Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time,
without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims
any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc.,
reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to
notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the
trade laws of other countries. You agree to comply with all export control regulations and to obtain any required
licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities
on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export
laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses.
See the Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information
on exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export
approvals.
Novell, Inc., has intellectual property rights relating to technology embodied in the product that is described in this
document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S.
patents listed on the Novell Legal Patents Web page (http://www.novell.com/company/legal/patents/) and one or
more additional patents or pending patent applications in the U.S. and in other countries.
Novell, Inc.
404 Wyman Street, Suite 500
Waltham, MA 02451
U.S.A.
www.novell.com
Online Documentation: To access the latest online documentation for this and other Novell products, see
the Novell Documentation Web page (http://www.novell.com/documentation).
Novell Trademarks
For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/
trademarks/tmlist.html).
Third-Party Materials
All third-party trademarks are the property of their respective owners.
SentinelTM is a security information and event management solution that receives information from
many sources throughout an enterprise, standardizes it, prioritizes it and presents it to you to make
threat, risk and policy related decisions.
The Sentinel 6.1 Reference Guide is your reference for the following:
Chapter 1, “SentinelTM User Reference Introduction,” on page 15
Chapter 2, “Sentinel Event Fields,” on page 17
Chapter 3, “Sentinel Control Center User Permissions,” on page 31
Chapter 5, “Sentinel Data Access Service,” on page 51
Chapter 6, “Sentinel Accounts and Password Changes,” on page 59
Chapter 7, “Sentinel Database Views for Oracle,” on page 65
Chapter 8, “Sentinel Database Views for Microsoft SQL Server,” on page 125
novdocx (en) 7 January 2010
Audience
This documentation is intended for Information Security Professionals.
Feedback
We want to hear your comments and suggestions about this manual and the other documentation
included with this product. Please use the User Comments feature at the bottom of each page of the
online documentation and enter your comments there.
Additional Documentation
Sentinel Technical documentation is broken down into several different volumes. They are:
Sentinel 6.1 Installation Guide
Sentinel 6.1 User Guide
Sentinel 6.1 User Reference Guide
The documentation for this product is available at http://www.novell.com/documentation/
Go to Start > Program Files > Control Panel to perform this action: Multiple actions in a step.
References
For more information, see “Section Name” (if in the same Chapter).
For more information, see “Chapter Name” (if in the same Guide).
For more information, see “Section Name” in “Chapter Name”, Name of the Guide (if in a
different Guide).
In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and
items in a cross-reference path.
®
A trademark symbol (
, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party
trademark.
novdocx (en) 7 January 2010
When a single pathname can be written with a backslash for some platforms or a forward slash for
other platforms, the pathname is presented with a backslash. Users of platforms that require a
forward slash, such as Linux or UNIX, should use forward slashes as required by your software.
Contacting Novell
Web Site: http://www.novell.com (http://www.novell.com)
The Sentinel User Reference Guide is your reference for:
Collector administrator functions
Collector and Sentinel meta tags
Sentinel console user permissions
This guide assumes that you are familiar with Network Security, Database Administration and
UNIX operating systems.
This guide discusses about:
Sentinel Meta tags
Sentinel User Permissions
Correlation Engine RuleLG Language
Sentinel Data Access Service
Sentinel Accounts and Password Changes
Sentinel Database Views for Oracle
Sentinel Database Views for Microsoft SQL Server
Sentinel correlation engine
Sentinel command line options
Sentinel server database views
1
SentinelTM User Reference Introduction
15
novdocx (en) 7 January 2010
16Sentinel 6.1 Reference Guide
2
Sentinel Event Fields
Every Sentinel event or correlated event has certain fields that are automatically populated (such as
Event Time and Event UUID) and other fields that may or may not be populated, depending on the
type of event, the collector parsing, and the mapping service configuration. This event data is visible
in Active Views, historical queries, and reports. They are stored in the database and can be accessed
via the report views. They can also be used in actions available through the right-click event menu,
correlation actions, and iTRAC workflow actions.
2.1 Event Field Labels and Tags
Each field can be referred to by a user-friendly label or a short tag. The user-friendly label is visible
throughout the Sentinel Control Center interface, for example:
Column headers for Active Views, historical event queries, and the Active Browser
Correlation wizard drop-down menus
novdocx (en) 7 January 2010
2
Active View configuration drop-down menus
Each field has a default label, but that label is user-configurable using the Event Configuration
option on the Admin tab. For more information, see “Admin Tab” section in Sentinel 6.1 User
Guide. InitUserName is the default label to represent the account name of the user who initiated the
event, but this can be changed by the administrator. When a user changes the default label, the
changes are reflected in most areas of the interface, including any correlation rules, filters, and rightclick menu options.
WARNING: Changing the default label for any variables other than Customer Variables may cause
confusion when working with Novell Technical Services or other parties who are familiar with the
default names. In addition, JavaScript Collectors built by Novell refer to the default labels described
in this chapter and are not automatically updated to refer to new labels.
Each field also has a short tag name that is always used for internal references to the field and is not
user-configurable. This short tag name may not correspond exactly to the default label; Sentinel
labels have changed over the years, but the underlying short tags remain the same for backward
compatibility. (For example, InitUserName is the default label for the account name of the user who
initiated the event. The default label was previously SourceUserName, and the underlying short tag
is “sun”.)
NOTE: Many of the default labels were updated for clarity in the Sentinel 6.1 release. Because all
filters, actions, and correlation rule definitions are defined using the short tags (even though the
label may be visible in the interface), there is no change in functionality due to the label renaming.
Each field is associated with a specific data type, which corresponds to the data type in the database:
string: limited to 255 characters (unless otherwise specified)
integer: 32 bit signed integer
UUID: 36 character (with hyphens) or 32 character (without hyphens) hexadecimal string in
the format XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX (For example, 6A5349DA-7CBF-1028-9795-000BCDFFF482)
Sentinel Event Fields
17
date: Collector Variable must be set with date as number of milliseconds from January 1, 1970
00:00:00 GMT. When displayed in Sentinel Control Center, meta-tags of type date are
displayed in a regular date format.
IPv4: IP address in dotted decimal notation (that is – xxx.xxx.xxx.xxx)
2.1.1 Free-Form Filters and Correlation Rules
Users can use either the tag or the label when they write free-form language in the Sentinel Control
Center. The Sentinel interface shows the user-friendly label.
Figure 2-1 Correlation Wizard displaying labels in drop-down and free-form language
novdocx (en) 7 January 2010
18Sentinel 6.1 Reference Guide
Figure 2-2 Filter Wizard displaying labels in drop-down and free-form language
novdocx (en) 7 January 2010
The representation of fields in the free-form RuleLG language is usually prefaced by “e.” for
example, “e.InitUserName” or “e.sun” can refer to the Initiator User Name for the incoming or
current event. In special cases, “w.” may be used to refer to a field in a past event (for example,
“w.InitUserName”). For more information about the RuleLG language, see Chapter 4, “Sentinel
Correlation Engine RuleLG Language,” on page 41.
2.1.2 Actions
Users can use either the tag or the label when they define parameters to be sent to right-click Event
Menu actions, correlation actions, and iTRAC workflow actions.
To pass a field value to an action, you may use a checklist that shows the labels or type the
parameter name directly into the configuration.
When you type the label or short tag for a field to be used in an action, the name can be enclosed in
percent signs (%tag%) or dollar signs ($tag$). For example:
%sun% in a correlation action refers to the value of InitUser in the correlated event
$sun$ in a correlation action refers to the value of InitUser in the current, “trigger” event (the
final event that caused the correlation rule to fire)
NOTE: In a right-click menu event operating on a single event, there is no functional
difference between %sun% and $sun$.
For example, to pass the Initiator User Name to a command line action to look up information from
a database about that user, you could use %InitUserName% or %sun%. For more information about
Actions, see “Actions and Integrators” section in Sentinel 6.1 User Guide.
20Sentinel 6.1 Reference Guide
Figure 2-4 Configuration Action window
novdocx (en) 7 January 2010
2.1.3 Proprietary Collectors
Proprietary Collectors, written in Novell’s own language, always use variables based on the short
tag to refer to event fields. The short tag name must be prefaced by a letter and underscore, where
the letter indicates the data type for the field (i_ for integer, s_ for string).
2.1.4 JavaScript Collectors
JavaScript Collectors usually refer to event fields using an “e.” followed by the same user-friendly
label set in Event Configuration in the Sentinel Control Center. For a Sentinel system with a default
configuration, for example, the Initiator User Name would be referred to as “e.InitUserName” in the
JavaScript Collector. There are some exceptions to this general rule. Refer to the Sentinel Collector
SDK (http://developer.novell.com/wiki/index.php?title=Develop_to_Sentinel) for more details.
2.2 List of Fields and Representations
The table on the following pages shows the default labels, descriptions and data types for the
Sentinel event fields, along with the proper way to refer to the tags in filters, correlation rules,
actions, and proprietary collector scripts. Fields that cannot or should not be manipulated in the
Collector parsing do not have a Collector variable.
Sentinel Event Fields21
Table 2-1 Labels and Meta-tags used in Sentinel Control Center and proprietary Collector language
novdocx (en) 7 January 2010
Default Label
Filters and
Correlation
Rules
Menu and
Correlation
Actions
Proprietary
Collector
Language
Data
Typ e
Description
DeviceEventTimeStringe.et%et%s_ETstringThe normalized date and
time of the event, as
reported by the sensor.
DeviceEventTimee.det%det%dateThe normalized date and
time of the event, as
reported by the sensor.
SentinelProcessTimee.spt%spt%dateThe date and time
Sentinel received the
event.
BeginTimee.bgnt%bgnt%s_BGNTdateThe date and time the
event started occurring
(for repeated events).
EndTimee.endt%endt%s_ENDTdateThe date and time the
event stopped occurring
(for repeated events).
RepeatCounte.rc%rc%s_RCintegerThe number of times the
same event occurred if
multiple occurrences were
consolidated.
EventTimee.dt%dt%dateThe normalized date and
time of the event, as given
by the Collector.
SentinelServiceIDe.src%src%UUIDUnique identifier for the
SARBOXe.cv90%cv90%s_CV90stringSet to 1 if the asset is
governed by SarbanesOxley.
HIPAAe.cv91%cv91%s_CV91stringSet to 1 if the asset is
governed by the Health
Insurance Portability and
Accountability Act
(HIPAA) regulation.
GLBAe.cv92%cv92%s_CV92stringSet to 1 if the asset is
governed by the GrammLeach Bliley Act (GLBA)
regulation.
FISMAe.cv93%cv93%s_CV93stringSet to 1 if the asset is
governed by the Federal
Information Security
Management Act (FISMA)
regulation.
NISPOMe.cv94%cv94%s_CV94stringSet to 1 via an asset map
if the target asset is
governed by the National
Industrial Security
Program Operating
Manual (NISPOM)
CustomerVar95 thru
CustomerVar100
e.cv95 thru
e.cv100
%cv95%
thru
%cv100%
s_CV95
thru
s_CV100
stringString variable reserved
for customer use. Stored
in database.
CustomerVar101 thru
CustomerVar110
28Sentinel 6.1 Reference Guide
e.cv101
thru
e.cv110
%cv101%
thru
%cv110%
s_CV101
thru
s_CV110
stringInteger variable reserved
for customer use. Stored
in database.
novdocx (en) 7 January 2010
Default Label
CustomerVar111 thru
CustomerVar120
CustomerVar121 thru
CustomerVar130
CustomerVar131 thru
CustomerVar140
CustomerVar141 thru
CustomerVar150
CustomerVar151 thru
CustomerVar160
CustomerVar161 thru
CustomerVar170
CustomerVar171 thru
CustomerVar180
Filters and
Correlation
Rules
e.cv111
thru
e.cv120
e.cv121
thru
e.cv130
e.cv131
thru
e.cv140
e.cv141
thru
e.cv150
e.cv151
thru
e.cv160
e.cv161
thru
e.cv170
e.cv171
thru
e.cv180
Menu and
Correlation
Actions
%cv111%
thru
%cv120%
%cv121%
thru
%cv130%
%cv131%
thru
%cv140%
%cv141%
thru
%cv150%
%cv151%
thru
%cv160%
%cv161%
thru
%cv170%
%cv171%
thru
%cv180%
Proprietary
Collector
Language
s_C V111
thru
s_CV120
s_CV121
thru
s_CV130
s_CV131
thru
s_CV140
s_CV141
thru
s_CV150
s_CV151
thru
s_CV160
s_CV161
thru
s_CV170
s_CV171
thru
s_CV180
Data
Typ e
Description
stringDate variable reserved for
customer use. Stored in
database.
stringUUID variable reserved
for customer use. Stored
in database.
stringIPv4 variable reserved for
customer use. Stored in
database.
stringString variable reserved
for customer use. Stored
in database.
stringInteger variable reserved
for customer use. Not
stored in database.
stringDate variable reserved for
customer use. Not stored
in database.
stringUUID variable reserved
for customer use. Not
stored in database.
CustomerVar181 thru
CustomerVar190
CustomerVar191 thru
CustomerVar200
e.cv181
thru
e.cv190
e.cv191
thru
e.cv200
%cv181%
thru
%cv190%
%cv191%
thru
%cv200%
s_CV181
thru
s_CV190
s_CV191
thru
s_CV200
stringIPv4 variable reserved for
customer use. Not stored
in database.
stringString variable reserved
for customer use. Not
stored in database.
Sentinel Event Fields29
novdocx (en) 7 January 2010
30Sentinel 6.1 Reference Guide
3
Sentinel Control Center User
novdocx (en) 7 January 2010
Permissions
Sentinel allows administrators to set user permissions in the Sentinel Control Center at a granular
level. The only user created by default is the esecadm, or Sentinel Administrator. All other users are
created by the Sentinel Administrator, or someone with similar permissions.
To change user permissions:
1 Log into the Sentinel Control Center as a user with “User Management” permissions.
2 Click the Admin tab.
3 Select User Configuration from Admin tab. Alternatively, Select User Manager from User
Configuration in the Navigator.
4 Right click user and select User Details.
3
5 Select the Permissions tab.
Sentinel Control Center User Permissions
31
novdocx (en) 7 January 2010
6 Uncheck the checkboxes for which you want to restrict user.
7 Click OK.
The permissions in the User Manager are grouped into several major categories:
General (page 33)
Active Views (page 34)
iTRAC (page 35)
Incidents (page 35)
Integrators (page 36)
Sentinel Control Center User Permissions (page 31)
Event Source Management (page 37)
Analysis Tab (page 37)
Advisor Tab (page 37)
Administration (page 38)
Correlation (page 39)
32Sentinel 6.1 Reference Guide
Solution Pack (page 39)
Identity (page 39)
Each of these groups of setting is described in more detail below.
3.1 General
Table 3-1 Permissions-General
Permission NameDescription
Save WorkspaceAllows user to save preferences. If this permission is unavailable, user
will never be prompted to save changes to preferences when logging out
or exiting the Sentinel Control Center.
Column ManagementAllows user to manage the columns in the Active View tables.
SnapshotAllows user to take a snapshot of Active View tables.
novdocx (en) 7 January 2010
3.1.1 General – Public Filters
Table 3-2 Permissions-General-Public Filters
Permission NameDescription
Create Public FiltersAllows user to create a filter with an owner ID of PUBLIC. If user does
not have this permission, then the value PUBLIC will not be listed as
one of the owner IDs that user can create a filter for.
Modify Public FiltersAllows user to modify a public filter.
Delete Public FiltersAllows user to delete a public filter.
3.1.2 General – Manage Private Filters of Other Users
Table 3-3 Permissions-General-Manage Private Filters of Other Users
Permission NameDescription
Create Private Filters for Other UsersAllows user to create private filters for themselves or for
other users.
Modify Private Filters of Other UsersAllows user to modify their own private filters and private
filters created by other users.
Delete Private Filters of Other UsersAllows user to delete their own private filters and private
filters created by other users.
View/Use Private Filters of Other UsersAllows user to view/use their own private filters and private
filters crated by other users.
Sentinel Control Center User Permissions33
3.1.3 General – Integration Actions
Table 3-4 Permissions-General-Integration Actions
Permission NameDescription
Send to Remedy Help DeskAllows user to send events, incident and associated objects to
Remedy. (requires the optional Remedy integration component)
3.2 Active Views
Table 3-5 Permissions-Active Views
Permission NameDescription
View Active Views TabAllows user to see and use the Active Views tab, menu and other
related functions associated with the Active Views tab.
novdocx (en) 7 January 2010
3.2.1 Active Views – Menu Items
Table 3-6 Permissions-Active Views-Menu Items
Permission NameDescription
Use Assigned Menu ItemsAllows user to use assigned menu items in the
Active Views Events table (the right-click menu).
Add to Existing IncidentAllows user to add events to existing incidents
using the Active Views Events table (the right-click
menu).
Remove from IncidentAllows user to remove events from an existing
incident using the Events tab Events table (the
right-click menu).
Email EventsAllows user to e-mail events using the Active Views
Events table (the right-click menu).
View Advisor Attack DataAllows user to view the Advisor Attack Data stream.
View VulnerabilityAllows user to view the vulnerabilities present in the
Sentinel database
3.2.2 Active Views – Active Views
Table 3-7 Permissions-Active Views-Active Views
Permission NameDescription
Use/View Active Views Allows user to access the Active Views charts.
34Sentinel 6.1 Reference Guide
3.3 iTRAC
Table 3-8 Permissions-iTRAC
Permission NameDescription
View iTRAC TabAllows user to see and use the iTRAC tab, menu and other related
functions associated with the iTRAC tab.
Activity ManagementAllows user to access the Activity Manager.
Manage Work Items Of UsersGives user administrative control over all workitems, including
those assigned to other users
3.3.1 iTRAC - Template Management
Table 3-9 Permissions-iTRAC-Template Management
novdocx (en) 7 January 2010
Permission NameDescription
View/Use Template ManagerAllows user to access the Template Manager.
Create/Modify TemplatesAllows user to create and modify templates.
3.3.2 iTRAC - Process Management
Table 3-10 Permissions-iTRAC-Process Management
Permission NameDescription
View/Use Process ManagerAllows user to access the Process View Manager.
Start/Stop ProcessesAllows user to use the Process View Manager.
3.4 Incidents
Table 3-11 Permissions-Incidents
Permission NameDescription
View Incidents TabAllows user to see and use the Incidents tab, menu and other related
functions associated with the View Incidents tab.
Incident AdministrationAllows user to modify an incident.
View Incident(s)Allows user to view/modify the details of an incident. If the user does not
have this permission, then the Incident Details window will not be displayed
when the user either double-clicks an Incident in the Incident View window
or right-clicks the incident or selects the Modify option.
Sentinel Control Center User Permissions35
Permission NameDescription
Create Incident(s)Allows user to create Incidents in the in the Incident View window or by right
clicking on the incident and select Modify option. Alternatively you can
select Create Incident menu item in the Incidents menu bar and clicking
Create Incident option in the tool bar.
Modify Incident(s)Allows user to modify an incident in the Incident Details window.
Delete Incident(s)Allows user to delete incidents.
Assign Incident(s)Allows user to assign an incident in the Modify and Create Incident window.
Email IncidentsAllows user to e-mail Incidents of interest.
Incident ActionsAllows user to view Execute Incident Action menu option in an Incident and
to execute actions.
Add NotesAllows user to add any number notes to an incident.
3.5 Integrators
novdocx (en) 7 January 2010
Table 3-12 Permissions-Integrators
Permission NameDescription
View IntegratorAllows user to view Integrators, open Integrator Manager, use
update, refresh, help, test buttons and view integrator event details.
Manage IntegratorAllows user to manage (add/modify/delete) the configured
Integrators.
Manage Integrator PluginsAllows user to manage (add/modify/delete) the Integrators plugins.
3.6 Actions
Table 3-13 Permissions-Action Manager
Permission NameDescription
View ActionsAllows user to use Action Manager and view Actions.
Manage ActionsAllows user to add/edit/delete actions of type "Execute Action
Plugins"
Manage Action PluginsAllows user to add/edit/delete Action Plugins.
36Sentinel 6.1 Reference Guide
3.7 Event Source Management
Table 3-14 Permissions-Event Source Management
Permission NameDescription
View StatusAllows user to view the status of ESM components.
View ScratchpadAllows user to design and configure ESM components.
Configure ESM ComponentsAllows you to configure ESM components.
Control ESM ComponentsAllows you to control and manage ESM components.
Manage PluginsAllows you to manage Collector and Connector Plugins.
View Raw DataAllows you to view/parse raw data.
Debug CollectorAllows you to debug Collector.
Command and Control consists of:
novdocx (en) 7 January 2010
start/stop individual ports
start/stop all ports
restart hosts
rename hosts
3.8 Analysis Tab
Table 3-15 Permissions-Analysis Tab
Permission NameDescription
View Analysis TabAllows user to see and use the View Analysis tab, menu and other
related functions associated with the View System Overview tab.
3.9 Advisor Tab
Table 3-16 Permissions-Advisor Tab
Permission NameDescription
View Advisor TabAllows user to view and use the Advisor tab and the Advisor Status
window.
Sentinel Control Center User Permissions37
3.10 Administration
Table 3-17 Permissions-Administration
Permission NameDescription
View Administration TabAllows user to see and use the View Administration tab, menu and
other related functions associated with the View Administration tab.
DAS StatisticsAllows user to view DAS activity (DAS binary and query).
Event ConfigurationAllows user to rename columns, set mappings from mapping files.
This function is associated with Mapping Configuration.
Map Data ConfigurationAllows user to add, edit and delete mapping files.
Event Menu ConfigurationAllows user to access the Menu Configuration window and add new
options that display on the Event menu when you right-click an
event.
Report Data ConfigurationAllows user to enable or disable summary tables used in
aggregation.
novdocx (en) 7 January 2010
User ManagementAllows user to add, modify and delete user details
User Session ManagementAllows user to view, lock and terminate active users (logins to
Sentinel Control Center).
iTRAC Role ManagementAllows user to view and use the role manager in the Admin Tab.
Download ManagerAllow user to configure download manager in the Admin Tab.
Advisor ConfigurationAllow user to configure Advisor settings.
View ServersAllows user to monitor the status of all processes.
38Sentinel 6.1 Reference Guide
Permission NameDescription
Control ServersAllows user to start, restart and stop processes.
3.11 Correlation
Table 3-20 Permissions-Correlation
Permission NameDescription
View Correlation TabAllows user to use the Correlation functions.
View/Use Correlation Rule ManagerAllows user to start or stop the Correlation Rules.
View/Use Correlation Engine ManagerAllows user to deploy/undeploy the Correlation Rules.
View/Use Dynamic ListsAllows user to Create, use, view, modify the Dynamic
Lists.
novdocx (en) 7 January 2010
3.12 Solution Pack
Table 3-21 TPermissions-Solution Pack
Permission NameDescription
Solution DesignerAllows user to access Solution Designer.
Solution ManagerAllows user to access Solution Manager.
3.13 Identity
Table 3-22 Permissions-Action Manager
Permission NameDescription
View/Use Identity Address BookAllows user to view and use Identity Browser.
Sentinel Control Center User Permissions39
novdocx (en) 7 January 2010
40Sentinel 6.1 Reference Guide
4
Sentinel Correlation Engine
novdocx (en) 7 January 2010
RuleLG Language
This section is about Sentinel correlation engine Rule LG language.
4.1 Correlation RuleLG Language Overview
The Sentinel Correlation Engine runs rules that are written in the Correlation RuleLg language.
Rules are created in the Sentinel Control Center. Users can create rules using a wizard for the
following rule types:
Simple Rule
Composite Rule
Aggregate Rule
Sequence Rule
These rules are converted to the Correlation RuleLg language when the rules are saved. The same
rule types, plus even more complex rules, can be created in the Sentinel Control Center using the
Custom/Freeform option. To use the Custom/Freeform option, the user must have a good
understanding of the Correlation RuleLg language.
RuleLg uses several operations, operators, and event field short tags to define a rule. The Correlation
Engine loads the rule definition and uses the rules to evaluate, filter, and store in memory events that
meet the criteria specified by the rule. Depending on the rule definition, a correlation rule might fire
based on
4
the value of one field or multiple fields
the comparison of an incoming event to past events
the number of occurrences of similar events within a defined time period
one or more subrules firing
one or more subrules firing in a particular order
Each of these constructs is represented by an operation in RuleLg.
4.2 Event Fields
All operations function on event fields, which can be referred to by their labels or by their short tags
within the correlation rule language. For a full list of labels and short tags, see “Sentinel Event
Fields” section. The label or metatag must also be combined with a prefix to designate whether the
event field is part of the incoming event or a past event that is stored in memory.
Examples:
e.DestinationIP (Destination IP for the current event)
e.dip (Destination IP for the current event)
w.dip (Destination IP for any stored event)
Sentinel Correlation Engine RuleLG Language
41
WARNING: If you rename the label of a metatag, do not use the original label name when creating
a correlation rule.
4.3 Event Operations
Event operations evaluate, compare, and count events. They include the following operations:
Filter: Evaluates the current to determine whether they could potentially trigger a rule to fire
Window: Compares the current event to past events that have been stored in memory
Trig ger: Counts events to determine whether enough events have occurred to trigger a rule
Each operation works on a set of events, receiving a set of events as input and returning a set of
events as output. The current event processed by a rule often has a special meaning for the semantic
of the language. The current event is always part of the set of events in and out of an operation
unless the set is empty. If an input set of an operation is empty, then the operation is not evaluated.
4.3.1 Filter Operation
novdocx (en) 7 January 2010
Filter consists of a Boolean expression that evaluates the current event from the real-time event
stream. It compares event attributes to user-specified values using a wide set of operators
The Boolean expression is a composite of comparison and match instructions.
<Boolean expressions 1…n> are expressions using one or more event field names
and filter operators
For example, this rule detects whether the current event has a severity of 4 and the resource event
field contains either “FW” or “Comm.”
filter(e.sev = 4 and (e.res match regex ("FW") or e.res match regex ("Comm")))
Boolean Operators
Filter expressions can be combined using the Boolean operators AND, OR and NOT. The filter
boolean operator precedence (from highest [top] to lowest [bottom] precedence) is:
Table 4-1 Boolean Operators
OperatorMeaningOperator TypeAssociativity
Notlogical notunaryNone
Andlogical andbinaryleft to right
Orlogical orbinaryleft to right
42Sentinel 6.1 Reference Guide
In addition to Boolean operators, filter supports the following operators.
Standard Arithmetic Operators
Standard arithmetic operators can be used to build a condition that compares the value of a Sentinel
metatag and a user-specified value (either a numeric value or a string field). The standard arithmetic
operators in Sentinel are =, <, >, !=, <=, and >=.
The match regex operator can be used to build a condition where the value of a metatag matches a
user-specified regular expression value specified in the rule. This operator is used only for string
tags, and the user-specified values for this operator are case-sensitive.
Examples:
novdocx (en) 7 January 2010
filter(e.Collector match regex ("IBM"))
filter(e.EventName match regex ("Attack"))
Match Subnet Operators
The match subnet operator can be used to build a condition where the value of a metatag maches a
user-specified subnet specified in the rule in CIDR notation. This operator is used only for IP
address fields.
Example:
filter(e.DestinationIP match subnet (10.0.0.1/22))
Inlist Operator
The inlist operator is used to perform a lookup on an existing dynamic list of string values, returning
true if the value is present in the list. For more information on Dynamic Lists, see “Correlation Tab”
in Sentinel 6.1 User Guide.
For example, this filter expression is used to evaluate whether the Source IP of the current event is
present on a dynamic list called MailServerList. If the Source IP is present in this list, the expression
evaluates to TRUE.
filter(e.sip inlist MailServerList)
As another example, this filter expression combines the NOT and the INLIST operator. This
expression evaluates to TRUE if the Source IP is not present in the dynamic list called
MailServerList.
filter(not (e.sip inlist MailServerList))
This filter expression is used to evaluate whether the event name of the current event equals “File
Access” and the Source User Name is also not present on a dynamic list called AuthorizedUsers. If
both conditions are true for the current event, the expression evaluates to TRUE.
Sentinel Correlation Engine RuleLG Language43
filter(e.evt="File Access" and not(e.sun inlist AuthorizedUsers))
ISNULL Operator
The isnull operator returns true if the metatag value is equal to NULL.
Example:
Filter(isnull(e.SIP))
Output Sets
The output of a filter is either the empty set (if the Boolean expression evaluates to false) or a
set containing the current event and all of the other events from the incoming set (if the
Boolean expression evaluates to true).
If filter is the last or only operation of a correlation rule, then the output set of the filter is used
to construct a correlated event. The trigger events are the filter operation output set of events
with the current event first.
If filter is not the last operation of a correlation rule (that is, filter is followed by a flow
operatior), then the output set of a filter is used as the input set to other operations (through the
flow operator).
novdocx (en) 7 January 2010
Additional Information
The filter operator can be used to compare metatag values with other metatag values, for
example:
e.SourceIP=e.DestinationIP
4.3.2 Window Operation
Window compares the current event to a set of past events that are stored in a “window.” The events
in the window can be all past events for a certain time period, or they can be filtered.
The Boolean expression is a composite of comparison instructions and match instructions with the
Boolean operators AND, OR and NOT.
<Boolean expression> is an expression comparing a metatag value from the
current event to a metatag value from a past event (or a user-specified
constant)
<filter expression> is optional and specifies filter criteria for the past
events
<evaluation period> specifies the duration for which past events matching the
filter expression are maintained, specified in seconds (s), minutes (m), or
hours (h). If no letter is specified, seconds are assumed.
For example, this rule detects whether the current event has a source IP address in the specified
subnet (10.0.0.10/22) and matches an event(s) that happened within the past 60 seconds.
window(e.sip = w.sip, filter(e.sip match subnet (10.0.0.10/22),60)
44Sentinel 6.1 Reference Guide
As another example, this rule is a domino type of rule. An attacker exploits a vulnerable system and
uses it as an attack platform.
window((e.sip = w.dip AND e.dp = w.dp AND e.evt = w.evt), 1h)
This rule identifies a potential security breach after a denial of service attack. The rule fires if the
destination of a denial of service attack has a service stopped within 60 seconds of the attack.
filter(e.rv51="Service" and e.rv52="Stop" and e.st = "H") flow window (e.sip =
w.dip, filter(e.rv52="Dos"), 60s) flow trigger(1,0))
Output Sets
If any past event evaluates to true with the current event for the simple boolean expression, the
output set is the incoming event plus all matching past events.
If no events in the window match the current event for the simple boolean expression, the
output set is empty.
If a window is the last or only operation of a correlation rule, then the output set of the window
is used to construct a correlated event (the correlated events being the window operation output
set of events with the current event first).
novdocx (en) 7 January 2010
Additional Information
You must prepend a metatag name with "e." to specify the current event or with "w." to specify
the past events
All window simple Boolean expressions must include a metatag in the form w.[metatag].
For more information about valid filter expressions, see Section 4.3.1, “Filter Operation,” on
page 42.
Every event coming in to the Correlation Engine that passes this filter is put into the window of
past events
If no filter expression exists, then all events coming into the Correlation Engine are maintained
by the window. With extremely high event rates or long durations, this might require a large
amount of memory.
The current event is not placed into the window until after the current event window evaluation
is complete
To minimize memory usage, only the relevant parts of the past events, not all metatag values,
are maintained in memory.
4.3.3 Trigger Operation
Trigger is used to specify a number of events for a user-specified duration.
The syntax for trigger is:
Trigger (<number of events>, <evaluation period>[, discriminator (<list of
tags>))
Where
Sentinel Correlation Engine RuleLG Language45
<number of events> is an integer value specifying the number of matching
events that are necessary for the rule to fire
<evaluation period> specifies the duration for which past events matching the
filter expression are maintained, specified in seconds (s), minutes (m), or
hours (h). If no letter is specified, seconds are assumed.
discriminator is a field to group by
For example, this rule detects if 5 events with the same source IP address happen within 10 seconds.
trigger(5,10,discriminator(e.sip))
Output Sets
If the specified count is reached within the specified duration, then a set of events containing all
of the events maintained by the trigger is output; if not, the empty set is output.
When receiving a new input set of events, a trigger first discards the outdated events (events
that have been maintained for more than the duration) and then inserts the current event. If the
number of resulting events is greater than or equal to the specified count, then the trigger
outputs a set containing all of the events.
If a trigger is the last operation (or the only operation) of a correlation rule, then the output set
of the trigger is used to construct a correlated event (the correlated events being the trigger
operation output set of events with the current event first).
If a trigger is not the last operation of a correlation rule (that is, it is followed by a flow
operator), then the output set of a trigger is used as the input set to other operations (through the
flow operator).
The discriminator (meta-tag list) is a comma-delimited list of meta-tags. A trigger operation
keeps different counts for each distinct combination of the discriminator meta-tags.
novdocx (en) 7 January 2010
4.4 Rule Operations
Rule operations work on subrules that have been combined into a compound rule. They include:
Gate
Sequence
4.4.1 Gate Operation
The gate operation is used to create a composite rule which is used in identifying complex situations
from the occurrence of simple situations.
The composite rule is made up of one or more nested subrules and can be configured to fire if some,
any or all of the subrules fire within a specified time window. The subrules can be a simple rule or
another composite rule. For more information on Composite Rule, see “Correlation Tab” in Sentinel
6.1 User Guide.
The syntax for gate is:
Gate(<subrule 1 rulelg>, <subrule 2 rulelg>…<subrule n ruleLg>, <mode>,
<evaluation period>, discriminator(<list of tags>))
Where
46Sentinel 6.1 Reference Guide
Subrule Rulelgs are the rulelg definitions for 1 to n subrules
mode = all | any | 1 | 2 | … | n, which is the number of subrules that must be
triggered in order for the gate rule to trigger
<evaluation period> specifies the duration for which past events matching the
filter expression are maintained, specified in seconds (s), minutes (m), or
hours (h). If no letter is specified, seconds are assumed.
discriminator is a field to group by
For example, this rule is a typical perimeter security IDS inside/outside rule
Sequence rules are similar to gate rules, except that all child rules must fire in time order for the
sequenced rule to evaluate to true.
The subrules can be a simple rule or another composite rule.
The syntax for sequence is:
novdocx (en) 7 January 2010
Sequence(<subrule 1 rulelg>, <subrule 2 rulelg>…<subrule n ruleLg>,
<evaluation period>, discriminator(<list of tags>))
Where
Subrule Rulelgs are the rulelg definitions for 1 to n subrules
<evaluation period> is a time period expressed in seconds (s), minutes (m), or
hours (h)
discriminator is a field to group by
For example, this rule detects three failed logins by a particular user in 10 minutes followed by a
successful login by same user.
Operators are used to transition between operations or expressions. The fundamental operators used
between operations are:
Flow operator
Union operator
Intersection operator
Discriminator operator
4.5.1 Flow Operator
The output set of events of the left-hand side operation is the input set of events for the right-hand
side operation. Flow is typically used to transition from one correlation operation to the next.
For example:
Sentinel Correlation Engine RuleLG Language47
filter(e.sev = 5) flow trigger(3, 60)
The output of the filter operation is the input of the trigger operation. The trigger only counts events
with severity equal to 5.
4.5.2 Union Operator
The union of the left side operation output set and the right side operation output set. The resulting
output set contains events from either the left-hand side operation output set or the right-hand side
operation output set without duplicates.
For example:
filter(e.sev = 5) union filter(e.sip = 10.0.0.1)
is equivalent to
filter(e.sev = 5 or e.sip = 10.0.0.1)
4.5.3 Intersection Operator
novdocx (en) 7 January 2010
The intersection of the left side operation output set and the right side operation output set. The
resulting output set contains events that are common in both the left-hand side operation output set
and the right-hand side operation output set without duplicates.
The discriminator operator allows users to group by event fields within other event operations.
Discriminator can be used within the trigger, gate, or sequence operations. This is the last operation
when executing a condition. The input for this operator will generally be the output of other
operations, if any.
For example, this filter expression is used to identify five severity 5 events within 60s that all have
the same Source IP. Note that the attribute (SIP in this example) can be any value, even a NULL, but
it must be the same for all five events in order for the rule to fire.
The operator precedence (from highest (top) to lowest (bottom)) are:
48Sentinel 6.1 Reference Guide
Table 4-2 Operator Precedence
OperatorMeaningOperator TypeAssociativity
flowOutput set becomes input setbinaryleft to right
intersectionSet intersection (remove duplicates)binaryleft to right
unionSet union (remove duplicates)binaryleft to right
4.7 Differences between Correlation in 5.x and
6.x
There are several new functionalities updated / included in 6.0 to widen the usage of Correlation to
meet user’s requirements and for the ease-of-use.
Gate Operation: This is new in 6.0.
Sequence Operation: This is new in 6.0.
Inlist Operator and Dynamic Lists: These are new in 6.0.
novdocx (en) 7 January 2010
Isnull Operator: This is new in 6.0. For metatag values equal to null, Sentinel 5.x supported the
following syntax which is replaced by the ISNull operator in Sentinel 6.0
e.SIP= “ ”
Update Window: This is new in Sentinel 6.0
Sentinel 6.0 merges the C (Correlated Events) and W (watchlist events) SensorTypes. All
events generated by the Correlation Engine are now labeled C in the SensorType field.
Correlation Actions and Correlation Rules: Correlation Actions and Correlation Rules are
decoupled in Sentinel 6.0
Although the filter operation supported AND and OR Boolean expressions in Sentinel 5.x, the
window operation supports Boolean expressions for the first time in Sentinel 6.0. For example:
OR: window(e.dip=w.dip OR e.sip=w.sip, filter(e.sev>2),60)
AND: window(e.evt=w.evt AND e.sun=w.sun, filter(e.sev>2),60)
Sentinel 6.0 no longer has the GUI option to create a rule from a PUBLIC filter. The filter
criteria must be defined in the correlation wizard or language.
The update functionality for a rule that is triggered more than once is configurable in Sentinel
6.0. In Sentinel 5.1.3, updates to a rule were based on a sliding window based on the trigger
time period. In Sentinel 6.0, the update functionality can be set when the rule is deployed; the
rule actions might happen every time the rule is triggered, or they can be set to occur once and
then wait for some period of time before the action occurs again. This prevents multiple
notifications on a single, ongoing event.
The in, not in, and difference operators are deprecated in Sentinel 6.0. Correlation rules using
these operators must be modified before running them in Sentinel 6.0.
The e.all metatag has been deprecated. Correlation rules using this operator should be updated
to use specific short tags before running them in Sentinel 6.0.
Sentinel Correlation Engine RuleLG Language49
novdocx (en) 7 January 2010
50Sentinel 6.1 Reference Guide
5
Sentinel Data Access Service
The Data Access Service (DAS) process is Sentinel Server's persistence service and provides a
message bus interface to the database. Some of the services it provides are event storage, Historical
Query, event drill down, vulnerability and Advisor data retrieval, and configuration manipulation.
5.1 DAS Container Files
DAS is a collection of services provided by five different processes. Each process is a container
responsible for different types of database operations. These processes are:
DAS Query: Performs general Sentinel Service operations including Login and Historical
Query.
DAS Binary: Performs event database insertion.
DAS RT: Provides the server-side functionality for Active Views.
DAS Aggregation: Calculates event data summaries that are used in reports.
novdocx (en) 7 January 2010
5
DAS iTRAC: Provides the server-side functionality for the Sentinel iTRAC functionality.
DAS CMD: Provides a command line interface to certain DAS services. Used primarily for
third-party integration.
DAS Proxy: Provides the server-side of the SSL proxy connection to Sentinel Server.
DAS Proxy is not directly part of the DAS collection of services. It is part of the Communication
Server and does not directly connect to the database.
The primary settings in these configuration files that can be configured using the dbconfig utility are
related to the database connection, including:
username
password
hostname
port number
database (database name)
server (oracle, oracle10g, or mssql)
If any of these database connection settings need to be changed, they must be changed in every
das_*.xml
the same time (For example, update all files in the %ESEC_HOME%\config or $ESEC_HOME/
config directory). Alternately, using the –n argument, this utility can update a single file’s contents if
only one file need to be updated. Typically, all files should be updated at the same time.
file using the
dbconfig
utility. Using the –a argument, this utility can update all files at
WARNING: Do not manually edit the database connection properties. Use the
change any database connection values within these files.
Sentinel Data Access Service
dbconfig
utility to
51
To Reconfigure Database Connection Properties:
1 Login to the machine where DAS is installed as the esecadm user on UNIX or a user with
NOTE: The -winAuth argument is available only on Windows and should be used instead of the –u
and –p arguments if the Sentinel Application User is a Windows Authentication user.
Other settings in the files can be adjusted manually (without using dbconfig):
maxConnections
batchSize
loadSize
Changing these settings might affect database performance and should be done with caution
5.1.2 DAS Logging Properties Configuration Files
The following files are used to configure logging of the DAS process. These files are typically
changed when troubleshooting the DAS process.
das_query_log.prop
das_binary_log.prop
das_rt_log.prop
das_itrac_log.prop
das_aggregation_log.prop
das_cmd_log.prop
das_proxy_log.prop
They are located in the following locations:
For Windows:
%ESEC_HOME%\config
52Sentinel 6.1 Reference Guide
For UNIX:
$ESEC_HOME/config
These files contain the configuration that determines how the DAS processes will log messages. The
most important part of the configuration is the logging levels, which indicate how verbose the log
messages should be. The section of the file to configure these settings is:
###### Configure the logging levels
# Logging level rules are read from the top down.
# Start with the most general, then get more specific.
#
# Defaults all loggers to INFO (enabled by default)
.level=INFO
#
# < Set level of specific loggers here >
#
# Turns off all logging (disabled by default)
#.level=OFF
######
novdocx (en) 7 January 2010
NOTE: The logger
.level
is a wildcard logger name that refers to all loggers. Setting this logger’s
level will affect all loggers.
The available logging levels are:
OFF: disables all logging
SEVERE (highest value): indication that a component has malfunctioned or there is a loss/
corruption of critical data
WARNING: if an action can cause a component to malfunction in the future or if there is non-
critical data loss/corruption
INFO: audit information
CONFIG: for debugging
FINE: for debugging
FINER: for debugging
FINEST: (lowest value) – for debugging
ALL: will log all levels
When one specifies a logging level, all log messages of that level and higher (in the above list) will
actually be logged. For example, if one specifies the INFO level, then all INFO, WARNING and
SEVERE message will be logged.
NOTE: At 10 second intervals, the logging properties file will be checked to see if any changes
have occurred since it was last read. If the file has changed, the LogManagerRefreshService will reread the logging properties file. Therefore, it is not necessary to restart the processes to begin using
the updated logging levels.
Log messages are written to ESEC_HOME%\log (for Windows) or $ESEC_HOME/log (for UNIX),
in the following files:
The 0 indicates the unique number to resolve conflicts and the * indicates a generation number to
distinguish rotated logs. For example,
das_query0.0.log
is the log with index 0 (latest) file in a
rotated set of log files for the DAS Query process.
Log messages are also written to the process’s console (standard output). However, since the
processes are running as services, users do not have access to the console output. It is possible,
however, to capture the console output in the
sentinel0.*.log file
. This is useful, for example,
if the process is producing an error that is not printed to the process’s own log file. This can be
enabled by adding the following line to the
The DAS_Proxy SSL Server uses an asymmetric key pair, consisting of a certificate (or public key)
and a private key, to encrypt communications. When the Sentinel Communication Server is started
for the first time, it automatically creates a self-signed certificate which is used by the DAS_Proxy
SSL Server.
You can replace the self-signed certificate with a certificate signed by a major Certificate Authority
(CA), such as Verisign, Thawte (http://www.thawte.com/), or Entrust (http://www.entrust.com/).
You can also replace the self-signed certificate with a certificate signed by a less common CA, such
as a CA within your company or organization.
This section describes several certificate management tasks that you can perform in Sentinel:
Replace the default certificate with a certificate signed by a Certificate Authority (CA)
Change default keystore and keyEntry passwords. This is recommended on all Sentinel
systems.
Change the location of the .proxyServerKeystore file
Change the default keyEntry alias to avoid potential conflicts with other keys in the keystore or
for simplicity
Replacing the default certificate with a CA-signed certificate
Novell provides a self-signed certificate for the DAS_Proxy SSL Server to use. To improve security,
you can replace the default, self-signed certificate that gets installed with a certificate signed by a
Certificate Authority (CA). The CA may be a major CA, such as Verisign, Thawte (http://
www.thawte.com/), or Entrust (http://www.entrust.com/), or it may be a less widely-known CA,
such as one that is within your organization.
54Sentinel 6.1 Reference Guide
The basic steps are to get a CA to sign your certificate and then import that certificate into the
keystore for DAS_Proxy to use. To import the certificate, the CA that signed the certificate must be
“known” to the keytool utility. Keytool usually recognizes the major certificate authorities, but for
other CA’s you may need to import a certificate or chain of certificates for the certificate authority
before you can successfully import the certificate that DAS_Proxy uses.
NOTE: These instructions are based on the user guide for keytool. For more information, see http://
2 Provide the keystore password (star1111 by default). The contents of the keystore file display:
Keystore type: jks
Keystore provider: SUN
Your keystore contains 1 entry
10.0.0.1, Jan 8, 2008, keyEntry,
Certificate fingerprint (MD5):
22:B4:19:63:AC:2D:F9:C0:66:7F:7C:64:85:68:89:AB
The keyEntry alias, which is used in the following step, is the IP address in the example above.
By default, the keyEntry alias can be the IP address or the host name of the local machine.
novdocx (en) 7 January 2010
3 Execute the following command in the console using the keyEntry alias from
Provide the current keystore password. The contents of the keystore file display:
Keystore type: jks
Keystore provider: SUN
Your keystore contains 1 entry
10.0.0.1, Jan 8, 2008, keyEntry,
Certificate fingerprint (MD5):
22:B4:19:63:AC:2D:F9:C0:66:7F:7C:64:85:68:89:AB
The keyEntry alias is the IP address in the example above. By default, the keyEntry alias is
either set to the IP address or the hostname of the local machine.
4 Execute the following command in the console to change the keyEntry password to the same
5 Enter the existing password and the new password. The following example depicts this:
Enter keystore password: <new_pass>
Enter key password for <keyEntry alias> <old_pass>
New key password for <keyEntry alias>: <new_pass>
Re-enter new key password for <keyEntry alias>: <new_pass>
novdocx (en) 7 January 2010
NOTE: Remember that the keyEntry password and keystore password must be identical.
6 Get the encrypted, Base64 value of the new password using the following steps:
Copy ESEC_HOME/config/das_rt.xml to a file named t
emp.xml
:
Execute the following command to add an encrypted, Base 64 form of the password to
temp.xml
$ESEC_HOME/bin/dbconfig -n $ESEC_HOME/config/temp.xml -p <new password
for keystore and keyEntry>
Open
Copy the value of “password” from the following section of the file:
By default the certificate and private key are stored in the file
$ESEC_HOME/config
value of the property “keystore” in the file
. To change the location of
$/ESEC_HOME/config/das_proxy.xml.
.proxyServerKeystore
.proxyServerKeystore
file, you can edit the
located at
You must restart Sentinel Server after making changes.
Using a new keyEntry alias
The default keyEntry alias is either the IP address or the hostname of the local machine. To use a
different keyEntry alias, open the das_proxy.xml file and set the value of “certificateAlias” in the
component “ProxyService” to the new value.
You must restart Sentinel Server after making changes.
58Sentinel 6.1 Reference Guide
6
Sentinel Accounts and Password
novdocx (en) 7 January 2010
Changes
This section discusses users that are created or used during Sentinel installation and normal Sentinel
operations. Unless you create domain users in advance in order to use Windows Authentication,
these users are created by the Sentinel installer. These user accounts are used for Sentinel’s normal
operations, such as event inserts into the Sentinel database.
The administrator might select to occasionally change the passwords for these accounts. To ensure
continued normal Sentinel operations, there are special procedures necessary to update the
passwords in all necessary locations.
6.1 Sentinel Default Users
This section discusses about Sentinel default users.
6.1.1 Native Database Authentication
Installer creates several users during installation if you use native database authentication (Oracle or
Microsoft SQL Server). These users are all created as database users in the Oracle or SQL Server
database, and the passwords are configurable at install time. The installer will create the users with
the following default names:
6
esecdba: Schema owner
esecadm: Sentinel administrator
esecrpt: Reporter user, same password as the admin user
esecapp: Sentinel application user. Used by Sentinel Server to connect to the database
In addition to creating a database user for the Sentinel administrator, the installer also creates a
Sentinel user with the same username and password for the Sentinel Control Center. For UNIX only,
the installer creates an operating system user with no password set. To log in as this user, the UNIX
administrator must set a password or su to the user as root.
6.1.2 Windows Authentication
If you use Windows authentication, the Windows administrator must create several domain accounts
before the installation is started. The credentials for these accounts must be given during the
Sentinel installation:
Sentinel DB Administrator: Schema owner
Sentinel Administrator: Sentinel administrator
Sentinel Report User: Reporter user, same password as the admin user.
Sentinel Application User: Sentinel application username for connecting to the database.
Windows Authentication users are supported only when SQL Server is being used and DAS is
running on Windows.
Sentinel Accounts and Password Changes
59
6.2 Password Changes
Corporate policy might require that passwords be changed on a regular schedule. Sentinel user
passwords can be changed using database utilities. After changing a password, some Sentinel
components need to be updated to use the new password.
6.2.1 Changing Password
This section discusses about changing password
SQL Server Accounts
On Windows, this procedure can be used to change the password for the Sentinel Application User,
the Sentinel Database User, or the Sentinel Report User. To change the password for the Sentinel
Administrator or other Sentinel Control Center user, see Section 6.2.1, “Changing Password,” on
page 60.
To change password in MS SQL Server Management Studio:
novdocx (en) 7 January 2010
1 Open the MS SQL Enterprise Manager/ MS SQL and select Security > Logins.
2 Right-click a username from the right pane and select properties.
3 Change the password. Click OK.
Follow the procedures in Sentinel updates after a password change.
Oracle Accounts
This procedure can be used to change the password for the Sentinel Application User, the Sentinel
Database User, or the Sentinel Report User. To change the password for the Sentinel Administrator
or other Sentinel Control Center user, see Section 6.2.1, “Changing Password,” on page 60.
To change password in Oracle:
1 Connect to Oracle Enterprise Manager with user having sysdba privilege.
2 Select your specific database from the left pane.
3 In Database > Security > Users, select a user for which you want to change the password.
4 Provide new password and confirm the password. Click Apply.
Follow the procedures in Sentinel updates after a password Change.
Windows Domain Accounts
If the Sentinel system uses domain user accounts and Windows Authentication, use the following
password change procedures. These procedures can be used for the Sentinel Administrator, the
Sentinel Database User, the Sentinel Report User, and the Sentinel Application User. It can also be
used for any Sentinel Control Center account that uses Windows Authentication.
To change the password for Windows domain accounts:
1 Log into a machine using the account and use standard Windows password change procedures
or
60Sentinel 6.1 Reference Guide
Request a password change from a Windows administrator.
2 Follow the procedures in Sentinel updates after a password change.
Sentinel Control Center Accounts (Native DB Authentication)
This procedure can be used to change the password for the Sentinel Administrator account or any
other Sentinel Control Center user.
To change the Sentinel Administrator password:
1 Login to the Sentinel Control Center as the Sentinel Administrator or another user with User
Management permissions.
2 Click Admin > User Configuration. The User Manager window displays.
3 Double-click esecadm user account or right-click User Details.
4 Modify the account password and confirm password. Click OK.
No additional updates are needed in the Sentinel system.
Sentinel Control Center Accounts (Windows Authentication)
novdocx (en) 7 January 2010
Use standard procedures for changing the password for Windows domain accounts.
6.2.2 Sentinel Updates After a Password Change
The passwords for certain Sentinel users, such as the Sentinel Database User and the Sentinel
Application User, are encrypted and stored in configuration files and used in normal Sentinel
operations. These configuration files must be updated after the passwords are changed.
Updating Sentinel Application User Password
The Sentinel Application User credentials are stored encrypted in the container xml files. After a
password change, these files must be updated for Sentinel to continue working.
The procedures are different depending on whether the Sentinel Application User uses Native
Database Authentication or Windows Authentication.
To update the Sentinel Application User password (Native DB Authentication):
1 Change the password for the Sentinel Application User (esecapp by default) using database
utilities as described in Section 6.2.1, “Changing Password,” on page 60.
2 Using the dbconfig utility, update all container xml files. This is required because these xml
files store the (encrypted) esecapp password to allow DAS and Advisor to connect to the
database.
The container xml files are located in the following locations:
For Windows:
%ESEC_HOME%\config
For Oracle:
$ESEC_HOME/config
Sentinel Accounts and Password Changes61
For more information on usage of the dbconfig utility, see Chapter 5, “Sentinel Data Access
To update the Sentinel Application User password (Windows Authentication):
1 Change the password for the Sentinel Application User domain account as described in
Section 6.2.1, “Changing Password,” on page 60.
2 On your DAS machine, open Windows Services (Control Panel > Administrative Tools >
Services).
3 Right-click Sentinel > Properties. Click the Log On tab and update Log on as password. Click
Apply and click OK.
novdocx (en) 7 January 2010
4 If you have Advisor installed, you will need to update the Run as property (Control Panel >
Scheduled Tasks > right-click Properties) of the Advisor Scheduled task(s).
62Sentinel 6.1 Reference Guide
novdocx (en) 7 January 2010
5 Click Set password. Provide the new password twice and click OK. Click Apply and click OK.
Updating Sentinel Database User Password
These password change procedures are only necessary if extra Sentinel Data Manager jobs have
been created and scheduled or the Sentinel Data Manager command line interface is being used.
To change Sentinel DB Administrator password (Windows Authentication):
1 Use the Windows Operating System to change the password as described in Section 6.2.1,
“Changing Password,” on page 60.
2 If you are running any SDM command line scheduled tasks in your environment, you will need
to update the Run as property (Control Panel > Scheduled Tasks > right-click Properties).
3 Click Set password. Provide the new password twice and click OK. Click Apply and click OK.
To update the Sentinel DB Administrator password (Native DB Authentication):
1 Change the password for the Sentinel DB Administrator User (esec by default) using database
utilities password as described in Section 6.2.1, “Changing Password,” on page 60.
Sentinel Accounts and Password Changes63
2 In order for automated SDM command line tasks to continue to work (if applicable in your
environment), update the dbPass in the sdm.connect file with the new esecdba password using
the SDM GUI or command line. For more information, see “Sentinel Data Manager” in
This procedure is only necessary for Crystal on Windows. For Crystal on Linux, no changes are
necessary.
To update the Sentinel Report User password for Crystal on Windows:
1 Change the password for the Sentinel Report User (esecrpt by default) using database utilities
as described in Section 6.2.1, “Changing Password,” on page 60.
2 Log into the Crystal Server machine.
3 Go to Control Panel > Administrative Tools >Data Sources (ODBC) to update the ODBC Data
Source Name (DSN).
4 Under the System DSN tab, highlight sentineldb and click Configure.
5 Click Next. Update the password.
novdocx (en) 7 January 2010
6 Click Next until you get a Finish button. Click Finish.
64Sentinel 6.1 Reference Guide
7
Sentinel Database Views for
novdocx (en) 7 January 2010
Oracle
This section lists the SentinelTM schema views for Oracle*. The views provide information for
developing your own reports (Crystal Reports*). Sentinel defines an event schema that is used to
hold the parsed data received from event sources. For more information on the Sentinel Event
schema, see Event schema (http://developer.novell.com/wiki/index.php/Event_schema).
7.1 Views
Listed below are the views available with Sentinel.
7.1.1 ACTVY_PARM_RPT_V
This view contains information about iTRACTM activities.
MODIFIED_BYnumber(38,0)User who last modified object
7.1.4 ACTVY_RPT_V
This view contains information about iTRAC activities.
Column NameDatatypeComment
ACTVY_IDvarchar2(36)Activity identifier
ACTVY_NAMEvarchar2(255)Activity name
ACTVY_TYP_CDvarchar2(1)Activity type code
ACCESS_LVLvarchar2(50)Access level
EXEC_LOCvarchar2(50)Execution location
ACTVY_DESCvarchar2(255)Activity description
PROCESSORvarchar2(255)Processor
INPUT_FORMATTERvarchar2(255)Input formatter
66Sentinel 6.1 Reference Guide
Column NameDatatypeComment
OUTPUT_FORMATTERvarchar2 (255)Output formatter
APP_NAMEvarchar2 (25)Application name
DATE_CREATEDdateDate the entry was created
DATE_MODIFIEDdateDate the entry was modified
CREATED_BYnumber (38,0)User who created object
MODIFIED_BYnumber (38,0)User who last modified object
7.1.5 ADV_NXS_FEED_V
This view contains information about the Advisor feed files that are processed on a regular schedule.
Column NameDatatypeComment
FILE_NAMEvarchar (256)The filename of the Advisor feed file.
novdocx (en) 7 January 2010
HASH_VALUEvarchar (256)The hash value of the Advisor feed
file.
RECORDS_INSERTEDnumber (18,0)The number of records inserted into
the database.
RECORDS_UPDATEDnumber (18,0)The number of records updated into
the database.
PROCESSING_START_TIMEdateTime stamp indicating when the
processing of the feed files started.
PROCESSING_END_TIMEdateTime stamp indicating when the
processing of the feed files ended.
GENERATIONdateThe unique ID to which each feed file
belongs.
DATE_CREATEDdateTime stamp indicating when the feed
file information was entered in the
Sentinel database.
DATE_MODIFIEDdateTime stamp indicating when the feed
file information was modified in the
Sentinel database.
CREATED_BYnumberID of the user who entered the feed
file information in the Sentinel
database.
MODIFIED_BYnumberID of the user who modified the feed
file information in the Sentinel
database.
Sentinel Database Views for Oracle67
7.1.6 ADV_NXS_PRODUCTS_V
This view contains information about all the products that are supported by Novell® for Advisor,
which include the Intrusion Detection System (IDS), Vulnerablility Scanners, and Knowledge Base
(OSVDB, CVE, and Bugtraq).
Column NameDatatypeComment
PRODUCT_IDnumberThe unique ID of the product.
PRODUCT_NAMEvarchar2 (256 char)Name of the product. For example, Cisco*
Secure IDS, Enterasys* Dragon* Network
Sensor, or McAfee* IntruShield*.
INTERNAL_NAMEvarchar2 (256 char)Short name of the product that is used in
generating the
file. This name is used by Collectors for
exploit detection. For example, if the
product name is Cisco Secure IDS, the
internal name is
exploitdetection.csv
Secure
.
novdocx (en) 7 January 2010
IS_ATTACKnumber (1,0)This value is
Otherwise, this value is 0.
IS_VULNnumber (1,0)This value is
Scanner. Otherwise, this value is 0.
IS_KBnumber (1,0)This value is
Base. Otherwise, this value is 0.
IS_ACTIVEnumber (1,0)This value is
exploit detection in the Advisor window of
Sentinel Control Center. If the value is
attacks from this product are not populated
in the
IS_POPULATE_ATTACK_NAME number (1, 0)This value is 1 by default. If the value is
the attack name is not populated in the
exploitDetection.csv
IS_POPULATE_ATTACK_CODE number (1, 0)This value is
the attack code is not populated in the
exploitDetection.csv
DATE_CREATEDdateTime stamp indicating when the product
information was entered in the Sentinel
database.
DATE_MODIFIEDdateTime stamp indicating when the product
information was modified in the Sentinel
database.
1
if the product is IDS.
1
if the product is Vulnerability
1
if the product is Knowledge
1
if the product is selected for
exploitdetection.csv
file.
1
by default. If the value is 0,
file.
file.
0
,
0
,
CREATED_BYnumberID of the user who entered the product
MODIFIED_BYnumberID of the user who modified the product
68Sentinel 6.1 Reference Guide
information in the Sentinel database.
information in the Sentinel database.
7.1.7 ADV_NXS_SIGNATURES_V
This view contains the information about the list of signatures for each product that is supported by
Novell for Advisor.
Column NameDatatypeComment
PRODUCT_IDnumberThe unique ID of the product.
SIGNATURE_IDnumberThe unique ID of the signature.
SIGNATURE_NAMEvarchar2 (256 char)Name of the signature.
PUBLISHEDdateTime stamp indicating when the signature
was published for the product by the
vendor.
INSERTEDdateTime stamp indicating when the signature
information was entered in the vendor
database.
UPDATEDdateTime stamp indicating when the signature
information was updated in the vendor
database.
novdocx (en) 7 January 2010
DATE_CREATEDdateTime stamp indicating when the signature
information was entered in the Sentinel
database.
DATE_MODIFIEDdateTime stamp indicating when the signature
information was modified in the Sentinel
database.
CREATED_BYnumberID of the user who entered the signature
information in the Sentinel database.
MODIFIED_BYnumberID of the user who modified the signature
information in the Sentinel database.
7.1.8 ADV_NXS_MAPPINGS_V
This view contains the mapping information for the products supported by Novell for Advisor. It
provides information about the type of mapping between each product including the IDS product
signatures, Vulnerability product signatures, and Knowledge Base product signatures.
Column NameDatatypeComment
SOURCE_PRODUCT_IDnumberThe unique ID of the source product.
SOURCE_SIGNATURE_IDnumberThe unique ID of the source signature.
TARGET_PRODUCT_IDnumberThe unique ID of the target product.
TARGET_SIGNATURE_IDnumberThe unique ID of the target signature.
MAPPING_DIRECTnumber (1, 0)This value is
MAPPING_INDIRECTnumber (1, 0)This value is
1
if the mapping is direct.
1
if the mapping is indirect.
Sentinel Database Views for Oracle69
Column NameDatatypeComment
MAPPING_NGRAMnumber (1, 0)This value is 1 if the mapping is n-gram.
INSERTEDdateTime stamp indicating when the mapping
information was entered in the vendor
database.
UPDATEDdateTime stamp indicating when the mapping
was updated in the vendor database.
novdocx (en) 7 January 2010
IS_DELETEDnumber (1, 0)This value is
invalid.
DELETEDdateTime stamp indicating when the mapping
was marked as invalid.
DATE_CREATEDdateTime stamp indicating when the mapping
information was entered in the Sentinel
database.
DATE_MODIFIEDdateTime stamp indicating when the mapping
information was modified in the Sentinel
database.
CREATED_BYnumberID of the user who entered the mapping
information in the Sentinel database.
MODIFIED_BYnumberID of the user who modified the mapping
information in the Sentinel database.
1
if the mapping is marked as
7.1.9 ADV_OSVDB_DETAILS_V
This view contains information about the known vulnerablities from the OSVDB for the products
supported by Novell for Advisor. It also stores the classifications to which the vulnerability applies.
Column NameDatatypeComment
OSVDB_IDnumberThe unique ID of the vulnerability in the
OSVDB_TITLEclobThe normalized name of the vulnerability.
DESCRIPTIONclobA brief description of the vulnerability.
URGENCYnumberIndicates the urgency of the vulnerability.
SEVERITYnumberIndicates the severity of the vulnerability.
ATTACK_TYPE_AUTH_MANAGEnumber (1, 0)This value is
70Sentinel 6.1 Reference Guide
OSVDB.
The rating is 1- 10. The higher the
number, the more urgent the vulnerability.
The rating is 1- 10. The higher the
number, the more urgent the vulnerability.
1
if the attack type is
authentication management. For
example, brute force attack, default
password, and cookie poisoning.
Column NameDatatypeComment
ATTACK_TYPE_CRYPTnumber (1, 0)This value is 1 if the attack type is
cryptographic. For example, weak
encryption (implementation or algorithm),
no encryption (plaintext), and sniffing.
ATTACK_TYPE_DOSnumber (1, 0)This value is 1 if the attack type is denial
of service. For example, saturation flood,
crash, lock up, and forced reboot.
ATTACK_TYPE_HIJACKnumber (1, 0)This value is 1 if the attack type is hijack.
For example, man-in-the-middle attacks,
IP spoofing, session timeout or take-over,
and session replay.
1
ATTACK_TYPE_INFO_DISCLOSEnumber (1, 0)This value is
information disclosure. For example,
comments, passwords, fingerprinting, and
system information.
ATTACK_TYPE_INFRASTRUCTnumber (1, 0)This value is 1 if the attack type is
infrastructure. For example, DNS
poisoning and route manipulation.
if the attack type is
novdocx (en) 7 January 2010
1
ATTACK_TYPE_INPUT_MANIPnumber (1, 0)This value is
manipulation. For example, XSS, SQL
injection, file retrieval, directory traversal,
overflows, and URL encoding.
ATTACK_TYPE_MISS_CONFIGnumber (1, 0)This value is 1 if the attack type is
misconfiguration. For example, default
files, debugging enabled, and directory
indexing.
ATTACK_TYPE_RACEnumber (1, 0)This value is 1 if the attack type is race
condition. For example, symlink.
ATTACK_TYPE_OTHERnumber (1, 0)This value is
fall under any of the above attack types.
ATTACK_TYPE_UNKNOWNnumber (1, 0)This value is
unknown.
IMPACT_CONFIDENTIALnumber (1, 0)This value is
attack(s) is loss of confidential
information. For example, passwords,
server information, environment
variables, confirmation of file existence,
path disclosure, file content access, and
SQL injection.
IMPACT_INTEGRITYnumber (1, 0)This value is
attack(s) is loss of integrity, which results
in data modifications by unauthorized
persons. For example, unauthorized file
modification, deletion, or creation, remote
file inclusion, and arbitrary command
execution.
if the attack type is input
1
if the attack type does not
1
if the attack type is
1
if the impact of the
1
if the impact of the
Sentinel Database Views for Oracle71
Column NameDatatypeComment
IMPACT_AVAILABLEnumber (1, 0)This value is 1 if the impact of the attack
is loss of availability of a service or
information.
1
IMPACT_UNKNOWNnumber (1, 0)This value is
is unknown.
if the impact of the attack
novdocx (en) 7 January 2010
EXPLOIT_AVAILABLEnumber (1, 0)This value is
the vulnerability.
EXPLOIT_UNAVAILABLEnumber (1, 0)This value is
for the vulnerability.
EXPLOIT_RUMOREDnumber (1, 0)This value is
exist for the vulnerability.
EXPLOIT_UNKNOWNnumber (1, 0)This value is
the vulnerability.
VULN_VERIFIEDnumber (1, 0)This value is
vulnerability has been verified.
VULN_MYTH_FAKEnumber (1, 0)This value is
or a false alarm.
VULN_BEST_PRACnumber (1, 0)This value is
result of not following the best practices in
the configuration or usage of the
vulnerable system or software.
VULN_CONCERNnumber (1, 0)This value is 1 if the vulnerability requires
additional concern for remediation.
VULN_WEB_CHECKnumber (1, 0)This value is
common problem in Web servers or Web
applications.
1
if an exploit is available for
1
if an exploit is not available
1
if an exploit is rumored to
1
if an exploit is unknown for
1
if the existence of the
1
if the vulnerability is a myth
1
if the vulnerability is a
1
if the vulnerability is a
ATTACK_SCENARIOclobDescription of how a vulnerability can be
SOLUTION_DESCRIPTIONclobDescription of the solution that is used to
FULL_DESCRIPTIONclobThe complete description of the
LOCATION_PHYSICALnumber (1, 0)This value is
LOCATION_LOCALnumber (1, 0)This value is
LOCATION_REMOTEnumber (1, 0)This value is
LOCATION_DIALUPnumber (1, 0)This value is 1 if the vulnerability can be
LOCATION_UNKNOWNnumber (1, 0)This value is
72Sentinel 6.1 Reference Guide
exploited.
fix the vulnerability.
vulnerability.
1
if the vulnerability can be
exploited with only physical system
access.
1
if the vulnerability can be
exploited on a local system.
1
if the vulnerabilitycan be
exploited on a remote system.
exploited using a dial-up connection.
1
if the vulnerability is
exploited in an unknown location.
Column NameDatatypeComment
PUBLISHEDdateTime stamp indicating when the
vulnerability was published in the
OSVDB.
INSERTEDdateTime stamp indicating when the
vulnerability was inserted in the vendor
database.
UPDATEDdateTime stamp indicating when the
vulnerability was updated in the vendor
database.
DATE_CREATEDdateTime stamp indicating when the
vulnerability information was entered in
the Sentinel database.
DATE_MODIFIEDdateTime stamp indicating when the
vulnerability information was modified in
the Sentinel database.
CREATED_BYnumberThe ID of the user who entered the
vulnerability information in the Sentinel
database.
novdocx (en) 7 January 2010
MODIFIED_BYnumberThe ID of the user who modified the
vulnerability information in the Sentinel
database.
7.1.10 ADV_NXS_KB_PATCH_V
This view contains information about the patches that are required to remove the vulnerabilities.
Column NameDatatypeComment
IDnumberThe unique ID for the row.
OSVDB_IDnumberThe ID of the vulnerability in the OSVDB.
TYPE_NAMEvarchar2 (128 char)The type of the patch used to remove the
vulnerability.
TYPE_IDnumberThe unique ID of the patch.
REF_VALUEclobThe URL that has the patch information.
DATE_CREATEDdateTime stamp indicating when the patch
information was entered in the Sentinel
database.
DATE_MODIFIEDdateTime stamp indicating when the patch
information was modified in the Sentinel
database.
CREATED_BYnumberThe ID of the user who entered the patch
information in the Sentinel database.
MODIFIED_BYnumberThe ID of the user who modified the patch
information in the Sentinel database.
Sentinel Database Views for Oracle73
7.1.11 ADV_NXS_KB_PRODUCTSREF_V
This view contains the information about the products that are affected by the vulnerability.
Column NameDatatypeComment
IDnumberThe unique ID for the row.
OSVDB_IDnumberThe ID of the vulnerability in the OSVDB.
VENDOR_NAMEvarchar2 (128 char)Name of the vendor of the product that is
affected by the vulnerability.
VERSION_NAMEvarchar2 (128 char)Version of the product that is affected by
the vulnerability.
BASE_NAMEvarchar2 (128 char)Name of the product that is affected by
the vulnerability.
TYPE_NAMEvarchar2 (128 char)Indicates whether the product is affected
by the vulnerability or not.
DATE_CREATEDdateTime stamp indicating when the product
information was entered in the Sentinel
database.
novdocx (en) 7 January 2010
DATE_MODIFIEDdateTime stamp indicating when the product
information was modified in the Sentinel
database.
CREATED_BYnumberThe ID of the user who entered the
product information in the Sentinel
database.
MODIFIED_BYnumberThe ID of the user who modified the
product information in the Sentinel
database.
7.1.12 ASSET_CATEGORY_RPT_V
This iew references ASSET_CTGRY table that stores information about asset categories
MODIFIED_BYnumber(38,0)User who last modified object
7.1.37 ESEC_DISPLAY_RPT_V
This view references ESEC_DISPLAY table that stores displayable properties of objects. Currently
used in renaming meta-tags. Used with Event Configuration (Business Relevance).
Column NameDatatypeComment
DISPLAY_OBJECTvarchar2(32)The parent object of the property
novdocx (en) 7 January 2010
TAGvarchar2(32)The native tag name of the property
LABELvarchar2(32)The display string of tag.
POSITIONnumberPosition of tag within display.
WIDTHnumberThe column width
ALIGNMENTnumberThe horizontal alignment
FORMATnumberThe enumerated formatter for displaying the
property
ENABLEDvarchar2(1)Indicates if the tag is shown.
TYPEnumberIndicates datatype of tag.
1 = string
2 = ulong
3 = date
4 = uuid
5 = ipv4
DESCRIPTIONvarchar2(255)Textual description of the tag
DATE_CREATEDdateDate the entry was created
DATE_MODIFIEDdateDate the entry was modified
CREATED_BYnumberUser who created object
MODIFIED_BYnumberUser who last modified object
REF_CONFIGvarchar2(4000)Referential data configuration
Sentinel Database Views for Oracle85
7.1.38 ESEC_PORT_REFERENCE_RPT_V
This view references ESEC_PORT_REFERENCE table that stores industry standard assigned port
numbers.
This view references ESEC_SEQUENCE table that’s used to generate primary key sequence
numbers for Sentinel tables.
Column NameDatatypeComment
TABLE_NAMEvarchar2(32)Name of the table.
COLUMN_NAMEvarchar2(255)Name of the column
SEEDnumberCurrent value of primary key field.
DATE_CREATEDdateDate the entry was created
DATE_MODIFIEDdateDate the entry was modified
novdocx (en) 7 January 2010
CREATED_BYnumberUser who created object
MODIFIED_BYnumberUser who last modified object
7.1.41 ESEC_UUID_UUID_ASSOC_RPT_V
This view contains information about object relationships. Used internally by Sentinel and not for
reporting purposes.
Column NameDatatypeComment
OBJECT1varchar2(64)Object 1
ID1varchar2(36)UUID for object 1
OBJECT2varchar2(64)Object 2
ID2varchar2(36)UUID for object 2
DATE_CREATEDdateDate the entry was created
DATE_MODIFIEDdateDate the entry was modified
CREATED_BYnumber(38,0)User who created object
MODIFIED_BYnumber(38,0)User who last modified object
7.1.42 EVENTS_ALL_RPT_V (legacy view)
This view is provided for backward compatibility. View contains current and historical events
(events imported from archives).
Sentinel Database Views for Oracle87
7.1.43 EVENTS_ALL_RPT_V1 (legacy view)
This view is provided for backward compatibility. New reports should use EVENTS_RPT_V2.
View contains current events.
7.1.44 EVENTS_RPT_V (legacy view)
This view is provided for backward compatibility. New reports should use EVENTS_RPT_V2.
View contains current and historical events.
7.1.45 EVENTS_RPT_V1 (legacy view)
This view is provided for backward compatibility. New reports should use EVENT_ALL_RPT_V.
View contains current events.
7.1.46 EVENTS_RPT_V2
This is the primary reporting view for Sentinel 6.0. This view contains current event and historical
events. It is included for legacy reports but has been replaced in Sentinel 6.1 with
EVENTS_RPT_V3.
novdocx (en) 7 January 2010
Column NameDatatypeComment
EVENT_IDvarchar2(36)Event identifier
RESOURCE_NAMEvarchar2(255)Resource name
SUB_RESOURCEvarchar2(255)Subresource name
SEVERITYintegerEvent severity
EVENT_PARSE_TIMEdateEvent time
EVENT_DATETIMEdateEvent time
EVENT_DEVICE_TIMEdateEvent device time
SENTINEL_PROCESS_TIMEdateSentinel process time
BEGIN_TIMEdateEvents begin time
END_TIMEdateEvents end time
REPEAT_COUNTintegerEvents repeat count
DESTINATION_PORT_INTintegerDestination port (integer)
SOURCE_PORT_INTintegerSource port (integer)
BASE_MESSAGEvarchar2(4000)Base message
EVENT_NAMEvarchar2(255)Name of the event as reported by the
sensor
EVENT_TIMEvarchar2(255)Event time as reported by the sensor
SOURCE_IPintegerSource IP address in numeric format
SOURCE_IP_DOTTEDvarchar2(16)Source IP in dotted format
SOURCE_HOST_NAMEvarchar2(255)Source host name
SOURCE_PORTvarchar2(32)Source port
DESTINATION_IPintegerDestination IP address in numeric format
DESTINATION_IP_DOTTEDvarchar2(16)Destination in dotted format
DESTINATION_HOST_NAMEvarchar2(255)Destination host name
novdocx (en) 7 January 2010
DESTINATION_PORTvarchar2(32)Destination port
SOURCE_USER_NAMEvarchar2(255)Source user name
DESTINATION_USER_NAMEvarchar2(255)Destination user name
FILE_NAMEvarchar2(1000)File name
EXTENDED_INFOvarchar2(1000)Extended information
CUSTOM_TAG_1varchar2(255)Customer Tag 1
CUSTOM_TAG 2varchar2(255)Customer Tag 2
CUSTOM_TAG 3integerCustomer Tag 3
RESERVED_TAG_1varchar2(255)Reserved Tag 1
Reserved for future use by Novell. This
field is used for Advisor information
concerning attack descriptions.
RESERVED_TAG_2varchar2(255)Reserved for future use by Novell. Use of
this field for any other purpose might
result in data being overwritten by future
functionality.
RESERVED_TAG_3integerReserved for future use by Novell. Use of
this field for any other purpose might
result in data being overwritten by future
functionality.
VULNERABILITY_RATINGintegerVulnerability rating
CRITICALITY_RATINGintegerCriticality rating
DATE_CREATEDdateDate the entry was created
DATE_MODIFIEDdateDate the entry was modified
CREATED_BYintegerUser who created object
Sentinel Database Views for Oracle89
Column NameDatatypeComment
MODIFIED_BYintegerUser who last modified object
RV01 - 10integerReserved Value 1 - 10
Reserved for future use by Novell. Use of
this field for any other purpose might
result in data being overwritten by future
functionality.
RV11 - 20dateReserved Value 1 - 31
Reserved for future use by Novell. Use of
this field for any other purpose might
result in data being overwritten by future
functionality.
RV21 - 25varchar2(36)Reserved Value 21 - 25
Reserved for future use by Novell to store
UUIDs. Use of this field for any other
purpose might result in data being
overwritten by future functionality.
novdocx (en) 7 January 2010
RV26 - 31varchar2(255)Reserved Value 26 - 31
Reserved for future use by Novell. Use of
this field for any other purpose might
result in data being overwritten by future
functionality.
RV33varchar2(255)Reserved Value 33
Reserved for EventContex
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV34varchar2(255)Reserved Value 34
Reserved for SourceThreatLevel
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV35varchar2(255)Reserved Value 35
Reserved for SourceUserContext.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV36varchar2(255)Reserved Value 36
90Sentinel 6.1 Reference Guide
Reserved for DataContext.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
Column NameDatatypeComment
RV37varchar2(255)Reserved Value 37
Reserved for SourceFunction.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV38varchar2(255)Reserved Value 38
Reserved for SourceOperationalContext.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV40 - 43varchar2(255)Reserved Value 40 - 43
Reserved for future use by Novell. Use of
this field for any other purpose might
result in data being overwritten by future
functionality.
novdocx (en) 7 January 2010
RV44varchar2(255)Reserved Value 44
Reserved for DestinationThreatLevel.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV45varchar2(255)Reserved Value 45
Reserved for DestinationUserContext.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV46varchar2(255)Reserved Value 46
Reserved for VirusStatus.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV47varchar2(255)Reserved Value 47
Reserved for future use by Novell. Use of
this field for any other purpose might
result in
data being overwritten by future
functionality.
Sentinel Database Views for Oracle91
Column NameDatatypeComment
RV48varchar2(255)Reserved Value 48
Reserved for
DestinationOperationalContext.
Use of this field for any other purpose
might result in data being overwritten by
future functionality.
RV49varchar2(255)Reserved Value 49
Reserved for future use by Novell. Use of
this field for any other purpose might
result in data being overwritten by future
functionality.
TAXONOMY_IDinteger
REFERENCE_ID_01 - 20integerReserved for future use by Novell. Use of
this field for any other purpose might
result in data being overwritten by future
functionality.
novdocx (en) 7 January 2010
CV01 - 10integerCustom Value 1 - 10
Reserved for use by Customer, typically
for association of Business relevant data
CV11 - 20dateCustom Value 11 - 20
Reserved for use by Customer, typically
for association of Business relevant data
CV21 - 29varchar2(255)Custom Value 21 – 100
Reserved for use by Customer, typically
for association of Business relevant data
CV30 - 34varchar2(4000)
CV35 – 100varchar2(255)
7.1.47 EVENTS_RPT_V3
This is the primary reporting view for Sentinel 6.1. This view contains current event and historical
events. It is included for legacy reports.
Column NameDatatypeComment
EVENT_IDvarchar2(36)Event identifier
RESOURCE_NAMEvarchar2(255)
SUB_RESOURCEvarchar2(255)Subresource name
SEVERITYnumber(38,0)Event severity
EVENT_PARSE_TIMEdateEvent time
92Sentinel 6.1 Reference Guide
Column NameDatatypeComment
EVENT_DATETIMEdate
EVENT_DEVICE_TIMEdateEvent device time
SENTINEL_PROCESS_TIMEdateSentinel process time
BEGIN_TIMEdateEvents begin time
END_TIMEdateEvents end time
REPEAT_COUNTnumber(38,0)
TARGET_SERVICE_PORTnumber(38,0)Target service port
MODIFIED_BYnumber(38)User who last modified object
96Sentinel 6.1 Reference Guide
7.1.49 EVT_AGENT_RPT_V3
View references EVT_AGENT table that stores information about Collectors. The column names in
this view reflects the name change of Sensor to Observer. This view is designed for use in Sentinel