The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following
information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it
is not installed in accordance with NetScreen’s installation instructions, it may cause interference with radio and television reception. This equipment has
been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These
specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Consult the dealer or an experienced radio/TV
technician for help. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warranty and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET
THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
Viewing Rules36
Enabling/Disabling Rules37
Creating a Rule37
Event Rule Tests47
Copying a Rule52
Deleting a Rule53
Grouping Rules53
Viewing Groups53
Creating a Group54
Editing a Group55
Copying an Item to Another Group(s)56
Deleting an Item from a Group57
Assigning an Item to a Group58
Editing Building Blocks58
5MANAGING REPORTS
Using the Reports Interface62
Using the Navigation Menu62
Using the Toolbar63
Viewing Reports63
Grouping Reports64
Creating a Group65
Editing a Group66
Copying a Template to Another Group66
Deleting a Template From a Group67
Assigning a Report to a Group68
Creating a Report68
Creating a Template69
Configuring Charts76
Selecting a Graph Type85
Using Default Report Templates86
Generating a Report 87
Duplicating a Report87
Sharing a Report88
Branding Your Report88
ADEFAULT RULESAND BUILDING BLOCKS
Default Rules91
Default Building Blocks101
AGLOSSARY
INDEX
ABOUT THIS GUIDE
The STRM Log Management Users Guide provides information on managing
STRM Log Management including the Dashboard, Reports, and Event Viewer
interfaces.
ConventionsTable 1 lists conventions that are used throughout this guide.
Table 1 Icons
IconTypeDescription
Information noteInformation that describes important features or
instructions.
CautionInformation that alerts you to potential loss of
data or potential damage to an application,
system, device, or network.
WarningInformation that alerts you to potential personal
injury.
Technical
Documentation
You can access technical documentation, technical notes, and release notes
directly from the Juniper Networks support web site at https://juniper.net/support.
Once you access the Juniper Networks support web site, locate the product and
software release for which you require documentation.
Your comments are important to us. Please send your e-mail comments about this
guide or any of the Juniper Networks documentation to:
documentation@juniper.com.
Include the following information with your comments:
•Document title
•Page number
STRM Log Management Users Guide
2ABOUT THIS GUIDE
Contacting
Customer Support
To help you resolve any issues that you may encounter when installing or
maintaining STRM Log Management, you can contact Customer Support as
follows:
•Log a support request 24/7: https://juniper.net/support
For access to the Juniper Networks support web site, please contact Customer
Support.
•Access Juniper Networks support and Self-Service support using e-mail:
support@juniper.net
•Telephone assistance: 1-800-638-8296.
STRM Log Management Users Guide
1
ABOUT STRM LOG MANAGEMENT
STRM Log Management is a network security management platform that provides
situational awareness and compliance support through security event correlation,
analysis, and reporting. This chapter provides an overview of the STRM Log
Management interface including:
•Logging In to STRM Log Management
•Dashboard
•Event Viewer
•Reports
•Using STRM Log Management
•STRM Log Management Administration Console
Note: When navigating STRM Log Management, do not use the browser Back
button. Use the navigation options available with STRM Log Management to
navigate the interface.
Logging In to STRM
Log Management
Step 1 Open your web browser.
Step 2 Log in to STRM Log Management:
Step 3 Click Login To STRM Log Management.
To login to STRM Log Management:
https://<
Where <
The default values are:
Username: admin
Password: <root password>
Where
during the installation process. For more information, see the STRM Log Management Installation Guide.
For your STRM Log Management Console, a default license key provides you
access to the interface for 5 weeks. A window appears providing the date that the
IP Address>
IP Address> is the IP address of the STRM Log Management system.
<root password> is the password assigned to STRM Log Management
STRM Log Management Users Guide
4ABOUT STRM LOG MANAGEMENT
temporary license key will expire. For information on installing a permanent license
key, see the STRM Log Management Administration Guide.
DashboardThe Dashboard tab is the default interface that appears when you log in to STRM
Log Management. The Dashboard tab provides summary and detailed information
on events occurring on your network. The Dashboard is customizable on a per
user basis to focus on individual user’s security or network operations
responsibilities.
Note: For more information on using the Dashboard, see Chapter 2Using the
Dashboard.
STRM Log Management Users Guide
Event Viewer5
Event ViewerThe Event Viewer allows you to view event logs being sent to STRM Log
Management in real-time, or through searches. The Event Viewer is a powerful
tool for performing in-depth investigations on event data.
Note: For more information, see Chapter 3 Using the Event Viewer.
ReportsReports is a flexible and robust reporting package that allows you to create,
distribute, and manage reports for any data within STRM Log Management.
Reports allows you to create customized reports for operational and executive use
by combining any combination of information into a single report. You can also use
the many pre-installed report templates included with STRM Log Management.
The Reports tab also allows you to brand your reports with your customized logos
enabling you to support various unique logos for each report. This is beneficial for
distributing reporting to different audiences.
Note: For more information on Reports, see Chapter 5 Managing Reports.
STRM Log Management Users Guide
6ABOUT STRM LOG MANAGEMENT
Using STRM Log
Management
Sorting ResultsIn the Event Viewer tab you can sort the resulting tables by clicking on a column
Using STRM Log Management, you can:
•Sort the results. See Sorting Results.
•Refresh the interface. See Refreshing the Interface.
•Pause the current display. See Pausing the Interface.
•Further investigate an IP address. See Investigating IP Addresses.
•View the time of the STRM Log Management Console. See STRM Log
Management Time.
•View the STRM Log Management on-line Help. See Accessing On-line Help
heading. A single click of the desired column sorts the results in descending order
and a second click on the heading sorts the results in ascending order. An arrow at
the top of the column indicates the direction of the sort.
For example, if you wish to sort the events by Name, click the Name heading. An
arrow appears in the column heading to indicate the results are sorted in
descending order.
Click the Name column heading again if you wish to sort the information in
ascending order.
Refreshing the
Interface
The Event Viewer and the Dashboard allow you to refresh the interface. This
refresh option is located in the right corner of the interface. The timer indicates the
amount of time since the interface was refreshed. To refresh the interface, click the
refresh icon.
Pausing the InterfaceYou can use the refresh timer, located on the right, to pause the current display. To
pause the interface, click the pause icon . The timer flashes red to indicate the
current display is paused. Click the icon again to restart the timer.
Investigating IP
Addresses
You can use the right-mouse button (right-click) on any IP address to access
additional menus, which allow you to further investigate that IP address. The menu
options include:
Note: For information on customizing the right-click menu, see the Customizing
the Right-Click Menu Technical Note.
STRM Log Management Users Guide
Using STRM Log Management7
Table 1- 1 Additional Options
MenuSub-MenuDescription
InformationDNS LookupSearches for DNS entries based on the IP
address.
WHOIS LookupSearches for the registered owner of a
remote IP address (Default system server:
whois.crsnic.net.)
Port ScanPerforms a NMAP scan of the selected IP
address. This option is only available if
NMAP is installed on your system. For more
information on installing NMAP, see your
vendor documentation.
STRM Log
Management Time
Accessing On-line
Help
The right corner of the STRM Log Management interface displays STRM Log
Management time, which is the time of the STRM Log Management Console. The
STRM Log Management Console time synchronizes all STRM Log Management
appliances within the STRM Log Management deployment, and is used to
determine the time events were received from other devices for proper time sync
correlation.
You can access the STRM Log Management on-line Help through the main STRM
Log Management interface. To access the on-line Help, click Help > Help Contents. The Help interface appears.
STRM Log Management Users Guide
8ABOUT STRM LOG MANAGEMENT
STRM Log
Management
Administration
Console
The STRM Log Management Administration Console is a client-based application
that provides administrative users access to administrative functionality including:
•System Configuration - Allows you configure system wide STRM Log
Management settings including, users, thresholds, system settings, backup and
recovery, license keys, network hierarchy, authentication, or automatic
updates.
•Access the deployment editor - Allows you to manage the individual
components of your STRM Log Management deployment.
•Configure sensor devices - Allows you to configure sensor devices, which
provide events to your deployment through DSMs.
All configuration updates using the Administration Console are saved to a staging
area. Once all changes are complete, you can deploy the configuration changes or
all configuration settings to the remainder of your deployment.
For more information regarding the STRM Log Management Administration
Console, see the STRM Log Management Administration Guide.
STRM Log Management Users Guide
2
USINGTHE DASHBOARD
The Dashboard allows you to create a customized portal to monitor any data
STRM Log Management collects, to which you have access. The Dashboard is the
default view when you log in to STRM Log Management and allows you to monitor
several areas of your network at the same time. Normal activity and suspicious
behaviors can be investigated directly from the Dashboard. Also, you can detach
an item and monitor the item directly from your desktop.
This chapter includes:
•About the Dashboard
•Event Viewer
•Reports
•System Summary
•Adding Items
About the
Dashboard
The Dashboard allows you to monitor your security event behavior. By default, for
non-administrative users, the Dashboard is empty. For administrative users, the
Dashboard displays the following:
•System Summary
•Events - Average Events Per Second
•Events By Severity
•Most Recent Reports
•Top Devices
Note: The items that appear on your Dashboard depends on the access you have
been granted. For more information on user roles, see the STRM Log
Management Administration Guide.
The content that appears on the Dashboard is user-specific. You can design the
Dashboard as you wish, as the changes made within a STRM Log Management
session affect only your system. The next time you log in, STRM Log Management
reflects your last Dashboard configuration.
STRM Log Management Users Guide
10USINGTHE DASHBOARD
You can move and position items to meet your requirements. You can stack items
in one panel or distribute them evenly within the three panels. When positioning
items, each item automatically resizes in proportion to the panel. The Dashboard
interface refreshes regularly to display the most recent information.
Using the DashboardYou can add, remove, or detach items on the Dashboard. Once added, each item
appears with a titlebar. Using the Dashboard, you can:
•Adding Items - Provides the list of items that you can add to your Dashboard.
You can monitor the following items:
-Event Viewer
-Reports
-System Summary
•Removing an Item - To remove an item from the Dashboard, click the red icon
located in the upper right corner of the item.
A confirmation window appears before an item is removed. Removing an item
does not remove the item from STRM Log Management. Removing an item
clears the item from the Dashboard. You can add the item again at any time.
•Detaching an Item - To detach an item from the Dashboard, click the green
icon located in the upper right of the item. Detaching an item does not remove
the item from STRM Log Management; detaching an item duplicates the data in
a new window.
Detaching an item allows you to temporarily monitor one or more particular
items on your desktop. You can detach the item then remove the item from the
Dashboard - the detached window remains open and refreshes during
scheduled intervals. If you close the STRM Log Management application, the
detached window remains open for monitoring and continues to refresh until
you manually close the window or shut down your computer system.
Note: STRM Log Management does not save the status of a detached Dashboard
item when you end your STRM Log Management session.
Event ViewerYou can add several Event Viewer items to your Dashboard. The Event Viewer
allows you to monitor and investigate events in real-time. Event Viewer options
include:
•Events Over Time
•Events By Severity
•Top Devices
Events Over TimeThe Events Over Time option displays events received over the last 8 hours in 15
minute intervals, categorized by the event category.
STRM Log Management Users Guide
Event Viewer11
Note: You must have the required permissions to access Event Viewer items.
To customize your display:
•Period of Time - Using the drop-down list box, select the period of time you
wish the Dashboard graph to display.
•Chart Type - You can display the data using a Time Series (default), Line
Chart, or Pie Chart. To change the chart type, click Time Series, Line Chart or
Pie Chart at the top of the graph.
Events By SeverityThe Events By Severity item displays a pie chart that specifies the number of
active events grouped by severity. This item allows you to see the number of
events that are being received by the level of severity that has been assigned.
Severity indicates the amount of threat an attacker poses in relation to how
prepared the target is for the attack. The range of severity is 0 (low) to 10 (high).
Top DevicesThe Top Devices item displays a pie chart that specifies the top 10 devices that
sent events to STRM Log Management within the last 15 minutes. The number of
events sent from the specified device is indicated in the pie chart. This item allows
STRM Log Management Users Guide
12USINGTHE DASHBOARD
you to view potential changes in behavior, for example, if a firewall device that is
typically not in the top 10 list is now contributing to a large percentage of the
overall message count, you should investigate this occurrence.
ReportsThe Reports option allows you to display the top recently generated reports. The
display provides the report title, the time and date the report was generated, and
the format of the report.
System SummaryThe Summary item provides a high-level summary of activity within the past 24
hours. Within the summary item, you can view the following information:
•Current Events Per Second - Specifies the number of current events per
second.
•New Events (Past 24 Hours) - Specifies the total number of new events
received within the last 24 hours.
STRM Log Management Users Guide
Adding Items13
Adding Items You can add multiple displays to the Dashboard interface. To add an item to the
Dashboard:
Step 1 Click the Dashboard tab.
The Dashboard interface appears.
Step 2 From the toolbar, click Add Item.
A list of menu items appears.
Step 3 Navigate through the categories, options include:
•Event Viewer
•Reports
•System Summary
Each panel highlights as you pass an item over the panel signalling an item can be
dropped into that panel. If the item titlebar is above the titlebar of an existing item,
the new item assumes position above the existing item.
STRM Log Management Users Guide
3
USINGTHE EVENT VIEWER
An event is an action that occurs on a network or a host. The Event Viewer allows
you to monitor and investigate events in real-time or perform advanced searches.
You must have permission to view the Event Viewer interface. For more
information on assigning roles, see the STRM Log Management Administration Guide.
This chapter provides information on using the Event Viewer including:
•Using the Event Viewer Interface
•Viewing Events
•Using the Search
•Modifying Event Mapping
•Exporting Events
Note: When STRM Log Management normalizes events, the system normalizes
names as well. Therefore, the name that appears in the Event Viewer may not
match the name that appears in the event.
STRM Log Management Users Guide
16USINGTHE EVENT VIEWER
Using the Event
Viewer Interface
This section provides information on using the Event Viewer interface including:
•Using the Toolbar
•Using the Right-Click Menu Options
Using the ToolbarUsing the toolbar, you can access the following options:
Table 3-1 Toolbar Options
OptionDescription
Allows you to perform advanced searches on events including:
• Edit Search - Allows you to perform a search.
• Quick Searches - Allows you to perform previously saved
searches. This option only appears when you have saved
search criteria.
For more information, see
Allows you to save the current search criteria.
Allows you to configure custom event rules to detect a single event
(within certain properties) or event sequences. For information on
rules, see
Allows you to perform the following actions:
• Show All - Removes all filters on search criteria and presents
all events.
• Print - Allows you to print the events displayed in the window.
• Export to XML - Allows you to export events in XML format.
See
• Export to CSV - Allows you to export events in CSV format.
See
Allows you to display events grouped by criteria specified in the
drop-down list box.
Chapter 4Configuring Rules.
Exporting Events.
Exporting Events.
Using the Search.
Using the Right-Click
Menu Options
Using the right mouse button (right-click), you can access the Filter menu options,
which allows you to filter on the selected event, depending on the selected item in
the event. For example, if you right-click on a Category of IP Protocol Anomaly, the
following filter options appear:
Filter on Category is IP Protocol Anomaly
Filter on Category is not IP Protocol Anomaly
STRM Log Management Users Guide
Viewing Events17
Viewing EventsBy default, the Event Viewer interface displays normalized events. Initially, the
Event Viewer displays events that occurred during the previous minute and the
interface refreshes each minute.
You can sort the resulting tables by clicking on a column heading. A single click of
the desired column sorts the results in descending order and a second click on the
heading sorts the results in ascending order. An arrow at the top of the column
indicates the direction of the sort.
You can also view events using the following options:
•Viewing Normalized Events
•Viewing Raw Events
•Viewing Aggregate Normalized Events
Viewing Normalized
Events
Step 1 Click the Event Viewer tab.
Step 2 From the Display drop-down list box, select None.
To view normalized events:
The Event Viewer window appears.
Table 3- 2 Event Viewer
ParameterDescription
Current FiltersThe top of the table displays the details of the filter applied to the
search results. To clear these filter values, click Clear Filter.
Event NameSpecifies the normalized name of the event.
DeviceSpecifies the device that sent the event to STRM Log
Management.
STRM Log Management Users Guide
18USINGTHE EVENT VIEWER
Table 3-2 Event Viewer (continued)
ParameterDescription
Event CountSpecifies the total number of bundled events that constitute this
normalized event. Events are bundled when many of the same
type of event for the same source and destination IP address are
seen within a short period of time.
TimeSpecifies the date and time that STRM Log Management
received the event.
Low Level
Category
Specifies the low-level category associated to this event. For
more information on event categories, see the Event Category Correlation Reference Guide.
Source IPSpecifies the source IP address of the event.
Source PortSpecifies the source port of the event.
Destination IPSpecifies the destination IP address of the event.
Destination PortSpecifies the destination port of the event.
UsernameSpecifies the username associated with this event. Usernames
are often available in authentication related events. For all other
types of events where the username is not available, this field is
empty.
MagnitudeSpecifies the magnitude of this event. Variables include
credibility, relevance, and severity. Point your mouse to the
magnitude bar to display values and the calculated magnitude.
Step 3 Double-click the event you wish to view in greater detail.
The event details window appears.
The details results provides the following information:
STRM Log Management Users Guide
Viewing Events19
Table 3- 3 Event Details
ParameterDescription
Event NameSpecifies the normalized name of the event.
Low Level
Category
Specifies the low-level category of this event.
For more information on categories, see the Event Category Correlation Reference Guide.
Event DescriptionSpecifies a description of the event, if available.
SeveritySpecifies the severity of this event.
CredibilitySpecifies the credibility of this event.
RelevanceSpecifies the relevance of this event.
MagnitudeSpecifies the magnitude for this event.
Source IP Specifies the source IP address of the event.
Source PortSpecifies the source port of this event.
Destination IP Specifies the destination IP address of the event.
Destination PortSpecifies the destination port of this event.
Pre NAT Source IPNetwork Address Translation (NAT) translates an IP address in
one network to a different IP address in another network. For a
firewall or another device capable of NAT, this parameter
indicates the source IP address before the NAT values were
applied.
Pre NAT Source
Port
Pre NAT
Destination IP
For a firewall or another device capable of NAT, this parameter
indicates the source port before the NAT values were applied.
For a firewall or another device capable of NAT, this parameter
indicates the destination IP address before the NAT values were
applied.
Pre NAT
Destination Port
For a firewall or another device capable of NAT, this parameter
indicates the destination port before the NAT values were
applied.
Post NAT Source IPFor a firewall or another device capable of NAT, this parameter
indicates the source IP address after the NAT values were
applied.
Post NAT Source
Port
Post NAT
Destination IP
For a firewall or another device capable of NAT, this parameter
indicates the source port after the NAT values were applied.
For a firewall or another device capable of NAT, this parameter
indicates the destination IP address after the NAT values were
applied.
Post NAT
Destination Port
For a firewall or another device capable of NAT, this parameter
indicates the destination port after the NAT values were applied.
ProtocolSpecifies the protocol associated with this event.
UsernameSpecifies the username associated with this event, if available.
QIDSpecifies the STRM Log Management identifier for this event.
Each event has a unique QID. For information on mapping a QID,
see
Modifying Event Mapping.
STRM Log Management Users Guide
20USINGTHE EVENT VIEWER
Table 3-3 Event Details (continued)
ParameterDescription
DeviceSpecifies the device that sent the event to STRM Log
Management.
Event CountSpecifies the total number of bundled events that constitute this
normalized event. Events are bundled when many of the same
type of event for the same source and destination IP address are
seen within a short period of time.
Start TimeSpecifies the time of the first event, as reported to STRM Log
Management by the device.
End TimeSpecifies the end time of the last event, as reported to STRM Log
Management by the device.
Device TimeSpecifies the system time of the device.
PayloadSpecifies payload content from the event. To view the payload in
Hex, click Hex. To view the payload in UTF, click UTF. To view in
Base64, click Base64.
Matched Custom
Rules
Specifies custom rules that have matched to this event. For more
information on rules, see the STRM Log Management
Administration Guide.
AnnotationsSpecifies the annotation or notes for this event.
The event details provides the following functions:
Table 3-4 Event Details Toolbar
IconFunction
Viewing Raw EventsTo view raw event data:
Step 1 Click the Event Viewer tab.
The Event Viewer window appears.
Step 2 From the Display drop-down list box, select Raw Events.
Raw event data appears
Allows you to return to the list of events.
Allows you to edit the event mapping. For more information,
see
Modifying Event Mapping.
Allows you to print the event details.
STRM Log Management Users Guide
Viewing Events21
The raw events window results provides the following information:
Table 3- 5 Raw Events Parameters
Viewing Aggregate
Normalized Events
ParameterDescription
Current FiltersThe top of the table displays the details of the filter applied to the
search results. To clear these filter values, click Clear Filter.
Start TimeSpecifies the time of the first event, as reported to STRM Log
Management by the device.
DeviceSpecifies the device that originated the event.
PayloadSpecifies the original event payload information in UTF-8 format.
Using the Event Viewer, you can view events aggregated (grouped) by various
options.
Table 3- 6 Aggregate Normalized Events
Aggregate OptionDescription
Event NameDisplays a summarized list of events grouped by the
normalized name of the event.
Source IPDisplays a summarized list of events grouped by the source
IP address of the event.
Destination IPDisplays a summarized list of events grouped by the
destination IP address of the event.
Source PortDisplays a summarized list of events grouped by the source
port address of the event.
Destination PortDisplays a summarized list of events grouped by the
destination port address of the event.
STRM Log Management Users Guide
22USINGTHE EVENT VIEWER
Table 3-6 Aggregate Normalized Events (continued)
Aggregate OptionDescription
High Level CategoryDisplays a summarized list of events grouped by the
high-level category of the event.
For more information on categories, see the Event Category Correlation Reference Guide.
Low Level CategoryDisplays a summarized list of events grouped by the
low-level category of the event.
For more information on categories, see the Event Category Correlation Reference Guide.
MagnitudeDisplays a summarized list of events grouped by the
magnitude for this event. The variables used to calculate
magnitude include credibility, relevance, and severity.
CredibilityCredibility indicates the integrity of an event as determined
by the credibility rating from source devices. Credibility
increases as the multiple sources results grouped by the
credibility of the event. This aggregate option displays a
summarized list of events grouped by the credibility of the
event.
SeveritySeverity indicates the amount of threat an attacker poses in
relation to how prepared the target is for the attack. This
value is mapped to an event category that is correlated to
the offense. This aggregate option displays a summarized
list of events grouped by the severity of the event.
RelevanceRelevance indicates the significance of an event. This option
displays a summarized list of events grouped by the
relevance of the event.
UsernameDisplays a summarized list of events grouped by the
username associated with the events.
DeviceDisplays a summarized list of events grouped by the devices
that sent the event to STRM Log Management.
Device TypeDevice Type indicates the type of device that originated the
event. This aggregate option displays a summarized list of
events grouped by device type.
Device GroupDisplays a summarized list of events grouped by device
group.
NetworkDisplays a summarized list of events grouped by the network
associated with the event.
Src IP/ Dst IP / Dst
Port/ User
Displays a summarized list of events grouped by the source
IP address, destination IP address, destination port, and the
user.
Src IP/ Dst IP / Dst
Port/ Event Name
Displays a summarized list of events grouped by the source
IP address, destination IP address, destination port, and the
name of the event.
Src IP/ Event Name/
User
Displays a summarized list of events grouped by the source
IP address, event name, and user.
Displays a summarized list of events grouped by the source
IP address, destination IP address, event name, and user.
Src IP/ Dst IP/ UserDisplays a summarized list of events grouped by the source
IP address, destination IP address , and the username
associated with the event.
Src IP / Dst IPDisplays a summarized list of events grouped by traffic from
the source IP address to destination IP address.
Dst IP/ PortDisplays a summarized list of events grouped by destination
IP address and port.
Event Name/ DeviceDisplays a summarized list of events grouped by the event
name and the device that sent the event to STRM Log
Management.
Device/ High Level Cat Displays a summarized list of events grouped by the device
that sent the event to STRM Log Management and the
high-level category.
For more information on categories, see the Event Category Correlation Reference Guide.
Device/ High Level
Cat./ Low Level Cat.
Displays a summarized list of events grouped by the device
that sent the event to STRM Log Management and the high
and low-level categories.
Matched Custom RuleDisplays a summarized list of events grouped by the
associated custom rule.
Event Name/ Device
Group
Device Group/ High
Level Cat
Displays a summarized list of events grouped by the event
name and the device group.
Displays a summarized list of events grouped by the device
group and the high-level category.
For more information on categories, see the Event Category Correlation Reference Guide.
Device Group/ High
Level Cat/ Low Level
Cat
Displays a summarized list of events grouped by the device
group and the low-level category.
For more information on categories, see the Event Category Correlation Reference Guide.
Src IP/ MACDisplays a summarized list of events grouped by the source
IP address and the source MAC address.
Src NAT/ Dst NATNetwork Address Translation (NAT) translates an IP address
in one network to a different IP address in another network.
The list of events that appears includes a summarized list of
events grouped by the source and destination information
(IP address and port) before and after NAT was applied.
Src IP/ High Level CatDisplays a summarized list of events grouped by the source
IP address and the high-level category. The aggregate
results provides a list of source IP addresses.
For more information on categories, see the Event Category
Correlation Reference Guide.
STRM Log Management Users Guide
24USINGTHE EVENT VIEWER
Table 3-6 Aggregate Normalized Events (continued)
Aggregate OptionDescription
Src IP/ Low Level CatDisplays a summarized list of events grouped by the source
IP address and the low-level category.
For more information on categories, see the Event Category Correlation Reference Guide.
Dst IP/ High Level CatDisplays a summarized list of events grouped by the
destination IP address and the high-level category.
For more information on categories, see the Event Category Correlation Reference Guide.
Dst IP/ Low Level CatDisplays a summarized list of events grouped by the
destination IP address and the low-level category.
For more information on categories, see the Event Category Correlation Reference Guide.
Src IP / Dst IP/ High
Level Cat
Displays a summarized list of events grouped by the source
IP address to destination IP addresses and the high-level
category.
For more information on categories, see the Event Category Correlation Reference Guide.
Src IP / Dst IP/ Low
Level Cat
Displays a summarized list of events grouped by the source
IP address to destination IP addresses and the low-level
category.
For more information on categories, see the Event Category Correlation Reference Guide.
To view aggregate normalized events:
Step 1 Click the Event Viewer tab.
The Event Viewer window appears.
Step 2 From the Display drop-down list box, select the desired option. For more
information, see Table 3-6 Aggregate Normalized Events.
The event information appears.
Note: The column layout of the data depends on the chosen display option.
STRM Log Management Users Guide
Viewing Events25
The events window results provides the following information:
Table 3- 7 Event Name Parameters
ParameterDescription
Current FiltersThe top of the table displays the details of the filter applied to the
search results. To clear these filter values, click Clear Filter.
GraphsDisplays a bar chart representing the top 10 aggregates,
depending on the chosen aggregate option. Click Hide Chart if
you wish to remove the graph from your display.
Legend Reference A colored box in this field associated this event to the graph.
Event NameSpecifies the normalized name of the event.
Source IPSpecifies the source IP address associated with this event. If
there are multiple IP addresses associated with this event, this
field indicates Multiple and the number.
Destination IPSpecifies the destination IP address associated with this event. If
there are multiple IP addresses associated with this event, this
field indicates Multiple and the number.
Destination PortSpecifies the destination ports associated with this event. If there
are multiple ports associated with this event, this field indicates
Multiple and the number.
DeviceSpecifies the device that sent the event to STRM Log
Management. If there are multiple devices associated with this
event, this field indicates Multiple and the number.
STRM Log Management Users Guide
26USINGTHE EVENT VIEWER
Table 3-7 Event Name Parameters (continued)
ParameterDescription
CategorySpecifies the low-level category of this event. If there are multiple
categories associated with this event, this field indicates Multiple
and the number.
For more information on categories, see the Event Category Correlation Reference Guide.
ProtocolSpecifies the protocol ID associated with this event.
UsernameSpecifies the username associated with this event, if available.
Max MagnitudeSpecifies the maximum calculated magnitude for all summarized
events. Variables used to calculate magnitude include credibility,
relevance, and severity.
CountSpecifies the total number of bundled events that constitute this
normalized event. Events are bundled when many of the same
type of event for the same source and destination IP address are
seen within a short period of time.
STRM Log Management Users Guide
Using the Search27
Using the SearchThe Event Viewer allows you to search for a specific event or a set of events. You
can also save event search criteria for future use. This section provides
information on searching events including:
•Searching Events
•Deleting Saved Searches
Searching EventsTo search events:
Step 1 Click the Event Viewer tab.
The Event Viewer window appears.
Step 2 Choose one of the following options:
a If you have previously saved search criteria you wish to use for this search,
select Search > Quick Searches from the drop-down list box.
b If you wish to start a new search, select Search > Edit Search from the
drop-down list box.
The search window appears.
Step 3 Enter values for the desired filter criteria:
STRM Log Management Users Guide
28USINGTHE EVENT VIEWER
Table 3-8 Event Search Criteria
ParameterDescription
Saved SearchesUsing the drop-down list box, select a previously saved search
you wish to apply to this search, if desired.
Other options include:
• Delete - Using the drop-down list box, select the search you
wish to delete. Click Delete.
• Include in my Quick Searches - Select the check box if you
wish to include this search in your Quick Search items, which
is available in the Search drop-down list box.
• Share with Everyone - Select the check box if you wish to
share the saved search with all other STRM Log Management
users.
Time RangeChoose one of the following options:
• Real Time - Select this option if you wish to filter on events
while in auto-refresh mode.
• Recent - Select the option and, using the drop-down list box,
specify the time range you wish to filter.
• Specific Interval - Select the option and, using the calendar,
specify the date and time range you wish to filter.
Test and Filters
Add Filter Options Using the options, define your specific search criteria including:
• From the first drop-down list box, select an attribute you wish
to search. For example, Any IP, Source Port, or Protocol.
• From the second drop-down list box, select the modifier you
wish to use for the search. The list of modifiers that appear
depends on the attribute selected in the first list.
• In the text field, enter specific information related to your
search.
For example, if you select Destination IP from the first drop-down
list box, Equals from the second drop-down list box, and enter
10.100.10.100 for the destination IP address you wish to search,
the search results returns results for this criteria.
For each criteria you wish to add to the filter, enter the desired
values and click Add Filter to add the filter to the Current Filter
list. Repeat for all filters you wish to add to the search criteria.
Current FiltersLists current search criteria filters. To remove any listed filter,
select the filter and click Remove Selected Filters.
Search Parameters
Sort/AggregateUsing the drop-down list box, specify whether you wish to sort
your search results by criteria specified in the By drop-down list
box or view your search results using an Aggregate value.
ByUsing the drop-down list box, select additional event criteria you
wish to use when searching
STRM Log Management Users Guide
Table 3- 8 Event Search Criteria (continued)
ParameterDescription
Search OrderSpecify the order you wish to display for the search results. The
options are: Descending or Ascending.
Step 4 Click Filter.
If you selected a sort criteria in your Search Parameters, the normalized events
appear. For more information on your search results, see Viewing Normalized
Events.
If you selected an aggregate value in your Search Parameters, the aggregate
events appear. For more information on your search results, see Viewing
Aggregate Normalized Events.
The results appear. If the number of returned events exceeds the value configured
in the Web Max Matched Results parameter in the System Settings window (for
more information, see the STRM Log Management Administration Guide), a
message appears indicating that only the maximum search results are provided.
Step 5 To save the specified search criteria for future use:
a Click Save Search.
Using the Search29
The Save Search window appears.
b Enter values for the parameters:
Table 3- 9 Save Search Parameters
ParameterDescription
Search NameSpecify a name you wish to assign to this search criteria.
Time RangeChoose one of the following options:
• Real Time - Select this option if you wish to filter on events while
in auto-refresh mode.
• Recent - Select the option and, using the drop-down list box,
specify the time range you wish to filter.
• Specific Interval - Select the option and, using the calendar,
specify the date and time range you wish to filter.
STRM Log Management Users Guide
30USINGTHE EVENT VIEWER
Table 3-9 Save Search Parameters
c Click OK.
ParameterDescription
Include in my
Quick
Select the check box if you wish to include this search in your Quick
Search items, which is available in the Search drop-down list box.
Searches
Share with
Everyone
Select the check box if you wish to share these search requirements
with all other STRM Log Management users.
Deleting Saved
Searches
Step 1 Click the Event Viewer tab.
Step 2 From the Search drop-down list box, select Edit Search.
Step 3 In the Saved Searches drop-down list box, select the search you wish to delete.
Step 4 Click Delete.
To delete previously saved searches:
The Event Viewer window appears.
The filter/search window appears.
STRM Log Management Users Guide
Modifying Event Mapping31
Modifying Event
Mapping
STRM automatically maps an event of a Device Support Module (DSM), also
known as a sensor device, for normalization purposes. Using the event mapping
tool, you can associate or map a normalized or raw event to a high-level and
low-level category (or QID). This allows STRM Log Management to map unknown
device events to known STRM events so that they can be categorized and
correlated appropriately.
STRM Log Management may receive events from DSMs that the system is unable
to categorize. STRM Log Management categorizes these types of events as
unknown. These events may occur for several reasons including:
•User-defined Events - Some DSMs, such as SNORT, allow you to create
user-defined events.
•New Events or Older Events - Third party devices may update their software
with maintenance releases to support new events that STRM may not support.
To modify event mapping:
Step 1 Click the Event Viewer tab.
The Event Viewer window appears.
Step 2 For any normalized event, double-click the event you wish to map.
For more information on viewing normalized events, seeViewing Normalized
Events. For information on viewing raw events, see Viewing Raw Events.
Step 3 Click Map Event.
The Device Event window appears.
STRM Log Management Users Guide
32USINGTHE EVENT VIEWER
Step 4 Choose one of the following options:
a If you know the QID that you wish to map to this event, enter the desired QID in
the Enter QID field. Go to Step 6.
b If you wish to search for a particular QID, go to Step 5.
Step 5 To search for a particular QID or high and low-level categories that you wish to
map this event to:
a In the High-Level Category drop-down list box, specify the high-level category
you wish to apply to this event.
b In the Low-Level Category drop-down list box, specify the low-level category
you wish to apply to this event.
A list of QIDs appears.
c From the QID list, select the QID you wish to assign to this normalized event.
Step 6 Click Ok.
STRM Log Management Users Guide
Exporting Events33
Exporting EventsYou can export events in Extensible Markup Language (XML) or Comma
Separated Values (CSV).
To export events:
Step 1 Click the Event Viewer tab.
The Event Viewer window appears.
Step 2 Choose one of the following:
a If you wish to export the event(s) in XML format, select Export to XML from the
Actions drop-down list box.
b If you wish to export the event(s) in CSV format, select Export to CSV from the
Actions drop-down list box
The status window appears. When the export is complete, the window disappears
or click Notify When Done to resume your activities and receive a notification
when the export is complete.
STRM Log Management Users Guide
34USINGTHE EVENT VIEWER
STRM Log Management Users Guide
4
CONFIGURING RULES
An event is an incident that is detected by your security devices in your enterprise.
You can create an event rule to events by performing a series of tests. If all the
conditions of a test are true, the rule generate a response. Building blocks are
rules without a response. Responses to a rule include:
•Generation of an event
•Generation of a response to an external system (syslog, SNMP)
•Send an e-mail
The tests in each rule can also reference other building blocks and rules. You do
not need to create rules in any specific order since the system will check for
dependencies each time a new rule is added, edited, or deleted. If a rule that is
referenced by another rule is deleted or disabled, a warning appears and action is
not taken.
Each rule may contain the following components:
•Functions - With functions, you can use building blocks and other rules to
create a multi-event function. You can also OR rules together, using the when we see an event match any of the following rules function.
•Building blocks - A building block is a rule without a response and is
commonly used as a common variable in multiple rules or used to build
complex rules or logic that you wish to use in other rules. You can save a group
of tests as building blocks for use with other functions. Building blocks allow you
to re-use specific rule tests in other rules. For example, you can save a building
block that includes the IP addresses of all mail servers in your network and then
use that building block to exclude those hosts from another rule. The building
block defaults are provided as guidelines, which should be reviewed and edited
based on the needs of your network.
•Tests - Property of an event, such as, source IP address, severity of event, or
rate analysis.
A user with non-administrative access can create rules for areas of the network
that they have access. You must have the appropriate role access to manage
rules.
STRM Log Management Users Guide
36CONFIGURING RULES
This chapter includes:
•Viewing Rules
•Enabling/Disabling Rules
•Creating a Rule
•Copying a Rule
•Deleting a Rule
•Grouping Rules
•Editing Building Blocks
Viewing RulesTo view deployed rules, rule type, and status:
Step 1 Select the Event Viewer tab.
The Event Viewer window appears.
Step 2 Click Rules.
The Rules List window appears.
Step 3 In the Display drop-down list box, select Rules.
The list of deployed rules appear. For more information on default rules and
building blocks, see Appendix ADefault Rules and Building Blocks.
Step 4 Select the rule you wish to view.
In the Rule and Notes fields, descriptive information appears.
STRM Log Management Users Guide
Enabling/Disabling Rules37
Enabling/Disabling
To enable or disable a rule:
Rules
Step 1 Select the Event Viewer tab.
The Event Viewer window appears.
Step 2 Click Rules.
The Rules List window appears.
Step 3 In the Display drop-down list box, select Rules.
The list of deployed rules appear.
Step 4 Select the rule you wish to enable or disable.
Step 5 From the Actions drop-down list box, select Enable/Disable.
The Enable column indicates the status.
Creating a RuleTo create a new rule:
Step 1 Select the Event Viewer tab.
The Event Viewer window appears.
Step 2 Click Rules.
The Rules List window appears.
Step 3 From the Actions drop-down list box, select New Event Rule.
The Custom Rule wizard appears.
STRM Log Management Users Guide
38CONFIGURING RULES
Note: If you do not wish to view the Welcome to the Custom Rules Wizard window
again, select the Skip this page when running the rules wizard check box.
Step 4 Read the introductory text. Click Next.
The Rules Test Stack Editor window appears.
Step 5 To add a test to a rule:
STRM Log Management Users Guide
Creating a Rule39
In the Test Group drop-down list box, select the type of test you wish to apply to
a
this rule.
The resulting list of tests appear. For information on tests, see Event Rule
Tes ts .
b For each test you wish to add to the rule, select the + sign beside the test.
The selected test(s) appear in the Rule field.
c For each test added to the Rule field that you wish to identify as an excluded
test, click and at the beginning of the test.
The and appears as and not.
d For each test added to the Rule field, you must customize the variables of the
test. Click the underlined configurable parameter to configure. See Event Rule
Tes ts .
e Repeat for all tests you wish to apply to this rule.
Step 6 In the enter rule name here field, enter a name you wish to assign to this rule.
Step 7 To export the configured tests as building blocks to use with other rules:
a Click Export as Building Block.
The Save Building Block window appears.
b Enter the name you wish to assign to this building block.
c Click Save.
Step 8 To assign multi-event functions to the rule, select Functions from the Test Group
drop-down list box and configure the function:
The functions include:
STRM Log Management Users Guide
40CONFIGURING RULES
Table 4-1 Functions Group
TestDescriptionDefault Test NameParameters
Multi-Rule
Event Function
Allows you to use saved
building blocks and other rules
to populate this test. The event
has to match either all or any of
the selected rules. If you wish to
create an OR statement for this
rule test, specify the any
when an event
matches any of the
following rules
Configure the following parameters:
• any - Specify either any or all of
the configured rules apply to this
test.
• rules - Specify the rules you wish
this test to consider.
parameter.
Multi-Rule
Event Function
Allows you to use saved
building blocks or other rules to
populate this test. This function
allows you to detect a specific
sequence of selected rules
involving a source and
destination within a configured
time period.
when all of these
rules, in order, from
the same IP
address/Port/QID/
Event/Device/
Category {default:
source IP} to the
same destination IP,
over this many time
intervals
Configure the following parameters:
• these rules - Specify the rules you
wish this test to consider.
• in - Specify whether you wish this
rule to consider in or in any order.
• the same - Specify if you wish this
rule to consider the same or any of
the source to destination port or IP
address.
• IP address/Port/QID/
Event/Device/ Category - Specify
whether you wish this rule to
consider a source IP address,
source port, QID, device event ID,
device, or category.
• the same - Specify if you wish this
rule to consider the same or any of
the source to destination port or IP
address.
• destination IP - Specify whether
you wish this rule to consider a
destination IP or port.
• this many - Specify the number of
time intervals you wish this rule to
consider.
• time intervals - Specify the time
interval you wish this rule to
consider. The options are:
seconds, minutes, hours, or days.
STRM Log Management Users Guide
Table 4- 1 Functions Group (continued)
TestDescriptionDefault Test NameParameters
Multi-Rule
Event Function
Allows you to use saved
building blocks or other rules to
populate this test. You can use
this function to detect a number
of specified rules, in sequence,
involving a source and
destination within a configured
time interval.
when at least this
number of these
rules, in order, from
the same IP
address/Port/QID/
Event/Device/
Category {default:
source IP} to the
same destination IP,
over this many time
intervals
Configure the following parameters:
• this number - Specify the number
of rules you wish this function to
consider.
• these rules - Specify the rules you
wish this test to consider.
• in - Specify whether you wish this
rule to consider in or in any order.
• the same - Specify if you wish this
rule to consider the same or any of
the source to destination port or IP
address.
• IP address/Port/QID/
Event/Device/ Category - Specify
whether you wish this rule to
consider a source IP address,
source port, QID, device event ID,
device, or category,
• the same - Specify if you wish this
rule to consider the same or any of
the source to destination port or IP
address.
• destination IP - Specify whether
you wish this rule to consider a
destination IP or port.
• this many - Specify the number of
time intervals you wish this rule to
consider.
• time intervals - Specify the time
interval you wish this rule to
consider. The options are:
seconds, minutes, hours, or days.
Multi-Event
Sequence
Function
Between Hosts
Allows you to detect a sequence
of selected rules involving the
same source and destination
hosts within the configured time
intervals. You can also use
saved building blocks and other
rules to populate this test.
when this sequence of rules, involving the
same source and
destination hosts in
this many time
intervals
Configure the following parameters:
• of rules - Specify the rules you
wish this test to consider
• this many - Specify the number of
time intervals you wish this test to
consider.
• time intervals - Specify the time
measurement value, seconds,
minutes, hours, or days you wish
to apply to this test.
Creating a Rule41
STRM Log Management Users Guide
42CONFIGURING RULES
Table 4-1 Functions Group (continued)
TestDescriptionDefault Test NameParameters
Multi-Event
Counter
Function
Allows you to test the number of
events from configured
conditions, such as, source IP
address. You can also use
building blocks and other rules
to populate this test.
emitting/receiving
more than5 {default}
of these rules across
more than 5 {default}
IP address /Port /QID/
Event/Device/
Category {default:
destination IP}, over
10 {default} minutes
Configure the following parameters:
• IP address/ Port/QID/Event/
Device/Category - Specify the
source you wish this test to
consider. The options are:
anything, a source IP, a source
Port, a QID, Device Event ID, or a
Device.
• more than - Specify if you wish
this test to consider more than or
exactly the number of rules.
• 5 - Specify the number of rules you
wish this test to consider.
• these rules - Specify the rules you
wish this test to consider.
• more than - Specify if you wish
this test to consider more than or
exactly the number of destination
IP address(es), destination port(s),
QID(s), Device Event ID(s), or
Device(s).
• 5 - Specify the number of IP
addresses, ports, QIDs, events,
devices, or categories you wish
this test to consider.
• IP address /Port /QID/
Event/Device/ Category - Specify
the destination you wish this test to
consider. The options are:
anything, destination IP(s),
destination port(s), QID(s), device
event ID(s), or device(s).
• 10 - Specify the time value you
wish to assign to this test.
• minutes - Specify the time
measurement value, seconds,
minutes, hours, or days that you
wish to apply to this test.
STRM Log Management Users Guide
Table 4- 1 Functions Group (continued)
TestDescriptionDefault Test NameParameters
Multi-Rule
Function
You can also use building
blocks or existing rules to
populate this test. Allows you to
detect a series of rules for a
specific IP address or port
followed by a series of specific
rules for a specific port or IP
address.
when all of these
rules, in order, with
the same destination IP address/port
followed by all of these
rules in order with the
same IP address/port
from the previous
source, within this
many time intervals
Configure the following parameters:
• rules - Specify the rules you wish
this test to consider.
• in - Specify if you wish this test to
consider rules in a specific order.
• destination - Specify whether you
wish this test to consider
destination or source IP address or
port.
• IP address/Port - Specify if you
wish this test to consider the IP
address or port.
• rules - Specify the rules you wish
this test to consider.
• in - Specify if you wish this test to
consider rules in a specific order.
• IP address/port - Specify if you
wish this test to consider the IP
address or port.
• this many - Specify the number of
time intervals you wish this rule to
consider.
• time intervals - Specify the time
interval you wish this rule to
consider. The options are:
seconds, minutes, hours, or days.
Creating a Rule43
STRM Log Management Users Guide
44CONFIGURING RULES
Table 4-1 Functions Group (continued)
TestDescriptionDefault Test NameParameters
Multi-Rule
Function
You can also use building
blocks or existing rules to
populate this test. Allows you to
detect a number of specific rules
for a specific IP address or port
followed by a number of specific
rules for a specific port or IP
address.
when at least this
number of these
rules, in order, with the same destination
IP address/port
followed by at least
this number of these
rules in order with the
same IPaddress/port
from the previous
source, within this
many time intervals
Configure the following parameters:
• this number - Specify the number
of rules you wish this test to
consider.
• rules - Specify the rules you wish
this test to consider.
• in - Specify if you wish this test to
consider rules in a specific order.
• destination - Specify whether you
wish this test to consider
destination or source IP address or
port.
• IPaddress/port - Specify if you
wish this test to consider the IP
address or port.
• this number - Specify the number
of rules you wish this test to
consider.
• rules - Specify the rules you wish
this test to consider.
• in - Specify if you wish this test to
consider rules in a specific order.
• IP address/port - Specify if you
wish this test to consider the IP
address or port.
• source - Specify if you wish this
test to consider source or
destination.
• this many - Specify the number of
time intervals you wish this rule to
consider.
• time intervals - Specify the time
interval you wish this rule to
consider. The options are:
seconds, minutes, hours, or days.
STRM Log Management Users Guide
Table 4- 1 Functions Group (continued)
TestDescriptionDefault Test NameParameters
Multi-Rule
Function
You can also use building
blocks or existing rules to
populate this test. Allows you to
detect the selected rules with
same source information across
more than the configured
number of destinations within a
configured time period.
when any of these
rules with the same IP
address/Port/QID/
Event/Device/
Category more than 5
times, across more
than 5 IP address/
Port/QID/Event/
Device/Category
within 10 minutes
Configure the following parameters:
• rules - Specify the rules you wish
this test to consider.
• IP address/Port/QID/
Event/Device/ Category - Specify
whether you wish this rule to
consider a source IP address,
source port, QID, device event ID,
device, or category.
• 5 - Specify the number of rules you
wish this test to consider.
• more than - Specify if you wish
this test to consider more than or
exactly the number of destination
IP address(es), destination port(s),
QID(s), Device Event ID(s), or
Device(s).
• 5 - Specify the number of IP
addresses, ports, QIDs, events,
devices, or categories you wish
this test to consider.
• IP address/ Port/QID/Event/
Device/Category - Specify the
destination you wish this test to
consider. The options are:
anything, destination IP(s),
destination port(s), QID(s), Device
Event ID(s), or Device(s).
• 10 - Specify the time value you
wish to assign to this test.
• minutes - Specify the time
measurement value, seconds,
minutes, hours, or days that you
wish to apply to this test.
Creating a Rule45
Step 9
In the groups area, select the check box(es) of the groups to which you wish to
assign this rule. For more information on grouping rules, see Grouping Rules.
Step 10 In the Notes field, enter any notes you wish to include for this rule. Click Next.
The Rule Responses window appears, which allows you to configure the action
STRM Log Management takes when the event sequence is detected.
Step 11 Configure the following parameters:
STRM Log Management Users Guide
46CONFIGURING RULES
Table 4-2 Event Rule Response Parameters
ParameterDescription
SeveritySelect the check box if you wish this rule to set or
adjust severity to the configured level. Once
selected, you can configure the desired level.
CredibilitySelect the check box if you wish this rule to set or
adjust credibility to the configured level. Once
selected, you can configure the desired level.
RelevanceSelect the check box if you wish this rule to set or
adjust relevance to the configured level. Once
selected, you can configure the desired level.
Dispatch New EventSelect the check box to dispatch a new event in
addition to the original event, which will be
processed like all other events in the system.
The Dispatch New Event parameters appear when
you select the check box. By default, the check box
is clear.
Event NameSpecify the name of the event you wish to display in
the Event Viewer.
Event DescriptionSpecify a description for the event. The description
appears in the Annotations of the event details.
SeveritySpecify the severity for the event. The range is 1
(lowest) to 10 (highest) and the default is 1. The
Severity appears in the Annotation of the event
details.
CredibilitySpecify the credibility of the event. The range is 1
(lowest) to 10 (highest) and the default is 10.
Credibility appears in the Annotation of the event
details.
RelevanceSpecify the relevance of the event. The range is 1
(lowest) to 10 (highest) and the default is 1.
Relevance appears in the Annotation of the event
details.
High-Level CategorySpecify the high-level event category you wish this
rule to use when processing events.
For more information on event categories, see the
Event Category Correlation Reference Guide.
Low-Level CategorySpecify the low-level event category you wish this
rule to use when processing events.
For more information on event categories, see the
Event Category Correlation Reference Guide.
EmailSelect the check box to display the email options. By
default, the check box is clear.
Enter e-mail address
to notify
Specify the e-mail address(es) to send notification if
the event generates. Separate multiple e-mail
addresses using a comma.
Response LimiterSpecify the frequency you wish this rule to respond.
Enable RuleSelect the check box to enable this rule. By default,
the check box is selected.
Step 12
Click Next.
The Rule Summary window appears.
Step 13 Review the configured rule. Click Finish.
Event Rule TestsThis section provides information on the tests you can apply to the rules including:
•Event Property Tests
•IP/Port Tests
•Date/Time Tests
•Device Tests
Event Property Tests
The event property test group includes:
STRM Log Management Users Guide
48CONFIGURING RULES
Table 4-3 Event Property Tests
TestDescriptionDefault Test NameParameters
Local Network
Object
IP ProtocolValid when the IP protocol of
Event Payload
Search
Valid when the event occurs
in the specified network.
the event is one of the
configured protocols.
Each event contains a copy
of the original unnormalized
when the local network is
one of the following
networks
when the IP protocol is
one of the following
protocols
when the Event Payload
contains this string
one of the following - Specify the
areas of the network you wish this test
to apply.
protocols - Specify the protocols you
wish to add to this test.
this string - Specify the text string you
wish include for this test.
event. This test is valid
when the entered search
string is included anywhere
in the event payload.
QID of EventA QID is a unique identifier
for events. This test is valid
when the event identifier is a
configured QID.
when the event QID is one
of the following QIDs
QIDs - Use of the following options to
locate QIDs:
• Select the Browse By Category
option and using the drop-down list
boxes, select the high and low-level
category QIDs you wish to locate.
• Select the QID Search option and
enter the QID or name you wish to
locate. Click Search.
Attack Context Attack Context is the
relationship between the
attacker and target. For
example, a local attacker to
a remote target.
Valid if the attack context is
one of the following:
• Local to Local
• Local to Remote
• Remote to Local
• Remote to Remote
Event
Category
Valid when the event
category is the same as the
configured category, for
example, Denial of Service
(DoS) attack.
when the attack context is
this context
when the event category
for the event is one of the
following categories
this context - Specify the context you
wish this test to consider. The options
are:
• Local to Local
• Local to Remote
• Remote to Local
• Remote to Remote
categories - Specify the event
category you wish this test to
consider.
For more information on event
categories, see the Event Category
Correlation Reference Guide.
SeverityValid when the event
severity is greater than, less
than, or equal to the
configured value. The
default is 5.
when the event severity is
greater than 5 {default}
Configure the following parameters:
• greater than - Specify whether the
severity is greater than, less than,
or equal to the configured value.
• this value - Specify the index,
which is a value from 0 to 10.
STRM Log Management Users Guide
Table 4- 3 Event Property Tests (continued)
TestDescriptionDefault Test NameParameters
CredibilityValid when the event
credibility is greater than,
less than, or equal to the
configured value. The
default is 5.
when the event credibility
is greater than 5
{default}
Configure the following parameters:
• greater than - Specify whether the
credibility is greater than, less than,
or equal to the configured value.
• this value - Specify the index,
which is a value from 0 to 10.
RelevanceValid when the event
relevance is greater than,
less than, or equal to the
configured value. The
default is 5.
when the event relevance
is greater than 5
{default}
Configure the following parameters:
• greater than - Specify whether the
relevance is greater than, less than,
or equal to the configured value.
• this value - Specify the index,
which is a value from 0 to 10.
Source
Location
Destination
Location
GeographicValid when the source of
Valid when the source IP
address of the event is
either local or remote.
Valid when the destination
IP address of the event is
either local or remote.
this event is located in the
configured geographic
when the source is local
or remote {default:
remote}
when the destination is
local or remote {default:
remote}
when the attacker is
located in this
geographic location
local or remote - Specify either local
or remote traffic.
local or remote - Specify either local
or remote traffic.
this geographic location - Specify
the geographic regions you wish this
test to consider.
region.
Rate AnalysisSTRM Log Management
monitors event rates of all
when the event has been
marked with rate analysis
source IP addresses/QIDs
and destination IP
addresses/QIDs and marks
events that exhibit abnormal
rate behavior.
Valid when the event has
been marked for rate
analysis.
Creating a Rule49
STRM Log Management Users Guide
50CONFIGURING RULES
Table 4-3 Event Property Tests (continued)
TestDescriptionDefault Test NameParameters
False Positive
Tuning
When you tune false
positive events in the Event
Viewer, the resulting tuning
values appear in this test. If
you wish to remove a false
positive tuning, you can edit
this test to remove the
necessary tuning values.
when the false positive
signature matches one of
the following signatures
signatures - Specify the false positive
signature you wish this test to
consider. Enter the signature in the
following format:
<CAT|QID|ANY>:<value>:<source
IP>:<dest IP>
Where:
<CAT|QID|ANY> - Specify whether
you wish this false positive signature
to consider a category (CAT), Q1 Labs
Identifier (QID), or any value.
<value> - Specify the value for the
<CAT|QID|ANY> parameter. For
example, if you specified QID, you
must specify the QID value.
<source IP> - Specify the source IP
address you wish this false positive
signature to consider.
<dest IP> - Specify the destination IP
address you wish this false positive
signature to consider.
UsernameValid when the configured
username is associated with
an event.
when the event(s)
username is this string
Configure the following parameters:
• is - Specify the value you wish to
associate with this test. Options
include: is, contains, starts with, or
ends with.
• this string - Specify a username
you wish this test to consider.
IP/Port Tests
The IP/Port tests include:
Table 4-4 IP / Port Test Group
TestDescriptionDefault Test NameParameters
Source PortValid when the source port
of the event is one of the
when the source port is one
of the following ports
ports - Specify the ports you wish
this test to consider.
configured source port(s).
Destination Port Valid when the destination
port of the event is one of
when the destination port is
one of the following ports
ports - Specify the ports you wish
this test to consider.
the configured destination
port(s).
Local PortValid when the local port of
the event is one of the
when the local port is one
of the following ports
ports - Specify the ports you wish
this test to consider.
configured local port(s).
STRM Log Management Users Guide
Table 4- 4 IP / Port Test Group (continued)
TestDescriptionDefault Test NameParameters
Remote PortValid when the remote port
of the event is one of the
when the remote port is one
of the following ports
ports - Specify the ports you wish
this test to consider.
configured remote port(s).
Source IP
Address
Valid when the source IP
address of the event is one
of the configured IP
when the source IP is one
of the following IP
addresses
IP addresses - Specify the IP
address(es) you wish this test to
consider.
address(es).
Destination IP
Address
Valid when the destination
IP address of the event is
one of the configured IP
when the destination IP is
one of the following IP
addresses
IP addresses - Specify the IP
address(es) you wish this test to
consider.
address(es).
Local IP
Address
Valid when the local IP
address of the event is one
of the configured IP
when the local IP is one of
the following IP addresses
IP addresses - Specify the IP
address(es) you wish this test to
consider.
address(es).
Remote IP
Address
Valid when the remote IP
address of the event is one
of the configured IP
when the remote IP is one
of the following IP
addresses
IP addresses - Specify the IP
address(es) you wish this test to
consider.
address(es).
IP AddressValid when the source or
destination IP address of
the event is one of the
when either the source or
destination IP is one of the
following IP addresses
IP addresses - Specify the IP
address(es) you wish this test to
consider.
configured IP address(es).
Creating a Rule51
Date/Time Tests
The date and time tests include:
Table 4- 5 Date/Time Tests
TestDescriptionDefault Test NameParameters
Event DayValid when the event occurs
on the configured day of the
month.
when the event(s)
occur on the selected
day of the month
Configure the following parameters:
• on - Specify if you wish this test
to consider on, after, or before the
configured day.
• selected - Specify the day of the
month you wish this test to
consider.
Event WeekValid when the event occurs
on the configured days of the
week.
Event TimeValid when the event occurs
on the after the configured
time.
when the event(s)
occur on any of these
days of the week
when the event(s)
occur after this time
these days of the week - Specify
the days of the week you wish this
test to consider.
Configure the following parameters:
• after - Specify if you wish this test
to consider after, before, or at the
configured time.
• this time - Specify the time you
wish this test to consider.
STRM Log Management Users Guide
52CONFIGURING RULES
Device Tests
The device tests include:
Table 4-6 Device Tests
TestDescriptionDefault Test NameParameters
Source DeviceValid when one of the
configured source devices is
the source of the event.
Source Device
Type
Valid when one of the
configured device types is the
source of the event
when the event(s) were
detected by one or
more of these device
when the event(s) were
detected by one or
more of these device
these devices - Specify the devices
that you wish this test to detect.
these device types - Specify the
devices that you wish this test to
detect.
types
DevicesValid when the event(s) have
not been detected by the
configured devices.
when the event(s)
have not been
detected by one or
more of these devices
for 300 seconds.
Configure the following parameters:
• these devices - Specify the
devices you wish this test to
consider.
• 300 - Specify the time, in
seconds, you wish this test to
consider.
Device GroupsValid when an event is
detected by the configured
device groups
when the event(s) were
detected by one or
more of these device
these device groups - Specify the
groups you wish this rule to
consider.
groups
Copying a RuleTo copy a rule:
Step 1 Select the Event Viewer tab.
The Event Viewer window appears.
Step 2 Click Rules.
The Rules List window appears.
Step 3 In the Display drop-down list box, select Rules.
Step 4 Select the rule you wish to duplicate.
Step 5 From the Actions drop-down list box, select Duplicate.
Step 6 In the Enter name for the copied rule, enter a name for the new rule. Click Ok.
The duplicated rule appears.
Step 7 Click Edit to edit the tests for the rule.
For more information on editing the rule, see Creating a Rule.
STRM Log Management Users Guide
Deleting a Rule53
Deleting a RuleTo delete a rule:
Step 1 Select the Event Viewer tab.
The Event Viewer window appears.
Step 2 Click Rules.
The Rules List window appears.
Step 3 In the Display drop-down list box, select Rules.
Step 4 Select the rule you wish to duplicate.
Step 5 From the Actions drop-down list box, select Delete.
Grouping RulesYou can group and view your rules and building blocks based on functionality.
Categorizing your rules or building blocks into groups allows you to efficiently view
and track your rules. For example, you can view all rules related to compliance. By
default, the Rules interface displays all rules and building blocks.
As you create new rules, you have a choice whether you wish to assign the rule to
an existing group. For information on assigning a group to a using the rule wizard,
see Creating a Rule.
Note: You must have administrative access to create, edit, or delete groups. For
more information on user roles, see the STRM Log Management Administration
Guide.
This sections provides information on grouping rules and building blocks including:
•Viewing Groups
•Creating a Group
•Editing a Group
•Copying an Item to Another Group(s)
•Deleting an Item from a Group
•Assigning an Item to a Group
Viewing GroupsTo view rules or building blocks using groups:
Step 1 Select the Event Viewer tab.
The Event Viewer window appears.
Step 2 Click Rules.
The Rules List window appears.
Step 3 From the Display drop-down list box, select whether you wish to view Rules or
Building blocks.
Step 4 Form the Filter drop-down list box, select the group category you wish to view.
STRM Log Management Users Guide
54CONFIGURING RULES
Step 5 The list of items assigned to that group appear.
Creating a GroupTo create a group:
Step 1 Select the Event Viewer tab.
The Event Viewer window appears.
Step 2 Click Rules.
The Rules List window appears.
Step 3 Click Groups.
The Group window appears.
Step 4 From the menu tree, select the group under which you wish to create a new group.
Note: Once you create the group, you can drag and drop menu tree items to
change the organization of the tree items.
Step 5 Click New Group.
The Group Properties window appears.
Step 6 Enter values for the parameters:
STRM Log Management Users Guide
•Name - Specify the name you wish to assign to the new group. The name may
be up to 255 characters in length.
•Description - Specify a description you wish to assign to this group. The
description may be up to 255 characters in length.
Step 7 Click Ok.
Step 8 If you wish to change the location of the new group, click the new group and drag
the folder to the desired location in your menu tree.
Step 9 Close the Groups window.
Editing a GroupTo edit a group:
Step 1 Select the Event Viewer tab.
The Event Viewer window appears.
Step 2 Click Rules.
The Rules List window appears.
Step 3 Click Groups.
The Group window appears.
Grouping Rules55
Step 4 From the menu tree, select the group you wish to edit.
Step 5 Click Edit.
The Group Properties window appears.
Step 6 Update values for the parameters, as necessary:
•Name - Specify the name you wish to assign to the new group. The name may
be up to 255 characters in length.
•Description - Specify a description you wish to assign to this group. The
description may be up to 255 characters in length.
STRM Log Management Users Guide
56CONFIGURING RULES
Step 7 Click Ok.
Step 8 If you wish to change the location of the group, click the new group and drag the
Step 9 Close the Groups window.
folder to the desired location in your menu tree.
Copying an Item to
Another Group(s)
Step 1 Select the Event Viewer tab.
Step 2 Click Rules.
Step 3 Click Groups.
Using the groups functionality, you can copy a rule or building block to one or
many groups. To copy a rule or building block:
The Event Viewer window appears.
The Rules List window appears.
The Group window appears.
Step 4 From the menu tree, select the rule or building block you wish to copy to another
group.
Step 5 Click Copy.
The Choose Group window appears.
STRM Log Management Users Guide
Grouping Rules57
Step 6
Step 7 Click Assign Groups.
Step 8 Close the Groups window.
Deleting an Item from
a Group
Step 1 Select the Event Viewer tab.
Step 2 Click Rules.
Step 3 Click Groups.
Step 4 From the menu tree, select the top level group.
Step 5 From the list of groups, select the group you wish to delete.
Step 6 Click Remove.
Select the check box for the group(s) to which you wish to copy the rule or building
block.
To delete a rule or building block from a group:
Note: Deleting a group removes this rule or building block from the Rules
interface. Deleting an item from a group does not delete the rule or building block
from the Rules interface.
The Event Viewer window appears.
The Rules List window appears.
The Group window appears.
A confirmation window appears.
Step 7 Click Ok.
Step 8 If you wish to change the location of the new group, click the new group and drag
the folder to the desired location in your menu tree.
Step 9 Close the Groups window.
STRM Log Management Users Guide
58CONFIGURING RULES
Assigning an Item to
a Group
Step 1 Select the Event Viewer tab.
Step 2 Click Rules.
Step 3 Select the rule or building block you wish to assign to a group.
Step 4 From the Actions drop-down list box, select Assign Groups.
Step 5 Click Assign Groups.
Editing Building
Blocks
Step 1 Select the Event Viewer tab.
To assign a rule or building block to a group:
The Event Viewer window appears.
The Rules List window appears.
The Choose Group window appears.
Building blocks allow you to re-use specific rule tests in other rules. For example,
you can save a building block that excludes the IP addresses of all mail servers in
your deployment from the rule.
To edit a building block:
The Event Viewer window appears.
Step 2 Click Rules.
The Rules List window appears.
Step 3 In the Display drop-down list box, select Building Blocks.
The Building Blocks appear.
Step 4 Double-click the building block you wish to edit.
The Custom Rules Wizard appears.
STRM Log Management Users Guide
Editing Building Blocks59
Step 5 Update the building block, as necessary. Click Next.
Step 6 Continue through the wizard. For more information, see Creating a Rule.
The Rule Summary appears.
STRM Log Management Users Guide
60CONFIGURING RULES
Step 7 Click Finish.
STRM Log Management Users Guide
5
MANAGING REPORTS
The Reports interface allows you to create, distribute, and manage reports. You
can use the Report Wizard to create executive and operational level reports.
STRM Log Management provides default templates that you can use to generate
your report data, using various intervals. You can edit any template to present
customized data when distributing reports to other STRM Log Management users,
however, administrative users can see all reports created by STRM Log
Management users.
Reports also allows you to brand your documents with customized logos, which
enables you to support unique logos for each report. This is beneficial when
distributing reporting to different audiences.
This chapter includes:
•Using the Reports Interface
•Viewing Reports
•Grouping Reports
•Creating a Report
•Using Default Report Templates
•Generating a Report
•Duplicating a Report
•Branding Your Report
Note: To brand reports with custom logos, you must upload and configure your
logos before you begin using the Report Wizard, see Branding Your Report.
STRM Log Management Users Guide
62MANAGING REPORTS
Using the Reports
Interface
Using the Navigation
Menu
This section provides information on using the Reports interface including:
•Using the Navigation Menu
•Using the Toolbar
The default main Reports interface displays generated reports. The navigation
menu provides access to reports, templates, and branding including:
Table 5-1 Navigation Menu Options
MenuColumnsDescription
Generated
Reports
Report Title Displays the name of the report. By default, the report title
GroupDisplays the group to which this report belongs.
ScheduleDisplays the frequency in which the report generates.
GeneratedDisplays the date and time the report was generated.
OwnerDisplays the STRM Log Management user that generated
Template
Author
FormatDisplays the available viewing formats.
Report
Templates
Template
Name
GroupDisplays the group to which this report belongs.
ScheduleDisplays the frequency in which the report generates.
Next Run
Time
Last
Modification
OwnerDisplays the STRM Log Management user that generated
Displays all generated reports. Reports listed in this panel
are available for immediate viewing. The Generated
Reports panel lists reports with the following details
in a default template is a duplicate of the template name.
the report.
Displays the user that created the template that
generated this report.
Displays existing report templates. STRM Log
Management provides a series of default templates that
are ready for immediate access, see
Report Templates
By default, templates are sorted by the report title. You
can access templates in the Report Templates panel; or,
click the arrow beside the Report Templates menu item
and select the group (frequency) folder. The Reports
Templates panel lists the configured templates with the
following details:
Displays the template name.
Displays the time in which the report is expected to
generate.
Displays the last modification date.
the report.
.
Using Default
STRM Log Management Users Guide
Table 5- 1 Navigation Menu Options (continued)
MenuColumnsDescription
Author Displays the STRM Log Management user that created
the template.
OutputDisplays the report format.
BrandingNavigates to the report branding option. See Branding
Your Report
Using the ToolbarYou can perform the following actions:
Table 5- 2 Toolbar Icon Descriptions
OptionDescription
GroupUsing the drop-down list box, allows you to view reports
assigned to a specific group. For more information, see
Grouping Reports.
Allows you to manage report groups. For more information,
see
Grouping Reports.
Allows you to perform the following actions:
• Create - Allows you to create a new template. For more
information, see
• Edit - Allows you to edit the selected template. You can
also double-click a template to edit the content.
• Duplicate - Allows you to duplicate/rename a report. For
more information, see
• Assign Groups - Allows you to assign a report template to
a report group. For more information, see
Reports
• Share - Allows you to share report templates with other
.
users. You must have administrative privileges to share
report templates. For more information, see
Report
• ToggleScheduling -Allows you to toggle active/inactive
.
for the selected template.
• GenerateReport - Generates a report from the selected
template. For more information, see
• Delete - Deletes the selected template. Hold the CTRL key
and click on the templates you wish to delete.
Viewing Reports63
.
Creating a Report.
Duplicating a Report.
Grouping
Sharing a
Generating a Report.
Viewing ReportsYou can view reports displayed in the Generated Reports interface. These reports
have been previously created, generated, and optionally distributed. You can only
view reports to which you have access. Reports may be formatted in one or all of
the following formats:
•PDF - Portable Document Format
STRM Log Management Users Guide
64MANAGING REPORTS
Step 1 Click the Reports tab.
Step 2 Click Generated Reports from the navigation menu.
Step 3 For the report you wish to view, click the icon that represents the format in which
•HTML - Hyper Text Markup Language format
•RTF - Rich Text Format
•XML - Extensible Markup Language
•XLS - Microsoft Excel format.
The XML and XLS formats are only available for reports using a single chart table
format (portrait or landscape).
Note: If you are currently using the FireFox browser and you select the RTF report
format, this may launch a new browser window. This does not affect STRM Log
Management; this is a result of the FireFox browser configuration. Close the
window and continue with your STRM Log Management session.
To view a generated report:
The main Reports interface appears.
you wish to view the report.
The report opens in the selected format.
Grouping ReportsThe Reports interface allows you to view your report and report templates based
on functionality. Categorizing your reports into groups allows you to efficiently view
and track your reports. For example, you can view all reports related to
compliance. By default, the Reports interface displays all reports, however, you
can view your reports the using one of the following default groups:
•Compliance
•Executive
•Network Management
•Security
•VoIP
As you create new reports, you can either assign the report to an existing group,
create a new group, or do not assign the report to any group. For information on
assigning a group to a using the report wizard, see Creating a Report.
Note: You must have administrative access to create, edit, or delete groups. For
more information on user roles, see the STRM Log Management Administration
Guide.
This sections provides information on grouping reports including:
•Creating a Group
STRM Log Management Users Guide
•Editing a Group
•Copying a Template to Another Group
•Deleting a Template From a Group
•Assigning a Report to a Group
Creating a GroupTo create a group:
Step 1 Click the Reports tab.
The Reports interface appears.
Step 2 Click the Report Templates menu option.
A list of templates appears.
Step 3 Click Groups.
The Reports Group window appears.
Grouping Reports65
Step 4 From the menu tree, select the group under which you wish to create a new group.
Note: Once you create the group, you can drag and drop menu tree items to
change the organization of the tree items.
Step 5 Click New Group.
The Group Properties window appears.
Step 6 Enter values for the parameters:
STRM Log Management Users Guide
66MANAGING REPORTS
•Name - Specify the name you wish to assign to the new group. The name may
be up to 255 characters in length.
•Description - Specify a description you wish to assign to this group. The
description may be up to 255 characters in length. This field is optional.
Step 7 Click Ok.
Step 8 If you wish to change the location of the new group, click the new group and drag
the folder to the desired location in your menu tree.
Step 9 Close the Report Groups window.
Editing a GroupTo edit a group:
Step 1 Click the Reports tab.
The Reports interface appears.
Step 2 Click the Report Templates menu option.
A list of templates appears.
Step 3 Click Groups.
The Reports Group window appears.
Step 4 From the menu tree, select the group you wish to edit.
Step 5 Click Edit.
The Group Properties window appears.
Step 6 Update values for the parameters, as necessary:
•Name - Specify the name you wish to assign to the new group. The name may
be up to 255 characters in length.
•Description - Specify a description you wish to assign to this group. The
description may be up to 255 characters in length. This field is optional.
Step 7 Click Ok.
Step 8 If you wish to change the location of the group, click the new group and drag the
folder to the desired location in your menu tree.
Step 9 Close the Report Groups window.
STRM Log Management Users Guide
Grouping Reports67
Copying a Template
to Another Group
Step 1 Click the Reports tab.
Step 2 Click the Report Templates menu option.
Step 3 Click Groups.
Step 4 From the menu tree, select the template you wish to copy to another group.
Using the groups functionality, you can copy a template from one group to another.
To copy a template:
The Reports interface appears.
A list of templates appears.
The Reports Group window appears.
Step 5 Click Copy.
Step 6 Select the group or groups to which you wish to copy the template.
Step 7 Click Assign Groups.
Step 8 Close the Report Groups window.
Deleting a Template
From a Group
Step 1 Click the Reports tab.
The Choose Group window appears.
To delete a template from a group:
Note: Removing a template from a group only removes this template from the
group. Removing a template does not delete the template from Reports interface.
The Reports interface appears.
STRM Log Management Users Guide
68MANAGING REPORTS
Step 2 Click the Report Templates menu option.
Step 3 Click Groups.
Step 4 From the menu tree, select the top level group.
Step 5 From the list of groups, select the group you wish to delete.
Step 6 Click Remove.
Step 7 Click Ok.
Step 8 Close the Report Groups window.
A list of templates appears.
The Reports Group window appears.
A confirmation window appears.
Assigning a Report
to a Group
Step 1 Click the Reports tab.
Step 2 Choose one of the following options:
Step 3 Select the report(s) you wish to assign to a group.
Step 4 Click Assign Groups.
Step 5 From the Item Groups list, select the check box of the group you wish to assign to
Step 6 Click Assign Groups.
You can assign a generated report or report template to a group. To assign a
report to a group:
The Reports interface appears.
a To assign a generated report to a group, click the Generated Reports menu
option.
A list of templates appears.
b To assign a report template report to a group, click the Report Templates
menu option.
A list of templates appears.
The Choose Group window appears.
this report template.
Creating a ReportYou can access the Report Wizard from the toolbar in the Reports Templates
interface to create a new report. When a report is complete, you can use the
template to create other reports using many of the same configurations.
The Report Wizard provides a step-by-step guide in designing, scheduling, and
generating your reports. The wizard uses the following elements:
•Layout - Determines the positioning and size of each container.
•Container - Placeholder for the featured content.
STRM Log Management Users Guide
•Content - Definition of the chart that is placed in the container.
This section includes:
•Creating a Template
•Configuring Charts
•Selecting a Graph Type
Creating a TemplateTo create a template:
Step 1 Click the Reports tab.
The Reports interface appears.
Step 2 From the Actions drop-down list box, select Create.
The Report Wizard appears.
Creating a Report69
Note: Select the check box if you wish to disable the Welcome page.
STRM Log Management Users Guide
70MANAGING REPORTS
Step 3 Select a scheduling option. Click Next.
Table 5-3 Report Scheduling
ParameterDefault Settings
This report should be scheduled to run
Manually Generates a report one time only. This is the default setting;
however, you may generate this report as often as required.
HourlySchedules the report to generate at the end of each hour
using the data from the previous hour.
Using the drop-down list boxes, select a time frame to begin
and end the reporting cycle. A report is generated for each
hour within this time frame. Time is available in half-hour
increments. The default is 1:00 a.m for both From and To.
DailySchedules the report to generate each day using the data
from the previous day. Each chart on a report allows you to
select the previous 24 hours of the day, or select a specific
time frame from the previous day.
Click the check boxes beside each day you wish to generate
a report. Also, using the drop-down list box, select a time to
begin the reporting cycle. Time is available in half-hour
increments. The default is 1:00 a.m.
WeeklySchedules the report to generate each week using the data
from the previous week.
Select the day you wish to generate the report. Default is
Monday. Using the drop-down list box, select a time to begin
the reporting cycle. Time is available in half-hour increments.
The default is 1:00 a.m.
STRM Log Management Users Guide
Creating a Report71
Table 5- 3 Report Scheduling (continued)
ParameterDefault Settings
Monthly Schedules the report to generate each month using the data
from the previous month.
Using the drop-down list box, select the date you wish to
generate the report. The default is the 1st day. Also, using
the drop-down list box, select a time to begin the reporting
cycle. Time is available in half-hour increments. The default
is 1:00 a.m.
Allow this report to generate manually
YesEnables manual generation of this report.
NoDisables manual generation of this report.
The Report Layout window appears.
A report can consist of several data. Your network and security data can be
presented in a variety of styles, such as tables, pie charts, and bar charts. Styles
consist of a number of options, such as delta or baseline.
When selecting the layout of a report, consider the type of report you wish to
create - do not choose a small chart container for graph content that may display a
large number of objects. Each graph is complete with a legend and a list of
networks from which the content is derived; choose a large enough container to
hold the data. To preview how each chart displays a data, see Selecting a Graph
Type.
STRM Log Management Users Guide
72MANAGING REPORTS
Step 4 From the Orientation drop-down list box, select the page orientation and then click
the desired layout. Click Next.
The Specify Report Contents window appears:
Step 5 Select values for the following parameters:
•Report Title - Specify a title for your report. The title can be up to 100
characters in length - do not use special characters.
Note: Your report is saved by the title name you enter in this field.
•Logo - Using the drop-down list box, select a logo. By default, the STRM Log
Management logo is displayed. Other logos may be uploaded and used, see
Branding Your Report.
•Chart Type - Using the drop-down list box, select a chart for your container
including:
-Event/Logs
-Time Series
-TopN Time Series
The Container Details window appears.
Step 6 Configure your chart.
For detailed information on configuring your chart, see Configuring Charts.
Step 7 Click Save Container Details for each container in a report.
The Specify Report Contents window appears. The configured container is
highlighted.
Step 8 Repeat the configuration process for each container you wish to define and click
Next.
STRM Log Management Users Guide
Creating a Report73
The Layout Preview window appears providing a preview of how your data
appears.
Note: Charts that appear in the preview window do not display actual data. This is
a graphical representation of the layout you have configured.
Step 9 Preview your report. Click Next:
The Report Format window appears. The default is PDF.
Step 10 Select the check box for any or all formats for report viewing. Click Next.
Note: Generated reports can be one to two megabytes in size, depending on the
selected output format. We recommend the use of the PDF format; PDF format is
smaller in size and does not consume a large quantity of disk space to store.
The Report Distribution Channels window appears. The default is Report Console.
STRM Log Management Users Guide
74MANAGING REPORTS
Step 11 Select the desired distribution channels. Click Next.
Table 5-4 Report Distribution
ParameterSub-ParameterDescription
Report
Console
Select the check box if you wish to send the
report to the Reports interface.
Note: You must have appropriate network
permissions to share your report with other
users. For more information on permissions,
see the STRM Log Management
Administration Guide.
EmailSelect the check box if you wish to distribute
the report using e-mail.
Enter the report
distribution email
address(es)
Specify the e-mail address(es) for each
destination you wish to send the report;
e-mail addresses are comma separated.
Maximum characters for this parameter is
255.
Note: E-mail recipients receive this e-mail
from no_reply_reports@STRM.
Include Report as
attachment (PDF/RTF)
Include link to Report
Console
Select the check box to send the report as
an attachment.
Select the check box to include a link in your
e-mail.
The Finishing Up window appears.
STRM Log Management Users Guide
Creating a Report75
Step 12
Enter values for the following parameters. Click Next.
Table 5- 5 Finishing Up
ParameterDescription
Report Template
Description
GroupsSpecify the group(s) to which you wish to assign this report. For
Would you like to
run the report
now?
The Report Summary window appears displaying details for your report. You can
select the tabs available in the summary window to preview your report selections.
Step 13 Click Finish.
If you have selected the Execute Report option from the Finishing Up window, the
report immediately generates. If you have not selected this option, the report
template is saved and generates as scheduled.
Specify a description for this template. This description appears
on the Report Summary page and is included in the report
distribution e-mail.
more information on groups, see
Grouping Reports.
Select the check box if you wish to generate the report when the
wizard is complete. By default, the check box is clear.
STRM Log Management Users Guide
76MANAGING REPORTS
Configuring ChartsThe chart type determines how your data and network objects are presented in
your report. Data can be charted with several characteristics and created in a
single report.
The following chart types are available for each template:
•Event/Logs
•Time Series
•TopN Time Series
Event/Logs
The Event/Logs Chart allows you to view event information for a specific period of
time.
Figure 5-1 Event/Logs Report
STRM Log Management Users Guide
Enter values for the following parameters:
Creating a Report77
Table 5- 6 Event/Logs Chart Container Details
ParameterDescription
Container Details - Events/Logs
Chart TitleSpecify a chart title to a maximum of 100 characters.
Chart Sub-TitleClear the check box to change the automatically created
sub-title. Enter a title to a maximum of 100 characters.
Graph TypeUsing the drop-down list box, select the type of graph you
wish to appear on your report. Options include:
• Bar - When selecting this option, you must also select the
Timeline Interval from the Additional Details section.
• Pie - When selecting this option, you must also select
either total or percent.
• Table - When selecting this option (full page width
container only), you must also select the Timeline Interval
from the Additional Details section.
Note: For an example of how each type of graph charts data,
see
Selecting a Graph Type.
GraphUsing the drop-down list box, select the number of
events/logs you wish to appear in the report.
SchedulingThe scheduling options depend on the template type you
Manually Using the calendar, select range of dates you wish this report
to consider. The default is the current date.
Using the drop-down list boxes, select a time to begin and
end generating the report. Time is available in half-hour
increments. The default is 1:00 a.m.
HourlyAutomatically graphs all data from the previous hour.
DailyChoose one of the following options:
• All data from previous 24 hours
• Data of previous day from - Using the drop-down list
boxes, select the period of time you wish the report to
consider. Time is available in half-hour increments. The
default is 1:00 a.m.
WeeklyChoose one of the following options:
• All data from previous week
• Data from a previous week - Using the drop-down list
boxes, select the days to begin and end generating the
report. Default is Sunday.
MonthlyChoose one of the following options:
• All data from previous month
• Data from a previous month - Using the drop-down list
boxes, select the dates to begin and end generating the
report. Default is 1st to 31st.
Graph Content
Base this event report onUsing the drop-down list box, select a previously saved
search. If you wish to create a new search, click Create New Event Search. For more information on creating an event
search, see
Chapter 3Using the Event Viewer.
STRM Log Management Users Guide
Creating a Report79
Time Series
The Time Series Chart displays options, such as pivoting and delta comparisons,
that allow you to create charts that compare a data for two different periods of time.
To configure a Time Series Chart, enter values for the following parameters:
Table 5- 7 Time Series Chart Container Details
ParameterDescription
Container Details - Time Series Chart
Chart TitleSpecify a chart title to a maximum of 100 characters.
Chart Sub-TitleClear the check box to change the automatically created
sub-title. Enter a title to a maximum of 100 characters.
Graph TypeUsing the drop-down list box, select the type of graph you
wish to appear on your report. Options include:
• Line - When selecting this option, you must also select the
Timeline Interval from the Additional Details section.
• Stacked_Line -When selecting this option, you must also
select the Timeline Interval from the Additional Details
section.
• Stacked_Base_Line - When selecting this option, you
must also select the Timeline Interval and choose a
Baseline from the Additional Details section.
• Bar - When selecting this option, you must also select the
Timeline Interval from the Additional Details section.
STRM Log Management Users Guide
80MANAGING REPORTS
Table 5-7 Time Series Chart Container Details (continued)
ParameterDescription
• Stacked_Bar - When selecting this option, you must also
select the Timeline Interval from the Additional Details
section.
• Stacked_Bar_Base_Line - When selecting this option,
you must also select the Timeline Interval and choose the
Baseline parameters.
• Delta - When selecting this option, you must also select
the Timeline Interval and select an option for the Delta
Span from the Additional Details. Delta chart represents
the difference in traffic patterns between the current
graphing interval and another equally sized interval from
the past. Use the Delta chart to model how traffic patterns
for networks, applications or event data are changing.
Note: The end date of your Delta Span must be set before
the From date of the data you are graphing.
• Pie - When selecting this option, you must also select
either total or percent.
• Table - When selecting this option (full page width
container only), you must also select the Timeline Interval
from the Additional Details section.
Note: For an example of how each type of graph charts data,
see
Selecting a Graph Type.
SchedulingThe scheduling options depend on the template type you
have selected.
Manually Using the calendar, select the date. The default is the current
date.
Using the drop-down list boxes, select a time to begin and
end generating the report. Time is available in half-hour
increments. The default is 1:00 a.m.
HourlyAutomatically graphs all data from the previous hour.
DailyChoose one of the following options:
• All data from previous 24 hours
• Data of previous day from - Using the drop-down list
boxes, select an hour to begin and end generating the
report. Time is available in half-hour increments. The
default is 1:00 a.m.
WeeklyChoose one of the following options:
• All data from previous week
• Data from a previous week - Using the drop-down list
boxes, select the days to begin and end generating the
report. Default is Sunday.
STRM Log Management Users Guide
Creating a Report81
Table 5- 7 Time Series Chart Container Details (continued)
ParameterDescription
MonthlyChoose one of the following options:
• All data from previous month
• Data from a previous month - Using the drop-down list
boxes, select the dates to begin and end generating the
report. Default is 1st to 31st.
Additional Details
Timeline IntervalUsing the drop-down list box, select the time interval. Options
are based on the schedule selected. For example, a weekly
report supports intervals of one hour, one day, and one
week. A monthly report supports intervals of one day, one
week, and one month.
BaselineThis option only appears if you select a base line type graph
type. Choose one of the following options:
• Individual Baseline - Creates individual baselines for
each object on the chart.
Note: This option can create many lines on chart.
• Aggregate Baseline - Creates a single baseline for the
the aggregate of all objects on the chart. Aggregate
Baseline is default.
Graph Content
Network Location Select the check box for each network you wish to chart data
for. You must select at least one network location.
View ObjectsUsing the drop-down list box, select the events object.
Layers Using the drop-down list box, select the layer you wish to
appear on the graph. The layer options that appear depends
on the View Objects. The layer also determines the average
per second availability.
Options
Average per secondSelect the check box to graph the average of all objects that
are selected.
Aggregate Selected
Objects
Select the check box to graph the sum of all (view) objects or
networks that are selected.
GraphSelect one of the following:
• View Objects - Displays the top view objects selected.
• Networks - Displays the top networks associated with the
view objects you have selected.
STRM Log Management Users Guide
82MANAGING REPORTS
Table 5-7 Time Series Chart Container Details (continued)
ParameterDescription
Expand To IncludeUsing the drop-down list box, select an option to include on
the graph. Options include:
• None - View Objects and Network Locations are graphed
exactly as shown in the View Object tree menu. This is the
default setting.
• Group - Expands chart to include Groups of a Network
Location or View Object, if the high level object is
selected.
• Leaves - Expands chart to include Network Location
leaves or View Object if the high level object is selected.
Note: Use this option to select only the Top of the Network
Location or a View Object, and display data for the groups, or
leaves. This is dependent also on the Graph Top Items
option.
Note: If you select View Objects in the Graph Top Items
option, and select Expand to include Group, this expands the
chart to include the groups for the specific View Object
selected.
TopN Time Series
The TopN Time Series chart allows you to create TopN charts for any data that
STRM Log Management logs over time. For example, you can create an Executive
Chart to represent the Top 5 Event Categories.
STRM Log Management Users Guide
Creating a Report83
Enter values for the following parameters:
Table 5- 8 TopN Time Series Container Details
ParameterDescription
Container Details - TopN Time Series Chart
Chart TitleSpecify a chart title to a maximum of 100 characters.
Chart Sub-TitleClear the check box to change the automatically created sub-title.
Enter a title to a maximum of 100 characters.
Graph TypeUsing the drop-down list box, select the type of graph you wish to
appear on your report. Options include:
• HorizontalBar
• Pie
• Table (full page width only)
SchedulingThe scheduling options depend on the chosen chart type.
Manually Using the calendar, select the date. The default is the current date.
Using the drop-down list boxes, select a time to begin and end
generating the report. Time is available in half-hour increments.
The default is 1:00 a.m.
HourlyAutomatically graphs all data from the previous hour.
DailyChoose one of the following options:
• All data from previous 24 hours
• Data of previous day from - Using the drop-down list boxes,
select an hour to begin and end generating the report. Time is
available in half-hour increments. The default is 1:00 a.m.
WeeklyChoose one of the following options:
• All data from previous week
• Data from a previous week - Using the drop-down list boxes,
select the days to begin and end generating the report. Default
is Sunday.
MonthlyChoose one of the following options:
• All data from previous month
• Data from a previous month - Using the drop-down list boxes,
select the dates to begin and end generating the report. Default
is 1st to 31st.
Graph Content
Network Location Select the check box for each network you wish to chart the data.
You can select all networks or click the expand option to select
network groups or leaved.
View ObjectsUsing the drop-down list box, select the View Object that
represents the type of data you wish to display. You can graphs the
number of events for the selected event categories within a
specified interval. You can sort the events by the severity,
credibility, and relevance layer.
STRM Log Management Users Guide
84MANAGING REPORTS
Table 5-8 TopN Time Series Container Details (continued)
ParameterDescription
Layers Using the drop-down list box, select the traffic layer you wish to
appear on the graph. The layer options that appear depends on the
selected View Objects.
Options
Average per
second
Select the check box to graph the average of the selected (view)
objects for the chart.
Graph top itemsUsing the drop-down list box, select the number of items to include
on graphs, then select one of the following:
• View Objects - Displays the top view objects selected.
• Networks - Displays the top networks associated with the view
objects you have selected.
Expand To Include Using the drop-down list box, select an option to include on the
graph. Options include:
• None - View Objects and Network Locations are graphed
exactly as shown in the View Object tree menu. This is the
default setting.
• Group - Expands chart to include Groups of a Network Location
or View Object, if the high level object is selected.
• Leaves - Expands chart to include Network Location leaves or
View Object if the high level object is selected.
Note: Use this option when selecting the Top of the Network
Location or a View Object, and display data for the groups, or
leaves. This is dependent also on the Graph Top Items option.
Note: If you select View Objects in the Graph Top Items option,
and select Expand to include Group, this expands the chart to
include the groups for the specific View Object selected.
STRM Log Management Users Guide
Creating a Report85
Selecting a Graph
Type
Each chart type has a variety of graphs to display your data. The available
selection is dependent on the chart type you have selected. The colors that appear
in the charts that depict network traffic are derived from the network configuration
files. Colors that appear depicting IP addresses are unique.
Table 5-9 provides examples of how STRM Log Management charts your network
and security data:
Table 5- 9 Available Graph Types
Line Graph
Available with the Time Series chart
type.
Stacked Base Line Graph
Available with the Time Series chart
type.
Stacked Line Graph
Available with the Time Series chart
type.
Stacked Bar Base Line Graph
Available with the Time Series chart
type.
Bar Graph
Available with the Time Series chart
type.
STRM Log Management Users Guide
Horizontal Bar Graph
Available with the TopN Time Series
chart.
86MANAGING REPORTS
Table 5-9 Available Graph Types (continued)
Stacked Bar Graph
Available with the Time Series chart
type.
Pie Graph
Available with the following chart type:
• Time Series
• TopN Time Series
Delta Graph
Available with the Time Series chart
type.
Table Graph
Available with the following charts:
• Time Series
• TopN Time Series
Using Default
Report Templates
Note: A report designed with content displayed in a table is available only with a
full page width container.
STRM Log Management provides a series of default templates that allows you to
manipulate and customize your data. Default templates are designed for both
executive level and operational level reports.
You can generate a report from any template located in the Report Templates
panel. These templates are also found in the folders within the Report Templates
navigation menu. Templates that do not specify an interval schedule must be
manually generated; others are configured to automatically generate.
Note: By default, report titles that appears with each template has the same name
in the Generated Reports panel. When you re-configure a template and enter a
new report title, your template takes on the new name; however, the original
template remains the same.
STRM Log Management Users Guide
Generating a Report87
Each template is designed to capture and display your existing data. Point your
mouse to any template to preview the summary. The summary reveals how the
template is configured and the type of information the template is configured to
generate.
Note: The STRM Log Management application is configured with the timezone
used during the installation and setup of the application. Please check with your
administrator to ensure your STRM Log Management session is synchronized with
your timezone.
To customize a template:
Step 1 Click the Reports tab.
The Reports interface appears.
Step 2 Click the Report Templates menu option.
A list of templates appears.
Step 3 Point your mouse over the templates and preview the summary information.
Step 4 Double-click the desired template.
The Report Wizard appears.
Generating a
Report
Duplicating a
Report
Step 5 Make the necessary changes. See Creating a Report.
To generate a report:
Step 1 Click the Reports tab.
The main Reports interface appears.
Step 2 Click the Report Templates menu option.
A list of templates appears.
Step 3 Select the report you wish to generate.
Step 4 Click Generate Report.
The report generates. See Viewing Reports.
To duplicate a report:
Step 1 Click the Reports tab.
The main Reports interface appears.
Step 2 Click the Report Templates menu option.
A list of templates appears.
Step 3 Select the report you wish to duplicate.
Step 4 Click Duplicate.
STRM Log Management Users Guide
88MANAGING REPORTS
The enter a name window appears.
Step 5 Enter a new name, without spaces, for the template.
The new template appears.
Sharing a ReportYou can share report templates with other users. This allows you to provide a copy
of the selected templates for another user to edit or schedule, as necessary. Once
shared, any updates that the user makes to your shared template does not affect
your version of the template.
Note: You must have administrative privileges to share templates. Also, for a new
user to view and access report templates, an administrative user must share all the
necessary reports with the new user.
To share a template:
Step 1 Click the Reports tab.
The main Reports interface appears.
Step 2 Click the Report Templates menu option.
A list of templates appears.
Branding Your
Report
Step 3 Select the report(s) you wish to share.
Step 4 Click Share.
The Share Templates window appears.
Step 5 From the list of users, select the user(s) you wish to share this report template
with.
Note: If no users with appropriate access are available, a message appears.
Step 6 Click Share.
The report template is now shared.
You can import logos and specific images to brand your reports. Report branding
is beneficial for your enterprise if you support more than one logo. When uploading
your images to STRM Log Management, the image is automatically saved as a
Portable Network Graphic (PNG). We recommend that you use graphics 144 x 50
pixels with a white background.
To brand your report:
Step 1 Click the Reports tab.
The main Reports interface appears.
Step 2 Click Branding.
The Branding window appears:
STRM Log Management Users Guide
Branding Your Report89
Step 3
Step 4 Select the file that contains the desired logo. Click Open.
Click Browse to browse the files located on your system.
The file name appears in the New Image field.
Step 5 Click Upload Image to upload the image to STRM Log Management.
Note: To make sure your browser displays the new logo, clear your browser
cache.
Step 6 Select the logo you wish to use as the default and click Set Default Image. This
logo appears as the first option using the drop-down menu in the Specify Content
window of the Report Wizard.
Note: If you have uploaded an image that is larger in length than the report header
can support, the image automatically resizes to fit the header; this is approximately
50 pixels in height.
STRM Log Management Users Guide
DEFAULT RULESAND BUILDING
A
B
LOCKS
This appendix provides the defaults for the rules and building blocks including:
•Default Rules
•Default Building Blocks
Default RulesDefault rules include:
Table B-6 Default Rules
Rule
RuleGroup
Default-Rule-Anomaly:
Devices with High Event
Rates
Default-RuleAnomaly: Excessive
Firewall Accepts Across
Multiple Hosts
Default-RuleAnomaly: Excessive
Firewall Denies from
Single Source
Default-RuleAnomaly: Potential
Honeypot Access
AnomalyEventFalseMonitors devices for high event rates. Typically,
AnomalyEventTrueReports an excessive number of successful
AnomalyEventTrueReports excessive firewall accepts across
AnomalyEventTrueReports excessive firewall denies from a single
AnomalyEventFalseReports an event that was targeting or sourced
Type
Enabled Description
the default threshold is low for most networks
and we recommend that you adjust this value
before enabling this rule. To configure which
devices will be monitored, edit the
Default-BB-DeviceDefinition: Devices to Monitor
for High Event Rates building block.
database connections.
multiple hosts. More than 100 events were
detected across at least 100 unique destination
IP addresses in 5 minutes.
host. Detects more than 400 firewall deny
attempts from a single source to a single
destination within 5 minutes.
from a honeypot or tarpit defined address.
Before enabling this rule, you must configure the
Default-BB-HostDefinition: Honeypot like
addresses building block and create the
appropriate sentry from the Network
Surveillance interface.
STRM Log Management Users Guide
92DEFAULT RULESAND BUILDING BLOCKS
Table B- 6 Default Rules (continued)
RuleGroup
Default-Rule-
AnomalyEventFalseReports a host emitting events at a rate greater
Anomaly: Rate Analysis
Marked Events
Default-Rule-
AnomalyEventFalseReports successful logins or access from an IP
Anomaly: Remote
Access from Foreign
Country
Default-Rule-
AuthenticationEvent TrueReports a host login message from a disabled
Authentication: Login
Failure to Disabled
Account
Default-Rule-
AuthenticationEvent TrueReports a host login failure message from an
Authentication: Login
Failure to Expired
Account
Default-Rule -
AuthenticationEventTrueReports authentication failures on the same
Authentication: Login
Failures Across Multiple
Hosts
Default-Rule-
AuthenticationEventTrueReports multiple log in failures to a single host,
Authentication: Login
Failures Followed By
Success
Default-Rule-
AuthenticationEventTrueReports on events detected by the system when
Authentication: Login
Successful After Scan
Attempt
Default-Rule-
AuthenticationEventTrueReports multiple log in failures to a VoIP PBX.
Authentication: Multiple
VoIP Login Failures
Default-Rule-
AuthenticationEvent TrueReports when a source IP address causes an
Authentication:
Repeated Login
Failures, Single Host
Rule
Type
Enabled Description
than normal. This may be normal, but in some
cases can be an early warning sign that the host
has changed behavior. We recommend that you
perform an event search and/or flow search to
determine if the host is exhibiting other
suspicious activity.
address known to be in a country that does not
have remote access right. Before you enable
this rule, we recommend that you configure the
Default-BB-CategoryDefinition: Countries with
no Remote Access building block.
user account. If the user is no longer a member
of the organization, we recommend that you
investigate any other received authentication
messages from the same user.
expired user account known. If the user is no
longer a member of the organization, we
recommend that you investigate any other
received authentication messages.
source IP address more than three times, across
more than three destination IP addresses within
10 minutes.
followed by a successful log in to the host.
at least one of the configured rules is detected
with the same source IP address followed by
successful authentication with the same IP
address, within 30 minutes.
authentication failure event at least seven times
to a single destination within 5 minutes.
STRM Log Management Users Guide
Table B-6 Default Rules (continued)
RuleGroup
Default-Rule-Botnet:
Botnet,ExploitEventFalseReports a host connecting or attempting to
Potential Botnet
Connection (DNS)
Default-Rule-Botnet:
BotnetEventTrueReports a host connecting or attempting to
Potential Botnet
Connection (IRC)
Default-Rule-
ComplianceEventFalseReports compliance-based events, such as,
Compliance:
Compliance Events
Become Offenses
Default-Rule-
ComplianceEventFalseReports excessive authentication failures to a
Compliance: Excessive
Failed Logins to
Compliance IS
Default-Rule-Database:
DatabaseEventTrueReports when a configuration modification is
Attempted Configuration
Modification by a remote
host
Default-Rule-Database:
DatabaseEventTrueReports when several authentications to a
Concurrent Logins from
Multiple Locations
Default-Rule-Database:
DatabaseEventTrueReports when there are failures followed by the
Failures Followed by
User Changes
Default-Rule-Database:
DatabaseEventTrueMonitors changes to groups on a database
Groups changed from
Remote Host
Default-Rule-Database:
DatabaseEventTrueReports when there are multiple database
Multiple Database
Failures Followed by
Success
Default-Rule-Database:
DatabaseEventTrueIncreases the severity of a failed login attempt to
Remote Login Failure
Rule
Type
Default Rules93
Enabled Description
connect to a DNS server on the Internet. This
may indicate a host connecting to a Botnet. The
host should be investigated for malicious code.
Do not enable this rule until you have tuned the
Default-BB-HostDefinition: DNS Servers building
block.
Note: Laptops that include wireless adapters
may cause this rule to generate alerts since the
laptops may attempt to communicate with
another IDPs DNS server. If this occurs, define
the ISPs DNS server in the
Default-BB-HostDefinition: DNS Servers building
block.
connect to an IRC server on the Internet. This
may indicate a host connecting to a Botnet. The
host should be investigated for malicious code.
clear text passwords.
compliance server within 10 minutes.
attempted to a database server from a remote
network.
database server occur across many remote IP
addresses.
addition or change of a user account.
when the change is initiated from a remote
network.
failures followed by a success within a short
period of time.
a database from a remote network.
STRM Log Management Users Guide
94DEFAULT RULESAND BUILDING BLOCKS
Table B- 6 Default Rules (continued)
RuleGroup
Default-Rule-Database:
DatabaseEventTrueReports when a successful authentication
Remote Login Success
Default-Rule-Database:
DatabaseEventTrueReports when changes to user privileges occurs
User Rights Changed
from Remote Host
Default-Rule-DDoS
D\DoSEventFalseReports network Distributed Denial of Service
Attack Detected
Default-Rule-DoS:
D\DoSEventTrueReports network Denial of Service (DoS) attacks
Network DoS Attack
Detected
Default-Rule-DoS:
D\DoSEventTrueReports a DoS attack against a local target that
Service DoS Attack
Detected
Default-Rule-Exploit:
ExploitEventFalseReports an exploit or attack type activity from a
Exploit Followed by
Suspicious Host Activity
Default-Rule-Exploit:
ExploitEventTrueReports a source IP address generating multiple
Exploit/Malware Events
Across Multiple Targets
Default-Rule-Exploit:
ExploitEventTrueReports a target attempting to be exploited using
Multiple Exploit Types
Against Single target
Default-Rule-Exploit:
ExploitEventFalseReports multiple failed logins to your VoIP
Potential VoIP Toll
Fraud
Default-Rule-Exploit:
ExploitEventTrueReports reconnaissance followed by an exploit
Recon followed by
Exploit
Default-Rule-False
False PositiveEventTrueReports events that include false positive rules
Positive: False Positive
Rules and Building
Blocks
Rule
Type
Enabled Description
occurs to a database server from a remote
network.
to a database from a remote network.
(DDoS) attacks on a system.
on a system.
is known to exist and the target port is open.
source IP address followed by suspicious
account activity on the destination host within 15
minutes.
(at least 5) exploits or malicious software
(malware) events in the last 5 minutes. These
events are not targeting hosts that are
vulnerable and may indicate false positives
generating from a device.
multiple types of attacks from one or more
attackers.
hardware followed by sessions being opened. At
least 3 events were detected within 30 seconds.
This action could indicate that illegal users are
executing VoIP sessions on your network.
from the same source IP address to the same
destination port within 1 hour.
and building blocks, such as,
Default-BB-FalsePositive: Windows Server
False Positive Events. Events that match the
above conditions are stored but also dropped. If
you add any new building blocks or rules to
remove events from becoming offenses, you
must add these new rules or building blocks to
this rule.
STRM Log Management Users Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.