Preventsys 2.5 User Guide

Transcription

Preventsys 2.5 User Guide
Preventsys Security Risk
Management System
User’s Guide
PREVENTSYS™ SRM USER’S GUIDE
NOTICES
NOTICES
This user guide (the “Guide”) is provided by Preventsys, Inc. to you to facilitate your use of the Preventsys, Inc. system. This Guide is subject to change
without notice.
Preventsys, Inc. retains all rights with respect to the Guide and the Preventsys, Inc. system. Your right to use this Guide and the Preventsys, Inc. system is
subject to the Preventsys, Inc. Terms of Use found at http://www.preventsys.com including, but not limited to, the warranty disclaimers contained therein. In
addition, your use may be subject to other terms and conditions as agreed upon in writing between you and Preventsys, Inc.
All content included in this Guide, including trade names or trademarks, service names or service marks, text and graphics (collectively the “Content”) and the
selection and arrangement thereof, are the sole and exclusive property of Preventsys, Inc. or its suppliers. However, subject to the Terms of Use and other
written agreements you may have with Preventsys, Inc., you are free to view, copy, print, and distribute the Content as long as:
•
•
•
•
The Content is used for non-commercial purposes only within your organization in support of Preventsys, Inc. products.
The Content is not distributed in any form to any third party.
The Content is used for information purposes only.
Copies of the Content include all Preventsys, Inc.’s copyright or other proprietary notices.
Except as specified above, nothing contained herein shall be construed as conferring by implication, estoppel or otherwise any license or right under any patent,
trademark or copyright of Preventsys, Inc. or any third party.
THE CONTENT IN THIS GUIDE AND THE PREVENTSYS SYSTEM ARE THE PROPRIETARY PROPERTY OF PREVENTSYS, INC. AND/OR ITS
SUPPLIERS AND IS PROTECTED BY U.S. AND INTERNATIONAL COPYRIGHT AND OTHER INTELLECTUAL PROPERTY LAWS. EXCEPT AS
SPECIFICALLY PERMITTED HEREIN, YOU AGREE NOT TO DUPLICATE, TRANSLATE, PUBLISH, DISTRIBUTE, MODIFY, EXTRACT DATA
FROM, OR OTHERWISE COMMERCIALLY EXPLOIT ANY CONTENT OR THE PREVENTSYS SYSTEM.
All contents in this Guide are: Copyright ©2002-2006. Preventsys, Inc. or its licensors. Preventsys is a registered trademark of Preventsys, Inc. All other
trademarks are the property of their respective owners. All Rights Reserved.
Preventsys, Inc. respects the intellectual property of others, and we ask you to do the same. If you believe some Content in this Guide has been copied in such
as way to constitute copyright infringement, please contact Preventsys, Inc. via email at [email protected].
Government Rights Legend: Use, duplication or disclosure of the contents in this Guide or the Preventsys System by the U.S. Government is subject to
restrictions set forth in the applicable Preventsys license agreement and as provided in DFARS 227.7202-1(a) and 227.7202-3(a) (1995), DFARS 252.2277013(c)(1)(ii) (Oct. 1988), FAR 12.212(a) (1995), FAR 52.227-19, or FAR 52.227-14, as applicable.
Export Controls. The Content and the Preventsys System may be subject to export controls imposed by U.S. laws and regulations. Use of the Content and
Preventsys System must be in compliance with all export laws and restrictions and regulations of the United States Department of Commerce or other United
States or foreign agency or authority, and the Content, Preventsys System and any underlying information or technology may not be exported, re-exported, or
downloaded in violation of any such restrictions, laws or regulations, or to Cuba, Libya, North Korea, Iran, Iraq, Uganda, Rwanda or Afghanistan, or to any
Group D:1 or E:2 country (or any national of such country) specified in the then current Supplement No. 1 to Part 740, or in violation of the embargo provisions
in part 746 of the U.S. Export Administration Regulations (or any successor regulations or supplement), except in compliance with all licenses and approvals
required under applicable export laws and regulations, including, without limitation, those of the U.S. Department of Commerce.
Document Number: 2006.2.5.0.0-00
i
PREVENTSYS™ SRM USER’S GUIDE
CONTENTS
CONTENTS
PREFACE ........................................................................................VIII
About Preventsys .............................................................................................................................. viii
Conventions Used in this Guide ....................................................................................................... viii
Contacting Preventsys Support ......................................................................................................... viii
CHAPTER 1........................................................................................ 1
Security Risk Management ...................................................................................... 1
Security Risk Manager......................................................................................................................... 2
Automated Security Compliance Reporter .......................................................................................... 2
CHAPTER 2........................................................................................ 3
Getting Started ......................................................................................................... 3
Web Browser Requirements ................................................................................................................ 3
Accessing the Preventsys SRM System............................................................................................... 4
The Basics............................................................................................................................................ 5
System Components ......................................................................................................................6
Navigating the Preventsys SRM System ............................................................................................. 7
Main Menu ....................................................................................................................................7
Pagination Controls .......................................................................................................................8
Table Sorting .................................................................................................................................8
Saving as PDF ...............................................................................................................................8
Licensing and Version Information ...............................................................................................9
Reporting Errors .................................................................................................................................. 9
CHAPTER 3...................................................................................... 12
Assessment Servers and Instance Configurations ................................................ 12
Managing Assessment Servers .......................................................................................................... 14
Adding Assessment Servers ........................................................................................................14
Editing Assessment Servers.........................................................................................................15
Disabling an Enabling Assessment Servers.................................................................................15
Deleting Assessment Servers.......................................................................................................16
Managing Instance Configurations .................................................................................................... 16
Affinity and Weight.....................................................................................................................16
Adding Instance Configurations ..................................................................................................17
Editing Instance Configurations ..................................................................................................17
Deleting Instance Configurations ................................................................................................18
CHAPTER 4...................................................................................... 19
User Authorization.................................................................................................. 19
Managing User Groups...................................................................................................................... 19
About Resources and Permissions...............................................................................................20
Adding User Groups....................................................................................................................23
Editing User Groups ....................................................................................................................24
Deleting User Groups ..................................................................................................................24
Adding and Removing Users from Groups .................................................................................24
Managing Users ................................................................................................................................. 25
Adding User Accounts.................................................................................................................26
Editing User Accounts.................................................................................................................27
Deleting User Accounts...............................................................................................................27
Changing Your User Information ................................................................................................27
ii
PREVENTSYS™ SRM USER’S GUIDE
CONTENTS
Associating a User with an External Remediation System..........................................................28
CHAPTER 5...................................................................................... 30
Assets and Networks ............................................................................................. 30
Managing Assets................................................................................................................................ 30
Adding an asset............................................................................................................................31
Editing an asset............................................................................................................................32
Deleting an Asset.........................................................................................................................33
Managing Host Properties ................................................................................................................. 33
Adding a Host Property ...............................................................................................................34
Editing a Host Property ...............................................................................................................35
Deleting a Host property..............................................................................................................35
Managing Services............................................................................................................................. 36
Adding a Service .........................................................................................................................38
Editing a Service..........................................................................................................................39
Delete a Service ...........................................................................................................................39
Managing Exclusion Lists ................................................................................................................. 40
Adding an Exclusion List ............................................................................................................40
Making an Exclusion List Global ................................................................................................41
Editing an Exclusion List.............................................................................................................42
Deleting an Exclusion List...........................................................................................................42
Managing Networks........................................................................................................................... 43
Time Windows ............................................................................................................................44
Adding a Network .......................................................................................................................45
Editing a Network........................................................................................................................46
Deleting a Network......................................................................................................................46
Managing Network Properties ........................................................................................................... 47
Adding a Network Property.........................................................................................................48
Deleting a Network Property .......................................................................................................48
Managing Network Groups ............................................................................................................... 49
Adding a Network Group ............................................................................................................49
Editing a Network Group ............................................................................................................50
Deleting a Network Group...........................................................................................................50
CHAPTER 6...................................................................................... 51
Policies and Rules.................................................................................................. 51
Configuring Your System for Policy Analysis .................................................................................. 51
Initial Rule Setup .........................................................................................................................51
About PDL Rules............................................................................................................................... 52
Managing PDL Rules ..................................................................................................................53
Deactivating a PDL Rule .............................................................................................................53
Working with Policies ....................................................................................................................... 53
Managing Policies .......................................................................................................................54
Deactivating a Policy...................................................................................................................54
Importing Preventsys Policies ........................................................................................................... 55
Importing and Exporting Policies ...................................................................................................... 57
Import a Policy ............................................................................................................................58
Exporting a Policy .......................................................................................................................58
CHAPTER 7...................................................................................... 59
Assessments.......................................................................................................... 59
Managing Connector Configurations................................................................................................. 60
iii
PREVENTSYS™ SRM USER’S GUIDE
CONTENTS
Adding a Connector Configuration..............................................................................................61
Editing a Connector Configuration..............................................................................................62
Deleting a Connector Configuration............................................................................................63
Managing Assessment Configurations .............................................................................................. 63
Creating an Assessment Configuration........................................................................................64
Editing an Assessment Configuration..........................................................................................65
Deleting an Assessment Configuration........................................................................................66
Managing Assessment Schedules ...................................................................................................... 66
Adding an Assessment Schedule .................................................................................................67
Editing an Assessment Schedule .................................................................................................68
Deleting an Assessment Schedule ...............................................................................................69
About The Assessment Lifecycle ...................................................................................................... 69
Network Assessment ...................................................................................................................69
Fact Indexing ...............................................................................................................................69
Analysis .......................................................................................................................................69
Understanding Assessment Status ..................................................................................................... 72
Viewing Assessment Details .......................................................................................................74
Pausing and Resuming an Assessment ........................................................................................76
Canceling an Assessment ............................................................................................................76
Hiding and Un-hiding Assessment Statuses ................................................................................76
Importing External Assessment Data................................................................................................. 77
Basic Steps To Import .................................................................................................................77
Importing Assessment Results Using the Preventsys SRM System’s UI ....................................79
Importing Assessment Results Using the Preventsys Command-Line AIU ................................82
Deleting Assessments ........................................................................................................................ 85
Deleting An Assessment Using the Preventsys SRM System’s UI .............................................85
Deleting An Assessment Using the Using the Preventsys AIU...................................................85
Re-Analyzing Assessment Results .................................................................................................... 87
Re-Analyzing an Assessment’s Results.......................................................................................87
Viewing the Status of a Re-Analyzed Assessment ......................................................................88
CHAPTER 8...................................................................................... 89
Remediations ......................................................................................................... 89
Managing Remediation Tasks ........................................................................................................... 89
Status Lifecycle ...........................................................................................................................89
Workflow Example......................................................................................................................91
Assigning Remediation Tasks ........................................................................................................... 92
About Severity.............................................................................................................................93
About Priority..............................................................................................................................93
About Due Date and Criticality ...................................................................................................93
Assigning or Reassigning a Remediation task.............................................................................95
Bulk Assignment .........................................................................................................................96
Filtering Remediation Tasks........................................................................................................96
Viewing Different Columns of Data............................................................................................97
Viewing Details about a Remediation .........................................................................................98
Verifying Remediation Tasks ....................................................................................................100
Working with Assignment Rules ..................................................................................................... 101
Creating an Assignment Rule ....................................................................................................102
Editing an Assignment Rule ......................................................................................................104
Ordering Assignment Rules.......................................................................................................104
Deleting an Assignment Rule ....................................................................................................104
Updating Remediation Tasks........................................................................................................... 104
Updating the Status of a Remediation Task...............................................................................106
iv
PREVENTSYS™ SRM USER’S GUIDE
CONTENTS
Managing External Remediation Systems ....................................................................................... 107
Adding an External Remediation System ..................................................................................107
Editing an External Remediation System ..................................................................................109
Deleting an External Remediation System ................................................................................109
Managing External Remediation System Users............................................................................... 109
Adding an External Remediation System User .........................................................................110
Editing an External Remediation System User..........................................................................111
Deleting an External Remediation System User........................................................................111
CHAPTER 9.................................................................................... 112
Manual Audit Tasks.............................................................................................. 112
Managing Manual Audit Tasks........................................................................................................ 114
Adding a Manual Audit Task ....................................................................................................114
Editing a Manual Audit Task.....................................................................................................117
Deleting Manual Audit Tasks....................................................................................................117
Updating Manual Audit Tasks ......................................................................................................... 118
Updating the Status of a Manual Audit Task.............................................................................118
Manual Audit Task Email Notifications .......................................................................................... 118
Managing Manual Audit Task Recipient Groups ............................................................................ 118
Adding a Recipient Group .........................................................................................................119
Editing a Recipient Group .........................................................................................................120
Deleting a Recipient Group .......................................................................................................120
About Manual Audit Task Rules and Policy Violations.................................................................. 120
Verification of Manual Audit Task Policy Violations ...............................................................120
CHAPTER 10.................................................................................. 122
Security Risk Dashboard...................................................................................... 122
About the Enterprise Console .......................................................................................................... 124
Viewing Enterprise Compliance and Enterprise Trending Portlets ...........................................124
About the Exposure Console ........................................................................................................... 124
About the Compliance Console ....................................................................................................... 125
About the Threat Console ................................................................................................................ 126
Viewing the Latest Threat Alerts...............................................................................................126
Viewing the Top Threat Alerts ..................................................................................................126
Viewing All Threat Alerts .........................................................................................................126
How Threat Alerts Affect Remediation Tasks...........................................................................127
How Severity Is Adjusted By Threat Alerts ..............................................................................128
Filtering the List of All Threat Alerts........................................................................................128
Viewing Different Columns of Data for All Threat Alerts........................................................129
Viewing Details about a Threat Alert ........................................................................................130
Viewing Details about Assets....................................................................................................134
About the Remediation Console ...................................................................................................... 135
Latest Tasks ...............................................................................................................................135
My Tasks ...................................................................................................................................135
Viewing Details about a Remediation .......................................................................................136
About the Assessment Console........................................................................................................ 136
About Enterprise Groups ................................................................................................................. 136
Creating an Enterprise Group ....................................................................................................138
Editing an Enterprise Group ......................................................................................................138
Activating and Deactivating an Enterprise Group .....................................................................139
CHAPTER 11.................................................................................. 140
Reports................................................................................................................. 140
v
PREVENTSYS™ SRM USER’S GUIDE
CONTENTS
Working with the Report Filter........................................................................................................ 141
Modifying the Report Context Filter .........................................................................................143
Calculating Compliance................................................................................................................... 145
Navigating Between Reports ........................................................................................................... 146
Using the “Narrow by Asset” Control ............................................................................................. 147
Viewing Reports .............................................................................................................................. 147
Executive Summary Report.......................................................................................................147
Enterprise Group Summary Report ...........................................................................................150
Administrator Overview ............................................................................................................152
Network Group Reports.............................................................................................................153
Network Report .........................................................................................................................156
Asset Report ..............................................................................................................................159
Chronological View Report.......................................................................................................164
Operating System Report...........................................................................................................165
Task Reports..............................................................................................................................168
Task Recipient Report ...............................................................................................................174
Compliance Overview Report ...................................................................................................177
Comparative Compliance Report ..............................................................................................178
Exposure Overview Report........................................................................................................180
Services Report..........................................................................................................................181
Wireless Access Points Report ..................................................................................................182
Saving Rendered Reports................................................................................................................. 184
Publishing a Report ...................................................................................................................184
Viewing Published Reports .......................................................................................................184
Deleting Published Reports .......................................................................................................185
CHAPTER 12.................................................................................. 186
System Updates................................................................................................... 186
Basic Update Steps .......................................................................................................................... 186
About Maintenance Mode .........................................................................................................186
Update Failure ...........................................................................................................................187
Checking for a New System Update................................................................................................ 187
Uploading and Applying a System Update...................................................................................... 188
Rolling Back a System Update ........................................................................................................ 190
APPENDIX A .................................................................................. 191
Instance Configurations ....................................................................................... 191
About Third-Party Connectors......................................................................................................... 193
AppDetective Instance Configuration.............................................................................................. 193
Dynamic Address Resolution Instance Configuration..................................................................... 194
Retina Instance Configuration ......................................................................................................... 195
FoundScan Instance Configuration.................................................................................................. 196
ISS Internet Scanner Instance Configuration................................................................................... 197
ISS SiteProtector Instance Configuration ........................................................................................ 198
Microsoft Baseline Security Analyzer Instance Configuration........................................................ 198
Nessus Instance Configuration ........................................................................................................ 199
Network Architecture Assessor Instance Configuration.................................................................. 200
Nmap Instance Configuration.......................................................................................................... 200
WiFi Instance Configuration ........................................................................................................... 201
Windows Registry Instance Configuration ...................................................................................... 202
QualysGuard Instance Configuration .............................................................................................. 203
vi
PREVENTSYS™ SRM USER’S GUIDE
CONTENTS
APPENDIX B .................................................................................. 204
Connector Configurations .................................................................................... 204
Updating Scanner Plugins................................................................................................................ 204
AppDetective Connector Configuration .......................................................................................... 204
FoundScan Connector Configuration .............................................................................................. 205
ISS Internet Scanner Connector Configuration ............................................................................... 206
ISS SiteProtector Connector Configuration..................................................................................... 206
Microsoft Baseline Security Analyzer Connector Configuration .................................................... 207
Nessus Connector Configuration ..................................................................................................... 207
Network Architecture Assessor Connector Configuration............................................................... 208
P2P Assessment.........................................................................................................................209
Adding Custom NAA Rules ......................................................................................................210
Nmap Connector Configuration....................................................................................................... 212
QualysGuard Connector Configuration ........................................................................................... 212
Retina Connector Configuration ...................................................................................................... 213
WiFi Connector Configuration ........................................................................................................ 213
WinReg Connector Configuration ................................................................................................... 214
Windows-Based Rules...............................................................................................................215
APPENDIX C .................................................................................. 217
Importing Assessment Data ................................................................................. 217
File Import ....................................................................................................................................... 217
Preventsys XML File Import .....................................................................................................217
Generic XML File Import..........................................................................................................218
AppDetective XML File Import ................................................................................................218
AppScan 5 XML File Import.....................................................................................................219
AppScan 6 XML File Import.....................................................................................................219
FoundScan Risk Data XML File Import....................................................................................220
FoundScan Risk and Host Data XMLs File Import...................................................................220
MBSA XML/Zip File Import ....................................................................................................221
nCircle IP360 XML2 File Import ..............................................................................................221
Nessus XML File Import...........................................................................................................222
Nessus NSR File Import ............................................................................................................222
NeXpose XML File Import .......................................................................................................223
NGSSquirrel for Oracle XML File Import ................................................................................223
NGSSquirrel for SQL Server XML File Import ........................................................................224
Nmap XML File Import ............................................................................................................224
QualysGuard XML File Import .................................................................................................225
Scan Import...................................................................................................................................... 225
AppDetective Scan Import ........................................................................................................225
FoundScan Scan Import.............................................................................................................226
QualysGuard Scan Import .........................................................................................................226
Retina Scan Import ....................................................................................................................227
SiteProtector Scan Import..........................................................................................................227
APPENDIX D .................................................................................. 228
Database Backup Guidelines............................................................................... 228
Backup.......................................................................................................................................228
Restore.......................................................................................................................................228
GLOSSARY .................................................................................... 229
vii
PREVENTSYS™ SRM USER’S GUIDE
PREFACE
PREFACE
This guide provides a complete description of the features and options available in the Preventsys
Security Risk Management System (Preventsys SRM System).
About Preventsys
Preventsys delivers automated solutions for security risk management and security compliance
reporting to large government agencies and Fortune 1000 Companies in the financial,
telecommunication, ecommerce, technology and healthcare markets. Preventsys customers reduce the
time required to run a host assessment from 4 hours per host to 9-12 minutes per host; saving the
company an average of $700,000 per year.
Preventsys is headquartered in Carlsbad, California just north of San Diego and has regional offices
across the United States.
Conventions Used in this Guide
The following table presents the typographic conventions used in this guide.
Convention
Represents
Bold
An element of the graphical user
interface
SMALL CAPS
A specific key on the keyboard
Fixed width
A file name, folder name, or other
information that you must type exactly as
shown
Italics
A file name, folder name, or other
information that you must provide
>
A sequence of commands from the menu
bar
Examples
Type the computer’s IP address or MAC
address in the Unique ID field and click
Next.
Press ENTER to continue.
Hold down CTRL to choose multiple
selections.
Log in to the system using the
Preventsys username.
Save the XML text as filename
sample.xsl.
Login to the selected system as root and
run the upgrade program from CD-ROM.
Click Admin > User > Add
Contacting Preventsys Support
Preventsys Inc.
2131 Palomar Airport Rd
Suite 200
Carlsbad, CA 92011
Telephone: 760.268.7888
Fax: 760.476.1011
Email: [email protected]
Web Site: https://support.preventsys.com
viii
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 1 | SECURITY RISK MANAGEMENT
CHAPTER 1
Security Risk Management
Preventsys has pioneered an award-winning Security Risk Management System for large companies
that need to proactively protect confidential customer and company information, ensure high
availability of critical IT assets and easily communicate security compliance to executive management.
Preventsys provides the only solution that consolidates vulnerability, configuration and threat data
from multi-vendor tools, prioritizes critical remediation tasks and automates security compliance
reporting, dramatically cutting costs and reducing the time it takes to create a picture of an
organization's security posture from weeks to seconds.
The Preventsys Security Risk Management System is the only solution that consolidates vulnerability,
configuration and threat data from multi-vendor tools into an enterprise dashboard, prioritizes critical
remediation tasks and automates security compliance reporting. As a result, you can proactively
protect your confidential company and customer information, ensure the high availability of your
critical IT assets, and easily communicate your enterprise compliance scorecard to your executive
team.
The Security Risk Management System has two solutions
The Security Risk Management System provides the following benefits:
»
Consolidation of Multi-vendor Assessment Data – Creates a consolidated view of your risks
across your network to simplify reporting and decision-making.
»
Prioritization of Remediations – Reduces the amount of information the IT team needs to act
upon by prioritizing remediation tasks to protect business critical systems.
»
Automated Compliance Reporting – Automates the time-consuming process of reporting
compliance against internal and external policies to save time and money.
1
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 1 | SECURITY RISK MANAGEMENT
Security Risk Manager
The Preventsys Security Risk Manager Application provides a single dashboard view of risks across
the enterprise, prioritizes remediation efforts and produces an executive scorecard to assess current risk
as well as changes in an organization’s risk score from day to day.
By consolidating multi-vendor vulnerability, configuration and threat data together, security
professionals can reduce the amount of data they need to analyze by up to 98%. The RiskScore™
Engine removes duplicate results, and identifies the top 2% of risks for remediation. Issues are then
assigned and tracked using a centralized workflow engine, which automates the remediation process to
help bridge the gap and create accountability between IT Security and IT Operations.
Automated Security Compliance Reporter
The Automated Security Compliance Reporter Application is the leading sustainable security
compliance reporting solution. Using its patent pending PolicyLab™, customers can “link” their
corporate security policies and standards to specific technical checks to ensure business policy
objectives are being adhered to across the network.
The Automated Security Compliance Reporter provides a consistent and cost-effective way for
auditors to report against established policies like HIPAA, SOX, GLBA and FFIEC. It significantly
reduces the costs of pre-audits and provides executive level insight to the company’s security
compliance initiatives, their cost and effectiveness. As a result, an enterprise can reduce legal and
regulatory exposure and demonstrate security compliance to management without the need for a team
of expensive auditors.
2
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 2 | GETTING STARTED
CHAPTER 2
Getting Started
This chapter explains the basics steps for getting started with the Preventsys SRM System, including
configuring your Web browser, accessing the Preventsys SRM System, and setting up assessments.
Web Browser Requirements
The Preventsys Administrative Client is a browser-based application that utilizes 128-bit encryption
and the HTTPS protocol to ensure secure communication. Microsoft Internet Explorer 5.5 or higher is
required to access the Administrative Client, and you must ensure that your Web browser is set to 128bit encryption.
You must also configure your Web browser to ensure that it always displays the latest versions of all
Web pages. Without the proper configuration settings, you may encounter cached versions of the
Preventsys SRM System’s pages. The following figures illustrate the proper Microsoft Internet
Explorer configuration.
To configure Internet Explorer
1
Click Tools > Internet Options from the Internet Explorer menu bar.
2
Click the Settings button in the Temporary Internet Files section under the General tab.
3
PREVENTSYS™ SRM USER’S GUIDE
3
4
5
CHAPTER 2 | GETTING STARTED
Under Check for newer versions of stored pages, click the Every visit to the page radio
button.
Click Okay in the Settings dialog box.
Click Okay in the Internet Options dialog box to save the configuration.
Accessing the Preventsys SRM System
To access the Preventsys Administrative Client you must first login to the system. If you log in
unsuccessfully three consecutive times, your session will be locked. Open a new Web browser and try
logging in again. Enter your Username and Password, and then click Login.
Close your session by clicking Logout located in the top right-hand corner of the Preventsys screen. If
your session is idle for 45 minutes or more your session will automatically be closed and the Logged
Out screen displayed. Click Login Again to return to the Login screen.
4
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 2 | GETTING STARTED
The Basics
The Preventsys SRM System uses the results of assessments that you configure and schedule to
identify vulnerabilities and policy violations on your networks. It can also use this information to
relate threat alerts to vulnerabilities and their associated remediation tasks.
To run assessments using the Preventsys SRM System, you must first complete the following tasks
after you have configured the Preventsys ESM Server. Details about each of these steps are presented
in the referenced chapters.
Step 1 – Change the Super User Password Preventsys ships with a default Super User
group and associated “Preventsys” user account that is used during installation and
configuration of the system. For security, change the Preventsys user’s password after
installation. See the “User Authorization” chapter for information about how to change a
password.
Step 2 – Update the Policy Library After installation, use the Importing the Preventsys
Policy function to obtain the latest version of the Policy Library. See the “Policies and Rules”
chapter for details about the importing policies. You can also create your own polices and
rules if desired using the rules shipped with the Preventsys SRM System as a template, or
develop custom rules to address your specific concerns. Refer to the Preventsys SRM System
PolicyLab User’s Guide for details about rule and policy development.
Note: Preventsys provides several policies that contain Manual Audit Task Rules. During the
analysis phase of an assessment, these rules conduct integrity checks on the associated
Manual Audit Tasks in your system (e.g.,, whether a Manual Audit Task is assigned, is one
such check). You should review your Manual Audit Tasks to ensure that they will pass all of
these checks before you run your first assessment and analysis, if you do not want policy
violations created because of these checks. See the PolicyLab User Guide for details about
Manual Audit Task Rules and their associated integrity checks.
Step 3 – Configure Assessment Servers and Instance Configurations Configure your
assessment servers and then configure each assessment server’s instance configurations. See
the “Assessment Servers and Instance Configurations” chapter for details about adding
assessment servers and associated instance configurations.
5
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 2 | GETTING STARTED
Step 4 – Define Networks and Network Groups Define the networks and network groups
that you want the Preventsys SRM System to assess. See the “Assets and Networks” chapter
for details about defining assets, networks, and network groups.
Step 5 – Configure Connectors and Configure and Schedule Assessments Configure
the connectors you want to use for assessments. Note that you must first add an instance
configuration for a connector before it can be configured for an assessment. Next, configure
your assessments, and then schedule them. See the “Assessments” chapter for details about
configuring connectors and configuring and scheduling assessments.
At any time you can add users and user groups, which define the functionality and content to which
those users should have access. After you have successfully run an assessment, you can view the
results in reports and on the Security Risk Dashboard. At this point, you can also review and assign
the remediation tasks created because of the vulnerabilities and policy violations found by the
assessment.
Step 6 – View Reports and the Security Risk Dashboard After an assessment is
completed, use the reporting feature to view the results. See the “Reports” chapter for details
about reports. The Security Risk Dashboard provides a snapshot of how compliant you are,
your current exposure, the current top-five unresolved remediation tasks as well as your topfive assigned remediation tasks based on priority. If you have Preventsys Threat Intelligence
license, you can also receive and view timely, actionable and comprehensive security analysis
and notification about the latest cyber threats, including the threats and vulnerabilities that
affect your networks. See the “Security Risk Dashboard” chapter for details.
Step 7 – Add User Groups and Users Add Groups that define how you want to mange user
access to functionality and content. Add a user account for each individual user who will be
accessing the system. Last, associate those users with the groups to which they should
belong. See the “User Authorization” chapter for details about defining users and associating
them with groups.
Step 8 – Assign Remediations Review and assign vulnerabilities and policy violations, so
that they can be resolved. You can also create filters that will only display the remediation
tasks you specify, and create rules that will automatically pre-assign tasks to specific
remediators. See the “Remediations” chapter for details about creating filters and rules and
assigning remediation tasks.
System Components
The Preventsys SRM System is comprised of the following main components.
Administrative Client The Administrative Client is a browser-based client that serves as the user’s
interface to the Enterprise Security Management Server. This client is responsible for allowing users
to perform user management, assessment and system configuration tasks, as well as report navigation
and remediation functions.
Assessment Server The server (or cluster of servers) which hosts the actual scanners. The
assessment server and the assessment tool instances you want on the server are configured via the
Preventsys SRM System web application UI.
Enterprise Security Management Server The Enterprise Security Management Server is the server
(or cluster of servers) which provides the administrative interface to the Preventsys software. This
server is responsible for allowing the administrator to configure target host and network information,
assess sessions, and to review reported assessment results.
6
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 2 | GETTING STARTED
Dynamic Address Resolution Connector (DARC) DARC provides consistent address resolution for
correlation of host information throughout changing IP addresses (because of DHCP) by tracking hosts
by its network interface controller’s (NIC) MAC address. By utilizing the Dynamic Target Address
Resolution Protocol (DTARP) to report the correlation between IP addresses and host identity, the
system is able to correlate the same physical hosts regardless of IP changes due to DHCP.
RDBMS Server The Relational Database Management System (RDBMS) stores Preventsys
configuration data and scan results in both raw and analyzed formats. Note that it is possible to install
multiple components on individual servers in environments that meet the requirements for minimum
installation configurations. See the Installation Guide for details about installation configuration
options.
Navigating the Preventsys SRM System
This section provides information about navigating via the Preventsys Main Menu, the Preventsys
Reports Menu, and the pagination controls.
Main Menu
The Preventsys Main Menu provides access to all system functions. Access to this functionality is
granted based on the groups to which the user belongs. See the “User Authorization” chapter for
information about controlling functionality .
Note: If a user does not belong to any groups, only the Home and Help menu items are displayed.
Enterprise Security Dashboard
Policies
Support
Rules
Submit Error
Update Policy Library
About Preventsys
Import Preventsys Policy
Enterprise Groups
Connector Configurations
Assessment Configurations
Assessment Schedules
Manual Audit Tasks
Assessment Status
Manual Audit Recipient Groups
Re-Analyze
Remediation Tasks
Re-Analyze Status
Remediation Assignment Rules
External Patch Management Systems
External Remediation Systems
External Remediation Users
Administrator
Comparative Compliance
Standard
Compliance
Executive Summary
»
Users
Trending
Groups
Enterprise Group
Exposure
Assets
Assets
»
Network
»
Network Group
Standard
Overview
Trending
Standard
Host Properties
Asset Exclusion Lists
Services
»
Trending
Task
»
Aging Summary
Standard
Network Groups
Task Recipient
»
Rollup by Violation
Trending
Preferences
Operating System
Services
Networks
Overview
Network Properties
Wireless Access Points
Rollup by Vulnerability
Assessment Servers
Published Reports
Standard
System Updates
Trending
Overview
Standard
Trending
7
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 2 | GETTING STARTED
Pagination Controls
Various reports and administration screens feature pagination controls near the bottom of the screen
that allow for convenient navigation through long lists of data. When the data spans multiple pages,
you may simply click a page number to advance to the selected page of data.
Note that these page numbers are presented in groups of ten. If there are more than ten pages, the
pagination controls will include links to the “Next” and “Previous” series of pages, allowing you to
navigate quickly to the next (or previous) group of ten pages.
Table Sorting
Many screens display information in tables. This information is organized based on a default sort (for
example, username). To change the way the table is sorted, click on the desired column heading. Note
that sortable columns will display a dashed line under the heading text. Click on the column heading a
second time to reverse the sort order. Note that not all column headings have the sort option.
Saving as PDF
There are several areas in Reporting and Remediation where you can save the displayed information as
in a Portable Document Format (PDF). Clicking the Save as PDF link will open a separate browser
to save
window displaying the information in PDF format. Click on the Adobe Acrobat Save icon
the report as a PDF file.
8
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 2 | GETTING STARTED
Licensing and Version Information
You can view information about the Preventsys SRM System including licensing and version
information by selecting Help > About Preventsys.
Note: The "Number of nodes used" is updated daily.
If your license has expired, the ESM Server and Administrative Client functionality will be
deactivated. Previously scheduled scans will continue, but assessment data will not be accessible
without a valid license. If this happens, please contact Preventsys to update your license.
Reporting Errors
You can report errors to Preventsys by using the Error Report form. This form is also displayed
whenever the Preventsys SRM System encounters an unknown issue with the system.
The Submit Error function allows you to email Preventsys about an issue you are experiencing with the
system. When you submit the Error Report form, the system gathers all the log files on the ESM and
sends them with the report. The Error Report form is also displayed when an unexpected issue occurs
with the system.
By default the information in the Error Report is encrypted and sent to Preventsys via email. However,
you can turn off the encryption option if desired, and you can specify a different “To” email address.
9
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 2 | GETTING STARTED
If your email system does not handle large files, you can elect to download the file and then manually
upload it to the Preventsys Customer Support Site using your Support account.
To submit an Error Report
1
Select Help > Submit Error. The Error Report screen is displayed. All the fields are prefilled with the exception “Comments”.
2
Modify any field entries desired and enter as much information as you can about what you
think caused the error and any steps that might help Preventsys reproduce it.
Select Continue when you are finished. The system will start gathering and compressing log
information. When this task is completed, the report will be sent to the "To" email address
you specified. If you elected to download the report, an email containing a link to a screen
where you can download the file will be sent to the "From" address you specified."
3
10
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 2 | GETTING STARTED
As discussed earlier, the Error Report screen is also displayed whenever the system encounters an
unexpected issue. When this happens, the screen also displays details about the error.
Figure 2-1. Sample Error Report based on unexpected system error
11
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 3 | ASSESSMENT SERVERS
AND
INSTANCE CONFIGURATIONS
CHAPTER 3
Assessment Servers and Instance Configurations
Before the Preventsys SRM System can perform assessments on your networks, you must first
configure your Assessment Server(s) and the instance configurations for the assessment tools you want
to use. This chapter discusses how to add and modify assessment servers and how to add instance
configurations.
The following terms and their definitions will assist you when reading this chapter.
Assessment Server: The Assessment Server is one of the applications that make up the Preventsys
Security Risk Management System. The Assessment Server provides an interface between the ESM
Server and a variety of assessment tools, both third-party as well as Preventsys-created. Each of these
interfaces is called a connector, and each Assessment Server is shipped with several connectors preinstalled. Additionally, the interface has been documented so that anyone can write their own
connector, enabling them to add support for additional third-party software.
Connector: A Connector is the interface used by the Preventsys Assessment Server, which allows an
ESM Server to configure, control, and receive results from a particular assessment tool. Each
connector must provide instance configuration and connector configuration forms, must be able to
start, stop and (optionally) pause and resume scans, and must be able to transform the tool’s results
into the Preventsys result format. Each connector is dynamically loaded at startup, so individual
connectors can be added, updated and/or removed without requiring a replacement Assessment Server
executable.
Preventsys has published its connector API, so that anyone can add support for additional software.
Contact Preventsys Support for information about the API. For a current list of connectors supported
by Preventsys, click on the “Supported Connectors List” link available on the Assessment Server
Management screen and on the Import Assessment Data screen.
12
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 3 | ASSESSMENT SERVERS
AND
INSTANCE CONFIGURATIONS
Figure 3-1. Example of the Preventsys Supported Connectors List
This list is updated regularly as new connectors are supported
Instance Configuration: An Instance Configuration is a static set of parameters for a particular
installation of an assessment tool supported by the Preventsys Assessment Server. An Instance
Configuration’s parameters are generally used to allow an Assessment Server to connect to, and, if
needed, authenticate to a particular installation of the assessment tool.
For example, if the same tool were installed in three different locations, each of those installations
would have a single instance configuration.
Network Affinity: During an assessment, the ESM Server can distribute a task across multiple
Assessment Servers, a process that not only frequently speeds up auditing, but also improves
reliability, since an assessment is never tied to a specific set of Assessment Servers. The downside to
this approach is that it assumes that all Assessment Servers are equally capable of scanning a particular
network range when, in fact, this is rarely the case. The mechanism Preventsys has to deal with this is
called network affinity.
Network affinity, on a basic level, allows you to configure how suitable a particular instance
configuration is to scan a network range. When adding an instance configuration, you can add one or
more network affinity ranges, each of which consists of a range of IPs and a weight, which is a number
from 1-100. If no network affinity range is defined for an instance configuration, the ESM Server
assumes that instance is the best possible instance for any IP range.
During an assessment when network affinity ranges are defined, the ESM Server will assign each task
to the instance configuration whose network affinity both supports the range and has the highest
weight. If necessary, the ESM Server will split the task across multiple Assessment Servers to insure
that the instance configuration with the highest weight for a given range of IPs is always used.
One case where network affinity is practically required is when dealing with Assessment Servers that
cannot send packets to a particular IP range due to routing or filtering-based restrictions. Using
network affinity ranges, you would define the IP ranges each instance configuration can reach, while
leaving out the ranges they cannot reach. This would prevent the ESM Server from using any of the
instance configurations to scan any ranges without network affinity ranges for the target IP range(s).
13
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 3 | ASSESSMENT SERVERS
AND
INSTANCE CONFIGURATIONS
Without being able to define network affinity ranges, assessments might fail because the ESM Server
could assign a task to an instance configuration unable to handle the target IP range.
This functionality is also very useful when configuring Assessment Servers at multiple locations that
are networked over a slower WAN connection. By assigning higher weights to local networks, and
lower weights to remote networks, you can insure that the fastest available instance configuration will
be selected to scan a particular network range, and that scan traffic will only be transmitted over the
WAN link as a last resort.
Managing Assessment Servers
All Assessment Server and Instance Configuration administration is conducted from the Assessment
Server Management screen.
To access the Assessment Server Management screen
1
Select Admin > Assessment Servers. The Assessment Server Management screen is
displayed.
The Assessment Server Management screen displays the connection status and version number of each
assessment server. The average status of all assessment servers is also displayed.
The screen also displays the connectors initialized on each assessment server. From this screen, you
can add a new assessment server and associated instance configurations, edit an existing assessment
server and associated instance configurations, and delete an assessment server and/or associated
instance configurations.
Note: The Preventsys SRM System supports the cooperative scanning of more than one network at a
time using multiple Assessment Servers, as well as scanning the same network using more than one
Assessment Server.
Adding Assessment Servers
The Add Assessment Server function allows authorized Preventsys users to add assessment servers to
the system.
14
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 3 | ASSESSMENT SERVERS
AND
INSTANCE CONFIGURATIONS
To add an assessment server
1
Select the Add New button on the Assessment Server Management screen. The Add
Assessment Server screen is displayed.
2
3
4
5
6
Enter the name for the assessment server (20 character max).
Enter the assessment server’s IP and hostname.
Enter the associated port.
Select Submit to save.
The system will verity connection to the added assessment server.
Editing Assessment Servers
The Edit Assessment Server function allows authorized Preventsys users to modify assessment servers.
To edit an assessment server
1
2
3
Select the Edit function on the Assessment Server Management screen the server you want to
edit.. The Edit Assessment Server screen is displayed.
Edit the assessment server as desired.
Select Submit to save.
Disabling an Enabling Assessment Servers
The Disable function allows you take an Assessment Server offline temporarily without losing any
data about the server or the associated instance configurations. When an Assessment Server is
disabled, it will still be displayed on the Assessment Server Management screen with its associated
instance configurations, however you will not be able to edit any of this data or use it to run new
assessments. Any assessments currently running should complete as expected.
After the Assessment Server is enabled, you will be able to edit it, view and edit the associated
instance configurations as well as add new ones, and use it to run assessments just as before.
To disable/enable an assessment server
1
2
Select the Disable function on the Assessment Server Management screen for the server you
want to deactivate. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
15
PREVENTSYS™ SRM USER’S GUIDE
3
4
CHAPTER 3 | ASSESSMENT SERVERS
AND
INSTANCE CONFIGURATIONS
If you selected OK, the system deactivates the selected assessment server and all associated
instance configurations. The “Disable” link changes to “Enable”.
Select the Enable function to reactivate the Assessment Server.
Deleting Assessment Servers
The Delete Assessment Server function allows authorized Preventsys users to delete assessment
servers from the system. Note that deleting an Assessment Server may cause currently running
assessments to fail if connectivity is also lost. In addition, all instance configurations associated with
that Assessment Server will also be deleted.
To delete an assessment server
1
2
3
Select the Delete function on the Assessment Server Management screen for the server you
want to remove. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected assessment server and all associated
instance configurations.
Managing Instance Configurations
As discussed at the beginning of this chapter, you must configure your assessment server and the
instance configurations for the assessment tools you want to use before assessments can be performed
on your networks. This section discusses how to add and modify instance configurations after you
have added an assessment server. See the “Instance” appendix for details about the connectors
supported by Preventsys. You can also click on the Supported Connectors List link available on the
Assessment Server Management screen for the current list of connectors supported by Preventsys.
All Instance Configuration administration is conducted from the Assessment Server Management
screen. See the previous section for details about accessing this screen.
Affinity and Weight
When you add an instance configuration to an Assessment Server, you have the option of specifying
which network(s) the instance should be allowed to assess. This is referred to as “Network Affinity”.
If you do not enter an affinity, then the system assumes “all” networks can be scanned.
If you chose to specify an affinity, make sure that the networks you want to assess are within the
affinity ranges. Networks outside of the affinity ranges will be ignored by the system when an
assessment is run.
Note: You can add multiple as well as overlapping network affinity ranges to a single instance
configuration.
If you have more than one instance configuration of a specific type (e.g., two Nessus instances), you
can also specify the priority in which the system should utilize them during an assessment by assigning
a weight with the network affinity range.
16
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 3 | ASSESSMENT SERVERS
AND
INSTANCE CONFIGURATIONS
Adding Instance Configurations
The Add Instance Configuration function allows authorized Preventsys users to add instance
configurations to assessment servers.
To add an instance configuration
1
Select the type of connector for which you want to add an instance from the dropdown list on
the Assessment Server Management screen, and then select the Add button. The instance
configuration screen for the connector you selected is displayed.
Figure 3-2. Example of the Nessus Instance Configuration screen
2
Enter the connector’s name.
Note: Preventsys recommends that you name your instance configurations such that their associated
connector type can be easily identified (e.g., “nessus1”; not “instance1”).
3
4
5
Enter the required and any desired optional content for the connector.
Enter affinities and weight if desired.
Select Submit to save.
Editing Instance Configurations
The Edit Instance Configuration function allows authorized Preventsys users to edit instance
configurations for assessment servers.
To edit an instance configuration
1
2
3
On the Assessment Server Management screen, expand the Connectors row for the
assessment server you want and then select the Edit link for the instance configuration you
want to edit. The instance configuration screen for the connector you selected is displayed
Edit the instance as desired.
Select Submit to save.
17
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 3 | ASSESSMENT SERVERS
AND
INSTANCE CONFIGURATIONS
Deleting Instance Configurations
The Delete Instance Configuration function allows authorized Preventsys users to remove instance
configurations from an assessment server. Note: If you have multiple instance configurations of the
same type, the system will attempt to use the remaining instance if you delete the other while
assessments are running.
To delete an instance configuration
1
2
3
On the Assessment Server Management screen, expand the Connectors row for the
assessment server you want and then select the Delete link for the instance configuration you
want to remove. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected instance configuration from the
assessment server.
18
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 4 | USER AUTHORIZATION
CHAPTER 4
User Authorization
The Preventsys SRM System controls access to functionality and content using a group-based access
control mechanism. This chapter provides details about how to grant access to functionality by adding
permissions to groups, how to grant access to content by associating networks with groups, how to add
users to the system, and how to add users to groups.
The following terms and their definitions will assist you when reading this chapter.
User Account: A User Account grants the user associated with that account initial access to the
Preventsys SRM System. The user’s account must be added to a group (or groups) to give them
additional access to functionality and content.
Resource: A Resource is an object of the Preventsys SRM System. For example, all of the
management screens in the system are resources (e.g., Assessment Configuration Management, User
Administration Management, etc.).
Permission: A Permission is a corresponding action that can be conducted on the resource (e.g., read,
modify, etc.). By giving a group a permission, you are granting that group access to the associated
functionality. For example, the “Modify User” permission for the “Users” resource gives users the
ability to add, edit, and delete user accounts. Permissions are also granted at the network level, which
gives users access to content in areas where content is driven by networks. For example, if a group has
the “Assign Remediations” permission for the “Remediations” resource and permission to the
“AcmeDataCenter” network, then members of that group will be able to view and assign tasks for
assets within the “AcmeDataCenter” network range.
User Group: A User Group is where you define the resources and permissions that members of that
group will have.
Managing User Groups
A User Group defines the resources, permissions, and networks for which its members should have
access. When users are added to a group, they automatically inherit the access rights of that group.
A user can belong to more than one group. In this case, the least restrictive permission takes
precedence. For example, the “modify” permission takes precedence over the “read” permission.
Since access is managed by groups rather than a user’s name, if you want a particular user to have
unique access permission, then you should create a separate group for that individual.
Any changes made to a group's permissions will automatically be applied to all members of that group.
Removing an individual user from one group and adding them to another group will sever all
connections to the resources, permissions, and networks of the previous group and replace them with
those of the new group.
19
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 4 | USER AUTHORIZATION
The Preventsys SRM System comes with a predefined group called “Super Users” that provides full
access to the system. Full access means that the group has permissions to modify all resources and
view content for all networks.
Note that content displayed on some resources in the system is controlled at the network group level
verses the network level. For those areas, for example reporting, the user must belong to a group (or
groups) with both the permissions for viewing the resource and for all the networks that make up the
network group associated with the content displayed on the report.
About Resources and Permissions
The following table presents all the resources and corresponding permissions for the system, the
functions that each of them control, and the screens to which they allow access.
Resource
Users
Permission
read only
modify users
Link from "Hello username"
> My Details
Functions
Read (read only, no adding or modifying
allowed)
Add/Edit/Delete/Add and Remove Users From
Groups
modify groups
Add/Edit/Copy/Delete and Add/Remove
Group Associations from Networks
N/A
Edit Self
Note: Unless the logged in user has other user
management permissions, they can only
change their password, full name, and email
address
Assets
read only
Networks
modify assets
modify asset properties
modify services
modify exclusion lists
globalize exclusion lists
read only
Assessment Servers
modify networks
modify network properties
modify network groups
read only
modify assessment servers
Read (read only, no adding or modifying
allowed)
Add/Edit/Delete Assets
Add/Edit/Delete Properties
Add/Edit/Delete Services
Add/Edit/Delete
Make Global
Read (read only, no adding or modifying
allowed)
Add/Edit/Delete Networks
Add/Delete Properties
Add/Edit/Delete Network Groups
Read (read only, no adding or modifying
allowed)
Add/Edit/Delete AS and Connector Instances
System Updates
update system
Read/Upload/Update/Rollback/ Check for
Updates
System Preferences
modify due date and criticality
Edit due date and criticality
Manual Audit Tasks
read only
modify MAT Recipient Groups
Read (read only, no adding or modifying
allowed)
Add/Copy/Edit/Delete MATs (includes
assignment and scheduling)
Add/Copy/Edit/Delete Recipient Groups
resolve MATs
Update MAT Status/View MAT Summary
modify MATs
20
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 4 | USER AUTHORIZATION
Resource
Remediations
Permission
read only
assign remediations
prioritize remediations
modify pre-assignment rules
resolve remediations
Policies and Rules
Read (read only, no adding or modifying
allowed)
Assign and Reassign/Modify Due Date
Prioritize/Modify Due Date
Add/Edit/Delete Rules
Update Remediation Status/View My Tasks
Portlet/View Remediation Details/Patch
Remediations
modify external systems
Add/Edit/Delete External PMS and
Remediation Systems and Users
read only
Read (read only, no adding or modifying
allowed)
Access PolicyLab/View Policy and Rule
Management/View Policy and Rule
Deactivate Rules and Policies
modify rules/policies
deactivate rules/policies
Assessments
Functions
import/export policies
read only
Import and Export
Read (read only, no adding or modifying
allowed)
modify assessment
configurations
Add/Edit/Copy/Delete Assessment
Configurations
modify analysis
Can select a policy and the threat analysis
option when editing an assessment
configuration
import
Import To Assessment
schedule
cancel
pause
terminate all
delete
hide
unhide
Add/Edit/Delete Schedules/Execute Now
Cancel Assessments
Pause/Resume Assessments
Terminate All Assessments
Delete Assessments
Hide Assessments
Unhide Assessments
reanalyze
Configure Reanalysis and View Reanalysis
Status
Add/Edit/Delete Connector Configurations
modify connector
configurations
Threat Alerts
modify enterprise groups
read threat alerts
Add/Edit/Copy/Delete/Activate
All Threats/Threat Details/Latest Threats
Reports
access reports
Read/Modify Filter/View Enterprise
Compliance, Enterprise Trending, Exposure,
and Compliance Dashboard portlets
publish reports
Publish/Delete
21
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 4 | USER AUTHORIZATION
The Preventsys SRM System comes with a pre-defined group called the “Super User” group, which
has one user called “Preventsys”. This group has all resources and permissions for all networks. Users
can be added to and removed from the group as long as at least one user remains in the group, but the
group itself cannot be edited, deleted, or copied.
The Preventsys user account is generally reserved for the Preventsys SRM System’s lead administrator
and has a default password:
Username:
Password:
preventsys
audit
While this default account is generally used for the initial setup and subsequent system administration,
it is strongly suggested that you change the default account’s password as soon as possible.
All user group administration is conducted from the Group Management screen.
To access the Group Management screen
1
Click Admin > Groups. The Group Management screen is displayed.
The Group Management screen allows authorized users to view existing groups, create new groups,
edit existing groups, add and remove group members, and remove groups. You can also view groups
based on the networks to which they are associated by selecting the By Network tab. Note that the
Super User group cannot be edited, copied, or deleted. You can only add and remove users from the
Super User group.
Note: If you are a member of the Super User group, then all groups are displayed. Otherwise, only
groups to which you belong are displayed.
22
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 4 | USER AUTHORIZATION
Adding User Groups
The system will automatically add you as a member to every User Group you create.
To add a User Group
1
On the Group Management screen, click the Add New Group button. The Add Group screen
is displayed..
2
3
Enter a name for the user group and a description if desired
Select the permissions under each resource to which you want the group to have access.
Selecting the checkbox next to a resource name will select all permission for that resource. A
checkbox with a gray check means that some, but not all, permissions for the resource are
selected.
Note: If a group is given both a “read only” and a “modify” permission for the same resource, the
“modify” permission will take precedence.
4
Select the networks to which you want the group to have access. By selecting a network, you
are allowing all member of the group to view and modify content associated with that
network. For example, a group with permission to “network1” and the “resolve remediations”
permission can be assigned remediation tasks associated with assets in network1.
Note: If you are a member of the Super User group, then all networks are displayed. Otherwise, only
networks that are within the range of the network permissions of the groups to which you belong are
displayed.
23
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 4 | USER AUTHORIZATION
Editing User Groups
If the group is edited such that permissions or networks are removed from the group, then members of
that group will no longer have authorization to the removed permissions and network ranges. The
user must belong to another group or groups with the same permission and network range
combinations that were removed to retain the same authorization.
To edit a group
1
2
3
On the Group Management screen, click the Edit link for the group you want to modify. The
Edit Group screen is displayed.
Edit group as desired.
Selected Submit to save.
Deleting User Groups
If a group is deleted, then members of that group will no longer have authorization to the permissions
and network ranges that were unique to that group. The user must belong to another group or groups
with the same permission and network range combinations as the deleted group to retain the same
authorization.
To delete a group
1
2
3
On the Group Management screen, click the Delete link for the group you wanted removed.
A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected group.
Adding and Removing Users from Groups
The Add and Remove Users function allows authorized users to add users to and remove users from
the groups to which they belong.
If a user is removed from a group, then that user will no longer have authorization to the permissions
and network ranges unique to that group. The user must belong to another group or groups with the
same permission and network range combinations as the group they were removed from to retain the
same authorization.
Note: The system will not allow a logged in user to remove himself/herself from the Super User Group.
Another logged in user with the correct permissions must conduct this action on behalf of that user.
To add and remove users
1
On the Group Management screen, select the Add/Remove Group Users link. The
Add/Remove Users screen is displayed.
Note: All users are displayed regardless of which group(s) they belong to as well as users who not
belong to any groups.
24
PREVENTSYS™ SRM USER’S GUIDE
2
CHAPTER 4 | USER AUTHORIZATION
Select Submit to save.
Managing Users
All user administration is conducted from the User Management screen.
To access the User Management screen
1
Click Admin > User. The User Management screen is displayed with the By User tab
selected by default.
From this screen, you can view a list of existing users by their usernames. You can also add new
users, edit existing users, and delete users.
Note: The By User tab displays all users in the system regardless of your group permissions.
25
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 4 | USER AUTHORIZATION
If you select the By Group tab, you can view a list of existing groups and their members.
Note: The By Group tab displays all groups and their members in the system regardless of your group
permissions.
Adding User Accounts
All users must be assigned a username, a password, a full name, and an email address. In addition,
users should also be added to at least one group that has the resources and permissions you want them
to have in the system.
To add a user
1
On the User Management screen, click the Add New User button. The Add User screen is
displayed.
2
Enter the following data for the new user:
ƒ Username (20 characters maximum)
26
PREVENTSYS™ SRM USER’S GUIDE
3
CHAPTER 4 | USER AUTHORIZATION
ƒ Password (50 characters maximum)
ƒ Enter the password again in the Verify Password field
ƒ Full Name (must be unique)
ƒ Email Address
Select the Group(s) to which you want the new user to belong
Note: If you are a member of the Super User group, then all groups are displayed in the “Groups” list.
Otherwise, only the groups to which you belong are presented.
4
Click Submit to add the user.
Editing User Accounts
You cannot edit your own username. Only a user belonging to the Super User group or a user
belonging to a group with the “Users” resource, the “Modify Users” permission, and the same network
associations as your group can make this change for you.
Note: Only users that belong to the Super User group can modify the user accounts of other users that
belong to the Super User Group.
To edit a user
1
2
3
On the User Management screen, click the Edit link for the user you want to modify. The
Edit User screen is displayed.
Edit the user’s information as desired.
Click Submit to save.
Deleting User Accounts
You cannot delete yourself from the system. If there is only one user in the Super User group, you also
cannot delete that user.
Remediation Tasks
Open remediation tasks that are assigned to the deleted user are automatically changed to the
“Unassigned” state by the system. For example, if user JohnSmith has four remediation tasks that are
have not been resolved (i.e. he has not changed their statuses to Claimed Resolved, False Positive, or
Accepted Risk), the system will change the status of these four tasks to Unassigned after he is deleted.
They can now be reassigned to a different user. See the “Remediations” chapter for details about
Remediation Task Management.
To delete a user account
1
2
3
On the User Management screen, click the Delete link for the user you want removed. A
confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected user.
Changing Your User Information
You can change your password, full name, and email address by clicking on your username in the
upper right-hand corner of any screen next to the word “Hello”. Click Submit when finished to save
your changes.
27
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 4 | USER AUTHORIZATION
Note: You cannot edit your own username. Only a user belonging to the Super User group or a user
belonging to a group with the User resource, Modify Users permission, and the same network
associations as your group can make this change for you.
Associating a User with an External Remediation System
The Associate External Remediation User screen is displayed following the creation of a new user if
you have an external remediation system configured in the Preventsys SRM System. See the
“Remediations” chapter for details about working with external remediation users.
This screen allows you to associate an external remediation system user with a Preventsys user to
allow for the exchange and synchronization of remediation task status. Preventsys users with external
remediation system associations should always be granted the “Remediations” resource and associated
“resolve remediations” permission. Since the external user will inherit the Preventsys user’s
privileges, this ensures that you will be able to assign tasks to that external user.
28
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 4 | USER AUTHORIZATION
Note that only “existing” external users may be associated via the Add User and Edit User functions.
In order to access the Associate User functionality, you must first have added the selected user via the
Add External Remediation System User function. If the external user is subsequently disassociated
from the Preventsys user, then tasks will remain assigned to the external user. If the external user
association is removed from the Preventsys SRM System, then all remaining tasks will be assigned to
the Preventsys user. See the “Remediations” chapter for details about working with external
remediation systems and users.
29
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
CHAPTER 5
Assets and Networks
Before the Preventsys SRM System can perform assessments on your networks, you must first define
those networks. This chapter discusses how to add networks, assets, and network groups.
The following terms and definitions will assist you when reading this chapter.
Asset: An Asset is an IP-based system (router, switch, server, firewall, etc.).
Service: A Service specifics whether the given service runs under TCP or UDP and the port that the
service runs on. Services are associated with Host Property Specifications to specify which services
are required or prohibited for an asset.
Host Property: A Host Property defines the asset/host type (e.g., Trusted, Firewall, Router). This
allows for the detection of policy violations in the context of asset type during analysis if a policy is
used.
Network: A Network is defined as a collection of IP-based systems (routers, switches, servers,
firewalls, etc.) that are grouped as a logical unit. For example, one network could be the “Finance
Network” which would include all of the servers, routers, and systems that service the finance
department.
Network Property: A Network Property defines the network type (e.g., DMZ, Private, Public). This
allows for the detection of policy violations in the context of network type during analysis if a policy is
used. Network properties can be exclusive or non-exclusive.
Time Window: YA Time Window specifies the times at which the system is allowed to conduct
assessments on a give network.
Network Group: A Network Group is a network or a selection of networks that you group together for
the purposes of assessment. When creating an Assessment Configuration, you will select the network
group you want to assess.
Exclusion List: An Exclusion List specifies the assets that you want the system to ignore during an
assessment.
Managing Assets
Each asset represents a specific machine on your network and must have a name, an IP address, a
unique ID, an operating system, a description, a host property, a financial impact and an operational
impact value.
The unique ID represents either a static IP address or a MAC address in DHCP systems. This unique
ID is used to identify assets despite potential changes to asset name or IP address.
30
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
Asset properties are used to define the type of asset, allowing for the detection of policy violations in
the context of asset type during analysis.
The financial impact of an asset (e.g., its replacement cost) is used for calculating assets at risk data. If
you wish to assign a specific dollar value to an individual asset, you may do so using the Edit Asset
function. Assets that are not assigned a financial impact will utilize the average value assigned to the
parent network.
The hourly operational impact is the cost that you would incur from an operations perspective (e.g., the
amount of work time lost $ per/hour) if a machine was compromised. This value is used for
calculating exposure risk, which is displayed on the Security Risk Dashboard. Assets that are not
assigned a operational impact will utilize the average value assigned to the parent network.
After adding the networks you want to assess, creating and running an assessment will trigger the
Dynamic Address Resolution process which automatically populating the Preventsys SRM System
with asset data. You can then edit these assets and add information such as the asset’s unique ID, host
property, and dollar value. While this process will automatically retrieve asset data as part of the
assessment process, you may also manually add and delete assets.
All asset administration is conducted from the Asset Management screen.
To access the Asset Management screen
1
Click Admin > Assets. The Asset Management screen is displayed.
From the Asset Management screen, you can view a list of existing assets, view details about an asset,
add new assets, edit existing assets, and delete assets.
Note: If you are a member of the Super User group, then all assets are displayed. Otherwise, only
assets that are within the range of the network permissions of the groups to which you belong are
displayed.
Adding an asset
Assets are generally acquired using the Dynamic Address Resolution Connector (DARC) during the
assessment process. New assets only need to be added manually in rare instances where the DARC
cannot acquire basic asset data. For example, if DARC is not able to generate the required data on
packet-filtered assets or assets with sporadic uptimes.
31
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
To add an asset
1
On the Asset Management screen, click the Add New Asset button. The Add Asset screen is
displayed.
2
Enter the following information:
ƒ IP Address of the new asset
Note: You can only enter assets that are within the range of the network permissions of the groups to
which you belong.
ƒ
ƒ
ƒ
ƒ
ƒ
3
Asset name (50 characters maximum).
Unique ID
Operating System
Description for the new asset
Select Asset Properties (you can select multiple properties by holding down the CTRL
key while making your selections)
ƒ Financial impact
ƒ Operational Impact per Hour
Click Submit to add the asset.
Editing an asset
The Dynamic Address Resolution Connector (DARC) automatically retrieves basic asset data as part
of the assessment process; however, asset properties and dollar values must be assigned manually.
To edit an asset
1
2
On the Asset Management screen, click the Edit link for the asset you want to modify. The
Edit Asset screen is displayed.
Edit the asset’s information as desired.
Note: In general, it is recommended that you do not edit the Unique ID field. This is the value used to
track hosts across successive assessments. The Unique ID should only be edited for manually added
hosts or for hosts that change to a new static IP address.
32
PREVENTSYS™ SRM USER’S GUIDE
3
CHAPTER 5 | ASSETS
AND
NETWORKS
Click Submit to save your changes.
Deleting an Asset
Assets are normally deleted automatically by the Dynamic Address Resolution Connector (DARC) as
part of the assessment process. Assets only need to be deleted manually in rare instances where DARC
cannot track the selected asset (as in the case of manually added assets) or where the assessment
process is causing errors on the specified asset. For example, if the assessment process is causing a
printer to crash, you may manually delete the printer’s asset to alleviate the problem.
To delete an asset
1
2
3
On the Asset Management screen, click the Delete link for the asset you want removed. A
confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected asset.
Managing Host Properties
Assets are categorized into types referred to as Asset Properties (i.e. server, desktop, DMZ, etc.).
During analysis, asset properties allow for the detection of policy violations in the context of asset type
when PDL policies are applied to assessment results.
For example, the Webserver_Constraint host property may be applied to dedicated Web servers to
ensure that they run no services other than SSHD (Secure Shell Daemon) and HTTPD (Hyper Text
Transfer Protocol Daemon). A policy violation will be reported if any other services are detected
when assets with the Webserver_Constraint host property are assessed.
There are two types of asset properties: “Label” and “Specification”. A Host Property Label is used to
define a list of assets that may or may not have any common network characteristics. A Host Property
Specification also defines a list of assets as well as specifies a list of services that are required or
prohibited for each those assets.
For example, if a company’s “development machines” do not prohibit or require that any specific
services are running, a host property label can be used to identify the list of assets that are considered
“development machines.” However, machines like “Commerce Servers” often have specific common
characteristics. For example, in most corporations, Commerce Servers typically require HTTPS, may
require HTTP, and prohibit insecure services like telnet. In this case, you can use a host property
specification to define the list of assets that are commerce servers and define which services are
required, allowed, and prohibited from running on them.
Label-based asset properties include a name only, while specification-based asset properties include a
name, description, solution, severity level, and service mappings, as well as an indicator determining
whether the host property should be applied to all assets. The description provides basic information
about the host property that is displayed in reports. The solution includes a text description and/or
links for alleviating policy violations associated with the selected host property. Severity levels range
from 1 to 100, with 100 being the most severe.
The Preventsys SRM System provides a set of standard Host Property Specifications and Host
Property Labels for you. Refer to the Preventsys SRM System Policy Reference Guide for a list of
these.
All Host Property administration is conducted from the Host Property Management screen.
33
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
To access the Host Property Management screen
1
Click Admin > Host Property. The Host Property Management screen is displayed.
From the Host Property Management screen, you can view a list of existing properties, add new
properties, edit existing properties, and delete properties.
Adding a Host Property
The Add Host Property function allows authorized Preventsys users to create new asset properties.
To add a host property
1
On the Host Property Management screen, click on the Add New Host Property button. The
Add Host Property screen is displayed.
2
Enter the Host Property Name (80 characters maximum). Note that a host property name
cannot include spaces.
Select whether the host property is Specification or Label based.
If you select Label based, advance to Step 11.
3
4
34
PREVENTSYS™ SRM USER’S GUIDE
5
6
7
8
CHAPTER 5 | ASSETS
AND
NETWORKS
Enter a Description for the new host property (2047 characters maximum).
Enter a Solution for the new host property (2047 characters maximum).
Select a severity level from the pull-down Severity control.
Click the Apply to All Assets checkbox if you want this property applied to all existing assets
as well as new assets.
Note: The “Apply to all Assets” option will only apply the property to assets that are within the range
of the network permissions of the groups to which you belong.
Now, select which services are mapped to this property (i.e. whether a service should be
Mandatory, Allowed or Prohibited by default) using the pull-down menus for each service.
10 Remember to select how you want the system to handle services that you have not specified
as Mandatory, Allowed or Prohibited.
11 Click Submit to add the new host property.
9
Editing a Host Property
The Edit Host Property function allows authorized Preventsys users to edit existing Specificationbased asset properties. However, you cannot change a Specification-based host property to a Labelbased property.
Note: Label-based asset properties cannot be edited. Since Label style asset properties include only a
name, they can be replaced when necessary via the Delete Asset Properties and Add Host Property
functions.
To edit a host property
1
2
3
4
On the Host Property Management screen, click on the Edit function for the property you
want to modify. The Edit Host Property screen is displayed.
Edit the host property’s information as desired. Note that a host property name cannot be
edited.
Click Next.
Click Submit to save the changes.
Deleting a Host property
The Delete Host Property function allows authorized Preventsys users to remove existing asset
properties that are no longer utilized on their networks. This screen features two dialog boxes, one
listing Specification asset properties and one listing Label asset properties.
To delete a host property
5
6
7
On the Host Property Management screen, click the Delete link for the property you want
removed. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected property.
35
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
Managing Services
As discussed previously, a Host Property Specification defines a list of assets as well as specifies a list
of services that are required or prohibited for each those assets. The Preventsys SRM System ships
with the following standard services. You can also add custom services using the Add Service
function described in this section.
Protocol
Service Name
Port
BearShare
tcp
6346
bootp
tcp
67
chargen
tcp
19
daytime
tcp
13
deslogin
tcp
2005
dhcp client
tcp
68
discard
tcp
9
domain
tcp
53
echo
tcp
7
eMule
tcp
4662
exec
tcp
512
finger
tcp
79
ftp
tcp
21
Gnutella
tcp
6346
Hotline Server
tcp
5500
http
tcp
80
https
tcp
443
imap
tcp
143
Kazaa
tcp
1214
loc-srv
tcp
135
login
tcp
513
Microsoft-DS
tcp
445
ms-sql-s
tcp
1433
MySQL
tcp
3306
Napster
tcp
8875
Napster
tcp
8888
netbios
tcp
135
netbios
tcp
136
netbios
tcp
137
netbios
tcp
138
netbios
tcp
139
netbios-ssn
tcp
139
netstat
tcp
15
Oracle SQL*NET
tcp
1521
pop3
tcp
110
36
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
Protocol
Service Name
AND
NETWORKS
Port
postgres
tcp
5432
printer
tcp
515
shell
tcp
514
smtp
tcp
25
snpp
tcp
444
Soulseek
tcp
2234
ssh
tcp
22
sunrpc
tcp
111
Sybase
tcp
2638
telnet
tcp
23
time
tcp
37
UPnP
tcp
5000
uucp
tcp
540
webcache
tcp
8080
WinMX
tcp
6699
Blubster
udp
41170
bootp
udp
67
chargen/udp
udp
19
daytime/udp
udp
13
dhcp client
udp
68
discard/udp
udp
9
domain
udp
53
echo/udp
udp
7
Gnutella
udp
6346
ipsec
udp
500
ldap
udp
389
lockd
udp
4045
microsoft-ds
udp
445
ms-sql-m
udp
1434
ms-sql-s
udp
1433
netbios
udp
135
netbios
udp
136
netbios
udp
137
netbios
udp
138
netbios
udp
139
netstat/udp
udp
15
nfs
udp
2049
nntp
udp
119
ntp
udp
123
portmap
udp
111
qotd
udp
17
37
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
Protocol
Service Name
AND
NETWORKS
Port
snmp
udp
161
snmp
udp
162
syslog
udp
514
systat
udp
11
tftp
udp
69
time
udp
37
WinMX
udp
6257
x11
udp
6000
Each service includes a service name, a protocol, and a service port. The service port represents the
port that the service runs on. The protocol indicates whether the service runs under TCP or UDP.
All services administration is conducted from the Services Management screen.
To access the Services Management screen
1
Click Admin > Services. The Services Management screen is displayed.
On the Services Management screen, you can view a list of existing services (both active and not), add
new services, edit existing services, and delete services. An active service “Active = Yes” means that
the service is available for use. An deactivated service “Active = No” means that the service was
deleted and is only being displayed for historical reference and reporting purposes.
Adding a Service
The Add Service function allows authorized Preventsys users to create new services.
To add a service
1
On the Services Management screen, click the Add New Service button. The Add Services
screen is displayed.
38
PREVENTSYS™ SRM USER’S GUIDE
2
CHAPTER 5 | ASSETS
AND
NETWORKS
Enter a Service Name for the new service (50 characters maximum).
Note: An “active” service can have the same name as a deleted service, but no two active services can
have the same name.
3
4
5
Enter the Service Port.
Select whether the new service protocol is TCP or UDP using the pull-down menu.
Click Submit to add the new service.
Editing a Service
The Edit Service function allows authorized Preventsys users to edit previously created services.
Note: You can only edit active services. Services that are not active have been deleted and are
displayed for reference only.
To edit a service
1
2
3
4
On the Services Management screen, click the Edit function for the service you want to
modify. The Edit Service screen is displayed.
You may modify the Service Port.
You may modify whether the service protocol is TCP or UDP using the pull-down menu.
Click Submit to save the changes.
Delete a Service
The Delete Service function allows authorized Preventsys users to delete previously created services.
When a service is deleted, it is still kept for historical and reporting purposes in the system. Therefore,
when a service is deleted, the “Active” row will change from “Yes” to “No”. You cannot reactivate a
deleted service.
Note: To delete a service associated with a host property, you must first remove the association by
editing the host property.
39
PREVENTSYS™ SRM USER’S GUIDE
1
2
3
CHAPTER 5 | ASSETS
AND
NETWORKS
On the Services Management screen, click the Delete function for the service you want
removed. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deactivates the selected service.
Managing Exclusion Lists
An Exclusion List allows you to specific assets or ranges that you want the system to ignore during an
assessment. You can configure an Exclusion List so that it is automatically applied to “all”
assessments (even those that already exist), or so that it must be selected each time you create an
assessment.
All exclusion list administration is conducted from the Exclusion List Management screen.
To access the Exclusion List Management screen
1
Click Admin > Exclusion Lists. The Exclusion List Management screen is displayed.
Note: If you are a member of the Super User group, then all exclusion lists are displayed. Otherwise,
only exclusion lists that are within the range of the network permissions of the groups to which you
belong are displayed.
Adding an Exclusion List
When you create an exclusion list, you are specifying that a certain asset or range of assets be ignored
by the system when the list is manually applied to an assessment. See the “Making an Exclusion List
Global” section for details about configuring a list so that it is automatically applied to all assessments.
To add an Exclusion List
1
On the Exclusion List Management screen, click the Add New List button. The Add
Exclusion Lists screen is displayed.
Note: You can create an Exclusion List based on another list by selecting the Copy an Existing
Exclusion List radio button.
40
PREVENTSYS™ SRM USER’S GUIDE
2
3
4
CHAPTER 5 | ASSETS
AND
NETWORKS
Enter an Exclusion List Name.
Enter a Description.
Enter the Assets you want excluded (each entry must be separated by a [RETURN]).
Note: You can enter hosts in several ways:
‚ Enter a single IP
‚ Enter using a range: 208.130.29.30 - 208.130.29.39 - Adds all IPs within this range
‚ Enter using Classless Inter-Domain Routing (CIDR) extensions:
‚ 208.130.29.33 - Adds just this host
‚ 208.130.29/24 - The "/24" extension adds all IP addresses starting with the twenty-four bit
prefix 208.130.29.
‚ 208.130.28/22 - The "/22" adds 208.130.29/24 because in binary, 28 is 00011100, while 29
is 00011101. However, because of the 22-bit prefix length, only the first 6 bits of the third byte are
valid.
5
6
Click Submit when you are finished.
You can now apply this list to individual assessments via the Add and Edit Assessment
screens. See the “Assessments” chapter for details about configuring assessments.
Note: You can only create lists that are within the range of the network permissions of the groups to
which you belong are displayed.
Making an Exclusion List Global
After you create an exclusion list, you can start applying it to assessments. However, if you want the
system to apply the exclusion list to “all” assessments automatically, you must make the list “global”.
You can make as many lists as you want “global”.
To make an Exclusion List global
1
2
On the Exclusion List Management screen, click the Make Global function for each list you
want applied to all assessments. Notice that the globe icon turns from the color gray to blue
for the global list.
This Exclusion List will now be automatically applied to all assessments (including existing
ones that have already been scheduled).
41
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
Note: Global lists are not displayed on the Add or Edit Assessment screens.
3
4
To make the list not global, click on the Un-Globalize function. Notice that the globe icon
turns from the color blue to gray for the non-global list.
The list will no longer be automatically applied to all assessments, but you can still apply it to
individual assessments when creating an Assessment Configuration. See the “Assessments”
chapter for details about configuring assessments.
Editing an Exclusion List
When you edit an Exclusion List, changes are automatically applied to future assessments. You do not
need to re-edit assessments that reference the list.
To edit an Exclusion List
1
2
3
On the Exclusion List Management screen, click the Edit function for the list you want to
modify. The Edit Exclusion List screen is displayed.
Edit the list as desired.
Click Submit to save.
Deleting an Exclusion List
You can only delete Exclusion Lists that are not associated with an assessment. Delete the list from
the associated assessment via the Edit Assessment screen. See the “Assessments” chapter for details
about editing assessments.
To delete an Exclusion List
1
2
3
On the Exclusion List Management screen, click the Delete link for the list you want
removed. Remember that only lists that are not associated with an assessment can be deleted.
A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected list.
42
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
Managing Networks
Each network represents a specific cluster of assets. Each network must have a network name, an IP
range (for range-based networks) or IP address/network mask (for mask-style networks), a
static/DHCP configuration, an average financial impact for each individual device on the network, and
an average operation impact for each asset per hour.
The average financial impact (e.g., the replacement cost) of each individual device on the network is
used to calculate assets at risk. This average value is used to determine the value of each asset for
which no dollar value was specified. When no value is specified, the average financial impact of each
individual device on the network defaults to $1,500.00. If the assets associated with the network have
not been assigned a financial impact value, they will utilize this default value. This allows you to
assign value easily to large groups of similar assets at one time.
The hourly operational impact is the cost that you would incur from an operations perspective (e.g., the
amount of work time lost $ per/hour) if a machine was compromised. This value is used for
calculating exposure risk, which is displayed on the Security Risk Dashboard. When no value is
specified, the operational impact of each individual device on the network defaults to $750.00. If the
assets associated with the network have not been assigned an operational impact value, they will utilize
this default value. This allows you to assign value easily to large groups of similar assets at one time.
Network properties are used to define the type of network, allowing for the detection of policy
violations in the context of network type during analysis. Network properties can be exclusive or nonexclusive. Networks can support multiple non-exclusive network properties, but assigning an
exclusive network property to a network precludes the assignment of additional network properties to
that network. See the “Managing Network Properties” section for details about working with network
properties.
For example, an Accounting network might be set up for all systems in an office’s accounting
department, encompassing the entire range of IP addresses from 10.10.10.50 through 10.10.10.100.
Applying network properties to this Accounting network would then allow for the detection of policy
violations based on specific types of services or network activity that are prohibited in the Accounting
department while being permissible in other parts of the office.
Note that when you add a network via the Add Network function, the system will automatically create
a network group of the same name containing the new network. If this network is subsequently deleted
via the Delete Network function, the automatically generated network group of the same name will
also be deleted provided if it has not been modified to contain any additional networks that remain
existent.
43
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
All Network Management is conducted from the Network Management screen.
To access the Network Management screen
1
Click Admin > Network. The Network Management screen is displayed.
From the Network Management screen, you can view a list of existing networks, add new networks,
edit networks, and delete networks.
Note: If you are a member a of the Super User group, then all networks are displayed. Otherwise,
only networks that are within the range of the network permissions of the groups to which you belong
are displayed.
Time Windows
You can identify when assessments “can” take place per a given network by specifying times windows
for that network. For example, if you enter 1:00 AM to 3:00 PM on Weekends. The system will run
assessments for the associated network only between 1:00 AM and 3:00 PM on Saturday and Sunday.
If an assessment cannot be completed during the specified time window, the system will pause the
assessment until the window reopens and then complete the assessment.
Note: Time windows cannot be for less than one hour. If you do not enter a time window, the default
will be “anytime”.
44
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
Adding a Network
The Add Network function allows authorized Preventsys users to create new networks. Preventsys
recommends adding networks in a hierarchical top-down approach. For example, if your network
range is 10.4.1.2-10.4.1.118, then you might add a network for that main range and then add several
other networks in smaller ranges of that range, such as networks for 10.4.1.2-10.4.1.40, 10.4.1.5010.4.1.80, and so on. This will also make it easier to administer authorization since users are granted
access to content based on the networks associated with the groups to which they belong.
Note: Assets within a network cannot overlap.
To add a new network
1
Select the Add New Network button on the Network Management screen. The Add Network
screen is displayed.
Note: You must be a member of a group with at least one network to add a network.
2
3
Enter the Network Name (50 characters maximum).
Enter the Assets you want in this network.
45
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
Note: If you are a member of the Super User group, then you can and any asset. Otherwise, you can
only add assets that are within the range of the network permissions of the groups to which you
belong.
4
Select any Existing Networks that you also want in this network.
Note: If you are a member of the Super User group, then all networks are displayed. Otherwise, only
networks that are within the range of the network permissions of the groups to which you belong are
displayed.
Select the Create Default Network Group checkbox if you want a network group
automatically created based on this network (the network group will have the same name as
the network).
6 Select the type of IP Protocol you want the network to utilize: Static IP Addresses, DHCP
with Dynamic Host Names, or DHCP with Static Host Names.
7 Select one or more Network Properties.
8 Enter the Average Financial impact of Each Host on the network ($1,500.00 default).
9 Enter the Average Operational Impact of Each Host per Hour ($750.00 default).
10 Select the Groups you want associate with this network.
5
Note: You can also associate networks to groups when creating or editing groups. See the “User
Authorization” chapter for details about groups. If you are a member of the Super User group, then
all groups are displayed. Otherwise, only groups to which you belong are displayed.
11 Enter one or more Time Windows for this network if desired. If you do not enter a time
window, the default will be “anytime”.
12 Click Submit to add the new network.
Editing a Network
The Edit Networks function allows authorized Preventsys users to edit networks.
To edit an existing network
1
2
3
Select the Edit link on the Network Management screen for the network you want to edit.
The Edit Network screen is displayed.
Edit the network as desired.
Click Submit to save changes.
Deleting a Network
The Delete Network function allows authorized Preventsys users to remove networks from the system.
To delete a network
1
2
3
Select the Delete link on the Network Management screen for the network you want to
remove. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected network.
46
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
Managing Network Properties
All networks require network properties to define a network type for analysis. Network properties
allow for the detection of policy violations in the context of network type when PDL policies are
applied to assessment results.
The Preventsys SRM System ships with the following standard network properties:
»
DMZ Represents a network segment in which some ports are publicly accessible from the
Internet while the majority of ports are filtered from public access.
»
Public Represents a network segment that is open to public access.
»
Private Represents a network segment that is restricted from public access.
Custom network properties may be created and manipulated via the Add Network Properties and
Delete Network Properties functions.
For example, an Engineering network property could be created and applied to all networks in an
office’s Engineering department. A simple PDL rule could then be developed to flag file sharing
services and other prohibited network activity in the Engineering department as policy violations.
All Network Property administration is conducted from the Network Property Management screen.
To access the Network Property Management screen
1
Click Admin > Network Property. The Network Property Management screen is displayed.
From the Network Property Management screen, you can view existing properties, add new properties,
and delete properties.
47
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
Adding a Network Property
The Add Network Property function allows authorized Preventsys users to create new network
properties.
To add a new network property
1
Select the Add New Network Property button on the Network Property Management screen.
The Add Network Property screen is displayed.
2
3
Enter the Property Name (50 characters maximum).
Click the Exclusive checkbox if the new network property is intended to be exclusive to all
networks.
Click Submit to add the new network property.
4
Deleting a Network Property
The Delete Network Properties function allows authorized Preventsys users to remove network
properties from the system.
Note: Deleting a network property will remove it from all networks that reference the property.
To delete a network property
1
2
3
Select the Delete link on the Network Property Management screen for the property you want
to delete. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected network.
48
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 5 | ASSETS
AND
NETWORKS
Managing Network Groups
Network group management encompasses adding, editing, and deleting network groups.
Network groups represent clusters of networks that are grouped for the purposes of performing
assessments and analysis. To assess a network, it must first belong to a network group. If you wish to
assess an individual network, you must first create a network group containing the selected network.
Each network group includes a network group name and a group of included networks.
Note: Networks within a network group cannot overlap.
All Network Group administration is conducted from the Network Group Management screen.
To access the Network Group Management screen
1
Click Admin > Network Group. The Network Group Management screen is displayed.
Note: If you are a member of the Super User group, then all network groups are displayed. Otherwise,
only network groups that are made up entirely of networks within the range of the network permissions
of the groups to which you belong are displayed.
Adding a Network Group
The Add Network Group function allows authorized Preventsys users to create new network groups.
To add a new network group
1
Select the Add New Network Group button on the Network Group Management screen.
The Add Network Group screen is displayed.
49
PREVENTSYS™ SRM USER’S GUIDE
2
3
CHAPTER 5 | ASSETS
AND
NETWORKS
Enter the Network Group Name (50 characters maximum).
Select one or more networks to be included in the network group.
Note: If you are a member of the Super User group, then all networks are displayed. Otherwise, only
networks that are within the range of the network permissions of the groups to which you belong are
displayed.
4
Click Submit.
Editing a Network Group
The Edit Network Group function allows authorized Preventsys users to edit existing network groups.
To edit an existing network group
1
2
3
Select the Edit link for the Network Group you want to edit on the Network Group
Management screen. The Edit Network Group screen is displayed.
Edit the network group as desired.
Click Submit to save the changes.
Deleting a Network Group
The delete Network Group function allows authorized Preventsys users to remove network groups
from the system.
To delete a network group
1
2
3
Select the Delete link for the Network Group you want removed on the Network Group
Management screen. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected network.
50
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 6 | POLICIES
AND
RULES
CHAPTER 6
Policies and Rules
The Preventsys Policy Library is a collection of packaged regulations, policies and configuration
standards designed to make configuration and customization for your environment as easy and fast as
possible. The library includes policies and rules based on the requirements of industry organizations,
Federal and State governments, and regulatory agencies governing financial services, healthcare,
manufacturing, and other industries. All of these can be customized to the specific practices,
specifications and requirements of your organization, and linked directly to original paper-based
policies through PolicyLab™. See the Preventsys PolicyLab User Guide for details.
The Proactive Compliance Module provides you with ready-made policy content, rules and mappings
for both configuration standards and regulatory policies. Based on frameworks like COBIT and ISO
17799, Preventsys has created hundreds of predefined rules to measure an organization's compliance
with government, regulatory policies and security standards and guidelines. These templates are ready
to use out-of-the-box and enable you to automate the time consuming task of compliance reporting
against your internal and external security policies.
The following terms and definitions will assist you when reading this chapter.
PDL Rule: The Policy Definition Language (PDL) utilizes XSL templates to define PDL rules that
identify specific policy violations and vulnerabilities via analysis.
Policy: A Policy is a combination of one or more PDL rules. PDL rules can also be combined to
create custom policies tailored to your corporate security policy. See the See the Preventsys
PolicyLab™ User Guide for details.
Configuring Your System for Policy Analysis
Before the Preventsys SRM System can analyze the results of an assessment against a security policy,
you must first set up your PDL rules and policies and all associated properties, and update your Policy
Library by importing the current set of policies and rules supplied with the Preventsys SRM System.
Note: If you do not want to analyze your networks against policies, you must still make sure that the
Preventsys Default Vulnerability Policy is available and selected for each Assessment Configuration
that you want to return any found vulnerabilities. If you do not select this policy, the system will not
create vulnerabilities, conduct threat correlation, or create remediation tasks, and you will not be able
to view reports based on the assessment results. In this case, you can conduct a reanalysis using the
Preventsys Default Vulnerability Policy and the results of your assessment, which will perform the
analysis the same as if the policy been selected before the assessment ran.
Initial Rule Setup
When the Preventsys SRM System’s standard PDL rules are initially installed, they will require some
modifications to ensure that your assets and networks are specified for property fragments. This may
be accomplished via the following procedures:
51
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 6 | POLICIES
AND
RULES
To ensure that assets and networks are specified for property fragments
1
2
3
4
Perform an assessment of your networks (this will populate the asset and network tables, so
that you can edit assets and networks).
Assign the standard host property specifications to the various assets on your system, as
appropriate, via the “Edit Asset” function.
Assign the standard network properties to the various networks on your system, as
appropriate, via the “Edit Network” function.
Generate or regenerate those properties listed in the Properties Used in Rules table using
PolicyLab™. Refer to the Preventsys SRM System PolicyLab™ User’s Guide for details.
Note: Some rules feature comments describing which property fragments should be added and where
in the rule text they should be added. Other rules already have shells of asset properties in them.
First, generate a fragment corresponding to the shell that you see in the rule. Then replace the shell
with the generated fragment. The new property fragments will have an updated list of assets. Refer to
the Preventsys SRM System PolicyLab™ User’s Guide for details.
About PDL Rules
Asset properties and network properties are referenced within PDL rules to denote conditions that
signify policy violations upon analysis. The Preventsys SRM System ships with standard PDL rules
configured to detect policy violations based on assessment results as applied to specific asset properties
and network properties. In this manner, you may customize the assessment process without
developing XSL for new PDL rules.
A number of standard PDL rules are included with the Preventsys SRM System. Using the
PolicyLab™ Client, you can create policies using these rules, or develop custom PDL rules to address
specific concerns. See the Preventsys PolicyLab™ User Guide for details. The Preventsys SRM
System allows you to view Preventsys policies and rules as well as polices and rules that you have
created or modified in the PolicyLab application.
All PDL rules are assigned a description, rule type, severity, and XSL text.
The PDL rule type identifies whether the rule detects a policy violation or vulnerability. There are five
basic rule types:
»
Violation of Network Policy
»
Information
»
Host Compromised
»
Exploitable Vulnerability
»
Custom Vulnerability
»
Exposure Analysis
»
Manual Audit Task
Note: To view a mapping of the scanners, common scanner tests, properties, characteristics, and rule
types associated with each rule, see the “Preventsys SRM System Policy Reference Guide”.
PDL rules are stored by version. Editing an existing PDL rule via the PolicyLab application will result
in the creation of a new version of the PDL rule.
The list of PDL rules displays current versions by default, but you may view all versions in the system
using the View All Versions of PDL Rules function. See “Managing PDL Rule” for details.
52
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 6 | POLICIES
AND
RULES
Managing PDL Rules
All Rule administration is conducted from the PDL Rule Management screen.
To access the PDL Rules Management screen
1
Click Policies > Rules. The PDL Rule Management screen is displayed, listing the most
recent version of each PDL rule.
2
Click the Show all Versions button to view all previous versions of the PDL rules in addition
to the current versions.
Select the View function to view the rule’s xml.
3
Deactivating a PDL Rule
The Deactivate function allows authorized Preventsys users to deactivate PDL rules.
To deactivate a rule
1
2
3
Select the Deactivate function on the PDL Rules Management screen for the rule you want
deactivated. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deactivates the selected rule.
Working with Policies
Policies are created through the grouping of PDL rules. All policies are assigned a name, a
description, a category, and a selection of PDL rules. See the Preventsys Policy Reference Guide for a
detailed list of the policy packages and rules available from Preventsys
The Preventsys SRM System allows you to view policies, delete policies, and import/export policies.
In order to create or edit policies, the stand-alone Preventsys PolicyLab application must be used. See
the PolicyLab User Guide for details about creating and editing policies.
Policies are stored by version. Editing an existing policy via the PolicyLab application will result in
the creation of a new version of the policy.
The policy list displays current versions by default, but you may view all versions in the system using
the View All Versions of Policies function.
53
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 6 | POLICIES
AND
RULES
Managing Policies
All Policy administration is conducted from the Policy Management screen.
To access the Policy Management screen
1
Click Policies > Policies. The Policy Management screen is displayed, listing the most recent
version of all Policies.
2
Use the Policy Module pull-down to select which type of policy you want to view and click
the >> button to refresh the view. The selected Policy Module is displayed.
Click the Show All Versions button to view all previous versions of the PDL policies in
addition to the current versions.
Click the Policy Name of any policy to edit the policy or view the policy’s XSL text.
Select the View link to see the View Policy screen, which lists all rules associated with the
policy.
3
4
5
Deactivating a Policy
The Deactivate policy function allows authorized Preventsys users to deactivate policies. Polices that
are deactivated will no longer be displayed in the system. The deactivated policy will also be removed
54
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 6 | POLICIES
AND
RULES
from any assessment configurations in which it was referenced. The policy will need to be imported
again to be displayed.
To deactivate a policy
1
2
3
Select the Deactivate link on the Policy Management screen for the policy you want
deactivated. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deactivates the selected policy.
Importing Preventsys Policies
The Import Preventsys Policies function allows you to update your system to the latest version of the
Preventsys Policy Library, or rollback to a previous version.
Note that the import process may take a few minutes to complete. Never use your browser's Back,
Stop, or Refresh buttons on any of the update or rollback pages. As a safeguard, it is recommended
that you log out of the product, or close your browser after the update or rollback process is finished
and the confirmation screen is displayed. Then, log back in as you normally would.
To import Preventsys Policies and update the Policy Library
1
2
Click Policies > Import Preventsys Policy.
The Import Preventsys Policies screen is displayed. Note that when you first install the
Preventsys SRM System, you will not have any installed policy libraries.
3
4
Click Submit.
A confirmation page is displayed, listing all potential conflicts with existing system resources.
Potential conflicts include clashes between Manual Audit Task names. If requested, you must
correct these conflicts before you can continue.
55
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 6 | POLICIES
AND
RULES
5
Click Next to update the Policy Library to the latest version. All of the new policies, rules,
properties, and services are listed on the screen.
6
Click Done to exit the update screen.
Note: Following the update, the Rollback function will be enabled at the bottom of the update screen.
This is your only opportunity to rollback to the previous version of the Policy Library.
To rollback the Policy Library
1
2
After using the Import Preventsys Policies function, the Rollback Policies function will
become active under the list of new policies and rules. Scroll down to the bottom of the
screen and click Rollback to rollback the Policy Library to the previous version.
A confirmation page is displayed. Click Submit to rollback.
56
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 6 | POLICIES
AND
RULES
Note: The Rollback Policies function is only available immediately after updating the Policy Library.
Once you leave the update screen which lists new policies and rules, the Rollback Policies function
will no longer be available.
The Preventsys Policy Library allows for the safe implementation of new and updated policies, policy
source documents, rules, properties, and services directly from the Preventsys Web site.
Importing an updated Policy Library creates new versions of policies and rules where a version of a
policy or rules already exists. In this case, you must manually reapply any changes to the newly
imported policy or rule. These changes include regenerating all property fragments for any propertybased rule as well as adding other custom changes. Likewise, changes to any rule require updating
each policy that uses that rule. It is important to understand that your modified rule and/or policy may
no longer be the current rule and/or policy in the system. However, the old rule still exists and has not
been deleted.
Importing an updated Policy Library also creates new properties in the Preventsys SRM System. Like
any new property, user specific network and asset information needs to be added to the properties prior
to their usage. Likewise, any rule that references these properties will need to be updated after the
properties have been changed.
Importing and Exporting Policies
You can import policies you have access to via your local machine using the Import Policy function on
the Policy Management screen. You can also save policies in the Preventsys SRM System to local
media using the Export function on the same screen.
If any rules in the imported policy contain properties such as Host Property Specifications, Host
Property Labels, and Network Properties, you will need to manually recreate all associated properties
and services, manually assign them to assets and networks on your system, and then recreate the
fragments associated with the imported rules.
57
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 6 | POLICIES
AND
RULES
For example, the E-Commerce_Servers_on_DMZ rule utilizes the standard network property DMZ.
After importing a new policy that includes this rule, you must ensure that the DMZ network property is
applied to all appropriate networks in order for the imported policy to function properly.
Import a Policy
The Import Policy function allows authorized Preventsys users to import policies that they have that
are accessible from a local media.
To import a new a policy
1
Click the Import Policy button on the Policy Management screen. The Import Policy screen
is displayed.
2
Enter the name of the File to import, or click the Browse button to locate the file in the file
library.
Enter a suffix for the policy filename in the Global Suffix field.
Click Submit to import the selected policy.
If the imported policy’s name conflicts with an existing policy, the Import Policy Conflict
screen is displayed.
You may modify the policy filename and all included rule filenames to resolve conflicts.
Click Submit to save the modified filenames.
3
4
5
6
7
Exporting a Policy
The Export Policy function allows authorized Preventsys users to export policies to local media using
their browser’s “Save As” function.
To export a policy to an external file
1
2
3
Select the Export link on the Policy Management screen for the policy you want to export. A
separate browser window will open displaying the signed XML text of the selected policy.
Use the browser’s Save As function to select a destination for the exported policy data.
The file is saved to the destination you specified.
58
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
CHAPTER 7
Assessments
This chapter presents the steps involved in configuring an assessment including, creating connector
configurations and assessment configurations as well as scheduling assessments. Next, it presents how
to pause, resume, or cancel an assessment that is running, view the status of an assessment, and
reanalyze the results of a completed assessment against a policy. This chapter also provides details
about importing assessment data acquired outside of the Preventsys SRM System.
Before you can conduct assessments, you must first follow the steps presented in the “Assessment
Servers and Instance Configurations” chapter, and add at least one Assessment Server and one
associated Instance Configuration. You will also need to add at least one network and associate
network group.
After you have completed these tasks, you need to add a connector configuration, add an assessment
configuration, and finally schedule your assessment.
The following terms and their definitions will assist you when reading this chapter.
Connector Configuration: A connector configuration is a set of parameters that controls the behavior
of a particular assessment tool supported by the Preventsys Assessment Server during an assessment.
A popular parameter defined in a connector configuration is the set of tests/checks to run during an
assessment. Unlike an Instance Configuration, a Connector Configuration can be applied to any
defined instance of the same assessment tool. For example, if the same assessment tool was installed
in three different locations, a single Connector Configuration could be applied to each of these
installations.
Assessment Configuration: An Assessment Configuration is a set of parameters that controls which
assessment tools, and connector configurations are used for the assessment, the networks that will be
assessed, the assets (if any) that will be excluded, the polices that will be analyzed against the results
of the assessment, and whether received threat alerts will be analyzed against the results of the
assessment.
Assessment Schedule: An Assessment Schedule specifies when the assessment will run and how
often. Assessments can be schedule to run once immediately, once on a specific day and time, or
recurrently.
Vulnerability: A vulnerability is a weakness in a system allowing an attacker to potentially violate the
integrity, confidentiality, access control, availability, consistency or audit mechanism of the system or
the data and applications it hosts. Vulnerabilities can result from bugs or design flaws in the system.
A vulnerability can exist only in theory, or could have a known exploit. During an assessment, the
Preventsys SRM System identifies vulnerabilities based on the results of the scanner-specific
tests/checks that are run. If you have the Preventsys Threat Feed license, then external threats that
exploit the vulnerabilities found are correlated and turned into “Actionable Threats”. See the “Security
Risk Dashboard” chapter for details about actionable threats.
Vulnerability Coalescing: The RiskScore Engine coalesces security facts from your assessment tools
to automatically aggregate, transform, classify and correlate vulnerability and configuration data into a
59
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
prioritized remediation task list. For example, Nessus and Nmap will often report the same
vulnerability for the same asset in different ways for the same or multiple ports. The system will
coalesce all of these issues into one remediation task with multiple descriptions.
Violation: A violation is the breach of a Preventsys PDL rule that was part of a policy analyzed
against the results of an assessment during the Policy Analysis phase. A violation means that the
conditions of the rule in a security policy were not met. For example, a Certificate_Expiration rule
checks to make sure no expired certificates are in use based on assessment data gathered from any of
the many assessment tools supported by Preventsys. If Expired Certificates are in use, this may not
necessarily be a vulnerability, but it would be considered a violation of this rule.
Another type of violation is a Manual Audit Task Violation. A Manual Audit Task can be associated
with a Manual Audit Task Rule, which can check whether the Manual Audit Task meets certain
criteria (e.g., integrity checks). If the Manual Audit Tasks does not meet these criteria, then the rule
can cause a violation. See the PolicyLab User Guide for details about Manual Audit Task Rules and
the different integrity checks they can perform.
Assessment Import: Assessment Import allows you to import assessment data that was gathered
outside the Preventsys SRM System.
Reanalysis: A Reanalysis is when you choose to analyze the results of a successful assessment
against another policy (or policies) regardless of whether the initial assessment included a policy.
Remediation Task: A remediation task is created based on either a vulnerability or a violation found
by the system. This task can be assigned to a user, so that it can be fixed, and then verified by the
system. Remember that Remediation Tasks are different from Manual Audit Tasks. However, a
Manual Audit Task Violation, as discussed in the “Violation” definition, can cause an associated
Remediation Task to be created (referred to as a Manual Audit Violation Type Remediation Task). A
Manual Audit Task Violation is always associated with the first assessment that finds it even if it is
found by multiple assessments. Therefore, you will need to run an assessment using the assessment
configuration associated with the assessment that found the violations, to verify the Manual Audit
Violation Type Remediation Task. See the “Manual Audit Tasks” chapter for details about Manual
Audit Tasks. See the “Remediations” chapter for details about Remediation Tasks and how to assign
and verify them.
Managing Connector Configurations
Assessment configurations also include Assessment Server/network assignments that are used to
determine which Assessment Servers are employed to scan specific networks.
A wide range of scanner options and configuration settings are accessible as part of the assessment
configuration process. See the “Connector Configuration” appendix for details about Preventsys
scanner support and configuration options.
All connector configuration administration is conducted from the Connector Configuration
Management screen.
To access the Connector Configuration Management screen
1
Click Assessments> Connector Configurations. The Connector Configuration Management
screen is displayed.
60
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Adding a Connector Configuration
The Add Connector Configuration function allows authorized Preventsys users to add new connector
configurations.
To add a new connector configuration
1
Select the Add New tab on the Connector Configuration Management screen. A dropdown
list of connectors is displayed.
Note: Only connectors for which you have added an instance configuration on a running Assessment
Server are listed. Therefore, if the ESM Server cannot connect to your Assessment Server for any
reason, the instance configurations on that server are not listed.
2
Select the connector type for which you want to create a connector configuration and select
». The connector’s configuration screen is displayed.
Note: If the instance configuration is not available due to an invalid instance configuration (i.e. the IP
or username for the instance configuration is incorrect), then a message is displayed on the Connector
Configuration Management screen. You should verify that your instance configuration is correct. See
the “Assessment Servers and Instance Configurations” chapter for details about Instance
Configurations.
61
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Figure 7-1 – Sample Nmap Connector Configuration screen
3
4
5
Enter a name for the connector configuration. Note that a connector configuration’s name
cannot be changed once submitted.
Enter the required information and any optional information you desire.
Click Submit to save.
Editing a Connector Configuration
The Edit Connector Configuration function allows authorized Preventsys users to edit existing
connector configurations.
When you access the Edit Connector Configuration screen, the Preventsys SRM System reviews the
configuration options for the associated connector against the options on each Assessment Server. If
the options do not match (e.g., you have updated the connector since this connector configuration was
added), the system will display all options that were present when the connector configuration was
created as well as any new options with their associated default settings.
If the ESM Server cannot connect to the Assessment Server and/or an Instance Configuration
associated a Connector Configuration, then the “Edit” function will not be active for that Connector
Configuration and a message will be displayed.
62
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
To edit an existing connector configuration
1
2
3
Select the Edit link for the connector configuration you want to edit on the Connector
Configuration screen. The Edit Connector Configuration screen is displayed.
Edit the connector’s configuration as desired. Note that a connector configuration’s name
cannot be edited.
Click Submit to save.
Deleting a Connector Configuration
The Delete Connector Configuration function allows authorized Preventsys users to remove connector
configurations from the system.
To delete a connector configuration
1
2
3
Select the Delete link for the connector configuration you want removed on the Connector
Configuration Management screen. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected connector configuration.
Managing Assessment Configurations
Assessment configurations represent specific schemes for performing network security assessments.
Each configuration includes a unique name, a list of network groups selected for the assessment, an
optional list of policies against which the assessment will be analyzed, a selection of connector
configurations that will perform the assessment, and any exclusion lists you specify.
All assessment configuration administration is conducted from the Assessment Configuration
Management screen.
To access the Assessment Configuration Management screen
1
Click Assessments> Assessment Configurations. The Assessment Configuration
Management screen is displayed.
63
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Note: If you are a member of the Super User group, then all assessment configurations are displayed.
Otherwise, only assessment configurations associated with network groups made up completely of
networks that are within the range of the network permissions of the groups to which you belong are
displayed.
Creating an Assessment Configuration
The Create Assessment Configuration function allows authorized Preventsys users to create new
assessment configurations, which may then be scheduled for execution. You can view a list of the
scanners the Preventsys SRM System supports and access information about evaluation software by
clicking on the Support Scanner Vendors link.
Note: It is recommended that assessment configurations be used as a mechanism to group reporting so
that the network groups and policies define a logical reporting structure like Line of Business (LOB)
or organizational unit. It is not recommended that several assessment configurations contain exactly
the same network groups and policies and differ only in the connector configurations used. This can
lead to confusing results during enterprise group summary reporting because only the latest analyses
for each network group and policy combination from the associated assessment configuration will be
shown. If there is an overlap, this may be confusing.
Policy Analysis
If no policies are selected in an assessment configuration, then the assessment’s results will not be
available for generating reports until policies are applied via the Re-Analyze Assessment Results
function.
Threat Analysis
If the Threat Analysis option is not selected, then the system will not perform threat correlation. See
the “Threat Intelligence Correlation” section in this chapter for details about threat correlation.
Note: If you do not want to analyze your networks against a specific policy, please select the
Preventsys Default Vulnerability Policy for each Assessment Configuration that you want to return
any found vulnerabilities. If you do not select this policy, the system will not create vulnerabilities,
conduct threat correlation, or create remediation tasks, and you will not be able to view reports based
on the assessment results. In this case, you can conduct a reanalysis using the Preventsys Default
Vulnerability Policy and the results of your assessment, which will perform the analysis the same as if
the policy been selected before the assessment ran.
64
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
In addition to standard network assessments, Preventsys supports the use of Manual Audit Tasks
(MAT) to track and confirm manual audit tasks that do not lend themselves to traditional electronic
solutions. See the “Manual Audit Tasks” chapter for details about working with manual audit tasks.
To create an assessment configuration
1
On the Assessment Configuration Management screen, select Add New. The Create
Assessment Configuration screen is displayed.
2
3
4
Enter the Assessment Configuration’s Name (50 characters maximum).
Select the Connector Configuration(s) you want utilized for the assessment.
Select the Network Group that will be assessed – only one network group can be selected.
Note: If you are a member of the Super User group, then all network groups are displayed. Otherwise,
only network groups made up completely of networks that are within the range of the network
permissions of the groups to which you belong are displayed.
5
6
7
8
Select the Exclusion List(s) you want the system to apply.
If you want the system to analyze the results of this assessment against a policy, select the
Policies desired. By default, only the latest version of each policy is displayed. To see all
versions of each policy, click the View all button.
If you want the system to analyze the results of this assessment against threats, make sure the
Perform Threat Analysis checkbox is selected.
Click Submit to save.
Editing an Assessment Configuration
The Edit Assessment Configuration function allows authorized Preventsys users to edit existing
assessment configurations.
65
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
To edit an assessment configuration
1
2
3
On the Assessment Configuration Management screen, select the Edit link for the assessment
configuration you want to modify. The Edit Assessment Configuration screen is displayed.
Edit the assessment configuration as desired. Note that the assessment configuration’s name
is not editable.
Click Submit to save.
Note: Remember that vulnerabilities are found by the selected connector during an assessment. Those
vulnerabilities are then associated with remediation tasks by the system. If you edit the connector’s
checks/tests (or delete a connector ) such that the checks that found those vulnerabilities will not be
run the next time the assessment is conducted, then the associated Unassigned, Unresolved, and
Claimed Resolved remediations will be verified by system due to the absence of their associated
vulnerabilities.
Deleting an Assessment Configuration
The Delete Assessment Configuration function allows authorized Preventsys users to remove existing
assessment configurations from the system. When you delete an assessment, the associated schedules
are also deleted. In addition, the system changes any remediation tasks associated with that assessment
configuration, which are in the Unassigned, Unresolved, or Claimed Resolved states to Verified. If
these issues are not fixed, they will reappear during the next assessment that finds them. This allows
for a more accurate trending of issues over time.
Note: Due to Preventsys’ Coalescing of Multi-vendor Assessment Data, a remediation can contain
more than one vulnerability. If a remediation task contains multiple vulnerabilities and at least one of
them is not associated with the deleted configuration, then the remediation task is not changed to
Verified. However, the affected vulnerabilities are deleted.
To delete a assessment configuration
1
2
3
Select the Delete link for the assessment configuration you want removed on the Assessment
Configuration Management screen. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected assessment configuration.
Managing Assessment Schedules
Assessment scheduling functions are used to schedule the execution of previously defined assessment
configurations. Assessments can be scheduled to execute immediately, execute once at a specified
date and time, or execute periodically according to a recurring schedule.
Note that assessments that are configured with a recurring schedule will continue to be run indefinitely,
according to the specified date parameters, until the assessment schedule is altered using the “Editing
an Assessment Schedule” or “Deleting an Assessment Schedule” functions.
Once you have scheduled assessments you may view the status of all pending assessments via the
“View Assessment Status” function.
The Create Assessment Schedule function allows authorized Preventsys users to schedule previously
configured assessments for execution. There are three basic types of schedules:
»
»
»
Execute Immediately
Schedule Once
Recurring Schedule
66
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
All assessment schedule administration is conducted from the Assessment Schedule Management
screen.
To access the Assessment Schedule Management screen
1
Click Assessments> Assessment Schedules. The Assessment Schedules Management screen
is displayed.
Note: If you are a member of the Super User group, then all assessment schedules are displayed.
Otherwise, only assessment schedules for assessment configurations associated with network groups
made up completely of networks that are within the range of the network permissions of the groups to
which you belong are displayed.
From this screen, you can add new schedules as well as view schedules whose start dates have not yet
occurred. For example, if you create a schedule that will start one week from today or will run every
Monday, that schedule will appear on the View Assessment Status screen as a future assessment.
Adding an Assessment Schedule
The Add Assessment Schedule function allows authorized Preventsys users to schedule previously
configured assessments for execution.
You can schedule an assessment configuration to run immediately, once based on a specific date and
time, or recurring based on the frequency you specify.
To run an assessment immediately
1
On the Assessment Configuration Management screen, select Execute Now. The
assessment will run immediately.
To schedule an assessment
1
On the Assessment Configuration Management screen, select Schedule to go to the Add
Assessment Schedule screen, or on the Assessment Schedule Management screen, select the
Add New button. The Add Assessment Schedule screen is displayed.
67
PREVENTSYS™ SRM USER’S GUIDE
2
CHAPTER 7 | ASSESSMENTS
On the Add Assessment Schedule screen, select the name of the assessment configuration you
want to schedule.
Note: If you are a member of the Super User group, then all assessment configurations are displayed.
Otherwise, only assessment configurations associated with network groups made up completely of
networks that are within the range of the network permissions of the groups to which you belong are
displayed.
3
4
Select the radio button for the type of schedule you want: Execute Immediately, Schedule
Once, or Recurring Schedule.
a. If you select Execute Immediately, the assessment will run as soon as you select
Submit.
b.
If you select Schedule Once, enter or select a Start Date that is greater than today’s date,
and then select a Start Time. The assessment will run on this date and time.
c.
If you select Recurring Schedule, enter or select a Start Date that is greater than today’s
date, and then select a Start Time. Next, select the Frequency on which you want the
assessment to run: Daily, Weekly, Monthly, or Yearly. Last, configure the timing
options you want based on the frequency you selected. The system will begin using this
scheduled on the Start Date and Time you entered. The assessment will then run based
on the frequency you specified.
Click Submit to save.
Editing an Assessment Schedule
The Edit Assessment Schedule function allows authorized Preventsys users to edit previously
determined assessment schedules.
To edit an assessment’s schedule
1
2
3
On the Assessment Schedule Management screen, select the Edit link for the assessment
schedule you want to modify. The Edit Assessment Schedule screen is displayed.
Edit the assessment’s schedule as desired.
Click Submit to save. Not that the modified schedule will not affect currently running
assessments.
68
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Deleting an Assessment Schedule
The Delete Assessment Schedule function allows authorized Preventsys users to remove existing
assessment schedules from the system. Note that when you delete a schedule, the assessment
configuration remains.
To delete an assessment’s schedule
1
2
3
Select the Delete link for the assessment schedule you want removed on the Assessment
Schedule Management screen. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected assessment schedule. Note that deleting a
schedule will not affect currently running assessments.
About The Assessment Lifecycle
Before an assessment can be conducted, you must add at least one Assessment Server with at least one
instance configuration. Next, you need to create an assessment configuration and an associated
schedule.
During an assessment, the system performs the following main tasks:
»
Network Assessment
»
Indexing (only occurs if you have the Preventsys Threat Feed license)
»
Analysis (this task is only performed if you selected a policy when creating the assessment
configuration)
Network Assessment
The Network Assessment phase begins when an Assessment Configuration is run. The configuration
identifies the Connectors used to gather internal intelligence (or facts) about your network, including:
»
Asset Discovery, Service Port Mapping, OS Fingerprinting, Vulnerability Detection, etc.
You may choose to use a supported network connector (e.g., Nessus, etc.) for checking for
vulnerabilities, providing port scanning for services and OS fingerprinting.
»
Configuration Information You may choose to use the Preventsys WinReg connector to
gather registry configuration information.
»
Wireless Access Points You may choose to use the Preventsys WiFi connector to identify
all access points, their logical location, vendor, WEP usage, and so on.
Once an Assessment Configuration is scheduled and its schedule executes, the different connectors
chosen are used to gather facts about your network.
Fact Indexing
When the Network Assessment finishes, the Indexing phase begins. During this phase, all of the facts
found during the network assessment are indexed so that complex associations with external threat
intelligence can be made during the Analysis phases.
Analysis
Once the Indexing phase finishes, an Analysis will be done if a policy was selected in the assessment
configuration. The analysis phase results in vulnerabilities, policy violations, threat correlation and
vulnerability and violation coalescing for the purpose of reporting and remediation prioritization and
tracking.
69
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Note: If you do not want to analyze your networks against a specific policy, please select the
Preventsys Default Vulnerability Policy, which will allow the system to perform non-policy specific
analysis, such as vulnerability coalescing and threat correlation as described later in this section. If
this policy is selected, the system will not analyze and display vulnerabilities, analyze threat alert data
against your networks, or create remediations based on the assessment.
This phase uses complex and optimized Preventsys search and mapping algorithms to apply policy
rules written in the Preventsys Policy Definition Language, and coalesce vulnerabilities and violations
(as described in the “Coalescing of Multi-vendor Assessment Data” section).
This phase is one of the single most important features of the Preventsys product as it drastically
reduces the effort of manually comparing data from different Security Point Solutions that gather
internal network intelligence but are not themselves correlated and then mapping that to external threat
intelligence typically gathered from threat newsletters and threat analyst services.
The Preventsys product merges this information during this phase to provide you with a consistent,
easy to navigate set of relationships.
The Analysis phase also creates Remediation tasks automatically, and can alter the severity and
priority of existing remediations tasks based on the contextual information of each contributing piece
of intelligence. See the “Remediations” chapter for details about remediations.
Threat Intelligence Correlation
If you have a valid Preventsys Threat Intelligence license, this phase will correlate threat intelligence
data with facts about your network that may expose you. Threat date received via the Preventsys
Threat Intelligence Connector undergoes a complex associative analysis with the internal vulnerability
and policy violation intelligence that the Preventsys ESM Server has in its database about your
enterprise network. All of this is accomplished without re-scanning and without you having to do all
the manual correlation.
The resulting analysis is a rapid and easy to understand association between devices at risk to a given
threat, exposure based on that threat and most importantly, prioritization of unresolved remediation
tasks that are that are associated with the threat.
Note: You can turn off the Threat Intelligence Correction phase of analysis by deselecting the Perform
Threat Analysis checkbox.
Coalescing of Multi-vendor Assessment Data
Vulnerability Coalescing
The Preventsys SRM System integrates a number of different pieces of security technology using its
Connector APIs. Many of the products integrated in this manner give similar pieces of information.
Even the same product will often give reams of data related to the same problem. The Preventsys
SRM System helps reduce this data overload by combining related information where possible into a
single piece of information with multiple descriptions (as different sources may have valuable
information).
As a result, on many of the screens where a vulnerability, remediation task or threat alert is referenced,
you will often see several pieces of information coalesced for that task or issue.
As an example of vulnerability coalescing, Nessus and Nmap will often report the same vulnerability
for the same asset in different ways for the same or multiple ports. The ESM System will coalesce all
of these issues into one item with multiple descriptions, when possible, so that fewer remediation items
and less data overload occur, resulting in higher value information.
70
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
A second example of vulnerability coalescing would be if Nessus, ISS SiteProtector, and eEye Retina
were all utilized in the same assessment and found the same vulnerability, but had very different
descriptions for it. The ESM System will coalesce all of this information into one vulnerability and
one remediation item with multiple descriptions. By doing this, no data is lost, but rather is organized
for more productive usability.
Coalescing reduces the huge amount of manual correlation you typically need to do when using each
of these types of integrated products and alerts individually.
The coalesced icon
allows you to identify coalesced vulnerabilities easily in the following areas:
»
Comparative Compliance Report
»
Network Standard Report
»
Network Group Standard Report
»
Operating System Standard Report
»
Asset Summary Report
»
Asset Standard Report
»
Asset Details Report
In addition, the descriptions and solutions for vulnerabilities that have been coalesced will be grouped
by scanner name and the associated test ID and test name. Descriptions and solutions for coalesced
vulnerabilities are viewable in the following areas:
»
Asset Summary Report
»
Asset Details Report
»
Remediation Details
71
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Figure 7-2. Asset Summary Report displaying a coalesced vulnerability
(note that the vulnerability was found by both the Qualys and Nessus connectors)
Violation Coalescing
When two different scanners find the same violation, the ESM coalesces these into one violation.
Coalescing helps reduce manual correlation, and since only one remediation task is created, it helps
reduce task management time as well.
Rules must be specifically written to allow for violation coalescing. For details about which
Preventsys rules allow coalescing, see the Policy Reference Guide. For information about how to write
rules that allow coalescing, see the PolicyLab User Guide.
Understanding Assessment Status
The following phases are displayed during an assessment. See the beginning of this chapter for more
details about each of these phases.
»
Assessing Preventsys SRM System is using the information in your assessment
configuration to gather facts about your networks using the specified scanner connectors. The
is displayed during this phase.
Assessing icon
»
Indexing Preventsys SRM System is indexing all of the facts found during assessment (i.e.
the scan results) so that they can be compared against threat alters during analysis (only
occurs if you have the Preventsys Threat Intelligence license). The Indexing icon
is displayed during this phase.
»
Analyzing Preventsys SRM System is applying the policy (or policies) specified in the
assessment configuration against the results obtained during assessment (only occurs if you
selected a policy), analyzing the latest threat alerts (only occurs if you have the Preventsys
72
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Threat Intelligence license), and grouping like vulnerabilities for the same asset into one
remediation. This phase results in vulnerability, policy violation and threat correlation and
coalescing for the purpose of reporting and remediation prioritization and tracking as well as
is displayed during this
the creation of remediation tasks. The Analyzing icon
phase.
»
Complete Preventsys SRM System has completed all tasks associated with the assessment.
Refer to the Status to for information about whether the assessment was completed
is displayed at this time. While
successfully or with errors. The Complete icon
the assessment maybe complete, you must check the Status column to know whether the
assessment was completely successful, successful with warnings, or failed
ƒ
Successful – The assessment completed as expected
ƒ
Successful with Warnings – At least one of the assessment’s tasks failed. When
this happens, the system will still attempt to complete the assessment. Assuming at
least one task can be completed successfully, the system will return partial results.
This icon “ ”is displayed if this occurs.
ƒ
Failed – Several things can cause an assessment fail. If the system cannot complete
the assessment, it will return a “Failure” message.
About Partial Results
If not all tasks conducted during the Assessing phase completed successfully, the system will save the
results it was able to obtain for report viewing and reanalysis. The Assessment Details screen will
display information about which assessment tasks completed successfully and which failed.
If not all tasks conducted during the Analyzing phase completed successfully, the system will save the
results it was able to obtain for report viewing.
If an assessment returns partial results, remediation tasks will be handled as follows:
»
No remediation tasks will be verified because of the assessment.
»
If your assessment used the Preventsys Default Vulnerabilities policy, then Claimed Resolved
remediation tasks will be reopened if the associated vulnerabilities are re-identified, and new
remediation tasks will be created for any new vulnerabilities found. Note that this is the same
behavior as with successfully completed assessments.
Note: You can view the status of the latest five assessments run via the Assessment console on the
Security Risk Dashboard. See the “Security Risk Dashboard” chapter for details.
All assessment status administration is conducted from the Assessment Status Management screen.
To access the Assessment Status Management screen
1
Click Assessments> Assessment Status. The Assessment Status Management screen is
displayed in the Standard View default.
73
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
From this screen, you can access detailed status information about assessments that are in progress as
well as those that have completed. You can also pause and resume or cancel assessments, clean up
your view by hiding old assessments, and delete assessments from the system.
Note: If you are a member of the Super User group, then all assessment statues are displayed. Otherwise, only
assessment statuses for assessment configurations associated with network groups made up completely of
networks that are within the range of the network permissions of the groups to which you belong are displayed.
Viewing Assessment Details
The Assessment Details screen presents additional and detailed information about a specific
assessment, such as the scanners used during the assessment, the schedule, when the assessment was
started and when it completed, the completion status, a list of any asset exclusion lists that were
applied, and if there were partial scan results. It also lists each task conducted for the assessment and
the analysis and their associated statuses.
Note: You can also access details about an assessment by clicking on the Assessment Details link on
reports.
To view details about an assessment:
1
On the Assessment Status Management screen, select the Details link for the desired
assessment. The Assessment Details screen is displayed.
74
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Figure 7-3. Sample Assessment Details screen displaying a successful assessment and running analysis
Figure 7-4. Sample Assessment Details Screen displaying a failed assessment task and therefore partial results are available
75
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Figure 7-5. Sample Assessment Details Screen displaying a failed analysis task and therefore partial results are available
Pausing and Resuming an Assessment
The Pause and Resume Assessment functions allows authorized Preventsys users to pause an
assessment that is in progress and then resume it at a later time. Note that only in progress assessments
can be paused and only paused assessments can be resumed.
To pause and resume an assessment
1
2
3
4
Select the Pause link for the assessment you want paused on the Assessment Data
Management screen. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system pauses the selected assessment. The system also changes the
“Pause” link to “Resume”.
To resume the assessment, select the Resume link.
Note: An assessment can also be paused by the system if a network time window closes before the
assessment can complete. The system will automatically resume the assessment once the time window
opens again. See the “Assets and Networks” Chapter for details about setting time windows for
networks.
Canceling an Assessment
On the Assessment Status Management screen, there are two ways to cancel an assessment that is in
progress: Clicking Terminate All Immediately “immediately stops” all current assessment activity.
Selecting the Cancel link for an individual assessment or the Cancel All link allows you to “cleanly
stop” current assessment activity.
When you select any of these links a confirmation popup box is displayed. Select OK to continue or
Cancel to quite. If you selected OK, the system cancels the assessment(s).
Hiding and Un-hiding Assessment Statuses
You can use the Hide functionality to cleanup the Assessment Status Management screen by hiding
completed assessments from view. The hidden assessment can always be redisplayed by using the
unhide functionality accessible via the Extended View.
76
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
To hide and unhide an assessment
1
2
3
4
5
6
7
8
On the Assessment Status Management screen select the Standard View to see all in progress
assessments and all completed assessments that have not been hidden.
To hide an assessment, select the Hide link the assessment you want to hide. Note that you
can also access the “Hide” functionality in the Extended View. A confirmation popup box is
displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system removes the selected assessment from the Standard View.
To unhide an assessment, on the Assessment Status Management screen select the Extended
View to see all in progress assessments and all completed assessments both hidden and not
hidden. Assessments that have not been hidden will have a “Hide” link and those that have
been hidden with have an “Unhide” link.
Select the Unhide link for the assessment you want to add back to the Standard View. A
confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system displays the selected assessment in the Standard View.
Importing External Assessment Data
The Preventsys SRM System allows the importing of externally obtained assessment data from the
following two sources:
»
File – Assessment data gathered and then exported into a file using an assessment tool outside
of the Preventsys SRM System
»
Scan – Scan results from an assessment tool supported by the Preventsys SRM System can be
imported via an associated instance configuration
Note: See the “Assessment Servers and Instance Configurations” chapter for details about adding
Assessment Servers and Instance Configurations to the Preventsys SRM System.
Files can be imported using the Preventsys SRM System’s GUI or by using the Preventsys Assessment
Import Utility (AIU), a command line interface. Steps for importing assessment data as well as
deleting assessments using each of these interfaces is presented in the following sections.
Basic Steps To Import
Determine Import Source
The Preventsys SRM System supports the import of assessment data from a file as well as directly
from a scanner.
Import Source
Import Type
File
Preventsys XML
File
Generic XML
File
AIU (Assessment Import Utility)
Description
File must already be in the valid Preventsys
XML format (no XSL transform is required)
For example, if you used the SiteProtector
extractor to extract data directly from
SiteProtector into a valid XML file. This file
can now be imported using the Preventsys
XML file import.
File requires an XSL file to transform it into
the valid Preventsys XML format – you must
enter the XSL filename
Similar to “Generic XML” in that the file is
77
PREVENTSYS™ SRM USER’S GUIDE
Import Source
CHAPTER 7 | ASSESSMENTS
Import Type
File
Connector File Import
Scan
For the import of assessment data
from scans, the system will only
support connectors that allow the
Preventsys SRM System to extract
the scan data requested directly.
Description
not in the valid Preventsys XML format.
However, Preventsys has built AIUs for these
connectors (i.e. XSL transforms). The XSL
will be applied automatically by the system
based on the file type/version selected (i.e.
Nessus, etc.), so you do not need to enter an
XSL filename. Please contact Preventsys
Support for details about AIUs.
Connector File import is similar to AIU import
except the transform will be done by a
connector instance verses just being converted
by the ESM using an XSL. The format does
not have to be XML (e.g., we support Nessus
NSR). The format does have to be a format
the connector recognizes and knows how to
convert to Preventsys XML format.
Importing scan data is similar to Connector
File Import in that the transform of the data
will be done by a connector instance verses
being converted by the ESM using an XSL.
However, instead of you providing a file to
import, the system connects directly to the
connector specified and displays a list of
available scans for you to select from or, in
some instances, requests that you enter a Job
ID for a scan the connector conducted.
Note: Please contact your Preventsys Support Representative for information about XSL transforms
that Preventsys has created and for the Preventsys Connector SDK.
Create An Assessment Configuration
Imported data must be associated with an assessment configuration. Therefore, you need to create a
assessment configuration with a network group that includes all of the IPs in the assessment data file
you want to import. Hosts data outside the ranges of the network group associated with the selected
assessment configuration will not be imported.
The connector types associated with the assessment configuration you select do not have to match the
assessment tool type of the file you are importing. For example, the assessment configuration you
selected uses the Nessus connector type, but you are importing a file from ISS SiteProtector.
However, if you want that assessment configuration to use the assessment tool type of the imported
scan results or data file for future assessments, you must add that instance configuration to your
assessment server, create an associated connector configuration, and then update the assessment
configuration.
Note: You do not need to conduct assessments with the assessment configuration you create prior to
importing a file; the assessment data can be imported into an assessment configuration for which no
assessments have been run.
Determine File Import Order
When importing a file if you do not specify an “override date”, the start_time in the xml file being
imported will be used as the start date and time of the assessment.
78
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Note: When importing an assessment data file, the start time in the file “must” be later than the latest
assessment’s time associated with the assessment configuration. If the start time of the file is earlier,
then the import will fail. Use the Override Date option to specify a different start time.
When importing a scan if you do not specify an “override date”, the start_time in the scan will be used
as the start date and time of the assessment. If neither of these are available, the system will use the
time that the import was started.
If you will be importing more than one file in a series, consider organizing these files in the historical
order in which you want them presented in the Preventsys SRM System. Thus, the file with the oldest
time should be imported first, followed by the next oldest and so on. The most recent file should be
imported last. Please allow time in between the imports for the system to perform its indexing of the
result set for analysis.
Note: Imported assessment data will be put in the database sequentially. Imported assessment data
cannot be placed in the middle of a sequence of assessments.
About System Data Merging and Analysis
Merge With Latest Assessment Data: As part of the import, the Preventsys SRM System merges the
imported assessment data with the latest assessment data for the assessment configuration you
specified, filtering out any duplicate vulnerabilities (i.e. the same vulnerability found on the same host
using the same assessment tool). The resulting assessment becomes the “new” latest assessment for
the assessment configuration you specified. This merging of assessment data prevents remediation
tasks from being closed due to missing data in the import file.
Note: The merging of assessment data is optional. If you turn this function off, then the imported
assessment data will not be merged with any other assessment data. The “new” latest assessment will
only include the imported data. Remediations associated with vulnerabilities found on hosts in
previous assessments that are not in the imported data will be changed to “verified” due to the
absence of their reoccurrence.
Assessment Configuration Inheritance: After an import, the “new” latest assessment is treated as if
it had been run by the Preventsys SRM System. It is displayed in the Assessment Console on the
Preventsys Security Risk Dashboard (assuming that the time specified falls in the range of the latest
five assessments), and on the View Assessment Status screen. This new assessment also inherits the
hosts, networks, network group, and policies of the associated assessment configuration.
Assessment Data Analysis: If the associated assessment configuration has a policy, then policy
analysis will take place automatically after the import. If the assessment configuration does not
contain a policy, then no analysis will be conducted as part of the import (i.e. no vulnerabilities or
violations will be created). You will need to conduct a re-analysis with the assessment to identify
vulnerabilities and violations.
Importing Assessment Results Using the Preventsys SRM System’s UI
All import functionality from the GUI is conducted from the Import Assessment Data screen.
To access the Import Assessment Data screen
1
On the Assessment Configuration Management screen, select the Import to link for the
assessment configuration into which you want to import your scan results. The Import
Assessment Data screen is displayed.
79
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
To import an assessment data file
1
The Import to Assessment Configuration field is populated with assessment configuration
you selected on the previous screen.
Note: The Import to Assessment Configuration dropdown list only displays assessment configurations
associated with network groups made up completely of networks that are within the range of the
networks to which you are associated via you user group(s).
2
3
4
5
6
Select “File” for the Source.
For Type, select the type of file and format you are importing.
ƒ
Preventsys XML – The file is already in the valid Preventsys XML format
ƒ
Generic XML – You have an XSL that will transform the file into valid Preventsys
XML
ƒ
Assessment Tool Name/Format – The format used by the assessment tool from
which the file was exported is supported by Preventsys and therefore no XSL is
required (supported assessment tool output formats are listed in the “Type”
dropdown)
Enter an Override Date if you want to use a different assessment date than what is specified
in the file. Format of the date/time entered must be yyyy-mm-ddTHH:mm:ss (e.g., 2004-0727T22:36:20) and is always in GMT
If the Merge with Latest Data check box is selected, the system to merges the imported
assessment data file with any previous assessments for the selected assessment configuration.
Select Next. The Import File screen is displayed.
80
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Figure 7-6 – Sample File Import screen if “Generic XML” selected
7
8
Enter the path or browse to find the requested file or files.
Select Submit to import the file.
To import scan results
1
2
3
4
5
6
Select “Scan” for the Source.
For Type, select the assessment tool from which you want the system to import the
assessment results.
For the assessment tool you selected, specify which associated instance configuration you
want the system to use. Note that the instance configuration must be valid and running on an
available assessment server.
Enter an Override Date if you want to use a different assessment date than what is specified
in the scan. Format of the date/time entered must be yyyy-mm-ddTHH:mm:ss (e.g., 2004-0727T22:36:20) and is always in GMT. If the scan does not have a scan time and you do not
enter an override date, then the date and time the scan is imported will be used.
If the Merge with Latest Data check box is selected, the system to merges the imported
assessment data file with any previous assessments for the selected assessment configuration.
Select Next. The Import Scan screen is displayed.
81
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Figure 7-7 – Sample Scan Import screen if Qualys scanner and instance configuration selected
7
8
Select the scan you want to import.
Select Submit to import the scan.
Importing Assessment Results Using the Preventsys Command-Line AIU
To Install the Preventsys Assessment Import Utility (AIU)
To utilize the Preventsys AIU, you must first install Java, and then the files supporting these functions
using the installation instructions below. Note that these commands are supported for both Windows
(batch files) and Linux (shell-scripts).
1
2
3
4
5
6
7
Install Java JDK or JRE v1.4.x
Create a new System Environment Variable and name it JAVA_HOME
Modify your existing System Environment Variable PATH so that it includes
%JAVA_HOME%/bin
Verify that JAVA_HOME is set by running a new command window and typing ‘set
JAVA_HOME’
Verify that %JAVA_HOME%/bin is now in your PATH by typing ‘set PATH’
Unzip the preventsys_data_manipulation_v1.1.zip file to any directory
Use the import_file, import_scan, or remove_scan command as needed
Before using the AIU, the following arguments must be placed in the file dataimport.conf in the
same directory as the import_file utility.
The property values of the dataimport.conf file are shown below:
# Url of the Preventsys ESM appliance web application
preventsys.webservice.host =
<host or IP address>
preventsys.webservice.port =
<8888>
# Preventsys login info
preventsys.login.username=
<preventsys user name>
preventsys.login.password=
<preventsys password>
82
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
truststore.filename=
<full path to truststore>
truststore.password=
<truststore password>
Importing a File
The following are parameters that are used with the import_file command. These are also discussed in
the “Basic Steps to Import” section of this chapter.
Parameter
Description
<pconfig_name>
The Preventsys Assessment Configuration Name with which you
want the imported data to be associated. Generally, this
will be the Assessment Configuration whose network group
definition most closely matches the ranges of hosts in the
imported scan. You can find the Preventsys Assessment
Configuration Name in the Assessment Status window.
Remember to put the assessment configuration name in quotes
if it contains spaces. Preventsys recommends always using
quotes regardless.
<xml>
The name of the xml file to import
<xsl>
An optional parameter that will transform the given XML
into the Preventsys Assessment Data format if it is not
already in that format.
<time>
An optional parameter for when you want to specify the
assessment date; format is yyyy-mm-ddTHH:mm:ss (e.g., 200407-27T22:36:20) and is always in GMT
<roll true|false>
An optional parameter that will turn off assessment data
merging if –roll false. If not present then default is
"roll=true”.
To import an assessment data file using the Preventsys AIU
Run the following import_file command using any optional parameters desired:
import_file -xml <xml> -paconfig <p_config_name>
Example using all optional parameters:
import_file -xml <xml> [-xsl <xsl>] [-time <time>] -paconfig
<p_config_name> -roll false
Example with actual values:
> import_file -xml NESSUS.xml –xsl ./NESSUS.xsl –time 2004-0727T22:36:20 –paconfig “MyNessusCompliantServers” –roll false
Importing a Scan
The following are the parameters used with the import_scan command. These are also discussed in the
“Basic Steps to Import” section of this chapter.
Parameter
Description
83
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Parameter
Description
<scanner_type>
The type of scanner/assessment tool.
<scan_id>
The scan id of the external scan to import (e.g.,
scan/1108521446.20654).
<pconfig_name>
The Preventsys Assessment Configuration Name with which you
want the imported data to be associated. Generally, this
will be the Assessment Configuration whose network group
definition most closely matches the ranges of hosts in the
imported scan. You can find the Preventsys Assessment
Configuration Name in the Assessment Status window.
Remember to put the assessment configuration name in quotes
if it contains spaces. Preventsys recommends always using
quotes regardless.
<connector_name>
The name of instance configuration associated with the
scanner type you entered that is to be used in the import
<assessment_server_name>
The name of assessment server associated with the instance
configuration that you entered
<time>
An optional parameter for when you want to specify the
assessment date; format is yyyy-mm-ddTHH:mm:ss (e.g., 200407-27T22:36:20) and is always in GMT
<roll true|false>
An optional parameter that will turn off assessment data
merging if –roll false. If not present then default is
"roll=true”.
To import scan results using the Preventsys AIU
Using the import_scan utility, scan results can be imported from the assessment tool you specify.
Run the following import_scan command using any optional parameters desired:
import_scan -scanner_type <scanner_type> -scan_id <scan_id> -paconfig
<config_name> -pci <connector_name> -pas <assessement_server_name>
Example using all optional parameters:
import_scan -scanner_type <scanner_type> -scan_id <scan_id> -paconfig
<config_name> -pci <connector_name> -pas <assessement_server_name> [time assessment_time] [-roll true|false]
Example with actual values:
> import_scan -scanner_type qualys -scan_id scan/1137454348.25445 paconfig qualys2-9 -pci qualys -pas as13 –time 2004-07-27T22:36:20 roll false
Local process has finished successfully.
Payload is being sent to the
server to be completed....
Successfully imported data.
New Preventsys scan_id = 1942261186194227
In addition to the arguments that must be supplied at each invocation, the following arguments must be
placed in the file dataimport.conf in the same directory as the import_scan utility.
84
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
The property values of the dataimport.conf file are as follows:
# Url of the Preventsys ESM appliance web application
preventsys.webservice.host =
<host or IP address>
preventsys.webservice.port =
<8888>
# Qualys scanner required variables
dataimport.qualys.key.deleteres=
Off
dataimport.qualys.key.appliancename=
<appliance name>
dataimport.qualys.key.password=
<password>
dataimport.qualys.key.optionspolicy
<policy>"SANS20 Options"
dataimport.qualys.key.username=
<qualys user name>
# Preventsys login info
preventsys.login.username=
<preventsys user name>
preventsys.login.password=
<preventsys password>
truststore.filename=
<full path to truststore>
truststore.password=
<truststore password>
Deleting Assessments
When an assessment is deleted, all vulnerabilities that were initially found based on that assessment as
well as their associated remediations are removed from the Preventsys SRM System.
Vulnerabilities and their associated remediations that were initially found in previous assessments and
carried forward to the deleted assessment are not deleted. They remain and keep their latest status
(e.g., Unassigned, Assigned, Claimed Resolved, False Positive, Accepted Risk, or Verified). Any reanalyses associated with the deleted assessment are also deleted. If the deleted assessment is also the
latest assessment, then the previous assessment now become the “new” latest assessment for that
assessment configuration.
Note: When an assessment is deleted, the system goes into Maintenance Mode until the removal is
complete. See “System Updates” chapter for details about Maintenance Mode.
Deleting An Assessment Using the Preventsys SRM System’s UI
To delete an assessment using the Preventsys SRM System’s UI
1
2
3
On the Assessment Status Management screen, select the Delete link for the assessment you
want to remove from the system. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected assessment.
Deleting An Assessment Using the Using the Preventsys AIU
Note: The Preventsys AIU must be installed prior to use. Please refer to the section about installing
the Preventsys AIU in this chapter for details about installation.
The following parameter must be used with the remove_scan command.
85
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 7 | ASSESSMENTS
Parameters:
<p_scan_id>
Preventsys Scan ID to be removed. You can find the Preventsys Scan ID
by clicking on the “Assessment Successful” link in the Assessment
Status. This will popup a window that displays the Preventsys Scan ID
for the assessment.
In addition to these arguments which must be supplied at each invocation, the following arguments
must be placed in the file dataimport.conf in the same directory as the remove_scan utility.
The property values of the dataimport.conf file are as follows:
# Url of the Preventsys ESM appliance web application
preventsys.webservice.host =
<host or IP address>
preventsys.webservice.port =
<8888>
# Preventsys login info
preventsys.login.username=
<preventsys user name>
preventsys.login.password=
<preventsys password>
truststore.filename=
<full path to truststore>
truststore.password=
<truststore password>
To delete an assessment using the Preventsys AIU
1
Identify the Preventsys scan id for the assessment you want deleted. You can locate the
assessments scan id by selecting Reports > Executive Summary. Select the assessment you
want to delete from the report context at the top of the screen. After the report refreshes with
the selected data, select the Assessment Details link located in the top right-hand corner of the
report. The scan id is the same as the “Assessment ID” (see the following image).
86
PREVENTSYS™ SRM USER’S GUIDE
2
CHAPTER 7 | ASSESSMENTS
After you have identified the Preventsys scan id for the assessment you want to delete, use the
remove_scan command and the <p_scan_id> parameter to perform the removal.
remove_scan -scan_id <p_scan_id>
Example with actual values:
> remove_scan -scan_id 8813212898813212
Local process has finished successfully. Payload is being sent to the server
to be completed....
Successfully removed data for scan_id = 8813212898813212
Re-Analyzing Assessment Results
The Re-Analyze feature allows you to re-analyze all successful assessments (even if only partial results
were obtained) against another policy (or policies) regardless of whether your initial assessment
included a policy. The system will send the administrator who initiated the re-analysis an email
notification upon its completion.
Re-analyzing an assessment is the same as running that assessment again except that the selected
assessment’s scan results are used instead of the system rescanning the associated assets. Therefore,
when an assessment is re-analyzed, the result becomes the latest assessment for the associated
assessment configuration. Before conducting a re-analysis, make certain you understand what happens
to exiting remediations during subsequent assessments. Please see the “Remediations” chapter for
details about how remediations are created, verified, and reopened.
Note: Conducting a reanalysis against an older assessment will result in the old assessment becoming
the “latest” assessment for that assessment configuration. This may cause Remediation Tasks to
change state based on this old data. If you conducted a reanalysis by mistake and want to remove the
resulting assessment, please see the previous section about deleting an assessment.
Re-Analyzing an Assessment’s Results
The Re-Analyze Assessment Results function allows authorized Preventsys users to select PDL
policies for assessment analysis.
To re-analyze an assessment’s results
1
2
3
4
Click Assessments > Reanalyze. The Select Order to View Assessments screen is displayed.
Select whether you wish to view the list of scan results Chronologically or Alphabetically.
Click Next. The Re-Analysis Management screen is displayed.
Select which assessment you wish you re-analyze from the Select an Assessment pull-down
menu.
Note: If you are a member of the Super User group, then all assessments are displayed. Otherwise,
only assessments for assessment configurations associated with network groups made up completely of
networks that are within the range of the network permissions of the groups to which you belong are
displayed.
87
PREVENTSYS™ SRM USER’S GUIDE
5
6
CHAPTER 7 | ASSESSMENTS
Select which policies you wish to apply from the Select a Policy list box.
Click Submit to being the reanalysis.
Viewing the Status of a Re-Analyzed Assessment
Click Assessments > Reanalysis Status to view the status of an assessment reanalysis. The
Reanalysis Status Management screen is displayed.
Note: If you are a member of the Super User group, then all reanalysis statuses are displayed.
Otherwise, only reanalyzes for assessment configurations associated with network groups made up
completely of networks that are within the range of the network permissions of the groups to which you
belong are displayed.
Once a reanalysis is completed, you can click on the Scanresults XML link to view the associated
XML results.
88
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
CHAPTER 8
Remediations
Remediation Tasks allow you to prioritize, assign, and track the security tasks that need to be fixed to
protect your critical IT assets. This chapter provides details about managing and assigning
remediations tasks, including creating rules that automatically assign tasks for you based on criteria
you specify, and specifying due dates based on a task’s priority. Integration of the Preventsys SRM
System with an external remediation system, such as Remedy’s Action Request System®, is also
discussed.
The following terms and their definitions will assist you when reading this chapter.
Remediation Task: A remediation task is automatically created by system based on either a
vulnerability or a violation found by during the Analysis phase of an Assessment. This task can be
assigned to a user, so that it can be fixed, and then verified by the system. See the “Assessments”
chapter for the definitions of vulnerability, violation, and vulnerability coalescing.
Vulnerability Type Remediation Task: A Vulnerability Type Remediation Task is automatically
created by the system based on a vulnerability found by during the Analysis phase of an Assessment.
Violation Type Remediation Task: A Violation Type Remediation Task is automatically created by
the system based on a violation found by during the Analysis phase of an Assessment.
Manual Audit Type Remediation Task: A Manual Audit Type Remediation Task is automatically
created by the system when a violation is found based on a Manual Audit Task Rule during the
Analysis phase of an Assessment. See the “Manual Audit Tasks” chapter for details about creating
Manual Audit Tasks, which can thus trigger Manual Audit Task Rules. See the Preventsys PolicyLab
User Guide for details about creating Manual Audit Task Rules, which can trigger violations and thus
Manual Audit Type Remediation Tasks.
Managing Remediation Tasks
Remediation Tasks can be managed through bulk assignment and the Assignment rules you create, and
can be assigned to users of external Action Request or Trouble Ticketing Systems.
Status Lifecycle
The status of each task is tracked, prioritized and verified automatically by the system and allows user
overrides. These items can be managed individually, or in bulk and navigation is easy using
customizable filters and column selection that you can save for use at any time.
The basic lifecycle of a remediation task includes four main stages:
»
Unassigned
»
Unresolved/Assigned
»
Resolved (Claimed Resolved, False Positive, or Accepted Risk)
»
Verified
89
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
3
2
Unassigned
1
Verified
Unresolved/Assigned
4
Reassigned to a
different remediator
Resolved
Claimed Resolved
Accepted Risk
False Positive
1
Claimed Resolved tasks are changed to Assigned if they cannot be Verified “and” the previously assigned remediator is still
active in the system, and is still a remediator for the network group associated with the task.
2
Claimed Resolved tasks are changed to Unassigned if they cannot be Verified “and” the previously assigned remediator is no
longer active in the system or is no longer a remediator for the network group associated with the task.
3
User can request that a task be “reassigned” in which case the task is changed to Unassigned.
A remediation is considered resolved if it has one of the following statuses: Claimed Resolved, False
Positive, or Accepted Risk. However, only tasks with the Unassigned, Assigned, and Claimed
Resolved status can be verified by the system. By marking a task as False Positive or Accepted Risk,
you are telling the system that you have acknowledged the policy violation or vulnerability and no
longer want to be notified of its existence or verified by the system.
Following task assignment, the system will automatically generate email notifications informing the
selected remediators of all task assignments. Remediators can then access the Update Remediation
Task function via links in the email notification to update the status of their tasks or directly via the
main menu. Note that users associated with external remediation systems will not receive email
notifications.
Note: Tasks may also be assigned to users in external remediation systems, which have been
configured to work with the Preventsys SRM System. See the “Managing External Remediation
Systems” section for details about setting up external remediation systems and users.
If a user loses authorization to an asset for which they have assigned remediation tasks (i.e. they are
removed from a group, the group is edited, the networks associated with the group are edited, or the
user’s account is deleted), then those tasks that are not in the Claimed Resolved, False Positive,
Accepted Risk, or Verified state will be set to “Unassigned” by the system. The exception to this is if
the user belongs to another group with the “resolve remediation” permission for a network whose
range includes the asset to which the user lost authorization, then tasks associated with that asset will
not be affected.
Once a remediation task has been completed and its status changed to Claimed Resolved, the fix may
be verified by running the assessment configuration that originally resulted in the detection of the
associated policy violation or vulnerability. See the “Verifying Remediation Tasks” section for details
about how the system verifies remediation tasks.
90
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
Workflow Example
For example, on a site with one lead IT administrator who is in charge of scheduling assessments,
reviewing reports, and assigning remediation tasks. This administrator has two IT personnel who fix
remediation tasks. When policy violations and vulnerabilities are identified, the lead IT administrator
assigns the corresponding remediation tasks to the other two remediators, both of whom would receive
emails informing them of their respective tasks.
The two remediators can follow the links in their task assignment emails to review their assigned tasks
and update each task’s status to Claimed Resolved once fixed. The lead IT administrator can then
schedule a new assessment utilizing the previous assessment configuration (including the same policy),
which will verify that the detected policy violations and vulnerabilities have been fixed, and their
statuses will automatically be updated from Claimed Resolved to Verified if appropriate.
If any of the previously detected policy violations or vulnerabilities remain active (are found again),
then the applicable remediation tasks will be reopened. Note that if any previously detected policy
violations or vulnerabilities associated with Unassigned or Assigned remediation tasks also do not
appear again on the subsequent assessment, then they too will be automatically updated to Verified.
All remediation task administration is conducted from the Remediation Task Management screen.
To access the Remediation Task Management screen
1
Click Tasks > Remediation Tasks. The Remediation Task Management screen is displayed.
Note: If you have tasks assigned to you, the “My Tasks” tab is displayed by default with your tasks
listed. Otherwise, the “Task Assignment” tab is displayed.
Note: If you are a member of the Super User group, then all remediation tasks are displayed in the
Task Assignment tab. Otherwise, only remediation tasks associated with hosts that are within the
range of the network permissions of the groups to which you belong are displayed. In addition, “all”
Manual Audit Task violations are displayed regardless of your group permissions.
From the Task Assignment tab on the Remediation Task Management screen, you can view details
about individual tasks, assign and reassign tasks, and change the priority of tasks. You can also use the
Filter Options and Column View Options tabs to filter and view different information. Note that by
default, tasks on this screen are displayed in the order of their priority; highest priority first.
91
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
Note: You can also access this screen via the Security Risk Dashboard by selecting the » tab located
on the “Latest Tasks” area of the Remediation console. Tasks are automatically filtered by the active
Enterprise Group when the screen is accessed in this way. Use the Filter Options tab to turn off
Enterprise Group filtering.
From the My Tasks tab on the Remediation Task Management screen, you view details about
individual tasks and resolve your tasks. You can also request that any of your tasks with the Accepted
Risk or False Positive resolution be reassigned.
Note: Only tasks assigned to you that are also associated with hosts that are within the range of the
network permissions of the groups to which you belong are displayed. All Manual Audit Task
violations assigned to you are also displayed.
Note: You can also access this screen via the Security Risk Dashboard by selecting the » tab located
on the “My Tasks” area of the Remediation console.
Assigning Remediation Tasks
The Assign Remediation Tasks function allows authorized users to assign new remediation tasks.
Note that you can only assign tasks using the latest analysis. Tasks that were not assigned in similar,
previous analyses are carried forward to the latest analysis.
After a task is assigned, it can be reassigned as long as it does not have the Claimed Resolved or
Verified status. A remediator can also request that a task with the False Positive or Accepted Risk
status be reassigned by selecting the Reassign status on the Remediation Task Update screen. The
task’s status is then automatically changed to Unassigned.
Note: Users in external remediation systems can only reassign Preventsys tasks that have the
“Assigned" status.
When tasks that are assigned to an external remediation user are reassigned to a different external
remediation user associated with the same external system, Preventsys simply reassigns the task and
updates the external system with the new information. If the two external users are associated with
92
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
different external systems, Preventsys updates the task in the first system by changing its status to
“Closed” and sends the reassigned task to the associated external remediation system.
If Preventsys encounters errors while attempting to send an external user’s task assignment to the
associated external remediation system, the system will display an error screen listing each task and the
associated error, including the error code and message generated by the external system when
available. The specified tasks will remain unassigned until they are successfully reassigned.
About Severity
The severity of each remediation task is automatically calculated by the system based on the severity
of the associated vulnerability or violation. A task’s severity can also be changed by the system if an
associated threat alert is found. Changes to severity are noted in the History/Comments section of the
Remediation Details screen.
Figure 8-1. Sample Remediation Details screen displaying system comments about changes to the task’s severity
About Priority
The priority of each remediation task is automatically calculated by the system based on the associated
severity, financial impact, and operational impact of the associated asset, relative to the highest
exposure value of all assets. However, you can also manually enter your own priority if desired. The
priorities you enter will take precedence over the priorities calculated by the system.
About Due Date and Criticality
Due dates for remediation tasks are optional and can be specified in two ways: automatically
calculated by the system or manually entered by the user.
93
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
System Calculated Due Dates
The system calculates due dates for remediation tasks based on how you decide to map priority ranges
to criticality levels. You setup this mapping on the System Preferences screen. There are three
criticality levels: High, Medium, and Low. The system defaults for these levels are as follows:
»
Low = 0 – 50
»
Medium = 51 – 80
»
High = 81 – 100
The system does not provide default due dates. Therefore, if you do not enter due dates for the
criticality levels, remediation tasks will display “N/A” for the due date. You will still be able to
manually enter due dates on the Remediation Task Management Assignment screen.
To change the criticality levels and due dates for remediation tasks
1
Select Admin > Preferences. The Preferences screen is displayed.
2
Click and hold the slider control while moving your mouse left to right to set the remediation
priority range for each Criticality level: Low, Medium, and High.
Enter a Due In date for each criticality level. This date is the number of days, after which the
remediation task is created, that you want the task completed. For example, you may want
highly critical tasks fixed within one day, but lower tasks can be fixed within six days.
Select Submit to save.
3
4
Note: Due dates are re-calculated by the system whenever the remediation task’s priority is changed.
If the change is such that the priority is bumped into the next criticality level, then the due date will
change to reflect this.
Manually Entered Due Dates
You can manually enter due dates on the Remediation Task Management Assignment screen by typing
the desired date in the Due Date field and selecting Submit. Due Date can be entered manually
regardless of whether the system has calculated a due date.
Note: The due dates you enter will take priority over calculated due dates.
94
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
Assigning or Reassigning a Remediation task
For each remediation task, The “Assign To” list will only display users that belong to groups with both
the “Resolve Remediations” permission and network permissions that include the host associated with
the remediation. In addition, all “Unassociated” External Users (i.e. user for an external remediation
system who do not have an associated Preventsys username) are also displayed.
To assign or reassign a remediation task
1
On the Remediation Task Management screen, select the Task Assignment tab if it is not
already selected. The Remediation Task Management screen is displayed.
2
For each task you want to assign or reassign, select the assignee from the associated Assign
To dropdown. Note that the “Assigned To” column displays to whom the task is currently
assigned.
Note: The Assign To dropdown list displays users with the “Remediation” resource and “resolve
remediations” permission that are associated with networks via their user group(s), which contain the
host associated with the remediation task. For Manual Audit Task violation Remediations, all users
with the “Remediation” resource and “Resolve Remediation” permission are displayed regardless of
their network permissions.
3
4
5
You can also change the Priority of the task if desired. Remember that Priority is
automatically calculated for you by the system and can affect “Due Date”. If you enter your
own priority, the system will default to that value and no longer automatically calculate
priority for you.
Click Submit to assign tasks and save any change you made to task priority.
The system automatically sends email notifications to all selected remediators. Tasks
assigned to external remediation system users are forwarded to the associated external
remediation system.
Note: If for any reason the system cannot send the assignment email notification to a remediator (e.g.,
there is an email server error or the recipient(s) address is incorrect), the task(s) will still be assigned.
A message will be displayed on the Task Assignment screen altering you to the issue. The system will
not attempt to resend the email, so please notify the remediator(s) if they have urgent tasks that need to
be resolved.
95
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
Bulk Assignment
You can assign several tasks to the same person at once by selecting the checkbox for each
remediation task you wish to assign, and then selecting the assignee’s name at the bottom of the screen
in the “With selected, assign to” dropdown. All checked remediations on all pages will be assigned to
the individual you selected assuming that user has permission for the host associated with each tasks.
Filtering Remediation Tasks
You can filter remediations tasks in a variety of ways by using the Filter Options tab. Filters you
create can also be saved for later use. For example, you can use a saved filter to create an Assignment
Rule. See the “Working with Assignment Rules” section for details about Assignment rules.
The Preventsys SRM System provides two preconfigured filters to get you started. You cannot edit or
delete these filters, but you can use them to create new filters (see the “Saving a Filter” section in this
chapter for details).
»
“Selective Remediation L1” - This filter displays tasks with a priority between 91 and 100
»
“Selective Remediation L2” - This filter displays tasks with a priority between 81 and 100
To filter remediations
1
On the Remediation Task Management screen or the Remediation Task Update screen, click
the Filter Options tab.
2
Enter data for the options you want to use.
Note: Text string fields are case sensitive. For example, entering “denverlab” for the network group
will not return “Denverlab”. You can also use the asterisk “*” for wildcard searches, for example:
96
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
▪ Searching for comp* will return all asset names starting with the letters “comp” such as
“computer” or “company.”
▪ Searching for *comp* will return all asset names containing the letters “comp” such as
“accompany.”
▪ Searching for *comp will return all asset names beginning with the letters “comp” such as
“computer” or “company.”
3
4
Click Apply Filter.
The list of remediations is displayed based on the filter selected.
Note: Remember that a Manual Audit Task Violation is always associated with the first assessment
that finds it even if it is found by multiple assessments. Therefore, if you want to search for Manual
Audit Task Violations by Assessment Name, you will need to know the name of the assessment that first
found those violations.
Saving a Filter
You can select various filter options that will change the types of data displayed and then save that
filter for use later. For example, you can filter by remediations that are associated with a specific asset.
To save a filter, enter the filter’s name in the Save as Filter field (400 characters maximum), and click
Save and Apply Filter.
You can also create a new filter based on an existing filter by using the Load Filter dropdown,
modifying the filter options as desired, and then changing that filter’s name and clicking Save and
Apply Filter.
Applying a Saved Filter
You can apply filters you have saved by using the Load Filter dropdown. Note that column settings
are not saved with a filter. To apply a saved filter, select the filter’s name from the Load Filter
dropdown, click Load, and then click Apply Filter.
Editing a Saved Filter
You can edit filters you have saved. To edit a saved filter, select the filter’s name from the Load
Filter dropdown, click Load, edit the filter including the filter’s name as desired, and then click Save
and Apply Filter.
Note: Remember that if you change the name of the filter you are editing, a new filter with that name
is created when you click Save and Apply Filter. The initial filter you selected is not deleted or
modified in any way.
Deleting a Saved Filter
Deleting a saved filter does not alter the remediations displayed. To delete a saved filter, select the
filter’s name from the Load Filter dropdown, click Load, and the click Delete Filter.
Note: Deleting a filter that was used to create an assignment rule does not affect the rule.
Viewing Different Columns of Data
You can choose different columns of data to view by using the Column View Options tab.
Note: Column options are not saved with filters. Saved filters use the system’s default column set.
97
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
To choose a column
1
On the Remediation Task Management screen or the Remediation Task Update screen, click
the Column View Options tab.
2
3
4
Select the column data that you want to show.
Click Apply View Choices.
Remediation tasks are displayed with the data columns you selected.
Viewing Details about a Remediation
You can view details about a remediation task by clicking on an Issue Name from the Task
Management tab, the My Tasks tab, or the Remediation console accessible from the ESM Dashboard.
See the “Security Risk Dashboard” chapter for information about the ESM Dashboard.
The Remediation Details screen provides in-depth information about a selected issue (policy violation
or vulnerability) and its remediation task.
This screen lists the issue name as well as information about its Severity, Priority, Asset, IP Address,
Data Found, Patchability, Patch Status, Issue Status, and assigned Remediator. The issue’s description
and a possible solution is also listed. A history of all user comments and status changes, as well as
changes the system made to the task are also displayed. Altering the task’s severity based on a threat
alert is an example of a system change.
Vulnerability Remediation Details
If the issue contains coalesced vulnerabilities, the descriptions and solutions will be grouped by
scanner name and the associated test ID and test name. In addition, if some of the coalesced
vulnerabilities were not found again during the latest assessment, they are listed under the “Previously
Found” heading. If they were found (or found again) during the latest assessment, they are listed under
the “Found” heading.
98
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
Figure 8-2. Sample Vulnerability Type Remediation Details Screen
Violation Remediation Details
For policy violation type remediation tasks, the Remediation Details screen also displays information
about the associated policy if a source document exists. A link to the policy is also provided. When
selected, this link opens a new browser window which displays the entire policy source document.
The rule associated with the remediation, is always displayed at the top of this window.
99
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
Figure 8-3. Sample Violation Type Remediation Screen With Policy Reference Displayed
Verifying Remediation Tasks
A Remediation Task is verified by the system when a subsequent assessment using the same
assessment configuration that found the associated policy violation or vulnerability on an asset cannot
find that same issue again on that same asset. Note that the system only attempts to verify
Remediation Tasks that are Unassigned, Unresolved, or Claimed Resolved. Remediations Tasks that
are Accepted Risk or False Positive are ignored.
»
To verify a policy violation fix, you must rerun the same assessment configuration that
created it (i.e. same connector configuration, same network group, same policy, same
exclusion lists).
»
To verify a MAT violation fix, you must rerun the same policy that created it using any
assessment configuration.
»
To verify a vulnerability fix, you must you must rerun the same assessment configuration that
created it (i.e. same connector configuration, same network group, same policy, same
exclusion lists).
Other Reasons Remediations Task Can Be Verified
It should be noted that there can be several reasons, other than that the associated issue was actually
fixed, as to why a violation or vulnerability was not found again. For example, if the asset on which
the vulnerability or violation was detected cannot be found during the subsequent assessment, then the
associated remediation task will be automatically updated to Verified based on the absence of that
asset. This could happen if you modify the assessment configuration by selecting a different network
group that does not contain that asset, or if you modify the selected network group such that it no
longer contains the asset, or if you select an Exclusion list or a Global Exclusion list is active that
includes the asset.
For vulnerabilities, another reason could be if the connector check/test that found the issue does not
fire. This could happen if you modify the assessment configuration by selecting a different connector
configuration, or if you modify the selected connector configuration such that it no longer performs
that check/test.
100
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
For violations, another reason could be if the rule that found the issue does not fire. This could happen
if you modify the assessment configuration by deselecting the policy that found the violation. This
could also happen if you modify the rule such that it no longer performs the same checks, update that
rule in the policy, and then modify the associated the assessment configuration so that it uses the new
version of that policy.
Verifying Remediation Tasks with Coalesced Vulnerabilities
As mentioned previously, if a remediation task contains coalesced vulnerabilities (i.e. different
connector types detect the same vulnerability for the same asset), the descriptions and solutions will be
grouped by scanner name and the associated test ID and test name.
The information mentioned in the previous paragraphs about verifying Remediation Tasks applies to
Remediation Tasks with Coalesced Vulnerabilities with the exception that each vulnerability must be
verified by running an assessment using the assessment configuration that found that particular
vulnerability. Therefore, if one vulnerability is verified, but the others are not, then the Remediation
Task will not be verified. All coalesced vulnerabilities must be verified for the Remediation Task to be
verified.
Verifying Remediation Tasks with Coalesced Violations
As mentioned previously, if a remediation task contains coalesced violations (i.e. different connector
types detect the same violation for the same asset). The information mentioned in the previous
paragraphs about verifying Remediation Tasks applies to Remediation Tasks with Coalesced
Violations with the exception that each violation must be verified by running an assessment using the
assessment configuration that found that particular violation. Therefore, if one violation is verified,
but the others are not, then the Remediation Task will not be verified. All coalesced violations must be
verified for the Remediation Task to be verified.
Working with Assignment Rules
Assignment rules allow the system to automatically pre-assign remediation tasks based on the
conditions you specify. For example, you can create a rule that pre-assigns all tasks associated with a
specific network group to “johnsmith”. Note that you should make sure that johnsmith has the
“Remediations” resource and associated “resolve remediations” permission for the all of the networks
within the network group specified for which you want him to be assigned tasks. Because the system
“pre-assigns” these tasks, you will still need to review and accept the assignment on the Remediation
Task Management screen before the tasks are officially assigned.
All assignment rule administration is conducted from the Assignment Rule Management screen.
101
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
To access the Assignment Rule Management screen
1
Click Tasks > Remediation Assignment Rules. The Assignment Rule Management screen
is displayed.
From this screen, you can add new rules, edit existing rules, and delete rules. You can also change the
order in which the system applies the rules.
Creating an Assignment Rule
Use Assignment rules to specify remediations that should automatically be assigned. For example, you
can create an assignment rule that assigns all tasks associated with a specific network to the remediator
you select.
Assignment rules can be created via the Remediation Task Management screen or the Assignment
Rule Manager screen, but can only be edited via the latter.
Note: Remember that group resources and permissions are granted at the network level. If you create
a rule that specifies that all remediations for an asset should be assigned to a specific remediator, then
you should also make sure that that remediator has the “Resolve Remediations” permission for the all
of the networks desired.
102
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
To create an assignment rule
1
On the Assignment Rule Management screen, click on the Add New Rule button. The Add
Assignment Rule screen is displayed.
2
Either load a saved filter or select the conditions upon which you want the system to assign
tasks (for example, all remediations associated with a specific asset) by entering data in the
provided fields.
Note: Filters and rules are saved separately, therefore modifying the rule does not alter the filter that
was used to create the rule and visa versa.
3
4
5
Enter the name of the rule in the Save as Rule field (400 characters maximum).
Select an assignee in the Assigned to dropdown.
Click Submit to save.
When a new rule is saved, it is automatically applied to all unassigned remediation tasks as well as all
new remediations tasks. Existing rules are automatically reordered so that the rule you created is first.
103
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
Editing an Assignment Rule
When you edit an assignment rule, it is applied to new remediations tasks as well as all existing ones
that have not been assigned.
To edit an assignment rule
1
2
On the Assignment Rule Management screen, click on the Edit link for the rule you want to
modify. The Edit Assignment Rule screen is displayed.
Edit the rule as desired.
Note: Remember that if you change the name of the rule you are editing, a new rule with that name is
created when you click Submit. The initial rule you selected is not deleted or modified in any way.
3
Click Submit to save.
Ordering Assignment Rules
You can specify the order in which you want the system to apply Assignment Rules. New rules are
automatically ordered first. When you reorder rules, the new order is automatically applied to all new
remediations tasks as well as all existing ones that have not been assigned.
On the Assignment Rule Management screen, click on the Up link to move the rule up on the list and
click the Down link to move it down.
Deleting an Assignment Rule
When you delete an assignment rule, remediations tasks that have been assigned are not affected.
Because filters and rules are saved separately, deleting a rule does not alter the filter that was used to
create the rule and visa versa.
To delete an assignment rule
1
2
3
On the Assignment Rule Management screen, click on the Delete link for the rule you wan to
remove. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected rule.
Updating Remediation Tasks
A remediation task can be resolved by changing its status to one of the following: Claimed Resolved,
False Positive, or Accepted Risk. Only tasks with the Claimed Resolved status will be verified by the
system.
To verify a remediation task with the Claimed Resolved status, you must conduct an assessment using
the “same” assessment configuration that resulted in the initial detection of the policy violation or
vulnerability. If the assessment does not find the policy violation or vulnerability, then the system will
automatically change the task’s status from Claimed Resolved to Verified.
You can change the status of False Positive and Accepted Risk tasks to Reassign, which means that the
task’s status will be changed to Unassigned. The task can then be reassigned via the Remediation Task
Management screen. You can also change their status to Claimed Resolved. Note that on Reports, a
Claimed Resolved task is treated the same as a Verified task.
104
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
You can use the Filter Options tab and the Column View Options tabs to control which remediation
tasks and what type of information is displayed. You can also save the filters you create. See the
“Filtering Remediation Tasks” section in this chapter for details.
Figure 8-4 – My Tasks tab Filter Options
Figure 8-5 – My Tasks tab Column View Options
105
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
Updating the Status of a Remediation Task
To update the status of a remediation task
1
On the Remediation Task Management screen, select the My Tasks tab if it is not already
selected. Your assigned tasks are displayed.
Note: My Tasks displays all tasks assigned to you that are associated with hosts that are within the
range of your network permissions based on the groups to which you belong, and “all” MAT violation
type remediations assigned to you regardless of your network permissions. This implies that if your
network permissions are changed such that you no longer have access to certain hosts, then you will
no longer see tasks associated with those hosts.
2
For each task that you want to resolve, select the new status from the Change Status
dropdown. The “Issue Status” column displays the status for each task.
Note: You can change several tasks to the same status at once by selecting the checkbox for each
remediation task you wish to change, and then selecting the new status at the bottom of the screen in
the “With selected” dropdown. All checked remediations on all pages will be changed to the status
you selected. If the status you select is not valid for all tasks (for example, you select “Reassign”
which is not a valid status change for tasks that are still unresolved), then only tasks that can be
changed to “Reassign” will be; the others will be ignored. A message will be displayed on the
confirmation screen, “Note: Some of the items you selected were not valid for this operation.”
3
4
You may also enter comments in the Additional Comments text box. Click on the Issue’s
Name to view all previous comments as well as additional details about the task. Remember
that comments can include user comments and status changes, as well as changes the system
made to the task. For example, altering the task’s severity based on a threat alert. See the
“Remediations” chapter for details about the Remediation Details screen.
Click Submit to save. If the task is associated with an external remediation system, the
updated task status will be forwarded to the external remediation system.
106
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
Managing External Remediation Systems
The Preventsys SRM System supports integration with Remedy’s Action Request System®. Setting up
an external action request (AR) system and associated users in the Preventsys SRM System allows for
the exchange and synchronization of remediation task status.
Remedy AR System v4.5, v5.1, or v6.3 must be installed for integration to function properly.
Additionally, the Preventsys Enterprise Security Management Server must have network access to all
specified Remedy servers, and the date and time must be synchronized to within 10 minutes of each
other.
Note that while the Add and Edit Remediation System screens contain fields for Name, Type, Host,
Port, Form Name, User Name, Password, To System Mapping, and From System Mapping, only the
Name, Type, Host, and To/From System Mapping fields are required by the Preventsys SRM System
when submitting an external remediation system configuration. The remaining fields may be required
by the external remediation system, in which case they must be entered properly in order to facilitate
communication.
The Add and Edit Remediation System screens both feature a Test System function that may be used
to test the validity of the external remediation system’s configuration.
All external remediation system administration is conducted from the External Remediation Systems
Management screen.
To access the External Remediation Systems Management screen
1
Click Tasks > External Remediation Systems. The External Remediation Systems
Management screen is displayed.
From this screen, you can add a new external systems, edit existing external systems, and delete
external systems.
Adding an External Remediation System
The Add Remediation System function allows external remediation systems to be integrated with the
Preventsys SRM System.
107
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
To add an external remediation system
1
On the External Remediation Systems Management screen, click the Add New System
button. The Add External Remediation System screen is displayed.
2
3
4
5
6
7
8
Enter the Name of the external remediation system.
Select a Type from the pull-down menu.
Enter the Host.
Enter a Port if required by the external remediation system.
Enter a Form Name if required by the external remediation system.
Enter a Username if required by the external remediation system.
Enter a Password if required by the external remediation system, and then Re-enter your
Password in the space provided.
Select a To System Mapping.
9
Note: Task data will not be exchanged without a valid entry in the To System Mapping field.
10 Select a From System Mapping.
Note: Task data will not be exchanged without a valid entry in the From System Mapping field.
11 Enter a Description if required by the external remediation system.
12 Click Test to test whether the Preventsys SRM System can exchange task data with the
external remediation system properly. If this test fails, review the information you entered for
errors.
13 Click Submit to save the external remediation system’s settings.
Note: You may submit the new external remediation system even if the test performed in Step 13 fails,
however no tasks can be assigned to the associated external users until the system test is successful.
108
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
Editing an External Remediation System
The Edit Remediation System function allows for the modification of previously configured external
remediation systems.
To edit an external remediation system
1
2
3
4
On the External Remediation Systems Management screen, click on the Edit link for the
system you want to modify. The Edit Remediation System screen is displayed.
Edit the external remediation system’s configuration as desired.
Click Test System to test whether the Preventsys SRM System can exchange task data with
the external remediation system properly.
Click Submit to save.
Note: You may submit the new external remediation system even if the test performed in Step 4 fails,
however no tasks can be assigned to the associated external users until the system test is successful.
Deleting an External Remediation System
The Delete Remediation System function allows for the removal of previously configured external
remediation systems.
Note that an external remediation system cannot be deleted until all of the selected system’s
unresolved tasks (assigned tasks that have not been marked as Claimed Resolved, False Positive, or
Accepted Risk) are reassigned to users that are not associated with the system that is being deleted.
To delete an external remediation system
1
2
3
On the External Remediation Systems Management screen, click on the Delete link for the
system you want removed. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected system.
Managing External Remediation System Users
The Add External Remediation System User function allows for external remediation system users to
be set up within the Preventsys SRM System.
Note that external remediation system users are not automatically granted Preventsys user accounts,
without which they will not be able to login to the Preventsys client. However, external remediation
system users may be associated with Preventsys users to provide enhanced integration for users that
are active on both systems.
For example, non-associated external users are automatically granted the “resolve remediation”
permission for every network. This ensures that the non-associated external user can be assigned tasks
for any asset via the Remediation Task Management Assignment screen. Associated external users
inherit the networks of the user to which they are associated. Therefore, these types of users can be
assigned tasks for those assets within the range of those networks for which the Preventsys user has the
“resolve remediation” permission.
See the “User Authorization” chapter for details about associating external user accounts with
Preventsys users via the Add User and Edit User functions.
All external remediation user administration is conducted from the External Remediation Users
Management screen.
109
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
To access the External Remediation Users Management screen
1
Click Tasks > External Remediation Users. The External Remediation Users Management
screen is displayed.
From this screen, you can add new external users, edit existing external users, and delete users.
Adding an External Remediation System User
To add an external remediation system user
1
On the Remediation Users Management screen, click the Add New User button. The
External Remediation User screen is displayed.
2
Enter the External Username of the external remediation system user. Note that this name
must exactly match the specified username in the external remediation system.
Select an External System from the pull-down menu.
Select a Preventsys User from the pull-down menu if you wish to associate the external
remediation system user with an existing Preventsys user. Note that this association is
optional; you may leave this field blank if you do not wish to associate the external user with
a Preventsys user.
3
4
110
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 8 | REMEDIATIONS
Note: The Preventsys User dropdown list displays all Preventsys users who have the “resolve
remediations” permission regardless of the groups to which they belong.
5
6
Click Verify to verify that the specified user is authorized to access the selected external
remediation system.
Click Submit to save.
Editing an External Remediation System User
The Edit External Remediation System User function allows for the modification of previously
configured external users.
To edit a previously entered external remediation system user
1
2
3
4
5
On the Remediation Users Management screen, click the Edit link for the user you want to
modify. The Edit External Remediation User screen is displayed.
Edit the user as desired.
Selecting “No Association” in the Preventsys User dropdown will clear the previous
Preventsys User association.
Click Verify to verify that the specified user is authorized to access the selected external
remediation system.
Click Submit to save.
Note: Modifying an external user’s Username or External System will result in all of the open
remediation tasks assigned to the old user/system being reassigned to the new user/system.
Deleting an External Remediation System User
The Delete External Remediation System User function allows for the removal of previously
configured external users. An external user cannot be deleted until all of that user’s unresolved tasks
(tasks that have not been changed to Claimed Resolve, False Positive, or Accepted Risk) are
reassigned. If you attempt to delete an external remediation system user with open tasks pending, the
system will display a message stating that all open tasks must be reassigned first. You may use the
Assign Remediation Tasks function described earlier in this chapter to reassign the selected external
user’s open tasks.
To delete an external remediation system user
1
2
3
On the External Remediation Users Management screen, click the Delete link for the user you
want removed. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected user.
111
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 9 | MANUAL AUDIT TASKS
CHAPTER 9
Manual Audit Tasks
Manual Audit Tasks (MAT) allow you to create, assign, track, and confirm manual security tasks.
Manual audit tasks allow for the support of policy rules that do not lend themselves to traditional
electronic solutions. For example many security rules are physical, such as locking doors, ensuring
that media is stored, etc. In other cases, an enterprise may wish to ensure that a backup was made of a
database or other external system that is not directly accessible to Preventsys. Manual audit tasks can
account for all of these scenarios through the definition of custom tasks, which may then be reported
upon and tracked in the Preventsys remediation system.
Manual audit tasks have two main stages “Incomplete” and “Complete”. A manual audit task is
considered “Incomplete” until it has both a schedule and at least one recipient. Once a manual audit
task has both of these, it is considered “Complete”.
The Preventsys SRM System ships with a selection of predefined manual audit tasks, which cover a
wide range of common tasks. Some of these manual audit tasks also have predefined schedules. You
may create your own manual audit tasks to account for additional scenarios.
All manual audit task administration is conducted from the Manual Audit Task Management screen.
To access the Manual Audit Task Management screen
1
Click Tasks > Manual Audit Tasks. The Manual Audit Task Management screen is
displayed.
Note: If you have tasks assigned to you, the My Tasks tab is displayed by default with your tasks listed.
Otherwise, the By Task tab is displayed.
From the By Task tab on the Manual Audit Task Management screen, you can view all Manual Audit
Tasks rolled up by assignees. From this screen you can also add new tasks, edit existing tasks, and
delete tasks. Note that by default, tasks on this screen are displayed in alphabetical order by name.
112
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 9 | MANUAL AUDIT TASKS
You can also use the Filter tab on the By Task and By Recipients views to filter tasks by Resolved,
Unresolved, Overdue, Future tasks and Incomplete tasks.
Note: Filtering by “Incomplete” is only available on the By Tasks view. In addition, selecting the
Future filter option with any other option will display only those future occurrences without a current
occurrence. Selecting the Future filter option by itself will display all future occurrences.
Figure 9-1. Manual Audit Task Management – By Task
You can conduct the same functions on By Recipients tab as you can on the By Tasks tab. The By
Recipients tab allows you to view a list of all tasks. Note that by default, tasks on this screen are
displayed in alphabetical order by name.
Figure 9-2. Manual Audit Task Management – By Recipient
113
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 9 | MANUAL AUDIT TASKS
From the My Tasks tab on the Manual Audit Task Management screen, you view details about the
individual tasks assigned to you and resolve them.
Figure 9-3. Manual Audit Task Management – My Tasks
Managing Manual Audit Tasks
Adding a Manual Audit Task
All manual audit tasks have an Audit Task Name, a Directive, and an Asset Value. The Directive
represents a text description of the manual audit task, including what the recipient must do to resolve
the task. The Asset Value is the dollar value assigned to those assets that are dependent upon the
manual audit task. For a tasks to be complete, it must also have recipients and a schedule. However,
neither recipients nor a scheduled is required to add the task.
All manual audit task schedules include a Due Date (or Start Date in the case of recurring schedules)
and an Assignment Date. The Assignment Date is the date upon which the manual audit task is
assigned to the specified recipients. Once the Assignment Date is reached, the manual audit task
becomes active and its status can therefore be updated by the recipients. On this date, recipients are
also sent emails notifying them of the task. If the recipient does not change the manual audit task’s
status to Resolved by the Due Date, the system automatically changes the task’s status to Overdue.
Manual audit tasks can be assigned to individuals as well as groups. If one user in the group changes
the status of a task, all other instances of the task change to that status as well.
The system will wait until a task has been assigned “and” has a schedule before actually assigning it,
and therefore allowing it to be seen and resolved by the assignees. When a manual audit task is
assigned that also has as schedule that can be run immediately (that is, it is not a task scheduled in the
future), the system will automatically generate email notifications informing the recipients that they
have manual audit tasks assigned to them. Recipients can then access and update the status of their
assigned manual audit tasks via the link provided in the email notification. Note that users associated
with external remediation systems will not receive email notifications.
In addition to the initial assignment of new manual audit tasks, individual occurrences of recurring
manual audit tasks may be edited to add new recipients or delete existing recipients.
114
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 9 | MANUAL AUDIT TASKS
To create a manual audit task
1
On the Manual Audit Task Management screen, click the Add New Task button. The Add
Manual Audit Task screen is displayed.
2
3
4
Enter the Task Name (100 characters maximum).
Enter the Directive.
Modify the default Asset Value of $1500 if desired.
Note: Even if the Manual Audit Task is not related to a specific asset, the Asset Value can still be
useful because it will aid in penalizing Manual Audit Type Policy Violations in exposure and risk
calculations.
5
Select the type of schedule you want the task to have: Schedule or Recurring Schedule.
ƒ
If you select Schedule Once, enter a Due Date for the task, or click on the calendar
icon and select a date.
ƒ
If you select Recurring Schedule, enter a Start Date for the task or click on the
calendar icon and select a date. Note that while the system will allow you to enter
dates such as February 31, it will still calculate and schedule the task correctly (e.g.
if you enter February 31, the system will use February 28; the last day of that
month).
Now set the Frequency of the schedule by selecting one of the following options:
»
Select Daily, and choose whether the manual audit task should occur “every
so many days”, Every ___ day(s), or Every weekday.
115
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 9 | MANUAL AUDIT TASKS
»
Select Weekly, and enter the number of weeks between occurrences, and
select whether the manual audit task should take place on Sun, Mon, Tue,
Wed, Thu, Fri, or Sat.
»
Select Monthly, and enter the Day of the month on which the manual audit
task should take place, the number of months between occurrences, and
select whether the Day setting should be based upon Weekdays or all Days.
»
Select Yearly, choose the month and day on which the manual audit task
should take place, and select whether the day setting should be based upon
Weekdays (Monday-Friday) or Days (Monday-Sunday).
Note: The Start Date is the date on which you want to make the schedule effective; however, it cannot
be earlier than today’s date. For example, if the start date is today, Monday, and your schedule is
every two weeks on Tuesday, then the first occurrence will be tomorrow, Tuesday, and the second
occurrence will be two weeks from tomorrow on Tuesday.
6
Specify how many Hours, Days, Weeks, or Months in advance of the Due Date the manual
audit task should be assigned using the Assign to Recipients controls.
Note: If the assignment date ends up being earlier than today’s date, then the assignment is sent out
immediately, assuming recipients have been assigned. For recurring schedules, you cannot schedule
an assignment date that would cause the next occurrence to be assigned before the previous
occurrence is due. In other words, only one occurrence of a manual audit task can be assigned or
“active” at any given time.
7
8
Click Calculate Schedule to display the schedule you created based upon the above data.
The screen will refresh to display the manual audit task’s proposed schedule.
Select the users or MAT groups you want assigned to the task from their respective lists and
click <. To delete a name, select the name and click >.
Note: Only users that belong to groups with the Resolve MATs permission are displayed in the
Available Users list.
9
Click Submit to save.
116
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 9 | MANUAL AUDIT TASKS
Editing a Manual Audit Task
When editing a Manual Audit Task, if you change the task’s directive and the task has a current
occurrence, than an email notification is sent to the recipients.
If the task had a schedule and recipients and you delete either of these, then the task becomes
Incomplete and all current and future occurrences are canceled. In addition, if the task has a current
occurrence, an email notification is sent to each recipient whose task state is “Unresolved” notifying
them that they are no longer responsible for the task.
When editing a task’s schedule, if the task has a “current” occurrence and you changed the due date,
then an email notification is sent to recipients telling them that the schedule has changed. Note that if
the you change the Assignment Date to be later than today’s date, then the “current” occurrence will go
away and be replaced by a “future” occurrence. An email notification will be sent to each recipient
whose task state is “Unresolved” notifying them that they are no longer responsible for the current
occurrence of the task.
When editing a task’s recipients, if a recipient is deleted then that recipient is deleted from both the
current and any future occurrences of the task. If the recipient’s status for the current occurrence of the
task is “Unresolved”, they will receive an email notification notifying them that they are no longer
responsible for the task.
See the “Email Notifications” section for details about which edits result in an email notification being
sent to a manual audit task recipient.
To edit a manual audit task
1
2
On the Manual Audit Task Management screen, click the Edit link for the task you want to
modify. The Edit Manual Audit Task screen is displayed.
Modify the task’s information, schedule, and recipients as desired.
Note: Manual Audit Task Names must be unique.
3
Click Submit to save.
Deleting Manual Audit Tasks
When you delete a manual audit task, you delete the actual task.
Note: You cannot use the “delete” function to delete individual occurrences (either current or future,
assigned or not assigned) of a task. See the “Edit Manual Audit Task” section for details about
adding and removing recipients and modifying the scheduled.
When a task is deleted, all current and future scheduled occurrences of the task are automatically
canceled. If the task has a current occurrence, then an email notification is sent to each recipient
whose task state is “Unresolved” notifying them that they are no longer responsible for the task. Task
states in the “Resolved” or “Overdue” state are not affected.
To delete an manual audit task
1
2
3
On the Manual Audit Task Management screen, click the Delete link for the task you want
removed. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected task and all of its scheduled occurrences.
117
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 9 | MANUAL AUDIT TASKS
Updating Manual Audit Tasks
Once a manual audit task is “Complete” (has both a schedule and at least one recipient) and its
assignment date has passed, its current occurrence can be viewed and its status updated by the
recipient(s). The status of Future Tasks (occurrences of tasks for which the assignment date has not
yet passed), cannot be updated. Once a task is “Overdue”, it cannot be resolved.
Updating the Status of a Manual Audit Task
To update the status of a manual audit task assigned to you
1
2
3
On the Manual Audit Task Management screen, select the My Tasks tab. All tasks assigned
to you are displayed. Use the Filter tab to view only Unresolved, Resolved, Overdue, or
Future.
Change the status of the desired task to Resolved.
Click Submit to save your updates.
Manual Audit Task Email Notifications
The Preventsys SRM System will send email notifications to recipients about their manual audit tasks
whenever the following conditions are met.
»
An email notification will be sent to the manual audit task recipients on the Assignment Date
of each occurrence of a recurring task or on the first occurrence of a single occurrence task.
»
An email notification will be sent to the manual audit task recipients when the Task Directive
of a Complete Task is changed if there is a Current Occurrence.
»
An email notification will be sent to the manual audit task recipient(s) when a Complete Task
is changed to an Incomplete Task.
»
An email notification will be sent to the manual audit task recipient(s) when a Complete Task
is deleted.
»
An email notification will be sent to the manual audit task recipient(s) when the schedule of a
Complete Task is changed such that the Assignment Date is later than today’s date.
»
An email notification will be sent to the manual audit task recipient(s) when the due date of a
task for which there is a Current Occurrence is changed.
Managing Manual Audit Task Recipient Groups
Manual audit tasks can be assigned to individuals as well as groups. A group can have as many
members as desired, but must have at least one member. Note that the system will wait until a task has
been assigned “and” has a schedule before actually assigning it, and therefore allowing it to be seen
and resolved by the assignees. When one user in the group changes the status of a task, all other
instances of the task change to that status as well.
All manual audit recipient group administration is conducted from the Manual Audit Task Recipient
Groups Management screen.
To access the Manual Audit Task Recipient Groups Management screen
1
Click Tasks > Manual Audit Recipient Groups. The Manual Audit Task Recipient Groups
Management screen is displayed.
118
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 9 | MANUAL AUDIT TASKS
From the Manual Audit Task Recipient Groups Management screen, you can add new groups, edit
existing groups, and delete groups.
Adding a Recipient Group
To add a recipient group
1
On the Manual Audit Task Recipient Groups Management screen, select the Add New
Group button. The Manual Audit Task Recipient Group screen is displayed.
2
3
4
Enter the Group Name.
You may enter a Description (optional) for the new recipient group.
Highlight a user(s) from the list on the right-hand side of the screen and click < to add the
selected users to the group. To delete recipients, select them and then click >.
Note: Only users that belong to groups with the Resolve MATs permission are displayed in the
Available Users list.
5
Click Submit to save the new recipient group.
119
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 9 | MANUAL AUDIT TASKS
Editing a Recipient Group
Deleting a member from a group will delete that member from all current occurrences and any future
occurrences of the Manual Audit tasks to which the group is assigned. If the member’s status for any
current occurrences was Overdue or Resolved before they were deleted, the member will be displayed
on the Manual Audit Tasks screen when Complete Tasks and Recipient view is selected. The deleted
member will no longer be able to update tasks to which the group they belonged to was assigned.
To edit a recipient group
1
2
3
On the Manual Audit Task Recipient Groups Management screen, click the Edit link for the
group you want to modify. The Edit Recipient Groups screen is displayed.
Edit the Recipient Group as desired.
Click Submit to save the modified recipient group.
Deleting a Recipient Group
Deleting a Recipient Group will remove that group from all current occurrences and any future
occurrences of tasks to which it is assigned. Members will no longer be able to update tasks to which
the group was assigned. Members, whose status was Overdue or who changed the status of any
current occurrences of their tasks to Resolved before the group was deleted, will be displayed on the
Manual Audit Tasks screen when Complete Tasks and Recipient view is selected.
To delete a recipient group
1
2
3
On the Manual Audit Task Recipient Groups Management screen, click the Delete link for the
group you want removed. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deletes the selected group.
About Manual Audit Task Rules and Policy Violations
Manual Audit Tasks may also be incorporated into policies via the PolicyLab Client using special
Manual Audit Task Rules. In this manner, Manual Audit Tasks may be used to generate Manual Audit
Task Policy Violations that can be tracked through remediation tasks.
Manual Audit Tasks do not require a schedule or recipient assignments to be used in Manual Audit
Task rules and policies. The Manual Audit Task Policy Violations generated by Manual Audit Task
Rules will be included in the following reports: Executive Summary Standard and Trending, Task
Standard and Trending Report, Exposure Overview Report, and Task Recipient Standard and
Trending. See the Preventsys PolicyLab Guide for details about working with Manual Audit Task
Rules.
Verification of Manual Audit Task Policy Violations
When a Manual Audit Task Rule fires because the criteria set by it is not met by the associated Manual
Audit Task, the result is a Manual Audit Task Policy Violation. This policy violation, is always
associated with the first assessment that finds it even if it is found by multiple assessments. This is
important to note when filtering by Assessment Name on the Remediation Task Management screen.
See the “Remediations” chapter for details about filtering remediation tasks.
120
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 9 | MANUAL AUDIT TASKS
It is also import to note that the system looks at the state of Manual Audit Tasks when an assessment
starts. Therefore, even if you modify a Manual Audit Task such that it should not fire a Manual Audit
Task Policy Violation (e.g., you make sure it is assigned, scheduled, and not overdue), that Manual
Audit Task can still cause a Manual Audit Task Policy Violation to be created or reopened. This can
happen if you modified the Manual Audit Task “after” the start of an assessment that uses a policy
which contains the associated Manual Audit Task Rule. If this occurs, simply rerun your assessment,
and the Manual Audit Task Policy Violation should be verified.
121
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
CHAPTER 10
Security Risk Dashboard
The Security Risk Dashboard allows you to get quick, simple access to the information you need and
the application controls used most frequently. If you have the Preventsys Threat Intelligence license,
you can also receive timely, actionable and comprehensive security analysis and notification about the
latest cyber threats, including the threats and vulnerabilities that affect your networks the most and
overall exposure levels. The Security Risk Dashboard also provides a snapshot of policy compliance
and the top outstanding remediation tasks, as well as your personal task list.
The Security Risk Dashboard is comprised of the following consoles. Details about each console are
provided in this chapter.
»
Enterprise Console
»
Exposure Console
»
Compliance Console
»
Threat Console
»
Remediation Console
»
Assessment Console
122
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
Clicking on logo
returns you to the
Dashboard
Enterprise
Compliance
Console
Exposure
Console
Enterprise
Trending Console
Network Group
Compliance
Console
Threat
Console
Remediation
Console
Assessment
Console
The Dashboard is displayed when you login to the Preventsys SRM System. You can also click on the
Preventsys logo or Home menu tab during any operation to return to the Dashboard.
Note: Much of the data displayed on the Dashboard is based on the results of assessments. You can
specify the assessment data you want displayed as well as ignored using the Enterprise Group feature.
See the “About Enterprise Groups” section for details.
123
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
About the Enterprise Console
Viewing Enterprise Compliance and Enterprise Trending Portlets
The Enterprise Compliance and Enterprise Trending portlets are scaled-down views of the Enterprise
Group Summary report, which you can access quickly by clicking on either of these portlets. The data
displayed in these portlets is filtered based on the active Enterprise Group. See the “About Enterprise
Groups” section for details about Enterprise Groups.
About the Exposure Console
On the Exposure console, you can view a snapshot of the current exposure of your networks based on
current vulnerabilities, the financial impact and operational impact of the affected assets, and severity
of those vulnerabilities. The data displayed in this console is filtered based on the active Enterprise
Group.
Clicking on the Exposure graph will display the Exposure Summary report, which provides additional
trending details about your exposure.
»
Exposure – An enlarged view of the graph displayed on the Exposure console.
»
Issues and Remediations over Time – Presents the number of issues over time.
»
Average Resolution Time – Presents the average resolution time of assigned remediation
tasks over time. Resolution time is the difference between the time the task was assigned to a
remediator and the time its status was changed to Claimed Resolved, False Positive, or
Accepted Risk.
124
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
About the Compliance Console
The Compliance portlet provides snapshots of analyses which you have “promoted” to the dashboard
via the Comparative Compliance Report. Note that the promoted view will always show the most
recent data for the selected analysis families. Therefore, if the user attempts to promote different
analyses from the same analysis family on the Comparative Compliance report, they will only see the
most recent in the Compliance portlet. Clicking on one of the charts in the portlet opens the
Comparative Compliance report with all the promoted assessments displayed. You can promote
additional assessment via this report as well as delete currently promoted ones by selecting the
“Dashboard+” and “Dashboard-“ buttons, respectively.
125
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
About the Threat Console
The Threat console is only available to users with the Preventsys Threat Intelligence license. This
subscription service is a near real-time information feed that provides actionable information for all
aspects of the threat horizon - from vulnerability announcements to patches, to exploit code and global
port scanning, through virus announcements and variants.
Preventsys combines the external intelligence of different sources of information, in a way that can be
automatically associated by the system, to knowledge about your corporate network’s current security
posture. This information contains technical and descriptive information and analysis, remediation
actions, and threat rules that can be directly applied to your network to pinpoint problems; often before
a signature file is available for a scanner. The Threat Intelligence Connector feed includes vendor
vulnerability announcements, as well as information from sources like CVE, Open Source
Vulnerability Database, subscription intelligence services, and Preventsys’ own in-house security
experts.
All of this results in prioritized and actionable remediation tasks based on threat severity and your
exposure to it for your highest valued asset.
Threat alerts are categorized into the following categories:
»
Actionable – By reviewing network assessment results, the Preventsys SRM System
determined that at least one of your assets is vulnerable to this threat alert. As a result,
remediation tasks associated with this threat are associated with the threat alert. As long as at
least one remediation task associated with the threat remains unresolved, the threat itself will
remain Actionable.
»
Remediated – All remediation tasks associated with this actionable threat alert were
fixed, and therefore your related assets are no longer vulnerable.
»
Non-Actionable – The Preventsys SRM System determined that your assets are not
vulnerable to this threat alert.
This message
displayed if
system cannot
receive latest
threat feed
Viewing the Latest Threat Alerts
From the Threat console, you can view a list of the latest five threat alerts by clicking on the Latest
Threats tab. The latest five threat alerts are displayed and ordered by the date received, and then by
severity.
Viewing the Top Threat Alerts
From the Threat console, you can view a list of the latest five threat alerts that the Preventsys SRM
System has determined would put your networks at risk of exposure by clicking on the Top Threats
tab. These types of threat alerts are considered “actionable”. Because each actionable threat alert is
associated with a remediation task, you can prioritize and track their resolution. If there are no
actionable threats, then the latest threats are displayed. See the “Remediations” chapter for details.
Viewing All Threat Alerts
From the Threat console, you can view all threat alerts received to date by clicking on the Details
tab ». All threat alerts received are displayed, ordered by date, and filtered to show the last 30 days of
126
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
data based on the date of the latest threat alert received. There is no additional filtering based on
Enterprise Group (see the Filtering section for details about filtering based on Enterprise Group). You
can change the filter to show any range desired, but note that larger ranges may take longer to calculate
and display. The All Threats screen also displays the number of threats out of the possible number of
threats that exist. Note that this number reflects the 30-day filter. Select the Filter Options tab to
specify a new filter.
This message
displayed if
system cannot
receive latest
threat feed
How Threat Alerts Affect Remediation Tasks
When actionable threat alerts are identified, the Preventsys SRM System automatically reviews the
current set of remediation tasks to determine if there is a similar task, which addresses the
vulnerability. If it finds such a task that does not have the Verified status, it alters that task’s severity
and adds details about the threat to its description and solution as needed.
127
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
How Severity Is Adjusted By Threat Alerts
The severity of a Vulnerability type remediation is determined by the severity set by the scanner that
detected that vulnerability. The severity of remediation tasks associated with threats can be adjusted
(raised or lowered) based on several things.
Each time the severity or the lifecycle phase of a threat alert, which is associated with a remediation
task increases or advances, the severity of that remediation task increases. Each time the severity or
the lifecycle phase of a threat alert, which is associated with a remediation task decreases, the severity
of that remediation task decreases. When a threat alert is associated with a remediation task for the
first time, the severity of that remediation task will increase.
In addition, a remediation task’s severity can be adjusted by an Exposure rule. Refer to the Preventsys
SRM System Policy Reference Guide for a list of exposure rules.
Filtering the List of All Threat Alerts
You can filter the list of all threat alerts in a variety of ways by using the Filter Options tab. Filters
you create can also be saved for later use.
Note: The list of all threats is automatically filtered to show the last 30 days. To view another date
range, simply enter a starting and ending date in the Date fields. Please note that larger ranges may
take longer to calculate and display.
To filter the threat alert list
1
On the list of all threats, click the Filter Options tab.
2
Enter data for the options you want to use.
Note: Text string fields are case sensitive. For example, entering “spybot*” for the threat name will
not return “Spybot…”.
3
Click Apply Filter.
128
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
Note: To see all actionable threats select the “actionable” option for the Status filter. To see only
threats related to the Enterprise Group, select the “actionable” option for the Enterprise group filter.
See the “About Enterprise Groups” section for details about using the Enterprise Group.
4
The list of threat alerts is displayed based on the filter selected.
Note: Selecting the “Remediated” filter option will return both remediated threats as well as partially
remediated threats (referred to as Actionable threats). As long as at least one remediation task
associated with a threat remains unresolved, the threat itself will remain Actionable.
Saving a Filter
You can select various filter options that will change the types of data displayed. For example, you
can filter by actionable threats. To save a filter, enter the filter’s name in the Save as Filter box (400
characters maximum), and click Save and Apply Filter.
You can also create a new filter based on an existing filter by applying a saved filter, modifying the
filter options as desired, and then changing that filter’s name and clicking Save and Apply Filter.
Applying a Saved Filter
You can load filters you have saved and apply them to the list of all threats list. Note column settings
are not saved with a filter. To apply a saved filter, select the filter’s name from the Load Filter
dropdown, click Load, and click Apply Filter.
Editing a Saved Filter
You can edit filters you have saved. To edit a saved filter, select the filter’s name from the Load
Filter dropdown, click Load, edit the filter including the filter’s name as desired, and then click Save
and Apply Filter.
Note: Remember that if you change the name of the filter you are editing, a new filter with that name
is created when you click Save and Apply Filter. The initial filter you selected is not deleted or
modified in any way.
Deleting a Saved Filter
Deleting a saved filter does not alter the threats displayed. To delete a saved filter, select the filter’s
name from the Load Filter dropdown, click Load, and click Delete Filter.
Viewing Different Columns of Data for All Threat Alerts
You can choose different columns of data to view for the list of all threat alerts by using the Column
View Options tab.
Note: Column options are not saved with filters. Saved filters use the system’s default column set.
129
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
To choose a column
1
On the list of all threats, click the Column View Options tab.
2
3
4
Select the data that you want to show.
Click Apply View Choices.
The list of threat alerts is displayed with the data you selected.
Viewing Details about a Threat Alert
From the Threat console, you can view all threat alerts received to date.
To view details about a threat alert
1
2
From the Threat Alert console, click on the name of a threat alert.
Click the individual tabs to view detailed information about the threat alert.
130
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
Main Tab
The Main tab displays the description of the threat alert.
Threat Lifecycle Tab
The Threat Lifecycle tab displays a graph that shows the current phase the threat is at within the threat
lifecycle: Advisory, Exploit Discovered, and Threat Active in Wild. Note that these phases can occur
in any order. Each of these phases has an associated probability of incident (likelihood that you will be
affected if the threat is actionable).
131
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
The following events are also displayed on the threat lifecycle graph:
»
At Risk – The date it was determined that your network was at risk of exposure from the
threat.
»
Patch Available – The date it was determined that your network was no longer at risk of
exposure from the threat.
»
Fixed – The date it was determined that your network was no longer at risk of exposure from
the threat.
132
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
Exposure Tab
The Exposure tab displays a graph that depicts the system’s exposure based on the financial and
operational impact on the affected assets based on this threat.
Assets Tab
The Assets tab displays the number of assets at risk for this threat. This means the number of assets to
which the system was able to correlate the threat. Also displays each asset’s financial and operational
impact.
Note: If you are a member of the Super User group, then all assets are displayed. Otherwise, only
assets within the range of the network permissions of the groups to which you belong are displayed.
133
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
Tasks Tab
The Tasks tab displays the remediation tasks associated with the threat.
Note: If you are a member of the Super User group, then all applicable remediation tasks are
displayed. Otherwise, only applicable remediation tasks associated with hosts that are within the
range of the network permissions of the groups to which you belong are displayed.
Viewing Details about Assets
Many of the consoles and tabs present asset data. You may view details about these assets by clicking
on an asset Name or IP Address in those areas and viewing the Asset Summary screen. For example,
select the Threat Details > Assets tab, and then click on an asset Name or IP Address.
The Asset Summary screen displays the issues (vulnerabilities and policy violations) associated with
the selected asset as well as service information.
Note: If you are a member of the Super User group, then all tasks are displayed. Otherwise, only tasks
are associated with hosts that are within the range of the networks to which you are associated via
your user group(s).
134
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
If an issue contains coalesced vulnerabilities, the descriptions and solutions for that issue will be
grouped by scanner name and the associated test ID and test name. In addition, if some of the
coalesced vulnerabilities were not found again during the latest assessment, they are listed under the
“Previously Found” heading. If they were found (or found again) during the latest assessment, they are
listed under the “Found” heading.
About the Remediation Console
The Remediation console is comprised of the following two areas:
Latest Tasks
The Latest Tasks console displays the five latest remediation tasks with a status of Unassigned,
Assigned, False Positive, or Accepted Risk, listed in descending order by date found, followed by
priority in descending order, followed by Issue ID in ascending order. This list can be additionally
filtered by the active Enterprise Group.
Note: If you are a member of the Super User group, then all applicable remediation tasks are
displayed. Otherwise, only applicable remediation tasks associated with hosts that are within the
range of the network permissions of the groups to which you belong are displayed.
Click the details tab » to view the Remediation Management screen where you can view and assign
the task as well as view its status. Note that tasks are automatically filtered by the active Enterprise
Group when the Remediation Management screen is accessed in this way. Use the Filter Options tab
on the screen to turn off Enterprise Group filtering.
My Tasks
The My Tasks console displays the five highest priority tasks in descending order by date found,
assigned to you (the logged in user), that have a status of Assigned, False Positive, or Accepted Risk.
Click the details tab » to view the Remediation Update screen where you can update your status.
135
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
Viewing Details about a Remediation
You can view details about a remediation task by clicking on a Task Name. See the “Remediations”
chapter for details about the Remediation Details screen.
About the Assessment Console
The Assessment console presents the latest assessments conducted by the system. Remember that
assessments that have been “hidden” are not displayed. See the “Assessments” chapter for details
about hiding assessments. Click the details tab » to view the View Assessment Status screen which
displays all assessments.
Note: If you are a member of the Super User group, then all applicable assessments are displayed.
Otherwise, only applicable assessments associated with network groups made up completely of
networks that are within the range of the network permissions of the groups to which you belong are
displayed.
You can view details about an assessment by clicking on the View Details link for an assessment. See
the “Assessments” chapter for details about the Assessment Details screen.
About Enterprise Groups
An Enterprise Group allows you to specify which assessment configurations you want the system to
include results from and which ones you want the system to ignore. For example, if you create a test
network and do not want assessment data from it displayed or utilized. You can create an enterprise
group that does not include any of the assessment configurations associated with that test network.
When an Enterprise Group is activated, the system selects the latest analysis for each policy/network
group combination from the latest version of each assessment configuration in the active Enterprise
Group, and then only uses those analyses that correspond to the policies currently selected in those
assessment configurations. For example, create an assessment configuration with two policies. When
that assessment configuration is run, it will result in two analyses (one for each policy). Now edit that
assessment configuration such that only one of those policies is now selected. Now the system will
only use the analysis associated with the policy that is still selected. If both policies are deselected,
then no analyses are used.
If you do not have an active Enterprise Group, the system will use the results from the latest analysis
for each policy/network group combination from the latest version of each assessment configuration
“in the system” verses just a subset defined in an enterprise group.
136
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
Several areas in the Preventsys SRM System are Enterprise Group Centric, and therefore use the query
described in the previous paragraphs to determine what data is displayed as well as what data is used in
calculations whose results are displayed. The following areas are considered enterprise group centric:
»
Top Threats – Actionability is determined base on enterprise group
»
Latest Threats – Actionability is determined base on enterprise group
»
All Threats – Actionability is determined base on enterprise group (filter option available to
see actionability not based on enterprise group)
»
Threat Details Exposure Tab – Graph calculated based on enterprise group
»
Latest Tasks – Tasks displayed based on enterprise group
»
Asset Summary – Tasks displayed based on enterprise group
»
Enterprise Group Summary Report - Calculated based on enterprise group; includes the
Enterprise Compliance pie chart and trending graph on the Dashboard
»
Exposure Summary - Calculated based on enterprise group; includes the Exposure graph on
the Dashboard
All enterprise group administration is conducted from the Enterprise Groups Management screen.
To access the Enterprise Groups Management screen
1
Click Assessments > Enterprise Groups. The Enterprise Groups Management screen is
displayed.
From the Enterprise Groups Management screen, you can add new groups, copy and edit existing
groups, activate a group, and delete groups.
Note: If you are a member of the Super User group, then all enterprise groups are displayed.
Otherwise, only enterprise groups, made up completely of assessment configurations, associated with
network groups, made up completely of networks that are within the range of the network permissions
of the groups to which you belong are displayed.
137
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
Creating an Enterprise Group
Create an enterprise group when you want to define which assessments the system will utilize to
display data on the Dashboard. You can create multiple enterprise groups, however only one group
can be active at a time. Remember that if you do not create and activate your own enterprise group,
the system will use all assessments as the default. When an enterprise group is activated, only the
latest analysis for each policy/network group combination from the latest version of each assessment
configuration in the enterprise group are utilized.
To create an Enterprise Group
1
On the Enterprise Groups Management screen, click the Add Enterprise Group button. The
Add Enterprise Group screen is displayed.
2
3
4
Enter an Group Name (100 characters maximum and must be unique).
Enter an Description (256 characters maximum).
Select the Assessment Configurations you want in the enterprise group from the Available
list and click the < button to add them. They will be added to the In Group list.
Note: If you are a member of the Super User group, then all assessment configurations are displayed.
Otherwise, only assessment configurations associated with network groups made up completely of
networks that are within the range of the network permissions of the groups to which you belong are
displayed.
5
Click Submit to save. Remember that you must “activate” the group before it will be utilized
by the system.
Editing an Enterprise Group
To edit an Enterprise Group
1
2
3
On the Enterprise Groups Management screen, click the Edit link for the group you want to
modify. The Edit Enterprise Group screen is displayed.
Edit the group as desired. To remove assessment configurations from the enterprise group
select them from the In Group list and click the > button to remove them.
Click Submit to save.
138
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 10 | SECURITY RISK DASHBOARD
Activating and Deactivating an Enterprise Group
After you create an enterprise group, it must be activated before it will be utilized by the system.
Remember that you can create multiple enterprise groups, however only one group can be active at a
time. If you do not activate an enterprise group, the system will use all the assessments as the default.
To activate and deactivate an Enterprise Group
1
2
3
4
5
6
On the Enterprise Groups Management screen, click the Activate link for the group you want
activated. A confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the group is activated and the icon turns color
. The link changes to
Deactivate. The system will now filter the data displayed on the ES Dashboard by this group.
To deactivate a group, click on the Deactivate link for the desired active group. A
confirmation popup box is displayed.
Select OK to continue or Cancel to quite.
If you selected OK, the system deactivates the selected group.
139
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
CHAPTER 11
Reports
The Preventsys SRM System provides many reports that allow you to view the state of your networks
with respect to policy violations, vulnerabilities, remediation tasks, and general compliance on a per
analysis basis. An analysis is generated after an assessment is completed and will “only” be created if
a policy was selected.
An assessment generates one analysis for each policy applied to the assessment, so a single assessment
can potentially generate multiple analyses. The analysis includes facts found about the assets assessed
as well as policy violations and vulnerabilities. Each Analysis includes the assessment configuration
name, policy name and version, network group, and a date and time indicating when the assessment
was performed. Many of these reports also provide trending data between two like analyses (analyses
that used the same assessment configuration).
The following are brief summaries about the reports. For details, refer to their individual sections in
this chapter.
Executive Summary: The Executive Summary reports provide a detailed overview of the assessed
network group with differential trending analysis. This is an ideal starting point for reviewing new
assessment results. The Asset Details reports can also be accessed from this report by clicking on a
specific asset
Enterprise Group Summary: The Enterprise Group Summary report, accessible via the Executive
Compliance and Enterprise Trending Dashboard consoles, is enterprise group centric and therefore
shows the aggregated results based on the active enterprise group. See the “Security Risk Dashboard”
chapter for details about Enterprise Groups.
Administrator: The Administrator overview lists all administrators, providing the email address and
network group assignments for each.
Network Group: The Network Group reports provide detailed information about the network groups
included in the selected assessment.
Network: The Network reports provide in-depth information about a selected network, including a
table listing all of the assets on the selected network, along with their IP addresses, operating systems,
number of policy violations, and number of vulnerabilities. This is an ideal report for reviewing the
status of an individual network.
Assets: The Assets reports are similar to the Network reports except you can filer the report by a
specific host in the network group. The Asset Details report can also be accessed from this report.
Asset Details: The Asset Details reports provide detailed information about a selected asset, listing its
IP address, operating system, network association, administrators, services, policy violations, and
vulnerabilities. This is the definitive report for reviewing the status of an individual asset. The
Chronological View report can also be accessed from this report.
140
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Chronological View: The Chronological View (accessible from the Asset Details Standard Report)
provides detailed information about scan analysis, vulnerability history, administrator history, and
network association specific to a selected asset. This is an ideal report for reviewing the history of an
individual asset.
Operating System: The Operating System reports provide in-depth information about all of the assets
utilizing a selected operating system in the assessed network group. This is an ideal report for
reviewing the status of all assets running a selected operating system.
Task: The Task Standard and Trending reports provide snapshot and trending information about all
remediation tasks addressing policy violations and vulnerabilities in the assessed network group. This
is the definitive report for tracking remediation status and effectiveness.
Task Aging Summary: The Aging Summary provides information about remediation tasks that are
overdue, the number of days since found, and the number of days since assigned using the enterprise
group. See the “Security Risk Dashboard” chapter for details about Enterprise Groups.
Task Rollup by Violation and Vulnerability: The rollup reports provide information about the
number of vulnerability type and violations type remediations per network group using the enterprise
group. See the “Security Risk Dashboard” chapter for details about Enterprise Groups.
Task Recipient: The Task Recipient reports provide current information about the status of
remediation tasks assigned to specific administrators.
Compliance: The Compliance report presents basic compliance data derived from the number of
violations, rules, and assets associated with the selected analysis.
Comparative Compliance: The Comparative Compliance report allows for the comparison of
multiple analyses, and for the viewing of more than one report/analysis combination at once.
Exposure: The Exposure report identifies how long individual vulnerabilities and policy violations
were active on the assessed network group. This is a critical report for analyzing the potential risk
associated with detected policy violations and vulnerabilities.
Services: The Services reports provide in-depth information about all services detected on the
assessed network group, identifying all assets running the selected service. This is an ideal report for
reviewing the usage of a particular service.
Wireless Access Points: The Wireless Access Points report provides detailed information about all
machines connected to the assessed network group via wireless networking. This is the definitive
report for monitoring the activity of all assets connected via wireless networking.
Working with the Report Filter
The Report Context appears at the top of most reports and allows you to select the analysis for which
you want to view information. The Report Context Filter allows you to filter the list of analyses
displayed in the Report Context. An Analysis is generated after an assessment is run. An assessment
will generate one Analysis for each policy applied to the assessment, so a single assessment can
potentially generate multiple Analyses. Each Analysis includes the assessment configuration name,
policy name and version, network group, and a date and time indicating when the assessment was
performed.
Note: An analysis always includes a policy. Therefore, if you do not select a policy when you
configure your assessment, the results of that assessment will not be displayed in the Report Context.
141
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
The Preventsys SRM System automatically sets the defaults for the Report Context and the Report
Context Filter based on the latest analysis conducted. See the “System Default for the Report Context
Filter” section for details.
Figure 11-1 Report Context for a Standard Report
Note: If you are a member of the Super User group, then all applicable assessments are displayed.
Otherwise, only applicable assessment with network groups made up completely of networks that are
within the range of the network permissions of the groups to which you belong are displayed.
For Trending reports, an expanded Report Context is provided to include both a Starting Analysis and
an Ending Analysis selection, which allows you to view differential data between the two analyses.
Figure 11-2 Expanded Report Context for a Trending Report
Note: Selecting a Starting Analysis that utilized different scanners than the Ending Analysis, may
result in inconsistent results relative to the number and types of vulnerabilities and policy violations
reported.
The Report Context can be changed by selecting the Modify Filter link. This link displays the Report
Context Filter screen, which consists of a Date Filter (Starting Date and Ending Date), a Policy Filter,
and a Network Group Filter.
Note: If you are a member of the Super User group, then all network groups are displayed in the
Network Group Filter dropdown list. Otherwise, network groups made up completely of networks that
are within the range of the network permissions of the groups to which you belong are displayed.
Figure 11-3 Report Context Filter
When you select a report for the first time, the System automatically sets the Report Context Filter and
the Report Context as described in the following sections.
142
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
System Default for the Report Context Filter
The Report Context Filter is automatically configured based on the latest analysis and the associated
policy and network group.
»
Ending Date Defaults to the date of the latest analysis.
»
Starting Date Defaults to the date on which the earliest equivalent analysis was completed.
Equivalent analyses are those where the assessment configuration name, policy name, and
network group are the same. The version of the policy however can be different.
Note: The Start Date and End Date can be the same if the completion date of the earliest equivalent
analysis is the same as the completion date of the latest analysis.
»
Policy List defaults to all policies that were applied between the Start and End Dates. The
Policy associated with the latest analysis is automatically selected.
»
Network Group List defaults to all network groups that the selected Policy was applied to
between the Start and End Dates. The Network Group associated with the latest analysis is
automatically selected.
System Default for the Report Context
The Report Context is automatically configured based on the default Report Context Filter settings.
For Standard Reports, the latest analysis is automatically selected, and the Analysis dropdown list is
populated with all equivalent analyses that occurred during the selected Start and End Dates.
For Trending Reports, the latest analysis is automatically selected for the Ending Analysis, and the
dropdown list is populated with all equivalent analyses whose analysis date is equal to or greater than
the earliest equivalent analysis (the analysis selected for the Starting Analysis). The earliest equivalent
analysis is automatically selected for the Starting Analysis, and the dropdown list is populated with all
equivalent analyses whose analysis date is equal to or less than the latest equivalent analysis (the
analysis selected for the Ending Analysis).
The System continues to use the default Report Context Filter and the Report Context until you modify
the filter.
Modifying the Report Context Filter
To modify the report context filter
1
2
3
Click Reports and select a specific report from the menu.
Click the Modify Filter link.
The Report Context Filter screen is displayed.
143
PREVENTSYS™ SRM USER’S GUIDE
4
5
6
7
CHAPTER 11 | REPORTS
Enter a Starting Date in the appropriate field, or click the accompanying calendar control to
enter the date using a graphical calendar.
Enter an Ending Date in the appropriate field, or click the accompanying calendar control to
enter the date using a graphical calendar.
Select a Policy Filter from the dropdown menu. Note that the Policy Filter only contains
those policies that were applied to an assessment between the selected Starting and Ending
Dates.
Select a Network Group Filter from the dropdown menu. Note that the Network Group
Filter only displays those network groups to which the selected Policy was applied between
the selected Starting and Ending Dates.
Note: If you are a member of the Super User group, then all network groups are displayed. Otherwise,
only network groups made up completely of networks that are within the range of the network
permissions of the groups to which you belong are displayed.
Click Apply Filter to utilize the selected context filter, or click Cancel or Restore Defaults.
The Report Context displays all analyses that match the Report Context Filter settings. That
is all analyses conducted between the Starting and Ending Dates that utilized the selected
policy and network group.
10 On the Report Context, the system automatically selects the latest analysis for you. For
Trending reports, the system also selects the earliest equivalent analysis.
8
9
Note: For Trending Reports, the analysis you select in the Ending Analysis is driven by what you select
for the Starting Analysis. The Ending Analysis will always be equal to or greater than the date of the
analysis selected for the Starting Analysis. By default, the latest analysis will automatically be
selected as the Ending Analysis and the earliest equivalent analysis will automatically be selected as
the Starting Analysis.
144
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Calculating Compliance
Preventsys uses a violation centric algorithm to determine the compliance of your assets. Details about
the data and formulas Preventsys uses to calculate asset compliance are provided in this section.
Term
Definition
Number of Assets
This is the total de-duped number of assets for a given grouping (network,
network group, enterprise group).
Distinct Rules
This is a count of all “unique” rules that could yield policy violations. Note that
“Violation of Network Policy” and “Host Compromised” are currently the only
two rule types that can create policy violations, and therefore, the only types
counted.
This is the count of all unique asset violations for the given grouping of assets
(e.g. individual asset, network, network group, exec summary, enterprise group).
Note that on Executive Summary and Executive Trending reports the grouping is
actually “by network group”. On the Enterprise reports, the grouping is “all
network groups in the enterprise group”.
Asset Violations
Possible Asset Violations
This is a count of all possible asset violations that could have been generated for
the set of assessments being considered and is used as a component of the
denominator in several calculations. This value is calculated using the following
formula:
Distinct Rules * Number Of Assets
MAT Violations
This is the count of all violations associated with manual audit tasks. It is
important to understand that MAT violations are not associated with assets and
therefore do not belong in any report that is purely asset-group based. For
example, the asset details, network, and network group reports are all purely asset
based and therefore do not include MAT violations. On the other hand, executive
summary and enterprise reports are “assessment based” and do include MAT
violations.
Possible MAT Violations
This is a count of all possible MAT violations, which could have been generated,
and is used as a component of the denominator in several calculations. Due to
the nature of MAT policy rules, the formula for calculating possible MAT
violations is somewhat complex.
Latest Distinct Analysis
The latest analysis for each unique policy/network group combination for which
there is currently both an associated network group and policy selected in the
assessment configuration.
When the assessing phase of an assessment is conducted, the returned scan result
is for the network group selected in the associated assessment configuration.
When the analyzing phase of an assessment is conducted, a separate analysis is
returned for each policy selected in the associated assessment configuration. To
determine the “latest distinct analyses” for an assessment configuration, the
system looks at the policies and the network group selected in the assessment
configuration and then gathers the latest analysis for each of those policies for
that network group and assessment configuration.
For example, assessment_config1 has networkgrp1 and two policies selected.
Therefore, when an assessment is run using assessment_config1, a scan result for
networkgrp1 and two analyses (one for each policy selected) will result. If
Assessment_config1 is then edited such that one of the two policies is deselected,
leaving only one policy selected, only the analysis associated with the policy still
selected will be used. Note that if both policies are deselected, then no analyses
are used.
145
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Note: Average Compliance is the formula used by the system by default and is based on an average
percentage of compliance using violations only (see definition in following table). Boolean
Compliance is an optional formula, which counts the number of assets that are 100% compliant (do
not have any violations or vulnerabilities) and divides by the number of total assets. Therefore, if at
least one violation or vulnerability is found for an asset, that asset is considered noncompliant. The
Boolean formula must be turn on by modifying certain files and doing a redeploy. See your Preventsys
Support Representative for details.
Formula
Definition
Equation
Reports
Asset
Compliance
Asset compliance is calculated
based on distinct violations;
vulnerabilities are not
considered
(asset violations) /
(possible asset
violations)
Asset Details
Network
Compliance*
Average compliance for all
assets that lie within the
specified network for a given
analysis
Sum(asset compliance)
/ (number of assets)
Network, Asset
Standard
Network Group
Compliance*
Average compliance for each
asset considered to be in the
network group. Note that only
distinct violations are counted.
Sum(asset compliance)
/ (number of assets)
Network Group,
Comparative
Compliance, Operating
System
Total
Compliance**
Includes both asset and MAT
based violations. Note that the
Executive reports consider a
single network group and
policy combination while
Enterprise Group may contain
multiple.
Sum(asset violations) +
Sum(mat violations) /
(possible asset
violations * number of
assets) + (possible Mat
violations))
Enterprise Group
Summary*, Executive
Summary**
*This is applied against all “Latest Distinct Analyses” based on the latest version of each assessment configuration
in the active enterprise group. If there is no active enterprise group, then it is applied based on the latest version of
each assessment configuration in the system.
**A network group can be considered non-compliant if there are MAT violations even if its individual assets do
not show any policy violations. This is because MAT violations are network group based; not host based. For
example, if you scanned a single host and it produced no vulnerabilities or policy violations, but three MAT
violations were created. The Executive Summary Pie chart will display the network group as non-compliant,
however the Bar chart will display Compliant = “1” because it is host based.
Navigating Between Reports
When moving from a Trending report to a Standard report, the Ending analysis selected in the
Trending report becomes the analysis selected on the Standard report. The same Report Context Filter
settings are applied that were set on the Trending report.
When moving from a Standard report to a Trending report, the Analysis selected on the Standard
report becomes the Ending analysis selected on the Trending report (i.e. the “latest” analysis). The
Starting Analysis dropdown list is automatically populated with all analyses whose analysis date is
equal to or earlier than the selected Ending Analysis. The analysis with the earliest analysis date is
automatically selected for you. The same Report Context Filter settings are applied that were set on
the Standard report.
146
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Using the “Narrow by Asset” Control
Selected Asset reports and Network Group reports feature a “Narrow by Asset” control that may be
used to refine the data included in these reports based upon IP addresses or asset name substrings.
After entering an IP address or substring and clicking Refresh, the system will refresh the report
based on only those assets that meet the specified criteria.
Deleting the query entered in the Narrow by Asset field and clicking Refresh will clear the filter and
display all results based on the selected Analysis.
In the case of asset name substrings, asterisk “*” wildcards may be used in the following manner:
»
Searching for comp* will return all asset names starting with the letters “comp” such as
“computer” or “company.”
»
Searching for *comp* will return all asset names containing the letters “comp” such as
“accompany.”
»
Searching for *comp will return all asset names beginning with the letters “comp” such as
“computer” or “company.”
»
In the case of IP address entry, CDIR notation may be used to refine the search in the
following manner:
»
208.130.29.33/32 – The "/32" extension will return all IP addresses that match all thirty-two
bits of the specified address (i.e. a host address, matching a single IP address). An IP address
without a trailing prefix is assumed to be a single address.
208.130.29/24 – The "/24" extension will return all IP addresses starting with the twenty-four
bit prefix 208.130.29.
»
208.130.28/22 – The “/22” extension here will result in the inclusion of 208.130.29/24
because in binary, 28 is 00011100, while 29 is 00011101. However, because of the 22-bit
prefix length, only the first 6 bits of the third byte are valid.
»
0.0.0.0/0 or 0/0 – The “/0” is the shortest possible IP address prefix and matches any IP
address.
Viewing Reports
This section describes what types of information are displayed on each report. Remember that you can
view details about the assessment selected for the report by clicking the Assessment Details link. See
“Error! Reference source not found.” for details.
Executive Summary Report
The Executive Summary provides a detailed overview of the assessed network group with information
about compliance, asset data, and vulnerabilities and policy violations.
Standard
The Standard Executive Summary report opens with a pie chart and a bar graph indicating basic
compliance information.
The Compliance Summary pie chart illustrates the percentage of compliant and noncompliant assets in
the selected Analysis. Compliance is calculated based on the average compliance of all assets
associated with the analysis selected for the report. The accompanying bar chart indicates the number
147
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
of violations, vulnerabilities, compliant assets, total assets, and the total number of manual audit task
rules referenced in the policy.
The Report Summary table indicates the total number of assets, the total number of assets that passed,
the total number of assets that failed, and the total manual audit task rules referenced in the policy.
The Vulnerabilities and Policy Violations table includes dated information about both pending and
resolved policy violations and vulnerabilities, along with the average time to fix for resolved issues.
Note: If a subsequent assessment verifies remediation tasks found in the previous assessment, the
number of resolved vulnerabilities in the report for that previous assessment will reflect that.
Figure 11-4 Sample Executive Summary – Standard report
Trending
The Trending Executive Summary also includes a trio of graphs indicating Issues and Assets over
Time, Asset Risk over Time, Vulnerabilities/Violations and Remediations over Time, and Average
Time to Fix.
The first graph on the Executive Summary Trending Report presents the total assets, total
noncompliant assets, and the total compliant assets for the analyses selected.
148
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Figure 11-5 Sample Compliance Totals over Time graph
The second graph on the trending version of the Executive Summary charts assets at risk. This graph
features a “View By” pull-down menu that allows you to switch between Assets and Dollars. In
Assets mode, this graph plots the severity level of policy violations and vulnerabilities found on the
network group. In Dollars mode, this graph plots the severity of policy violations and vulnerabilities
against the dollar value of the affected assets.
Figure 11-6 Asset Risk over Time graph
The third graph on the trending version of the Executive Summary illustrates the total number of
vulnerabilities and policy violations found along with the number of remedied vulnerabilities and
policy violations.
Figure 11-7 Issues and Remediations over Time graph
The last graph on the trending version of the Executive Summary provides a graph illustrating
differential Average Time to Fix data.
149
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Figure 11-8 Average Time to Fix graph
The Trend Report Summary table presents the total number of assets, the total number of assets that
passed, the total number of assets that failed, total services running, total vulnerabilities, total new
assets, total changed assets, the total manual audit task new and existing rules referenced in the policy,
the total Web servers, and the total SSL Web Servers.
The Vulnerabilities/Violations table includes dated information from the two analyses selected about
both pending and resolved policy violations and vulnerabilities, along with the average time to fix for
resolved issues.
Enterprise Group Summary Report
The Enterprise Group Summary report, accessible via the Executive Summary submenu, is Enterprise
Group centric, and therefore shows aggregated results based on the active Enterprise Group. See the
“Security Risk Dashboard” chapter for details about enterprise group centric reports.
The Enterprise Group Summary report displays three areas of information (trends, current compliance,
and roll-up information per network group assessed). It is a blend of trended data (the Trending Report
graph) and the latest snapshot of compliance information (Compliance Summary graph) as well as a
table that displays the latest information on a per network group based on the active Enterprise Group.
The Trending Report graph shows the trend of Total Assets, Compliant Assets and Non-Compliant
Assets. Again, this is based on active Enterprise Group. Therefore, it represents aggregate
information of the trends across all network groups based on the active Enterprise Group.
The Compliance Summary pie chart shows the current, average compliance of assets. Therefore, it
represents aggregate information of the compliance across all network groups based on the active
Enterprise Group.
150
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
The “Totals by Policy” table displays the all violations and all MAT violations per policy, with totals
for each row and each column. This means that the total violations should match the sum of the
violations from the last table, across all network groups.
The “Totals by Network Group” table displays totals of violations, vulnerabilities, and threats by
network group. These values are the sum of all violations and vulnerabilities across all network
group/policy combinations that are in the current enterprise group, with totals for each column.
The “Totals by Network Group and Policy” table displays the violations, vulnerabilities and threats
associated with the latest analysis by network group and policy. The number of violations and
vulnerabilities link to the Network Group Standard report for that network group and policy. The
number of threats link to the All Threats screen, which is then be pre-filtered to display the actionable
threats for the network group.
Name of active
enterprise group.
If none active,
then “All”
displayed
Figure 11-9 Sample Enterprise Group Summary report – Note that the active Enterprise Group is
displayed as a link next to the report title. There is no enterprise group set, so “All” is displayed to
signify that all assessment configurations in the system are being considered. Note that selecting this link
displays the Enterprise Groups Management screen.
151
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Clicking on a link in the Violations column, which represents the number of violations found on the
network group, will display the latest Network Group Standard report for the specified network group.
Clicking on a link in the Vulnerabilities column, which represents the number of vulnerabilities found
on the network group, will display the latest Network Group Standard report for the specified network
group.
Clicking on a link in the Threats column, which represents the number of threats applicable to the
network group, will take you to the All Threats page which will be pre-filtered by the specified
network group. Note that this filtering happens in the background, and therefore is not displayed in the
Filter Options tab. To view “all” threats, click on Apply Filter button, and all threats will be displayed
rather than just those for the selected network group.
This report also allows you to generate a PDF version via the Save As PDF link.
Administrator Overview
The Administrator Overview report lists all administrators and their corresponding network group
assignments, as well as their email addresses.
An Administrator is any user belonging to a group (or groups) that has the “Modify Networks” and
“Modify Assessment Configurations” permissions. However, an administrator will only be displayed
on this report if the groups to which he or she belongs also have network permissions for all the
networks in a network group for which an assessment has been run.
Note: If you are a member of the Super User group, then all network groups are displayed. Otherwise,
only network groups made up completely of networks that are within the range of the network
permissions of the groups to which you belong are displayed.
Figure 11-10 Sample Administrator Overview report
Selecting a Network Group name will allow you to view the corresponding Network Group report, and
selecting an administrator’s email address will open your email tool so that you can send an email to
the selected administrator.
152
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Network Group Reports
The Network Group reports provides in-depth information about all network groups included in the
selected assessment.
Overview
The Network Group Overview screen presents a list of all network groups, with links to the
corresponding Network Group Details reports.
Note: If you are a member of the Super User group, then all network groups are displayed. Otherwise,
only network groups made up completely of networks that are within the range of the network
permissions of the groups to which you belong are displayed.
Figure 11-11 Sample Network Group Overview report
Standard
The standard Network Group Details report opens with a pie chart and a bar graph indicating basic
compliance information. Compliance is calculated based on the average compliance of all assets in the
network group associated with the analysis selected for the report.
Figure 11-12 Sample Network Group Standard report
153
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Next is a table displaying information about all assets in the selected network group, including Asset
Name, IP address, Operating System, number of Violations, and number of Vulnerabilities.
Clicking on the Asset Name, IP Address, OS, Violation, or Vulnerabilities column headings will resort
the table according to the selected element.
The Narrow by Asset field allows you to refine the data included in this report based upon IP addresses
or asset name substrings. See the “Using the Narrow by Asset Control” section presented earlier in
this chapter for details about working with the Narrow by Asset control.
All asset names on the Network Group Details screen serve as links to the corresponding Asset report.
All operating system names serve as links to the corresponding OS report.
Trending
The first graph on the trending version of the Network Group Details report charts assets at risk. This
graph features a “View By” pull-down menu that allows you to switch between Assets and Dollars. In
Assets mode, this graph plots the severity level of policy violations and vulnerabilities found on the
network group. In Dollars mode, this graph plots the severity of policy violations and vulnerabilities
against the dollar value of the affected assets.
The second graph on the trending version of the Network Group Details report illustrates the total
number of vulnerabilities and policy violations found along with the number of remedied
vulnerabilities and policy violations.
Next, the trending version of the Network Group Details report provides a graph illustrating
differential Average Time to Fix data.
154
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
The Narrow by Asset field allows you to refine the data included in this report based upon IP addresses
or asset name substrings. See the “Using the Narrow by Asset Control” section presented earlier in
this chapter for details about working with the Narrow by Asset control.
Figure 11-13 Sample Network Group Trending report
155
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Network Report
The Network reports provide detailed information about all networks in the selected Analysis,
including asset names, IP addresses, operating systems, policy violations, and vulnerabilities. Assets
with high severity vulnerabilities or policy violations are also flagged as compromised on this report.
Network Overview
The Network Overview screen presents a list of all networks included in the selected Analysis, with
links to the corresponding Network Details reports.
Figure 11-14 Sample Network Overview report
Standard
The standard Network Details report opens with a pie chart and a bar graph indicating basic
compliance information. Compliance is calculated based on the average compliance of all assets in the
network group associated with the analysis selected for the report.
Next is a table displaying information about all assets in the selected network, including Asset Name,
IP address, Operating System, number of Violations, and number of Vulnerabilities.
Clicking on the Asset Name, IP Address, OS, Violation, or Vulnerabilities column headings will resort
the table according to the selected element.
All asset names on the Network Details screen serve as links to the corresponding Asset report. All
operating system names serve as links to the corresponding OS report..
156
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Figure 11-15 Sample Network Details Standard report
Trending
The first graph on the trending version of the Network Details report charts assets at risk. This graph
features a “View By” pull-down menu that allows you to switch between Assets and Dollars. In
Assets mode, this graph plots the severity level of policy violations and vulnerabilities found on the
network. In Dollars mode, this graph plots the severity of policy violations and vulnerabilities against
the dollar value of the affected assets.
The second graph on the trending version of the Network Details report illustrates the total number of
vulnerabilities and policy violations found along with the number of remedied vulnerabilities and
policy violations.
157
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
The trending version of the Network Details report provides a graph illustrating differential Average
Time to Fix data.
Figure 11-16 Sample Network Details Trending report
158
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Asset Report
The Asset reports provide information about all assets within selected analyses associated network
group or detailed information about a specific asset.
Standard
The Asset Standard Report opens with a pie chart and a bar graph indicating basic compliance
information. Compliance is calculated based on the average compliance of all assets associated with
the analysis selected for the report.
Next is a table displaying information about all assets in the selected network group, including Asset
Name, IP address, Operating System, number of Violations, and number of Vulnerabilities.
Clicking on the Asset Name, IP Address, OS, Violation, or Vulnerabilities column headings will resort
the table according to the selected element.
The Narrow by Asset field allows you to refine the data included in this report based upon IP addresses
or asset name substrings. See the “Using the Narrow by Asset Control” section presented earlier in
this chapter for details about working with the Narrow by Asset control.
All asset names on the Asset Standard Report screen serve as links to the corresponding Asset Details
Standard Report. All operating system names serve as links to the corresponding OS report.
Figure 11-17 Sample Asset Standard report
159
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Details Standard
The Asset Details Standard Report opens by listing the asset name, IP address, operating system, and
network, followed by all administrators assigned to the selected asset. Next, this report presents a
graphic indicating the severity level of policy violations found on the selected asset. This is followed
with a table listing all policy violations and vulnerabilities detected on the selected asset, along with
Y/N fields indicating whether or not it is a new policy violation or vulnerability and whether or not
there is a known fix. A text description is provided for each policy violation and vulnerability,
offering basic remediation information. Finally, the Asset Report features a table listing all services
detected on the selected asset, providing the port number, protocol, and service name for each.
All operating system names on the Asset Report screen serve as links to the corresponding entries in
the Operating System Overview screen. All network names serve as links to the corresponding
Network Details screen. All administrator names serve as links to the corresponding Administrator
Report, and you may click on administrator’s email address to send email to the selected administrator.
This screen also features a link to the Chronological View for the selected asset.
When available, CVE/BugTRAQ IDs will also be listed within the policy violation/vulnerability text
descriptions. All CVE/BugTRAQ IDs will serve as links to the corresponding CVE/BugTRAQ page.
Note: The Asset Details Standard report is automatically filtered based on the asset that you selected
to view. The Report Context Filter will not allow you to select a network group that does not contain
the selected asset. To view the Asset Details Standard report for a different asset, return to the
previous report and select that asset.
160
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Click on the Go to Trending Report link to view the Asset Details Trending Report.
Figure 11-18 Sample Asset Details Standard report
161
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Details Trending
The Asset Details Trending report opens by listing the asset name, IP address, operating system, and
network, followed by all administrators assigned to the selected asset, and the analysis date. Next, a
chart that indicating the assets risk over time is displayed. This graph features a “View By” pull-down
menu that allows you to switch between Assets and Dollars. In Assets mode, this graph plots the
severity level of policy violations and vulnerabilities found on the asset. In Dollars mode, this graph
plots the severity of policy violations and vulnerabilities against the dollar value of the affected asset.
The second graph on the trending version of the Asset Details Trending report illustrates the total
number of vulnerabilities and policy violations found along with the number of remedied
vulnerabilities and policy violations.
Next, the trending version of the Asset Details Trending report provides a graph illustrating differential
Average Time to Fix data.
Figure 11-19 Sample Asset Details Trending report
162
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Note: The Asset Details Trending report is automatically filtered based on the asset that you selected
to view. The Report Context Filter will not allow you to select a network group that does not contain
the selected asset. To view the Asset Details Trending report for a different asset, return to the
previous report and select that asset.
Trending
The Assets Trending report opens with a chart that indicating the assets risk over time. This graph
features a “View By” pull-down menu that allows you to switch between Assets and Dollars. In
Assets mode, this graph plots the severity level of policy violations and vulnerabilities found on the
asset. In Dollars mode, this graph plots the severity of policy violations and vulnerabilities against the
dollar value of the affected asset.
Figure 11-20 Sample Asset Trending report
163
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
The second graph on the Asset Trending report illustrates the total number of vulnerabilities and policy
violations found along with the number of remedied vulnerabilities and policy violations.
Next, the trending version of the Asset Trending report provides a graph illustrating differential
Average Time to Fix data.
The Narrow by Asset field allows you to refine the data included in this report based upon IP addresses
or asset name substrings. See the “Using the Narrow by Asset Control” section presented earlier in
this chapter for details about working with the Narrow by Asset control.
Chronological View Report
The Chronological View provides information about scans, vulnerability history, administrator history,
and network association specific to the selected asset. The asset name, IP address, operating system,
and network are listed at the top of the Chronological View page, followed by all administrators
assigned to the selected asset. A chronological listing of all assessments performed upon the asset
follows, then a table listing all vulnerabilities, the date they were found, and the date they were fixed.
Clicking on the Vulnerability, Date Found, or Date Fixed column headings will resort the
Vulnerabilities table according to the selected element.
Figure 11-21 Sample Chronological View report
164
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Operating System Report
The Operating System reports provide detailed information about the usage of all operating systems
found in the selected Analysis.
Overview
The Operating System Overview report opens with a pie chart that breaks down all operating systems
found on the assessed network group by percentage. This is followed with a table indicating the
number of assets, number of vulnerabilities, percentage of vulnerabilities, new vulnerabilities, and
average time to fix for each operating system.
The average time to fix is calculated based on the date that policy violations and vulnerabilities are
found versus the date they are reported fixed in the remediation system.
Clicking on the Operating System, Assets, Vulnerabilities, or Average Time to Fix column headings
will resort the table according to the selected element.
All operating system names on the Operating System Overview serve as links to the corresponding
Operating System Details report.
Figure 11-22 Sample Operating System Overview report
165
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Standard
The standard Operating System Details report opens with a pie chart and a bar graph indicating basic
compliance information. Next, is another pie chart that presents the percentage of all operating
systems found in the selected Analysis. This is followed with a table listing all assets in the assessed
network group, organized by operating system. This table includes asset name, IP address, operating
system version, and the number of policy violations and vulnerabilities discovered.
Clicking on the Asset Name, IP Address, Violations, or Vulnerabilities column headings will resort the
table according to the selected element.
All asset names and IP addresses on the Operating System Details screen serve as links to the
corresponding Asset report.
Figure 11-23 Sample Operating System Details Standard report
166
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Trending
The first graph on the trending version of the Operating System Details report charts assets at risk.
This graph features a “View By” pull-down menu that allows you to switch between Assets and
Dollars. In Assets mode, this graph plots the severity level of policy violations and vulnerabilities
found on the network. In Dollars mode, this graph plots the severity of policy violations and
vulnerabilities against the dollar value of the affected assets.
The second graph on the trending version of the Operating System Details report illustrates the total
number of vulnerabilities and policy violations found along with the number of remedied
vulnerabilities and policy violations.
Next, the trending version of the Operating System Details report provides a graph illustrating
differential Average Time to Fix data.
Figure 11-24 Sample Operating System Details Trending report
167
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Task Reports
The Task reports provide current information about the status of all remediation tasks addressing
policy violations and vulnerabilities in the selected Analysis.
Task Aging Summary
The data displayed on the Task Aging Summary report is driven by the active Enterprise Group. In
addition, only remediation tasks that have not been resolved are considered. The report displays charts
and associated tables for Overdue Tasks, Days since Found, and Days since Assigned. No additional
content authorization is done for this report.
Overdue Tasks
The Overdue Tasks chart displays the number of tasks that are past due. A remediation task is
considered past due if it has not been resolved by the associated due date.
168
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Days Since Found
The Days Since Found chart groups task by how many days have elapsed since the underlying issue
was first found.
Days Since Assigned
The Days Since Assigned Chart groups task by how many days have elapsed since the task was last
assigned (i.e. if a task is reassigned, then the chart will show the number of days since the task was
reassigned)
169
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Task Rollup Reports
The task rollup reports display vulnerability type and violations type remediations rolled up by
Network Group. This report is enterprise group centric. See the “Security Risk Dashboard” chapter
for details about enterprise group centric data.
Note: If you are a member of the Super User group, then all network groups are displayed. Otherwise,
only network groups made up completely of networks that are within the range of the network
permissions of the groups to which you belong are displayed.
Rollup by Violation
The Task Rollup by Violation report displays the violations type remediations rolled up for the given
network groups. The following columns are displayed on this report:
»
Network Group – The name of the network group associated with the violations
»
Violation – The name of the violation
»
Assets – The number of assets that have the violation
»
Severity – The average severity for this violation on the current Network Group
»
Priority – The average priority for this violation on the current Network Group
»
Exposure – The sum of all host values and operational impacts for the network group and this
violation
»
New – The % of the tasks that are in an “unassigned” state and not overdue
»
Assigned – The % of the tasks that are in the assigned state and not overdue
»
Overdue – The % of the tasks that are overdue
Rollup by Vulnerability
The Task Rollup by Vulnerability report displays the vulnerability type remediations rolled up for the
given network groups. The following columns are displayed on this report:
»
Network Group – The name of the network group associated with the vulnerabilities
»
Violation – The name of the vulnerability
»
Assets – The number of assets that have the vulnerability
»
Severity – The average severity for this vulnerability on the current Network Group
»
Priority – The average priority for this vulnerability on the current Network Group
170
PREVENTSYS™ SRM USER’S GUIDE
»
CHAPTER 11 | REPORTS
Exposure – The sum of all host values and operational impacts for the network group and this
vulnerability
»
New – The % of the tasks that are in an “unassigned” state and not overdue
»
Assigned – The % of the tasks that are in the assigned state and not overdue
»
Overdue – The % of the tasks that are overdue
Standard
The standard Task report opens with two pie charts illustrating Remediation Status Overview and
Remediation Status Per OS. This is followed with a pair of tables tracking both pending and resolved
policy violations and vulnerabilities, indicating the affected asset and IP addresses as well as the date
upon which each policy violation or vulnerability was found.
Note: The Date Found is the date the violation or vulnerability was first found by the system, across
all analyses and regardless of assessment configuration.
All violation and vulnerability names on the standard Task report screen serve as links to the
corresponding Remediation Details screen. See the “Remediations” chapter for details about the
Remediation Details screen.
171
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Figure 11-25 Sample Task Standard report
Trending
The first graph on the trending version of the Task report charts remediation status. This graph
features data points indicating the number of remediation tasks Verified, Claimed Resolved, False
Positive, Accepted Risk, Unresolved, and Unassigned.
Next, the trending version of the Task report provides a graph illustrating differential Average Time to
Fix data.
172
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Figure 11-26 Sample Task Trending report
173
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Task Recipient Report
The Task Recipient reports provide current information about the status of all administrators and their
corresponding remediation tasks, including policy violations, Manual Audit Task violations, and
vulnerability type remediation tasks.
Overview
The Task Recipient Overview screen presents a list of all users who have the “resolve remediation”
permission.
Note: If a Remediator has remediation tasks assigned to them for hosts that are within the range of
networks to which you can view, then the Remediator’s name will also be a link to the corresponding
Task Recipient Details Standard Report.
Figure 11-27 Sample Task Recipient Overview report
174
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Standard
To view details about a recipient’s tasks, select a recipient from the Select Task Recipient dropdown
list, and click Refresh.
Note: The Select Task Recipient dropdown presents a list of all users who have the “resolve
remediation” permission. If a Remediator has remediation tasks assigned to them for hosts that are
within the range of the networks to which you can view, then that data will be displayed. Otherwise,
you will receive a message notifying you that no data was found for the selected user that you are not
authorized to view.
The Standard Task Recipient Details report displays two pie charts illustrating Remediation Status
Overview and Remediation Status by OS. These are followed with tables tracking both pending and
resolved policy violations and vulnerabilities, indicating the affected asset and IP address as well as the
date upon which each policy violation or vulnerability was found.
Note: If you are a member of the Super User group, then all the applicable tasks are displayed.
Otherwise, only the applicable tasks associated with hosts that are within the range of the network
permissions of the groups to which you belong are displayed. In addition, “all” Manual Audit Task
violations are displayed regardless of your group permissions.
Figure 11-28 Sample Task Recipient Details Standard report
175
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Trending
To view trending data about a recipient’s tasks, select the Start and End data ranges, select a recipient
from the Select Task Recipient dropdown list, and click Refresh.
Note: The Select Task Recipient dropdown presents a list of all users who have the “resolve
remediation” permission. If a Remediator has remediation tasks assigned to them for hosts that are
within the range of the networks to which you can view, then that data will be displayed. Otherwise,
you will receive a message notifying you that no data was found for the selected user that you are not
authorized to view.
The Task Recipient Details Trending report displays trending data about the selected recipient’s tasks
during the period you specify.
Note: If you are a member of the Super User group, then all the applicable tasks are displayed.
Otherwise, only the applicable tasks associated with hosts that are within the range of the network
permissions of the groups to which you belong are displayed. In addition, “all” Manual Audit Task
violations are displayed regardless of your group permissions.
The first graph charts remediation statuses over time. This graph features data points indicating the
number of remediation tasks Verified, Claimed Resolved, False Positive, Accepted Risk, Unresolved,
and Unassigned. The next graph illustrates differential Average Time to fix data.
Figure 11-29 Task Recipient Details Trending report
176
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Compliance Overview Report
The Compliance Overview report presents basic compliance data derived from the number of
violations, rules, and assets associated with the selected analysis.
The Compliance Overview report features a bar graph indicating Violations Per Rule and a table
indicating the number of assets that passed and failed for each individual rule associated with the
selected Analysis.
Figure 11-30 Sample Compliance Overview report
177
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Comparative Compliance Report
The Comparative Compliance report allows for the comparison of multiple analyses, and for the
viewing of more than one report/analysis combination at once.
The Comparative Compliance report features a modified Analysis dropdown with an Add button that
allows for the selection of multiple analyses, as well as a control for switching between Overall
Compliance view and Detailed Compliance view.
In the Overall Compliance view, a series of pie charts indicate the compliance level of each selected
analysis. Beneath this is an asset table indicating the Asset Name, IP Address, OS, the number of
Violations, and the numbers of Vulnerabilities.
Figure 11-31 Sample Comparative Compliance report “Overall Compliance” view
178
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
In the Detailed Compliance view, a series of bar charts indicate the number of Violations,
Vulnerabilities, Compliant Assets, and Total Assets. Beneath this is an asset table indicating the Asset
Name, IP Address, OS, the number of Violations, and the numbers of Vulnerabilities.
Clicking on the Asset Name, IP Address, OS, Violation, or Vulnerabilities column headings will resort
the table according to the selected element.
All asset names on the Comparative Compliance Report screen serve as links to the corresponding
Asset report. All operating system names serve as links to the corresponding OS report.
Figure 11-32 Sample Comparative Compliance report “Detailed Compliance” view
179
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Exposure Overview Report
The Exposure Overview report is designed to tell administrators how long a particular bug has existed
on the system. Whenever a policy violation or vulnerability is found during scan analysis, the
Preventsys SRM System will reference prior scans of the affected network group in reverse
chronological order to calculate how long the system has been exposed. The CVE/BugTraq date
indicates the date the bug was listed on CVE/BugTRAQ. This date is important because it represents
how long the vulnerability has been in general release, significantly increasing the risk associated with
exposure.
The Exposure Overview Report includes a table for each asset listing policy violations and
vulnerabilities, exposure date, remediation assignments, and remediation status. It also provides a
description for policy violations and a CVE/BugTRAQ date for vulnerabilities.
Vulnerability listings also include links to associated entries on the official CVE site when available.
Figure 11-33 Sample Exposure Overview report
180
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Services Report
The Services report provides detailed information about selected services. The Services report opens
with a chart indicating the Top 10 Services found in the selected Analysis. This is followed with a
table listing all services discovered, their port numbers, protocols, service names, product guesses, and
the number of assets on which they are active.
Figure 11-34 Sample Services report
All Service Names on the Services report screen serve as links to the corresponding entries in the
Services Details report. The Services Details report lists the service name and port, along with its
banner information, followed by a table listing all assets that are running the selected service and their
IP addresses.
All asset names and IP addresses on the Services Details screen serve as links to the corresponding
Asset report. The Services Details page also provides links to banner information when available.
181
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Figure 11-35 Sample Services Details
Wireless Access Points Report
The Wireless Access Points report provides detailed information about all machines using wireless
networking in the selected Analysis. The Wireless Access Points report presents a table listing each
unknown access point’s SSID (Source Station Identifier), a Y/N field indicating whether or not its IP is
known, Wireless Channel, WEP (Wired Equivalent Privacy), and BBSID (Basic Service Set
Identifier), plus an additional Y/N field indicating whether or not the access point is Active.
The SSID represents a unique name or identifier for each wireless access point. If a hidden access
point is identified but not decloaked, then the report will display “(SSID is Blank)” in the SSID
column. If a hidden access point is identified and decloaked, then the system will display
“<SSIDstring> (Cloaked)” in the SSID column.
WEP returns a value of “On” or “Off” to indicate the status of WEP security. BSSID represents the
MAC address of the wireless access point.
182
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Figure 11-36 Sample Wireless Access Points report
All SSIDs on the Wireless Access Points report serve as links to the corresponding Wireless Access
Point Details report. The Wireless Access Point Details report presents detailed information about the
selected access point. In addition to the basic information provided on the overview screen, the
Wireless Access Point Details report provides information about WEP key size, Beacon Interval, MAC
filtering, Signal, Noise, and Rates. It also indicates when the access point was First Seen, Last Seen, as
well as Last Disappearance, Last Reappearance, and the total number of disappearances and
reappearances.
Figure 11-37 Sample Wireless Access Points Details report
183
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
Saving Rendered Reports
Reports can be saved either by saving them as a PDF or by publishing them for viewing later in the
Preventsys SRM System as HTML.
Publishing a Report
The Publish function allows you to save any report in the Preventsys SRM System with its associated
report context as HTML. Publishing reports in this manner allows for the quick retrieval of selected
reports without the use of the Report Context controls.
When a report is published, it will always reflect the active Enterprise Group regardless of what
Enterprise Group was active when the report was published. To save a record of the report based on
the current and active enterprise group, use the Save as PDF feature.
When publishing a report, only the report context is saved; the state of remediation tasks at that time is
not saved. Therefore, the publish report will always display the current state. To save a record of the
report based on the state of remediation tasks at a specific time, use the Save as PDF feature.
To publish a report
1
2
3
4
Select Reports on the main menu and then select a specific report type.
The report you selected is displayed.
Click the Publish link located in the Report Context area.
The Publish Report screen is displayed.
5
6
7
Enter a Published Report Name (35 characters maximum).
Enter Comments (250 characters maximum).
Click Submit to save the published report.
Viewing Published Reports
The View Published Reports function allows you to view any previously published report in the
Preventsys SRM System as HTML.
Note: If you are a member of the Super User group, then all published reports are displayed.
Otherwise, only published reports associated with network groups made up completely of networks
that are within the range of the network permissions of the groups to which you belong are displayed.
184
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 11 | REPORTS
To view a published report
1
Click Reports > Published Reports. The View Published Reports screen is displayed.
2
Click the link corresponding to the Name of whichever report you wish to view. The selected
report is displayed.
Deleting Published Reports
The Delete Published Reports function allows you to delete published report in the Preventsys SRM
System.
Note: You can only delete published reports that you created.
To delete a published report
1
2
3
Click Reports > Published Reports. The View Published Reports screen is displayed.
Click the Delete checkboxes corresponding to the Name of whichever reports you wish to
delete.
Click the Delete button. The selected reports will be deleted.
185
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 12 | SYSTEM UPDATES
CHAPTER 12
System Updates
The Preventsys Update Propagation System (PUPS) allows for the upload, download, deployment, and
rollback of Preventsys SRM System component updates.
Note: You need a username and password to log into the Customer Support System. Please contact
Customer Support to setup an account .
Basic Update Steps
The basic steps for updating the Preventsys SRM System are as follows:
1
2
3
4
5
Check the Preventsys Support System for new updates.
Download the update file to any system accessible by the system running the Administrative
Client.
Upload the update file from the Administrative Client to the Enterprise Security Management
Server.
Apply the new update.
If necessary, you may rollback the update to return to the previous version.
As part of the update process, you will have an opportunity to set the configuration parameters for all
components included in the update. Please refer to the release notes included with the update for
additional information prior to altering the default configuration parameters.
About Maintenance Mode
When the update is initiated, the system will enter Maintenance Mode. Once the system enters
Maintenance Mode, all pending assessments will be completed but no new assessments will be
initiated.
Note: The system will remain in Maintenance Mode until the update is completed. If the pending
assessments are not completed within 24 hours (default setting), the update will not complete
successfully and the system will remain in its current state.
Only Super Users will be able to login and access the system when it is in Maintenance Mode. All
non-Super Users will be automatically logged out of the system as soon as it enters Maintenance
Mode.
Note: Do not modify any system data once the system enters Maintenance Mode. Altering system data
at this time may result in an unsuccessful update.
Once the update is completed, PUPS will automatically restart all system components that require a
reboot for the update to take effect. Note that this may temporarily disrupt the Administrative Client’s
access to the Enterprise Security Management Server.
186
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 12 | SYSTEM UPDATES
Update Failure
If an update fails, PUPS will restore the system to the latest successful state. Any time an update fails,
the update must be uploaded to the Enterprise Security Management Server again prior to initiating
another attempt at applying the update. In the event of an unsuccessful update or rollback procedure
that results in the Manage System Updates screen being out of synch or other system problems, please
contact Preventsys Customer Support for assistance.
Checking for a New System Update
A Preventsys customer support username and password are required in order to access the Preventsys
Support System. Please contact Preventsys Customer Support to obtain a username and password.
Note: The system running the browser-based Administrative Client must have access to the Internet in
order to download system updates.
To check for new system updates
1
Click Help > Support. The Preventsys Support System login screen is displayed in a new
window.
2
3
4
5
Enter the Username.
Enter the Password.
Click Login. The Preventsys Welcome screen is displayed.
Click the Download Center link on the left side of the screen.
187
PREVENTSYS™ SRM USER’S GUIDE
6
7
8
9
CHAPTER 12 | SYSTEM UPDATES
Click the Product folder.
Click the Preventsys folder.
Click the on the folder that corresponds to the version of the product you are interested in to
display all of the updates available for that version.
You may click any update name to open a download dialog, then click Save and use the file
browser to select a location for the .jar file. System updates are downloaded from the
Preventsys Support System Web site in .jar file format.
Uploading and Applying a System Update
Once you have downloaded an update in .jar file format from the Preventsys Support System Web site,
you may upload the update to the Enterprise Security Management Server and apply it to the
appropriate components.
To upload and apply a system update
1
2
Click Admin > System Updates.
The System Updates screen is displayed. If you have any updates to be applied, they are
displayed on this screen.
188
PREVENTSYS™ SRM USER’S GUIDE
3
4
CHAPTER 12 | SYSTEM UPDATES
Click the Browse button and select the desired system update file.
Click Upload to upload the file to the Enterprise Security Management Server. Once the
upload is complete, the screen will refresh with the update queued for application.
Note: Uploading the update .jar file to the Enterprise Security Management Server may take some
time. Please do not log out or close the Administrative Client’s browser window while the upload is in
progress.
5
6
7
8
9
Click Apply Now to initiate the update process. The Review Contents screen is displayed,
listing a Module Name, Description, and Version for each component included in the
update.
Click Next. The Set Configuration Parameters screen is displayed, listing the configuration
parameters for each component included in the update.
You may edit the configuration parameters as necessary. Please refer to the release notes
accompanying the update package for more details on each of the configuration parameters
prior to modifying the default values.
The Reset button may be used to restore the configuration parameter defaults.
Click Next. The Update Confirm screen is displayed, listing any pending assessments that
will be completed prior to the update, as well as the names of any logged in users who lack
Super User access.
Note: Once the update process is initiated, the system will transition to Maintenance Mode. The
pending assessments listed on the Update Confirm screen will be allowed to complete, but no new
assessments will be initiated. In addition, the non-Super Users listed on the Update Confirm screen
will be logged out automatically.
10 For minor updates, the Save System Archive checkbox will be selected by default. You may
deselect it if you do not wish to save a temporary archive of the current system. IF YOU DO
NOT SAVE AN ARCHIVE OF THE CURRENT SYSTEM, YOU WILL NOT BE ABLE
TO ROLLBACK TO IT LATER.
189
PREVENTSYS™ SRM USER’S GUIDE
CHAPTER 12 | SYSTEM UPDATES
Note: For major updates, the system archive will be saved automatically.
11 Click Update to apply the update. The Update Initiated screen is displayed and the system
will enter Maintenance Mode while applying the update.
12 Click Next to continue. The Preventsys Main Menu is displayed in Maintenance Mode. All
members of the Super User group will receive a confirmation email once the update is
complete.
Note: Please do not modify any system data while the update is pending. Once the update is
completed, the system will automatically restart if necessary and full functionality will be restored.
Rolling Back a System Update
Once an update has been applied, the rollback feature may be used to return the Preventsys SRM
System to the previous version.
Note: The Rollback System Update function may only be used to return the Preventsys SRM System to
the last successful state.
To rollback a system update
1
2
Click Admin > System Updates.
Click the Rollback to previous version link. The Rollback Confirm screen is displayed,
listing any pending assessments that will be completed prior to the rollback procedure, as well
as the names of any logged in users who lack Super User access.
Note: Once the rollback process is initiated, the system will transition to Maintenance Mode. The
pending assessments listed on the Rollback Confirm screen will be allowed to complete, but no new
assessments will be initiated. In addition, the non-Super Users listed on the Rollback Confirm screen
will be automatically logged out.
3
4
Click Rollback to initiate the rollback process. The Rollback Initiated screen is displayed and
the system will enter Maintenance Mode while implementing the rollback.
Click Next to continue. The Preventsys Main Menu is displayed in Maintenance Mode. All
Super Users will receive a confirmation email once the rollback is complete.
190
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
APPENDIX A
Instance Configurations
As discussed in the “Assessment Servers and Instance Configurations” chapter, an Instance
Configuration is a static set of parameters for a particular installation of an assessment tool supported
by the Preventsys Assessment Server. An Instance Configuration’s parameters are generally used to
allow an Assessment Server to connect to, and, if needed, authenticate to a particular installation of the
assessment tool. For example, if the same tool was installed in three different locations, each of those
installations would have a single instance configuration.
This appendix presents specific information about the assessment tools supported by the Preventsys
SRM System. For steps about how to add assessment servers and instance configurations, see the
“Assessment Servers and Instance Configurations” chapter. Preventsys has also published its
connector API, so that anyone can add support for additional software. Contact Preventsys Support for
information about the API. For a current list of connectors supported by Preventsys, click on the
“Supported Connectors List” link available on the Assessment Server Management screen and on the
Import Assessment Data screen.
Figure 12-1. Example of the Preventsys Supported Connectors List
This list is updated regularly as new connectors are supported
When adding an instance configuration to an Assessment Server, you will be asked for the information
the system requires to connect to that instance. The assessment tool’s username and password, and its
IP address and port number are some of the types of information which may be required. You can also
specify an affinity and associated weight with an instance. See the “Assessment Servers and Instance
Configurations” chapter for details about affinity and weight.
191
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
The following assessment tools are supported for conducting assessments within the Preventsys SRM
System:
»
AppDetective by Application Security
»
Dynamic Address Resolution Connector by Preventsys
»
FoundScan by Foundstone
»
ISS Internet Scanner by Internet Security Systems
»
ISS SiteProtector by Internet Security Systems
»
Microsoft Baseline Security Analyzer by Microsoft
»
Nessus by Tenable Network Security
»
Network Architecture Assessor by Preventsys
»
Nmap Insecure.Com
»
QualysGuard by Qualys
»
Retina Network Security Scanner by eEye Digital Security
»
WiFi by Preventsys
»
WinReg by Preventsys
You can view a description of each field on the instance configuration screens by positioning your
mouse over the desired field.
Figure 12-2. Example of Help text displayed on Nessus Instance Configuration screen
192
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
About Third-Party Connectors
Preventsys makes their API available for the use of writing third-party connectors. You may then
connect to them from the Assessment Server, and therefore run assessments with them using the
Preventsys SRM System.
Note: See your Preventsys Support Representative for details about writing third-party connectors.
Figure 12-3. Sample Third-Party Instance Configuration screen
AppDetective Instance Configuration
To add an instance of AppDetective, you must have a licensed version of AppDetective. Enter the
information requested on the AppDetective Instance Configuration screen.
»
AppDetective connector address – Enter the IP or hostname of the AppDetective connector
»
AppDetective connector port – Enter the port of the AppDetective connector
193
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
Dynamic Address Resolution Instance Configuration
The Dynamic Address Resolution Connector (DARC), is automatically run in the background by the
system during assessments. You must create an instance configuration for it, but you will not need to
create a connector configuration. This connector is only necessary in Dynamic Host Configuration
Protocol (DHCP) environments. Note that DARC is also utilized during WiFi scans, where it is used
to attempt to ascertain the IP addresses of the wireless access points discovered during scanning.
DARC provides consistent address resolution for correlation of host information throughout changing
IP addresses (because of DHCP) by tracking hosts by its network interface controller’s (NIC) MAC
address. By utilizing the Dynamic Target Address Resolution Protocol (DTARP) to report the
correlation between IP addresses and host identity, the system will be able to correlate the same
physical hosts regardless of IP changes due to DHCP.
DARC can be configured to utilize any network interface controller (NIC) installed on the DARC
server. if a DARC server is attached to two subnets, 10.1.1.0/24 and 10.2.2.0/24, DARC will utilize
DTARP on each of these interfaces.
There are three basic techniques utilized by DARC. DARC automatically utilizes the following
techniques (i.e. DARC is always sending ARP packets to obtain MAC addresses for hosts on the same
subnet, sending NetBIOS packets to hosts on other subnets, and looking for DHCP traffic).
»
Address Resolution Protocol (ARP) – DARC instances send ARP packets to every IP address
in the subnets DARC has been configured to utilize. This process is very accurate, but is
limited because DARC servers need to have an interface physically attached to any subnet
where DHCP is utilized.
»
NetBIOS Querying – DARC instances will attempt to utilize the NetBIOS protocol to obtain
MAC addresses. This process works across subnets, unlike ARP, but it only works against
Microsoft Windows hosts whose NetBIOS port (UDP port 137) is unfiltered.
»
Passive DHCP analysis – MAC addresses may also be gathered from DHCP packets. This
process allows a single DARC instance to gather MAC addresses from a particular DHCP
server.
For these techniques to work, DARC must be able to capture the given DHCP packets. In most
environments, DHCP servers are connected to switches, which prevent DARC from being able to
capture the necessary packets. In this situation, one of two configuration changes must be made. One
option is for the switch to be placed into a Switch Port Analyzer (SPAN) or mirrored configuration in
which all traffic from the DHCP server is also sent to the DARC server. The other option is for the
DHCP server and DARC server to be placed on the same hub. Unlike switches, hubs broadcast any
packets received to each of their ports.
194
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
To add an instance of DARC, enter the information requested on the DARC Instance Configuration
screen.
»
Select the interfaces on which you want DARC to listen. The interfaces available on the
machine running DARC are listed.
Retina Instance Configuration
To add an instance of Retina, you must have a licensed version of Retina. Enter the information
requested on the Retina Instance Configuration screen.
»
Hostname/IP – Enter the hostname and IP on which Retain is running
»
Port – Enter the port on which Retain is listening
Note: While you can select either Retina 4.9 or Retina 5.0 from the menu, you should only select one
version and install it on all of your Assessment Servers. Do not install different versions.
195
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
FoundScan Instance Configuration
To add an instance of FoundScan, you must also have a licensed version of FoundScan. Enter the
information requested on the FoundScan Instance Configuration screen.
»
Hostname/IP – Enter the hostname and IP on which FoundScan is running
»
Port – Enter the port on which FoundScan is listening
»
Organization – Enter the name of the organization associated with the FoundScan account
»
User – Enter the username for the FoundScan account
»
Password – Enter the password for the FoundScan account
»
Communications – Select use SSL
»
CA Public Cert – Enter CA public cert. When you install FoundScan, there is a certificate
authority (CA) public key, in PEM format, installed in a file called TrustedCA.pem. Paste
this file into the CA public cert textbox. This file will allow the Preventsys FoundScan
Connector to authenticate the identity of the FoundScan server.
»
Valid Public Key and Private Cert – Enter valid public key and private cert. When you install
FoundScan, in addition to the TrustedCA.pem file, it generates a client certificate. Paste one
of these communications certificates in the PEM format, which contains a private key and a
certificate that has been signed by the above “CA Public cert”. Note that more information
about this can be found in your FoundScan documentation.
196
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
ISS Internet Scanner Instance Configuration
The Preventsys SRM System provides support for ISS SiteProtector assessment tool as a subordinate
network fact-collection module. The ISS SiteProtector instance must be controlling one or more ISS
Internet Scanner 7.x instances to collect vulnerability data and basic facts about the hosts.
To add an instance of Internet Scanner, you must also have a licensed version of Internet Scanner.
Enter the information requested on the Internet Scanner Instance Configuration screen.
»
Hostname/IP – Enter the hostname and IP on which ISS Internet Scanner is running
»
Port – Enter the port on which the ISS Internet Scanner is listening
»
Scanner Instance – Enter the sensor instance name of the ISS Internet Scanner
Support for one or more instances of ISS Internet Scanner 7.x as a standalone assessment module
independent of ISS SiteProtector is supported. This module may be used instead of Nessus and Nmap,
but does not provide data comparable to the other plug-in modules.
The ISS Internet Scanner 7.0 connector is installed as a Windows service. By default, this service will
run as the default user. Following the installation of this scanner, you must use the Services Control
Panel to assign this service to a user with sufficient security rights to use the ISS Internet Scanner 7.0
connector CLI (enginemgr.exe – usually installed in
C:\ProgramFiles\ISS\ScannerConsole\EngineMgr.exe).
You can configure the Windows Service portion of ISS Internet Scanner by manipulating various
Registry Keys/Values on the Windows system where the Preventsys ISS Internet Scanner module is
installed. These include:
»
HKEY_LOCAL_MACHINES\SOFTWARE\Preventsys, Inc.\ISS7\Port
»
This specified registry value (REG_DWORD) accepts a number (0-65535). This will be the
port on which the ISS Internet Scanner 7.0 listens for connections. If this value is 0 or nonexistent, a random port will be used. Note: This setting may be useful when routing through
firewalls, etc.
»
HKEY_LOCAL_MACHINES\SOFTWARE\Preventsys, Inc.\ISS7\dsn
This specified registry value (REG_SZ) identifies the database that ISS Internet Scanner 7.0 is using
for storage of results. This should match the Data Source specified under Tools->Database
Administration in the ISS Internet Scanner console.
197
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
ISS SiteProtector Instance Configuration
The Preventsys SRM System provides support for the ISS SiteProtector assessment tool as a
subordinate network fact-collection module. The ISS SiteProtector instance must be controlling one or
more ISS Internet Scanner 7.x instances. ISS SiteProtector can be used in addition to or instead of the
Nessus/Nmap modules but does not provide comparable data.
To add an instance of SiteProtector, you must also have a licensed version of SiteProtector and its subcomponents. Enter the information requested on the SiteProtector Instance Configuration screen.
»
Database username – Enter the username for the SiteProtector database
»
Database password – Enter the password for the SiteProtector database
»
Database address – Enter the address for the SiteProtector database
»
Database port – Enter the port on which the SiteProtector database is running
»
Internet Scanner instance – Enter the name for the Internet Scanner sensor instance
»
SP control WSM address – Enter the WSM address for the SiteProtector control
»
SP control WSM port – Enter the WSM port on which the SiteProtector control instance is
listening
Microsoft Baseline Security Analyzer Instance Configuration
To add an instance of MBSA, you must have a licensed version of MBSA. Enter the information
requested on the MBSA Instance Configuration screen.
»
Hostname/IP – Enter the hostname and IP on which MBSA is running
»
Port – Enter the port on which MBSA is running
»
Run MBSA As User – Enter the credentials of an MBSA Administrator account. When
MBSA scans, it will adjust its privilege level to that of this account for the duration of the
scan.
»
Run MBSA As Password – Enter the credentials of an MBSA Administrator account. When
MBSA scans, it will adjust its privilege level to that of this account for the duration of the
scan.
198
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
Nessus Instance Configuration
The Nessus assessment tool provides vulnerability detection and network-based auditing checks; uses
Nmap plug-in as well as its own database of plug-ins to collect vulnerability data and basic facts about
the hosts, their operating systems, exposed services and default configurations for advanced reporting
and policy compliance analysis by the Enterprise Security Manager Server.
To add an instance of Nessus, enter the information requested on the Nessus Instance Configuration
screen.
»
Nessus username – Enter the username for Nessus
»
Nessus password – Enter the password for Nessus
»
Nessus IP – Enter the IP to which Nessus is bound
»
Nessus Port – Enter the port on which Nessus is listening
199
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
Network Architecture Assessor Instance Configuration
The Preventsys Network Architecture Assessor (NAA) assessment tool is used to test gateway device
routing and filtering rules (i.e. firewall, routers, etc.) and collects data for comprehensive perimeter
policy checks.
P2P Assessment is built in as part of the Network Architecture Assessor configuration, and is used to
test the perimeter defense devices (routers and firewalls) for the possibility of rogue P2P protocols
such as Kazaa, Direct Connect and Bittorrent). You will need the policies that contain rules associated
with these to view the results. Refer to the Preventsys SRM System Policy and Regulatory Guide for
details.
To add an instance of Network Architecture Assessor, enter the information requested on the Network
Architecture Assessor Instance Configuration screen.
Enter the following for each NAA “Slave” accessible by this NAA
»
Slave Name – The name of the NAA slave accessible by this NAA
»
Slave IP – The IP of the NAA slave accessible by this NAA
»
Slave Netmask – The netmask of the NAA slave accessible by this NAA
»
Slave Port – The port of the NAA slave accessible by this NAAFirewall IP – The firewall IP
of the NAA slave accessible by this NAA
»
Firewall IP – Enter the IP of the firewall this salve will be used to test
»
NAT Network – Enter the NAT network if the source IP of packets sent to this slave will be
NAT’d. Otherwise, leave blank.
»
NAT Netmask – Enter the NAT netmask if the source IP of packets sent to this slave will be
NAT’d. Otherwise, leave blank.
Nmap Instance Configuration
The Nmap assessment tool provides network discovery, OS fingerprinting, and port scanning. Nmap
has no instance configuration parameters. To add an instance of Nmap, enter a connector name and
any affinity desired, and select Submit. Nmap does not have any additional instance parameters to
enter.
200
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
WiFi Instance Configuration
The Preventsys WiFi assessment tool provides wireless access point detection and property
enumeration (i.e. WEP, SSID, BSSID, MAC Filtering, etc.) used to collect data for comprehensive
Wireless Access policy assessment including rogue and misconfigured access point identification and
location. To add an instance of WiFi, enter the information requested on the WiFi Instance
Configuration screen.
»
Device selection – Select which WiFi device you want used from the list of detected devices.
If no WiFi devices are detected, a message is displayed.
»
Channel Scanning Policy – Select which channel scanning policy you want used
Note: For the system to return data about Wireless IPs, you must have a Dynamic Address Resolution
Instance Configuration created before conducting your WiFi assessment.
201
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
Windows Registry Instance Configuration
The Preventsys Windows Registry (WinReg) assessment tool provides support for remote assessment
of the Windows Registry in Windows Domains, which allows for policy analysis, based on the
existence, non-existence, and values of Windows Registry key entries for Windows environment
specific policies. To add an instance of WinReg, enter the information requested on the WinReg
Instance Configuration screen.
»
Hostname/IP –Enter the hostname and IP on which WinReg is running
»
Port – Enter the port on which WinReg is listening
The Preventsys Windows Registry Installer will install this Windows scan module as a Windows
service. It can be installed and run on Windows 2000 Professional (regular), Microsoft Windows NT
4.0, Microsoft Windows 2000 Server, Windows XP (pre-SP2), and Microsoft 2003 Server Standard
Edition.
By default, this service will run as the default user. Following the installation of this scanner, you
must use the Services Control Panel to assign this service to a user with sufficient access to activate
this remote service. This process is explained later in this chapter.
Note that prior to installation all Preventsys component system clocks must be properly set and
configured to the desired time zone. Moreover, all Preventsys component system clocks must be
synchronized to the same time in order to ensure a successful installation.
Next, you must access the Services Control Panel and change the user assignment for the new
Windows Registry Scanner service to ensure that this service will be run by a user with sufficient
access to read remote system registries.
You can configure the Windows Service portion of the Registry Scanner by manipulating various
Registry Keys/Values on the Windows system where the Windows Registry Scanner was installed.
These include:
»
HKEY_LOCAL_MACHINES\SOFTWARE\Preventsys, Inc.\ISS7\Port
»
This specified registry value (REG_DWORD) accepts a number (0-65535). This will be the
port on which the ISS Internet Scanner 7.0 listens for connections. If this value is 0 or nonexistent, a random port will be used. Note: This setting may be useful when routing through
firewalls, etc.
202
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX A | INSTANCE CONFIGURATIONS
»
HKEY_LOCAL_MACHINES\SOFTWARE\Preventsys, Inc.\ISS7\dsn
»
This specified registry value (REG_SZ) identifies the database that ISS Internet Scanner 7.0 is
using for storage of results. This should match the Data Source specified under Tools>Database Administration in the ISS Internet Scanner console.
QualysGuard Instance Configuration
The QualysGuard assessment tool is a web-based network discovery/vulnerability detection
application, which can work in conjunction with an “intranet scanner” appliance located inside your
firewall. To add an instance of QualysGuard, you must have a license for QualysGuard and a Qualys
account. Enter the information requested on the QualysGuard Instance Configuration screen.
»
Qualys username – Enter the Qualys username
»
Qualys password – Enter the Qualys password
»
Appliance name – Enter the appliance name for QualysGuard
»
Batch size for pause simulation – Enter the number of hosts to break up into chunks and
therefore scan those chunks serially. Note that this field is required because Qualys does not
include native pause and resume in their API. Preventsys must therefore simulate
pause/resume with Qualys, so that in the case of a requested pause only the chunk being
scanned needs to be rescanned. The number equals the size of those chunks, with “0”
meaning scan all IPs in one Qualys scan.
203
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX B | CONNECTOR CONFIGURATIONS
APPENDIX B
Connector Configurations
As discussed in the “Assessments” chapter, a connector configuration is a set of parameters that
controls the behavior of a particular assessment tool supported by the Preventsys Assessment Server
during an assessment. A popular parameter defined in a connector configuration is the set of
tests/checks to run during an assessment. Unlike an Instance Configuration, a Connector
Configuration can be applied to any defined instance of the same assessment tool. For example, if the
same assessment tool was installed in three different locations, a single Connector Configuration could
be applied to each of these installations.
This appendix presents connector-specific information about the connectors supported by the
Preventsys SRM System. For steps about adding connector configurations, see the “Assessments”
chapter.
Updating Scanner Plugins
Use the tools provide with the individual connectors to update their associated plugins. For example,
use the update plugin script provide by Nessus.
AppDetective Connector Configuration
To add an AppDetective connector configuration, enter the information requested on the AppDetective
Connector Configuration screen. For details about the options displayed, please refer to your
AppDetective documentation.
Note: If your AppDetective license is exceeded during an assessment, the AppDetective scan will fail
with the following message: “The AppDetective scan failed due to an unspecified error, which is often
a result of a license violation. Please verify that the IP:Port is included in your license."
Preventsys provides the following options, in addition to the standard AppDetective options displayed.
SIDs for Oracle 10g – AppDetective’s Application Discovery scan is normally able to detect the
system identifiers (SID) for any Oracle database. However, AppDetective is unable to detect the SIDs
for Oracle 10g databases. Therefore, to scan Oracle 10g databases, the SIDs must be manually
entered.
To add an Oracle 10g SID, select Insert on the AppDetective Connector Configuration screen under
the SIDs for Oracle 10g section, and enter the SID in the field provided. To delete an SID, select the
radio button next to that SID, and select Delete.
Discovering applications on nonstandard port ranges – AppDetective is configured with the default
ports of each of the applications it supports. However, if one or more of your applications are running
on nonstandard ports, there is an option to override AppDetective’s range and to enter the range
yourself. It is important that you do not make the port range too large by including more than 100
204
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX B | CONNECTOR CONFIGURATIONS
ports if possible. AppDetective’s Application Discovery scanner could take a long time for large
numbers of ports.
To specify a custom port range, select the Discover Applications on Nonstandard Ports checkbox.
Next, enter the custom port range in Custom Discovery Port Range field. Note that a valid port range
is made up of one or more ranges or single ports, separated by commas, with no spaces. For example,
to include the ports 1200, 1202, 1203, 1204, 1205, 1207 and 1208 in the Application Discovery scan,
you could enter the range: 1200,1202-1205,1207-1208
FoundScan Connector Configuration
To add an FoundScan connector configuration, enter the information requested on the FoundScan
Connector Configuration screen. For details about the options displayed, please refer to your
FoundScan documentation.
205
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX B | CONNECTOR CONFIGURATIONS
ISS Internet Scanner Connector Configuration
To add an ISS Internet Scanner connector configuration, enter the information requested on the ISS
Internet Scanner Connector Configuration screen. For details about the options displayed, please refer
to your ISS Internet Scanner documentation.
ISS SiteProtector Connector Configuration
To add an ISS SiteProtector connector configuration, enter the information requested on the ISS
SiteProtector Connector Configuration screen. For details about the options displayed, please refer to
your ISS SiteProtector documentation.
206
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX B | CONNECTOR CONFIGURATIONS
Microsoft Baseline Security Analyzer Connector Configuration
On the Microsoft Baseline Security Analyzer (MBSA) Connector Configuration screen, the domain
administrator username and password fields allow you to specify the credentials for the domain
administrator of your target systems. These will be used if MBSA is being run on a machine in one
domain, and you wanted to scan machines in another domain. For example, if MBSA is running on a
machine not in the POLCAP domain, you can scan machines in the POLCAP domain by adding
POLCAP\Administrator as the user, and the matching password.
To add an MBSA connector configuration, enter the information requested on the MBSA Connector
Configuration screen. For details about the options displayed, please refer to your MBSA
documentation.
Note: When MBSA is run from its GUI outside of Preventsys SRM System, you can select a range of
IPs or a Domain to scan. This will produce one file per machine scanned, which Preventsys will
aggregate.
Note: MBSA v2.0 services requires that it run as the local Administrator (./Administrator). When
configuring an assessment you must enter the Username and Password for an MBSA domain
administrator to run a successful assessment (e.g., DOMAIN\ADMINISTRATOR). If these credentials
are not correct or not supplied, the assessment will fail and the following message will be displayed:
“Assessment Failed: ID: 1 - Scan Connector Microsoft Baseline Security Analyzer: Protocol error
(120 / START) got (320/User ID or Password not Supplied).”
Nessus Connector Configuration
The Nessus Connector Configuration screen presents all Nessus scanner options organized under tabs.
Note that Preventsys provides default settings that you can use or edit the configuration as desired.
To add an Nessus connector configuration, enter the information requested on the Nessus Connector
Configuration screen. For details about the options displayed, please refer to your Nessus
documentation. You can also find information at http://www.nessus.org.
207
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX B | CONNECTOR CONFIGURATIONS
The first page of the Nessus Connector Configuration lists every Nessus test broken into categories,
spread across multiple tabs. The second page contains preferences, many of which are specific to the
tests on the first page. Therefore, if a test with an associated set of preferences is disabled, those
preferences will be read-only.
By default, all dangerous tests are disabled and displayed in red, along with a few tests deemed to be
redundant by Preventsys. Note that a test is considered dangerous if the author of that test has placed it
in one of four “dangerous” categories: “ACT_DENIAL”, “ACT_KILL_HOST”, “ACT_FLOOD” and
“ACT_DESTRUCTIVE_ATTACK”. The category of a given NASL script can be determined by
opening it and looking for its “script_category” line.
Each category of tests has a set of buttons marked “All”, “Default” and “None”, which will enable all
tests in the category, set the category’s tests to their default state, or disable all tests in the category,
respectively.
Network Architecture Assessor Connector Configuration
To add an Network Architecture Assessor (NAA) connector configuration, enter the information
requested on the NAA Connector Configuration screen. The configuration screen provides the
following options:
»
Slaves to Test – Select the salves you want tested
»
Rule to Use – Select the rules you want to test with
»
Custom Rules Entry – Enter custom rules (see the “Adding Customer NAA Rules” section for
details)
208
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX B | CONNECTOR CONFIGURATIONS
NAA performs the following tests by default:
»
rfc1918-192.168 – A TCP/IP packet with a source in the RFC 1918 address block of
192.168/16 was able to be sent through the firewall.
»
rfc1918-10 – A TCP/IP packet with a source in the RFC 1918 address block of 10.0.0.0/8 was
able to be sent through the firewall
»
rfc1918-172.16 – A TCP/IP packet with a source in the RFC 1918 address block of 172.16/12
was able to be sent through the firewall.
»
ipzero – A TCP/IP packet with a source address of 0.0.0.0 was able to be sent through the
firewall.
»
localhost-tcp – A TCP/IP packet with a source address of 127.0.0.1 was able to be sent
through the firewall.
»
localhost-udp – A UDP packet with a source address of 127.0.0.1 was able to be sent through
the firewall.
»
src53-echo – A UDP packet with a source port of 53 was able to be sent through the firewall
to the echo port.
»
src53-ssh – A TCP packet with a source port of 53 was able to be sent through the firewall to
the SSH port.
»
icmp-echoreq – An ICMP echo request packet was able to be sent inward through the
firewall.
»
icmp-echorep – An ICMP echo reply packet was able to be sent outward through the firewall.
»
udp-broadcast – A broadcast packet was able to be sent inward through your firewall.
»
src-routing – A source routed packet was able to be sent inward from a packet thrower.
P2P Assessment
NAA can also do P2P assessments that test perimeter defense devices (routers and firewalls) for the
possibility of the following rogue P2P protocols:
»
P2P – Bittorrent traffic
»
P2P – Direct Connection (DC) traffic
»
P2P – Kazaa traffic
209
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX B | CONNECTOR CONFIGURATIONS
You will need to select the policies that contain the rules associated with these protocols when creating
your assessment configuration. Refer to the Preventsys SRM System Policy Reference Guide for
details about these rules.
Adding Custom NAA Rules
NAA can get its rule data from two different sources: from rules entered into the NAA Custom Rules
field in the UI or from rule files you upload to the AS. If you use the second method, you will need to
upload your rules to every AS. In addition, once they’ve been uploaded anyone can use them, which
may not be desirable.
By contrast however, the NAA Connector Configuration screen allows you to paste the contents of
your rule files (referred to as rulesets) into the NAA Custom Rules field. Custom NAA rulesets are
XML documents that contain tests for the NAA. Each document consists of one or more “rules”, each
of which describes a particular packet to send through a firewall. Basically, each packet you configure
should be blocked by the firewall, so that any packet that passes the firewall would be considered a
“failure”.
NAA Custom Rulesets File Layout
The general format of a ruleset document is:
<naarules>
<naarule …XML attributes …>description for rule #1</naarule>
<naarule … XML attributes …>description for rule #2</naarule>
…
<naarule … XML attributes …>description for rule #n</naarule>
</naarules>
As shown above, each rule has a description associated with it. If a given rule is able to be sent
through the firewall being tested, that rule’s description will be used in the results.
NAA Rule Attributes
Each Network Architecture Assessor rule defines a specific packet type that will be sent either
“outward” (from the “Master” to the “Slave”) or “inward” (from the “Slave” to the “Master”).
The following table lists the attributes for NAA rules.
Attribute
Required
dir
Yes
saddr
Yes
daddr
sport
Yes
Yes
Description
Sets the “direction” of the packet for this test. The valid values for this attribute are
“out” (sent from the slave Æ master), “in” (sent from the master Æ slave) and
“both” (the same thing as making two identical rules, one “out”, one “in”).
Sets the source IP address of the packet. This attribute must be specified in one of
three forms:
•
An IP address (for example, “10.4.3.2”)
•
An IP address range, given in either “CIDR” form (ex: 192.168.0.0/16)
or “netmask” form (ex: 192.168.0.0:255.255.0.0)
•
A symbolic address: either “srcaddr” (the address of the host sending the
packet), “srcbcast” (the broadcast address of the host sending the packet),
“destaddr” (the address of the host the packet is being sent to), or
“destbcast” (the broadcast address of the host the packet is being sent to).
Note: In the case of the range format addresses, a random address is selected at
assessment time.
Same format as the saddr attribute
Sets the source port of the packet. This attribute must be specified in one of two
forms:
A port (for example, “12345”)
210
PREVENTSYS™ SRM USER’S GUIDE
Attribute
Required
dport
proto
Yes
Yes
flags
No (except for
ICMP)
Yes
Yes
severity
id
APPENDIX B | CONNECTOR CONFIGURATIONS
Description
A range of ports (for example, “1024-65535”)
Note: In the case of the range format ports, a random port is selected at assessment
time.
Same format as the sport attribute
A string specifying the protocol of the packet. The three acceptable values are
“tcp” (for TCP/IP packets), “udp” (for UDP packets) and “icmp” (for ICMP
packets).
One or more comma-delimited strings that configure the packet. See the “List of
NAA Rule Flags” sections for descriptions of each.
Sets the severity of the rule, from 0-90.
A string specifying an identifier that will be given in the results if the packet
described by this rule is able to pass through the firewall being tested.
NAA Rule Flags
As explained in the NAA Rule Attributes section, the flags attribute may contain one or more commadelimited strings. Each of these strings is protocol-specific, and they alter the behavior of the packet.
Here is a list of the possible flags, along with the protocol the flag is specific to, and a description of its
behavior.
Flag
Protocol
syn
ack
psh
urg
rst
fin
srcrt
TCP
TCP
TCP
TCP
TCP
TCP
TCP
echoreq
echorep
ICMP
ICMP
Description
Sets the SYN flag of the TCP/IP packet
Sets the ACK flag of the TCP/IP packet
Sets the PSH flag of the TCP/IP packet
Sets the URG flag of the TCP/IP packet
Sets the RST flag of the TCP/IP packet
Sets the FIN flag of the TCP/IP packet
Adds the source route option to the TCP/IP packet. The firewall address is
specified as one of the required routes.
Makes an ICMP echo request.packet
Makes an ICMP echo reply packet
Uploading Custom Rules
As mentioned previously you can upload custom NAA rules to an assessment server. The file must
have the form name_naa.xml (where name is a unique identifier describing what the rules test for). Put
the file in the directory /usr/local/preventsys/ASComponents/share/audserv/netarch/ on “each
assessment server”.
211
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX B | CONNECTOR CONFIGURATIONS
Nmap Connector Configuration
To add an Nmap connector configuration, enter the information requested on the Nmap Connector
Configuration screen. For details about the options displayed, please refer to your Nmap
documentation.
QualysGuard Connector Configuration
To add an QualysGuard connector configuration, enter the information requested on the QualysGuard
Connector Configuration screen. For details about the options displayed, please refer to your
QualysGuard documentation.
Note: The Qualys Account must be activated on the Qualys website prior to attempting a Preventsys
Assessment with Qualys.
212
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX B | CONNECTOR CONFIGURATIONS
Retina Connector Configuration
To add an Retina connector configuration, enter the information requested on the Retina Connector
Configuration screen. For details about the options displayed, please refer to your Retina
documentation.
Note: When upgrading to Retina 5.0, existing assessment configurations that have a previous version
of eEye Retina selected must be recreated and the new version selected. Simply editing the assessment
configuration or using the "copy existing" feature is not recommended.
WiFi Connector Configuration
The WiFi Connector Configuration screen opens with a license agreement disclaimer. Read the
disclaimer and select the Accept checkbox to continue.
To add an WiFi connector configuration, enter the information requested on the WiFi Connector
Configuration screen. The configuration screen provides the following options:
»
Static IP Address – Enter a static IP address. If you do not want the WiFi card to attempt to
obtain an IP address from each access point using DHCP, you may enter an IP address and
Netmask in the format IP:Netmask (for example “10.2.3.4:255.255.255.0”).
»
Known WEP Keys – Enter known WEP keys for wireless access points on your network.
Select a key length and then enter a WEP key. Select Insert to add additional keys. WEP
keys may be entered as either a plain string of text or as hexadecimal digits preceded by ‘0x’.
On the first iteration of the passive scanning loop, the WiFi server attempts to sniff all of the
theoretically possible wireless channels. In addition, the WiFi sever attempts to detect hidden access
points. If a hidden access point is detected, the server will attempt to decloak it (i.e. obtain the service
set identifier (SSID)).
213
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX B | CONNECTOR CONFIGURATIONS
WinReg Connector Configuration
To add an WinReg connector configuration, enter the information requested on the WinReg Connector
Configuration screen. The configuration screen provides the following options:
»
Authentication – Enter the usernames and passwords for the local and domain administrator
accounts you want used. When the Windows Registry scanner attempts to acquire a registry
key from a target, it will present the credentials from each of the accounts you specified, in
addition to the account specified at WSM install time. If no accounts are specified, WinReg
will only attempt to acquire the remote keys with the credentials specified at WSM install
time.
»
Registry Keys to Acquire – Enter the specific registry keys that you want tested. Each
Registry key must be entered on a separate line. For example, to test two registry keys,
simply type or paste the first key into the text box, hit [ENTER], and then proceed to type or
paste the second key on the next line. Note that wildcard entries for registration keys can
return large amounts of data that may slow down and even exhaust the memory of the
Assessment Server and Enterprise Security Management Server.
214
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX B | CONNECTOR CONFIGURATIONS
The following wildcard entries may be used when entering registration keys:
»
*  An asterisk alone at the end of a key entry will return all values under the specified key
but will not recurse subkeys. For example,
“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\*” will
return all values under CurrentVersion but will not recurse into subkeys like Credentials.
»
**  A pair of asterisks at the end of a key will return all values under the specified key and
will recurse into subkeys. Note that this wildcard can return LARGE amounts of data.
»
*  Asterisks are also supported as intermediate keys. For example,
“HKEY_USERS\*\Environment\TEMP” will return the TEMP directory setting for each user
registered on the scanned machine.
Additionally, since “\” is a legal character in a value name, if you wish to read the value data
of a value named “test\val” under registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft, you must “escape” the “\” by doubling
it. “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\test\\val” would be used in this
case.
Assessments that utilize the Preventsys Remote Windows Registry Scanner v1.0 without specifying
Registry keys, will still acquire the OSDetect data described previously. This data may be utilized by
the Registry-specific rules described later in this section.
Windows-Based Rules
The following standard, Windows-specific rules may be used to interface with WingReg:
»
Minimum Password Length Rule
Rule Name: Win_Reg_Prohibited_Software--Template
Rule Description: All windows registry keys that represent specific applications found in this
rule will trigger a violation. By default, keys for Kazaa, AIM, and MSN Messenger are
provided.
This is a template rule. To use this rule, the XML element <prohibited_software> should be
configured with the registry keys of software applications that are prohibited by corporate
policy.
215
PREVENTSYS™ SRM USER’S GUIDE
»
APPENDIX B | CONNECTOR CONFIGURATIONS
Require Alpha-Numeric Passwords Rule
Rule Name: Win_Reg_Ctrl_Alt_Del_Logon
Rule Description: Pressing CTRL-ALT-DEL to get to the initial logon screen is required on
Windows 2000 and Windows XP hosts.
»
Automatic Logon to Windows Ruleplay
Rule Name: Win_Reg_Auto_Logon
Rule Description: Automatic Logon is allowed on this host.
This rule checks to see if automatic logon to the windows machine occurs. It reports a
violation if it does.
»
Windows Last Logon Rule
Rule Name: Win_Reg_Last_Logon
Rule Description: This host shows the previous user that logged on.
This rule checks to see if the last username that logged into the system is displayed whenever
someone logs in. It reports a violation if it does.
»
Logon Banner Rule
Rule Name: Win_Reg_Logon_Banner—Template
Rule Description: All Windows Logon Banners must conform to a company banner.
216
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX C | IMPORTING ASSESSMENT DATA
APPENDIX C
Importing Assessment Data
Externally gathered assessment data can be imported into the Preventsys SRM System using the
Assessment Import functionality. The steps for importing assessment data is discussed in detail in the
“Assessments” chapter. This appendix presents information about the different types of file import
and scan import screens that can be displayed based on which import options you select.
File Import
This section presents the different types of import screens displayed based on the type of “file” import
selected in GUI.
Preventsys XML File Import
The following screen is display if “Preventsys XML” is selected. Enter the path for the xml file you
want to import or select Browse to find. Select Submit to import the file.
217
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX C | IMPORTING ASSESSMENT DATA
Generic XML File Import
The following screen is display if “Generic XML (XSL Required)” is selected. Enter the path for the
xml file you want to import or select Browse to find. Enter the path for the xsl transform you want
used or select Browse to find. Select Submit to import the file.
AppDetective XML File Import
The following screen is display if “AppScan XML” is selected. Enter the path for the xml file you
want to import or select Browse to find. Select Submit to import the file.
218
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX C | IMPORTING ASSESSMENT DATA
AppScan 5 XML File Import
The following screen is display if “AppScan 5 XML” is selected. Enter the path for the xml file you
want to import or select Browse to find. Select Submit to import the file.
AppScan 6 XML File Import
The following screen is display if “AppScan 6 XML” is selected. Enter the path for the xml file you
want to import or select Browse to find. Select Submit to import the file.
219
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX C | IMPORTING ASSESSMENT DATA
FoundScan Risk Data XML File Import
The following screen is display if “FoundScan Risk Data XML” is selected. Enter the path for the xml
file you want to import or select Browse to find. Select Submit to import the file.
FoundScan Risk and Host Data XMLs File Import
The following screen is display if “FoundScan Risk & Host Data XMLs” is selected. Enter the path
for the host data xml results file you want to import or select Browse to find. Enter the vulnerability
data xml results file you want to import or select Browse to find. Select Submit to import the file.
220
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX C | IMPORTING ASSESSMENT DATA
MBSA XML/Zip File Import
The following screen is display if “MBSA XML/Zip” is selected. Enter the path for the file or .zip file
you want to import or select Browse to find. If you want to import a zip file, you must also enter the
password for the zip file. Select Submit to import the file.
nCircle IP360 XML2 File Import
The following screen is display if “nCircle IP360 XML2” is selected. Enter the path for the xml file
you want to import or select Browse to find. Select Submit to import the file.
221
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX C | IMPORTING ASSESSMENT DATA
Nessus XML File Import
The following screen is display if “Nessus XML” is selected. Enter the path for the xml file you want
to import or select Browse to find. Select Submit to import the file.
Nessus NSR File Import
The following screen is display if “Nessus NSR” is selected. Enter the path for the NSR formatted
results you want to import or select Browse to find. Select Submit to import the file.
222
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX C | IMPORTING ASSESSMENT DATA
NeXpose XML File Import
The following screen is display if “NeXpose XML” is selected. Enter the path for the xml file you
want to import or select Browse to find. Select Submit to import the file.
NGSSquirrel for Oracle XML File Import
The following screen is display if “NGSSquirrel for Oracle XML” is selected. Enter the path for the
xml file you want to import or select Browse to find. Select Submit to import the file.
223
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX C | IMPORTING ASSESSMENT DATA
NGSSquirrel for SQL Server XML File Import
The following screen is display if “NGSSquirrel for SQL Server XML” is selected. Enter the path for
the xml file you want to import or select Browse to find. Select Submit to import the file.
Nmap XML File Import
The following screen is display if “Nmap XML” is selected. Enter the path for the xml format results
you want to import or select Browse to find. Select Submit to import the file.
224
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX C | IMPORTING ASSESSMENT DATA
QualysGuard XML File Import
The following screen is display if “QualysGuard XML” is selected. Enter the path for the xml results
file you want to import or select Browse to find. Select Submit to import the file.
Scan Import
This section presents the different types of import screens displayed based on the type of “scan” import
selected in GUI.
AppDetective Scan Import
The following screen is display if “AppDetective” is selected. Select the scan you want to import.
Select Submit to import the scan.
225
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX C | IMPORTING ASSESSMENT DATA
FoundScan Scan Import
The following screen is display if “FoundScan” is selected. Select the scan you want to import. Select
Submit to import the scan.
QualysGuard Scan Import
The following screen is display if “QualysGuard” is selected. Select the scan you want to import.
Select Submit to import the scan.
226
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX C | IMPORTING ASSESSMENT DATA
Retina Scan Import
The following screen is display if “Retina” is selected. Select the scan you want to import. Select
Submit to import the scan.
SiteProtector Scan Import
The following screen is display if “SiteProtector” is selected. Select the scan result you want to
import, or enter the SiteProtector Job ID you want to import, or enter the Internet Scanner Job ID you
want to import. Select Submit to import the scan.
227
PREVENTSYS™ SRM USER’S GUIDE
APPENDIX D | DATABASE BACKUP GUIDELINES
APPENDIX D
Database Backup Guidelines
This appendix provides instructions that are meant to serve as general guidelines about how the
Preventsys database could be backed up. If the Preventsys database is located on a database server that
is used for other applications, then it can be included in that server’s backup schedule if the frequency
of backups is acceptable.
These instructions are not meant to replace existing corporate backup strategies and should be viewed
as supplemental information pertaining only to the Preventsys SRM System. Please note that the
commands listed below are to create full “logical” backups of the Preventsys SRM System database.
Consult the official documentation for each database for information about doing a physical file-based
backup.
Backup
pg_dump –U <username> -h <ip-address> -f <backup-filename.sql> <databasename>
For example:
pg_dump –U preventsys –h 192.168.0.10 –f compliance.sql preventsys
Restore
psql –U <username –h <ip-address> -f <backup-filename.sql> <databasename>
For example:
psql –U preventsys –h 192.168.0.10 –f compliance.sql preventsys
Please note that it may be necessary prior to restoring, to drop/recreate the database if it already has
tables and data in it. Use extreme caution when dropping a database, and ensure that you have a
current backup.
These are the commands that should be run in this case:
psql –U <username –h <ip-address> template1
drop database <databasename>;
create database <databasename>
;
228
PREVENTSYS™ SRM USER’S GUIDE
GLOSSARY
GLOSSARY
A policy violation or vulnerability that was detected, but the user decides that the
risk is acceptable and therefore does not plan to fix the associated remediation. Vulnerabilities and
policy violations associated with remediation tasks that have the False Positive status are treated the
same as Claimed Resolved tasks when calculating and display data for reports.
Accepted Risk
The Administrative Client is a browser-based client, which serves as the
user’s interface to the Enterprise Security Management Server. This client is responsible for allowing
users to perform user management, assessment, and system configuration tasks, as well as report
navigation and remediation functions.
Administrative Client
Assessment
The process by which a network group is scanned for policy violations and
vulnerabilities.
Defines, which network groups, policies, and scan modules, should be
utilized in network assessments.
Assessment Configuration
Assessment schedules are used to schedule the execution of previously
defined assessment configurations. Assessments can be scheduled to execute immediately, execute
once at a specified date and time, or execute periodically according to a recurring schedule.
Assessment Schedule
Assessment Server The server (or cluster of servers) which hosts the actual scanners. The scanners
are configured by the Enterprise Security Management Server through an administrative interface
presented to the administrator resulting in ASCP sessions describing scanner configuration parameters.
Assessment Server Control Protocol (ASCP)
Protocol used to facilitate Assessment Server
communication.
A list of all revoked certificates, including the dates of issue, the
entities that issued them, and the reasons for revocation.
Certificate Revocation List (CRL)
Enterprise Security Management Server The Enterprise Security Management Server is the server
(or cluster of servers) which provides the administrative interface to the Preventsys software. This
server is responsible for allowing the administrator to configure target asset and network information,
assessment sessions, and to review reported results of assessments.
Confirmation Page
A screen that checks for confirmation prior to the removal of a user, asset, PDL
rule, or other item.
Continuous Security Improvement
A process by which network security is continually refined to
provide enhanced security.
A computer host or small network inserted as a buffer between a private
network and the outside public network to prevent outside users from gaining direct access to
resources on the private network.
Demilitarized Zone (DMZ)
Distinguished Name (DN)
A section of an X509 certificate that describes the certificate’s purpose
and issuer.
Dollar Value
A financial impact associated with an asset for calculating assets at risk data.
229
PREVENTSYS™ SRM USER’S GUIDE
Domain Name System (DNS)
GLOSSARY
A distributed database that manages the mapping of host names to
numerical IP addresses.
Dynamic Host Configuration Protocol (DHCP)
A protocol used to allocate IP addresses
dynamically to computers on a local area network.
The Dynamic Packet Filter (DPF) is a packet filter and application
level proxy-based firewall designed to protect the Preventsys Scanner environment from exploitation.
Note: DPF servers are not required for minimum installation.
Dynamic Packet Filter (DPF)
DPF rules can be defined to manage communications between
Preventsys components and the assessed network groups.
Dynamic Packet Filter (DPF) Rule
Protocol employed by DARC to report the
correlation between IP addresses and host identity in network environment with dynamic IP addresses.
Dynamic Target Address Resolution Protocol (DTARP)
Extensible Markup Language (XML)
A standard for creating special purpose markup languages.
Extensible Stylesheet Language (XSL)
A language used to describe how files encoded in the XML
standard are to be formatted.
A policy violation or vulnerability that is detected when no such policy violation or
vulnerability is active on the specified host. Vulnerabilities and policy violations associated with
remediation tasks that have the False Positive status are treated the same as Claimed Resolved tasks
when calculating and display data for reports.
False Positive
A suffix applied to imported PDL policies in order to distinguish them from
previously existing PDL policies with identical names.
Global Suffix
A specific workstation, server, router, switch, or other type of machine on the assessed
network.
Host
Hosts utilize host properties to define type of host (i.e. server, desktop, DMZ, etc.) for
analysis. Host properties allow for the detection of policy violations in the context of host type when
PDL policies are applied to assessment results. There are two types of host properties: Label and
Specification.
Host Property
Hypertext Transfer Protocol (HTTP)
A protocol used to request and transmit Web content over the
Internet or other computer networks.
Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)
An encrypted version of HTTP
used for secure communications.
IP Address
IP Range
An address used to identify hosts on a network.
A range of IP addresses.
MAC Address
An address used to identify hosts on a network based on network interface card.
The Preventsys SRM System is put into maintenance mode during all updates
and rollbacks. When in maintenance mode only Super Users are allowed to log in.
Maintenance Mode
Manual Audit Task (MAT) A special task that must be tested and verified manually via the
Administrative Client. A fully configured manual audit task has a schedule and has one or more users
that are assigned to the task.
230
PREVENTSYS™ SRM USER’S GUIDE
GLOSSARY
A rule that reports violations based upon a specific manual audit task. A
manual audit task rule can optionally report a violation if the manual audit task is not configured
correctly.
Manual Audit Task Rule
Mask
See Network Mask.
Netmask
See Network Mask.
A collection of IP-based systems (routers, switches, servers, firewalls, etc.) that are grouped
as a logical unit. For example, one network could be the “Finance Network” which would include all
of the servers, routers, and systems that service the finance department.
Network
A network or cluster of networks that are grouped together for assessment
configuration and analysis. Network groups must be defined prior to scheduling assessments.
Network Group
A string of “0”s and “1”s that mask the network portion of an IP address so that only
the unique host address remains.
Network Mask
Networks utilize network properties to define network type for analysis. Network
properties allow for the detection of policy violations in the context of network type when PDL
policies are applied to assessment results.
Network Property
Pagination Controls
A series of links that allow for convenient navigation through long lists of data.
Policy Definition Language (PDL) The Policy Definition Language (PDL) utilizes XSL templates to
create PDL rules that identify specific policy violations and vulnerabilities via analysis.
PDL policies represent collections of PDL rules that together
form a cohesive corporate security policy.
Policy Definition Language Policy
Policy Definition Language Rule
PolicyLab
The tools and functions used to manage PDL rules and policies.
Policy Violation
Port
PDL rules are used to define network security policy.
A condition that violates defined network policy.
A logical connection place that allows for the communication of Internet services.
Permissions are the actions you can conduct on a resource. For example, you can
“add” a user. Resources and their permission grant access to the functionality in the system via
groups.
Permissions
Protocol
A specification describing how computers communicate on a network.
A Registry is a database used by the Windows operating system (Windows 95 and NT)
to store configuration information. The Registry Keys are contained in this database. Each Key may
have one or more Registry Values associated with it. Each key may also have an “Unnamed Value”
associated with it.
Registry Key
Entries associated with a Registry Key, consisting of: Name / Type / Data. To
access this data, the registry key is entered in the form: key[\key_n…]\registry_value_name.
Registry Value
Relational Database Management System The Relational Database Management System
(RDBMS) stores Preventsys configuration data and scan results in both raw and analyzed formats.
231
PREVENTSYS™ SRM USER’S GUIDE
Remediation Task
GLOSSARY
A task assigned to an administrator to alleviate a detected policy violation or
vulnerability.
Reports present assessment data and analysis.
Report
The selection of specific assessments and PDL policies that are then used to
generate report data.
Report Context
Identifies whether individual PDL rules are used to detect policy violations or
vulnerabilities.
Rule Type
Scan Module
Service
Scanning software utilized by Assessment Servers when assessing network groups.
A network application associated with a specific port.
Defines the severity of policy violations and vulnerabilities. Severity levels range from 1 to
100, with 100 being the most severe.
Severity
Solution
A text description and/or links for alleviating policy violations.
A scheme for IP addressing which associates a unique and unchanging IP address with
every host on the network.
Static IP
A unique host identifier that represents either a static IP address or a MAC address in
DHCP systems.
Unique ID
Entries associated with a Registry key consisting of Name / Type / Data. To
access this data, the registry key is entered in the form: key[\key_n…]\ - this would return the
Unnamed Value associated with key_n.
Unnamed Value
User
An account authorized to access the Preventsys SRM System.
Virtual LAN (VLAN) Group of devices on one or more LANs that are configured (using management
software) so that they can communicate as if they were attached to the same wire, when in fact they are
located on a number of different LAN segments. Because VLANs are based on logical instead of
physical connections, they are extremely flexible
Vulnerability
A bug or flaw in software or hardware that could compromise network security.
232