eTrust Audit Administrator Guide

Transcription

eTrust Audit Administrator Guide
This documentation and related computer software program (hereinafter referred to as the “Documentation”) is for
the end user’s informational purposes only and is subject to change or withdrawal by Computer Associates
International, Inc. (“CA”) at any time.
THIS DOCUMENTATION MAY NOT BE COPIED, TRANSFERRED, REPRODUCED, DISCLOSED OR
DUPLICATED, IN WHOLE OR IN PART, WITHOUT THE PRIOR WRITTEN CONSENT OF CA. THIS
DOCUMENTATION IS PROPRIETARY INFORMATION OF CA AND PROTECTED BY THE COPYRIGHT LAWS
OF THE UNITED STATES AND INTERNATIONAL TREATIES.
TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS”
WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IN NO EVENT
WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR
INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST
PROFITS, BUSINESS INTERRUPTION, GOODWILL OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED OF
SUCH LOSS OR DAMAGE.
THE USE OF ANY PRODUCT REFERENCED IN THIS DOCUMENTATION AND THIS DOCUMENTATION IS
GOVERNED BY THE END USER’S APPLICABLE LICENSE AGREEMENT.
The manufacturer of this documentation is Computer Associates International, Inc.
Provided with “Restricted Rights” as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.227-19(c)(1) and (2) or
DFARS Section 252.227.7013(c)(1)(ii) or applicable successor provisions.
 1999-2001 Computer Associates International, Inc., One Computer Associates Plaza, Islandia, New York 11749.
Portions of this product  1999-2001 Memco Software Ltd., a CA company. All rights reserved.
All trademarks, trade names, service marks, or logos referenced herein belong to their respective companies.
Contents
Chapter 1: Preface .................................................................1-1
eTrust Audit Advantages .................................................................................................................................... 1-1
Accountability ................................................................................................................................................ 1-2
Native Auditing Supported by eTrust Audit 1.5 ...................................................................................... 1-3
What Happens to Native Auditing? ........................................................................................................... 1-3
How eTrust Audit 1.5 Empowers Your Auditing ............................................................................................ 1-6
Components of eTrust Audit 1.5......................................................................................................................... 1-6
Architecture ........................................................................................................................................................... 1-9
The importance of eTrust Audit ....................................................................................................................... 1-10
Getting started with eTrust Audit 1.5 .............................................................................................................. 1-15
Product information .................................................................................................................................... 1-15
Chapter 2: Pre-Installation Planning .....................................2-1
Planning What to Audit ....................................................................................................................................... 2-1
The Client............................................................................................................................................................... 2-2
The Policy Manager.............................................................................................................................................. 2-5
Data Tools ............................................................................................................................................................ 2-10
System requirements .......................................................................................................................................... 2-14
Chapter 3: Installing eTrust Audit...........................................3-1
Installing the Client .............................................................................................................................................. 3-1
Installing the Policy Manager.............................................................................................................................. 3-5
Installing Data Tools............................................................................................................................................. 3-6
Starting the Services ...................................................................................................................................... 3-8
Chapter 4: Policy Management............................................4-1
Database.......................................................................................................................................................... 4-2
Contents
iii
Service ..............................................................................................................................................................4-2
Policy Manager GUI..............................................................................................................................................4-2
Policies .............................................................................................................................................................4-3
Audit Nodes..................................................................................................................................................4-14
Policy Activation Log...................................................................................................................................4-19
The Users Window.......................................................................................................................................4-21
Chapter 5: Data Tools.............................................................5-1
Database ..........................................................................................................................................................5-1
Service ..............................................................................................................................................................5-2
Audit Viewer..........................................................................................................................................................5-2
The Audit Reporter .............................................................................................................................................5-18
Security Monitor ..................................................................................................................................................5-22
Chapter 6: Services ................................................................6-1
The eAudit recorder service.................................................................................................................................6-1
The eAudit SNMP recorder service ....................................................................................................................6-6
The redirector service............................................................................................................................................6-8
The Collector Service...........................................................................................................................................6-10
The Log Router Service.......................................................................................................................................6-12
The router configuration File ......................................................................................................................6-14
The Action Manager Service ..............................................................................................................................6-15
The eAudit Distribution Agent Service ............................................................................................................6-20
The eAudit Distribution Server Service............................................................................................................6-22
The Portmap Service ...........................................................................................................................................6-23
Chapter 7: Registry Keys and ini Files...................................7-1
Windows.................................................................................................................................................................7-1
Current Version .....................................................................................................................................................7-2
Components ...........................................................................................................................................................7-2
Paths ........................................................................................................................................................................7-2
Ports.........................................................................................................................................................................7-2
RPC..........................................................................................................................................................................7-4
Messages .................................................................................................................................................................7-4
Severity ............................................................................................................................................................7-4
Targets..............................................................................................................................................................7-5
Mail..........................................................................................................................................................................7-6
iv
eTrust Audit Administrator Guide
Client ...................................................................................................................................................................... 7-6
SeOS................................................................................................................................................................. 7-6
Recorders ........................................................................................................................................................ 7-7
Redirector ....................................................................................................................................................... 7-8
Router............................................................................................................................................................ 7-10
Management Agent ..................................................................................................................................... 7-14
Policy Manager ................................................................................................................................................... 7-17
Database........................................................................................................................................................ 7-17
Distribution Log........................................................................................................................................... 7-17
Distribution Server ...................................................................................................................................... 7-17
Data Server .......................................................................................................................................................... 7-19
Database........................................................................................................................................................ 7-20
Viewer ........................................................................................................................................................... 7-20
Collector........................................................................................................................................................ 7-21
Reports .......................................................................................................................................................... 7-21
Monitors ............................................................................................................................................................... 7-22
Security Monitor .......................................................................................................................................... 7-22
UNIX..................................................................................................................................................................... 7-23
eAudit.ini ............................................................................................................................................................. 7-23
Current Version ........................................................................................................................................... 7-23
Components ................................................................................................................................................. 7-23
Paths .............................................................................................................................................................. 7-23
Ports............................................................................................................................................................... 7-24
Messages ....................................................................................................................................................... 7-25
Mail................................................................................................................................................................ 7-26
Client ............................................................................................................................................................. 7-27
Recorders ...................................................................................................................................................... 7-27
Router............................................................................................................................................................ 7-27
Management Agent ..................................................................................................................................... 7-31
recorder.ini........................................................................................................................................................... 7-33
Appendix A: Advanced Options ......................................... A-1
Encryption ............................................................................................................................................................ A-2
SMTP ..................................................................................................................................................................... A-4
Firewall.................................................................................................................................................................. A-4
Configuring an Oracle client .............................................................................................................................. A-4
Windows NT Authentication with Microsoft SQL Server ............................................................................. A-5
Changing the Database Type ............................................................................................................................. A-6
Policy Manager Options ..................................................................................................................................... A-7
The Rule Wizard .................................................................................................................................................. A-8
Contents
v
Reduce Events Example ........................................................................................................................... A-14
Customizing the Viewers ................................................................................................................................. A-14
Column Width ............................................................................................................................................ A-15
Window/Table Properties ........................................................................................................................ A-16
Data Styles ................................................................................................................................................... A-16
Encup .................................................................................................................................................................. A-17
Security-related Windows NT Event IDs ....................................................................................................... A-17
Debug .................................................................................................................................................................. A-20
Example for Debug .................................................................................................................................... A-20
Appendix B: Submit API .........................................................B-1
Mapping ......................................................................................................................................................... B-1
Message routing ............................................................................................................................................ B-1
Submitting a Message to the Router ........................................................................................................... B-2
If submit fails ................................................................................................................................................. B-2
Compiling and linking......................................................................................................................................... B-2
Library ............................................................................................................................................................ B-2
Sample SAPI usage............................................................................................................................................... B-3
SAPI reference....................................................................................................................................................... B-5
SAPI_Init......................................................................................................................................................... B-6
SAPI_NewMessage ....................................................................................................................................... B-6
SAPI_AddItem............................................................................................................................................... B-6
SAPI_SubmitMsg .......................................................................................................................................... B-7
SAPI_RemoveMessage ................................................................................................................................. B-8
SAPI_ DumpMessage ................................................................................................................................... B-8
SAPI_DestroyCTX ......................................................................................................................................... B-9
SAPI_SetRouter ............................................................................................................................................. B-9
SAPI_SetRouterPort .................................................................................................................................... B-11
SAPI_ SetRouterTimeout............................................................................................................................ B-11
SAPI return codes and errors............................................................................................................................ B-11
Fields for the SAPI.............................................................................................................................................. B-14
Field Properties............................................................................................................................................ B-14
Examples of mapping ........................................................................................................................................ B-15
Mandatory fields for event identification ................................................................................................ B-15
Common predefined fields for event identification ............................................................................... B-17
Optional predefined fields for event identification ................................................................................ B-18
Common predefined fields for event description ................................................................................... B-18
Mapping events to predefined categories................................................................................................ B-21
System Access .............................................................................................................................................. B-22
Account Management................................................................................................................................. B-23
vi
eTrust Audit Administrator Guide
Object Access................................................................................................................................................B-24
Policy Management .....................................................................................................................................B-27
Security Systems Status ..............................................................................................................................B-27
Network ........................................................................................................................................................B-28
Detailed Tracking ........................................................................................................................................B-30
System/Application, Administration and General Events....................................................................B-31
Fields internal to eTrust Audit...................................................................................................................B-31
Reserved Keywords.....................................................................................................................................B-32
Contents
vii
Chapter
1
Preface
This book is a complete guide to eTrust Audit 1.5.
This book was written for auditors and system administrators who are
implementing and maintaining protected environments supported by eTrust
Audit 1.5, and who may be users of other products pertaining to the eTrust
family.
eTrust Audit Advantages
eTrust Audit 1.5:
■
■
■
■
■
Provides a rich set of out-of-the-box host-based intrusion detection policies,
which allow you to protect your whole enterprise across heterogeneous
environments
Collects and archives security audit data from various sources in a consistent,
searchable format with powerful filters, reporting and analyzing capabilities
Has a flexible architecture, which makes it suitable for the needs of small
businesses as well as for large enterprises
Lets you define your own policies by using a simple graphical interface,
which guides you through the steps of defining a new policy
Responds to suspicious events with e-mail, pop-up messages, scrolling alerts,
and other actions
Preface
1–1
eTrust Audit Advantages
eTrust Audit puts powerful tools at your disposal:
■
■
■
■
■
■
eTrust Audit filters, forwards, and centralizes audit data from different
applications, platforms, and operating systems. For details, see Native
Auditing Supported by eTrust Audit 1.5 in this chapter.
An API lets you expand eTrust Audit’s recording facilities to the clients of
your choice, thus letting you incorporate Windows NT, Windows 2000 and
UNIX applications.
A single management GUI lets you control policies system-wide.
When suspicious events are detected, then besides writing to the database or
to a file, eTrust Audit can respond by:
-
Sending e-mail
-
Sending pop-up screen messages
-
Displaying scrolling alerts
-
Sending messages to Unicenter TNG
-
Running user-defined executable programs and batch files
-
Sending SNMP traps
eTrust Audit uses a highly flexible multi-tier architecture. Events from each
station can be forwarded to anywhere in the network for storage, actions, or
additional processing.
eTrust Audit includes an API that lets you customize responses to audit
events by adding new actions
Accountability
Network security administrators face three challenges, known as the
“Security AAA”:
■
Authentication — who is it?
■
Authorization — what is allowed?
■
Accountability — who did what?
The first two items are up to you to control with administrative or security tools,
either native or third party such as eTrust Access Control.
Native auditing event logs provide the basis for accountability. These logs are
written by most operating systems, DBMSs, and commercial and homegrown
applications to reflect the actual transactions performed by them, immediately
after the transactions are completed.
1–2
eTrust Audit Administrator Guide
eTrust Audit Advantages
Native Auditing Supported by eTrust Audit 1.5
■
Windows NT/2000
■
UNIX (syslog, sulog, and others — expandable on demand)
■
Other eTrust products, such as:
-
eTrust Access Control
-
eTrust Intrusion Detection
-
eTrust Single Sign On
-
eTrust VPN
-
eTrust content inspection
-
Other eTrust products soon to be added
■
Netscape Enterprise Server
■
Apache Web Server
■
Oracle Server Enterprise Edition
■
OS/390 CA - Top Secret (through SNMP)
■
OS/390 CA - ACF2 (through SNMP)
■
CA-TNG (through SNMP)
■
OS/390 IBM - RACF (through SNMP)
■
Any source that can send SNMP traps
eTrust Audit 1.5 accepts data from any platform or application by using its
Submit API (SAPI) or eAudit SNMP recorder. You can configure virtually any
platform, including mainframe, to submit its events to an eTrust Audit router for
further handling. All information is mapped into a uniform format, which highly
resembles the format of NT Event Viewer. You can also create an Audit recorder
(in UNIX only).
Without eTrust Audit, data from these logs stays where it originated — on local
systems. Native auditing does not forward or collect data.
What Happens to Native Auditing?
The native auditing offered by applications and operating systems is uniformly
underutilized.
Turned on
Turned off
So much data is created that important
events cannot be found
No data
Preface 1–3
eTrust Audit Advantages
Turned on
Turned off
Auditors use different tools for each
environment
No data
The result in either case: organizations do not know what is happening on their
systems.
Native auditing is seldom used effectively because:
■
Logs grow large and are overwritten
■
Data is written locally and discarded
■
Tools for sorting and analyzing data are insufficient
■
There is no central control of policies
■
Events that happen on different hosts cannot be correlated, because of the
following reasons:
- Cross-platform analysis is impossible
- Audit format is different
- Reduction capabilities are limited
- Alerting facilities and analysis tools are non-existent
- UNIX systems create insufficient audit data
- Viewing tools are inadequate
eTrust Audit 1.5 solves these problems by offering full control on recording
native auditing:
■
Audit file size is controlled, with an additional back-up option
■
Data is recorded into central databases
■
Data is mapped to a common format, while preserving the original data
■
One smart tool is used for sorting, filtering, and analyzing the data
■
Security policies are centrally controlled
■
Cross-platform is built-in
■
■
1–4
Events that take place on different hosts and different platforms can be
correlated
eTrust Audit 1.5 Viewer GUI offers a powerful viewing tool
eTrust Audit Administrator Guide
eTrust Audit Advantages
Weakness of Windows
NT Native Auditing
Administrators have full control of objects on a domain (or, if they do not have
control, they can take it). This makes the Administrator accounts and
Administrators group powerful tools for intruders, which is a severe security
weakness in Windows NT.
For example, when intruders attempt a password attack in Windows NT, they
may soon reach the Bad Password limit for the account and be locked out, unless
they were attempting to break into an Administrator account.
Windows NT does not provide lockout for Administrator accounts.
The lockout event appears in the event log only for the workstation where the
bad passwords were entered, and only if that workstation enabled auditing for
failed logon/logoff events. No event is ever logged at the domain controller.
■
■
■
Without eTrust Audit, the auditor who suspects an improper use of an account
must search the event logs of all client stations to find the lockout.
With eTrust Audit, the sequence of events appears in the event database;
appropriate alerts are distributed in near-realtime.
With eTrust Access Control, properly configured, no intrusion can occur; a
detailed description of the attempted intrusion is forwarded to eTrust Audit.
Preface 1–5
How eTrust Audit 1.5 Empowers Your Auditing
How eTrust Audit 1.5 Empowers Your Auditing
Properly configured, your native auditing provides eTrust Audit 1.5 with many
types of events, such as:
■
Logon/logoff and other security events
■
User administration
■
File, directory, and (in Windows NT) registry access
■
Audit policy changes
■
Object access
■
System events
■
Application events
In themselves, these events are routine occurrences which may take place on a
network thousands of times each day. However, under certain circumstances,
they can constitute suspicious events.
In addition, using eTrust Audit lets you create new event sources, by specifying
customized criteria for indicating security breaches.
Patterns of Suspicious Activity
By using Policy Manager’s out-of-the-box security policies, you can use native
auditing events to detect intrusion patterns such as:
■
■
■
■
Password guessing and theft of password files. (For example: if a user
performs three failed access attempts on the same computer and succeeds
only in the fourth attempt, or if a user performs three failed access attempts
on three different computers, operated by three different operating systems,
in a very short period).
Illegal use of administrative privileges to define new accounts
Illegal access to critical resources such as system files and sensitive registry
entries
Hiding actions, such as clearing or resetting auditing, performing changes in
audit setup, and hiding the origins of activity
■
Deleting, replacing, or modifying important data
■
Shutdowns of services and systems
Components of eTrust Audit 1.5
1–6
eTrust Audit Administrator Guide
Components of eTrust Audit 1.5
eTrust Audit 1.5 offers almost limitless flexibility in a multi-tier architecture.
Every computer in your network can participate as a client, and any user in your
network can receive eTrust Audit’s alerts, mail, and system status notifications.
Properly configured, eTrust Audit’s services can transmit events through
firewalls and across the Internet to forward audit data protected by the
encryption method of your choice.
The components of eTrust Audit 1.5 include:
■
■
■
Services — collect and forward audit data, generating actions and alerts
Databases — event databases that store audit data for analysis and
management, and a configuration database that stores your intrusion
detection policies
Graphical user interfaces:
– Policy Manager manages policy administration
– Audit Viewer displays, sorts and filters audit events stored in central
databases. You can also save your own customized filters for future use.
- Audit Reporter lets you view and schedule detailed, graphic reports
based on the event database
- Security Monitor displays scrolling alerts in near real-time
Actions
eTrust Audit creates a local data file of selected events on each client system and
delivers the data to its dedicated event databases. In addition, selected records
can be written to files sent to SNMP servers and Unicenter TNG, or send e-mail
notifications to specific users, security administrators and so on.
Preface 1–7
Components of eTrust Audit 1.5
Policy Management
The composition of rules in the Policy Manager GUI follows an intuitive scheme.
Rules can be added at any point in a hierarchy, and are held to incorporate all the
conditions applying at that point and above.
For example, to generate an action whenever an administrator logs on to a
Windows NT server named Techserv, you do not have to write a rule including
Logon, S, Administrator, and other features of the event. You only need to
navigate to the rule for successful logons by administrators and add a rule with a
single condition - that the computer name is Techserv. If you want to ensure that
the action you specify does not duplicate an action already configured for that
event, you can specify a rule dictating that this action is performed only once. Do
that by highlighting the required policy (NT, UNIX and so on) and selecting the
Summary command from the Policy menu. Alternatively, highlight the policy
and then right-click and select Summary from the pop-up menu.
1–8
eTrust Audit Administrator Guide
Architecture
Architecture
eTrust Audit 1.5 uses a highly flexible multi-tier architecture. Any number of
clients, servers, and database stations can be incorporated in the auditing
hierarchy. Each client may include several Audit Nodes (ANs). For instance, if
the client is running both UNIX and Netscape Server on the same computer, both
ANs will be monitored by a single eTrust Audit client.
Preface 1–9
The importance of eTrust Audit
The importance of eTrust Audit
eTrust Audit 1.5 helps security administrators understand and analyze audit
data:
■
Record only the events you choose
■
Redirect events only as appropriate
■
■
Save data in a common format, while preserving the original native auditing
data
Use out-of-the-box intrusion detection policies for the operating system log
files
In native auditing, all events are given precisely the same treatment: they are
recorded in the log. In eTrust Audit 1.5, each event is treated individually. You
can customize responses to suit your auditing priorities. You can intercept the
events you choose and redirect them as appropriate, while preserving native
auditing data unchanged.
eTrust Audit 1.5 can give you as many layers of filtering as you wish. You tell
eTrust Audit:
■
What events to copy from native auditing, and what events to ignore
■
What events should be forwarded for collection in a database
■
What events require prompt attention
■
What events constitute security emergencies
Cross-Platform Data Integration
eTrust Audit 1.5 records audit data from many applications and operating
systems, as previously detailed in this chapter under the Native Auditing
Supported by eTrust Audit 1.5 section.
Cross-Platform Event Management
Besides detecting suspicious events, eTrust Audit 1.5 doubles as an event
manager. eTrust Audit 1.5 collects events across platforms and operating systems
into a comprehensive event database, accessible through a custom Viewer. Data
from all clients is displayed in one consistent format. The commercial relational
databases used by eTrust Audit 1.5 — Microsoft Access, Oracle Server, and
Microsoft SQL Server — can hold very large amounts of data.
1–10
eTrust Audit Administrator Guide
The importance of eTrust Audit
The Audit Viewer lets you view different types of events in different colors, as
shown in the following illustration:
In addition, the Audit Viewer provides powerful administrative options:
■
Filtering — select which records will be displayed, based on criteria you
choose. You can also create filters for different users, thus letting them see
only certain components. The Viewer also lets you save your own
customized filters for future use.
■
Sorting — sort data by any field, such as the user, computer, domain, or time
■
Tracking — follow events related to a single user or file
■
Printing – print events and detailed events
■
Reports — view, create, and schedule a variety of text and graphical reports
With these tools, you can easily analyze events, even when the database contains
millions of records.
Preface 1–11
The importance of eTrust Audit
Data Analysis
An event database may contain millions of records. eTrust Audit 1.5 lets you
filter them with precision. As shown in the following example, you can create
filters that search for highly specific events. Text fields can contain simple regular
expressions.
1–12
eTrust Audit Administrator Guide
The importance of eTrust Audit
Scalability
Filtering and alerting can be performed at any location you choose, while multitier routing solves the problem of scalability.
In other words, you can route events from any client or server to any target
anywhere on the network. You may wish to create a strict hierarchy, but you can
bypass it at any time.
Out-of-the-Box Intrusion Detection Policies
eTrust Audit 1.5 ships with ready-to-use intrusion detection policies. Each policy
can be tailored to your specific auditing goals on a specific operating system or
server platform — an Audit Node.
Each policy lets you select and deselect events. By default, no event is selected.
Preface 1–13
The importance of eTrust Audit
By using Policy Manager, you can distribute the policy to appropriate targets
throughout your network. The success of policy distribution is monitored in a
dedicated window.
Audit Nodes
Audit node (AN) is an abstraction denoting each system from which you would
like to retrieve auditing information.
By using Policy Manager, you can designate AN groups that combine native
auditing systems on different hosts, and then distribute each policy to its
appropriate AN group. Policy Manager also lets you configure and save a userdefined audit node type to be added as a new audit information source. For
details, see Audit Nodes in the “Pre-Installation planning” chapter.
1–14
eTrust Audit Administrator Guide
Getting started with eTrust Audit 1.5
Getting started with eTrust Audit 1.5
The following table outlines the recommended approach for learning about
eTrust Audit 1.5.
What You Should Do …
How to Do It …
Install all the components of eTrust
Audit 1.5 on a single machine
Review the instructions beginning with
Installing the Client in the “Installing
eTrust Audit 1.5” chapter of this guide
Customize your configuration and
build your auditing hierarchy
See the information beginning with
Installing the Client in “Installing
eTrust Audit 1.5” chapter of this guide
Create and administer effective
intrusion detection and event
management policies
See Policies in the “Policy
Management” c
chapter of this guide
Related Documents and Training
As mentioned earlier in this chapter, in Native Auditing Supported by eTrust
Audit 1.5 , eTrust Audit 1.5 can help you handle audit information from many
operating systems and applications.
■
■
■
■
■
For information regarding other products of the eTrust family (such as eTrust
Access Control for Windows NT and for UNIX, eTrust Intrusion Detection
and eTrust Single Sign-On), See the respective product documentation for
details.
For information about organized training, or for other product information,
contact your marketing representative.
For details regarding other products that are supported by eTrust Audit 1.5,
see the respective product documentation.
Several good third-party books on Windows NT are widely available.
Resources such as the Microsoft TechNet Technical Information Network
CD-ROM also contain helpful articles on securing Windows NT and
Windows 2000 installations.
Product information
Improvements are continuously being made to the products documented in this
book. Contact your marketing representative for up-to-date information.
Preface 1–15
Chapter
2
Pre-Installation Planning
Installing eTrust Audit takes only a few moments, but before you start this
process, you must take the time to understand the product’s components and
how they relate to your existing event logs and your auditing goals.
You should plan your auditing hierarchy, and be aware of technical issues
affecting installation.
When you install eTrust Audit 1.5, you choose among three components:
■
■
■
The Client software must be installed on each system you want to audit. This
software consists of related agents and services.
The Policy Manager includes the Policy Manager graphical user interface and
associated services and databases. The policy manager components do not
require a dedicated host, but they should reside on a fast, stable machine.
Data Tools include the event database, Audit Viewer, Security Monitor, Audit
Reporter, and the Collector service. We recommend a strong, dedicated
computer with enough free space for the Collector service.
Planning What to Audit
eTrust Audit relies on data generated by native operating systems auditing
(Windows NT and UNIX) as well as by eTrust products. Configure the auditing
programs with care.
Avoid collecting unnecessary information that can strain personnel and system
resources.
Consider implementing the following steps regarding security administrators:
■
■
You can maximize accountability by separating auditing and administrative
roles, and by distributing auditing responsibilities.
You can configure the client to forward certain types of records instantly to
several Collector stations or e-mail accounts, so that even an administrator
cannot tamper with audit data.
Pre-Installation Planning
2–1
The Client
■
You will probably find it convenient to put security administrators into a
group of their own (a recommended name for the group is sysaudit). To
manage groups, use eTrust Access Control if you have it, or use Windows
NT User Manager.
eTrust Access Control for UNIX and eTrust Access Control for Windows
eTrust Access Control for UNIX and eTrust Access Control for Windows are
Computer Associates products that enhance and supplement native auditing.
eTrust Access Control provides important protection for Windows NT and UNIX
systems, including virus and Trojan horse detection.
■
■
If you are running eTrust Access Control for Windows, then you can use it
for auditing. Wherever you are set up to record Windows NT audit records,
you will automatically record any audit records from eTrust Access Control
for Windows as well.
If you are running eTrust Access Control for UNIX, you can receive audit
data from there as well.
Windows NT 4.0
Unless you turn on Windows NT auditing for events such as Logon/Logoff,
eTrust Audit 1.5 cannot collect and analyze these events.
■
By using The Policy Manager’s NT Policies window, you can configure
remotely the elements of the system native auditing.
The Client
Every computer in the network that is to be audited must have the client
software installed. The client software collects local audit data from various
applications and from the operating systems of the platforms for which it is
available, as previously detailed in Platform. After collecting the local audit data,
it sends this data to other stations, and issues notifications and alerts.
Tip: For Windows NT installations, ensure that you include the PDC (Primary
Domain Controller), where domain administration events are logged.
Regardless of which Windows NT Server computer you use to make changes
in User Manager for Domains, events are logged only at the PDC.
2–2
eTrust Audit Administrator Guide
The Client
Platform
The eTrust Audit 1.5 client is available for:
■
Windows NT 4.0 (SP 3 and higher); Windows 2000 (and SP 1)
■
Solaris 2.5.1 and higher (HPUX, AIX and LINUX in future service packs)
You may use UNIX recorders for submitting events from additional log files, by
adding parsing configuration files (MP files).
Note that API is available only for these platforms.
The Client Architecture
The client comprises:
■
■
■
■
■
■
eAudit recorder (SeLogRec.exe on NT and acrecorderd on UNIX) modules
for each platform, which collect and forward messages from native auditing
present on the client to eTrust Audit 1.5 router.
eAudit Redirector (SeLogRd.exe - on NT only), receives all events from the
NT recorder and sends them to the router.
eAudit log router (ACLOGRD.exe on NT and aclogrd on UNIX) applies
filtering rules to events and determines what actions will be issued.
eAudit SNMP recorder (SNMPREC.EXE on NT and snmprec on UNIX)
eAudit action manager (ACACTMGR.exe on Windows NT and acactmgr on
UNIX), which initiates actions, either local or remote, and carries out
responses to audit events, including:
-
E-mail messages
-
Sending alerts to Security Monitor
-
Screen pop-up messages
-
Forwarding messages by SNMP protocol
-
Sending alerts to Security Monitor
-
Sending to Collector for collecting data for further using by Audit
Viewer, Reporter and other tools
-
Forwarding messages to other routers
-
Sending events to Unicenter TNG
-
Lines to files
-
Running program and scripts
eAudit distribution agent (ACDISTAGN.exe on Windows NT and Acdistagn
on UNIX)), specific to each platform that reacts to instructions from the
policy distribution server.
Pre-Installation Planning
2–3
The Client
It is possible to separate the eAudit recorder and router — for example, if there is
not enough free disk space for queues, or that the host is not powerful enough to
run a router.
The following illustration shows the elements normally present on an eTrust
Audit 1.5 client:
Each AN type requires a different eAudit recorder module. For example:
■
■
In Windows NT, events are forwarded to the router by a recorder service and
a redirector service.
On each client located on a UNIX host, a generic recorder controls recorder
modules for various audit nodes. The generic recorder does not provide
filtering. Instead, it controls the frequency and intensity of message
forwarding to the router.
The generic recorder has two types of modules:
■
One module – for the UNIX native logs, Netscape log and Apache log
■
An Oracle module – for the Oracle log (audit node)
In case a UNIX host runs two audit nodes: one of the Oracle type and one of the
UNIX type, we need to use the modules mentioned previously to be able to get
messages from the two audit nodes. Each module sends messages to the router
and then the messages are processed as shown in the previous illustration.
2–4
eTrust Audit Administrator Guide
The Policy Manager
The Policy Manager
The Policy Manager software includes database, services, and a graphical user
interface, shown in the following illustration.
Platform
Policy Manager requires x86 machines running Windows NT 4, SP 5 and higher,
or Windows 2000.
Database
The policy manager database uses Microsoft Access database for storing the
policies and the policy activation log.
You should decide on which host to install policy manager. Afterwards, assign
this host’s IP address or host’s name to all clients in the system as a trusted
server, the only server from which the client will accept new policies.
Pre-Installation Planning
2–5
The Policy Manager
Services
The manager software includes the eAudit distribution server. This server
receives policies from the Policy Manager and sends them to the eAudit
distribution agents, which are part of The Client software.
Policy Manager GUI
Policy Manager lets you manage and distribute policies enterprise-wide by using
four separate GUI windows:
■
Policies
■
Audit nodes
■
Policy Activation Log
■
Users
Policies
The Policies window currently displays policies as logically nested in up to 16
hierarchical levels of rules.
When you install eTrust Audit 1.5, you can take advantage of many out-of-thebox policies, or create user-defined policies from scratch.
Two types of pre-defined rules exist:
■
2–6
Suspicious events rules let you choose among out-of-the-box policies that
generate actions such as e-mail or alerts in response to possible security
violations. You can add conditions to any rule; for example, within
eTrust Audit Administrator Guide
The Policy Manager
Logon/Logoff, you could add a condition monitoring Logons by a specific
user.
■
Collection rules let you set eTrust Audit router for handling events and
sending them to the Collector to be stored in the database for future use.
In addition, the user can define and add custom rules by using the wizard.
In Windows NT and Windows 2000, the user can change audit policy for audit
nodes.
Pre-Installation Planning
2–7
The Policy Manager
Audit Nodes
Audit Node (AN) is an abstraction denoting each system or application from
which you would like to retrieve auditing information.
In a network environment, one host may run several different applications, and
one type of application may run on several different hosts. Under such
circumstances, it would not make sense to designate either the host or the server
as an AN.
Instead, you designate each instance of the AN by type and current location, by
default, the logical name of the AN (usually, the operating system or service
type), plus the host name. You apply your policies to AN groups as you
configure them in this window.
Each AN can belong to only one group. Only one policy can apply to each AN
group.
2–8
eTrust Audit Administrator Guide
The Policy Manager
Policy Activation Log
The Policy Activation Log window lets you follow the success of the eAudit
distribution server’s asynchronous transmissions from your configuration
database.
The Activation log notifies you if some instance of an AN is unavailable or
improperly configured, so that you can take corrective action.
Users
The Users window lets you configure the users of eTrust Audit Policy Manager.
Each user can be authorized to:
■
Configure policies
■
Distribute policies
■
Manage users
Pre-Installation Planning
2–9
Data Tools
Data Tools
The Data Tools package includes the event database and four components:
■
Collector service
■
Audit Viewer
■
Audit Reporter
■
Security Monitor.
Recommended Configuration
A Collector station needs a dedicated processor with a minimum speed of 350
MHz and at least 128 MB of RAM. The event database requires 1-2 KB of disk
space per record.
Choosing a Database
eTrust Audit 1.5 can use three commercial relational databases — Microsoft
Access (versions 97 and higher) , Oracle Server (versions 7.0 and 8.05), or
Microsoft SQL Server (versions 6.5, 7.0 and 2000). By using ODBC (open
database connectivity), the database is used by Audit Viewer, Audit Reporter,
and Audit Collector.
■
■
■
Microsoft Access is configured as the default choice.
For Oracle Server, you must create the database and configure an Oracle
client on each machine that needs access to the audit database before
installation. For details, see Configuring an Oracle client in the Appendix.
For Microsoft SQL Server, you must create the database before installation.
For configuring the type of authentication for the SQL server, see Windows
NT Authentication with Microsoft SQL Server in Appendix.
Note: If during setup you select Oracle or SQL as your database, then for both
types Setup lets you select the option of creating new tables. Ensure that you
create new tables only once per database. (Each time you choose the Create New
Tables option, your existing data is erased). You may install several Collector
services that write to one database.
Audit Viewer
You can configure eTrust Audit to collect records across platforms and from
many different stations into a single event database. Audit Viewer uses standard
DBMS technology and ODBC connectivity.
2–10
eTrust Audit Administrator Guide
Data Tools
You can view, print, and archive your audit logs like any other database. Audit
Viewer’s precise filtering helps you focus on particular audit data, and you can
print reports according to useful, flexible criteria.
You can use the strong filtering mechanism and save the filters for future use by
a specific user or all the users.
Security Monitor
Security Monitor shows you audit records by using a GUI, much as Audit Viewer
does, but Security Monitor is intended for events that deserve attention in nearrealtime. Because Security Monitor is a Viewer for the very latest alerts, it differs
from Audit Viewer in a number of ways:
■
By default, the data scrolls past as you watch
■
You save audit data manually in files to which you give names
■
Security Monitor has no report generation, no filtering, and no multiple
windowing
Audit Reporter
The Audit Reporter lets you view selected data from the eTrust Audit event
database in the form of graphic or detail reports. You can generate reports for
immediate viewing, or you can schedule reports to be generated later.
Several formats are available for the reports, including text file, Word document,
HTML, and Crystal Reports.
Collector Service
The Collector service receives records from action managers and enters them into
the event database. For detailed description of the Collector service parameters,
see The Collector Service in the “Services” chapter.
Pre-Installation Planning
2–11
Data Tools
Event Database
As previously mentioned in this chapter in Choosing a Database, eTrust Audit
1.5 uses ODBC for the event database used by the Collector service, Audit
Viewer and Audit Reporter. If you do not already have current ODBC drivers,
then you can install them from the eTrust Audit 1.5 CD as part of Microsoft Data
Access Pack.
Audit Viewer, Audit Reporter, and the Collector service must log in to the event
database. For Audit Viewer, the user enters a username and password. However,
it may not be desirable to require manual entry of the username and password
each time the Collector service starts. To configure the Collector service to log in
to the database, use one of the following two ways:
■
■
During setup, provide a username and password to eTrust Audit 1.5, so that
the Collector service will log in silently.
For Microsoft SQL Server, configure the ODBC drivers to use Windows NT’s
native authentication.
Microsoft Access
If you select to use a Microsoft Access database, no configuration tasks are
required. The database will be created and configured for you automatically. The
Collector service, Audit Viewer and Audit Reporter will have automatic access.
Note that you have no need to install Microsoft Access itself. eTrust Audit 1.5’s
Collector will write to the .mdb file that is created in your system, and you do not
need to handle this file yourself.
Microsoft SQL Server
For Microsoft SQL Server, you must create the event database before installing
the Collector or Viewer software. You can configure Microsoft SQL Server to use
Windows NT authentication to log in to the database automatically when the
Collector service starts.
Oracle Server
For Oracle Server, you must create the event database before installing the
Collector or Viewer software. Before you install Collector, Viewer, and Reporter,
you must create an Oracle client at each host that will run these components.
Configure the client by using the Oracle Net8 Easy Config utility. See
Configuring an Oracle client in the Appendix.
2–12
eTrust Audit Administrator Guide
Data Tools
Note that if the Collector service resides on the same machine where the Oracle
Server is located, you may need to define a depend-on-service regarding Oracle
services.
Data Flow
The following illustration reviews how the eTrust Audit 1.5 components work
together.
Pre-Installation Planning
2–13
System requirements
Sample Configuration
The following illustration shows how a simple network might use the
components of eTrust Audit 1.5.
System requirements
eTrust Audit 1.5 has certain requirements with regard to your operating system,
hardware, database, mail, and firewall. You should also take some planning
considerations into account.
Operating System
eTrust Audit 1.5 components can run on the following operation systems:
■
Client
Windows NT 4.0 SP 3 or higher
Windows 2000
UNIX – Sun Solaris 2.5.1 and higher
2–14
eTrust Audit Administrator Guide
System requirements
■
Policy Manager and Data Tools
Windows NT 4.0 SP 5 or higher
Windows 2000
Hardware
To accomplish installation, each PC needs a CD-ROM drive or access to the CDROM drive on another station.
The disk space required for eTrust Audit 1.5 varies according to the components
you install and the number of records you maintain.
■
■
■
To install all the eTrust Audit 1.5 components, you need at least 70 MB free
on a hard drive in Windows NT, and at least 57 on UNIX. Normally not all
components are installed at all stations.
For the hardest working of the eTrust Audit 1.5 services, the Collector
service, a dedicated computer with a strong CPU is recommended. At the
least, yours should provide a processing speed of 350 MHz and 128 MB of
RAM. The event database needs additional disk space — approximately 0.6K
per record for Oracle Server and Microsoft Access or 2K per record for
Microsoft SQL Server.
Note that if you install the router service on the client, this service requires
space for queues, in which case you need to have a disk space of at least
25MB (on Windows NT) or 15MB (on UNIX).
Database
See the Event Database part in the Data Tools section in this chapter.
Mail
eTrust Audit 1.5 is configured to use only Simple Mail Transfer Protocol (SMTP)
for any e-mail notifications it issues.
Firewall
It is not generally advisable to place the following eTrust Audit 1.5 components
on opposite sides of a firewall:
■
eAudit recorder - Remote Router
■
Local Router – Remote Router
■
Local Router – Remote Collector
Pre-Installation Planning
2–15
System requirements
■
Local Router – Remote Security Monitor
Because the eAudit recorder and router services use RPC to route audit records,
and there is no way to know which port the portmapper will assign to the
receiver service, placing the Collector or the other router behind a firewall does
not allow simple blocking of UDP ports.
For Windows NT 4.0 and Windows 2000, note that eTrust Audit 1.5 installs the Sun
RPC portmapper. You should not remove or disable this service while running
eTrust Audit 1.5.
If you must separate the components with a firewall, configure eTrust Audit 1.5
as instructed on Firewall in the Appendix.
Encryption
As installed, eTrust Audit 1.5 has 56-bit DES encryption specified for the transfer
of audit information from station to station. For instructions on changing the
encryption key or eliminating encryption, see Encryption in the Appendix.
Note that in eTrust Audit 1.5, the user name and password that are used for the
connection to the database are encrypted, so that they are displayed in their
encrypted form in the registry editor file. To change the name and password
manually, use the Encup utility, described in Appendix A.
Besides using the Policy Manager, you can also configure the native auditing for
events and control access to objects by using Windows NT User Manager for
domains.
You can turn on file, directory, and registry key auditing by using:
■
NT Explorer’s file and directory properties for Security and auditing.
■
Auditing and Security options in RegEdt32.exe
Several good third-party books on Windows NT are widely available. Resources
such as the Microsoft TechNet Technical Information Network CD-ROM also contain
helpful articles on securing Windows NT installations.
2–16
eTrust Audit Administrator Guide
System requirements
Oracle Enterprise Edition
Oracle Server generates a native auditing event log, which is read by eTrust
Audit 1.5. For details, see the chapters that refer to database security and
Auditing, in Oracle8 literature.
Netscape Enterprise Server
Like Oracle Server, Netscape server generates a native auditing event log, which
is read by eTrust Audit 1.5. For details, see the chapters that refer to monitoring
the server in Netscape Enterprise Server’s literature.
Apache Web server
eTrust Audit 1.5 can read event logs created by Apache Web Server version
1.3.12, which just like Netscape server generates a native auditing event log. For
details, see the chapter that refers to securing the web server in Apache Web
Server’s literature.
UNIX
eTrust Audit 1.5 can read event logs created by Sun Solaris 2.5.1 to 2.7 (HPUX,
AIX and LINUX in future service packs).
When working with UNIX operating systems, eTrust Audit 1.5 reads and
processes all system messages generated in files such as syslogd, as well as other
daemons and programs directed by the user.
For details, see the chapters that refer to database security and Auditing, in UNIX
operation systems literature.
Pre-Installation Planning
2–17
Chapter
3
Installing eTrust Audit
eTrust Audit installation consists of three component packages:
■
Client
■
Policy Manager
■
Data Tools
You must install and configure eTrust Audit client on every station in the
auditing hierarchy.
For Windows NT installations, it is mostly recommended that you install the
eTrust Audit 1.5 client on your primary domain controllers (PDCs), where
domain administration events are logged.
It is recommended that you restart each computer after installation.
Installing the Client
Before installing the Client on Windows NT, ensure that you know the location
(host name or IP address) of the policy manager host and the self-monitor host,
because you should indicate the location of these hosts during the installation.
The client software collects local audit data, sends audit data to other stations,
and issues notifications and alerts. You need this software on every station that is
to be audited.
The client software includes the distribution agent, eAudit recorder, router, and
action manager. There is no graphical user interface. You configure the services,
telling the software what events to record and transmit, at installation and by
using the Policy Manager.
Installing eTrust Audit
3–1
Installing the Client
Installing the Client on Windows NT
To install the client on Windows NT, follow these steps:
1.
If any applications are running, it is recommended that you close them all. If
you have uninstalled eTrust Audit 1.5 since the last time you restarted your
computer, it is recommended that you restart before beginning installation.
2.
Insert the eTrust Audit 1.5 CD-ROM. The setup program runs
automatically.
If you are using a remote CD drive, select Run from the Windows NT
Start menu. In the text box, specify eTrust Audit 1.5’s setup program. For
example, if drive E: contains the eTrust Audit 1.5 CD-ROM, enter:
E:\Pe_x86.exe
Then click OK.
Alternatively, if you downloaded and unzipped the software, run
client.exe from the temporary directory.
Note: You can also perform the installation by running the Client.exe file
from the Client Windows NT setup directory.
3.
Select Components
From the eTrust Product Explorer, specify which components you want
to install - in this case, eTrust Audit Client for Windows NT.
When you install eTrust Audit Client for Windows NT, you can choose
between custom and standard installation. This document details the
phases of a custom installation.
3–2
eTrust Audit Administrator Guide
Installing the Client
Custom Installation
When you are performing a custom installation, note the following:
1.
Immediately after choosing the custom installation, the Optional
Components dialog appears, prompting you to choose which optional
components to install. As mentioned in this dialog, required components are
not listed in the dialog and are always installed.
2.
The Destination Folder section of the dialog lets you choose a destination
other than the system default (c:\program files\ eTrustAudit). However,
you should install eTrust Audit 1.5 on a local disk and not on a network
drive. If you check the Router box, the router will be installed on a local host,
meaning it will handle events from the same computer on which you now
install the client. However, if you choose to install the router on another
host, by selecting not to check its box, you will be prompted later to enter the
host name or IP address of that remote host. Note that the default router
location can be edited at any time by using the registry key.
3.
After being asked to select a program folder, the next dialog displays a list of
event sources from which you can choose. Leave the default event sources
(NT System, NT Security and NT Application event logs).
4.
Two sequential dialogs prompt you to indicate a host.
■
■
5.
The Self-Monitoring host will receive eTrust Audit 1.5’s internal messages. In
this dialog, enter the address (IP address or host name) of the host where the
Security Monitor will be installed later, displaying eTrust Audit’s internal
messages. You can leave this dialog empty and click Next. Installing the
Security Monitor is part of the Data Tools installation. You can add the
service later by editing the registry keys. For details, see Monitor Parameters
in the “Registry Keys” chapter.
The following dialog, Client Management, prompts you to indicate the
location of the host that will run eTrust Audit Policy Manager. If you do not
know the name of such a host, click Next.
Note: during setup, you can define only one server as a trusted server,
recognized by the Distribution Agent Service. However, you can add later
more servers to be recognized as trusted servers, by editing the key of the
Distribution Agent Service. This key is found in the Management Agent
section of the registry keys
If, in the beginning of the installation you did not check the Router box,
meaning you wanted the router not to be installed locally, the Host Router
dialog is now displayed, prompting you to type the DNS name or IP address
of that host.
Installing eTrust Audit
3–3
Installing the Client
6.
The next dialog prompts you to choose your mail SMTP server.
Enter the name of your organization mail server, if it is different from the
default mailsrv. Click Next.
7.
In the last dialog, you are asked whether you like to configure eTrust Audit
services for automatic or manual startup.
If you select Manual, you can run these services either from the command
line with the -start parameter or by opening the Services window,
highlighting the required services, and clicking Start. Having made your
decision, click Next to review your chosen settings and start the installation.
Silent Setup Option
If you want to install the client over the whole network without repeating this
procedure, you can use the “silent setup” option, which lets you skip the whole
question phase by preparing an “answer file.” To do that, follow these steps:
1.
First you have to make a template setup that will make an "answer File"
(*.iss) from the command prompt, where the client.exe is: client -a -r -f1Path
(Path where you what to save the iss file), for example:
client -a -r -f1Z:\users\Mycroft\silent.iss
2.
Now you can install the product "Silently" or over the network, by using
third party utilities such as PCAnywhere , Unicenter RCO or RConsole from
the Resource Kit. To install the client over the network, enter the command
prompt client -a –s –f1Path (where Path is the location of the .iss file), for
example:
client -s -a -s -f1Z:\users\Mycroft\silent.iss
Installing the Client on UNIX
You must have root authority to install eTrust Audit 1.5.
To install the file on UNIX, you need to have the product itself and the
installation file. For example, if you install the file on SOLARIS system, you need
the two following files:
■
_SOLARIS_AC1.5.xx.tar.Z (The product itself, where xx is the build number)
■
install_eTrustAudit (The installation file)
From the installation directory (<cdrom_mount>/eTrust/Audit/Client/Solaris),
run the script install_eTrustAudit. If you are running eTrust Access Control, you
receive a message instructing you to stop the eTrust Access Control daemon.
3–4
eTrust Audit Administrator Guide
Installing the Policy Manager
The setup program asks for the host name or IP address of the policy
management host - the management station from which you want this client to
receive its audit policies. The next dialog asks for the self-monitoring host – the
host where the self-monitor will reside.
Next, you should identify which recorder modules you would like to activate:
syslog, su_log, Netscape, Oracle, and Apache.
After Installing the Client on UNIX
■
When installation is complete, the daemons should run automatically. If not,
run the eTrust Audit daemons — aclogrd, acactmngr, acrecorderd, and
acdistagn — from the command line:
/etc/rc2.d/S77<daemon name> start
(for example) /etc/rc2.d/S77aclogrd start
■
■
Even after you have installed the client and run all its services, the router will
not write events to queues until it gets policy files from the Policy Manager.
If you are reinstalling, be aware that the .dat files and action queues remain
unchanged after the reinstall of eTrust Audit 1.5 (provided, of course, that
eTrust Audit was not uninstalled prior to reinstallation).
Installing the Policy Manager
Policy Manager employs one service — the eAudit distribution server — and a
configuration database employing ODBC connectivity, plus a GUI.
eTrust Audit uses a standard installation wizard. Here is how to perform
installation:
1.
If any applications are running, it is recommended that you close them all.
2.
Insert the eTrust Audit 1.5 CD-ROM.
3.
Select Run from the Windows NT Start menu. In the text box, specify eTrust
Audit 1.5’s setup program. For example, if drive E: contains the eTrust Audit
1.5 CD-ROM, enter:
E:\ pe_x86.exe
And then click OK.
4.
Setup reminds you to close any applications that may be running. If you
want to close them, click Exit Setup, close the applications, and restart the
setup program. Otherwise, click Next.
Installing eTrust Audit
3–5
Installing Data Tools
Alternatively, if you downloaded and unzipped the software, run
PolicyManager.exe from the temporary directory.
5.
In the Destination Path dialog, choose the destination folder on which
Policy Manager will be installed and then click Next.
6.
In the following dialog, you are asked to indicate the program folder. Accept
the default program folder (eTrustAudit) or select another one, and then
click Next.
7.
The next dialog prompts you to indicate the name of the authorized user
who will initially be able to run the Policy Manager.
8.
Next, you are asked to enter a password to protect you Policy Manager
database:
9.
Now the same dialog shown earlier in this chapter, bearing the title SelfMonitoring Host appears, asking you to indicate the DNS name or IP
address of the said host.
10. Click Next. You can modify the location of the Self-Monitoring Host later by
editing the registry keys. For details, see Monitor Parameters in the
“Registry Keys” chapter. Press Next and click OK in the dialog warning you
that the security monitor is not yet installed.
11. Next, you are asked whether you like to configure eTrust Audit 1.5 services
for automatic or manual startup. If you select Manual, you can run these
services either from the DOS command line with the -start parameter or by
opening the Services Window and then choosing the relevant service.
12. The last dialog, bearing the title Start Installation, displays all data
accumulated so far and asks you to confirm the data by pressing Continue.
Review the data and press the button when ready to start the installation.
Installing Data Tools
When you install data tools, you can select whether to install one or more of the
following optional components:
■
■
3–6
Audit Viewer is a tool for auditors. It lets auditors collect records across
platforms and from many different stations into a single event log, which can
be viewed, printed, archived and filtered like any other database.
Security Monitor, likewise, is a tool for auditors and security managers.
When the Security Monitor window is open, alerts scroll past in near realtime. When the window is closed, the application is still running in the
background, and a light bulb icon in the tray icon bar in the system tray
alerts to new data.
eTrust Audit Administrator Guide
Installing Data Tools
■
■
The Collector service. This service, which exists only in Windows NT and
Windows 2000 platforms, receives information from other stations where
eTrust Audit 1.5 is running and writes it to the event database.
The Reporter displays the reports that are generated by filtering the
database.
eTrust Audit 1.5 uses a standard installation wizard. Here is how to perform
installation:
1. If any applications are running, it is recommended that you close them all.
2. Insert the eTrust Audit 1.5 CD-ROM.
3. Select Run from the Windows NT Start menu. In the text box, specify eTrust
Audit 1.5’s setup program. For example, if drive E: contains the eTrust Audit
1.5 CD-ROM, enter:
E:\ pe_x86.exe
And then click OK.
4. Setup reminds you to close any applications that may be running. If you
want to close them, click Exit Setup, close the applications, and restart the
setup program. Otherwise, click Next.
Alternatively, if you downloaded and unzipped the software, run
DataTools.exe from the temporary directory.
5. In the Setup Type dialog, choose the one more suitable for you (Custom or
Standard) and then click Next.
6. The following dialog lets you choose which optional components you want
to install, among the following components:
■
Viewer
■
Security Monitor
■
Collector
■
Reporter
As noted in the dialog, required components are not listed in the dialog and
are always installed.
7. In the next dialog, select the database type or leave the default choice –
Microsoft Access, and then click Next. Note that if you choose Microsoft
Access, setup is transparent. For both Microsoft SQL Server and Oracle
Server, a DBA must set up the database before the Collector software is
installed. Otherwise, eTrust Audit’s tables will be created in a default
database, and not in their own dedicated database.
8. The following dialog prompts you to indicate the name of your SMTP
server. Enter the name of your organization mail server, if it is different from
the default mailsrv. Click Next.
Installing eTrust Audit
3–7
Installing Data Tools
9. Indicate the location (host name or IP address) of your self-monitoring host
and click Next to review your settings and start the installation process,
same as you did when you installed the Client software.
10. The last dialog, bearing the title Start Installation, displays all data
accumulated so far and asks you to confirm the data by pressing Continue.
Review the data and press the button when ready to start the installation.
Starting the Services
The first time you start eTrust Audit 1.5, you start the services either
automatically or by running them from the command line with the -start
parameter.
Windows NT and Windows 2000 let you use the Control Panel’s Services dialog
box to start the services on successive occasions.
The Portmap service, available only in Windows NT and Windows 2000, is
common to all components of the software. This service supports SUN RPC
protocol.
Other services are:
Client services:
■
eAudit event recorder (selogrec.exe for Windows NT or Windows 2000,
acrecorderd for UNIX). For details on NT event recorder, see the Recorder
Service for NT section in the services chapter. For details on the recorder for
UNIX, see the Recorder Daemon for UNIX
section in the same chapter.
■
■
■
■
■
3–8
eAudit redirector for NT (selogrd.exe). For details, see The redirector service
in the “Services” chapter. This service does not exist in UNIX environment.
eAudit SNMP recorder (snmprec.exe). For details, see The eAudit SNMP
recorder service in the “Services” chapter. For details on the SNMP recorder
for UNIX, see SNMP Recorder Parameters for UNIX in the same chapter.
eAudit log router (aclogrd.exe). For details, see The Log Router Service in
the “Services” chapter. For details on the eAudit log router for UNIX, see the
Log Router UNIX Parameters in the same chapter.
eAudit action manager (acactmgr.exe). For details, see The Action Manager
Service in the “Services” chapter. For details on the Action manager service
for UNIX, see the Log Router UNIX Parameters in the same chapter.
eAudit distribution agent (acdistagn.exe). For details, see The eAudit
Distribution Agent Service in the “Services” chapter. For details on the
eAudit distribution agent for UNIX, see Distribution Agent UNIX
Parameters in the same chapter.
eTrust Audit Administrator Guide
Installing Data Tools
Data Tools’ services:
■
eAudit Collector service (selogrcd.exe). For details, see The Collector Service
in the “Services” chapter.
Policy Manager services:
■
eAudit distribution service (acdistsrv.exe). For details, see The eAudit
Distribution Server in the “Services” chapter.
Starting Services in Windows NT or Windows 2000
As mentioned earlier, the first time you start eTrust Audit 1.5, you start the
services either automatically or by running them from the command line with
the -start parameter. In addition, Windows NT and Windows 2000 let you use
the Control Panel’s Services dialog box to start the services on successive
occasions. This section details both ways.
Starting the services for the first time
You may have configured the services to start automatically and restarted since
then. If not, start the services at the appropriate stations. Use the Windows NT
Control Panel - Services dialog, or enter these commands in the DOS command
line (where audit is the installation directory you specified in step 5 of the
installation procedure):
Command name
Description
audit\bin\SeLogRec –start
(the eAudit recorder service)
audit\bin\SeLogRcd –start
(the eAudit Collector service)
audit\bin\selogrd –start
(the eAudit redirector service)
audit\bin\aclogrd –start
(The eAudit router service)
audit\bin\acactmgr –start
(The eAudit action manager service)
audit\bin\acdistsrv –start
(The eAudit distribution server service)
audit\bin\acdistagn –start
(The eAudit distribution agent service)
Starting the services on successive occasions
You can start the services from the command line as you may have done the first
time, or you can open the Windows NT or Windows 2000 Control Panel (from
Settings on the Start menu) and use the Services dialog box, for starting the
Installing eTrust Audit
3–9
Installing Data Tools
services automatically.
The eTrust Audit 1.5 services are listed as:
■
eAudit Action Manager
■
eAudit Collector
■
eAudit Distribution Agent
■
eAudit Distribution Server
■
eAudit Log Router
■
eAudit Portmap
■
eAudit Recorder
■
eAudit Redirector
■
eAudit SNMP Recorder
Starting Services in UNIX
You can start all eAudit UNIX daemons in one of the two following ways:
■
Running the daemon directly.
■
Running a script from init directory: /etc/rc2.d/S77daemon_name start
Before running the daemon directly, you should export the required
environment variables to the current shell (Bourne or Korn) by running the script
ac_set_env.sh from /usr/eaudit/bin
For example: % . /usr/eaudit/bin/ac_set_env.sh
(% stands for UNIX prompt)
3–10
eTrust Audit Administrator Guide
Chapter
4
Policy Management
The Policy Manager software includes database, service, and a graphical user
interface, shown in the following illustration.
The policy manager includes four windows:
■
Policies window
■
Audit Nodes window
■
Policy activation log window
■
Users window
Policy Management
4–1
Policy Manager GUI
Database
The Policy Manager database uses Microsoft Access database for storing the
policies, audit nodes and their groups, as well as the policy activation log.
Service
The manager software includes The eAudit Distribution Server , which receives
policies from the Policy Manager and sends them to the eAudit distribution
agents. The eAudit Distribution Agent Service is a part of the client software.
Policy Manager GUI
Policy Manager lets you manage and distribute policies enterprise-wide by using
the following GUI windows:
4–2
■
Policies
■
Audit nodes
■
Policy Activation log
■
Users window
eTrust Audit Administrator Guide
Policy Manager GUI
Policies
The Policies window currently displays policies as logically nested in up to 16
hierarchical levels of rules.
When you install eTrust Audit 1.5, you can take advantage of many out-of-thebox policies.
Two types of pre-defined rules exist:
■
Suspicious events rules
These events let you choose among out-of-the-box policies that generate
actions such as e-mail or alerts in response to possible security violations.
You can add conditions to any rule — for example, within Logon/Logoff,
you could add a condition monitoring Logons by a specific user.
■
Collection rules
These rules let you set eTrust Audit 1.5 router for handling events and
sending them to the Collector to be stored in the database for future use.
The Default Policies folder is essentially read-only. This folder does not let the
user change hierarchy, but only define actions and choose rules.
To create new policies, new rules and so on, it is recommended that you make a
copy of the existing Policies folder, by using the regular copy and paste
operation.
Policy Management
4–3
Policy Manager GUI
Auditing NT Policy
To audit NT policy, highlight the policy and right-click. Select Properties from
the pop-up menu, and then select the Audit tab, partly shown below. Check the
events you want to audit. Note that if you check the File and Object Access box,
the Select Critical Objects button is enabled.
Click on this button to select the critical objects that you want to audit, be it files,
directories, or registry keys. The critical objects tab, partly shown below, also lets
you add, edit, or delete critical objects.
4–4
eTrust Audit Administrator Guide
Policy Manager GUI
Note: To enable auditing, the file system must be NTFS.
Policy Management
4–5
Policy Manager GUI
Creating a New Rule
Besides creating new policies, you can define and add custom rules, by right
clicking on the appropriate policy or rule and then selecting the New Rule
command.
1.
4–6
The Rule Wizard opens, offering you two ways to define custom rules: by
using a wizard or by using an editor.
eTrust Audit Administrator Guide
Policy Manager GUI
2. If you choose the Using editor option and then click Next, the next dialog lets
you enter the rule filter and its condition in free text. Choosing the Using
wizard option leads to the dialog shown in the following illustration, which
lets you include conditions from a list of pre-defined fields:
Policy Management
4–7
Policy Manager GUI
3. Whether you create the rule by using the wizard or the editor, in either way
the next dialog is Actions, which lets you select actions to be issued when the
event occurs:
This dialog lets you select the action type and add targets to the list that is
linked to the action type. Every action must have a target linked to it. An
action can be performed for any target (on a local server or on a remote
server).
4. Click Finish to end the process and create a new rule.
4–8
eTrust Audit Administrator Guide
Policy Manager GUI
If you want to ensure that the action you specify does not duplicate an action
already configured for that event, you can specify a rule dictating that this action
is performed only once. Do that by highlighting the required policy (NT, UNIX
and so on) and selecting the Summary command from the Policy menu.
Alternatively, highlight the policy and then right-click and select Summary from
the pop-up menu.
Creating a New Policy
1. To create a new policy, highlight any policy folder, and perform one of the
following operations:
■
Right click to select the New Policy command from the pop-up menu
■
Click Ctrl + N
■
Select the New command from the File menu
■
Select the New icon from the toolbar
(Note that in the Default Policies folder, the New Policy command is
disabled in the pop-up menu, but you can select this command by using one
of the other three ways previously mentioned).
Policy Management
4–9
Policy Manager GUI
2. The Policy Wizard opens:
This window lets you create policy by template (a ready, pre-defined policy)
or by AN type, in which case a new, empty policy without any rule is
created.
Note that besides the pre-defined policy templates, you can save an existing
policy as a template by right-clicking the policy and selecting the Save as
Template command.
4–10
eTrust Audit Administrator Guide
Policy Manager GUI
You may want to create a new policy from scratch for an AN for which a
template already exists (for example, Netscape). The Default Policies folder
does not let you do that, because it disables the existing templates area. Note,
however, that you can perform this operation in a copied Policy folder. In
such case, it is recommended that in the copied folder you erase the existing
template so that you can create a new one. Alternatively, you can create an
entirely new folder in which to make new policies.
3. If you are working in a copied folder and you try to create a new policy with
the same name of an existing policy without erasing first the existing
template, the following message appears:
4. Assign a name and description to the new policy and click Finish. (If you
create an NT policy, two additional dialogs prompt you to select critical files
and critical registry keys).
Note that you can define audit properties for Windows NT policy.
Policy Management
4–11
Policy Manager GUI
Activating and Deactivating Policy Folder
1. To activate a policy folder, highlight this folder and then perform one of the
following actions:
■
Right-click the folder and then select the Activate command, or:
■
Select the Activate command from the Policy menu, or:
■
Select the Activate All command from the Policy menu (if you want to
activate all policy folders).
Note that if you want to activate a policy folder, you need to select at least
one rule in that folder; otherwise, a message similar to the following one is
displayed:
A rule to which no action is defined is displayed in white, as shown in the
following illustration:
2. To select an action for this rule, highlight the rule, right click, and then
choose the Properties command. The Properties dialog, like the one shown in
the following illustration, appears. Switch to the Actions tab and select at
least one action:
4–12
eTrust Audit Administrator Guide
Policy Manager GUI
3. Having selected at least one action, click OK to close the Properties window.
Note that the events group is now displayed in blue. Click the bell icon to
change its color to red (a toggle), indicating that the rule is selected:
4. Now that the rule is selected, you can activate its policy folder.
A policy folder can have three activation statuses:
Icon
Status
Policy not activated
Policy activated
Policy modified (after it was activated)
Policy Management
4–13
Policy Manager GUI
Audit Nodes
Audit Node (AN) is an abstraction denoting each system or application from
which you would like to retrieve auditing information.
In a network environment, one host may run several different applications, and
one type of application may run on several different hosts. Under such
circumstances, it would not make sense to designate either the host or the server
as an AN.
Instead, you designate each instance of the AN by type and current location —
by default, the logical name of the AN (usually, the operating system or service
type), plus the host name.
You apply your policies to AN groups as you configure them in this window.
Each AN can belong to only one group. Only one policy can apply to each AN
group.
An audit node can be created in any AN group. When you delete an AN from its
group, this AN is deleted altogether. You can move an AN from one AN group
to another by using the drag and drop operation.
4–14
eTrust Audit Administrator Guide
Policy Manager GUI
The Definitions tab in AN group Properties dialog, partly shown below, displays
a list of action types and relevant remote servers.
Policy Management
4–15
Policy Manager GUI
You can define a remote server for any action type and use this definition in the
Actions tab of the policy rule.
Audit Node Groups can have three statuses:
Icon
Status
Black screen - indicating that no policy
folder was activated for this audit node
group, or that a policy folder was
detached from the group.
Blue screen - indicating that a policy
folder was activated for this audit node
group, and definitions of remote
servers were not changed.
Indicating that a policy folder was
activated for this audit node group, but
definitions of remote servers were
changed.
4–16
eTrust Audit Administrator Guide
Policy Manager GUI
To reactivate policy for a specific audit node group, right-click the group and
choose the Policy Reactivate command from the pop-up menu. Note that this
option is enabled if policy folder attached to the group is activated.
You can also add or delete audit types.
To add a new audit node type, choose AN Types from the File menu. In the
Audit Node Types dialog box, which appears now, enter a name and description
for the new audit type, and then click Add. The prompt shown in the following
illustration appears:
Policy Management
4–17
Policy Manager GUI
To delete an audit node type, highlight one of the types that appear in the
Existing AN types section, at the top of the Audit Node Types dialog box, and
click Delete. Note that you can delete AN types that you created, but not predefined AN types.
The audit node icon comprises three elements: a computer, a status icon, and a
triangular background of the status icon.
The triangular background can be displayed in several forms:
Icon
Description
Indicating the audit node initial status.
Indicating that the policy was activated successfully.
Indicating that a problem occurred during policy activation attempt.
Indicating that a fatal error occurred during policy activation. No
attempts will now be performed.
Notification message that can be sent during the policy distribution
process.
Indicating that the policy was removed successfully.
Indicating that a problem occurred during policy removal attempt.
Indicating that a fatal error occurred during policy removal. No
attempts will now be performed.
Notification message that can be sent during the policy removal
process.
Audit Node Statuses
The Policy Manager estimates two audit node statuses: either a policy exists there
or not.
Icon
Description
Blue screen - policy exists on the audit
node.
Black screen - policy does not exist on
the audit node.
4–18
eTrust Audit Administrator Guide
Policy Manager GUI
For a specific audit node, you can also deactivate the policy, and not just
reactivate it, like in audit node groups. To do that, highlight the audit node and
right click to display the following pop-up menu:
The Policy Reactivate command is enabled if audit node group containing the
audit node is active and the policy folder attached to this group is activated.
The Policy Deactivate command is enabled if there is a policy on the audit node
and the audit node group is not active or is modified.
Policy Activation Log
The Policy Activation Log Viewer lets you follow the success of the eAudit
distribution server’s asynchronous transmissions of policies.
The Activation log notifies you if some instance of an AN is unavailable or
improperly configured, so that you can take corrective action.
Two dialog types help to simplify your work:
■
Event Detail dialog – Displays the same data that appears in the event line,
but lets you view and print it.
Policy Management
4–19
Policy Manager GUI
■
Log Filter dialog - Lets you filter the types of event that you want to include
in the log.
You can open the activation log by right clicking on the audit node and selecting
the Show Policy Activation Log command.
Having selected the activation log, the log matching the audit node from which it
was opened is now displayed.
4–20
eTrust Audit Administrator Guide
Policy Manager GUI
You can also open the activation log by right clicking on the Policy folder and
selecting the Show Policy Activation Log command. In such case, the log
matching the policy from which it was opened is displayed.
The Users Window
The Users window lets you configure the users of eTrust Audit Policy Manager.
You need to be included in a user window in order to open the Policy Manager
application.
Each user can be authorized to:
■
■
Configure policies, by checking the Policy configuration box. You can change
existing policies, define new policies, change existing rules (including filters,
actions and targets), and define new ones.
Manage users by checking the User Management box. A user manager can
define new users, change permissions of existing users, and delete existing
users.
Note that if only one user with user management capability exists in the
system, you cannot delete this user or cancel their user management
capability. In such case, the warning shown in the following illustration is
displayed:
Policy Management
4–21
Policy Manager GUI
■
■
4–22
Besides defining new users, the user can also add new users from the dropdown menu in the New User dialog box. Of course, to appear in the list in
this dialog box, a user should first be defined in the user manager (in
Windows NT) or in Local Users and Groups (in Windows 2000).
Distribute policies, by checking the Policy Distribution box. Lets you define
groups of audit nodes, the audit node itself, change the way audit nodes
belong to various auditing groups, attach and detach policies to audit nodes
groups. You can also activate or deactivate policy, as well as defining or
removing new types of audit nodes.
eTrust Audit Administrator Guide
Chapter
5
Data Tools
Three graphical user interfaces (GUIs) are at your service for viewing audit data:
■
■
■
Audit Viewer displays the event database and lets you create reports by
using the eAudit Reporter
The Audit Reporter displays the reports that are generated by filtering the
database in the Audit Viewer.
Security Monitor scrolls alerts in near-realtime
This chapter will help you interpret Audit Viewer and Security Monitor records,
manage your data, and customize the interfaces.
Database
eTrust Audit 1.5 can use three commercial relational databases — Microsoft
Access (versions 97 and higher) , Oracle Server (versions 7.0 and 8.05), or
Microsoft SQL Server (versions 6.5, 7.0 and 2000). By using ODBC (open
database connectivity), the database is used by Audit Viewer, Audit Reporter,
and Audit Collector.
■
■
■
Microsoft Access is configured as the default choice.
For Oracle Server, you must create the database and configure an Oracle
client on each machine that needs access to the audit database before
installation. For details, see Configuring an Oracle client in the Appendix.
For Microsoft SQL Server, you must create the database before installation.
For configuring the type of authentication for the SQL server, see Windows
NT Authentication with Microsoft SQL Server in Appendix.
Note: If during setup you select Oracle or SQL as your database, then for both
types Setup lets you select the option of creating new tables. Ensure that you
create new tables only once per database. (Each time you choose the Create New
Tables option, your existing data is erased). You may install several Collector
services that write to one database.
Data Tools
5–1
Audit Viewer
Service
The manager software includes The Collector Service, which is located in
audit\bin (where audit is the directory in which you installed eTrust Audit
1.5). This service receives information from other stations where eTrust Audit 1.5
is running and writes it to the event database.
Audit Viewer
Audit Viewer shows you audit information, much as the Windows NT Event
Viewer does, but Audit Viewer has many advantages:
■
■
■
■
■
You can configure eTrust Audit 1.5 to collect records from different stations
and platforms into a single event database for use by Audit Viewer.
Audit Viewer’s precise filtering helps you focus on particular audit data.
Audit Viewer can handle large databases; the event database is governed by
standard DBMS technology.
By using the eAudit Reporter, you can schedule, display and print well
formatted reports according to useful, flexible criteria.
You can archive and print your event data like any other database material.
Audit Viewer is one of the components of eTrust Audit Data Tools. When you
installed eTrust Audit 1.5, you should have installed the Viewer software on one
or more auditor stations.
With Audit Viewer, you view the event database created by the Collector service.
You may install the Collector and Viewer software together, but it is not a
requirement. You can use Audit Viewer on one machine to view the event
database on another.
Note for Microsoft Access Users
If you are using the Microsoft Access database type and you want to use Audit
Viewer to access a database located on another computer, you must first map the
remote drive to your machine, and then set up the System DSN.
Microsoft Access limits the size of the database to one gigabyte or approximately
one million records. To back up the database, you should:
5–2
1.
Stop the Collector service and the Audit Viewers.
2.
Rename the event database (SeOSData.mdb) as you wish.
3.
Copy the file SeOSDataBak.mdb.
eTrust Audit Administrator Guide
Audit Viewer
4.
Rename the copy of SeOSDataBak.mdb to SeOSData.mdb.
5.
Restart the Collector service and the Audit Viewers.
Starting Audit Viewer
Start Audit Viewer like any other Windows NT program. Its program folder was
specified at installation. By default, it is eTrust Audit\bin.
This applies for
Oracle and SQL
only
When Audit Viewer starts, you may be asked for the database name, user name,
and password, unless they are recorded in the registry (see Database in the
“Registry Keys” chapter).
The event database appears in a window, sorted by timestamp, with the newest
records at the top. You can resize it just like any other standard application
window. Besides the scroll bars and arrow keys, you can use the View menu’s
commands (First Record, Previous Record, Next Record, Last Record) and the
corresponding toolbar icons to navigate among the records.
Note: If your database is very large, you may get a message telling you to filter
the records. This message means that it would be wise to filter the data before
searching for a particular record. For details on filtering records, see Filtering the
Records in this chapter.
Remember, there will be no data if the eTrust Audit 1.5 services have not been
running (see Starting the Services in the “Installing eTrust Audit” chapter).
Note that for records to appear in Audit Viewer:
■
■
The client’s recorder service must be configured to collect events from at least
one source
The client’s redirector configuration file must contain rules specifying that
records be forwarded to Router
■
The Router (On NT) must have at least one rule, with Action Collector.
■
The Collector service must write collected records to the event database
For details, consult the chapters on the respective services.
Data Tools
5–3
Audit Viewer
Selecting Event Databases for Viewing
By default, Audit Viewer shows you the event database with the data source
name (DSN) eAudit_DSN. However, you can use Audit Viewer to view different
event databases. You can view as many databases as you wish, or you can open
more than one copy of the same database and apply different filtering and
sorting options.
To see additional databases, you need to create a system DSN for each one. When
you select New from File menu, you see a list of all available system DSNs, and
you can choose the remote event database you want to view.
You can also enter a list of relevant DSNs in the registry; for details, see Database
in the “Registry Keys” chapter. If a list is present, choosing New from File menu
lets you only see the DSNs in the list. The registry also lets you change the default
DSN.
Examining the Event Database
Each record consists of nine fields.
Title
Description
(Untitled column at
far left)
The icons shown in the following illustration characterize
events. For certain miscellaneous events, classified as
“other” events, there is no icon.
Information
Warning Error
Audit Success Audit
Others
Failure
5–4
Time Stamp
The time when the event originated on the client machine,
adjusted to the local time in case of time zone differences.
Log Name
NT-Application, NT-System, NT-Security, eTrust AC
(eTrust Access Control), SW3 (eTrust Intrusion Detection),
Netscape, UNIX, Oracle and Apache.
Computer Name
The name of the station where the event occurred.
Domain Name
The name of a Windows NT domain (not applicable for
UNIX).
User
The name of the user who performed the action.
eTrust Audit Administrator Guide
Audit Viewer
Title
Description
Source
The program or resource through which the event was
executed.
For Windows NT events, it is the same as in the Windows
NT Event Viewer. For other events, it could be an eTrust
Audit 1.5 source (such as any of the three eAudit services),
a eTrust Access Control services, or an external program as
reported by eTrust Access Control.
Event Category
Account Management, Administration, Logon/Logoff, and
so on. The tokens are different for Windows NT and for
eTrust Access Control.
Event ID
The Windows NT event ID, or if the record came from
eTrust Access Control, the stage number. Double-click the
record for an explanation. A table of Security-related
Windows NT Event IDs is included in the Appendix.
Refresh
As new events are added to the database, Audit Viewer does not add them
automatically to your display. You can, however, manually refresh the display to
include the latest additions. To do that, select Refresh from the View menu or use
<F5>.
Finding a Particular Record
You can find records according to the text of any given field.
1.
Click in the column where you expect to find a particular string of text. For
example, if you are looking for records reporting Logon/Logoff events, click
in the Event Category column.
2.
Select Find from the Edit menu, or use the shortcut <Ctrl><f>. Enter a string
in the dialog box that appears.
You can choose whether to match the case of your string, and whether to
search Up or Down.
3.
When you click Find Next in the dialog box, the cursor — the triangle in the
leftmost column — jumps to the closest matching record in the specified
direction. The match is highlighted by a rectangle around the cell.
4.
To find the next match, click Find Next again. Even when the dialog box is no
longer displayed, you can use <F3> or select Find Next from the Edit menu.
Data Tools
5–5
Audit Viewer
Displaying an Event in Detail
To see any event in further detail, you can use any of these techniques:
■
■
■
Double-click inside the record.
Click inside the record to select it, and then select Event Detail from the View
menu.
Click inside the record to select it, right-click and select Event Detail from the
pop-up menu.
The Details of Event dialog box appears. Notice that it includes buttons for
switching to the previous or next event and for printing the current details.
Whereas the top part of the Details box is standard, the bottom part — the
Description — is application-dependent. For details regarding how to
understand descriptions of various native operating system events or application,
see the appropriate documentation of each operating system.
5–6
eTrust Audit Administrator Guide
Audit Viewer
Sorting the Records
You can sort the displayed records chronologically or alphanumerically. You can
sort in ascending or descending order.
Sorting by Record Number
When Audit Viewer opens, records are sorted by timestamp. The timestamp
gives the time of the occurrence of the event on the client machine. When it is
displayed, the timestamp is adjusted for any difference in time zone between the
client and the Collector.
The record number reflects the order in which the records arrived at the
Collector, regardless of delays in transmission.
To sort by record number, select Sort from the View menu and then select the By
Record Number option.
Sorting Alphanumerically
To sort alphanumerically by any of the columns, you can use any of three
techniques:
■
■
■
■
Position the mouse cursor over the title of the column that you want to sort.
The pointer changes its shape into an arrow. Then Double-click. To reverse
the order of the sort, double-click again.
Select the column by which you want to sort. It does not matter which line
you select.
Select Sort from the View menu and then select the By Current Column
option
Select the column that you want to sort by, and then right-click and select
Sort from the pop-up menu.
The sort operation may take some time, and it will include a secondary sort (in
records where the column is identical) by time.
To reverse the sequence of the sort, re-select the same sorting method. For
example, if you are currently sorting bottom-to-top by timestamp and you want
to sort top-to-bottom by timestamp, double-click on the Time Stamp column
header, or select the column and use the menu.
Data Tools
5–7
Audit Viewer
Filtering the Records
You can filter the event data — that is, specify criteria by which records will be
displayed or hidden — according to fields or according to events. You can also
filter by file, which means specifying one or more files and finding all the events
that directly concern them.
■
■
■
When you filter by fields, events are filtered by the contents of the fields
(column headings) you see in Audit Viewer. You can easily filter Windows
NT events by using event IDs. A table of Security-related Windows NT
Event IDs is included in the Appendix.
The menus for filtering by events were originally designed for eTrust Access
Control, incorporating its classes and commands. However, you can map all
events to eTrust Audit 1.5’s generic filters.
You can define and use a unique filter per database and save it for a specific
user. The window title indicates the DSN name (also known as audit events
database) and the type of filter you use. In addition, you can open more than
one view for different databases.
Filter Bar
On the left side of the screen, you can see the filter bar. This area contains pre-
5–8
eTrust Audit Administrator Guide
Audit Viewer
defined filters, such as Last 7 days’ record and administration records. In
addition, this bar contains a filter that bears the user’s name. The following
illustration shows the filter bar docked, with the user filter at the bottom.
All new filters you add will be under the filter that bears the user name. To add
new filters, right-click in the filter bar to display the following menu:
Having defined the way to filter, either by fields or by events, as described later,
you are required to define the filter properties, such as field or event types or
filtering range. Having done that and pressed Save, you are prompted to assign a
name for the newly created filter, and to determine whether it will be available to
all users or only to the current user:
Data Tools
5–9
Audit Viewer
The new filter is added under the “user” filters. Having added the new filter, you
can now make it a start-up filter, to be used the next time you start the viewer. To
do that, right-click the filter and select the Use as Startup command.
Filtering by Fields
5–10
1.
To filter by fields, you can use either of these techniques:
■
Select Filter by Fields from the Filter menu.
■
Alternatively, click the toolbar’s Filter by Fields icon.
eTrust Audit Administrator Guide
Audit Viewer
2.
A dialog box opens, displaying the filtering options. The filtering is
cumulatively restrictive. That is to say, if you specify several criteria then the
filter will admit only those records that meet all the criteria.
Data Tools
5–11
Audit Viewer
By default, the first time you start the Viewer, no records are excluded. By
changing the specifications, you exclude records that are not of interest to you.
You can then save your customized filters by checking the appropriate box.
At the top of the dialog box, you can specify what time-range interests you.
In the time fields, click on any of the numbers and use the small arrow buttons. In
the date field, click on the arrow to drop down a calendar.
In the calendar, you can click on the year and use the accompanying arrow
buttons to change it; click on the month and choose another month from a list; or
click on any day of the month to select that day and close the calendar.
To reorient yourself by jumping to the current date, click on the Today line at the
bottom of the calendar or use the right-hand mouse button.
In the bottom section of the form, each field corresponds to a column in the main
window. In each field, you can enter a string you want to match. Select Not to
exclude records that match your string.
If your event database type is Oracle Server or case-sensitive Microsoft SQL
Server, fields will be case-sensitive.
You can use the asterisk (*) and question mark (?) as wildcard characters. You
can filter by more than one string if you separate them with commas. The filter
will work on data that matches any of the strings.
If you want to define the filter as a startup filter (that is: the default filter to be
used when the Viewer starts), you can do it from the dialog box or by rightclicking the filter and selecting the Use as Startup option. Note that after defining
the filter as a startup filter, the Reset Startup Filter icon and command are
enabled.
5–12
eTrust Audit Administrator Guide
Audit Viewer
Filtering by Event
To filter by event, you can select Filter by Event from the Filter menu, or click the
toolbar’s Filter by Event icon.
A dialog box opens, displaying the filtering options.
You can specify a range of dates just as you can when you filter by fields, as
described in the Filtering by Fields section of this chapter.
Data Tools
5–13
Audit Viewer
In the next part of the dialog box, the three fields correspond to columns in the
main Audit Viewer window. By filling one or more fields, you make Audit
Viewer include only the records that match your specifications in those fields.
You can use the asterisk (*) and question-mark (?) as wildcard characters.
Field
Description
Domain
The Windows NT domain (not
applicable for UNIX).
Computer
The host station where the event
occurred.
Log Name
NT-Application, NT-System, NTSecurity, eTrust AC (eTrust Access
Control), UNIX, Netscape, Oracle,
Apache
The third part of the dialog box includes checkboxes for events, with associated
tabs beneath. The page for each tab includes text boxes.
The text boxes permit the use of commas, question marks (one unknown
character), and asterisks (any number of unknown characters). For example, to
display records for users named admin1, admin2, and guest1 through guest100,
enter admin?,guest* in a ”user” field.
5–14
eTrust Audit Administrator Guide
Audit Viewer
When you select a tab in the Events section of the dialog, drop-down menus and
text boxes allow you to enter criteria for filtering. Filtering by event was
originally designed to match eTrust Access Control events, but you can also filter
for events from Windows NT.
Event
Mapping to Windows NT events
Administration
The Windows NT events User Right
Assigned and User Right Removed are
included under Change User. Local and
global groups are treated as equivalent.
Login
Logon/logoff events. In the “Login
From” field, you can enter the name of
the computer, and in the “Login To”
field, the name of the domain.
Network
eTrust Access Control and eTrust
Audit only.
Resource
Object such as a file or a registry key.
Trusted Program
eTrust Access Control only (a trusted
program will not run in any altered
form).
Tracking
The PROCESS class will catch events
592 and 593.
Filtering by File
When eTrust Audit 1.5 reports that a user or program has opened a file, the file
name appears in the corresponding audit record. Further events concerning that
file are reported without the filename. But if you filter by file, eTrust Audit 1.5
will single out each complete series of events that unfolds from the opening of a
specified file.
In filtering by file, you can specify one or more files or filename patterns. You can
use the comma, asterisk, and question mark. For example:
■
■
■
You can enter myfile to mean the file named myfile.
You can enter myfile, file_? to mean the file named myfile and all files named
file_1, file_2, file_a, file_b, and so on.
You can enter myfile, file_?, *setup* to mean the file named myfile; all files
named file_1, file_2, file_a, file_b, and so on.; and all files named setup.exe,
newsetup, mysetup.log, and so on.
Data Tools
5–15
Audit Viewer
The Filter by file command is on the Filter menu. When you select the command,
a dialog box appears. Enter the name of the file, and click OK.
After the filtering, Windows NT events in the main window are organized in
sets. Each set corresponds to the opening and subsequent handling of a file.
The main window shows the set’s first event (the opening of the file). If there are
more events in the set, a “+” icon appears in the leftmost column. Click on the
“+” icon for a record to list its entire set.
The listing of the full set of events occurs in a separate window. You can display
details of each event, and in general, you can work in the new window much as
you work in the main window. Two additional buttons, Previous and Next, move
from set to set.
Like filtering by file, tracking by event shows you a complete series of audit
records relating to an object — such as a file or a registry key — even though only
the first of the records contains the object’s name. (The first record reports the
opening of the object.)
To track what happens concerning an opened object:
1.
Select the record that reports the opening of the object.
2.
Select Track Event from the Filter menu, or right-click and select Track Event
from the pop-up menu that appears.
Unfiltering
To restore the complete list of events, select Show all events from the Filter menu
or select the toolbar’s View All events icon.
Copying Records into Other Applications
You can copy records to the Windows clipboard in order to paste them into
documents handled by other applications.
By using the mouse, <Shift>, and <Ctrl>, highlight the records you want to copy.
Then select Edit from the Copy menu or press <Ctrl><C>.
The information is copied to the Windows NT clipboard, and you can paste it
into other applications.
5–16
eTrust Audit Administrator Guide
Audit Viewer
Printing Records
With the File menu, you can print either the entire filtered display or the details
of specified records.
To check in advance, what the printout will look like, select Print Preview from
the File menu. Ensure that the column widths on screen are set appropriately for
your printout.
To change print parameters, select Print Setup and Page Setup from the File
menu. Save your Page Setup if you want to use it again.
Select Print from the File menu, or click Print. Use the Print dialog box that
appears.
The printout conforms to the styles and properties currently used in the Main
window. (Styles and properties include fonts, colors, and so on. See Customizing
the Viewers in the “Appendix” chapter for details how to edit them.)
Headers and footers
If you want to adjust the header or footer for the printout, select Header/Footer
from the File menu.
Note the use of the $ sign. As you enter text for your header or footer, you can
include the following variables.
Variable
Description
$A
Application name
$D
Date
$F
Document’s filename
$N
Number of pages
$P
Page number
Control the fonts of the header and footer separately. You can save your
specifications in a profile for future use.
Printing record details
To print details of one or more records:
1.
Select the records. You do not need to open the “Details of Event” box. You
can use <Shift>Click and <Ctrl>Click to select continuous and discontinuous
groups of records.
Data Tools
5–17
The Audit Reporter
2.
If you would like to check in advance, what the printout would look like,
select Print Detail Preview from the File menu.
To change print parameters, select Print Setup from the File menu.
3.
Select Print Detail from the File menu. Use the Print dialog box that appears.
Closing Audit Viewer
You close Audit Viewer like any other Windows program. Select Exit from the
File menu, use the Close button on the main window, or use <Alt><F4>.
The Audit Reporter
Displaying and Printing Reports
To receive the reports you want:
Select Report Manager from the Report menu or open the Audit Reporter from
the eTrust Audit program group. A list of reports is displayed, letting you choose
the reports you want to view from the sources you use. In the example shown in
the following illustration, we can see the eTrust Audit 1.5 reports, which are
arranged by five main events.
5–18
eTrust Audit Administrator Guide
The Audit Reporter
The second tab – Scheduled Reports – displays the list of reports that run in prespecified intervals.
Data Tools
5–19
The Audit Reporter
To add a report to the scheduled reports list, or to customize its settings and
output type, highlight a report and then right-click. In the example shown in the
following illustration, we have chosen the Shutdown report:
If you choose the Add to Schedule option, the following dialog opens:
Note that this report is highly customizable, letting you select between four
formats for displaying your report, as well as several pre-defined days on which
the report will run (such as: next Tuesday, every Tuesday, today and tomorrow).
You can also assign a user-defined file, which the report will overwrite each time
that it is transferred.
5–20
eTrust Audit Administrator Guide
The Audit Reporter
To customize the data displayed in the report, click Options:
In the example shown here, we have chosen to limit the report, by displaying
only the events of the current week in a specific computer used by a specific user
name. The other tab lets you select the database from which to gather the data, as
well as testing the database connection:
Data Tools
5–21
Security Monitor
Note that unlike the reports you view on the screen, scheduled reports can only
be sent to the printer.
The resulted report displays a list of all days available, and lets us choose which
day to view. You can use the two icons shown in the following illustration to
refresh the screen and view the log of reports generated so far.
Searching within reports
By using the toolbar, you can search downward for text strings within reports
printed to the screen.
Security Monitor
Security Monitor shows you audit records, much as Audit Viewer does, but
Security Monitor is intended for events that deserve attention in near-realtime.
Because Security Monitor is a Viewer for the very latest alerts, it differs from
Audit Viewer in a number of ways:
■
■
■
■
Security Monitor is intended for the display of exceptional, high-priority
alerts.
By default, the data scrolls past as you watch. When you stop scrolling, data
is held in a buffer, which can hold up to 10,000 alerts (default: 100).
The alerts currently displayed are saved when you close Security Monitor,
and will be visible the next time you open it. You can save the current set of
alerts as a text file at any time.
Security Monitor has no report generation, no filtering, and no multiple
windowing. It lets you copy records, as does Audit Viewer, but its Edit menu
has no Copy command; you use <Ctrl><C> instead.
Starting Security Monitor
When you installed eTrust Audit 1.5, you should have installed Security Monitor
(the monitor software) on one or more security administrator stations. Records
reach Security Monitor by having Monitor designated as a destination, as
described in The router configuration File in the “Services” chapter.
5–22
eTrust Audit Administrator Guide
Security Monitor
By default, Security Monitor runs automatically on startup. To open the Security
Monitor window, right-click the light bulb icon in the system tray, or start
Security Monitor as you would any other Windows NT program. Its program
folder was specified at installation. By default, it is eTrust Audit\bin.
Whenever Security Monitor is running, its light bulb icon appears in your system
tray. When there is no data, the bulb is white. When an alert arrives, the bulb
turns yellow and glow lines appear.
No data
Data
The Security Monitor also doubles for internal eAudit events. You should
install one Security Monitor for this purpose. This monitor will be your “Self
monitor” host, required for the client installation.
Running Minimized
You can run Security Monitor minimized, with the light bulb icon in the system
tray, by starting SecMonW.exe with the parameter -tray.
Freezing the Scrolling
To stop Security Monitor from scrolling data out of the visible part of the list,
click the Stop/Restart button or select Stop Scroll from the View menu.
Both on the View menu and as a toolbar button, Stop Scroll is a toggle. While
scrolling is stopped, a checkmark appears and the button is highlighted.
Scrolling is halted
Scrolling is proceeding
Specifying the Data Quantity
After accumulating a certain number of records, Security Monitor deletes an old
record each time a new one arrives.
Data Tools
5–23
Security Monitor
To specify how many records Security Monitor accumulates before deleting any
old ones — that is, the maximum number of records that will be on hand at any
given moment for you to scroll through:
1.
Select Options from the View menu. A dialog box appears.
2.
In the dialog box, enter the number of records that you want Security
Monitor to keep at hand — up to 10,000. You can save as few as 100.
However, if too few records are held in the buffer, it may be difficult to stop
scrolling.
Saving Alerts
To save the currently displayed alerts, select Save As from the File menu. The
alerts are saved to a text file.
Clearing the Security Monitor Window
You can clear the Security Monitor window, discarding all the records. Click
Clear Events.
The alerts disappear from the Security Monitor window.
Closing Security Monitor
Closing the Security Monitor window and shutting down the redirection of data
into Security Monitor are two different things.
5–24
eTrust Audit Administrator Guide
Security Monitor
■
■
■
By closing the Security Monitor window, you hide the monitor but you do
not turn it off. Closing the window does not stop information from flowing
into Security Monitor.
To hide the monitor, you can select Exit from the File menu, use the Close
button on the main window, or use <Alt><F4>.
To shut down Security Monitor, halting the flow of information, you need to
use the light bulb icon in the system tray.
Right-click the icon and choose Close from the pop-up menu. The icon
disappears and redirection to Security Monitor stops.
Data Tools
5–25
Chapter
6
Services
eTrust Audit includes several services, which enable the information flow in this
product by collecting , reading, and forwarding information from all sources in
the system. Some of these services work only in Windows NT, while others
operate also in UNIX.
This chapter describes in detail the eTrust Audit service.
The eAudit recorder service
Recorder Service for NT
The eAudit recorder service, SeLogRec, brings a computer’s Windows NT audit
information into the local audit file for further handling by eTrust Audit.
For instructions on starting the service, see Starting the Services in the
“Installing eTrust Audit” chapter.
Services
6–1
The eAudit recorder service
SeLogRec
The eAudit recorder service
Description
SeLogRec is the eAudit recorder service. It intercepts
Windows NT audit events and stores them in the local audit
file for eTrust Audit 1.5 to display, act on, or forward.
SeLogRec.exe is located in audit\bin (where audit is the
directory in which you installed eTrust Audit 1.5).
You can edit the recorder configuration file to specify which
events are to be recorded. For details, see The Recorder
Configuration File in this chapter.
To allow the recorder service to run when eTrust Access
Control is stopped, you must edit the emulate registry key,
which is found under the SeOS key
(HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociat
es\etrustAudit\Client\SeOS\emulate), so that
emulate value=1.
Syntax
6–2
eTrust Audit Administrator Guide
SeLogRec options
Option
Description
-install
Installs the service
-start
Registers the service with
Windows NT and then
starts the service.
–stop
Stops the service
-remove
Stops the service and
unregisters it as a service
of Windows NT,
removing it from the
Control Panel’s Services
dialog box.
-help
Displays these syntax
options
The eAudit recorder service
Recorder Daemon for UNIX
The eAudit Recorder daemon, acrecorderd, prepares the logs created by UNIX
operating system, by third-party applications running on the UNIX station, or
both, for further handling by eTrust Audit. The daemon reads the logs and,
where possible, sends them to the Audit Router daemon.
For instructions on starting the service, see Starting the Services in the
“Installing eTrust Audit” chapter.
acrecorderd
The eAudit recorder daemon
Description
acrecorderd is the eAudit Recorder daemon. It takes UNIX
audit events and, where possible, sends them to the Audit
Router daemon, aclogrd.
You can edit the recorder configuration file to specify which
events are to be recorded. For details, see The Recorder
Configuration File in this chapter.
To allow the recorder service to run when eTrust Access
Control is stopped, you must edit the emulate registry key,
which is found under the SeOS key
(HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociat
es\etrustAudit\Client\SeOS\emulate), so that
emulate value=1.
Syntax
acrecorderd options
Option
Description
-start
Starts the daemon
-install
Places the executable into
the operating system
initialization directory
–stop
Stops the daemon
-remove
Removes the executable
from the operating system
initialization directory
-help
Displays these syntax
options
Services
6–3
The eAudit recorder service
Note: You can start the daemons in one of the two following ways:
■
Running the daemon directly from UNIX shell
■
Running a script from init directory: /etc/rc2.d/S77daemon_name start
Before running the daemon directly, you should export the required environment
variables to the current shell (Bourne or Korn) by running the script ac_set_env.sh
from /usr/eaudit/bin
For example: % . /usr/eaudit/bin/ac_set_env.sh
(% stands for UNIX prompt)
This note is valid for all eAudit UNIX daemons.
Daemon name
eAudit Log Recorder
Daemon Location
/usr/eaudit/bin/acrecorderd
Usage: acrecorderd action [debug_options]
Options
Action:
-start
start daemon
-stop
stop daemon
-install
install daemon
-remove
remove daemon
-help
show this message
The Recorder Configuration File
In the recorder configuration file, each line (other than comment lines) provides
criteria for bringing audit records into the local audit file from Windows NT. A
record is admitted and handled by eTrust Audit 1.5 if it matches the criteria of
any line in the file. If the record does not match a line, then eTrust Audit 1.5 will
ignore the record. The file is selogrec.cfg in the audit\etc directory, where audit is
the directory in which you installed eTrust Audit 1.5. This file defines which NT
logs will be read, according to the client.
The format is explained in the following example. Note that commas are used as
delimiters within the three-part Resource specification, while semicolons are
used elsewhere. The file is case-sensitive.
6–4
eTrust Audit Administrator Guide
The eAudit recorder service
You can select the way to filter the events that are recorded by using the
following mask:
<Log Name>;<Resource>;<User>;<Result>
The default values, which can be selected during installation, are:
■
NT-System;*;*;*
■
NT-Security;*;*;*
■
NT-Application;*;*;*
For more in-depth information regarding this issue, see the selogrec.cfg file in
the \eTrust Audit\etc directory.
The access results Success and Failure typically refer to logins, while Info reports
on successful application startups. Warning refers to possible problems, while
Error indicates a more severe problem.
Comment lines
To create a comment line, begin it with a semicolon (;), pound sign (#), or
exclamation point (!). For example, —
! Here are four comment lines. If you wanted to
! use the fourth one as a rule, you could simply
! erase the "!" mark from its start.
! NT-Security;Security,Detailed Tracking,593;jerry;S
The asterisk as wildcard
You can use an asterisk (*), signifying any number of wildcards, for any field
except the event log name. If you wish, you can use a single asterisk for the threepart Resource field; for example, to indicate “all Windows NT security log
events, regardless of resource, user, and result”:
NT-Security;*;*;*
The question mark (?) represents a single wildcard character.
Services
6–5
The eAudit SNMP recorder service
Here is another example, specifying all Windows NT Application log events that
are Information events with the eTrust Audit 1.5 Collector service as their source,
regardless of event category, event ID, and user:
NT-Application;eAudit Col*,*,*;*;I
Registry Keys
The registry includes a key for the eAudit recorder service, under
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\etrustAudit\
Client\Recorders\NT Recorder
For a comprehensive description of its values, see The Recorder Configuration
File in this chapter.
The eAudit recorder service uses the following values located in the
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust Audit
1.5\Client\SeOS\logmgr key:
■
audit_log
■
audit_size
■
audit_back
In addition, if the eTrust Access Control software is installed, the eAudit recorder
service uses the emulate value, located under the SeOS key in
HKEY_LOCAL_MACHINE\SOFTWARE\Memco\SeOS\SeOS
The eAudit SNMP recorder service
The eAudit SNMP recorder service, Snmprec, traps SNMP messages sent to
either a UNIX station or an NT station. The trapped messages are then passed on
to a router – by default the local host or however the defaultrouter key was
defined in the Recorders section of the registry.
For instructions on starting the service, see Starting the Services in the
“Installing eTrust Audit” chapter.
6–6
eTrust Audit Administrator Guide
The eAudit SNMP recorder service
SnmpRec
The eAudit recorder service
Description
SNMP recorder traps SNMP messages
and sends these messages to the default
router.
By default, SNMP recorder traps
messages that are sent to port 162. This
default port can be changed by setting
the SNMPRecorderPort key in the
following registry section.
(HKEY_LOCAL_MACHINE\SOFTWA
RE\ComputerAssociates\eTrust
Audit\Ports).
For more information, see the
SNMPRecorderPort in the Ports section
of the “Registry Keys” chapter.
Service Name
Service Location
eAudit SNMP Recorder
\eTrust Audit\bin\snmprec.exe
Options
action:
-start
start service
-stop
stop service
-install
install service
-remove
remove service
-help
show this message
SNMP Recorder Parameters for UNIX
Daemon Name
Service Location
eAudit SNMP Recorder
/usr/eaudit/bin/snmprec
Usage: snmprec action [debug_options]
Services
6–7
The redirector service
Options
action:
-start
start daemon
-stop
stop daemon
-install
install daemon
-remove
remove daemon
-help
show this message
Registry Keys
The registry includes a key for the eAudit snmprecorder service, under
(HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit\client\recorders\SNMP recorder).
The SNMP recorder sends its messages to the default router, located under
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit\Client\Recorders\DefaultRouter.
The SNMP recorder sends to the MP file, which is located under
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit\Client\Recorders\SNMP Recorder\cfg\snmptd_rec.mp.
The redirector service
The redirector service, SeLogRd, which operates only in Windows NT and
Windows 2000 environments, reads the local audit file created by the eAudit
recorder service and forwards it to the router. The local audit file contains events
originating on the local machine. You control SeLogRd by editing the
configuration file, logroute.cfg. For more details, see The Redirector
Configuration File, later in this chapter.
eTrust Audit sets limits to the size of the audit files. As a result, when events are
generated faster than they can be forwarded — for example, if a Router service is
not running or during a peak situation — it is possible to lose data.
You can guarantee delivery of records to the Router by using one of the following
two ways:
Allowing the files to exceed their prescribed maximum size, by increasing the
maximal file size with the registry value audit_size in the logmgr key.
6–8
eTrust Audit Administrator Guide
The redirector service
Disabling the option to overwrite backup files, by setting the value of the
OverWriteBackup entry in the registry keys for Redirector.
For instructions on starting the service, see Starting the Services on the
“Installing eTrust Audit” chapter.
SeLogRd
The redirector service
Description
SeLogRd is the redirector service. It
handles the contents of the local audit
file according to the instructions in the
redirector configuration file.
SeLogRd can pass information to a
router, whether local or remote.
Location
Syntax
SeLogRd.exe is located in audit\bin
(where audit is the directory in which
you installed eTrust Audit 1.5).
SeLogRd options
Option
Description
-install
Installs the service
-start
Registers the service with
Windows NT and then
starts the service.
-stop
Stops the service
-remove
Unregisters the service as
a service of Windows NT,
removing it from the
Control Panel’s Services
dialog box.
-help
Displays these syntax
options.
The Redirector Configuration File
The redirector configuration file tells what should be sent where. By default,
everything is sent to the router (local or remote).
Services
6–9
The Collector Service
While running, the service periodically reconfigures itself according to the file
contents.
For SeLogRd, the configuration file is logroute.cfg, located in the audit\bin
folder.
Registry Keys for SeLogRd
The registry includes a key for the redirector service:
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\etrustAudit\
Client\Redirector. For a comprehensive description of its values, see the
Redirector key.
In addition, the redirector service uses the following values located in
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit\Client\SeOS\logmgr:
■
audit_log
■
audit_size
■
audit_back
The Collector Service
The Collector service, SeLogRcd, exists only in Windows NT and Windows 2000
platforms. This service receives information from other stations where eTrust
Audit 1.5 is running and writes it to the event database.
For instructions on starting the service, see Starting the Services in the
“Installing eTrust Audit” chapter.
SeLogRcd
The Collector service
Description
SeLogRcd.exe, the Collector service, is
located in audit\bin (where audit is
the directory in which you installed
eTrust Audit 1.5). Whenever the Action
Manager service forwards records as the
action collector, they are accepted by
SeLogRcd at the target station and
written to the event database.
If the Collector service is not running,
the routers will stop trying to send to it.
6–10
eTrust Audit Administrator Guide
The Collector Service
Syntax
SeLogRcd options
Option
Description
-install
Installs the service
-start
Registers the service with
Windows NT and then
starts the service.
When the service starts,
you are asked for the
event database name,
user name, and password,
unless they are recorded
in the registry. (Under
normal conditions, this is
irrelevant for Microsoft
Access.)
-stop
Stops the service
-remove
Stops the service and
unregisters it as a service
of Windows NT,
removing it from the
registry and from the
Control Panel’s Services
dialog box.
-help
Displays these syntax
options.
Registry Keys
The Collector service uses the following values located in
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit\Data Server\Database:
■
Audit DSN
■
Database
■
User
■
Password
Services
6–11
The Log Router Service
The Log Router Service
The router service aclogRd operates in the NT and UNIX environments. Events
from a number of different sources are forwarded to aclogRd. The service reads
the *.cfg files that are found under \eTrust Audit\cfg directory (in NT) or
/usr/eaudit/cfg (in UNIX). These *.cfg files contain filters that are made up of
rules and actions. By using these rules, aclogrd filters the forwarded events and
discards some of them.
All the logs the audit router receives from other recorders are written into queues
in the directories defined in the registry keys in Windows NT (or in ini file in
UNIX), under:
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit\Client\Router\Queue Manager\Queues.
The three pre-defined directories are:
■
Default
■
AlertQueue
■
CollectionQueue
However, you can define your own directories.
The type of queue to which the Router writes depend on the rules defined in the
Queue Rules section (for example:
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit\Client\Router\Queue Manager\Queues\AlertQueue\Queue Rules). A
queue rule can have two forms:
rule_name
action; target name (for a specific target)
rule_name
action (for all targets)
For example: if the cfg file contains rule with action Collector, the records should
be written to the collection queue, because this queue, as defined by the Queue
rules, includes the rule Collector.
You can add rules in the registry, to customize your settings. For example:
Actions that are not defined by default to be directed to the alert queue or the
collection queue are directed to the Default directory. If you do want other
actions to be directed to the alert or collection queue, you should add a rule to
define such situation. In the following example, the ‘file’ rule was add to define
that actions of this type be directed to this queue, and not to Default directory.
6–12
eTrust Audit Administrator Guide
The Log Router Service
Certain actions are attached to the events that are kept, which are then placed in
a number of different queues.
For instructions on starting the service, see Starting the Services on the
“Installing eTrust Audit” chapter.
aclogRd
The router service
Description
aclogRd is the router service. It handles
received events according to the filters
of the router configuration file.
aclogRd.exe is located in audit\bin
(where audit is the directory in which
you installed eTrust Audit 1.5).
Syntax
aclogRd options
Options
Action
-start
start service
-stop
stop service
-install
install service
-remove
remove service
-debug
switch to debug mode
-help
show this message
Services
6–13
The Log Router Service
Log Router UNIX Parameters
Daemon Name
Daemon Location
eAudit Log Router
/usr/eaudit/bin/aclogrd
Usage: aclogrd option [debug_options]
Options are the same as in Windows NT
The router configuration File
The router filter events and decide what action should be performed on these
events according to configuration files.
The following is a brief example of the language used in a configuration file:
Statements
Rule
Configuration File
Language Example
Description
select_NT
Every rule must start with the word Rule
and have at least one action or one Do
group.
(name of rule)
Action
Monitor;localhost (target
name)
Defines the action associated with the
event. Possible actions include: monitor,
file, Collector, and so on.
Include int
Log ~"^NT"
Include int is the internal language. Log
~"^NT" is the condition for including the
event.
Exclude int
Log ~"^Oracle"
Exclude int is the internal language. Log
~"^Oracle" is the condition for excluding
the event.
Do group
group_NT
Can be used for activating another rule or
for implementing a nesting of rules
Group
group_NT
Contains a list of rules
Do Int Define
$Host_%Location%_Count
Value(1)
This defines an internal integer variable
that has the value of 1. Whatever is
between % (such as %location%) is
replaced by embedded text. In this case, it
would be whatever value location is.
$Host_%Location%_Count
exists
Test for the existence of the variable
$Host_%Location%_FailedCount
6–14
eTrust Audit Administrator Guide
The Action Manager Service
Configuration File
Language Example
Description
Incr
Host_%Location%_Count
Increments the internally defined variable
Decr
Host_%Location%_Count
Decrements the internally defined variable
Integer:
$Host_%Location%_FailedCo
unt equal to 3
A conditional statement checking whether
the internal variable equals 3
Do Int Define
$AlertEvent Src("eTrust
Policy Manager")
Type("Alert")
Define variable to generate new event
Do Int Set
$AlertEvent.User
Sets the value of User in the generated
event by copying the value contained in
the token User, which is found in the
event currently filtered.
Do Int Delete
$AlertEvent
Statements
User
Deletes the generated events.
Registry Keys for aclogrd
The registry includes a key for the router service:
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit\Client\Router. For a comprehensive description of its values, see
Router key.
The Action Manager Service
The action manager service performs all actions that are entered into
configuration files (*.cfg). The action manager reads from queues and performs
actions defined per event.
The queues have parameters, which define their maximum action time,
maximum file number and so on. For more details regarding the queue
parameters, see Queue Parameters in the “Registry Keys” chapter.
Services
6–15
The Action Manager Service
Actions managed by the Action Manager
Collector
The Collector action states that the action manager should send the records
received from the queue to a Collector on a user-defined host (hostname), as
shown in the following example:
Action Collector;hostname
Monitor
The Monitor action states that the action manager should send the records
received from the queue to eTrust Audit security monitor on a user-defined host
(hostname), as shown in the following example:
Action monitor; localhost
Screen
The Screen action sends pop-up messages to the screen.
Action screen; target name
Mail
The Mail action states that the action manager should send the records received
from the queue to a specific mail address.
Action mail;[email protected]
6–16
eTrust Audit Administrator Guide
The Action Manager Service
SNMP
SNMP recorder traps SNMP messages and passes these messages on to the
default router on the local station.
Action SNMP; localhost
File
The File action writes messages to a file, instead of mailing them or displaying
them on the screen.
Action file; file; full path
Route
The Route action moves router events to a remote host, where the router of that
host handles them.
Action route; host name
Remote
The Remote action moves records from a queue to a remote router and performs
any action on this remote host. For example:
Action remote; moriarity;monitor;adler.
Program
Running an executable or batch file
When you define an action with the name program, the event is written to a file.
The file name and the file location (the directory to which the file was written)
are transferred as one string to the program you want to run.
The user can now open the file and continue from there.
Services
6–17
The Action Manager Service
For the program action, the formats for the action and target fields in the router
configuration file are as follows.
program;\path\progname.exe;additional parameter;timeout
or
program;\path\progname.bat; additional parameter;timeout
If the program is located in the system environment variable path or in
audit\bin, the path may be omitted. The use of quotation marks is not allowed.
When you run a batch file, it contains the same parameters as a program.
When you run a program or a batch file, the following procedure takes place:
The event is written into a file located in the TEMP directory (currently
%TEMP%).
The program itself gets the file name and the directory path.
By using your API, you can open the file, retrieve the appropriate information,
and run your software accordingly.
It is the responsibility of the user program to parse the additional parameter
string.
To specify the target program’s location, do one of the following:
■
■
Use the full path name.
Ensure that the program file is in the directory defined by the %path%
environment variable.
Timeout
The optional timeout (in seconds) to terminate the program may be added after
the final parameter string.
The default timeout is 30 seconds. If the program has not exited when the
timeout expires, it will be terminated.
6–18
eTrust Audit Administrator Guide
The Action Manager Service
Unicenter
When you specify the action unicenter, selected events are handed off to the
local Unicenter agents for forwarding to the Unicenter TNG Event Console on the
specified host. Status codes from eTrust Access Control are translated to their
generic equivalents. In the Unicenter TNG Event Console, events display color
codes and status icons.
Action unicenter; host name
Service Name
Service Location
eAudit Action
Manager
\eTrust Audit\bin\acactmgr.exe
Options
Action:
-start
start service
-stop
stop service
-install
service
-remove
remove service
-help
show this message
Parameters for UNIX
Service Name
Service Location
eAudit Action Manager
/usr/eaudit/bin/acactmgr
Usage: acatmgr option [debug_options]
Options
Action:
-start
start daemon
-stop
stop daemon
-install
install daemon
-remove
remove daemon
-help
show this message
Services
6–19
The eAudit Distribution Agent Service
The eAudit Distribution Agent Service
The Distribution Agent Service, which is registered as the management agent
Service, runs on UNIX and NT. This service is used for receiving policy files from
the policy manager through distribution server or for removing old policy files if
instructed by the distribution server.
During setup, you can define only one server as a trusted server, recognized by
the Distribution Agent Service. However, you can add later more servers to be
recognized as trusted servers, by editing the key of the Distribution Agent
Service. This key is found in the Management Agent section of the registry keys,
under:
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit\Client\Management Agent.
Under this key, you can find the types of audit nodes
Note that in the Policy Manager you can create a new audit node type by
selecting AN Types from the File menu, when you are in the Audit Nodes
window. Enter the new AN type name (for example: eTrust VPN), and then
confirm this operation.
Having added a new AN type in the Policy Manager window, you must add this
type to the registry to get a configuration file for it. Note that the name you add
to the registry must be identical to the name you add in the Policy Manager
window. Copy the parameters and values from another key, such as eTrust
Access Control.
In Windows NT, the service changes the auditing according to the policy it
receives. The service notifies the router to update the policy to get new rules.
The distribution agent can accept policy files only from the audit node types that
were previously listed.
6–20
Service Name
Service Location
eAudit Distribution
\eTrust Audit\bin\acdistagn.exe
eTrust Audit Administrator Guide
The eAudit Distribution Agent Service
Agent
Usage: acdistagn option [debug_options]
Options
Action:
-start
start service
-stop
stop service
-install
install service
-remove
remove service
-help
show this message
Note: Both the distribution server and the distribution agent services work with
TCP/IP port 8025. You can change that port by using the registry and adding a
special port. For details, see the Ports section of the Registry Keys and ini Files
chapter.
Distribution Agent UNIX Parameters
Service Name
Service Location
eAudit Distribution
Agent
/usr/eaudit/bin/acdistagn
Usage: acdistagn option [debug_options]
Options
Action:
-start
start daemon
-stop
stop daemon
-install
install daemon
-remove
remove daemon
-help
show this message
Services
6–21
The eAudit Distribution Server Service
The eAudit Distribution Server Service
The Distribution Server Service runs only on NT. This server, used for
distributing the policy files amongst the clients, must run on the same station
where the policy manager is located.
While activating the policy from the policy manager, the relevant commands
reach the distribution queue. The Distribution server reads the distribution
queue, selects from the compiled policy files, processes them, and sends them to
the agents according to the commands.
The Distribution Server tries to connect to the distribution agent. In case the
connection succeeded, the agent starts receiving configuration files. After the
transmission operation was terminated successfully, the log is updated.
In case the connection trial failed (or in case the initial connection succeeded but
afterwards a failure occurred), the transmission command is delayed. After a
pre-defined time period (by default: 24 hours) of failed connection trials, the
distribution server terminates the transmission trials and updates the log.
The key of the Distribution server is found under:
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit\Policy Manager\Distribution Server. Under this key, you can find the
queue manager parameters.
Note: Both the distribution server and the distribution agent services work with
TCP/IP port 8025. You can change that port by using the registry and adding a
special port. For details, see the Ports section of the Registry Keys and ini Files
chapter.
eAudit distribution server Parameters
Service name
Service location
eAudit Distribution
Server
\eTrust Audit\bin\acdistsrv.exe
Usage: acdistsrv [debug_options]
6–22
eTrust Audit Administrator Guide
The Portmap Service
Option
Action:
-start
Registers the service with Windows NT and then starts
the service.
-stop
stop service
-install
install service
-remove
Stops the service and unregisters it as a service of
Windows NT, removing it from the Control Panel’s
Services dialog box.
-help
show this message
The Portmap Service
For Windows NT 4.0 and Windows 2000, note that eTrust Audit 1.5 installs the Sun
RPC portmapper.
The portmapper manages a table of correspondences between ports (logical
communications channels) and the services registered at them. It provides a
standard way for a client to look up the TCP/IP or UDP/IP port number of an
RPC program supported by the server. This service runs on all hosts on which
eTrust Audit 1.5’s components are installed.
Service Name
Service Location
eAudit Portmap
\eTrust Audit\bin\Portmap.exe
usage:
inst_pm <full pathname\\portmap.exe
to install portmap, or:
inst_pm remove to remove it
Services
6–23
Chapter
7
Registry Keys and ini Files
This chapter is divided into two parts:
The first part summarizes the items in the Windows NT registry that belong to
eTrust Audit 1.5, and are located under
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\
etrustAudit.
The second part details the parallel items in the UNIX system, which contains
only the client suite.
Note: this chapter describes only keys and files that are
user-configurable.
Windows
Note:
The etrustAudit root
(HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust Audit)
will henceforth be referred to in this document as Audit.
Registry Keys and ini Files
7–1
Current Version
Current Version
Under Audit\CurrentVersion
Name
Data
InstallDate
Date of the installation
day
MajorVersion
Major version number
MinorVersion
Minor version number
UserName
Name of the user who
installed the software
Default Value
Components
Paths
Under Audit\Paths
Name
Data
RootPath
Default Value
…\eTrust Audit
BinPath
Location of the binary
files library
bin\
LibPath
Location of file library
lib\
DllPath
Location of the dll files
library
bin\
Ports
Under Audit\Ports
Notes:
•
7–2
These keys are to be used in one of the following two cases:
eTrust Audit Administrator Guide
Ports
•
The default port is busy.
•
The service cannot get the dynamic port from the portmapper.
Name
Data
Default Value
MonitorPort
Type = String Value
By default port is
assigned by portmapper
Value = port number
Used by Action Manager
(action "monitor") and
Monitor
RouterPort
By default port is
assigned by portmapper
Type = String Value
Value = port number
Used by Redirector and
Router
RouterSapiPort
By default port is
assigned by portmapper
Type = String Value
Value = port number
Used by SAPI senders
and Router
CollectorPort
By default port is
assigned by portmapper
Type = String Value
Value = port number
Used by Action Manager
(action "collector")
DistributionPort
8025
Type = String Value
Value = port number
Used by Distribution
Server and Distribution
Agent
SNMPRecorderPort
Type = String Value
162
Value = port number
Used by SNMPRecorder
SNMPTrapPort
162
Type = String Value
Value = port number
Used by Action Manager
(action "snmp")
Registry Keys and ini Files
7–3
RPC
RPC
Under Audit\RPC
Name
Data
Default Value
PortmapName
Name of the program that Portmap.exe
operates as portmapper
Messages
Under Audit\Messages
Name
Data
Default Value
MessageFile
Message file location
….eTrust Audit\messages\
message.txt
Severity
Under Audit\Messages\Severity\
Under this key, you can find several keys with the same values: Targets
(Mandatory) and SkipTimeout (Optional). Only the default SkipTimeout value
differs in each key.
In the example below, we show the first key with the two values, and then a table
with the list of Default SkipTimeout Values in the other keys.
Fatal
Name
Data
Targets
SkipTimeout
7–4
eTrust Audit Administrator Guide
Default Value
Monitor,Log
Minimal timeout
between two identical
messages
0 seconds
Messages
Key Name
Default SkipTimeout Value
Critical
0 seconds
Error
60 seconds
Warning
60 seconds
Info
60 seconds
Targets
Monitor
Under Audit\Messages\Targets\Monitor
Name
Data
LibraryName
GMON
Default Value
Parameters
Under Audit\Messages\Targets\Monitor\Parameters
Name
Data
Default Value
Host
The location of the self
monitor host
MonitorPort
This parameter is relevant
if the self-monitor host is
used as a predefined port
for recieving alerts (see
the Ports section),
(Optional value)
RetryTimeout
How long to wait before
retrying to connect
3600 seconds (60 minutes)
TransmitTimeout
How long to wait in the
transmission request
5 seconds
Registry Keys and ini Files
7–5
Mail
Mail
Under Audit\Mail
Name
Data
Default Value
ServerType
SMTP. This value cannot
be changed.
MailServer
mailsrv – the default (or
any other mail server
name you indicated
when you installed the
product)
mailsrv
Sender
The user whose account
we use to send mail if
needed
Administrator
Client
SeOS
logmgr
Under Audit\Client\SeOS\logmgr
7–6
Name
Data
audit_back
eTrust Audit \dat\log\
The name of the backup file
seos_audit.bak
for the local audit file. When
the local audit file reaches the
size specified by the audit_size
parameter, it is given this
name and the old file with this
name is discarded.
audit_log
The name of the local audit
file. The recorder service
writes to the file named here,
and the redirector service
reads from it.
eTrust Audit Administrator Guide
Default Value
eTrust Audit \dat\log\seos.audit
Client
Name
Data
Default Value
audit_size
The maximum size, in KB, for
the local audit file
3000
error_back
The name of a file used
internally
eTrust Audit \dat\ log\
seos_error.bak
error_log
The name of a file used
internally
eTrust Audit \dat\ log\seos.error
Recorders
Under Audit\Client\Recorders
Name
Data
Default Value
DefaultRouter
The host name or IP
address of the computer
that runs the eTrust
Audit router
localhost
NT Recorder
Under Audit\Client\Recorders\NT Recorder
Name
Data
Default Value
DataFile
The name of a file that the
recorder service uses
internally.
…eTrust Audit\dat\
recorders\selogrec.dat.
This location should not
be changed.
FilterFile
The name of the recorder
configuration file.
…eTrust Audit\etc\
selogrec.cfg
SearchStringsFile
The name of a file that the
recorder service uses
internally.
…eTrust Audit\etc\
selogrec.str.
Whether to import prior
Windows NT audit logs.
This value is generated
during setup and should
not be changed.
SkipImportLogs
This location should not
be changed.
Registry Keys and ini Files
7–7
Client
Name
Data
Default Value
Interval
The time the service
suspends (sleeps) without
writing any data from the
event log. (Optional Value)
10 seconds
MaxSeqNoSleep
The maximum number of
records written before
sleeping. (Optional Value)
50
SNMP Recorder
Under Audit\Client\Recorders\SNMP Recorder
Name
Data
Default Value
MPFile
Mapping file used for
parsing received
messages
cfg\snmptd_rec.mp
Redirector
Under Audit\Client\Redirector
7–8
Name
Data
Default Value
DataFile
The name of a file that the
redirector service uses
internally
Audit\dat\recorders\
logroute.dat. This location
should not be changed.
MailSubject
The subject line for eTrust
Audit 1.5’s outgoing e-mail.
Notification from eTrust
Audit 1.5
RouteFile
The name of the redirector
configuration file.
eTrust Audit \etc\
logroute.cfg
SendTimeout
The time SeLogRd waits for
confirmation from the router
before resending a message. If
the timeout period is too short,
the same message may appear
in the database several times.
(Optional value).
eTrust Audit Administrator Guide
25 seconds
Client
Name
Data
Default Value
Interval
The time that the redirector
service sleeps without writing
any data from the log.
(Optional value).
MaxSeqNoSleep
The maximum number of
records written before
sleeping. (Optional value).
50
SpeedBackup
This value affects the values of
Interval and MaxSeqNoSleep,
previously mentioned. The
value of MaxSeqNoSleep is
multiplied by the value of
SpeedBackup to give an
effective value. The value of
Interval is divided by the
value of SpeedBackup to give
an effective value. The
effective value has a set
minimum of 1 second.
(Optional value).
2
ChangeLogFactor
The number of sleep periods
before retrying failed targets.
(Optional value).
3
SavePeriod
The time before the current
position of the redirector
service in seos.audit is stored
in logroute.dat. (Optional
value).
10 minutes
OverWriteBackup
When this parameter is set at 1,
the redirector service closes the
backup file during sleep
periods, allowing it to be
erased.
5 seconds
1
Data
Under Audit\Client\Redirector\Data
Name
Data
Default Value
Registry Keys and ini Files
7–9
Client
Name
Data
Default Value
LastBackupLogFileSignature A value unique for
each SeoSAudit.bak
file
LogFileSignature
seos_audit.bak
A value unique for
seos.audit
each SeoSAudit.log file
Router
Under Audit\Client\Router
Name
Data
Default Value
RulesDirectory
cfg\
(Optional value)
Rules extension
cfg
Queue Manager
Queues
Under Audit\Client\Router\Queue Manager\Queues
Name
Data
Default value
DirectoryName
Directory
name
…eTrust Audit \dat\Queue\route
AlertQueue
Queue Rules
Under Audit\Client\Router\Queue Manager\Queues\AlertQueue\ Queue
Rules
Note that the rule name is unimportant, and can be changed by the user. The
Data section indicates which action will be performed and which target the action
reaches. In case the target is not indicated, it means that only the action is of
importance.
Name
7–10
eTrust Audit Administrator Guide
Data
Default value
Client
Name
Data
Default value
monitor
Action name and Target,
delimited by semi-colon
monitor;
snmp
Action name and Target,
delimited by semi-colon
snmp;
screen
Target and action name
screen;
Queue Parameters
Under Audit\Client\Router\Queue Manager\ Queues\ AlertQueue\ Queue
Parameters
Name
Data
Default Value
MaxFileNum
10
MaxFileSize
500KB
MaxActionTime
The maximal time the action
manager operates in the queue
before moving to another
queue.
500 milliseconds
MinActionTime
The minimal time the action
manager operates in the queue
before moving to another
queue.
20 milliseconds
SleepTime
3 seconds
RetryDelay
The amount of time that passes
before trying to transmit a
message again.
600 seconds (10 minutes)
MaxLifeTime
The maximal time a message
can be in the queue before it is
erased.
86400 sec (24 hours)
Registry Keys and ini Files
7–11
Client
Name
Data
Default Value
DeleteOldFiles
When this parameter is set at 1, 1
then when the number of files
in the queue equals the number
set in the MaxFileNum
parameter, the oldest file should
be deleted.
If you do not want to loose any
record, set this parameter to 0. If
you do not want the router to
stop until the oldest file is
processed, set the parameter to
1.
(Optional value)
CollectionQueue
Queue Rules
Under Audit\Client\Router\Queue Manager\Queues\ CollectionQueue\
Queue Rules
Name
Data
Collector
Default Value
Collector;
Queue Parameters
Under Audit\Client\Router\Queue Manager\Queues\CollectionQueue\
Queue Parameters
These keys are identical to the alertqueue queue parameters, but some of them
have different default values.
Name
7–12
Data
Default Value
MaxFileNum
10
MaxFileSize
500KB
MaxActionTime
500 milliseconds
MinActionTime
10 milliseconds
eTrust Audit Administrator Guide
Client
Name
Data
Default Value
SleepTime
3 seconds
RetryDelay
900 seconds (15 minutes)
MaxLifeTime
259200 sec (72 hours)
DeleteOldFiles
1
Default
Queue Rules
Under Audit\Client\Router\Queue Manager\Queues\Default\ Queue Rules
The default key has no key rules; it gets all the rules of the other keys.
Queue Parameters
Under Audit\Client\Router\Queue Manager\Queues\Default\ Queue
Parameters
These keys are identical to the AlertQueue queue parameters, but some of them
have different default values.
Name
Data
Default Value
MaxFileNum
10
MaxFileSize
500KB
MaxActionTime
500 milliseconds
MinActionTime
10 milliseconds
SleepTime
3 seconds
RetryDelay
1800 seconds (30 minutes)
MaxLifeTime
86400 sec (24 hours)
DeleteOldFiles
1
Actions
file
monitor
Registry Keys and ini Files
7–13
Client
collector
mail
Parameters
Under Audit\Client\Router\Queue Manager\Actions\Mail\Parameters
Name
Data
Default Value
MailSubject
The subject line for
eTrust Audit 1.5’s
outgoing e-mail.
Notification from eTrust Audit
1.5
(eTrustAudit: Notification)
screen
remote
route
snmp
program
unicenter
Management Agent
Under Audit\Client\Management Agent
Name
Data
Default Value
TrustedServers
The host in which policy
manager is installed – the
server or servers from
which the client will
accept new policies.
During setup, you can
define only one server as
a trusted server,
recognized by the
Distribution Agent
Service.
This value lets you add
more servers to be
recognized as trusted
servers, by editing the
value and adding more
servers, separated by a
comma
7–14
eTrust Audit Administrator Guide
Client
Parameters
Under Audit\Client\Management Agent\Parameters
All the keys listed below are optional
Name
Data
Default Value
TmpPolicyDir
Temporary policy
directory
…eTrust Audit\dat\ tmp\
agent_tmp_policies
ConnectionTimeout
600 seconds
ReceiveTimeout
Internal parameter for
the TCP session
10 seconds
SendTimeout
Internal parameter for
the TCP session
10 seconds
DistributionTimeout
The time period from the 800 seconds
start of the session until
the agent receives the
policy
AN Types
Under Audit\Client\Management Agent\AN Types\, you can find the different
event log sources.
Note: all the following event log sources have a Parameters section that contains
no values.
NT
Under Audit\Client\Management Agent\AN Types\NT
Name
Data
LibraryName
TALR
Default Value
UNIX
Under Audit\Client\Management Agent\AN Types\UNIX
Name
Data
Default Value
Registry Keys and ini Files
7–15
Client
Name
Data
LibraryName
TGNR
Default Value
eTrust Access Control
Under Audit\Client\Management Agent\AN Types\eTrust Access Control
Name
Data
LibraryName
TGNR
Default Value
Oracle
Under Audit\Client\Management Agent\AN Types\Oracle
Name
Data
LibraryName
TGNR
Default Value
Netscape
Under Audit\Client\Management Agent\AN Types\Netscape
Name
Data
LibraryName
TGNR
Default Value
Apache
Under Audit\Client\Management Agent\ AN Types\ Apache
7–16
Name
Data
LibraryName
TGNR
eTrust Audit Administrator Guide
Default Value
Policy Manager
Policy Manager
Database
Under Audit\Policy Manager\Database
Name
Data
Default Value
DSN
Data source name
eAuditPMDB
UserName
Name of the user
(encrypted)
Password
User-defined password
(encrypted)
Distribution Log
Under Audit\Policy Manager\Distribution Log
Name
Data
Default Value
MaxLogSize
DelPartSize
10000 records
How many records to
500
erase when maximum log
size is reached.
Distribution Server
Under Audit\Policy Manager\Distribution Server
Name
Data
Default Value
OutputDir
Output directory
…\eTrust Audit\dat\AN
Queue Manager
Queues
DistributionQueue
Registry Keys and ini Files
7–17
Policy Manager
Queue Rules
Under Audit\Policy Manager\Distribution Server\Queue Manager\Queues\
DistributionQueue\Queue Rules
Name
Data
Default Value
distribute
distribute;
remove
remove;
Queue Parameters
Under Audit\Policy Manager\Distribution Server\Queue Manager\
Queues\DistributionQueue\Queue Parameters
Name
Data
MaxFileNum
10
MaxFileSize
100KB
MaxActionTime
The maximal time the action
500 milliseconds
manager operates in the queue
before moving to another queue
MinActionTime
The minimal time the action
manager operates in the queue
before moving to another
queue.
SleepTime
7–18
Default Value
50 milliseconds
10 seconds
RetryDelay
The amount of time that passes
before trying to transmit a
message again
1800 seconds (30
minutes)
MaxLifeTime
The maximal time a message
can be in the queue before it is
erased
86400 sec (24 hours)
eTrust Audit Administrator Guide
Data Server
Name
Data
Default Value
DeleteOldFiles
When this parameter is set at 1, 1
then when the number of files
in the queue equals the number
set in the MaxFileNum
parameter, the oldest file should
be deleted.
If you do not want to loose any
policy, set this parameter to 0. If
you do not want the Policy
Manager to stop until the oldest
file is processed, set the
parameter to 1.
(Optional value)
Default
Queue Rules
The default key has no key rules; it gets all the rules of the other keys.
Queue Parameters
Under Audit\Policy Manager\Distribution Server\Queue
Manager\Queues\Default\ Queue Parameters
Same parameters as in the distribution queue, with the same default values.
Actions
distribute
remove
Data Server
Under Audit\Data Server
Registry Keys and ini Files
7–19
Data Server
Database
Under Audit\Data Server\Database
Name
Data
Default Value
AuditDSN
The data source name (DSN) for eAudit_DSN
the event database. The Collector
service writes to the database
with the DSN given here, and
Audit Viewer displays it on
startup. To switch to a different
database, you can use the ODBC
tool in Windows NT’s Control
Panel (or the Administrative
Tools in the Control Panel, in
Windows 2000) to set up a new
database with the same DSN. If
you want to start a new database
with a new DSN, you need to
match this value to it.
Password
The password for the event
database
No default; if data is
absent, it is requested
when the Collector
service or Viewer starts.
The password is
displayed in an encrypted
form in the registry keys.
User
The username for the event
database, displayed in an
encrypted form in the registry
keys
No default; if data is
absent, it is requested
when the Collector
service or Viewer starts.
Note that both the user name and the password can be replaced by using the
Encup utility.
Viewer
Under Audit\Data Server\Viewer
Name
7–20
eTrust Audit Administrator Guide
Data
Default Value
Data Server
Name
Data
Default Value
FiltersDir
Full path to the directory
where filter definition files
are stored
…eTrust Audit \dat\filters\
IniFile
Full path to the directory
where the ini file is stored
…eTrust Audit
\ini\SeAuditW.ini
Filters
Under Audit\Data Server\Viewer\Filters
Under this key, you can find three pre-defined values:
•
Pre-defined
•
Startup
•
All
Each filter has one key.
Collector
Under Audit\Data Server\Collector
All the keys of this section are optional.
Name
Data
Default value
CollectFile
The name of the audit collect
file
eTrust Audit\dat/log\
seos.collect.audit
Reports
Under Audit\Data Server\Reports
Default Value
Name
Data
ReportsDir
Root directory for reports …\eTrust Audit\dat\
reports
Registry Keys and ini Files
7–21
Monitors
Name
Data
Default value
ReadyReportsDir
Saved reports directory
Saved\
(Optional value)
TemplatesDir
Report templates
directory
Templates\
MailSubject
E-Mail notification
message subject
Notification from eAudit
Report Generator
MailBody
E-Mail notification
message body
Report has been created
successfully. You can
view the report using
eAudit Reporter.
Monitors
Security Monitor
Under Audit\Monitors\Security Monitor
7–22
Name
Data
Default Value
EventData
If this value is defined, the
events currently displayed are
saved to a file every time you
close Security Monitor. When
you reopen Security Monitor,
the contents of the file are
displayed again, and new
alerts are added.
eTrust Audit\etc\ events.data
IniFile
Full path to the ini file location eTrust Audit\ini\
SecMonW.ini
eTrust Audit Administrator Guide
UNIX
UNIX
As mentioned earlier, the UNIX version contains only the client suite.
The ini files in UNIX are similar to the registry mechanism in NT. eTrust Audit’s
ini files, eaudit.ini and recorder.ini, are found under eaudit_root/ini/
eAudit.ini
In this file, you can find the following sections:
Current Version
This section is similar to the one that is found in NT, and contains the same
parameters:
Name
Data
Default Value
InstallDate
Date of the installation
day
MajorVersion
Major version number
MinorVersion
Minor version number
UserName
Name of the user who
installed the software
Components
Paths
Name
Data
RootPath
BinPath
Default Value
eaudit_root/
Location of the binary files
library
bin/
Registry Keys and ini Files
7–23
eAudit.ini
Name
Data
Default Value
LibPath
Location of file library
lib/
DllPath
Location of the dll files library
lib/
Ports
Notes:
•
These parameters are to be used in one of the following two cases:
•
The default port is busy.
•
The service cannot get the dynamic port from the portmapper.
Name
Data
Default Value
MonitorPort
Type = String Value
By default port is
assigned by portmapper
Value = port number
Used by Action Manager
(action "monitor") and
Monitor
RouterPort
Type = stringvalue
Value = port number
By default port is
assigned by portmapper
Used by Redirector and
Router
RouterSapiPort
Type = String Value
Value = port number
By default port is
assigned by portmapper
Used by SAPI senders
and Router
CollectorPort
Type = String Value
Value = port number
Used by Action Manager
(action "collector")
7–24
eTrust Audit Administrator Guide
By default port is
assigned by portmapper
eAudit.ini
Name
Data
Default Value
DistributionPort
Type = String Value
8025
Value = port number
Used by Distribution
Server and Distribution
Agent
SNMPRecorderPort
162
Type = String Value
Value = port number
Used by SNMPRecorder
SNMPTrapPort
162
Type = String Value
Value = port number
Used by Action Manager
(action "snmp")
Messages
Name
Data
Default Value
MessageFile
Message file location
eaudit_root/messages/
message.txt
Severity
Under this section, you can find several sub-sections with the same values:
Targets (Mandatory) and SkipTimeout (Optional). Only the default SkipTimeout
value differs in each sub-section.
In the example below, we show the first sub-section with the two values, and
then a table with the list of Default SkipTimeout Values in the other sub-sections.
Fatal
Name
Data
Targets
SkipTimeout
Default Value
Monitor,Log
Minimal timeout
between two identical
messages
0 seconds
Registry Keys and ini Files
7–25
eAudit.ini
Sub-section Name
Default SkipTimeout Value
Critical
0 seconds
Error
60 seconds
Warning
60 seconds
Info
60 seconds
Targets
Monitor
Name
Data
Default Value
LibraryName
GMON
Name
Data
Host
The location of the self
monitor host
MonitorPort
In case the monitor host
and the local host are
found on opposite sides
of the firewall, the
monitor can be defined by
the user and not only by
port mapping (Optional
value)
RetryTimeout
How long to wait before
retrying to connect
3600 seconds (60 minutes)
TransmitTimeout
How long to wait in the
transmission request
5 seconds
Parameters
Mail
For future use.
7–26
eTrust Audit Administrator Guide
Default Value
eAudit.ini
Client
Recorders
Name
Data
Default Value
RecordersIniFile
The path to the recorders ini/recorder.ini
ini file
DefaultRouter
Default router that
should be used by any
recorder. An empty
parameter means using a
local host
SNMP Recorder
Name
Data
Default Value
MPFile
Mapping file used
for parsing
received messages
cfg/snmptd_rec.mp
Router
Name
Data
Default Value
RulesDirectory
cfg/
(Optional value)
Rules extension
cfg
Queue MANAGER
Queues
Name
Data
Default value
DirectoryName
Directory
name
…eaudit_root/dat/Queue/route
AlertQueue
Registry Keys and ini Files
7–27
eAudit.ini
Queue Rules
Name
Data
Default Value
monitor
monitor;
screen
screen;
snmp
snmp;
Queue Parameters
Name
Data
MaxFileNum
10
MaxFileSize
500KB
MaxActionTime
The maximal time the action
manager operates in the queue
before moving to another
queue.
500 milliseconds
MinActionTime
The minimal time the action
manager operates in the queue
before moving to another
queue.
20 milliseconds
SleepTime
7–28
Default Value
3 seconds
RetryDelay
The amount of time that passes
before trying to transmit a
message again.
600 seconds (10 minutes)
MaxLifeTime
The maximal time a message
can be in the queue before it is
erased.
86400 sec (24 hours)
eTrust Audit Administrator Guide
eAudit.ini
Name
Data
Default Value
DeleteOldFiles
When this parameter is set at 1, 1
then when the number of files
in the queue equals the number
set in the MaxFileNum
parameter, the oldest file should
be deleted.
If you do not want to loose any
record, set this parameter to 0. If
you do not want the router to
stop until the oldest file is
processed, set the parameter to
1.
(Optional value)
CollectionQueue
Queue Rules
Name
Data
Collector
Collector;
Queue Parameters
These parameters are identical to the alertqueue queue parameters, but some of
them have different default values.
Name
Data
Default Value
MaxFileNum
10
MaxFileSize
500KB
MaxActionTime
500 milliseconds
MinActionTime
10 milliseconds
SleepTime
3 seconds
RetryDelay
900 seconds (15 minutes)
MaxLifeTime
259200 sec (72 hours)
DeleteOldFiles
1
Registry Keys and ini Files
7–29
eAudit.ini
Default
Queue Rules
The default sub-section has no key rules; it gets all the rules of the other subsections.
Queue Parameters
These parameters are identical to the AlertQueue queue parameters, but some of
them have different default values.
Name
Data
Default Value
MaxFileNum
10
MaxFileSize
500KB
MaxActionTime
500 milliseconds
MinActionTime
10 milliseconds
SleepTime
3 seconds
RetryDelay
1800 seconds (30 minutes)
MaxLifeTime
86400 sec (24 hours)
DeleteOldFiles
1
Actions
Mail
Parameters
Name
Data
Default Value
MailSubject
The subject line for
eTrust Audit 1.5’s
outgoing e-mail.
Notification from eTrust Audit
1.5
(eTrustAudit: Notification)
Unicenter
7–30
eTrust Audit Administrator Guide
eAudit.ini
Parameters
Name
Data
UnicenterHome
Used by script to
set environment
variables.
(Optional value)
Default Value
Management Agent
Name
Data
Default Value
TrustedServers
The host in which policy
manager is installed – the
server or servers from
which the client will
accept new policies.
During setup, you can
define only one server as
a trusted server,
recognized by the
Distribution Agent
Service.
This value lets you add
more servers to be
recognized as trusted
servers, by editing the
value and adding more
servers, separated by a
comma.
Parameters
All the values listed below are optional
Name
Data
Default Value
TmpPolicyDir
Temporary policy
directory
…eaudit_root/dat/ tmp/
agent_tmp_policies
ConnectionTimeout
600 seconds
ReceiveTimeout
Internal parameter for
the TCP session
10 seconds
SendTimeout
Internal parameter for
the TCP session
10 seconds
Registry Keys and ini Files
7–31
eAudit.ini
Name
Data
Default Value
DistributionTimeout
The time period from the 800 seconds
start of the session until
the agent receives the
policy
AN Types
Under AN Types, you can find the different event log sources.
Note: all the following event log sources have a Parameters section that contains
no values.
NT
Name
Data
LibraryName
TALR
Name
Data
LibraryName
TGNR
Name
Data
LibraryName
TGNR
Name
Data
LibraryName
TGNR
Default Value
UNIX
Default Value
eTrust Access Control
Default Value
Oracle
7–32
eTrust Audit Administrator Guide
Default Value
recorder.ini
Netscape
Name
Data
LibraryName
TGNR
Name
Data
LibraryName
TGNR
Default Value
Apache
Default Value
recorder.ini
Recorder Modules
The recorders supported by eTrust Audit in UNIX are:
•
File Spooler (UNIX native recorder)
•
Netscape
•
Apache
•
Oracle
Each recorder has its own section in the recorder.ini file, which bears its name.
The following tables will detail the various parts of the recorders, as mentioned
in the sections devoted to each recorder, while indicating which of the definitions
or parameters are found in all recorder sections and which are specific to a
certain kind of recorder.
Definitions
The following definitions are found in all UNIX recorders supported by eTrust
Audit, except for the last definition, ORACLE_HOME, which is found only in the
Oracle recorder:
Definition
Meaning
Default Value
Registry Keys and ini Files
7–33
recorder.ini
Definition
Meaning
ModuleName
Unique name for the
Recorder Module
LibraryPrefix
Prefix for the Recorder
Module's library name
Active
Activating the recorder
module
SleepInterval
The time, in seconds, that
the service sleeps after
each record. Default: 1
SendInterval
The time, in seconds, that
the service sleeps after
each record. Default: 10
MaxSeqNoSleep
The maximum number of
records sent before
sleeping. Default: 50
ORACLE_HOME
Where Oracle would be
found on file system
Default Value
Parameters
The Parameters section is found in all UNIX recorders supported by eTrust
Audit. However, there is a significant difference between Oracle and other
recorder in regard to this section:
•
In all recorders except for oracle, you can find two parameters under this section.
DatFilePath is a mandatory parameter, found in all UNIX recorders supported
by eTrust Audit.
MPDebug is an optional parameter and is found in all recorders except Oracle.
•
Except for the DatFilePath parameter described earlier, and the MP file, which is
found under the Log Data section in the other recorders, and is therefore described
under that section, Oracle has additional parameters, which are not found in the
other recorders. These are the other parameters in this table.
Parameter Name
7–34
eTrust Audit Administrator Guide
Meaning
Default Value
recorder.ini
Default Value
Parameter Name
Meaning
DatFilePath
Relative path to the .dat UNIX file
dat/recorders/syslog.dat
Netscape dat/recorders/netscape.da
t
Apache –
dat/recorders/apache.dat
Oracle dat/recorders/oracle.dat
MPDebug
1 – debug information
for message parser is
generated
ORACLE_SID
DB name on local
machine
TWO_TASK
Remote database host
name
Password
User password
Username
User name
ORCALE_HOME/network
/admin/tnsnames.ora
Log Data
Under this section, you can find parameters for the log. The file spooler has two
logs: syslog and sulog. Other recorders have only one log, which bears their
name: Netscape or Apache.
Notes:
•
This section is not found in the Oracle recorder directory, and the only parameter
here that is found also in Oracle is the MPfile parameter, which is located under the
Parameter section in Oracle.
•
The ConfigFile and Source parameters are found only in syslog.
Parameter
Meaning
LogName
The recorder name – Unix,
Netscape or Apache
Default Value
Registry Keys and ini Files
7–35
recorder.ini
Parameter
Meaning
Default Value
StartOver
1 - Restarts reading the log files
(ignores the .dat file)
0
SendUnmatched
0 – sends only logs that are
matched to mp file.
0
1 - sends all events
SkipCurrentLogs
0 – skips the log files defined
under log_files
0
MPfile
Relative path to .mp file
UNIX –
cfg/syslog.mp, or:
cfg/sulog.mp
Netscape –
cfg/netscape.mp
Apache –
cfg/apache.mp
Oracle –
cfg/oracle.mp
ConfigFile
Relative path to syslog
configuration file
/etc/syslog.conf
Source
0 – taking the log files defined in
the default configuration file
under the ConfigFile parameter,
plus all log files found in the
LogFiles section
1
1 - taking only the log files
defined in the default
configuration file
LogFiles
List of paths to log files from
which records are to be read
In sulog – log1
In Nestscape NETSCAPE_LOGS
In Apache APACHE_LOGS
7–36
eTrust Audit Administrator Guide
Appendix
A
Advanced Options
This chapter contains information regarding the following tasks:
■
■
■
■
■
Changing your encryption key, changing your encryption method, or
eliminating encryption
Changing the value for MailSender in the registry keys for mail action for the
SMTPserver
Setting up eTrust Audit 1.5 with a firewall between components
Preparing your computer to use the Collector or Viewer software with the
Oracle Server database type
Configuring Microsoft SQL Server to let the Collector service access the event
database by using Windows NT native authentication
■
Changing your database type
■
Using advanced Policy Manager options
■
Using the Rule Wizard
■
Customizing the eAudit viewer
■
Using the Encup utility
■
Security-related Windows NT Event Ids
■
Debug Options
Advanced Options
A–1
Encryption
Encryption
By default, the information eTrust Audit 1.5 sends from station to station is
encrypted.
You can change your encryption key, switch to a different encryption cipher, or
turn off encryption. Whatever you do about encryption, you should do the same
thing at every station where eTrust Audit 1.5 is installed. Note, however, that
unencrypted information will be accepted from all sources.
As originally installed, eTrust Audit 1.5 uses 56-bit DES encryption.
Changing Your Encryption Key
You can change the encryption key at any time, and you can change back to the
default key at any time. But whenever you change the key at any station, you
must make the same change at all stations.
eTrust Audit generates new keys by using the MD5 hashing function. They can
be based on a file or string of any size.
To change the encryption key:
A–2
1.
Stop the eTrust Audit 1.5 services and Security Monitor, if installed.
2.
From the command line, use the setkey utility, located in the audit\bin
directory (where audit is the directory in which you installed eTrust Audit
1.5).
eTrust Audit Administrator Guide
Encryption
3.
Restart the services and Security Monitor.
Setkey options
Option
Description
-c
Clears the user key and sets a default
key
-f[e] filename
Specifies the contents of filename as the
basis for the new encryption key. If the
file is not in the current directory, you
can include an absolute or relative
pathname.
If you use -fe, the file is then deleted. If
you use -f, the file remains.
-help
Displays these syntax options.
-k newkey.
Installs newkey as the basis for the new
encryption key.
Turning off Encryption
To turn off encryption in Windows NT or Windows 2000, delete the
\winnt\system32\adcipher.dll file.
To turn off encryption in UNIX, delete the /usr/lib/adcipher.so file.
Advanced Options
A–3
SMTP
SMTP
eTrust Audit 1.5 uses SMTP by default.
If you are having trouble with mail delivery that uses SMTP, you may need to
change the value for MailSender in the registry keys for mail action
(HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\etrustAudit\
Mail).
For certain SMTP servers, the value of MailSender must represent an existing
mail account, with the format name@domain — for example,
[email protected].
Firewall
If you are installing Security Monitor, the Router or the Collector service on one
side of a firewall, and the recorder and router services on the opposite side, and
the firewall allows port 111 from outside the network (portmapper port), then no
further action is necessary. But if the firewall does not allow communication to
the portmapper in the protected network, the client and the server (the redirector
service, the router service and the Collector service) must be made to agree on a
specific port.
You can ensure agreement by setting the same value in the registry at the client
and Collector stations.
1.
At the client stations, edit the registry keys under
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit 1.5\Ports (for example:
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit 1.5\ports\MonitorPort). For details, see Ports.
2.
Enter the same name and value at the target station.
Configuring an Oracle client
At each station where you want to work with an Oracle Server database, you
must configure an Oracle-Net client. To do so, use the Oracle Net8 Easy Config
utility in the Oracle for NT application group.
1.
Ensure that you have the following information (if you are unsure, consult
your Oracle Server DBA):
The Oracle Server’s host name
A–4
eTrust Audit Administrator Guide
Windows NT Authentication with Microsoft SQL Server
The Oracle Server’s port number (usually 1521)
The username and password of the Oracle account where the eTrust Audit
1.5 tables are defined
2.
Next, start the Oracle Net8 Easy Config utility and request Add New Service.
3.
Choose a name for the service. Any name is acceptable, but it is
recommended to use the same name for all users.
4.
In the next dialog, select TCP/IP.
5.
Specify the host name. Unless you have a local reason to change the port
number, leave 1521 selected.
6.
Specify the database SID name.
7.
Check the new connection by clicking the Test Service option.
8.
Enter the username and password, and then click Test. If the result is
positive, the connection is properly defined. Otherwise, consult your Oracle
Server DBA.
Windows NT Authentication with Microsoft SQL Server
In configuring the Collector service’s login to the event database, you have two
options — Microsoft SQL Server authentication and Windows NT authentication
with the network login ID.
Microsoft SQL Server authentication requires you to enter a username and
password each time the Collector service starts. Windows NT authentication
allows a silent login.
Advanced Options
A–5
Changing the Database Type
To use Windows NT authentication, several configuration tasks are required. If
you have any questions, consult your DBA.
■
■
■
■
■
The Collector should be in the same domain as the database, or in a trusted
domain.
The user account for the Collector service in Microsoft SQL Server should be
preconfigured in Windows NT. It is recommended to create a new user with
a single account name for use in both Windows NT and Microsoft SQL
Server. In Microsoft SQL Server, make the event database the default
database for the account. The Collector service will log in to the database
under this account.
The Login Security Mode for the database must be either “Windows NT
Integrated” or “Mixed.”
You must configure the ODBC drivers appropriately, either during eTrust
Audit 1.5 setup or from the Control Panel in NT (or the Administrative Tools
in the Control Panel, in Windows 2000). Select Windows NT authentication
with the network login ID.
After eTrust Audit 1.5 installation, you must configure the Collector service
to access the database as the new user you created. In the Control Panel’s
Services dialog, select the “eAudit Collector” and click Startup, Log On As
This Account. Then select the user you created for the Collector service.
Changing the Database Type
At installation time, you specify the database type for the event database:
Microsoft Access (versions 97 and higher) , Oracle Server (versions 7.0 and 8.05),
or Microsoft SQL Server (versions 6.5, 7.0 and 2000)
To change the database type, it is recommended that you reinstall the Collector.
Note that in such case, the data stored in the old database will not be moved to
the new database.
A–6
1.
Use the ODBC tool in Windows NT’s control panel (or the Administrative
Tools in the Control Panel, in Windows 2000) to set up your new database.
2.
If there is a difference in DSN between the old and new databases, update
the Audit value under the
HKEY_LOCAL_MACHINE\SOFTWARE\ComputerAssociates\eTrust
Audit 1.5\Data Server\Database key. You can also use this key to update the
username and password by using the Encup utility.
eTrust Audit Administrator Guide
Policy Manager Options
Policy Manager Options
You can control the refresh rate of two of the Policy Manager windows and the
Policy Manager appearance by using the Options tool or by selecting the Options
command from the Tools menu, as shown in the following illustration:
The Options window has two tabs: Data View and Appearance, as shown here:
The Data View tab lets you set the automatic refresh time of the Audit Nodes and
Policy Activation Log windows.
Advanced Options
A–7
The Rule Wizard
The Appearance tab lets you display large buttons at the toolbar, as well as
displaying the main window in a workbook (spreadsheet) style.
The Rule Wizard
The rule wizard lets you create rules by using the Include Events and Exclude
Event buttons. The two following figures show how you can define conditions
with the Field button, as shown in the following illustration:
A–8
eTrust Audit Administrator Guide
The Rule Wizard
Advanced Options
A–9
The Rule Wizard
A–10
eTrust Audit Administrator Guide
The Rule Wizard
Here we have seen how to include events where NT event type is equal to
success. Of course, you can also exclude events and use other operations such as
different than, less than and so on. In the example shown in the following
illustration we have included and excluded several event types with various
operations:
When you create a filter that can include several “Include events” and “Exclude
events ” condition groups, the relation between the condition groups is this:
(Include Or Include) And (Exclude Or Exclude).
To understand that, let us create a filter that includes the following sub-condition
groups:
■
■
■
■
Include all events that happened until 19/6/2001, whose severity is
“Critical,” or:
Include all events that happened from 19/6/2001 onwards:
Exclude all events that happened on the 13/6/2001, whose severity is
“Critical,” or:
Exclude all events that happened on the 20/6/2001.
Advanced Options
A–11
The Rule Wizard
To create this filter, click Include events and add the first condition: Severity
equal to Critical.
Now click Add to List. Note that as long as you do not click Exclude events, or
click again Include events, any condition you add by using Add to List is joined
to the same condition group to which the previous one belongs, with an “and”
relation.
Now select the field Date less than 19 Jun 2001 and click again Add to List. The
event should now meet those two conditions: having a “Critical” severity type
and happening before the 19/6/2000.
Now click on Include events to add another condition group. When you add a
condition group this way, it means that the event should now meet the
conditions specified in the first condition group or the in the newly created
group.
A–12
eTrust Audit Administrator Guide
The Rule Wizard
Define the condition shown in the following illustration, and then click Add to
List:
Now click Exclude events. By so doing, you state that besides meeting the
conditions specified in one of the two condition groups mentioned earlier, the
event must meet all conditions mentioned from now on.
Add the two conditions shown in the following illustration, and click Add to List
after each condition:
Now click again Exclude events and add the following condition:
Our task is now complete. If you want to view the script of the conditions, click
Show script. If you want to remove one of the conditions, click Remove. You can
use this button in two ways:
■
Remove a condition.
To do that, highlight the line of that condition and click Remove.
Note that if you remove the first condition, as shown previously, the other
condition’s text is changed (from “and date” to “where date”).
■
Remove a condition group
Advanced Options
A–13
Customizing the Viewers
To do that, highlight the line with the Include events or Exclude events token
and click remove. All that group conditions (that is, all lines until the next
Include events or Exclude events line) will be deleted.
Reduce Events Example
Sometimes we may have events that occur many times in a certain time frame,
but we would like to be notified only about the first event, or perhaps only once
or a few times a day.
For example: if we have a vast number of computers in the organization , we may
receive notifications of licensing expiration events every twenty minutes, thus
getting thousands of notification regarding the same event, when we want to be
notified only about the first one. The same may occur when the user’s computer
is connected to the network on hours when he is not authorized to work. In such
case, we may get warning notification every few minutes, and eventually our
database will be filled with thousands of unwanted records. The following
example shows you how to exclude the unwanted event notifications in a certain
time frame.
The event will be processed once, and only when the time frame that we set is
passed will the event be reprocessed. (The time frame of 3600, mentioned in the
example, is indicated in seconds).
After you create a rule regarding a specific event, you need to add manually such
definition to the rule in order to add this definition for implanting an action and
distributing the policy.
Exclude Int
$Host_%SAPI_LOCATION_FLD_RL%_UserName_%SAPI_USER_FLD_RL%_Count exists
Do Int
Define $Host_%SAPI_LOCATION_FLD_RL%_UserName_%SAPI_USER_FLD_RL%_Count
Value(1) ExpireSinceLastModified(3600)
Note: This rule should be handled with much care, because using it may cause
loss of events. You need to be very precise about the type of events that would
activate this rule.
Customizing the Viewers
The main windows of both Audit Viewer and Security Monitor are customizable.
■
A–14
You can hide and redisplay the toolbar and status bar.
eTrust Audit Administrator Guide
Customizing the Viewers
■
You can add up to 10 user-defined columns.
■
You can resize columns.
■
■
You can change certain graphical properties of the window and table as a
whole, such as line colors and current-cell highlighting.
You can change the graphical style of specific data types; for example, you
can change the font and color of numeric fields.
Column Width
To change column width, or even eliminate a column, follow these steps:
1.
Position the pointer between column titles. The pointer’s shape changes to a
double arrow.
2.
Press the mouse button and drag the pointer laterally. You can drag the
pointer until the column disappears.
The next time you open a Viewer window, the columns will reappear with their
default widths.
Advanced Options
A–15
Customizing the Viewers
Window/Table Properties
To change characteristics of the window and the table as a whole, select
Properties from the Edit menu and use the dialog box that appears. To preserve
your changes, check the Save settings to profile box.
Data Styles
Select Styles from the Edit menu. A list of data types that can be reformatted
appears. Select a type, and then click Change. Tabs provide access to all editable
characteristics such as fonts, colors, alignment, and the width and appearance of
borders.
A–16
eTrust Audit Administrator Guide
Encup
Encup
The Encup utility passes a buffer that contains either a user name or a password
associated with that user name. The source of the information is either a file or
standard input.
The information is then encrypted and returned either to a file or to standard
output.
For more detailed explanation regarding Encup, run encup –help from the
command line
Security-related Windows NT Event IDs
The following events are among those directly involved in security.
Event ID
Description
512
Windows NT startup
513
Windows NT shutdown
514
Authentication package has been
loaded
515
Trusted logon process has been
registered
Advanced Options
A–17
Security-related Windows NT Event IDs
A–18
Event ID
Description
516
Some audit messages have been
discarded (full queue)
517
The event log was cleared
518
Notification package has been loaded
528
Successful logon
529
Failed logon — unknown user name or
bad password
530
Failed logon — time restriction
violation
531
Failed logon — account disabled
532
Failed logon — account expired
533
Failed logon — user not permitted at
this computer
534
Failed logon — logon type not
permitted for this user
535
Failed logon — password expired
536
Failed logon — Netlogon component
not active
537
Failed logon — unexpected error
538
Logoff
539
Failed logon — account locked out
560
Object open
561
Handle allocated
562
Handle closed
563
Object open for delete
564
Object deleted
576
Special privileges assigned to new
logon
577
Privilege service called
578
Privileged object operation
592
New process created
eTrust Audit Administrator Guide
Security-related Windows NT Event IDs
Event ID
Description
593
Process exited
594
Handle duplicated
595
Indirect access to an object
608
User right assigned
609
User right removed
610
New trusted domain
611
Removing trusted domain
612
Audit policy change
624
User account created
625
Account type changed
626
Account enabled
627
Change password attempt
628
Password set
629
Account disabled
630
Account deleted
631
Global group created
632
Global group member added
633
Global group member removed
634
Global group deleted
635
Local group created
636
Local group member added
637
Local group member removed
638
Local group deleted
639
Local group changed
640
General account database changed
641
Global group changed
642
User account changed
643
Domain policy changed
Advanced Options
A–19
Debug
Debug
All debug options described in the following example are non-supported
features, used only for when you switch to debug mode.
The features are identical for all services.
Example for Debug
The eAudit Recorder Service
Parameters for NT
Option
-debug
Description
Specifies the debug mode (not for
regular use).
Debug information is sent to the
command prompt window from which
the SeLogRec command was sent. To
terminate debug mode, press Enter.
–backuplog
Backs up the audit log
Parameters for UNIX
debug_options:
A–20
-trace
switch on TRACE
-dbglvl <n>
debug level n (from 1 to 5)
-dest1 <dest>
use dest as primary output for debug
information
-dest2 <dest>
use dest as secondary output for debug
information (where destinations can be
STDOUT, STDERR or <FILE>)
eTrust Audit Administrator Guide
Appendix
B
Submit API
eTrust Audit provides an API, the Submit API (SAPI), to submit audit events to
the eTrust Audit router. The Submit API provides a simple means of adding new
sources of audit information to eTrust Audit. Any third-party application
intended to submit events to eTrust Audit should use the SAPI calls.
Because the ultimate objective of eTrust Audit is to enable event analysis, both
online and offline, it is important that events from different sources conform to a
single concept. On the other hand, it is vital that native auditing information be
preserved. The SAPI allows for both:
■
■
■
If a submitted application's events are to be analyzed by eTrust Audit, it
should map events to the common format. The unified format simplifies
management, reporting, and analysis. For example, Intrusion Detection rules
for generic events such as logon/logoff can be easily administered crossplatform.
Translators are functions that translate external data representation (such as
UNIX time_t) to SAPI internal string format. Each translator is identified by
name. Currently three translators are supported: string, timet and long.
The client is free to add fields for native information. If the fields have been
registered with the eTrust Audit database, auditors can report on events
from a certain source by using the terms specific to the source.
Mapping
Messages are created by mapping to fields defined in the header file
AC_SAPITokens.h. The SAPI format is completely free. However, some fields are
mandatory and others are strongly recommended.
Message routing
After mapping, the resulting message is submitted to a router. By default, events
are submitted to the router resident on the local machine. You can configure the
SAPI to submit to the router of your choice.
Submit API
B–1
Compiling and linking
Following a successful submit operation, eTrust Audit provides guaranteed
delivery according to the filters and actions specified in the router’s filter rules
file (router.cfg).
Submitting a Message to the Router
Tip: You must use SAPI_Init before any other SAPI function.
Submitting events to the SAPI has a simple flow. Follow these steps:
1.
Create a SAPI context by using SAPI_Init. The context is helpful in the case of
multiple threads.
2.
Create a message handle by using SAPI_NewMessage.
3.
By using the message handle, you add items (fields) to the message with
SAPI_AddItem.
4.
With the same handle, submit the message to the router with
SAPI_SubmitMsg.
5.
After a message has been successfully submitted, use SAPI_RemoveMessage
to clear it from memory.
If submit fails
If the attempt to submit a message fails, you may either remove it, or try to
submit it again. If the message is not removed, it stays in memory.
Note that after the first submit attempt, the message is locked and cannot be
changed.
Compiling and linking
To use the Submit API, you will be required to include a header file with
prototypes and structure definitions in your source code. The header file is
etsapi.h
For mapping, use AC_SAPITokens.h.
Library
SAPI on Solaris UNIX platform includes two shared libraries: etsapi.so and
etbase.so. In Windows NT, the corresponding files are etsapi.dll and etbase.dll.
B–2
eTrust Audit Administrator Guide
Sample SAPI usage
Sample SAPI usage
The following is a simple example of SAPI usage.
The application below will send a single message containing three fields
(timestamp, user, and category of event).
Note that SAPI_Init and SAPI_Destroy should be used only once per application
— not once per message as in this demonstration.
#include "etsapi.h"
#include "AC_SAPITokens.h"
/*
* Usage : test [host]
*/
int main(int argc, char *argv[])
{
SAPI_CTX
ctx;
/* SAPI context
*/
SAPI_HANDLE_l
h;
/* handle for new message
*/
SMStatus
rv;
/* return value to check
*/
SMStatus
remote_rv;
/* return value from the receiver */
Char
msg_buffer[1024];
long
eventId
char
category[] = "General";
char
logname[]
= "test_log";
char
source[]
= "test_recorder";
char
info[]
= "test_recorder information";
rv = SAPI_Init(&ctx, NULL);
= 123456;
/* Create a new SAPI context */
if (rv != SAPI_SUCCESS)
{
printf("SAPI_Init: failed code : 0x%X\n", rv);
return 1;
}
/* set destination host, default - localhost */
if (argc > 1)
{
rv = SAPI_SetRouter(ctx, argv[1]);
if (rv != SAPI_SUCCESS)
{
Submit API
B–3
Sample SAPI usage
printf("SAPI_SetRouter: host = '%s', failed code : 0x%X\n",
argv[1], rv);
return 1;
}
}
else
printf("Set destination host %s\n", argv[1]);
rv = SAPI_NewMessage(ctx, &h); /* Create a new SAPI message */
if (rv != SAPI_SUCCESS)
{
printf("SAPI_NewMessage: failed code : 0x%X\n", rv);
return 1;
}
/* Add a new items to a message */
rv = SAPI_AddItem(ctx, h,
SAPI_TRANS_DATATYPE_STRING,
SAPI_CATEGORY_FLD,
category);
if (rv != SAPI_SUCCESS)
{
printf("SAPI_AddItem: failed code : 0x%X\n", rv);
return 1;
}
rv = SAPI_AddItem(ctx, h,
SAPI_TRANS_DATATYPE_LONG,
SAPI_NATIVEID_FLD,
&eventId);
if (rv != SAPI_SUCCESS)
{
printf("SAPI_AddItem: failed code : 0x%X\n", rv);
return 1;
}
rv = SAPI_AddItem(ctx, h,
SAPI_TRANS_DATATYPE_STRING,
SAPI_LOGNAME_FLD,
logname);
if (rv != SAPI_SUCCESS)
{
printf("SAPI_AddItem: failed code : 0x%X\n", rv);
return 1;
}
rv = SAPI_AddItem(ctx, h,
SAPI_TRANS_DATATYPE_STRING,
SAPI_SOURCE_FLD,
source);
if (rv != SAPI_SUCCESS)
{
printf("SAPI_AddItem: failed code : 0x%X\n", rv);
return 1;
}
rv = SAPI_AddItem(ctx, h,
SAPI_TRANS_DATATYPE_STRING,
SAPI_INFO_FLD,
info);
if (rv != SAPI_SUCCESS)
{
printf("SAPI_AddItem: failed code : 0x%X\n", rv);
return 1;
B–4
eTrust Audit Administrator Guide
SAPI reference
}
/* Print the content of a message to a buffer */
rv = SAPI_DumpMessage(ctx, h, msg_buffer, sizeof(msg_buffer));
if (rv != SAPI_SUCCESS)
{
printf("SAPI_DumpMessage: failed code : 0x%X\n", rv);
return 1;
}
else
{
printf("SAPI message:\n %s\n", msg_buffer);
}
/*Submits the message to a SAPI router.*/
rv = SAPI_SubmitMsg(ctx, h, &remote_rv);
if (rv == SAPI_SUCCESS)
printf("SAPI_SubmitMsg OK, remote return code : 0x%X\n", remote_rv);
else
printf("SAPI_SubmitMsg: failed code :0x%X\n", rv);
/*Remove a message from the given context.*/
rv = SAPI_RemoveMessage(ctx, h);
if (rv != SAPI_SUCCESS)
{
printf("SAPI_RemoveMessage: failed code : 0x%X\n", rv);
return 1;
}
/* destroy SAPI context and free all its allocations */
rv = SAPI_DestroyCTX(ctx);
if (rv != SAPI_SUCCESS)
{
printf("SAPI_DestroyCTX: failed code :0x%X\n", rv);
return 1;
}
}
return 0;
SAPI reference
SAPI functions employ the following type definitions.
Type
Purpose
SAPI_CTX
SAPI context contains state information
for all SAPI calls
SAPI_HANDLE_l
SAPI message handles used for
referring to specific messages
SAPI_HANDLE_lp
The SAPI uses the functions on the following pages to pass messages to the
eTrust Audit router.
Submit API
B–5
SAPI reference
SAPI_Init
Note: This function must be called before any other SAPI functions can be used.
Syntax
SMStatus SAPI_Init( SAPI_CTX
char
*ctx,
*config );
Parameter
Description
ctx
Address of pointer to SAPI context
config
Configuration (reserved for future use)
SAPI_NewMessage
Syntax
SMStatus SAPI_NewMessage( SAPI_CTX
SAPI_HANDLE_lp
* ctx,
Handle );
Parameter
Description
ctx
SAPI context
This parameter’s value originates with
SAPI_Init.
handle
Address of the handle to return on
success
Description
Creates a handle to new message in the given context. The message is also filled
with automatic arguments for mandatory fields with their default values.
Return Values
The function returns SAPI_SUCCESS on success and SAPI_BADCTX_RC for an
invalid SAPI context.
SAPI_AddItem
Syntax
B–6
SMStatus SAPI_AddItem( SAPI_CTX
eTrust Audit Administrator Guide
ctx,
SAPI_HANDLE_l
handle,
char
*item_type,
char
*name,
SAPI reference
void
Parameter
Description
ctx
SAPI context
*value );
This parameter’s value originates with
SAPI_Init.
handle
Handle to a message
This parameter’s value originates with
SAPI_NewMessage.
item_type
The external raw data type.
Currently available item types are —
“long” — value should point to address
of long
“string” — value should point to a null
terminated char string
“timet” — value should point to the
address of a time_t
name
The item name
value
The binary raw data
Description
Adds a new Item to a message. If an Item by the given name already exists, it is
replaced by the given Item.
Return Values
The function returns SAPI_SUCCESS on success and SAPI_BADCTX_RC for an
invalid SAPI context.
SAPI_SubmitMsg
Syntax
SMStatus SAPI_SubmitMsg( SAPI_CTX
ctx,
SAPI_HANDLE_l
handle,
SMStatus
*sapi_remote_rv );
Parameter
Description
ctx
SAPI context
This parameter’s value originates with
SAPI_Init.
Submit API
B–7
SAPI reference
handle
Handle of a message to submit
This parameter’s value originates with
SAPI_NewMessage.
sapi_remote_rv
Description
Return value of the remote function
Submits the message to a SAPI router.
Note that after the message has been submitted, you must free it with
SAPI_RemoveMessage.
Return Values
The function returns SAPI_SUCCESS on success.
SAPI_RemoveMessage
Syntax
SMStatus SAPI_RemoveMessage( SAPI_CTX
SAPI_HANDLE_l
Parameter
Description
ctx
SAPI context
ctx,
Handle );
This parameter’s value originates with
SAPI_Init.
handle
Handle of message to remove
This parameter’s value originates with
SAPI_NewMessage.
Description
Remove a message in the given context. Use the function to clear sent messages
from memory.
Return Values
The function returns SAPI_SUCCESS on success and SAPI_BADCTX_RC for an
invalid SAPI context.
SAPI_ DumpMessage
Syntax
B–8
SMStatus SAPI_DumpMessage( SAPI_CTX
eTrust Audit Administrator Guide
ctx,
SAPI_HANDLE_l
handle,
char
* buffer,
SAPI reference
int
Parameter
Description
ctx
SAPI context
Size );
This parameter’s value originates with
SAPI_Init.
handle
handle of message to dump
This parameter’s value originates with
SAPI_NewMessage.
buffer
buffer to output
size
buffer size
Description
Print the content of a message in the given context to a buffer. Function prints the
string values of the message fields.
Return Values
The function returns SAPI_SUCCESS on success, SAPI_BADCTX_RC for an
invalid SAPI context and SAPI_BADPARAM_RC for too small buffer size.
SAPI_DestroyCTX
Syntax
SMStatus SAPI_DestroyCTX( SAPI_CTX
Parameter
Description
ctx
SAPI context
Ctx );
This parameter’s value originates with SAPI_Init.
Description
Frees current SAPI context and all unsent messages and gracefully shuts the
client side of SAPI.
Return Values
The function returns SAPI_SUCCESS on success.
SAPI_SetRouter
Syntax
SMStatus SAPI_SetRouter( SAPI_CTX
unsigned short
Ctx,
hostname );
Submit API
B–9
SAPI reference
Parameter
Description
ctx
SAPI context created by SAPI_Init
function call
hostname
Name of host where router resides
Description
Registers the name of a new router host.
Return Values
The function returns SAPI_SUCCESS on success and SAPI_BADPARAM_RC for
an invalid context.
B–10
eTrust Audit Administrator Guide
SAPI return codes and errors
SAPI_SetRouterPort
Syntax
SMStatus SAPI_SetRouterPort( SAPI_CTX
unsigned short
Ctx,
Portnum );
Parameter
Description
ctx
SAPI context created by SAPI_Init function call
portnum
user defined port number to be register in portmap
0 - port number will be set by portmap
Description
Change the default SAPI router port number.
Return Values
The function returns SAPI_SUCCESS on success and SAPI_BADCTX_RC for an
invalid SAPI context.
SAPI_ SetRouterTimeout
Syntax
SMStatus SAPI_SetRouterTimeout( SAPI_CTX
unsigned long
Ctx,
Timeout );
Parameter
Description
ctx
SAPI context created by SAPI_Init function call
timeout
user defined timeout
Description
Change the default SAPI router timeout.
Return Values
The function returns SAPI_SUCCESS on success and SAPI_BADCTX_RC for an
invalid SAPI context.
SAPI return codes and errors
The following macros process return codes for all SAPI calls.
Submit API
B–11
SAPI return codes and errors
Each return code is composed from (most to least):
■
■
■
B–12
1 bit — success or failure code
16 bits — software component ID number. In the case of the SAPI, the ID
number is 11 (SAPI_RC_BASE).
12 bits — meaningful portion of return code
Macro
Purpose
_SM_IS_FAIL(rc) (rc>>30)
The macro checks whether the call
failed. In case of failure, the macro
returns TRUE or 1.
_SM_RC_PKG(rc) ((rc>>12)&0xffff)
The macro extracts and returns the
software component ID number.
_SM_RC_CODE(rc) (rc&0xfff)
The macro extracts and returns the
meaningful portion of the return code.
eTrust Audit Administrator Guide
SAPI return codes and errors
Below are return and error codes as defined in etsapi.h
Name
Construction
Meaning
SAPI_SUCCESS
0
Function returned
successfully.
SAPI_MALLOC_RC
_SM_RC_FAIL(SAPI_RC_BASE,1)
SAPI could not allocate
memory.
SAPI_NOHANDLE_RC
_SM_RC_FAIL(SAPI_RC_BASE,2)
Requested SAPI message
handle could not be found.
SAPI_BADPARAM_RC
_SM_RC_FAIL(SAPI_RC_BASE,3)
Function received a bad
parameter (most
commonly a NULL
pointer).
SAPI_NOITEM_RC
_SM_RC_FAIL(SAPI_RC_BASE,4)
Low-level internal code,
should not appear in
normal operation.
SAPI_ALRDYEXIST_RC
_SM_RC_FAIL(SAPI_RC_BASE,5)
A field by the same name
already exists in the
message.
SAPI_UNSUPPORTED_RC
_SM_RC_FAIL(SAPI_RC_BASE,6)
Unsupported SAPI type.
SAPI_NOAUTOARG_RC
_SM_RC_SUCCESS(SAPI_RC_BASE,7)
Low-level internal code,
should not appear in
normal operation.
SAPI_BADCTX_RC
_SM_RC_FAIL(SAPI_RC_BASE,8)
Function got an invalid
SAPI context for input.
SAPI_MSGLOCKED_RC
_SM_RC_FAIL(SAPI_RC_BASE,9)
Low-level internal code,
should not appear in
normal operation.
SAPI_NOTHINGTOSEND_RC _SM_RC_SUCCESS(SAPI_RC_BASE,10)
Low-level internal code,
should not appear in
normal operation.
SAPI_NOTREROUTING_RC
_SM_RC_FAIL(SAPI_RC_BASE,11)
Low-level internal code,
should not appear in
normal operation.
SAPI_REROUTINGMODE_RC _SM_RC_FAIL(SAPI_RC_BASE,12)
Low-level internal code,
should not appear in
normal operation.
Submit API
B–13
Fields for the SAPI
Fields for the SAPI
The SAPI format is completely free, except for certain mandatory fields,
generally, those affecting intrusion detection and security auditing. If the
submitting application does not provide values for such fields, the SAPI will
provide a default value.
Additional fields can be added as you choose. However, for security-related
events it is strongly recommended to map to the predefined SAPI fields. Unless
events map to the SAPI fields, they will be treated generically by the eTrust
Audit viewers.
Predefined fields are defined in the file AC_SAPITokens.h. User-defined field
names should begin with the name of the source of the event. This unique name
should be identical with the log name.
It is recommended to identify the source in all user-defined field names. For
example, the first of these two macro definitions is specific to the SAPI and the
second, to Oracle.
#define SAPI_DATE_FLD
#define ORA_AUDIT_OPTION
”Date”
“ORA_Audit_Option”
Field Properties
Each SAPI field has three properties: name, type, and value. Field types are
assigned when submitting messages. Available types are date, string and long.
The SAPI fields discussed below are organized by priority.
!
!
!
B–14
Mandatory fields must be present in every record.
Common predefined fields are important for event identification and
description.
Optional, category-specific fields provide further characterization of events.
Other fields are specific to event sources.
eTrust Audit Administrator Guide
Examples of mapping
Examples of mapping
The following are examples of mapping of SAPI fields.
Event
User
Category
Subcategory
ObjClass
ObjName
Oper
User account
was created
“Administrator”
Account
Management
Administration
USER
newuser
Create
Registry key
was deleted
“richard”
Object Access
Administration
REGKEY
“HKEY_USERS\ Delete
...“
Process was
“joan”
stopped (NT)
Object Access
Activation
PROCESS
“FINDFAST.
EXE”
Windows NT “SYSTEM”
was shut
down
Security
Systems
A file was
opened for
read
Object Access
“joan”
OS
Usage
FILE
Stop
Stop
“c:\winnt\
system.ini”
Read
Mandatory fields for event identification
The SAPI requires that certain fields be present in each message you submit.
These fields contain data on the time, place, and status of events. For some fields,
values are strictly predefined.
Mandatory field name
Available values for event
identification (mandatory fields)
SAPI_LOCATION_FLD “Location”
Name of the host where the event was
originated. Name format is UNIX
qualified name or UNC (if DNS is not
available).
Examples:
host.mydomain.com (UNIX qualified
name)
\\mydomain\host (UNC).
Default value: name of machine where
submitter is resident
Submit API
B–15
Examples of mapping
Mandatory field name
Available values for event
identification (mandatory fields)
SAPI_LOGNAME_FLD “Log”
Logical log name that uniquely
identifies the native auditing type
(logical name of the source of audit
information).
Examples:
NT-System, NT-Application
UNIX for syslog and sulog files, Oracle
for Oracle logs and so on.
Default value: the submitter must
supply the contents for this field
SAPI_SOURCE_FLD “Src”
Name of the software component that
issued the event. Note that the audit
mechanism may serve more than one
process or application. When a native
auditing environment has more than
one instance on the same machine, this
field will contain the instance
identification.
Examples:
Windows NT — Security, Disk,
NETLOGON
UNIX — telnetd, ftpd
Default value: the submitter must
supply the contents for this field
SAPI_DATE_FLD “Date”
When the event was originated. Date
contains both date and time in standard
ISO format (text format that includes
date, time and time zone).
Examples:
20010201T080001-0500 means Feb. 1,
2001at 8:00:01 EST
20010202T080001+0000 means Feb. 2,
2001 at 8:00:01 GMT
Default value: Date and time at
machine where the event is submitted
B–16
eTrust Audit Administrator Guide
Examples of mapping
Mandatory field name
Available values for event
identification (mandatory fields)
SAPI_STATUS_FLD “Status”
Status, which the event describes.
Values for Status are strictly
predefined:
“S” SAPI_STATUS_SUCCESS — event
for a successful operation
“F” SAPI_STATUS_FAILURE —
event for a failure operation
“D” SAPI_STATUS_DENIED — event
for a failure operation where the reason
is insufficient privileges.
We recommend that you use “F”
SAPI_STATUS_FAILURE even for
failure operations that is caused by
insufficient privileges.
Note: all source specific statues should
be converted into one of SAPI statuses.
To keep the original value put it into
specific field
<SRC>_Status, where <SRC> is an
unique identifies the source of audit
information.
Default value: “S”
Common predefined fields for event identification
The following fields are used by most events. They are not mandatory, but they
are strongly recommended for each SAPI message.
Field name
Field value
SAPI_USER_FLD “User”
The name of the user (or principal as
some systems define) who performed
the audited operation.
Examples:
Windows NT — Administrator,
my_domain\john
UNIX — “root,” “john”
Default value: none
Submit API
B–17
Examples of mapping
Field name
Field value
SAPI_USERID_FLD “UID”
Native user ID.
Examples:
Windows NT — S-1-5-21-17935294201590284213-401-284377-1208
UNIX — 0 (root user)
Optional predefined fields for event identification
Certain fields providing event identification are optional.
Field name
Field value
SAPI_LOCATIONIP_FLD “LocationIP” IP address where the event was
originated.
Example:
141.202.248.116
SAPI_LOGFILENAME_FLD “LogF”
Physical file name (full path name), if
available, in cases where the audit does
not reside in a fixed file.
Example:
UNIX — /usr/logs/trace1.log
SAPI_RECORDERVER_FLD “RecVer”
Version of the submitter for the native
auditing environment.
Common predefined fields for event description
The following fields provide general information about events. They are not
mandatory, but it is recommended to set their values (if available) for each SAPI
message.
Reserved fields specific to predefined security event categories are listed later in
this chapter.
Field name
B–18
eTrust Audit Administrator Guide
Available values for event
description
Examples of mapping
Field name
Available values for event
description
SAPI_CATEGORY_FLD “Category”
Security-related events fall into
predefined categories. If the event
belongs to one of the categories, it is
highly recommended to set the field’s
value. The field can be left empty, or it
can have a user-defined category if the
predefined values are not matched.
Examples:
“System Access”
SAPI_CATEGORY_SYSACC
for any logon or logoff operation
“Account Management”
SAPI_CATEGORY_ACCOUNT
for user account definition
SAPI_SUBCAT_FLD “Subcat”
Enables subdivision of events within a
category. You can fill this field by using
either a pre-defined value or any other
string value.
SAPI_SEVERITY_FLD “Severity”
Logical severity of the event set by
eTrust Audit policies (not by
application severity).
Values for Severity are strictly
predefined.
“0” SAPI_SEVERITY_INFO
“1” SAPI_SEVERITY_WARNING
“2” SAPI_SEVERITY_CRITICAL
“3” SAPI_SEVERITY_FATAL
SAPI_OPERATION_FLD “Oper”
The operation performed on an object.
Values are chosen from a list of
predefined values. In cases where the
predefined values are not suitable,
native auditing values may be used.
Examples:
“Write” SAPI_OPER_WRITE — edited
a file or registry key
“Start” SAPI_OPER_START — started
a service
Submit API
B–19
Examples of mapping
Field name
Available values for event
description
SAPI_OBJCLASS_FLD “ObjClass”
The class of the object of the operation.
Values are chosen from a list of
predefined values. In cases where the
predefined values are not suitable,
native auditing values may be used.
Examples:
“FILE,” “REGKEY”
SAPI_OBJNAME_FLD “ObjName”
Name of the object on which the
operation is performed.
Examples:
“C:\WINNT\system.ini” — a file name
“notepad.exe” — a process name
SAPI_OBJCLASS2_FLD “SObjClass”
Class of the second object that
participated in the event (if it exists).
Example:
“Group” — in case of joining a user to a
group
SAPI_OBJNAME2_FLD “SObjName”
Name of the second object that
participated in the event (if it exists).
Example:
“Administrators” — as the name of the
group a user was added to
SAPI_NATIVEOID_FLD “OID”
Native object ID (handle) from auditing
or operating system.
Example:
Windows NT — “24”
SAPI_PID_FLD “PID”
Process ID of the process that
performed the operation, if available.
Example:
WINDOWS NT — “2309196368”
B–20
eTrust Audit Administrator Guide
Examples of mapping
Field name
Available values for event
description
SAPI_NATIVEID_FLD “NID”
Native ID of the event, in native
auditing environments that enumerate
events.
Example:
Windows NT — “562” for closed
handle event, “592” for process creation
SAPI_INFO_FLD “Info”
Free-text event information.
Examples:
Windows NT —
A process has exited.
Process ID: 215487040
User Name:
user_john
Domain:
My_Domain
Logon ID:
(0x0,0x3ED6)
UNIX —
printer/tcp: “Print services stopped”
Mapping events to predefined categories
For each security event category, records can be built from a certain set of SAPI
fields, in addition to the mandatory identifying fields.
Predefined security-related categories are:
■
System Access
■
Account Management
■
Object Access
■
Policy Management
■
Security Systems Status
■
Network
■
Detailed Tracking
Other events (generally, start and stop notifications for applications) fall into the
one of the following categories:
■
System \ Application
Submit API
B–21
Examples of mapping
■
Administration
■
General
System Access
System access events include logon, logoff, and change of user identity
(impersonation).
Field name
Available values for System Access
SAPI_CATEGORY_FLD “Category”
“System Access”
SAPI_CATEGORY_SYSACC
SAPI_SOURCE_FLD “Src”
The software component that generated
the message.
Examples:
Windows NT — “Security”
UNIX — “login,” “telnetd,”
in.telnetd,” rshd,” “in.rshd,”
“Xsession” (XDMCP), “ftpd,” “in.ftpd,”
“rlogind,” “in.rlogind,” “fingerd,”
ffingerd”
SAPI_OPERATION_FLD “Oper”
"Logon" SAPI_OPER_LOGON
"Logoff" SAPI_OPER_LOGOFF
SAPI_USER_FLD “User”
Name of the logged-on user
SAPI_SURROGATEUSER NAME_FLD Name of the new user when logging on
from another user. For example, the
“SurrogateUser”
UNIX command su root generates a
(optional)
SurrogateUser value of “root.”
SAPI_INFO_FLD “Info”
B–22
eTrust Audit Administrator Guide
May contain reason for failed logon
Examples of mapping
Field name
Available values for System Access
SAPI_LOGONTYPE_FLD
For logon operations, the type of logon.
Values for LogonType are strictly
predefined.
“LogonType”
Examples:
“Interactive”
SAPI_LOGONTYPE_INTERACTIVE —
local user logon
“Server” SAPI_LOGONTYPE_SERVER
— logon to server, domain or shared
drive
SAPI_TERMINAL_FLD “Term”
(optional)
Terminal name or ID from which the
operation is initiated.
Example:
“pts/7”
SAPI_REMOTEHOST_FLD “RemHost” Name or address of the remote host for
operations that are performed remotely
(optional)
(name should follow Location field
format)
Account Management
Account management events include the creation, changing, and deletion of
users, groups, profiles and roles, as well as the granting of permissions.
For security purposes, special care should be taken to audit the addition of users
to the administrators group, and the addition of significant authorizations.
The management of permissions on the system level is mapped to “Account
Management,” and the management of auditing is mapped to “Policy
Management.” For individual objects, both permissions and auditing setups are
mapped to “Object Access.”
Field name
Available values for Account
Management
SAPI_CATEGORY_FLD “Category”
“Account Management”
SAPI_CATEGORY_ACCOUNT
Submit API
B–23
Examples of mapping
Field name
Available values for Account
Management
SAPI_SUBCAT_FLD “Subcat”
“Permission”
SAPI_SUBCAT_PERMISSION
“Audit” SAPI_SUBCAT_AUDIT
“Password”
SAPI_SUBCAT_PASSWORD
SAPI_OPERATION_FLD “Oper”
Some possible values are predefined.
For example:
“Create” SAPI_OPER_CREATE
“Delete” SAPI_OPER_DELETE
“ChangeProperty”
SAPI_OPER_CHANGEPROPERTY
“Lock” SAPI_OPER_LOCK
“Unlock SAPI_OPER_UNLOCK
SAPI_OBJCLASS_FLD “ObjClass”
“USER” SAPI_OBJCLASS_USER
“GROUP” SAPI_OBJCLASS_GROUP
SAPI_OBJNAME_FLD “ObjName”
Name of user or group.
SAPI_OBJCLASS2_FLD “SObjClass”
Class of the secondary object.
Examples:
When adding a user to a group,
“USER” is the primary object and
“GROUP” is the secondary object.
When changing permissions, the
secondary object is “PRIVILEGE”
SAPI_OBJCLASS_PRIVILEGE.
SAPI_OBJNAME2_FLD “SObjName”
Name of the secondary object.
SAPI_INFO_FLD “Info”
Free-text description of the operation.
Object Access
Object access events include any access to resources such as files and the registry.
Usually these accesses are audited only for critical objects.
For individual objects, both permissions and auditing setups are mapped to
“Object Access.” The management of permissions on the system level is mapped
to “Account Management.”
B–24
eTrust Audit Administrator Guide
Examples of mapping
Field name
Available values for Object Access
SAPI_CATEGORY_FLD “Category”
“Object Access”
SAPI_CATEGORY_OBJACC
SAPI_SUBCAT_FLD “Subcat”
“Password”
SAPI_SUBCAT_PASSWORD
“Usage” SAPI_SUBCAT_USAGE
“Audit” SAPI_SUBCAT_AUDIT
“Activation”
SAPI_SUBCAT_ACTIVATION
“Permission”
SAPI_SUBCAT_PERMISSION
SAPI_OBJCLASS_FLD “ObjClass”
Name of the object on which the
operation is performed. In cases where
the predefined values are not suitable,
native auditing values may be used.
Examples:
“REGKEY” — for registry key
“FILE” – for file or folder
SAPI_OBJNAME_FLD “ObjName”
Name of the accessed object.
Submit API
B–25
Examples of mapping
Field name
Available values for Object Access
SAPI_OPERATION_FLD “Oper”
For example:
“Execute” SAPI_OPER_EXECUTE
“Start” SAPI_OPER_START_RL
"Stop" SAPI_OPER_STOP
"Kill" SAPI_OPER_KILL
“Create” SAPI_OPER_CREATE
“Delete” SAPI_OPER_DELETE
“ChangeProperty”
SAPI_OPER_CHANGEPROPERTY
“Rename” SAPI_OPER_RENAME
“TakeOwnership”
SAPI_OPER_TAKEOWNERSHIP
“ChangePermission”
SAPI_OPER_CHANGEPERMISSION
“Lock” SAPI_OPER_LOCK
“Unlock” SAPI_OPER_UNLOCK
“Open” SAPI_OPER_OPEN
“Read” SAPI_OPER_READ_RL
"Write" SAPI_OPER_WRITE
"Edit" SAPI_OPER_EDIT
SAPI_NATIVEOID_FLD (optional)
Object ID used by the native
environment
SAPI_PID_FLD (optional)
ID of the process that accesses the
object
SAPI_COMMAND_FLD “Command”
Original command that caused the
event (in case of a command line
interface usage).
(optional)
Example:
eTrust Access Control — Definition of
new resource “new user(john)”
SAPI_INFO_FLD “Info”
B–26
eTrust Audit Administrator Guide
Free-text event information
Examples of mapping
Policy Management
Policy management events include changes in audit policy, changes in password
policy, and other events on the system level. This category usually includes very
few events.
For individual objects, permissions and auditing setups are mapped to “Object
Access.”
Field name
Available values for Policy
Management
SAPI_CATEGORY_FLD “Category”
“Policy Management”
SAPI_CATEGORY_POLICY
SAPI_SUBCAT_FLD “Subcat”
“Audit” SAPI_SUBCAT_AUDIT
“Activation”
SAPI_SUBCAT_ACTIVATION
“Permission”
SAPI_SUBCAT_PERMISSION
SAPI_OPERATION_FLD “Oper”
For example:
“Create” SAPI_OPER_CREATE
“Delete” SAPI_OPER_DELETE
SAPI_OBJCLASS_FLD “ObjClass”
“POLICY” SAPI_OBJCLASS_POLICY
Oracle — map “Audit_Option” to this
field
SAPI_OBJNAME_FLD “ObjName”
Object name
SAPI_INFO_FLD “Info”
Free-text event information
Security Systems Status
Security system status events include events related to the change in the status of
security systems. For example, the stopping and starting of operating systems
and the clearing of audit logs.
Field name
Available values for Security
Systems
Submit API
B–27
Examples of mapping
Field name
Available values for Security
Systems
SAPI_CATEGORY_FLD “Category”
“Security Systems”
SAPI_CATEGORY_SECURITYSYS
SAPI_OPERATION_FLD “Oper”
For example:
"Restart" SAPI_OPER_RESTART
“Startup” SAPI_OPER_STARTUP
"Shutdown" SAPI_OPER_SHUTDOWN
“Clear” SAPI_OPER_CLEAR
SAPI_OBJCLASS_FLD “ObjClass”
For example:
“Service” (or daemon)
SAPI_OBJCLASS_SERVICE
“Log” SAPI_OBJCLASS_LOG
“Process” SAPI_OBJCLASS_PROCESS
“OS” SAPI_OBJCLASS_OS
SAPI_OBJNAME_FLD “ObjName”
Name of started or stopped program
SAPI_INFO_FLD “Info”
Free-text event information
Network
Network events include:
■
Incoming and outgoing communication events from eTrust Access Control
■
eTrust Intrusion Detection (former SessionWall)
■
Events from other network products to be integrated with eTrust Audit
Network events should map to identification fields.
Field name
Available values for Network
SAPI_CATEGORY_FLD “Category”
“Network”
SAPI_CATEGORY_NETWORK
SAPI_OPERATION_FLD “Oper”
“Connect” SAPI_OPER_CONNECT
"Disconnect
"SAPI_OPER_DISCONNECT
B–28
eTrust Audit Administrator Guide
Examples of mapping
Field name
Available values for Network
SAPI_OBJCLASS_FLD “ObjClass”
For example:
“PORT” SAPI_OBJCLASS_PORT
PORT
"HOST" SAPI_OBJCLASS_HOST
"TERMINAL"
SAPI_OBJCLASS_TERMINAL
"DOMAIN"
SAPI_OBJCLASS_DOMAIN
"PROCESS"
SAPI_OBJCLASS_PROCESS
“PRINTER”
API_OBJCLASS_PRINTER_RL
SAPI_OBJNAME_FLD “ObjName”
Object name, name of host, terminal,
domain and so on
SAPI_INFO_FLD “Info”
Free-text event information
The following additional fields contain network objects.
Field name
Available values for network objects
SAPI_REMOTEIP_FLD “RemIP”
Remote IP address
SAPI_AFTYPE_FLD “AddressFamily”
Address family
Submit API
B–29
Examples of mapping
Field name
Available values for network objects
SAPI_NETSERVICENAME_FLD
Service or daemon
“NetServiceName”
Example:
“FTP”
SAPI_PORT_FLD “Port”
Local port number
Example: “7890”
SAPI_REMOTEPORT_FLD
Remote port number.
“RemotePort”
Example: “8765”
SAPI_PROTOCOL_FLD
Protocol
“Protocol”
Examples: “TCP,” “UDP”
Detailed Tracking
Both Windows NT and eTrust Access Control offer detailed tracking — in
Windows NT, for processes (by PID). In eTrust Access Control, tracking can be
activated for other fields as well.
Field name
Available values for Detailed
Tracking
SAPI_CATEGORY_FLD “Category”
“Detailed Tracking”
SAPI_CATEGORY_TRACKING
SAPI_OPERATION_FLD “Oper”
For example:
“Start” SAPI_OPER_START
“Stop” SAPI_OPER_STOP
B–30
SAPI_OBJCLASS_FLD “ObjClass”
Example: “PROCESS”
SAPI_OBJCLASS_PROCESS
SAPI_PID_FLD “PID”
Process ID
SAPI_OBJNAME_FLD “ObjName”
Object name, name of started or
stopped program
SAPI_INFO_FLD “Info”
Event description
SAPI_USER_FLD “User”
User name
SAPI_USERID_FLD “UID”
User ID
eTrust Audit Administrator Guide
Examples of mapping
Field name
Available values for Detailed
Tracking
SAPI_SURROGATEUSER NAME_FLD Name of new identity of a user who
changed his identity via set user etc.
“SurrogateUser”
(available on systems that retain the
original identity).
Example:
UNIX — for set user operation,
UserName may be “john” and
SurrogateUser may be “root”
SAPI_SURROGATEUSERID _FLD
“SurrogateUId”
SAPI_EUSERNAME_FLD
“EffectiveUser”
SAPI_EUSERID_FLD
“EffectiveUserId”
The ID of the SurrogateUser, as
explained above.
Effective user name. The effective user
is the user whose rights are in effect for
the described event.
The ID of the effective user, as
explained above.
System/Application, Administration and General Events
These events include start and stop notifications for applications not directly
involved in security auditing (that is, not mapped to another category). Fields
will be application-specific. Identification fields are mandatory.
Field name
Available values for System and
Application
SAPI_CATEGORY_FLD “Category”
“System and Application”
SAPI_CATEGORY_STATUS
"Administration"
SAPI_CATEGORY_ADMIN
"General"
SAPI_CATEGORY_GENERAL
SAPI_INFO_FLD “Info”
Free-text event information
Fields internal to eTrust Audit
Internal fields may be filled for each event by eTrust Audit. These fields may be
present in each record, but need not be filled by third-party submitters.
Submit API
B–31
Examples of mapping
Internal field name
Description
SAPI_ROUTINGINFO_FLD
“RoutInfo”
For debug purposes only — a
concatenation of the names of all the
routers that have handled the event.
SAPI_RULENAME_FLD “Rule”
For debug purposes only — name of
the eTrust Audit policy that originated
the event.
Reserved Keywords
The following words may not be used as field names, since they have specific
meanings in the filter language.
ADD
AM
AT
CASE
CI
CS
DATE_YACC
DAY
DECR
DECREMENT
DEFINE
DELETE
DELETE_YACC
DIFFERENT
DY
EQUAL
EXISTS
FATAL_ERROR
GREATER
INCR
INCREMENT
INSENSITIVE
INTEGER
LESS
MATCHES
MONTH
NAME
NEWEVENT
NOT
NUMBER
OF
OR
PART
PM
REL_OP
SCAN_ERROR
SENSITIVE
SET
STRING
STRING_CONST
B–32
eTrust Audit Administrator Guide
Examples of mapping
SUB
SUBTRACT
THAN
TIME
TIMESTAMP
TO
VARIABLE
YR
The names of months (JAN-DEC) are also reserved.
Submit API
B–33
Index
By Fields, 5-2
By File, 5-3
Filter Bar, 5-2
Unfiltering, 5-3
A
accountability, 1-1
alerts, 1-1
architecture, 1-1
Audit Viewer, 3-7
C
client software, 3-1
Control Panel, 3-7
D
Data Tools, 2-1
E
eTrust Access Control, 2-1
Working with the recorder, 6-1, 6-2
F
Filtering the Records, 5-2
By Event, 5-2
H
hierarchy, 3-1
M
mail protocol, 2-2
manager components, 2-1, 4-1
N
native auditing, 1-1
R
RegEdt32
RegEdit, 2-2
requirements, 2-1
S
SAPI
Index–1
error codes, B-10
return codes, B-10
type definitions, B-5
SAPI functions
SAPI_AddItem, B-5, B-6, B-8, B-9
SAPI_SubmitMsg, B-7
scalability, 1-1
Security Monitor, 2-1, 3-7
Index–2
eTrust Audit Administrator Guide
SMTP, 2-2
Sorting event database records, 5-2
Alphanumerically, 5-2
BY record number, 5-2
system considerations, 2-1