DAM Process Document
DAM Process Document
Page 1 of 77
1.1. INTRODUCTION
This document purpose is to provide the brief about Imperva application console and there
configuration. Also it include the daily task and monitoring process. Also this document include
the backup, security, audit and purging police configured in the DAM solution.
Page 2 of 77
Page 3 of 77
Agent Installation:
1.3. Agent Installation
Page 4 of 77
Required Permissions for Agent Installation/Configuration
To install and configure agents, you require administrator privileges. To run with
administrator privileges:
In Windows: Open the Windows Start Menu, search for ‘cmd,’ then right-
click cmd.exe and select "Run as administrator." In command window, navigate to location
of installation package and run as required.
In Unix/Linux: Run as root user (uid=0). Also “/tmp” ( location where the installation setup
was copied) folder should have execution permission. i.e. ( rw,nosuid,nodev,exec,relatime
)To verify check run the below command.
mount | grep noexec
Sample Output: sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids)
cgroup on /sys/fs/cgroup/perf_event type cgroup
(rw,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
/dev/mapper/rhel-tmp on /tmp type xfs
(rw,nosuid,nodev,noexec,relatime,attr2,inode64,noquota)
/dev/mapper/rhel-var_tmp on /var/tmp type xfs
(rw,nosuid,nodev,noexec,relatime,attr2,inode64,noquota) ( in this /tmp folder is having no
execution permission (noexec) due to which you cannot execute installation script from given
folder.)
Page 5 of 77
To install a Linux agent:
12. Now copy the file from \\172.1.57.119\sharefolder\DAM\New Agents to /tmp folder of the
sarver.
13. Go to /tmp directory using command cd /tmp
14. The agent file format will be .tar.gz , gunzip the file using the command gunzip
<filename>
15. For e.g - gunzip Imperva-ragent-RHEL-v4-kSMP-pi386-b13.0.0.20.0.569909.tar.gz
16.
17. Now the file is in “.tar” format, extract from tar format using a command tar –xvf
<filename>
18. For e.g - tar –xvf Imperva-ragent-RHEL-v4-kSMP-pi386-b12.0.0.1084.tar.gz” Type
“./” then type the agent package file name. Installation is run.
19. After successful extraction of file , install.sh file will be generated, run that file using
command
./install.sh (NOTE - The default directory of agent installation is /opt/Imperva)
Page 6 of 77
20. After running install.sh file, Type “y” to continue with accept the default installation
location in /opt/Imperva/.
21. After extraction, Type “1” to run a Quick Configuration.
22. Type “1” for monitoring DB traffic.
23. Enter the Name of agent "name of application like BBPS-PROD-01"
24. Type the IP address (172.1.80.10 for DC and 172.2.46.230 for DR) of the listener you
previously configured on a gateway.
25. Type “2” for monitoring the both (Internal & EXTERNAL) then Enter the gateway
password 'Imp#BOI123' for registration. The agent is installed and registered. You can
register it to additional gateways if desired. We’ll type no.
26. Type Y to restart the agent services.
27. After starting the remote agent the “Agent Installation Manager” wizard will be displayed.
28. Select “1” to start with Quick configuration.
29. Press ‘y’ for using the same configuration for installer as was for agent.
30. Specify the location of installer path as /opt/imperva and specify the size of installer
folder – 100 MB. Or press enter for default value
31. Now the Agent Installation Manager is successfully registered to the gateway. Press any
key to continue.
32. Press “y” to start Agent Installation Manager Services, and then press any key to
continue.
Now agent and Installer manager was installed on the given server.
For window systems we can directly copy the window based agent setup from
\\172.1.57.119\sharefolder\DAM\New Agents\Windows\Imperva-ragent-Windows-
b13.5.0.21.0.572491 to their “c:” drive.
Page 7 of 77
15. Agent is asking for Primary or Secondary, choose Primary.
16. Enter the IP Address of DAM Gateway.(172.1.80.10 for DC and 172.2.46.230 for DR)
17. Enter the Password 'Imp#BOI123' for registration.
18. Type “n” to skip the registration of remote agent with secondary gateway
19. After that agent will installed successfully and ask to run the agent service type 'y' for
same.
20. It will prompt installation is completed. Click “Close” to successful completion of
installation prompt.
21. Check the status of agent running and registered.
Page 8 of 77
OR
<remote agent directory>/ragent/bin/cli actions stop (remote agent directory is
by default “/opt/impeva”
Note: Beginning with SecureSphere Agent version 10.0, it is not necessary to uninstall the
SecureSphere Agent before installing a SecureSphere Agent. The only exception to this is
when you want to re-install exactly the same version SecureSphere Agent that is already
installed, in which case you must uninstall the SecureSphere Agent before installing it
Page 9 of 77
3. Select the DB service under protocol and type the respective ports and click on
“save”.
2. Select the single or network or range depend on your requirement and provide the
Page 10 of 77
start ip address for single ip, for range provide start and end ip details of range and for
network provide the CIDR notation (i.e. 172.1.1.1/23) and save the configuration.
Page 11 of 77
Page 12 of 77
After successful scanning to see the scan result Go to the DISCOVERY &
CLASSIFICATION > Discovered Server. In given page click on “Server Discovery Results”.
Where we can generate PDF or Create the Report of given scan result.
Result:
1. In the Main workspace, select Discovery & Classification > Scans Management.
2. Under the Scope Selection drop down, select Scan Profiles.
3. Select a scan profile.
Page 13 of 77
4. In the Data Types tab:
5. You can enable or disable any data type by selecting or de-selecting the appropriate
check box.
Here we have created the “BOI PII&CII profile”, and then enable or disable the data
types required by the BOI.
6. In the Settings tab, we tick the manual or automatic update the secure SecureSphere
configuration based on classification result. Here we have selected the manually
review results before update. After scanning we shared the scan result with DB owner
and they update us the
Actual table details which contain the given data type.
7. Select the “save sample data” based on accuracy level 0.7% (i.e. 70%).It will save the
sample of data present in the scan table where data type accuracy will matched 70 %
.
8. Click Save.
Page 14 of 77
DB Credential configuration:
To configure the DB user password of particular server group for which we need to do
classification (Configure the “Direct Access Information” & Configure the “Direct Access
Information”)
1. In the Main workspace, click Setup > Sites.
2. Click the Server group for which we need to do risk assessment. Select the Service of
database, and select a ”Direct Access Information” under “Definition” tab , then provide
the required details like DB user name , password, verify password , port, SID.
3. Click the save button, then click on “Test Connection”. Once the connection is
successful add the same details in “Database Connections” by clicking on “+” icon. After
providing the required details click on “Save” and then click on “test connection”
Page 15 of 77
To configure data classification options:
1. In the Main workspace, select Discovery & Classification > Scans Management.
The Scans window appears.
2. Select an existing Data Classification Scan or click New and create a new Data
Classification Scan and provide the name of scan.
3. Select the Scan name and go to the Details pane, click the Settings tab. Data
Classification options are displayed.
4. If you so desire, you can change the scan profile you wish the scan to use. You can
configure the profile if you want, adding data types and rules, and deleting data types
and user-defined rules. For more information, configure a Scan Profile as mention in
above.
5. Click the Apply to tab and select the services on which you want to run data
classification. For more information on Apply to, see Applying Policies.
6. Click the Scheduling tab and configure scheduling options if you want service
discovery to run on a regular basis. For more information on scheduling
see Configuring Scheduling.
7. Click Save in the upper right of the screen. Your settings are saved.
8. Once the scan has been configured, it can be run by selecting Action > Run Now
Page 16 of 77
After successful scanning to see the scan result Go to the DISCOVERY &
CLASSIFICATION > Classification DB Data. In given page click on “DB Data
Classification Results”. Where we can generate PDF or Create the Report of given scan
result.
Once scan is complete we generate the PDF or CSV and share the same with DB owner so
that they can provide us the actual Table which contain the respective DATA type. After
getting the data from DB owner we accept or reject the discovered classified data. So that
we will get the sensitive table groups for creating sensitive data access policy.
1. Go to the DISCOVERY & CLASSIFICATION > Classification DB Data.
2. In given page click on “DB Data Classification Results”.
3. In result pane we select the “Accepted by user” or “Rejected by User” in action
column of respective table as per the details receive from the DB owner.
4. Click on “SAVE”.
5. After saving the above classification result it create the Table Groups on the base of
data type and server group under Setup >Global Object > Table Groups. Which
we are adding in the “Sensitive data access” security policy for generating the alert
for Sensitive tables.
Page 17 of 77
Action configuration for classified data.
Page 18 of 77
Creating Security Policy for Sensitive Data Access:
Page 19 of 77
To configure the DB user password and Server OS credential (Configure the “Direct Access
Information” & Configure the “Direct Access Information”)
.
1. In the Main workspace, click Setup > Sites.
2. In the Sites tree, select the database for which you want to configure database
credentials.
3. Select the Service of database, and select a ”Direct Access Information” under
“Definitions” tab , then provide the required details like DB user name , password, verify
password , port, SID.
4. Click the save button, then click on “Test Connection”. Once the connection is
successful add the same details in “Database Connections” by clicking on “+” icon. After
providing the required details click on “Save” and then click on “test connection”
POLICY Base:
Page 20 of 77
once created but in the Tag base scan rule we can select the different policy on the base
of Tag assign to the policy which we can change depend on requirement.).. Select the
type of database you want to assess, and select a Policy, then click Create.
3. Click Save.
4. Go to the scheduled option of the created rule and click Run the Assessment Scan now.
The scan will run.
5. Once complete, we can review assessment scan results by selecting the “Risk Console”
and clicking the “Assessment Results”. There is option to generate the report in pdf or
create as report option at the top of Assessment result.
TAG Base:-
6. In the Main workspace, click Risk Management > DB Assessment Scans.
7. Click “+” and create Tag base scan type and provide the name of Rule. Go to the DB
Assessment policy. Select the policy based on DB type and click on “Details” option and
type the name of the policy tag and enter (it will display the name as given in the below
screen)and click the “Save” .
Page 21 of 77
8. Go to the “DB Assessment Scans” and select the new rule which we created and select
the policy tag in “setting” option. To view the applied policy click on “view effective policy”
button Click the Apply to tab, then select the services you want to assess.
9. Click Save.
10. Go to the scheduled option of the created rule and click Run the Assessment Scan now.
The scan will run.
Page 22 of 77
Page 23 of 77
Agent Configuration in DAM console
1.7. Site and Server Group Configuration
Server groups are a representation of one or more servers located in a specific site. A server
in SecureSphere is a set of services or applications belonging to a single IP address. Server
groups enable SecureSphere to identify the specific entities at a site that need to be
protected, and whose operations you want to track and audit. They also allow you to select
the traffic that you want to manage using the following features: Ignore IP, limit monitoring to
specific IP addresses, manage applied policies on the server group level, and set server
group status
Creating the Site, Server Groups:
To create a Site & Server group:
1. In the Main workspace, select Setup > Sites.
2. In the Sites window, you will see the “default site”. To create the new SITE click on “+”.
Create site window will appear. Type the name of site and click on create. In BOI we have
created the “BOI_DC” and “BOI_DR” sites in DC and DR respectively
3. To create the server group, select the “BOI_DC” site in which you want to create the new
server group. The selected site information appears in the Details pane.
4. In the title bar of the Sites Tree pane, click on “+”. The Create Server Group dialog box
appears.
5. Type a name for the new server group, then click Create. The new server group is created
and added to the selected site in the Site Tree. E.g. here we have given the name IMT_DC.
6. Click Save. Settings are saved.
Page 24 of 77
Create the Service:
1. Right click on server group and click “create service”
2. Create Service dialog box will open. Type the name of service and select the type of
database service. E.g. Here we have type name as “IMT_Postgress_SQL” and selected the
“PostgreSQL Service”.
3. Click on “Save” Settings are saved.
Page 25 of 77
To Configuring Agent Operation Mode and protected IP address.
Operation mode defines the behaviour of SecureSphere regarding current traffic. There are
three operation modes: active, Simulation and disabled. To configure the operation mode:
1. In the Main workspace, select Setup > Sites. The Sites window appears.
2. Click the server group whose operating mode you want to modify. The server group
details appear in the Sites window.
3. Click the Definitions tab. The Definitions options are displayed.
4. Select the option button of the desired Operation Mode. The options include:
Active
Simulation
Disabled
5. We have selected the “Active” as we have to monitor and configure apply the policies on
given group.
Determines the operation mode of the server group and that of all defined services and
applications belonging to the server group. The three available operation modes are:
Active: Configures SecureSphere to actively monitor traffic and apply policies. This means
that alerts are generated and traffic is blocked when required by a policy.
Simulation (default): Configures SecureSphere to simulate monitoring. It monitors traffic
and generates alerts and violations, but does not prevent traffic from reaching its destination
(block). It is recommended to use simulation mode when SecureSphere is learning traffic.
Disabled: Suspends all monitoring and blocking activities. Can be used to help
troubleshooting. Traffic flows uninterrupted through SecureSphere. Disabled mode can be
used as a temporary fix to overcome problems with configuration that generates a hail of
alerts or blocks sources that need to have access to the network. Use disabled mode
carefully.
6. In Protected IP address we have to add the agent IP. To add new agent ip click “+”
under the protected IP address .Type the new agent ip and select the gateway
group. E.g. here we have type the IP “172.1.30.49” and Gateway group we have
selected “DCBOI” (Gateway cluster name.)
7. Go to the server tab and select the OS type.
Page 26 of 77
8. Click on “Save” for configuration save.
Page 27 of 77
Agent Configuration:
1. In the Main workspace, select Setup > Agents option.
2. Click on “New agents” option to see the new add agent.
3. Click on given agent and select the “Explore in Workbench”.
4. Given agent will show in “Agents” pane of Workbench.
5. Go to the “settings” tab in Agent configuration window at bottom.
6. Select the relative server group and service type which we have created for
given agent.
7. Go to Data interfaces and select the respective service which we have
created in all discovered interfaces.
8. Click “SAVE” to save the configuration.
9. Right click on agent and select the “restart agent” option to push the new
configuration on agent.
Page 28 of 77
Page 29 of 77
Policy Creation
Page 30 of 77
Go to the Main workspace, select Setup > Agents option. Select the servers which are in
the above server groups. Right click on selected agent and click “restart agent” agent
option.
Page 31 of 77
To configure an audit policy:
1. Go to the Main workspace of MX, select Policies > Security..
2. Click the “+” sign and from the drop down list, select “DB Service” for creating the New
Database Policy window will opens.
3. Type the Name for the Audit policy.
4. Select either From Scratch, or if you already created the policy template then tick Use
Existing option and select the existing policy template from the list.
5. If you select from the scratch then Click Create for new policy creation.
6. We have to select the new Audit policy which we have created and then select “Match
criteria” tab in Policy detail pane. We have to add the matching criteria for which we are
required Audit. In BOI we have selected two matching criteria “Event Type” & “operation” in
which we have selected the “Query” & “insert, delete, update, Privileged Operations”
operation respectivly for which we required Audit.
Page 32 of 77
7. After selecting the match criteria Go to the “Apply To” tab and select the server group on
which we need to apply the policy.
8. To set the quota (max disk use by the policy to store the audit data in the gateway) Go to
the “Settings” tab and under Quota section give the maximum Size (GB) and maximum Size
(%). Here we have given 500 GB and 70 %. Which we can change as per requirement.
9. Go to the Archive tab to schedule archiving jobs. Select the Action set and Archive
setting from the drop down. (Here we have selected the “Audit_archive” action set and
“Default Archiving Setting” which we have created in BOI for the same). Specify the
time and purging
10. Go to “External logger” tab for enable to send audit logs to any third-party SIM/SIEM
system. Select the audit syslog action from the drop down and Enable the option “Enable
using gateway configuration if exist”
11. Click Save for save the Settings.
12. After saving the configuration, we have to push the configuration on gateway and agent.
Go to the Main workspace, select Setup > Agents option. Select the servers which are in
the above server groups. Right click on selected agent and click “restart agent” agent
option.
Page 33 of 77
Page 34 of 77
Report Creation
Page 35 of 77
In BOI we have created the alert reports for individual server groups with follow action set of
mail, which send the daily alert reports to respective DB Owners. Also we have created the
Audit report for all individual server groups which store in the NFS partition through script.
Path of Report in backend: cd /opt/SecureSphere/server/SecureSphere/jakarta-tomcat-
secsph/webapps/SecureSphere/WEB-INF/reptemp
To configure Audit Reports :
1. In the Main workspace, select Reports > Manage Reports. The Manage Reports
window appears displaying available report definitions and configuration options.
2. In the Reports pane of the Report Management window, click New. The New report
type dropdown menu appears.
3. Select a report type for audit select the “DB Audit” , alert report for based on security
policy, The Create Report dialog box appears for the report type you selected.
4. Type a name for the report. This name appears both in the generated report and in
the View Results window.
5.Type a Report Description (optional). This description appears in the generated
report.
6.Click the radio button to identify the basis of your new report. You have two options:
From Scratch: Creates a report from scratch with all available parameters needing to
be configured.
Use existing: Enables you to select an existing report definition to use as the basis for
the new report. If you click this radio button, select the existing report to be used as the
basis for the new report from the Use existing drop-down list. Only available for alerts,
and system events. NOTE: Remove the existing audit policy and server group of
selected policy template.
7. Enable the Copy Permissions from Existing Report if desired. This will apply the
same permissions to the new report definition as those from the existing report that was
selected.
8. Click Create. SecureSphere creates the requested report.
9. Select the new created report, go to “DATA SCOPE” tab and select the audit policy
name related the selected server server group. In collection at time frame select Last
and type 1 and select day from drop down. So that it will generate the report for last day.
10. In Available Field select the “server group” by clicking the upper arrow and select
the respective server group for which you want to generate the report.
11. Go to Tabular tab and select the column of the reports.
12. Go to Data Analysis Views tab if you want the graphical representation. We have
disabled the all graph in given tab.
13. Go to Scheduling for schedule the report time. We select recurring option and select
daily , type 1 day and select the date and time of execution. It will generate the daily
report at provided time.
14. Go to the “General Details” and select the format of the report. i.e. CSV or PDF
format.
15. Click “SAVE” for saving the configuration.
Page 36 of 77
Page 37 of 77
Page 38 of 77
Alert report Creation:
1. In the Main workspace, select Reports > Manage Reports. The Manage Reports window
appears displaying available report definitions and configuration options.
2. In the Reports pane of the Report Management window, click New. The New report type
dropdown menu appears.
3. Select a report type alert which are based on security policy, The Create Report dialog
box appears for the report type you selected.
4. Type a name for the report. This name appears both in the generated report and in the
View Results window.
5. Type a Report Description (optional). This description appears in the generated report.’
6. Click the radio button to identify the basis of your new report. You have two options:
From Scratch: Creates a report from scratch with all available parameters needing to
be configured.
Use existing: Enables you to select an existing report definition to use as the basis for
the new report. If you click this radio button, select the existing report to be used as the
basis for the new report from the Use existing drop-down list. Only available for alerts,
and system events. NOTE: Remove the existing security policy and server group of
selected policy template.
16.Enable the Copy Permissions from Existing Report if desired. This will apply the
same permissions to the new report definition as those from the existing report that was
selected.
17.Click Create. SecureSphere creates the requested report.
18.Select the new created report, go to “DATA SCOPE” tab .In Available Field select
multiple field. “Alert Type” field select all operation type except profile. Select “Custom
Policy” Field and select the “security policy” name of server groups for which we want to
generate the alert report. Select the “server group” by clicking the upper arrow and
select the respective server group for which you want to generate the report. Then
select Last few days field and select “1”. It will generate the last day alert report for given
server group.
19.Go to Tabular tab and select the column of the reports.
20. Go to Data Analysis Views tab if you want the graphical representation. We have
disabled the all graph in given tab.
21.Go to Scheduling for schedule the report time. We select recurring option and select
daily , type 1 day and select the date and time of execution. It will generate the daily
report at provided time.
22.Go to the “General Details” and select the format of the report. i.e. CSV or PDF
format.
23. Click “SAVE” for saving the configuration.
Page 39 of 77
Page 40 of 77
Page 41 of 77
Monitoring
1.10. Monitoring Alerts, Violation, System event and Alarms:
Monitoring is a key phase in the SecureSphere application data management lifecycle.
SecureSphere is equipped with a user friendly monitor that clearly displays generated
information in a central location. Real-time information that is generated includes system
events, alerts, violations, blocked sources, gateway and agent status, system warnings,
database auditing, file server auditing, and archiving information.
Alert Monitoring:
On the base of Security policy real time alerts are generating. Alerts are notifications that a
violation or group of violations (of security policies) have taken place on monitored traffic. A
single security attack might contain a long sequence of violations, each generating an
individual alert and resulting in an alert storm. To correlate alerts into a of logical group,
prevent alert storms and assist in identifying attacks, SecureSphere aggregates violations
based on attack type, then displays aggregated violation. It consist the alerts that start with
name Distributed which is aggregation of alert of specific type on that specific duration. In
Details pane, we can see the bifurcation of these alerts based on Sources IP, Application
and SQL users based. For which we have to click on icon
To monitor the real time alert, Go to the Main Manu > Alerts.
It contain three panes filter pane, alert pane and details pane. In filter we can view the
alert based on the different filter like Severity, Action, Alert Type, Alert Flag, Alert Number,
and Server groups, Service, User Name and Source IP etc. For robust filtering we can
choose the Advance filter option at the bottom. Here we can view the alert on specific time
frame, object type and violation type.
In Alert pane there are 6 column.
First column consist the alert number.
Second column consist the Action performed i.e. Block or none.
Third consist a Severity.
Fourth consist the alert time.
Fifth consist the “number of occurrence”.
Six column consist an Alert description.
In Details pane we can view the alert details Event time, connection, gateway, server group,
source ip, source application, Source activity, OS users, query, database and schema
details and DB user details.
Page 42 of 77
Page 43 of 77
Violations Monitoring:
On the base of Violation type we will see the real time alerts here. Violations are warnings
that an event has taken place which violates a policy defined in SecureSphere. As opposed
to alerts, violations provide a specific indication regarding an event that has taken place,
including a number. of details regarding the offending traffic. This assists you in analyzing violations and
determining what type of threat they may pose to your data
To monitor the real time violation, Go to the Main Manu > Violations.
It contain three panes filter, Violations and details. In filter we can view the alert based on the
different filter like Severity, Action, Alert Type, Alert Flag, Alert Number, Server groups,
Service, User Name and Source IP etc. For robust filtering we can choose the Advance filter
option at the bottom. Here we can view the alert on specific time frame, object type and
violation type.
In Alert pane there are 6 column.
First column consist the Time.
Second column consist the Event ID.
Third consist a Service Type.
Fourth consist the Event Type.
Fifth consist the Source IP
Six column consist a User.
Seven Column consist a Destination IP.
Eight Column consist the Violation details.
Page 44 of 77
In Details pane we can view the alert details Event time, connection, gateway, server group,
source ip, source application, Source activity, OS users, query, database and schema
details and DB user details
Monitor System:
Monitor system shows the alarms generated by the MX, SOM, Cluster, Gateways and agent.
This needs to be monitor frequently.
To configure the alarm from MX we have to GO to Monitor> Monitor System > configured.
Page 45 of 77
In BOI these settings are pushed from the SOM hence we have to configure from the SOM.
To Configure from SOM Go to the Monitor System > Configuration.
IN SOM
Page 46 of 77
1.11. Incident Creation & Closure Process:
On the base of daily alert report. We share the alert report to respective department through
mail. Bank DAM team is creating the Incident for the same in HP SM tool. On the base of
proper SD or approval of authorized bank team, we send the mail to SOC team to close the
incident. Closure time of incident is 2 days. We are maintaining the all alert details in one
excel sheet with IM details.
1. Navigation pane: shows all Clusters and Gateway Groups on the MX server
2. Overview pane: Gives an overview of the state and health of the item selected in the
navigation pane. It shows the cluster status, Total load
3. Status Charts: Shows the health of the Agents and/or Gateways of the item selected in
the navigation pane.
4. Filters pane: Applies filters to the assets in the Assets pane
5. Assets pane: Gives a detailed view of the Gateway Groups, Gateways or Agents of the
item selected in the navigation pane. Allows configuration, movement and other actions
on these assets
Page 47 of 77
In Assets pane go to the Gateways tab, where we can see the gateway role, running status,
Network status, theoretical & calculated load and version. In Agent tab we can see the
agent status.
To see the DB users or process traffic distribution for particular agent. Just select the agent
and click on “traffic distribution” option at top of assets pane. It will open Agent traffic
distribution traffic where we can see the last 15 min or 7 days traffic analysis of particular
process or DB user. i.e. It consist IN and OUT traffic forwarded by the agent and IN and
OUT traffic ignore by the agent.
Note: We have enabled the automatically Load Balanced cluster configuration. In which we
cannot move the agent from on gateway to other. Cluster itself maintaining the load
balancing depend on the calculated Load and move the agent automatically.
Cluster Management page details:
Cluster Status: We have created DCBOI, DRBOI cluster in DC and DR DAM respectively.
Page 48 of 77
Gateway Status:
Agent Status:
Page 49 of 77
Checking the Real-time Gateway status:
On Daily bases we have to monitor the gateway status i.e. CPU, SQL HIT, throughput and
connection/sec.
To monitor the real-time gateway status Go to the Main Menu> Monitor >Dashboard. Here
we can see the gateways real time CPU utilization, sql hit/s, throughput, connection/s. Alerts
and system events in graphical format. Page contain 5 panes.
1. SOM status pane: It shows the SOM connectivity with MX.
2. Gateways Pane: Lists the gateways currently being managed by SecureSphere.
3. Server Group Pane: Lists the server groups configured for the selected gateway,
provides statistics regarding traffic on the server groups, and provides a visual cue as to the
current operating status by using a green checkmark (running), or red exclamation mark
(warning). When a warning is displayed, you can hover over the warning to display a tooltip
with details regarding what is causing the warning. When no gateway is selected, server
groups for all gateways are displayed.
4. Alert Pane: Displays a list of alerts that have been generated by SecureSphere. To open
an alert’s details, click on the alert. Retrieves data every 10 seconds while graphs are
refreshed every 3 seconds. If a filter has been applied, displays only those alerts that match
the filter, with the type of filter appearing in the title bar. List displays amount of alerts that
can fit in window.
5. System Event Pane: Displays a list of system events generated by SecureSphere.
Retrieves data every 10 seconds.
Page 50 of 77
To view CPU Load/SQL Hits:
Displays a graph for all gateways showing either the current CPU load or hits per second.
You can manually change between the two graphs, or configure the display to automatically
alternate.
To View Throughput/Connections:
Displays a graph for all gateways showing either the current gateway throughput or
connections per second. You can manually change between the two graphs, or configure the
display to automatically alternate.
Page 51 of 77
Audit Log Storage Status of Gateways:
To see the storage occupied by the audit log on the all gateways.
Go to the Main menu > Audit and select the Dashboard. Given Page consist of three
panes.
1. Storage Usage Overview Pane: Contain the graphical representation of gateway
storage status. It shows gateway storage status based on “Adequate available storage”,
“approaching full usage”, “Quota exceeded”.
To see the details view, click on respective graph. It will shows the graph of total, free and
used space of gateway by the audit logs. Also at bottom it will show the details of disk
utilization of gateway by audit policy.
Currently we are storing the 2 Weeks Audit log on the gateways. If we found any gateway
shows the quota exceeded graph then we have to see which audit policy quota was
exceeded in details view by clicking on given graph. Once we found policy whose quota was
exceeded then we to archive and purge that audit policy manually.
NOTE: Manually archive and purging steps are provide at Backup section of this document.
2. Audit Archive jobs requiring Attention: It shows the list of last five Audit archive
schedule jobs which finish with error or warnings. To see the last five status of job of
particular job click on view option under action column.
3. Audit Report requiring Attention: It shows the list of last five Audit report schedule jobs
which finish with error or warnings. To see the last five status of job of particular job click on
view option under action column.
Page 52 of 77
Details view of Audit storage:
Page 53 of 77
To view the Audit log and analysing audit policy statistics on gateway
Audit Details:
To View the audit data Go to Main menu> Audit and select the DB Audit data. In this
section we can see the audit summary, Data and statistics of audit data of particular audit
policy. There are different view section through which we can analyse the collected audit
logs.
Source Analysis: A category of views which provides information that assist in analysing
the source of database traffic and provides advanced insight into items such as shared
database users. Views include tables of data which can be added to a filter and charts that
graphically represent data. This can assist in obtaining insight into the source of database
traffic including users, source IP addresses, logins and more. Available source analysis
views include Shared DB User, Most Active Users, Source Applications, Source Host, OS
Users, Source IPs, User Groups, Login Analysis and Performance by Source.
Data Access Patterns: A category of views which provides information regarding the
manner in which information in the database was accessed. This can assist in obtaining
insight into the types of queries being performed, most commonly used queries, sensitive
queries that have been conducted and more. Available data access pattern views include
Top Queries, Query Type Analysis, Sensitive Query Overview, Query Records and Data
Modification Analysis
Additional Views: Additional views provide various information regarding audit operations
that may be of value such as failed logins and errors in the SQL traffic. Available additional
views include Failed Logins, SQL Errors, and Unmonitored Encrypted Logins.
Time Based Analysis: A category of views which provides information about database
activity in different time frames. This gives insight regarding patterns of activity. Available
time based analysis views include Daily, Day of the Week and Hours of Day.
Page 54 of 77
Audit Management Statistics:
Imperva generates a number of statistics that reflect the operation of the audit mechanism
and its impact on overall Imperva operation. These statistics assist in determining if the
current settings for audit collection match the amount of audit data your system has been
configured to collect. They also assist in determining if current settings match the overall
configuration of SecureSphere, or whether they may impact other operations that use the
same system resources. For example, you can gauge whether audit quotas are sufficient for
audit policies based on the configuration. Also you can generate the report for the same.
In addition to displaying audit statistics based on a specific policy, we can display audit
statistics related to the gateway and management server. This provides an overview
regarding the efficiency of audit configurations to assist in making decisions regarding
managing the resources of system, archiving data, disk usage, understanding how load is
impacting operation (if there are lost events), and more.
Page 55 of 77
Stats on the base of Gateway:
Page 56 of 77
BACKUPS
1.13. Backup configuration and process
Export Backup
Audit Archive
Report Archive
Audit Archive: Imperva Audit Archiving is the process of making a Copy of complete
Audit data collected by the gateway from all the agents as per the Audit policy defined
in the MX. It is created as MPRV format file with the Policy Name. These file we can
import in the MX whenever there is requirement to see the audit details for particular
site or group depend upon requirement.
Report Archive: Imperva Report archiving is the process of making a Copy of all Alert
and Audit Reports generated by the MX. It is created MPRV format file for the same.
1.13.2. REQUIRMENT
Create the Backup of DAM solution, audit and report data on external Location for Disaster
recovery. Purge the older than 2 week audit data in Gateway.
In “172.1.57.43” NFS server, folders “ImpervaDCNew” and “ImpervaDRNew” are mounted at
“media/mount “point in DC and DR MX and gateways respectively. Imperva backup schedules
are coping the Archive and Report data on daily bases and MX configuration on Weekly bases
on these external NFS location. Old data of “172.1.57.43” they are manually coping in to the DR
Shared folder “\\172.26.63.6\dambackupfolder” as per available free space in “172.1.57.43”
server from there they are taking the data into the TAPES.
Page 57 of 77
1.13.3. Pre-Configuration requirement
I. Configuring the NFS Share Folder
To mount the NFS folder in MX and gateway. We have to first create the NFS shared folder
on“172.1.57.43” server. Right Click on the folder select the NFS sharing tab and Click on the
“Manage NFS sharing option”. Tick the “Share this folder” option and click on permission
button. Here we have to add the IP of MX and GW of DC with the “Read & Write” type of
access and “Everyone” user should have “No Access” permission. Similarly configure the
NFS folder for DR and give the permission to DR MX and gateways IP.
DC FOLDER
Page 58 of 77
DR FOLDER
Page 59 of 77
II. Mounting the Audit Archive Directory (NFS) (Imperva OS version 13.6.0.40)
To permanently mount an NFS directory:
1. Confirm that the NFS server is running on the remote machine.
2. Confirm that the directory is shared.
3. SSH to the gateway.
1. Login as root.
2. Create a destination directory for the mount point (for example, /media/mount).
3. Run below command to add the entry in crontab so that every reboot it automatically
mount.
crontab –e
IN DC MX
@reboot root sleep 60;mount -t nfs -o nolock,nfsvers=3 172.1.57.43:/ImpervaDCNew
/media/mount
@reboot root sleep 60;mount -t nfs -o nolock,nfsvers=3 172.1.57.43:/ImpervaDCNew
/media/backup
IN DC GW
@reboot root sleep 60;mount -t nfs -o nolock,nfsvers=3 172.1.57.43:/ImpervaDCNew
/media/mount
IN DR MX
Page 60 of 77
@reboot root sleep 60;mount -t nfs -o nolock,nfsvers=3 172.1.57.43:/ImpervaDRNew
/media/mount
@reboot root sleep 60;mount -t nfs -o nolock,nfsvers=3 172.1.57.43:/ImpervaDRNew
/media/backup
IN DR GW
@reboot root sleep 60;mount -t nfs -o nolock,nfsvers=3 172.1.57.43:/ImpervaDRNew
/media/mount
Page 61 of 77
1.13.4. CONFIGURATION OF ACTION SET FOR EXPORT BACKUP AND REPORT
ARCHIVE
Configuring the EXPORT and Report Archive setting first we have to create the Action set.
Where we define the path for Archiving data. In BOI we have created the separate action set
for Export and audit archive.
Steps:-
Login to the MX “MAIN” interface and click on “POLICY” and select the System “ACTION
SET”. Click on “+” to add the path of backup. Type the Name and select the “Archive” type.
In BOI we have created the “System Archive” action for taking EXPORT backup.
Select the “NFS Archive>MX_backup_Archive” type the Directory path “/media/backup” and
“save” the setting.
Page 62 of 77
============================================== ===================
Page 63 of 77
For manual backup click on “Export Now” option
DC MX:
DR MX:
Page 64 of 77
For Manual Archive Select the Audit policy and click on “Action” option at corner and select
“Archive Now” Option. It will open Immediate Archiving window. In that Select the Achieving
Action set, Archive Settings as mention above and tick the Purge Archived Records if want
to purge the log then click “Archive” .
Page 65 of 77
1.14. DC & DR AUDIT POLICY WITH DISC QUOTA AND PURGE PERIOD DETAILS
Page 66 of 77
Disc Quota Disc Quota
Policy Name Archive Enabled Archive Settings Purge Period (%) (GB)
BOI SFMS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI BTESIP Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI FO IB Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI BBPS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI Star Token Audit
Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI EMERGE Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI ATM Recon Audit
Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI -Table operations TRUE Default Archiving Settings 2 Weeks 50 200
BOI EWS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI FO Treasury Audit
Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI FO StarToken Audit
Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI Finacle Domestic
Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI CBOD Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI - Login and Logout
Audit TRUE Default Archiving Settings 2 Weeks 50 200
BOI FO CBS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI SARAL Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI GPS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI UPI Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI DMS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI GST Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI - DDL commands TRUE Default Archiving Settings 2 Weeks 50 200
BOI - DML Commands TRUE Default Archiving Settings 2 Weeks 75 750
BOI CTS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI Financial Inclusion
Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI PIM Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI Treasury Domestic
Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI CKYC Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI RECON Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI RRBCBS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI Internet Banking Audit
Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI CAPS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI CFeedback Audit
Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI EFRMS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI Mobile Banking Audit
Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI EDW Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI - Database
configuration changes TRUE Default Archiving Settings 2 Weeks 50 200
BOI HRMS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI AML Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
BOI SMS Audit Policy TRUE Default Archiving Settings 2 Weeks 50 200
Page 67 of 77
1.15. REPORT ARCHIVE AND PURGING CONFIGURATION
Go to the “Admin” Console of the MX. Click on “Maintenance” Option and select “Report
Archive” option. In Report Archiving select the Archiving Action as “System Export” which
we have created for MX backup and Archive Setting as “Default Archiving Settings”.
Note: Above setting will archive the report on daily in External NFS mount point with
MPRV format.
For manual backup click on “Archive Now” option. . It will Archive all the reports and save
single PRV file in NFS folder.
For manual Purging click on “Purge Now” option. It will purge all the reports.
DC
DR
Page 68 of 77
1.16. Other Configuration:
Uploading the License:
1. Go to the Admin Manu> License
2. Click on Action and select the import option. Upload window will open.
3. Click Choose File, browse to the location of the file and select it.
4. Click Upload. The upload begins and the Update License Information progress bar is
displayed.
When the status is reported as 100%, click Continue
Page 69 of 77
Adding Route for particular subnet or agent IP in the Gateway
In Imperva DAM we have two interface. MGM (eth0) and Agent communication interface
(eth1).
If agent is having 172.1.30.X series IP then we have to add the route for given agent ip
towards the Agent communication interface. Default it will sent the traffic from the eth0.
Check the route in DAM gateway. If specific route is not available then we have to add the
static route on gateway for agent facing interface.
To add the route.
1) Login to the gateway CLI and type below command.
Impcfg
Page 70 of 77
3) Select the 1 ( manage network)
Page 71 of 77
6) Type the “host” ( if you want to add route for single ip other wise type “network”)
7) Type the IP address ( for network we have to add the network e.g. “172.1.13.0/24”)
8) Type the gateway 172.1.80.1 ( type the gateway of interface from where you want to send
the traffic. Here we have to send through eth1 interface which is for agent communication)
Page 72 of 77
12) Type “S” for Save the configuration and then type “q” quit the console after save the
configuration.
Page 73 of 77
Manually Updating Gateway Configuration.
This process need to be follow when the gateway create the core file and it do not
contain the update configuration.
Gateway reverted to last known good configuration appears on the Dashboard or
under Setup
The below procedure relevant for SecureSphere versions
The gateway always keeps a local copy of the last good configuration it has loaded.
If a configuration update from the MX to the gateway fails for some reason, the gateway
reverts to his old configuration working configuration
Page 74 of 77
Extracting the Archive report file MPRV
To extract the content of the archive report (which is stored in External storage daily in
MPRV format ) follow below steps.
1. Copy the archive report file from /media/mount to /tmp
======================================================================
2. Collect the generated file from /var/tmp/ or /tmp and send it to support.
From GUI:
Notes:
Page 75 of 77
The Gateway must be in the status Running.
When exporting technical information from a Onebox architecture, both Gateway and MX
technical information is exported.
3. Run: ./racli
The log file ragent_tech_support.case-X.Y.tar.gz will be created and available under /var or
/tmp (for default installations it will be under /opt/imperva/agent/var )
Note: X and Y are numbers that represent counter of the number of times this operation was
performed.
Note: The Agent collects all relevant debugging data. The operation of collecting information
may take several minutes to complete depending on the Server host.
Page 76 of 77
4. Get Agent Technical info for all selected agents window will open type the comment
and click OK.
5. Performing agent operation window will open which show the progress bar.
6. After completing, it will ask for save the generated file. Provide the path to save the file
and click finish.
Page 77 of 77