Reference Guide. Skybox View Revision: 11

Size: px
Start display at page:

Download "Reference Guide. Skybox View 7.0.600. Revision: 11"

Transcription

1 Reference Guide Skybox View Revision: 11

2 Copyright Skybox Security, Inc. All rights reserved. This documentation contains proprietary information belonging to Skybox Security and is provided under a license agreement containing restrictions on use and disclosure. It is also protected by international copyright law. Due to continued product development, the information contained in this document may change without notice. The information and intellectual property contained herein are confidential and remain the exclusive intellectual property of Skybox Security. If you find any problems in the documentation, please report them to us in writing. Skybox Security does not warrant that this document is error-free. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means electronic, mechanical, photocopying, recording, or otherwise without the prior written permission of Skybox Security. Skybox, Skybox View, Skybox Security, Skybox Firewall Assurance, Skybox Network Assurance, Skybox Vulnerability Control, Skybox Threat Manager, Skybox Change Manager, Skybox 5000/5000W/5500/6000 Appliance, are trademarks and registered trademarks of Skybox Security, Inc. Check Point, SiteManager-1, FireWall-1, Provider-1, SmartDashboard, VPN-1, and OPSEC are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. All other trademark and registered trademark products mentioned in this document are the property of their respective owners. Skybox Security, Inc. Telephone (in the U.S.): SKYBOX ( ) Telephone (outside the U.S.): Fax: Website: support@skyboxsecurity.com

3 Contents Intended Audience... 8 How this manual is organized... 8 Related documentation... 8 Technical support... 8 Part I: Tasks Managing tasks User roles and tasks Setting task parameters Task Properties dialog box Device access management Using Cyber-Ark for device password management Quick reference for data collection Quick reference: firewall configuration collection Quick reference: firewall traffic log and audit log collection Quick reference: proxies, VPN devices, and IPS devices Quick reference: load balancers Quick reference: routers and LAN controllers Quick reference: scanners Quick reference: alert services File import tasks Import directory tasks Data formats for file import tasks Basic file import tasks Advanced file import tasks Collector file import tasks Advanced collector file import tasks Script invocation tasks Importing interface and routing configuration Firewall configuration tasks Blue Coat proxy Check Point FireWall-1 firewall Check Point Provider-1 CMA Cisco PIX/ASA/FWSM firewall Cisco Security Manager Dell SonicWALL firewall Fortinet FortiGate firewall Fortinet FortiManager Security Management appliance Juniper Networks Junos firewall Juniper Networks NetScreen firewall Juniper Networks Network and Security Manager Linux iptables firewall McAfee Firewall Enterprise (Sidewinder) firewall Skybox View version

4 Skybox View Reference Guide Palo Alto Networks firewall Palo Alto Networks Panorama Sidewinder G2 (McAfee Firewall Enterprise) firewall VMware vshield Edge firewall Firewalls implemented in software Firewall log data tasks Check Point FireWall-1 activity log data (LEA collection) Check Point FireWall-1 change events (audit log data) Importing syslog change tracking events Syslog traffic events IPS tasks HP TippingPoint IPS devices IBM Proventia G appliances Load balancer tasks A10 Networks load balancer Cisco CSS load balancer Citrix NetScaler load balancer F5 BIG-IP load balancer Radware AppDirector load balancer Radware WSD load balancer Router tasks Cisco IOS router Cisco Nexus router HP ProCurve router Nortel Passport 8600 router Scanner tasks eeye Retina scanner McAfee Foundstone FoundScan Enterprise scanner IBM SiteProtector Qualys QualysGuard scanner Rapid7 Nexpose scanner Shavlik NetChk Protect patch management tool Tenable Network Security Nessus scanner Tripwire ncircle scanner Blacklists Management systems tasks McAfee epolicy Orchestrator Microsoft SCCM SolarWinds NCM Microsoft Active Directory Microsoft WSUS CiscoWorks HP Software & Solutions (OpenView) Symantec Management Suite Alerts and vulnerability definition feed tasks Symantec DeepSight alert services Skybox View version

5 Contents VeriSign idefense alert services Network tasks Network scan tasks Topology discovery tasks Analysis tasks Access requests tasks Change tracking tasks Exposure tasks False positive reduction tasks Policy compliance tasks Security Metrics calculation tasks Shadowed rules tasks Vulnerability detection tasks Model maintenance tasks Model completion and validation tasks Copy model tasks Model integrity tasks Outdated entities removal tasks Back up model and settings tasks Server software update tasks Collector software update tasks Dictionary update tasks Report and ticket tasks Report generation tasks Ticket generation tasks CSV access rule review export tasks CSV analysis export tasks CSV change tracking export tasks CSV compliance results export tasks CSV Configuration Compliance export tasks CSV firewall assurance export tasks CSV optimization and cleanup export tasks CSV security metrics export tasks Qualys format XML vulnerability occurrences export tasks Part II: Analyses Managing analyses Types of analyses Setting analysis parameters Analysis Properties dialog box Customizing the display of an analysis Risk analyses Assets analyses Attacks analyses Business Asset Groups analyses Business Units analyses Locations analyses Skybox View version

6 Skybox View Reference Guide Networks analyses Regulation Compliance analyses Threat Origins analyses Vulnerability definitions risk analyses Vulnerability occurrences analyses Worms analyses Threat management analyses Vulnerability definitions threat management analyses Model validation analyses Assets validation analyses Network interfaces validation analyses Networks validation analyses Services validation analyses Ticket analyses Tickets analyses Part III: Tickets, reports, and notifications Tickets reference Tickets Ticket rules Reports reference Working with reports Report Properties dialog box Tickets reports Skybox Vulnerability Control and Skybox Threat Manager reports Skybox Firewall Assurance reports Skybox Network Assurance reports Notifications reference Notifications Customizing notification templates Selecting the correct template Editing templates Exportable data CSV-exportable data Other exports Part IV: Tools Access Control List Editor Using the Access Control List Editor Access Rule Properties dialog box ACL Management dialog box Skybox View version

7 Contents Access Rule Properties with Rule Review section Access Rule Properties dialog box (extended) Specifying routing rules Managing routing rules Replicating routing rules Access Analyzer Access Analyzer query fields for Vulnerability Control Access Analyzer query fields for Firewall Assurance and Network Assurance Network Map Network Map control panel Network Map filter toolbar s of individual maps Layout parameters Firewall Map Firewall Map filter pane Part V: Entities Model entities Entity relationships Locking entity parameters Business Asset Groups Business Units Clouds Assets Asset groups Locations Networks Network groups Network interfaces Services Threat Origins Vulnerability occurrences Index Skybox View version

8 Preface Intended Audience The Skybox View Reference Guide is the reference companion to the Skybox Firewall Assurance User s Guide, the Skybox Network Assurance User s Guide, the Skybox Vulnerability Control User s Guide, and the Skybox Threat Manager User s Guide. The intended audience is readers of the User s Guides who want additional technical and in-depth information. How this manual is organized The parts in this manual contain reference information about Skybox View, such as configuration of components and devices; supplying parameters of analyses, tasks, and model entities; and specifying access, dependency, and routing rules. Related documentation The following documentation is available for Skybox View: Skybox View Installation and Administration Guide Skybox View Developer s Guide Skybox View Release Notes The entire documentation set (in PDF format) is available in the <Skybox_View_Home>/docs directory. You can access a comprehensive Help file from any location in the Skybox View Manager by using the Help menu or by pressing F1. Technical support You can contact Skybox Security technical support by: Calling SKYBOX ( ) inside the U.S. or outside the U.S. Using the Skybox Security support portal at You must register to use the support portal. Registered users can view the knowledge base, download updates, and submit cases. Faxing (U.S. number) Sending an to support@skyboxsecurity.com When opening a case, you need the following information: Your contact information (telephone number and address) Skybox View version and build numbers Platform (Windows or Linux) Problem description Skybox View version

9 Any documentation or relevant logs You can compress logs before attaching them by using the Pack Logs tool (see Packing log files for technical support, in the Skybox View Installation and Administration Guide). Preface Skybox View version

10 Part I: Tasks This part describes the parameters of Skybox View tasks.

11 Chapter 1 Managing tasks This chapter gives an overview of how to set the parameters of Skybox View tasks. For information about running tasks, task messages, and modifying tasks, see Tasks, in the Skybox Vulnerability Control Getting Started Guide. In this chapter User roles and tasks Setting task parameters Task Properties dialog box Device access management Using Cyber-Ark for device password management User roles and tasks Only Admins and Users have access to the Operational Console where Skybox View tasks are managed. Admins can create, manage, and run all tasks. Users can view tasks that add information to the model, delete information from the model, or save the model. Users can create, manage, and run the following: All types of analysis tasks All types of report tasks, including CSV export tasks and XML vulnerability occurrence export tasks Ticket generation tasks Copy model tasks (which copy model data from one model to another, such as from Live to What If) Setting task parameters The general procedure for setting task parameters is described in this section. The main dialog box for setting a task s parameters is described in Task Properties dialog box (on page 12) and Schedule tab (on page 13). These sections describe parameters common to all tasks. For information about the parameters specific to each Skybox View task type, see the section relating to the task. Tip: When you mouseover a field, a tooltip listing the values selected for that field appears. This is especially useful for fields of the s pane that can hold multiple values. To open the operational console On the toolbar, click. Skybox View version

12 Skybox View Reference Guide To create a Skybox View task On the Operational Console toolbar, click. To create a Skybox View task based on an existing task 1 In the Operational Console tree, select Tasks > All Tasks. The workspace lists all tasks defined for this model. 2 Right-click a task and select Create Task Like. A Task Properties dialog box containing a copy of the selected task appears. To edit a Skybox View task 1 In the Operational Console tree, select Tasks > All Tasks. The workspace lists all tasks defined for this model. 2 Do one of the following: Double-click a task. Right-click a task and select Properties. The Task Properties dialog box for the selected task appears. Task Properties dialog box The Task Properties dialog box contains the following tabs: General, Comments, and Schedule: General: This tab, described in General tab (on page 12), contains the fields that define the selected task type. Alerts: This tab, described in Alerts tab (on page 13), is used to define when and where alerts are sent for the task. Comments: This tab, which is the same for all tasks, contains your description of the task. Supplying a description is optional (but strongly recommended) and does not affect the task. When the Task table is displayed in the Operational Console, view comments by showing the User Comments column. Schedule: This tab, which is the same for all tasks, is described in Schedule tab (on page 13). It is used to schedule the automatic launching of the task. General tab The General tab consists of two panes: s: This pane contains parameters specific to each task. These parameters are described in the task-specific sections. General: This pane, described in the following table, is the same for all tasks. Name Task Type Collector Timeout Hours A name that you assign to the task. The task type. Task types are grouped into folders and are searchable. You can modify this parameter for new tasks only. The Skybox View Collector to be used by the task. Specifies whether the task has a timeout limit. This field is enabled only if Timeout is selected. Skybox View version

13 Chapter 1 Managing tasks Minutes Show Properties Dialog Before Launch Enable Auto-launch The hours portion of the task s timeout limit. This field is enabled only if Timeout is selected. The minutes portion of the task s timeout limit. Note: This field is displayed only when working with Skybox Vulnerability Control. Specifies whether to open the task s Properties dialog box before the task is launched. Specifies whether to launch the task automatically, according to the schedules that are specified in the Schedule tab. Alerts tab The Alerts tab is used to define who will get alerts for a task, and under what exit conditions. You can either use the global settings (from Tools > Options > Server Options > Task Settings > Task Alert Settings) or define specific ones. Enable Task Alerts To Specifies whether task alerts are sent for this task. This field is enabled only if Enable Task Alerts is selected. Specifies to which users task alerts are sent: Use Global Settings: Task alerts are sent to the users specified in the global settings. Exit Codes Specific: Enables you to specify users and addresses to which task alerts from this task are sent. This field is enabled only if Enable Task Alerts is selected. Specifies on which exit codes task alerts are sent for this task. Use Global Settings: Task alerts are sent according to the exit codes specified in the global settings. Specific: Enables you to specify the exit codes for which task alerts from this task are sent. Schedule tab The Schedule tab is used to schedule when a task runs automatically (auto-launch). Note: Each schedule (each row) is independent of every other schedule. You can add, modify, or delete schedules. To add a schedule to a task 1 In the Task Properties dialog box, click the Schedule tab. 2 Click Add. 3 Select a frequency for the task. 4 Select when the task is to run according to the selected frequency. Daily, Weekly, Monthly, Yearly To change the time of day, click the down arrow next to the Every day at or At field. (To close the Clock dialog box, click anywhere inside the Task Schedule dialog box.) Monthly If you specify a day that does not exist in all months for example, day 31 the task is not launched from this schedule in a month that does not contain that day. Skybox View version

14 Skybox View Reference Guide Yearly If you specify a day that does not exist in the selected month for example, November 31 the task is never launched from this schedule. 5 To specify that the task runs a limited number of times, select End After and specify how many times the task is to run automatically. 6 In the Model field, specify the model on which to run this schedule. 7 Click OK. 8 If auto-launch is disabled (Enable Auto-launch is cleared in the General tab), you are asked whether you want to enable auto-launch. You can run a sequence of tasks on a schedule. For information about task sequences, see the Using tasks for automation chapter in the Skybox Vulnerability Control User s Guide or the Skybox Network Assurance User s Guide. Device access management For some task types, you can instruct Skybox View to take user name and password pairs from a repository instead of typing this data in fields in the Task Properties dialog box. In many organizations, the same user name and password combination is used to access multiple devices of one type. For example, there might be one user name and password to access your organization s Cisco routers in London and a separate combination to access the Cisco routers in New York. Admins can configure Skybox View so that each user name and password combination is saved by Skybox View and can be used by online collection tasks for devices of the specified type and scope. This section contains information about setting up access for multiple devices. Creating access tokens In Skybox View, each combination of user name and password for a specific set of devices is referred to as an access token. Only Admins can create (and manage) these access tokens, which are used by some online collection tasks. For devices that require an administrator user name and password combination, create two access tokens; a regular one (of type <Device_type>) for the regular user name and password, and a separate one (of type <Device_type> Admin) for the administrator combination. The types of online collection tasks that can use access tokens are listed in the following table. Collection task type Token type Routers Cisco IOS Routers Nortel Passport To create an access token Cisco, Cisco Admin Nortel Passport 1 Select Tools > Administrative Tools > Device Access Management. 2 In the Device Access Management dialog box, click Add. 3 In the New Access Token dialog box: a) Type a Device Name for the access token, such as London Cisco routers. b) In the Field Type field, select the type of device. Cisco IOS routers, which require an administrator user name and password combination, require two access tokens, one for a regular user whose Type is the device name type (Cisco) and one for the administrator user name and password combination whose Type has the string Admin appended to the name (Cisco Admin). Skybox View version

15 Chapter 1 Managing tasks c) In the User Name field, type the user name for this set of devices. For Admin-type access tokens, this is the administrator user name. d) In the Password and Confirm Password fields, type the password for this set of devices. For Admin-type access tokens, this is the administrator password. e) If necessary, click the Browse button next to the Scope field to limit the scope of the device set. f) Click OK to save the new device access token. How access tokens are used After creating access tokens, you can use them in online collection tasks. Each access token type matches a specific type of collection. Admin-type access tokens are used only when required by the devices being accessed. Note: Access tokens are only used when Use Access Tokens is selected in the Properties dialog box of the task. If this option is not selected, even if access tokens exist for the devices specified in the task, they are not used. When Use Access Tokens is selected, Skybox View checks the access tokens to find those that match the scope and type of the task. Access tokens that do not match either the scope or the type of the task are not used. For example, if there is an access token for Cisco routers in London and one for Cisco firewalls in London, a router collection task uses only the router-type access token and a firewall collection task uses only the firewall-type access token. If two (or more) access tokens are found that match a task, the best match (the one with the most specific range) is used. For example, you create a collection task for a device with the address ; an access token with a range of matches the task, but an access token with a range of is a more specific match and is used by the task. Using Cyber-Ark for device password management Cyber-Ark is a tool that allows highly-sensitive passwords to be centrally stored, logged, and managed. The following tasks can be authenticated with Cyber-Ark: Firewalls Check Point FireWall-1 CPMI Collection (on page 45) Firewalls Cisco PIX/ASA/FWSM Collection (on page 58) Firewalls Cisco Security Manager Collection (on page 61) Firewalls FortiGate Collection (on page 64) Firewalls FortiManager Collection (on page 66) Firewalls Junos Collection (on page 68) Firewalls NetScreen Collection (on page 69) Firewalls Juniper Networks NSM Collection (on page 71) Firewalls McAfee Firewall Enterprise Collection (on page 73) Firewalls Palo Alto Networks Collection (on page 75) Firewalls Panorama Collection (on page 77) Firewalls SonicWALL Collection (on page 63) Skybox View version

16 Skybox View Reference Guide Load Balancer A10 Collection (on page 104) Load Balancer AppDirector Collection (on page 109) Load Balancer BIG-IP Collection (on page 108) Load Balancer NetScaler Collection (on page 107) Proxy Blue Coat Collection (on page 43) Routers Cisco IOS Collection (on page 114) Routers Cisco Nexus Collection (on page 118) Routers HP ProCurve Collection (on page 121) Tools Script Invocation (on page 40) You must configure Cyber-Ark so that Skybox View tasks can retrieve device authentication credentials from Cyber-Ark. Configuring Cyber-Ark for device credentials retrieval It is recommended that you create a separate safe to contain all device authentication credentials required by Skybox View collection tasks. It is recommended that you use one or more Cyber-Ark application security options: Add the IP address of the Skybox View Server Add the Operating System User of the Skybox View Server: (If you installed the Server as a service): skyboxview (If you did not install the Server as a service): The installation user Add the path to JBoss in the Skybox View installation: <Skybox_View_Home>\thirdparty\jboss Note: The default folder for Cyber-Ark is Root and the default application ID for connecting from Skybox View is SkyboxSecurity. If you change these in Cyber-Ark, you must also change them in Skybox View. For additional information, see Global Task Settings, in the Skybox View Installation and Administration Guide. Skybox View version

17 Chapter 2 Quick reference for data collection This chapter provides a quick reference for data collection from devices supported by Skybox View. More detailed information for each device is available in the following chapters. You can collect device data by: Connecting directly to the device or management system and collecting device data. For this method, you must know the device details, such as credentials and the device IP address. Skybox View has specific collection tasks for many types of devices. Importing saved device files. For this method, you must save copies of the necessary files on your file system. Skybox View includes offline file import tasks that import these data files. In this chapter Quick reference: firewall configuration collection Quick reference: firewall traffic log and audit log collection Quick reference: proxies, VPN devices, and IPS devices Quick reference: load balancers Quick reference: routers and LAN controllers Quick reference: scanners Quick reference: alert services Quick reference: firewall configuration collection You can collect device data by: Connecting directly to the device ( ) or device management system ( ) and collecting device data. For this method, you must know the device details, such as credentials and the device IP address. Skybox View has many tasks that connect to specific types of devices. Importing saved device files ( ). For this method, you must save copies of the necessary files on your file system. Skybox View includes offline file import tasks that import these data files. Skybox View version

18 Skybox View Reference Guide Device Barracuda Networks (Phion) Barracuda NG Firewall Check Point Firewall-1 (on page 45) Check Point Provider-1 (on page 53) Cisco PIX/ASA/FWSM (on page 58) Cisco Security Manager (on page 61) Data source Integration requirements Skybox View includes a parser that creates an ixml file from Barracuda Networks Barracuda NG firewall configuration files. This ixml file can then be imported into Skybox View. The parser is located at <Skybox_View_Home>\intermediate\bin\pa rsers\firewalls\barracuda\barracudangp arser.pl. For help using the script, run the script without any parameters. For additional help, open a case at the Skybox Security support portal. The OPSEC API is used to get configurations remotely from FireWall-1 Manager or from Provider- 1 CMA. The following files are required for FireWall-1 Manager: objects_5_0.c: The network objects rulebases_5_0.fws: The rulebase The following files are required for Provider-1 CMA: objects.c or objects_5_0.c: The CMA network objects rulebases.fws or rulebases_5_0.fws: The CMA rulebase g_objects.c or g_objects_5_0.c: The global network objects The following files are optional for FireWall-1 Manager and Provider-1 CMA: install_statuses.c: The statuses Note: If the Check Point configuration contains several policies, install_statuses.c is mandatory. vsx_objects.c: The VSX device objects You also need the name of the active policy on each firewall module and the ifconfig and netstat rnv output from each firewall module. The IP address of the firewall SSH or telnet access to the firewall An admin user with level 5 privileges The following files are required: run.txt: The PIX/ASA/FWSM configuration (Optional) route.txt: Dump of the PIX/ASA/FWSM routing table The IP address of the Security Manager A user name and password to access the Security Manager Skybox View version

19 Chapter 2 Quick reference for data collection Device CiscoWorks (on page 145) Dell SonicWALL (on page 63) Fortinet FortiGate (on page 64) Fortinet FortiManager (on page 66) Juniper Networks Junos (on page 68) Juniper Networks NetScreen (on page 69) Juniper Networks NSM (on page 71) Data source Integration requirements The following file is required: *.xml: The Security Manager source file The following file is required: <device_ip_address>.cfg: The firewall configuration The name or IP address of the firewall A user name and password to access the firewall The IP address of the firewall SSH or telnet access to the firewall A user name and password to access the firewall The following files are required: config.txt: The FortiGate configuration (Optional) route.txt: Dump of the FortiGate routing table The name or IP address of the FortiManager Security Management appliance A user name and password to access the FortiManager Security Management appliance The IP address of the firewall SSH or telnet access to the firewall A user name and password to access the firewall The following files are required: config.txt: The Junos configuration (Optional) route.txt: Dump of the Junos routing table The IP address of the firewall SSH or telnet access to the firewall A user name and password to access the firewall The following files are required: config.txt: The NetScreen configuration (Optional) route.txt: Dump of the NetScreen routing table A global domain Read-Only Administrator account. The name or IP address of the NSM A user name and password to access the NSM Skybox View version

20 Skybox View Reference Guide Device Linux iptables (on page 73) McAfee Firewall Enterprise (Sidewinder) (on page 73) Palo Alto Networks (on page 75) Palo Alto Networks Panorama (on page 77) Sidewinder G2 (McAfee Firewall Enterprise) (on page 78) Data source Integration requirements The following files are required: ifconfig.txt: The iptables interfaces configuration report filter.txt: The iptables filter table nat.txt: The iptables NAT table mangle.txt: The iptables mangle table The name or IP address of the firewall A user name and password to access the firewall The name or IP address of the firewall A user name and password to access the firewall The following files are required: config.xml: The Palo Alto configuration and system information (Optional) route.txt: Dump of the Palo Alto Networks routing table The name or IP address of the Panorama A user name and password to access the Panorama The following files are required: The interfaces file The ipfilter data file The proxy services definitions file The proxy rules data (ACL) file (Optional) Burbs definition file (Optional) Routing information file The Skybox View Sidewinder G2 parser creates an ixml file from these files. This ixml file can then be imported into Skybox View. Skybox View version

21 Chapter 2 Quick reference for data collection Device Stonesoft (McAfee) StoneGate Topsec WatchGuard Technologies Data source Integration requirements Skybox View includes a collector script that retrieves Stonesoft StoneGate firewall configuration files and a parser that creates an ixml file from these files. This ixml file can then be imported into Skybox View. The collector script is located at <Skybox_View_Home>\intermediate\bin\co llectors\firewalls\stonegate\stonegate Collection.pl. The parser is located at <Skybox_View_Home>\intermediate\bin\pa rsers\firewalls\stonegate\stonegatepar ser.pl. For help using the scripts, run each script without any parameters. For additional help, open a case at the Skybox Security support portal. Skybox View includes a parser that creates an ixml file from Topsec firewall configuration files. This ixml file can then be imported into Skybox View. The parser is located at <Skybox_View_Home>\intermediate\bin\pa rsers\router\topsec\topsecparser.pl. For help using the parser, run the parser without any parameters. For additional help, open a case at the Skybox Security support portal. Skybox View includes a collector script that retrieves WatchGuard Technologies firewall configuration files and a parser that creates an ixml file from these files. This ixml file can then be imported into Skybox View. The collector script is located at <Skybox_View_Home>\intermediate\bin\co llectors\firewalls\watchguard\watchgua rdcollection.pl. The parser is located at <Skybox_View_Home>\intermediate\bin\pa rsers\firewalls\watchguard\watchguardp arser.pl. For help using the scripts, run each script without any parameters. For additional help, open a case at the Skybox Security support portal. Quick reference: firewall traffic log and audit log collection You can collect firewall traffic and audit data by: Connecting directly to the management system ( ) that manages the firewalls and collecting log data. For this method, you must know the management system details, such as credentials and the device IP address. Skybox View has many tasks that connect to specific management systems. Skybox View version

22 Skybox View Reference Guide Importing saved firewall log files ( ). For this method, you must save copies of the necessary files on your file system. Skybox View includes offline file import tasks that import these data files. Data Check Point Firewall-1 activity log data (on page 83) (LEA collection) Check Point FireWall-1 change events (on page 90) (audit log data) Syslog change events (on page 91) Syslog traffic events (on page 95) Data source Integration requirements The IP address of the FireWall-1 management system A user name and password to access the management system (If collecting from a log server) The IP address of the log server The IP address of the FireWall-1 management system A user name and password to access the management system (If collecting from a log server) The IP address of the log server Configure the firewall or syslog server to forward the change events The path to the directory containing the syslog files Configure the firewall or syslog server to forward the traffic events The path to the directory containing the syslog files Quick reference: proxies, VPN devices, and IPS devices You can collect device data by: Connecting directly to the device ( ) or device management system ( ) and collecting device data. For this method, you must know the device details, such as credentials and the device IP address. Skybox View has many tasks that connect to specific types of devices. Importing saved device files ( ). For this method, you must save copies of the necessary files on your file system. Skybox View includes offline file import tasks that import these data files. Device BalaBit Shell Control Box Data source Integration requirements Skybox View includes a parser that creates an ixml file from BalaBit Shell Control Box proxy configuration files. This ixml file can then be imported into Skybox View. The parser is located at <Skybox_View_Home>\intermediate\bin\pa rsers\proxy\balabitscb\balabitscbparse r.pl. For help using the parser, run the parser without Skybox View version

23 Chapter 2 Quick reference for data collection Device Blue Coat (on page 43) HP TippingPoint (on page 101) IBM ISS Proventia G (on page 102) Juniper SSL Data source + Integration requirements any parameters. For additional help, open a case at the Skybox Security support portal. The IP address of the proxy A user name and password to access the proxy The following files are required: *.txt or *.log: The Blue Coat configuration (Optional) route.txt: Dump of the Blue Coat routing table The name or IP address of the SMS appliance A super user name and password to access the SMS appliance The IP address of the TippingPoint device A user name and password to access the TippingPoint device The IP address of the Proventia G appliance A user name and password to access the SiteProtector database Skybox View includes a parser that creates an ixml file from Juniper SSL VPN appliance configuration files. This ixml file can then be imported into Skybox View. The parser is located at <Skybox_View_Home>\intermediate\bin\pa rsers\vpn\juniper\junipersslvpnparser. pl. For help using the parser, run the parser without any parameters. For additional help, open a case at the Skybox Security support portal. Quick reference: load balancers You can collect load balancer data by: Connecting directly to the load balancer ( ) and collecting device data. For this method, you must know the load balancer details, such as credentials and the device IP address. Skybox View has many tasks that connect to specific types of load balancers. Importing saved load balancer files ( ). For this method, you must save copies of the necessary files on your file system. Skybox View includes offline file import tasks that import these data files. Device A10 Networks (on page 104) Data source Integration requirements The IP address of the load balancer A user name and password to access the load Skybox View version

24 Skybox View Reference Guide Device Cisco Ace Cisco CSS (on page 106) Citrix NetScaler (on page 107) F5 BIG-IP (on page 108) Radware AppDirector (on page 109) Radware WSD (on page 111) Data source Integration requirements balancer The following files are required: *.txt or *.log: The A10 configuration (Optional) route.txt: Dump of the A10 routing table Skybox View includes a parser that creates an ixml file from Cisco Ace load balancer configuration files. This ixml file can then be imported into Skybox View. The parser is located at <Skybox_View_Home>\intermediate\bin\pa rsers\loadbalancers\ciscoace\ciscoacep arser.pl. For help using the parser, run the parser without any parameters. For additional help, open a case at the Skybox Security support portal. The following file is required: A Cisco CSS configuration file The Skybox View Cisco CSS parser creates an ixml file from this file. This ixml file can then be imported into Skybox View. The IP address of the load balancer A user name and password to access the load balancer The IP address of the load balancer A user name and password to access the load balancer The IP address of the load balancer A user name and password to access the load balancer The following files are required: *.*: The AppDirector configuration (Optional) route.txt: Dump of the AppDirector routing table The IP address of the load balancer The SNMP Community string to access the load balancers The following file is required: *.txt: A WSD SNMP dump file Quick reference: routers and LAN controllers With Skybox View, you can collect router configuration data by: Connecting directly to the router ( ) and collecting device data. Skybox View version

25 Chapter 2 Quick reference for data collection For this method, you must know the router details, such as credentials and the device IP address. Skybox View has many tasks that connect to specific types of routers. Importing saved device files ( ). For this method, you must save copies of the necessary files on your file system. Skybox View includes offline file import tasks that import these data files. Device Alcatel-Lucent Cisco Wireless LAN Controller CiscoWorks (on page 145) Brocade (Foundry Networks) Data source Integration requirements Skybox View includes a collector script that retrieves Alcatel-Lucent router configuration files and a parser that creates an ixml file from these files. This ixml file can then be imported into Skybox View. The collector script is located at <Skybox_View_Home>\intermediate\bin\co llectors\router\alcatellucent\alcatell ucentcollection.pl. The parser is located at <Skybox_View_Home>\intermediate\bin\pa rsers\router\alcatellucent\alcatelluce ntparser.pl. For help using the scripts, run each script without any parameters. For additional help, open a case at the Skybox Security support portal. Skybox View includes a parser that creates an ixml file from Cisco Wireless LAN Controller configuration files. This ixml file can then be imported into Skybox View. The parser is located at <Skybox_View_Home>\intermediate\bin\pa rsers\wireless\ciscowlc\ciscowlcparser.pl. For help using the parser, run the parser without any parameters. For additional help, open a case at the Skybox Security support portal. The following file is required: <device_ip_address>.cfg: The router configuration The following files are required: run.txt: The router s configuration (Optional) route.txt: Dump of the router s routing table Skybox View version

26 Skybox View Reference Guide Device H3C HP ProCurve (on page 121) Nortel Passport 8600 (on page 122) Data source Integration requirements Skybox View includes a parser that creates an ixml file from H3C router configuration files. This ixml file can then be imported into Skybox View. The parser is located at <Skybox_View_Home>\intermediate\bin\pa rsers\router\h3c\h3cparser.pl. For help using the parser, run the parser without any parameters. For additional help, open a case at the Skybox Security support portal. The IP address of the router A user name and password to access the router The following files are required: *.*: The ProCurve configuration (Optional) route.txt: Dump of the ProCurve routing table The IP address of the router SSH or telnet access to the router A user name and password to access the router The following files are required: run.txt: The Nortel configuration (Optional) route.txt: Dump of the Nortel routing table Quick reference: scanners You can collect device data by: Connecting directly to the scanner ( ) or scanner management system ( ) and collecting device data. For this method, you must know the scanner details, such as credentials and the device IP address. Skybox View has many tasks that connect to specific types of scanners. Importing saved scanner files ( ). For this method, you must save copies of the necessary files on your file system. Skybox View includes offline file import tasks that import these data files. Device eeye Retina scanner (on page 125) Data source Integration requirements One of: The path to an RTD file The name of the DSN that is configured for the Retina output Skybox View version

27 Chapter 2 Quick reference for data collection Device McAfee Foundstone FoundScan scanner (on page 126) HP Software & Solutions (OpenView) (on page 145) IBM SiteProtector (on page 128) Data source Integration requirements The name or IP address of the database server that hosts the FoundScan database A user name and password to access the FoundScan database The following file is required: *.txt: HPOV topology dump The IP address of the scanner The name or IP address of the database server that hosts the SiteProtector database A user name and password to access the SiteProtector database Nmap Use a topology discovery task (see page 151) Use a basic file import (on page 35) or advanced file import (on page 36) task. The following file is required: Outpost24 Qualys QualysGuard scanner (on page 129) Rapid7 Nexpose (on page 132) *.xml: Nmap XML file (output of nmap v ss O ox <out-file> <scan-range>) Skybox View includes a parser that creates an ixml file from Outpost24 scanner files. This ixml file can then be imported into Skybox View. The parser is located at <Skybox_View_Home>\intermediate\bin\pa rsers\scanners\outpost24\outpost24pars er.pl. For help using the parser, run the parser without any parameters. For additional help, open a case at the Skybox Security support portal. A user name and password to access the Qualys account The following files are required: scan.xml: Qualys scan (Optional) map.xml: Qualys map The IP address of the scanner A user name and password to access the scanner The following files are required: A set of *.xml: Rapid7 Nexpose audit report files The files can be in ns-xml, raw-xml, or qualys-xml format. Skybox View version

28 Skybox View Reference Guide Device Shavlik NetChk Protect patch management tool (on page 133) SNMP walk Tenable Network Security Nessus (on page 134) Tripwire ncircle scanner (on page 136) Data source Integration requirements One of: The path to an MDB file The name of the DSN that is configured for the NetChk Protect output The following file is required: *.txt: Shavlik NetChk Protect Vulnerability Scanner Report Use a basic file import (on page 35) or advanced file import (on page 36) task. The following file is required: *.*: SNMP walk dump The IP address of the scanner A user name and password to access the scanner The following file is required: *.nessus: Nessus XML file The following files are required for ncircle XML3: scan.xml: ncircle export XML aspl.xml: ncircle ASPL XML The following file is required for ncircle XML2: *.xml: ncircle export XML Quick reference: alert services You can collect device data by: Connecting directly to the <device> ( ) or management system ( ) and collecting device data. For this method, you must know the <device> details, such as credentials and the device IP address. Skybox View has many tasks that connect to specific types of devices. Importing saved <device> files ( ). For this method, you must save copies of the necessary files on your file system. Skybox View includes offline file import tasks that import these data files. Skybox View version

29 Chapter 3 File import tasks This chapter describes how to set the parameters of file import tasks. Note: File import tasks can import a new model (in XML or encrypted XML format) into the current model, thus merging two models. This is useful if you must merge several models. In this chapter Import directory tasks Data formats for file import tasks Basic file import tasks Advanced file import tasks Collector file import tasks Advanced collector file import tasks Script invocation tasks Importing interface and routing configuration Import directory tasks Import Directory tasks import the configuration or scan data files of multiple devices into a Skybox View model, where the files are in a specified directory located on the Skybox View Server or on a Skybox View Collector. For a list of supported devices, scanners, and files and their file formats, see Supported devices and files for import directory tasks (on page 30). Directory structure Single configuration files for devices and scanner output files must be located in the specified directory (this directory can contain any number of these files, for the same or different devices); if a device has multiple configuration files, the files must be located in a first-level subdirectory of the specified directory (one subdirectory per device). You can specify up to four directories per Import Directory task. The specified directory can contain any of the following file types: A device configuration file A single file combines device configuration and a dump of the routing table A single file that combines the netstat and ifconfig data A scanner output file An ixml file Each (first-level) subdirectory can contain one of the following sets of files: Device configuration and a dump of the routing table in separate files Check Point files: (Mandatory) objects.c, rulesbases.fws (Optional) global objects, statuses file Skybox View version

30 Skybox View Reference Guide Note: If the Check Point configuration contains several policies, install_statuses.c is mandatory (it contains the information of which policy is installed on which firewall). netstat and ifconfig data in separate files Note: In all cases the files can have any names: Skybox View identifies the file type. Task parameters The parameters that control Import Directory tasks are described in the following table. Basic tab Run in Modified in Set <n> Directory Comment Additional Sets The location of the files to import. The age of the files to import. Custom: Select Specific or Relative start and end times. Specify up to four sets of devices (directories). (To import more sets, use the Additional Sets field.) If you specify Location Hint in the Advanced tab, all devices must be at the same location. The full path to the directory containing the files (and subdirectories) to import. of the contents of Directory. Click the Browse button and type the directories containing the configuration data of additional sets of devices (one per line). Optionally, specify a location hint per directory. Advanced tab Location Hint Merge assets by Wins name Do not force unique tag merging ncircle ASPL file The location of the devices whose data is imported. (To import the data of more than one device, the devices must be at the same location.) Note: Use this parameter when different locations use the same set of IP addresses, so that two devices at different locations can have the same IP address. Specifies whether to merge assets from the same network by name and not by IP address. Select this option when assets do not have fixed IP addresses. If selected, and the firewall or router being imported has a unique tag, the task tries to match the device to devices already existing in the model according to network interfaces. If unsuccessful, the task adds the device to the model. If cleared, the task adds the device to the model if it has a unique tag. (For ncircle XML3 imports) The ASPL file to use for all ncircle imports (so that the file is only parsed once by Skybox View). If this field is left blank, the ASPL file is parsed separately for each ncircle import. Supported devices and files for import directory tasks Import Directory tasks support the following devices, scanners, and files: Devices Skybox View version

31 A10 Networks load balancers Blue Coat proxies Check Point FireWall-1 firewalls and Provider-1 CMAs Cisco PIX/ASA/FWSM firewalls Cisco IOS routers Cisco Nexus routers F5 BIG-IP load balancers Fortinet FortiGate firewalls HP ProCurve routers Juniper Networks Junos firewalls and routers Juniper Networks NetScreen firewalls McAfee epolicy Orchestrator management systems McAfee Firewall Enterprise firewalls Palo Alto Networks firewalls Radware AppDirector load balancers Chapter 3 File import tasks ixml: A file containing device configuration written in Skybox View s Integration XML (ixml) For information about ixml, see the Integration part of the Skybox View Developer s Toolkit Scanner output Nessus vulnerabilities scanners (XML format) Qualys QualysGuard scanners (XML format) Rapid7 Nexpose scanners Tripwire ncircle scanners (XML format) Network state files (see Importing interface and routing configuration (on page 41)) netstat data files ifconfig data files Data formats for file import tasks Note: It is recommended that you use Import Directory tasks (see page 29) for all supported devices and file types (see page 30) (including network state files and ixml files). The import data format types supported by Skybox View are listed in the following table. The table also gives the relevant source file or folder required for the file import. The information in this table is used by the following file import task types: Import Basic, Import Advanced, Import Collector, and Import Collector Advanced. Note: For Import Basic tasks, you must specify the location of each file separately and not the folder. Format name Type of import data Source file or folder A10 A10 Folder containing the following files: *.txt or *.log: The A10 configuration (Optional) route.txt: Dump of the Skybox View version

User s Guide. Skybox Risk Control 7.0.0. Revision: 11

User s Guide. Skybox Risk Control 7.0.0. Revision: 11 User s Guide Skybox Risk Control 7.0.0 Revision: 11 Copyright 2002-2014 Skybox Security, Inc. All rights reserved. This documentation contains proprietary information belonging to Skybox Security and is

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks

More information

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product

More information

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Managing Vulnerability Assessment

Managing Vulnerability Assessment Security Threat Response Manager Release 2012.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-12 Copyright Notice Copyright 2013

More information

Extreme Networks Security Vulnerability Assessment Configuration Guide

Extreme Networks Security Vulnerability Assessment Configuration Guide Extreme Networks Security Vulnerability Assessment Configuration Guide 9034869 Published July 2015 Copyright 2007 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make

More information

List of Supported Systems & Devices

List of Supported Systems & Devices List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged

More information

HP TippingPoint Security Management System User Guide

HP TippingPoint Security Management System User Guide HP TippingPoint Security Management System User Guide Version 4.0 Abstract This information describes the HP TippingPoint Security Management System (SMS) client user interface, and includes configuration

More information

WatchDox SharePoint Beta Guide. Application Version 1.0.0

WatchDox SharePoint Beta Guide. Application Version 1.0.0 Application Version 1.0.0 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE FAST FORWARD YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE VISUALIZE COMPLY PROTECT RedSeal Networks, Inc. 3965 Freedom Circle, 8th Floor, Santa Clara, 95054 Tel (408) 641-2200 Toll Free (888)

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Integrating Juniper Netscreen (ScreenOS)

Integrating Juniper Netscreen (ScreenOS) Integrating Juniper Netscreen (ScreenOS) EventTracker Enterprise Publication Date: Jan. 5, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide helps you

More information

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE

More information

VMware vcenter Operations Manager Enterprise Administration Guide

VMware vcenter Operations Manager Enterprise Administration Guide VMware vcenter Operations Manager Enterprise Administration Guide vcenter Operations Manager Enterprise 5.0 This document supports the version of each product listed and supports all subsequent versions

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright

More information

Integrate Check Point Firewall

Integrate Check Point Firewall Integrate Check Point Firewall EventTracker Enterprise Publication Date: Oct.26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Log Sources User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 108. Copyright

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system

More information

Symantec Security Information Manager Version 4.7

Symantec Security Information Manager Version 4.7 Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics Event Source Log Configuration Guide Microsoft Windows using Eventing Collection Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event

More information

VMware vcenter Operations Manager Administration Guide

VMware vcenter Operations Manager Administration Guide VMware vcenter Operations Manager Administration Guide Custom User Interface vcenter Operations Manager 5.6 This document supports the version of each product listed and supports all subsequent versions

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Managing Vulnerability Assessment Release 2014.2 Published: 2014-07-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Managing Vulnerability Assessment Release 2014.4 Published: 2015-02-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Integrate Cisco IronPort Web Security Appliance (WSA)

Integrate Cisco IronPort Web Security Appliance (WSA) Integrate Cisco IronPort Web Security Appliance (WSA) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides

More information

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

Integrating Trend Micro OfficeScan 10 EventTracker v7.x Integrating Trend Micro OfficeScan 10 EventTracker v7.x Publication Date: August 26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help you in

More information

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014 QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

Multi-Domain Security Management

Multi-Domain Security Management Multi-Domain Security Management R77 Versions Administration Guide 20 May 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

Shavlik Patch for Microsoft System Center

Shavlik Patch for Microsoft System Center Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Administration Guide. WatchDox Server. Version 4.8.0

Administration Guide. WatchDox Server. Version 4.8.0 Administration Guide WatchDox Server Version 4.8.0 Published: 2015-11-01 SWD-20151101091846278 Contents Introduction... 7 Getting started... 11 Signing in to WatchDox... 11 Signing in with username and

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1

IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1 IBM Proventia Management SiteProtector Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1 Copyright Statement Copyright IBM Corporation 1994, 2010. IBM Global Services Route

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Getting Started. Version 9.1

Getting Started. Version 9.1 Getting Started Version 9.1 Contents About this Guide 4 Other Resources 4 Product Documentation 4 Online Training Program 4 Daily Online Q & A sessions 4 Prepare Your Customer's Network 5 Create a Probe

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01 Oracle Enterprise Single Sign-on Provisioning Gateway Administrator Guide Release 10.1.4.1.0 E12613-01 March 2009 Oracle Enterprise Single Sign-on Provisioning Gateway, Administrator Guide, Release 10.1.4.1.0

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Integrating Symantec Endpoint Protection

Integrating Symantec Endpoint Protection Integrating Symantec Endpoint Protection EventTracker Version 7.x Publication Date: Nov 8, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide This guide provides

More information

Integrating Barracuda Web Application Firewall

Integrating Barracuda Web Application Firewall Integrating Barracuda Web Application Firewall EventTracker v7.x Publication Date: July 28, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides

More information

IBM Security SiteProtector System Configuration Guide

IBM Security SiteProtector System Configuration Guide IBM Security IBM Security SiteProtector System Configuration Guide Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 209. This edition

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015 QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

FTP Server Configuration

FTP Server Configuration FTP Server Configuration For HP customers who need to configure an IIS or FileZilla FTP server before using HP Device Manager Technical white paper 2 Copyright 2012 Hewlett-Packard Development Company,

More information

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are

More information

Cloud Director User's Guide

Cloud Director User's Guide Cloud Director 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access

More information

EMC Smarts Integration Guide

EMC Smarts Integration Guide vcenter Operations Manager Enterprise 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more

More information

Adaptive Log Exporter Users Guide

Adaptive Log Exporter Users Guide IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,

More information

McAfee Security Information Event Management (SIEM) Administration Course 101

McAfee Security Information Event Management (SIEM) Administration Course 101 McAfee Security Information Event Management (SIEM) Administration Course 101 Intel Security Education Services Administration Course The McAfee SIEM Administration course from McAfee Education Services

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services

More information

Web Application Vulnerability Testing with Nessus

Web Application Vulnerability Testing with Nessus The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP rikjones@computer.org Rïk A. Jones Web developer since 1995 (16+ years) Involved with information

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

vrealize Operations Manager Customization and Administration Guide

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.0.1 This document supports the version of each product listed and supports all subsequent versions until

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics Event Source Log Configuration Guide VMware NSX Last Modified: Friday, March 13, 2015 Event Source Product Information: Vendor: VMware Event Source: VMware NSX Version: 6.1.2 RSA

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

VMware vcenter Discovered Machines Import Tool User's Guide Version 5.3.0.25 for vcenter Configuration Manager 5.3

VMware vcenter Discovered Machines Import Tool User's Guide Version 5.3.0.25 for vcenter Configuration Manager 5.3 VMware vcenter Discovered Machines Import Tool User's Guide Version 5.3.0.25 for vcenter Configuration Manager 5.3 This document supports the version of each product listed and supports all subsequent

More information

Integrate Cisco IronPort Email Security Appliance (ESA)

Integrate Cisco IronPort Email Security Appliance (ESA) Integrate Cisco IronPort Email Security Appliance (ESA) EventTracker v7.x Publication Date: Jun 17, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9) Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012 SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

LANDESK Service Desk. Desktop Manager

LANDESK Service Desk. Desktop Manager LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

Advanced Service Design

Advanced Service Design vcloud Automation Center 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

CenturyLink Cloud Configuration

CenturyLink Cloud Configuration CenturyLink Cloud Configuration CenturyLink Setup for VNS3:vpn, VNS3:net and VNS3:turret 2015 copyright 2015 1 Table of Contents Introduction 3 CenturyLink Cloud Deployment Setup 9 VNS3 Configuration Document

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

SNMP Adapter Installation and Configuration Guide

SNMP Adapter Installation and Configuration Guide SNMP Adapter Installation and Configuration Guide vcenter Operations Manager 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7

Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7 Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7 Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7 The software described

More information