The SmartView Tracker



Similar documents
SmartView Tracker. R77 Versions. Administration Guide. 21 May Classification: [Protected]

Check Point Security Administrator R70

SmartView Monitor. R77 Versions. Administration Guide. 21 May Classification: [Protected]

Configuring Security for FTP Traffic

Application Control and URL Filtering

VPN-1 VE Evaluation Guide

Integrate Check Point Firewall

Security Management Server

Multi-Domain Security Management

Monitoring Oracle Enterprise Performance Management System Release Deployments from Oracle Enterprise Manager 12c

Moving the Web Security Log Database

Checkpoint Check Point Provider-1 NGX (v4) Practice Test. Version 2.1

Monitoring Replication

In this lab you will explore the Windows XP Firewall and configure some advanced settings.

Security Administration R77

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Lab - Configure a Windows XP Firewall

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

W h a t is m e tro e th e rn e t

Monitoring System Status

WhatsUp Gold v11 Features Overview

HDA Integration Guide. Help Desk Authority 9.0

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

2X ApplicationServer & LoadBalancer Manual

CheckPoint Firewall-1 Commands

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Lab - Configure a Windows 7 Firewall

NETWRIX EVENT LOG MANAGER

EM EA. D is trib u te d D e n ia l O f S e rv ic e

SonicWALL GMS Custom Reports

S y ste m s. T h e D atabase. D atabase m anagem e n t sy ste m

Exclaimer Mail Archiver User Manual

SonicWALL Global Management System Reporting Guide Standard Edition

How to set up popular firewalls to work with Web CEO

Configuring Security for SMTP Traffic

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

WhatsUpGold. v NetFlow Monitor User Guide

CHAPTER 1 WhatsUp Flow Monitor Overview. CHAPTER 2 Configuring WhatsUp Flow Monitor. CHAPTER 3 Navigating WhatsUp Flow Monitor

Lab - Using Wireshark to View Network Traffic

3M Command Center. Installation and Upgrade Guide

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide

VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines

11.1. Performance Monitoring

+27O.557+! RM Auditor Additions - Web Monitor. Contents

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5

Monitor Mobile Devices via ActiveSync Using EventTracker

Network Visiblity and Performance Solutions Online Demo Guide

Managed Security Web Portal USER GUIDE

2X ApplicationServer & LoadBalancer Manual

Lab - Configure a Windows Vista Firewall

Parallels Plesk Panel

Moving the TRITON Reporting Databases

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Knowledge Base Articles

System Area Management Software Tool Tip: Integrating into NetIQ AppManager

Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker

EventTracker: Integrating Imperva SecureSphere

Jetico Central Manager. Administrator Guide

Adaptive Log Exporter Users Guide

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

LT Auditor Windows Assessment SP1 Installation & Configuration Guide

Virtual Web Appliance Setup Guide

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.

Operation Error Management

Configuring PA Firewalls for a Layer 3 Deployment

NEFSIS DEDICATED SERVER

1. Installation Overview

Setting up an MS SQL Server for IGSS

Lenovo Online Data Backup User Guide Version

28 What s New in IGSS V9. Speaker Notes INSIGHT AND OVERVIEW

Manual Password Depot Server 8

Analyzer 7.1 Administrator s Guide

Ekran System Help File

Checkpoint Accelerated CCSE NGX R65. Practice Test. Version 2.1

HP IMC User Behavior Auditor

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

Tenrox and Microsoft Dynamics CRM Integration Guide

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents:

Understanding Task Scheduler FIGURE Task Scheduler. The error reporting screen.

NETASQ SSO Agent Installation and deployment

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

WatchDox Administrator's Guide. Application Version 3.7.5

Viewing and Troubleshooting Perfmon Logs

F-Secure Client Security. Administrator's Guide

Desktop Surveillance Help

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

EVENT LOG MANAGEMENT...

FIGURE Selecting properties for the event log.

MacroLan Azure cloud tutorial.

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Installation Overview

Distributed File System Replication Management Pack Guide for System Center Operations Manager 2007

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0

IBM Security QRadar SIEM Version MR1. Administration Guide

Transcription:

CHAPTER 5 S m a r tv ie w T r a c k e r In This Chapter The Need for Tracking p ag e 8 9 The C heck P oint S olu tion for Tracking p ag e 9 0 Tracking C onsiderations p ag e 9 6 Tracking C onfigu ration p ag e 9 7 T h e N e e d fo r T ra c k in g As a sy ste m ad m in istrato r, y o u n e e d an ad v an c e d trac k in g to o l in o rd e r to ; En su re y o u r p ro d u c ts are o p e ratin g p ro p e rly, to c o n firm th at b o th b asic o p e ratio n s su c h as ac c e ss c o n tro l an d m o re ad v an c e d o p e ratio n s lik e IK E are all p e rfo rm e d c o rre c tly. Tro u b le sh o o t sy ste m an d se c u rity issu e s G ath e r in fo rm atio n fo r le g al re aso n s G e n e rate re p o rts to an aly z e y o u r traffic p atte rn s Y o u n e e d d iffe re n t le v e ls o f trac k in g, d e p e n d in g o n th e d ata s im p o rtan c e. F o r e x am p le, w h ile y o u m ay c h o o se to trac k stan d ard n e tw o rk p atte rn s (e.g. y o u r u se rs su rfin g p atte rn s), th is in fo rm atio n is n o t u rg e n t an d y o u c an in sp e c t it at y o u r c o n v e n ie n c e. Ho w e v e r, if y o u r fire w all is b e in g attac k e d, y o u m u st b e ale rte d im m e d iate ly. 89

The Check Point Solution for Tracking The C heck P oint Solu tion for Tracking In This Section Tracking O v erv iew Tracking O v erv iew page 90 The SmartV iew Tracker page 91 F iltering page 93 Q ueries page 93 L og F ile M aintenance via L og Sw itch page 94 Disk Sp ace M anagement via Cy clic L ogging page 94 L og E x p ort Cap abilities page 94 L ocal L ogging page 95 L ogging using L og Servers page 95 A dvanced Tracking O p erations page 96 Check Point products provide you with the ability to collect comprehensive information on your network activity in the form of logs. You can then audit these logs at any given time, analyze your traffic patterns and troubleshoot networking and security issues. FIGU RE 5-1 illustrates the log collection and tracking process: F IG U R E 5-1 L og Collection and Tracking Process The SmartDashboard allows you customize your tracking settings for each Rule B ase, by specifying per-rule whether or not to track the events that match it. 90 July 2 0 0 3

The SmartView Tracker If you decide to track the events that match a certain rule, you can choose from a variety of tracking options, based on the information s urgency. For example, you can choose a standard Log for allowed http connections; opt for an Account log when you wish to save byte data; or issue an Alert (in addition to the log) when a connection s destination is your firewall machine. For a list of the available tracking options, rightclick the relevant rule s Track column. The modules on which this Policy is installed collect data as specified in the Policy, and forward the logs to the SmartCenter Server (and/ or to L og S ervers, depending on their settings). The logs are organized in files according to the order in which they arrived to the S martcenter S erver. All new logs are saved to the fw.log file, except for audit (management-related) logs, which are saved to the fw.adtlog file. The S martcenter S erver makes these logs available for inspection via the SmartView Tracker: a comprehensive auditing solution, enabling you to centrally manage both active and old logs of all Check Point products. You can conveniently customize searches to address your specific tracking needs; integrate the logs with Check Point s S martv iew Reporter; or export them to text files or to an external O racle database. The S martcenter S erver also performs the operations specified in the Policy for events matching certain rules (e.g. issuing an alert, sending email, running a user-defined script etc.). In addition to the above solutions, you can benefit from the tracking and auditing capabilities of the following Check Point S martconsole: The SmartView Status allows you to track connections per-module. The SmartView Monitor offers real-time data with multiple counters. The SmartView R eporter allows you to save consolidated records (as opposed to raw logs) and conveniently focus on events of interest. The SmartView Tracker FIGURE 5-2 on page 92 displays the S martv iew Tracker s main window. Each entry in the R ecords pane is a record of an event that was logged according to a specific rule in the Rule Base. N ew records that are added to the fw.log file are automatically added at to the records pane as well. Chapter 5 SmartView Tracker 91

The Check Point Solution for Tracking FIGURE 5-2 SmartView Tracker M ain Screen The L og, A ctive and A udit M odes display different types of logs The Q uery Prop erties pane displays the properties of the fields in the Records pane The Q uery Tree pane displays the Predefined and Custom q ueries The Records pane displays the fields of each record in the log file The log fields displayed are a function of the following factors: The product that generated the log (e.g. FireW all-1 vs. FloodGate-1) The type of operation performed (e.g. installation vs. opening a connection) For example, when NAT is used, the address translation fields (with the Xlate prefix, e.g. X latesrc, X lated s t etc.) are displayed. W hen VPN-1 is used, IKE-related fields (e.g. IK E Cookiel, IK E CookieR etc.) are displayed. SmartView Tracker M odes The SmartView Tracker consists of three different modes: L og, the default mode, displays all logs in the current fw.log file. These include entries for security-related events logged by different Check Point products, as well as Check Point s OPSEC partners. New logs that are added to the fw.log file are added to the bottom or the Records pane. A ctive allows you to focus on connections that are currently open through the VPN-1/FireW all-1 modules that are logging to the active Log file. 92 July 2003

Filtering Audit allows you to focus on management-related records, such as records of changes made to objects in the Rule Base and general SmartD ashboard usage. This mode displays audit-specific data, such as the record s Administrator, Application or Operation details, which is read from the fw.adtlog file. You can toggle between modes by clicking the desired tab. Filtering The SmartView Tracker s filtering mechanism allows you to conveniently focus on log data of interest and hide other data, by defining the appropriate criteria per-log field. Once you have applied the filtering criteria, only entries matching the selected criteria are displayed. The filtering options available are a function of the log field in q uestion. For example, while the Date field is filtered to show data that is after, before or in the range of the specified date, the Source, Destination and Origin fields are filtered to match (or differ from) the specified machines. Since it is very useful to filter the Product field and focus on a specific Check Point product, the SmartView Tracker features these filters as predefined q ueries, described in the following section. Queries The SmartView Tracker gives you control over the Log file information displayed. You can either display all records in the Log file, or filter the display to focus on a limited set of records matching one or more conditions you are interested in. This filtering is achieved by running a q uery. A q uery consists of the following components: Condition(s) applied to one or more log fields (record columns) for example, to investigate all http req uests arriving from a specific source, you can run a q uery specifying http as the Service column s filter and the machine in q uestion as the Source column s filter. A selection of the columns you wish to show for example, when investigating http req uests it is relevant to show the URL log field. Chapter 5 SmartView Tracker 93

The Check Point Solution for Tracking Each of the SmartDashboard s three modes (Log, Active and Audit) has its own Query Tree, consisting of the following folders: Predefined, containing the default queries that cannot be directly modified or saved. The predefined queries available depend on the mode you are in. The default query of all three modes is All Records. In addition, the Log mode includes predefined per product or feature. Custom, allowing you to customize your own Q uery based on a predefined one, to better address your needs. Customized queries are the main querying tool, allowing you to pinpoint the data you are interested in. An existing query that is copied or saved under a new name is automatically added to the Custom folder. The attributes of the selected query are displayed in the Query Properties pane. Log File Maintenance via Log Switch The active Log file s size is kept below the 2 GB default limit by closing the current file when it approaches this limit and starting a new file. This operation, known as a log switch, is performed either automatically, when the Log file reaches the specified size or according to a log switch schedule; or manually, from the SmartView Tracker. The file that is closed is written to the disk and named according to the current date and time. The new Log file automatically receives the default Log file name, $FWDIR/log/fw.log. Disk Space Management via Cyclic Logging When there is a lack of sufficient free disk space, the system stops generating logs. To ensure the logging process continues even when there is not enough disk space, you can set a process known as Cyclic Logging. This process automatically starts deleting old log files when the specified free disk space limit is reached, so that the module can continue logging new information. The Cyclic Logging process is controlled by; M odifying the amount of required free disk space. Setting the module to refrain from deleting logs from a specific number of days back. Log Ex port Capab ilities While the SmartView Tracker is the standard log tracking solution, you may also wish to use your logs in other ways that are specific to your organization. For that purpose, Check Point products provide you with the option to export log files to the appropriate destination. 94 July 2003

Local Logging A log file can be exported in two different ways: As a simple text file In a database format, exported to an external Oracle database The SmartView Tracker supports a basic export operation, in which the display is copied as-is into a text file. More advanced export operations (e.g. exporting the whole log file or exporting log online) are performed using the command line (using the fwm logexport and fw log commands). Local Logging By default, modules forward their log records online to the SmartCenter Server. Alternatively, to improve the module s performance, you can free it from constantly sending logs by saving the information to local log files. These files can either be automatically forwarded to the SmartCenter Server or Log Server, according to a specified schedule; or manually imported through the SmartView Tracker, using the Remote File Management operation. If you choose to use a local logging configuration, you need to manually configure the standard log maintenance settings (e.g. log switch, cyclic logging etc.) on the module. Logging B ehavior During Downtime During downtime, when the module cannot forward its logs, they are written to a local file. To view these local file, you must manually import them using the SmartView Tracker s Remote File Management operation. Logging using Log Servers To reduce the SmartCenter Server s load, administrators can install Log Servers and then configure the modules to forward their logs to these Log Servers. In this case, the logs are viewed by logging with the SmartView Tracker into the Log Server machine (instead of the SmartCenter Server machine). A Log Server behaves just like a SmartCenter Server for all log management purposes: it executes the operation specified in the Policy for events matching certain rules (e.g. issuing an alert or an email); performs an Automatic Log Switch when fw.log reaches 2GB, allows you to export files etc. Chapter 5 SmartView Tracker 95

Tracking Considerations Advanced Tracking Operations Block intruder The Active mode of the SmartView Tracker allows you to shut out intruders, by selecting the connection you ve identified as intrusive and blocking one of the following: The connection - block the selected connection or any other connection with the same service, source or destination. The source of the connection - block access to and from this source. Block all connections that are headed to or coming from the machine specified in the Source field. The destination of the connection - block access to and from this destination. Block all connections that are headed to or coming from the machine specified in the Destination field. Specify a time frame during which this connection is to be blocked. Custom commands The SmartView Tracker allows you to conveniently run commands from the SmartConsole, instead of working in the command line. The commands available by default are ping and whois. These commands, along with the ones you add manually, are available through the menu displayed by right-clicking a relevant cell in the Records pane. Tracking Considerations Choosing which Rules to Track The extent to which you can benefit from the events log depends on how well they represent the traffic patterns you are interested in. Therefore, you must ensure your Security Policy is indeed tracking all events you may later wish to study. On the other hand, you should keep in mind that tracking multiple events results in an inflated log file, which requires more disk space and management operations. To balance these conflicting needs, and determine which of your Policy s rules should be tracked, consider how useful this information is to you. For example, consider whether this information: Improves your network s security Enhances your understanding of your users behavior Is the kind of data you wish to see in reports May be useful for future purposes 96 July 2003