows you to filter the full list of QIDs for a specific word,
for example, policy.
Configuring DSMs
374 IBM
IBM Security The Juniper Secure Analytics (JSA) DSM for IBM Security Directory Server can
Directory Server collect event logs from your IBM Security Directory Server.
Table 54-15 identifies the specifications for the IBM Security Directory Server DSM.
Specification Value
Manufacturer IBM
DSM IBM Security Directory Server
RPM file name DSM-IBMSecurityDirectoryServer-build_number.noarch.rpm
Supported 6.3.1 and later
version
Protocol Syslog (LEEF)
JSA recorded All relevant events
events
Automatically Yes
discovered
Includes identity Yes
For more http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp?t
information opic=%2Fcom.ibm.IBMDS.doc_6.3.1%2Fadmin_gd381.htm&pat
h=9_3_4_13_18_3
Configuring DSMs
IBM Security Directory Server 375
IBM Security To integrate IBM Security Directory Server with JSA, use the following procedure:
Directory Server
integration process
1 If automatic updates are not enabled, download and install the most recent
versions of the following RPMs on your JSA console:
• DSMCommon RPM
• IBM Security Directory Server RPM
2 Configure each IBM Security Directory Server system in your network to enable
communication with JSA.
For more information, see Enabling communication between JSA and IBM
Security Directory Server
(http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp?topic=%2Fcom.ib
m.IBMDS.doc_6.3.1%2Fadmin_gd381.htm&path=9_3_4_13_18_3)
3 If JSA does not automatically discover the log source, for each IBM Security
Directory Server on your network, create a log source on the JSA console.
Related tasks
Manually installing a DSM
Configuring an IBM To collect IBM Security Directory Server events, configure a log source in JSA.
Security Directory
Server Log Source in Before you begin
JSA Ensure that the
DSM-IBMSecurityDirectoryServer-build_number.noarch.rpm file is
installed and deployed on your JSA host:
Procedure
To configure an IBM Security Directory Server log source in JSA:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 From the Log Source Type list, select IBM Security Directory Server.
Step 7 From the Protocol Configuration list, select Syslog.
Step 8 Configure the remaining parameters.
Step 9 Click Save.
Step 10 On the Admin tab, click Deploy Changes.
Configuring DSMs
376 IBM
IBM Tivoli Access The IBM Tivoli® Access Manager for e-business DSM for JSA accepts access,
Manager for audit, and HTTP events forwarded from IBM Tivoli Access Manager.
E-business
JSA collects audit, access, and HTTP events from IBM Tivoli Access Manager for
e-business using syslog. Before you can configure JSA, you must configure Tivoli
Access Manager for e-business to forward events to a syslog destination.
Configure Tivoli You can configure syslog on your Tivoli Access Manager for e-business to forward
Access Manager for events.
E-business
Procedure
To configure Tivoli Access Manager for E-business:
Step 1 Log in to Tivoli Access Manager’s IBM Security Web Gateway.
Step 2 From the navigation menu, select Secure Reverse Proxy Settings > Manage >
Reverse Proxy.
The Reverse Proxy pane is displayed.
Step 3 From the Instance column, select an instance.
Step 4 Click the Manage list box and select Configuration > Advanced.
The text of the WebSEAL configuration file is displayed.
Step 5 Locate the Authorization API Logging configuration.
The remote syslog configuration begins with logcfg. For example,
# As an example, to send authorization events to a remote syslog
server:
# logcfg = audit.azn:rsyslog server=<IP
address>,port=514,log_id=<log name>
Step 6 Copy the remote syslog configuration (logcfg) to a new line without the comment
(#) marker.
Step 7 Edit the remote syslog configuration.
For example,
logcfg = audit.azn:rsyslog server=<IP
address>,port=514,log_id=<log name>
logcfg = audit.authn:rsyslog server=<IP address>,port=514,log_id=<log name>
logcfg = http:rsyslog server=<IP address>,port=514,log_id=<log name>
Where:
<IP address> is the IP address of your JSA console or Event Collector.
<Log name> is the name assigned to the log that is forwarded to JSA. For
example, log_id=WebSEAL-log.
Step 8 Click Submit.
The Deploy button is displayed in the navigation menu.
Configuring DSMs
IBM Tivoli Access Manager for E-business 377
Configure a Log JSA automatically discovers syslog audit and access events, but does not
Source automatically discover HTTP events forwarded from IBM Tivoli Access Manager
for e-business.
Since JSA automatically discovers audit and access events, you are not required
to create a log source. However, you can manually create a log source for JSA to
receive IBM Tivoli Access Manager for e-business syslog events. The following
configuration steps for creating a log source are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Step 5 In the Log Source Name field, type a name for the log source.
Step 6 In the Log Source Description field, type a description for the log source.
Step 7 From the Log Source Type list box, select IBM Tivoli Access Manager for
e-business.
Step 8 From the Protocol Configuration list box, select Syslog.
Configuring DSMs
378 IBM
Table 54-16 IBM Tivloi Access Manager for E-business Syslog Configuration
Parameter Description
Log Source Identifier Type the IP address or hostname for your IBM Tivoli Access
Manager for e-business appliance.
The IP address or hostname identifies your IBM Tivoli
Access Manager for e-business as a unique event source in
JSA.
For more information on configuring log sources, see the Log Sources Users
Guide.
Step 10 Click Save.
Step 11 On the Admin tab, click Deploy Changes.
The IBM Tivoli Access Manager for e-business configuration is complete.
IBM z/Secure Audit The IBM z/OS DSM for Juniper Secure Analytics (JSA) allows you to integrate with
an IBM z/OS mainframe using IBM Security zSecure Audit to collect security,
authorization, and audit events.
Using a zSecure process, events from the System Management Facilities (SMF)
are recorded to an event file in the Log Enhanced Event format (LEEF). JSA
retrieves the LEEF event log files using the log file protocol and processes the
events. You can schedule JSA to retrieve events on a polling interval, which allows
JSA to retrieve the events on the schedule you have defined.
To integrate IBM z/OS events from IBM Security zSecure Audit into JSA:
1 Confirm your installation meets any prerequisite installation requirements. For
more information, see Before You Begin.
2 Configure your IBM z/OS image. For more information, see the IBM Security
zSecure Suite: CARLa-Driven Components Installation and Deployment Guide.
3 Create a log source in JSA for IBM z/OS to retrieve your LEEF formatted event
logs. For more information, see Create an IBM z/OS Log Source.
4 Optional. Create a custom event property for IBM z/OS in JSA. For more
information, see the Custom Event Properties for IBM z/OS technical note.
Before You Begin Before you can configure the data collection process, you must complete the basic
zSecure installation process.
Configuring DSMs
IBM z/Secure Audit 379
Create an IBM z/OS The Log File protocol allows JSA to retrieve archived log files from a remote host.
Log Source
Log files are transferred, one at a time, to JSA for processing. The log file protocol
can manage plain text event logs, compressed files, or archives. Archives must
contain plain-text files that can be processed one line at a time. Multi-line event
logs are not supported by the log file protocol. IBM z/OS with zSecure writes log
files to a specified directory as gzip archives. JSA extracts the archive and
processes the events, which are written as one event per line in the file.
To retrieve these events, you must create a log source using the Log File protocol.
JSA requires credentials to log in to the system hosting your LEEF formatted event
files and a polling interval.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Step 5 In the Log Source Name field, type a name for the log source.
Step 6 In the Log Source Description field, type a description for the log source.
Step 7 From the Log Source Type list box, select IBM z/OS.
Step 8 From the Protocol Configuration list box, select Log File.
Configuring DSMs
380 IBM
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names are recommended as
they allow JSA to identify a log file to a unique event source.
Configuring DSMs
IBM z/Secure Audit 381
Parameter Description
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file. When
you provide an SSH Key File, the Remote Password field is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
IBM z/OS mainframe using IBM Security zSecure Audit writes
event files using the pattern zOS.<timestamp>.gz
The FTP file pattern you specify must match the name you
assigned to your event files. For example, to collect files
starting with zOS and ending with .gz, type the following:
zOS.*\.gz
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only displays if you select FTP as the Service
Type. From the list box, select Binary.
The binary transfer mode is required for event files stored in a
binary or compressed format, such as zip, gzip, tar, or
tar+gzip archive files.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. For
example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files. Type the start time, based on a 24 hour
clock, in the following format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the remote directory to be
scanned every 2 hours from the start time. The default is 1H.
Configuring DSMs
382 IBM
Parameter Description
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the Run On Save completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor From the list box, select gzip.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded to JSA. JSA can process files in zip,
gzip, tar, or tar+gzip archive format.
Ignore Previously Select this check box to track and ignore files that have
Processed File(s) already been processed by the log file protocol.
JSA examines the log files in the remote directory to
determine if a file has been previously processed by the log
file protocol. If a previously processed file is detected, the log
file protocol does not download the file for processing. All files
that have not been previously processed are downloaded.
This option only applies to FTP and SFTP Service Types.
Change Local Select this check box to define a local directory on your JSA
Directory? for storing downloaded files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory to
use for storing files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
Configuring DSMs
IBM Tivoli Endpoint Manager 383
IBM Tivoli Endpoint The IBM Tivoli Endpoint Manager DSM for JSA accepts system events in Log
Manager Extended Event Format (LEEF) retrieved from IBM Tivoli Endpoint Manager.
JSA uses the Tivoli Endpoint Manager SOAP protocol to retrieve events on a 30
second interval. As events are retrieved the IBM Tivoli Endpoint Manager DSM
parses and categorizes the events for JSA. The SOAP API for IBM Tivoli Endpoint
Manager is only available after you have installed with the Web Reports
application. The Web Reports application for Tivoli Endpoint Manager is required
to retrieve and integrate IBM Tivoli Endpoint Manager system event data with JSA.
NOTE
Note: JSA is compatible with IBM Tivoli Endpoint Manager versions 8.2.x.
However, we recommend that you update and use the latest version of IBM Tivoli
Endpoint Manager that is available.
To integrate IBM Tivoli Endpoint Manager with JSA, you must manually configure a
log source as events from IBM Tivoli Endpoint Manager are not automatically
discovered.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Step 5 In the Log Source Name field, type a name for the log source.
Step 6 In the Log Source Description field, type a description for the log source.
Step 7 From the Log Source Type list box, select IBM Tivoli Endpoint Manager.
Step 8 From the Protocol Configuration list box, select IBM Tivoli Endpoint Manager
SOAP.
Step 9 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for your IBM Tivoli
Endpoint Manager appliance.
The IP address or hostname identifies your IBM Tivoli
Endpoint Manager as a unique event source in JSA.
Configuring DSMs
384 IBM
Table 54-18 IBM Tivoli Endpoint Manager SOAP Protocol Configuration (continued)
Parameter Description
Port Type the port number used to connect to the IBM Tivoli
Endpoint Manager using the SOAP API.
By default, port 80 is the port number for communicating with
IBM Tivoli Endpoint Manager. If you are use HTTPS, you
must update this field to the HTTPS port number for your
network. Most configurations use port 443 for HTTPS
communications.
Use HTTPS Select this check box to connect using HTTPS.
If you select this check box, the hostname or IP address you
specify uses HTTPS to connect to your IBM Tivoli Endpoint
Manager. If a certificate is required to connect using HTTPS,
you must copy any certificates required by the JSA Console
or managed host to the following directory:
/opt/qradar/conf/trusted_certificates
Note: JSA support certificates with the following file
extensions: .crt, .cert, or .der. Any required certificates
should be copied to the trusted certificates directory before
you save and deploy your changes.
Username Type the username required to access your IBM Tivoli
Endpoint Manager.
Password Type the password required to access your IBM Tivoli
Endpoint Manager.
Confirm Password Confirm the password necessary to access your IBM Tivoli
Endpoint Manager.
For more information on configuring JSAto import IBM Tivoli Endpoint Manager
vulnerabilities assessment information, see the Juniper Secure Analytics
Managing Vulnerability Assessment Guide.
Step 10 Click Save.
Step 11 On the Admin tab, click Deploy Changes.
The IBM Tivoli Endpoint Manager configuration is complete.
IBM zSecure Alert The IBM zSecure Alert DSM for JSA accepts alert events using syslog, allowing
JSA to receive alert events in real-time.
The alert configuration on your IBM zSecure Alert appliance determines which
alert conditions you want to monitor and forward to JSA. To collect events in JSA,
you must configure your IBM zSecure Alert appliance to forward events in a UNIX
syslog event format using the JSA IP address as the destination. For information
on configuring UNIX syslog alerts and destinations, see the IBM Security zSecure
Alert User Reference Manual.
Configuring DSMs
IBM Security Network Protection (XGS) 385
JSA automatically discovers and creates a log source for syslog events from IBM
zSecure Alert. However, you can manually create a log source for JSA to receive
syslog events. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Step 5 In the Log Source Name field, type a name for your log source.
Step 6 In the Log Source Description field, type a description for the log source.
Step 7 From the Log Source Type list box, select IBM zSecure Alert.
Step 8 Using the Protocol Configuration list box, select Syslog.
Step 9 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your IBM zSecure Alert.
IBM Security The IBM Security Network Protection (XGS) DSM accepts events by using the Log
Network Protection Enhanced Event Protocol (LEEF), enabling JSA to record all relevant events.
(XGS)
Before you configure an Network Security Protection (XGS) appliance in JSA, you
must configure remote syslog alerts for your IBM Security Network Protection
(XGS) rules or policies to forward events to JSA.
Supported Event IBM Security Network Protection (XGS) appliances provides three types of event
Types to JSA:
• System events
• Access events
• Security events
To integrate the device with JSA see the Network Security Protection (XGS) online
documentation:
Configuring DSMs
386 IBM
http://pic.dhe.ibm.com/infocenter/sprotect/v2r8m0/topic/com.ibm.alps.doc/tasks/al
ps_configuring_system_alerts.htm.
Configure IBM All event types are sent to JSA using a remote syslog alert object that is LEEF
Security Network enabled.
Protection (XGS)
Alerts Remote syslog alert objects can be created, edited and deleted from each context
in which an events is generated. To configure a remote syslog alert object log in to
the Network Security Protection (XGS) local management interface as admin and
navigate to one of the following:
In the IPS Objects, the Network Objects pane, or the System Alerts page,
complete the following steps.
Procedure
Step 1 Click New > Alert > Remote Syslog.
Step 2 Select an existing remote syslog alert object, and then click Edit.
Step 3 Configure the following options:
Option Description
Name Type a name for the syslog alert configuration.
Remote Syslog Collector Type the IP address of your JSA Console or Event
Collector.
Remote Syslog Collector Port Type 514 for the Remote Syslog Collector Port.
Remote LEEF Enabled Select this check box to enable LEEF formatted
events. This field is required.
Note: If you do not see this option, verify you have
software version 5.0 and fixpack 7 installed on your
IBM Security Network Protection appliance.
Comment Optional. Type a comment for the syslog
configuration.
Configuring DSMs
IBM Security Network Protection (XGS) 387
The remote syslog alert object you created is now ready to be added to your
system, access, or security policies to forward events to JSA
Step 6 To make your IBM Security Network Protection (XGS) device send an event to
JSA, you must:
• Add the LEEF alert object for JSA to one or more rules in a policy.
• Add the LEEF alert object for JSA to the Added Objects pane n the System
Alerts page.
Step 7 Click Deploy to update your IBM Security Network Protection (XGS) appliance.
Further support information about the Network Security Protection (XGS) device
can be found by clicking help in the Network Security Protection (XGS) local
management interface browser client window or by accessing the online Network
Security Protection (XGS) documentation.
The configuration is complete. The log source is added to JSA as events IBM
Security Network Protection (XGS) are automatically discovered. Events
forwarded to JSA by IBM Security Network Protection (XGS) are displayed on the
Log Activity tab of JSA.
Configuring a Log JSA automatically discovers and creates a log source for LEEF-enabled syslog
Source in JSA events from IBM Security Network Protection (XGS). The following configuration
steps are optional.
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your log source.
Step 5 From the Log Source Type list box, select IBM Security Network Protection
(XGS).
Step 6 Using the Protocol Configuration list box, select Syslog.
Step 7 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your IBM Security Network
Protection (XGS).
Configuring DSMs
388 IBM
IBM Security The IBM Security Network IPS DSM for JSA accepts LEEF-based events from IBM
Network IPS Security Network IPS appliances using syslog.
Supported Versions JSA supports syslog events from IBM Security Network IPS appliances v4.6 and
above.
Supported Events Events forwarded by the IBM Security Network IPS appliance are generated from
security alerts (including IPS and SNORT), health alerts, and system alerts. IPS
events include security, connection, user defined, and OpenSignture policy events.
NOTE
Note: Ensure no firewall rules are blocking the communication between your IBM
Security Network IPS appliance and JSA.
Configuring your IBM To collect events with JSA, you must configure your IBM Security Network IPS
Security Network IPS appliance to enable syslog forwarding of LEEF events.
Appliances
Procedure
Step 1 Log in to your IPS Local Management Interface.
Step 2 From the navigation menu, select Manage System Settings > Appliance > LEEF
Log Forwarding.
Step 3 Select the Enable Local Log check box.
Step 4 In the Maximum File Size field, configure the maximum file size for your LEEF log
file.
Step 5 From the Remote Syslog Server pane, select the Enable check box.
Step 6 In the Syslog Server IP/Host field, type the IP address of your JSA Console or
Event Collector.
Step 7 In the UDP Port field, type 514 as the port for forwarding LEEF log events.
Step 8 From the event type list, enable any event types that are forwarded to JSA. The
options include Security Event, System Event, and Health Event.
The syslog configuration for your IBM Security Network IPS is complete.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from IBM
Source in JSA Security Network IPS appliances. However, you can manually create a log source
for JSA to receive syslog events. This procedure is optional.
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your log source.
Configuring DSMs
IBM Security Network IPS 389
Step 5 From the Log Source Type list box, select IBM Security Network IPS.
Step 6 Using the Protocol Configuration list box, select Syslog.
Step 7 Configure the following values:
Parameter Description
Log Source Type the IP address or host name for the log source as an
Identifier identifier for events from your IBM Security Network IPS appliance.
Enabled Select this check box to enable the log source.
By default, the check box is selected.
Credibility Select the credibility of the log source. The range is 0 - 10.
The credibility indicates the integrity of an event or offense as
determined by the credibility rating from the source devices.
Credibility increases if multiple sources report the same event. The
default is 5.
Target Event Select the Event Collector to use as the target for the log source.
Collector
Coalescing Select this check box to enable the log source to coalesce (bundle)
Events events.
By default, automatically discovered log sources inherit the value
of the Coalescing Events list box from the System Settings in
JSA. When you create a log source or edit an existing
configuration, you can override the default value by configuring
this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for parsing
Payload and storing the logs.
Store Event Select this check box to enable the log source to store event
Payload payload information.
By default, automatically discovered log sources inherit the value
of the Store Event Payload list box from the System Settings in
JSA. When you create a log source or edit an existing
configuration, you can override the default value by configuring
this option for each log source.
Configuring DSMs
390 IBM
Configuring DSMs
55 IBM PRIVILEGED SESSION
RECORDER
The Juniper Secure Analytics (JSA) DSM for IBM Privileged Session Recorder can
collect event logs from your IBM Privileged Session Recorder device.
Table 55-1 identifies the specifications for the IBM Privileged Session Recorder
DSM.
Table 55-1 Trend Micro Deep Discovery Analyzer DSM Specifications
Specification Value
Manufacturer IBM
DSM name Privileged Session Recorder
RPM file name DSM-IBMPrivilegedSessionRecorder
Protocol JDBC
Event format LEEF
JSA recorded Command Execution Audit Events
events
Automatically No
discovered
Includes identity No
For more IBM website
information (http://www.ibm.com/)
To integrate IBM Privileged Session Recorder with JSA, use the following
procedures:
1 If automatic updates are not enabled, download and install the following RPMs on
your JSA console:
• Protocol-JDBC RPM
Configuring DSMs
392 IBM PRIVILEGED SESSION RECORDER
Configuring a Log JSA does not automatically discover IBM Privileged Session Recorder events. To
Source for IBM integrate IBM Privileged Session Recorder event data, you must create a log
Privileged Session source for each instance from which you want to collect event logs.
Recorder
Procedure
1 Log in to JSA.
2 Click the Admin tab.
3 In the navigation menu, click Data Sources.
4 Click the Log Sources icon.
5 Click Add.
6 From the Log Source Type list, select IBM Privileged Session Recorder.
7 From the Protocol Configuration list, select JDBC.
8 From the Predefined Query list, select IBM Privileged Session Recorder.
9 Configure the remaining parameters.
10 Click Save.
11 On the Admin tab, click Deploy Changes.
Configuring DSMs
56 IBM SECURITY NETWORK IPS
The IBM Security Network IPS DSM for Juniper Secure Analytics (JSA) collects
LEEF-based events from JSA IPS appliances by using the syslog protocol.
Table 56-1 identifies the specifications for the IBM Security Network IPS DSM.
Table 56-1 IBM Security Network IPS DSM Specifications
Specification Value
Manufacturer IBM
DSM Security Network IPS
RPM file names DSM-IBMSecurityNetworkIPS-QRadar_version-Buil
d_number.noarch.rpm
Supported v4.6 and later (UDP)
versions v4.6.2 and later (TCP)
Protocol syslog (LEEF)
JSA recorded Security alerts (including IPS and SNORT)
events Health alerts
System alerts
IPS events (Includubg security, connection, user
defined,
and OpenSignature policy events)
Automatically Yes
discovered
Includes identity No
Configuring DSMs
394 IBM SECURITY NETWORK IPS
To integrate the IBM Security Network IPS appliance with JSA, use the following
steps:
1 If automatic updates are not enabled, download and install the most recent version
of the IBM Security Network IPS RPMs on your JSA console.
2 For each instance of IBM Security Network IPS, configure your IBM Security
Network IPS appliance to enable communication with JSA.
3 If JSA does not automatically discover the log source, create a log source for each
instance of IBM Security Network IPS on your network.
Configuring your IBM To collect events with JSA, you must configure your IBM Security Network IPS
Security Network IPS appliance to enable syslog forwarding of LEEF events.
Appliance for
Communication with Before you begin
JSA
Ensure that no firewall rules block the communication between your IBM Security
Network IPS appliance and JSA.
Procedure
To configure your IBM Security Network IPS appliance to enable syslog forwarding
of LEEF events:
Configuring DSMs
57 IMPERVA SECURESPHERE
The Imperva SecureSphere DSM for Juniper Secure Analytics (JSA) records all
relevant events forwarded using syslog.
Configuration To collect syslog events, you must configure your Imperva SecureSphere
Overview appliance with an alert and a system event action that can be associated to a
firewall or system policy. Each time a firewall policy triggers an alert action or a
system event policy triggers an event action a syslog event is sent to JSA. JSA
supports syslog events from SecureSphere V6.2, V7.x, and V8.5.
Configuring an Alert You can configure your Imperva SecureSphere appliance to forward syslog events
Action for Imperva for firewall policy alerts to JSA.
SecureSphere
Procedure
Step 1 Log in to your SecureSphere device user interface using administrative privileges.
Step 2 Click the Policies tab.
Step 3 Click the Action Sets tab.
Step 4 To generate events for each alert generated by the SecureSphere device:
a Click New to create a new action set for an alert.
b Move the action to the Selected Actions list.
c Expand the System Log action group.
d In the Action Name field, type a name for your alert action.
Configuring DSMs
396 IMPERVA SECURESPHERE
NOTE
Note: The devTimeFormat does not include a value as the time format can be
configured on the SecureSphere appliance. Administrators must review the time
format of their SecureSphere appliance and specify the appropriate time format.
For example, dd MMM yyyy HH:mm:ss or yyyy-MM-dd HH:mm:ss.S.
Configuring DSMs
397
Step 5 To trigger syslog events, you must associate your firewall policies to use your alert
actions.
a From the navigation menu, select Policies > Security > Firewall Policy.
b Select the policy you want to edit to use the alert action.
c Click the Policy tab.
d From the Followed Action list, select your new action.
e Ensure your policy is configured as enabled and is applied to the appropriate
server groups.
f Click Save.
g Repeat this step for all policies that require an alert.
Configuring a System You can configure your Imperva SecureSphere appliance to forward syslog system
Event Action for policy events to JSA.
Imperva
SecureSphere
Step 1 Click the Policies tab.
Step 2 Click the Action Sets tab.
Step 3 To generate events for each event generated by the SecureSphere device:
a Click New to create a new action set for an event.
b Move the action to the Selected Actions list.
c Expand the System Log action group.
d In the Action Name field, type a name for your event action.
e Configure the following parameters:
- Syslog host - Type the IP address of JSA to which you want to send events.
- Syslog log level - Select INFO.
- Message - Define a message string for your event type from Table 57-2.
Table 57-2 Imperva SecureSphere System Event Message Strings
Configuring DSMs
398 IMPERVA SECURESPHERE
NOTE
Note: The devTimeFormat does not include a value as the time format can be
configured on the SecureSphere appliance. Administrators must review the time
format of their SecureSphere appliance and specify the appropriate time format.
For example, dd MMM yyyy HH:mm:ss or yyyy-MM-dd HH:mm:ss.S.
Configuring DSMs
399
Step 4 To enable the action, you must edit your system event policies to use the action.
The below procedure details the steps to configure the action for a system event
policy. Repeat this procedure for all required policies.
a Go to Policies > System Events.
b Select or create the system event policy you want to edit to use the event
action.
c Click the Followed Action tab.
d From the Followed Action list, select your system event action.
e Click Save.
f Repeat this step for all system event policies that require an action.
Configuring a log JSA automatically discovers and creates a log source for syslog events from
source Imperva SecureSphere. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Step 5 In the Log Source Name field, type a name for your log source.
Step 6 From the Log Source Type list box, select Imperva SecureSphere.
Step 7 Using the Protocol Configuration list box, select Syslog.
Step 8 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Imperva SecureSphere
appliance.
Enabled Select this check box to enable the log source.
By default, the check box is selected.
Credibility Select the credibility of the log source. The range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector Select the Event Collector to use as the target for the log
source.
Configuring DSMs
400
Parameter Description
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Configuring DSMs
58 INFOBLOX NIOS
The Infoblox NIOS DSM for Juniper Secure Analytics (JSA) accepts events using
syslog, enabling JSA to record all relevant events from an Infoblox NIOS device.
Before configuring JSA, you must configure your Infoblox NIOS device to send
syslog events to JSA. For more information on configuring logs on your Infoblox
NIOS device, see your Infoblox NIOS vendor documentation.
Table 58-1 identifies the specifications for the Infoblox NIOS DSM.
Table 58-1 Infoblox NIOS DSM Specifications
Specification Value
Manufacturer Infoblox
DSM NIOS
Version v6.x
Events accepted Syslog
JSA recorded • ISC Bind events
events • Linux DHCP events
• Linux Server events
• Apache events
Option in QRadar Infoblox NIOS
Auto discovered No
Includes identity Yes
For more http://www.infoblox.com
information
Configuring a Log To integrate Infoblox NIOS appliances with JSA, you must manually create a log
Source source to receive Infoblox NIOS events.
JSA does not automatically discover or create log sources for syslog events from
Infoblox NIOS appliances.
Configuring DSMs
402 INFOBLOX NIOS
Procedure
To integrate Infoblox NIOS appliances with JSA:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Infoblox NIOS.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the remaining parameters.
Step 11 Click Save.
Step 12 On the Admin tab, click Deploy Changes.
The log source is added to JSA. Events forwarded to JSA by Infoblox NIOS are
displayed on the Log Activity tab.
Configuring DSMs
59 ISC BIND
You can integrate an Internet System Consortium (ISC) BIND device with Juniper
Secure Analytics (JSA). An ISC BIND device accepts events using syslog.
Configuring Syslog You can configure syslog on your ISC BIND device to forward events to JSA.
for ISC BIND
Procedure
Step 1 Log in to the ISC BIND device.
Step 2 Open the following file to add a logging clause:
named.conf
logging {
channel <channel_name> {
syslog <syslog_facility>;
severity <critical | error | warning | notice | info |
debug [level ] | dynamic >;
print-category yes;
print-severity yes;
print-time yes;
};
category queries {
<channel_name>;
};
category notify {
<channel_name>;
};
category network {
<channel_name>;
};
category client {
<channel_name>;
};
Configuring DSMs
404 ISC BIND
};
For Example:
logging {
channel QRadar {
syslog local3;
severity info;
};
category queries {
QRadar;
};
category notify {
QRadar;
};
category network {
QRadar;
};
category client {
QRadar;
};
};
Step 3 Save and exit the file.
Step 4 Edit the syslog configuration to log to your JSA using the facility you selected in
Step 2:
<syslog_facility>.* @<IP Address>
Where <IP Address> is the IP address of your JSA.
For example:
local3.* @192.16.10.10
NOTE
Note: JSA only parses logs with a severity level of info or higher.
Configuring DSMs
405
Configuring a Log JSA automatically discovers and creates a log source for syslog events from ISC
Source BIND. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select ISC BIND.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your ISC BIND appliance.
Configuring DSMs
60 IT-CUBE AGILESI
The iT-CUBE agileSI DSM for Juniper Secure Analytics (JSA) can accept
security-based and audit SAP events from agileSI installations that are integrated
with your SAP system.
JSA uses the event data defined as security risks in your SAP environment to
generate offenses and correlate event data for your security team. SAP security
events are written in Log Event Extended Format (LEEF) to a log file produced by
agileSI. JSA retrieves the new events using the SMB Tail protocol. To retrieve
events from agileSI, you must create a log source using the SMB Tail protocol and
provide JSA credentials to log in and poll the LEEF formatted agileSI event file.
JSA is updated with new events each time the SMB Tail protocol polls the event file
for new SAP events.
Configuring AgileSI To configure agileSI, you must create a logical filename for your events and
to Forward Events configure the connector settings with the path to your agileSI event log.
The location of the LEEF formatted event file must be in a location viewable by
Samba and accessible with the credentials you configure for the log source in JSA.
Procedure
Step 1 In agileSI core system installation, define a logical file name for the output file
containing your SAP security events.
SAP provides a concept which enables you to use platform-independent logical file
names in your application programs. Create a logical file name and path using
transaction “FILE” (Logical File Path Definition) according to your organization’s
requirements.
Step 2 Log in to agileSI.
For example, http://<sap-system-url:port>/sap/bc/webdynpro/itcube/
ccf?sap-client=<client>&sap-language=EN
Where:
<sap-system-url> is the IP address and port number of your SAP system, such
as 10.100.100.125:50041.
<client> is the agent in your agileSI deployment.
Step 3 From the menu, click Display/Change to enable change mode for agileSI.
Configuring DSMs
408 IT-CUBE AGILESI
Step 4 From the toolbar, select Tools > Core Consumer Connector Settings.
The Core Consumer Connector Settings are displayed.
Step 5 Configure the following values:
a From the Consumer Connector list box, select Q1 Labs.
b Select the Active check box.
c From the Connector Type list box, select File.
d From the Logical File Name field, type the path to your logical file name you
configured in Step 1.
For example, /ITCUBE/LOG_FILES.
The file created for the agileSI events is labeled LEEFYYYYDDMM.TXT where
YYYYDDMM is the year, day, and month. The event file for the current day is
appended with new events every time the extractor runs. iT-CUBE agileSI
creates a new LEEF file for SAP events daily.
Step 6 Click Save.
The configuration for your connector is saved. Before you can complete the agileSI
configuration, you must deploy the changes for agileSI using extractors.
Step 7 From the toolbar, select Tools > Extractor Management.
The Extractor Management settings are displayed.
Step 8 Click Deploy all.
The configuration for agileSI events is complete. You are now ready to configure a
log source in JSA.
Configure an AgileSI JSA must be configured to log in and poll the event file using the SMB Tail
Log Source protocol.
The SMB Tail protocol logs in and retrieves events logged by agileSI in the
LEEFYYYDDMM.txt file.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select iT-CUBE agileSI.
Step 9 Using the Protocol Configuration list box, select SMB Tail.
Configuring DSMs
409
Parameter Description
Log Source Identifier Type the IP address, hostname, or name for the log source
as an identifier for your iT-CUBE agileSI events.
Server Address Type the IP address of your iT-CUBE agileSI server.
Domain Type the domain for your iT-CUBE agileSI server.
This parameter is optional if your server is not located in a
domain.
Username Type the username required to access your iT-CUBE agileSI
server.
Note: The username and password you specify must be able
to read to the LEEFYYYYDDMM.txt file for your agileSI
events.
Password Type the password required to access your iT-CUBE agileSI
server.
Confirm Password Confirm the password required to access your iT-CUBE
agileSI server.
Log Folder Path Type the directory path to access the LEEFYYYYDDMM.txt
file.
Parameters that support file paths allow you to define a drive
letter with the path information. For example, you can use
c$\LogFiles\ for an administrative share, or LogFiles\
for a public share folder path, but not c:\LogFiles.
If a log folder path contains an administrative share (C$),
users with NetBIOS access on the administrative share (C$)
have the proper access required to read the log files. Local
or domain administrators have sufficient privileges to access
log files that reside on administrative shares.
File Pattern Type the regular expression (regex) required to filter the
filenames. All matching files are included for processing
when JSA polls for events.
For example, if you want to list all files ending with txt, use
the following entry: .*\.txt. Use of this parameter requires
knowledge of regular expressions (regex). For more
information, see the following website:
http://download.oracle.com/javase/tutorial/essential/regex/
Force File Read Select this check box to force the protocol to read the log file.
By default, the check box is selected.
If the check box is clear the event file is read when JSA
detects a change in the modified time or file size.
Recursive Select this check box if you want the file pattern to search
sub folders. By default, the check box is selected.
Configuring DSMs
410 IT-CUBE AGILESI
Parameter Description
Polling Interval (in Type the polling interval, which is the number of seconds
seconds) between queries to the event file to check for new data.
The minimum polling interval is 10 seconds, with a maximum
polling interval of 3,600 seconds. The default is 10 seconds.
Throttle Events/Sec Type the maximum number of events the SMB Tail protocol
forwards per second.
The minimum value is 100 EPS and the maximum is 20,000
EPS. The default is 100 EPS.
Configuring DSMs
61 ITRON SMART METER
The Itron Smart Meter DSM for Juniper Secure Analytics (JSA) collects events
from an Itron Openway Smart Meter using syslog.
The Itron Openway Smart Meter sends syslog events to JSA using Port 514. For
details of configuring your meter for syslog, see your Itron Openway Smart Meter
documentation.
JSA automatically discovers and creates a log source for syslog events from Itron
Openway Smart Meters. However, you can manually create a log source for JSA
to receive syslog events. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Itron Smart Meter.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Itron Openway Smart Meter
installation.
Configuring DSMs
62 JUNIPER NETWORKS
Juniper Networks The Juniper Networks Application Volume Tracking (AVT) DSM for Juniper Secure
AVT Analytics (JSA) accepts events using Java Database Connectivity (JDBC)
protocol.
JSA records all relevant events. To integrate with Juniper Networks NSM AVT
data, you must create a view in the database on the Juniper Networks NSM server.
You must also configure the Postgres database configuration on the Juniper
Networks NSM server to allow connections to the database since, by default, only
local connections are allowed.
NOTE
Note: This procedure is provided as a guideline. For specific instructions, see your
vendor documentation.
Configuring DSMs
414 JUNIPER NETWORKS
Procedure
Step 1 Log in to your Juniper Networks AVT device command-line interface (CLI).
Step 2 Open the following file:
/var/netscreen/DevSvr/pgsql/data/pg_hba.conf file
Step 3 Add the following line to the end of the file:
host all all <IP address>/32 trust
Where <IP address> is the IP address of your JSA console or Event Collector
you want to connect to the database.
Step 4 Reload the Postgres service:
su - nsm -c "pg_ctl reload -D /var/netscreen/DevSvr/pgsql/data"
Step 5 As the Juniper Networks NSM user, create the view:
create view strm_avt_view as SELECT a.name, a.category,
v.srcip,v.dstip,v.dstport, v."last", u.name as userinfo, v.id,
v.device, v.vlan,v.sessionid, v.bytecnt,v.pktcnt, v."first" FROM
avt_part v JOIN app a ON v.app =a.id JOIN userinfo u ON
v.userinfo = u.id;
The view is created.
You are now ready to configure the log source in JSA.
Configuring DSMs
Juniper DDoS Secure 415
NOTE
Note: For more information on configuring log sources and protocols, see the Log
Sources Users Guide.
For more information about the Juniper Networks AVT device, see your vendor
documentation.
Juniper DDoS The Juniper DDoS Secure DSM for Juniper Secure Analytics (JSA) receives
Secure events from Juniper DDoS Secure devices by using syslog in Log Event Extended
Format (LEEF) format. JSA records all relevant status and network condition
events.
Procedure
Step 1 Log in to Juniper DDoS Secure.
Step 2 Go to the Structured Syslog Server window.
Step 3 In the Server IP Address(es) field, type the IP address of the JSA Console.
Step 4 From the Format list, select LEEF.
Step 5 Optional. If you do not want to use the default of local0 in the Facility field, type
a facility.
Step 6 From the Priority list, select the syslog priority level that you want to include.
Events that meet or exceed the syslog priority level you select are forwarded to
JSA.
Step 7 Log in to JSA.
Step 8 Click the Admin tab.
Step 9 From the navigation menu, click Data Sources.
Step 10 Click the Log Sources icon.
Step 11 Click Add.
Step 12 From the Log Source Type list, select the Juniper DDoS Secure option.
Step 13 Configure the parameters.
Step 14 Click Save.
For more information about log source management, see the Log Sources Users
Guide.
Juniper DX The Juniper DX Application Acceleration Platforms off-load core networking and
Application I/O responsibilities from web and application servers to improve the performance
Acceleration of web-based applications, increasing productivity of local, remote, and mobile
Platform users.
Configuring DSMs
416 JUNIPER NETWORKS
The Juniper DX Application Acceleration Platform DSM for JSA accepts events
using syslog. JSA records all relevant status and network condition events. Before
configuring JSA, you must configure your Juniper device to forward syslog events.
Procedure
Step 1 Log in to the Juniper DX user interface.
Step 2 Browse to the desired cluster configuration (Services - Cluster Name), Logging
section.
Step 3 Select the Enable Logging check box.
Step 4 Select the desired Log Format.
JSA supports Juniper DX logs using the common and perf2 formats only.
Step 5 Select the desired Log Delimiter format.
JSA supports comma delimited logs only.
Step 6 In the Log Host section, type the IP address of your JSA system.
Step 7 In the Log Port section, type the UDP port on which you wish to export logs.
Step 8 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Juniper DX Application
Acceleration Platform option.
For more information on configuring log sources, see the Log Sources Users
Guide.
Juniper EX Series The Juniper EX Series Ethernet Switch DSM for JSA accepts events using syslog.
Ethernet Switch
The Juniper EX Series Ethernet Switch DSM supports Juniper EX Series Ethernet
Switches running Junos OS. Before you can integrate JSA with a Juniper EX
Series Ethernet Switch, you must configure your Juniper EX Series Switch to
forward syslog events.
Procedure
Step 1 Log in to the Juniper EX Series Ethernet Switch command-line interface (CLI).
Step 2 Type the following command:
configure
Step 3 Type the following command:
set system syslog host <IP address> <option> <level>
Where:
<IP address> is the IP address of your JSA.
Configuring DSMs
Juniper EX Series Ethernet Switch 417
Option Description
any All facilities
authorization Authorization system
change-log Configuration change log
conflict-log Configuration conflict log
daemon Various system processes
dfc Dynamic flow capture
explicit-priority Include priority and facility in messages
external Local external applications
facility-override Alternate facility for logging to remote host
firewall Firewall filtering system
ftp FTP process
interactive-commands Commands run by the UI
kernel Kernel
log-prefix Prefix for all logging to this host
match Regular expression for lines to be logged
pfe Packet Forwarding Engine
user User processes
For example:
set system syslog host 10.77.12.12 firewall info
Configures the Juniper EX Series Ethernet Switch to send info messages from
firewall filtering systems to your JSA.
Step 4 Repeat Step 3 to configure any additional syslog destinations and options. Each
additional option must be identified using a separate syslog destination
configuration.
Step 5 You are now ready to configure the Juniper EX Series Ethernet Switch in JSA.
From the Log Source Type list box. select Juniper EX-Series Ethernet
Switch option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about your Juniper switch, see your vendor
documentation.
Configuring DSMs
418 JUNIPER NETWORKS
Juniper IDP The Juniper IDP DSM for JSA accepts events using syslog. JSA records all
relevant Juniper IDP events.
Configuring Syslog You can configure a sensor on your Juniper IDP to send logs to a syslog server:
for Juniper IDP
Procedure
Step 1 Log in to the Juniper NSM user interface.
Step 2 In NSM, double-click on the Sensor in Device Manager.
Step 3 Select Global Settings.
Step 4 Select Enable Syslog.
Step 5 Type the Syslog Server IP address to forward events to JSA.
Step 6 Click OK.
Step 7 Use Update Device to load the new settings onto the IDP Sensor.
The format of the syslog message sent by the IDP Sensor is as follows:
<day id>, <record id>, <timeReceived>, <timeGenerated>,
<domain>, <domainVersion>, <deviceName>, <deviceIpAddress>,
<category>, <subcategory>,<src zone>, <src intface>, <src addr>,
<src port>, <nat src addr>, <nat src port>, <dstzone>,
<dst intface>, <dst addr>, <dst port>, <nat dst addr>,
<nat dst port>,<protocol>, <rule domain>, <rule domainVersion>,
<policyname>, <rulebase>, <rulenumber>, <action>, <severity>,
<is alert>, <elapsed>, <bytes in>, <bytes out>, <bytestotal>,
<packet in>, <packet out>, <packet total>, <repeatCount>,
<hasPacketData>,<varData Enum>, <misc-str>, <user str>,
<application str>, <uri str>
For example:
[[email protected] dayId="20061012" recordId="0"
timeRecv="2006/10/12 21:52:21" timeGen="2006/10/12 21:52:21"
domain="" devDomVer2="0" device_ip="10.209.83.4"
cat="Predefined" attack="TROJAN:SUBSEVEN:SCAN" srcZn="NULL"
srcIntf="NULL" srcAddr="192.168.170.20" srcPort="63396"
natSrcAddr="NULL" natSrcPort="0" dstZn="NULL" dstIntf="NULL"
dstAddr="192.168.170.10" dstPort="27374" natDstAddr="NULL"
natDstPort="0" protocol="TCP" ruleDomain="" ruleVer="5"
policy="Policy2" rulebase="IDS" ruleNo="4" action="NONE"
severity="LOW" alert="no" elaspedTime="0" inbytes="0"
outbytes="0" totBytes="0" inPak="0" outPak="0" totPak="0"
repCount="0" packetData="no" varEnum="31"
misc="<017>'interface=eth2" user="NULL" app="NULL" uri="NULL"]
Configure a Log Juniper NSM is a central management server for Juniper IDP. You can configure
Source JSA to collect and represent the Juniper IDP alerts as coming from a central NSM,
or JSA can collect syslog from the individual Juniper IDP device.
Configuring DSMs
Juniper Networks Secure Access 419
To configure JSA to receive events from Juniper Networks Secure Access device:
From the Log Source Type list box, select Juniper Networks Intrusion
Detection and Prevention (IDP).
For more information on configuring devices, see the Log Sources Users Guide.
For more information about Juniper IDP, see your Network and Security Manager
documentation.
Juniper Networks The Juniper Networks Secure Access DSM for JSA accepts login and session
Secure Access information using syslog in WebTrends Enhanced Log File (WELF) format. You
can integrate Juniper SA and Juniper IC with JSA.
NOTE
Note: If your Juniper device is running release 5.5R3-HF2 - 6.1 or above, we
recommend that you use the WELF:WELF format for logging. See your vendor
documentation to determine if your device and license support logging in
WELF:WELF format.
Use the WELF:WELF To integrate a Juniper Networks Secure Access device with JSA using the
format WELF:WELF format.
Procedure
Step 1 Log in to your Juniper device administration user interface:
https://10.xx.xx.xx/admin
Configuring DSMs
420 JUNIPER NETWORKS
Configuring DSMs
Juniper Networks Secure Access 421
To configure JSA to receive events from Juniper Networks Secure Access device:
From the Log Source Type list box, select Juniper Networks Secure
Access (SA) SSL VPN.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about your Juniper device, see your vendor
documentation.
Use the Syslog You can use the syslog format to integrate a Juniper Networks Secure Access
Format device with JSA.
Procedure
Step 1 Log in to your Juniper device administration user interface:
https://10.xx.xx.xx/admin
Step 2 Configure syslog server information for events:
a From the left pane, select System > Log/Monitoring > Events > Settings.
b From the Select Events to Log section, select the events that you wish to log.
c In the Server name/IP field, type the name or IP address of the syslog server.
Configuring DSMs
422 JUNIPER NETWORKS
To configure JSA to receive events from Juniper Networks Secure Access device:
From the Log Source Type list box, select Juniper Networks Secure
Access (SA) SSL VPN.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about your Juniper device, see your vendor
documentation.
Juniper Infranet The Juniper Networks Infranet Controller DSM for JSA accepts DHCP events
Controller using syslog. JSA records all relevant events from a Juniper Networks Infranet
Controller. Before you configure JSA to integrate with a Juniper Networks Infranet
Controller, you must configure syslog within the server. For more information on
configuring your Juniper Networks Infranet Controller, consult your vendor
documentation.
After you configure syslog for your Juniper Infranet Controller, you are now ready
to configure the log source in JSA.
To configure JSA to receive events from your Juniper Networks Infranet Controller:
From the Log Source Type list box, select Juniper Networks Infranet
Controller option.
For more information on configuring devices, see the Log Sources Users Guide.
Configuring DSMs
Juniper Networks Firewall and VPN 423
Juniper Networks The Juniper Networks Firewall and VPN DSM for JSA accepts Juniper Firewall
Firewall and VPN and VPN events using UDP syslog. JSA records all relevant firewall and VPN
events.
NOTE
Note: TCP syslog is not supported. You must use UDP syslog.
You can Juniper Networks Firewall and VPN device to export events to JSA.
Procedure
Step 1 Log in to your Juniper Networks Firewall and VPN user interface.
Step 2 Select Configuration > Report Settings > Syslog.
Step 3 Select the enable syslog messages check box.
Step 4 Type the IP address of your JSA console or Event Collector.
Step 5 Click Apply.
You are now ready to configure the log source in JSA.
To configure JSA to receive events from a Juniper Networks Firewall and VPN
device:
From the Log Source Type list box, select Juniper Networks Firewall and
VPN option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about your Juniper Networks Firewall and VPN
device, see your Juniper documentation.
Juniper Networks The Juniper Networks Network and Security Manager (NSM) DSM for JSA
Network and accepts Juniper Networks NSM and Juniper Networks Secure Service Gateway
Security Manager (SSG) logs. All Juniper SSG logs must be forwarded through Juniper NSM to JSA.
All other Juniper devices should be forwarded directory to JSA.
For more information on advanced filtering of Juniper Networks NSM logs, see
your Juniper Networks vendor documentation.
Configuring Juniper Juniper Networks NSM uses the syslog server when exporting qualified log entries
Networks NSM to to syslog. Configuring the syslog settings for the management system only defines
Export Logs to the syslog settings for the management system.
Syslog
Configuring DSMs
424 JUNIPER NETWORKS
It does not actually export logs from the individual devices. You can enable the
management system to export logs to syslog.
Procedure
Step 1 Log in to the Juniper Networks NSM user interface.
Step 2 From the Action Manager menu, select Action Parameters.
Step 3 Type the IP address for the syslog server to which you want to send qualified logs.
Step 4 Type the syslog server facility for the syslog server to which you want to send
qualified logs.
Step 5 From the Device Log Action Criteria node, select the Actions tab.
Step 6 Select Syslog Enable for Category, Severity, and Action.
You are now ready to configure the log source in JSA.
Configuring a Log You can configure a log source in JSA for Juniper Networks NSM.
Source for Juniper
Networks NSM Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 1 From the Log Source Type list box, select Juniper Networks Network and
Security Manager.
Step 2 From the Protocol Configuration list box, select Juniper NSM.
Step 3 Configure the following values for the Juniper NSM protocol:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source.
The log source identifier must be unique for the log source
type.
IP Type the IP address or hostname of the Juniper Networks
NSM server.
Inbound Port Type the inbound port to which the Juniper Networks NSM
sends communications.The valid range is 0 to 65536. The
default is 514.
Redirection Listen Type the port to which traffic is forwarded. The valid range is
Port 0 to 65,536. The default is 516.
Use NSM Address for Select this check box to use the Juniper NSM management
Log Source server IP address instead of the log source IP address. By
default, the check box is selected.
Configuring DSMs
Juniper Junos OS 425
NOTE
Note: In the JSA interface, the Juniper NSM protocol configuration enables you to
use the Juniper Networks NSM IP address by selecting the Use NSM Address for
Event Source check box. If you wish to change the configuration to use the
originating IP address (clear the check box), you must log in to your JSA console,
as a root user, and reboot the console (for an all-in-one system) or the Event
Collector hosting the log sources (in a distributed environment) using the following
command: shutdown -r now.
Juniper Junos OS The Juniper Junos OS Platform DSM for JSA accepts events using syslog,
structured-data syslog, or PCAP (SRX Series only). JSA records all valid syslog or
structured-data syslog events.
The Juniper Junos OS Platform DSM supports the following Juniper devices
running Junos OS:
• Juniper M Series Multiservice Edge Routing
• Juniper MX Series Ethernet Services Router
• Juniper T Series Core Platform
• Juniper SRX Series Services Gateway
For information on configuring PCAP data using a Juniper Networks SRX Series
appliance, see Configure the PCAP Protocol.
NOTE
Note: For more information about structured-data syslog, see RFC 5424 at the
Internet Engineering Task Force: http://www.ietf.org/
Before you configure JSA to integrate with a Juniper device, you must forward data
to JSA using syslog or structured-data syslog.
Procedure
Step 1 Log in to your Juniper platform command-line interface (CLI).
Step 2 Include the following syslog statements at the set system hierarchy level:
[set system]
syslog {
host (hostname) {
facility <severity>;
explicit-priority;
any any;
authorization any;
firewall any;
}
source-address source-address;
structured-data {
Configuring DSMs
426 JUNIPER NETWORKS
brief;
}
}
Table 62-3 lists and describes the configuration setting variables to be entered in
the syslog statement.
Table 62-3 List of Syslog Configuration Setting Variables
Parameter Description
host (hostname) Type the IP address or the fully-qualified hostname of your JSA.
Facility <severity> Define the severity of the messages that belong to the named
facility with which it is paired. Valid severity levels are:
• any
• none
• emergency
• alert
• critical
• error
• warning
• notice
• info
Messages with the specified severity level and higher are
logged. The levels from emergency through info are in order
from highest severity to lowest.
Source-address Type a valid IP address configured on one of the router
interfaces for system logging purposes.
The source-address is recorded as the source of the syslog
message send to JSA. This IP address is specified in host
hostname statement set system syslog hierarchy level; not,
however, for messages directed to the other routing engine, or
to the TX Matrix platform in a routing matrix.
structured-data Inserts structured-data syslog into the data.
The following devices are auto discovered by JSA as a Juniper Junos OS Platform
devices:
Configuring DSMs
Juniper Junos OS 427
From the Log Source Type list box, select one of the following options:
Juniper Junos OS Platform, Juniper M Series Multiservice Edge Routing,
Juniper MX Series Ethernet Services Router, Juniper SRX Series
Services Gateway, or Juniper T Series Core Platform.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about your Juniper device, see your vendor
documentation.
Configure the PCAP The Juniper SRX Series appliance supports forwarding of packet capture (PCAP)
Protocol and syslog data to JSA.
Syslog data is forwarded to JSA on port 514. The IP address and outgoing PCAP
port number is configured on the Juniper Networks SRX Series appliance
interface. The Juniper Networks SRX Series appliance must be configured using
the to forward PCAP data in the format
<IP Address>:<Port>.
Where:
<IP Address> is the IP address of JSA.
<Port> is the outgoing port address for the PCAP data.
For more information on Configuring Packet Capture, see your Juniper Networks
Junos OS documentation.
You are now ready to configure the log source and protocol in JSA. For more
information see Configuring a New Juniper Networks SRX Log Source with
PCAP.
JSA detects the syslog data and adds the log source automatically. The PCAP
data can be added to JSA as Juniper SRX Series Services Gateway log source
using the PCAP Syslog Combination protocol. Adding the PCAP Syslog
Combination protocol after JSA auto discovers the Junos OS syslog data adds an
additional log source to your existing log source limit. Deleting the existing syslog
entry, then adding the PCAP Syslog Combination protocol adds both syslog and
PCAP data as single log source.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Configuring DSMs
428 JUNIPER NETWORKS
Juniper The Juniper Steel-Belted Radius DSM for JSA accepts syslog events from a client
Steel-Belted Radius running the JSA Adaptive Log Exporter utility using the Windows operating
system, or on Linux using syslog.
JSA records all successful and unsuccessful login attempts. You can integrate
Juniper Networks Steel-Belted Radius with JSA using one of the following
methods:
Configuring DSMs
Juniper Steel-Belted Radius 429
Configuring Juniper You can integrate a Juniper Steel-Belted Radius DSM with JSA using the Adaptive
Steel-Belted Radius Log Exporter.
for the Adaptive Log
Exporter Procedure
Step 1 From the Start menu, select Start > Programs > Adaptive Log Exporter >
Configure Adapter Log Exporter.
The Adaptive Log Exporter must be installed on the same system as your Juniper
SBR system. The Adaptive Log Exporter must be updated to include the Juniper
SBR device plug-in. For more information, see your Adaptive Log Exporter Users
Guide.
Step 2 Click the Devices tab.
Step 3 Select Juniper SBR, right-click and select Add Device.
The New Juniper SBR Properties window is displayed.
Step 4 Configure the following parameters:
a Name - Type a name for the device. The name can include alphanumeric
characters and underscore (_) characters.
b Description - Type a description for this device.
c Device Address - Type the IP address or hostname that the device. The IP
address or hostname is used to identify the device in syslog messages
forwarded to JSA. This is the IP address or hostname that will appear in JSA.
d Root Log Directory - Type the location where Juniper SBR stores log files.
Report log files should be located in the Steel-Belted Radius directory
<radiusdir>\authReports. The Adaptive Log Exporter monitors the Root
Log Directory for any .CSV files having a date stamp in the file name matching
the current day.
Step 5 From the Adaptive Log Exporter toolbar, click Save.
Step 6 From the Adaptive Log Exporter toolbar, click Deploy.
NOTE
Note: You must use the default values for the log file heading in the Juniper
Steel-Belted Radius appliance. If the log file headings have been changed from the
default values and JSA is not parsing SBR events properly, please contact Juniper
Customer Support.
Step 7 You are now ready to configure the log source in JSA.
Juniper SBR events provided from the Adaptive Log Exporter are automatically
discovered by JSA. If you want to manually configure JSA to receive events from
Juniper Steel-Belted Radius:
From the Log Source Type drop-down box, select the Juniper Steel-Belted
Radius option.
For more information on configuring log sources, see the Log Sources Users
Guide.
Configuring DSMs
430 JUNIPER NETWORKS
Configuring Juniper You can integrate a Juniper Steel-Belted Radius DSM with JSA using syslog on a
Steel-Belted Radius Linux-based operating system.
for Syslog
Procedure
Step 1 Using SSH log in to your Juniper Steel-Belted Radius device, as a root user.
Step 2 Edit the following file:
/etc/syslog.conf
Step 3 Add the following information:
<facility>.<priority> @<IP address>
Where:
<facility> is the syslog facility, for example, local3.
<priority> is the syslog priority, for example, info.
<IP address> is the IP address of JSA.
Step 4 Save the file.
Step 5 From the command-line, type the following command to restart syslog:
service syslog restart
Step 6 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Juniper Steel-Belted Radius
option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information on configuring your Steel-Belted Radius server
consult your vendor documentation.
Juniper Networks The Juniper Networks vGW Virtual Gateway DSM for JSA accepts events using
vGW Virtual syslog and NetFlow from your vGW management server or firewall. JSA records
Gateway all relevant events, such as admin, policy, IDS logs, and firewall events. Before
configuring an Juniper Networks vGW Virtual Gateway in JSA, you must configure
vGW to forward syslog events.
Procedure
Step 1 Log in to your Juniper Networks vGW user interface.
Step 2 Select Settings.
Step 3 From Security Settings, select Global.
Step 4 From External Logging, select one of the following:
• Send Syslog from vGW management server - Central logging with syslog
event provided from a management server.
Configuring DSMs
Juniper Networks vGW Virtual Gateway 431
If you select the option Send Syslog from vGW management server, all
events forwarded to JSA contain the IP address of the vGW management
server.
• Send Syslog from Firewalls - Distribute logging with each Firewall Security
VM providing syslog events.
Step 5 Type values for the following parameters:
a Syslog Server - Type the IP address of your vGW management server if you
selected to Send Syslog from vGW management server. Or, type the IP
address of JSA if you selected Send Syslog from Firewalls.
b Syslog Server Port - Type the port address for syslog. This is typically port
514.
Step 6 From the External Logging panel, click Save.
Only changes made to the External Logging section are stored when you click
Save. Any changes made to NetFlow require that you save using the button within
NetFlow Configuration section.
Step 7 From the NetFlow Configuration panel, select the enable check box.
NetFlow does not support central logging from a vGW management server. From
the External Logging section, you must select the option Send Syslog from
Firewalls.
Step 8 Type values for the following parameters:
a NetFlow collector address - Type the IP address of JSA.
b NetFlow collector port - Type a port address for NetFlow events.
Note: JSA typically uses port 2055 for NetFlow event data on QFlow Collectors.
You must configure a different NetFlow collector port on your Juniper Networks
vGW Series Virtual Gateway for NetFlow.
Step 9 From the NetFlow Configuration, click Save.
Step 10 You are now ready to configure the log source in JSA.
JSA automatically detects syslog forwarded from Juniper Networks vGW. If you
want to manually configure JSA to receive syslog events:
From the Log Source Type list box, select Juniper vGW.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information, see your Juniper Networks vGW documentation.
Configuring DSMs
432 JUNIPER NETWORKS
Juniper Security The Juniper Security Binary Log Collector DSM for JSA can accept audit, system,
Binary Log firewall and intrusion prevention system (IPS) events in binary format from Juniper
Collector SRX or Juniper Networks J Series appliances. The Juniper Networks binary log file
format is intended to increase performance when writing large amounts of data to
an event log. To integrate your device with JSA, you must configure your Juniper
appliance to stream binary formatted events, then configure a log source in JSA.
Configuring the The binary log format from Juniper SRX or J Series appliances are streamed to
Juniper Networks JSA using the UDP protocol. You must specify a unique port for streaming binary
Binary Log Format formatted events, the standard syslog port for JSA cannot understand binary
formatted events. The default port assigned to JSA for receiving streaming binary
events from Juniper appliances is port 40798.
NOTE
Note: The Juniper Binary Log Collector DSM only supports events forwarded in
Streaming mode. The Event mode is not supported.
Procedure
Step 1 Log in to your Juniper SRX or J Series using the command-line Interface (CLI).
Step 2 Type the following command to edit your device configuration:
configure
Step 3 Type the following command to configure the IP address and port number for
streaming binary formatted events:
set security log stream <Name> host <IP address> port <Port>
Where:
<Name> is the name assigned to the stream.
<IP address> is the IP address of your JSA console or Event Collector.
<Port> is a unique port number assigned for streaming binary formatted events to
JSA. By default, JSA listens for binary streaming data on port 40798. For a list of
ports used by JSA, see the Juniper Secure Analytics Common Ports List technical
note.
Step 4 Type the following command to set the security log format to binary:
set security log stream <Name> format binary
Where <Name> is the name you specified for your binary format stream in Step 3.
Step 5 Type the following command to enable security log streaming:
set security log mode stream
Configuring DSMs
Juniper Security Binary Log Collector 433
Step 6 Type the following command to set the source IP address for the event stream:
set security log source-address <IP address>
Where <IP address> is the IP address of your Juniper SRX Series or Juniper J
Series appliance.
Step 7 Type the following command to save the configuration changes:
commit
Step 8 Type the following command to exit the configuration mode:
exit
The configuration of your Juniper SRX or J Series appliance is complete. You are
now ready to configure a log source in JSA.
Configure a Log JSA does not automatically discover incoming Juniper Security Binary Log
Source Collector events from Juniper SRX or Juniper J Series appliances.
If your events are not automatically discovered, you must manually create a log
source using the Admin tab in JSA.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Juniper Security Binary Log
Collector.
Step 9 Using the Protocol Configuration list box, select Juniper Security Binary Log
Collector.
Configuring DSMs
434 JUNIPER NETWORKS
Parameter Description
Log Source Identifier Type an IP address or hostname to identify the log source.
The identifier address should be the Juniper SRX or J Series
appliance generating the binary event stream.
Binary Collector Port Specify the port number used by the Juniper Networks SRX
or J Series appliance to forward incoming binary data to JSA.
The UDP port number for binary data is the same port config-
ured in Configuring the Juniper Networks Binary Log
Format, Step 3.
If you edit the outgoing port number for the binary event
stream from your Juniper Networks SRX or J Series
appliance, you must also edit your Juniper log source and
update the Binary Collector Port parameter in JSA.
To edit the port:
1 In the Binary Collector Port field, type the new port
number for receiving binary event data.
2 Click Save.
Event collection is stopped for the log source until you
fully deploy JSA.
3 On the Admin tab, select Advanced > Deploy Full
Configuration.
The port update is complete and event collection starts on
the new port number.
Note: When you click Deploy Full Configuration, JSA restarts
all services, resulting in a gap in data collection for events
and flows until the deployment completes.
XML Template File Type the path to the XML file used to decode the binary
Location stream from your Juniper SRX or Juniper J Series appliance.
By default, JSA includes an XML template file for decoding
the binary stream in the following directory:
/opt/qradar/conf/security_log.xml
Configuring DSMs
Juniper Junos WebApp Secure 435
Juniper Junos The Juniper WebApp Secure DSM for JSA accepts events forwarded from Juniper
WebApp Secure Junos WebApp Secure appliances using syslog.
Juniper Junos WebApp Secure provides incident logging and access logging
events to JSA. Before you can receive events in JSA, you must configure event
forwarding on your Juniper Junos WebApp Secure, then define the events you
want to forward.
Configuring Syslog To configure a remote syslog server for Juniper Junos WebApp Secure, you must
Forwarding SSH in to a configuration interface. The configuration interface allows you to setup
or configure core settings on your Juniper Junos WebApp Secure appliance.
Procedure
Step 1 Using SSH, log in to your Juniper Junos WebApp device using port 2022.
https://<IP address>:<port>
Where:
<IP address> is the IP address of your Juniper Junos WebApp Secure
appliance.
<Port> is the port number of your Juniper Junos WebApp Secure appliance
configuration interface. The default SSH configuration port is 2022.
Step 2 From the Choose a Tool menu, select Logging.
Step 3 Click Run Tool.
Step 4 From the Log Destination menu, select Remote Syslog Server.
Step 5 In the Syslog Server field, type the IP address of your JSA console or Event
Collector.
Step 6 Click Save.
Step 7 From the Choose a Tool menu, select Quit.
Step 8 Type Exit to close your SSH session.
You are now ready to configure event logging on your Juniper Junos WebApp
Secure appliance.
Configuring Event The Juniper Junos WebApp Secure appliance must be configured to determine
Logging which logs are forwarded to JSA.
Procedure
Step 1 Using a web browser, log in to the Configuration Site for your Juniper Junos
WebApp Secure appliance.
https://<IP address>:<port>
Where:
<IP address> is the IP address of your Juniper Junos WebApp Secure
appliance.
Configuring DSMs
436 JUNIPER NETWORKS
<Port> is the port number of your Juniper Junos WebApp Secure appliance. The
default configuration uses a port number of 5000.
Step 2 From the navigation menu, select Configuration Manager.
Step 3 From the Configuration menu, select Basic Mode.
Step 4 Click the Global Configuration tab and select Logging.
Step 5 Click the link Show Advanced Options.
Step 6 Configure the following parameters:
Parameter Description
Access logging: Log Click this option to configure the level of information logged
Level when access logging is enabled.
The options include:
• 0 - Access logging is disabled.
• 1 - Basic logging.
• 2 - Basic logging with headers.
• 3 - Basic logging with headers and body.
Note: Access logging is disabled by default. It is
recommended that you only enable access logging for
debugging purposes. For more information, see your Juniper
Junos WebApp Secure documentation.
Access logging: Log Click this option and select True to log the request before it is
requests before processed, then forward the event to JSA.
processing
Access logging: Log Click this option and select True to log the request after it is
requests to access log processed. After Juniper Junos WebApp Secure processes
after processing the event, then it is forwarded to JSA.
Access logging: Log Click this option and select True to log the response after it is
responses to access processed. After Juniper Junos WebApp Secure processes
log after processing the event, then the event is forwarded to JSA.
Access logging: Log Click this option and select True to log the response before it
responses to access is processed, then forward the event to JSA.
log before processing
Configuring DSMs
Juniper Junos WebApp Secure 437
Parameter Description
Incident severity log Click this option to define the severity of the incident events
level to log. All incidents at or above the level defined are
forwarded to JSA. The options include:
The options include:
• 0 - Informational level and above incident events are
logged and forwarded.
• 1 - Suspicious level and above incident events are logged
and forwarded.
• 2 - Low level and above incident events are logged and
forwarded.
• 3 - Medium level and above incident events are logged
and forwarded.
• 4 - High level and above incident events are logged and
forwarded.
Log incidents to the Click this option and select Yes to enable syslog forwarding
syslog to JSA.
The configuration is complete. The log source is added to JSA as Juniper Junos
WebApp Secure events are automatically discovered. Events forwarded to JSA by
Juniper Junos WebApp Secure are displayed on the Log Activity tab of JSA.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source Juniper Junos WebApp Secure. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Juniper Junos WebApp Secure.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Configuring DSMs
438 JUNIPER NETWORKS
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Juniper Junos WebApp Secure
appliance.
Juniper Networks Juniper Secure Analytics (JSA) can collect and categorize syslog events from
WLC Series Juniper Networks WLC Series Wireless LAN Controllers.
Wireless LAN
Controller
Configuration To collect syslog events, you must configure your Juniper Networks Wireless LAN
overview Controller to forward syslog events to JSA. Administrators can use either the
RingMaster interface or the command-line interface to configure syslog forwarding
for their Juniper Networks Wireless LAN Controller appliance. JSA automatically
discovers and creates log sources for syslog events that are forwarded from
Juniper Networks WLC Series Wireless LAN Controllers. JSA supports syslog
events from Juniper WLAN devices that run on Mobility System Software (MSS)
V7.6.
To integrate Juniper WLC events with JSA, administrators can complete the
following tasks:
1 On your Juniper WLAN appliance, configure syslog server.
• To use the RingMaster user interface to configure a syslog server, see
Configuring a Syslog Server from the Juniper WLC User Interface.
• To use the command-line interface to configure a syslog server, see
Configuring a Syslog Server with the Command-line Interface for Juniper
WLC.
2 On your JSA system, verify that the forwarded events are automatically
discovered.
Configuring a Syslog To collect events, you must configure a syslog server on your Juniper WLC system
Server from the to forward syslog events to JSA.
Juniper WLC User
Interface Procedure
TO configure a syslog server from the Juniper WLC user interface:
Step 1 Log in to the RingMaster software.
Step 2 From the Organizer panel, select a Wireless LAN Controller.
Step 3 From the System panel, select Log.
Configuring DSMs
Juniper Networks WLC Series Wireless LAN Controller 439
Result
As events are generated by the Juniper WLC appliance, they are forwarded to the
syslog destination you specified. The log source is automatically discovered after
enough events are forwarded to JSA. It typically takes a minimum of 25 events to
automatically discover a log source.
What to do next
Administrators can log in to the JSA Console and verify that the log source is
created on the Console. The Log Activity tab displays events from the Juniper
WLC appliance.
Configuring a Syslog To collect events, you must configure a syslog server on your Juniper WLC system
Server with the to forward syslog events to JSA.
Command-line
Interface for Juniper Procedure
WLC
Step 1 Log in to the command-line interface of the Juniper WLC appliance.
Step 2 To configure a syslog server, type the following command:
set log server <ip-addr> [port 514 severity <severity-level>
local-facility <facility-level>]
For example, set log server 1.1.1.1 port 514 severity error
local-facility local0.
Step 3 To save the configuration, type the following command:
save configuration
Result
As events are generated by the Juniper WLC appliance, they are forwarded to the
syslog destination you specified. The log source is automatically discovered after
enough events are forwarded to JSA. It typically takes a minimum of 25 events to
automatically discover a log source.
Configuring DSMs
440 JUNIPER NETWORKS
What to do next
Administrators can log in to the Console and verify that the log source is created.
The Log Activity tab displays events from the Juniper WLC appliance.
Configuring DSMs
Juniper Networks WLC Series Wireless LAN Controller 441
Configuring DSMs
442 JUNIPER NETWORKS
Configuring DSMs
63 KASPERSKY SECURITY CENTER
The Kaspersky Security Center DSM retrieves events directly from a database on
your Kaspersky Security Center appliance.
Supported Event JSA uses the JDBC protocol to poll a view created specifically for Juniper Secure
Types Analytics (JSA) to collect antivirus, server, and audit events.
Before You Begin Before you can receive events in JSA, you must create a database view for JSA to
poll using the JDBC protocol.
We also recommend that you create a user for JSA, as JSA requires a user
account to poll the database for events. After you have configured a database view
and a user account for JSA, you are ready to configure a log source in JSA for
Kaspersky Security Center.
Creating a Database To collect audit event data, you must create a database view on your Kaspersky
View for Kaspersky server that is accessible to JSA.
Security Center
To create a database view, you can download the klsql2.zip tool, which is available
from Kaspersky or use another program that allows you to create database views.
The instructions provided below define the steps required to create the dbo.events
view using the Kaspersky Labs tool.
Procedure
Step 1 From the Kaspersky Labs website, download the klsql2.zip file:
http://support.kaspersky.com/9284
Step 2 Copy klsql2.zip to your Kaspersky Security Center Administration Server.
Step 3 Extract klsql2.zip to a directory.
Step 4 The following files are included:
• klsql2.exe
• libmysql.dll
• src.sql
• start.cmd
Configuring DSMs
444 KASPERSKY SECURITY CENTER
NOTE
Note: Kaspersky Security Center database administrators should ensure that JSA
is allowed to poll the database for events using TCP port 1433 or the port
configured for your log source. Protocol connections are often disabled on
databases by default and additional configuration steps might be required to allow
connections for event polling. Any firewalls located between Kaspersky Security
Center and JSA should also be configured to allow traffic for event polling.
Configuring the Log JSA requires a user account with the proper credentials to access the view you
Source in JSA created in the Kaspersky Security Center database.
To successfully poll for audit data from the Kaspersky Security Center database,
you must create a new user or provide the log source with existing user credentials
to read from the dbo.events view. For more information on creating a user account,
see your Kaspersky Security Center documentation.
Procedure
Step 1 Click the Admin tab.
Step 2 On the navigation menu, click Data Sources.
Step 3 Click the Log Sources icon.
Step 4 In the Log Source Name field, type a name for the log source.
Step 5 In the Log Source Description field, type a description for the log source.
Step 6 From the Log Source Type list box, select Kaspersky Security Center.
Configuring DSMs
445
Parameter Description
Log Source Type the identifier for the log source. Type the log source identifier
Identifier in the following format:
<Kaspersky Database>@<Kaspersky Database Server
IP or Host Name>
Where:
<Kaspersky Database> is the database name, as entered in
the Database Name parameter.
<Kaspersky Database Server IP or Host Name> is the
hostname or IP address for this log source, as entered in the IP or
Hostname parameter.
Database Type From the list box, select MSDE.
Database Name Type KAV as the name of the Kaspersky Security Center
database.
IP or Hostname Type the IP address or hostname of the SQL server that hosts the
Kaspersky Security Center database.
Port Type the port number used by the database server. The default
port for MSDE is 1433. You must enable and verify you can
communicate using the port you specify in the Port field.
The JDBC configuration port must match the listener port of the
Kaspersky database. The Kaspersky database must have
incoming TCP connections enabled to communicate with JSA.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the username the log source can use to access the
Kaspersky database.
Password Type the password the log source can use to access the
Kaspersky database.
The password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password field.
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define the Window
Authentication Domain. Otherwise, leave this field blank.
Configuring DSMs
446 KASPERSKY SECURITY CENTER
Parameter Description
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type dbo.events as the name of the table or view that includes
the event records.
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type nld as the compare field. The compare field is used to
identify new events added between queries to the table.
Start Date and Optional. Type the start date and time for database polling.
Time
The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Use Prepared Select the Use Prepared Statements check box.
Statements
Prepared statements allows the JDBC protocol source to setup the
SQL statement one time, then run the SQL statement many times
with different parameters. For security and performance reasons,
we recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Polling Interval Type the polling interval, which is the amount of time between
queries to the view you created. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication
When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Configuring DSMs
447
Parameter Description
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
Kaspersky Security Center log source with a higher importance compared to other
log sources in JSA.
Configuring DSMs
64 LIEBERMAN RANDOM PASSWORD
MANAGER
The Lieberman Random Password Manager DSM for allows you to integrate
Juniper Secure Analytics (JSA) with Lieberman Enterprise Random Password
Manager and Lieberman Random Password Manager software using syslog
events in the Log Extended Event Format (LEEF).
The Lieberman Random Password Manager forwards syslog events to JSA using
Port 514. JSA records all relevant password management events. For information
on configuring syslog forwarding, see your vendor documentation.JSA
From the Log Source Type list box, select Lieberman Random Password
Manager.
For more information on configuring log sources, see the Log Sources Users
Guide.
Configuring DSMs
65 LINUX
Linux DHCP The Linux DHCP Server DSM for Juniper Secure Analytics (JSA) accepts DHCP
events using syslog.
Configuring Syslog JSA records all relevant events from a Linux DHCP Server. Before you configure
for Linux DHCP JSA to integrate with a Linux DHCP Server, you must configure syslog within your
Linux DHCP Server to forward syslog events to JSA.
For more information on configuring your Linux DHCP Server, consult the man
pages or associated documentation for your DHCP daemon.
Configuring a Log JSA automatically discovers and creates log sources for syslog events forwarded
Source from Linux DHCP Servers. The following procedure is optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your Linux DHCP Server.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Linux DHCP Server.
Step 9 Using the Protocol Configuration list box, select Syslog.
Configuring DSMs
452 LINUX
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for events from your Linux DHCP Server.
Linux IPtables The Linux IPtables DSM for JSA accepts firewall IPtables events using syslog.
JSA records all relevant from Linux IPtables where the syslog event contains any
of the following words: Accept, Drop, Deny, or Reject. Creating a customized log
prefix in the event payload allows JSA to easily identify IPtables behavior.
Configure IPtables IPtables is a powerful tool, which allows you to create rules on the Linux kernel
firewall for routing traffic.
To configure IPtables, you must examine the existing rules, modify the rule to log
the event, and assign a log identifier to your IPtables rule that can be identified by
JSA. This process allows you to determine which rules are logged by JSA. JSA
includes any events that are logged that include the words: accept, drop, reject, or
deny in the event payload.
Procedure
Step 1 Using SSH, log in to your Linux Server as a root user.
Step 2 Edit the IPtables file located in the following directory:
/etc/iptables.conf
NOTE
Note: The file containing IPtables rules can vary according to the specific Linux
operating system you are configuring.
Step 3 Review the file to determine the IPtables rule you want to log.
For example, if you want to log the rule defined by the entry:
-A INPUT -i eth0 --dport 31337 -j DROP
Step 4 Insert a matching rule immediately before each rule you want to log:
-A INPUT -i eth0 --dport 31337 -j DROP
-A INPUT -i eth0 --dport 31337 -j DROP
Step 5 Update the target of the new rule to LOG for each rule you want to log. For
example:
Configuring DSMs
Linux IPtables 453
NOTE
Note: The trailing space is required before the closing quotation mark.
Configuring a Log JSA automatically discovers and creates log sources for IPtables syslog events
Source forwarded from Linux Servers. The following steps for configuring a log source are
optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Configuring DSMs
454 LINUX
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for IPtables events forwarded from your Linux
Server.
Linux OS The Linux OS DSM for JSA records Linux operating system events and forwards
the events using syslog or syslog-ng.
If you are using syslog on a UNIX host, we recommends that you upgrade the
standard syslog to a more recent version, such as, syslog-ng.
CAUTION
CAUTION: Do not run both syslog and syslog-ng at the same time.
To integrate Linux OS with JSA, select one of the following syslog configurations
for event collection:
• Configuring Linux OS Using Syslog
• Configure Linux OS Using Syslog-ng
Supported Event The Linux OS DSM supports the following event types:
Types
• cron
• HTTPS
Configuring DSMs
Linux OS 455
• FTP
• NTP
• Simple Authentication Security Layer (SASL)
• SMTP
• SNMP
• SSH
• Switch User (SU)
• Pluggable Authentication Module (PAM) events.
Configuring DSMs
456 LINUX
For more information on configuring log sources, see the Log Sources Users
Guide.
For more information on syslog, see your Linux operating system documentation.
Configuring Linux OS Configure Linux OS to send audit logs to Juniper Secure Analytics (JSA).
to Send Audit Logs
About this task
This task applies to Red Hat Enterprise Linux v6 operating systems. If you use
SUSE, Debian, or Ubuntu operating system, see your vendor documentation for
specific steps for your operating system.
Procedure
Step 1 Log in to your Linux OS device, as a root user.
Step 2 Type the following commands:
yum install audit
service auditd start
chkconfig auditd on
Step 3 Open the following file:
/etc/audisp/plugins.d/syslog.conf
Step 4 Ensure the parameters match the following values:
Configuring DSMs
Linux OS 457
active = yes
direction = out
path = builtin_syslog
type = builtin
args = LOG_LOCAL6
format = string
Step 5 Open the following file:
/etc/rsyslog.conf
Step 6 Add the following line to the end of the file:
local6.* @@QRadar_Collector_IP_address
Step 7 Log in to the JSA user interface.
Step 8 Add a Linux OS log source. For more information on configuring log sources, see
the Log Sources Users Guide.
Step 9 On the Admin tab, click Deploy Changes.
Step 10 Log in to JSA as the root user.
Step 11 Type the following commands:
service auditd restart
service syslog restart
Configuring DSMs
458 LINUX
Configuring DSMs
66 LOGBINDER EX EVENT
COLLECTION FROM MICROSOFT
EXCHANGE SERVER
The Juniper Secure Analytics (JSA) DSM for Microsoft Exchange Server can
collect LOGbinder V3.5 events.
Table 66-1 identifies the specifications for the Microsoft Exchange Server DSM
when the log source is configured to collect LOGbinder events.
Table 66-1 LOGbinder for Microsoft Exchange Server
Specification Value
Manufacturer Microsoft
DSM name Exchange Server
RPM file name DSM-MicrosoftExchange-QRadar_versionbuild_
number.noarch.rpm
Supported Microsoft Exchange Server 2010 and later
versions
Protocol type Syslog
JSA recorded Admin
events Mailbox
Automatically Yes
discovered
Includes identity No
More information Microsoft Exchange website
(http://www.office.microsoft.com/en-us/exchange/)
The Microsoft Exchange Server DSM can collect other types of events. For more
information on how to configure for other Microsoft Exchange Server event
formats, see Microsoft Exchange Server.
Configuring DSMs
460 LOGBINDER EX EVENT COLLECTION FROM MICROSOFT EXCHANGE SERVER
To collect LOGbinder events from Microsoft Exchange Server, use the following
steps:
1 If automatic updates are not enabled, download the most recent version of the
Microsoft Exchange Server DSM RPM.
2 Configure your Microsoft Exchange Server device to send LOGbinder events to
JSA.
3 If the log source is not automatically created, add a Microsoft Exchange Server
DSM log source on the JSA console.
Table 66-2 describes the parameters that require specific values that are required
for LOGbinder event collection.
Table 66-2 Microsoft Exchange Server Log Source Parameters for LOGbinder Event
Collection
Parameter Description
Log Source type Microsoft Exchange Server
Protocol Syslog
Configuration
Configuring your To collect Microsoft Exchange LOGbinder events, you must configure your
LOGbinder EX LOGbinder EX system to send events to JSA.
system to Send
Microsoft Procedure
Exchange Event
Logs to JSA To configure your LOGbinder EX system to send events to JSA:
Configuring DSMs
67 MCAFEE
McAfee Intrushield A Juniper Secure Analytics (JSA) McAfee Intrushield DSM accepts events using
syslog. JSA records all relevant events.
Before you configure JSA to integrate with a McAfee Intrushield device, you must
select your McAfee Intrushield version.
• To integrate JSA with a version of McAfee Intrushield between v2.x and v5.x,
see Configure McAfee Intrushield Using v2.x to v5.x.
• To integrate JSA with McAfee Intrushield v6.x, see Configuring McAfee
Intrushield Using v6.x.
Configure McAfee To integrate your McAfee Intrushield with JSA, you must configure a syslog
Intrushield Using forwarder in McAfee Intrushield, then configure the log source in JSA or wait for
v2.x to v5.x JSA to automatically discover your McAfee Intrushield appliance.
Configuring DSMs
462 MCAFEE
NOTE
Note: The custom message string must be entered as a single line with no
carriage returns. Versions of McAfee Intrushield that do not have patches applied
use different message strings than patched versions. McAfee Intrushield expects
the format of the custom message syslog information to contain a dollar sign ($)
delimiter before and after each element. If you are missing a dollar sign for an
element, then the event might not parse properly.
If you are unsure what event message format to use, contact McAfee Customer
Support.
b If you are using a version of McAfee Intrushield that has patches applied from
3.x to v5.x, type the following to customize the message string:
|$IV_ALERT_ID$|$IV_ALERT_TYPE$|$IV_ATTACK_TIME$|"$IV_ATTACK_
NAME$"|$IV_ATTACK_ID$|$IV_ATTACK_SEVERITY$|$IV_ATTACK_
SIGNATURE$|$IV_ATTACK_CONFIDENCE$|$IV_ADMIN_DOMAIN$|$IV_
SENSOR_NAME$|$IV_INTERFACE$|$IV_SOURCE_IP$|$IV_SOURCE_PORT$|
$IV_DESTINATION_IP$|$IV_DESTINATION_PORT$|
NOTE
Note: The custom message string must be entered as a single line with no
carriage returns. Versions of McAfee Intrushield with patches applied use custom
message strings that begin with $IV. McAfee Intrushield expects the format of the
custom message syslog information to contain a dollar sign ($) delimiter before
and after each element. If you are missing a dollar sign for an element, then the
event might not parse properly.
If you are unsure what event message format to use, contact McAfee Customer
Support.
Step 8 Click Save.
You are now ready to configure the log source in JSA.
Configuring DSMs
McAfee Intrushield 463
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select McAfee IntruShield Network IPS
Appliance.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for the McAfee Intrushield
console.
Configuring McAfee To integrate your McAfee Intrushield with JSA, you must configure your McAfee
Intrushield Using Intrushield to forward events, then configure the log source in JSA or wait for JSA
v6.x to automatically discover your McAfee Intrushield appliance.
Configuring DSMs
464 MCAFEE
Parameter Description
Enable Syslog Notification Select Yes to enable syslog notifications for
McAfee Intrushield. You must enable this option
to forward events to JSA.
Admin Domain Select any of the following options:
• Current - Select this check box to send
syslog notifications for alerts in the current
domain. This option is selected by default.
• Children - Select this check box to send
syslog notifications for alerts in any child
domains within the current domain.
Server Name or IP Address Type the IP address of your JSA console or
Event Collector. This field supports both IPv4
and IPv6 addresses.
UDP Port Type 514 as the UDP port for syslog events.
Facility Select a syslog priority value from the list box.
Severity Mappings Select a value to map the informational, low,
medium, and high alert notification level to a
syslog severity.
The options include:
• Emergency - The system is down or
unusable.
• Alert - The system requires immediate user
input or intervention.
• Critical - The system should be corrected
for a critical condition.
• Error - The system has non-urgent failures.
• Warning - The system has a warning
message indicating an imminent error.
• Notice - The system has notifications, no
immediate action required.
• Informational - Normal operating
messages.
Send Notification If Select the following check boxes:
• The attack definition has this notification
option explicitly enabled
• The following notification filter is
matched - From the list box, select Severity
Informational and above.
Notify on IPS Quarantine Alert Select No as the notify on IPS quarantine
option.
Configuring DSMs
McAfee Intrushield 465
Parameter Description
Message Preference Select the Customized option.
NOTE
Note: The custom message string must be entered as a single line with no
carriage returns. McAfee Intrushield expects the format of the custom message
syslog information to contain a dollar sign ($) delimiter before and after each
element. If you are missing a dollar sign for an element, then the event might not
parse properly.
You might require a text editor to properly format the custom message string as a
single line.
You are now ready to configure the log source in JSA or wait for JSA to
automatically discover your McAfee Intrushield appliance.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select McAfee IntruShield Network IPS
Appliance.
Step 9 Using the Protocol Configuration list box, select Syslog.
Configuring DSMs
466 MCAFEE
Parameter Description
Log Source Identifier Type the IP address or hostname for the McAfee Intrushield
console.
McAfee ePolicy The McAfee ePolicy Orchestrator (ePO) DSM for JSA accepts events using Java
Orchestrator Database Connectivity (JDBC) or Simple Network Management Protocol
(SNMPv2, and SNMPv3).
JSA records all relevant ePO anti-virus events from JDBC or SNMP. You can
configure McAfee ePolicy Orchestrator to integrate with JSA using one of the
following methods:
Configuring a Log To configure JSA to access the ePO database using the JDBC protocol:
Source Using the
JDBC Protocol Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your McAfee ePolicy Orchestrator
log source.
Step 5 From the Log Source Type list box, select McAfee ePolicy Orchestrator.
Step 6 Using the Protocol Configuration list box, select JDBC.
You must refer to the Configure Database Settings on your ePO Management
console to configure the McAfee ePolicy Orchestrator with JDBC.
Configuring DSMs
McAfee ePolicy Orchestrator 467
Parameter Description
Log Source Type the identifier for the log source. The log source identifier must
Identifier be added in the following format:
<McAfee ePO Database>@<McAfee ePO Database Server
IP or Host Name>
Where:
<McAfee ePO Database> is the database name, as entered in
the Database Name parameter.
<McAfee ePO Database Server IP or Host Name> is the
hostname or IP address for this log source, as entered in the IP or
Hostname parameter.
When defining a name for your log source identifier, you must use
the values of the McAfee ePO Database and Database Server IP
address or hostname from the ePO Management console.
Database Type From the list box, select MSDE.
Database Name Type the exact name of the McAfee ePolicy Orchestrator
database.
IP or Hostname Type the IP address or host name of the McAfee ePolicy
Orchestrator SQL Server.
Port Type the port number used by the database server. The default
port for MSDE is 1433.
The JDBC configuration port must match the listener port of the
McAfee ePolicy Orchestrator database. The McAfee ePolicy
Orchestrator database must have incoming TCP connections
enabled to communicate with JSA.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the username required to access the database.
Password Type the password required to access the database.
The password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password parameter.
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define the Window
Authentication Domain. Otherwise, leave this parameter blank.
Configuring DSMs
468 MCAFEE
Parameter Description
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type a table or view that includes the event records as follows:
• For ePO 3.x - Type Events.
• For ePO 4.x - Type EPOEvents.
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. Also, the list can include the following special characters:
dollar sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type AutoID in the compare field. The compare field is used to
identify new events added between queries to the table.
Start Date and Optional. Type the start date and time for database polling.
Time
The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Use Prepared Select this check box to use prepared statements.
Statements
Prepared statements allow the JDBC protocol source to setup the
SQL statement once, then run the SQL statement many times with
different parameters. For security and performance reasons, we
recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Configuring DSMs
McAfee ePolicy Orchestrator 469
Parameter Description
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication
When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
McAfee ePolicy Orchestrator log source with a higher importance compared to
other log sources in JSA.
Configuring ePO to To configure ePO to forward events using SNMP, you must complete the following
Forward SNMP configuration steps on your McAfee ePolicy Orchestrator device:
Events
1 Add a registered server. For more information, see Adding a Registered Server to
McAfee ePO.
2 Configure the SNMP trap notifications on your ePO device. For more information,
see Configuring SNMP Notifications.
3 Configure the log source and protocol in JSA. For more information, see
Configuring the Log Source in JSA.
4 Optional. Install the Java Cryptography Extension for high level SNMP decryption
algorithms. For more information, see Installing the Java Cryptography
Extension.
Configuring DSMs
470 MCAFEE
Configuring DSMs
McAfee ePolicy Orchestrator 471
c Click >> to add to the following Select Types window from Table 67-7 based on
your McAfee ePolicy Orchestrator version.
Table 67-7 Supported Parameters for Event Detection
Configuring DSMs
472 MCAFEE
Step 6 From the Protocol Configuration list box, select either SNMPv2, or SNMPv3.
NOTE
Note: SNMPv1 is listed as an option in the Protocol Configuration list box, but
SNMPv1 is not a recommended protocol when using McAfee ePolicy Orchestrator
with JSA.
Step 7 Configure the following values based on the protocol you selected in Step 6:
a To configure the SNMPv2 protocol:
Table 67-8 SNMPv2 Configuration Parameters
Parameter Description
Log Source Type the IP address for the log source. The log source identifier
Identifier must be unique for the log source type.
Community Type the SNMP community string for the SNMPv2 protocol, such
as Public.
The default community string is Public.
Include OIDs in Select this check box.
Event Payload This options allows the McAfee ePO event payloads to be
constructed using name-value pairs instead of the standard
event payload format. Including OIDs in the event payload is
required for processing SNMPv2 or SNMPv3 events for McAfee
ePO.
Note: This option is not supported for SNMPv1 configurations of
McAfee ePO.
Parameter Description
Log Source Identifier Type the IP address for the log source. The log source
identifier must be unique for the log source type.
Authentication From the list box, select the algorithm you want to use to
Protocol authenticate SNMP traps. This parameter is required if you
are using SNMPv3.
The options include:
• SHA - Select this option to use Secure Hash Algorithm
(SHA) as your authentication protocol.
• MD5 - Select this option to use Message Digest 5 (MD5)
as your authentication protocol.
The default is MD5.
Authentication Type the password you want to use to authenticate SNMP.
Password This parameter is required if you are using SNMPv3.
Note: Your authentication password must include a minimum
of 8 characters.
Configuring DSMs
McAfee ePolicy Orchestrator 473
Parameter Description
Decryption Protocol From the list box, select the algorithm you want to use to
decrypt the SNMP traps. This parameter is required if you are
using SNMPv3.
The decryption algorithms include:
• DES
• AES128
• AES192
• AES256
The default is AES256.
Note: If you select AES192 or AES256 as your decryption
algorithm, you must install additional software for JSA. For
more information, see Installing the Java Cryptography
Extension.
Decryption Password Type the password used to decrypt SNMP traps. This
parameter is required if you are using SNMPv3.
Note: Your decryption password must include a minimum of 8
characters.
User Type the user access for this protocol. The default is
AdminUser.
The username can be up to 255 characters in length.
Include OIDs in Event Select this check box.
Payload
This options allows the McAfee ePO event payloads to be
constructed using a name-value pairs instead of the standard
event payload format. Including OIDs in the event payload is
required for processing SNMPv2 or SNMPv3 events for
McAfee ePO.
Note: This option is not supported for SNMPv1 configurations
of McAfee ePO.
For more information on configuring SNMP on your ePO device, see the McAfee
website at http://www.mcafee.com.
Installing the Java The Java Cryptography Extension (JCE) is a Java framework that is required for
Cryptography JSA to decrypt advanced cryptography algorithms for AES192 or AES256. The
Extension following information describes how to install Oracle JCE with JSA and on your
McAfee ePO appliance.
Configuring DSMs
474 MCAFEE
NOTE
Note: You do not need to extract the zip files for the Java Cryptography Extension
on your McAfee ePolicy Orchestrator appliance.
Configuring DSMs
McAfee Application / Change Control 475
Step 4 Copy the JCE jar files to the following directory on your JSA console or Event
Collector:
/usr/java/latest/jre/lib/
The JCE jar files are only copied to the system receiving the AES192 or AE256
encrypted files from McAfee ePolicy Orchestrator. Depending on your
configuration, this could be the JSA console or an Event Collector.
The installation of the Java Cryptography Extension for JSA is complete.
McAfee Application The McAfee Application / Change Control DSM for JSA accepts change control
/ Change Control events using Java Database Connectivity (JDBC). JSA records all relevant McAfee
Application / Change Control events. This document includes information on
configuring JSA to access the database containing events using the JDBC
protocol.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Step 5 Using the Log Source Type list box, select McAfee Application / Change
Control.
Step 6 Using the Protocol Configuration list box, select JDBC.
You must refer to the Configure Database Settings on your ePO Management
console to configure the McAfee Application / Change Control DSM in JSA.
Step 7 Configure the following values:
Parameter Description
Log Source Type the identifier for the log source. Type the log source identifier
Identifier in the following format:
<McAfee Change Control Database>@<Change Control
Database Server IP or Host Name>
Where:
<McAfee Change Control Database> is the database name,
as entered in the Database Name parameter.
<Change Control Database Server IP or Host Name>
is the hostname or IP address for this log source, as entered in the
IP or Hostname parameter.
When defining a name for your log source identifier, you must use
the values of the McAfee Change Control Database and Database
Server IP address or hostname from the ePO Management
Console.
Configuring DSMs
476 MCAFEE
Table 67-10 McAfee Application / Change Control JDBC Protocol Parameters (continued)
Parameter Description
Database Type From the list box, select MSDE.
Database Name Type the exact name of the McAfee Application / Change Control
database.
IP or Hostname Type the IP address or host name of the McAfee Application /
Change Control SQL Server.
Port Type the port number used by the database server. The default
port for MSDE is 1433.
The JDBC configuration port must match the listener port of the
McAfee Application / Change Control database. The McAfee
Application / Change Control database must have incoming TCP
connections enabled to communicate with JSA.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the username required to access the database.
Password Type the password required to access the database. The
password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password parameter.
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define the Window
Authentication Domain. Otherwise, leave this field blank.
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type SCOR_EVENTS as the name of the table or view that
includes the event records.
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type AutoID as the compare field. The compare field is used to
identify new events added between queries to the table.
Configuring DSMs
McAfee Application / Change Control 477
Table 67-10 McAfee Application / Change Control JDBC Protocol Parameters (continued)
Parameter Description
Start Date and Optional. Type the start date and time for database polling.
Time
The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Use Prepared Select this check box to use prepared statements.
Statements
Prepared statements allows the JDBC protocol source to setup the
SQL statement one time, then run the SQL statement many times
with different parameters. For security and performance reasons,
we recommend that you use prepared statements.
Note: Clearing this check box requires you to use an alternative
method of querying that does not use pre-compiled statements.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
McAfee Application / Change Control log source with a higher importance
compared to other log sources in JSA.
Configuring DSMs
478 MCAFEE
McAfee Web You can configure McAfee Web Gateway to integrate with JSA using one of the
Gateway following methods:
• Configuring McAfee Web Gateway for Syslog
• Configuring McAfee Web Gateway for the Log File Protocol
NOTE
Note: McAfee Web Gateway is formerly known as McAfee WebWasher.
Configuring DSMs
McAfee Web Gateway 479
NOTE
Note: If the McAfee Web Gateway appliance detects any conflicts with the rule set,
you must resolve the conflict. For more information, see your McAfee Web
Gateway documentation.
If you want to manually configure JSA to receive syslog events, select McAfee
Web Gateway from the Log Source Type list box.
For more information on configuring log sources, see the Log Sources Users
Guide.
Configuring McAfee The McAfee Web Gateway appliance allows you to forward event log files to an
Web Gateway for the interim file server for retrieval by JSA.
Log File Protocol
Procedure
Step 1 From the support website, download the following file:
log_handlers.tar.gz
Step 2 Extract the file.
This will give you the access handler file required to configure your McAfee Web
Gateway appliance.
access_log_file_loghandler.xml
Step 3 Log in to your McAfee Web Gateway console.
Step 4 Using the menu toolbar, click Policy.
NOTE
Note: If there is an existing access log configuration in your McAfee Web Gateway
appliance, you must delete the existing access log from the Rule Set Library
before adding access_log_file_loghandler.xml.
Configuring DSMs
480 MCAFEE
NOTE
Note: Due to the size of access.log files generated, we recommend you select the
option GZIP files after rotation in your McAfee Web Gate appliance.
NOTE
Note: By default McAfee Web Gateway is configured to write access logs to the
/opt/mwg/log/user-defined-logs/access.log/ directory.
You are now ready to configure JSA to receive access.log files from McAfee Web
Gateway. For more information, see Pulling Data Using the Log File Protocol.
You are now ready to configure the log source and protocol in JSA:
Step 1 To configure JSA to receive events from a McAfee Web Gateway appliance, select
McAfee Web Gateway from the Log Source Type list box.
Step 2 To configure the protocol, you must select the Log File option from the Protocol
Configuration list box.
Configuring DSMs
McAfee Web Gateway DSM Integration Process 481
Step 3 To configure the File Pattern parameter, you must type a regex string for the
access.log file, such as access[0-9]+\.log.
NOTE
Note: If you selected to GZIP your access.log files, you must type
access[0-9]+\.log\.gz for the FIle Pattern field and from the Processor list box,
select GZIP.
McAfee Web To integrate McAfee Web Gateway DSM with Juniper Secure Analytics (JSA), use
Gateway DSM the following procedure:
Integration Process
1 Download and install the most recent version of the McAfee Web Gateway DSM
RPM on your JSA console.
2 For each instance of McAfee Web Gateway, configure your McAfee Web Gateway
VPN system to enable communication with JSA.
3 If JSA does not automatically discovers the log source, for each McAfee Web
Gateway server you want to integrate, create a log source on the JSA console.
4 If you use McAfee Web Gateway v7.0.0 or later, create an event map.
Related tasks
• Manually installing a DSM
• Configuring McAfee Web Gateway for Syslog
• Configuring McAfee Web Gateway for the Log File Protocol
• Creating an event map for McAfee Web Gateway events
Configuring DSMs
482 MCAFEE
Configuring DSMs
68 METAINFO METAIP
The MetaInfo MetaIP DSM for Juniper Secure Analytics (JSA) accepts MetaIP
events using syslog.
JSA records all relevant and available information from the event. Before
configuring a MetaIP device in JSA, you must configure your device to forward
syslog events. For information on configuring your MetaInfo MetaIP appliance, see
your vendor documentation.
After you configure your MetaInfo MetaIP appliance the configuration for JSA is
complete. JSA automatically discovers and creates a log source for syslog events
forwarded from MetaInfo MetaIP appliances. However, you can manually create a
log source for JSA to receive syslog events. The following configuration steps are
optional.
Configuring DSMs
484 METAINFO METAIP
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your MetaInfo MetaIP appliances.
Configuring DSMs
69 MICROSOFT
Microsoft The Microsoft Exchange Server DSM for Juniper Secure Analytics (JSA) accepts
Exchange Server Exchange events by polling for event log files.
Supported Versions JSA supports collecting events from Microsoft Exchange Servers with the following
products:
Table 69-1 Microsoft Exchange Supported Versions
Version Product
Microsoft Exchange 2003 Adaptive Log Exporter
Note: For more information, see the Juniper Secure
Analytics Adaptive Log Exporter User Guide.
Microsoft Exchange 2007 Microsoft Exchange Protocol
Microsoft Exchange 2010 Microsoft Exchange Protocol
Configuring DSMs
486 MICROSOFT
Supported Event The Microsoft Exchange Protocol for JSA supports several event types for mail
Types and security events. Each event type contains events in a separate log file on your
Microsoft Exchange Server. To retrieve events, you must create a log source in
JSA to poll the Exchange Server for the event log, which is downloaded by the
Microsoft Exchange Protocol.
The log files for each event type are located in the following default directories:
Table 69-2 Microsoft Exchange Server Default File Path
The Exchange Protocol configuration supports file paths that allow you to define a
drive letter with the path information. The default file paths are typical for standard
Exchange Server installations, but if you have changed the ExchangeInstallPath
environment variable, you need to adjust the Microsoft Exchange Protocol
accordingly. The Microsoft Exchange Protocol is capable of reading subdirectories
of the OWA, SMTP, and MSGTRK folders for event logs.
Configuring DSMs
Microsoft Exchange Server 487
Required Ports and The Microsoft Exchange Protocol polls your Exchange Server for OWA, SMTP,
Privileges and MSGTRK event logs using NetBIOS.
You must ensure any firewalls located between the Exchange Server and the
remote host being remotely polled allow traffic on the following ports:
• TCP port 135 is used by the Microsoft Endpoint Mapper.
• UDP port 137 is used for NetBIOS name service.
• UDP port 138 is used for NetBIOS datagram service.
• TCP port 139 is used for NetBIOS session service.
• TCP port 445 is required for Microsoft Directory Services to transfer files
across a Windows share.
If a log folder path contains an administrative share (C$), users with NetBIOS
access on the administrative share (C$) have the proper access required to read
the log files. Local or domain administrators have sufficient privileges to access log
files that reside on administrative shares. Clearing the file path information from
any log folder path field disables monitoring for that log type.
Configure OWA Logs Outlook Web Access event logs for Microsoft Exchange are generated by the
Microsoft Internet Information System (IIS) installed with your Windows operating
system.
The following log formats are supported by the Microsoft Exchange Protocol:
• W3C
• NCSA
• IIS
The configuration steps to enable OWA event logs for your Microsoft Exchange
Server is dependant on the version of IIS installed.
Configuring DSMs
488 MICROSOFT
Configuring DSMs
Microsoft Exchange Server 489
Step 8 From the list of properties, select all properties that you want to apply to the
Microsoft Exchange Server DSM. You must select the following check boxes:
• Method (cs-method)
• Protocol Version (cs-version)
Step 9 Click OK.
JSA supports OWA, SMTP, and MSGTRK event logs. After you configure all of the
event log types you want to collect, then you are ready to create a log source in
JSA.
Configure SMTP SMTP logs created by the Exchange Server write SMTP send and receive email
Logs events that are part of the message delivery process.
Configuring DSMs
490 MICROSOFT
Configure MSGTRK Message Tracking logs created by the Exchange Server detail the message
Logs activity that takes on your Exchange Server, including the message path
information.
Configure a Log The Microsoft Windows Exchange protocol supports SMTP, OWA, and message
Source tracking logs for Microsoft Exchange.
Configuring DSMs
Microsoft Exchange Server 491
Parameter Description
Log Source Identifier Type an IP address, hostname, or name to identify the
Windows Exchange event source.
IP addresses or host names are recommended as they allow
JSA to identify a log file to a unique event source.
Server Address Type the IP address of the Microsoft Exchange server.
Domain Type the domain required to access the Microsoft Exchange
server. This parameter is optional.
Username Type the username required to access the Microsoft
Exchange server.
Password Type the password required to access the Microsoft
Exchange server.
Confirm Password Confirm the password required to access the Microsoft
Exchange server.
SMTP Log Folder Path Type the directory path to access the SMTP log files.
Clearing the file path information from the SMTP Log Folder
Path field disables SMTP monitoring.
OWA Log Folder Path Type the directory path to access the OWA log files.
Clearing the file path information from the OWA Log Folder
Path field disables OWA monitoring.
MSGTRK Log Folder Type the directory path to access message tracking log files.
Path
Message tracking is only available on Microsoft Exchange
2007 servers assigned the Hub Transport, Mailbox, or Edge
Transport server role.
File Pattern Type the regular expression (regex) required to filter the
filenames. All files matching the regex are processed.
The default is .*\.(?:log|LOG)
Force File Read Select this check box to force the protocol to read the log file.
By default, the check box is selected.
If the check box is cleared, the log file is read when the log
file modified time or file size attributes change.
Recursive Select this check box if you want the file pattern to search
sub folders. By default, the check box is selected.
Polling Interval (in Type the polling interval, which is the number of seconds
seconds) between queries to the log files to check for new data. The
minimum polling interval is 10 seconds, with a maximum
polling interval of 3,600 seconds.
The default is 10 seconds.
Configuring DSMs
492 MICROSOFT
Parameter Description
Throttle Events/Sec Type the maximum number of events the Microsoft
Exchange protocol forwards every second. The minimum
value is 100 EPS and the maximum is 20,000 EPS.
The default value is 100 EPS.
Microsoft IAS The Microsoft IAS Server DSM for JSA accepts RADIUS events using syslog. You
Server can integrate Internet Authentication Service (IAS) or Network Policy Server (NPS)
logs with JSA using the Adaptive Log Exporter. For more information, see the
Adaptive Log Exporter Users Guide.
From the Log Source Type list box, select the Microsoft IAS Server option.
For more information on configuring devices, see the Log Sources Users Guide.
For more information about your server, see your vendor documentation.
Microsoft DHCP The Microsoft DHCP Server DSM for JSA accepts DHCP events using the
Server Microsoft DHCP Server protocol or the Adaptive Log Exporter.
Configure your Before you can integrate your Microsoft DHCP Server with JSA, you must enable
Microsoft DHCP audit logging.
Server
To configure the Microsoft DHCP Server:
Step 1 Log in to the DHCP Server Administration Tool.
Step 2 From the DHCP Administration Tool, right-click on the DHCP server and select
Properties.
The Properties window is displayed.
Step 3 Click the General tab.
The General panel is displayed.
Step 4 Click Enable DHCP Audit Logging.
The audit log file is created at midnight and must contain a three-character day of
the week abbreviation.
Configuring DSMs
Microsoft IIS Server 493
You are now ready to configure the log source and protocol in JSA:
Step 1 To configure JSA to receive events from a Microsoft DHCP Server, you must select
the Microsoft DHCP Server option from the Log Source Type list box.
Step 2 To configure the protocol, you must select the Microsoft DHCP option from the
Protocol Configuration list box. For more information on configuring the
Microsoft DHCP protocol, see the Log Sources Users Guide.
NOTE
Note: To integrate Microsoft DHCP Server versions 2000/2003 with JSA using the
Adaptive Log Exporter Microsoft DHCP devices, see the Adaptive Log Exporter
Users Guide.
Microsoft IIS Server The Microsoft Internet Information Services (IIS) Server DSM for JSA accepts FTP,
HTTP, NNTP, and SMTP events using syslog.
You can integrate a Microsoft IIS Server with JSA using one of the following
methods:
• Configure JSA to connect to your Microsoft IIS Server using the IIS Protocol.
The IIS Protocol collects HTTP events from Microsoft IIS servers. For more
information, see Configure Microsoft IIS using the IIS Protocol.
• Configure a Snare Agent with your Microsoft IIS Server to forward event
information to JSA. For more information, see Configuring Microsoft IIS Using
a Snare Agent.
• Configure the Adaptive Log Exporter to forward IIS events to JSA. For more
information, see Configuring Microsoft IIS using the Adaptive Log Exporter.
For more information on the Adaptive Log Exporter, see the Adaptive Log
Exporter Users Guide.
Table 69-6 Microsoft IIS Supported Log Types
Supported Log
Version Type Method of Import
Microsoft IIS 6.0 SMTP, NNTP, IIS Protocol
FTP, HTTP
Configuring DSMs
494 MICROSOFT
Supported Log
Version Type Method of Import
Microsoft IIS 6.0 SMTP, NNTP, Adaptive Log Exporter or Snare
FTP, HTTP
Microsoft IIS 7.0 HTTP IIS Protocol
Microsoft IIS 7.0 SMTP, NNTP, Adaptive Log Exporter or Snare
FTP, HTTP
Configure Microsoft Before you configure JSA with the Microsoft IIS protocol, you must configure your
IIS using the IIS Microsoft IIS Server to generate the proper log format.
Protocol
The Microsoft IIS Protocol only supports the W3C Extended Log File format. The
Microsoft authentication protocol NTLMv2 Session is not supported by the
Microsoft IIS protocol.
Configuring DSMs
Microsoft IIS Server 495
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source.
Server Address Type the IP address of the Microsoft IIS server.
Username Type the username required to access the Microsoft IIS
server.
Password Type the password required to access the Microsoft IIS
server.
Confirm Password Confirm the password required to access the Microsoft IIS
server.
Domain Type the domain required to access the Microsoft IIS server.
Configuring DSMs
496 MICROSOFT
Parameter Description
Folder Path Type the directory path to access the IIS log files. The default
is \WINDOWS\system32\LogFiles\W3SVC1\
Parameters that support file paths allow you to define a drive
letter with the path information. For example, you can use
c$\LogFiles\ for an administrative share or LogFiles\
for a public share folder path, but not c:\LogFiles.
If a log folder path contains an administrative share (C$),
users with NetBIOS access on the administrative share (C$)
have the proper access required to read the log files. Local
or domain administrators have sufficient privileges to access
log files that reside on administrative shares.
File Pattern Type the regular expression (regex) required to filter the
filenames. All matching files are included in the processing.
The default is (?:u_)?ex.*\.(?:log|LOG)
For example, to list all files starting with the word log,
followed by one or more digits and ending with tar.gz, use
the following entry: log[0-9]+\.tar\.gz. Use of this parameter
requires knowledge of regular expressions (regex). For more
information, see the following website:
http://download.oracle.com/javase/tutorial/essential/regex/
Recursive Select this check box if you want the file pattern to search
sub folders. By default, the check box is selected.
Polling Interval (s) Type the polling interval, which is the number of seconds
between queries to the log files to check for new data. The
default is 10 seconds.
Configuring If you want to use a snare agent to integrate the Microsoft IIS server with JSA, you
Microsoft IIS Using a must configure a Snare Agent to forward events.
Snare Agent
Configuring Microsoft IIS using a Snare Agent with JSA requires the following:
1 Configure Your Microsoft IIS Server for Snare
2 Configure the Snare Agent
3 Configure a Microsoft IIS log source
Configuring DSMs
Microsoft IIS Server 497
Configuring DSMs
498 MICROSOFT
Step 5 In the Target Host field, type the IP address of your JSA.
Step 6 In the Log Directory field type the IIS file location:
\%SystemRoot%\System32\LogFiles\
By default Snare for IIS is configured to look for logs in
C:\WINNT\System32\LogFiles\.
Step 7 For Destination, select Syslog.
Step 8 For Delimiter, select TAB.
Step 9 Select the Display IIS Header Information check box.
Step 10 Click OK.
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source.
Configuring DSMs
Microsoft ISA 499
Configuring The Adaptive Log Exporter is a stand-alone application that allows you to integrate
Microsoft IIS using device logs or application event data with JSA or Log Manager.
the Adaptive Log
Exporter The Adaptive Log Export supports NCSA, IIS, and W3C active log formats.
Microsoft ISA The Microsoft Internet and Acceleration (ISA) DSM for JSA accepts events using
syslog. You can integrate Microsoft ISA Server with JSA using the Adaptive Log
Exporter. For more information on the Adaptive Log Exporter, see the Adaptive
Log Exporter Users Guide.
NOTE
Note: The Microsoft ISA DSM also supports events from Microsoft Threat
Management Gateway using the Adaptive Log Exporter.
Configuring DSMs
500 MICROSOFT
Microsoft Hyper-V The Juniper Secure Analytics (JSA) DSM for Microsoft Hyper-V can collect event
logs from your Microsoft Hyper-V servers.
Table 69-1 describes the specifications for the Microsoft Hyper-V Server DSM.
Microsoft Hyper-V To integrate Microsoft Hyper-V DSM with JSA, use the following procedures:
DSM Integration
Process
1 Download and install the most recent WinCollect RPM on your JSA console.
2 Install a WinCollect agent on the Hyper-V system or on another system that has a
route to the Hyper-V system. You can also use an existing WinCollect agent. For
more information, see the WinCollect Users Guide.
3 If automatic updates are not enabled, download and install the DSM RPM for
Microsoft Hyper-V on your JSA Console. RPMs need to be installed only one time.
4 For each Microsoft Hyper-V server that you want to integrate, create a log source
on the JSA console.
Related tasks
Manually installing a DSM
Configuring a Microsoft Hyper-V Log Source in JSA
Configuring DSMs
Microsoft SQL Server 501
Procedure
To configure a Microsoft Hyper-V log source in JSA:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 From the Log Source Type list, select Microsoft Hyper-V.
Step 7 From the Protocol Configuration list, select WinCollect.
Step 8 From the Application or Service Log Type list, select Microsoft Hyper-V.
Step 9 From the WinCollect Agent list, select the WinCollect agent that accesses the
Microsoft Hyper-V server.
Step 10 Configure the remaining parameters.
Step 11 Click Save.
Step 12 On the Admin tab, click Deploy Changes.
Microsoft SQL The Microsoft SQL Server DSM JSA accepts SQL events using syslog or JDBC.
Server
You can integrate Microsoft SQL Server with JSA using one of the following
methods:
• JDBC - Microsoft SQL Server 2008 Enterprise allows you to capture audit
events using JDBC by generating a table view containing audit events. Audit
events are only available using Microsoft SQL Server 2008 Enterprise.
• Adaptive Log Exporter - You can integrate Microsoft SQL Server 2000 and
2005 with JSA using the Adaptive Log Exporter to collect ERRORLOG
messages from databases managed by your Microsoft SQL Server. For more
information on the Adaptive Log Exporter, see the Adaptive Log Exporter Users
Guide.
Configure Auditing To configure Microsoft SQL Server 2008 Enterprise, you must create an auditing
for MS SQL Server object for audit events. The auditing object allows you log database events to a file.
2008 Enterprise
Configuring DSMs
502 MICROSOFT
Creating an Audit An audit specification allows you to define the level of auditing events that are
Specification written to an audit file.
You can create an audit specification at the server level or at the database level.
Depending on your requirements, you might require both a server and database
audit specification.
Configuring DSMs
Microsoft SQL Server 503
Create a Database The database view contains the audit events from your server audit specification
View and database audit specification. A database view allows JSA to poll for audit
events from a database table using JDBC.
Configuring DSMs
504 MICROSOFT
A new database view is created named dbo.AuditData. You are now ready to
configure a log source in JSA.
Parameter Description
Log Source Type the identifier for the log source in the following format:
Identifier
<SQL Database>@<SQL DB Server IP or Host Name>
Where:
<SQL Database> is the database name, as entered in the
Database Name parameter.
<SQL DB Server IP or Host Name> is the hostname or IP
address for this log source, as entered in the IP or Hostname
parameter.
Database Type From the list box, select MSDE.
Database Name Type Master as the name of the Microsoft SQL database.
IP or Hostname Type the IP address or host name of the Microsoft SQL Server.
Port Type the port number used by the database server. The default
port for MSDE is 1433.
The JDBC configuration port must match the listener port of the
Microsoft SQL database. The Microsoft SQL database must have
incoming TCP connections enabled to communicate with JSA.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the username required to access the SQL database.
Password Type the password required to access the SQL database.
The password can be up to 255 characters in length.
Confirm Confirm the password required to access the SQL database.
Password
Configuring DSMs
Microsoft SQL Server 505
Parameter Description
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define a Window Authentication
Domain. Otherwise, leave this field blank.
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type dbo.AuditData as the name of the table or view that
includes the audit event records.
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type event_time as the compare field. The compare field is used
to identify new events added between queries to the table.
Start Date and Optional. Type the start date and time for database polling.
Time The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Use Prepared Select this check box to use prepared statements.
Statements
Prepared statements allow the JDBC protocol source to setup the
SQL statement once, then run the SQL statement many times with
different parameters. For security and performance reasons, we
recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Configuring DSMs
506 MICROSOFT
Parameter Description
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication
When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
Microsoft SQL log source with a higher importance compared to other log sources
in JSA.
Microsoft The Microsoft SharePoint DSM for JSA collects audit events from the SharePoint
SharePoint database using JDBC to poll an SQL database for audit events. Audit events allow
you to track changes made to sites, files, and content managed by Microsoft
SharePoint.
Before you can integrate Microsoft SharePoint with JSA, you must:
1 Configure the audit events you want to collect for Microsoft SharePoint.
2 Create an SQL database view for JSA in Microsoft SharePoint.
3 Configure a log source to collect audit events from Microsoft SharePoint.
NOTE
Note: Ensure that no firewall rules are blocking the communication between JSA
and the database associated with Microsoft SharePoint.
Configuring DSMs
Microsoft SharePoint 507
Configure Microsoft The audit settings for Microsoft SharePoint allow you to define what events are
SharePoint Audit tracked for each site managed by Microsoft SharePoint.
Events
To configure audit events for Microsoft SharePoint:
Step 1 Log in to your Microsoft SharePoint site.
Step 2 From the Site Actions list box, select Site Settings.
Step 3 From the Site Collection Administration list, click Site collection audit settings.
Step 4 From the Documents and Items section, select a check box for each document
and item audit event you want to audit.
Step 5 From the Lists, Libraries, and Sites section, select a check box for each content
audit event you want to enable.
Step 6 Click OK.
You are now ready to create a database view for JSA to poll Microsoft SharePoint
events.
Create a database Microsoft SharePoint uses SQL Server Management Studio (SSMS) to manage
View for Microsoft the SharePoint SQL databases. To collect audit event data, you must create a
SharePoint database view on your Microsoft SharePoint server that is accessible to JSA.
Configuring DSMs
508 MICROSOFT
,a.DocLocation
,a.LocationType
,a.Occurred as "EventTime"
,a.Event as "EventID"
,a.EventName
,a.EventSource
,a.SourceName
,a.EventData
from WSS_Content.dbo.AuditData a, WSS_Content.dbo.UserInfo u
where a.UserId = u.tp_ID and a.SiteId = u.tp_SiteID;
Step 10 From the Query pane, right-click and select Execute.
If the view is created, the following message is displayed in the results pane:
Command(s) completed successfully.
The dbo.AuditEvent view is created. You are now ready to configure the log source
in JSA to poll the view for audit events.
Configure a Log JSA requires a user account with the proper credentials to access the view you
Source created in the Microsoft SharePoint database. To successfully poll for audit data
from the Microsoft SharePoint database, you must create a new user or provide
the log source with existing user credentials to read from the AuditEvent view. For
more information on creating a user account, see your vendor documentation.
Configuring DSMs
Microsoft SharePoint 509
Step 4 In the Log Source Name field, type a name for the log source.
Step 5 In the Log Source Description field, type a description for the log source.
Step 6 From the Log Source Type list box, select Microsoft SharePoint.
Step 7 From the Protocol Configuration list box, select JDBC.
The JDBC protocol parameters appear.
Step 8 Configure the following values:
Parameter Description
Log Source Type the identifier for the log source. Type the log source identifier
Identifier in the following format:
<SharePoint Database>@<SharePoint Database Server
IP or Host Name>
Where:
<SharePoint Database> is the database name, as entered in
the Database Name parameter.
<SharePoint Database Server IP or Host Name> is the
hostname or IP address for this log source, as entered in the IP or
Hostname parameter.
Database Type From the list box, select MSDE.
Database Name Type WSS_Logging as the name of the Microsoft SharePoint
database.
IP or Hostname Type the IP address or host name of the Microsoft SharePoint
SQL Server.
Port Type the port number used by the database server. The default
port for MSDE is 1433.
The JDBC configuration port must match the listener port of the
Microsoft SharePoint database. The Microsoft SharePoint
database must have incoming TCP connections enabled to
communicate with JSA.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the username the log source can use to access the Microsoft
SharePoint database.
Password Type the password the log source can use to access the Microsoft
SharePoint database.
The password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password field.
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define the Window
Authentication Domain. Otherwise, leave this field blank.
Configuring DSMs
510 MICROSOFT
Parameter Description
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type AuditEvent as the name of the table or view that includes
the event records.
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type EventTime as the compare field. The compare field is used
to identify new events added between queries to the table.
Start Date and Optional. Type the start date and time for database polling.
Time
The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Use Prepared Select the Use Prepared Statements check box.
Statements
Prepared statements allows the JDBC protocol source to setup the
SQL statement one time, then run the SQL statement many times
with different parameters. For security and performance reasons,
we recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Polling Interval Type the polling interval, which is the amount of time between
queries to the AuditEvent view you created. The default polling
interval is 10 seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication
When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Configuring DSMs
Microsoft Windows Security Event Log 511
Parameter Description
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
Microsoft SharePoint log source with a higher importance compared to other log
sources in JSA.
Microsoft Windows The Microsoft Windows Security Event Log DSM for JSA accepts Windows-based
Security Event Log events using syslog.
You can integrate Window Microsoft Security Event Log events with JSA using one
of the following methods:
• Use a WinCollect agent to retrieve Windows-based events from multiple
Windows systems in your network. For more information on WinCollect, see the
WinCollect User Guide.
• Use the Adaptive Log Exporter. For more information on the Adaptive Log
Exporter, see the Adaptive Log Exporter Users Guide.
• Use the Microsoft Security Event Log protocol to collect events using WMI. For
more information, see Using WMI
• Set-up the Snare Agent to forward Microsoft Windows Security Event Logs to
JSA. See Using the Snare Agent
Using WMI Before you can configure a log source using the Microsoft Windows Security Event
Log protocol, you must configure your system DCOM settings for each host you
want to monitor. Ensure the following is configured for each host:
• Make sure you have appropriate administrative permissions. For this process,
you must be a member of the Administrators group on the remote computer.
• Make sure you have Windows 2000, Windows 2003, Windows 2008, XP, or
Vista software, or Windows 7 installed. The Windows Event Log Protocol
supports 32 or 64-bit systems.
• Configure DCOM and enable the host.
• Enable Windows Management Instrumentation on the host.
• Activate the remote registry service.
Configuring DSMs
512 MICROSOFT
Using the Snare To configure the Snare Agent to forward Windows security event logs to JSA:
Agent
Step 1 Download and install the Snare Agent.
NOTE
Note: To download a Snare Agent, see the following website:
http://www.intersectalliance.com/projects/SnareWindows/index.html
Configuring DSMs
Microsoft Operations Manager 513
For more information on configuring devices, see the Log Sources Users Guide.
For more information about your server, see your vendor documentation.
Microsoft The Microsoft Operations Manager DSM for JSA accepts Microsoft Operations
Operations Manager (MOM) events by polling the OnePoint database allowing JSA to record
Manager the relevant events.
Before you configure JSA to integrate with the Microsoft Operations Manager, you
must ensure a database user account is configured with appropriate permissions
to access the MOM OnePoint SQL Server database. Access to the OnePoint
database SDK views is managed through the MOM SDK View User database role.
For more information, please see your Microsoft Operations Manager
documentation.
NOTE
Note: Make sure that no firewall rules are blocking the communication between
JSA and the SQL Server database associated with MOM. For MOM installations
that use a separate, dedicated computer for the SQL Server database, the
SDKEventView view is queried on the database system, not the system running
MOM.
Configuring DSMs
514 MICROSOFT
Parameter Description
Log Source Type the identifier for the log source. Type the log source identifier
Identifier in the following format:
<MOM Database>@<MOM Database Server IP or Host
Name>
Where:
<MOM Database> is the database name, as entered in the
Database Name parameter.
<MOM Database Server IP or Host Name> is the
hostname or IP address for this log source, as entered in the IP or
Hostname parameter.
Database Type From the list box, select MSDE.
Database Name Type OnePoint as the name of the Microsoft Operations Manager
database.
IP or Hostname Type the IP address or host name of the Microsoft Operations
Manager SQL Server.
Port Type the port number used by the database server. The default
port for MSDE is 1433.
The JDBC configuration port must match the listener port of the
Microsoft Operations Manager database. The Microsoft
Operations Manager database must have incoming TCP
connections enabled to communicate with JSA.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the username required to access the database.
Password Type the password required to access the database. The
password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password parameter.
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define the Window
Authentication Domain. Otherwise, leave this field blank.
Configuring DSMs
Microsoft Operations Manager 515
Parameter Description
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type SDKEventView as the name of the table or view that
includes the event records.
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type TimeStored as the compare field. The compare field is used
to identify new events added between queries to the table.
Start Date and Optional. Type the start date and time for database polling.
Time
The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Use Prepared Select this check box to use prepared statements.
Statements
Prepared statements allows the JDBC protocol source to setup the
SQL statement one time, then run the SQL statement many times
with different parameters. For security and performance reasons,
we recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication
When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Configuring DSMs
516 MICROSOFT
Parameter Description
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
Microsoft Operations Manager log source with a higher importance compared to
other log sources in JSA.
For more information on configuring log sources, see the Log Sources Users
Guide.
Microsoft System A JSA Microsoft System Center Operations Manager (SCOM) DSM accepts
Center Operations SCOM events by polling the OperationsManager database allowing JSA to record
Manager the relevant events.
Before you configure JSA to integrate with the Microsoft SCOM, you must ensure
a database user account is configured with appropriate permissions to access the
SCOM OperationsManager SQL Server database. The appropriate authentication
mode might need to be enabled in the Security settings of the SQL Server
properties. For more information, please see your Microsoft SCOM documentation.
NOTE
Note: Ensure that no firewall rules are blocking the communication between JSA
and the SQL Server database associated with SCOM. For SCOM installations that
use a separate, dedicated computer for the SQL Server database, the EventView
view is queried on the database system, not the system running SCOM.
Configuring DSMs
Microsoft System Center Operations Manager 517
Parameter Description
Log Source Type the identifier for the log source. Type the log source identifier
Identifier in the following format:
<SCOM Database>@<SCOM Database Server IP or Host
Name>
Where:
<SCOM Database> is the database name, as entered in the
Database Name parameter.
<SCOM Database Server IP or Host Name> is the
hostname or IP address for this log source, as entered in the IP or
Hostname parameter.
Database Type From the list box, select MSDE.
Database Name Type OperationsManager as the name of the Microsoft SCOM
database.
IP or Hostname Type the IP address or host name of the Microsoft SCOM SQL
Server.
Port Type the port number used by the database server. The default
port for MSDE is 1433.
The JDBC configuration port must match the listener port of the
Microsoft SCOM database. The Microsoft SCOM database must
have incoming TCP connections enabled to communicate with
JSA.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the username required to access the database.
Password Type the password required to access the database. The
password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password parameter.
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define a Window Authentication
Domain. Otherwise, leave this field blank.
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type EventView as the name of the table or view that includes
the event records.
Configuring DSMs
518 MICROSOFT
Parameter Description
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type TimeAdded as the compare field. The compare field is used
to identify new events added between queries to the table.
Start Date and Optional. Type the start date and time for database polling.
Time
The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Use Prepared Select this check box to use prepared statements.
Statements
Prepared statements allows the JDBC protocol source to setup the
SQL statement one time, then run the SQL statement many times
with different parameters. For security and performance reasons,
we recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
Configuring DSMs
Microsoft Endpoint Protection 519
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
Microsoft SCOM log source with a higher importance compared to other log
sources in JSA.
Microsoft Endpoint The Microsoft Endpoint Protection DSM for JSA is capable of collecting malware
Protection detection events.
Supported Event Malware detection events are retrieved by JSA by configuring the JDBC protocol.
Types Adding malware detection events to JSA allows you to monitor and detect malware
infected computers in your deployment.
Configuration The Microsoft Endpoint Protection DSM uses JDBC to poll an SQL database for
Overview malware detection event data. This DSM does not automatically discover. To
integrate Microsoft EndPoint Protection with JSA, you must:
1 Create an SQL database view for JSA with the malware detection event data.
2 Configure a JDBC log source to poll for events from the Microsoft EndPoint
Protection database.
3 Ensure that no firewall rules are blocking communication between JSA and the
database associated with Microsoft EndPoint Protection.
Configuring DSMs
520 MICROSOFT
Creating a Database Microsoft EndPoint Protection uses SQL Server Management Studio (SSMS) to
View manage the EndPoint Protection SQL databases.
Procedure
Step 1 Log in to the system hosting your Microsoft EndPoint Protection SQL database.
Step 2 On the desktop, select Start > Run.
Step 3 Type the following:
ssms
Step 4 Click OK.
Step 5 Log in to your Microsoft Endpoint Protection database.
Step 6 From the Object Explorer, select Databases.
Step 7 Select your database and click Views.
Step 8 From the navigation menu, click New Query.
Step 9 In the Query pane, type the following Transact-SQL statement to create the
database view:
create view dbo.MalwareView as
select n.Type
, n.RowID
, n.Name
, n.Description
, n.Timestamp
, n.SchemaVersion
, n.ObserverHost
, n.ObserverUser
, n.ObserverProductName
, n.ObserverProductversion
, n.ObserverProtectionType
, n.ObserverProtectionVersion
, n.ObserverProtectionSignatureVersion
, n.ObserverDetection
, n.ObserverDetectionTime
, n.ActorHost
, n.ActorUser
, n.ActorProcess
, n.ActorResource
, n.ActionType
, n.TargetHost
, n.TargetUser
, n.TargetProcess
, n.TargetResource
, n.ClassificationID
, n.ClassificationType
, n.ClassificationSeverity
, n.ClassificationCategory
Configuring DSMs
Microsoft Endpoint Protection 521
, n.RemediationType
, n.RemediationResult
, n.RemediationErrorCode
, n.RemediationPendingAction
, n.IsActiveMalware
, i.IP_Addresses0 as 'SrcAddress'
from v_AM_NormalizedDetectionHistory n, System_IP_Address_ARR i,
v_RA_System_ResourceNames s, Network_DATA d where n.ObserverHost
= s.Resource_Names0 and s.ResourceID = d.MachineID and
d.IPEnabled00 = 1 and d.MachineID = i.ItemKey and
i.IP_Addresses0 like '%.%.%.%';
Step 10 From the Query pane, right-click and select Execute.
If the view is created, the following message is displayed in the results pane:
Command(s) completed successfully.
You are now ready to configure a log source in JSA.
Configuring a Log JSA requires a user account with the proper credentials to access the view you
Source created in the Microsoft EndPoint Protection database.
To successfully poll for malware detection events from the Microsoft EndPoint
Protection database, you must create a new user or provide the log source with
existing user credentials to read from the database view you created. For more
information on creating a user account, see your vendor documentation.
Procedure
Step 1 Click the Admin tab.
Step 2 On the navigation menu, click Data Sources.
Step 3 Click the Log Sources icon.
Step 4 In the Log Source Name field, type a name for the log source.
Step 5 In the Log Source Description field, type a description for the log source.
Step 6 From the Log Source Type list box, select Microsoft EndPoint Protection.
Step 7 From the Protocol Configuration list box, select JDBC.
Configuring DSMs
522 MICROSOFT
Parameter Description
Log Source Type the identifier for the log source. Type the log source identifier
Identifier in the following format:
<Database>@<Database Server IP or Host Name>
Where:
<Database> is the database name, as entered in the Database
Name parameter.
<Database Server IP or Host Name> is the hostname or
IP address for this log source, as entered in the IP or Hostname
parameter.
Database Type From the list box, select MSDE.
Database Name Type the name of the Microsoft EndPoint Protection database.
This name must match the database name you selected when
creating your view in Step 7.
IP or Hostname Type the IP address or host name of the Microsoft EndPoint
Protection SQL Server.
Port Type the port number used by the database server. The default
port for MSDE is 1433.
The JDBC configuration port must match the listener port of the
Microsoft EndPoint Protection database. The Microsoft EndPoint
Protection database must have incoming TCP connections
enabled to communicate with JSA.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the username the log source can use to access the Microsoft
EndPoint Protection database.
Password Type the password the log source can use to access the Microsoft
EndPoint Protection database.
The password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password field.
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define the Window
Authentication Domain. Otherwise, leave this field blank.
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Configuring DSMs
Microsoft Endpoint Protection 523
Parameter Description
Table Name Type dbo.MalwareView as the name of the table or view that
includes the event records.
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type Timestamp as the compare field. The compare field is used
to identify new events added between queries to the table.
Start Date and Optional. Type the start date and time for database polling.
Time The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Use Prepared Select the Use Prepared Statements check box.
Statements
Prepared statements allows the JDBC protocol source to setup the
SQL statement one time, then run the SQL statement many times
with different parameters. For security and performance reasons,
we recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Polling Interval Type the polling interval, which is the amount of time between
queries to the view you created. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
Configuring DSMs
524 MICROSOFT
Parameter Description
Use NTLMv2 Select the Use NTLMv2 check box.
This option forces MSDE connections to use the NTLMv2 protocol
when communicating with SQL servers that require NTLMv2
authentication. The default value of the check box is selected.
If the Use NTLMv2 check box is selected, it has no effect on
MSDE connections to SQL servers that do not require NTLMv2
authentication.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
Microsoft EndPoint Protection log source with a higher importance compared to
other log sources in JSA.
Configuring DSMs
70 MOTOROLA SYMBOL AP
The Motorola Symbol AP DSM for Juniper Secure Analytics (JSA) records all
relevant events forwarded from Motorola Symbol AP devices using syslog.
Configure a Log To integrate Motorola SymbolAP with JSA, you must manually create a log source
Source to receive events.
JSA does not automatically discover or create log sources for syslog events from
Motorola SymbolAP appliances. In cases where the log source is not automatically
discovered, we recommend you create a log source before forwarding events to
JSA.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Motorola SymbolAP appliance.
Configuring DSMs
526 MOTOROLA SYMBOL AP
Configuring DSMs
71 NAME VALUE PAIR
The Name Value Pair (NVP) DSM allows you to integrate Juniper Secure Analytics
(JSA) with devices that might not natively send logs using syslog.
JSAThe NVP DSM provides a log format that allows you to send logs to JSA. For
example, for a device that does not export logs natively with syslog, you can create
a script to export the logs from a device that JSA does not support, format the logs
in the NVP log format, and send the logs to JSA using syslog. The NVP DSM log
source configured in JSA then receives the logs and is able to parse the data since
the logs are received in the NVP log format.
NOTE
Note: Events for the NVP DSM are not automatically discovered by JSA.
The NVP DSM accepts events using syslog. JSA records all relevant events. The
log format for the NVP DSM must be a tab-separated single line list of
Name=Parameter. The NVP DSM does not require a valid syslog header.
NOTE
Note: The NVP DSM assumes an ability to create custom scripts or thorough
knowledge of your device capabilities to send logs to JSA using syslog in NVP
format.
NVP Log Format Table 71-1 includes a list of tags that the NVP DSM is able to parse:
Tag Description
DeviceType Type NVP as the DeviceType. This identifies the log
formats as a Name Value Pair log message.
This is a required parameter and DeviceType=NVP must
be the first pair in the list.
Configuring DSMs
528 NAME VALUE PAIR
Tag Description
EventName Type the event name that you want to use to identity the
event in the Events interface when using the Event
Mapping functionality. For more information on mapping
events, see the Juniper Secure Analytics Users Guide.
This is a required parameter.
EventCategory Type the event category you want to use to identify the
event in the Events interface. If this value is not included in
the log message, the value NameValuePair value is
used.
SourceIp Type the source IP address for the message.
SourcePort Type the source port for the message.
SourceIpPreNAT Type the source IP address for the message before
Network Address Translation (NAT) occurred.
SourceIpPostNAT Type the source IP address for the message after NAT
occurs.
SourceMAC Type the source MAC address for the message.
SourcePortPreNAT Type the source port for the message before NAT occurs.
SourcePortPostNAT Type the source port for the message after NAT occurs.
DestinationIp Type the destination IP address for the message.
DestinationPort Type the destination port for the message.
DestinationIpPreNAT Type the destination IP address for the message before
NAT occurs.
DestinationIpPostNAT Type the IP address for the message after NAT occurs.
DestinationPortPreNAT Type the destination port for the message before NAT
occurs.
DestinationPortPostNAT Type the destination port for the message after NAT
occurs.
DestinationMAC Type the destination MAC address for the message.
DeviceTime Type the time that the event was sent, according to the
device. The format is: YY/MM/DD hh:mm:ss. If no specific
time is provided, the syslog header or DeviceType
parameter is applied.
UserName Type the user name associated with the event.
HostName Type the host name associated with the event. Typically,
this parameter is only associated with identity events.
GroupName Type the group name associated with the event. Typically,
this parameter is only associated with identity events.
NetBIOSName Type the NetBIOS name associated with the event.
Typically, this parameter is only associated with identity
events.
Configuring DSMs
Examples 529
Tag Description
Identity Type TRUE or FALSE to indicate whether you wish this
event to generate an identity event. An identity event is
generated if the log message contains the SourceIp (if the
IdentityUseSrcIp parameter is set to TRUE) or
DestinationIp (if the IdentityUseSrcIp parameter is set to
FALSE) and one of the following parameters: UserName,
SourceMAC, HostName, NetBIOSName, or GroupName.
IdentityUseSrcIp Type TRUE or FALSE (default). TRUE indicates that you
wish to use the source IP address for identity. FALSE
indicates that you wish to use the destination IP address
for identity. This parameter is used only if the Identity
parameter is set to TRUE.
In addition to the parameters listed above, you can add any NVP parameters to
your log. The additional parameters are added to the payload, however, these
values are not parsed.
Step 9 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Name Value Pair option.
For more information on configuring log sources, see the Log Sources Users
Guide.
Examples Example 1
The following example parses all fields:
DeviceType=NVP EventName=Test
DestinationIpPostNAT=172.16.45.10 DeviceTime=2007/12/14
09:53:49 SourcePort=1111 Identity=FALSE SourcePortPostNAT=3333
DestinationPortPostNAT=6666 HostName=testhost
DestinationIpPreNAT=172.16.10.10 SourcePortPreNAT=2222
DestinationPortPreNAT=5555 SourceMAC=AA:15:C5:BF:C4:9D
SourceIp=172.16.200.10 SourceIpPostNAT=172.16.40.50
NetBIOSName=testbois DestinationMAC=00:41:C5:BF:C4:9D
EventCategory=Accept DestinationPort=4444
GroupName=testgroup SourceIpPreNAT=172.16.70.87UserName=root
DestinationIp=172.16.30.30
Example 2
The following example provides identity using the destination IP address:
<133>Apr 16 12:41:00 172.16.10.10 namevaluepair:
DeviceType=NVP EventName=Test EventCategory=Accept
Identity=TRUE SourceMAC=AA:15:C5:BF:C4:9D
Configuring DSMs
530 NAME VALUE PAIR
SourceIp=172.15.210.113 DestinationIp=172.16.10.10
UserName=root
Example 3
The following example provides identity using the source IP address:
DeviceType=NVP EventName=Test EventCategory=Accept
DeviceTime=2007/12/14 09:53:49 SourcePort=5014 Identity=TRUE
IdentityUseSrcIp=TRUE SourceMAC=AA:15:C5:BF:C4:9D
SourceIp=172.15.210.113 DestinationIp=172.16.10.10
DestinationMAC=00:41:C5:BF:C4:9D UserName=root
Example 4
The following example provides an entry with no identity:
DeviceType=NVP EventName=Test EventCategory=Accept
DeviceTime=2007/12/14 09:53:49 SourcePort=5014 Identity=FALSE
SourceMAC=AA:15:C5:BF:C4:9D SourceIp=172.15.210.113
DestinationIp=172.16.10.10DestinationMAC=00:41:C5:BF:C4:9D
UserName=root
Configuring DSMs
72 NETAPP DATA ONTAP
Juniper Secure Analytics (JSA) accepts syslog events from a Windows agent
installed with the Adaptive Log Exporter.
The Adaptive Log Exporter is an external event collection agent. The Adaptive Log
Exporter allows you to collect events using a NetApp Data ONTAP plug-in. The
Adaptive Log Exporter can read and process event log messages generated from
Common Internet File System (CIFS) auditing on the NetApp Data ONTAP device
and forward the events.
For more information on using the Adaptive Log Exporter, see the Adaptive Log
Exporter Users Guide.
NOTE
Note: The NetApp Data ONTAP plug-in for the Adaptive Log Exporter only
supports CIFS. For information on configuring CIFS on your NetApp Data ONTAP
device, see your vendor documentation.
JSA automatically detects the NetApp Data ONTAP events from the Adaptive Log
Exporter. To manually configure JSA to receive events from NetApp Data ONTAP:
From the Log Source Type list box, select the NetApp Data ONTAP option.
Configuring DSMs
73 NIKSUN
The Niksun DSM for Juniper Secure Analytics (JSA) records all relevant Niksun
events using syslog.
Configure a Log To integrate Niksun with JSA, you must manually create a log source to receive
Source events.
JSA does not automatically discover or create log sources for syslog events from
Niksun appliances. In cases where the log source is not automatically discovered,
we recommend you create a log source before forwarding events to JSA.
Configuring DSMs
534 NIKSUN
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Niksun appliance.
Configuring DSMs
74 NOKIA FIREWALL
The Check Point Firewall-1 DSM allows Juniper Secure Analytics (JSA) to accept
events Check Point-based Firewall events sent from Nokia Firewall appliances.
The syslog and OPSEC protocols allow two methods for JSA to collect Check
Point events from Nokia Firewall appliances.
Integrating with a This method allows you to configure your Nokia Firewall to accept Check Point
Nokia Firewall syslog events forwarded from your Nokia Firewall appliance.
Using Syslog
To configure JSA to integrate with a Nokia Firewall device, you must:
1 Configure iptables on your JSA console or Event Collector to receive syslog events
from Nokia Firewall.
2 Configure your Nokia Firewall to forward syslog event data.
3 Configure the events logged by the Nokia Firewall.
4 Optional. Configure a log source in JSA.
Configuring IPtables Nokia Firewalls require a TCP reset (rst) or a TCP acknowledge (ack) from JSA on
port 256 before forwarding syslog events.
The Nokia Firewall TCP request is an online status request designed to ensure
that JSA is online and able to receive syslog events. If a valid reset or
acknowledge is received from JSA, then Nokia Firewall begins forwarding events
to JSA on UDP port 514. By default, JSA does not respond to any online status
requests from TCP port 256. You must configure IPtables on your JSA console or
any Event Collectors that receive Check Point events from a Nokia Firewall to
respond to an online status request.
Configuring DSMs
536 NOKIA FIREWALL
Procedure
Step 1 Using SSH, log in to JSA as the root user.
Login: root
Password: <password>
Step 2 Type the following command to edit the IPtables file:
vi /opt/qradar/conf/iptables.pre
The IPtables configuration file is displayed.
Step 3 Type the following command to instruct JSA to respond to your Nokia Firewall with
a TCP reset on port 256:
-A INPUT -s <IP address> -p tcp --dport 256 -j REJECT
--reject-with tcp-reset
Where <IP address> is the IP address of your Nokia Firewall. You must include a
TCP reset for each Nokia Firewall IP address that sends events to your JSA
console or Event Collector. For example,
-A INPUT -s 10.10.100.10/32 -p tcp --dport 256 -j REJECT
--reject-with tcp-reset
-A INPUT -s 10.10.110.11/32 -p tcp --dport 256 -j REJECT
--reject-with tcp-reset
-A INPUT -s 10.10.120.12/32 -p tcp --dport 256 -j REJECT
--reject-with tcp-reset
Step 4 Save your IPtables configuration.
Step 5 Type the following command to update IPtables in JSA:
./opt/qradar/bin/iptables_update.pl
Step 6 Repeat Step 1 to Step 5 to configure any additional Event Collectors in your
deployment that receive syslog events from a Nokia Firewall.
You are now ready to configure your Nokia Firewall to forward events to JSA.
Configuring Syslog To configure your Nokia Firewall to forward syslog events to JSA:
Procedure
Step 1 Log in to the Nokia Voyager.
Step 2 Click Config.
Step 3 In the System Configuration pane, click System Logging.
Step 4 In the Add new remote IP address to log to field, type the IP address of your
JSA console or Event Collector.
Step 5 Click Apply.
Step 6 Click Save.
You are now ready to configure which events are logged by your Nokia Firewall to
the logger.
Configuring DSMs
Integrating with a Nokia Firewall Using Syslog 537
Configure the To configure which events are logged by your Nokia Firewall and forwarded to
Logged Events JSA, you must configure a custom script for your Nokia Firewall.
Custom Script
Procedure
Step 1 Using SSH, log in to Nokia Firewall as an administrative user.
If you cannot connect to your Nokia Firewall, SSH may be disabled. You must
enable the command-line using the Nokia Voyager web interface or connect
directly using a serial connection. For more information, see your Nokia Voyager
documentation.
Step 2 Type the following command to edit your Nokia Firewall rc.local file:
vi /var/etc/rc.local
Step 3 Add the following command to your rc.local file:
$FWDIR/bin/fw log -ftn | /bin/logger -p local1.info &
Step 4 Save the changes to your rc.local file.
The terminal is displayed.
Step 5 To begin logging immediately, type the following command:
nohup $FWDIR/bin/fw log -ftn | /bin/logger -p local1.info &
You are now ready to configure the log source in JSA.
Configure a Log Events forwarded by your Nokia Firewall are automatically discovered by the
Source Check Point Firewall-1 DSM. The automatic discovery process creates a log
source for syslog events from Nokia Firewall appliances. The following steps are
optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Check Point Firewall-1.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for events from your Nokia Firewall appliance.
Configuring DSMs
538 NOKIA FIREWALL
Integrating With a JSA can accept Check Point FireWall-1 events from Nokia Firewalls using the
Nokia Firewall Check Point FireWall-1 DSM configured using the OPSEC/LEA protocol. Before
Using OPSEC you configure JSA to integrate with a Nokia Firewall device, you must:
1 Configure Nokia Firewall using OPSEC, see Configuring a Nokia Firewall for
OPSEC.
2 Configure a log source in JSA for your Nokia Firewall using the OPSEC LEA
protocol, see Configuring an OPSEC Log Source.
Configuring an OPSEC/LEA log sources do not automatically discover in JSA, you must create an
OPSEC Log Source OPSEC log source to collect events.
Configuring DSMs
Integrating With a Nokia Firewall Using OPSEC 539
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Check Point FireWall-1.
Step 9 Using the Protocol Configuration list box, select OPSEC/LEA.
Step 10 Configure the following values:
Parameter Description
Log Source Type an IP address, hostname, or name to identify the event
Identifier source. IP addresses or host names are recommended as they
allow JSA to identify a log file to a unique event source.
Server IP Type the IP address of the server.
Server Port Type the port used for OPSEC communication. The valid range
is 0 to 65,536 and the default is 18184.
Use Server IP for Select this check box if you want to use the LEA server’s IP
Log Source address instead of the managed device’s IP address for a log
source. By default, the check box is selected.
Statistics Report Type the interval, in seconds, during which the number of syslog
Interval events are recorded in the qradar.log file.
The valid range is 4 to 2,147,483,648 and the default is 600.
Configuring DSMs
540 NOKIA FIREWALL
Parameter Description
Authentication From the list box, select the authentication type you want to use
Type for this LEA configuration. The options are sslca (default),
sslca_clear, or clear. This value must match the authentication
method used by the server. The following parameters appear if
sslca or sslca_clear is selected as the authentication type.
• OPSEC Application Object SIC Attribute (SIC Name) -
Type the Secure Internal Communications (SIC) name of the
OPSEC Application Object. The SIC name is the
distinguished name (DN) of the application, for example:
CN=LEA, o=fwconsole..7psasx. The name can be up
to 255 characters in length and is case sensitive.
• Log Source SIC Attribute (Entity SIC Name) - Type the SIC
name of the server, for example:
cn=cp_mgmt,o=fwconsole..7psasx. The name can be
up to 255 characters in length and is case sensitive.
• Specify Certificate - Select this check box if you want to
define a certificate for this LEA configuration. JSA attempts to
retrieve the certificate using these parameters when the
certificate is required.
If you select the Specify Certificate check box, the Certificate
Filename parameter is displayed:
• Certificate Filename - This option only appears if Specify
Certificate is selected. Type the directory path of the
certificate you want to use for this configuration.
If you clear the Specify Certificate check box, the following
parameters appear:
• Certificate Authority IP - Type the IP address of the
SmartCenter server from which you want to pull your
certificate.
• Pull Certificate Password - Type the password you want to
use when requesting a certificate. The password can be up to
255 characters in length.
• OPSEC Application - Type the name of the application you
want to use when requesting a certificate. This value can be
up to 255 characters in length.
Configuring DSMs
75 NOMINUM VANTIO
The Nominum Vantio DSM for Juniper Secure Analytics (JSA) accepts syslog
events in Log Extended Event Format (LEEF) forwarded from Nominum Vantio
engines installed with the Nominum Vantio LEEF Adapter.
The Vantio LEEF Adapter creates LEEF messages based on Lightweight View
Policy (LVP) matches. In order to generate LVP matches for the Vantio LEEF
Adapter to process, you most configure Lightweight Views and the lvp-monitor for
the Vantio engine. LVP is an optionally licensed component of the Nominum Vantio
product. For more information about configuring LVP, please see the Vantio
Administrator’s Manual.
Before you can integrate Nominum Vantio events with JSA, you must install and
configure the Vantio LEEF adapter. To obtain the Vantio LEEF adapter or request
additional information, you can email Nominum at the following address:
[email protected].
Configure the Vantio To install and configure your Vantio LEEF Adapter:
LEEF Adapter
Step 1 Using SSH, log in to your Vantio engine server.
Step 2 Install the Vantio LEEF Adapter:
sudo rpm -I VantioLEEFAdapter-0.1-a.x86_64.rpm
Step 3 Edit the Vantio LEEF Adapter configuration file.
usr/local/nom/sbin/VantioLEEFAdapter
Step 4 Configure the Vantio LEEF Adapter configuration to forward LEEF events to JSA:
-qradar-dest-addr=<IP Address>
Where <IP Address> is the IP address of your JSA console or Event Collector.
Step 5 Save the Vantio LEEF configuration file.
Configuring DSMs
542 NOMINUM VANTIO
Configure a Log JSA automatically discovers and creates a log source for syslog events from the
Source Vantio LEEF Adapter. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from Nominum Vantio.
Configuring DSMs
76 NORTEL NETWORKS
Nortel The Nortel Multiprotocol Router DSM for Juniper Secure Analytics (JSA) records
Multiprotocol all relevant Nortel Multiprotocol Router events using syslog.
Router
Before you configure JSA to integrate with a Nortel Multiprotocol Router device,
you must:
Configuring DSMs
544 NORTEL NETWORKS
Configuring DSMs
Nortel Multiprotocol Router 545
event-upper-bound 255
fault-map critical
info-map info
name WILDCARD
severity-mask {fault warning info trace debug}
slot-lower-bound 0
slot-upper-bound 1
state enabled
trace-map debug
warning-map warning
Step 13 View the currently configured settings for the syslog filters:
show syslog filters
When the syslog and filter parameters are correctly configured, the Operational
State indicates up.
For example:
syslog# show syslog filters
show syslog filters Sep 15, 2008 18:21:25 [GMT+8]
Configuring DSMs
546 NORTEL NETWORKS
From the Log Source Type list box, select the Nortel Multiprotocol Router
option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about your device, see your vendor documentation.
Nortel Application Nortel Application Switches integrate routing and switching by forwarding traffic at
Switch layer 2 speed using layer 4-7 information.
The Nortel Application Switch DSM for JSA accepts events using syslog. JSA
records all relevant status and network condition events. Before configuring a
Nortel Application Switch device in JSA, you must configure your device to send
syslog events to JSA.
From the Log Source Type list box, select the Nortel Application Switch
option.
Configuring DSMs
Nortel Contivity 547
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about the Nortel Application Switch, see your vendor
documentation.
Nortel Contivity A JSA Nortel Contivity DSM records all relevant Nortel Contivity events using
syslog.
Before you configure JSA to integrate with a Nortel Contivity device, you must:
Step 1 Log in to the Nortel Contivity command-line interface (CLI).
Step 2 Type the following command:
enable <password>
Where <password> is the Nortel Contivity device administrative password.
Step 3 Type the following command:
config t
Step 4 Configure the logging information:
logging <IP address> facility-filter all level all
Where <IP address> is the IP address of the JSA.
Step 5 Type the following command to exit the command-line:
exit
Step 6 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Nortel Contivity VPN Switch
option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about your Nortel Contivity device, see your vendor
documentation.
Nortel Ethernet A JSA Nortel Ethernet Routing Switch (ERS) 2500/4500/5500 DSM records all
Routing Switch relevant routing switch events using syslog.
2500/4500/5500
Before configuring a Nortel ERS 2500/4500/5500 device in JSA, you must
configure your device to send syslog events to JSA.
Configuring DSMs
548 NORTEL NETWORKS
Step 3 Type informational as the severity level for the logs you wish to send to the
remote server:
logging remote level {critical|informational|serious|none}
Where informational sends all logs to the syslog server.
Step 4 Enable the host:
host enable
Step 5 Type the remote logging address:
logging remote address <IP address>
Where <IP address> is the IP address of the JSA system.
Step 6 Ensure that remote logging is enabled:
logging remote enable
Step 7 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Nortel Ethernet Routing
Switch 2500/4500/5500 option.
For more information on configuring log sources, see the Log Sources Users
Guide.
Nortel Ethernet A JSA Nortel Ethernet Routing Switch (ERS) 8300/8600 DSM records all relevant
Routing Switch events using syslog.
8300/8600
Before configuring a Nortel ERS 8600 device in JSA, you must configure your
device to send syslog events to JSA.
Configuring DSMs
Nortel Ethernet Routing Switch 8300/8600 549
From the Log Source Type list box, you must select the Nortel Ethernet
Routing Switch 8300/8600 option.
For more information on configuring log sources, see the Log Sources Users
Guide.
Configuring DSMs
550 NORTEL NETWORKS
Nortel Secure A JSA Nortel Secure Router DSM records all relevant router events using syslog.
Router
Before configuring a Nortel Secure Router device in JSA, you must configure your
device to send syslog events to JSA.
Configuring DSMs
Nortel Secure Network Access Switch 551
ipmux: warning
bundle: warning
qos: warning
hdlc: warning
local7: warning
vpn: warning
firewall: warning
Step 7 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Nortel Secure Router option.
For more information on configuring log sources, see the Log Sources Users
Guide.
Nortel Secure A JSA Nortel Secure Network Access Switch (SNAS) DSM records all relevant
Network Access switch events using syslog.
Switch
Before configuring a Nortel SNAS device in JSA, you must:
Step 1 Log in to the Nortel SNAS user interface.
Step 2 Select the Config tab.
Step 3 Select Secure Access Domain and Syslog from the Navigation pane.
The Secure Access Domain window is displayed.
Step 4 From the Secure Access Domain list, select the secure access domain. Click
Refresh.
Step 5 Click Add.
The Add New Remote Server window is displayed.
Step 6 Click Update.
The server is displayed in the secure access domain table.
Step 7 Using the toolbar, click Apply to send the current changes to the Nortel SNAS.
Configuring DSMs
552 NORTEL NETWORKS
Step 8 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Nortel Secure Network
Access Switch (SNAS) option.
For more information on configuring log sources, see the Log Sources Users
Guide.
Nortel Switched A JSA Nortel Switched Firewall 5100 DSM records all relevant firewall events
Firewall 5100 using either syslog or OPSEC.
Before configuring a Nortel Switched Firewall device in JSA, you must configure
your device to send events to JSA.
Integrate Nortel This method ensures the JSA Nortel Switched Firewall 5100 DSM accepts events
Switched Firewall using syslog.
Using syslog
To configure your Nortel Switched Firewall 5100:
Step 1 Log into your Nortel Switched Firewall device command-line interface (CLI).
Step 2 Type the following command:
/cfg/sys/log/syslog/add
Step 3 Type the IP address of your JSA system at the following prompt:
Enter IP address of syslog server:
A prompt is displayed to configure the severity level.
Step 4 Configure info as the desired severity level. For example:
Enter minimum logging severity
(emerg | alert | crit | err | warning | notice | info | debug):
info
A prompt is displayed to configure the facility.
Step 5 Configure auto as the local facility. For example:
Enter the local facility (auto | local0-local7): auto
Configuring DSMs
Nortel Switched Firewall 5100 553
To configure JSA to receive events from a Nortel Switched Firewall 5100 device
using syslog:
From the Log Source Type list box, select the Nortel Switched Firewall
5100 option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information, see http://www.nortel.com/support.
Integrate Nortel This method ensures the JSA Nortel Switched Firewall 5100 DSM accepts Check
Switched Firewall Point FireWall-1 events using OPSEC.
Using OPSEC
NOTE
Note: Depending on your Operating System, the procedures for the Check Point
SmartCenter Server can vary. The following procedures are based on the Check
Point SecurePlatform Operating system.
Configuring DSMs
554 NORTEL NETWORKS
Step 7 From the Host drop-down menu, select the host object you have created in Step 1.
Step 8 From Application Properties, select User Defined as the vendor.
Step 9 From Client Entries, select LEA.
Step 10 Click Communication.
Step 11 Choose a password in the provide field. This password is necessary when pulling
the certificate to the Firewall Director.
Step 12 Click OK and then click Close.
Step 13 To install the Security Policy on your firewall, select Policy > Install > OK.
Nortel Switched A JSA Nortel Switched Firewall 6000 DSM records all relevant firewall events
Firewall 6000 using either syslog or OPSEC.
Before configuring a Nortel Switched Firewall device in JSA, you must configure
your device to send events to JSA.
Configure syslog for This method ensures the JSA Nortel Switched Firewall 6000 DSM accepts events
Nortel Switched using syslog.
Firewalls
To configure your Nortel Switched Firewall 6000:
Step 1 Log into your Nortel Switched Firewall device command-line interface (CLI).
Step 2 Type the following command:
/cfg/sys/log/syslog/add
Step 3 Type the IP address of your JSA system at the following prompt:
Enter IP address of syslog server:
A prompt is displayed to configure the severity level.
Configuring DSMs
Nortel Switched Firewall 6000 555
To configure JSA to receive events from an Nortel Switched Firewall 6000 using
syslog:
From the Log Source Type list box, select the Nortel Switched Firewall
6000 option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information, see http://www.nortel.com/support.
Configure OPSEC for This method ensures the JSA Nortel Switched Firewall 6000 DSM accepts Check
Nortel Switched Point FireWall-1 events using OPSEC.
Firewalls
NOTE
Note: Depending on your Operating System, the procedures for the Check Point
SmartCenter Server can vary. The following procedures are based on the Check
Point SecurePlatform Operating system.
Configuring DSMs
556 NORTEL NETWORKS
Nortel Threat A JSA Nortel Threat Protection System (TPS) DSM records all relevant threat and
Protection System system events using syslog.
Configuring DSMs
Nortel VPN Gateway 557
Step 5 Under Syslog Configuration, select on next to State to enable syslog alerting.
Step 6 From the list boxes, select the facility and priority levels.
Step 7 Optional. In the Logging Host field, type the IP address of your JSA system. This
configures your JSA system to be your logging host. Separate multiple hosts with
commas.
Step 8 Click Save.
The syslog alerting configuration is saved.
Step 9 Apply the policy to your appropriate detection engines.
Step 10 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Nortel Threat Protection
System (TPS) Intrusion Sensor option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about Nortel TPS, see http://www.nortel.com/support.
Nortel VPN The JSA Nortel VPN Gateway DSM accetps events using syslog.
Gateway
JSA records all relevant operating system (OS), system control, traffic processing,
startup, configuration reload, AAA, and IPsec events. Before configuring a Nortel
VPN Gateway device in JSA, you must configure your device to send syslog
events to JSA.
Configuring DSMs
Nortel VPN Gateway 558
Step 6 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Nortel VPN Gateway option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about the Nortel VPN Gateway, see
http://www.nortel.com/support.
Configuring DSMs
77 NOVELL EDIRECTORY
The Novell eDirectory DSM for Juniper Secure Analytics (JSA) accepts audit
events from Novell eDirectory using syslog.
Before You Begin To use the Novell eDirectory DSM, you must have the following components
installed:
Configure XDASv2 to By default, XDASv2 is configured to log events to a file. To forward events from
Forward Events XDASv2 to JSA, you must edit the xdasconfig.properties and configure the file for
syslog forwarding.
Audit events must be forwarded by syslog to JSA, instead of being logged to a file.
Configuring DSMs
560 NOVELL EDIRECTORY
Step 5 To configure the IP address for the syslog destination, remove the comment
marker (#) and edit the following lines:
log4j.appender.S.Host=<IP address>
log4j.appender.S.Port=<Port>
Where,
<IP address> is the IP address or hostname of JSA.
<Port> is the port number for the UDP or TCP protocol. The default port for syslog
communication is port 514 for JSA or Event Collectors.
Step 6 To configure the syslog protocol, remove the comment marker (#) and type the
protocol (UDP, TCP, or SSL) use in the following line:
log4j.appender.S.Protocol=TCP
The encrypted protocol SSL is not supported by JSA.
Step 7 To set the severity level for logging events, remove the comment marker (#) from
the following line:
log4j.appender.S.Threshold=INFO
The default value of INFO is the correct severity level for events.
Step 8 To set the facility for logging events, remove the comment marker (#) from the
following line:
log4j.appender.S.Facility=USER
The default value of USER is the correct facility value for events.
Step 9 To set the facility for logging events, remove the comment marker (#) from the
following line:
log4j.appender.R.MaxBackupIndex=10
Step 10 Save the xdas.properties file.
After you configure the syslog properties for XDASv2 events, you are ready to load
the XDASv2 module.
Load the XDASv2 Before you can configure events in Novell iManager, you must load the changes
Module you made to the XDASv2 module.
Configuring DSMs
561
NOTE
Note: If your Novell eDirectory has Novell Module Authentication Service (NMAS)
installed with NMAS auditing enabled, the changes made to XDASv2 modules are
loaded automatically. If you have NMAS installed, you should configure event
auditing. For information on configuring event auditing, see Configure Event
Auditing Using Novell iManager.
Configuring DSMs
562 NOVELL EDIRECTORY
Configuring DSMs
563
c Click Apply.
You are now ready to configure JSA.
Configure a Log JSA automatically detects syslog events from Novell eDirectory. This configuration
Source step is optional.
From the Log Source Type list box, select Novell eDirectory.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about Novell eDirectory, Novell iManager, or XDASv2,
see your vendor documentation.
Configuring DSMs
78 OBSERVEIT
The ObserveIT DSM for Juniper Secure Analytics (JSA) can collect Log Enhanced
Event Format (LEEF) events from ObserveIT using the log file protocol.
About ObserveIT ObserveIT provides administrators and security professionals the ability to capture
and replay video recordings of user interactions with network systems, software, or
operating systems.
To integrate ObserveIT with JSA, you must download and install an interface
package from the ObserveIT website. The interface package contains the tools
required to monitor the ObserveIT database and write the events to a file in LEEF
format. As ObserveIT generates and writes events to a log file, JSA can poll for the
event file and retrieve your ObserveIT event data. JSA remembers the state of the
event file to ensure that duplicate events are not imported the next time JSA read
your event file.
Configuring The following process outlines the steps required to integrate ObserveIT events
ObserveIT with JSA.
1 Configure the ObserveIT interface package for JSA on your ObserveIT appliance.
2 Configure a log source to use the log file protocol and download the ObserveIT
event log to JSA.
Configuring DSMs
566 OBSERVEIT
Configuring the To collect ObserveIT events in JSA, you must download and configure the
ObserveIT Interface ObserveIT interface package.
Package
Procedure
Step 1 Email ObserveIT customer support at [email protected] to receive the
ObserveIT interface package for JSA.
Monitor_Log_QRadar.zip
Step 2 Copy the ObserveIT interface package to the web server hosting ObserveIT.
Step 3 Extract the interface package to a directory.
Step 4 From the interface package directory, edit the following file:
Data_Query_v5.bat
Step 5 In the Data_Query_v5.bat file, edit the osql connection information with the
location of the ObserveIT database.
Step 6 From the interface package directory, run the Monitor_Log.pl file.
You must be an administrator or have access to write permissions to the following
folder: C:\Program Files (x86)\ObserveIT\NotificationService\LogFiles\qradar\.
Step 7 Verify that ObserveIT events are written to the following folder:
C:\Program Files (x86)\ObserveIT\NotificationService\LogFiles\qradar\
Step 8 Optional. Add Monitor_Log.pl to the Windows Job Scheduler to ensure the script
starts automatically when the host is powered on.
Next Steps
You are now ready to configure a log source for ObserveIT in JSA.
Configuring a To integrate ObserveIT events, you must manually create a log source in JSA.
Venusense Log
Source Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for the log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select ObserveIT.
Step 9 From the Protocol Configuration list box, select Log File.
Configuring DSMs
567
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source. IP addresses or host names allow JSA to identify a
log file to a unique event source.
Service Type From the list box, select the protocol you want to use to
retrieve log files from a remote server. The default is SFTP.
• SFTP - SSH File Transfer Protocol
• FTP - File Transfer Protocol
• SCP - Secure Copy
Note: The underlying protocol used to retrieve log files for the
SCP and SFTP service type requires that the server specified
in the Remote IP or Hostname field has the SFTP subsystem
enabled.
Remote IP or Type the IP address or host name of the ObserveIT web
Hostname server that contains your event log files.
Remote Port Type the port number for the protocol selected to retrieve the
event logs from your ObserveIT web server. The valid range
is 1 to 65535.
The options include:
• FTP - TCP Port 21
• SFTP - TCP Port 22
• SCP - TCP Port 22
Note: If the host for your event files is using a non-standard
port number for FTP, SFTP, or SCP, adjust the port value
accordingly.
Remote User Type the user name required to log in to the ObserveIT web
server that contains your audit event logs.
The username can be up to 255 characters in length.
Remote Password Type the password to log in to your ObserveIT web server.
Confirm Password Confirm the password to log in to your ObserveIT web server
SSH Key File If you select SCP or SFTP as the Service Type, use this
parameter to define an SSH private key file. When you
provide an SSH Key File, the Remote Password field is
ignored.
Configuring DSMs
568 OBSERVEIT
Parameter Description
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive parameter is ignored if you configure SCP as
the Service Type.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All files that match the regular expression are
retrieved and processed.
The FTP file pattern must match the name you assigned to
your ObserveIT event log. For example, to collect files that
start with ObserveIT_ and end with a timestamp, type the
following value:
ObserveIT_*
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only displays if you select FTP as the Service
Type. From the list box, select ASCII.
ASCII is required for text event logs retrieved by the log file
protocol using FTP.
SCP Remote File If you select SCP as the Service Type, type the file name of
the remote file.
Start Time Type a time value to represent the time of day you want the
log file protocol to start. Type the start time, based on a 24
hour clock, in the following format: HH:MM.
For example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence parameter
value to establish when and how often the Remote Directory
on your ObserveIT web server is scanned for new event log
files.
Configuring DSMs
569
Parameter Description
Recurrence Type the frequency that you want to scan the remote directory
on your ObserveIT web server for new event log files. Type
this value in hours (H), minutes (M), or days (D).
For example, type 2H to scan the remote directory every 2
hours from the start time. The default is 1H and the minimum
value is 15M.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the save action completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor From the list box, select NONE.
Processors allow event file archives to be expanded and
contents processed for events. Files are only processed after
they are downloaded. JSA can process files in zip, gzip, tar, or
tar+gzip archive format.
Ignore Previously Select this check box to track and ignore files that are already
Processed File(s) processed.
JSA examines the log files in the remote directory to
determine if a file is already processed by the log file protocol.
If a previously processed file is detected, the log file protocol
does not download the file. Only new or unprocessed event
log files are downloaded by JSA.
This option only applies to FTP and SFTP service types.
Change Local Select this check box to define a local directory on JSA to
Directory? store event log files during processing.
We recommend that you leave this check box clear. When
this check box is selected, the Local Directory field is
displayed, which allows you to configure the local directory on
JSA to store event log files. After the event log is processed
and the events added to JSA, the local directory deletes the
event log files to retain disk space.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. Each line of the file is a single event. For
example, if a file has 10 lines of text, 10 separate events are
created.
Configuring DSMs
570
Configuring DSMs
79 OPENBSD
The OpenBSD DSM for Juniper Secure Analytics (JSA) accepts events using
syslog.
Supported Event JSA records all relevant informational, authentication, and system level events
Types forwarded from OpenBSD operating systems.
Configure a Log To integrate OpenBSD events with JSA, you must manually create a log source.
Source JSA does not automatically discover or create log sources for syslog events from
OpenBSD operating systems.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your OpenBSD appliance.
Configuring DSMs
572 OPENBSD
NOTE
Note: The command above uses the backquote character ( ‘ ), which is located to
the left of the number one on most keyboard layouts.
Configuring DSMs
80 OPEN LDAP
The Open LDAP DSM for Juniper Secure Analytics (JSA) accepts multiline UDP
syslog events from Open LDAP installations configured to log stats events using
logging level 256.
Before You Begin Open LDAP events are forwarded to JSA using port 514, but must be redirected to
the port configured in the UDP Multiline protocol. This redirect using iptables is
required because JSA does not support multiline UDP syslog on the standard
listen port.
NOTE
Note: UDP multiline syslog events can be assigned to any port other than port
514. The default port assigned to the UDP Multiline protocol is UDP port 517. If
port 517 is used in your network, see the Juniper Secure Analytics Common Ports
Technical Note for a list of ports used by JSA.
Configure a Log JSA does not automatically discover Open LDAP events forwarded in UDP
Source multiline format. To complete the integration, you must manually create a log
source for the UDP Multiline Syslog protocol using the Admin tab in JSA. Creating
the log source allows JSA to establish a listen port for incoming Open LDAP
multiline events.
Configuring DSMs
574 OPEN LDAP
Step 8 From the Log Source Type list box, select Open LDAP Software.
Step 9 From the Protocol Configuration list box, select UDP Multiline Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Open LDAP server.
Listen Port Type the port number used by JSA to accept incoming UDP
Multiline Syslog events. The valid port range is 1 to 65536.
The default UDP Multiline Syslog listen port is 517.
Note: If you do not see the Listen Port field, you must restart
Tomcat on JSA. For more information on installing a protocol
manually, see the Log Sources Users Guide.
To edit the Listen Port number:
1 Update IPtables on your JSA console or Event Collector
with the new UDP Multiline Syslog port number. For more
information, see Configure IPtables for Multiline UDP
Syslog Events.
2 In the Listen Port field, type the new port number for
receiving UDP Multiline Syslog events.
3 Click Save.
4 On the Admin tab, select Advanced > Deploy Full
Configuration.
Note: When you click Deploy Full Configuration, JSA
restarts all services, resulting in a gap in data collection for
events and flows until the deployment completes.
Message ID Pattern Type the regular expression (regex) required to filter the
event payload messages. All matching events are included
when processing Open LDAP events.
The following regular expression is recommended for Open
LDAP events:
conn=(\d+)
For example, Open LDAP starts connection messages with
the word conn, followed by the rest of the event payload. Use
of this parameter requires knowledge of regular expressions
(regex). For more information, see the following website:
http://download.oracle.com/javase/tutorial/essential/regex/
Configuring DSMs
575
Configure IPtables Open LDAP requires that you redirect events from your Open LDAP servers from
for Multiline UDP port 514 to another JSA port for the UDP multiline protocol. You must configure
Syslog Events IPtables on your JSA console or for each Event Collectors that receives multiline
UDP syslog events from an Open LDAP server.
Configuring DSMs
576 OPEN LDAP
Where:
<IP address> is the IP address of your Open LDAP server.
<New port> is the port number configured in the UDP Multiline protocol for Open
LDAP.
You must include a redirect for each Open LDAP IP address that sends events to
your JSA console or Event Collector. For example, if you had three Open LDAP
servers communicating to an Event Collect, you would type the following:
-I QChain 1 -m udp -p udp --src 10.10.10.10 --dport 517 -j
ACCEPT
-I QChain 1 -m udp -p udp --src 10.10.10.11 --dport 517 -j
ACCEPT
-I QChain 1 -m udp -p udp --src 10.10.10.12 --dport 517 -j
ACCEPT
Step 7 Type the following command to update IPtables in JSA:
./opt/qradar/bin/iptables_update.pl
Step 8 Repeat Step 1 toStep 7 to configure any additional JSA consoles or Event
Collectors in your deployment that receive syslog events from an Open LDAP
server.
You are now ready to configure your Open LDAP server to forward events to JSA.
NOTE
Note: If your Open LDAP server stores event messages in a directory other than
/var/log/messages, you must edit the directory path accordingly.
Configuring DSMs
577
Configuring DSMs
578 OPEN LDAP
Configuring DSMs
81 OPEN SOURCE SNORT
The Open Source SNORT DSM for Juniper Secure Analytics (JSA) records all
relevant SNORT events using syslog.
Supported Event The SourceFire VRT certified rules for registered SNORT users are supported.
Types Rule sets for Bleeding Edge, Emerging Threat, and other vendor rule sets might
not be fully supported by the Open Source SNORT DSM.
Before You Begin The below procedure applies to a system operating Red Hat Enterprise. The
procedures below can vary for other operating systems.
Configuring DSMs
580 OPEN SOURCE SNORT
Configure a Log JSA automatically discovers and creates log sources for Open Source SNORT
Source syslog events. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for your Open Source SNORT events.
Configuring DSMs
82 ORACLE
Oracle Audit Oracle databases track auditing events, such as, user login and logouts,
Records permission changes, table creation, and deletion and database inserts.
Juniper Secure Analytics (JSA) can collect these events for correlation and
reporting purposes through the use of the Oracle Audit DSM. For more
information, see your Oracle documentation.
NOTE
Note: Oracle provides two modes of audit logs. JSA does not support fine grained
auditing.
Before You Begin Oracle RDBMS is supported on Linux only when using syslog. Microsoft Windows
hosts and Linux are supported when using JDBC to view database audit tables.
When using a Microsoft Windows host, verify database audit tables are enabled.
These procedures should be considered guidelines only. We recommend that you
have experience with Oracle DBA before performing the procedures in this
document. For more information, see your vendor documentation.
Before JSA can collect Oracle Audit events from an Oracle RDBMS instance, that
instance must be configured to write audit records to either syslog or the database
audit tables. For complete details and instructions for configuring auditing, see
your vendor documentation.
Configuring DSMs
582 ORACLE
NOTE
Note: Not all versions of Oracle can send audit events using syslog. Oracle v9i
and 10g Release 1 can only send audit events to the database. Oracle v10g
Release 2 and Oracle v11g can write audit events to the database or to syslog. If
you are using v10g Release 1 or v9i, you must use JDBC-based events. If you are
using Oracle v10g Release 2, you can use syslog or JDBC-based events.
To configure an Oracle Audit device to write audit logs to JSA, see Configure
Oracle Audit Logs. If your system includes a large Oracle audit table (greater than
1 GB), see Improve Performance with Large Audit Tables.
Configuring DSMs
Oracle Audit Records 583
If you are using the JDBC protocol, see the Log Sources Users Guide for more
information on configuring the JDBC protocol. When configuring the JDBC protocol
within JSA, use the following specific parameters:
Table 82-1 Configuring Log Source Parameters
NOTE
Note: Make sure that database user that JSA uses to query events from the audit
log table has the appropriate permissions for the Table Name object.
Step 8 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Oracle RDBMS Audit Record
option.
For more information on configuring log sources, see the Log Sources Users
Guide.
Improve Performance The size of the Oracle audit table affects the amount of time that JSA requires to
with Large Audit process the DBA_AUDIT_TRAIL view. If your sys.sud$ table is large (close or
Tables exceeding 1 GB), extended processing time is required. To ensure JSA processes
the large sys.sud$ table quickly, you must create an index and a new view.
Configuring DSMs
584 ORACLE
NOTE
Note: If auditing is extensive or the database server is very active, you might need
to shut down the database to perform the below procedure.
Configuring DSMs
Oracle DB Listener 585
Oracle DB Listener The Oracle Database Listener application stores logs on the database server.
To integrate JSA with Oracle DB Listener, select one of the following methods for
event collection:
Collect Events Using The Oracle Database Listener protocol source allows JSA to monitor log files
the Oracle Database generated from an Oracle Listener database. Before you configure the Oracle
Listener Protocol Database Listener protocol to monitor log files for processing, you must obtain the
directory path to the Oracle Listener database log files.
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source.
Server Address Type the IP address of the Oracle Database Listener.
Domain Type the domain required to access the Oracle Database
Listener. This parameter is optional.
Username Type the username required to access the host running the
Oracle Database Listener.
Password Type the password required to access the host running the
Oracle Database Listener.
Confirm Password Confirm the password required to access the Oracle
Database Listener.
Log Folder Path Type the directory path to access the Oracle Database
Listener log files.
Configuring DSMs
586 ORACLE
Parameter Description
File Pattern Type the regular expression (regex) required to filter the
filenames. All matching files are included in the processing.
The default is listener\.log
This parameter does not accept wildcard or globbing
patterns in the regular expression. For example, if you want
to list all files starting with the word log, followed by one or
more digits and ending with tar.gz, use the following entry:
log[0-9]+\.tar\.gz. Use of this parameter requires knowledge
of regular expressions (regex). For more information, see the
following website:
http://download.oracle.com/javase/tutorial/essential/regex/
Force File Read Select this check box to force the protocol to read the log file
when the timing of the polling interval specifies.
When the check box is selected, the log file source is always
examined when the polling interval specifies, regardless of
the last modified time or file size attribute.
When the check box is not selected, the log file source is
examined at the polling interval if the last modified time or file
size attributes have changed.
Recursive Select this check box if you want the file pattern to also
search sub folders. By default, the check box is selected.
Polling Interval (in Type the polling interval, which is the number of seconds
seconds) between queries to the log files to check for new data. The
minimum polling interval is 10 seconds, with a maximum
polling interval of 3,600 seconds. The default is 10 seconds.
Throttle Events/Sec Type the maximum number of events the Oracle Database
Listener protocol forwards per second. The minimum value is
100 EPS and the maximum is 20,000 EPS. The default is
100 EPS.
The configuration of the Oracle Database Listener protocol is complete. For more
information, see the Log Sources Users Guide.
Collect Oracle The Oracle Database Listener application stores logs on the database server. To
Database Events forward these logs from the Oracle server to JSA, you must configure a Perl script
Using Perl on the Oracle server. The Perl script monitors the listener log file, combines any
multi-line log entries into a single log entry, and sends the logs, using syslog
(UDP), to JSA.
Before being sent to JSA, the logs are processed and re-formatted to ensure the
logs are not forwarded line-by-line, as is found in the log file. All of the relevant
information is retained.
Configuring DSMs
Oracle DB Listener 587
NOTE
Note: Perl scripts written for Oracle DB listener work on Linux/UNIX servers only.
Windows Perl script is not supported.
NOTE
Note: Perl 5.8 must be installed on the device that hosts the Oracle server.
Step 6 Log in to the Oracle server using an account that has read/write permissions for
the listener.log file and the /var/run directory.
Step 7 Type the following command and include any additional command parameters to
start the Oracle DB Listener script:
oracle_dblistener_fwdr.pl -h <IP address> -t “tail -F
listener.log”
Where <IP address> is the IP address of your JSA console or Event Collector.
Table 82-3 Command Parameters
Parameters Description
-D The -D parameter defines that the script is to run in the foreground.
Default is to run as a daemon and log all internal messages to the local
syslog service.
-t The -t parameter defines that the command-line is used to tail the log
file (monitors any new output from the listener). The log file might be
different across versions of the Oracle database; some examples are
provided below:
Oracle 9i:
<install_directory>/product/9.2/network/log
/listener.log
Oracle 10g:
<install_directory>/product/10.2.0/db_1/network/log
/listener.log
Oracle 11g:
<install_directory>/diag/tnslsnr/qaoracle11/listener
/trace/listener.log
Configuring DSMs
588 ORACLE
Parameters Description
-f The -f parameter defines the syslog facility.priority to be included at the
beginning of the log.
If nothing is specified, user.info is used.
-H The -H parameter defines the host name or IP address for the syslog
header. It is recommended that this be the IP address of the Oracle
server on which the script is running.
-h The -h parameter defines the receiving syslog host (the Event Collector
host name or IP address being used to receive the logs).
-p The -p parameter defines the receiving UDP syslog port.
If a port is not specified, 514 is used.
-r The -r parameter defines the directory name where you wish to create
the .pid file. The default is /var/run. This parameter is ignored if -D is
specified.
-l The -I parameter defines the directory name where you wish to create
the lock file. The default is /var/lock. This parameter is ignored if -D is
specified.
For example, to monitor the listener log on an Oracle 9i server with an IP address
of 182.168.12.44 and forward events to JSA with the IP address of 192.168.1.100,
type the following:
oracle_dblistener_fwdr.pl –t “tail –f
<install_directory>/product/9.2/network/log/listener.log”
–f user.info –H 192.168.12.44 –h 192.168.1.100 –p 514
NOTE
Note: The kill command can be used to terminate the script if you need to
reconfigure a script parameter or stop the script from sending events to JSA. For
example, kill -QUIT ‘cat /var/run/oracle_dblistener_fwdr.pl.pid‘.
The example command uses the backquote character (‘), which is located to the
left of the number one on most keyboard layouts.
You are now ready to configure the Oracle Database Listener within JSA.
Step 1 From the Log Source Type list box, select Oracle Database Listener.
Step 2 From the Protocol Configuration list box, select syslog.
Step 3 In the Log Source Identifier field, type the IP address of the Oracle Database you
specified using the -H option in Step 7.
The configuration of the Oracle Database Listener protocol is complete. For more
information on Oracle Database Listener, see your vendor documentation.
Configuring DSMs
Oracle Audit Vault 589
Oracle Audit Vault The Oracle Audit Vault DSM for JSA accepts events on Oracle v10.2.3.2 and
above using Java Database Connectivity (JDBC) to accesses alerts on the JDBC
protocol.
JSA records Oracle Audit Vault alerts from the source database and captures
events as configured by the Oracle Audit Policy Setting. When events occur, the
alerts are stored in avsys.av$alert_store table. Customized events are created in
Oracle Audit Vault by a user with AV_AUDITOR permissions.
In Oracle Audit Vault, alert names are not mapped to a JSA Identifier (QID). Using
the Map Event function in the JSA Events interface a normalized or raw event can
be mapped to a high-level and low-level category (or QID). Using the Oracle Audit
Vault DSM, category mapping can be done by mapping your high or low category
alerts directly to an alert name (ALERT_NAME field) in the payload. For
information about the Events interface, see the Juniper Secure Analytics Users
Guide.
Configure a Log To configure a JSA log source to access the Oracle Audit Vault database using the
Source JDBC protocol:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
The Data Sources panel is displayed.
Step 4 Click the Log Sources icon.
The Log Sources window is displayed.
Step 5 Click Add.
Step 6 Using the Log Source Type list box, select Oracle Audit Vault.
Step 7 Using the Protocol Configuration list box, select JDBC.
Step 8 Configure the following values:
a Database Type: Oracle
b Database Name: <Audit Vault Database Name>
c Table Name: avsys.av$alert_store
d Select List: *
e Compare Field: ALERT_SEQUENCE
f IP or Hostname: <Location of Oracle Audit Vault Server>
g Port: <Default Port>
h Username: <Database Access Username having AV_AUDITOR role>
Configuring DSMs
590 ORACLE
i Password: <Password>
j Polling Interval: <Default Interval>
NOTE
Note: Verify the AV_AUDITOR password has been entered correctly before saving
the JDBC protocol configuration. Oracle Audit Vault might lock the user account
due to repeated failed login attempts. When the AV_AUDITOR account is locked,
data in the avsys.av$alert_store cannot be accessed. In order to unlock this user
account, it is necessary to first correct the password entry in the protocol
configuration. Then log in to Oracle Audit Vault through the Oracle sqlplus prompt
as the avadmindva user to perform an alter user <AV_AUDITOR USER> account
unlock command.
NOTE
Note: The local time zone conversion-dependent Oracle timestamps are not
supported in earlier versions of the JDBC protocol for JSA so fields
AV_ALERT_TIME, ACTUAL_ALERT_TIME, and TIME_CLEARED in the payload
only display object identifiers until your JDBC protocol is updated.
Oracle OS Audit The Oracle OS Audit DSM for JSA allows monitoring of the audit records that are
stored in the local operating system file.
When audit event files are created or updated in the local operating system
directory, a Perl script detects the change, and forwards the data to JSA. The Perl
script monitors the Audit log file, combines any multi-line log entries into a single
log entry to ensure the logs are not forwarded line-by-line, as is found in the log
file, then sends the logs using syslog to JSA. Perl scripts written for Oracle OS
Audit work on Linux/UNIX servers only. Windows-based Perl installations are not
supported.
Configuring DSMs
Oracle OS Audit 591
NOTE
Note: Perl 5.8 must be installed on the device that hosts the Oracle server. If you
do not have Perl 5.8 installed, you might be prompted that library files are missing
when you attempt to start the Oracle OS Audit script. We recommend you verify
you have installed Perl 5.8 before you continue.
Step 6 Log in to the Oracle host as an Oracle user that has SYS or root privilege.
Step 7 Make sure the ORACLE_HOME and ORACLE_SID environment variables are
configured properly for your deployment.
Step 8 Open the following file:
${ORACLE_HOME}/dbs/init${ORACLE_SID}.ora
Step 9 For syslog, add the following lines to the file:
*.audit_trail=’os’
*.audit_syslog_level=’local0.info’
Step 10 Verify account has read/write permissions for the following directories:
/var/lock/
/var/run/
Step 11 Restart the Oracle database instance.
Step 12 Start the OS Audit DSM script:
oracle_osauditlog_fwdr_5.3.pl -t target_host -d logs_directory
Table 82-4 Oracle OS Audit Command Parameters
Parameters Description
-t The -t parameter defines the remote host that receives the audit log
files.
-d The -d parameter defines directory location of the DDL and DML log
files.
Note: The directory location you specify should be the absolute path
from the root directory.
-H The -H parameter defines the host name or IP address for the syslog
header. We recommend that this be the IP address of the Oracle server
on which the script is running.
-D The -D parameter defines that the script is to run in the foreground.
Default is to run as a daemon (in the background) and log all internal
messages to the local syslog service.
-n The -n parameter processes new logs, and monitors existing log files for
changes to be processed.
If the -n option string is absent all existing log files are processed during
script execution.
-u The -u parameter defines UDP.
Configuring DSMs
592 ORACLE
Parameters Description
-f The -f parameter defines the syslog facility.priority to be included at the
beginning of the log.
If you do not type a value, user.info is used.
-r The -r parameter defines the directory name where you want to create
the .pid file. The default is /var/run. This parameter is ignored if -D is
specified.
-l The -I parameter defines the directory name where you want to create
the lock file. The default is /var/lock. This parameter is ignored if -D is
specified.
-h The -t parameter displays the help message.
-v The -v parameter displays the version information for the script.
If you restart your Oracle server you must restart the script:
oracle_osauditlog_fwdr.pl -t target_host -d logs_directory
You are now ready to configure the log sources within JSA.
Step 1 From the Log Source Type list box, select Oracle RDBMS OS Audit Record.
Step 2 From the Protocol Configuration list box. select syslog.
Step 3 From the Log Source Identifier field type the address specified using the –H
option in Step 12. For more information on configuring log sources, see the Log
Sources Users Guide.
For more information about your Oracle Audit Record, see your vendor
documentation.
Oracle BEA The Oracle BEA WebLogic DSM allows JSA to retrieve archived server logs and
WebLogic audit logs from any remote host, such as your Oracle BEA WebLogic server.
JSA uses the log file protocol to retrieve events from your Oracle BEA WebLogic
server and provide information on application events that occur in your domain or
on a single server.
Configuring DSMs
Oracle BEA WebLogic 593
Enable Event Logs By default, Oracle BEA WebLogic does not enable event logging.
Configure Domain Oracle BEA WebLogic supports multiple instances. Event messages from
Logging instances are collected in a single domain-wide log for the Oracle BEA WebLogic
server.
You are now ready to configure application logging for the server.
Step 1 From your Oracle WebLogic console, select Server > Logging > General.
Step 2 From the Log file name parameter, type the directory path and file name for the
application log. For example, OracleDomain.log.
Step 3 Optional. Configure any additional application log file rotation parameters.
Step 4 Click Save.
You are now ready to configure an audit provider for Oracle BEA WebLogic.
Configuring DSMs
594 ORACLE
Configure a Log To configure JSA to retrieve log files from Oracle BEA WebLogic:
Source
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
The Data Sources panel is displayed.
Step 4 Click the Log Sources icon.
The Log Sources window is displayed.
Step 5 From the Log Source Type list box, select Oracle BEA WebLogic.
Step 6 Using the Protocol Configuration list box, select Log File.
Step 7 Configure the following parameters:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source. This
value must match the value configured in the Remote Host IP
or Hostname parameter.
The log source identifier must be unique for the log source
type.
Service Type From the list box, select the File Transfer Protocol (FTP) you
want to use for retrieving files. The options are: SSH File
Transfer Protocol (SFTP), File Transfer Protocol (FTP), or
Secure Copy (SCP). The default is SFTP.
Remote IP or Type the IP address or hostname of the host from which you
Hostname want to receive files.
Configuring DSMs
Oracle BEA WebLogic 595
Parameter Description
Remote Port Type the TCP port on the remote host that is running the
selected Service Type. If you configure the Service Type as
FTP, the default is 21. If you configure the Service Type as
SFTP or SCP, the default is 22.
The valid range is 1 to 65535.
Remote User Type the username necessary to log in to the host running the
selected Service Type.
The username can be up to 255 characters in length.
Remote Password Type the password necessary to log in to the host running the
selected Service Type.
Confirm Password Confirm the Remote Password to log in to the host running
the selected Service Type.
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file. Also,
when you provide an SSH Key File, the Remote Password
option is ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved.
Recursive Select this check box if you want the file pattern to also search
sub folders. The Recursive parameter is not used if you
configure SCP as the Service Type. By default, the check box
is clear.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
For example, if you want to list all files starting with the word
server, followed by one or more digits and ending with .log,
use the following entry: server[0-9]+\.log. Use of this
parameter requires knowledge of regular expressions (regex).
For more information, see the following website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only appears if you select FTP as the Service
Type. The FTP Transfer Mode parameter allows you to define
the file transfer mode when retrieving log files over FTP.
From the list box, select the transfer mode you want to apply
to this log source:
• Binary - Select a binary FTP transfer mode for log sources
that require binary data files or compressed .zip, .gzip, .tar,
or .tar.gz archive files.
• ASCII - Select ASCII for log sources that require an ASCII
FTP file transfer. You must select NONE for the Processor
parameter and LINEBYLINE the Event Generator
parameter when using ASCII as the FTP Transfer Mode.
Configuring DSMs
596 ORACLE
Parameter Description
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. This
parameter functions with the Recurrence value to establish
when and how often the Remote Directory is scanned for files.
Type the start time, based on a 24 hour clock, in the following
format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the directory to be scanned
every 2 hours. The default is 1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save. After the Run On Save
completes, the log file protocol follows your configured start
time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File(s) parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor If the files located on the remote host are stored in a .zip,
.gzip, .tar, or .tar.gz archive format, select the processor that
allows the archives to be expanded and contents processed.
Ignore Previously Select this check box to track files that have already been
Processed File(s) processed and you do not want the files to be processed a
second time. This only applies to FTP and SFTP Service
Types.
Change Local Select this check box to define the local directory on your JSA
Directory? system that you want to use for storing downloaded files
during processing. We recommend that you leave the check
box clear. When the check box is selected, the Local Directory
field is displayed, which allows you to configure the local
directory to use for storing files.
Event Generator From the Event Generator list box, select Oracle BEA
WebLogic.
Configuring DSMs
Oracle Acme Packet Session Border Controller 597
Oracle Acme You can use JSA to collect events from Oracle Acme Packet Session Border
Packet Session Controller (SBC) installations in your network.
Border Controller
Configuration The Oracle Acme Packet SBC installations generate events from syslog and
Overview SNMP traps. SNMP trap events are converted to syslog and all events are
forwarded to to JSA over syslog. JSA does not automatically discover syslog
events that are forwarded from Oracle Communications SBC. JSA supports syslog
events from Oracle Acme Packet SBC V6.2 and above.
To collect Oracle Acme Packet SBC events, you must complete the following
tasks:
1 On your JSA system, configure a log source with the Oracle Acme Packet Session
Border Controller DSM.
2 On your Oracle Acme Packet SBC installation, enable SNMP and configure the
destination IP address for syslog events.
3 On your Oracle Acme Packet SBC installation, enable syslog settings on the
media-manager object.
4 Restart your Oracle Acme Packet SBC installation.
5 Optional. Ensure that no firewall rules block syslog communication between your
Oracle Acme Packet SBC installation and the JSA console or managed host that
collects syslog events.
Supported Oracle The Oracle Acme Packet SBC DSM for JSA can collect syslog events from
Acme Packet Event authorization and the system monitor event categories.
Types that are
Logged by JSA Each event category can contain low-level events that describe the action that is
taken within the event category. For example, authorization events can have
low-level categories of a login success or login failed.
Configuring an To collect syslog events from Oracle Acme Packet SBC, you must configure a log
Oracle Acme Packet source in JSA. Oracle Acme Packet SBC syslog events do not automatically
SBC Log Source discover in JSA.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Configuring DSMs
598 ORACLE
Step 7 Optional. In the Log Source Description field, type a description for your log
source.
Step 8 From the Log Source Type list box, select Oracle Acme Packet SBC.
Step 9 From the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name as an identifier for events
from your Oracle Acme Packet SBC installation.
The log source identifier must be unique value.
Enabled Select this check box to enable the log source. By default,
the check box is selected.
Credibility Select the credibility of the log source. The range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector Select the Event Collector to use as the target for the log
source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
What’s next
You are now ready to configure your Oracle Acme Packet SBC installation.
Configuring DSMs
Oracle Acme Packet Session Border Controller 599
Configuring SNMP to To collect events in a format compatible with JSA, you must enable SNMP to
Syslog Conversion syslog conversion and configure a syslog destination.
on Oracle Acme
Packet SBC Procedure
Step 1 Using SSH, log in to the command-line interface of your Oracle Acme Packet SBC
installation as an administrator.
Step 2 Type the following command to start the configuration mode:
config t
Step 3 Type the following commands to start the system configuration:
(configure)# system
(system)#
(system)# system-config
(system-config)# sel
The sel command is required to select a single-instance of the system
configuration object.
Step 4 Type the following commands to configure your JSA system as a syslog
destination:
(system-config)# syslog-servers
(syslog-config)# address <JSA IP address>
(syslog-config)# done
Step 5 Type the following commands to enable SNMP traps and syslog conversion for
SNMP trap notifications:
(system-config)# enable-snmp-auth-traps enabled
(system-config)# enable-snmp-syslog-notify enabled
(system-config)# enable-snmp-monitor-traps enabled
(system-config)# ids-syslog-facility 4
(system-config)# done
Step 6 Type the following commands to return to configuration mode:
(system-config)# exit
(system)# exit
(configure)#
Enabling Syslog The media-manager object configuration enables syslog notifications when the
Settings on the Media Intrusion Detection System (IDS) completes an action on an IP address. The
Manager Object available action for the event might be dependent on your firmware version.
Procedure
Step 1 Type the following command to list the firmware version for your Oracle Acme
Packet SBC installation:
(configure)# show ver
ACME Net-Net OSVM Firmware SCZ 6.3.9 MR-2 Patch 2 (Build 465)
Build Date=03/13/13
The underlined text is the major and minor version number for the firmware.
Configuring DSMs
600 ORACLE
Oracle Fine The Oracle Fine Grained Auditing DSM can poll for database audit events from
Grained Auditing Oracle 9i and later by using the Java Database Connectivity (JDBC) protocol.
Configuration To collect events, administrators must enable fine grained auditing on their Oracle
overview databases. Fine grained auditing provides events on select, update, delete, and
insert actions that occur in the source database and the records the data changed.
The database table dba_fga_audit_trail is updated with a new row each time a
change occurs on a database table where the administrator enabled an audit
policy.
Configuring DSMs
Oracle Fine Grained Auditing 601
To configure Oracle fine grained auditing, administators can complete the following
tasks:
1 Configure on audit on any tables that require policy monitoring in the Oracle
database.
2 Configure a log source for the Oracle Fine Grained Auditing DSM to poll the Oracle
database for events.
3 Verify that the events polled are collected and displayed on the Log Activity tab of
JSA.
Configure a log After the database administrator has configured database policies, a log source
source can be configured to access the Oracle database with the JDBC protocol.
Procedure
To configure a log source to access the Oracle database with the JDBC protocol:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 Using the Log Source Type list, select Oracle Fine Grained Auditing.
Step 7 Using the Protocol Configuration list, select JDBC.
Step 8 Configure the following values:
Parameter Description
Log Source Type the log source identifier in the following format:
Identifier
<database>@<hostname> or
<table name>|<database>@<hostname>
Where:
<table name> is the name of the table or view of the database
containing the event records. This parameter is optional. If you
include the table name, you must include a pipe (|) character and
the table name must match the Table Name parameter.
<database> is the database name, as defined in the Database
Name parameter. The database name is a required parameter.
<hostname> is the hostname or IP address for this log source, as
defined in the IP or Hostname parameter. The hostname is a
required parameter.
The log source identifier must be unique for the log source type.
Database Type Select MSDE as the database type.
Configuring DSMs
602 ORACLE
Parameter Description
Database Name Type the name of the database to which you want to connect.
The table name can be up to 255 alphanumeric characters in
length. The table name can include the following special
characters: dollar sign ($), number sign (#), underscore (_), en
dash (-), and period(.).
IP or Hostname Type the IP address or hostname of the database.
Port Type the port number used by the database server. The default
that is displayed depends on the selected Database Type. The
valid range is 0 to 65536.
The JDBC configuration port must match the listener port of the
database. The database must have incoming TCP connections
enabled to communicate with JSA.
The default port number for all options include:
• DB2 - 50000
• MSDE - 1433
• Oracle - 1521
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the database username.
The username can be up to 255 alphanumeric characters in
length. The username can also include underscores (_).
Password Type the database password.
The password can be up to 255 characters in length.
Confirm Confirm the password to access the database.
Password
Authentication If you select MSDE as the Database Type, the Authentication
Domain Domain field is displayed. If your network is configured to validate
users with domain credentials, you must define a Windows
Authentication Domain. Otherwise, leave this field blank.
The authentication domain must contain alphanumeric characters.
The domain can include the following special characters:
underscore (_), en dash (-), and period(.).
Database If you select MSDE as the Database Type, the Database Instance
Instance field is displayed.
Type the type the instance to which you want to connect, if you
have multiple SQL server instances on one server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Configuring DSMs
Oracle Fine Grained Auditing 603
Parameter Description
Predefined From the list, select None.
Query
Table Name Type dba_fga_audit_trail as the name of the table that
includes the event records. If you change the value of this field
from the default, events cannot be properly collected by the JDBC
protocol.
Select List Type * to include all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type extended_timestamp to identify new events added
between queries to the table by their timestamp.
Use Prepared Select the Use Prepared Statements check box.
Statements
Prepared statements allows the JDBC protocol source to setup the
SQL statement one time, then run the SQL statement many times
with different parameters. For security and performance reasons,
we recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Start Date and Optional. Configure the start date and time for database polling.
Time
Polling Interval Type the polling interval in seconds, which is the amount of time
between queries to the database table. The default polling interval
is 30 seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values without an H
or M designator poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Use Named Pipe If you select MSDE as the Database Type, the Use Named Pipe
Communication Communications check box is displayed. By default, this check
box is clear.
Select this check box to use an alternative method to a TCP/IP
port connection.
When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Configuring DSMs
604 ORACLE
Parameter Description
Use NTLMv2 If you select MSDE as the Database Type, the Use NTLMv2
check box is displayed.
Select the Use NTLMv2 check box to force MSDE connections to
use the NTLMv2 protocol when communicating with SQL servers
that require NTLMv2 authentication. The default value of the check
box is selected.
If the Use NTLMv2 check box is selected, it has no effect on
MSDE connections to SQL servers that do not require NTLMv2
authentication.
Use SSL Select this check box if your connection supports SSL
communication. This option requires additional configuration on
your SharePoint database and also requires administrators to
configure certificates on both appliances.
Database If you select the Use Named Pipe Communication check box,
Cluster Name the Database Cluster Name parameter is displayed. If you are
running your SQL server in a cluster environment, define the
cluster name to ensure Named Pipe communication functions
properly.
Configuring DSMs
83 OSSEC
The OSSEC DSM for Juniper Secure Analytics (JSA) accepts events forwarded
from OSSEC installations using syslog.
OSSEC is an open source Host-based Intrusion Detection System (HIDS) that can
provide intrusion events to JSA. If you have OSSEC agents installed, you must
configure syslog on the OSSEC management server. If you have local or
stand-alone installations of OSSEC, then you must configure syslog on each
stand-alone OSSEC to forward syslog events to JSA.
Configuring DSMs
606 OSSEC
Configure a Log JSA automatically discovers and creates a log source for syslog events from
Source OSSEC. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your OSSEC installation.
Configuring DSMs
84 PALO ALTO NETWORKS
Use the Juniper Secure Analytics (JSA) DSM for Palo Alto PA Series to collect
events from Palo Alto PA Series devices.
Table 84-1 identifies the specifications for the Palo Alto PA Series DSM.
Table 84-1 DSM specifications for Palo Alto PA Series
Specification Value
Manufacturer Palo Alto Networks
DSM name Palo Alto PA Series
RPM file name DSM-PaloAltoPaSeriesbuild_number.noarch.rpm
Supported PanOS v3.0 and later
versions
Event format Syslog
LEEF
JSA recorded All events
events
Automatically Yes
discovered
Includes identity Yes
For more Palo Alto Networks website
information (http://www.paloaltonetworks.com)
To integrate Palo Alto PA Series with JSA, complete the following steps:
1 If automatic updates are not enabled, download the most recent version of the
Palo Alto PA Series DSM RPM.
2 Configure your Palo Alto PA Series device to enable communication with JSA. You
must create a syslog destination and forwarding policy on the Palo Alto PA Series
device.
3 If JSA does not automatically detect Palo Alto PA Series as a log source, create a
Palo Alto PA Series log source on the JSA console.
Configuring DSMs
608 PALO ALTO NETWORKS
Use the Palo Alto values described in Table 84-2 to configure the log source
parameters.
Table 84-2 DSM specifications for Palo Alto PA Series
Specification Value
Log Source The IP address or host name of the Palo Alto PA
Identifier Series device
Log Source Type Palo Alto PA Series
Protocol Syslog
Configuration
Creating a Syslog Before you can send Palo Alto events to JSA, create a syslog destination on the
Destination on your Palo Alto PA Series device.
Palo Alto device
Configuring DSMs
Creating a Syslog Destination on your Palo Alto device 609
What to do next
To allow communication between your Palo Alto Networks device and JSA, create
a forwarding policy. See “Creating a Forwarding Policy on your Palo Alto
Device”.
Configuring DSMs
610 PALO ALTO NETWORKS
Creating a If your JSA console or Event Collector is in a different security zone than your Palo
Forwarding Policy Alto PA Series device, create a forwarding policy rule.
on your Palo Alto
Device Procedure
Configuring DSMs
85 PIREAN ACCESS: ONE
The Pirean Access: One DSM for Juniper Secure Analytics (JSA) collects events
by polling the DB2 audit database for access management and authentication
events.
Supported Versions JSA supports Pirean Access: One software installations at v2.2 that use a DB2
v9.7 database to store access management and authentication events.
Before You Begin Before you configure JSA to integrate with Pirean Access: One, you can create a
database user account and password for JSA. Creating a JSA account is not
required, but is beneficial as it allows you to secure your access management and
authentication event table data for the JSA user. Your JSA user must have read
permissions for the database table that contains your events. The JDBC protocol
allows JSA to log in and poll for events from the database based on the timestamp
to ensure the latest data is retrieved.
NOTE
Note: Ensure that no firewall rules block communication between your Pirean
Access: One installation and the JSA console or managed host responsible for
event polling with JDBC.
Configuring a Log To collect events, you must configure a log source in JSA to poll your Access: One
Source installation database with the JDBC protocol.
Procedure
Step 1 Click the Admin tab.
Step 2 On the navigation menu, click Data Sources.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Step 5 In the Log Source Name field, type a name for your log source.
Step 6 In the Log Source Description field, type a description for the log source.
Step 7 From the Log Source Type list box, select Pirean Access: One.
Step 8 Using the Protocol Configuration list box, select JDBC.
Configuring DSMs
612 PIREAN ACCESS: ONE
Parameter Description
Log Source Type the identifier for the log source. The log source identifier must
Identifier be defined in the following format:
<database>@<hostname>
Where:
<database> is the database name, as defined in the Database
Name parameter. The database name is a required parameter.
<hostname> is the hostname or IP address for the log source as
defined in the IP or Hostname parameter. The hostname is a
required parameter.
The log source identifier must be unique for the log source type.
Database Type From the list box, select DB2 as the type of database to use for the
event source.
Database Name Type the name of the database to which you want to connect. The
default database name is LOGINAUD.
IP or Hostname Type the IP address or hostname of the database server.
Port Type the TCP port number used by the audit database DB2
instance.
Your DB2 administrator can provide you with the TCP port
required for this field.
Username Type a username that has access to the DB2 database server and
audit table.
The username can be up to 255 alphanumeric characters in
length. The username can also include underscores (_).
Password Type the database password.
The password can be up to 255 characters in length.
Confirm Confirm the password to access the database.
Password
Table Name Type AUDITDATA as the name of the table or view that includes
the event records.
The table name can be up to 255 alphanumeric characters in
length. The table name can include the following special
characters: dollar sign ($), number sign (#), underscore (_), en
dash (-), and period(.).
Select List Type * to include all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Configuring DSMs
613
Parameter Description
Compare Field Type TIMESTAMP to identify new events added between queries
to the table.
The compare field can be up to 255 alphanumeric characters in
length. The list can include the special characters: dollar sign ($),
number sign (#), underscore (_), en dash (-), and period(.).
Use Prepared Select this check box to use prepared statements, which allows
Statements the JDBC protocol source to setup the SQL statement one time,
then run the SQL statement many times with different parameters.
For security and performance reasons, we recommend that you
use prepared statements.
Clear this check box to use an alternative method of querying that
does not use pre-compiled statements.
Start Date and Optional. Configure the start date and time for database polling.
Time The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values without an H
or M designator poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Enabled Select this check box to enable the Pirean Access: One log
source.
Configuring DSMs
86 POSTFIX MAIL TRANSFER AGENT
Juniper Secure Analytics (JSA) can collect and categorize syslog mail events from
PostFix Mail Transfer Agents (MTA) installed in your network.
Configuration To collect syslog events, you must configure PostFix MTA installation to forward
Overview syslog events to JSA. JSA does not automatically discover syslog events that are
forwarded from PostFix MTA installations as they are multiline events. JSA
supports syslog events from PostFix MTA V2.6.6.
If you have multiple PostFix MTA installations where events go to different JSA
systems, you must configure a log source and IPtables for each JSA system that
receives PostFix MTA multiline UDP syslog events.
Configuring Syslog To collect events, you must configure syslog on your PostFix MTA installation to
for PostFix Mail forward mail events to JSA.
Transfer Agent
Procedure
Step 1 Using SSH, log in to your PostFix MTA installation as a root user.
Step 2 Edit the following file:
/etc/syslog.conf
Step 3 To forward all mail events, type the following command to change
-/var/log/maillog/ to an IP address. Make sure all other lines remain intact:
mail.* @<IP address>
Where <IP address> is the IP address of the JSA console, Event Processor, or
Event Collecor, or all-in-one system.
Configuring DSMs
616 POSTFIX MAIL TRANSFER AGENT
Configuring a To collect syslog events, you must configure a log source for PostFix MTA to use
PostFix MTA Log the UDP Multiline Syslog protocol.
Source
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your log source.
Step 5 From the Log Source Type list box, select PostFix Mail Transfer Agent.
Step 6 From the Protocol Configuration list box, select UDP Multiline Syslog.
Step 7 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address, host name, or name to identify your
PostFix MTA installation.
Listen Port Type 517 as the port number used by JSA to accept
incoming UDP Multiline Syslog events. The valid port range
is 1 to 65535.
To edit a saved configuration to use a new port number:
1 In the Listen Port field, type the new port number for
receiving UDP Multiline Syslog events.
2 Click Save.
3 On the Admin tab, select Advanced > Deploy Full
Configuration.
After the full deploy completes, JSA is capable of receiving
events on the updated listen port.
Note: When you click Deploy Full Configuration, JSA
restarts all services, which results in a gap in data collection
for events and flows until the deployment completes.
Message ID Pattern Type the following regular expression (regex) required to
filter the event payload messages.
postfix/.*?[ \[]\\d+[ \]](?:- - |: )([A-Z0-9]{8,10})
Enabled Select this check box to enable or disable the log source.
Credibility Select the credibility of the log source. The range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Configuring DSMs
617
Parameter Description
Target Event Collector Select the Event Collector to use as the target for the log
source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Payload Select the character encoding required to parse the event
Encoding logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Log Source Language Select the language of the events generated by PostFix
MTA.
Configure IPtables To collect events, you must redirect events from the standard PostFix MTA port to
for Multiline UDP port 517 for the UDP multiline protocol.
Syslog Events
Procedure
Step 1 Using SSH, log in to JSA as the root user.
Step 2 To edit the IPtables file, type the following command:
vi /opt/qradar/conf/iptables-nat.post
Step 3 To instruct JSA to redirect syslog events from UDP port 514 to UDP port 517, type
the following command:
-A PREROUTING -p udp --dport 514 -j REDIRECT --to-port
<new-port> -s <IP address>
Where:
<IP address> is the IP address of your PostFix MTA installation.
<New port> is the port number configured in the UDP Multiline protocol for
PostFix MTA.
Configuring DSMs
618 POSTFIX MAIL TRANSFER AGENT
For example, if you had three PostFix MTA installations that communicate to JSA,
you can type the following:
-A PREROUTING -p udp --dport 514 -j REDIRECT --to-port 517 -s
10.10.10.10
-A PREROUTING -p udp --dport 514 -j REDIRECT --to-port 517 -s
10.10.10.11
-A PREROUTING -p udp --dport 514 -j REDIRECT --to-port 517 -s
10.10.10.12
Step 4 Save your IPtables NAT configuration.
You are now ready to configure IPtables on your JSA console or Event Collector to
accept events from your PostFix MTA installation.
Step 5 Type the following command to edit the IPtables file:
vi /opt/qradar/conf/iptables.post
Step 6 Type the following command to instruct JSA to allow communication from your
PostFix MTA installations:
-I QChain 1 -m udp -p udp --src <IP address> --dport <New port>
-j ACCEPT
Where:
<IP address> is the IP address of your PostFix MTA installation.
<New port> is the port number configured in the UDP Multiline protocol.
For example, if you had three PostFix MTA installations communicating to an
Event Collector, you can type the following:
-I QChain 1 -m udp -p udp --src 10.10.10.10 --dport 517 -j
ACCEPT
-I QChain 1 -m udp -p udp --src 10.10.10.11 --dport 517 -j
ACCEPT
-I QChain 1 -m udp -p udp --src 10.10.10.12 --dport 517 -j
ACCEPT
Step 7 To save the changes and update IPtables, type the following command:
./opt/qradar/bin/iptables_update.pl
Configuring DSMs
87 PROFTPd
Juniper Secure Analytics (JSA) can collect events from a ProFTP server through
syslog.
Configuring DSMs
620 PROFTPD
Configure a Log JSA automatically discovers and creates a log source for syslog events from
Source ProFTPd. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your ProFTPd installation.
Configuring DSMs
88 PROOFPOINT ENTERPRISE
PROTECTION AND ENTERPRISE
PRIVACY
Juniper Secure Analytics (JSA) can collect and categorize syslog events from
Proofpoint Enterprise Protection and Enterprise Privacy systems that are installed
within your network.
Configuration To collect syslog events, administrators must configure the Proofpoint appliance to
Overview forward syslog events. JSA does not automatically discover syslog events that are
forwarded from Proofpoint installations. JSA supports syslog events from
Proofpoint Enterprise Protection or Proofpoint Enterprise Privacy installations that
use software version 2014.3 or later.
Configuring Syslog To collect events, you must configure syslog on your Proofpoint installation to
for Proofpoint forward syslog events.
Enterprise
Procedure
To configure syslog for Proofpoint enterprise:
Step 1 Log in to the Proofpoint Enterprise interface.
Step 2 Click Logs and Reports.
Step 3 Click Log Settings.
Step 4 From the Remote Log Settings pane, configure the following options to enable
syslog communication:
a Select Syslog as the communication protocol.
Configuring DSMs
622 PROOFPOINT ENTERPRISE PROTECTION AND ENTERPRISE PRIVACY
Configuring a To collect syslog events, you must configure a log source for Proofpoint Enterprise
Proofpoint Log because the DSM does not support automatic discovery.
Source
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your log source.
Step 5 In the Log Source Description field, type a description for your log source.
Step 6 From the Log Source Type list, select Proofpoint Enterprise
Protection/Enterprise Privacy.
Step 7 From the Protocol Configuration list, select Syslog.
Step 8 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address, host name, or name to identify your
Proofpoint Enterprise appliance.
Enabled Select this check box to enable the log source.
Credibility Select the credibility of the log source. The range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector Select the Event Collector to use as the target for the log
source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Configuring DSMs
623
Parameter Description
Incoming Payload Select the character encoding that is required to parse the
Encoding event logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Log Source Language Select the language of the events that are generated by the
Proofpoint Enterprise appliance.
Configuring DSMs
89 RADWARE DEFENSEPRO
The Radware DefensePro DSM for Juniper Secure Analytics (JSA) accepts events
using syslog. Event traps can also be mirrored to a syslog server.
Before you configure JSA to integrate with a Radware DefensePro device, you
must configure your Radware DefensePro device to forward syslog events to JSA.
You must configure the appropriate information using the Device > Trap and
SMTP option.
Any traps generated by the Radware device are mirrored to the specified syslog
server. The current Radware Syslog server enables you to define the status and
the event log server address.
You can also define additional notification criteria, such as Facility and Severity,
which are expressed by numerical values:
• Facility is a user-defined value indicating the type of device used by the sender.
This criteria is applied when the device sends syslog messages. The default
value is 21, meaning Local Use 6.
• Severity indicates the importance or impact of the reported event. The Severity
is determined dynamically by the device for each message sent.
In the Security Settings window, you must enable security reporting using the
connect and protect/security settings. You must enable security reports to syslog
and configure the severity (syslog risk).
Configure a Log JSA automatically discovers and creates a log source for syslog events from
Source Radware DefensePro. The following configuration steps are optional.
Configuring DSMs
626 RADWARE DEFENSEPRO
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Radware DefensePro
installation.
Configuring DSMs
90 RAZ-LEE ISECURITY
Juniper Secure Analytics (JSA) that can collect and parse syslog events forwarded
from Raz-Lee iSecurity installations on IBM iSeries® infrastructure.
Supported Versions JSA supports events from Raz-Lee iSecurity installations with Firewall v15.7 and
Audit v11.7.
Supported Event Raz-Lee iSecurity installations on IBM AS/400 iSeries are can forward syslog
Types events for security, compliance, and auditing to JSA.
All syslog events forwarded by Raz-Lee iSecurity automatically discover and the
events are parsed and categorized with the IBM AS/400 iSeries DSM.
Configuring Raz-Lee To collect security and audit events, you must configure your Raz-Lee iSecurity
iSecurity installation to forward syslog events to JSA.
Procedure
Step 1 Log in to the IBM System i command-line interface.
Step 2 Type the following command to access the audit menu options:
STRAUD
Step 3 From the Audit menu, select 81. System Configuration.
Step 4 From the iSecurity/Base System Configuration menu, select 31. SYSLOG
Definitions.
Step 5 Configure the following parameters:
a Send SYSLOG message - Select Yes.
b Destination address - Type the IP address of JSA.
c “Facility” to use - Type a facility level.
d “Severity” range to auto send - Type a severity level.
e Message structure - Type any additional message structure parameters
required for your syslog messages.
Configuring DSMs
628 RAZ-LEE ISECURITY
Next steps
Syslog events forwarded by Raz-Lee iSecurity are automatically discovered by
JSA by the IBM AS/400 iSeries DSM. In most cases, the log source is
automatically created in JSA after a small number of events are detected. If the
event rate is extremely low, then you might be required to manually create a log
source for Raz-Lee iSecurity in JSA. Until the log source is automatically
discovered and identified, the event type displays as Unknown on the Log Activity
tab of JSA. Automatically discovered log sources can be viewed on the Admin tab
of JSA by clicking the Log Sources icon.
Configuring a Log JSA automatically discovers and creates a log source for syslog events forwarded
Source from Raz-Lee i Security. This procedure is optional.
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your log source.
Step 5 In the Log Source Description field, type a description for the log source.
Step 6 From the Log Source Type list box, select IBM AS/400 iSeries.
Step 7 Using the Protocol Configuration list box, select Syslog.
Step 8 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your IBM AS/400 iSeries device
with Raz-Lee iSecurity.
Enabled Select this check box to enable the log source.
By default, the check box is selected.
Credibility Select the credibility of the log source. The range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector Select the Event Collector to use as the target for the log
source.
Configuring DSMs
629
Parameter Description
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Configuring DSMs
630 RAZ-LEE ISECURITY
Configuring DSMs
91 REDBACK ASE
The Redback ASE DSM for Juniper Secure Analytics (JSA) accepts events using
syslog.
The Redback ASE device can send log messages to the Redback device console
or to a log server that is integrated with JSA to generate deployment specific
reports. Before configuring a Redback ASE device in JSA, you must configure your
device to forward syslog events.
Configuring DSMs
632 REDBACK ASE
The source IP address used for log messages is 10.192.22.24. This address must
be an IP address of a loopback interface in context local.
asp security default
log server 10.172.55.55
log source 10.192.22.24
You are now ready to configure the log sources JSA.
Configure a Log JSA automatically discovers and creates a log source for syslog events from
Source Redback ASE. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Redback ASE appliance.
Configuring DSMs
92 RSA AUTHENTICATION MANAGER
Before you configure JSA to integrate with RSA Authentication Manager, select
your configuration preference:
NOTE
Note: You must apply the most recent hot fix on RSA Authentication Manager 7.1
primary, replica, node, database and radius installations before configuring syslog.
Configuring Syslog The procedure to configure your RSA Authentication Manager using syslog
for RSA depends on the operating system version for your RSA Authentication Manager or
SecureID 3.0 appliance:
• If you are using RSA Authentication Manager on Linux, see Configuring Linux.
• If you are using RSA Authentication Manager on Windows, see Configuring
Windows.
Configuring Linux To configure RSA Authentication Manager for syslog on Linux-based operating
systems:
Step 1 Log in to the RSA Security console command-line interface (CLI).
Step 2 Open the following file for editing based on your operating system:
/usr/local/RSASecurity/RSAAuthenticationManager/utils/resources
/ims.properties
Step 3 Add the following enteries to the ims.properties file:
ims.logging.audit.admin.syslog_host = <IP address>
ims.logging.audit.admin.use_os_logger = true
ims.logging.audit.runtime.syslog_host = <IP address>
ims.logging.audit.runtime.use_os_logger = true
Configuring DSMs
634 RSA AUTHENTICATION MANAGER
From the Log Source Type list box, select the RSA Authentication Manager
option.
For more information, see the Log Sources Users Guide. For more information on
configuring syslog forwarding, see your RSA Authentication Manager
documentation.
Configuring To configure RSA Authentication Manager for syslog using Microsoft Windows:
Windows
Step 1 Log in to the system hosting your RSA Security console.
Step 2 Open the following file for editing based on your operating system:
/Program Files/RSASecurity/RSAAuthenticationManager/utils/
resources/ims.properties
Step 3 Add the following enteries to the ims.properties file:
ims.logging.audit.admin.syslog_host = <IP address>
ims.logging.audit.admin.use_os_logger = true
ims.logging.audit.runtime.syslog_host = <IP address>
ims.logging.audit.runtime.use_os_logger = true
ims.logging.system.syslog_host = <IP address>
ims.logging.system.use_os_logger = true
Where <IP address> is the IP address or hostname of JSA.
Step 4 Save the ims.properties files.
Step 5 Restart RSA services.
You are now ready to configure the log source in JSA.
Configuring DSMs
Configuring the Log File Protocol for RSA 635
From the Log Source Type list box, select the RSA Authentication Manager
option.
For more information, see the Log Sources Users Guide. For more information on
configuring syslog forwarding, see your RSA Authentication Manager
documentation.
Configuring the The log file protocol allows JSA to retrieve archived log files from a remote host.
Log File Protocol The RSA Authentication Manager DSM supports the bulk loading of log files using
for RSA the log file protocol source.
The procedure to configure your RSA Authentication Manager using the log file
protocol depends on the version of RSA Authentication Manager:
• If you are using RSA Authentication Manager v7.x, see Configuring RSA
Authentication Manager 7.x.
• If you are using RSA Authentication Manager v6.x, see Configuring RSA
Authentication Manager 6.x.
NOTE
Note: The Export and Purge operation exports log records from the database to
the archive and then purges the logs form the database. The Export Only
operation exports log records from the database to the archive and the records
remain in the database.
Configuring DSMs
636 RSA AUTHENTICATION MANAGER
For more information on configuring log sources and protocols, see the Log
Sources Users Guide.
You are now ready to configure the log sources and protocol in JSA:
Step 1 To configure JSA to receive events from a RSA device, you must select the RSA
Authentication Manager option from the Log Source Type list box.
Step 2 To configure the log file protocol, you must select the Log File option from the
Protocol Configuration list box.
For more information on configuring log sources and protocols, see the Log
Sources Users Guide.
Configuring DSMs
93 SAMHAIN LABS
The Samhain HIDS DSM for Juniper Secure Analytics (JSA) supports Samhain
version 2.4 when used for File Integrity Monitoring (FIM).
You can configure the Samhain HIDS DSM to accept one of the following log
types:
• Configuring Syslog to Collect Samhain Events
• Configuring JDBC to Collect Samhain Events
Configuring Syslog Before you configure JSA to integrate with Samhain HIDS using syslog, you must
to Collect Samhain configure the Samhain HIDS system to forward logs to your JSA system.
Events
NOTE
Note: The following procedure is based on the default samhainrc file. If the
samhainrc file has been modified, some values might be different, such as the
syslog facility,
Procedure
Step 1 Log in to Samhain HIDS from the command-line interface.
Step 2 Open the following file:
/etc/samhainrc
Step 3 Remove the comment marker (#) from the following line:
SetLogServer=info
Step 4 Save and exit the file.
Alerts are sent to the local system using syslog.
Step 5 Open the following file:
/etc/syslog.conf
Configuring DSMs
638 SAMHAIN LABS
From the Log Source Type list box, select the Samhain HIDS option.
For more information on configuring log sources, see the Log Sources Users
Guide.
Configuring JDBC You can configure Samhain HIDS to send log alerts to a database. Oracle,
to Collect Samhain PostgreSQL, and MySQL are natively supported by Samhain. You can also
Events configure JSA to collect events from these databases using the JDBC protocol.
NOTE
Note: JSA does not include a MySQL driver for JDBC. If you are using a DSM or
protocol that requires a MySQL JDBC driver, you must download and install the
platform independent MySQL Connector/J from
http://dev.mysql.com/downloads/connector/j/. For instruction on installing MySQL
Connector/J for the JDBC protocol, see the Log Sources Users Guide.
Procedure
Step 1 Log into JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 From the Log Source Type list box, select the Samhain HIDS option.
Step 7 Using the Protocol Configuration list box, select JDBC.
Step 8 Update the JDBC configuration to include the following values:
a Database Type: <Samhain Database Type>
b Database Name: <Samhain SetDBName>
c Table Name: <Samhain SetDBTable>
d Select List: *
Configuring DSMs
Configuring JDBC to Collect Samhain Events 639
Where:
<Samhain Database Type> is the database type used by Samhain (see your
Samhain system administrator).
<Samhain SetDBName> is the database name specified in the samhainrc file.
<Samhain SetDBTable> is the database table specified in the samhainrc file.
<Samhain SetDBHost> is the database host specified in the samhainrc file.
<Samhain SetDBUser> is the database user specified in the samhainrc file.
<Samhain SetDBPassword> is the database password specified in the samhainrc
file.
You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Samhain HIDS option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about Samhain, see
http://www.la-samhna.de/samhain/manual.
Configuring DSMs
94 SAFENET DATASECURE
The SafeNet DataSecure DSM for Juniper Secure Analytics (JSA) receives syslog
events from your SafeNet DataSecure device. DataSecure maintains activity logs,
such as record administrative actions, network activity, and cryptography requests.
JSA supports SafeNet DataSecure v6.3.0 and later.
Audit log
Contains a record of all configuration changes and user input errors that are made
to KeySecure, whether through the management console or the command line
interface.
System log
Contains a record of all system events, such as the following events:
• Service starts, stops, and restarts
• SNMP traps
• Hardware failures
• Successful or failed cluster replication and synchronization
• Failed log transfers
• License errors
configuring DSMs
642 SAFENET DATASECURE
Configuration To integrate SafeNet DataSecure with JSA, you must perform the following tasks:
Overview
1 Enable syslog on the SafeNet DataSecure device.
2 Configure a SafeNet DataSecure log source on your JSA console.
Enabling Syslog on Before you add the DSM for SafeNet DataSecure, enable syslog on your SafeNet
SafeNet DataSecure DataSecure device.
Procedure
To enable syslog on Safenet DataSecure:
Step 1 Log in to the SafeNet DataSecure management console as an administrator with
logging access control.
Step 2 Select Device > Log Configuration.
Step 3 Select the Rotation & Syslog tab.
Step 4 Select a log in the Syslog Settings section and click Edit.
Step 5 Select Enable Syslog.
Step 6 Configure the parameters:
Table 94-1 Parameters to Enable Systol on SafeNet DataSecure
Parameter Description
Syslog Server #1 IP The IP address or host name of
the target JSA Event Collector.
Syslog Server #1 Port The listening port for JSA. Use
Port 514.
Step 7 Optional. Type an IP address, port, and protocol for a Syslog Server #2. When two
servers are configured, SafeNet DataSecure sends messages to both servers.
Step 8 Type the Syslog Facility or accept the default value of local1.
Step 9 Click Save.
Add a log source JSA automatically detects syslog events forwarded by SafeNet DataSecure. In
most cases, JSA automatically adds the log source after a small number of events
are detected. If required, you can manually add the log source.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
configuring DSMs
643
Parameter Description
Log Source Identifier The IP address or hostname to identify the log source. The
value must be unique to the log source type.
Credibility Indicates the integrity of an event or offense as determined by
the credibility rating from the log source. Credibility increases
if multiple log sources report the same event.
Incoming Payload The character encoding that is required to parse the event
Encoding logs.
Store Event Payload Enables the log source to store event payload information.
Automatically discovered log sources inherit the value in the
Store Event Payload list from your system settings. When
you manually create or edit a log source, you can override the
default value by configuring this option.
Step 9 Optional. Clear the Enable check box if you want to disable the log source.
Step 10 Select any groups that you want this log source to be a member of.
Step 11 Click Save.
configuring DSMs
95 SENTRIGO HEDGEHOG
You can integrate a Sentrigo Hedgehog device with Juniper Secure Analytics
(JSA).
A Sentrigo Hedgehog device accepts LEEF events using syslog. Before you
configure JSA to integrate with a Sentrigo Hedgehog device, you must:
NOTE
Note: Depending on your Sentrigo Hedgehog configuration or installation, you
might be required to replace or overwrite the existing log.format entry.
sentrigo.comm.ListenAddress=1996
log.format.body.custom=usrName=$osUser:20$|duser=$execUser:20$|
severity=$severity$|identHostName=$sourceHost$|src=$sourceIP$|
dst=$agent.ip$|devTime=$logonTime$|devTimeFormat=EEE MMM dd
HH:mm:ss z yyyy|cmdType=$cmdType$|externalId=$id$|
execTime=$executionTime.time$|dstServiceName=$database.name:20$
|srcHost=$sourceHost:30$|execProgram=$execProgram:20$|
cmdType=$cmdType:15$|oper=$operation:225$|
accessedObj=$accessedObjects.name:200$
log.format.header.custom=LEEF:1.0|Sentrigo|Hedgehog|$serverVers
ion$|$rules.name:150$|
log.format.header.escaping.custom=\\|
log.format.header.seperator.custom=,
log.format.header.escape.char.custom=\\
log.format.body.escaping.custom=\=
log.format.body.escape.char.custom=\\
log.format.body.seperator.custom=|
log.format.empty.value.custom=NULL
log.format.length.value.custom=10000
log.format.convert.newline.custom=true
Configuring DSMs
646 SENTRIGO HEDGEHOG
From the Log Source Type list box, select the Sentrigo Hedgehog option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about Sentrigo Hedgehog see your vendor
documentation.
Configuring DSMs
96 SECURE COMPUTING SIDEWINDER
The Sidewinder DSM for Juniper Secure Analytics (JSA) records all relevant
Sidewinder events using syslog.
Before you configure JSA to integrate with a Sidewinder device, you must
configure syslog within your Sidewinder device. When configuring the Sidewinder
device to forward syslog to JSA, make sure that the logs are exported in
Sidewinder Export format (SEF).
After you configure syslog to forward events to JSA, you are ready to configure the
log source in JSA.
From the Log Source Type list box, select Sidewinder G2 Security
Appliance option.
For more information on configuring log sources, see the Log Sources Users
Guide.
Configuring DSMs
97 SOLARWINDS ORION
The SolarWinds Orion DSM for Juniper Secure Analytics (JSA) supports SNMPv2
and SNMPv3 configured alerts from the SolarWinds Alert Manager.
The events are sent to JSA using syslog. Before you can integrate JSA, you must
configure the SolarWinds Alert Manager to create SNMP traps and forward syslog
events.
Configuring DSMs
650 SOLARWINDS ORION
NOTE
Note: To verify that your SNMP trap is configured properly, select an alert you
have edited and click Test. The action should trigger and forward the syslog event
to JSA.
Step 9 Repeat Step 3 to Step 8 to configure the Alert Manager with all of the SNMP trap
alerts you want to monitor in JSA.
You are now ready to configure the log source in JSA.
JSA automatically detects syslog events from properly configured SNMP trap alert
triggers. However, if you want to manually configure JSA to receive events from
SolarWinds Orion:
From the Log Source Type list box, select SolarWinds Orion.
For more information on configuring log sources, see the Log Sources Users
Guide.
Configuring DSMs
98 SONICWALL
Juniper Secure Analytics (JSA) records all relevant syslog events forwarded from
SonicWALL appliances using SonicOS firmware. Before you can integrate with a
SonicWALL SonicOS device, you must configure syslog forwarding on your
SonicWALL SonicOS appliance.
Configure SonicWALL captures all SonicOS event activity. The events can be forwarded to
SonicWALL to JSA using SonicWALL’s default event format.
Forward Syslog
Events To configure SonicWALL to forward syslog events:
Step 1 Log in to your SonicWALL web interface.
Step 2 From the navigation menu, select Log > Automation.
The Automation window is displayed.
Step 3 From the Syslog Servers pane, click Add.
The Add Syslog Server window is displayed.
Step 4 In the Name or IP Address field, type the IP address of your JSA console or Event
Collector.
Step 5 In the Port field, type 514.
SonicWALL syslog forwarders send events to JSA using UDP port 514.
Step 6 Click OK.
The Automation window is displayed.
Step 7 From the Syslog Format list box, select Default.
Step 8 Click Apply.
Syslog events are forwarded to JSA. SonicWALL events forwarded to JSA are
automatically discovered and log sources are created automatically. For more
information on configuring your SonicWALL appliance or for information on specific
events, see your vendor documentation.
Configuring DSMs
652 SONICWALL
Configure a Log JSA automatically discovers and creates a log source for syslog events from
Source SonicWALL appliances. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for events from SonicWALL appliances.
Each log source you create for your SonicWALL SonicOS
appliance should include a unique identifier, such as an IP
address or host name.
Configuring DSMs
99 SOPHOS
Sophos Enterprise Juniper Secure Analytics (JSA) has two options for gathering events from a
Console Sophos Enterprise console using JDBC.
Select the method that best applies to your Sophos Enterprise console installation:
• Configure JSA Using the Sophos Enterprise Console Protocol
• Configure JSA Using the JDBC Protocol
NOTE
Note: To use the Sophos Enterprise console protocol, you must ensure that the
Sophos Reporting Interface is installed with your Sophos Enterprise console. If you
do not have the Sophos Reporting Interface, you must configure JSA using the
JDBC protocol. For information on installing the Sophos Reporting Interface, see
your Sophos Enterprise console documentation.
Configure JSA Using The Sophos Enterprise console DSM for JSA accepts events using Java Database
the Sophos Connectivity (JDBC).
Enterprise Console
Protocol The Sophos Enterprise console DSM works in coordination with the Sophos
Enterprise console protocol to combine payload information from anti-virus,
application control, device control, data control, tamper protection, and firewall logs
in the vEventsCommonData table and provide these events to JSA. You must
install the Sophos Enterprise console protocol before configuring JSA.
To configure JSA to access the Sophos database using the JDBC protocol:
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Configuring DSMs
654 SOPHOS
NOTE
Note: You must refer to the Configure Database Settings on your Sophos
Enterprise console to define the parameters required to configure the Sophos
Enterprise console JDBC protocol in JSA.
Parameter Description
Log Source Type the identifier for the log source. Type the log source identifier
Identifier in the following format:
<Sophos Database>@<Sophos Database Server IP or
Host Name>
Where:
<Sophos Database> is the database name, as entered in the
Database Name parameter.
<Sophos Database Server IP or Host Name> is the
hostname or IP address for this log source, as entered in the IP or
Hostname parameter.
Note: When defining a name for your log source identifier, you
must use the values of the Sophos Database and Database Server
IP address or hostname from the Management Enterprise console.
Database Type From the list box, select MSDE.
Database Name Type the exact name of the Sophos database.
IP or Hostname Type the IP address or host name of the Sophos SQL Server.
Port Type the port number used by the database server. The default
port for MSDE in Sophos Enterprise console is 1168.
The JDBC configuration port must match the listener port of the
Sophos database. The Sophos database must have incoming TCP
connections enabled to communicate with JSA.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Configuring DSMs
Sophos Enterprise Console 655
Parameter Description
Username Type the username required to access the database.
Password Type the password required to access the database. The
password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password parameter.
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define a Window Authentication
Domain. Otherwise, leave this field blank.
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type vEventsCommonData as the name of the table or view that
includes the event records.
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type InsertedAt as the compare field. The compare field is used
to identify new events added between queries to the table.
Start Date and Optional. Type the start date and time for database polling.
Time
The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Configuring DSMs
656 SOPHOS
Parameter Description
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication
When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
Use NTLMv2 If you select MSDE as the Database Type, the Use NTLMv2
check box is displayed.
Select the Use NTLMv2 check box to force MSDE connections to
use the NTLMv2 protocol when communicating with SQL servers
that require NTLMv2 authentication. The default value of the check
box is selected.
If the Use NTLMv2 check box is selected, it has no effect on
MSDE connections to SQL servers that do not require NTLMv2
authentication.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
Sophos log source with a higher importance compared to other log sources in JSA.
Configure JSA Using The Sophos Enterprise console DSM for JSA accepts events using Java Database
the JDBC Protocol Connectivity (JDBC).
JSA records all relevant anti-virus events. This document provides information on
configuring JSA to access the Sophos Enterprise console database using the
JDBC protocol.
Configuring DSMs
Sophos Enterprise Console 657
NOTE
Note: The database name must not contain any spaces.
After you have created your custom view, you must configure JSA to receive event
information using the JDBC protocol.
To configure the Sophos Enterprise console DSM with JSA, see Configure a JDBC
log source in JSA.
NOTE
Note: You must refer to the Configure Database Settings on your Sophos
Enterprise console to define the parameters required to configure the Sophos
Enterprise console DSM in JSA.
Configuring DSMs
658 SOPHOS
Parameter Description
Log Source Type the identifier for the log source. Type the log source identifier
Identifier in the following format:
<Sophos Database>@<Sophos Database Server IP or
Host Name>
Where:
<Sophos Database> is the database name, as entered in the
Database Name parameter.
<Sophos Database Server IP or Host Name> is the
hostname or IP address for this log source, as entered in the IP or
Hostname parameter.
Note: When defining a name for your log source identifier, you
must use the values of the Sophos Database and Database Server
IP address or hostname from the Management Enterprise console.
Database Type From the list box, select MSDE.
Database Name Type the exact name of the Sophos database.
IP or Hostname Type the IP address or host name of the Sophos SQL Server.
Port Type the port number used by the database server. The default
port for MSDE is 1433.
The JDBC configuration port must match the listener port of the
Sophos database. The Sophos database must have incoming TCP
connections enabled to communicate with JSA.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the username required to access the database.
Password Type the password required to access the database. The
password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password parameter.
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define a Window Authentication
Domain. Otherwise, leave this field blank.
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type threats_view as the name of the table or view that includes
the event records.
Configuring DSMs
Sophos Enterprise Console 659
Parameter Description
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type ThreatInstanceID as the compare field. The compare field is
used to identify new events added between queries to the table.
Start Date and Optional. Type the start date and time for database polling.
Time The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Use Prepared Select this check box to use prepared statements.
Statements
Prepared statements allows the JDBC protocol source to setup the
SQL statement one time, then run the SQL statement many times
with different parameters. For security and performance reasons,
we recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
Sophos log source with a higher importance compared to other log sources in JSA.
Configuring DSMs
660 SOPHOS
Sophos The Sophos PureMessage DSM for JSA accepts events using Java Database
PureMessage Connectivity (JDBC).
JSA records all relevant quarantined email events. This document provides
information on configuring JSA to access the Sophos PureMessage database
using the JDBC protocol.
Integrate JSA with To integrate JSA with Sophos PureMessage for Microsoft Exchange:
Sophos
PureMessage for
Microsoft Exchange
Step 1 Log in to the Microsoft SQL Server command-line interface (CLI):
osql -E -S localhost\sophos
Step 2 Type which database you want to integrate with JSA:
use savexquar;
go
Step 3 Type the following command to create a SIEM view in your Sophos database to
support JSA:
create view siem_view as select 'Windows PureMessage' as
application, id, reason, timecreated, emailonly as sender,
filesize, subject, messageid, filename from dbo.quaritems,
dbo.quaraddresses where ItemID = ID and Field = 76;
Go
After you create your SIEM view, you must configure JSA to receive event
information using the JDBC protocol.
Configuring DSMs
Sophos PureMessage 661
To configure the Sophos PureMessage DSM with JSA, see Configure a JDBC log
source for Sophos PureMessage.
NOTE
Note: You must refer to the database configuration settings on your Sophos
PureMessage device to define the parameters required to configure the Sophos
PureMessage DSM in JSA.
Parameter Description
Log Source Type the identifier for the log source. Type the log source identifier
Identifier in the following format:
<Sophos PureMessage Database>@<Sophos PureMessage
Database Server IP or Host Name>
Where:
<Sophos PureMessage Database> is the database name, as
entered in the Database Name parameter.
<Sophos PureMessage Database Server IP or Host
Name> is the hostname or IP address for this log source, as
entered in the IP or Hostname parameter.
When defining a name for your log source identifier, you must use
the values of the Database and Database Server IP address or
hostname of the Sophos PureMessage device.
Database Type From the list box, select MSDE.
Database Name Type savexquar.
Configuring DSMs
662 SOPHOS
Parameter Description
IP or Hostname Type the IP address or host name of the Sophos PureMessage
server.
Port Type the port number used by the database server. The default
port for MSDE is 1433. Sophos installations typically use 24033.
You can confirm port usage using the SQL Server Configuration
Manager utility. For more information, see your vendor
documentation.
The JDBC configuration port must match the listener port of the
Sophos database. The Sophos database must have incoming TCP
connections enabled to communicate with JSA.
Note: If you define a database instance in the Database Instance
parameter, you must leave the Port parameter blank. You can only
define a database instance if the database server uses the default
port of 1433. This is not the standard Sophos configuration.
Username Type the username required to access the database.
Password Type the password required to access the database. The
password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password parameter.
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define a Window Authentication
Domain. Otherwise, leave this field blank.
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you define a port number other than the default in the Port
parameter, or have blocked access to port 1434 for SQL database
resolution, you must leave the Database Instance parameter
blank.
Table Name Type siem_view as the name of the table or view that includes
the event records.
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type ID. The Compare Field parameter is used to identify new
events added between queries to the table.
Configuring DSMs
Sophos PureMessage 663
Parameter Description
Use Prepared Select this check box to use prepared statements.
Statements
Prepared statements allows the JDBC protocol source to set up
the SQL statement one time, then run the SQL statement many
times with different parameters. For security and performance
reasons, we recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Start Date and Optional. Type the start date and time for database polling.
Time
The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24-hour clock. If
the Start Date and Time parameter is clear, polling begins
immediately and repeats at the specified polling interval.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
Sophos PureMessage log source with a higher importance compared to other log
sources in JSA.
Configuring DSMs
664 SOPHOS
Integrate JSA with To integrate JSA with Sophos PureMessage for Linux:
Sophos
PureMessage for
Linux
Step 1 Navigate to your Sophos PureMessage PostgreSQL database directory:
cd /opt/pmx/postgres-8.3.3/bin
Step 2 Access the pmx_quarantine database SQL prompt:
./psql -d pmx_quarantine
Step 3 Type the following command to create a SIEM view in your Sophos database to
support JSA:
create view siem_view as select 'Linux PureMessage' as
application, id, b.name, m_date, h_from_local, h_from_domain,
m_global_id, m_message_size, outbound, h_to, c_subject_utf8 from
message a, m_reason b where a.reason_id = b.reason_id;
After you create your database view, you must configure JSA to receive event
information using the JDBC protocol.
NOTE
Note: You must refer to the Configure Database Settings on your Sophos
PureMessage to define the parameters required to configure the Sophos
PureMessage DSM in JSA.
Configuring DSMs
Sophos PureMessage 665
Parameter Description
Log Source Type the identifier for the log source. Type the log source identifier
Identifier in the following format:
<Sophos PureMessage Database>@<Sophos PureMessage
Database Server IP or Host Name>
Where:
<Sophos PureMessage Database> is the database name, as
entered in the Database Name parameter.
<Sophos PureMessage Database Server IP or Host
Name> is the hostname or IP address for this log source, as
entered in the IP or Hostname parameter.
When defining a name for your log source identifier, you must use
the values of the Database and Database Server IP address or
hostname of the Sophos PureMessage device.
Database Type From the list box, select Postgres.
Database Name Type pmx_quarantine.
IP or Hostname Type the IP address or host name of the Sophos PureMessage
server.
Port Type the port number used by the database server. The default
port is 1532.
The JDBC configuration port must match the listener port of the
Sophos database. The Sophos database must have incoming TCP
connections enabled to communicate with JSA.
Username Type the username required to access the database.
Password Type the password required to access the database. The
password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password parameter.
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type siem_view as the name of the table or view that includes
the event records.
Configuring DSMs
666 SOPHOS
Parameter Description
Select List Type * for all fields from the table or view.
You can use a comma-separated list to define specific fields from
tables or views, if required for your configuration. The list must
contain the field defined in the Compare Field parameter. The
comma-separated list can be up to 255 alphanumeric characters in
length. The list can include the following special characters: dollar
sign ($), number sign (#), underscore (_), en dash (-), and
period(.).
Compare Field Type ID.
The Compare Field parameter is used to identify new events
added between queries to the table.
Use Prepared Select this check box to use prepared statements.
Statements
Prepared statements allows the JDBC protocol source to set up
the SQL statement one time, then run the SQL statement many
times with different parameters. For security and performance
reasons, we recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Start Date and Optional. Type the start date and time for database polling.
Time The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24-hour clock. If
the Start Date and Time parameter is clear, polling begins
immediately and repeats at the specified polling interval.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
Sophos PureMessage log source with a higher importance compared to other log
sources in JSA.
Configuring DSMs
Sophos Astaro Security Gateway 667
Sophos Astaro The Sophos Astaro Security Gateway DSM for JSA accepts events using syslog,
Security Gateway enabling JSA to record all relevant events.
Configure Syslog for To configure syslog for Sophos Astaro Security Gateway:
Sophos Astaro
Step 1 Log in to the Sophos Astaro Security Gateway console.
Step 2 From the navigation menu, select Logging > Settings.
Step 3 Click the Remote Syslog Server tab.
The Remote Syslog Status window is displayed.
Step 4 From Syslog Servers panel, click the + icon.
The Add Syslog Server window is displayed.
Step 5 Configure the following parameters:
a Name - Type a name for the syslog server.
b Server - Click the folder icon to add a pre-defined host, or click + and type in
new network definition.
c Port - Click the folder icon to add a pre-defined port, or click + and type in a new
service definition.
By default, JSA communicates using the syslog protocol on UDP/TCP port 514.
Step 6 Click Save.
Step 7 From the Remote syslog log selection field, you must select check boxes for the
following logs:
a POP3 Proxy - Select this check box.
b Packet Filter - Select this check box.
c Intrusion Prevention System - Select this check box.
d Content Filter(HTTPS) - Select this check box.
e High availability - Select this check box.
f FTP Proxy - Select this check box.
g SSL VPN - Select this check box.
h PPTP daemon- Select this check box.
i IPSEC VPN - Select this check box.
j HTTP daemon - Select this check box.
k User authentication daemon - Select this check box.
l SMTP proxy - Select this check box.
Step 8 Click Apply.
Step 9 From Remote syslog status section, click Enable.
Configuring DSMs
668 SOPHOS
Step 10 You are now ready to configure the log source in JSA.
To configure JSA to receive events from your Sophos Astaro Security Gateway
device:
From the Log Source Type list box, select Sophos Astaro Security
Gateway.
For more information on configuring log sources, see the Log Sources Users
Guide.
Sophos Web The Sophos Web Security Appliance (WSA) DSM for JSA accepts events using
Security Appliance syslog.
JSA records all relevant events forwarded from the transaction log of the Sophos
Web Security Appliance. Before configuring JSA, you must configure your Sophos
WSA appliance to forward syslog events.
Configure Syslog for To configure your Sophos Web Security Appliance to forward syslog events:
Sophos Web Security
Appliance
JSA automatically detects syslog data from a Sophos Web Security Appliance. To
manually configure JSA to receive events from Sophos Web Security Appliance:
From the Log Source Type list box, select Sophos Web Security
Appliance.
For more information on configuring log sources, see the Log Sources Users
Guide.
Configuring DSMs
100 SOURCEFIRE
Sourcefire Defense The Sourcefire Defense Center DSM for Juniper Secure Analytics (JSA) accepts
Center (DC) Sourcefire Defense Center events using the eStreamer API service.
Supported Versions JSA supports the following versions of Sourcefire Defense Center:
• Sourcefire Defense Center v4.8.2.x and above
• Sourcefire Defense Center v5.x
You must download and install one of the following hotfixes from the Sourcefire
website to collect Sourcefire Defense Center 5.x events in JSA:
- Sourcfire_hotfix-v5.1.0-0-build_1.tar
- Sourcfire_hotfix-v5.1.1-0-build_1.tar
For more information on hotfixes for your Sourcefire appliance, see the
Sourcefire website.
Configuration Integrating with Sourcefire Defense Center requires that you create certificates in
Overview the Sourcefire Defense Center interface, then add the certificates to JSA
appliances that receive eStreamer event data.
Configuring DSMs
670 SOURCEFIRE
The following steps are required to integrate JSA with Sourcefire Defense Center:
1 Create the eStreamer certificate on your Sourcefire Defense Center appliance.
2 Add the Sourcefire Defense Center certificate files to JSA.
3 Configure a log source in JSA for your Sourcefire Defense Center appliances.
Supported Event JSA supports the following event types from Sourcefire Defense Center:
Types
• Intrusion events and extra data
Intrusion events categorized by the Sourcefire Defense Center DSM in JSA use
the same JSA Identifiers (QIDs) as the Snort DSM. To ensure that all intrusion
events are categorized properly, you can download and install the latest Snort
DSM from http://www.juniper.net/customers/support/.
Intrusion events in the 1,000,000 to 2,000,000 range are user-defined rules in
Sourcefire Defense Center. User-defined rules that generate events are added
as an Unknown event in JSA, but include additional information describing the
event type. For example, a user-defined event can identify as Unknown:Buffer
Overflow for Sourcefire Defense Center.
• Correlation events
• Metadata events
• Discovery events
• Host events
• User events
Creating Sourcefire Certificates are created by Sourcefire Defense Center appliances in your
4.x Certificates deployment.
JSA requires a certificate for every Sourcefire Defense Center appliance in your
deployment. Certificates are generated in pkcs12 format and must be converted to
a keystore and truststore file, which are usable by JSA appliances.
Procedure
Step 1 Log in to your Sourcefire Defense Center interface.
Step 2 Select Operations > Configuration > eStreamer.
Step 3 Click the eStreamer tab.
Step 4 Click Create Client.
Step 5 Select check boxes for the event types Sourcefire Defense Center provides to
JSA.
Step 6 Click + Create Client located in the upper right-side of the interface.
Step 7 In the Hostname field, type the IP address or hostname.
Configuring DSMs
Sourcefire Defense Center (DC) 671
• If you are collect all events on your JSA console or using an All-in-one
appliance to collect sStreamer events, type the IP address or hostname of your
JSA console.
• If you are using a remote Event Collector to collect eStreamer events, type the
IP address or hostname for the remote Event Collector.
• If you are using High Availability (HA), type the virtual IP address.
Step 8 In the Password field, leave the password field blank or type a password for your
certificate.
Step 9 Click Save.
The new client is added to the Streamer Client list and the host is allowed to
communicate with the eStreamer API on port 8302.
Step 10 From the Certificate Location column, click the client you created to save the
pkcs12 certificate to a file location and click OK.
You are now ready to import your Sourcefire Defense Center certificate to your
JSA appliance.
Creating Sourcefire Certificates are created by Sourcefire Defense Center appliances in your
5.x Certificates deployment.
JSA requires a certificate for every Sourcefire Defense Center appliance in your
deployment. Certificates are generated in pkcs12 format and must be converted to
a keystore and truststore file, which are usable by JSA appliances.
Procedure
Step 1 Log in to your Sourcefire Defense Center interface.
Step 2 Select System > Local > Registration.
Step 3 Click the eStreamer tab.
Step 4 Select check boxes for the event types Sourcefire Defense Center provides to
JSA.
WARNING
WARNING: For Sourcefire Defense Center 5.x, you must clear the Impact Flag
Alerts check box.
Configuring DSMs
672 SOURCEFIRE
• If you are using an Event Collector to collect eStreamer events, type the IP
address or hostname for the Event Collector.
• If you are using High Availability (HA), type the virtual IP address.
Step 8 In the Password field, leave the password field blank or type a password for your
certificate.
Step 9 Click Save.
The new client is added to the Streamer Client list and the host is allowed to
communicate with the eStreamer API on port 8302.
Step 10 Click the download arrow for your host to save the pkcs12 certificate to a file
location.
Step 11 Click OK to download the file.
You are now ready to import your Sourcefire Defense Center certificate to your
JSA appliance.
Importing a The estreamer-cert-import.pl script for JSA is responsible for converting your
Certificate to JSA pkcs12 certificate file to a keystore and truststore file and placing certificates in the
proper directory on your JSA appliance.
The script can only convert and import one pkcs12 file at a time, as bulk certificate
importing is not supported. You can repeat this procedure for each Sourcefire
Defense Center pcks12 certificate you need to import to your JSA console or
Event Collector. It is not necessary to import a certificate to both the JSA console
and an Event Collector. You are only required to import a certificate for the JSA
appliance that manages the Sourcefire Defense Center log source. After the
Sourcfire event is categorized and normalized by an Event Collector in a JSA
distributed deployment, it is forwarded to the JSA console. The certificate is only
required at the point of entry of the Sourcefire event.
Procedure
Step 1 Using SSH, log in to your JSA console or Event Collector as the root user.
User name: root
Password: <password>
Configuring DSMs
Sourcefire Defense Center (DC) 673
Step 2 Copy the pkcs12 certificate from your Sourcefire Defense Center appliance to the
following directory in JSA:
/opt/qradar/bin/
Step 3 Type the following command and any additional option parameters to import your
pkcs12 file:
/opt/qradar/bin/estreamer-cert-import.pl -f <file name>
<options>
Where:
<file name> is the file name of the pkcs12 file created by your Sourcefire
Defense Center appliance.
<options> are any additional import script parameters from Table 100-1.
For example,
/opt/qradar/bin/estreamer-cert-import.pl -f 192.168.0.1.pkcs12
Parameter Description
-f The -f parameter identifies the file name of the pkcs12 files to
import. This parameter is required to import certificates.
-o The -o parameter allows you to overrides the default
estreamer name for the keystore and truststore files. The -o
parameter is required when using multiple Sourcefire
Defense Center devices, as unique key file names are
required.
For example,
/opt/qradar/bin/estreamer-cert-import.pl -f
<file name> -o 192.168.1.100
The import script creates the following files:
/opt/qradar/conf/192.168.0.100.keystore
/opt/qradar/conf/192.168.0.100.truststore
-d The -d parameter enables verbose mode when using the
import script.
Verbose mode is intended to display error messages for
troubleshooting purposes when pkcs12 files fail to import
properly.
-p The -p parameter allows you to specify a password if a
password was accidently provided when generating the
pkcs12 file.
-v The -v parameter displays the version information for the
import script.
-h The -h parameter displays a help message on using the
import script.
Configuring DSMs
674 SOURCEFIRE
The import script creates a keystore and truststore file in the following location:
/opt/qradar/conf/estreamer.keystore
/opt/qradar/conf/estreamer.truststore
Configure a Log You must configure a log source in JSA as Sourcefire Defense Center events do
Source not automatically discover.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 Select the Sourcefire Defense Center option from the Log Source Type list box.
Step 7 From the Protocol Configuration list box, select Sourcefire Defense Center
Estreamer.
Step 8 Configure the following parameters:
Parameter Description
Log Source Identifier Type the IP address or hostname to identify the log source.
The information in the Log Source Identifier field must be
unique to the log source type.
Server Address Type the IP address or hostname of the Sourcefire Defense
Center device.
Server Port Type the port number JSA uses to receive Sourcefire
Defense Center Estreamer events.
The default is 8302.
Keystore Filename Type the directory path and file name for the keystore private
key and associated certificate.
By default, the import script creates the keystore file in the
following directory:
/opt/qradar/conf/estreamer.keystore
Truststore Filename Type the directory path and file name for the truststore files.
The truststore file contain the certificates trusted by the client.
By default, the import script creates the truststore file in the
following directory:
/opt/qradar/conf/estreamer.truststore
Configuring DSMs
Sourcefire Intrusion Sensor 675
Step 9 Optional. Repeat this process to create log sources to receive eStreamer events
from additional Sourcefire Defense Center appliances in your deployment.
For more information about Sourcefire, see the Sourcefire documentation, see
http://www.sourcefire.com
Sourcefire The Sourcefire Intrusion Sensor DSM for JSA accepts Snort based intrusion and
Intrusion Sensor prevention syslog events from Sourcefire devices.
Configuring To configure your Sourcefire Intrusion Sensor, you must enable policy alerts and
Sourcefire Intrusion configure your appliance to forward the event to JSA.
Sensor
Procedure
Step 1 Log in to your Sourcefire user interface.
Step 2 On the navigation menu, select Intrusion Sensor > Detection Policy > Edit.
Step 3 Select an active policy and click Edit.
Step 4 Click Alerting.
Step 5 In the State field, select on to enable the syslog alert for your policy.
Step 6 From the Facility list box, select Alert.
Step 7 From the Priority list box, select Alert.
Step 8 In the Logging Host field, type the IP address of the JSA console or Event
Collector.
Step 9 Click Save.
Step 10 On the navigation menu, select Intrusion Sensor > Detection Policy > Apply.
Step 11 Click Apply.
You are now ready to configure the log source in JSA.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source in JSA Sourcefire Intrusion Sensor. However, you can manually create a log source for
JSA to receive syslog events. The following procedure is optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Configuring DSMs
676 SOURCEFIRE
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Snort Open Source IDS.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Sourcefire Intrusion Sensor
appliance.
Configuring DSMs
101 SPLUNK
Juniper Secure Analytics (JSA) accepts and parses multiple event types forwarded
from Splunk appliances.
Collect Windows To collect events, you can configure your Windows end points to forward events to
Events Forwarded your JSA console and your Splunk indexer.
from Splunk
Appliances Forwarding Windows events from aggregation nodes in your Splunk deployment is
not suggested. Splunk indexers that forward events from multiple Windows end
points to JSA can obscure the true source of the events with the IP address of the
Splunk indexer. To prevent a situation where an incorrect IP address association
might occur in the log source, you can update your Windows end point systems to
forward to both the indexer and your JSA console.
Splunk events are parsed by using the Microsoft Windows Security Event Log
DSM with the TCP multiline syslog protocol. The regular expression configured in
the protocol defines where a Splunk event starts or ends in the event payload. The
event pattern allows JSA to assemble the raw Windows event payload as a
single-line event that is readable by JSA. The regular expression required to
collect Windows events is outlined in the log source configuration.
Configuring DSMs
678 SPLUNK
To configure event collection for Splunk syslog events, you must complete the
following tasks:
1 On your JSA appliance, configure a log source to use the Microsoft Windows
Security Event Log DSM.
NOTE
Note: You must configure one log source for Splunk events. JSA can use the first
log source to autodiscover additional Windows end points.
Configuring a Log To collect raw events forwarded from Splunk, you must configure a log source in
Source for Splunk JSA.
Forwarded Events
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 Optional. In the Log Source Description field, type a description for your log
source.
Step 8 From the Log Source Type list box, select Microsoft Windows Security Event
Log.
Step 9 From the Protocol Configuration list box, select TCP Multiline Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Splunk appliance.
The log source identifier must be unique value.
Configuring DSMs
Collect Windows Events Forwarded from Splunk Appliances 679
Parameter Description
Listen Port Type the port number used by JSA to accept incoming TCP
multiline syslog events from Splunk.
The default listen port is 12468.
The port number you configure must match the port that you
configured on your Splunk Forwarder. You can use the listen
port to collect events from up to 50 event sources that have a
common event pattern. You cannot specify port 514 in this
field.
Event Formatter From the list box, select Windows Multiline.
The event formatter ensures the format of the TCP multiline
event matches the event pattern for the event type you
selected.
Event Start Pattern Type the following regular expression (regex) to identify the
start of your Splunk windows event:
(?:<(\d+)>\s?(\w{3} \d{2} \d{2}:\d{2}:\d{2})
(\S+) )?(\d{2}/\d{2}/\d{4} \d{2}:\d{2}:\d{2}
[AP]M)
The TCP multiline syslog protocol captures all the information
between each occurrence of the defined regex pattern to
create single-line syslog events.
Event End Pattern This field can be cleared of any regex patterns.
Enabled Select this check box to enable the log source. By default, the
check box is selected.
Credibility From the list box, select the credibility of the log source. The
range is 0 - 10.
The credibility indicates the integrity of an event or offense as
determined by the credibility rating from the source devices.
Credibility increases if multiple sources report the same event.
The default is 5.
Target Event From the list box, select the Event Collector to use as the
Collector target for the log source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Configuring DSMs
680 SPLUNK
Parameter Description
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Configuring DSMs
102 SQUID WEB PROXY
The Squid Web Proxy DSM for Juniper Secure Analytics (JSA) records all cache
and access log events using syslog.
To integrate JSA with Squid Web Proxy, you must configure your Squid Web Proxy
to forward your cache and access logs using syslog.
Configure Syslog To configure Squid Web Proxy to forward your access and cache events using
Forwarding syslog:
Step 1 Using SSH, log in to the Squid device command-line interface (CLI).
Step 2 Open the following file:
/etc/rc3.d/S99local
Step 3 Add the following line:
tail -f /var/log/squid/access.log | logger -p
<facility>.<priority> &
Where:
<facility> is any valid syslog facility (such as, authpriv, daemon, local0 to
local7, or user) written in lowercase.
<priority> is any valid priority (such as, err, warning, notice, info, debug) written
in lowercase.
Step 4 Save and close the file.
Logging begins the next time the system is rebooted.
Step 5 To begin logging immediately, type the following command:
nohup tail -f /var/log/squid/access.log | logger -p
<facility>.<priority> &
Where <facility> and <priority> are the same values entered in Step 3.
Step 6 Open the following file:
/etc/squid/squid.conf
Configuring DSMs
682 SQUID WEB PROXY
Step 7 Add the following line to send the logs to the JSA:
<prioirty>.<facility> @<JSA_IP_address>
Where:
<priority> is the priority of your Squid messages
<facility> is the facility of your Squid messages
<JSA_IP_address> is the IP address or hostname of your JSA.
For example:
info.local4 @172.16.210.50
Step 8 Add the following line to squid.conf to turn off Squid httpd log emulation:
emulate_httpd_log off
Step 9 Save and close the file.
Step 10 Type the following command to restart the syslog daemon:
/etc/init.d/syslog restart
For more information on configuring Squid Web Proxy, consult your vendor
documentation. After you configure syslog forwarding your cache and access logs,
the configuration is complete. JSA can automatically discover syslog events
forwarded from Squid Web Proxy.
Create a Log Source JSA automatically discovers and creates a log source for syslog events forwarded
from Squid Web Proxy appliances. These configuration steps for creating a log
source are optional.
Configuring DSMs
683
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for events from the Squid Web Proxy.
Configuring DSMs
103 STARENT NETWORKS
The Starent Networks DSM for Juniper Secure Analytics (JSA) accepts Event,
Trace, Active, and Monitor events.
Before configuring a Starent Networks device in JSA, you must configure your
Starent Networks device to forward syslog events to JSA.
Parameter Description
syslog <IP address> Type the IP address of your JSA
facility <facilities> Type the local facility for which the logging options shall be
applied. The options are:
• local0
• local1
• local2
• local3
• local4
• local5
• local6
• local7
The default is local7.
rate value Type the rate that you want log entries to be sent to the system
log server. This value must be an integer from 0 to 100000.
The default is 1000 events per second.
Configuring DSMs
686 STARENT NETWORKS
Parameter Description
pdu-verbosity Type the level of verboseness you want to use in logging the
<pdu-level> Protocol Data Units (PDUs). The range is 1 to 5 where 5 is the
most detailed. This parameter only affects protocol logs.
pdu-data <format> Type the output format for the PDU when logged as one of
following formats:
• none - Displays results in raw or unformatted text.
• hex - Displays results in hexadecimal format.
• hex-ascii - Displays results in hexadecimal and ASCII
format similar to a main frame dump.
event-verbosity Type the level of detail you want to use in logging of events,
<event_level> including:
• min - Provides minimal information about the event, such
as, event name, facility, event ID, severity level, data, and
time.
• concise - Provides detailed information about the event, but
does not provide the event source.
• full - Provides detailed information about the event including
the source information identifying the task or subsystem that
generated the event.
Step 3 From the root prompt for the Exec mode, identify the session for which the trace
log is to be generated:
logging trace {callid <call_id> | ipaddr <IP address> | msid
<ms_id> | name <username>}
The following table provides the necessary parameters:
Table 103-2 Trace Log Parameters
Parameter Description
callid <call_id> Indicates a trace log is generated for a session identified by the
call identification number. This value is a 4-byte hexadecimal
number.
ipaddr <IP address> Indicates a trace log is generated for a session identified by the
specified IP address.
msid <ms_id> Indicates a trace log is generated for a session identified by the
mobile station identification (MSID) number. This value must
be from 7 to 16 digits, specified as an IMSI, MIN, or RMI.
name <username> Indicates a trace log is generated for a session identified by the
username. This value is the name of the subscriber that was
previously configured.
Step 4 To write active logs to the active memory buffer, in the config mode:
logging runtime buffer store all-events
Configuring DSMs
687
Parameter Description
facility <facility> Type the facility message level. A facility is a protocol or task
that is in use by the system. The local facility defines which
logging options shall be applied for processes running locally.
The options are:
• local0
• local1
• local2
• local3
• local4
• local5
• local6
• local7
The default is local7.
level <report_level> Type the log severity level, including:
• critical - Logs only those events indicating a serious error
has occurred that is causing the system or a system
component to cease functioning. This is the highest level
severity.
• error - Logs events that indicate an error has occurred that
is causing the system or a system component to operate in
a degraded date. This level also logs events with a higher
severity level.
• warning - Logs events that can indicate a potential problem.
This level also logs events with a higher severity level.
• unusual - Logs events that are very unusual and might
need to be investigated. This level also logs events with a
higher severity level.
• info - Logs informational events and events with a higher
severity level.
• debug - Logs all events regardless of the severity.
We recommend that a level of error or critical can be
configured to maximize the value of the logged information
while minimizing the quantity of logs generated.
critical-info The critical-info parameter identifies and displays events with a
category attribute of critical information. Examples of these
types of events can be seen at bootup when system processes
or tasks are being initiated.
Configuring DSMs
688 STARENT NETWORKS
Parameter Description
no-critical-info The no-critical-info parameter specifies that events with a
category attribute of critical information are not displayed.
Parameter Description
msid <md_id> Type an msid to define that a monitor log is generated for a
session identified using the Mobile Station Identification
(MDID) number. This value must be between 7 and 16 digits
specified as a IMSI, MIN, or RMI.
username Type username to identify a monitor log generated for a
<username> session by the username. The username is the name of the
subscriber that was previously configured.
From the Log Source Type list box, select the Starent Networks Home
Agent (HA) option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about the device, see your vendor documentation.
Configuring DSMs
104 STEALTHBITS
STEALTHINTERCEPT
STEALTHbits To integrate STEALTHbits StealthINTERCEPT DSM with JSA, use the following
StealthINTERCEPT procedure:
DSM Integration
Process
Configuring DSMs
690 STEALTHBITS STEALTHINTERCEPT
1 If automatic updates are not enabled, download and install the most recent RPM
files on your JSA console. RPMs need to be installed only one time. The most
recent version of the following RPM files are required:
• DSMCommon RPM
• STEALTHbits StealthINTERCEPT RPM
2 For each instance of STEALTHbits StealthINTERCEPT, configure you
STEALTHbits StealthINTERCEPT system to enable communication with JSA.
3 If JSA does not automatically discover the log source, for each STEALTHbits
StealthINTERCEPT server that you want to integrate, create a log source on the
JSA console.
Related tasks
• Manually Installing a DSM
• Configuring your STEALTHbits StealthINTERCEPT System for
Communication with JSA
• Configuring a STEALTHbits StealthINTERCEPT Log Source in JSA
Configuring your To collect all audit logs and system events from STEALTHbits StealthINTERCEPT,
STEALTHbits you must specify JSA as the syslog server and configure the message format.
StealthINTERCEPT
System for Procedure
Communication To configure your STEALTHbits StealthINTERCEPT system for communication
with JSA with JSA:
Step 1 Log in to your STEALTHbits StealthINTERCEPT server.
Step 2 Start the Administration console.
Step 3 Click Configuration > Syslog Server.
Step 4 Configure the following parameters:
Table 104-2 Parameters to Configure your STEALTHbits StealthINTERCEPT System
Parameter Description
Host Address The IP address of the JSA
console
Port 514
Configuring DSMs
Configuring a STEALTHbits StealthINTERCEPT Log Source in JSA 691
Tip: Leave the Send to Events DB check box selected. StealthINTERCEPT uses
the events database to generate reports.
Configuring DSMs
105 STONESOFT MANAGEMENT CENTER
The Stonesoft Management Center DSM for Juniper Secure Analytics (JSA)
accepts events using syslog.
JSA records all relevant LEEF formatted syslog events. Before configuring JSA,
you must configure your Stonesoft Management Center to export LEEF formatted
syslog events.
Configuring DSMs
694 STONESOFT MANAGEMENT CENTER
Configure a Syslog If the Stonesoft Management Center and JSA are separated by a firewall in your
Traffic Rule network, you must modify your firewall or IPS policy to allow traffic between the
Stonesoft Management Center and JSA.
Procedure
Step 1 From the Stonesoft Management Center, select one of the following methods for
modifying a traffic rule:
• Firewall policies - Select Configuration > Configuration > Firewall.
• IPS policies - Select Configuration > Configuration > IPS.
Step 2 Select the type of policy to modify:
• Firewall - Select Firewall Policies > Edit Firewall Policy.
• IPS - Select IPS Policies > Edit Firewall Policy.
Configuring DSMs
695
Step 3 Add an IPv4 Access rule with the following values to the firewall policy:
a Source - Type the IPv4 address of your Stonesoft Management Center Log
Server.
b Destination - Type the IPv4 address of your JSA console or Event Collector.
c Service - Select Syslog (UDP).
d Action - Select Allow.
e Logging - Select None.
Note: In most cases, we recommend setting the logging value to None. Logging
syslog connections without configuring a syslog filter can create a loop. For more
information, see the StoneGate Management Center Administrator’s Guide.
Step 4 Save your changes and refresh the policy on the firewall or IPS.
You are now ready to configure the log source in JSA.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source Stonesoft Management Center. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Stonesoft Management Center.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Stonesoft Management Center
appliance.
Configuring DSMs
106 SUN SOLARIS
Sun Solaris The Sun Solaris DSM for records all relevant Solaris authentication events using
syslog.
Configuring Sun To collect authentication events from Sun Solaris, you must configure syslog to
Solaris forward events to Juniper Secure Analytics (JSA).
Procedure
Step 1 Log in to the Sun Solaris command-line interface.
Step 2 Open the /etc/syslog.conf file.
Step 3 To forward system authentication logs to JSA, add the following line to the file:
*.err;auth.notice;auth.info @<IP address>
Where <IP address> is the IP address of your JSA. Use tabs instead of spaces
to format the line.
NOTE
Note: Depending on the version of Solaris you are running, you might need to add
additional log types to the file. Contact your system administrator for more
information.
Configuring DSMs
698 SUN SOLARIS
Configuring a Sun JSA automatically discovers and creates a log source for syslog events from Sun
Solaris DHCP Log Solaris DHCP installations. The following configuration steps are optional.
Source
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Solaris Operating System
Authentication Messages.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for events from Sun Solaris installations.
Each additional log source you create when you have
multiple installations should include a unique identifier, such
as an IP address or host name.
Sun Solaris DHCP The Sun Solaris DHCP DSM for JSA records all relevant DHCP events using
syslog.
Configuring Sun To collect events from Sun Solaris DHCP, you must configure syslog to forward
Solaris DHCP events to JSA.
Procedure
Step 1 Log in to the Sun Solaris command-line interface.
Step 2 Edit the /etc/default/dhcp file.
Step 3 Enable logging of DHCP transactions to syslog by adding the following line:
LOGGING_FACILITY=X
Configuring DSMs
Sun Solaris DHCP 699
Configuring a Sun JSA automatically discovers and creates a log source for syslog events from Sun
Solaris DHCP Log Solaris DHCP installations. The following configuration steps are optional.
Source
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Solaris Operating System DHCP
Logs.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for events from Sun Solaris DHCP installations.
Each additional log source you create when you have
multiple installations should include a unique identifier, such
as an IP address or host name.
Configuring DSMs
700 SUN SOLARIS
Sun Solaris The Sun Solaris Sendmail DSM for JSA accepts Solaris authentication events
Sendmail using syslog and records all relevant sendmail events.
Configuring Syslog To collect events from Sun Solaris Sendmail, you must configure syslog to forward
for Sun Solaris events to JSA.
Sendmail
Procedure
Step 1 Log in to the Sun Solaris command-line interface.
Step 2 Open the /etc/syslog.conf file.
Step 3 To forward system authentication logs to JSA, add the following line to the file:
mail.*; @<IP address>
Where <IP address> is the IP address of your JSA. Use tabs instead of spaces
to format the line.
NOTE
Note: Depending on the version of Solaris you are running, you might need to add
additional log types to the file. Contact your system administrator for more
information.
Configuring a Sun JSA automatically discovers and creates a log source for syslog events from Sun
Solaris Sendmail Log Solaris Sendmail appliances. The following configuration steps are optional.
Source
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Configuring DSMs
Sun Solaris Basic Security Mode (BSM) 701
Step 8 From the Log Source Type list box, select Solaris Operating System Sendmail
Logs.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for events from Sun Solaris Sendmail installations.
Each additional log source you create when you have
multiple installations should include a unique identifier, such
as an IP address or host name.
Sun Solaris Basic Sun Solaris Basic Security Mode (BSM) is an audit tracking tool for system
Security Mode administrator to retrieve detailed auditing events from Sun Solaris systems.
(BSM)
JSA retrieves Sun Solaris BSM events using the Log File protocol. To you
configure JSA to integrate with Solaris Basic Security Mode, you must:
1 Enable Solaris Basic Security Mode.
2 Convert audit logs from binary to a human-readable format.
3 Schedule a cron job to run the conversion script on a schedule.
4 Collect Sun Solaris events in JSA using the Log File protocol.
Enabling Basic To configure Sun Solaris BSM, you must enable Solaris Basic Security Mode and
Security Mode configure the classes of events the system logs to an audit log file.
Procedure
Step 1 Log in to your Solaris console as a superuser or root user.
Step 2 Enable single-user mode on your Solaris console.
Step 3 Type the following command to run the bsmconv script and enable auditing:
/etc/security/bsmconv
The bsmconv script enables Solaris Basic Security Mode and starts the auditing
service auditd.
Step 4 Type the following command to open the audit control log for editing:
vi /etc/security/audit_control
Configuring DSMs
702 SUN SOLARIS
Step 5 Edit the audit control file to contain the following information:
dir:/var/audit
flags:lo,ad,ex,-fw,-fc,-fd,-fr
naflags:lo,ad
Step 6 Save the changes to the audit_control file, then reboot the Solaris console to start
auditd.
Step 7 Type the following command to verify auditd has started:
/user/sbin/auditconfig -getcond
If the auditd process is started, the following string is returned:
audit condition = auditing
You are now ready to convert the binary Solaris Basic Security Mode logs to a
human-readable log format.
Converting Sun JSA cannot process binary files directly from Sun Solaris BSM. You must convert
Solaris BSM Audit the audit log from the existing binary format to a human-readable log format using
Logs praudit before the audit log data can be retrieved by JSA.
Procedure
Step 1 Type the following command to create a new script on your Sun Solaris console:
vi /etc/security/newauditlog.sh
Step 2 Add the following information to the newauditlog.sh script:
#!/bin/bash
#
# newauditlog.sh - Start a new audit file and expire the old
logs
#
AUDIT_EXPIRE=30
AUDIT_DIR="/var/audit"
LOG_DIR="/var/log/"
/usr/sbin/audit -n
# Get a listing of the files based on creation date that are not
current in use
FILES=$(ls -lrt | tr -s " " | cut -d" " -f9 | grep -v
"not_terminated")
Configuring DSMs
Sun Solaris Basic Security Mode (BSM) 703
lastFile=""
for file in $FILES; do
lastFile=$file
done
Creating a Cron Job Cron is a Solaris daemon utility that automates scripts and commands to run
system-wide on a scheduled basis.
The following steps provide an example for automating newauditlog.sh to run daily
at midnight. If you need to retrieve log files multiple times a day from your Solaris
system, you must alter your cron schedule accordingly.
Procedure
Step 1 Type the following command to create a copy of your cron file:
crontab -l > cronfile
Step 2 Type the following command to edit the cronfile:
vi cronfile
Step 3 Add the following information to your cronfile:
0 0 * * * /etc/security/newauditlog.sh
Configuring DSMs
704 SUN SOLARIS
What to do next
You are now ready to configure a log source in JSA.
Configuring a Log A log file protocol source allows JSA to retrieve archived log files from a remote
Source for Sun host. Sun Solaris BSM supports the bulk loading of audit log files using the log file
Solaris BSM protocol.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 From the Log Source Type list box, select Solaris BSM.
Step 6 Using the Protocol Configuration list box, select Log File.
Step 7 Configure the following parameters:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source. The log
source identifier must be unique for the log source type.
Service Type From the list box, select the protocol you want to use when
retrieving log files from a remove server. The default is SFTP.
• SFTP - SSH File Transfer Protocol
• FTP - File Transfer Protocol
• SCP - Secure Copy
Note: The underlying protocol used to retrieve log files for the
SCP and SFTP service types requires that the server
specified in the Remote IP or Hostname field has the SFTP
subsystem enabled.
Remote IP or Type the IP address or hostname of the Sun Solaris BSM
Hostname system.
Remote Port Type the TCP port on the remote host that is running the
selected Service Type. If you configure the Service Type as
FTP, the default is 21. If you configure the Service Type as
SFTP or SCP, the default is 22.
The valid range is 1 to 65535.
Configuring DSMs
Sun Solaris Basic Security Mode (BSM) 705
Parameter Description
Remote User Type the username necessary to log in to your Sun Solaris
system.
The username can be up to 255 characters in length.
Remote Password Type the password necessary to log in to your Sun Solaris
system.
Confirm Password Confirm the Remote Password to log in to your Sun Solaris
system.
SSH Key File If you select SCP or SFTP from the Service Type field you
can define a directory path to an SSH private key file. The
SSH Private Key File allows you to ignore the Remote
Password field.
Remote Directory Type the directory location on the remote host from which the
files are retrieved. By default, the newauditlog.sh script writes
the human-readable logs files to the /var/log/ directory.
Recursive Select this check box if you want the file pattern to also search
sub folders. The Recursive parameter is not used if you
configure SCP as the Service Type. By default, the check box
is clear.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
For example, if you want to retrieve all files in the
<starttime>.<endtime>.<hostname>.log format, use the
following entry: \d+\.\d+\.\w+\.log.
Use of this parameter requires knowledge of regular
expressions (regex). For more information, see the following
website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only appears if you select FTP as the Service
Type. The FTP Transfer Mode parameter allows you to define
the file transfer mode when retrieving log files over FTP.
From the list box, select the transfer mode you want to apply
to this log source:
• Binary - Select Binary for log sources that require binary
data files or compressed .zip, .gzip, .tar, or .tar+gzip
archive files.
• ASCII - Select ASCII for log sources that require an ASCII
FTP file transfer. You must select NONE for the Processor
field and LINEBYLINE the Event Generator field when
using ASCII as the transfer mode.
SCP Remote File If you select SCP as the Service Type, you must type the file
name of the remote file.
Configuring DSMs
706 SUN SOLARIS
Parameter Description
Start Time Type the time of day you want the processing to begin. This
parameter functions with the Recurrence value to establish
when and how often the Remote Directory is scanned for files.
Type the start time, based on a 24 hour clock, in the following
format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the directory to be scanned
every 2 hours. The default is 1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save. After the Run On Save
completes, the log file protocol follows your configured start
time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File(s) parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor If the files located on the remote host are stored in a .zip,
.gzip, .tar, or tar+gzip archive format, select the processor that
allows the archives to be expanded and contents processed.
Ignore Previously Select this check box to track files that have already been
Processed File(s) processed and you do not want the files to be processed a
second time. This only applies to FTP and SFTP Service
Types.
Change Local Select this check box to define the local directory on your JSA
Directory? system that you want to use for storing downloaded files
during processing. We recommend that you leave the check
box clear. When the check box is selected, the Local Directory
field is displayed, which allows you to configure the local
directory to use for storing files.
Event Generator From the Event Generator list box, select LINEBYLINE.
Sun ONE LDAP The Sun ONE LDAP DSM for JSA accepts multiline UDP access and LDAP events
from Sun ONE Directory Servers with the log file protocol.
Configuration JSA retrieves access and LDAP events from Sun ONE Directory Servers by
Overview connecting to each server to download the event log. The event file must be
written to a location accessible by the log file protocol of JSA with FTP, SFTP, or
SCP. The event log is written in a multiline event format, which requires a special
Configuring DSMs
Sun ONE LDAP 707
event generator in the log file protocol to properly parse the event. The ID-Linked
Multiline event generator is capable of using regex to assemble multiline events for
JSA when each line of a multiline event shares a common starting value.
The Sun ONE LDAP DSM also can accept events streamed using the UDP
Multiline Syslog protocol. However, in most situations your system requires a 3rd
party syslog forwarder to forward the event log to JSA. This can require you to
redirect traffic on your JSA appliance to use the port defined by the UDP Multiline
protocol. For more information, see the Log Sources Users Guide.
Enabling the Event To collect events from Sun ONE Directory Server, you must enable the event log to
log for Sun ONE write events to a file.
Directory Server
Procedure
Step 1 Log in to your Sun ONE Directory Server console.
Step 2 Click the Configuration tab.
Step 3 From the navigation menu, select Logs.
Step 4 Click the Access Log tab.
Step 5 Select the Enable Logging check box.
Step 6 Type or click Browse to identify the directory path for your Sun ONE Directory
Server access logs.
Step 7 Click Save.
Step 8 The configuration of the access log for Sun ONE Directory Server is complete.
What to do next
You are now ready to configure a log source in JSA.
Configuring a Log To receive events, you must manually create a log source for your Sun ONE
Source for Sun ONE Directory Server as JSA does not automatically discover log file protocol events.
LDAP
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for your log source.
Step 8 From the Log Source Type list box, select Sun ONE LDAP.
Configuring DSMs
708 SUN SOLARIS
Step 9 From the Protocol Configuration list box, select Log File.
Step 10 From the Event Generator list box, select ID-Linked Multiline.
Step 11 In the Message ID Pattern field, type conn=(\d+) as the regular expression that
defines your multiline events.
Step 12 Configure the following values:
Parameter Description
Log Source Identifier Type an IP address, hostname, or name to identify the event
source. IP addresses or hostnames are recommended as
they allow JSA to identify a log file to a unique event source.
Configuring DSMs
Sun ONE LDAP 709
Parameter Description
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file. When
you provide an SSH Key File, the Remote Password field is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders. By default, the check box is clear.
The Recursive option is ignored if you configure SCP as the
Service Type.
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
For example, if you want to list all files starting with the word
log, followed by one or more digits and ending with tar.gz,
use the following entry: log[0-9]+\.tar\.gz. Use of this
parameter requires knowledge of regular expressions (regex).
For more information, see the following website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option only appears if you select FTP as the Service
Type. The FTP Transfer Mode parameter allows you to define
the file transfer mode when retrieving log files over FTP.
From the list box, select the transfer mode you want to apply
to this log source:
• Binary - Select Binary for log sources that require binary
data files or compressed zip, gzip, tar, or tar+gzip archive
files.
• ASCII - Select ASCII for log sources that require an ASCII
FTP file transfer.
You must select NONE for the Processor parameter and
LINEBYLINE the Event Generator parameter when using
ASCII as the FTP Transfer Mode.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want the processing to begin. This
parameter functions with the Recurrence value to establish
when and how often the Remote Directory is scanned for files.
Type the start time, based on a 24 hour clock, in the following
format: HH:MM.
Configuring DSMs
710 SUN SOLARIS
Parameter Description
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D). For example, 2H if you
want the directory to be scanned every 2 hours. The default is
1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save. After the Run On Save
completes, the log file protocol follows your configured start
time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Processor If the files located on the remote host are stored in a zip, gzip,
tar, or tar+gzip archive format, select the processor that
allows the archives to be expanded and contents processed.
Ignore Previously Select this check box to track files that have already been
Processed File(s) processed and you do not want the files to be processed a
second time.
This only applies to FTP and SFTP Service Types.
Change Local Select this check box to define the local directory on your JSA
Directory? that you want to use for storing downloaded files during
processing.
Most configurations can leave this check box clear. When you
select the check box, the Local Directory field is displayed,
which allows you to configure a local directory to use for
temporarily storing files.
Event Generator Select ID-Linked Multiline to process to the retrieved event
log as multiline events.
The ID-Linked Multiline format processes multiline event logs
that contain a common value at the start of each line in a
multiline event message. This option displays the Message ID
Pattern field that uses regex to identify and reassemble the
multiline event in to single event payload.
Folder Separator Type the character used to separate folders for your operating
system. The default value is /.
Most configurations can use the default value in Folder
Separator field. This field is only used by operating systems
that use an alternate character to define separate folders. For
example, periods that separate folders on mainframe
systems.
Configuring DSMs
107 SYBASE ASE
You can integrate a Sybase Adaptive Server Enterprise (ASE) device with Juniper
Secure Analytics (JSA) to record all relevant events using JDBC.
Configuring DSMs
712 SYBASE ASE
Configuring DSMs
108 SYMANTEC
Symantec Endpoint The Symantec Endpoint Protection DSM for Juniper Secure Analytics (JSA)
Protection accepts events using syslog.
JSA records all Audit and Security log events. Before configuring a Symantec
Endpoint Protection device in JSA, you must configure your device to forward
syslog events.
Procedure
Step 1 Log in to the Symantec Endpoint Protection Manager
Step 2 On the left panel, click the Admin icon.
The View Servers option is displayed.
Step 3 From the bottom of the View Servers panel, click Servers.
Step 4 From the View Servers panel, click Local Site.
Step 5 From the Tasks panel, click Configure External Logging.
Step 6 On the Generals tab:
a Select the Enable Transmission of Logs to a Syslog Server check box.
b In the Syslog Server field, type the IP address of your JSA you want to parse
the logs.
c In the UDP Destination Port field, type 514.
d In the Log Facility field, type 6.
Step 7 In the Log Filter tab:
a Under the Management Server Logs, select the Audit Logs check box.
Configuring DSMs
714 SYMANTEC
b Under the Client Log panel, select the Security Logs check box.
c Under the Client Log panel, select the Risks check box.
Step 8 Click OK.
You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Symantec Endpoint
Protection option.
For more information on configuring log sources, see the Log Sources Users
Guide.
Symantec SGS The Symantec Gateway Security (SGS) Appliance DSM for JSA accepts SGS
events using syslog.
JSA records all relevant events from SGS. Before you configure JSA to integrate
with an SGS, you must configure syslog within your SGS appliance. For more
information on Symantec SGS, see your vendor documentation.
After you configure syslog to forward events to JSA, the configuration is complete.
Events forward from Symantec SGS to JSA using syslog are automatically
discovered. However, if you want to manually create a log source for Symantec
SGS:
From the Log Source Type list box, select the Symantec Gateway Security
(SGS) Appliance option.
For more information on configuring devices, see the Log Sources Users Guide.
Symantec System The Symantec System Center (SSC) DSM for JSA retrieves events from an SSC
Center database using a custom view created for JSA.
JSA records all SSC events. You must configure the SSC database with a user
that has read and write privileges for the custom JSA view to be able to poll the
view for information. Symantec System Center (SSC) only supports the JDBC
protocol.
Configuring a A database view is required by the JDBC protocol to poll for SSC events.
Database View for
Symantec System Procedure
Center
Step 1 In the Microsoft SQL Server database used by the SSC device, configure a custom
default view to support JSA:
The database name must not contain any spaces.
Configuring DSMs
Symantec System Center 715
After you create your custom view, you must configure JSA to receive event
information using the JDBC protocol.
Configuring a Log To configure JSA to access the SSC database using the JDBC protocol.
Source
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 Using the Log Source Type list box, select Symantec System Center.
Step 7 Using the Protocol Configuration list box, select JDBC.
Configuring DSMs
716 SYMANTEC
Parameter Description
Log Source Type the identifier for the log source. Type the log source identifier
Identifier in the following format:
<SSC Database>@<SSC Database Server IP or Host
Name>
Where:
<SSC Database> is the database name, as entered in the
Database Name parameter.
<SSC Database Server IP or Host Name> is the
hostname or IP address for this log source, as entered in the IP or
Hostname parameter.
Database Type From the list box, select MSDE.
Database Name Type Reporting as the name of the Symantec System Center
database.
IP or Hostname Type the IP address or host name of the Symantec System Center
SQL Server.
Port Type the port number used by the database server. The default
port for MSDE is 1433.
The JDBC configuration port must match the listener port of the
Symantec System Center database. The Symantec System
Center database must have incoming TCP connections enabled to
communicate with JSA.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
configuration.
Username Type the username required to access the database.
Password Type the password required to access the database. The
password can be up to 255 characters in length.
Confirm Confirm the password required to access the database. The
Password confirmation password must be identical to the password entered
in the Password parameter.
Authentication If you select MSDE as the Database Type and the database is
Domain configured for Windows, you must define a Windows
Authentication Domain. Otherwise, leave this field blank.
Database Optional. Type the database instance, if you have multiple SQL
Instance server instances on your database server.
Note: If you use a non-standard port in your database
configuration, or have blocked access to port 1434 for SQL
database resolution, you must leave the Database Instance
parameter blank in your configuration.
Table Name Type vw_qradar as the name of the table or view that includes
the event records.
Configuring DSMs
Symantec System Center 717
Parameter Description
Select List Type * for all fields from the table or view.
You can use a comma separated list to define specific tables or
views, if required for your configuration. The comma separated list
can be up to 255 alphanumeric characters in length. The list can
include the following special characters: dollar sign ($), number
sign (#), underscore (_), en dash (-), and period(.).
Compare Field Type idx as the compare field. The compare field is used to
identify new events added between queries to the table.
Start Date and Optional. Type the start date and time for database polling.
Time
The Start Date and Time parameter must be formatted as
yyyy-MM-dd HH:mm with HH specified using a 24 hour clock. If the
start date or time is clear, polling begins immediately and repeats
at the specified polling interval.
Use Prepared Select this check box to use prepared statements.
Statements
Prepared statements allows the JDBC protocol source to setup the
SQL statement one time, then run the SQL statement many times
with different parameters. For security and performance reasons,
we recommend that you use prepared statements.
Clearing this check box requires you to use an alternative method
of querying that does not use pre-compiled statements.
Polling Interval Type the polling interval, which is the amount of time between
queries to the event table. The default polling interval is 10
seconds.
You can define a longer polling interval by appending H for hours
or M for minutes to the numeric value. The maximum polling
interval is 1 week in any time format. Numeric values entered
without an H or M poll in seconds.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The default value is 20000 EPS.
Use Named Pipe Clear the Use Named Pipe Communications check box.
Communication When using a Named Pipe connection, the username and
password must be the appropriate Windows authentication
username and password and not the database username and
password. Also, you must use the default Named Pipe.
Database If you select the Use Named Pipe Communication check box, the
Cluster Name Database Cluster Name parameter is displayed. If you are running
your SQL server in a cluster environment, define the cluster name
to ensure Named Pipe communication functions properly.
NOTE
Note: Selecting a value for the Credibility parameter greater than 5 will weight your
Symantec System Center log source with a higher importance compared to other
log sources in JSA.
Configuring DSMs
718 SYMANTEC
Symantec Data The Symantec Data Loss Protection (DLP) DSM for JSA accepts events from a
Loss Prevention Symantec DLP appliance using syslog.
(DLP)
Before configuring JSA, you must configure response rules on your Symantec
DLP. The response rule allows the Symantec DLP appliance to forward syslog
events to JSA when a data loss policy violation occurs. Integrating Symantec DLP
requires you to create two protocol response rules (SMTP and None of SMTP) for
JSA. These protocol response rules create an action to forward the event
information, using syslog, when an incident is triggered.
Configuring DSMs
Symantec Data Loss Prevention (DLP) 719
Configuring DSMs
720 SYMANTEC
Configuring a Log You are now ready to configure the log source in JSA.
Source
JSA automatically detects syslog events for the SMTP and None of SMTP
response rules you created. However, if you want to manually configure JSA to
receive events from a Symantec DLP appliance:
From the Log Source Type list box, select the Symantec DLP option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about Symantec DLP, see your vendor
documentation.
Creating an Event Event mapping is required for a number of Symantec DLP events. Due to the
Map for Symantec customizable nature of policy rules, most events, except the default policy events
DLP Events do not contain a predefined JSA Identifier (QID) map to categorize security events.
You can individually map each event for your device to an event category in JSA.
Mapping events allows JSA to identify, coalesce, and track reoccurring events from
your network devices. Until you map an event, all events that are displayed in the
Log Activity tab for Symantec DLP are categorized as unknown. Unknown events
are easily identified as the Event Name column and Low Level Category columns
display Unknown.
Discovering As your device forwards events to JSA, it can take time to categorize all of the
Unknown Events events for a device, as some events might not be generated immediately by the
event source appliance or software. It is helpful to know how to quickly search for
unknown events. When you know how to search for unknown events, we
Configuring DSMs
Symantec Data Loss Prevention (DLP) 721
recommend you repeat this search until you are comfortable that you have
identified the majority of your events.
Procedure
Step 1 Log in to JSA.
Step 1 Click the Log Activity tab.
Step 2 Click Add Filter.
Step 3 From the first list box, select Log Source.
Step 4 From the Log Source Group list box, select the log source group or Other.
Log sources that are not assigned to a group are categorized as Other.
Step 5 From the Log Source list box, select your Symantec DLP log source.
Step 6 Click Add Filter.
The Log Activity tab is displayed with a filter for your log source.
Step 7 From the View list box, select Last Hour.
Any events generated by the Symantec DLP DSM in the last hour are displayed.
Events displayed as unknown in the Event Name column or Low Level Category
column require event mapping in JSA.
NOTE
Note: You can save your existing search filter by clicking Save Criteria.
NOTE
Note: Events that do not have a defined log source cannot be mapped to an event.
Events without a log source display SIM Generic Log in the Log Source column.
Procedure
Step 1 On the Event Name column, double-click an unknown event for Symantec DLP.
The detailed event information is displayed.
Step 2 Click Map Event.
Step 3 From the Browse for QID pane, select any of the following search options to
narrow the event categories for a JSA Identifier (QID):
a From the High-Level Category list box, select a high-level event
categorization.
Configuring DSMs
722 SYMANTEC
For a full list of high-level and low-level event categories or category definitions,
see the Event Categories section of the Juniper Secure Analytics
Administration Guide.
b From the Low-Level Category list box, select a low-level event categorization.
c From the Log Source Type list box, select a log source type.
The Log Source Type list box allows you to search for QIDs from other log
sources. Searching for QIDs by log source is useful when events are similar to
another existing network device. For example, Symantec provides policy and
data loss prevention events, you might select another product that likely
captures similar events.
d To search for a QID by name, type a name in the QID/Name field.
The QID/Name field allows you to filter the full list of QIDs for a specific word,
for example, policy.
Step 4 Click Search.
A list of QIDs are displayed.
Step 5 Select the QID you want to associate to your unknown event.
Step 6 Click OK.
JSA maps any additional events forwarded from your device with the same QID
that matches the event payload. The event count increases each time the event is
identified by JSA.
If you update an event with a new JSA Identifier (QID) map, past events stored in
JSA are not updated. Only new events are categorized with the new QID.
Symantec PGP The PGP Universal Server DSM for JSA accepts syslog events from PGP
Universal Server Universal Servers.
Supported Event JSA accepts all relevant events from the following categories:
Types • Administration
• Software updates
• Clustering
• Backups
• Web Messenger
• Verified Directory
• Postfix
• Client logs
• Mail
Configuring DSMs
Symantec PGP Universal Server 723
Before you can integrate PGP Universal Server events with JSA, you must enable
and configure PGP Universal Server to forward syslog events to JSA.
Configure Syslog for To enable external logging to forward syslog events to JSA:
PGP Universal Server
Procedure
Step 1 In a web browser, log in to your PGP server’s administrative interface.
https://<PGP Server IP address>:9000
Step 2 Click Settings.
Step 3 Select the Enable External Syslog check box.
Step 4 From the Protocol list box, select the either UDP or TCP.
By default, JSA uses port 514 to receive UDP syslog or TCP syslog event
messages.
Step 5 In the Hostname field, type the IP address of your JSA console or Event Collector.
Step 6 In the Port field, type 514.
Step 7 Click Save.
The configuration is complete. The log source is added to JSA as PGP Universal
Server events are automatically discovered. Events forwarded to JSA by the PGP
Universal Servers are displayed on the Log Activity tab of JSA.
Configure a Log JSA automatically discovers and creates a log source for syslog events from PGP
Source Universal Servers. The following configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select PGP Universal Server.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your PGP Universal Server.
Configuring DSMs
724 SYMANTEC
Configuring DSMs
109 SYMARK
Symark PowerBroker logs all events to a multi-line format in a single event log file,
which is viewed using Symark's pblog utility.
NOTE
Note: Perl 5.8 must be installed on the device that hosts Symark PowerBroker.
Parameters Description
-h The -h parameter defines the syslog host receiving the events from
Symark PowerBroker. This is the IP address of your JSA or Event
Collector.
Configuring DSMs
Table 109-1 Command Parameters (continued)
Parameters Description
-t The -t parameter defines that the command-line is used to tail the log
file and monitor for new output from the listener.
For PowerBroker this must be specified as ”pblog -l -t”.
-p The -p parameter defines the TCP port to be used when forwarding
events.
If nothing is specified, the default is port 514.
-H The -H parameter defines the hostname or IP address for the syslog
header of all sent events. It is recommended that this be the IP
address of the Symark PowerBroker.
-r The -r parameter defines the directory name where you want to create
the process ID (.pid) file. The default is /var/run.
This parameter is ignored if -D is specified.
-l The -I parameter defines the directory name where you want to create
the lock file. The default is /var/lock.
This parameter is ignored if -D is specified.
-D The -D parameter defines that the script should run in the foreground.
The default setting is to run as a daemon and log all internal messages
to the local syslog service.
-f The -f parameter defines the syslog facility and (optionally) the severity
for messages sent to the Event Collector.
If no value is specified, user.info is used.
-a The -a parameter enables an AIX compatible ps method.
This command is only required when using Symark PowerBroker on
AIX systems.
-d The -d parameter enables debug logging.
-v The -v parameter displays the script version information.
Configure a Log JSA automatically discovers and identifies most incoming syslog events from
Source external sources. The following configuration steps are optional.
Parameter Description
Log Source Identifier Type the IP address or hostname for your Symark
PowerBroker appliance.
Enabled Select this check box to enable the log source. By default,
this check box is selected.
Credibility From the list box, select the credibility of the log source. The
range is 0 to 10. The credibility indicates the integrity of an
event or offense as determined by the credibility rating from
the source devices. Credibility increases if multiple sources
report the same event. The default is 5.
Target Event Collector From the list box, select the Event Collector to use as the
target for the log source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
Automatically discovered log sources use the default value
configured in the Coalescing Events list box in the System
Settings window, which is accessible on the Admin tab.
However, when you create a new log source or update the
configuration for an automatically discovered log source you
can override the default value by configuring this check box
for each log source. For more information on Settings, see
the Juniper Secure Analytics Administration Guide.
Configuring DSMs
728 SYMARK
Parameter Description
Store Event Payload Select this check box to enable or disable JSA from storing
the event payload.
Automatically discovered log sources use the default value
from the Store Event Payload list box in the System
Settings window, which is accessible on the Admin tab.
However, when you create a new log source or update the
configuration for an automatically discovered log source you
can override the default value by configuring this check box
for each log source. For more information on Settings, see
the Juniper Secure Analytics Administration Guide.
Configuring DSMs
110 THREATGRID MALWARE THREAT
INTELLIGENCE PLATFORM
The ThreatGRID Malware Threat Intelligence Platform DSM for Juniper Secure
Analytics (JSA) collects malware events by using the log file protocol or syslog.
Supported versions JSA supports ThreatGRID Malware Threat Intelligence Platform appliances with
of ThreatGRID v2.0 software that use the JSA Log Enhanced Event Format (LEEF) Creation
Malware Threat script.
Intelligence
Supported Event ThreatGRID Malware Threat Intelligence Platform writes malware events that are
Collection Protocols readable by JSA.
for ThreatGRID
Malware Threat The LEEF creation script is configured on the ThreatGRID appliance and queries
Intelligence the ThreatGRID API to write LEEF events that are readable by JSA. The event
collection protocol your log source uses to collect malware events is based on the
script you install on your ThreatGRID appliance.
Two script options are available for collecting LEEF formatted events:
• Syslog - The syslog version of the LEEF creation script allows your
ThreatGRID appliance to forward events directly to JSA. Events that are
forwarded by the syslog script are automatically discovered by JSA.
• Log File - The Log File protocol version of the LEEF creation script allows the
ThreatGRID appliance to write malware events to a file. JSA uses the Log File
protocol to communicate with the event log host to retrieve and parse malware
events.
The LEEF creation script is available from ThreatGRID customer support. For
more information, see the ThreatGRID website (http://www.threatgrid.com) or
email ThreatGRID support at [email protected].
Configuring DSMs
730 THREATGRID MALWARE THREAT INTELLIGENCE PLATFORM
ThreatGRID Malware To integrate ThreatGRID Malware Threat Intelligence events with JSA, you must
Threat Intelligence complete the following tasks:
Configuration
Overview
1 Download the JSA Log Enhanced Event Format Creation script for your collection
type from the ThreatGRID support website to your appliance.
2 On your ThreatGRID appliance, install and configure the script to poll the
ThreatGRID API for events.
3 On your JSA appliance, configure a log source to collect events based on the
script you installed on your ThreatGRID appliance.
4 Ensure that no firewall rules block communication between your ThreatGRID
installation and the JSA console or managed host that is responsible for retrieving
events.
Configuring a JSA automatically discovers and creates a log source for malware events that are
ThreatGRID Syslog forwarded from the ThreatGRID Malware Threat Intelligence Platform. This
Log Source procedure is optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select ThreatGRID Malware Intelligence
Platform.
Step 9 From the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your ThreatGRID Malware
Intelligence Platform.
The log source identifier must be unique for the log source
type.
Enabled Select this check box to enable the log source. By default,
the check box is selected.
Configuring DSMs
731
Parameter Description
Credibility From the list box, select the credibility of the log source. The
range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector From the list box, select the Event Collector to use as the
target for the log source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Configuring a To use the log file protocol to collect events, you must configure a log source in
ThreatGRID Log File JSA to poll for the event log that contains your malware events.
Protocol Log Source
Procedure
Step 13 Click the Admin tab.
Step 14 On the navigation menu, click Data Sources.
Step 15 Click the Log Sources icon.
Step 16 Click Add.
Step 17 In the Log Source Name field, type a name for the log source.
Step 18 In the Log Source Description field, type a description for the log source.
Step 19 From the Log Source Type list box, select ThreatGRID Malware Threat
Intelligence Platform.
Configuring DSMs
732 THREATGRID MALWARE THREAT INTELLIGENCE PLATFORM
Step 20 From the Protocol Configuration list box, select Log File.
Step 21 Configure the following values:
Parameter Description
Log Source Identifier Type an IP address, host name, or name to identify the event
source.
The log source identifier must be unique for the log source
type.
Service Type From the list box, select the protocol that you want to use to
retrieve log files from a remote server. The default is SFTP.
• SFTP - SSH File Transfer Protocol
• FTP - File Transfer Protocol
• SCP - Secure Copy Protocol
The SCP and SFTP service type requires that the host server
in the Remote IP or Hostname field has the SFTP subsystem
enabled.
Remote IP or Type the IP address or host name of the ThreatGRID server
Hostname that contains your event log files.
Remote Port Type the port number for the protocol that is selected to
retrieve the event logs from your ThreatGRID server. The
valid range is 1 - 65535.
The list of default service type port numbers:
• FTP - TCP Port 21
• SFTP - TCP Port 22
• SCP - TCP Port 22
Remote User Type the user name that is required to log in to the
ThreatGRID web server that contains your audit event logs.
The user name can be up to 255 characters in length.
Remote Password Type the password to log in to your ThreatGRID server.
Confirm Password Confirm the password to log in to your ThreatGRID server
SSH Key File If you select SCP or SFTP as the Service Type, use this
parameter to define an SSH private key file. When you
provide an SSH Key File, the Remote Password field is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved, relative to the user account you are using
to log in.
Note: For FTP only. If your log files are in the remote user’s
home directory, you can leave the remote directory blank.
Blank values in the Remote Directory field support operating
systems where a change in the working directory (CWD)
command is restricted.
Configuring DSMs
733
Parameter Description
Recursive Select this check box if you want the file pattern to search sub
folders in the remote directory. By default, the check box is
clear.
The Recursive parameter is ignored if you configure SCP as
the Service Type.
FTP File Pattern Type the regular expression (regex) required to filter the list of
files that are specified in the Remote Directory. All files that
match the regular expression are retrieved and processed.
The FTP file pattern must match the name that you assigned
to your ThreatGRID event log. For example, to collect files
that start with leef or LEEF and ends with a text file extension,
type the following value:
(leef|LEEF)+.*\.txt
Use of this parameter requires knowledge of regular
expressions (regex). This parameter applies to log sources
that are configured to use FTP or SFTP.
FTP Transfer Mode If you select FTP as the Service Type, from the list box,
select ASCII.
ASCII is required for text-based event logs.
SCP Remote File If you select SCP as the Service Type, type the file name of
the remote file.
Start Time Type a time value to represent the time of day you want the
log file protocol to start. The start time is based on a 24 hour
clock and uses the following format: HH:MM.
For example, type 00:00 to schedule the Log File protocol to
collect event files at midnight.
This parameter functions with the Recurrence field value to
establish when your ThreatGRID server is polled for new
event log files.
Recurrence Type the frequency that you want to scan the remote directory
on your ThreatGRID server for new event log files. Type this
value in hours (H), minutes (M), or days (D).
For example, type 2H to scan the remote directory every 2
hours from the start time. The default recurrence value is 1H.
The minimum time interval is 15M.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save.
After the save action completes, the log file protocol follows
your configured start time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of events per second (EPS) that you do not
want this protocol to exceed. The valid range is 100 - 5000.
Configuring DSMs
734 THREATGRID MALWARE THREAT INTELLIGENCE PLATFORM
Parameter Description
Processor From the list box, select NONE.
Processors allow event file archives to be expanded and
processed for their events. Files are processed after they are
downloaded. JSA can process files in zip, gzip, tar, or tar+gzip
archive format.
Ignore Previously Select this check box to track and ignore files that are already
Processed File(s) processed.
JSA examines the log files in the remote directory to
determine whether the event log was processed by the log
source. If a previously processed file is detected, the log
source does not download the file. Only new or unprocessed
event log files are downloaded by JSA.
This option applies to FTP and SFTP service types.
Change Local Select this check box to define a local directory on your JSA
Directory? appliance to store event log files during processing.
In most scenarios, you can leave this check box not selected.
When this check box is selected, the Local Directory field is
displayed. You can configure a local directory to temporarily
store event log files. After the event log is processed, the
events added to JSA and event logs in the local directory are
deleted.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies extra processing to the retrieved
event files. Each line of the file is a single event. For example,
if a file has 10 lines of text, 10 separate events are created.
Configuring DSMs
111 TIPPING POINT
Tipping Point The Tipping Point Intrusion Prevention System (IPS) DSM for Juniper Secure
Intrusion Analytics (JSA) accepts Tipping Point events using syslog.
Prevention System
JSA records all relevant events from either a Local Security Management (LMS)
device or multiple devices with a Security Management System (SMS).
Before you configure JSA to integrate with Tipping Point, you must configure your
device based on type:
• If you are using an SMS, see Configure Remote Syslog for SMS.
• If you are using an LSM, see Configure Notification Contacts for LSM.
Configure Remote To configure Tipping Point for SMS, you must enable and configure your appliance
Syslog for SMS to forward events to a remote host using syslog.
Configuring DSMs
736 TIPPING POINT
From the Log Source Type list box, select the Tipping Point Intrusion
Prevention System (IPS) option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about your Tipping Point device, see your vendor
documentation.
Configuring DSMs
Tipping Point Intrusion Prevention System 737
NOTE
Note: If your JSA resides in a different subnet than your Tipping Point device, you
might have to add static routes. For more information, see your vendor
documentation.
From the Log Source Type list box, select the Tipping Point Intrusion
Prevention System (IPS) option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about your Tipping Point device, see your vendor
documentation.
Configuring DSMs
738 TIPPING POINT
Tipping Point The Tipping Point X505/X506 DSM for JSA accepts events using syslog.
X505/X506 Device
Supported Event JSA records all relevant system, audit, VPN, and firewall session events.
Types
NOTE
Note: If your JSA resides in a different subnet than your Tipping Point device, you
might have to add static routes. For more information, see your vendor
documentation.
Step 4 You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Tipping Point X Series
Appliances option.
For more information on configuring log sources, see the Log Sources Users
Guide.
NOTE
Note: If you have a previously configured Tipping Point X505/X506 DSM installed
and configured on your JSA, the Tipping Point X Series Appliances option is still
displayed in the Log Source Type list box. However, any new Tipping Point
X505/X506 DSM you configure, you must select the Tipping Point Intrusion
Prevention System (IPS) option.
Configuring DSMs
112 TOP LAYER IPS
The Top Layer IPS DSM for Juniper Secure Analytics (JSA) accepts Top Layer IPS
events using syslog.
JSA records and processes Top Layer events. Before you configure JSA to
integrate with a Top Layer device, you must configure syslog within your Top Layer
IPS device. For more information on configuring Top Layer, see your Top Layer
documentation.
The configuration is complete. The log source is added to JSA as Top Layer IPS
events are automatically discovered. Events forwarded to JSA by Top Layer IPS
are displayed on the Log Activity tab of JSA.
From the Log Source Type list box, select the Top Layer Intrusion
Prevention System (IPS) option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about your Top Layer device, see your vendor
documentation.
Configuring DSMs
113 TREND MICRO
Trend Micro The Trend Micro InterScan VirusWall DSM for Juniper Secure Analytics (JSA)
InterScan VirusWall accepts events using syslog.
You can integrate InterScan VirusWall logs with JSA using the Adaptive Log
Exporter. For more information on the Adaptive Log Exporter, see the Adaptive
Log Exporter Users Guide.
After you configure the Adaptive Log Exporter, the configuration is complete. The
log source is added to JSA as Trend Micro InterScan VirusWall events are
automatically discovered. Events forwarded to JSA by Trend Micro InterScan
VirusWall are displayed on the Log Activity tab of JSA.
From the Log Source Type list box, select the Trend InterScan VirusWall
option.
For more information on configuring devices, see the Log Sources Users Guide.
For more information about your Trend Micro InterScan VirusWall device, see your
vendor documentation.
Configuring DSMs
742 TREND MICRO
Trend Micro You can integrate a Trend Micro Control Manager device with JSA.
Control Manager
A Trend Micro Control Manager accepts events using SNMPv1 or SNMPv2.
Before you configure JSA to integrate with a Trend Micro Control Manager device,
you must configure a log source, then configure SNMP trap settings for your Trend
Micro Control Manager.
Configure a Log JSA does not automatically discover SNMP events from Trend Micro Control
Source Manager.
You must configure an SNMP log source for your Trend Micro Control Manager to
use the SNMPv1 or SNMPv2 protocol. SNMPv3 is not supported by Trend Micro
Control Manager.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Trend Micro Control Manager.
Step 9 Using the Protocol Configuration list box, select SNMPv2.
SNMPv3 is not supported by Trend Micro Control Manager.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Trend Micro Control Manager
appliance.
Community Type the SNMP community name required to access the
system containing SNMP events. The default is Public.
Include OIDs in Event Clear the Include OIDs in Event Payload check box, if
Payload selected.
This options allows the SNMP event payload to be
constructed using name-value pairs instead of the standard
event payload format. Including OIDs in the event payload is
required for processing SNMPv2 or SNMPv3 events from
certain DSMs.
Configuring DSMs
Trend Micro Office Scan 743
Configure SNMP To configure SNMP traps for Trend Micro Control Manager:
Traps
NOTE
Note: Trend Micro Control Manager v5.5 requires hotfix 1697 or hotfix 1713 after
Service Pack 1 Patch 1 to provide correctly formatted SNMPv2c events. For more
information, see your vendor documentation.
Procedure
Step 1 Log in to the Trend Micro Control Manager device.
Step 2 Select Administration > Settings > Event Center Settings.
Step 3 Set the SNMP trap notifications:
a In the SNMP Trap Settings field, type the Community Name.
b Type the JSA server IP address.
Step 4 Click Save.
You are now ready to configure events in the Event Center.
Step 1 Select Administration > Event Center.
Step 2 From the Event Category list, expand Alert.
Step 3 Click Recipients for an alert.
Step 4 In Notification methods, select the SNMP Trap Notification check box.
Step 5 Click Save.
The Edit Recipients Result window is displayed.
Step 6 Click OK.
Step 7 Repeat Step 2 to Step 6 for every alert that requires an SNMP Trap Notification.
The configuration is complete. Events from Trend Micro Control Manager are
displayed on the Log Activity tab of JSA. For more information on Trend Micro
Control Manager, see your vendor documentation.
Trend Micro Office A Trend Micro Office Scan DSM for JSA accepts events using SNMPv2.
Scan
JSA records events relevant to virus and spyware events. Before configuring a
Trend Micro device in JSA, you must configure your device to forward SNMPv2
events.
Configuring DSMs
744 TREND MICRO
JSA has two options for integrating with a Trend Micro device depending on your
device version:
• Integrating with Trend Micro Office Scan 8.x
• Integrating with Trend Micro Office Scan 10.x
Integrating with To integrate a Trend Micro Office Scan 8.x device with JSA:
Trend Micro Office
Scan 8.x Procedure
Step 1 Log in to the Office Scan Administration interface.
Step 2 Select Notifications.
Step 3 Configure the General Settings for SNMP Traps:
a In the Server IP Address field, type the IP address of the JSA.
Note: Do not change the community trap information.
b Click Save.
Step 4 Configure the Standard Alert Notification:
a Select Standard Notifications.
b Click the SNMP Trap tab.
c Select the Enable notification via SNMP Trap for Virus/Malware Detections
check box.
d Type the following message in the field (this should be the default):
Virus/Malware: %v
Computer: %s
Domain: %m
File: %p
Date/Time: %y
Result: %a
e Select the Enable notification via SNMP Trap for Spyware/Grayware
Detections check box.
f Type the following message in the field (this should be the default):
Spyware/Grayware: %v
Computer: %s
Domain: %m
Date/Time: %y
Result: %a
Step 5 Click Save.
Step 6 Configure Outbreak Alert Notifications:
a Select Out Notifications.
b Click the SNMP Trap tab.
c Select the Enable notification via SNMP Trap for Virus/Malware Outbreaks
check box.
Configuring DSMs
Trend Micro Office Scan 745
d Type the following message in the field (this should be the default):
Number of viruses/malware: %CV
Number of computers: %CC
Log Type Exceeded: %A
Number of firewall violation logs: %C
Number of shared folder sessions: %S
Time Period: %T
e Select the Enable notification via SNMP Trap for Spyware/Grayware
Outbreaks check box.
f Type the following message in the field (this should be the default):
Number of spyware/grayware: %CV
Number of computers: %CC
Log Type Exceeded: %A
Number of firewall violation logs: %C
Number of shared folder sessions: %S
Time Period: %T
g Click Save.
Step 7 You are now ready to configure the log sources in JSA.
For more information on configuring log sources, see the Log Sources Users
Guide.
Integrating with Before you configure JSA to integrate with a Trend Micro Office Scan 10.x device,
Trend Micro Office you must:
Scan 10.x
1 Configure the SNMP settings for Trend Micro Office Scan 10.x.
2 Configure standard notifications.
3 Configure outbreak criteria and alert notifications.
Configuring DSMs
746 TREND MICRO
You must now configure the Standard Notifications for Office Scan.
NOTE
Note: Trend Micro recommends using the default values for the detection number
and detection period.
Step 4 Select Shared Folder Session Link and enable Office Scan to monitor for firewall
violations and shared folder sessions.
NOTE
Note: To view computers on the network with shared folders or computers
currently browsing shared folders you can select the number link in the interface.
Configuring DSMs
Trend Micro Deep Discovery 747
Trend Micro Deep The Trend Micro Deep Discovery DSM for JSA accepts syslog events using the
Discovery Log Enhanced Event Format (LEEF).
Before you can collect events in JSA, you must configure your Trend Micro Deep
Discovery appliance to forward syslog events in LEEF format.
Supported Event JSA is capable of collecting events from the following categories in Trend Micro
Types Deep Discovery:
Configuring DSMs
748 TREND MICRO
• System events
• Update events
Configuring Syslog You must configure Trend Micro Deep Discovery to forward syslog events to
for Trend Micro Deep integration with JSA.
Discovery
Procedure
Step 1 Log in to your Trend Micro Deep Discovery console.
Step 2 From the navigation menu, select Logs > Syslog Server Settings.
The Syslog Server Settings pane is displayed.
Step 3 Select the Enable Syslog Server check box.
Step 4 In the IP address field, type the IP address of your JSA.
Step 5 In the Port number field, type 514.
Port 514 is the default port for all syslog events forwarded to JSA.
Step 6 From the Syslog facility list box, select a local facility.
For example, local3.
Step 7 From the Syslog severity list box, select a severity level.
For example, Info. The severity level you select includes messages for the
selected severity, plus any messages that are higher in severity.
Step 8 In the Syslog format field, select the LEEF option.
Step 9 In the Detections pane, select any check boxes for the events you want to forward
to JSA.
NOTE
Note: To forward all possible detections to JSA, click the Select all check box.
Configuring a Log JSA automatically discovers and creates a log source for LEEF formatted syslog
Source events from Trend Micro Deep Discovery. The configuration steps for creating a
log source are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Configuring DSMs
Trend Micro Deep Discovery 749
Step 6 In the Log Source Name field, type a name for the log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Trend Micro Deep Discovery.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type an IP address, hostname, or name to identify the event
source.
IP addresses or host names are recommended as they allow
JSA to identify your device as a unique event source.
Configuring DSMs
750 TREND MICRO
Trend Micro Deep The Trend Micro Deep Discovery Analyzer DSM for Juniper Secure analytics
Discovery Analyzer (JSA) can collect event logs from your Trend Micro Deep Discovery Analyzer
console.
Table 113-1 identifies the specifications for the Trend Micro Deep Discovery
Analyzer DSM.
Table 113-1 Trend Micro Deep Discovery Analyzer DSM Specifications
Specification Value
Manufacturer Trend Micro
DSM name Deep Discovery Analyzer
RPM file name DSM-TrendMicroDeepDiscoveryAnalyzerbuild_num
ber.noarch.rpm
Supported 1.0
versions
Event format LEEF
JSA recorded All events
events
Automatically Yes
discovered
Includes identity Yes
For more Trend Micro website
information (www.trendmicro.com/DeepDiscovery)
To integrate Trend Micro Deep Discovery with JSA, use the following steps:
1 If automatic updates are not enabled, download the most recent versions of the
following RPMs.
• DSMCommon
• Trend Micro Deep Discovery DSM
2 Configure your Trend Micro Deep Discovery device to enable communication with
JSA.
3 If JSA does not automatically detect Trend Micro Deep Discovery as a log source,
create a Trend Micro Deep Discovery log source on the JSA console.
Configuring DSMs
114 TRIPWIRE
The Tripwire DSM for Juniper Secure Analytics (JSA) accepts resource additions,
removal, and modification events using syslog.
Procedure
Step 1 Log in to the Tripwire interface.
Step 2 On the left-hand navigation, click Actions.
Step 3 Click New Action.
Step 4 Configure the new action.
Step 5 Select Rules and click on the desired rule you wish to monitor.
Step 6 Select the Actions tab.
Step 7 Make sure the new action is selected.
Step 8 Click OK.
Step 9 Repeat Step 5 to Step 8 for each rule you want to monitor.
You are now ready to configure the log source in JSA.
From the Log Source Type list box, select the Tripwire Enterprise option.
For more information on configuring log sources, see the Log Sources Users
Guide. For more information about your Tripwire device, see your vendor
documentation.
Configuring DSMs
115 TROPOS CONTROL
The Tropos Control DSM for Juniper Secure Analytics (JSA) accepts events using
syslog.
JSA is capable of recording all fault management, login and logout events,
provisioning events, and device image upload events. Before configuring JSA, you
must configure your Tropos Control to forward syslog events.
You can configure Tropos Control to forward logs using syslog to JSA.
Procedure
Step 1 Using SSH, log in to your Tropos Control device as a root user.
Step 2 Open the following file for editing:
/opt/ControlServer/ems/conf/logging.properties
Step 3 To enable syslog, remove the comment marker (#) from the following line:
#log4j.category.syslog = INFO, syslog
Step 4 To configure the IP address for the syslog destination, edit the following line:
log4j.appender.syslog.SyslogHost = <IP address>
Where <IP address> is the IP address or hostname of JSA.
By default, Tropos Control uses a facility of USER and a default log level of INFO.
These default settings are correct for syslog event collection from a Tropos Control
device.
Step 5 Save and exit the file.
You are now ready to configure the Tropos Control DSM in JSA.
From the Log Source Type list box, select Tropos Control.
For more information on configuring log sources, see the Log Sources Users
Guide.
Configuring DSMs
116 TRUSTEER APEX LOCAL EVENT
AGGREGATOR
Juniper Secure Analytics (JSA) can collect and categorize malware, exploit, and
data exfiltration detection events from Trusteer Apex Local Event Aggregator.
Configuration To collect syslog events, you must configure your Trusteer Apex Local Event
Overview Aggregator to forward syslog events to JSA. Administrators can use the Apex
L.E.A. management console interface to configure a syslog target for events. JSA
automatically discovers and creates log sources for syslog events that are
forwarded from Trusteer Apex Local Event Aggregator appliances. JSA supports
syslog events from Trusteer Apex Local Event Aggregator V1304.x and later.
To integrate events with JSA, administrators can complete the following tasks:
1 On your Trusteer Apex Local Event Aggregator appliance, configure syslog server.
2 On your JSA system, verify that the forwarded events are automatically
discovered.
Configuring Syslog To collect events, you must configure a syslog server on your Trusteer Apex Local
for Trusteer Apex Event Aggregator to forward syslog events.
Local Event
Aggregator Procedure
To configure syslog for Trusteer Apex Local Event Aggregator:
Step 1 Log in to the Trusteer Apex L.E.A. management console.
Step 2 From the navigation menu, select Configuration.
Step 3 To export the current Trusteer Apex Local Event Aggregator configuration, click
Export and save the file.
Step 4 Open the configuration file with a text editor.
Step 5 From the syslog.event_targets section, add the following information:
{
“host”: “<QRadar IP address>”,
“port”: “514”,
“proto”: “tcp”
}
Step 6 Save the configuration file.
Configuring DSMs
756 TRUSTEER APEX LOCAL EVENT AGGREGATOR
Result
As syslog events are generated by the Trusteer Apex Local Event Aggregator, they
are forwarded to the target specified in the configuration file. The log source is
automatically discovered after enough events are forwarded to JSA. It typically
takes a minimum of 25 events to automatically discover a log source.
What to do next
Administrators can log in to the JSA console and verify that the log source is
created. The Log Activity tab displays events from Trusteer Apex Local Event
Aggregator.
Configuring DSMs
117 UNIVERSAL DSM
Juniper Secure Analytics (JSA) can collect and correlates events from any network
infrastructure or security device using the Universal DSM.
After the events are collected and before the correlation can begin. The individual
events from your devices must be properly parsed to determine the event name, IP
addresses, protocol, and ports. For common network devices, such as Cisco
Firewalls, predefined DSMs have been engineered for JSA to properly parse and
classify the event messages from the respective devices. After the events from a
device have been parsed by the DSM, JSA can continue to correlate events into
offenses.
If an enterprise network has one or more network or security devices that are not
officially supported, where no specific DSM for the device exists, you can use the
Universal DSM. The Universal DSM allows you to forward events and messages
from unsupported devices and use the Universal DSM to categorize the events for
JSA. JSA can integrate with virtually any device or any common protocol source
using the Universal DSM. For more information on the available protocols for
retrieving events or logs from devices, see the Log Sources Users Guide.
To configure the Universal DSM, you must use device extensions to associate a
Universal DSM to devices. Before you define device extension information using
the log sources window in the Admin tab, you must create an extensions
document for the log source.
For more information on writing and testing a Universal DSM, see our support
forum at http://www.juniper.net/customers/support/.
Configuring DSMs
118 UNIVERSAL LEEF
The Universal LEEF DSM for Juniper Secure Analytics (JSA) can accept events
from devices that produce events using the Log Event Extended Format (LEEF).
The LEEF event format is a proprietary event format, which allows hardware
manufacturers and software product manufacturers to read and map device events
specifically designed for JSA integration.
LEEF formatted events sent to JSA outside of the partnership program require you
to have installed the Universal LEEF DSM and manually identify each event
forwarded to JSA by mapping unknown events. The Universal LEEF DSM can
parse events forwarded from syslog or files containing events in the LEEF format
polled from a device or directory using the Log File protocol.
Configuring a Before you configure your device to send events to JSA, you must add a log
Universal LEEF Log source for the device providing LEEF events.
Source
JSA can receive events from a real-time source using syslog or files stored on a
device or in a repository using the Log File protocol.
Configuring Syslog To configure a log source for Universal LEEF using syslog:
to Collect Universal
LEEF Events Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Configuring DSMs
760 UNIVERSAL LEEF
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Universal LEEF.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for Universal LEEF events.
Configuring the Log The Log File protocol allows JSA to retrieve archived event or log files from a
File Protocol to remote host or file repository.
Collect Universal
LEEF Events The files are transferred, one at a time, to JSA for processing. JSA reads the event
files and updates the log source with new events. Due to the Log File protocol
polling for archive files, the events are not provided in real-time, but added in bulk.
The log file protocol can manage plain text, compressed files, or archives.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 In the Log Source Name field, type a name for the Universal LEEF log source.
Step 6 In the Log Source Description field, type a description for the Universal LEEF log
source.
Step 7 From the Log Source Type list box, select Universal LEEF.
Step 8 Using the Protocol Configuration list box, select Log File.
Configuring DSMs
Configuring a Universal LEEF Log Source 761
Parameter Description
Log Source Identifier Type the IP address or hostname for your Universal LEEF log
source. This value must match the value configured in the
Remote Host IP or Hostname parameter.
The log source identifier must be unique for the log source
type.
Service Type From the list box, select the protocol you want to use when
retrieving log files from a remove server. The default is SFTP.
• SFTP - SSH File Transfer Protocol
• FTP - File Transfer Protocol
• SCP - Secure Copy
Note: The underlying protocol used to retrieve log files for the
SCP and SFTP service type requires that the server specified
in the Remote IP or Hostname field has the SFTP subsystem
enabled.
Remote IP or Type the IP address or hostname of the host from which you
Hostname want to receive files.
Remote Port Type the TCP port on the remote host that is running the
selected Service Type. If you configure the Service Type as
FTP, the default is 21. If you configure the Service Type as
SFTP or SCP, the default is 22. The valid range is 1 to 65535.
Remote User Type the username necessary to log in to the host running the
selected Service Type. The username can be up to 255
characters in length.
Remote Password Type the password necessary to log in to the host containing
the LEEF event files.
Confirm Password Confirm the Remote Password to log in to the host containing
the LEEF event files.
SSH Key File If you select SCP or SFTP as the Service Type, this
parameter allows you to define an SSH private key file. When
you provide an SSH Key File, the Remote Password option is
ignored.
Remote Directory Type the directory location on the remote host from which the
files are retrieved.
Note: For FTP only. If your log files reside in the remote user’s
home directory, you can leave the remote directory blank. This
is to support operating systems where a change in the
working directory (CWD) command is restricted.
Recursive Select this check box if you want the file pattern to search sub
folders. By default, the check box is clear.
The Recursive parameter is not used if you configure SCP as
the Service Type.
Configuring DSMs
762 UNIVERSAL LEEF
Parameter Description
FTP File Pattern If you select SFTP or FTP as the Service Type, this option
allows you to configure the regular expression (regex)
required to filter the list of files specified in the Remote
Directory. All matching files are included in the processing.
For example, if you want to list all files starting with the word
log, followed by one or more digits and ending with tar.gz,
use the following entry: log[0-9]+\.tar\.gz. Use of this
parameter requires knowledge of regular expressions (regex).
For more information, see the following website:
http://download.oracle.com/javase/tutorial/essential/regex/
FTP Transfer Mode This option is only displayed if you select FTP as the Service
Type. The FTP Transfer Mode parameter allows you to define
the file transfer mode when retrieving log files over FTP.
From the list box, select the transfer mode you want to apply
to this log source:
• Binary - Select Binary for log sources that require binary
data files or compressed zip, gzip, tar, or tar+gzip archive
files.
• ASCII - Select ASCII for log sources that require an ASCII
FTP file transfer.
You must select NONE as the Processor and LINEBYLINE
as the Event Generator when using ASCII as the FTP
Transfer Mode.
SCP Remote File If you select SCP as the Service Type you must type the file
name of the remote file.
Start Time Type the time of day you want processing to begin. This
parameter functions with the Recurrence value to establish
when and how often the Remote Directory is scanned for files.
Type the start time, based on a 24 hour clock, in the following
format: HH:MM.
Recurrence Type the frequency, beginning at the Start Time, that you
want the remote directory to be scanned. Type this value in
hours (H), minutes (M), or days (D).
For example, type 2H if you want the directory to be scanned
every 2 hours. The default is 1H.
Run On Save Select this check box if you want the log file protocol to run
immediately after you click Save. After the Run On Save
completes, the log file protocol follows your configured start
time and recurrence schedule.
Selecting Run On Save clears the list of previously processed
files for the Ignore Previously Processed File parameter.
EPS Throttle Type the number of Events Per Second (EPS) that you do not
want this protocol to exceed. The valid range is 100 to 5000.
Configuring DSMs
Forwarding Events to JSA 763
Parameter Description
Processor If the files located on the remote host are stored in a zip, gzip,
tar, or tar+gzip archive format, select the processor that
allows the archives to be expanded and contents processed.
Ignore Previously Select this check box to track files that have already been
Processed File(s) processed that you do not want to be processed a second
time. This only applies to FTP and SFTP Service Types.
Change Local Select this check box to define the local directory on your JSA
Directory? system that you want to use for storing downloaded files
during processing.
We recommend that you leave this check box clear. When the
check box is selected, the Local Directory field is displayed,
allowing you to configure the local directory to use for storing
files.
Event Generator From the Event Generator list box, select LineByLine.
The Event Generator applies additional processing to the
retrieved event files. The LineByLine option reads each line of
the file as single event. For example, if a file has 10 lines of
text, 10 separate events are created.
Forwarding Events After you have created your log source, you are ready to forward or retrieve events
to JSA for JSA. Forwarding events using syslog might require additional configuration
from your network device.
As events are discovered by JSA, either using syslog or polling for log files, events
are displayed in the Log Activity tab. The events for your device forwarding LEEF
events are identified by the name you typed in the Log Source Name field. The
events for your log source are not categorized by default in JSA and require
categorization. For more information on categorizing your Universal LEEF events,
see Creating a Universal LEEF Event Map.
Creating a Event mapping is required for the Universal LEEF DSM, as Universal LEEF events
Universal LEEF do not contain a predefined JSA Identifier (QID) map to categorize security events.
Event Map
Members of the SIPP partner program have QID maps designed for their network
devices, the configuration documented, and the QID maps tested by Juniper
Networks
Configuring DSMs
764 UNIVERSAL LEEF
The Universal LEEF DSM requires that you individually map each event for your
device to an event category in JSA. Mapping events allows JSA to identify,
coalesce, and track reoccurring events from your network devices. Until you map
an event, all events that are displayed in the Log Activity tab for the Universal
LEEF DSM are categorized as unknown. Unknown events are easily identified as
the Event Name column and Low Level Category columns display Unknown.
Discovering As your device forwards events to JSA, it can take time to categorize all of the
Unknown Events events for a device, as some events might not be generated immediately by the
event source appliance or software. It is helpful to know how to quickly search for
unknown events. When you know how to search for unknown events, we
recommend you repeat this search until you are comfortable that you have
identified the majority of your Universal LEEF events.
Procedure
Step 1 Log in to JSA.
Step 1 Click the Log Activity tab.
Step 2 Click Add Filter.
Step 3 From the first list box, select Log Source.
Step 4 From the Log Source Group list box, select the log source group or Other.
Log sources that are not assigned to a group are categorized as Other.
Step 5 From the Log Source list box, select your Universal LEEF log source.
Step 6 Click Add Filter.
The Log Activity tab is displayed with a filter for your Universal LEEF DSM.
Step 7 From the View list box, select Last Hour.
Any events generated by your Universal LEEF DSM in the last hour are displayed.
Events displayed as unknown in the Event Name column or Low Level Category
column require event mapping in JSA.
NOTE
Note: You can save your existing search filter by clicking Save Criteria.
You are now ready to modify the event map for your Universal LEEF DSM.
Modifying an Event Modifying an event map allows you to manually categorize events to a JSA
Map Identifier (QID) map. Any event categorized to a log source can be remapped to a
new JSA Identifier (QID). By default, the Universal LEEF DSM categorizes all
events as unknown.
NOTE
Note: Events that do not have a defined log source cannot be mapped to an event.
Events without a log source display SIM Generic Log in the Log Source column.
Configuring DSMs
Creating a Universal LEEF Event Map 765
Procedure
Step 1 On the Event Name column, double-click an unknown event for your Universal
LEEF DSM.
The detailed event information is displayed.
Step 2 Click Map Event.
Step 3 From the Browse for QID pane, select any of the following search options to
narrow the event categories for a JSA Identifier (QID):
a From the High-Level Category list box, select a high-level event
categorization.
For a full list of high-level and low-level event categories or category definitions,
see the Event Categories section of the Juniper Secure Analytics
Administration Guide.
b From the Low-Level Category list box, select a low-level event categorization.
c From the Log Source Type list box, select a log source type.
The Log Source Type list box allows you to search for QIDs from other
individual log sources. Searching for QIDs by log source is useful when the
events from your Universal LEEF DSM are similar to another existing network
device. For example, if your Universal DSM provides firewall events, you might
select Cisco ASA, as another firewall product that likely captures similar events.
d To search for a QID by name, type a name in the QID/Name field.
The QID/Name field allows you to filter the full list of QIDs for a specific word,
for example, MySQL.
Step 4 Click Search.
A list of QIDs are displayed.
Step 5 Select the QID you want to associate to your unknown Universal LEEF DSM
event.
Step 6 Click OK.
JSA maps any additional events forwarded from your device with the same QID
that matches the event payload. The event count increases each time the event is
identified by JSA.
NOTE
Note: If you update an event with a new JSA Identifier (QID) map, past events
stored in JSA are not updated. Only new events are categorized with the new QID.
Configuring DSMs
119 VENUSTECH VENUSENSE
The Venustech Venusense DSM for Juniper Secure Analytics (JSA) can collect
events from Venusense appliances using syslog.
Supported JSA records all relevant unified threat, firewall, or network intrusion prevention
Venusense Events events forwarded using syslog on port 514.
and Appliances
The following Venustech appliances are supported by JSA:
• Venustech Venusense Security Platform
• Venusense Unified Threat Management (UTM)
• Venusense Firewall
• Venusense Network Intrusion Prevention System (NIPS)
Venusense JSA can collect events from Venustech appliances that are configured to forward
Configuration filtered event logs in syslog format to JSA.
Overview
The following process outlines the steps required to collect events from a
Venustech Venusense appliance:
1 Configure the syslog server on your Venusense appliance.
2 Configure a log filter on your Venusense appliance to forward specific event logs.
3 Configure a log source in JSA to correspond to the filtered log events.
Configuring a To forward events to JSA, you must configure and enable a syslog server on your
Venusense Syslog Venusense appliance with the IP address of your JSA console or Event Collector.
Server
Procedure
Step 1 Log in to the configuration interface for your Venusense appliance.
Step 2 From the navigation menu, select Logs > Log Configuration > Log Servers.
Step 3 In the IP Address field, type the IP address of your JSA console or Event
Collector.
Step 4 In the Port field, type 514.
Step 5 Select the Enable check box.
Step 6 Click OK.
Configuring DSMs
768 VENUSTECH VENUSENSE
Next Steps
You are ready to configure your Venusense appliance to filter which events are
forwarded to JSA.
Configuring Event filtering allows you to determine which events your Venusense appliance
Venusense Event forwards to JSA.
Filtering
Procedure
Step 1 From the navigation menu, select Logs > Log Configuration > Log Filtering.
Step 2 In the Syslog Log column, select a check box for each event log you want to
forward to JSA.
Step 3 From the list box, select a syslog facility for the event log you enabled.
Step 4 Repeat Step 2 and Step 3 to configure any additional syslog event filters.
Step 5 Click OK.
Next Steps
You are now ready to configure a log source for your Venusense appliance in JSA.
JSA does not automatically discover or create log sources for syslog events from
Venusense appliances.
Configuring a To integrate Venusense syslog events, you must manually create a log source in
Venusense Log JSA as Venusense events to not automatically discover.
Source
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Configuring DSMs
769
Step 8 From the Log Source Type list box, select your Venustech Venusense appliance.
The type of log source you select is determined by the event filtering configured on
your Venusense appliance. The options include:
• Venustech Venusense Security Platform - Select this option if you enabled
all event filtering options.
• Venustech Venusense UTM - Select this option if you enabled unified filtering
events.
• Venustech Venusense Firewall - Select this option if you enabled filtering for
firewall events.
• Venustech Venusense NIPS - Select this option if you enabled filtering for
firewall events.
Step 9 From the Protocol Configuration list box, select Syslog.
Step 10 In the Log Source Identifier field, type the IP address or host name for the log
source as an identifier for your Venusense appliance.
Step 11 Click Save.
Step 12 On the Admin tab, click Deploy Changes.
The configuration is complete. Events forwarded to JSA by your Venusense
appliance are displayed on the Log Activity tab.
Configuring DSMs
120 VERDASYS DIGITAL GUARDIAN
The Verdasys Digital Guardian DSM for Juniper Secure Analytics (JSA) accepts
and categorizes all alert events from Verdasys Digital Guardian appliances.
Digital Guardian’s integration with JSA provides context from the endpoint and
enables a new level of detection and mitigation for Insider Threat and Cyber Threat
(Advanced Persistent Threat).
Digital Guardian provides JSA with a rich data stream from the end-point which
includes; visibility of every data access by users or processes including the file
name, file classification, application used to access the data and other contextual
variables.
Supported Event JSA supports all JSA LEEF or syslog formatted alert events you configure in your
Types data export from Verdasys Digital Guardian.
Configuring DSMs
772 VERDASYS DIGITAL GUARDIAN
Configuring IPtables Before configuring your Verdasys Digital Guardian to forward events, you must
configure IPtables in JSA to allow ICMP requests from Verdasys Digital Guardian.
Procedure
Step 1 Using SSH, log in to JSA as the root user.
Login: root
Password: <password>
Step 2 Type the following command to edit the IPtables file:
vi /opt/qradar/conf/iptables.post
The IPtables configuration file is displayed.
Step 3 Type the following command to allow JSA to accept ICMP requests from Verdasys
Digital Guardian:
-I QChain 1 -m icmp -p icmp --src <IP address> -j ACCEPT
Where <IP address> is the IP address of your Verdasys Digital Guardian
appliance. For example,
-I QChain 1 -m icmp -p icmp --src 10.100.100.101 -j ACCEPT
Step 4 Save your IPtables configuration.
Step 5 Type the following command to update IPtables in JSA:
./opt/qradar/bin/iptables_update.pl
Step 6 To verify JSA accepts ICMP traffic from your Verdasys Digital Guardian, type the
following command:
iptables --list --line-numbers
The following output is displayed:
[root@JSA bin]# iptables --list --line-numbers
Chain QChain (1 references)
num target prot opt source destination
1 ACCEPT icmp -- 10.100.100.101 anywhere icmp
any
2 ACCEPT tcp -- anywhere anywhere state
NEW tcp dpt:https
3 ACCEPT tcp -- anywhere anywhere state
NEW tcp dpt:http
The IPtables configuration for JSA is complete.
Configuring a Data Data exports allow you to configure the events Verdasys Digital Guardian forwards
Export to JSA.
Procedure
Step 1 Log in to the Digital Guardian Management console.
Step 2 Select Workspace > Data Export > Create Export.
Step 3 From the Data Sources list box, select Alerts or Events as the data source.
Configuring DSMs
773
Step 4 From the Export type list box, select JSA LEEF.
If your Verdasys Digital Guardian is v6.0.x, you can select Syslog as the Export
Type. JSA LEEF is the preferred export type format for all Verdasys Digital
Guardian appliances with v6.1.1 and above.
Step 5 From the Type list box, select UDP or TCP as the transport protocol.
JSA can accept syslog events from either transport protocol. If the length of your
alert events typically exceed 1024 bytes, then you should select TCP to prevent
the events from being truncated.
Step 6 In the Server field, type the IP address of your JSA console or Event Collector.
Step 7 In the Port field, type 514.
Step 8 From the Severity Level list box, select a severity level.
Step 9 Select the Is Active check box.
Step 10 Click Next.
Step 11 From the list of available fields, add the following Alert or Event fields for your data
export:
• Agent Local Time
• Application
• Computer Name
• Detail File Size
• IP Address
• Local Port
• Operation (required)
• Policy
• Remote Port
• Rule
• Severity
• Source IP Address
• User Name
• Was Blocked
• Was Classified
Step 12 Select a Criteria for the fields in your data export and click Next.
By default, the Criteria is blank.
Step 13 Select a group for the criteria and click Next.
By default, the Group is blank.
Configuring DSMs
774 VERDASYS DIGITAL GUARDIAN
Next steps
The data export from Verdasys Digital Guardian occurs on a 5 minute interval. You
can adjust this timing with the job scheduler in Verdasys Digital Guardian, if
required. Events exported to JSA by Verdasys Digital Guardian are displayed on
the Log Activity tab.
Configuring a Log JSA automatically discovers and creates a log source for data exports from
Source Verdasys Digital Guardian appliances. The following procedure is optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Verdasys Digital Guardian.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for events from Verdasys Digital Guardian
appliance.
Configuring DSMs
121 VERICEPT CONTENT 360 DSM
The Vericept Content 360 DSM for Juniper Secure Analytics (JSA) accepts
Vericept events using syslog.
JSA records all relevant and available information from the event. Before
configuring a Vericept device in JSA, you must configure your device to forward
syslog. For more information on configuring your Vericept device, consult your
vendor documentation.
After you configure syslog to forward events to JSA the configuration is complete.
The log source is added to JSA as Vericept Content 360 events are automatically
discovered. Events forwarded to JSA by your Vericept Content 360 appliance are
displayed on the Log Activity tab.
To manually configure a log source for JSA to receive events from a Vericept
device:
From the Log Source Type list box, select the Vericept Content 360 option.
For more information on configuring devices, see the Log Sources Users Guide.
Configuring DSMs
122 VMWARE
The VMWare DSM for Juniper Secure Analytics (JSA) can collect events from
VMWare ESX and ESXi, vCenter, and vCloud Director servers.
• VMware ESX and ESXi
• VMware vCenter
• VMware vCloud Director
VMware ESX and The EMC VMware DSM for JSA collects ESX and ESXi server events by using the
ESXi VMware protocol or syslog. The EMC VMware DSM supports events from VMware
ESX or ESXi 3.x, 4.x, or 5.x servers.
To collect VMware ESX or ESXi events, you can select one of the following event
collection methods:
• Configuring Syslog on VMWare ESX and ESXi Servers
• Configuring the VMWare Protocol for ESX or ESXi Servers
Configuring Syslog To collect syslog events for VMWare, you must configure the server to forward
on VMWare ESX and events by using syslogd from your ESXi server to JSA.
ESXi Servers
Procedure
Step 1 Log in to your VMWare vSphere Client.
Step 2 Select the host that manages your VMWare inventory.
Step 3 Click the Configuration tab.
Step 4 From the Software panel, click Advanced Settings.
Step 5 In the navigation menu, click Syslog.
Configuring DSMs
778 VMWARE
CAUTION
CAUTION: By default, the syslog firewall configuration for VMWare products allow
only outgoing syslog communications. To prevent security risks, do not edit the
default syslog firewall rule to enable incoming syslog connections.
Procedure
Step 1 Log in to your ESXi v5.x Server from a vSphere client.
Step 2 From the inventory list, select your ESXi Server.
Step 3 Click the Manage tab and select Security Profile.
Step 4 In the Firewall section, click Properties.
Step 5 In the Firewall Properties window, select the syslog check box.
Step 6 Click OK.
Configuring DSMs
VMware ESX and ESXi 779
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your log source.
Step 5 From the Log Source Type list box, select EMC VMWare.
Step 6 Using the Protocol Configuration list box, select Syslog.
Step 7 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your EMC VMWare server.
Enabled Select this check box to enable the log source. By default,
the check box is selected.
Credibility From the list box, select the credibility of the log source. The
range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector From the list box, select the Event Collector to use as the
target for the log source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Configuring DSMs
780 VMWARE
Configuring the You can configure the VMWare protocol to read events from your VMWare ESXi
VMWare Protocol for server. The VMware protocol uses HTTPS to poll for ESX and ESXi servers for
ESX or ESXi Servers events.
Before you configure your log source to use the VMWare protocol, we suggest you
create a unique user to poll for events. This user can be created as a member of
the root or administrative group, but you must provide the user with an assigned
role of read-only permission. This ensures that JSA can collect the maximum
number of events and retain a level of security for your virtual servers. For more
information on user roles, see your VMWare documentation.
To integrate EMC VMWare with JSA, you must complete the following tasks:
1 Create an ESX account for JSA.
2 Configure account permissions for the JSA user.
3 Configure the VMWare protocol in JSA.
CAUTION
CAUTION: Creating a user who is not part of the root or an administrative group
might lead to some events not being collected by JSA. We suggest that you create
your JSA user to include administrative privileges, but assign this custom user a
read-only role.
Procedure
Step 1 Log in to your ESX host by using the vSphere Client.
Step 2 Click the Local Users & Groups tab.
Step 3 Click Users.
Step 4 Right-click and select Add.
Step 5 Configure the following parameters:
a Login - Type a login name for the new user.
b UID - Optional. Type a user ID.
c User Name - Optional. Type a user name for the account.
d Password - Type a password for the account.
e Confirm Password - Type the password again as confirmation.
f Group - From the Group list box, select root.
Configuring DSMs
VMware ESX and ESXi 781
Read-only permission allows the JSA user account to view and collect events by
using the VMWare protocol.
Procedure
Step 1 Click the Permissions tab.
Step 2 Right-click and select Add Permissions.
Step 3 On the Users and Groups window, click Add.
Step 4 Select your JSA user and click Add.
Step 5 Click OK.
Step 6 From the Assigned Role list box, select Read-only.
Step 7 Click OK.
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your log source.
Step 5 From the Log Source Type list box, select EMC VMWare.
Step 6 Using the Protocol Configuration list box, select EMC VMWare.
Step 7 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source. This
value must match the value configured in the ESX IP field.
Configuring DSMs
782 VMWARE
Parameter Description
ESX IP Type the IP address of the VMWare ESX or ESXi server.
For example, 1.1.1.1.
The VMware protocol prepends the IP address of your
VMware ESX or ESXi server with HTTPS before the protocol
requests event data.
User Name Type the username required to access the VMWare server.
Password Type the password required to access the VMWare server.
VMware vCenter The VMware vCenter DSM for JSA collects vCenter server events by using the
VMware protocol.
The VMware protocol uses HTTPS to poll for vCenter appliances for events. You
must configure a log source in JSA to collect VMware vCenter events.
Before you configure your log source to use the VMWare protocol, we suggest you
create a unique user to poll for events. This user can be created as a member of
the root or administrative group, but you must provide the user with an assigned
role of read-only permission. This ensures that JSA can collect the maximum
number of events and retain a level of security for your virtual servers. For more
information on user roles, see your VMWare documentation.
Configuring a Log To collect vCenter events with the VMware protocol, you must configure a log
Source for the source in JSA.
VMWare vCenter
Procedure
Step 1 Click the Admin tab.
Step 2 Click the Log Sources icon.
Step 3 Click Add.
Step 4 In the Log Source Name field, type a name for your log source.
Step 5 From the Log Source Type list box, select VMWare vCenter.
Step 6 Using the Protocol Configuration list box, select EMC VMWare.
Step 7 The syslog protocol is listed in the
Configuring DSMs
VMware vCloud Director 783
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source. This
value must match the value configured in the ESX IP field.
ESX IP Type the IP address of the VMWare vCenter server.
For example, 1.1.1.1.
The VMware protocol prepends the IP address of your
VMware vCenter server with HTTPS before the protocol
requests event data.
User Name Type the username required to access the VMWare vCenter
server.
Password Type the password required to access the VMWare vCenter
server.
VMware vCloud You can use the VMware vCloud Director DSM and the vCloud protocol for JSA to
Director poll the vCloud REST API for events.
Configuration JSA supports polling for VMware vCloud Director events from vCloud Directory 5.1
Overview appliances. Events collected by using the vCloud REST API are assembled as Log
Extended Event Format (LEEF) events.
To integrate vCloud events with JSA, you must complete the following tasks:
1 On your vCloud appliance, configure a public address for the vCloud REST API.
2 On your JSA appliance, configure a log source to poll for vCloud events.
3 Ensure that no firewall rules block communication between your vCloud appliance
and the JSA console or the managed host that is responsible for polling the vCloud
REST API.
Supported vClound The VMware vCloud DSM for JSA can collect events from several categories.
Event Types Logged
by JSA Each event category contains low level events that describe the action taken within
the event category. For example, user events can have user created or user
deleted as low level event.
The following list are the default event categories collected by JSA from vCloud
Director:
• User events
• Group events
Configuring DSMs
784 VMWARE
Configuring the JSA collects security data from the vCloud API by polling the REST API of the
vCloud REST API vCloud appliance for events. Before JSA can collect any data, you must configure
Public Address the public REST API base URL.
Procedure
Step 1 Log in to your vCloud appliance as an administrator.
Step 2 Click the Administration tab.
Step 3 From the Administration menu, select System Settings > Public Addresses.
Step 4 In the VCD public REST API base URL field, type an IP address or host name.
The address that you specify becomes a publically available address outside of the
firewall or NAT on your vCloud appliance. For example, https://1.1.1.1/.
Step 5 Click Apply.
The public API URL is created on the vCloud appliance.
What to do next
You are now ready to configure a log source in JSA.
Configuring a vCloud To collect vCloud events, you must configure a log source in JSA with the location
Log Source in JSA and credentials that are required to poll the vCloud API.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Configuring DSMs
VMware vCloud Director 785
Step 7 Optional. In the Log Source Description field, type a description for your log
source.
Step 8 From the Log Source Type list box, select VMware vCloud Director.
Step 9 From the Protocol Configuration list box, select VMware vCloud Director.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address, host name, or name that identifies the
vCloud appliance events to JSA.
vCloud URL Type the URL configured on your vCloud appliance to
access the REST API.
The URL you type must match the address you configured in
the VCD public REST API base URL field on your vCloud
Server.
For example, https://10.10.10.1.
User Name Type the user name that is required to remotely access the
vCloud Server.
For example, console/user@organization.
If you want to configure a read-only account to use with JSA,
you can create a vCloud user in your organization who has
the Console Access Only permission.
Password Type the password that is required to remotely access the
vCloud Server.
Confirm Password Confirm the password that is required to remotely access the
vCloud Server.
Polling Interval Type a polling interval, which is the amount of time between
queries to the vCloud Server for new events.
The default polling interval is 10 seconds.
Enabled Select this check box to enable the log source. By default,
the check box is selected.
Credibility From the list box, select the credibility of the log source. The
range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector From the list box, select the Event Collector to use as the
target for the log source.
Configuring DSMs
786 VMWARE
Parameter Description
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
VMware vShield The Juniper Secure Analytics (JSA) DSM for VMware vShield can collect event
logs from your VMware vShield servers.
Table 122-1 identifies the specifications for the VMware vShield Server DSM.
Configuring DSMs
VMware vShield 787
VMware vShield DSM To integrate VMware vShield DSM with JSA, use the following procedures:
Integration Process
1 If automatic updates are not enabled, download and install the most recent version
of the VMware vShield RPM on your JSA Console.
2 For each instance of VMware vShield, configure your VMware vShield system to
enable communication with JSA. This procedure must be performed for each
instance of VMware vShield.
3 If JSA does not automatically discover the log source, for each VMware vShield
server that you want to integrate, create a log source on the JSA Console.
Related tasks
Manually installing a DSM
Configuring your To collect all audit logs and system events from VMware vShield, you must
VMware vShield configure the vShield Manager. When you configure VMware vShield, you must
System for specify JSA as the syslog server.
Communication with
JSA Procedure
To configure your VMware vShied system for communication with JSA:
Step 1 Access your vShield Manager inventory panel.
Step 2 Click Settings & Reports.
Step 3 Click Configuration > General.
Step 4 Click Edit next to the Syslog Server option.
Step 5 Type the IP address of your JSA console.
Step 6 Optional. Type the port for your JSA console. If you do not specify a port, the
default UDP port for the IP address/host name of your JSA console is used.
Step 7 Click OK.
Configuring DSMs
788 VMWARE
Configuring DSMs
123 VORMETRIC DATA SECURITY
The Vormetric Data Security DSM for Juniper Secure Analytics (JSA) can collect
event logs from your Vormetric Data Security servers.
Table 123-1 identifies the specifications for the Vormetric Data Security DSM.
Vormetric Data To integrate Vormetric Data Security DSM with JSA, use the following procedures:
Security DSM
Integration Process
1 If automatic updates are not enabled, download and install the most recent version
of the following RPMs on your JSA console:
• Syslog protocol RPM
• DSMCommon RPM
The minimum version of the DSMCommon RPM that you can use are the
DSM-DSMCommon-7.1-530016.noarch.rpm or
DSM-DSMCommon-7.2-572972.noarch.rpm
Configuring DSMs
790 VORMETRIC DATA SECURITY
Related tasks
• Manually Installing a DSM
• Configuring your Vormetric Data Security Systems for Communication with
JSA
• Configuring a Vormetric Data Security Log Source in JSA
Configuring your To collect all audit logs and system events from Vormetric Data Security, you must
Vormetric Data configure your Vormetric Data Security Manager to enable communication with
Security Systems JSA.
for Communication
with JSA Before you begin
Your Vormetric Data Security Manager user account must have System
Administrator permissions.
Procedure
To configure your Vormetric Data Security system for communication with JSA:
Step 1 Log in to your Vormetric Data Security Manager as an administrator that is
assigned System Administrator permissions.
Step 2 On the navigation menu, click Log > Syslog.
Step 3 Click Add.
Step 4 In the Server Name field, type the IP address or host name of your JSA system.
Step 5 From the Transport Protocol list, select TCP or a value that matches the log
source protocol configuration on your JSA system.
Step 6 In the Port Number field, type 514 or a value that matches the log source protocol
configuration on your JSA system.
Step 7 From the Message Format list, select LEEF.
Step 8 Click OK.
Step 9 On the Syslog Server summary screen, verify the details you have entered for your
JSA system. If the Logging to SysLog value is OFF, complete the following steps.
a On the navigation menu, click System > General Preferences.
b Click the System tab.
c In the Syslog Settings pane, select the Syslog Enabled check box.
Configuring DSMs
Configuring your Vormetric Data Security Systems for Communication with JSA 791
What to do next
Configuring Vormetric Data Firewall FS Agents to Bypass Vormetric Data
Security Manager
Configuring When the Vormetric Data Security Manager is enabled to communicate with JSA,
Vormetric Data all events from the Vormetric Data Firewall FS Agents are also forwarded to the
Firewall FS Agents to JSA system through the Vormetric Data Security Manager. To bypass the
Bypass Vormetric Vormetric Data Security Manager, you can configure Vormetric Data Firewall FS
Data Security Agents to send LEEF events directly to the JSA system.
Manager
Before you begin
Your Vormetric Data Security Manager user account must have System
Administrator permissions.
Procedure
Step 1 Log in to your Vormetric Data Security Manager.
Step 2 On the navigation menu, click System > Log Preferences.
Step 3 Click the FS Agent Log tab.
Step 4 In the Policy Evaluation row, configure the following parameters:
a Select the Log to Syslog/Event Log check box.
b Clear the Upload to Server check box.
c From the Level list, select INFO.
This set up enables a full audit trail from the policy evaluation module to be sent
directly to a syslog server, and not to the Security Manager. Leaving both
destinations enabled may result in duplication of events to the JSA system.
Step 5 Under the Syslog Settings section, configure the following parameters.
a In the Server field, use the following syntax to type the IP address or host name
and port number of your JSA system.
qradar_IP address_or_host:port
b From the Protocol list, select TCP or a value that will match the log source
configuration on your JSA system.
c From the Message Format list, select LEEF.
What to do next
This configuration is applied to all hosts or host groups subsequently added to the
Vormetric Data Security Manager. For each existing host or host group, select the
required host or host group from the Hosts list and repeat the procedure.
Configuring DSMs
792 VORMETRIC DATA SECURITY
Configuring a To collect Vormetric Data Security events, configure a log source in JSA.
Vormetric Data
Security Log Procedure
Source in JSA
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 In the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 From the Log Source Type list, select Vormetric Data Security.
Step 7 From the Protocol Configuration list, select Syslog.
Step 8 Configure the remaining parameters.
Step 9 Click Save.
Step 10 On the Admin tab, click Deploy Changes.
Configuring DSMs
124 WEBSENSE V-SERIES
Websense TRITON The Websense V-Series Content Gateway DSM for Juniper Secure Analytics
(JSA) supports events for web content from several Websense TRITON solutions,
including Web Security, Web Security Gateway, Web Security Gateway Anywhere,
and V-Series appliances.
Websense TRITON collects and streams event information to JSA using the
Websense Multiplexer component. Before configuring JSA, you must configure the
Websense TRITON solution to provide LEEF formatted syslog events.
Before You Begin Before you can configure Websense TRITON Web Security solutions to forward
events to JSA, you must ensure your deployment contains a Websense
Multiplexer.
Configuring DSMs
794 WEBSENSE V-SERIES
Configuring Syslog To collect events, you must configure syslog forwarding for Websense TRITON.
for Websense
TRITON Procedure
Step 1 Log in to your Websense TRITON Web Security console.
Step 2 On the Settings tab, select General > SIEM Integration.
Step 3 Select the Enable SIEM integration for this Policy Server check box.
Step 4 In the IP address or hostname field, type the IP address of your JSA.
Step 5 In the Port field, type 514.
Step 6 From the Transport protocol list box, select either the TCP or UDP protocol
option.
JSA supports syslog events for TCP and UDP protocols on port 514.
Step 7 From the SIEM format list box, select syslog/LEEF (JSA).
Step 8 Click OK to cache any changes.
Step 9 Click Deploy to update your Websense Triton security components or V-Series
appliances.
The Websense Multiplexer connects to Websense Filtering Service and ensures
that event log information is provided to JSA.
Configure a Log JSA automatically discovers and creates a log source for syslog events in LEEF
Source format from Websense TRITON and V-Series appliances. The
configuration steps for creating a log source are optional.
Configuring DSMs
Websense V-Series Data Security Suite 795
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Websense V Series Content
Gateway.
Note: Websense TRITON uses the Websense V Series Content Gateway DSM for
parsing events. When you manually add a log source to JSA for Websense
TRITON, you should select the Websense V Series Content Gateway.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or hostname for the log source as an
identifier for events from Websense TRITON or V-Series
appliance.
Websense V-Series The Websense V-Series Data Security Suite DSM for JSA supports Websense
Data Security Suite V-Series appliances and the Data Security Suite (DSS) software.
Configuring syslog The Websense V-Series Data Security Suite DSM accepts events using syslog.
for Websense Before you can integrate JSA you, must enable the Websense V-Series appliance
V-Series DSS to forward syslog events in the Data Security Suite (DSS) Management console.
Procedure
Step 1 Select Policies > Policy Components > Notification Templates.
Step 2 Select an existing Notification Template or create a new template.
Step 3 Click the General tab.
Step 4 Click Send Syslog Message.
Configuring DSMs
796 WEBSENSE V-SERIES
Step 5 Select Options > Settings > Syslog to access the Syslog window.
The syslog window enables administrators to define the IP address/hostname and
port number of the syslog in their organization. The defined syslog receives
incident messages from the Websense Data Security Suite DSS Manager.
Step 6 The syslog is composed of the following fields:
DSS Incident|ID={value}|action={display value - max}|urgency=
{coded}|policy categories={values,,,}|source={value-display
name}|destinations={values...}|channel={display name}|matches=
{value}|detaills={value}
• Max length for policy categories is 200 characters.
• Max length for destinations is 200 characters.
• Details and source are reduced to 30 characters.
Step 7 Click Test Connection to verify that your syslog is accessible.
You are now ready to configure the log source in JSA.
The configuration is complete. The log source is added to JSA as OSSEC events
are automatically discovered. Events forwarded to JSA by OSSEC are displayed
on the Log Activity tab of JSA.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source Websense V-Series Data Security Suite. The following configuration steps are
optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Websense V Series.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Websense V-Series Data
Security Suite DSM
Configuring DSMs
Websense V-Series Content Gateway 797
Websense V-Series The Websense V-Series Content Gateway DSM for JSA supports events for web
Content Gateway content on Websense V-Series appliances with the Content Gateway software.
The Websense V-Series Content Gateway DSM accepts events using syslog to
stream events or using the Log File protocol to provide events to JSA. Before you
can integrate your appliance with JSA, you must select one of the following
configuration methods:
• To configure syslog for your Websense V-Series, see Configure Syslog for
Websense V-Series Content Gateway.
• To configure the log file protocol for your Websense V-Series, see Configuring
a Log File Protocol for Websense V-Series Content Gateway.
Configure Syslog for The Websense V-Series DSM supports Websense V-Series appliances running
Websense V-Series the Websense Content Gateway on Linux software installations.
Content Gateway
Before configuring JSA, you must configure the Websense Content Gateway to
provide LEEF formatted syslog events.
Configuring DSMs
798 WEBSENSE V-SERIES
Step 7 In the Custom Log File Definitions window, type the following text for the LEEF
format.
<LogFormat>
<Name = "leef"/>
<Format =
"LEEF:1.0|Websense|WCG|7.6|%<wsds>|cat=%<wc> src=%<chi> devTime=
%<cqtn> devTimeFormat=dd/MMM/yyyy:HH:mm:ss
Z http-username=%<caun> url=%<cquc>
method=%<cqhm> httpversion=%<cqhv> cachecode=%<crc> dstBytes
=%<sscl> dst=%<pqsi>
srcBytes=%<pscl> proxy-status-code=%<pssc> server-status-code=%<ss
sc> usrName=%<wui> duration=%<ttms>"/>
</LogFormat>
<LogObject>
<Format = "leef"/>
<Filename = "leef"/>
</LogObject>
NOTE
Note: The fields in the LEEF format string are tab separated. You might be
required to type the LEEF format in a text editor and then cut and paste it into your
web browser to retain the tab separations.The definitions file ignores extra white
space, blank lines, and all comments.
Procedure
Step 1 Log in to the command-line Interface (CLI) of the server running Websense
Content Gateway.
Step 2 Add the following lines to the end of the /etc/rc.local file:
( while [ 1 ] ; do
tail -n1000 -F /opt/WCG/logs/leef.log | nc <IP Address> 514
sleep 1
done ) &
Where <IP Address> is the IP address for JSA.
Step 3 To start logging immediately, type the following command:
nohup /bin/bash –c “while [ 1 ] ; do tail -F
/opt/WCG/logs/leef.log | nc <IP Address> 514; sleep 1; done” &
Configuring DSMs
Websense V-Series Content Gateway 799
NOTE
Note: You might need to type the logging command in Step 3 or copy the
command to a text editor to interpret the quotation marks.
The configuration is complete. The log source is added to JSA as syslog events
from Websense V-Series Content Gateway are automatically discovered. Events
forwarded by Websense V-Series Content Gateway are displayed on the Log
Activity tab of JSA.
Configuring a Log JSA automatically discovers and creates a log source for syslog events from
Source Websense V-Series Content Gateway. The following configuration steps are
optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Websense V Series.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter Description
Log Source Identifier Type the IP address or host name for the log source as an
identifier for events from your Websense V-Series Content
Gateway appliance.
Configuring a Log The log file protocol allows JSA to retrieve archived log files from a remote host.
File Protocol for
Websense V-Series The Websense V-Series DSM supports the bulk loading of log files from your
Content Gateway Websense V-Series Content Gateway using the log file protocol to provide events
on a scheduled interval. The log files contain transaction and error events for your
Websense V-Series Content Gateway:
Configuring DSMs
800 WEBSENSE V-SERIES
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select the Websense V Series.
Step 9 From the Protocol Configuration list box, select the Log File.
Step 10 From the Service Type list box, select the Secure File Transfer Protocol (SFTP)
option.
Step 11 In the FTP File Pattern field, type extended.log_.*.old.
Configuring DSMs
Websense V-Series Content Gateway 801
Configuring DSMs
802 WEBSENSE V-SERIES
Configuring DSMs
125 ZSCALER NANOLOG STREAMING
SERVICE
Juniper Secure Analytics (JSA) can collect and categorize events from Zscaler
Nanolog Streaming Service (NSS) log feeds that forward syslog event to JSA.
Configuration To collect syslog events, you must configure your Zscaler NSS with an NSS feed to
Overview forward TCP syslog events to JSA. JSA automatically discovers and creates log
sources for syslog events that are forwarded from Zscaler NSS log feeds. JSA
supports syslog events from Zscaler NSS V4.1.
Supported Event The ZScaler NSS DSM for JSA collects information about web browsing events
types for Zscaler NSS from Zscaler NSS installations.
Each Zscaler NSS event contains information on the action that is taken on the
web browsing in the event category. For example, web browsing events can have
a category that is allowed or blocked website traffic. Each event defines the
website that was allowed or blocked and includes all of the event details in the
event payload.
Configuring a Syslog To collect events, you must configure a log feed on your Zscaler NSS to forward
feed in Zscaler NSS syslog events to JSA.
Procedure
Step 1 Log in to the administration portal for Zscaler NSS.
Step 2 In the navigation menu, select Policy > Administration > Configure Nanolog
Streaming Service.
Step 3 Click Add Feed.
Step 4 In the Feed Name field, type a name for the NSS feed.
Step 5 From the NSS Name list, select the ZScaler NSS system.
Step 6 From the Status list, select Enabled.
Configuring DSMs
804 ZSCALER NANOLOG STREAMING SERVICE
Step 7 In the SIEM IP field, type the IP address of your JSA system.
Step 8 In the TCP Port field, type the 514.
Step 9 From the Log Type list, select Web Log.
Step 10 From the Feed Output Type list, select Custom.
Step 11 In the Feed Output Format field, type the following custom format:
%s{mon} %02d{dd} %02d{hh}:%02d{mm}:%02d{ss} zscaler-nss:
LEEF:1.0|Zscaler|NSS|4.1|%s{reason}|cat=%s{action}\tdevTime=
%s{mon} %02d{dd} %d{yy}
%02d{hh}:%02d{mm}:%02d{ss}%s{tz}\tdevTimeFormat=MMM dd yyyy
HH:mm:ss z\tsrc=%s{cip}\tdst=%s{sip}
\tsrcPostNAT=%s{cintip}\trealm=%s{location}\tusrName=%s{login}\
tsrcBytes=%d{reqsize}\tdstBytes=%d{respsize}\trole=%s{dept}\tpo
licy=%s{reason}\turl=%s{url}\trecordid=%d{recordid}\tbwthrottle
=%s{bwthrottle}\tuseragent=%s{ua}\treferer=%s{referer}\thostnam
e=%s{host}\tappproto=%s{proto}\turlcategory=%s{urlcat}\turlsupe
rcategory=%s{urlsupercat}\turlclass=%s{urlclass}\tappclass=%s{a
ppclass}\tappname=%s{appname}\tmalwaretype=%s{malwarecat}\tmalw
areclass=%s{malwareclass}\tthreatname=%s{threatname}\triskscore
=%d{riskscore}\tdlpdict=%s{dlpdict}\tdlpeng=%s{dlpeng}\tfilecla
ss=%s{fileclass}\tfiletype=%s{filetype}\treqmethod=%s{reqmethod
}\trespcode=%s{respcode}\n
Step 12 Click Done.
JSA automatically discovers and creates a log source for Zscaler NSS appliances.
Events that are forwarded to JSA are viewable on the Log Activity tab.
Configuring a Zscaler JSA automatically discovers and creates a log source for syslog events that are
NSS Log Source forwarded from Zscaler NSS. These configuration steps are optional.
Procedure
Step 1 Log in to JSA.
Step 2 Click the Admin tab.
Step 3 Click the Log Sources icon.
Step 4 Click Add.
Step 5 In the Log Source Name field, type a name for your log source.
Step 6 Optional. In the Log Source Description field, type a description for your log
source.
Step 7 From the Log Source Type list box, select Zscaler NSS.
Step 8 From the Protocol Configuration list box, select Syslog.
Configuring DSMs
805
Parameter Description
Log Source Identifier Type the IP address as an identifier for events from your
Zscaler NSS installation.
The log source identifier must be unique value.
Enabled Select this check box to enable the log source.
By default, the check box is selected.
Credibility Select the credibility of the log source. The range is 0 - 10.
The credibility indicates the integrity of an event or offense
as determined by the credibility rating from the source
devices. Credibility increases if multiple sources report the
same event. The default is 5.
Target Event Collector Select the Event Collector to use as the target for the log
source.
Coalescing Events Select this check box to enable the log source to coalesce
(bundle) events.
By default, automatically discovered log sources inherit the
value of the Coalescing Events list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Incoming Event From the list box, select the incoming payload encoder for
Payload parsing and storing the logs.
Store Event Payload Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in JSA. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Log Source Language Select the language of the events generated by zScaler
NSS.
Configuring DSMs
126 JSA SUPPORTED DSMS
Juniper Secure Analytics (JSA) can collect events from your third-party security products by using a plug-in file that is
called a Device Support Module (DSM). JSA supports an extensive list of third-party security solutions.
Configuring DSMs
808JSA SUPPORTED DSMS
Configuring DSMs
809
Configuring DSMs
810JSA SUPPORTED DSMS
Configuring DSMs
811
Configuring DSMs
812JSA SUPPORTED DSMS
Configuring DSMs
INDEX
E
B Enterasys 800-Series Switch 245
BalaBit IT Security for Microsoft ISA and TMG Events 77, Enterasys Dragon 229
808 Enterasys HiGuard Wireless IPS 236
BalaBit IT Security for Microsoft Windows Events 73, 808 Enterasys HiPath Wireless Controller 238
Barracuda Spam & Virus Firewall 83, 808 Enterasys Matrix K/N/S Series Switch 243
Barracuda Web Application Firewall 84, 808 Enterasys Matrix Router 241
Barracuda Web Filter 86 Enterasys Matrix Series 243
Bit9 Parity 89 Enterasys NAC 244
Blue Coat SG 97 Enterasys NetSight Automatic Security Manager 242
BlueCat Networks Adonis 93 Enterasys Stackable and Standalone Switches 239
Bridgewater Systems 107, 809 Enterasys XSR Security Router 240
Brocade Fabric OS 109 Extreme Networks ExtremeWare 247
C F
CA ACF2 111, 116, 809 F5 Networks BIG-IP AFM 249
CA SiteMinder 124, 809 F5 Networks BIG-IP APM 254
CA Top Secret 127, 809 F5 Networks BIG-IP ASM 255
Check Point FireWall-1 141, 809 F5 Networks BIG-IP LTM 257
Check Point Provider-1 149, 810 F5 Networks FirePass 259
Cilasoft QJRN/400 155, 810 Fair Warning 263
Cisco ACE Firewall 159, 810 Fidelis XPS 265
Cisco ACS 163, 810 ForeScout CounterACT 273
Cisco Aironet 161, 810 Fortinet FortiGate 277
Cisco ASA 167, 810 Foundry FastIron 279
Cisco CallManager 172, 810
Cisco Catalyst Switch 173, 811
Cisco CatOS for Catalyst Switches 173, 811
G
Cisco CSA 175, 810
Generic Authentication Server 285
Cisco FWSM 176, 811
Generic Firewall 281
Cisco Identity Services Engine 197
Great Bay Beacon 289
Cisco IDS/IPS 178, 811
Cisco IOS 185
Configuring DSMs
814 INDEX
I
IBM AIX 308 M
IBM AS/400 iSeries 319 manually installing DSMs 26
IBM CICS 322 McAfee Application / Change Control 475
IBM DB2 346 McAfee Intrushield 461
IBM Guardium 368 McAfee Web Gateway 478
IBM IMS 362 MetaInfo MetaIP 483
Microsoft DHCP Server 492
IBM Informix Audit 361
Microsoft Endpoint Protection 519
IBM ISS Proventia 333
Microsoft Exchange Server 485
IBM Lotus Domino 326
Microsoft IAS 492
IBM Proventia Management SiteProtector 329
Microsoft IIS Server 493
IBM RACF 334 Microsoft Internet and Acceleration Server 499
IBM Security Network IPS 388 Microsoft ISA 499
IBM Security Network Protection (XGS) 385 Microsoft Operations Manager (MOM) 513
IBM Tivoli Access Manager for e-business 376 Microsoft SharePoint 506
IBM Tivoli Endpoint Manager 383 Microsoft SQL Server 501
IBM WebSphere Application Server 356 Microsoft System Center Operations Manager (SCOM) 516
IBM zSecure Alert 384 Microsoft Windows Security Event Log 511
Imperva SecureSphere 395 Motorola Symbol AP 525
Infoblox NIOS 401
installing DSM bundle 27
installing DSMs 23
Internet System Consortium (ISC) Bind 403 N
ISC Bind 403 Name Value Pair 449, 527
iT-CUBE agileSI 407 NetApp Data ONTAP 531
Itron Smart Meter 411 Niksun NetVCR 2005 533
Nokia Firewall 535
Nominum Vantio 541
Nortel Application Switch 546
Nortel ARN 29
Nortel Contivity 547
J Nortel Ethernet Routing Switch 2500/4500/5500 547
Juniper DDoS Secure 415 Nortel Ethernet Routing Switch 8300/8600 548
Juniper DX Application Acceleration Platform 415 Nortel Multiprotocol Router 543
Juniper EX Series Ethernet Switch 416 Nortel Secure Network Access Switch 551
Juniper IDP 418 Nortel Secure Router 550
Juniper Infranet Controller 422 Nortel Switched Firewall 5100 552
Juniper Junos OS 425 Nortel Switched Firewall 6000 554
Juniper Junos WebApp Secure 435 Nortel VPN Gateway 557
Juniper Networks AVT 413 Novell eDirectory 559
Juniper Networks Firewall and VPN 423
Juniper Networks NSM 423
Juniper Networks Secure Access 419 O
Juniper Networks vGW 430 Open LDAP Software 573
Juniper Secure Services Gateway (SSG) 423 Open Source SNORT 579
Juniper Security Binary Log Collector 432 OpenBSD 571
Oracle Acme Packet Session Border Control 597
Configuring DSMs
INDEX 815
R
Radware DefensePro 625 V
Redback Networks ASE 631 Venustech Venusense 767
Requesting Technical Support 18 Verdasys Digital Guardian 771
RSA Authentication Manager 633 Vericept Content 360 775
VMWare 777
VMware vCloud 783
S
Samhain 637
Secure Computing Sidewinder 647 W
Sentrigo Hedgehog 645 Websense Content Gateway 797
SolarWinds Orion 649 Websense Data Security Suite 795
SonicWALL 651 Websense TRITON 793
Sophos Astaro Security Gateway 667
Sophos Enterprise Console 653, 656
Sophos PureMessage 660 Z
Sophos Web Security Appliance 668 Zscaler NSS 438, 803
Sourcefire Defense Center 669
Sourcefire Intrusion 675
Splunk 677
Squid Web Proxy 681
Starent Networks 685
Stonesoft Management Center 693
stored events 24
Sun ONE LDAP 706
Sun Solaris 697
Sun Solaris Basic Security Mode (BSM) 701
Sun Solaris DHCP 698
Sun Solaris Sendmail 700
Supported DSMs 807
Sybase ASE 711
Symantec Data Loss Prevention (DLP) 718
Symantec Endpoint Protection 713
Symantec PGP Universal Server 722
Symantec SGS 714
Symantec SSC 714
Symark PowerBroker 725
T
ThreatGRID Malware Threat Intelligence Platform 729
Configuring DSMs