Chapter 35

Agent Configuration

In this chapter you will learn about: HideIn this chapter you will learn about: Show
  1. Agent Configuration
  2. Security - Protect Agent Configuration Settings
  3. Load a Template
  4. System
    1. To Report System Name as FQDN
  5. License Server
  6. Managers
  7. Event Filters
    1. Filter Events with Exception
    2. Filter Events with Advanced Filters
    3. Enable SID Translation
  8. System Monitor
    1. To configure system performance threshold
    2. USB and Other Device Changes
  9. Add USB Device in the Exception List
  10. Monitor Processes
    1. To monitor application install/uninstall
    2. Filter Processes that need not be monitored
    3. Filter Processes that need to be monitored
  11. Monitor Services
    1. Configure Service Restart List
    2. Filter Services
  12. Logfile Monitor
    1. View File Details
    2. Delete Log File Monitoring Settings
    3. Search Strings
    4. Monitor Check Point Logs
    5. Monitor VMware Logs
    6. Specifying the System Name & Event Source for LFM logs
    7. Extract Device ID from syslog devices
  13. Monitor Network Connections
    1. To monitor network connection
    2. Exclude Network Connections
    3. Include Network Connections to monitor
    4. Suspicious Connections
    5. Monitor Suspicious Connections
    6. Add Programs to the Trusted List
    7. Add Firewall Exceptions to the Trusted List
  14. Monitor Performance
    1. To monitor configured processes
    2. Remove Processes from ‘List of Filtered Processes’
  15. Maintain Log Backup
    1. To backup event logs automatically
  16. Transfer Log Files
    1. To transfer Windows and Application Log Files
  17. Syslog FTP Server
    1. To transfer Windows events as Syslog messages
  18. Save Current Configuration

Agent Configuration

All configurations for agent(s) are set by default during installation. If you are interested in changing these default configuration settings, then it can be done in EventTracker Agent Configuration.

Security - Protect Agent Configuration Settings

This option enables you to protect the EventTracker agent configuration settings. You can allow local system or specified remote system(s) to modify the agent configurations. Once the agent configuration is protected, then the agent settings will be modified only by local system and/or specified IP addresses.

 

1        Login to EventTracker Control Panel. Double click EventTracker Agent Configuration.

EventTracker Agent Configuration window displays.

 

2        Select the File menu, and then select Security.

EventTracker displays Agent Configuration Protection pane.

 

 

 

Field

Description

Enable protection for agent configuration

Select this checkbox to enable other options in this dialog box.

Settings can be modified on the following system(s)

Local System:

Select this checkbox to protect the current configuration settings only for the local system. Other users cannot modify your settings from their machines.

Enter IP Address:

Select this checkbox to protect the current configuration settings for other machines.

IP Address:

Type the IP addresses in this dialog box.

You can configure the current configuration settings up to five IP addresses.

The IP addresses specified in this field can modify the agent configuration settings.

Remedial Action

Select the checkbox to enable the remedial action.

 

 

1        Select the Enable protection for Agent configuration checkbox.

2        Select/enter appropriate data in relevant fields, and then select the Save button.

Load a Template

For loading an Agent Template,

 

·         Select File from the menu and click on the Load a Template option from the dropdown list.

 

 

·         Browse the template to be selected and click the Open button (Select the etaconfig_Servers.ini or etaconfig_Workstations.ini from the RemoteInstaller folder).

 

A pop-up message displays.

 

 

·         Depending on the Operating system, select Yes/No, to get the configuration according to the selected template.

System

·         Click the File option and select Systems from the dropdown list.

 

The System window gets displayed.

To Report System Name as FQDN

For more Information on this section, Refer: Agent syslog collector to resolve sender IP Address.

License Server

1        To enter/update license server configuration details, login to EventTracker Control Panel. Double click EventTracker Agent Configuration.

EventTracker Agent Configuration window displays.

 

 

2        Select the File menu, and then select License Server.

By default the license server details are already updated.

3        Update/Enter Server (Name/IP): and Port: number details, if required.

4        Select the OK button.

Managers

The amount of free space to be left on storage device can be entered in terms of percentage (%) or in MB.

1.      To update settings in EventTracker Manager, open EventTracker Control Panel. Double-click EventTracker Agent Configuration.

Managers tab displays by default.

 

 

 

2.      Click appropriate tabs and configure the agent as per the requirement.

3.      To configure the amount of free space on storage devices, click the Add button.

Add Destination window displays.

4.      Select Guaranteed Delivery Mode (TCP) option.

 

 

 

5.      Select Minimum Amount of Free space to be left on Storage Device (%) or Minimum Amount of Free space to be left on Storage Device (MB) option. 

 

Default value for (%) is 20 and default value for MB is 2048 MB.

Event Filters

This option enables you to filter events being sent to the Manager. Select appropriate checkboxes under Basic Logs, Special Logs, and Event Types. Event Logs is a dynamic list of Channels. Whenever a new Channel is provided for subscription, EventTracker updates this list automatically.

 

1        To filter events, double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System hyperlink. Select Event Filters tab.

 

EventTracker displays the Event Filters tab.

 

 

 

 

Field

Description

Basic Logs

Select appropriate checkboxes to filter the events being sent to the Manager.

Special Logs

Select appropriate checkboxes to filter the events being sent to the Manager.

Event Types

Select appropriate checkboxes to filter the events being sent to the Manager.

Example: Event Types -> Warning

The filter is now set and all events with Event Type Warning will be filtered out and will not be sent to EventTracker Manager.

Enable SID Translation

Select this checkbox to enable SID translation. For more information on SID translation, refer SID-translate.pdf in the EventTracker installation folder.

Enable High Performance mode

Select this checkbox to switch the Agent performance modes.

Filter Exception

Click this button to set the filter exceptions for specific events that you want to monitor.

Advanced Filters

Click this button to set the filters for the specific events that you do not want to monitor.

 

By default, EventTracker filters Information and Audit Success events.

3        Set the available filter options appropriately, and then click the Save button.

Filter Events with Exception

This option helps you to filter events with exception. For example, had you configured agent to filter Information events, all events of ‘Information’ event type will not be forwarded to the Manager. However, if you wish to send specific events of Information event type, you can exempt those events from filtering.

 

1        To filter events with exception, double-click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System hyperlink. Select Event Filters tab.

EventTracker displays the Event Filters tab.

3        Click Filter Exception.

EventTracker displays the Filter Exception pop-up window with a list of events exempted from filtering.

 

1        To modify event details, select a row and then click Edit.

2        To remove event details, select a row and then click Delete.

3        To find event details, select the Find button.

4        To add filter exceptions, click New.

EventTracker displays the Filter Exception pop-up window to select/enter event details.

 

 

5        Enter appropriate data in the relevant fields.

For example - Log Type: Application, Event Type: Information, Match in Source: Web Service

 

 

 

6        Click OK.

EventTracker displays the Filter Exception pop-up window with the newly added filter exception.

 

 

7        Click Close, and then click Save.

 

For negating the results of User and Source in the Filter Exception list:

 

a)      In EventTracker Agent Configuration window, under Event Filters tab, click the Filter Exception button.

b)      Click the New button.

EventTracker displays the New Event Detail window.

c)      Enter appropriate data in the relevant fields.

For example - Log Type: Application, Event Type: Information, Match in User: [$NOT$]user, Match in Source: [$NOT$]EventTracker    

       

 

 

 

 

d)      Click the OK button.

 

EventTracker displays the Filter Exception pop-up window with the newly added User and Source filter exception.

 

 

 

 

e)      Click Close and then click the Save button in the Agent Configuration window.

 

 

2 NOTE

Multiple strings separated with && (And) and II (OR) operators can now be used for both “Match in User” and Match in Source”.

Filter Events with Advanced Filters

Filters and Filter Exception go hand in hand, which means you can filter all the events but with exceptions. Whereas Advanced Filters help, you filter out a specific event allowing other events of that type.

1        To filter events with Advanced Filters, double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System hyperlink.

3        Click the Event Filters tab.

EventTracker displays the Event Filters tab.

 

4        Click Advanced Filters.

EventTracker displays the Advanced Filters pop-up window with a list of advanced filters.

 

5        Click New.

EventTracker displays the Advanced Filters pop-up window to select/enter event details.

6        Enter appropriate data in the relevant fields and then click OK.

EventTracker displays the Advanced Filters pop-up window with the newly added filter.

7        Click Close.

8        Click the Find button to find event details by entering appropriate data

9        Click the OK button and then click the Close button in the Advanced Filters window.

 

 

2 NOTE

 

The filter is set and specific events matching the filter criteria will not be forwarded to EventTracker Manager. All Error Events will be forwarded to the Manager except the events matching the filtered criteria set.

 

 

10    Click Save.

Enable SID Translation

This option helps you enable SID translation.

1        Double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System hyperlink. Select Event Filters tab.

EventTracker displays the Event Filters tab.

3        Select the Enable SID Translation option.

EventTracker displays the Caution message box.

 

 

SID Translation Caution.png

 

4        Click Yes and then click Save.

 

 

2 NOTE

 

This feature works in all versions of EventTracker.  For more information please go through SID-translate.pdf found in the EventTracker installation folder typically, ...\Program Files\Prism Microsystems\EventTracker.

 

System Monitor

Monitoring CPU, memory performance and disk usage of a system enables the administrator to monitor the general health of a system. You can configure general health thresholds for CPU and Memory Usage. All thresholds are measured in percent terms.

When the configured threshold is crossed, an event will be generated and reported to the manager. An event will also be generated when the thresholds are back to below configured levels.

Care is taken not to report spikes in CPU or memory usage by a process. Therefore, when an event is seen that a system is crossing thresholds, you can be sure that this is for a long enough period and need to investigate.

The default threshold limits are 90% for all variables. A configuration of 0% would disable the monitoring for that specific variable.

USB and other Device Changes option helps to monitor insertion or removal of USB and other media. Also helps to track file transactions that occur in the inserted media.

To configure system performance threshold

1        Double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System hyperlink.

3        Click the System Monitor tab.

EventTracker displays the System Monitor tab.

 

 

 

 

Field

 Description

Performance

CPU Performance (%)

Select a threshold limit to monitor CPU performance from the drop-down list.

Memory Usage (%)

Select a threshold limit to monitor memory usage from the drop-down list.

Disk Space Usage (%)

Select a threshold limit to monitor disk space usage from the drop-down list.

Handle

Select a threshold limit to monitor handle usage of the system.

Thread

Select a threshold limit to monitor thread usage of the system.

USB and other Device Changes

Report insert/remove

Select this checkbox to track insertion or removal of USB or other devices. This checkbox is selected by default.

Record activity

Select this checkbox to monitor file transactions occur in the inserted devices.

Disable USB Devices

Select this checkbox to disable USB devices. The selection will enable the ‘USB Exception List’ button.

USB Exception List

Click this button to add the USB device ID or serial number in the exception list.  The listed USB devices will not be disabled when inserted.

 

To change the disk space configuration values,

1.      Click the Advanced button.

Advanced Configuration window displays.

 

 

2        Under the Disk Space, enter the Drive: name

3        Select/Enter the required value in Used more than % drop-down or Free less than (MB).

4        To edit or delete the disk space configuration, click the Edit or Delete button accordingly.

5     Select Save & Close once necessary changes have been done.

6        Select the required Performance, USB and other Device Changes options.

7        ClickSave & Close.

 

To configure handles usage,

1        In the Advanced Configuration window, click onHandle in the menu bar.

2        Select the count from the dropdown box.

Ex: For “Monitor System handles usage if more than %”, 90 is selected (Default).

3.      Click Save & Close.

 

 

 

To configure Thread usage,

1        Select the count from the dropdown box.

Ex: For “Monitor System threads usage if more than %”, 90 is selected (Default).

2.      Click Save & Close.

 

 

USB and Other Device Changes

       For Blocking all types of USB devices, go to the USB and other device changes pane.

1.      Select the Disable USB Devices checkbox.

2.      Sub-option gets enabled, namely, Mass Storage Device and All Device.

3.      By enabling the Mass storage Device option, the user can block USB Devices like Pen Drive, Hard Disk.

4.      When the All Devices option is enabled, it will block or disable all the devices like mouse, pen drive, external CD-DVD, external hard disk, USB ear phone/head phone, tablet and mobile devices connected either USB storage device, or MTP or PTP type.

Add USB Device in the Exception List

While disabling USB Devices on a particular computer, you can also exempt and enable USB devices from monitoring.

1        To configure USB Exception List, select the Disable USB Devices checkbox.

2        Click USB Exception List button.

EventTracker displays the ‘USB Exception List’ pop-up window.

 

 

USB Exception List.png

 

 

  3        Type the USB serial number in decimal format or hexadecimal format in the Enter USB Serial Number field, and then select the Format option accordingly.

 

OR

 

Type USB device ID in the Enter USB Device ID field.

4        Click the Add button.

EventTracker adds the newly entered serial number or device Id in the exception list.

5        Click Save & Close button.

6        In ‘Windows Agent Configuration’ page, click the Save button to save the configuration changes.

 

2 NOTE

Please refer How to – Monitor Removable Media Devices document for more details on creating exception list and its functionality.

Monitor Processes

This option enables you to monitor installation and un-installation of applications, and monitor application usage. EventTracker logs a custom information event whenever a monitored application is opened or closed. These events are received at the Console and helps in tacking the application usage.

EventTracker monitors all processes specified in ‘Include List’ and ignores processes specified in ‘Exclude List’.

The option Enable process monitoring will help in monitoring the process created and terminated. The user can also filter out the processes that need not be monitored.DLL and image files can also be monitored that are load by a process.

To monitor application install/uninstall

1        Double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System drop-down, and then select the Monitor Processes tab.

EventTracker displays the ‘Monitor Processes’ tab.

 

 

Field

Description

Monitor App Install/ Uninstall

Select this checkbox to monitor installation and un-installation of applications.

Enable Process Monitoring

Select this checkbox to monitor processes.

This selection enables the Exclude List and Include List buttons.

Exclude List

Enables you to set the processes that you do not wish to monitor.

Include List

Enables you to set the processes that you wish to monitor.

 

 

2 NOTE

Enable Process Monitoring option is a licensed feature and will be available only if the license is purchased.

 

4        Select appropriately the Monitor App Install / Uninstall and Enable Process Monitoring options.

 

Under the Option “Enable Process Monitoring”

·         The option Process Creation/Process Termination helps in monitoring the process launched/closed.

·         The option Enable DLL/Image Monitoring helps in monitoring the DLL’s and the image file loaded by the process.

·         The option “Report occurrence only” will be checked by default. If you wish to uncheck it, the following message will be displayed.

 

 

 

 

5        Select the Save button.

Filter Processes that need not be monitored

1        To filter applications that need not be monitored, double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System drop down.

3        Select Monitor Processes tab.

EventTracker displays the ‘Monitor Processes’ tab.

4        Select the Enable Process Monitoring checkbox, if not selected.

5        Select App Exceptions.

EventTracker displays ‘Process Exclude List’ dialog box.

 

 

 

6        Click the Add button.

EventTracker opens a textbox to type the file name of the process.

 

 

 

 

7        Type the application name with .exe extension that you do not want to monitor.

For Example: AppFile.exe

 

2 NOTE

The process name should be in .exe format.

 

8        Click OK and then click Save.

Filter Processes that need to be monitored

1        To filter applications that need to be monitored, double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System drop down. Select Monitor Processes tab.

EventTracker displays the ‘Monitor Processes’ tab.

3        Select the Enable Process Monitoring checkbox, if not selected

4        Click Include List.

EventTracker displays ‘Process Include List’ dialog box.

 

 

 

5        Click Add.

EventTracker opens a textbox to type the file name of the process.

 

 

 

6        Type the application name with .exe extension that you want to monitor.

7        Click OK and then click Save.

Monitor Services

By default, EventTracker monitors all Windows Services for stop/start. If a service stops, an event will be sent immediately to the Manager. An event will also be sent if a stopped service restarts.

You can also choose to automatically restart services that have been stopped.

There may be certain services that you may not want to monitor. You can filter out such services from the monitoring list.

The service name that needs to be configured can be either the name as displayed in Control Panel -> Services or the display name. While configuring the service name, please ensure that it is spelt correctly.

Configure Service Restart List

This option helps to add services to the restart list.

1        Double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System hyperlink. Select the Services tab.

EventTracker displays the Services tab.

 

 

 

 

Field

Description

Services Monitoring

This checkbox is selected by default to monitor all Windows services. ‘Service Restart List’ and ‘Service Monitor Exceptions’ will be enabled only if ‘Service Monitoring’ checkbox is selected.

Service Restart List

 

 

EventTracker Alerter

EventTracker Elasticsearch Indexer

EventTracker EventVault

TrapTracker

EventTracker Indexer

EventTracker Reporter

EventTracker Receiver

WcwService

EventTracker Remoting

EventTracker Scheduler

By default following services are monitored:

 

Click Add to add selected services to restart when they stop.

Click the Remove button to remove the services from the ‘Services restart list’.

Service Monitor Exceptions

Click Add to add services that you do not want to monitor.

Click Remove to remove the services from the list.

 

 

 

3        Click Add under Service Restart List.

EventTracker displays the Enter Service Name field to type the name of the service.

 

Add service name.png

 

4        Type the name of the service, and then click OK.

5        Click Save.

Filter Services

1        Double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System hyperlink, and then select the Services tab.

3        Click the Add button under Service Monitor Exceptions.

4        Type the name of the service that you do not wish to monitor in the Enter Service Name field.

5        Click OK and then click Save.

Logfile Monitor

This option enables you to monitor multi-vendor log files with matching keyword entries. EventTracker generates an event if any matching record is found. The Log file monitoring configurations can be done through EventTracker Agent Configuration provided on the EventTracker Control Panel. In the EventTracker Enterprise (Web GUI), you can only view the Logfile monitoring settings.

1        Double-click EventTracker Agent Configuration on the EventTracker Control Panel.

2        Select the system from the Select System drop-down, and then select Logfile Monitor tab.

EventTracker opens the ‘Logfile Monitor’ tab.

 

 

Click

To

Add File Name

Add a log file that you wish to monitor.

View File Details

View log file details.

Delete File Name

Delete the log file name from the list.

Search Strings

Configure the strings to search.

 

3        Click the Add File Name button.

EventTracker displays the ‘Enter File Name’ window.

enter file name.png

 

 

2 NOTE

 

We have provided standard and custom date and time formats to configure Agent LFM.

Now the configured files in the Agent LFM will be parsed as per the selected date and time formats.

 

 

For more Information, refer: Enhancement-in-LFM-to-consider-the-date-and-time-mentioned-in-the-log-file

 

4        Click the Get All Existing Log Files checkbox, if you want all the existing files prior to this configuration and the files that are logged after this configuration.

5        Select the logfile type from the Select Logfile Type drop-down list.

6        Type the path in the Enter File Name field.

(OR)

Click the browse button to locate the log file.

EventTracker displays the ‘Select Folder/File Name’ dialog box.

 

C windows iis 7 selected.png

 

7        In Select Folder name:, select appropriate folder associated with selected Log File Type.

8        Select the Show all the files checkbox to view all files with different file extensions.

9        Click OK.

EventTracker displays the ‘Enter File Name’ window with the file location.

 

IIS 7 in Windows selected.png

 

10    Click OK.

EventTracker displays the ‘EventTracker Agent Configuration’ message box.

 

If older files are monitores.png

 

 

11    Click Yes.

EventTracker displays the Search String dialog box.

 

Search String.png

 

12    Click the Add String button.

EventTracker displays the ‘Enter Search String’ dialog box.

 

esxwebdoc.png

 

13    Select the file name from the Select Field Name drop-down list.

14    Type the string that you want to search in the Enter Search String field.

EventTracker displays the Enter Search String dialog box.

15    Click OK.

EventTracker displays the Search String dialog box.

 

Search String added.png

 

16    Click OK.

EventTracker displays the ‘Agent Configuration’ window with the newly added Logfile entry.

 

17    Click the Save button.

 

 

View File Details

This option helps you to view files details.

 

1        To view file details in EventTracker Control Panel, open the EventTracker Agent Configuration window.

2        Select the system from the Select Systems drop-down list.

EventTracker displays the ‘Logfile Monitor’ tab.

3        Click the Logfile Monitor tab.

4        Select the log file from the list under Logfile Name.

5        Click View File Details.

EventTracker displays the ‘Enter File Name’ window

 

View file data.png

 

6        Click Close.

Delete Log File Monitoring Settings

This option helps you delete log file monitoring settings.

 

1        To delete log file monitor settings in EventTracker Control panel, open the EventTracker Agent Configuration window.

2        Select the system from the Select Systems drop-down list, and then select the Logfile Monitor tab.

3        Select the log file from the Logfile Name list, and then select Delete File Name.

4        Click Save on the Agent Configuration window.

Search Strings

This option helps you search strings.

 

1        In EventTracker Control panel, open the EventTracker Agent Configuration window.

2        Select the system from the Select Systems drop-down list.

3        Click the Logfile Monitor tab.

4        Select the log file from the Logfile Name list.

5        Click Search Strings.

 

 

6        Click Add String.

EventTracker displays the Enter Search String dialog box.

7        Select the file name from the Select Field Name drop-down list.

8        Type the string that you want to search in the Enter Search String field.

EventTracker displays the Enter Search String dialog box with newly added search string entry.

 

9        Click OK.

EventTracker displays the Search String dialog box with newly added search string.

 

To modify, click Edit String. Enter appropriately in the relevant fields in the displayedEnter Search String dialog box, and then click OK.

 

OR

 

To delete, select the string you want to delete and then click Delete String in the Search String dialog box.

10    Click OK on the ‘Search String’ dialog box.

EventTracker displays the ‘Agent Configuration’ window with the modified settings.

11    Click Save.

 

NOTE: When LFM is configured there are possibilities that CPU usage of the EventTracker Agent might go high.

Monitor Check Point Logs

This option helps you monitor logs generated by Check Point.

 

2 NOTE

Severity level of mapping for Checkpoint logs with EventTracker log and event type is given in the table below.

 

Checkpoint log attribute

(ET event category)

Checkpoint log attribute value

EventTracker log type

EventTracker Event type

Alert 0 (“Alert’)

Alert

Application

Warning

Alert 1 (“snmptrap’)

snmptrap

Application

Warning

Alert 2(“mail’)

Mail

Application

Warning

Alert 3 (“useralert’)

Useralert

Application

Warning

Alert 4 (“useralert2’)

Useralert2

Application

Warning

Alert 5 (“useralert3’)

Useralert3

Security

Audit Failure

Audit Status 0

Failure

Security

Audit Success

Audit Status 0

*

Security

Audit Success

* 0

*

Application

Information

 

1        To monitor checkpoint logs in EventTracker Control panel, open the EventTracker Agent Configuration window.

2        Select the system from the Select System drop-down list, and then select the Logfile Monitor tab.

3        Click the Add File Name button.

EventTracker displays the Enter File Name dialog box.

4        Select the logfile type as ‘CHECKPOINT’ from the Select Log File Type drop-down list.

EventTracker unfolds a pane with configuration options.

Checkpoint.png

 

5        Select an option from the Communication Method drop-down list.

 

Communication method options

Description

OPSEC_SSLCA

Encryption Method: 3DES

Compressed: No

OPSEC_SSLCA_COMP

Encryption Method: 3DES

Compressed: Yes

 

 

6        Type LEA Server Name. Type the Client DN.

Check Point generated this string while configuring the OPSEC Application.

7        Type the Server DN.

This is the Check Point Gateway DN.

8        Click the browse button  to locate SSLCA file.

9        Select the SSLCA file and then click Open.

EventTracker populates the SSLCA file field

10    Type the Server IP.

This is the IP of the host where Check Point is installed.

11    Type the Server Port.

This can be any port but should be consistent with what you have entered earlier in the fwopsec.conf file.

 

Field

Description

Active

This option is selected by default. Select this option to receive live Check Point logs from the point in time the configuration takes effect.

Historical

Select this option to read from previous logs and the current logs as well. This option has two modes namely Current Logs and All Logs.

Select the Current Logs option to read from the first record of the current log. This mode is selected by default.

Select the All Logs option to read from all the backed up logs and the current logs.

 

 

12    Click OK.

EventTracker displays the ‘Agent Configuration’ window.

 

13    Click Save.

For information regarding How to configure EventTracker Agent to read CheckPoint logs, please refer CheckPoint Guide.

Monitor VMware Logs

This option helps you monitor logs generated by VMware. VMware severity values are mapped to EventTracker event types.

The mapping of VMware log severity value:

 

VMware severity            

ET event type

Description

Error

Error

If VMware logs on severity value as ‘Error’, then EventTracker agent also generates event type as Error.

Info

Information

If VMware logs on severity value as ‘Info’, then EventTracker agent generates event type as Information.

Warning

Warning

If VMware generates logs on severity value as ‘Warning’, then EventTracker generates event type as Warning.

User

Information

If VMware generates log with severity value ‘User’, then EventTracker generates event type as Information.

 

 

The mapping of VMware task state with event type:

 

Task State

ET Event type

Description

Error

Error

If VMware logs on Task state as ‘Error’, then EventTracker agent also generates event type as Error.

Queued

Information

If VMware logs on Task state as ‘Queued’, then EventTracker agent generates event type as Information.

Running

Information

If VMware logs on Task state as ‘Running’, then EventTracker agent generates event type as Information.

Success

Audit Success

If VMware logs on Task state as ‘Success’, then EventTracker agent generates event type as Audit Success.

 

1        To monitor VMware logs in EventTracker Control Panel, open the EventTracker Agent Configuration window.

2        Select the system from the Select System drop-down list.

3        Click the Logfile Monitor tab.

4        Click the Add File Name button.

EventTracker displays the ‘Enter File Name’ dialog box.

5        Select the logfile type as VMWARE from the Select Logfile Type drop-down list.

EventTracker unfolds a pane with configuration options.

 

VMWARE.png

 

 

Field

Description

VMware URL

Type a valid URL, e.g. https://esxvcserver/sdk/vimService You can also replace the server name with the IP address.

User Name

Type valid user name.

Password

Type valid password.

Timeout

Connection timeout.

 

6        Type appropriately in the relevant fields.

7        Click Test Connection to check if the configuration parameters you have entered are correct.

8        Click OK.

EventTracker displays the Agent Configuration window.

 

 

9        Click Save.

Specifying the System Name & Event Source for LFM logs

An option is provided to get the log source and computer name from user(s) for all supported format.

 

Event id 3230 will get generated based on this property. If user does not give any value then by default it will consider Source as "EventTracker" and System Name as "Local computer name"

 

1.      Select Add File Name.

 

 

NOTE: System name allowed special characters are “-“and “_”.

 

2.      In the Enter File Name window, enter the file path, the Event Source and the System name and click OK.

 

NOTE: For VMware, Checkpoint, Evt and syslog, this new option will not be available.

Extract Device ID from syslog devices

Another enhancement is extracting the device ID from syslog device while it is relaying. It will extract the Device ID from event description by using regular expression. After extracting the value from description it assigns it to “Computer Name” standard property.

 

Example: FG1K5D3I14802285@ntpldtblr104-syslog

 

 

NOTE: The allowed special characters for system name are “.”, “_” and “-“

Monitor Network Connections

NCM (Network connection monitoring) provides you with the capability to effectively monitor for network connections on any system in your enterprise. It is a feature that provides you security beyond the firewall by detecting threats from inside the firewall as well as keeping the external attackers at bay.

It helps you keep track of various happenings like connections established by remote applications, unauthorized connections to server and connections made to standard ports.

 

NCM provides second level security beyond firewall. NCM can drastically reduce internal security threats and can be configured to raise an alert whenever any intruder outside a list of trusted IP addresses attempts to make network connection. The NCM functionality can also be set at high security mode wherein an event is generated for all incoming and outgoing connections.

 

The NCM functionality facilitates to achieve the following key objectives:

 

§  Host based intrusion detection

§  To provide second level security and complement to firewall and anti-virus

§  In strengthening security policies

§  To improve security policies against inside security breaches

§  To monitor all network connections (TCP and UDP)

§  For constant unattended, reliable monitoring of intrusion detection

§  Flexible configuration as per the business requirement

To monitor network connection

1        Double click EventTracker Control Panel; select ‘EventTracker Agent Configuration’.

2        Select the system from the Select System hyperlink.

3        Click the Network Connections tab.

EventTracker displays the ‘Network Connection’ tab.

 

 

2 NOTE

 

· The “Listen” option is provided to monitor the process whose ports are in listen state. The option will be disabled by default. The user needs to enable it for monitoring the ports in listen state.

 

 

For more information, refer: Enhancement-in-Network-monitoring-to-monitor-listening-ports.

 

Field

Description

TCP

This checkbox is selected by default to monitor TCP network connections.

UDP

This checkbox is selected by default to monitor UDP network connections.

Connection States

Listen

To monitor the process whose ports are in listen state.

Open

This checkbox is selected by default to monitor opened TCP/UDP connections.

Close

This checkbox is selected by default to monitor closed TCP/UDP connections.

All Network Traffic (NCM): By default, EventTracker selects this option.

Exclude List

Click this button to configure the network connections that need not be monitored.

A notification will be sent for the entries in this list, if the port is open.

Include List

Click this button to configure the network connections to monitor.

Entries in this list will always be monitored.

‘Include Network Connections List’ always override the ‘Exclude Network Connections List’.

Suspicious Traffic Only (SNAM)

Trusted List

Click this button to view and configure trusted network connections.

 

 

4        Select or clear the TCP or UDP checkbox.

5        Select the Save button.

Exclude Network Connections

1        Double click EventTracker Control Panel; select ‘EventTracker Agent Configuration’.

2        Select the system from the Select System hyperlink. Select Network Connections tab.

EventTracker displays the ‘Network Connections’ tab.

3        Select Exclude List.

EventTracker displays the Exclude List pop-up window.

 

4        Click New.

EventTracker displays the Exclude List window to type New Network Connection Details.

 

 

 

 

Field

Description

Local Address Details

Host Name or IP Address

Type the host name or the IP address in this field.

Local Port

Select a local port from the drop-down list.

Remote Address Details

Host name, IP Address or URL

Type the host name, IP address or URL in this field.

Remote Port

Select a remote port from the drop-down list.

Select IP Address Range

Click this button to add IP address range.

EventTracker displays the IP Address Range Setting dialog box.

Type the range until which you want to monitor the IP network connections.

This option is available only when you Type the IP address in Host name, IP address or URL field.

Process Name

Type the process name in this field.

Connection State

Select a connection state from the drop-down list.

 

2 NOTE

If a field is left blank, a wildcard match for that field is assumed.  For example, leaving the Local Port field blank implies that any value in that field is acceptable.

 

5        Enter appropriate data in relevant fields.

6        Click OK.

EventTracker displays the Exclude List with the newly added entry.

7        To modify the network connection details, click Edit.

8        To delete the network connection details, select the network connection details you want to delete from the list, and then click Delete.

9        To find network connection detail, click the Find button and enter appropriate data in the required field.

10    Click Close on the Exclude List pop-up window.

11    Click Save.

Include Network Connections to monitor

1        Double click EventTracker Control Panel; select ‘EventTracker Agent Configuration’.

2        Select the system from the Select System hyperlink.

3        Click the Network Connections tab.

EventTracker displays the ‘Network Connection’ tab.

4        Select the appropriate checkboxes.

5        Click Include List.

EventTracker displays the Include List pop-up window.

6        Select the Monitor only the ports that are in this list checkbox to monitor only the ports present in the list, and then click Close.

 

 

7        To add more network connection details, click New.

EventTracker displays the Include List window to type the New network connection details.

8        Enter appropriate data in the relevant fields.

 

 

9        Click OK.

EventTracker displays the Include List with the newly added entry.

 

10    To modify the network connection details, click Edit.

11    To delete the network connection details, select the network connection details you want to delete from the list, and then click Delete.

12    Click Close, and then click Save.

Suspicious Connections

This feature is an enhancement of the existing ‘Network Connection Monitoring’. This option enables you to monitor the suspicious usage of TCP or UDP ports and their connection states. By default, all the connections are suspicious and you can exempt applications and ports from monitoring.  EventTracker is shipped along with a list of applications and ports, which are not harmful to any enterprise environment. As discussed, EventTracker Agent will not monitor these White-listed applications and ports.

 

2 NOTE

Prior to enabling EventTracker Agent to monitor Suspicious Traffic, apply all the latest Microsoft patches / hotfixes if the operating system is Windows 2000.

Monitor Suspicious Connections

This option helps you to monitor suspicious connections and to view predefined trusted connections list. EventTracker does not monitor the connections listed in Trusted List. You can also edit predefined trusted connection list and define your own set of trusted connection list.

1        To view Trusted List in EventTracker Control panel, open the EventTracker Agent Configuration window.

2        Select the system from the Select Systems drop-down list.

3        Click the Network Connections tab.

EventTracker displays the Network Connections tab.

4        Select Suspicious Traffic Only (SNAM) option. Select the Trusted List button.

EventTracker displays the ‘Trusted Connections List’ dialog box

 

Trusted List Conn List.png

 

 

Click

To

Add new trusted connections. EventTracker displays’ Trusted Port Details’ dialog box.

Type appropriate details in the relevant fields and then click OK. You can use wild cards to search processes. For example, had you configured Virtual Collection Points and wish to add all EventTracker Receiver processes, it is enough to provide the Process name as EtReceiver*.exe.

You can also use  browse button to locate the process. 

Select a process from the list and then click Edit.

EventTracker displays ‘Trusted Port Details’ dialog box.

Edit required details in the relevant fields and then click OK.

Select a process from the list, and then click Delete.

EventTracker displays confirmation message box.

Click Yes to delete the selected entry.

Add programs installed in your computer to the trusted list.

Add programs included in the Firewall Exceptions list to the trusted list.

Close the ‘Trusted Connections List’ dialog box.

 

 

 

Add Programs to the Trusted List

This option helps you add programs installed in your computer to the trusted list. You can enable or disable the entries in the trusted programs list. Enable means the processes and the ports used by the processes are legitimate and disable means illegitimate and EventTracker monitors them.

1        To add programs to trusted list, click Add Program.

EventTracker displays the ‘Add Program to Trusted List’ window.

 

Add Program to trusted List.png

 

2        Select the checkbox against the programs or select the Select All checkbox to select all the programs.

3        Click Add.

EventTracker adds the selected program to the Trusted Connections List.

4        Click Close and then click Save.

Add Firewall Exceptions to the Trusted List

This option helps you add the processes and ports in the Firewall programs and ports Exceptions to the trusted list.

1        To add firewall exception to the trusted list in Trusted Connections List, click Add Firewall List.

EventTracker displays the ‘Add Program/Port to Trusted List’ window.

 

Add Port or Pgm to trusted list.png

 

By default, EventTracker selects the Add Program option and displays the programs in the exceptions list.

(OR)

Select the Add Port option, EventTracker displays available ports in the exception list.

2        Select the programs or select the Select All checkbox and then select Add to add programs to the trusted list.

EventTracker adds the selected items to the ‘Trusted Connections’ List.

Monitor Performance

Performance monitoring enables the administrator to monitor the general health of processes on a system. You can configure general process health thresholds for CPU and Memory Usage per process. CPU usage is measured in terms of percentage while memory usage is measured in absolute terms.

When the configured threshold is crossed, an event will be generated and reported to the Manager. An event will also be generated when the thresholds are back to below configured levels.

 

Care is taken not to report spikes in CPU or memory usage by a process. Therefore, when an event is seen that a process is crossing thresholds, you can be sure that this is for a long enough period and need to investigate.

 

By default, all processes will be monitored and the default threshold limits are 1024MB of Memory Usage and 85% of CPU.

You can also choose to filter out processes that you do not want to monitor. By default, all processes will be monitored.

To monitor configured processes

1        Double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System drop-down, and then select the Performance tab.

EventTracker displays the Performance tab.

 

 

 

 

Field

Description

CPU Performance (%)

Select CPU Performance threshold limit from the drop-down list.

Memory Usage (MB)

Type the memory usage threshold limit in MB in this field.

Handle

Select a threshold to monitor handle usage of a running process.

Thread

Select a threshold to monitor thread usage of a running process.

Specific Process

Provide Individual CPU and memory threshold for specific processes.

 

3    Click the Add button.

EventTracker unfolds an option to type the process name.

4     Type the process name in the Enter Process Name field.

5      Click OK.

EventTracker adds the process to the List of Filtered Processes pane.

6.      Click the Advanced button.

Advanced Process Configuration window displays.

7.      In the Handle tab, select the handle counts as per requirement.

 

 

 

8        In the Thread tab, select the thread count as per requirement.

 

 

 

9        In the Specific Process tab, enter individual CPU and Memory threshold.

 

 

 

10    Click Add/Edit/Delete button as per requirement.

11    Click the Save & Close button.

 

2 NOTE

EventTracker generates the process event when the set threshold value crosses the limit for more than 3 minutes.

Remove Processes from ‘List of Filtered Processes’

1        Double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System drop-down, and then select the Performance tab.

EventTracker displays the Performance tab.

3        Select the process from List of Filtered processes pane, select Remove and then select the Save button.

Maintain Log Backup

This option enables you to backup event logs automatically in the EventTracker Agent directory whenever the event logs are full. EventTracker automatically performs event log backup or archival in the standard Windows event log format (.evt /.evtx format).

To backup event logs automatically

1        Double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System drop-down, and then select the Log Backup tab.

EventTracker displays the Log Backup tab.

 

 

 

Field

Description

Clear logs as needed

If selected, EventTracker Agent clears log file if and only if offset error is encountered.

After clearing, Agent inserts “3241” event to notify the user. In this case, no backup is taken.

This is true for any setting of the Windows Event Log’s “When maximum log size is reached” option (i.e. Overwrite events as needed, Overwrite events older than N days, Do not overwrite events (clear log manually)).

EventTracker log backup and clear operation:

Computer: EXCHTEST

Log file name: Application

Log file backup: Not applicable

Log file clear: Success

Reason: Received invalid offset error while reading the event log.

For more information see Microsoft KB Article #177199.

Backup event logs

If the “Backup event logs” option is selected, and If the offset is lost at any point, no matter whether “Clear log after backup” checkbox is selected or not the respective log file will be backed up and cleared and the following 3241 event will be logged.

EventTracker log backup and clear operation:

Computer: EXCHTEST

Log file name: Security

Log file backup: C:\Program Files\Prism Microsystems\EventTracker\Agent\ EXCHTEST\ Eventlog_Backup_Security1221683647.evt

Log file clear: Success

Reason: Invalid offset error while reading the event log.

For more information see Microsoft KB Article #177199.

Backup Path

By default backed up log files are stored in the EventTracker installation folder typically, …\Program Files\Prism Microsystems\EventTracker\Agent

Keep backup files for

If selected, backup files older than selected number of days will be automatically deleted by the agent.

 

 

3        Select the required options and then select Save.

 

Transfer Log Files

This option enables you to transfer Windows and other application log files at scheduled times to the manager. Windows logs that are filtered out by the real time settings are cached for transfer (further filtering is available). This minimizes the EventTracker Receiver service workload and conserves the network bandwidth.

A new option has been added to configure offline events. To achieve this configure the port to send offline events.

To transfer Windows and Application Log Files

1        Double click EventTracker Control Panel, select EventTracker Agent Configuration.

2        Select the system from the Select System drop-down, and then select the File Transfer tab.

EventTracker displays the File Transfer tab.

 

 

Click

To

Add

DLA Manager window displays.

 

a)       Enter the System: name or IP address, Port to configure.

b)      If the events have to be encrypted is required, select Yes or No as per requirement.

c)       Select an option from the Encrypt drop-down list to encrypt and securely transfer the cached events to the destination.

d)      Click OK.

Edit

You can edit the manager name or IP address and even can change the encryption option.

a)       To update the details of Manager, click the Edit button.

b)      Enter required information and then click the OK button.

Remove

Delete the destination, i.e. manager name or IP address.

a)       To remove file transferring of events in Manager, click the Remove button.

EventTracker Agent Configuration displays a message.

b)      Click the Yes button.

Filter

Click the Filter button.

 

 

Select the required options  to Add/Edit/Remove/Find DLA Filters and click the Close button.

 

 

Field

Description

Frequency

Set the frequency of file transfer. You can set file transfer to occur every configure hours or daily at a particular time.

Purge Transferred Files

Set this option to purge files that are transferred to the Manager.

Retry

Set the number of attempts made in a given time interval by the source Agent machine to transfer the files to the manager system.

You can also generate an event for each transfer attempt, successful transfer or failed transfer as per your choice.

Send Windows Events via File Transfer

Select this option to transfer Windows events to the configured managers at scheduled interval. Click the Filters button to further filter the events.

In DLA Filters dialog box, click Add to add the event details.

Send other log files via DLA

Select this option to transfer other application log files.

Type the path the folder where log files are dumped or click the browse button to select the folder.

Advanced

a)       Click the Advanced button.

Advanced Option window displays.

b)      Select the required options, and then click the OK button.

Send Now

Click this option to override the Frequency option and transfer the files immediately. This option is available only under EventTracker Control panel >> File Transfer.

a)       Click the Send Now button.

DLA – Transfer Files window displays.

b)      In Select Files pane, select Windows Event Cache Files, and then select > button.

c)       Click the Transfer button.

d)       To view the logs, click the View Log button.

 

3        Select the required options and then select Save.

Syslog FTP Server

This new feature is introduced to transmit windows events from local systems, as text files containing syslog messages.

To transfer Windows events as Syslog messages

1        Open EventTracker Control Panel, double click EventTracker Agent configuration and then select Syslog FTP server tab.

A Syslog FTP server window displays.

 

 

2        Click the Add button.

EventTracker opens Syslog FTP destination window.

 

syslog FTP destination.png

 

3        Select the Protocol name, from the protocol dropdown list.

If you select protocol as FTP then port number 21 will be selected by default in the Port field.

If you select protocol as SFTP/SCP, then the port number 22 will be selected by default in the Port field.

4        Enter the server name or IP address in Server (Name/IP) field, where the syslog messages need to be transferred.

5        Enter the location in Directory field, where the files need to be transferred.

6        Enter the appropriate Username and Password.

7        Enter the host key in the Host Key field, which is provided by the System Administrator.

Host Key option is available only for SFTP/SCP.

8        Click OK.

The server details can be seen in the FTP server(s) field.

9        Click Send as syslog Events via File Transfer option to allow the file transfer to happen.

10    To send other log files, select Send other log files option, and then click the  browse button.

EventTracker displays Browse for folder pop-up window.

11    Select the log file folder, and then click Ok.

(OR)

Click the location where you want to create a folder, and then click Make a New Folder button.

EventTracker creates new folder under the selected location. Right click and rename the New folder, and then click Ok.

14    Select Also purge files on server if required.

15    Select Message Options to send/receive messages.

A syslog Message Options window displays.

16    Select the required Event Properties, syslog Format.

17    To add new syslog facility or severity settings in RFC 3164 syslog Facility Settings, select the New button. To edit/delete the settings, select the corresponding Edit/Delete button.

18    To add new syslog facility or severity settings in RFC 3164 syslog facility Severity Settings, select the New button. To edit/delete the settings, select the corresponding Edit/Delete button.

19    Select OK, select Save and then select the Close button.

All the files placed in this folder will be transferred to the configured manager.

Save Current Configuration

This option enables you to save the current configuration settings in agent configuration.

1        To save current configuration settings, open EventTracker Control panel, and then select EventTracker Agent Configuration.

2        Select the system from the Select Systems drop down, select the File menu, and then select the Save as option.

 

 

3        Select appropriate path to backup the current configuration settings. Enter the file name in the File name field.

The valid file extension is ‘*.ini’.

4        Click Save.

EventTracker displays the ‘EventTracker Agent Configuration’ message box.

5        Click OK.