CyberSentry. Instruction manual. Security Event Manager *1601-9202-A2* GE Digital Energy



Similar documents
Copyright 2013 GE Multilin Inc. All rights reserved. CyberSentry SEM software revision CyberSentry, Digital Energy, Multilin, and GE Multilin

Copyright 2014 GE Multilin Inc. All rights reserved. EnerVista Viewpoint Monitoring Quickstart Guide for version 7.1x. EnerVista, Viewpoint

Pearl Echo Installation Checklist

StrikeRisk v6.0 IEC/EN Risk Management Software Getting Started

Installation Guide for Pulse on Windows Server 2012

Server Installation Guide ZENworks Patch Management 6.4 SP2

Installation Guide for Pulse on Windows Server 2008R2

ArcGIS 9. Installation Guide: Workgroup for Microsoft SQL Server Express

LifeSize Control Installation Guide

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Dell Statistica Statistica Enterprise Installation Instructions

Mobility Services Platform Software Installation Guide

System Administration Training Guide. S100 Installation and Site Management

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

NETWRIX EVENT LOG MANAGER

Compuprint 4247 Serial Matrix Printers

User s Manual. Management Software for ATS

MadCap Software. Upgrading Guide. Pulse

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

WhatsUp Gold v16.3 Installation and Configuration Guide

VERITAS Backup Exec TM 10.0 for Windows Servers

VisiCount Installation. Revised: 8/28/2012

Software Version 5.1 November, Xerox Device Agent User Guide

AuthentiMax Software for GloMax -Multi+

Netwrix Auditor for Windows Server

Spector 360 Deployment Guide. Version 7

EntraPass WebStation. Installation Manual DN

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide


Netwrix Auditor for Active Directory

Netwrix Auditor for SQL Server

NSi Mobile Installation Guide. Version 6.2

WhatsUp Gold v16.2 Installation and Configuration Guide


Installing the Microsoft Network Driver Interface

Print Audit 6 - SQL Server 2005 Express Edition

Manual POLICY PATROL SECURE FILE TRANSFER

About This Manual. 2 About This Manual

Getting Started with Vision 6

TANDBERG MANAGEMENT SUITE 10.0

EventTracker Enterprise v7.3 Installation Guide

Installation and Program Essentials

Microsoft BackOffice Small Business Server 4.5 Installation Instructions for Compaq Prosignia and ProLiant Servers

Netwrix Auditor for Exchange

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

POLICY PATROL MFT. Manual

Kaseya Server Instal ation User Guide June 6, 2008

Sage 200 Web Time & Expenses Guide

Bitrix Site Manager ASP.NET. Installation Guide

AXIS Camera Station Quick Installation Guide

WhatsUp Gold v16.1 Installation and Configuration Guide

Server Installation ZENworks Mobile Management 2.7.x August 2013

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer

Installation Instruction STATISTICA Enterprise Small Business

The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0.

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Intel Unite Solution. Standalone User Guide

Software Version 5.2 June Xerox Device Agent User Guide

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Installation & Configuration Guide

FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version

StruxureWare Power Monitoring 7.0.1

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Portions of this product were created using LEADTOOLS LEAD Technologies, Inc. ALL RIGHTS RESERVED.

SOFTWARE INSTALLATION INSTRUCTIONS

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

OPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher

GE Measurement & Control. Remote Comms System. Installation and User Reference Guide

MGC WebCommander Web Server Manager

QIAsymphony Management Console User Manual

NETWRIX EVENT LOG MANAGER

Web Filter. SurfControl Web Filter 5.0 Installation Guide. The World s #1 Web & Filtering Company

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Guide to Installing BBL Crystal MIND on Windows 7

STIDistrict Server Replacement

Avigilon Control Center Server User Guide

NETASQ SSO Agent Installation and deployment

SQL EXPRESS INSTALLATION...

QUANTIFY INSTALLATION GUIDE

BitDefender Security for Exchange

Manuals for This Product

Administrators Help Manual

Omtool Server Monitor administrator guide

Sophos for Microsoft SharePoint startup guide

Avalanche Site Edition

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Table of Contents. CHAPTER 1 About This Guide CHAPTER 2 Introduction CHAPTER 3 Database Backup and Restoration... 15

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Installation Guide for Workstations

Netwrix Auditor for SQL Server

InventoryControl for use with QuoteWerks Quick Start Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide

Central Management System

Diamond II v2.3 Service Pack 4 Installation Manual

Xactimate v.27 Network Installation

Core Protection for Virtual Machines 1

Transcription:

GE Digital Energy CyberSentry Security Event Manager Instruction manual CyberSentry SEM software revision: 1.00 GE publication code: 1601-9202-A2 (GEK-113634A) GE Digital Energy 650 Markland Street Markham, Ontario Canada L6C 0M1 Tel: +1 905 927 7070 Fax: +1 905 927 5098 Internet: http://www.gedigitalenergy.com *1601-9202-A2*

Copyright 2013 GE Multilin Inc. All rights reserved. CyberSentry SEM software revision 1.00. CyberSentry, Digital Energy, Multilin, and GE Multilin are trademarks or registered trademarks of GE Multilin Inc. The contents of this manual are the property of GE Multilin Inc. This documentation is furnished on license and may not be reproduced in whole or in part without the permission of GE Multilin. The manual is for informational use only and is subject to change without notice. Part number: 1601-9202-A2 (March 2013)

CyberSentry SEM Software Table of contents GLOSSARY Glossary...1 INTRODUCTION Overview...3 Devices supported...3 Unpacking checklist...3 How CyberSentry works...4 CyberSentry workflow...5 Sample event/case...6 For further assistance...8 GETTING STARTED System requirements...9 Operating system...9 Hardware requirements...9 Software required...9 Software restrictions...9 Install the software...10 Installation notes...10 Default user accounts...11 Start the software and log in...11 Enter the activation code...13 Using the trial version...13 Menu structure...14 Home tab...14 System tab...14 Security Dashboard tab...15 Lock computer...15 Log out...15 Exit the software...16 Uninstall the software...16 PREFERENCES Set scan rate and notification...17 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL iii

TABLE OF CONTENTS Set email notification...19 Configure syslog...21 Configure compliance reports...25 USER ACCOUNTS Add, update, delete, disable user account...28 Add user account...28 Update user account...29 Delete user account...29 Disable user account...29 View permissions...30 Update contact information...32 Change password...32 Forgot password...33 Groups...34 SECURITY DOMAINS Add, update, delete security domain...35 Add security domain...35 Update security domain...36 Delete security domain...36 Add device...37 Modbus parameters...37 SNMP parameters...39 Assign ports and services...40 Assign device to security domain...40 Delete device...42 AUTHORIZED CONFIGURATION PROFILES Types of security parameters...43 Configuration changes...44 Device events...45 Loss of communication...46 Security...46 Add ACP security parameter...48 Delete ACP security parameter...48 SECURITY DASHBOARD Check online, scan, and error statuses...49 Scan devices...52 Security dashboard explained...52 EVENT/CASE WORKFLOW Monitor and fix event/case...55 Add incident case...58 Search for event/case...59 Close or delete event/case...59 DEVICE PROFILES Generate device profile...61 Add device profile...62 Update device profile...63 Delete device profile...65 iv CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

TABLE OF CONTENTS COMPLIANCE REPORTS View report...69 Generate report...69 Delete report...71 LICENSE MANAGEMENT View software version...73 Manage activation code...73 Update software...73 Transfer software license...74 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL v

TABLE OF CONTENTS vi CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CyberSentry SEM Software Chapter 0: Glossary Glossary Glossary ABNF ACP CIP CMC CMS COMMS IC MIB NERC PDF SAT SD SE SEM SNMP SMTP SP syslog Augmented Backus-Naur Form (ABNF). The system logs of CyberSentry SEM conform to the ABNF (RFC 5234) definition. Authorized Configuration Profile. A set of rules for the expected behavior of a relay or network device. When a rule is violated, a Security Event or Incident Case is generated. Critical Infrastructure Protection. CyberSentry SEM is one component of CIP. CyberSentry Management Console CyberSentry Monitoring Server Communication Layer that performs the low-level communications (SNMP, Modbus over TCP/IP) Incident Case, such as multiple failed login attempts. The more serious Security Events become Incident Cases. Management Information Base. When adding device profiles,.mib files can be imported. North American Electric Reliability Corporation. CyberSentry SEM complies with NERC standards. Portable Document Format. The file format used for reports generated by CyberSentry SEM. Adobe Reader or a similar viewer is required. Security Audit Trail (SAT) server of CyberSentry SEM that retrieves security trail records from UR and UR Plus devices Security Domain. A group of devices. Devices are grouped in Security Domains so that a set of rules can be applied to the devices. Security Event, such as multiple failed login attempts. The more serious Security Events become Incident Cases. Security Event Manager. The CyberSentry software. Simple Network Management Protocol. SNMP devices are supported by CyberSentry SEM. Simple Mail Transfer Protocol. An SMTP server is required for email notification of events detected by CyberSentry SEM. Security Parameter. A single rule. It includes the basic data elements to be acquired from devices for security monitoring and analysis. In the context of Modbus or SNMP devices, they are the setting parameters. System log. CyberSentry SEM can log events to system logs. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 1

GLOSSARY CHAPTER 0: GLOSSARY 2 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CyberSentry SEM Software Chapter 1: Introduction Introduction Overview CyberSentry TM Security Event Manager (SEM) is software for automated Critical Infrastructure Protection (CIP), specifically for auditing, monitoring, and reporting of devices in electrical grids to standards of the North American Electric Reliability Corporation (NERC). The software is typically used in substations. Based on configuration and security policies, CyberSentry SEM initiates and performs security monitoring of power management relays and networking devices. It can record events, detect device setting changes, log security events, raises Incident Cases (ICs), and initiates IC tasks. CyberSentry SEM also generates reports. Devices supported CyberSentry SEM supports the following GE relays and networking devices: UR firmware versions 5.4x to 6.0x UR Plus firmware versions 1.7x and 1.8x ML2400 firmware version 4.01 CyberSentry SEM also supports the following third-party devices: Modbus devices Simple Network Management Protocol (SNMP) devices Unpacking checklist The following items are included with purchase: CyberSentry SEM software (on CD) CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 3

HOW CYBERSENTRY WORKS CHAPTER 1: INTRODUCTION Quickstart Guide (on CD and printed) Instruction Manual (on CD) If any of the contents listed are missing or there is physical damage to the product, contact GE Digital Energy immediately using the contact information in the For further assistance section. For product information, instruction manual updates, and software updates, visit the GE Multilin website at http://gedigitalenergy.com/multilin. How CyberSentry works CyberSentry SEM has three logical layers that interact with an SQL database. Figure 1: Logical layers interacting with the database CyberSentry Management Console (CMC) Presentation / GUI Layer SQL Database CyberSentry Monitoring System (CMS) Business / Logic Layer Workflow Configuration Environment Data Security Events Incident Cases Raw Device Information Communication Servers (COMMS) Communication Layer The functions performed by each layer of the CyberSentry architecture are outlined as follows: CyberSentry Management Console (CMC) The CMC is the client layer that allows you to monitor CyberSentry SEM activity, perform actions on workflows, and produce compliance reports. This is the interface with which you interact with the program. The CMC is installed on the same computer as the CMS and COMMs layers. The CMC must be open in order for CyberSentry SEM to operate, which means that a user needs to be logged in to the CyberSentry SEM software. CyberSentry Monitoring System (CMS) The CMS is the middle layer where device information is analyzed and monitored for new Security Events and Incident Cases, where the more serious Security Events become Incident Cases. It must be installed and running from an authorized Windows account on the computer. The default poll rate at which the CMS monitors devices is 30 minutes. This rate can be altered to suit different network architectures, corporate security, and communication approaches. The rate can range from 15 minutes to 12 hours. Communication Servers (COMMS) The communication layer provides an interface directly to field devices. This layer collects data and provides it to the CMS layer. 4 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 1: INTRODUCTION HOW CYBERSENTRY WORKS CyberSentry workflow There are two phases: Phase 1 Setup Configure CyberSentry with details of the system to be monitored Phase 2 Monitor CyberSentry is fully operational and used daily to monitor the system and create reports Figure 2: Phase 1 is configuration Figure 3: Phase 2 is monitoring Step 1: Monitor Security Events/Incidents PHASE 2: MONITOR (daily activity) CyberSentry SEM monitors for new Security Events/ Incident Cases and notifies designated owner. Evaluate Security Events/Incident Cases to determine correct action. Step 2: Perform Workflow Actions Users log in to CyberSentry SEM and manage their assigned activities by updating the workflow status Step 3: Reports Create reports to review activity and for auditing In other words, the process for installing and using CyberSentry SEM is as follows: Install the software Enter the activation code Configure preferences Configure user accounts Configure Security Domains Add and assign devices to the Security Domains Review and add rules (Authorized Configuration Profiles) Check the Security Dashboard and respond to issues, modifying an event/case until it is closed Update the software CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 5

HOW CYBERSENTRY WORKS CHAPTER 1: INTRODUCTION Sample event/case This section outlines an example of setup and workflow for loss of communication with a device. Scenario Create an Authorized Configuration Profile (ACP) for a device that creates a Security Event when communication with a device is lost. Do not "Raise IC". The Security Domain owner is James Brown. Configuration Administrator adds user account for Joe Smith in the Officer category. Administrator adds user account for James Brown, in the Compliance Officer category. James Brown adds a Security Domain, which is simply a category in which to group devices. James Brown adds the device and assigns it to the Security Domain. James Brown adds a security parameter (rule) to monitor communication with the device by adding a Loss of Communication security parameter. By leaving the Raise IC checkbox disabled, any loss of communication is a Security Event instead of a more serious Incident Case. Figure 4: Add rule to monitor for loss of communication with device With configuration complete, the software communicates with the device according to the global scanning frequency set in the Preferences, which is also configured to send email notifications. Workflow A month later, the software cannot communicate with the device. The Loss of Communication button on the Security Dashboard changes to red and indicates that there is an issue. James Brown is notified by email of the loss of communication. Figure 5: Security Dashboard alarm James Brown clicks the Loss of Communication button to open the event viewer window. He assigns the Security Event to Joe Smith and comments "Joe, can you please see why this device is not communicating. Thanks. James' [Joe gets email] 6 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 1: INTRODUCTION HOW CYBERSENTRY WORKS Figure 6: Assign event and comment Joe responds with comments: "James, squirrels chewed through the communication cable. I've attached the picture." He attaches a bitmap image. [James gets email] Joe promotes the Security Event to an Incident Case and reassigns it back to James. [James gets email] As an Incident Case, James assigns it to Joe: "Joe, please repair the communication cable ASAP. Thanks James" [Joe gets email] Joe responds with comments: "James, repairs are made and I've rerouted the wiring. I've attached the picture." He attaches a bitmap image. [James gets email] Joe has completed the work and changes the state to Reviewed. [James gets email] James evaluates Joe's comments and attachment and signs off the Incident Case by closing it with the comment: "Examined photos to approve installation. Device successfully communicating." [no email] James generates a report for his records, including the details and history. As shown in the figure, this includes the comments. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 7

FOR FURTHER ASSISTANCE CHAPTER 1: INTRODUCTION Figure 7: Report for loss of communication event For further assistance For product support, contact the information and call center as follows: GE Digital Energy 650 Markland Street Markham, Ontario Canada L6C 0M1 Worldwide telephone: +1 905 927 7070 Europe/Middle East/Africa telephone: +34 94 4854 88 54 North America toll-free: 1 877 547 8630 Fax: +1 905 927 5098 E-mail: multilin.tech@ge.com Website: http://gedigitalenergy.com/multilin Comments about new features or modifications for specific requirements are welcome. 8 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CyberSentry SEM Software Chapter 2: Getting started Getting started System requirements Operating system CyberSentry SEM supports the following Windows operating system: Windows 7 (32-bit) with the latest service pack and patches Hardware requirements The computer requirements are as follows: 2.3 GHz (or better) Intel/AMD processor 4 GB RAM (minimum 2 GB) 1.0 GB free space on hard drive Video card supporting 65535 colors 17 inch (minimum) monitor CD drive (when installing from the CD) Ethernet connection Keyboard Mouse or mouse pad Software required The following software must be present on the computer before installing CyberSentry SEM: Adobe Reader or compatible viewer for viewing compliance reports Software restrictions CyberSentry SEM cannot be installed on the same computer with any of the following software: CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 9

INSTALL THE SOFTWARE CHAPTER 2: GETTING STARTED EnerVista TM Integrator EnerVista Energy Aggregator EnerVista Viewpoint Monitoring Either use another computer or uninstall the EnerVista software, ensuring first that the uninstall does not interfere with operation of an electrical grid. Install the software The license allows for installation on one computer. Installation typically is done at a substation. The software typically is installed on a computer shared by multiple users. For example, you install the software, configure four user accounts, and these four users use the computer at different times. Email notifications are sent to the users as appropriate, which allows the users to respond even while not working at the computer that has CyberSentry SEM installed. CyberSentry SEM can be installed from the CD or a download file. To install the CyberSentry SEM software from the CD: 1. With Adobe Reader installed and EnerVista software not installed, insert the CyberSentry SEM CD in the computer drive. 2. If the installation program does not automatically start, locate the CyberSentrySEM100Setup.exe file on the CD, then click or double-click the file to start the installation. If prompted, click Yes to allow the program to make changes to the computer, and also allow Microsoft.NET framework to be installed. 3. Complete the wizard. All components required by CyberSentry SEM are installed. Default user accounts are created automatically. 4. Start the software and log in, as outlined in the next section. To install the CyberSentry SEM software using the download file: 1. With Adobe Reader installed and EnerVista software not installed, click or double-click the CyberSentrySEM100Setup.exe file. If prompted. click Yes to allow the program to make changes to the computer, and also allow Microsoft.NET framework to be installed. 2. Complete the wizard. All components required by CyberSentry SEM are installed. Default user accounts are created automatically. 3. Start the software and log in, as outlined in the next section. After installing the software, configure it, working through each chapter in this instruction manual to set preferences, user accounts, monitoring, and so on. This instruction manual is located in the following folder: C:\Program Files\GE Digital Energy\CyberSentry SEM. Installation notes CyberSentry SEM uses Microsoft SQL Server 2008 Express database for storage. The name of the SQL Server used is PMCSSQLSERVER. The name of the database is EVENTLOGGERSQL, and the database is located in C:\MSSQL7\Data. 10 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 2: GETTING STARTED START THE SOFTWARE AND LOG IN If the database is not attached to the server properly, use the database installation script DB_CMD.CMD located in the directory C:\Program Files\GE Digital Energy\CyberSentry SEM\. If your SQL Server instance is named differently, for example SQLEXPRESS instead of PMCSSQLSERVER, change the script and run the script. You need to be logged in as computer administrator to replace the file. Default user accounts Four user accounts and four user groups are created by default. Table 1: Default user accounts User account Password Group Permissions Administrator password Administrators Preferences User accounts View Security Events and Incident Cases View reports Officer password Officers Security Domains Devices Authorized Configuration Profiles Generate reports Respond to Security Events and Incident Cases Compliance Officer (log in as COfficer) password Compliance Officers Security Domains Devices Authorized Configuration Profiles Generate reports Respond to Security Events and Incident Cases Close Security Events and Incidents Cases User password Users View Security Events and Incident Cases View reports Start the software and log in A user needs to be logged in for the software to run. To start the software and log in: 1. Click the CyberSentry SEM desktop icon, or click Start > All Programs > GE Digital Energy > CyberSentry SEM. 2. In the login window, enter the user name and password. For first login, use the Administrator account and password of "password". When logging in to the default Compliance Offcer account, enter the user name of COfficer. If a message displays that "Your account has been disabled" this means that the user account has been temporarily disabled by the Administrator; ask the Administrator to enable the user account or log in with another account. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 11

START THE SOFTWARE AND LOG IN CHAPTER 2: GETTING STARTED Figure 8: Login window 3. With first login for any of the default user accounts, a window prompts to specify a new password and security question for the account. Complete the information. 4. To lock the computer and leave the software running, press the Ctrl+Alt+Delete keys, then click the Lock this computer option. Figure 9: Prompt to change password and enter security question After three unsuccessful password attempts, CyberSentry SEM shuts down. A message displays to that effect, and a system log (syslog) message is generated. With successful launch, the Security Dashboard displays (next figure). With successful installation and login, configure the software, working through each chapter in this instruction manual, which is located in the following folder: C:\Program Files\GE Digital Energy\CyberSentry SEM. Start by entering the activation code (next section) and configuring preferences (next chapter). 12 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 2: GETTING STARTED ENTER THE ACTIVATION CODE Figure 10: Security Dashboard in the software interface Enter the activation code A valid license and activation code are required to run the software. Enter the activation code after installation of the software. To enter the activation code: 1. While logged in to CyberSentry SEM as Administrator, click System > License. 2. In the window that opens, enter the code in the Activation Code field, then click the Unlock button. 3. Click the OK button to exit. Using the trial version On a freshly installed CyberSentry SEM system, a 90-day trial period is provided. After the trial period, the software locks, and you must have a valid activation code to unlock it. Based on the license purchased, CyberSentry SEM limits the number of devices that can be configured in Security Domains to 25, 50, 100, or 150 devices. When in demonstration/trial mode, the number of devices is limited to 25. To view license status: 1. While logged in as Administrator, click System > License. 2. In the window that opens, view the License Status field. The number of days remaining in the trial displays. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 13

MENU STRUCTURE CHAPTER 2: GETTING STARTED Figure 11: View license status To enter the activation code: 1. See the previous section. Menu structure Home tab CyberSentry SEM has the following tabs: Home System Security Dashboard To open the online help, click the question mark icon on the right side of the software window. Use this tab to access status windows, log out, and exit the software. Figure 12: Home tab Logout To log out of a user account and stop monitoring. Exit To log out, stop monitoring, and shut down the software. Online To display current status of the software. See the Security dashboard chapter. Scan To display details of CyberSentry SEM s device scanning. See the Security dashboard chapter. Error To display details of any known error conditions detected by CyberSentry SEM. See the Security dashboard chapter. System tab This tab provides access to administration and configuration functions. Figure 13: System tab 14 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 2: GETTING STARTED LOCK COMPUTER Users To manage user accounts. Non-administrators can manage their personal information. See the User accounts chapter. Preferences To manage system preferences, such as scan rate, email notification, and system logging. See the Preferences chapter. License To manage the software license and view version. See the License management chapter. SDs To manage the Security Domains and devices. See the Security domains chapter. ACPs To manage the Authorized Configuration Profiles, which are the rules applied during monitoring. See the Authorized configuration profiles chapter. Profiles To add profiles for third-party or customized Modbus/SNMP devices. See the Device profiles chapter. Security Dashboard tab This tab provides functions available for the Security Dashboard window and events/cases. Figure 14: Security Dashboard tab Dashboard To hide/show the Security Dashboard. See the Security dashboard chapter. Event Viewer To open the Event Viewer window. This is the window used to view, respond, and close events and cases. See the Event/case workflow chapter. Create To enter an Incident Case. See the Event/case workflow chapter. Reports To generate a report. See the Compliance reports chapter. Lock computer A user needs to be logged in for the software to monitor devices. An alternative to logging out is to lock the computer, which leaves the software running. To lock the computer: 1. Press the Ctrl+Alt+Delete keys, then click the Lock this computer option. Log out A user needs to be logged in for the software to monitor devices. To log out: 1. Click Home > Logout. CyberSentry SEM logs out of the user account and displays the login window. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 15

EXIT THE SOFTWARE CHAPTER 2: GETTING STARTED Exit the software The software needs to running for it to monitor devices. To exit the software: 1. Click Home > Exit. 2. Confirm the exit at the prompt. The CyberSentry SEM software closes all communications channels, shuts down, and no longer monitors devices. Uninstall the software To uninstall the software: 1. Click Start > Control Panel. 2. Click Programs and Features. 3. Click CyberSentry SEM. 4. Click Uninstall, and confirm the deletion. The software is deleted. The database is detached but not yet deleted. 5. Delete the EVENTLOGGERSQL database, which is located in C:\MSSQL7\Data. 16 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CyberSentry SEM Software Chapter 3: Preferences Preferences There are four panels to manage preferences. Configure them after installation. General scan rate and system tray notification Emailing email notification Syslog log events Compliance Reports configure report location and logo Administrator access is required. Set scan rate and notification Use the General panel to configure scan frequency and system tray notification, which is on by default. To set scan rate and notification: 1. Log in to the CyberSentry SEM software as Administrator. 2. Click System > Preferences. 3. Configure the settings, which are explained as follows. 4. Click the OK button to exit. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 17

SET SCAN RATE AND NOTIFICATION CHAPTER 3: PREFERENCES Figure 15: General tab to set scan frequency (default settings shown) Scan rate The scan rate is the frequency at which devices are monitored/polled. None To stop scanning, such as for maintenance, when performing configuration, or when the network is down and you want to avoid unwanted messages. Continuous (default) Range: 15 to 720 minutes (12 hours) Default: 30 minutes Hourly Selection: 0 to 45 minutes, in increments of 15 minutes Default: 0 minutes Daily Range: mm:ss Default: 00:00 (midnight) System tray notification Messages appear by default in the system tray on the Windows taskbar when new Security Events and/or Incident Cases are detected. Notification can be turned on and off. Figure 16: Notification of event/case in system tray New security events Enable to display notification when a new Security Event is detected. New incident cases Enable to display notification when a new Incident Case is detected. 18 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 3: PREFERENCES SET EMAIL NOTIFICATION Set email notification CyberSentry SEM can be configured to send emails when it detects new Security Events, Incident Cases, or other parameters. Recipients are based on the parameter. An example of an email notification is the following for a missed deadline to respond to an event/case: Subject: [CyberSentry SEM 12-000011] Deadline Date Expired Case: CS12-000011 Activity: Deadline Date Expired Deadline: 2012-09-22 GE recommends configuring this function, which is disabled by default. An email server compliant with the Simple Mail Transfer Protocol (SMTP) is required, located within your company. To set email notification: 1. Log in as Administrator. 2. Click System > Preferences. 3. Click the Emailing option. 4. Configure the settings, which are explained as follows. 5. Click the Test button to send a test email to the user with the message "This is a test email from CyberSentry SEM." When an address is entered here that is not registered in the software for the user, a message displays to that effect; add the address under System > Users. If nothing happens when you click the button, this means that you do not have an SMTP server configured correctly in the panel or there is a connection issue with it. 6. Click the OK button to exit. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 19

SET EMAIL NOTIFICATION CHAPTER 3: PREFERENCES Figure 17: Emailing panel to set email notification SMTP server address Send email Enable to send emails for the notification types specified in this panel. SMTP mail server Specify the name of your server, such as hpserver or mail.yourcompany.com. Do not specify the path. Servers located at Internet service providers (ISPs) are not supported; the SMTP server needs to be your own, located within your network. SMTP user credentials CyberSentry SEM emails originate from Enter the email address to be used in the From field of emails sent. This address is typically that of the Administrator of CyberSentry SEM. An example is kim.wong@yourcompany.com Notification Specify when to send email notifications. New security events / incident cases Default: Enabled Enable to send an email when a Security Event or Incident Case is created. Send the email to the owner, the assignee, and (when enabled separately) the user performing the activity. When the Incident Case is created by enabling the Raise IC checkbox or a Security Event was manually entered, a "New incident cases" email is sent. Otherwise, a "New security events" email is sent. 20 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 3: PREFERENCES CONFIGURE SYSLOG Change of state Default: Enabled Enable to send an email when a Security Event or Incident Case changes state. Examples of state changes are when a Security Event is assigned, when a request is made to review an Incident Case, and when a deadline date expired. Send the email to the owner, the assignee, and (when enabled separately) the user performing the activity. Field modified Default: Enabled Enable to send an email when a field has been changed for an event/case, for example Add Comment or Add Attachment, or the Security Event or Incident Case has been reassigned to another office. Send the email to the owner, the assignee, and (when enabled separately) the user performing the activity. Deadline date expired Default: Enabled In the Event Viewer window, when a comment is made on an event/case or the event/ case is assigned to another user, for example, a deadline is specified and added by the software to the event/case. Enable this checkbox to send an email when the deadline date for an event has expired. Send the email to the owner and the assignee. Send email to the user entering the action Default: Disabled Enable to send email notifications to the person performing the activity that causes the notification. Disable to reduce the amount of email sent and do not send an email to person who initiated the activity because they already know about the activity. Leave disabled to minimize email. Configure syslog Several types of system action can be recorded in system logs (syslogs). An example of a syslog message is as follows for a closed Incident Case: 8/22/2012 14:52:42.827: Email id da55951a-278d-4bd6-a4fa-f6175af8d4af To:aze832@gmail.com, bimma@ge.com Subject:[CyberSentry SEM 12-000640] IC Closed Case: CS12-000640 Activity: Incident Case Closed Time: 2012-08-10 13:57:50 Description: IC resolved and closed The figure shows an example of a syslog. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 21

CONFIGURE SYSLOG CHAPTER 3: PREFERENCES Figure 18: Syslog example The computer clock is used for timestamps in the syslogs. Logging is disabled by default. At least one remote server is required, such as a UNIX server. The logs can be sent to one or two servers, referred to as primary and secondary. An example of a free syslog server is Kiwi Syslog Server, shown in the previous figure. The syslog message format conforms to the Augmented Backus-Naur Form (ABNF) (RFC 5234) definition. To configure system logging: 1. Log in as Administrator. 2. Click System > Preferences. 3. Click the Syslog option. 4. Configure the settings, which are explained as follows. 5. Click the Test button(s) to confirm access of the servers. 6. Click the OK button to exit. 22 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 3: PREFERENCES CONFIGURE SYSLOG Figure 19: Syslog panel to configure system logs (default settings shown) Primary server address Log to server Enable to log events/cases and software activity, such as a user adding a security parameter in the software, to system logs on the main remote server. Server name Specify the name of the main remote server, such as hpuxserver. Do not specify the path. The maximum number of characters is 80. Port number Default: 514 Specify the port number on the main remote server used for communication. Port 514 typically is used for syslogs. Secondary server address Use of a second server is optional. Log to server Enable to log events/cases and software activity, such as a user adding a security parameter in the software, to system logs on a second remote server. Server name Specify the name of the second remote server, such as hpuxserver2. Do not specify the path. The maximum number of characters is 80. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 23

CONFIGURE SYSLOG CHAPTER 3: PREFERENCES Port number Default: 514 Specify the port number on the second remote server used for communication. Port 514 typically is used for syslogs. Notification Specify the activities that generate an entry in the syslog. New security event Default: Enabled Enable to record in the syslog when a Security Event is created. New incident case Default: Enabled Enable to record in the syslog when an Incident Case is created. Incident case closed Default: Enabled Enable to record in the syslog when an Incident Case is closed. Environment / configuration change Default: Enabled Enable to record in the syslog when device configuration is changed. Examples are "User FirstOfficer Added SP Control Password Access for Timeout for Device B90_ver600" and "User FirstOfficer Added SP Session for Device N60_version540." System error Default: Enabled Enable to record in the syslog when a system error is generated. An example is the message "SMTP Error: Check the system." Deadline date expired Default: Enabled In the Event Viewer window, when a comment is made on an event/case or the event/ case is assigned to another user, for example, a deadline is specified and added by the software to the event/case. Enable this checkbox to record in the syslog when the deadline date for an event/case has expired. 24 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 3: PREFERENCES CONFIGURE COMPLIANCE REPORTS Configure compliance reports Specify the calendar week, location of the reports, and a logo. Figure 20: Compliance Reports panel to specify report location To configure reports: 1. Log in as Administrator. 2. Click System > Preferences. 3. Click the Compliance Reports option. 4. Configure the settings, which are explained as follows. 5. Click the OK button to exit. Calendar week definition Default: Monday to Sunday Specify the calendar week for the reports as Monday to Sunday or as Sunday to Saturday. Reports file location Default: C:\Users\Public\Public Documents Specify where the reports are stored when created. Enter the full path. Any computer accessible through the Browse function can be used. You cannot use an HTTP path. Any user with access to the computer can view the reports when they know the path to the location. Logo file location Default: C:\ProgramData\GE Digital Energy\CyberSentry SEM\Reports\Report_Logo.png To include a logo on the compliance reports, specify the path to the file. An example is C:\Documents and Settings\My Documents\My Pictures. Use a square image. If you specify a non-square image, it is cropped in this panel but later scaled to fit the report, which means that it is formatted as square (and distorted) when a report is generated. The formats supported are BMP, JPG, GIF, and PNG. An error message displays when an unsupported file is accessed; click Continue to close it. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 25

CONFIGURE COMPLIANCE REPORTS CHAPTER 3: PREFERENCES 26 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CyberSentry SEM Software Chapter 4: User accounts User accounts The Administrator can manage user accounts. All other users can manage their contact information, address, and password. After installation, as a minimum, change the passwords and set the email addresses for the Administrator and Compliance Officer accounts. During installation, Administrator, Compliance Officer, Officer, and User accounts were created by default. Upon first login for each account, change the default password of "password". Each account is a member of their respective user group, and access to functions depend on permissions. Table 2: Default user accounts User account Password Group Permissions Administrator password Administrators Preferences User accounts View Security Events and Incident Cases View reports Officer password Officers Security Domains Devices Authorized Configuration Profiles Generate reports Respond to Security Events and Incident Cases Compliance Officer (log in as COfficer) password Compliance Officers Security Domains Devices Authorized Configuration Profiles Generate reports Respond to Security Events and Incident Cases Close Security Events and Incidents Cases User password Users View Security Events and Incident Cases View reports The following functions are based on permissions: Add, update, delete, disable user accounts View permissions Update contact information Change password Forgot password Groups CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 27

ADD, UPDATE, DELETE, DISABLE USER ACCOUNT CHAPTER 4: USER ACCOUNTS Add, update, delete, disable user account The Administrator performs these functions. A user is a member of a group and only one group. Only one Administrator account is possible. Figure 21: Managing user accounts Add user account CyberSentry SEM supports 1,000 user accounts. To add a user account: 1. Log in as Administrator. 2. Click System > Users. 3. Click a user account category/group on the left side, such as Officers, which is the core group to respond to Security Events. The types are explained in the View permissions section that follows. Because only a single Administrator account is allowed, this group is not selectable. 4. Click the New User icon. As a minimum, enter a user name, first and last name, and email address. 5. Click the OK button to add the account and exit. The default password for the user is "password". The user can set the password and security question when they log in. 6. Access the panel again and click the Test button for the email account. This sends a test email to the user with the message "This is a test email from CyberSentry SEM." The email server needs to be configured under System > Preferences for this function to work, otherwise a message displays to that effect. When incorrectly configured, nothing happens when you click the Test button. User name The user name for login must be unique and between 4 and 20 characters long. Once set, only the Administrator can change it. 28 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 4: USER ACCOUNTS ADD, UPDATE, DELETE, DISABLE USER ACCOUNT Update user account To update a user account: 1. Click System > Users. 2. Select the user account. When the user logged in belongs to the Users, Officers, or Compliance Officers group, the list displays that account only. Administrators see the entire user list. 3. Change the information. All users can update their Contact Information, Address, and Password. Only the Administrator can change a user name. The Administrator cannot change the password of another user. 4. Click the OK button to exit. Delete user account An alternative to deleting a user account is to disable it. See the Disable user account section that follows. Deleted accounts cannot be recovered. Any Security Events and Incident Cases assigned to them remain available to other users. To delete a user account: 1. Log in as Administrator. 2. Click System > Users. 3. Select the user account. 4. Click the Delete icon. A user cannot delete their own account; ask the Administrator to delete it. 5. At the prompt, confirm the deletion. Before the account is deleted, CyberSentry SEM checks the system for active Security Events and Incident Cases that are assigned to the account. When there are any matches, a message indicates the number of records assigned to the user, and the account is deleted. Any Security Events and Incident Cases assigned to the user remain visible in the system and available to other users. They can be picked up by any Officer or Compliance Officer. 6. Click the OK button to exit. Disable user account An alternative to deleting a user account is to disable it. A disabled user account cannot log in to the software. Any Security Events and Incident Cases assigned to it remain available to other users. To disable a user account: 1. Log in as Administrator. 2. Click System > Users. 3. Select the user account. 4. Click the Disable button, which displays only for the Administrator. The Administrator account cannot be disabled. Before an account is disabled, CyberSentry SEM checks the system for active Security Events and Incident Cases that are assigned to the account. When there are any matches, a message indicates the number of records assigned to the user. When the account is successfully disabled, the Disable button toggles to Enable, and CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 29

VIEW PERMISSIONS CHAPTER 4: USER ACCOUNTS the user is unable to log in. Any Security Events and Incident Cases assigned to the user remain visible in the system and available to other users. They can be picked up by any Officer or Compliance Officer. Figure 22: Disable a user account View permissions There are four types of user accounts/groups, which determine the permissions: Administrator Compliance Officer Officer User All user accounts in a group share the same permissions. Permissions cannot be customized. To view permissions: 1. Click System > Users. 2. Select a user group or user account. The permissions display at the top of the window and are explained as follows. They cannot be modified. Administrator The Administrator can view all information, manage user accounts, and view reports. They cannot modify the Security Domain (SD), device configuration, or perform action on Security Events and Incident Cases. One Administrator account is allowed. Figure 23: Permissions for the Administrator Compliance Officer A Compliance Officer can view and edit information about device and security parameters, as well as workflow and compliance reports. They can manually raise Incident Cases. They can close Security Events and Incident Cases. They cannot manage user accounts other than their own. 30 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 4: USER ACCOUNTS VIEW PERMISSIONS Figure 24: Permissions for a Compliance Officer Officer An Officer is the core group that responds to Security Events. They have the same permissions as Compliance Officers except that they cannot close events/cases. Figure 25: Permissions for an Officer User A User can view workflows, meaning events/cases. They can view compliance reports. Figure 26: Permissions for a User CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 31

UPDATE CONTACT INFORMATION CHAPTER 4: USER ACCOUNTS Update contact information All users can update their contact information except the User name field, which the Administrator changes. The Administrator can view all contact information. Figure 27: Contact Information and Address fields To update contact information: 1. See the Update user account section. Change password The rules for passwords are as follows: Length between 6 and 20 characters Contain a minimum of one lowercase letter (a - z) Contain a minimum of one uppercase letter (A - Z) Contain a minimum of one number (0-9) Contain a minimum of one special character from!@#$%* Although "password" is used as the default password, this word cannot be expressly set as a password. When any user attempts to log in with the password of "password", they are prompted to change the password. A user changes their own password. The Administrator cannot change it. Passwords are encrypted in the database. There is no connection to Microsoft Active Directory or the Remote Authentication Dial In User Service (RADIUS) protocol. To change a password: 1. Click System > Users. 2. Select the user account. 3. Click the password Update button and complete the form. 4. Click the OK button to exit. 32 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 4: USER ACCOUNTS FORGOT PASSWORD Figure 28: Change the password Forgot password When a user forgets their password, they reset it by clicking the Reset password button in the login window. To reset the password: 1. In the login window, click the Reset password button. When no security question exists for the account, such as for a default user account, a message displays to that effect. In this case, log in with the default password of "password" and set the security question. 2. In the window that opens, enter the Answer to the security question displayed. The answer is case-sensitive. Click OK. 3. In the password reset window that opens, enter a new password, security question, and answer. Then click OK. When the button is not active, cancel out and try again. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 33

GROUPS CHAPTER 4: USER ACCOUNTS Figure 29: Answer the security question to reset the password Groups There are four fixed user groups: Administrators, Users, Officers, and Compliance Officers. They cannot be renamed, and you cannot add or delete groups. 34 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CyberSentry SEM Software Chapter 5: Security domains Security domains A Security Domain (SD) is a set of devices. The purpose of Security Domains is to group devices in order to apply rules for monitoring. All devices monitored by CyberSentry SEM must be in at least one Security Domain. The following action can be performed. To configure the software the first time, you add domains, add devices, and assign them to domains. Add, update, delete Security Domains Add devices Assign devices to the domains Delete devices Users in the Compliance Officer and Officers groups modify these functions. Administrators can view them. Add, update, delete security domain The advantage of naming domains is that each domain has its own set of rules, referred to as Authorized Configuration Profiles (ACPs). The ACPs define how CyberSentry SEM determines Security Events and Incident Cases. Add security domain To add a Security Domain: 1. Log in as a Compliance Officer or Officer. 2. Click System > SDs. 3. Click the New SD icon. 4. Complete the fields, which are explained as follows, and click the OK button to exit. The order of the domains displayed cannot be changed later, so add them in the order in which you want them to appear. Because devices have yet to be assigned to the domain, a message displays when you click OK; click Yes to continue. 5. Add devices (next section). CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 35

ADD, UPDATE, DELETE SECURITY DOMAIN CHAPTER 5: SECURITY DOMAINS Figure 30: Add a Security Domain Name The name of the Security Domain, such as SD1, UR_Devices, or Markham. Security policy Type a description of the policy. An example is "Testing" or "Connection Monitoring" or "Login Monitoring Only." Owner Select an Officer or Compliance Officer to be the owner of the domain. The user accounts are listed by first and last name, not user name. Update security domain The order of the domains cannot be modified. To update a Security Domain: 1. Log in as a Compliance Officer or Officer. 2. Click System > SDs. 3. Click the Security Domain. 4. Update the fields. 5. Click the OK button to exit. Delete security domain To delete a Security Domain: 1. Log in as a Compliance Officer or Officer. 2. Click System > SDs. 3. Click the Security Domain. 4. Click the Delete icon, and confirm the deletion. 5. Click the OK button to exit. 36 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL

CHAPTER 5: SECURITY DOMAINS ADD DEVICE Add device The following devices can be monitored: UR series (versions 5.4x to 6.0x); UR Plus series (versions 1.7x and 1.8x); ML2400 (version 4.01); Modbus; and SNMP. When adding a device, you select a protocol (Modbus or SNMP), then complete the fields. The UR and UR Plus devices are Modbus devices. The ML2400 is an SNMP device. When in doubt, view the device profile under System > Profiles. Depending on the CyberSentry SEM license, 25, 50, 100, or 150 devices can be added. When in trial/demonstration mode, the number of devices is limited to 25. To add a device: 1. If the device is a third-party device, add its profile under System > Profiles. See the Device profiles chapter. 2. Log in as a Compliance Officer or Officer. 3. Click System > SDs. 4. Select the Security Domain on the left side. 5. Click the New Device icon. 6. Select the Protocol from the drop-down list. Select Modbus for UR and UR Plus devices. Select SNMP for the ML2400. 7. From the Device type drop-down list, select the device, then click the Test communication button for SNMP or Read order code button for Modbus to verify communication with the device. 8. Complete the remaining fields, which depend on the communication protocol (Modbus or SNMP) and which are explained as follows. Examples of device names are UR, B30, and ML2400. 9. Click the OK button to exit. Modbus parameters Modbus TCP/IP is supported, where Modbus is a serial communications protocol used to communicate with devices. Three parameters are required: IP address, Modbus port number, and a Modbus slave address. The Ports and services button is explained later. CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL 37

ADD DEVICE CHAPTER 5: SECURITY DOMAINS Figure 31: Configure Modbus parameters for a device IP address The IP address of the device. View it in the EnerVista software or on the front panel of the device itself. Modbus port Default: 502 Slave address Default: 254 On the same IP address you can have different devices that differ by slave address. So if you have more than one device using the IP address, enter the device s slave address here. Order Code For the built-in Modbus devices, CyberSentry SEM can communicate with the device to determine the device order code. Click the Read order code button, or manually enter the code. Version For the built-in Modbus devices, CyberSentry SEM can communicate with the device to determine the device version number. Click the Read order code button, or manually select the version number. 38 CYBERSENTRY SECURITY EVENT MANAGER INSTRUCTION MANUAL