Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time,
without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims
any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc.,
reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to
notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the
trade laws of other countries. You agree to comply with all export control regulations and to obtain any required
licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on
the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws.
You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the
Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information on
exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export
approvals.
Novell, Inc., has intellectual property rights relating to technology embodied in the product that is described in this
document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S.
patents listed on the Novell Legal Patents Web page (http://www.novell.com/company/legal/patents/) and one or
more additional patents or pending patent applications in the U.S. and in other countries.
Novell, Inc.
404 Wyman Street, Suite 500
Waltham, MA 02451
U.S.A.
www.novell.com
Online Documentation: To access the latest online documentation for this and other Novell products, see
the Novell Documentation Web page (http://www.novell.com/documentation).
Novell Trademarks
For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/
trademarks/tmlist.html).
Third-Party Materials
All third-party trademarks are the property of their respective owners.
novdocx (en) 13 May 2009
novdocx (en) 13 May 2009
4Sentinel 6.1 Rapid Deployment User Guide
Contents
About This Guide17
1 Managing Sentinel 6.1 Rapid Deployment Through the Web Interface19
Novell® SentinelTM 6.1 Rapid Deployment is a security information and event management solution
that receives information from many sources throughout an enterprise, standardizes it, prioritizes it,
and presents it to you to make threat, risk, and policy-related decisions. This guide is divided into
the following sections:
Chapter 1, “Managing Sentinel 6.1 Rapid Deployment Through the Web Interface,” on page 19
Chapter 2, “Sentinel Control Center,” on page 41
Chapter 3, “Active Views Tab,” on page 53
Chapter 4, “Correlation Tab,” on page 83
Chapter 5, “Incidents Tab,” on page 109
Chapter 6, “iTRAC Workflows,” on page 123
Chapter 7, “Work Items,” on page 161
Chapter 8, “Analysis Tab,” on page 167
novdocx (en) 13 May 2009
Chapter 9, “Event Source Management,” on page 171
Chapter 10, “Administration,” on page 219
Chapter 11, “Sentinel Data Manager,” on page 267
Chapter 12, “Utilities,” on page 285
Chapter 13, “Quick Start,” on page 293
Chapter 14, “Solution Packs,” on page 311
Chapter 15, “Action Manager and Integrator,” on page 341
Chapter 17, “Advisor Usage and Maintenance,” on page 379
Appendix A, “Sentinel 6.1 Rapid Deployment Architecture,” on page 385
Appendix B, “System Events for Sentinel,” on page 413
Audience
This documentation is intended for information security professionals.
Feedback
We want to hear your comments and suggestions about this manual and the other documentation
included with this product. Please use the User Comments feature at the bottom of each page of the
online documentation or go to Novell Documentation Feedback (http://www.novell.com/
documentation/feedback.html) and enter your comments there.
Additional Documentation
Sentinel technical documentation includes several different volumes:
The Sentinel SDK site provides the details about developing Collectors (proprietary or
JavaScript*) and JavaScript correlation actions.
Documentation Conventions
In this documentation, a greater-than symbol (>) is used to separate actions within a step and items
within a cross-reference path.
novdocx (en) 13 May 2009
A trademark symbol (®, ™, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party
trademark.
When a single path name can be written with a backslash for some platforms or a forward slash for
other platforms, the path name is presented with forward slashes to reflect the Linux* convention.
®
Users of platforms that require a backslash, such as NetWare
, should use backlashes as required by
your software.
Contacting Novell
Novell Web site (http://www.novell.com)
Novell Support (http://support.novell.com/phone.html?sourceidint=suplnav4_phonesup)
This section discusses how to manage the services for Novell® SentinelTM by using the Sentinel Web
interface.
Section 1.1, “Accessing the Novell Sentinel Web Interface,” on page 19
Section 1.2, “Applications and Installers,” on page 19
Section 1.3, “Reporting,” on page 21
Section 1.4, “Searching Events,” on page 31
1.1 Accessing the Novell Sentinel Web Interface
Use the Novell Sentinel Web interface to manage, run, schedule, and search reports, launch the
Sentinel Control Center (SCC), the Sentinel Data Manager (SDM), and the Solution Designer, and
download the Collector Manager installer and the Client installer. You can also perform full-text
search on events by using the Web interface.
1 Open a Web browser to the following URL:
https://svrname.example.com: port/sentinel
Replace
192.168.1.1
svrname.example.com
) of the server where Sentinel is running.
with the actual DNS name or IP address (such as
1
IMPORTANT: The URL is case sensitive.
2 If you are prompted to verify the certificates, review the certificate information, then click Yes
if it is valid.
3 Specify the username and password for the Sentinel account you want to access.
4 Use the Languages drop-down list to specify which language you want to use.
This is typically the same language as the language code of the Sentinel server and your local
computer. Make sure to configure your browser's Languages setting to support the desired
language.
5 Click Sign in.
1.2 Applications and Installers
Click Applications in the left panel of the Novell Sentinel 6.1 Rapid Deployment Web interface to
download the Sentinel components.
Managing Sentinel 6.1 Rapid Deployment Through the Web Interface
19
Figure 1-1 We bS ta rt
novdocx (en) 13 May 2009
Table 1-1 Downloading Options
OptionsDescriptionAction
The Sentinel Control
Center (SCC)
The Sentinel Control Center
allows you monitor, configure,
and control most features of
1. Click Launch Control Center.
2. Open SCC with the Java* Web Start
the Sentinel system.
3. Specify the user credentials and click Login.
The SCC interface helps you
manage and monitor the
security information received
from different network
resources. It creates and
deploys rules to detect
suspicious or malicious
patterns of events, provides
real-time indication of attacks
and related risks, and
manages and monitors
connections between
Sentinel and its event
sources.
Launcher.
20Sentinel 6.1 Rapid Deployment User Guide
OptionsDescriptionAction
novdocx (en) 13 May 2009
The Sentinel Data
Manager (SDM)
The Solution Designer
Collector Manager
Installer
Client InstallerThe Client Installer allows
The Sentinel Data Manager
allows you manage the
Sentinel database.
You can monitor database
space utilization, view and
manage database partitions,
configure auto-archives, and
configure auto-addition of
partitions.
The Collector Manager
Installer allows you install the
Sentinel Collector Manager
on any machine where you
want to forward the events
from.
you install the Sentinel
Control Center, Sentinel
Collector Builder, Sentinel
Solution Designer, and
Sentinel Data Manager on
any client machine.
1. Click Launch Data Manager.
2. Open SDM with the Java Web Start
Launcher.
3. Specify the server, database, host, and port
number.
4. Specify the user credentials and click
Connect.
Click download Collector Manager installer and
follow the on-screen instructions.
Click download Client installer and follow the onscreen instructions.
1.3 Reporting
You can upload, run, view, and delete reports or report definitions by using the Sentinel 6.1 Rapid
Deployment Web interface. You can run a report by using the desired parameters (such as start and
end date) as given in the report definition. The report results are saved with a name of your choice.
After the report runs, you can retrieve the results and view them as a PDF file.
Reports are organized by category.
Section 1.3.1, “Running Reports,” on page 21
Section 1.3.2, “Viewing Reports,” on page 24
Section 1.3.3, “Scheduling a Report,” on page 26
Section 1.3.4, “Managing Reports,” on page 27
1.3.1 Running Reports
Sentinel 6.1 Rapid Deployment is installed with a set of reports organized into several product
categories. Reports run asynchronously, so you can continue to do other things in the application
while the report is running. You can view the PDF report results after the report finishes running.
Many report definitions include parameters. You are prompted to set them before running the
reports. Depending on how the report developer designed the report, the report parameters can be
text, numbers, Boolean values, or dates. A parameter might have a default value or a list based on
values in the Sentinel RD database.
Managing Sentinel 6.1 Rapid Deployment Through the Web Interface21
IMPORTANT: If a report in progress is canceled by using the Cancel link, the query on the
database is canceled.
Manually Running a Report
1 Click Reports to display the available reports.
novdocx (en) 13 May 2009
2 If desired, click a report definition to expand it. If you see a Sample Report link, you can click
View to find out how the completed report looks with a set of sample data.
3 Select the report you want to run and click Run.
4 Specify the following:
The report parameters are specific to the report definition. Therefore, the report parameters
might vary based on the report definition you select.
22Sentinel 6.1 Rapid Deployment User Guide
Report ParametersDescription
Run OptionSet the schedule for running the report. If you want the report to
run later, you must also enter a start time.
Now: This is the default. It runs the report immediately.
Once: Runs the report once at the specified date and time.
Daily: Runs the report once a day at the specified time.
Weekly: Runs the report once a week on the same day at
the specified time.
Monthly: Runs the report on the same day of the month
every month, starting at the specified date and time. For
example, if the start date and time is October 28 at 2:00 p.m,
the report will run on the 28th day of the month at 2:00 p.m
every month.
All time settings are based on the browser’s local time.
NameSpecify a name to identify the report results.
novdocx (en) 13 May 2009
Because the username and time are also used to identify the
report results, the report name does not need to be unique.
LanguageChoose the language in which the report labels and descriptions
should be displayed (English, French, German, Italian, Japanese,
Traditional Chinese, Simplified Chinese, Spanish, or Portuguese).
The data in the report is displayed in whatever language was
originally used by the event source.
Date RangeIf the report includes time period parameters, choose the date
range. You can also set start and end dates for all the time
periods. All time periods are based on the local time for the
browser.
Current Day: Shows events from midnight of the current
day until 11:59 p.m of the current day. If the current time is 8
a.m, the report shows 8 hours of data.
Previous Day: Shows events from midnight yesterday until
11:59 p.m yesterday.
Week To Date: Shows events from midnight Sunday of the
current week until the end of the current day.
Previous Week: Shows seven days of events, from
midnight Sunday of the previous week until 11:59 p.m
Saturday of the previous week
Month to Date: Shows events from midnight the first day of
the current month until the end of the current day.
Previous Month: Shows a month of events, from midnight
of the first day of the previous month until 11:59 p.m of the
last day of the previous month
Custom Date Range: For this setting only, you also need to
set a start date and end date below.
From Date and To DateSet the start date (From Date) and the end date (To Date) for the
report.
Managing Sentinel 6.1 Rapid Deployment Through the Web Interface23
Report ParametersDescription
MinSevSpecify the minimum severity of events to be included in the
report. The range is 0-5.
MaxSevSpecify the maximum severity of events to be included in the
report. The range is 0-5.
Email Report ToIf the report should be mailed to a user or users, specify their e-
mail addresses, separated by commas.
To enable mailing reports, the administrator must configure the
mail relay under Rules > Configuration.
5 Click Run.
A report results entry is created and mailed to the designated recipients.
1.3.2 Viewing Reports
You can view the reports for different applications in the Sentinel Rapid Deployment Web interface
for reports. The report GUI by default shows up to 10 report results for any given report definition.
The 10 report results displayed are the 10 most recent report results for that report definition.
novdocx (en) 13 May 2009
If there are more than 10 report results for any given report definition (that is, the report has been run
more than 10 times), a Show all x reports link is displayed after the 10th report, where x is the total
number of results available for that given report definition.
1 To view the list of report results, click View.
All previously run reports are shown with the user-defined report name, the user who ran them,
and the time the report was run.
IMPORTANT: The default number of report results to be displayed for each report definition
is managed by the
this value, ensure that you restart the das_core to apply the changes.
24Sentinel 6.1 Rapid Deployment User Guide
novdocx (en) 13 May 2009
2 Click show parameters to see the exact values used to run the report.
For Date Range, D=Current Day, PD=Previous Day, W=Week To Date, PW=Previous
Week, M=Month To Date, PM=Previous Month, and DR=Custom Date Range.
For Language, en=English, fr=French, de=German, it=Italian, ja=Japanese, pt=Brazilian
Portuguese, es=Spanish, zh=Simplified Chinese, and zh_TW=Traditional Chinese.
3 Click View for the report results you want to see. The report results are displayed in a new
window in .
pdf
format.
Managing Sentinel 6.1 Rapid Deployment Through the Web Interface25
novdocx (en) 13 May 2009
TIP: Report results are organized from newest to oldest.
1.3.3 Scheduling a Report
When you run a report, you can run the report immediately or schedule it to be run later, either once
or on a recurring basis. For scheduled reports, you must choose a frequency and enter a time at
which the report should run.
Now: This is the default. It runs the report immediately.
Once: Runs the report once at the specified date and time.
Daily: Runs the report once a day at the specified time.
Weekly: Runs the report once a week on the same day at the specified time.
Monthly: Runs the report on the same day of the month every month, starting at the specified
date and time. For example, if the start date and time is October 28 at 2:00 p.m, the report runs
on the 28th day of the month at 2:00 p.m.every month.
NOTE: All time settings are based on the browser’s local time.
26Sentinel 6.1 Rapid Deployment User Guide
Figure 1-2 Scheduled Reports
novdocx (en) 13 May 2009
Report schedules can be removed or modified by using the Delete and Edit links.
1.3.4 Managing Reports
Sentinel Rapid Deployment users can add, delete, update, and schedule reports.
“Adding Reports” on page 27
“Creating New Reports” on page 29
“Renaming Report Results” on page 29
“Deleting Reports and Report Definitions” on page 29
“Updating Report Definitions” on page 31
Adding Reports
Any user can add or update reports in Sentinel 6.1 Rapid Deployment.
“Downloading New or Updated Reports” on page 27
“Adding New Reports” on page 27
Downloading New or Updated Reports
New or updated reports by Novell can be downloaded from the Novell Content Web site (http://
Sentinel Rapid Deployment comes preloaded with reports, but new report plug-ins (special .
files that include the report definition plus metadata) can be uploaded into Sentinel 6.1 Rapid
Deployment. If there are no reports in the system, the following screen displays:
Managing Sentinel 6.1 Rapid Deployment Through the Web Interface27
zip
Figure 1-3 No Reports Loaded
To add a report:
1 Click the Reports button on the left side of the screen.
2 Click the Upload Report button.
novdocx (en) 13 May 2009
3 Browse and select the report plug-in .
zip
file on your local machine.
4 Click Open.
5 Click Save.
6 If the same report already exists in the report repository (based on the report’s unique ID),
decide whether to replace the existing report.
Sentinel Rapid Deployment displays the details of both the report in the system and the one
being imported. In the example below, the imported report is the same version as the existing
report.
28Sentinel 6.1 Rapid Deployment User Guide
The new report definition is added to the list in alphabetical order and can be run immediately, if
desired.
Creating New Reports
Users can modify or write reports by using JasperForge iReport. a graphical report designer for
JasperReports. iReport is an open source report development tool that is available for download
from JasperForge.org (http://jasperforge.org/plugins/project/project_home.php?group_id=83) (as of
the time of this publication).
New or modified reports can include additional database fields that are not presented in the Sentinel
Rapid Deployment Web interface. They must adhere to the file and format requirements of the
report plug-ins. For more information about database fields and file and format requirements for
report plug-ins, see the Sentinel SDK Web site (http://developer.novell.com/wiki/
index.php?title=Develop_to_Sentinel).
Renaming Report Results
Report results (but not report definitions) can be renamed in the interface.
novdocx (en) 13 May 2009
1 Click the Reports button on the left side of the screen.
2 Click a report name to expand it.
3 Click the name of the report results you want to rename.
4 Specify the new name.
5 Click Rename.
Deleting Reports and Report Definitions
“Deleting Report Definitions” on page 29
“Deleting Report Results” on page 30
Deleting Report Definitions
You can delete either a set of report results or a report definition by using the button at the right
side of the report definition. If a report definition is deleted, all associated report results are also
deleted.
IMPORTANT: Only the users with Manage Reports permissions can delete the report definitions.
For more information on permissions, see “Reporting” in the Sentinel 6.1 Rapid Deployment
Reference Guide.
Managing Sentinel 6.1 Rapid Deployment Through the Web Interface29
Deleting Report Results
There are two ways to delete report results.
Delete a single report by using the button at the right side of the report result.
IMPORTANT: Users with the Run/View Reports or Manage Reports permission can delete
the report results. For more information on permissions, see “Reporting” in the Sentinel 6.1
Rapid Deployment Reference Guide.
Delete multiple report results by using the option at the bottom right side of the
report results for each report definition.
NOTE: If the number of report results you have created for a report definition is less than or
equal to the default value, you need to use the button to delete each report result.
However, you can change the default value by editing the following property of the
After you modify this property value, restart the Sentinel services to apply the changes.
Using the Multi-delete Option
The option is displayed only if:
You have either Run/View Reports or Manage Reports permissions.
The number of report results created for a report definition is higher than the default value
specified in the Jasper Reporting component.
1 Click the Multi-delete option to:
Expand the Multi-delete panel to list Select all and delete reports options.
Display a check box next to each report result.
2 Select the report results for deletion.
You can also use the select all or unselect all options from the Multi-delete options panel.
3 Click delete # reports to delete the selected report results, where # is the number of report result
selected for deletion.
For example, if you select 3 reports for deletion, a delete 3 reports option displays under Multi-
delete panel. Click delete 3 reports to delete all the selected reports. Click Select all and select
delete reports to remove all the reports for a selected report definition.
Click cancel to remove the Multi-delete panel and the check boxes for all the report results.
30Sentinel 6.1 Rapid Deployment User Guide
Figure 1-4 Multi-delete
novdocx (en) 13 May 2009
Updating Report Definitions
Users can upload updated reports to replace an existing report. For more information, see “Adding
Reports” on page 27.
1.4 Searching Events
Novell Sentinel Rapid Deployment provides the ability to perform a search events. The search
includes all online data currently in the database, but internal events generated by the Sentinel
system are excluded unless you select Include System Events. By default, events are sorted based on
the search engine’s relevancy algorithm.
Basic event information includes event name, source, time, severity, information about the initiator
(represented by an arrow icon), and information about the target (represented by a bull’s-eye icon).
1.4.1 Running an Event Search
You can run simple and advanced searches.
“Basic Search” on page 32
“Advanced Search” on page 33
Managing Sentinel 6.1 Rapid Deployment Through the Web Interface31
Basic Search
A basic search runs against all of the event fields in Table 1-2 on page 37. Some sample basic
searches include the following:
root
127.0.0.1
Lock*
driverset0
NOTE: If time is not synchronized between the end user machine and the Sentinel Rapid
Deployment server (for example, one machine is 25 minutes behind), you might get unexpected
results from your search. Searches such as Last 1 hour or Last 24 hours are based on the end user’s
machine time.
1 Click the Search link on the left.
Sentinel Rapid Deployment is configured to run a default search for non-system events with
severity 3 to 5 the first time you the Search link. Otherwise, it defaults to the last search term
you entered.
novdocx (en) 13 May 2009
2 For a different search, type a search term in the search field (for example,
not case sensitive.
3 Select a time period for which the search should be performed. Most of the time settings are
self-explanatory, and the default is Last 30 Days.
Custom allows you to select a start date and time and an end date and time for the query.
The start date must be before the end date, and the time is based on the browser’s local
time.
All time searches all the data in the database.
4 Select Include System Events to include events that are generated by Sentinel Rapid
Deployment system operations.
5 Select Sort By Time to arrange data with the most recent events at the beginning.
Sorting by time takes longer than sorting by relevance, which is the default.
6 Click Search.
All fields in the index are searched for the specified text. A spinning icon indicates that the
search is taking place.
32Sentinel 6.1 Rapid Deployment User Guide
admin
). The search is
The event summaries are displayed.
Advanced Search
An advanced search can search for a value in a specific event field or fields. The advanced search
criteria are based on the short names for each event field and the search logic for the index. To view
the field names and descriptions, the short names that are used in advanced searches, and whether
the fields are visible in the basic and detailed event views, see Table 1-2 on page 37.
To search for a value in a specific field, use the short name of the field, a colon, and the value. For
example, to search for an authentication attempt to Sentinel RD by user2, use the following text in
the search field:
evt:authentication AND sun:user2
Other advanced searches might include:
novdocx (en) 13 May 2009
pn:NMAS AND sev:5
sip:123.45.67.89 AND evt:“Set Password”
Figure 1-5 Advanced Search Example
Multiple advanced search criteria can be combined by using the following Boolean operators:
AND (must be capitalized)
OR (must be capitalized)
NOT (must be capitalized and cannot be used as the only search criterion)
+
-
Managing Sentinel 6.1 Rapid Deployment Through the Web Interface33
Special characters must be escaped by using a \ symbol:
+ - && || ! ( ) { } [ ] ^ " ~ * ? : \
The advanced search criteria are modeled on the search criteria for the Apache* Lucene* open
source package. More detail about the search criteria is available on the Web: Lucene Query Parser
Searches return a set of events. Users can view basic or detailed event information and configure the
number of results per page. Search results are returned in batches. The default batch size is 25
results, but this is easily configured.
When results are sorted by relevance, only the top 100,000 events can be viewed. When they are
sorted by time, this limitation does not exist.
“Basic Event View” on page 34
“Event View with Details” on page 35
“Refining Search Results” on page 35
novdocx (en) 13 May 2009
Basic Event View
The information in each event is grouped into initiator information and target information. If data
isn’t available for a particular event field, the fields are labeled Unknown.
Figure 1-6 Basic Event View
Occasionally, the search engine might index events faster than they are inserted into the database. If
you run a search that returns events that have not been inserted into the database, you get a message
that some events match the search query but could not be found in the database. If you run the search
again later, the events are usually in the database and the search is successful.
34Sentinel 6.1 Rapid Deployment User Guide
Figure 1-7 Events Indexed but Not Yet in Database
novdocx (en) 13 May 2009
Event View with Details
You can view additional details about any event or events by clicking the details link on the right
side of the page.The details for all events on a page can be expanded or collapsed by using the all details ++ or details-- link. This preference is retained as you scan through multiple pages of results
or execute new searches.
Figure 1-8 Event View
The event in Figure 1-8 shows the same event as in Figure 1-6 on page 34, but with an expanded
view that shows additional data fields that might have been populated.
Refining Search Results
After viewing the results of a search, it might be necessary to refine the search results and add
additional search criteria. For example, you might see one initiator user’s name appear several times
in the search results and want to see more events from that initiator.
To filter the search results using a specific value appearing in the search results:
1 Identify the desired filter criteria in the search results.
2 Click the value (for example, target hostname test 1900) by which you want to filter the results.
Managing Sentinel 6.1 Rapid Deployment Through the Web Interface35
novdocx (en) 13 May 2009
TIP: This adds the value to your filter with an AND operator. To add the value to your filter
with an NOT operator, press the Alt key as you click the value.
3 Click Search.
Some fields cannot be selected to refine a search this way:
EventTime
Message
Any field related to the Reporter
Any field related to the Observer
Any field related to TargetTrust
Any field with a value
36Sentinel 6.1 Rapid Deployment User Guide
Unknown
1.4.3 Event Fields
Each event has fields that might or might not be populated, depending on the specific event. The
values for these event fields can be viewed by using a search or running a report. Each field has a
short name that is used in advanced searches. The values for most of these fields are visible in the
detailed event view; other values are also visible in the basic event view.
Table 1-2 Event Fields
novdocx (en) 13 May 2009
Field
SeveritysevNormalized severity of the event on a scale
EventTimedtTime stamp of the event. Can be the
EventNameevtShort name of the event.XX
MessagemsgDetailed event message.InvisibleX
ProductNamepnProduct that generated the event; the
InitUserNamesunUsername of the user who initiated the
InitUserIDiuidUser ID of the user who initiated the event,
Short
Description
Name
of 0 (informational) to 5 (critical).
Sentinel Rapid Deployment server time
stamp or the time stamp from the original
event source (if trust event time is
enabled).
event source.
Displayed after the event name.
event.
based on the raw data reported by the
device.
Visible in
Basic View
XX
XX
XX
XX
InvisibleX
Visible in
Detailed
View
InitUserDomainrv35Domain of the user who initiated the event.
Searchable but not displayed in either
event view.
InitHostNameshnHostname of the machine from which the
event initiated.
InitHostDomainrv42Domain of the machine from which the
event initiated.
InitIPsipIP address of the machine from which the
event initiated.
InitServicePortspint Port number from which the event initiated
(for example, HTTP)
InitServicePortNamespType of port from which the event initiated
(for example, HTTP).
TargetUserNamedunUsername of the user who was the target
of the event.
Managing Sentinel 6.1 Rapid Deployment Through the Web Interface37
InvisibleInvisible
XX
XX
InvisibleX
InvisibleX
InvisibleX
XX
novdocx (en) 13 May 2009
Field
Short
Name
Description
TargetUserIDtuidUser ID of the user who was the target of
the event, based on the raw data reported
by the device.
TargetUserDomainrv45Domain of the user who was the target of
the event.
Searchable but not displayed in either
event view.
TargetHostNamedhnHostname of the machine that was the
target of the event.
TargetHostDomainrv41Domain of the machine that was the target
of the event.
TargetIPdipIP address of the machine that was the
target of the event.
TargetServicePortdpint Port number that was the target of the
event (for example, 80).
TargetServicePortName dpType of port that was the target of the event
(for example, HTTP).
Visible in
Basic View
Visible in
Detailed
View
InvisibleX
InvisibleX
XX
XX
InvisibleX
InvisibleX
InvisibleX
TargetTrustNamettnRole of the user that was a target of the
event (for example, FinanceAdmin).
Searchable but not displayed in either
event view.
TargetTrustIDttidNumerical ID representing the role of the
user that was a target of the event.
Searchable but not displayed in either
event view.
TargetTrustDomainttdDomain (namespace) within which the
target trust exists.
Searchable but not displayed in either
event view.
EffectiveUserNameeunameName of the user that the InitUser is
impersonating (
root
using su, for
example); follows Initiator Username (Initiator User ID) as in the detailed event
view.
EffectiveUserIDeuidNumerical ID of the user that the InitUser is
impersonating (
root
using su, for
example), based on the raw data reported
by the device.
InvisibleInvisible
InvisibleInvisible
InvisibleInvisible
InvisibleX
InvisibleX
38Sentinel 6.1 Rapid Deployment User Guide
novdocx (en) 13 May 2009
Field
Short
Name
Description
ObserverHostNamesnHostname of the machine that forwarded
the event to the security information event
management system (for example, the
hostname of a syslog server).
Searchable but not displayed in either
event view.
ObserverHostDomainobsdomDomain of the machine that forwarded the
event to the security information event
management system (for example, the
domain of a syslog server).
Searchable but not displayed in either
event view.
ObserverIPobsip IP address of the machine that forwarded
the event to the security information event
management system (for example, the IP
address of a syslog server).
Searchable but not displayed in either
event view.
ReporterHostNamernHostname of the machine that reported the
event to an observer.
Visible in
Basic View
Visible in
Detailed
View
InvisibleInvisible
InvisibleInvisible
InvisibleInvisible
InvisibleInvisible
Searchable but not displayed in either
event view.
ReporterHostDomainrepdomDomain of the machine that reported the
event to an observer.
Searchable but not displayed in either
event view.
ReporterIPrepip IP address of the machine that reported the
event to an observer.
Searchable but not displayed in either
event view.
SensorTypestThe single character designator for the
sensor type (N=network, H=host,
O=operating system, A and I=Sentinel
Rapid Deployment auditing events,
P=Sentinel RDSentinel Rapid Deployment
performance events).
Searchable but not displayed in either
event view.
DataName/FilenamefnData object name reported in the event (for
example, the file name or database table
name).
InvisibleInvisible
InvisibleInvisible
InvisibleInvisible
InvisibleX
Managing Sentinel 6.1 Rapid Deployment Through the Web Interface39
novdocx (en) 13 May 2009
Field
DataContextrv36Container for the FileName data object (for
TaxonomyLevel1rv50Target classification for event. Displayed
TaxonomyLevel2rv51Subtarget classification for the event.
TaxonomyLevel3rv52Action information for the event. Displayed
TaxonomyLevel4rv53Detail information for the event. Displayed
Short
Description
Name
example, a directory for a file or a database
instance for a database table)
Some fields are tokenized. Tokenizing the fields makes it possible to search for an individual word
in the field without a wildcard. The fields are tokenized based on spaces and other special
characters. For these fields, articles such as “a” or “the” are removed from the search index.
EventName
Message
ProductName
FileName
DataContext
TaxonomyLevel1
TaxonomyLevel2
TaxonomyLevel3
TaxonomyLevel4
40Sentinel 6.1 Rapid Deployment User Guide
2
Sentinel Control Center
Novell® SentinelTM gathers and correlates security and non-security information from across an
organization's networked infrastructure, as well as third-party systems, devices, and applications.
Sentinel presents the collected data in an richly functional interface, identifies security or
compliance issues, and tracks remediation activities, streamlining previously error-prone processes
and building a more rigorous and secure management program. The Sentinel Control Center (SCC)
is the main user interface for viewing and interacting with this data.
Section 2.1, “Log In to the Sentinel Control Center,” on page 41
Section 2.2, “About Sentinel Control Center,” on page 42
Section 2.3, “Introduction to the User Interface,” on page 45
2.1 Log In to the Sentinel Control Center
Section 2.1.1, “Linux,” on page 41
novdocx (en) 13 May 2009
2
Section 2.1.2, “Windows,” on page 41
2.1.1 Linux
1 As the Sentinel Administrator (admin), change directory to:
<Install_directory>/bin
2 Run the following command:
./control_center.sh
3 Specify your username and password, then click OK.
A Certificate window displays.
4 Select Accept, if you want this message to display every time you start Sentinel on your system.
To avoid this, you can select Accept Permanently.
2.1.2 Windows
1 Perform either of the following:
Go to Start > Programs > Sentinel and select Sentinel Control Center. The Sentinel Login
window displays.
Click Applications in the left panel of the Novell Sentinel 6.1 Rapid Deployment Web
interface, then click Launch Control Center:
Sentinel Control Center
41
2 Specify your username and password.
novdocx (en) 13 May 2009
3 Click Login.
On the first login, the following warning message displays. You must accept the certificate in
order to securely log in to the Sentinel Control Center
4 Select Accept, if you want this message to display every time you start Sentinel on your system.
To avoid this, you can select Accept Permanently.
2.2 About Sentinel Control Center
The Sentinel Control Center includes the following functional tabs and interfaces:
Section 2.2.1, “Active Views,” on page 43
Section 2.2.2, “Incidents,” on page 43
Section 2.2.3, “iTRAC,” on page 43
42Sentinel 6.1 Rapid Deployment User Guide
Section 2.2.4, “Analysis,” on page 44
Section 2.2.5, “Admin,” on page 44
Section 2.2.6, “Correlation,” on page 44
Section 2.2.7, “Event Source Management,” on page 44
Section 2.2.8, “Solution Packs,” on page 45
Section 2.2.9, “Identity Integration,” on page 45
2.2.1 Active Views
The Active Views tab presents events in near-real time.
In the Active Views tab, you can:
View events occurring in near-real time
Investigate events
Graph events
Perform historical queries to collect data for a specified period
novdocx (en) 13 May 2009
Invoke right-click functions
Initiate manual incidents and remediation workflows
2.2.2 Incidents
An incident is a set of events that require attention (for example, a possible attack). Incidents
centralize the data and are typically made up of a correlated event, the associated events that
triggered a correlation rule, asset details of the affected systems, vulnerability state of the affected
systems, and any remediation information, if known. Incidents can be associated with a remediation
TM
workflow in iTRAC
, if specified. An incident associated to an iTRAC workflow allows users to
track the remediation state of the incident.
In the Incidents tab, you can:
Manage incident views
View and manage incidents and their associated data
Switch between existing incident views
2.2.3 iTRAC
The iTRAC stateful incident remediation workflow capability allows you to incorporate your
organization’s incident response processes into Sentinel.
In the iTRAC tab, you can:
Create custom workflow templates
Edit workflow templates
Create custom activities
Edit activities
Sentinel Control Center43
Associate activities with workflow steps
Initiate and execute processes
2.2.4 Analysis
The Analysis tab is used to run and save an offline query for later quick retrieval of search results.
2.2.5 Admin
The Admin tab provides you access to perform the administrative actions and configuration settings
in Sentinel. In the Admin tab, you can:
Create and modify filters
Use filters to format data
Use filters to determine event routing
View system statistics about the Data Access Service
Start and stop system components
Configure Sentinel event fields
Configure the mapping service
novdocx (en) 13 May 2009
Create new options for right-click event menus
Aggregate data for reporting
Create users and assign them to roles for workflows
Manage user sessions
2.2.6 Correlation
The Correlation tab provides an interface to create and deploy rules to detect suspicious or
malicious patterns of events.
In the Correlation tab, you can:
Create and edit rules
Deploy/undeploy rules
Add an action and associate it to a rule
Configure dynamic lists
2.2.7 Event Source Management
The Event Source Management (ESM) interface is available through the Sentinel Control Center
menu. It allows you to manage and monitor connections between Sentinel and its event sources by
using Sentinel Connectors and Sentinel Collectors.
In the ESM, you can:
Import/export Connectors and Collectors from and to the centralized repository available in
ESM
44Sentinel 6.1 Rapid Deployment User Guide
Add/edit connections to event sources through the configuration wizards
View the real-time status of the connections to event sources
Monitor data flowing through the Collectors and Connectors
Sentinel Collectors
The Collectors parse the data and deliver a richer event stream by injecting taxonomy, exploit
detection, and business relevance into the data stream before events are correlated and analyzed and
sent to the database.
Sentinel Connectors
The Connectors use industry standard methods to connect to the data source to get raw data.
2.2.8 Solution Packs
You can use the Solution Packs interface through the To ol s menu in the Sentinel Control Center.
Solution Packs provide a framework within which sets of content can be packaged into controls,
each of which is designed to enforce a specific business or technical policy.
novdocx (en) 13 May 2009
2.2.9 Identity Integration
The Sentinel integration framework for identity management systems provides functionality on
several levels. When identity integration is implemented, you can:
Look up the following information about a user from the Identity Browser:
Contact information
Accounts associated with that user
Most recent authentication events
Most recent access events
Most recent permissions changes
Look up user information by right-clicking an event
2.3 Introduction to the User Interface
In the Sentinel Control Center user interface, you can perform the activities through the following
components:
Section 2.3.1, “Menu Bar,” on page 46
Section 2.3.2, “Toolbar,” on page 46
Section 2.3.3, “Tabs,” on page 48
Section 2.3.4, “Frames,” on page 48
Sentinel Control Center provides you the “dockable” framework, which allows you to move the
toolbars, tabs or frames from their default location to user-specific locations for ease of use.
Sentinel Control Center45
Figure 2-1 Sentinel Control Center
novdocx (en) 13 May 2009
2.3.1 Menu Bar
The menu bar has the menus required to navigate, perform activities, and change the appearance of
the Sentinel Control Center.
Figure 2-2 Menu Bar
The File, Options, Event Source Management, Windows, and Help menus are always available. The
availability of other menus depends on your location in the console and the permissions you have.
2.3.2 Toolbar
The toolbar allows you to perform tab-specific functions. There are four system-wide toolbar
buttons that are always displayed: View Sentinel Help, Cascade All Display Windows, Tile All Display Windows, and Save User Preferences. The availability of other toolbar buttons depends on
your location in the console and the permissions you have.
“System-Wide Toolbar” on page 47
“Tab-Specific Toolbar Buttons” on page 47
46Sentinel 6.1 Rapid Deployment User Guide
System-Wide Toolbar
The system-wide toolbar buttons are:
Figure 2-3 Toolbar Buttons
Tab-Specific Toolbar Buttons
Tab-specific toolbar buttons allows you to perform the functions related to each tab.
Table 2-1 Tab-Specific Toolbar Buttons
Too lbarView
novdocx (en) 13 May 2009
Active Views
Correlation
Incidents
iTRAC
Analysis
Admin
For more information on tab-specific toolbar buttons, see the sections on each of the tabs listed in
Section 2.3.3, “Tabs,” on page 48.
Sentinel Control Center47
2.3.3 Tabs
Depending on your access permissions, Sentinel Control Center displays the following tabs.
Active Views tab. For more information, see Chapter 3, “Active Views Tab,” on page 53
Correlation tab. For more information, see Chapter 4, “Correlation Tab,” on page 83
Incidents tab. For more information, see Chapter 5, “Incidents Tab,” on page 109
iTRAC tab. For more information, see Chapter 6, “iTRAC Workflows,” on page 123
Analysis tab. For more information, see Chapter 8, “Analysis Tab,” on page 167
Admin tab. For more information, see Chapter 10, “Administration,” on page 219
2.3.4 Frames
Sentinel provides a dockable framework that allows you to drag frames on the screen to place them
in your preferred locations. The following buttons allow you to drag and/ hide frames.
Toggle Floating
Toggle Auto-hide
novdocx (en) 13 May 2009
Figure 2-4 Navigator Frame
To drag a frame to any location:
1 Click the Toggle Floating icon on the frame or hold the frame and drag it to the desired
location.
To hide a frame:
1 Click the Toggle Auto-hide icon.
NOTE: You can undo dragging or reset the framework to the default position by using the toolbar
buttons.
2.3.5 Using the Sentinel Control Center to Navigate
To navigate by using the toolbar:
1 Click the tab you need to use.
2 Click toolbar buttons to perform the actions.
To navigate by using the menu bar:
1 Click the tab menu in the menu bar.
2 Select an action you need to perform.
48Sentinel 6.1 Rapid Deployment User Guide
NOTE: This procedure is generic for all the tabs in the Sentinel Control Center. Navigation
procedures for tabs are discussed in the relevant sections.
2.3.6 Changing the Appearance of the Sentinel Control Center
You can change the Sentinel Control Center’s look by:
“Setting the Tab Position” on page 49
“Cascading Windows” on page 49
“Tiling Windows” on page 49
“Minimizing Windows” on page 49
“Restoring Windows to Original Size” on page 49
“Closing all Open Windows” on page 49
Setting the Tab Position
1 Click Options > Tab Placement.
2 Select either Top or
Bottom
.
novdocx (en) 13 May 2009
Cascading Windows
1 Click Windows > Cascade All. All open windows in the right panel cascade.
Tiling Windows
1 Click Windows > Tile All.
2 Select from the following options:
Tile Best Fit
Tile Vertical
Tile Horizontal
Minimizing Windows
1 Click Windows > Minimize All. All open windows in the right panel minimize.
Restoring Windows to Original Size
1 Click Windows > Restore All. All open windows in the right panel are restored to their original
size.
NOTE: Use the Minimize and Restore options provided on the top right corner of the tab to
minimize individual tabs.
Closing all Open Windows
1 Click Windows > Close All.
Sentinel Control Center49
2.3.7 Saving User Preferences
If the user has permissions to save the workspace, they can save the following preferences:
Permanent windows that are not dependent on data that was available at the time of their
original creation.
Active Views
Summary displays
Window positions
Window sizes, including the application window
Tab positions
Navigator docked or floating and showing or hidden
The following preferences are not saved when the user logs out:
Snapshots
Historical event queries
TM
novdocx (en) 13 May 2009
Secondary windows opened from one of the primary windows in the Admin Navigator
Column widths in Active Views
To save your preferences:
1 Click File > Save Preferences or click
2.3.8 Changing Password
1 Click Options > Change Password.
2 Provide the old password.
3 Provide the new password and confirm it.
4 Click OK.
For more information on password security, see the Sentinel 6.1 Rapid Deployment Reference
Guide.
2.3.9 Configuring the Attachment Viewer
1 On the Tools menu, click Attachment Viewer Configuration or alternatively click the Configure
Attachment Viewers button. The Attachment Viewer Configuration window displays.
50Sentinel 6.1 Rapid Deployment User Guide
novdocx (en) 13 May 2009
2 Click Add. The Attachment Identification window displays.
Specify the extension type (such as
.doc, .xls, .txt, .html
type in the application program to launch the file type (such as
3 Click OK.
and so on) and click Browse or
notepad.exe
for Notepad).
Sentinel Control Center51
novdocx (en) 13 May 2009
52Sentinel 6.1 Rapid Deployment User Guide
3
Active Views Tab
The Active Views tab presents events in near-real time.
Section 3.1, “Understanding Active Views,” on page 53
Section 3.2, “Introduction to the User Interface,” on page 54
Section 3.3, “Reconfiguring Total Display Time,” on page 57
Section 3.4, “Viewing Real-Time Events,” on page 57
Section 3.5, “Showing and Hiding Event Details,” on page 61
Section 3.6, “Sending Mail Messages about Events and Incidents,” on page 62
Section 3.7, “Creating Incidents,” on page 63
Section 3.8, “Viewing Events That Trigger Correlated Events,” on page 64
Section 3.9, “Investigating an Event or Events,” on page 65
Section 3.10, “Viewing Advisor Data,” on page 70
Section 3.11, “Viewing Asset Data,” on page 71
novdocx (en) 13 May 2009
3
Section 3.12, “Viewing Vulnerabilities,” on page 72
Section 3.13, “Ticketing System Integration,” on page 77
Section 3.14, “Viewing User Information,” on page 77
Section 3.15, “Using Custom Menu Options with Events,” on page 77
Section 3.16, “Managing Columns in a Snapshot or Navigator Window,” on page 78
Section 3.17, “Taking a Snapshot of a Navigator Window,” on page 79
Section 3.18, “Sorting Columns in a Snapshot,” on page 79
Section 3.19, “Closing a Snapshot or Navigator,” on page 79
Section 3.20, “Adding Events to an Incident,” on page 79
3.1 Understanding Active Views
In the Active Views tab, you can:
View events occurring in near-real time
Investigate events
Graph events
Perform historical statistical analysis
Invoke right-click functions
Initiate manual incidents and remediation workflows
TM
An event represents a normalized log record reported to Sentinel
network, or application device or from an internal Sentinel source. There are several types of events:
External events (event received from a security device), such as:
An attack detected by an intrusion detection system
from a third-party security,
Active Views Tab
53
A successful login reported by an operating system
A customer-defined situation such as a user accessing a file
Internal events (an event generated by Sentinel), including:
A correlation rule being disabled
The database filling up
Correlated events
You can monitor the events in a tabular form or you can use several different types of charts to
perform queries for recent events. Access to these features can be enabled or disabled for each user.
3.2 Introduction to the User Interface
In an Active ViewsTM, you can see Create Active View, Event Real Time, and Event Query. You can
navigate to these functions from:
Table 3-1 Active Views User Interface
novdocx (en) 13 May 2009
User InterfaceDescription
The Active Views menu in the menu bar
When you create a filter, the Active Views menu
has these additional options.
The Navigation tree in the Navigation pane
54Sentinel 6.1 Rapid Deployment User Guide
User InterfaceDescription
The toolbar buttons
Active Views provides two types of views that display the events in tables and graphs.
The Table format displays the variables of the events as columns in a table. You can sort the
information in the grid by clicking the column name.
Figure 3-1 Active View Tabular Format
novdocx (en) 13 May 2009
The Graphical format displays events as graphs. You can change the chart types to display
other chart types.
Figure 3-2 Active View Graphical Format
There are two types of Active Views:
Near Real Time Event Table:
Holds up to 750 events per 30-second period. If there are more than 750 events, the events
are displayed in the following priority order: correlated events, events that are sent to the
GUI by using a global filter, and all remaining events.
By default, the client maintains a 24-hour period of cached events. This is configurable
through Active View Properties.
By default, the smallest possible display interval of an active view is 30 seconds. This is
represented by a gray line in the event table.
Active Views Tab55
Figure 3-3 Gray Line Smallest Possible Display Interval
If there are more than 750 events per 30-second time period, a red separation line displays
indicating that there are more events than are displayed. The other events can be viewed
by using Historical Queries.
Figure 3-4 Red Line More Events Displayed
On saving user preferences, the system continues to collect data for four days. For
instance, if you save your preferences, log out, and log back in the following day, your
Active View displays data as if you never logged off.
If an Active View is created and not saved, it continues to collect data for an hour. If an
identical Active View is created within that hour, the Active View displays data for the last
hour.
novdocx (en) 13 May 2009
Snapshot: Time-stamped views of a Real Time Event View table.
Active View provides you the following unique features:
Filter assigned to an Active View
The z-axis attribute
The security filter assigned to a user
The Active Views tab allows you to:
Reconfigure total display time
Add events to an incident
Close a Snapshot or Navigator window
Create an incident
Custom menu options with events
Investigate an event query
Investigate a graph map
View Advisor data
Manage columnsSend messages about events by e-mail
Show or hide event details
Take a Snapshot of a Navigator window
View events that triggered a correlated event
View vulnerability visualization
View asset data
Integrate with the ticketing system
56Sentinel 6.1 Rapid Deployment User Guide
You can change labels (column names) to user-friendly names and the new names are populated
throughout the system. For more information, see Section 3.15, “Using Custom Menu Options with
Events,” on page 77.
3.3 Reconfiguring Total Display Time
Active View Properties allows you to configure the cached time in each client. The default cache
time value in an Active View is 24 hours.
To configure Maximum Total Display Time:
1 Click the Active Views tab.
2 Click Active Views > Properties.
3 Make your changes, then click OK.
novdocx (en) 13 May 2009
The new values do not take effect until you restart the Sentinel Control Center.
3.4 Viewing Real-Time Events
1 Click the Active Views tab.
2 Click Active Views > Create Active View or click the Create Active View icon .
3 In the Event Visualization Wizard window, click the down-arrows to select your Event
Attribute (Z Axis), Filter, and to Display Events (Yes or No).
In the Filter Selection window, you can build your own filter or select one of the already built
filters. Selecting the All filter allows all events to display in your window. When you are
creating an Active View, if the filter assigned to the Active View is changed or deleted after
creation of the Active View, the Active View is unaffected.
Active Views Tab57
novdocx (en) 13 May 2009
After making your selection, you can click Next or Finish. If you select Finish, the following
default values are selected:
Display Interval and Refresh rate of 30 seconds
Total Display Time of 15 minutes
Y-axis as Event Count
Chart type of Stacked Bar 2D
4 If you click Next, click the down-arrows and fill in the fields:
Display Interval and Refresh rate:
Display Interval is the time interval to display events.
Refresh Rate is the rate at which Active Views should refresh.
Total Di s p l a y T i m e : Amount of time to display the chart.
Y-axi s: Either the total Event Count or Event Count per Second.
5 Click Next.
6 Select your chart type from the drop-down list and click Finish.
Your graph looks similar to:
58Sentinel 6.1 Rapid Deployment User Guide
The five buttons to the left of the chart perform the following functions:
Table 3-2 Functions of the Buttons
novdocx (en) 13 May 2009
ButtonsDescription
Lock/Unlock the ChartUsed when performing a drill-down, zoom in, zoom out, and
zoom to selection, and saving a chart as an HTML file.
Increase Display IntervalIncreases the display time interval for the incoming events.
Decrease Display IntervalDecreases the display time interval for the incoming events.
Increase Display TimeIncreases the time interval along the x-axis.
Decrease Display TimeDecreases the time interval along the x-axis.
When you click the Lock button, additional available buttons are the following:
Table 3-3 Additional Buttons
ButtonsDescription
Lock/Unlock the ChartUsed when performing a drill-down, zoom in, zoom out, and zoom to
selection, and saving a chart as an HTML file.
Zoom InZooms in without changing any of the time settings of the chart.
Zoom OutZooms out without changing any of the time settings of the chart.
Zoom to SelectionZooms in on a selection of time intervals of events.
Snapshot Active ViewSave as an HTML file with chart as images and events in a tabular
format.
Active Views Tab59
3.4.1 Resetting the Parameters and Chart Type of an Active
View
When viewing an Active View, you can reset your chart parameters and change your chart type.
1 Within an Active View displaying a chart, right-click and select Properties.
novdocx (en) 13 May 2009
2 Under the Parameters tab, set the following options:
Display Interval: Time between each interval.
Refresh Rate: Number of seconds for the event rate to be updated.
Total Di s p l a y T i m e : Amount of time to display the chart.
Y-axi s: Either total Event Count or Event Count per Second.
60Sentinel 6.1 Rapid Deployment User Guide
3 Under the Chart Types tab, set your chart to Stacked Bar2D, Bar 3D, Line, or Ribbon.
novdocx (en) 13 May 2009
3.4.2 Rotating a 3D Bar or Ribbon Chart
1 Click anywhere on the chart and hold the mouse button.
2 Reposition the chart as desired by moving the mouse and holding the button.
3.5 Showing and Hiding Event Details
To show event details:
1 In a Real Time Event Table of the Navigator or in a Snapshot, double-click or right-click an
event and click Show Details. The event details displaying the left panel of the Real Time
Event Table.
Active Views Tab61
To hide event details:
1 In a Real Time Event Table of the Navigator or in a Snapshot, with event details displayed in
the left panel, right-click an event and click Show Details. The Event Details window closes.
3.6 Sending Mail Messages about Events and
Incidents
IMPORTANT: Before you send a mail by using the Sentinel Control Center, ensure that you have
an SMTP Integrator configured with connection information and with the
SentinelDefaultEMailServer property SentinelDefaultEMailServer set to
To send an event message by e-mail:
1 In a Real Time Event Table, select an event or a group of events, then right-click and select
Email.
true
.
novdocx (en) 13 May 2009
2 Provide the following information:
Email Address
Email Subject
Email Message
3 Click OK.
62Sentinel 6.1 Rapid Deployment User Guide
To e-mail an incident:
1 After you save your incident, click the Incidents tab, Incidents > Incidents View.
2 Click the All Incidents option in the Switch View drop-down list located at the bottom right
corner.
3 Double-click an incident.
4 Click Email Incident icon.
5 Provide the following information:
Email Address
Email Subject
Email Message
6 Click OK.
The e-mail messages have HTML attachments that address incident details, events, assets,
vulnerabilities, advisor information, attachment information, incident notes, and incident
history.
novdocx (en) 13 May 2009
3.7 Creating Incidents
To perform this function you must have user permission to create incidents.
This is useful in grouping a set of events together as a whole representing something of interest
(group of similar events or set of different events that indicate a pattern of interest such an attack).
If events are not initially displayed in a newly created incident, it is probably because of a lag in the
time between display in the Real Time Events window and insertion into the database. If this occurs,
it takes a few minutes for the original events to be inserted into the database and display in the
incident.
To create an incident:
1 In a Real Time Event Table of the Navigator or a Snapshot Real Time Event Table, select an
event or a group of events, then right-click and select Create Incident.
2 In the New Incident window, fill in the necessary information in the following tabs:
Events: Shows which events make up the incident
Assets: Show affected assets
Active Views Tab63
Vulnerability: Show related asset vulnerabilities
Advisor: Asset attack and alert information
iTRAC: Under this tab, you can assign a WorkFlow (iTRAC
History: Incident history
Attachments: You can attach any document or text file with pertinent information to this
incident
Notes: You can specify any general notes regarding this incident.
3 In the Create Incident dialog box, specify:
Title
State
Severity
Priority
Category
Responsible
Description
TM
)
novdocx (en) 13 May 2009
Resolution
4 Click Create. The incident is added under the Incidents tab of the Sentinel Control Center.
3.8 Viewing Events That Trigger Correlated
Events
You must right-click a correlated event in order to view the events that triggered the correlated
event. In the event table from which you are selecting the event, look in the summary display panel
on the right for an event that has a property of SensorType with a Value of C (C: correlated event).
To view events that triggered a correlated event:
1 In a Real Time Event Table of the Navigator or Snapshot, or in an event query table, right-click
a correlated event and select View Trigger Events.
A window opens, showing the events that triggered the rule and the name of the correlation
rule.
64Sentinel 6.1 Rapid Deployment User Guide
3.9 Investigating an Event or Events
The right-click option Investigate allows you to:
Perform an event query for the last hour on a single event for:
Other events with the same target IP address
Other events with the same source (initiator) IP address
Other targets with the same event name
NOTE: You cannot perform a query on a null (empty) field.
Graphically display the mappings between any two fields in the selected events. This is
particularly useful to view the relationship between the initiators (IP, port, event, sensor type,
Collector) and the targets (IP, port, event, sensor type, Collector name) of the selected events,
but any fields can be used
Figure 3-5 is an illustration of initiator IP addresses mapped to target IP addresses.
Figure 3-5 Graph Mapper
novdocx (en) 13 May 2009
Section 3.9.1, “Investigate: Event Query,” on page 66
Section 3.9.2, “Investigate: Graph Mapper,” on page 66
Section 3.9.3, “Historical Event Query,” on page 67
Section 3.9.4, “Active Browser,” on page 68
Active Views Tab65
3.9.1 Investigate: Event Query
This function allows you to perform an event query within the last hour for events similar to the
selected event.
1 In a Navigator or Snapshot window, right-click an event, click Investigate, and select one of
three options given below:
OptionFunction
Show More Events to this targetEvents with the same destination IP address
Show More Events from this sourceEvents with the same initiator IP address
What are the target objects of this event?Events with the same event name as the
selected event
An event table opens, showing the chosen event information.
3.9.2 Investigate: Graph Mapper
novdocx (en) 13 May 2009
To create a graph map:
1 In a Real Time Event Table, right-click an event or events and select Investigate >Show Graph.
The following is a graphic depiction of Sensor Name to Event Name of severity 5 in an organic
format. You can view a graphic mapping in the following formats:
Circular
Hierarchical
Organic
Orthogonal
66Sentinel 6.1 Rapid Deployment User Guide
2 You must specify the From and To fields and click Finish. The Graph Mapper window
displays.
novdocx (en) 13 May 2009
3.9.3 Historical Event Query
You can query the database for the past events through a historical event query. The events can be
queried according to the filter and severity criteria in required batch size. You can export the results
in HTML or CSV file format.
To query events in the Historical Event Query window:
1 In the Active Views tab, select Active Views > Event Query. You can also open the Historical
Event Query window by clicking the Historical Query icon on the toolbar. The Historical Event
Query window displays.
2 Click Filter. In Filter Selection window, select a filter from the list of available filters.
Active Views Tab67
3 Click Severity icon. The Select Severity Values window displays.
4 Select one or more values for Severity and click OK.
5 Select a From and To date and time.The time you select corresponds your system time.
6 Select a batch size. The events queried display in the batch size you specify.
If you select a batch size of 100, the first 100 events are displayed in the window. After the
query is processed, the Begin Searching icon changes to the More results icon. You can see next
100 events along with the previous events by clicking the More results icon.
novdocx (en) 13 May 2009
7 Click the Begin Searching icon. The query is processed. You can cancel the search by clicking
the Cancel search icon.
TIP: Select HTML or CSV from the drop-down list to export query results.
3.9.4 Active Browser
The Active Browser provides the ability to browse through a selected set of data to look for patterns
and perform investigation. You can view the selected events in the Active Views in the Active
Browser. When you open the Active Browser using Analysis > Offline Query and click Browse
against a specific offline query, the events table is displayed only when the number of events is less
than or equal to1000.
68Sentinel 6.1 Rapid Deployment User Guide
The events are grouped according to the meta tags. In these meta tags, various sub categories are
defined. The numbers in the parentheses against these sub categories displays the total number of
event counts corresponding to the value of the meta tag.
To view events in Active Browser:
1 In the Active Views tab, select the event or events you want to view in Active Browser.
2 Right-click the event or events and select View in the Active Browser. The selected event/s
displays in the Active Browser window.
or
In the Active Views tab, select Active Views > Event Query. Historical Event Query window
displays.
3 In the Historical EventQuery window, run a query and click the Active Browser tab. The
selected query displays in the Active Browser window.
NOTE: The Active Browser tab is enabled only if the query results in at least one event display.
To view events in Active Browser in the Analysis tab:
novdocx (en) 13 May 2009
1 In the Analysis tab, select the query you want to view in the Active Browser.
2 Click Browse. The selected query result displays in the Active Browser window.
To search in the Active Browser:
1 Specify the value or text you want to search for in the Search field.
2 Press Enter or click the Search icon next to the Search field to search.
NOTE: You can move between the various searches by using the Forward and Backward buttons
above the Search field.
Active Views Tab69
To add attributes in Active Browser:
1 Click the Add an attribute for categorization icon as shown below:
2 Select an attribute in the Add an Attribute for categorization window that displays.
novdocx (en) 13 May 2009
3 Click OK.
3.10 Viewing Advisor Data
The Advisor provides a cross-reference between real-time intrusion detection systems attack
signatures and the Advisor's knowledge base of vulnerabilities. The Advisor feed has an alert and
attack feed. The alert feed contains information about vulnerabilities and viruses. The attack feed
lists the exploits associated with vulnerabilities. The Advisor data is updated on a regular basis if
you have opted for the optional Advisor data subscription service.
To View Advis or Data :
1 In a Real Time Event Table of the Navigator or Snapshot, right-click an event or a series of
selected events, then click Analyze > Advisor Data.
70Sentinel 6.1 Rapid Deployment User Guide
If the DeviceAttackName field is properly populated, a report similar to the one below displays.
This example is for a WEB-MISC amazon 1-click cookie theft.
novdocx (en) 13 May 2009
3.11 Viewing Asset Data
This function allows you to view and save your view as an HTML file of your Asset report. You
must run your asset management Collector to view this data. The available data for viewing are:
Hardware
MAC Address
Name
Type
Vendor
Product
Ve rs io n
Va lu e
Criticality
Sensitivity
Environment
Location
Network
IP Address
Hostname
Software
Name
Type
Active Views Tab71
Vendor
Product
Ve rs io n
Contacts
Order
Name
Role
Email
Phone Number
Location
Room
Rack
Address
To view Asset Data:
novdocx (en) 13 May 2009
1 In a Real Time Event Table of the Navigator or a Snapshot window, right-click an event or
click events >Analyze >Asset Data.
A window similar to the one below displays.
3.12 Viewing Vulnerabilities
Vulnerability Visualization provides a textual or graphical representation of the vulnerabilities of
selected destination systems. Vulnerabilities for the selected destination IPs can be seen for the
current time or for the time of the selected events.
72Sentinel 6.1 Rapid Deployment User Guide
Vulnerability Visualization requires that a vulnerability Collector is running and adding
vulnerability scan information to the Sentinel database. The Novell Sentinel Content (http://
support.novell.com/products/sentinel/secure/sentinel61.html) provides Collectors for several
industry-standard vulnerability scanners, and additional vulnerability Collectors can be written by
using the Sentinel SDK (http://developer.novell.com/wiki/index.php?title=Develop_to_Sentinel).
NOTE: Vulnerability Collectors are distinct from Event Collectors and use different commands.
There are several Vulnerability Visualization views:
HTML
Graphical
Circular
Organic
Hierarchical
Orthogonal
The HTML view is a report view that lists relevant fields, depending on which vulnerability scanner
you have:
novdocx (en) 13 May 2009
IP
Host
Vulnerability
Port/protocol
Figure 3-6 Viewing Vulnerability
The graphical display is a rendering of vulnerabilities that link them to an event through common
ports. Below are the examples of the four available views:
Active Views Tab73
Figure 3-7 Organic View
novdocx (en) 13 May 2009
Figure 3-8 Hierarchical View
74Sentinel 6.1 Rapid Deployment User Guide
Figure 3-9 Circular View
novdocx (en) 13 May 2009
Figure 3-10 Orthogonal View
The graphical display has four panels:
Graph panel
Tree panel
Control panel
Details/events panel
The graph panel display associates vulnerabilities to a port/protocol combination of a resource (IP
address). For example, if a resource has five unique port/protocol combinations that are vulnerable,
there are five nodes attached to that resource. The resources are grouped together under the scanner
that scanned the resources and reported the vulnerabilities. If two different scanners are used (ISS
and Nessus*), there are two independent scanner nodes that have vulnerabilities associated with
them.
Active Views Tab75
NOTE: Event mapping takes place only between the selected events and the vulnerability data
returned.
The tree panel organizes data in same hierarchy as the graph. The tree panel also allows users to
hide/show nodes at any level in the hierarchy.
The control panel exposes all the functionality available in the display. This includes:
Four different algorithms to display
The ability to show all or selected nodes which have events mapped to them
Zooming in and out of selected areas of the graph
There are two tabs in the Details/Events panel. When you are in the Details tab, clicking a node
displays node details. When you are in the Events tab, clicking an event associated with a node
displays the node in tabular form as in a Real Time or Event Query window.
To run a Vulnerability Visualization:
1 In a Real Time Event Table of the Navigator or Snapshot, right-click an event or a series of
selected events and click Analysis.
Current Vulnerability: Queries the database for vulnerabilities that are active (effective)
at the current date and time.
Event Time Vulnerability: Queries the database for vulnerabilities that were active
(effective) at the date and time of the selected event.
novdocx (en) 13 May 2009
2 At the bottom the vulnerability results window, click one of the following:
Event to Vulnerability Graph
Vulnerability Report
3 (For Event to Vulnerability Graph) Adjust the display as desired:
Move nodes and their labels
76Sentinel 6.1 Rapid Deployment User Guide
Use one of four different layout algorithms to display the graph
Show all nodes or only those nodes that have events mapped to them
Use in-line tree filtering if a large number of resources are returned as vulnerable
Zoom in and out of selected areas
3.13 Ticketing System Integration
Novell provides optional integration modules for BMC Remedy* that allow you to send events from
any display screen to one of these external ticketing systems. You can also send incidents and their
associated information (asset data, vulnerability data, or attached files) to Remedy.
For more information on Remedy integration, see the Remedy Integration Guide, available at the
Novell Sentinel Content Web site (http://support.novell.com/products/sentinel/sentinel61.html) for
users with a Remedy integration license.
NOTE: The permission to create Remedy incidents is controlled by the administrator on a user-byuser basis.
novdocx (en) 13 May 2009
3.14 Viewing User Information
Novell provides optional integration with identity management systems, specifically Novell Identity
Manager. With this integration, user identity information is added to incoming events when the
account name matches one from Novell Identity Manager. When the InitUserIdentity or
TargetUserIdentity column is populated in an event, a right-click option menu option is enabled to
open the user’s page in the Identity Browser.
When you select Show Identity Details, you can choose to view the identity of the Initiator user, the
Target user, or both. The Identity Browser opens and shows identifying information about the user
(or users) from the identity management system, all the accounts to which the user is provisioned,
and the recent activity by that user. For more information on the Identity Browser, see Chapter 16,
“Identity Integration,” on page 369.
3.15 Using Custom Menu Options with Events
1 In an existing Real Time Event Table of the Visual Navigator or Snapshot, right-click an event
and select a menu option. The default custom menu options are as follows:
ping
nslookup
Active Views Tab77
tracert
Whois?
You can further assign user permissions to view vulnerability and to perform HP actions. You
can add options by using the Event Menu Configuration option on the Admin tab.
novdocx (en) 13 May 2009
3.16 Managing Columns in a Snapshot or
Navigator Window
To select and arrange columns in a Snapshot or Navigator:
1 With a Snapshot or Navigator window open, click Active View > Event Real Time > Manage
Columns or click the Manage Columns icon of a Real Time Event Table.
2 Use the Add and Remove buttons to move column titles between the Available Columns list and
the Show these columns in this order list. The Insert button can be used to insert an available
column item into a specific location.
For example, in the illustration below, clicking Insert places AttackId above DateTime.
78Sentinel 6.1 Rapid Deployment User Guide
Use the up-arrow and down-arrow buttons to arrange the order of the columns as you want
them to display in the Real Time Event Table. The top-to-bottom order of column titles in the
Manage Column dialog box determines the left-to-right order of the columns in the Real Time
Event Table.
3 In the Manage Column dialog box, click OK.
4 If you want your columns to display the next time you open the Sentinel Control Center, click
File > Save Preferences or click the Save User Preference icon.
3.17 Taking a Snapshot of a Navigator Window
It is useful to study events this way because the Navigator refreshes automatically and the alert or
alerts of interest scroll off the screen. Also, within a Snapshot, you can sort by column.
To perform this function, you must have the Snapshot user permission.
1 With a Navigator window open, click Active Views > Event Real Time > Snapshot or click the
Snapshot Event Real Time Table icon.
A Snapshot window opens and is added to the Snap Shots folder list under Active Views in the
Navigator. The graphical display is not part of the Snapshot.
novdocx (en) 13 May 2009
3.18 Sorting Columns in a Snapshot
1 Click any column header once to sort by ascending value and twice to sort by descending
value.
3.19 Closing a Snapshot or Navigator
1 When a Snapshot or Navigator is open, close it by using the Close button in the upper right
corner.
NOTE: The view or Snapshot does not redisplay when you close and reopen the Sentinel Control
Center.
3.20 Adding Events to an Incident
To perform this function you must have user permissions to Modify Incident(s) and Add to existing
Incident(s).
1 In a Real Time Event Table or a Snapshot, select an event or a group of events and right-click.
Click Add To Incident.
2 In the Add Events To Incident dialog box, click Browse to list the available incidents.
Active Views Tab79
novdocx (en) 13 May 2009
The Select Incident window displays.
3 Click Search to view a list of incidents with the selected criteria.
You can define your criteria to search for a particular incident or incidents in Select Incident
window.
4 Select an incident and click Add.
80Sentinel 6.1 Rapid Deployment User Guide
5 Click OK. The event or events selected are added to the incident in the Incidents Navigator.
If events are not initially displayed in a newly created incident, it is probably because of a lag in
the time between displaying in the Real Time Events window and insertion into the database. If
this occurs, it takes a few minutes for the original events to be inserted into the database and
display in the incident.
novdocx (en) 13 May 2009
Active Views Tab81
novdocx (en) 13 May 2009
82Sentinel 6.1 Rapid Deployment User Guide
4
Correlation Tab
Sometimes, an event viewed in the system might not necessarily draw your attention. However,
when you correlate a set of similar or comparable events in a given period, it might lead you to a
significant event. Sentinel
the Correlation engine so you can take appropriate action to mitigate any alarming situation.
Section 4.1, “Understanding Correlation,” on page 83
Section 4.2, “Introduction to the User Interface,” on page 85
Section 4.3, “Correlation Rules,” on page 85
Section 4.4, “Dynamic Lists,” on page 98
Section 4.5, “Correlation Engine,” on page 102
Section 4.6, “Correlation Actions,” on page 102
TM
helps you correlate such events with the rules you create and deploy in
novdocx (en) 13 May 2009
4
4.1 Understanding Correlation
Correlation adds intelligence to security event management by automating analysis of the incoming
event stream to find patterns of interest. Correlation allows you to define rules that identify critical
threats and complex attack patterns so that you can prioritize events and initiate effective incident
management and response. Starting with Sentinel 6.0, the Correlation engine is built with a
pluggable framework, which allows the addition of new Correlation engines in the future.
Correlation rules define a pattern of events that should trigger, or fire, a rule. Using either the
Correlation Rule Wizard or the simple RuleLG language, you can create rules that range from
simple to extremely complex, for example:
High severity event from a finance server
High severity event from any server brought online in the past 10 days
Five failed logins in 2 minutes
Five failed logins in 2 minutes to the same server from the same username
Intrusion detection event targeting a server, followed by an attempted login to root originating
from that same server within 60 seconds
Two or more of these rules can be combined into one composite rule. The rule definition determines
the conditions under which the composite rule fires:
All subrules must fire
A specified number of subrules must fire
The subrules must fire in a particular sequence
After the rule is defined, it should be deployed to an active Correlation engine, and one or more
actions can be associated with it. After the rule is deployed, the Correlation engine processes events
from the real-time event stream to determine whether they should trigger any of the active rules.
NOTE: Events that are sent directly to the database or dropped by a global filter are not processed
by the Correlation engine.
Correlation Tab
83
When a rule fires, a correlated event is sent to the Sentinel Control Center, where it can be viewed in
the Active Views window.
Figure 4-1 Active Views Window
novdocx (en) 13 May 2009
The correlated event can also trigger actions, such as sending an e-mail with the correlated event’s
TM
details or creating an incident associated with an iTRAC
workflow.
4.1.1 Technical Implementation
All correlation is done in-memory on the machine (or machines) that host the Correlation engine.
This model allows fast, distributed processing that does not contend with database operations such
as inserting events into the database.
For environments with large numbers of Correlation rules or extremely high event rates, it might be
advantageous to install more than one Correlation engine and redeploy some rules to the new
Correlation engine. The ability to deploy multiple Correlation engines provides the ability to scale
as the Sentinel system incorporates additional data sources or as event rates increase.
Sentinel correlation is nearly real-time and depends on the time stamp for the individual events. To
synchronize time, you can use an NTP (Network Time Protocol) server to synchronize the time on
all devices on your network, or you can rely on the time on the Collector Manager servers and
synchronize only those few machines.
Correlation relies on the data that is collected, parsed, and normalized by the Collectors, so a
working understanding of the data is necessary to write rules. Many Novell
on an event taxonomy that ensures that a “failed login” and an “unsuccessful logon” from two
devices are classified the same.
®
Correlation rules rely
84Sentinel 6.1 Rapid Deployment User Guide
In the Correlation tab, you can:
Create/modify Correlation rules and rule folders
Deploy Correlation rules on the Correlation engine
Create and associate an action to a rule
Configure dynamic lists
NOTE: Access to the correlation functions can be enabled by the administrator on a user-by-user
basis.
4.2 Introduction to the User Interface
In Correlation, you can see the Correlation Rule Manager, Correlation Engine Manager, Correlation
Action Manager, and dynamic lists.
You can navigate to these functions from:
Table 4-1 Correlation User Interface
novdocx (en) 13 May 2009
User InterfaceDescription
The Correlation menu in the Menu bar
The Navigation tree in the Navigation pane
The Toolbar buttons
4.3 Correlation Rules
Correlation rules are created, modified, renamed, deployed, and undeployed in the Correlation Rule
Manager. Correlation rules are organized into rule folders, which can also be managed in the
Correlation Rule Manager.
NOTE: There is no limit to the number of users that can access Correlation rules. When more than
one user is editing the same rule, the last person to save overwrites all previous saves.
Section 4.3.1, “Opening the Correlation Rule Manager,” on page 86
Section 4.3.2, “Creating a Rule Folder,” on page 86
Correlation Tab85
Section 4.3.3, “Renaming a Rule Folder,” on page 86
Section 4.3.4, “Deleting a Rule Folder,” on page 86
Section 4.3.5, “Creating a Correlation Rule,” on page 86
Section 4.3.6, “Creating Correlation Rules,” on page 87
Section 4.3.7, “Deploying and Undeploying Correlation Rules,” on page 95
Section 4.3.8, “Enabling and Disabling Rules,” on page 96
Section 4.3.9, “Renaming and Deleting a Correlation Rule,” on page 96
Section 4.3.10, “Sorting Correlation Rules,” on page 96
Section 4.3.11, “Moving a Correlation Rule,” on page 97
Section 4.3.12, “Importing a Correlation Rule,” on page 97
Section 4.3.13, “Exporting a Correlation Rule,” on page 98
4.3.1 Opening the Correlation Rule Manager
1 Click the Correlation tab.
2 In the navigator, click Correlation Rules Manager. Alternatively, click the Correlation Rules
Manager button in the tool bar. The Correlation Rule Manager window displays.
novdocx (en) 13 May 2009
4.3.2 Creating a Rule Folder
1 Open the Correlation Rule Manager window and click Manage Folder.
2 Right-click a folder and select Add Folder.
3 Specify the Rule Folder name.
4.3.3 Renaming a Rule Folder
1 Open the Correlation Rule Manager window and click Manage Folder.
2 Select a folder and click Rename. Change the name of the folder.
4.3.4 Deleting a Rule Folder
1 Open the Correlation Rule Manager window and click Manage Folder.
2 Select a folder and click Delete. Click Yes when the system asks for confirmation.
4.3.5 Creating a Correlation Rule
1 Open the Correlation Rule Manager window and select a folder from the Folder drop-down list
to which this rule is added.
2 Click the Add button located on the top left corner of the screen.
86Sentinel 6.1 Rapid Deployment User Guide
3 The Rule Wizard displays. Select one of the following rule types and follow the steps for that
particular rule type:
Simple
Composite
Aggregate
Sequence
Custom/Freeform
4 Define the update criteria for the rule.
If you select Continue to perform actions every time this rule fires, the rule fires every time the
criteria is met. If you select Do not perform actions every time this rule fires for the next (t) time, the event fires only once as per user-defined time period.
All the other events that match the Correlation rule within the specified time are grouped
together with this correlated event. This user-defined time period can be a certain number of
seconds, minutes, or hours.
5 Click Next.
6 Provide the rule name. The syntax of the rule is checked at the time it is created.
7 Under Namespace, select a Correlation rule folder in which to store the rule.
8 Type the description of the rule.
novdocx (en) 13 May 2009
9 Click Next. The rule is created and displays in the Correlation Rules Manager window.
10 Select Yes if you want to create another rule or select No if you do not want to create another
rule. Click Next.
The rule types and the steps to create them are described in Section 4.3.6, “Creating Correlation
Rules,” on page 87.
4.3.6 Creating Correlation Rules
Correlation rules can be defined in the Correlation Rule Wizard by walking through the wizard or by
choosing the Custom/Freeform option to write the rule in the proprietary RuleLG language. All rule
definitions are stored in the database in RuleLG.
Correlation rules can be defined based on any populated event field.
NOTE: When creating a rule, you can refer to a dynamic list for it. For more information, see
Section 4.4.5, “Using a Dynamic List in a Correlation Rule,” on page 100.
“Simple Rule” on page 88
“Aggregate Rule” on page 90
“Composite Rule” on page 92
“Sequence” on page 93
“Custom or Freeform Correlation Rules” on page 94
Correlation Tab87
Simple Rule
A simple rule is defined by specifying the events that can trigger the rule to fire (For example,
firewall events, firewall events of severity 3 or higher). The filter criteria can be intersected (using
the “all”option in the GUI or the “AND” operator in RuleLG) or the filter criteria can be unioned
(using the “any” option in the GUI or the “OR” operator in RuleLG).
For example, a rule might be defined so that it fires anytime an event takes place on a server that is
on the critical list. Another rule might be defined to fire anytime an event of severity 4 or greater
takes place on a server that is on the critical list.
A simple rule requires only one event in order to fire.
For users familiar with the Correlation rule language (RuleLG), the defining operator for a simple
rule is the “filter” operator. For more information about RuleLG, see “Sentinel 6.1 Rapid
Deployment Correlation Engine RuleLG Language” in the Sentinel 6.1 Rapid Deployment
Reference Guide.
In Sentinel 6, filter criteria must be defined in the Correlation Rule Wizard. You cannot use existing
public filters.
novdocx (en) 13 May 2009
To create a simple rule:
1 Open the Correlation Rule Manager window and select a folder from the drop-down list to
which this rule is added.
2 Click the Add button located on the top left corner of the screen. The Correlation Rule window
displays. Select Simple Rule.
3 In the Simple Rule window, define a condition for this rule. Select the Property and Operator
values from the drop-down lists and specify data in the value field.
88Sentinel 6.1 Rapid Deployment User Guide
novdocx (en) 13 May 2009
4 Click Add to add additional definitions for this rule.
5 Preview the rule in the RuleLG preview window. For example,
filter(e.sev=3)
.
6 Click Next.The Update Criteria window displays.
7 Enable the update criteria for the rule to fire and click Next. The General Description window
displays.
Correlation Tab89
8 Provide a name for this rule. You have an option to modify the rule folder.
9 Provide rule description and click Next.
10 You have an option to create another rule from this wizard. Select your option and click Next.
Aggregate Rule
An aggregate rule is defined by specifying a subrule and the number of times the subrule must fire
within a specific time window in order to trigger the aggregate rule. For example, an aggregate rule
might require that a subrule fire 10 times within 5 minutes for the aggregate rule to fire.
Aggregate rules have an optional group by field, which can be any populated field from the events.
For example, an aggregate rule might require that a subrule fire 10 times within 5 minutes where
each of the 10 events has the same destination server.
NOTE: For users familiar with the Correlation rule language (RuleLG), the defining operator for an
aggregate rule is the “trigger” operator. The trigger clause might also use the “discriminator”
operator to define the group by field. For more information about RuleLG, see “Sentinel 6.1 Rapid
Deployment Correlation Engine RuleLG Language” in the Sentinel 6.1 Rapid Deployment
Reference Guide.
novdocx (en) 13 May 2009
To create an aggregate rule:
1 Open the Correlation Rule Manager window and select a folder from the drop-down list to
which this rule is added.
2 Click the Add button located on the top left corner of the screen. The Correlation Rule window
displays. Select Aggregate Rule.
90Sentinel 6.1 Rapid Deployment User Guide
3 In Aggregate Rule window, click the Add Rule button to select a sub rule to create an aggregate
rule. The Add Rule window displays.
You can select only one sub rule when creating an aggregate rule.
4 Select a rule and click OK.
5 Set parameters for the rule to fire.
novdocx (en) 13 May 2009
6 To group event tags according to the attributes, Click Add/Edit. The Attribute List window
displays.
7 Select the attribute you want, then preview the rule in the RuleLG preview window.
8 Click Next.The Update Criteria window displays.
9 Update the criteria for the rule to fire and click Next. The General Description window
displays.
10 Provide a name for this rule. You have an option to modify the rule folder.
11 Provide a rule description and click Next.
12 You have an option to create another rule from this wizard. Select your option and click Next.
Correlation Tab91
Composite Rule
A composite rule is comprised of two or more subrules. A composite rule can be defined so that all
or a specified number of the subrules must fire within the defined time frame. Composite rules have
an optional group by field, which can be any populated field from the events.
NOTE: When a subrule is used to create a composite rule, a copy of the subrule is added to the
composite rule’s definition. Because a copy is added, changes to the original subrule do not affect
the composite rule.
To create a composite rule:
1 Open the Correlation Rule Manager window and select a folder from the drop-down list to
which this rule is added.
2 Click the Add button located on the top left corner of the screen. The Correlation Rule window
displays. Select Composite Rule.
novdocx (en) 13 May 2009
3 In the Composite Rule window, click Add Rule to select sub rules to create a composite rule.
The Add Rule window displays.
4 Select a rule or a set of rules nd click OK.
5 Set parameters for the rule to fire.
6 To group event tags according to the attributes, click Add/Edit. The Attribute window displays.
7 Select the attribute you want, then preview the rule in RuleLg preview box.
8 Click Next.The Update Criteria window displays.
9 Update criteria for the rule to fire and click Next.
10 Provide a name for this rule. You have an option to modify the rule folder.
92Sentinel 6.1 Rapid Deployment User Guide
11 Provide a rule description and click Next.
12 You have an option to create another rule from this wizard. Select your option and click Next.
Sequence
A sequence rule is comprised of two or more subrules that must be triggered in a specific order
within the defined time frame. Sequence rules have an optional group by field, which can be any
populated field from the events.
NOTE: When a subrule is used to create a sequence rule, a copy of the subrule is added to the
sequence rule’s definition. Because a copy is added, changes to the original subrule do not affect the
sequence rule.
To create a sequence rule:
1 Open the Correlation Rule Manager window and select a folder from the Folder drop-down list
to which this rule is added.
2 Click the Add button located on the top left corner of the screen. The Correlation Rule window
displays. Select Sequence Rule.
novdocx (en) 13 May 2009
3 In the Sequence Rule window, click the Add Rule button to select a sub rule to create a
sequence rule. The Add Rule window displays.
4 Select a rule and click OK.
5 Set parameters for the rule to fire. To group event tags according to the attributes, click Add/
Edit. The Attribute List window displays.
6 Select the attribute you want, then You can preview the rule in RuleLg preview box.
7 Click Next.The Update Criteria window displays.
8 Update criteria for the rule to fire and click Next.
9 Provide a name for this rule. You have an option to modify the rule folder.
Correlation Tab93
10 Provide rule description and click Next.
11 You have an option to create another rule from this wizard. Select your option and click Next.
Custom or Freeform Correlation Rules
The custom or freeform rule option is the most powerful option for creating a correlation rule. This
allows the user to create any of the previous types of rules by typing the RuleLG correlation rule
language directly into the Correlation Rule Wizard.
Freeform rules are the only way to include certain functionality in a correlation rule. Freeform rules
give you the ability to do the following:
Nest operations by using parentheses to specify order of operations
Use the
inlist
operator to refer to a dynamic list
novdocx (en) 13 May 2009
Use the
Use the
isnull
w.
operator to refer to unpopulated fields
prefix for a field name in the window operation to compare an incoming event’s
value to a set of previous events
TIP: You can select the functions, operators, and meta tags from the drop-down list selection. Type
e.
or w. in the Correlation Rule section to view the drop-down lists.
To create a custom or freeform rule:
1 Open the Correlation Rule Manager window and select a folder from the Folder drop-down list
to which this rule is added.
2 Click the Add button located on the top left corner of the screen. The Correlation Rule window
displays. Select Custom/Freeform Rule.
3 In the Custom/Freeform Rule window, write the condition for the rule and click Validate to test
the validity of the rule.
4 After validation of the rule, click Next. The Update Criteria window displays.
5 Update the criteria for the rule to fire and click Next.
6 Provide a name for this rule. You have an option to modify the rule folder.
7 Provide rule description and click Next.
8 You have an option to create another rule from this wizard. Select your option and click Next.
94Sentinel 6.1 Rapid Deployment User Guide
4.3.7 Deploying and Undeploying Correlation Rules
Correlation rules can be deployed or undeployed from the Correlation Engine Manager or the
Correlation Rule Manager. You can undeploy all rules or a single rule.
The rules can be associated with one or more actions. If no action is selected, a default correlated
event is generated with the following values:
Table 4-2 Default Correlated Event Details
Field NameDefault Values
Severity4
Event NameSame as the event name for the trigger event
MessageSame as the message for the trigger event
ResourceCorrelation
SubResource<Rule Name>
novdocx (en) 13 May 2009
Other types of actions can be configured in the Action Manager:
Configure a Correlated Event replaces the default correlated event settings
Add to Dynamic List adds an element to a dynamic list
Remove from Dynamic List removes an element from a dynamic list
Execute a Command executes a shell or batch script
Execute a Script executes a script; only available for actions created in Sentinel 6.0
Send an Email by using default Sentinel mail settings
Create an Incident creates a Sentinel incident
Configure any Action from the Action Manager that was created from an Action plug-in that
takes a correlated event as input. For more information on the Action Manager, see Chapter 15,
“Action Manager and Integrator,” on page 341.
To deploy correlation rules in the Correlation Engine Manager:
1 Open the Correlation Engine Manager window.
2 Right-click the engine you want to deploy the rule on and select Deploy Rule.
3 In the Rules tab, select the rule or rules you want to deploy.
4 In the Actions tab, select the action or actions you want to associate with the rule.
5 Click Deploy. Rules are deployed in an enabled state.
To deploy correlation rules in the Correlation Rule Manager:
1 Open the Correlation Rule Manager window.
2 Select a rule and click the Deploy rules link. The Deploy Rule window displays.
3 In the Deploy Rule window, select the engine to deploy the rule from the drop-down list.
4 (Optional) Select an action or add a new action.
Correlation Tab95
If nothing is selected, a Correlated event with default values is created.
5 Click Deploy.
To undeploy a single rule:
1 In the Correlation Engine Manager, right-click the rule and select Undeploy Rule.
or
In the Correlation Rule Manager, select the rule and click the Undeploy rule link.
To undeploy all correlation rules:
1 Open the Correlation Engine Manager window.
2 Right-click the Correlation engine and select Undeploy All Rules.
4.3.8 Enabling and Disabling Rules
1 Open the Correlation Engine Manager window.
2 Right-click the rule or set of rules and select Enable Rule or Disable Rule.
novdocx (en) 13 May 2009
4.3.9 Renaming and Deleting a Correlation Rule
To rename a correlation rule:
NOTE: You must undeploy a rule before you rename or delete the rule.
1 Open the Correlation Rule Manager window and select the rule you want to rename.
2 If the rule is deployed, click the Undeploy Rule link to undeploy the rule.
3 Click the Vie w/Edit link. In the General Description tab, change the name of the Correlation
rule.
4 Click OK.
To delete a correlation rule:
1 Open the Correlation Rule Manager window and select the rule you want to delete.
2 If the rule is deployed, click the Undeploy Rule link to undeploy the rule.
3 Click the Delete link. Click Yes when the system prompts for confirmation.
4.3.10 Sorting Correlation Rules
To sort the list of correlation rules, click the Sort button at the top left of the Correlation Rule
Manager window.
96Sentinel 6.1 Rapid Deployment User Guide
4.3.11 Moving a Correlation Rule
1 Open the Correlation Rule Manager window and click Manage Folder.
2 Drag a correlation rule from one folder to another.
4.3.12 Importing a Correlation Rule
1 Open the Correlation Rule Manager window and click the Import/Export Correlation Rule
icon.
The Import Export Rule window displays.
novdocx (en) 13 May 2009
2 Select the Import option from the Action pane. The description in the Description pane changes
to Import.
3 Click Browse to select the Correlation rule you want to import. Select the file and click Import,
then click Next. The Import Rule window displays.
4 Select the folder you want to import the Correlation rule into, then click Finish.
When importing a correlation rule in a folder, if a correlation rule with the same name exists,
the system displays a message and does not import the file.
Correlation Tab97
novdocx (en) 13 May 2009
IMPORTANT: If you import a correlation rule using the
aligned to that rule must exist or you must create the dynamic list with the same name on the
system to which it is imported.
inlist
operator, the dynamic list
4.3.13 Exporting a Correlation Rule
1 Open the Correlation Rule Manager window and click the Import/Export Correlation Rule
icon. The Import Export Rule window displays.
2 Select the Export option from the Action pane. The description in the Description pane changes
to Export.d
3 Click Browse to export the rule. Specify a filename and click Export, then click Next. The
Export Rule window displays.
4 Select the Correlation rule you want to export. Click Finish.
4.4 Dynamic Lists
Dynamic lists are distributed list structures that can be used to store string elements, such as IP
addresses, server names, or usernames. The lists are then used within a Correlation rule for a quick
lookup to see whether an incoming event includes an element from the dynamic list. Some examples
of dynamic list include:
Terminated user lists
Suspicious user watchlist
Privileged user watchlist
Authorized ports and services list
Authorized server list
A dynamic list can be built by using the text values for any event meta tag. Elements can be added to
the list manually (by an administrator) or automatically whenever a Correlation rule fires. Elements
can be removed from a list manually (by an administrator), automatically whenever a correlation
rule fires, when their time limit expires, or when the maximum list size is reached.
IMPORTANT: The Time To Live (TTL) must be between 60 seconds and 90 days and the
maximum list size is 100,000.
98Sentinel 6.1 Rapid Deployment User Guide
Regardless of how the values were added, they can be persistent (active until manually removed or
until the maximum list size is reached) or transient (active only for a specified time frame after being
added to the list, also known as the Time to Live). The Time to Live can range from 60 seconds to 90
days.
NOTE: If the Time to Live period is updated on an active dynamic list, the change is not retroactive
to elements already on the list. Elements that are already added to the dynamic list retain their
original Time to Live.
4.4.1 Adding a Dynamic List
1 Click Correlation on the menu bar and select Dynamic Lists. Alternatively, you can click the
Dynamic Lists button on the toolbar.
2 Click the Add button located on the top left corner of the screen. The Dynamic List Properties
window displays.
3 Provide the name of the list.
novdocx (en) 13 May 2009
The name cannot contain special characters, such as quotations or hyphens.
4 Click Add. The Add Element window displays:
5 Provide the name of the Element. To make the Element persistent, select the Make Persistent
check box and click OK.
Correlation Tab99
To make an existing element persistent, select the check box next to the element name in the
Dynamic Properties window.
6 Select Transient elements life span, then specify the time the persistent values are active in the
list
7 Specify the maximum number of elements. The number defined here limits the number of
elements in the list.
8 Click OK.
Select a filter type from Quick Filter drop-down list and specify the name of the element, to
filter the available elements.
4.4.2 Modifying a Dynamic List
1 Click Correlation on the menu bar and select Dynamic Lists. Alternatively, you can click the
Dynamic Lists button on the toolbar.
2 Select a dynamic list and click the Vie w/Edi t link.
3 The Dynamic List Properties window displays. Edit the options as required and click OK.
novdocx (en) 13 May 2009
4.4.3 Deleting a Dynamic List
WARNING: Do not delete a dynamic list that is part of a correlation rule or rules.
1 Click Correlation on the menu bar and select Dynamic Lists. Alternatively, you can click the
Dynamic Lists button on the toolbar.
2 Select a dynamic list and click the Delete link next to it. A confirmation message alert
displays.
3 Click Yes to delete the list.
4.4.4 Removing Dynamic List Elements
There are several ways an element can be removed from a dynamic list:
A user can remove it manually
The element can be removed by a Correlation rule action
The transient element life span can expire
If the maximum number of elements for a dynamic list is reached, elements are removed from
the list to keep the list at or below the maximum list size. The transient elements are removed
(from oldest to newest) before any persistent elements are removed.
4.4.5 Using a Dynamic List in a Correlation Rule
Dynamic lists can be referenced in a Correlation rule by using the Custom/Freeform option of the
Correlation Rule Wizard. For example:
filter(e.<tagname> inlist <Dynamic List Name>)
100 Sentinel 6.1 Rapid Deployment User Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.