Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time,
without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims
any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc.,
reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to
notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the
trade laws of other countries. You agree to comply with all export control regulations and to obtain any required
licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on
the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws.
You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the
Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information on
exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export
approvals.
Novell, Inc., has intellectual property rights relating to technology embodied in the product that is described in this
document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S.
patents listed on the Novell Legal Patents Web page (http://www.novell.com/company/legal/patents/) and one or
more additional patents or pending patent applications in the U.S. and in other countries.
Novell, Inc.
404 Wyman Street, Suite 500
Waltham, MA 02451
U.S.A.
www.novell.com
Online Documentation: To access the latest online documentation for this and other Novell products, see
the Novell Documentation Web page (http://www.novell.com/documentation).
Page 3
Novell Trademarks
For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/
trademarks/tmlist.html).
Third-Party Materials
All third-party trademarks are the property of their respective owners.
This guide covers the installation and configuration of Novell® Identity Audit.
Chapter 1, “Introduction,” on page 13
Chapter 2, “System Requirements,” on page 17
Chapter 3, “Installation,” on page 19
Chapter 6, “Searching,” on page 47
Chapter 4, “Reporting,” on page 27
Chapter 5, “Data Collection,” on page 37
Chapter 7, “Data Storage,” on page 57
Chapter 8, “Rules,” on page 61
Chapter 9, “User Administration,” on page 67
Appendix A, “Troubleshooting,” on page 71
Appendix B, “Truststore,” on page 73
novdocx (en) 22 June 2009
Appendix C, “Novell Identity Audit Database Views for PostgreSQL Server,” on page 75
Appendix D, “Documentation Updates,” on page 139
Audience
This guide is intended for Novell Identity Audit administrators and end users.
Feedback
We want to hear your comments and suggestions about this manual and the other documentation
included with this product. Please use the User Comments feature at the bottom of each page of the
online documentation, or go to www.novell.com/documentation/feedback.html and enter your
comments there.
Documentation Updates
For the most recent version of the Novell Identity Audit 1.0 Guide, visit the Identity Audit
documentation Web site (http://www.novell.com/documentation/identityaudit).
Additional Documentation and Support
To download additional plug-ins (for example, reports), go to the Identity Audit Content Web page
For more information about building your own plug-ins (for example, Jasper Reports*), go to the
TM
Sentinel
SDK Web page (http://developer.novell.com/wiki/index.php/Develop_to_Sentinel). The
build environment for Identity Audit report plug-ins is identical to what is documented for Novell
Sentinel.
About This Guide11
Page 12
Documentation Conventions
In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and
items in a cross-reference path.
®
A trademark symbol (
, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party
trademark.
novdocx (en) 22 June 2009
12Identity Audit Guide
Page 13
1
Introduction
Novell® Identity Audit provides event reporting and monitoring for the Novell Identity and Security
Management environment, including Novell eDirectory™, Novell Identity Manager, Novell Access
Manager, Novell Modular Authentication Services (NMAS™), Novell SecureLogin, and Novell
SecretStore
Section 1.1, “Product Overview,” on page 13
Section 1.2, “Interface,” on page 14
Section 1.3, “Architecture,” on page 15
®
.
1.1 Product Overview
Novell Identity Audit 1.0 is an easy to use, lightweight tool for collecting, aggregating, and storing
events from Novell Identity Manager, Novell Access Manager, Novell eDirectory, and other Novell
identity and security products and technologies. Key features include:
novdocx (en) 22 June 2009
1
Web-based administration and reporting interfaces
Full-event search tool allows searches across multiple event fields
Selected event output to several channels
Embedded JasperReports engine allows the use of open source tools for customizing included
reports or creating new reports
Built-in database eliminates the need for external database licenses or administration
Simple, intuitive data management tools
Novell Identity Audit is a replacement for Novell Audit and is related to Novell SentinelTM, but there
are significant differences.
Section 1.1.1, “Comparison to Novell Audit 2.0.2,” on page 13
Section 1.1.2, “Comparison to Novell Sentinel,” on page 14
1.1.1 Comparison to Novell Audit 2.0.2
Novell Identity Audit 1.0 is designed as a replacement product for the Novell Audit product line,
which leaves general support in February 2009. Identity Audit is comparable in functionality, but
with major improvements in architecture, reporting, and data management. Novell Identity Audit
1.0 is a drop-in replacement for the Novell Audit 2.0.2 Secure Logging Server for products in the
Novell Identity and Security product line. Because Novell Identity Audit uses a new embedded
database, customers should keep existing Novell Audit events in the archived Novell Audit database
rather than attempting to migrate legacy data.
The Novell Audit client component, also known as the Platform Agent, is still used as the data
transport mechanism for Novell Identity Audit. This will continue to be supported according to the
life cycles of Novell Identity and Access Management products that still use the Platform Agent.
Introduction
13
Page 14
1.1.2 Comparison to Novell Sentinel
Novell Identity Audit is built on a robust technological foundation, because much of the underlying
code is shared with Novell Sentinel. However, Sentinel collects data from a broader range of
devices, supports a higher event rate, and provides more tools than Novell Identity Audit. Sentinel
provides additional Security Information and Event Management (SIEM) features, such as real-time
dashboards, multi-event correlation, incident tracking and automated remediation, and data
collection from non-Novell products. Identity Audit is designed to integrate into a future Sentinel
deployment.
Novell Identity Audit 1.0 is not part of the Novell Compliance Management Platform (CMP) and
does not include the advanced identity and security integration features delivered in that platform.
Sentinel 6.1 is presently the identity audit and monitoring component of the CMP.
1.2 Interface
The Novell Identity Audit Web interface provides the ability to perform the following tasks:
Upload, run, view, and delete reports
novdocx (en) 22 June 2009
Search for events
Edit user profile details
Create, edit, and delete users and assign administrative rights (administrators only)
Configure data collection and view the health of event sources (administrator only)
Configure data storage and view the health of the database (administrators only)
Create filtering rules and configure associated actions to send matching event data to output
The Identity Audit pages automatically refresh every 30 seconds to show updates by other users, if
applicable.
The interface is available in multiple languages (English, French, German, Italian, Japanese,
Portuguese, Spanish, Simplified Chinese, and Traditional Chinese). It defaults to the browser’s
default language, but users can select another language at login.
NOTE: Although the interface is localized into double-byte languages, the current release of
Identity Audit does not process double-byte event data.
1.3 Architecture
Identity Audit collects data from multiple Novell identity and security applications. These
application servers are configured to generate event records, and each hosts a Platform Agent. Event
data is forwarded by the Platform Agent to an Audit Connector that resides on the Identity Audit
Server.
The Audit Connector passes events to the Data Collection component, which parses the events and
puts them on the Communication Bus, which is the backbone of the system and brokers most
communication between components. As part of Data Collection, incoming events are evaluated by
a set of filtering rules. These rules filter events and send them to output channels such as a file, a
syslog relay, or an SMTP relay.
In addition, all events are stored in the Identity Audit database (powered by PostgreSQL*), in
partitioned tables.
Introduction15
Page 16
The Configuration component retrieves, adds, and modifies configuration information such as data
collection and storage settings, rule definitions, and report definitions. It also manages user
authentication.
The Search component performs fast, indexed searches and retrieves events from the database to
present search result sets to the user.
The Reporting component runs reports and formats report results.
Figure 1-2 Architecture for Identity Audit
novdocx (en) 22 June 2009
Users interact with the Identity Audit server and all of its functionality via a Web browser, which
connects to an Apache* Tomcat Web server. The Web server makes calls to the various Identity
Audit components via the Communications Bus.
16Identity Audit Guide
Page 17
2
System Requirements
In addition to the hardware, operating system, browser, and event source compatibility requirements
described below, the user must also have root access for some installation steps.
Section 2.1, “Hardware Requirements,” on page 17
Section 2.2, “Supported Operating Systems,” on page 18
Section 2.3, “Supported Browsers,” on page 18
Section 2.4, “Supported Platform Agent Version,” on page 18
Section 2.5, “Supported Event Sources,” on page 18
2.1 Hardware Requirements
Novell Identity Audit is supported on 64-bits intel Xeon* and AMD Opteron* hardware. It is not
supported on Itanium* hardware. Novell recommends the following hardware for a production
system that holds 90 days of online data:
novdocx (en) 22 June 2009
2
1x Quad Core (x86-64)
16 GB RAM
1.5 TB usable disk space - 3x 500GB (3 usable), 10K RPM drives in a hardware RAID
configuration
Approximately 2/3 of the usable disk space is used for database files
Approximately 1/3 of the usable disk space is used for the search index and temp files
A small amount of storage is available for archived data that has been removed from the
database, but Novell recommends that you move archived data files from the Identity
Audit server to a long-term storage location.
Table 2-1 Performance
MetricValueDescription
Events per second (eps) - steady
state
Events per second (eps) - peak500Peak event rate during a spike (up to 10 minutes)
Events per second (eps) - peak per
application
100Average event rate during normal operations
300Peak event rate from each type of Novell application
Event rates are typically low (less than 15 eps)
for Identity Manager, SecureLogin,
SecretStore
Event rates can be very high from eDirectory
and Access Manager. Event filtering should be
implemented to ensure a manageable rate.
Even during an event spike, no one application
can send more than this many events per
second.
®
, and NMASTM)
TM
System Requirements
17
Page 18
MetricValueDescription
novdocx (en) 22 June 2009
Online data90 days or
750 million
events
Amount of data Identity Audit can store at a steady
state rate of approximately 100 eps, with the
recommended storage
2.2 Supported Operating Systems
Identity Audit is certified to run on 64-bits SUSE Linux Enterprise Server 10 SP1 and SP2.
NOTE: Identity Audit is not supported on Novell Open Enterprise Server 2.
2.3 Supported Browsers
The following browsers are supported by Identity Audit. Other browsers may not display
information as expected.
Mozilla* Firefox* 2
Mozilla Firefox 3
Microsoft* internet Explorer* 7
The performance of searches and report viewing seems to vary by browser. Novell has observed
particularly good performance from Mozilla Firefox 3.
2.4 Supported Platform Agent Version
Identity Audit 1.0 supports collecting log events from many applications that were supported by
Novell Audit and its Platform Agent. Platform Agent version 2.0.2 SP6 or above is required for
Identity Audit.
NOTE: Some Novell applications are bundled with a previous version of the Platform Agent. The
recommended version includes important bug fixes, so you should upgrade the Platform Agent if
you have a previous version.
2.5 Supported Event Sources
Identity Audit supports collecting data from the Novell identity and security applications. Some
applications require a specific patch level in order to collect data correctly.
Novell Access Manager 3.0
Novell eDirectory 8.8.3 with the eDirectory instrumentation patch found on the Novell Support
Web Site (http://download.novell.com/Download?buildid=RH_B5b3M6EQ~)
Novell Identity Manager 3.6
Novell NMAS 3.1
Novell SecretStore 3.4
Novell SecureLogin 6.0
18Identity Audit Guide
Page 19
3
Installation
This section describes how to install Novell® Identity Audit and configure the event sources to send
data to it. These instructions assume that the minimum requirements for each system component
have been met. For more information, see Chapter 2, “System Requirements,” on page 17.
Section 3.1, “Prerequisites,” on page 19
Section 3.2, “Installing Novell Identity Audit,” on page 19
Section 3.3, “Configuring Event Sources,” on page 23
Section 3.4, “Logging In to Identity Audit,” on page 25
Section 3.5, “Uninstalling,” on page 25
3.1 Prerequisites
Before installing Identity Audit, be sure you meet the system requirements in Chapter 2, “System
Requirements,” on page 17. In particular, you need to have the supported patch levels for some
Novell applications in order to receive high-quality events from those event sources.
novdocx (en) 22 June 2009
3
3.2 Installing Novell Identity Audit
The Identity Audit installation package installs everything you need to run Identity Audit: the
Identity Audit application and communications bus, the database to store events and configuration
information, the Web-based user interface, and the reporting server. There are two installation
root
options, a simple installation that can be run as
little as possible.
, or a multi-step installation that uses
3.2.1 Quick Installation (as root)
This simple installation must be run as
root
1 Log in as
2 Download or copy
3 Change to the temporary directory (if necessary).
4 Extract the install script from the file by using the following command:
tar xfz identity_audit_1.0_x86-64.tar.gz identity_audit_1.0_x86-64/setup
to the server where you want to install Identity Audit.
identity_audit_1.0_x86-64.tar.gz
root_install_all.sh
root
root
.
to a temporary directory.
script with
and run the command above or use the
root
privileges.
sudo
command to run
root
as
6 Choose a language by entering a number.
The end user license agreement displays in the selected language.
Installation
19
Page 20
7 Read the end user license and enter 1 or y if you agree to the terms and want to continue
installation.
The installation begins. If the previously selected language is not available for the installer (for
example, Polish), the installer continues in English.
novdocx (en) 22 June 2009
The novell user and novell group are created, if they do not already exist.
The novell user is created without a password. If you want to be able to log in as the novell user
later (for example, to install patches), you can create a password for this user after the
installation is completed.
8 Enter the password for database administrator (dbauser).
9 Confirm the password for database administrator (dbauser).
10 Enter the password for the admin user.
11 Confirm the password for the admin user.
20Identity Audit Guide
Page 21
novdocx (en) 22 June 2009
The dbauser credentials are used to create tables and partitions in the PostgreSQL database.
Identity Audit is configured to start up with runlevels 3 and 5 (Multi-User Mode with boot-up
in console or X-Windows mode).
After the Identity Audit service starts, you can log in to the URL (for example: https://
10.10.10.10:8443/novellidentityaudit) specified in the installation output.The system starts
processing internal audit events immediately, and it is fully functional after you configure event
sources to send data to Identity Audit.
3.2.2 Non-root Installation
If organizational policy prohibits running the full installation process as
run in two steps. The first part of the installation procedure must be performed with
access, and the second part is performed as the Identity Audit administrative user (created during the
first part).
root
1 Log in as
2 Download or copy
to the server where you want to install Identity Audit.
identity_audit_1.0_x86-64.tar.gz
3 (Conditional) If the novell user and novell group do not exist on the server:
3a Extract the script to create the novell user and novell group from the Identity Audit tar file.
For example:
tar xfz identity_audit_1.0_x86-64.tar.gz identity_audit_1.0_x86-64/
The end user license agreement displays in the selected language.
10 Read the end user license and enter
1
or y if you agree to the terms and want to continue
installation.
The installation begins. If the previously selected language is not available for the installer (for
example, Polish), the installer continues in English.
novdocx (en) 22 June 2009
11 Enter the password for database administrator (dbauser).
12 Confirm the password for database administrator (dbauser).
13 Enter the password for the admin user.
14 Confirm the password for the admin user.
15 Log out and log back in as novell. This loads the PATH environment variable changes made by
Identity Audit is configured to start up with runlevels 3 and 5 (Multi-User Mode with boot-up
in console or X-Windows mode).
After the Identity Audit service starts, you can log in to the URL (for example: https://
10.10.10.10:8443/novellidentityaudit) specified in the installation output.The system starts
processing internal audit events immediately, and it is fully functional after you configure event
sources to send data to Identity Audit.
3.3 Configuring Event Sources
Identity Audit 1.0 supports collecting log events from applications that were supported by the old
Novell Audit product and its Platform Agent. Before completing the steps in this section, ensure that
your Novell products are supported. For more information, see Section 2.4, “Supported Platform
Agent Version,” on page 18.
The 32-bits Platform Agent (http://download.novell.com/Download?buildid=1O9cbsOIO8Y~)
can be downloaded as part of the Novell Audit product.This URL is current for Audit 2.0.2
SP6.
The 64-bits Platform Agent (http://download.novell.com/Download?buildid=8hsF_lYQZJM~)
can be downloaded as a standalone client.This URL is current for 2.0.2 SP6.This URL is
current for Audit 2.0.2 SP6.
Section 3.3.1, “Installing the Platform Agent,” on page 23
Section 3.3.2, “Configuring the Platform Agent,” on page 24
Section 3.3.3, “Configuring the Auditing Level,” on page 25
3.3.1 Installing the Platform Agent
The Platform Agent must be at least the minimum version recommended for Identity Audit. For
more information, see Section 2.4, “Supported Platform Agent Version,” on page 18. The
appropriate Platform Agent (32-bits or 64-bits) must be installed or updated on all event source
machines.
The instructions for installing or upgrading the Platform Agent vary slightly by operating system.
The sample instructions below are for a 32-bits Linux* Platform Agent.
iso
1 Download the .
event source machine.
2 Create a directory for Audit. For example,
3 Log in as
root
file for the supported version of Novell Audit to the
.
mkdir -p audit202
/tmp
directory on the
.
Installation23
Page 24
novdocx (en) 22 June 2009
4 Mount the Audit .
mount -o loop ./NAudit202.iso ./audit202
5 Go to the
audit202
iso
file.
directory.
6 Go to the appropriate directory for the operating system on your event source. For example:
cd Linux
7 Run
pinstall.lin.
./pinstall.lin
8 Read the license agreement and enter y if you are willing to accept the terms.
9 Enter
10 Enter
P
to install the Platform Agent.
Y
to keep any previous configurations to the
logevent.conf
file.
The Platform Agent is installed.
11 To verify that the Platform Agent version is correct, enter the following command:
rpm -qa | grep AUDT
The version of novell-AUDTplatformagent should be at least the supported version listed in
Section 2.4, “Supported Platform Agent Version,” on page 18.
3.3.2 Configuring the Platform Agent
After installation, the Platform Agent must be configured to send data to the Identity Audit server
and, if desired, to send event signatures from the event sources.
IMPORTANT: Configuring the Platform Agent to generate signatures can negatively impact the
performance of the event source machines.
To configure the Platform Agent:
1 Log into the event source machine.
2 Open the
logevent
file for editing. The file is in a different location depending on the
operating system:
Linux:
Windows*:
NetWare
Solaris*:
/etc/logevent.conf
C:\WINDOWS\logevent.cfg
®
:
SYS:\etc\logevent.cfg
/etc/logevent.conf
3 Set LogHost to the IP address of the Identity Audit server.
4 Set LogEnginePort=1289, if this entry does not already exist.)
5 If you want the event source to send event signatures, enter LogSigned=always.
6 Save the file.
7 Restart the Platform Agent. The method varies by operating system and application. Reboot the
machine or refer to the application-specific documentation on the Novell Documentation Web
Site (http://www.novell.com/documentation) for more instructions.
24Identity Audit Guide
Page 25
3.3.3 Configuring the Auditing Level
The events for which each application generates records are configured differently for each
application monitored by Identity Audit. The URLs below have more information about each
application.
SecureLogin (http://www.novell.com/documentation/securelogin60/index.html) (see the
Auditing link)
novdocx (en) 22 June 2009
3.4 Logging In to Identity Audit
The administrative user created during the install can log into the Identity Audit application and
create more users, run preloaded reports, upload new reports, perform event searches, and more.
To log into Identity Audit:
1 Open a supported Web browser. For more information, see Section 2.3, “Supported Browsers,”
on page 18.
2 Go to the Novell Identity Audit page (for example: https://10.10.10.10:8443/
novellidentityaudit).
3 If this is the first time you have logged into Identity Audit, you are presented with a certificate.
You must accept it to proceed.
admin
4 Enter
5 Enter the admin password you configured during installation.
6 Select the language for the Identity Audit interface (English, Portuguese, French, Italian,
German, Spanish, Japanese, Traditional Chinese, or Simplified Chinese).
7 Click Login.
.
3.5 Uninstalling
To fully uninstall an Identity Audit installation, you must run the uninstall script and then perform
some manual cleanup steps.
4 Delete the Identity Audit home directory and its contents.
rm -rf /opt/novell/identity_audit_1.0_x86-64
The final steps depend on whether you want to retain any information related to the novell user
and group.
5 (Conditional) If you do not want to retain any information related to the novell user, run the
following command to remove the user, its home directory, and the group:
userdel -r novell && groupdel novell
6 (Conditional) If you do want to retain the novell user and its home directory but want to remove
all Identity-Audit-related settings:
6a Remove the following environment variable entries for Identity Audit from the novell
user’s profile (in
APP_HOME=/opt/novell/identity_audit_1.0_x86-64
export PATH=$APP_HOME/bin:$PATH
~novell/.bashrc
):
novdocx (en) 22 June 2009
6b Remove the dbauser entry from the PostgreSQL file
*:*:*:dbauser:password
~novell/.pgpass
.
Although the dbauser password is shown in clear text, the contents of this file are only
visible to the novell and root users, which already have full access to all functions on the
Identity Audit server.
26Identity Audit Guide
Page 27
4
Reporting
Novell® Identity Audit is installed with a core set of report templates related to Novell applications.
Any Identity Audit user can run a report by using the desired parameters (such as start and end date),
and the report results are saved with a name of the user’s choosing. After the report runs, the results
can be retrieved by any Identity Audit user and viewed as a PDF file
Reports are organized by category. Identity Audit is installed with reports for each supported event
source.
Section 4.1, “Running Reports,” on page 27
Section 4.2, “Viewing Reports,” on page 30
Section 4.3, “Managing Reports,” on page 31
Section 4.4, “Default Reports,” on page 34
novdocx (en) 22 June 2009
4
4.1 Running Reports
Identity Audit is installed with a set of reports organized into several product categories. Reports run
asynchronously, so users can continue to do other things in the application while the report is
running. The PDF report results can be viewed by any user after the report finishes running.
Many report definitions include parameters. The user is prompted to set these before running the
reports. Depending on how the report developer designed the report, the report parameters can be
text, numbers, bits values, or dates. A parameter might have a default value or a list based on values
in the Identity Audit database.
Section 4.1.1, “Manually Running a Report,” on page 27
Section 4.1.2, “Scheduling a Report,” on page 29
4.1.1 Manually Running a Report
1 In Identity Audit, click Reports to display the available reports.
Reporting
27
Page 28
novdocx (en) 22 June 2009
If desired, click a report definition to expand it. If you see a Sample Report link, you can click
View to find out how the completed report looks with a set of sample data.
2 Select the report you want to run and click Run.
3 Set the schedule for running the report. If you want the report to run later, you must also enter a
start time.
Now: This is the default. It runs the report immediately.
Once: Runs the report once at the specified date and time.
Daily: Runs the report once a day at the specified time.
Weekly: Runs the report once a week on the same day at the specified time.
Monthly: Runs the report on the same day of the month every month, starting at the
specified date and time. For example, if the start date and time is October 28 at 2 P.M, the
report will run on the 28th day of the month at 2 P.M every month.
All time settings are based on the browser’s local time.
4 Specify a name to identify the report results.
Because the username and time are also used to identify the report results, the report name need
not to be unique.
28Identity Audit Guide
Page 29
5 Choose the language in which the report labels and descriptions should be displayed (English,
French, German, Italian, Japanese, Traditional Chinese, Simplified Chinese, Spanish, or
Portuguese).
The data in the report will be displayed in whatever language it was originally produced by the
event source.
6 If the report includes time period parameters, choose the date range. All time periods are based
on the local time for the browser.
Current Day: Shows events from midnight of the current day until 11:59 of the current
day. If the current time is 8AM, the report will show 8 hours of data.
Previous Day: Shows events from midnight yesterday until 11:59PM yesterday.
Week To Date: Shows events from midnight Sunday of the current week until the end of
the current day.
Previous Week: Shows last seven days of events.
Month to Date: Shows events from midnight the first day of the current month until the
end of the current day.
Previous Month: Shows a month of events, from midnight of the first day of the previous
month until 11:59 PM of the last day of the previous month
Custom Date Range: For this setting only, you also need to set a start date and end date
below.
7 If you selected Custom Date Range, set the start date (From Date) and the end date (To Date)
for the report.
novdocx (en) 22 June 2009
If any of the other settings is selected for the report type, these time settings are ignored.
8 Set the Minimum Severity events to be included in the report.
9 Set the Maximum Severity events to be included in the report.
10 If the report should be mailed to a user or users, enter their e-mail addresses, separated by
commas.
To enable mailing reports, the administrator must configure the mail relay under Rules > Configuration.
11 Click Run.
A report results entry is created and mailed to the designated recipients.
4.1.2 Scheduling a Report
When you run a report, you can run the report immediately or schedule it to be run later, either once
or on a recurring basis. For scheduled reports, you must choose a frequency and enter a time at
which the report should run.
Now: This is the default. It runs the report immediately.
Once: Runs the report once at the specified date and time.
Daily: Runs the report once a day at the specified time.
Weekly: Runs the report once a week on the same day at the specified time.
Monthly: Runs the report on the same day of the month every month, starting at the specified
date and time. For example, if the start date and time is October 28 at 2PM, the report will run
on the 28th day of the month at 2PM every month.
Reporting29
Page 30
NOTE: All time settings are based on the browser’s local time.
Figure 4-1 Scheduled Reports
Report schedules can be removed or modified by using the Delete and Edit links.
novdocx (en) 22 June 2009
4.2 Viewing Reports
Identity Audit users can view reports in the Identity Audit application. Other users might receive
pdf
report .
1 To view the list of report results, click Vi ew.
files in e-mail.
All previously run reports are shown with the user-defined report name, the user who ran them,
and what time the report was run.
If the server was restarted while a report was processing, you will see buttons to cancel or
restart the report. If you restart the report, it uses the same parameters as the first time it was
run. In cases where the report was run using a relative time setting (such as Current Day), the
time period for the rerun report is based on the current date and time, not the date and time at
which the report was originally run.
2 Click show parameters to see the exact values used to run the report.
30Identity Audit Guide
Page 31
For Date Range, D=Current Day, PD=Previous Day, W=Week To Date, PW=Previous
Week, M=Month To Date, PM=Previous Month, and DR=Custom Date Range.
For Language, en=English, fr=French, de=German, it=Italian, ja=Japanese, pt=Brazilian
Portuguese, es=Spanish, zh=Simplified Chinese, and zh_TW=Traditional Chinese.
3 Click View for the report results you want to see. The report results are displayed in a new
window in .
pdf
format.
novdocx (en) 22 June 2009
TIP: Report results are organized from newest to oldest.
4.3 Managing Reports
Identity Audit users can add, delete, update, and schedule reports.
Section 4.3.1, “Adding Reports,” on page 32
Section 4.3.2, “Creating New Reports,” on page 33
Section 4.3.3, “Renaming Report Results,” on page 33
Section 4.3.4, “Deleting Reports,” on page 34
Section 4.3.5, “Updating Report Definitions,” on page 34
Reporting31
Page 32
4.3.1 Adding Reports
Any user can add or update reports in Identity Audit.
“Downloading New or Updated Reports” on page 32
“Adding New Reports to Identity Audit” on page 32
Downloading New or Updated Reports
New or updated reports by Novell can be downloaded from the Identity Audit 1.0 Plugins Web site
Identity Audit comes preloaded with reports, but new report plug-ins (special .
zip
files that include
the report definition plus metadata) can be uploaded into Identity Audit. If there are no reports in the
system, the following screen displays:
Figure 4-2 No Reports Loaded
To add a report:
1 Click the Reports button on the left side of the screen.
2 Click the Upload Report button.
3 Browse and select the report plug-in .
zip
file on your local machine.
4 Click Open.
5 Click Save.
6 If the same report already exists in the report repository (based on the report’s unique ID),
decide whether to replace the existing report.
32Identity Audit Guide
Page 33
Identity Audit displays the details of both the report in the system and the one being imported.
In the case below, the imported report is the same version as the existing report.
novdocx (en) 22 June 2009
The new report definition is added to the list in alphabetical order and can be run immediately, if
desired.
4.3.2 Creating New Reports
Users can modify or write reports by using JasperForge iReport. a graphical report designer for
JasperReports. iReport is an open source report development tool that is available for download
from JasperForge.org (http://jasperforge.org/plugins/project/project_home.php?group_id=83) (as of
the time of this publication).
New or modified reports can include additional database fields that are not presented in the Identity
Audit Web interface. They must adhere to the file and format requirements of the report plug-ins.
For more information about database fields and file and format requirements for report plug-ins, see
the Sentinel SDK Web site (http://developer.novell.com/wiki/
index.php?title=Develop_to_Sentinel).
4.3.3 Renaming Report Results
Report results (but not report definitions) can be renamed in the Identity Audit interface.
1 Click the Reports button on the left side of the screen.
2 Click a report name to expand it.
Reporting33
Page 34
3 Click the name of the report results you want to rename.
4 Specify the new name.
5 Click Rename.
4.3.4 Deleting Reports
Users can delete either a report result set or a report definition by using the button. If a report
definition is deleted, all associated report results are also deleted.
If a report in progress is canceled by using the Cancel link, the query on the database is canceled.
4.3.5 Updating Report Definitions
Users can upload updated reports to Identity Audit to replace an existing report. For more
information, see Section 4.3.1, “Adding Reports,” on page 32.
4.4 Default Reports
novdocx (en) 22 June 2009
This section lists the pre-installed reports of Novell Identity Audit:
Administrators can configure and monitor data collection for Novell® Identity Audit. Identity Audit
is installed with the ability to collect data from a variety of Novell applications by using the Novell
Audit. For information on the supported versions of the, see Section 2.4, “Supported Platform Agent
Version,” on page 18.
Section 5.1, “Data Collection Status,” on page 37
Section 5.2, “Managing Event Sources,” on page 40
Section 5.3, “Audit Server Options,” on page 40
Section 5.4, “Event Sources,” on page 45
5.1 Data Collection Status
Administrators can enable or disable data collection and view health information about the audit
server and event sources.
novdocx (en) 22 June 2009
5
Section 5.1.1, “Enabling and Disabling Data Collection,” on page 37
Section 5.1.2, “Viewing Audit Server Health,” on page 38
Section 5.1.3, “Viewing Event Source Health,” on page 39
5.1.1 Enabling and Disabling Data Collection
1 Log into Identity Audit as an administrator.
2 Click Collection in the upper right corner of the page.
Data Collection
37
Page 38
novdocx (en) 22 June 2009
3 In the Audit Server section, administrators can enable or disable data collection at a global level
by using the On and Off options. For more information about audit server health status, refer to
Section 5.1.2, “Viewing Audit Server Health,” on page 38.
4 In the Event Sources section, administrators can enable data collection at the application level
by using the On and Off options. These settings might affect data collection for several servers
TM
(for example, multiple eDirectory
instances). They do not start or stop services on the event
source machines.
For more information about event source health status, see Section 5.1.3, “Viewing Event
Source Health,” on page 39.
Changes on this page take effect immediately.
5.1.2 Viewing Audit Server Health
The Audit Server is a server that listens for connections from Novell applications.
1 Log into Identity Audit as an administrator.
2 Click Collection in the upper right corner of the page.
3 A colored icon beside the Audit Server indicates its health.
Healthy: A green indicator means that the Audit Server is healthy (it is turned on, is listening
on a port, and doesn’t have any unresolved errors).
Error: A red indicator means that the Audit Server has experienced an error. For more
information, view the
Offline: A black indicator means that the Audit Server has been taken offline by an
administrator.
server0.*.log
files.
38Identity Audit Guide
Page 39
5.1.3 Viewing Event Source Health
The health status for each Novell application is indicated by a colored icon. For each online data
source, Identity Audit also shows the calculated event rate for incoming events. The event rate is
recalculated every 60 seconds.
For more information about the health status, including the IP addresses of the individual event
sources, click show details.
1 Log into Identity Audit as an administrator.
2 Click Collection in the upper right corner of the page.
3 A colored icon beside the Novell application indicates its health.
Healthy: A green indicator means that the event source is healthy and Identity Audit has
received data from it.
War ning: A yellow indicator indicates a warning condition. A frequent cause is that the
application is turned on in Identity Audit but has not sent any data. For example, this could
happen if the event source is not configured properly to send data to Identity Audit or if event
logging is not enabled for the application.
novdocx (en) 22 June 2009
Error: A red indicator means that the Identity Audit server is reporting an error connecting to
or receiving data from this application.
Offline: A black indicator means that the event source has been turned off. Identity Audit is not
processing any data from it.
4 Click show details to see more information, including IP addresses for individual event sources
and their associated status.
Data Collection39
Page 40
5.2 Managing Event Sources
Although Identity Audit is preconfigured to accept data from supported Novell applications, the
application servers themselves must be configured to send data to the Identity Audit server. This is
part of the basic setup for Identity Audit. For more information, see Section 3.3, “Configuring Event
Sources,” on page 23.
Section 5.2.1, “Adding Event Sources,” on page 40
Section 5.2.2, “Deleting Event Sources,” on page 40
5.2.1 Adding Event Sources
After new event sources start sending data to Identity Audit, the IP addresses for those event sources
are automatically added to the list of IPs that shows when you click show details for a Novell
application.
novdocx (en) 22 June 2009
5.2.2 Deleting Event Sources
If there is an error with the connection for an event source, the event source can be deleted using the
yellow icon to the left of the IP address. If the event source starts sending data again, the connection
will be automatically re-established.
5.3 Audit Server Options
Administrators can change some settings regarding how Identity Audit listens for data from the
event source applications, including the port on which Identity Audit listens and the type of
authentication between the event source and Identity Audit.
1 Log into Identity Audit as an administrator.
2 Click the Collection link at the top of the screen.
3 Click the Configuration link on the right side of the screen.
4 Make sure that the Audit Server tab is selected.
40Identity Audit Guide
Page 41
novdocx (en) 22 June 2009
5 Specify the port on which the Identity Audit server will listen for messages from the event
sources. For more information, see Section 5.3.1, “Port Configuration and Port Forwarding,”
on page 42.
6 Set the appropriate client authentication and server key pairs settings. For more information,
see Section 5.3.2, “Client Authentication,” on page 42.
7 Select the Identity Audit server behavior when the buffer fills with too many events.
Temporarily pause connections: Drops the existing connections and stops accepting new
connections until the buffer has space for the new messages. In the meantime, messages are
cached by the event sources.
Drop oldest messages: Drops the oldest messages in order to accept new messages.
WARNING: There is no supported method for recovering dropped messages if you select
Drop oldest messages.
8 Select Idle Connection to disconnect event sources that have not sent data for a certain period
of time.
The event source connections are automatically re-created when they start sending data again.
9 Specify the number of minutes before an idle connection is disconnected.
Data Collection41
Page 42
10 Select Event Signatures to receive a signature with the event.
To receive a signature, the Platform Agent on the event source must be configured properly.
For more information, see Section 5.2, “Managing Event Sources,” on page 40.
11 Click Save.
5.3.1 Port Configuration and Port Forwarding
The default port on which Identity Audit listens for messages from the s is port 1289. When the port
is set, the system checks whether the port is valid and open.
Binding to ports less than 1024 requires root privileges. Instead, Novell recommends that you use a
port greater than 1024. You can change the source devices to send to a higher port or use port
forwarding on the Identity Audit server.
To change the event source to send to a different port:
1 Log into the event source machine.
2 Open the
logevent
operating system:
file for editing. The file is in a different location depending on the
novdocx (en) 22 June 2009
Linux:
Windows:
NetWare:
Solaris:
/etc/logevent.conf
C:\WINDOWS\logevent.cfg
SYS:\etc\logevent.cfg
/etc/logevent.conf
3 Set the LogEnginePort parameter to the desired port.
4 Save the file.
5 Restart the Platform Agent. The method varies by operating system and application. Reboot the
machine or refer to the application-specific documentation on the Novell Documentation Web
Site (http://www.novell.com/documentation) for more instructions.
To configure port forwarding on the Identity Audit server:
1 Log into the Identity Audit server operating system as
2 Open the file
/etc/init.d/boot.local
for editing.
(or su to
root
).
root
3 Add the following command near the end of the bootup process:
iptables -A PREROUTING -t nat -p protocol --dport incoming port -j DNAT -to-destination IP:rerouted port
where protocol is tcp or udp, incoming port is the port on which the messages are arriving, and
IP:rerouted port are the IP address of the local machine and an available port above 1024
4 Save the changes.
5 Reboot. If you cannot reboot immediately, run the
iptables
command above from a command
line.
5.3.2 Client Authentication
Event sources send their data over an SSL connection, and the Client authentication setting for the
Identity Audit server determines what kind of authentication is performed for the certificates from
the s on the event sources.
42Identity Audit Guide
Page 43
Open: No authentication is required. Identity Audit does not request, require, or validate a
certificate from the event source.
Loose: A valid X.509 certificate is required from the event source, but the certificate is not
validated. It does not have to be signed by a Certificate Authority.
Strict: A valid X.509 certificate is required from the event source, and it must be signed by a trusted
Certificate Authority. If the event source does not present a valid certificate, Identity Audit does not
accept its event data.
“Creating a Truststore” on page 43
“Importing a Truststore” on page 43
“Server Key Pair” on page 44
Creating a Truststore
For strict authentication, you must have a truststore that contains either the event source’s certificate
or the certificate for the Certificate Authority (CA) that signed the event source’s certificate. After
you have a DER or PEM certificate, you can create the truststore by using the CreateTruststore
utility that comes with Identity Audit.
In this example, the TruststoreCreator utility creates a keystore file called
contains two certificates (
cert1.pem
utility.
and
cert2.pem
my.keystore
that
) in it. It is protected by the password
password1.
Importing a Truststore
For strict authentication, the administrator can import a truststore by using the Import button. This
helps ensure that only authorized event sources are sending data to Identity Audit. The truststore
must include either the event source’s certificate or the certificate of the Certificate Authority that
signed it.
The following procedure must be run on the machine that has the truststore on it. You can open a
Web browser on the machine with the truststore or move the truststore to any machine with a Web
browser.
To import a truststore:
1 Log into Identity Audit as an administrator.
2 Click the Collection link at the top of the screen.
3 Click the Configuration link on the right side of the screen.
Data Collection43
Page 44
4 Make sure that the Audit Server tab is selected.
5 Select the Strict option under Client authentication.
6 Click Browse and browse to the truststore file (for example,
my.keystore
7 Enter the password for the truststore file.
8 Click Import.
9 If desired, click Details to see more information about the truststore.
novdocx (en) 22 June 2009
)
10 Click Save.
After the truststore is imported successfully, you can click Details to see the certificates included in
the truststore.
Server Key Pair
Identity Audit is installed with a built-in certificate, used to authenticate the Identity Audit server to
the event sources. This certificate can be overridden with a certificate signed by a public certificate
authority (CA).
To replace the built-in certificate:
1 Log into Identity Audit as an administrator.
2 Click the Collection link at the top of the screen.
3 Click the Configuration link on the right side of the screen.
4 Make sure that Audit Server is selected.
5 Under Server key pairs, select Custom.
6 Click Browse and browse to the truststore file.
7 Enter the password for the truststore file.
8 Click Import.
44Identity Audit Guide
Page 45
novdocx (en) 22 June 2009
If there is more than one public-private key pair in the file, select the desired key pair and click
OK.
9 Click Details to see more information about the server key pair.
10 Click Save.
5.4 Event Sources
The Event Sources page allows administrators to configure how time is determined for events from
each event source. The event time can be based on the time stamp from the event source (“trust
event time”) or the time stamp from the Identity Audit server. The time stamp affects the order in
which events are displayed in a search if you sort by time. The time stamp also affects the display
time in reports. The default is to use the Identity Audit server time.
NOTE: An NTP server is recommended to keep time synchronized on all machines in the Identity
Audit system. If an NTP server is available, you should trust the event time for the applications. If
an NTP server is not available, you should use the Identity Audit server time for all applications
(which is the default setting) to correct for any time differences between machines.
To change the event time options:
1 Log into Identity Audit as an administrator.
2 Click the Collection link at the top of the screen.
3 Click the Configuration link on the right side of the screen.
4 Click Event Source.
Data Collection45
Page 46
5 Select all applications for which Identity Audit should use the event time stamp from the
original application.
novdocx (en) 22 June 2009
For all others, the Identity Audit server time stamp replaces the time stamp from the original
application.
The changes take effect immediately for all new incoming events. It might take some time for events
already in the queue to be processed.
46Identity Audit Guide
Page 47
6
Searching
Novell Identity Audit provides the ability to perform a search on events. The search includes all
online data currently in the database, but internal events generated by the Identity Audit system are
excluded unless the user selects Include System Events. By default, events are sorted based on the
search engine’s relevancy algorithm.
Basic event information includes event name, source, time, severity, information about the initiator
(represented by an arrow icon), and information about the target (represented by a bull’s-eye icon).
Figure 6-1 Event Fields
novdocx (en) 22 June 2009
6
Section 6.1, “Running an Event Search,” on page 47
Section 6.2, “Viewing Search Results,” on page 49
Section 6.3, “Event Fields,” on page 52
6.1 Running an Event Search
Users can run simple and advanced searches.
Section 6.1.1, “Basic Search,” on page 47
Section 6.1.2, “Advanced Search,” on page 48
6.1.1 Basic Search
A basic search runs against all of the event fields in Table 6-1 on page 52. Some sample basic
searches include the following:
root
127.0.0.1
Lock*
driverset0
NOTE: If time is not synchronized between the end user machine and the Identity Audit server (for
example, one machine is 25 minutes behind), you might get unexpected results from your search.
Searches such as Last 1 hour or Last 24 hours are based on the end user’s machine time.
1 Click the Search link on the left.
Searching
47
Page 48
Identity Audit is configured to run a default search for non-system events with severity 3 to 5
the first time a user clicks the Search link. Otherwise, it defaults to the last search term the user
entered.
admin
2 For a different search, type a search term in the search field (for example,
). The search is
not case-sensitive.
3 Select a time period for which the search should be performed. Most of the time settings are
self-explanatory, and the default is Last 30 Days.
Custom allows you select a start date and time and an end date and time for the query. The
start date must be before the end date, and the time is based is based on the browser’s local
time.
All time searches all the data in the database.
novdocx (en) 22 June 2009
4 Select Include System Events to include events that are generated by Identity Audit system
operations.
5 Select Sort By Time to arrange data with the most recent events at the beginning.
Sorting by time takes longer than sorting by relevance, which is the default.
6 Click Search.
All fields in the index are searched for the specified text. A spinning icon indicates that the
search is taking place.
The event summaries are displayed.
6.1.2 Advanced Search
An advanced search can search for a value in a specific event field or fields. The advanced search
criteria are based on the short names for each event field and the search logic for the index. To view
the field names and descriptions, the short names that are used in advanced searches, and whether
the fields are visible in the basic and detailed event views. see Table 6-1 on page 52.
48Identity Audit Guide
Page 49
To search for a value in a specific field, use the short name of the field, a colon, and the value. For
example, to search for an authentication attempt to Identity Audit by user2, use the following text in
the search field:
evt:authentication AND sun:user2
Other advanced searches might include:
pn:NMAS AND sev:5
sip:123.45.67.89 AND evt:“Set Password”
Figure 6-2 Advanced Search Example
novdocx (en) 22 June 2009
Multiple advanced search criteria can be combined by using the following bits operators:
AND (must be capitalized)
OR (must be capitalized)
NOT (must be capitalized and cannot be used as the only search criterion)
+
-
Special characters must be escaped by using a \ symbol:
+ - && || ! ( ) { } [ ] ^ " ~ * ? : \
The advanced search criteria are modeled on the search criteria for the Apache Lucene* open source
package. More detail about the search criteria is available on the Web: Lucene Query Parser Syntax
Searches return a set of events. Users can view basic or detailed event information and configure the
number of results per page. Search results are returned in batches. The default batch size is 25
results, but this is easily configured.
When results are sorted by relevance, only the top 100,000 events can be viewed. When they are
sorted by time, this limitation does not exist.
Section 6.2.1, “Basic Event View,” on page 50
Searching49
Page 50
Section 6.2.2, “Event View with Details,” on page 50
Section 6.2.3, “Refining Search Results,” on page 51
6.2.1 Basic Event View
The information in each event is grouped into Initiator information and Target information. If data
isn’t available for a particular event field, the fields are labeled Unknown.
Figure 6-3 Basic Event View
Occasionally, the search engine might index events faster than they are inserted into the database. If
a user runs a search that returns events that have not been inserted into the database, the user gets a
message that some events match the search query but could not be found in the database. Generally
if the search is run again later, the events are in the database and the search is successful.
novdocx (en) 22 June 2009
Figure 6-4 Events Indexed but Not Yet in Database
6.2.2 Event View with Details
Users can view additional details about any event or events by clicking the details link on the right
side of the page.The details for all events on a page can be expanded or collapsed by using the All
Details++ or All details-- link. This preference is retained as you scan through multiple pages of
results or execute new searches.
50Identity Audit Guide
Page 51
Figure 6-5 Event View with Details
The event above shows the same event as in Figure 6-3 on page 50 but with an expanded view that
shows additional data fields that might have been populated.
6.2.3 Refining Search Results
After viewing the results of a search, it might be necessary to refine the search results and add
additional search criteria. For example, you might see one initiator user’s name appear several times
in the search results and want to see more events from that initiator.
novdocx (en) 22 June 2009
To filter the search results using a specific value appearing in the search results:
1 Identify the desired filter criteria in the search results.
2 Click the value (for example, target hostname test1900) by which you want to filter the results.
TIP: This adds the value to your filter with an AND operator. To add the value to your filter
with an NOT operator, press the Alt key as you click the value.
Searching51
Page 52
3 Click Search.
novdocx (en) 22 June 2009
Some fields cannot be selected to refine a search this way:
EventTime
Message
Any field related to the Reporter
Any field related to the Observer
Any field related to TargetTrust
Any field with a value
Unknown
6.3 Event Fields
Each event has fields that might or might not be populated, depending on the specific event. The
values for these event fields can be viewed by using a search or running a report. Each field has a
short name that is used in advanced searches. The values for most of these fields are visible in the
detailed event view; other values are also visible in the basic event view.
Table 6-1 Event Fields
Field
Short
Name
Description
Visible in
Basic View
Visible in
Detailed
View
SeveritysevNormalized severity of event on a scale of
EventTimedtTime stamp of event. Can be the Identity
EventNameevtShort name of the eventXX
52Identity Audit Guide
XX
0 (informational) to 5 (critical)
XX
Audit server time stamp or the time stamp
from the original event source (if trust event
time is enabled)
Page 53
novdocx (en) 22 June 2009
Field
Short
Name
Description
Visible in
Basic View
MessagemsgDetailed event messageX
ProductNamepnProduct that generated the event; the
XX
event source
Displayed after the event name.
InitUserNamesunUsername of the user who initiated the
XX
event
InitUserIDiuidUser ID of the user who initiated the event,
based on the raw data reported by the
device.
InitUserDomainrv35Domain of the user who initiated the event
Searchable but not displayed in either
event view
InitHostNameshnHostname of the machine from which the
XX
event initiated
InitHostDomainrv42Domain of the machine from which the
XX
event initiated
InitIPsipIP address of the machine from which the
event initiated
Visible in
Detailed
View
X
X
InitServicePortspint Port number from which the event initiated
(for example, HTTP)
InitServicePortNamespType of port from which the event initiated
(for example, HTTP)
TargetUserNamedunUsername of the user who was the target
of the event
TargetUserIDtuidUser ID of the user who was the target of
the event, based on the raw data reported
by the device.
TargetUserDomainrv45Domain of the user who was the target of
the event
Searchable but not displayed in either
event view
TargetHostNamedhnHostname of the machine that was the
target of event
TargetHostDomainrv41Domain of the machine that was the target
of event
TargetIPdipIP address of the machine that was the
target of event
TargetServicePortdpint Port number that was the target of event
(for example, 80)
X
X
XX
X
X
XX
XX
X
X
Searching53
Page 54
novdocx (en) 22 June 2009
Field
Short
Name
Description
TargetServicePortName dpType of port that was the target of event
(for example, HTTP)
TargetTrustNamettnRole of the user that was a target of the
event (for example, FinanceAdmin)
Searchable but not displayed in either
event view
TargetTrustIDttidNumerical ID representing the role of the
user that was a target of the event
Searchable but not displayed in either
event view
TargetTrustDomainttdDomain (namespace) within which the
target trust exists.
Searchable but not displayed in either
event view
EffectiveUserNameeunameName of the user that the InitUser is
root
impersonating (
using su, for
example); follows Initiator Username (Initiator User ID) as in the detailed event
view
Visible in
Basic View
Visible in
Detailed
View
X
X
EffectiveUserIDeuidNumerical ID of the user that the InitUser is
root
impersonating (
using su, for
example), based on the raw data reported
by the device.
ObserverHostNamesnHostname of the machine that forwarded
the event to the security information event
management system (for example, the
hostname of a syslog server)
Searchable but not displayed in either
event view
ObserverHostDomainobsdomDomain of the machine that forwarded the
event to the security information event
management system (for example, the
domain of a syslog server)
Searchable but not displayed in either
event view
ObserverIPobsip IP address of the machine that forwarded
the event to the security information event
management system (for example, the IP
address of a syslog server)
Searchable but not displayed in either
event view
X
54Identity Audit Guide
Page 55
novdocx (en) 22 June 2009
Field
Short
Name
Description
ReporterHostNamernHostname of the machine that reported the
event to an observer
Searchable but not displayed in either
event view
ReporterHostDomainrepdomDomain of the machine that reported the
event to an observer
Searchable but not displayed in either
event view
ReporterIPrepip IP address of the machine that reported the
event to an observer
Searchable but not displayed in either
event view
SensorTypestThe single character designator for the
sensor type (N=network, H=host,
O=operating system, A and I=Identity Audit
auditing events, P=Identity Audit
performance events)
Searchable but not displayed in either
event view
Visible in
Basic View
Visible in
Detailed
View
DataName/FilenamefnData object name reported in the event (for
example, the file name or database table
name)
DataCotextrv36Container for the FileName data object (for
example, a directory for a file or a database
instance for a database table)
TaxonomyLevel1rv50Target classification for event. Displayed
Some fields are tokenized. Tokenizing the fields makes it possible to search for an individual word
in the field without a wildcard. The fields are tokenized based on spaces and other special
characters. For these fields, articles such as “a” or “the” are removed from the search index.
EventName
Message
ProductName
FileName
DataCotext
TaxonomyLevel1
TaxonomyLevel2
TaxonomyLevel3
TaxonomyLevel4
novdocx (en) 22 June 2009
56Identity Audit Guide
Page 57
7
Data Storage
Novell® Identity Audit installation installs a PostgreSQL database with all the necessary tables and
users to run Identity Audit. The database also includes stored procedures designed to manage
database partitions and archive old data. Administrators can manage the database storage and
archiving settings via the Web interface.
Section 7.1, “Database Health,” on page 57
Section 7.2, “Data Storage Configuration,” on page 58
Section 7.3, “Database Setup,” on page 59
7.1 Database Health
The Data Storage Health page, available only to administrators, shows database health based on the
number of partitions available in the database and the success of the stored procedures to create new
partitions and archive data (if configured).
novdocx (en) 22 June 2009
7
To view database health:
1 Log into Identity Audit as an administrator.
2 Click the Storage link in the upper right corner of the page.
The health page displays. If Identity Audit is configured to delete old data, the health page for a
healthy database looks like this:
If Identity Audit is configured to archive and delete old data, the health page for a healthy
database looks like this:
Data Storage
57
Page 58
This page shows whether several database functions are in a healthy state (green), a warning state
(yellow), or an error state (red).
Online Database: This indicator shows whether the expected number of partitions exists in the
database for each of the partitioned tables. The expected number of partitions is based on the
number of days configured to be online (or the number of days since installation, if the installation is
recent).
If the number of partitions is not as expected, the page shows the name of the table, the number of
partitions that were expected, and the actual number of partitions in the database.
Online Database Jobs: This indicator turns red if there were any errors the last time the stored
procedures to add partitions and delete data were run. If archiving is enabled, this indicator only
shows whether there were errors the last time the job to add partitions was run. If there are errors, the
page displays the name, time stamp, and details associated with the failed job.
Archive Database: This indicator is only displayed if archiving is enabled. It turns red if there were
any errors the last time the stored procedure to archive data was run. If there are errors, the page
displays the name, time stamp, and details associated with the failed job.
novdocx (en) 22 June 2009
7.2 Data Storage Configuration
The database is the repository for incoming events, configuration information, and report results.
Identity Audit provides database management procedures to prevent the database from filling up.
The Data Storage page, accessible only to administrators, provides the ability to configure several
aspects of data storage.
Figure 7-1 Data Storage Configuration
Keep data online for: Administrators can specify the number of days to keep data in the database
for reporting purposes. The minimum is one day, and the number must be a whole number (no
decimals).
58Identity Audit Guide
Page 59
After online period expires: After the online data retention period expires, any event data older
than the time period above is either deleted or moved out of the database to an archive directory.
WARNING: Deleted data cannot be recovered, so choose the Delete option with care.
Archive to this database directory: If the Archive data option is chosen, data is archived to a
specified location before it is deleted. This directory must already exist and the novell user must
have write access to it. By default, this location is set to
data/db_archive
in the Identity Audit
home directory. The default directory is created with the proper permissions during Identity Audit
installation.
Figure 7-2 Configuration Page when Archive Data is Selected
novdocx (en) 22 June 2009
IMPORTANT: The archive files should be moved periodically to a long-term storage location to
avoid filling the hard disk.
Te st : If the Archive data option is chosen, the Tes t button verifies whether the archive directory
exists and is writable by the novell user.
Perform maintenance every day at: Specify the time of day for the maintenance routines to be
performed. The time is based on the Identity Audit server’s local time. At the scheduled
maintenance time, a stored procedure runs to add partitions to the database. Two hours later, a stored
procedure runs to archive or delete data older than the configured number of days.
Data archiving should be planned for a time of day when the database usage is relatively low.
7.3 Database Setup
The installer creates and configures a PostgreSQL database with a predefined structure, users, and
stored procedures.
Section 7.3.1, “Database Structure,” on page 60
Data Storage59
Page 60
Section 7.3.2, “Database Users,” on page 60
Section 7.3.3, “Database Stored Procedures,” on page 60
7.3.1 Database Structure
The database for this security and information event management system created by the installer is
named SIEM, and the default tablespace is named SENDATA1.
The eight largest tables in the database, which store events, events on which actions have taken
place, and aggregated events, are partitioned by day to enable easy management and querying.
7.3.2 Database Users
There are several users created by default:
dbauser: This user is the database owner (database administrator user) and the password is set
during the installation process.
appuser: This user is used by the Identity Audit server process (the ConnectionManager) to log into
the database. The password is randomly generated during the installation process, and it is intended
for internal use only.
novdocx (en) 22 June 2009
admin: This user is the administrator and can be used to log into the Identity Audit Web interface.
The password is set during the installation process.
7.3.3 Database Stored Procedures
At the scheduled maintenance time a job runs to determine whether to add new partitions to the
database. The number of partitions added is governed by the data storage configuration settings,
which are stored in the ESEC_JOB_CONFIG table in the database. The following settings are in
this table:
ADD_MIN: If there are fewer than this number of future (empty) partitions in the database (7, by
default), the stored procedure ESEC_ADD_REQUIRED_PARTITION adds new partitions to the
database.
ADD_MAX: Two hours after the scheduled maintenance time, the stored procedure
ESEC_OFFLINE_PARTITIONS runs to archive or delete all data older than the time period
configured by the administrator. At this time, the following things happen:
1. The archived data is written to flat files in the specified archive directory
2. The archive operation is logged to the ESEC_JOB_STS table in the database
3. The archived data is deleted from the database
4. The search indexes are updated to remove indexes for data that have been removed from the
database
There are two aggregation tables that are used for default reports. The aggregation service is enabled
by default for EventDestSummary (for Target data) and EventSourceSummary (for Initiator data).
60Identity Audit Guide
Page 61
8
Rules
This section describes the event channels that can be used to send events from Identity Audit to
another system.
Section 8.1, “Rules Overview,” on page 61
Section 8.2, “Configuring Rules,” on page 62
Section 8.3, “Configuring Actions,” on page 64
8.1 Rules Overview
The Rules interface provides the ability to define rules to evaluate all incoming events and deliver
selected events to designated output channels.For example, each severity 5 event can be e-mailed to
a security analysts distribution list or an administrator.
NOTE: All events are also delivered to the database.
novdocx (en) 22 June 2009
8
An incoming event is evaluated against each filtering rule in order until a match is found, and then
the delivery actions associated with that rule are executed:
Send to e-mail: Send the event to a user or users by using a configured SMTP relay
Write to File: Write the event to a specified file on the Identity Audit server
Send to Syslog: Forward the event to a configured syslog server
TIP: Events are processed by the associated actions one at a time. You should therefore consider
performance implications when selecting which output channel to which events are sent. For
example, the Write to File action is the least resource-intensive, so it can be used to test rule criteria
to determine the data volume before sending a flood of events to e-mail or syslog.
Also, when you set up the Send to e-mail action, you should consider how many events the recipient
can effectively handle and adjust the filtering on the rule accordingly.
Event output is in JavaScript* Object Notation (JSON) which is a lightweight data exchange format.
Events consist of field names (such as “evt” for Event Name) followed by a colon and a value (such
as “Start”), separated by commas.
{"st":"I","evt":"Start","sev":"1","sres":"Collector","res":"CollectorManager"
,"rv99":"0","rv1":"0","repassetid":"0","rv77":"0","agent":"Novell
SecureLogin","obsassetid":"0","vul":"0","port":"Novell
SecureLogin","msg":"Processing started for Collector Novell SecureLogin (ID
D892E9F0-3CA7-102B-B5A1-005056C00005).","dt":"1224204655689","id":"751D97B07E13-112B-B933-000C29E8CEDE","src":"D892E9F0-3CA7-102B-B5A2-005056C00004"}
Rules
61
Page 62
8.2 Configuring Rules
Identity Audit rules can be configured to filter events based on one or more of the searchable fields.
For a list of the Identity Audit searchable event fields, see Table 6-1 on page 52. Each rule can be
associated with one or more of the configured actions.
Section 8.2.1, “Filter Criteria,” on page 62
Section 8.2.2, “Adding a Rule,” on page 62
Section 8.2.3, “Ordering Rules,” on page 63
Section 8.2.4, “Editing a Rule,” on page 63
Section 8.2.5, “Deleting a Rule,” on page 63
Section 8.2.6, “Activating or Deactivating a Rule,” on page 63
8.2.1 Filter Criteria
Rules can be based on any searchable event field. For a list of these fields, see Table 6-1 on page 52.
The available operators depend on the data type of the event field. For example,
available for IP addresses, and
match regex
is available for text fields.
match subnet
is
novdocx (en) 22 June 2009
8.2.2 Adding a Rule
Administrators can add a filter-based rule and then define one or more channels to which to output
the events that meet the rule criteria.
1 Log into Identity Audit as an administrator.
2 Click Rules in the upper right corner of the page.
3 Click Add Rule.
4 Specify a rule name.
5 If you will create multiple conditions, select All to join the conditions with an AND operator.
Select Any to join the conditions with an OR operator.
6 Select the event field, the operator, and the value for the filter.
7 Select an action that will be performed on every event that meets the filter criteria.
The action details are based on the configuration information seen if you click the
Configuration link.
62Identity Audit Guide
Page 63
8 Configure additional actions, as desired.
9 Click Save.
8.2.3 Ordering Rules
Because events are evaluated by rules in order until a match is made, you should order rules
accordingly. More narrowly defined rules and more important rules should be placed at the
beginning of the list. When there is more than one rule, rules can be reordered by using drag-anddrop.
To reorder rules:
1 Log into Identity Audit as an administrator.
2 Click Rules in the upper right corner of the page.
3 Mouse over the icon to the left of the rule numbering to enable drag-and-drop. The cursor
changes.
novdocx (en) 22 June 2009
4 Drag and drop the rule to the correct place in the ordered list.
8.2.4 Editing a Rule
Click the edit link beside the rule to change a rule definition.
8.2.5 Deleting a Rule
Click the remove link beside the rule to delete it. If there are already events in queue for an action or
actions when you delete a rule, it might take some time to flush that queue after the rule is
deactivated.
8.2.6 Activating or Deactivating a Rule
To the left of each rule, in a column headed On, is a check box to activate that rule. New rules are
activated by default. If you deactivate a rule, incoming events are no longer evaluated according to
that rule. If there are already events in queue for an action or actions, it might take some time to
flush that queue after the rule is deactivated.
Rules63
Page 64
8.3 Configuring Actions
An event is delivered to one or more channels when it meets the criteria specified by one of the
rules. Before the events can be output to a channel, the action to send to that channel must be
configured with the appropriate connection information (and authentication credentials, if needed
for the SMTP relay). The Identity Audit system can have only one configured connection per action
type (for example, all events that are written to a file must be written to the same file).
Section 8.3.1, “Send to E-Mail,” on page 64
Section 8.3.2, “Send to Syslog,” on page 65
Section 8.3.3, “Write to File,” on page 65
8.3.1 Send to E-Mail
To configure the Send to e-mail action, you need the connection information for an SMTP relay (IP
address and port number), and the To and From addresses. You can send to more than one e-mail
address by entering a comma-separated list.
novdocx (en) 22 June 2009
NOTE: To avoid overwhelming your SMTP relay or e-mail recipients, this action should only be
used with rules that generate a low volume of events.
This SMTP relay configuration is also used to deliver reports to users.
1 Log into Identity Audit as an administrator.
2 Click Rules in the upper right corner of the page.
3 Click Configuration.
4 Under e-mail, enter the name and port of an available SMTP relay. If desired, click Te st to
validate the hostname or IP address, port, username, and password fields.
The Te st button does not actually send a test e-mail message.
5 If the SMTP relay requires authentication, specify a username and password.
6 Specify an address from which the e-mail messages will come.
7 Specify one or more e-mail addresses, separated by commas.
8 Click Save.
64Identity Audit Guide
Page 65
All Identity Audit events meeting the filter criteria for which the Send to e-mail action is defined are
sent to the same SMTP relay and set of addresses.
8.3.2 Send to Syslog
To configure the Send to Syslog action, you need the connection information for the syslog server
(IP address and port number).
1 Log into Identity Audit as an administrator.
2 Click Rules in the upper right corner of the page.
3 Click Configuration.
4 Under Syslog, specify a name or IP address and open UDP port of a syslog server. If desired,
click Tes t to test that the destination server and port are formatted correctly.
novdocx (en) 22 June 2009
5 Click Save.
All Identity Audit events meeting the filter criteria for which the Send to Syslog action is defined are
sent to the same syslog server.
8.3.3 Write to File
To configure the Write to File action, you need the name and path of the file to which the events will
be written. The directory must already exist and the novell user must have permissions to write to it.
If the file does not already exist, Identity Audit creates it.
1 Log into Identity Audit as an administrator.
2 Click Rules in the upper right corner of the page.
3 Click Configuration.
4 Under Filename, specify the path to the file to which you want the events to be written, either
an absolute path or a relative path (where the working directory is data under the application’s
home directory). If desired, click Te st to test permissions and create a zero-byte file to hold the
data.
5 Click Save.
All Identity Audit events meeting the filter criteria for which the Write to File action is defined are
written to the same file.
Rules65
Page 66
novdocx (en) 22 June 2009
66Identity Audit Guide
Page 67
9
User Administration
Administrators can add, edit, and delete users in Novell® Identity Audit and grant administrative
rights. Users can edit the details of their own user profile.
Section 9.1, “Adding a User,” on page 67
Section 9.2, “Editing User Details,” on page 68
Section 9.3, “Deleting a User,” on page 70
9.1 Adding a User
Adding a user in the Identity Audit system creates an application user who can then log into the
Identity Audit application.
Selecting the Grant administrative rights option gives the user administrative rights in the Identity
Audit system. Administrative rights include the ability to manage the following functions:
novdocx (en) 22 June 2009
9
User Administration
Data Collection
Data Storage
Rules
To add a user:
1 Log into Identity Audit as an administrator.
2 Click User Admin in the upper right corner of the page.
3 Click Add a user.
4 Specify the user information.
The fields with an asterisk (*) are required, and the username must be unique.
The e-mail address format is validated, but the phone number fields allow any format. Be sure
you enter a valid phone number.
User Administration
67
Page 68
5 (Optional) Select Grant administrative rights.
6 Click Save.
9.2 Editing User Details
Administrators can edit user information for any user in the system. Users can edit their own profiles
except for the username and administrative privileges.
Section 9.2.1, “Editing Your Own Profile,” on page 68
Section 9.2.2, “Changing Your Own Password,” on page 69
Section 9.2.3, “Editing Another User’s Profile (admin only),” on page 70
Section 9.2.4, “Resetting Another User’s Password (admin only),” on page 70
9.2.1 Editing Your Own Profile
1 Click profile in the upper right corner.
novdocx (en) 22 June 2009
68Identity Audit Guide
Page 69
novdocx (en) 22 June 2009
2 Edit any available field.
3 Click Save.
9.2.2 Changing Your Own Password
You can change your own password if you know the current password. Otherwise, an administrator
must reset the password.
1 Click profile in the upper right corner.
2 Enter your current password.
3 Enter your new password.
User Administration69
Page 70
4 Confirm your new password.
5 Click Save.
9.2.3 Editing Another User’s Profile (admin only)
1 Log into Identity Audit as an administrator.
2 Click User Admin in the upper right corner of the page.
3 Click Edit under the user you want to edit.
4 Edit any fields (except the username).
5 Click Save.
Changes to Grant Administrative Rights take effect the next time the user logs in.
9.2.4 Resetting Another User’s Password (admin only)
To reset another user’s password, see Section 9.2.3, “Editing Another User’s Profile (admin only),”
on page 70.
novdocx (en) 22 June 2009
9.3 Deleting a User
Administrators can delete a user from the system.
1 Log into Identity Audit as an administrator.
2 Click User Admin in the upper right corner of the page.
3 Click Edit under the user you want to delete.
4 Click Delete this user in the upper right corner of the page.
5 Click Delete to confirm.
70Identity Audit Guide
Page 71
A
Troubleshooting
novdocx (en) 22 June 2009
A
Log files are located in the
./identity_audit/log
directory. There are logs for Identity Audit and
the ActiveMQ* message bus, PostgreSQL database, JasperReports server, and Tomcat Web server.
Most of the logs are numbered because they rotate.
Table A-1 Log Files in Identity Audit
Log File NamePurpose
activemq.log
db.1.log
db_start.log
db_stop.log
server0.*.log
server_wrapper.log
admin.date.log
catalina.date.log
(through
db.7.log
Logs for the message bus.
)Database logs for the most recent Monday (through Sunday).
Startup logs for PostgreSQL database.
Shutdown logs for PostgreSQL database.
Logs for Identity Audit server process, including search and
reporting messages.
Logging properties for this log are set in the
server_log.prop
Logs for Identity Audit wrapper process, which owns the server
process.
Logs for the Web server. Located in the
Logs for the Web server, including events related to the servlets that
upload report plug-ins and manage viewing for report results, report
samples, and report help files. Located in the
file. These changes take effect immediately.
config/
./tomcat
./tomcat
directory.
directory.
Logging properties for this log are set in the
conf/logging.properties file
after Tomcat is restarted.
host-manager.date.log
localhost.date.log
manager.date.log
The following logging settings can be changed in the
esecurity.ccs.comp.reporting.jasper=ALL
com.novell.reports.jasper=ALL
esecurity.ccs.comp.scheduler.level=ALL
esecurity.ccs.comp.textsearch.level=ALL
The following logging settings can be changed in the
Using strict authentication for the connection between Identity Audit and the Novell applications it
collects data from can improve data security.
B.1 Creating a Keystore
A keystore can be created using the Java* “keytool” executable, which comes with any JRE*
installation. This keystore holds a public and private keypair that can be used to replace the default
certificate that comes with Identity Audit. There are basic instructions below, but for more info on
keytool, see the Sun* Web site (http://java.sun.com/j2se/1.3/docs/tooldocs/win32/keytool.html).
/bin
1 Go to the
2 Run the following command:
keytool -genkey -alias alias -keystore .keystore
3 Enter a password for the keystore. This password is used when you import the truststore.
directory for Java (for example,
$JAVA_HOME/bin
).
novdocx (en) 22 June 2009
B
4 Enter the following information:
First and last name
Organizational unit
Organization
City or locality
State or province
Two-digit country code
5 Verify the information.
6 Press Enter to use the same password as the keystore password.
A
.keystore
file is created with a private key and corresponding public key (certificate).
Truststore
73
Page 74
novdocx (en) 22 June 2009
74Identity Audit Guide
Page 75
C
Novell Identity Audit Database
novdocx (en) 22 June 2009
Views for PostgreSQL Server
This section lists the Novell Identity Audit Schema Views for PostgreSQL Server.
C.1 Views
Below listed are the views available with Identity Audit.
C.1.1 ACTVY_PARM_RPT_V
Column NameDatatypeComment
ACTVY_PARM_IDuuidActivity parameter identifier
ACTVY_IDuuidActivity identifier
PARM_NAMEcharacter varying(255)Activity Parameter name
PARM_TYP_CDcharacter varying(1)Activity parameter type code
DATA_TYPcharacter varying(50)Activity parameter data type
C
DATA_SUBTYPcharacter varying(50)Activity parameter data subtype
FEED_DATE_CREATEDtimestamp with time zone Date of the Feed that carried
information on this product
FEED_DATE_UPDATEDtimestamp with time zone Date of the Feed that updated
information on this product
ACTIVE_FLAGintegerReserved for future use
DATE_CREATEDtimestamp with time zone Date the entry was created
DATE_MODIFIEDtimestamp with time zone Date the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.12 ADV_PRODUCT_SERVICE_PACK_RPT_V
View references ADV_PRODUCT_SERVICE _PACK table that stores Advisor service pack
information, such as service pack name, version ID and date.
Column NameDatatypeComment
SERVICE_PACK_IDintegerService Pack ID
VERSION_IDintegerVersion ID
SERVICE_PACK_NAMEcharacter varying(32)Name of the Service Pack
80Identity Audit Guide
Page 81
Column NameDatatypeComment
FEED_DATE_CREATEDtimestamp with time zoneDate of the Feed that carried information
on this product
FEED_DATE_UPDATEDtimestamp with time zoneDate of the Feed that updated information
on this product
ACTIVE_FLAGintegerReserved for future use
BEGIN_EFFECTIVE_DATE timestamp with time zoneDate from which the entry is valid
END_EFFECTIVE_DATEtimestamp with time zoneDate until which the entry is valid
DATE_CREATEDtimestamp with time zoneDate the entry was created
DATE_MODIFIEDtimestamp with time zoneDate the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.13 ADV_PRODUCT_VERSION_RPT_V
novdocx (en) 22 June 2009
View references ADV_PRODUCT_VERSION table that stores Advisor product version
information, such as version name, product and version ID.
Column NameDatatypeComment
VERSION_IDintegerVersion ID
PRODUCT_IDintegerProduct ID
VERSION_NAMEcharacter varying(128)Version Name of the product
FEED_DATE_CREATEDtimestamp with time zoneDate of the feed that carried the information
on the entry
FEED_DATE_UPDATEDtimestamp with time zoneDate of the feed that carried the update on
the entry
ACTIVE_FLAGintegerReserved for future use
DATE_CREATEDtimestamp with time zoneDate the entry was created
DATE_MODIFIEDtimestamp with time zoneDate the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.14 ADV_VENDOR_RPT_V
Column NameDatatypeComment
VENDOR_IDbigintID of the vendor
VENDOR_NAMEcharacter varying(128)Name of the vendor
Novell Identity Audit Database Views for PostgreSQL Server81
Page 82
Column NameDatatypeComment
CONTACT_PERSONcharacter varying(128)Contains the contact person name for
the vendor
ADDRESS_LINE_1character varying(128)Address of the vendor
ADDRESS_LINE_2character varying(128)Address of the vendor
ADDRESS_LINE_3character varying(128)Address of the vendor
ADDRESS_LINE_4character varying(128)Address of the vendor
CITYcharacter varying(128)City of the vendor
STATEcharacter varying(128)State of the vendor
COUNTRYcharacter varying(128)Country of the vendor
ZIP_CODEcharacter varying(128)Zip code of the vendor
URLcharacter varying(256)Web URL of the vendor
PHONEcharacter varying(32)Contact number of the vendor
novdocx (en) 22 June 2009
FAXcharacter varying(32)Fax number of the vendor
EMAILcharacter varying(128)Email of the vendor
PAGERcharacter varying(32)Pager of the vendor
FEED_DATE_CREATEDtimestamp with time zoneDate of the feed that carried the
information on the entry
FEED_DATE_UPDATEDtimestamp with time zoneDate of the feed that carried the update
on the entry
ACTIVE_FLAGintegerReserved for future use
DATE_CREATEDtimestamp with time zoneDate the entry was created
DATE_MODIFIEDtimestamp with time zoneDate the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.15 ADV_VULN_KB_RPT_V
Column NameDatatypeComment
VULN_KB_IDintegerKnowledge base ID mapping CVE_ID, OSVDB_ID,
BUGTRAQ_ID
CVE_IDintegerCVE ID for the related vulnerability
OSVDB_IDintegerOSVDB ID for the related vulnerability
BUGTRAQ_IDintegerBugtraq id for the related vulnerability
DATE_PUBLISHEDtimestamp with time zoneDate the entry was published
82Identity Audit Guide
Page 83
Column NameDatatypeComment
DATE_UPDATEDtimestamp with time zoneDate the entry was updated
DATE_CREATEDtimestamp with time zoneDate the entry was created
DATE_MODIFIEDtimestamp with time zoneDate the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.16 ADV_VULN_PRODUCT_RPT_V
View references ADV_VULN_PRODUCT table that stores Advisor vulnerability attack ID and
service pack ID.
Column NameDatatypeComment
SERVICE_PACK_IDintegerContains the service pack id
novdocx (en) 22 June 2009
ATTACK_ID integerContains the attack id
DATE_CREATEDtimestamp with time zone Date the entry was created
DATE_MODIFIEDtimestamp with time zone Date the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.17 ADV_VULN_SIGNATURES
Column NameDatatypeComment
VULN_KEYintegerVulnerability key
VULN_SCANNER_NAMEcharacter varying(128)Vulnerability scanner name
VULN_NAMEcharacter varying(256)Vulnerability name
VULN_IDcharacter varying(256)Vulnerability ID
C.1.18 ANNOTATIONS_RPT_V
View references ANNOTATIONS table that stores documentation or notes that can be associated
with objects in the Sentinel system such as cases and incidents.
DATE_CREATEDtimestamp with time zoneDate the entry was created
DATE_MODIFIEDtimestamp with time zoneDate the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.30 CONTACTS_RPT_V
View references CONTACTS table that stores contact information.
novdocx (en) 22 June 2009
Column NameDatatypeComment
CNT_IDintegerContact ID - Sequence number
FIRST_NAMEcharacter varying(20)Contact first name.
LAST_NAMEcharacter varying(30)Contact last name.
TITLEcharacter varying(128)Contact title
DEPARTMENTcharacter varying(128)Department
PHONEcharacter varying(64)Contact phone
EMAILcharacter varying(255)Contact email
PAGERcharacter varying(64)Contact pager
CELLcharacter varying(64)Contact cell phone
DATE_CREATEDtimestamp with time zoneDate the entry was created
DATE_MODIFIEDtimestamp with time zoneDate the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.31 CORRELATED_EVENTS_RPT_V (legacy view)
This view is provided for backward compatibility. New reports should use
CORRELATED_EVENTS_RPT_V1 because this view does not include archived correlated events
that have been imported back into the database.
C.1.32 CORRELATED_EVENTS_RPT_V1
View contains current and historical correlated events (correlated events imported from archives).
Novell Identity Audit Database Views for PostgreSQL Server89
Page 90
Column NameDatatypeComment
PARENT_EVT_IDuuidEvent Universal Unique Identifier (UUID) of parent
event
CHILD_EVT_IDuuidEvent Universal Unique Identifier (UUID) of child event
PARENT_EVT_TIME timestamp with time zone Parent event time
CHILD_EVT_TIMEtimestamp with time zone Child event time
DATE_CREATEDtimestamp with time zone Date the entry was created
DATE_MODIFIEDtimestamp with time zone Date the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.33 CRITICALITY_RPT_V
novdocx (en) 22 June 2009
View references CRIT_LKUP table that contains information about asset criticality.
Column NameDatatypeComment
CRITICALITY_IDbigintAsset criticality code
CRITICALITY_NAMEcharacter varying(50)Asset criticality name
DATE_CREATEDtimestamp with time zoneDate the entry was created
DATE_MODIFIEDtimestamp with time zoneDate the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.34 CUST_HIERARCHY_V
View references CUST_HIERARCHY table that stores information about MSSP customer
hierarchy.
DATE_CREATEDtimestamp with time zoneDate the entry was created
DATE_MODIFIEDtimestamp with time zoneDate the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.44 ESEC_DISPLAY_RPT_V
View references ESEC_DISPLAY table that stores displayable properties of objects. Currently used
in renaming meta-tags. Used with Event Configuration (Business Relevance).
Column NameDatatypeComment
DISPLAY_OBJECTcharacter varying(32)The parent object of the property
TAGcharacter varying(32)The native tag name of the property
LABELcharacter varying(32)The display string of tag.
POSITIONintegerPosition of tag within display.
WIDTHintegerThe column width
ALIGNMENTintegerThe horizontal alignment
FORMATintegerThe enumerated formatter for displaying the
94Identity Audit Guide
property
Page 95
Column NameDatatypeComment
ENABLEDbooleanIndicates if the tag is shown.
TYPEintegerIndicates datatype of tag.
1 = string
2 = ulong
3 = date
4 = uuid
5 = ipv4
DESCRIPTIONcharacter varying(255)Textual description of the tag
DATE_CREATEDtimestamp with time zoneDate the entry was created
DATE_MODIFIEDtimestamp with time zoneDate the entry was modified
CREATED_BYintegerUser who created object
novdocx (en) 22 June 2009
MODIFIED_BYintegerUser who last modified object
REF_CONFIGcharacter varying(4000)Referential data configuration
C.1.45 ESEC_PORT_REFERENCE_RPT_V
View references ESEC_PORT_REFERENCE table that stores industry standard assigned port
numbers.
DATE_CREATEDtimestamp with time zone Date the entry was created
DATE_MODIFIEDtimestamp with time zone Date the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.47 ESEC_SEQUENCE_RPT_V
View references ESEC_SEQUENCE table that’s used to generate primary key sequence numbers
for Sentinel tables.
Column NameDatatypeComment
TABLE_NAMEcharacter varying(32)Name of the table.
COLUMN_NAMEcharacter varying(255)Name of the column
SEEDintegerCurrent value of primary key field.
DATE_CREATEDtimestamp with time zoneDate the entry was created
DATE_MODIFIEDtimestamp with time zoneDate the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
96Identity Audit Guide
Page 97
C.1.48 ESEC_UUID_UUID_ASSOC_RPT_V
Column NameDatatypeComment
OBJECT1character varying(64)Object 1
ID1uuidUUID for object 1
OBJECT2character varying(64)Object 2
ID2uuidUUID for object 2
DATE_CREATEDtimestamp with time zoneDate the entry was created
DATE_MODIFIEDtimestamp with time zoneDate the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
C.1.49 EVENTS_ALL_RPT_V (legacy view)
novdocx (en) 22 June 2009
This view is provided for backward compatibility. View contains current and historical events
(events imported from archives).
C.1.50 EVENTS_ALL_RPT_V1 (legacy view)
This view is provided for backward compatibility. New reports should use EVENTS_RPT_V2.
View contains current events.
C.1.51 EVENTS_ALL_V (legacy view)
This view is provided for backward compatibility. New reports should use EVENTS_RPT_V2.
C.1.52 EVENTS_RPT_V (legacy view)
This view is provided for backward compatibility. New reports should use EVENTS_RPT_V2.
View contains current and historical events.
C.1.53 EVENTS_RPT_V1 (legacy view)
This view is provided for backward compatibility. New reports should use EVENTS_RPT_V2.
View contains current events.
C.1.54 EVENTS_RPT_V2
This is the primary reporting view. View contains current event and historical events.
Column NameDatatypeComment
EVENT_IDuuidEvent identifier
Novell Identity Audit Database Views for PostgreSQL Server97
Page 98
Column NameDatatypeComment
RESOURCE_NAMEcharacter varying(255)Resource name
SUB_RESOURCEcharacter varying(255)Subresource name
SEVERITYintegerEvent severity
EVENT_PARSE_TIMEtimestamp with time zone Event time
EVENT_DATETIMEtimestamp with time zone Event time
EVENT_DEVICE_TIMEtimestamp with time zone Event device time
SENTINEL_PROCESS_TIMEtimestamp with time zone Sentinel process time
BEGIN_TIMEtimestamp with time zone Events begin time
END_TIMEtimestamp with time zone Events end time
REPEAT_COUNTintegerEvents repeat count
DESTINATION_PORT_INTintegerDestination port (integer)
novdocx (en) 22 June 2009
SOURCE_PORT_INTintegerSource port (integer)
BASE_MESSAGEcharacter varying(4000)Base message
EVENT_NAMEcharacter varying(255)Name of the event as reported by the
sensor
EVENT_TIMEcharacter varying(255)Event time as reported by the sensor
CUST_IDbigintCustomer identifier
SOURCE_ASSET_IDbigintSource Asset ID
DESTINATION_ASSET_IDbigintDestination Asset ID
AGENT_IDbigintCollector identifier
PROTOCOL_IDbigintProtocol ID
ARCHIVE_IDbigintArchieve ID
SOURCE_IPintegerSource IP address in numeric format
SOURCE_IP_DOTTEDcharacter varyingSource IP in dotted format
SOURCE_HOST_NAMEcharacter varying(255)Source host name
SOURCE_PORTcharacter varying(32)Source port
DESTINATION_IPintegerDestination IP address in numeric format
DESTINATION_IP_DOTTEDcharacter varyingDestination IP in dotted format
DESTINATION_HOST_NAMEcharacter varying(255)Destination host name
DESTINATION_PORTcharacter varying(32)Destination port
SOURCE_USER_NAMEcharacter varying(255)Source user name
DESTINATION_USER_NAMEcharacter varying(255)Destination user name
FILE_NAMEcharacter varying(1000)File name
98Identity Audit Guide
Page 99
Column NameDatatypeComment
EXTENDED_INFOcharacter varying(1000)Extened information
CUSTOM_TAG_1character varying(255)Customer Tag 1
CUSTOM_TAG 2character varying(255)Customer Tag 2
CUSTOM_TAG 3integerCustomer Tag 3
RESERVED_TAG_1character varying(255)Reserved Tag 1
Reserved for future use by Sentinel. This
field is used for Advisor information
concerning attack descriptions.
RESERVED_TAG_2character varying(255)Reserved for future use by Sentinel. Use
of this field for any other purpose might
result in data being overwritten by future
functionality.
RESERVED_TAG_3integerReserved for future use by Sentinel. Use
of this field for any other purpose might
result in data being overwritten by future
functionality.
novdocx (en) 22 June 2009
VULNERABILITY_RATINGintegerVulnerability rating
CRITICALITY_RATINGintegerCriticality rating
DATE_CREATEDtimestamp with time zone Date the entry was created
DATE_MODIFIEDtimestamp with time zone Date the entry was modified
CREATED_BYintegerUser who created object
MODIFIED_BYintegerUser who last modified object
RV01 - 10integerReserved Value 1 - 10
Reserved for future use by Sentinel. Use
of this field for any other purpose might
result in data being overwritten by future
functionality.
RV11 - 20timestamp with time zone Reserved Value 1 - 31
Reserved for future use by Sentinel. Use
of this field for any other purpose might
result in data being overwritten by future
functionality.
RV21 - 25uuidReserved Value 21 - 25
Reserved for future use by Sentinel to
store UUIDs. Use of this field for any other
purpose might result in data being
overwritten by future functionality.
Novell Identity Audit Database Views for PostgreSQL Server99
Page 100
Column NameDatatypeComment
RV26 - 31character varying(255)Reserved Value 26 - 31
Reserved for future use by Sentinel. Use
of this field for any other purpose might
result in data being overwritten by future
functionality.
RV33character varying(255)Reserved Value 33
Reserved for EventContex
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV34character varying(255)Reserved Value 34
Reserved for SourceThreatLevel
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
novdocx (en) 22 June 2009
RV35character varying(255)Reserved Value 35
Reserved for SourceUserCotext.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV36character varying(255)Reserved Value 36
Reserved for DataCotext.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV37character varying(255)Reserved Value 37
Reserved for SourceFunction.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV38character varying(255)Reserved Value 38
Reserved for SourceOperationalCotext.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV40 - 43character varying(255)Reserved Value 40 - 43
100 Identity Audit Guide
Reserved for future use by Sentinel. Use
of this field for any other purpose might
result in data being overwritten by future
functionality.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.