Jsa Log Source User Guide
Jsa Log Source User Guide
Release
2014.1
Published: 2014-03-17
ii
Table of Contents
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Documentation and Release Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Documentation Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Requesting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Self-Help Online Tools and Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Opening a Case with JTAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Part 1
Chapter 1
Chapter 2
iii
Chapter 3
Chapter 4
Chapter 5
Part 2
Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
iv
List of Tables
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Table 1: Notice Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Table 2: Text and Syntax Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Part 1
Chapter 1
Chapter 2
Table 35: IBM Tivoli Endpoint Manager SOAP Protocol Parameters . . . . . . . . . . 100
Chapter 5
vi
To obtain the most current version of all Juniper Networks technical documentation,
see the product documentation page on the Juniper Networks website at
http://www.juniper.net/techpubs/.
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.
Documentation Conventions
Table 1 on page viii defines notice icons used in this guide.
vii
Meaning
Description
Informational note
Caution
Warning
Laser warning
Table 2 on page viii defines the text and syntax conventions used in this guide.
Description
Examples
viii
[edit]
root@# set system domain-name
domain-name
Description
Examples
| (pipe symbol)
broadcast | multicast
# (pound sign)
[ ] (square brackets)
; (semicolon)
[edit]
routing-options {
static {
route default {
nexthop address;
retain;
}
}
}
GUI Conventions
Bold text like this
Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can
improve the documentation. You can provide feedback by using either of the following
methods:
Online feedback rating systemOn any page at the Juniper Networks Technical
Documentation site at http://www.juniper.net/techpubs/index.html, simply click the
stars to rate the content, and use the pop-up form to provide us with information about
your experience. Alternately, you can use the online feedback form at
https://www.juniper.net/cgi-bin/docbugreport/.
ix
JTAC hours of operationThe JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
PART 1
CHAPTER 1
For example, log sources that do not send an event within 720 minutes display an error
in the Status column. Log sources that display N/A are log sources that have been bulk
added.
Related
Documentation
Description
Protocol Configuration
From the list, select the protocol configuration for the log source.
The protocol defines how Juniper Secure Analytics (JSA) attempts to communicate with the log
source. Protocols can either listen for events or they can initiate communication to a log source to
collect events. The protocol options that are available for each log source is determined by the Log
Source Type.
The JSA provides step-by-step instructions to configure each log source.
Type an IPv4 address or hostname to identify the log source that created the events.
If your network contains multiple devices that are attached to a management console, you should
specify the IP address of the individual device that created the event. A unique identifier for each,
such as an IP address, prevents event searches from identifying the management console as the
source for all of the events.
Description
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log sources
contributes to the calculation of the offense magnitude and can increase or decrease the magnitude
value of an offense.
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating systems
that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Description
Groups
Related
Documentation
Description
Description
Type an IPv4 address or hostname to identify the log source that created the events.
If your network contains multiple devices that are attached to a management console, you should
specify the IP address of the individual device that created the event. A unique identifier for each,
such as an IP address, prevents event searches from identifying the management console as the
source for all of the events.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log sources
contributes to the calculation of the offense magnitude and can increase or decrease the magnitude
value of an offense.
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating systems
that can create events in multiple languages.
Description
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
Extension Use
Condition
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
The log source is updated. Deploy changes is not required to edit a log source.
Related
Documentation
When a log source is enabled, the Enabled column indicates true or the column indicates
false when disabled. Disabled log sources do not count against the log source limit
assigned to the license. If an administrator cannot enable a log source, the system might
have exceeded the log source license limit. Administrators can review the system
notifications to determine if the number of log sources exceeds the license limit. When
this occurs, administrators can disable low priority log sources. If extra log source capacity
is required, contact your sales representative.
Related
Documentation
Description
10
From the list, select a log source type for your Windows based log source or Universal DSM log source.
Description
Protocol
Configuration
From the list, select the protocol configuration for the log source.
The protocol defines how the system attempts to communicate with the log source. Protocols can
either listen for events or they can initiate communication to a log source to collect events. The protocol
options that are available for each log source is determined by the Log Source Type.
The JSA provides step-by-step instructions to configure each log source.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility is
5.
Credibility is a representation of the integrity or validity of events that are created by a log source. The
credibility value that is assigned to a log source can increase or decrease based on incoming events or
adjusted as a response to user created event rules. The credibility of events from log sources contributes
to the calculation of the offense magnitude and can increase or decrease the magnitude value of an
offense.
Target Event
Collector
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can improve
performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a short
time interval. Coalesced events provide administrators a way to view and determine the frequency
with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating systems
that can create events in multiple languages.
11
Description
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing of a device support
module (DSM).
Extension Use
Condition
File Upload
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Select this option to specify the location of a text file that contains a list of IP addresses or host names
to bulk add.
The text file must contain one IP address or host name per line. Extra characters after an IP address
or host names longer than 255 characters can result in a value being bypassed from the text file. The
file upload lists a summary of all IP address or host names that were added as the bulk log source.
Domain Query
Select this option to search a domain for hosts to add as bulk log sources. To search a domain you
must add the domain, username, and password before polling the domain for hosts to add. Click Query
Domain to search for IP addresses or host name to the list.
Manual
Select this option to manually add an individual IP address or host names to the host list. Click Add
Host to add an IP address or host name to the list.
Add
Clear any values from the Add check box to exclude host names or IP addresses from the list of bulk
log sources.
The log sources are bulk added and a group is created for your bulk log sources.
Related
Documentation
12
Description
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility is
5.
Credibility is a representation of the integrity or validity of events that are created by a log source. The
credibility value that is assigned to a log source can increase or decrease based on incoming events or
adjusted as a response to user created event rules. The credibility of events from log sources contributes
to the calculation of the offense magnitude and can increase or decrease the magnitude value of an
offense.
Target Event
Collector
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can improve
performance in distributed deployments.
13
Description
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a short
time interval. Coalesced events provide administrators a way to view and determine the frequency with
which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating systems
that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing of a device support
module (DSM).
Extension Use
Condition
File Upload
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Select this option to specify the location of a text file that contains a list of IP addresses or host names
to bulk add.
The text file must contain one IP address or host name per line. Extra characters after an IP address or
host names longer than 255 characters can result in a value being bypassed from the text file. The file
upload lists a summary of all IP address or host names that were added as the bulk log source.
Domain Query
Select this option to search a domain for hosts to add as bulk log sources. To search a domain you
must add the domain, username, and password before polling the domain for hosts to add. Click Query
Domain to search for IP addresses or host name to the list.
Manual
Select this option to manually add an individual IP address or host names to the host list. Click Add
Host to add an IP address or host name to the list.
Add
Clear any values from the Add check box to exclude host names or IP addresses from the list of bulk
log sources.
14
1.
15
source instead of deleting the log source from your system. This enables you to continue
to search for events by log source or log source group.
Related
Documentation
16
CHAPTER 2
17
Configuring the IBM Tivoli Endpoint Manager SOAP Protocol on page 100
Description
18
Description
Protocol Configuration
Type an IPv4 address or host name to identify the log source that created the events.
If the network contains multiple devices that are attached to a management console, administrators
can specify the IP address of the individual device that created the event. A unique identifier for each,
such as an IP address, prevents event searches from identifying the management console as the
source for all of the events.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log sources
contributes to the calculation of the offense magnitude and can increase or decrease the magnitude
value of an offense.
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
19
Description
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating systems
that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
20
Description
Protocol Configuration
database@hostname
table name|database@hostname
The databasename must match the value of the Database Name parameter. The database name
is a required parameter.
The hostname is the hostname or IP address for the device that hosts the database. Thehostname
must match the parameter in the IP or Hostnamefield. The hostname is a required parameter.
Optional. The table name is the name of the table or view on the database which contains the
event records. If you define the name of a table or view, you must include a pipe ( | ) character as a
separator. The name of the view or table must match the Table Name field.
Database Type
From the list box, select the type of database that contains the events.
Database Name
Type the name of the database to which the protocol can connect. The database name must match
the database name specified in the Log Source Identifier field.
IP or Hostname
21
Description
Port
Type the port number used by the database server. The default displayed depends on the selected
Database Type. The valid range is 0 to 65536. The defaults include:
MSDE1433
Postgres5432
MySQL3306
Sybase1521
Oracle1521
Informix9088
The JDBC port must match the listen port configured on the remote database. The database must
permit incoming TCP connections.
If a Database Instance is used with the MSDE database type, administrators must leave the Port
parameter blank in the log source configuration.
Username
Type the database username. The username can be up to 255 alphanumeric characters in length
and can include underscore (_) characters.
To track access to database access for audit purposes, administrators can create a create a specific
user on the database for JSA.
Password
Type the database password. The password can be up to 255 characters in length.
Confirm Password
Authentication Domain
Database Instance
Type the database instance, if required. MSDE databases can include multiple SQL server instances
on one server.
When a non-standard port is used for the database or administrators have blocked access to port
1434 for SQL database resolution, the Database Instance parameter must be blank in the log source
configuration.
Predefined Query
Optional. Select a predefined database query for the log source. If a predefined query is not available
for the log source type, administrators can select none.
Table Name
Type the name of the table or view that includes the event records.
The table name can include the following special characters: dollar sign ( $ ), number sign ( # ),
underscore ( _ ), en dash ( - ), and period( . ).
Select List
Type the list of fields to include when the table is polled for events. Administrators can use a comma
separated list or type * to select all fields from the table or view.
If a comma-separated list is defined, the list must contain the field defined in the Compare Field.
22
Description
Compare Field
Type a numeric value or timestamp field from the table or view that can identify new events added
between queries to the table.
This field enables the protocol to identify events that were previously polled by the protocol to ensure
that duplicate events are not created.
Use Prepared
Statements
Optional. Configure a start date and time for when the protocol can start to poll the database.
If a start time is not defined, the protocol attempts to poll for events after the log source configuration
is saved and deployed.
Polling Interval
Type the polling interval, which is the amount of time between queries to the database. The default
polling interval is 10 seconds.
Administrators can define a longer polling interval by appending H for hours or M for minutes to the
numeric value. The maximum polling interval is 1 week in any time format. Numeric values without
an H or M designator poll in seconds.
EPS Throttle
Type the number of Events Per Second (EPS) that you do not want this protocol to exceed. The
default value is 20000 EPS.
If MSDE is configured as the database type, administrators can select this check box to use an
alternative method to a TCP/IP port connection.
Named pipe connections for MSDE databases require the username and password field to use a
Windows authentication username and password and not the database username and password.
The log source configuration must use the default named pipe on the MSDE database.
If the Use Named Pipe Communication check box, the Database Cluster Name parameter is displayed.
If you use your SQL server in a cluster environment, define the cluster name to ensure that named
pipe communications function properly.
Use NTLMv2
Select the Use NTLMv2 check box to force MSDE connections to use the NTLMv2 protocol when
communicating with SQL servers that require NTLMv2 authentication. The default value of the check
box is selected.
The Use NTLMv2 check box does not interrupt communications for MSDE connections that do not
require NTLMv2 authentication.
Use SSL
Select this check box to enable SSL encryption for the JDBC protocol.
Enabled
23
Description
Credibility
Select the credibility of the log source. The range is 0 (lowest) 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log sources
contributes to the calculation of the offense magnitude and can increase or decrease the magnitude
value of an offense.
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
Groups
24
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
Description
Protocol Configuration
25
Description
database@hostname
table name|database@hostname
The database name must match the value of the Database Name parameter. The database
name is a required parameter.
The hostname is the hostname or IP address for the device that hosts the database. The
hostname must match the parameter in theIP or Hostnamefield. The hostname is a required
parameter.
Optional. The table name is the name of the table or view on the database that contains the
event records. If you define the name of a table or view, you must include a pipe (|) character as
a separator. The name of the view or table must match the Table Name field.
Database Type
From the list box, select MSDE as the type of database to use for the event source.
Database Name
Type RealSecureDB the name of the database to which the protocol can connect.
IP or Hostname
Port
Type the port number used by the database server. The default displayed depends on the selected
Database Type. The valid range is 0 to 65536. The defaults include:
MSDE1433
Postgres5432
MySQL3306
Sybase1521
Oracle1521
Informix9088
The JDBC SiteProtector configuration port must match the listener port of the database. The
database must have incoming TCP connections enabled.
If you define a Database Instance when with MSDE as the database type, you must leave the Port
parameter blank in your log source configuration.
Username
Type the database username. The username can be up to 255 alphanumeric characters in length
and can include underscores (_).
If you want to track access to a database by the JDBC protocol, you can create a specific use for
your JSA system.
Password
Type the database password. The password can be up to 255 characters in length.
Confirm Password
Authentication Domain
If you select MSDE and the database is configured for Windows, you must define a Windows
domain.
If your network does not use a domain, leave this field blank.
26
Description
Database Instance
If you select MSDE and you have multiple SQL server instances on one server, define the instance
to which you want to connect.
If you use a non-standard port in your database configuration, or have blocked access to port 1434
for SQL database resolution, you must leave the Database Instance parameter blank in your
configuration
Predefined Query
From the list, select a predefined database query for your log source. Predefined database queries
are only available for special log source connections.
Table Name
Type SensorData1.
Type SensorDataAVP.
Type SensorDataResponse.
Select List
Compare Field
Select this check box to collect audit events from IBM SiteProtector.
By default, this check box is clear.
Optional. Configure a start date and time for when the protocol can start to poll the database.
Polling Interval
Type the polling interval, which is the amount of time between queries to the event table. The
default polling interval is 10 seconds.
Administrators can define a longer polling interval by appending H for hours or M for minutes to
the numeric value. The maximum polling interval is 1 week in any time format. Numeric values
without an H or M designator poll in seconds.
EPS Throttle
Type the number of Events Per Second (EPS) that you do not want this protocol to exceed. The
default value is 20000 EPS.
If you select MSDE as the database type, select the check box to use an alternative method to a
TCP/IP port connection.
When administrators use a Named Pipe connection, the username and password must be the
appropriate Windows authentication username and password and not the database username
and password. The log source configuration must use the default named pipe.
27
Description
If the Use Named Pipe Communication check box is selected, the Database Cluster Name parameter
is displayed.
Type the cluster name to ensure that named pipe communications function properly.
Use NTLMv2
Select the Use NTLMv2 check box to force MSDE connections to use the NTLMv2 protocol when
communicating with SQL servers that require NTLMv2 authentication. The default value of the
check box is selected.
The Use NTLMv2 check box does not interrupt communications for MSDE connections that do not
require NTLMv2 authentication.
Use SSL
Select this check box to enable SSL encryption for the JDBC protocol.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
28
Description
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
From the list box, select the use condition for the log source extension. The options include:
Groups
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
29
and firewall logs in the vEvents Common Data table to provide events to Juniper Secure
Analytics (JSA). If the Sophos Enterprise console does not have the Sophos Reporting
Interface, administrators can use the standard JDBC protocol to collect antivirus events.
Detailed configuration steps for Sophos Enterprise consoles are provided in the JSA.
Table 10 on page 30 describes the parameters of the Sophos Enterprise console JDBC
protocol.
Description
Protocol Configuration
database@hostname
table name|database@hostname
The database name must match the value of the Database Name parameter. The database name
is a required parameter.
The hostname is the host name or IP address for the device that hosts the database. Thehostname
must match the parameter in the IP or Hostname field. The host name is a required parameter.
Optional. The table name is the name of the table or view on the database that contains the event
records. If you define the name of a table or view, you must include a pipe ( | ) character as a
separator. The name of the view or table must match the Table Name field.
Database Type
Database Name
IP or Hostname
Port
Type the port number that is used by the database server. The default port for MSDE in Sophos
Enterprise console is 1168. The JDBC configuration port must match the listener port of the Sophos
database. The Sophos database must have incoming TCP connections enabled to communicate
with JSA.
If a Database Instance is used with the MSDE database type, administrators must leave the Port
parameter blank in the log source configuration.
Username
30
Type the database user name. The user name can be up to 255 alphanumeric characters in length
and can include underscore (_) characters.
Description
Password
Type the database password that is required to access the database on the database.
Confirm Password
Authentication Domain
Database Instance
Type the database instance, if required. MSDE databases can include multiple SQL server instances
on one server.
When a non-standard port is used for the database or administrators block access to port 1434 for
SQL database resolution, the Database Instance parameter must be blank.
Table Name
Type vEventsCommonData as the name of the table or view that includes the event records.
The table name can include the following special characters: dollar sign ( $ ), number sign ( # ),
underscore ( _ ), en dash ( - ), and period( . ).
Select List
Compare Field
Type InsertedAt to identify new events added between queries to the database table.
Use Prepared
Statements
Optional. Configure a start date and time for when the protocol can start to poll the database.
If a start time is not defined, the protocol attempts to poll for events after the log source configuration
is saved and deployed.
Polling Interval
Type the polling interval, which is the amount of time between queries to the database. The default
polling interval is 10 seconds.
Administrators can define a longer polling interval by appending H for hours or M for minutes to the
numeric value. The maximum polling interval is 1 week in any time format. Numeric values without
an H or M designator poll in seconds.
EPS Throttle
Type the number of Events Per Second (EPS) that you do not want this protocol to exceed. The
default value is 20000 EPS.
31
Description
If MSDE is configured as the database type, administrators can select this check box to use an
alternative method to a TCP/IP port connection.
Named pipe connections for MSDE databases require the username and password field to use a
Windows authentication username and password and not the database username and password.
The log source configuration must use the default named pipe on the MSDE database.
If the Use Named Pipe Communication check box, the Database Cluster Name parameter is
displayed.
If you use your SQL server in a cluster environment, define the cluster name to ensure that named
pipe communications function properly.
Use NTLMv2
Select the Use NTLMv2 check box to force MSDE connections to use the NTLMv2 protocol when
communicating with SQL servers that require NTLMv2 authentication. The default value of the
check box is selected.
The Use NTLMv2 check box does not interrupt communications for MSDE connections that do not
require NTLMv2 authentication.
Use SSL
Select this check box to enable SSL encryption for the protocol.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
32
Description
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
33
Description
From the list, select Juniper Networks Network and Security Manager.
Protocol Configuration
Type an IP address, host name, or unique name to identify the log source.
IP
Type the IP address or host name of the Juniper Networks NSM server.
Inbound Port
Type the inbound port to which the Juniper Networks NSM sends events.
The valid range is 0 to 65536. The default is 514.
Select this check box to use the Juniper NSM management server IP address instead of the log
source IP address. By default, the check box is selected.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease
the magnitude value of an offense.
34
Description
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within
a short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing of a
device support module (DSM).
From the list box, select the use condition for the log source extension. The options include:
Groups
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
35
5. Click Save.
6. On the Admin tab, click Deploy Changes.
Related
Documentation
Description
Protocol Configuration
Log
Server IP
Server Port
Select this check box if you want to use the LEA servers IP
address instead of the managed devices IP address for a
log source.
By default, the check box is selected.
36
Description
Authentication Type
From the list box, select the authentication type you want
to use for this LEA configuration. The type selected must
match the authentication method used by the server. The
options include sslca, sslca_clear, or clear.
Specify Certificate
Certificate Filename
Type the directory path of the certificate you want to use for
this configuration. This option only appears if Specify
Certificate is selected.
Certificate Authority IP
OPSEC Application
Enabled
37
Description
Credibility
Select the target for the log source. When a log source
actively collects events from a remote source, this field
defines which appliance polls for the events.
The target event collector enables administrators to poll and
process events on the target event collector, instead of the
console appliance. Distributing event across target event
collectors can improve performance in distributed
deployments.
Coalescing Events
Select this check box to enable the log source to store the
payload information from an event.
New and automatically discovered log sources inherit the
value of this check box from the System Settings
configuration on the Admin tab. Administrators can use this
check box to override the default behavior of the system
settings for an individual log source.
38
Description
From the list box, select the use condition for the log source
extension. The options include:
Related
Documentation
39
Description
Protocol Configuration
Type an IP address, host name, or name to identify the SDEE event source.
IP addresses or host names are suggested as they identify a unique value for the event source.
URL
Administrators with SDEE/CIDEE (Cisco IDS v5.x and above), the URL must end with
/cgi-bin/sdee-server.
Administrators with RDEP (Cisco IDS v4.x), the URL must end with /cgibin/ event-server.
Username
Password
Events / Query
Force Subscription
Severity Filter
Event Filter
40
Select a check box for each severity level the log source can subscribe to and collect with the log
source.
Informational
Low
Medium
High
Select a check box for each severity level the log source can subscribe to and collect with the log
source.
Alerts
Status
Errors
Type the time interval to indicate the frequency with which the subscription can collect events.
The time interval is defined in seconds.
Connection Retry On
Failure
Type a time interval to indicate how long the subscription must wait before another subscription
is attempted. The wait time interval is defined in seconds.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events created by a log source. The
credibility value assigned to a log source can increase or decrease based on incoming events or
adjusted as a response to user created event rules. The credibility of events from log sources
contributes to the calculation of the offense magnitude and can increase or decrease the magnitude
value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
41
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing of a
device support module (DSM).
From the list box, select the use condition for the log source extension. The options include:
Groups
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
Description
42
Description
Protocol Configuration
Type an IPv4 address or host name to identify the log source that created the events.
If the network contains devices that are attached to a management console, administrators can
specify the IP address of the individual device that created the event. A unique identifier for each,
such as an IP address, prevents event searches from identifying the management console as the
source for all of the events.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab.
Administrators can use this check box to override the default behavior of the system settings for
an individual log source.
43
Description
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
44
Description
Protocol Configuration
Type an IPv4 address or hostname to identify the log source that created the events.
If the network contains devices that are attached to a management console, administrators can
specify the IP address of the individual device that created the event. A unique identifier for each,
such as an IP address, prevents searches from identifying the management console as the source
for all of the events.
Community
Type the SNMP community name required to access the system containing SNMP events. The
default is Public.
This options allows the SNMP event payload to be constructed using namevalue pairs instead of
the standard event payload format.
Including OIDs in the event payload is required for processing SNMPv2 or SNMPv3 events when
you select specific log sources from the Log Source Types list. For more information, see the JSA.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
45
Description
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the X
configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the X
configuration on the Admin tab.
Administrators can use this check box to override the default behavior of the system settings for
an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
46
Related
Documentation
Description
Protocol Configuration
Type an IPv4 address or hostname to identify the log source that created the events.
If the network contains devices that are attached to a management console, administrators can
specify the IP address of the individual device that created the event. A unique identifier for each,
such as an IP address, prevents event searches from identifying the management console as the
source for all of the events.
Authentication Protocol
Authentication Password
From the list, select the algorithm you want to use to authenticate SNMP traps. The options
include:
MD5
SHA
Decryption Protocol
From the list box, select the protocol you want to use to decrypt SNMP traps.The default is AES256.
Decryption Password
Type the password used to decrypt SNMP traps. The password can be up to 64 characters in
length.
47
Description
User
Type the user access for this protocol. The default is AdminUser.
The username can be up to 255 characters in length.
This options allows the SNMP event payload to be constructed using namevalue pairs instead of
the standard event payload format.
Including OIDs in the event payload is required for processing SNMPv2 or SNMPv3 events when
you select specific log sources from the Log Source Types list. For more information, see the JSA.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
48
Description
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing of a
device support module (DSM).
From the list box, select the use condition for the log source extension. The options include:
Groups
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
49
Description
Protocol Configuration
Type an IP address, host name, or name to identify the Sourcefire Defense Center event source.
IP addresses or host names are suggested as they identify a unique value for the event source.
Server Address
Server Port
Type the port number JSA uses to receive Sourcefire Defense Center Estreamer events. The default
is 8302.
Keystore Filename
Type the directory path and file name for the keystore private key and associated certificate.
By default, the import script creates the keystore file in the following directory:
/opt/qradar/conf/estreamer.keystore.
Truststore Filename
Type the directory path and file name for the truststore files.
The truststore file contain the certificates trusted by the client.
By default, the import script creates the truststore file in the following directory:
/opt/qradar/conf/estreamer.truststore.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
50
Description
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
From the list box, select the use condition for the log source extension. The options include:
Groups
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
51
Description
Protocol Configuration
Type an IPv4 address or host name to identify the log source that created the events.
If the remote source contains multiple devices, such as a file repository, administrators must specify
the IP address of the device that created the event.
Unique identifiers ensure that events are associated to the correct device in the network, instead of
identifying the event for the management console or file repository.
52
Description
Service Type
From the list box, select the protocol to use when retrieving log files from a remove server. The options
include:
Type the IP address or host name of the device that contains the event log files.
Remote Port
Type the port that is used to communicate with the remote host. The valid range is 1 65535. The
options include:
If the remote host uses a non-standard port number, administrators must adjust the port value to
retrieve events.
Remote User
Type the user name necessary to log in to the host that contains the event files.
Remote Password
Confirm Password
Type the path to the SSH key, if the system is configured to use key authentication.
When an SSH key file is used, the Remote Password field is ignored.
Remote Directory
Type the directory location on the remote host from which the files are retrieved. The directory path
is relative to the user account that is used to log in.
NOTE: For FTP only. If the log files are in the remote users home directory, you can leave the remote
directory blank. A blank remote directory field supports systems where a change in the working
directory (CWD) command is restricted.
Recursive
Select this check box to enable the file pattern to search sub folders. By default, the check box is
clear.
This option is ignored for SCP file transfers.
Type the regular expression (regex) required to identify the files to download from the remote host.
All files that match the regular expression are included in the download.
This field applies to the SFTP or FTP file transfers.
For SCP file transfers, type the name of the file on the remote host.
53
Description
From the list box, select the transfer mode for the log source:
BinarySelect this option for log sources that require binary data files or compressed archive files.
ASCIISelect ASCII for log sources that require an ASCII FTP file transfer.
Administrators must select NONE in the Processor field and LINEBYLINE in the Event Generator
field for ASCII transfers over FTP.
Start Time
Type the time of day for the log source to start the file import.
This parameter functions with the Recurrence value to establish when and how often the Remote
Directory is scanned for files.
Recurrence
Type a time interval to determine how frequently the remote directory is scanned for new event log
files. The minimum value is 15 minutes.
The time interval can include values in hours (H), minutes (M), or days (D). For example, a recurrence
of 2H scans the remote directory every 2 hours.
Run On Save
Select this check box to start the log file import immediately after the administrators saves the log
source.
After the first file import, the log file protocol follows the start time and recurrence schedule that is
defined by the administrator.
When selected, this check box clears the list of previously downloaded and processed files.
EPS Throttle
Type the number of Events Per Second (EPS) that the protocol cannot exceed.
The valid range is 100 5000.
Processor
If the files on the remote host are stored in an archive format, select the processor that is required to
un-compress the event log.
Ignore Previously
Processed File(s)
Select this check box to track files that were processed by the log source.
This option prevents duplicate events from files that are processed a second time.
This check box applies to FTP and SFTP file transfers.
Change Local
Directory?
Select this check box to define the local directory on the Target Event Collector to store event logs
before they are processed.
Administrators can leave this check box clear for more configurations.
Local Directory
Type the local directory on the Target Event Collector. This option is used with the Change Local
Directory field.
The directory must exist before the log file protocol attempts to retrieve events.
54
Description
Event Generator
From the Event Generator list box, select one of the following options:
LineByLineEach line of the file is processed as a single event. For example, if a file has 10 lines of
text, 10 separate events are created.
HPTandemThe file is processed as a HPTandem NonStop binary audit log. Each record in the
log file (whether primary or secondary) is converted into text and processed as a single event.
HPTandem audit logs use the following file name pattern: [aA]\d{7}.
WebSphere Application ServerProcesses event logs for WebSphere Application Server. The
remote directory must define the file path that is configured in the DSM.
W3CProcesses log files from sources that use the w3c format. The header of the log file identifies
the order and data that is contained in each line of the file.
Fair WarningProcesses log files from Fair Warning devices that protect patient identity and
medical information. The remote directory must define the file path to the event logs that are
generated by the Fair Warning device.
DPI Subscriber DataThe file is processed as a DPI statistic log produced by a Juniper Networks
MX router. The header of the file identifies the order and data that is contained in each line of the
file. Each line in the file after the header is formatted to a tab-delimited name=value pair event.
SAP Audit LogsProcess files for SAP Audit Logs to keep a record of security-related events in
SAP systems. Each line of the file is formatted to be processed.
Oracle BEA WebLogicProcesses files for Oracle BEA WebLogic application log files. Each line of
the file is formatted to be processed.
Juniper SBRProcesses event log files from Juniper Steel-belted RADIUS. Each line of the file is
formatted to be processed.
ID-Linked MultilineProcesses multiline event logs that contain a common value at the start of
each line in a multiline event message. This option uses regular expressions to identify and
reassemble the multiline event in to single event payload.
File Encoding
From the list box, select the character encoding that is used by the events in your log file.
Folder Separator
Type the character that is used to separate folders for your operating system. The default value is /.
Most configurations can use the default value in Folder Separator field.
This field is intended for operating systems that use a different character to define separate folders.
For example, periods that separate folders on mainframe systems.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events created by a log source. The credibility
value assigned to a log source can increase or decrease based on incoming events or adjusted as a
response to user created event rules. The credibility of events from log sources contributes to the
calculation of the offense magnitude and can increase or decrease the magnitude value of an offense.
55
Description
Select the Event Collector to use as the target for the log source. When a log source actively collects
events from a remote source, this field defines which appliance polls for the events.
This enables administrators to poll and process events on the target event collector, instead of the
console appliance. This can improve performance in distributed deployments.
When an administrator verifies firewall ports between JSA and the remote database, the firewall
must allow communication between the target event collector and the remote database.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a short
time interval. Coalesced events provide administrators a way to view and determine the frequency
with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are displayed individually and the information is not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Optional. Select the name of the extension to apply to the log source.
This parameter is only available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing patterns
defined by a device support module (DSM).
Extension Use
Condition
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
56
4. Configure the parameters for the log source. The JSA provides step-by-step instructions
Related
Documentation
Systems that exceed 50 events per second (eps) can exceed the capabilities of this
protocol. WinCollect can be used for systems that exceed 50 eps.
A Juniper Secure Analytics (JSA) all-in-one installation can support up to 250 log
sources with the Microsoft Security Event Log protocol.
Dedicated Event Collectors can support up to 500 log sources with the Microsoft
Security Event Log protocol.
The Microsoft Security Event Log protocol is not suggested for remote servers that are
accessed over network links. For example, systems with high round-trip delay times, such
as satellite or slow WAN networks. Round-trip delay can be confirmed by examining
request and response time between a server ping. Network delays that are created by
slow connections decrease the EPS throughput available to those remote servers. In
addition, event collection from busy servers or Domain Controllers rely on low round-trip
delay times to keep up with incoming events. If it is not possible to decrease your network
round-trip delay time, administrators can use WinCollect to process Windows events.
The Microsoft Security Event Log supports the following software versions with the
Microsoft Windows Management Instrumentation (WMI) API:
57
Microsoft Windows XP
Microsoft Windows 7
Description
Protocol Configuration
Domain
Username
Type the user name that is required to access the Windows host.
Password
Confirm Password
Select a check boxes for each log type to monitor. At least one check box must be selected.
Event Types
58
Security
System
Application
DNS Server
Directory Service
Select a check boxes for each event type to monitor. At least one check box must be selected.
Informational
Warning
Error
Success Audit
Failure Audit
Description
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease
the magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
This enables administrators to poll and process events on the target event collector, instead of
the console appliance. This can improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within
a short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are displayed individually and the information is not
bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Optional. Select the name of the extension to apply to the log source.
This parameter is only available after you upload a log source extension to JSA. Log source
extensions are XML files that contain regular expressions, which can override or repair the event
parsing patterns defined by a device support module (DSM).
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
59
Description
Groups
Related
Documentation
Systems that exceed 50 events per second (eps) can exceed the capabilities of this
protocol. Win Collect can be used for systems that exceed 50 eps.
A Juniper Secure Analytics (JSA) all-in-one installation can support up to 250 log
sources with the Microsoft Security Event Log Custom protocol.
Dedicated Event Collectors can support up to 500 log sources with the Microsoft
Security Event Log Custom protocol.
The Microsoft Security Event Log protocol is not suggested for remote servers that are
accessed over network links. For example, systems with high round-trip delay times, such
60
Microsoft Windows XP
Microsoft Windows 7
Description
Protocol Configuration
Domain
Username
Type the user name that is required to access the Windows host.
Password
Confirm Password
61
Description
Event Types
Select a check boxes for each event type to monitor. At least one check box must be selected:
Enabled
Informational
Warning
Error
Success Audit
Failure Audit
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default
credibility is 5.
Credibility is a representation of the integrity or validity of events that are created by a log
source. The credibility value that is assigned to a log source can increase or decrease based on
incoming events or adjusted as a response to user created event rules. The credibility of events
from log sources contributes to the calculation of the offense magnitude and can increase or
decrease the magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
This option enables administrators to poll and process events on the target event collector,
instead of the console appliance. This can improve performance in distributed deployments.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the
System Settings configuration on the Admin tab. Administrators can use this check box to
override the default behavior of the system settings for an individual log source.
Optional. Select the name of the extension to apply to the log source.
This parameter is only available after you upload a log source extension to JSA. Log source
extensions are XML files that contain regular expressions, which can override or repair the event
parsing patterns defined by a device support module (DSM).
Groups
62
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
Description
63
Description
Protocol Configuration
Type an IP address, host name, or name to identify the Microsoft DHCP server.
The log source identifier must be unique for the log source type.
Domain
Optional. Type the domain that is required to access the Microsoft DHCP server.
Username
Type the user name that is required to access the Microsoft DHCP server.
Password
Type the password that is required to access the Microsoft DHCP server.
Confirm Password
Folder Path
File Pattern
Type the regular expression (regex) to identify and download the event logs.
The log files must contain a three-character abbreviation for a day of the week.
The available file patterns are:
Select this check box if you want the file pattern to search sub folders. By default, the check box
is selected.
Type the polling interval, which is the number of seconds between queries to the log files to check
for new data.
The minimum polling interval is 10 seconds, with a maximum polling interval of 3,600 seconds.
Throttle Events/Second
Type the maximum number of events the DHCP protocol can forward per second.
The minimum value is 100 EPS and the maximum value is 20,000 EPS.
Enabled
64
Description
Credibility
Select the credibility of the log source. The range is 0 (lowest) 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
This option enables administrators to poll and process events on the target event collector, instead
of the console appliance. This can improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are displayed individually and the information is not
bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Optional. Select the name of the extension to apply to the log source.
This parameter is only available after you upload a log source extension to JSA. Log source
extensions are XML files that contain regular expressions, which can override or repair the event
parsing patterns defined by a device support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
65
Related
Documentation
Description
66
Description
Protocol Configuration
Type an IP address, host name, or name to identify the Windows Exchange event source.
The log source identifier must be unique for the log source type.
Domain
Optional. Type the domain that is required to access the Microsoft Exchange server.
Username
Type the user name that is required to access the Microsoft Exchange server.
Password
Type the password that is required to access the Microsoft Exchange server.
Confirm Password
File Pattern
Type the regular expression (regex) to identify and download the event logs. The default is
.*\.(?:log|LOG).
All files that match the regex pattern are processed.
Select this check box to force the protocol to read the log file. By default, the check box is selected.
If the check box is clear, the log file is read only when JSA detects a change in the modified time
or file size.
Recursive
Select this check box if you want the file pattern to search sub folders. By default, the check box
is selected.
Type the polling interval, which is the number of seconds between queries to the log files to check
for new data.
The minimum polling interval is 10 seconds, with a maximum polling interval of 3,600 seconds.
67
Description
Throttle Events/Second
Type the maximum number of events the Exchange protocol can forward per second.
The minimum value is 100 EPS and the maximum value is 20,000 EPS.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease
the magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
This enables administrators to poll and process events on the target event collector, instead of
the console appliance. This can improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within
a short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are displayed individually and the information is not
bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Optional. Select the name of the extension to apply to the log source.
This parameter is only available after you upload a log source extension to JSA. Log source
extensions are XML files that contain regular expressions, which can override or repair the event
parsing patterns defined by a device support module (DSM).
68
Description
From the list box, select the use condition for the log source extension. The options include:
Groups
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
69
Detailed configuration steps for Microsoft IIS are provided in the Juniper Secure Analytics
(JSA).
Description
Protocol Configuration
Type an IP address, host name, or name to identify the Microsoft IIS server.
The log source identifier must be unique for the log source type.
Domain
Optional. Type the domain that is required to access the Microsoft IIS server.
Username
Type the user name that is required to access the Microsoft IIS server.
Password
Type the password that is required to access the Microsoft IIS server.
Confirm Password
Folder Path
File Pattern
Type the regular expression (regex) to identify and download the event logs.
The default file pattern is (?:u_)?ex.*\.(?:log|LOG).
All files that match the file pattern are processed.
Recursive
Select this check box if you want the file pattern to search sub folders. By default, the check box
is selected.
Type the polling interval, which is the number of seconds between queries to the log files to check
for new data.
The minimum polling interval is 10 seconds, with a maximum polling interval of 3,600 seconds.
Throttle Events/Second
Type the maximum number of events the IIS protocol can forward per second.
The minimum value is 100 EPS and the maximum value is 20,000 EPS.
Enabled
70
Description
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events created by a log source. The
credibility value assigned to a log source can increase or decrease based on incoming events or
adjusted as a response to user created event rules. The credibility of events from log sources
contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within
a short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing of a
device support module (DSM).
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for the log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Groups
71
Related
Documentation
Description
Protocol Configuration
Type an IP address, hostname, or name to identify the SMB Tail event source.
IP addresses or host names are suggested as they identify a unique value for the event source.
Server Address
Domain
Optional. Type the domain required for the SMB (samba) server.
Username
72
Description
Password
Confirm Password
File Pattern
Type the regular expression (regex) to identify and download the event logs.
All matching files are included in the processing.
Select this check box to force the protocol to read the log file. By default, the check box is selected.
If the check box is clear, the log file is read only when JSA detects a change in the modified time
or file size.
Recursive
Select this check box if you want the file pattern to search sub folders. By default, the check box
is selected.
Type the polling interval, which is the number of seconds between queries to the log files to check
for new data.
The minimum polling interval is 10 seconds, with a maximum polling interval of 3,600 seconds.
Throttle Events/Second
Type the maximum number of events the SMB Tail protocol forwards per second.
The minimum value is 100 EPS and the maximum value is 20,000 EPS.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events created by a log source. The
credibility value assigned to a log source can increase or decrease based on incoming events or
adjusted as a response to user created event rules. The credibility of events from log sources
contributes to the calculation of the offense magnitude and can increase or decrease the magnitude
value of an offense.
73
Description
Select the Event Collector to use as the target for the log source. When a log source actively
collects events from a remote source, this field defines which appliance polls for the events.
This enables administrators to poll and process events on the target event collector, instead of
the console appliance. This can improve performance in distributed deployments.
When an administrator verifies firewall ports between JSA and the remote database, the firewall
must allow communication between the target event collector and the remote database.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are displayed individually and the information is not
bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Optional. Select the name of the extension to apply to the log source.
This parameter is only available after you upload a log source extension to JSA. Log source
extensions are XML files that contain regular expressions, which can override or repair the event
parsing patterns defined by a device support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
74
Related
Documentation
Description
Protocol Configuration
Type the IP address or hostname for the log source. The value for this parameter must match the
VMware IP.
VMware IP
User Name
Password
Confirm the password that is required to remotely access the VMware Server.
75
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events created by a log source. The
credibility value assigned to a log source can increase or decrease based on incoming events or
adjusted as a response to user created event rules. The credibility of events from log sources
contributes to the calculation of the offense magnitude and can increase or decrease the magnitude
value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is only available after you upload a log source extension to JSA. Log source
extensions are XML files that contain regular expressions, which can override or repair the event
parsing patterns defined by a device support module (DSM).
Groups
76
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
Description
Protocol Configuration
Type an IP address, host name, or name to identify the Oracle database server.
The log source identifier must be unique for the log source type.
77
Description
Domain
Optional. Type the domain that is required to access the Oracle database server.
Username
Type the user name that is required to access the Oracle database server.
Password
Type the password that is required to access the Oracle database server.
Confirm Password
Type the directory path to access the Oracle database log files.
File Pattern
Type the regular expression (regex) to identify and download the event logs.
The default file pattern is listener\.log.
All files that match the file pattern are processed.
Recursive
Select this check box if you want the file pattern to search sub folders. By default, the check box
is selected.
Type the polling interval, which is the number of seconds between queries to the log files to check
for new data.
The minimum polling interval is 10 seconds, with a maximum polling interval of 3,600 seconds.
Throttle Events/Second
Type the maximum number of events the protocol can forward per second.
The minimum value is 100 EPS and the maximum value is 20,000 EPS.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease
the magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
This option enables administrators to poll and process events on the target event collector,
instead of the console appliance. This can improve performance in distributed deployments.
78
Description
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within
a short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are displayed individually and the information is not
bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing of a
device support module (DSM).
From the list box, select the use condition for the log source extension. The options include:
Groups
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
79
Description
Protocol Configuration
Type an IPv4 address or hostname to identify the log source that created the events.
If the network contains devices that are attached to a management console, administrators can
specify the IP address of the individual device that created the event. A unique identifier for each,
such as an IP address, prevents event searches from identifying the management console as the
source for all of the events.
Collector Port
Type the UDP port number used by Cisco ASA to forward NSEL events. The valid range of the
Collector Port parameter is 1 65535.
JSA uses port 2055 for flow data on QFlow Collectors. Administrators must assign a different UDP
port on the Cisco Adaptive Security Appliance for NetFlow using NSEL.
Enabled
80
Description
Credibility
Select the credibility of the log source. The range is 0 (lowest) 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
81
Related
Documentation
Configuring the IBM Tivoli Endpoint Manager SOAP Protocol on page 100.
Description
Protocol Configuration
Type an IP address, host name, or name to identify the Juniper Networks SRX Series appliance.
The log source identifier must be unique for the log source type.
82
Description
Specify the port number used by the Juniper Networks SRX Series appliance to forward incoming
PCAP data.
The PCAP UDP port number must be configured from your Juniper SRX Series appliance.
If the outgoing PCAP port is edited on the Juniper Networks SRX Series appliance, the administrator
must edit the log source.
To edit the Incoming PCAP Port number, complete the following steps:
1.
2. Click Save.
3. On the Admin tab, select Advanced > Deploy Full Configuration.
Attention: When administrators click Deploy Full Configuration, the system restarts all services,
resulting in a gap in data collection for events and flows until the deployment completes.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
This option enables administrators to poll and process events on the target event collector, instead
of the console appliance. This can improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are displayed individually and the information is not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
83
Description
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing patterns defined
by a device support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
Configuring the Juniper Security Binary Log Collector Protocol on page 90.
84
A is configured with an off-site target in the deployment editor, which points to console
B. Log sources that are automatically discovered are automatically added to console B.
Any log sources from console A that is not automatically discovered must be added to
console B as a log source with the forwarded protocol.
Description
Protocol Configuration
Enabled
85
Description
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. This can improve performance in distributed
deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are displayed individually and the information is not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Optional. Select the name of the extension to apply to the log source.
This parameter is only available after you upload a log source extension to JSA. Log source
extensions are XML files that contain regular expressions, which can override or repair the event
parsing patterns defined by a device support module (DSM).
Groups
86
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
Configuring the Juniper Security Binary Log Collector Protocol on page 90.
Configuring the IBM Tivoli Endpoint Manager SOAP Protocol on page 100.
Description
Protocol Configuration
Type the IP address or host name of the network device forwarding encrypted syslog.
87
Description
Type the new port number for the TLS syslog protocol.
2. Click Save.
3. On the Admin tab, select Advanced > Deploy Full Configuration.
Attention: When administrators click Deploy Full Configuration, the system restarts all services,
resulting in a gap in data collection for events and flows until the deployment completes.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are displayed individually and the information is not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
88
Description
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing patterns defined
by a device support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
After the log source is saved, a syslog-tls certificate is created for log source device. The
certificate must be copied to any device on your network that is capable of forwarding
encrypted syslog. Additional network devices with a syslogtls certificate file and the TLS
listen port number can be automatically discovered as a TLS syslog log source in JSA.
Related
Documentation
Configuring the Juniper Security Binary Log Collector Protocol on page 90.
Configuring the IBM Tivoli Endpoint Manager SOAP Protocol on page 100.
89
Description
Protocol Configuration
2. Click Save.
3. On the Admin tab, select Advanced > Deploy Full Configuration.
Attention: When administrators click Deploy Full Configuration, the system restarts all services,
resulting in a gap in data collection for events and flows until the deployment completes.
XML Template File
Location
Type the path to the XML file used to decode the binary stream from your Juniper SRX or Juniper
J-Series appliance.
By default, the device support module (DSM) includes an XML file for decoding the binary stream.
The XML file is in the following directory: /opt/qradar/conf/ security_log.xml.
90
Table 31: Juniper Security Binary Log Collector Protocol Parameters (continued)
Parameter
Description
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are displayed individually and the information is not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing patterns
defined by a device support module (DSM).
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
91
Table 31: Juniper Security Binary Log Collector Protocol Parameters (continued)
Parameter
Description
Groups
Related
Documentation
Configuring the IBM Tivoli Endpoint Manager SOAP Protocol on page 100.
Description
92
Description
Protocol Configuration
Type the IP address or host name of the network device forwarding encrypted syslog.
Listen Port
Type the port number to accept incoming UDP multiline Syslog events.
The default listen port is 517.
To edit the port number, complete the following steps:
1.
2. Click Save.
3. On the Admin tab, select Advanced > Deploy Full Configuration.
Attention: When administrators click Deploy Full Configuration, the system restarts all services,
resulting in a gap in data collection for events and flows until the deployment completes.
Message ID Pattern
Type the regular expression (regex) required to filter the event payload messages.
The UDP multiline event messages must contain a common identifying value that repeats on each
line of the event message.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
93
Description
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are listed individually and the information is not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing patterns that
are defined by a device support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
After the log source is saved, a syslog-tls certificate is created for log source device. The
certificate must be copied to any device on your network configured to forward encrypted
syslog. Additional network devices with a syslog-tls certificate file and the TLS listen port
number can be automatically discovered as a TLS syslog log source.
94
Related
Documentation
Configuring the Juniper Security Binary Log Collector Protocol on page 90.
Configuring the IBM Tivoli Endpoint Manager SOAP Protocol on page 100.
06/13/2012 08:15:15 PM
Log Name=Security
Source Name=Microsoft Windows security auditing.
Event Code=5156
Event Type=0
Task Category=Filtering Platform Connection
Keywords=Audit Success
Message=The Windows Filtering Platform permitted a connection.
Process ID: 4
Application Name: System
Direction: Inbound
Source Address: 1.1.1.1
Source Port: 80
Destination Address: 1.1.1.12
Destination Port:444
Description
Protocol Configuration
Type the IP address or host name of the network device forwarding encrypted syslog.
95
Description
Listen Port
Type the port number to accept incoming TCP multiline syslog events.
The default listen port is 12468.
To edit the port number, complete the following steps:
1.
2. Click Save.
3. On the Admin tab, select Advanced > Deploy Full Configuration.
Attention: When administrators click Deploy Full Configuration, the system restarts all services,
resulting in a gap in data collection for events and flows until the deployment completes.
Event Formatter
No FormattingSelect this option when no extra formatting is required for the multiline events.
Windows MultilineSelect this option for multiline events are formatted specifically for Windows.
Type the regular expression (regex) required to identify the start of a TCP multiline event payload.
Syslog headers typically begin with a date or time stamp.
The protocol can create a single-line event that are based on solely an event start pattern, such as
a time stamp.
When a start pattern is all that is available, the protocol captures all the information between each
start value to create a valid event.
Type the regular expression (regex) required to identify the last field of a TCP multiline event payload.
If the syslog event ends with the same value, administrators can use a regular expression to determine
the end of an event.
The protocol can capture events based on solely on an event end pattern.
When an end pattern is all that is available, the protocol captures all the information between end
start value to create a valid event.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log sources
contributes to the calculation of the offense magnitude and can increase or decrease the magnitude
value of an offense.
96
Description
Select the target for the log source. When a log source actively collects events from a remote source,
this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, the events are displayed individually and the information is not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the default
behavior of the system settings for an individual log source.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are XML
files that contain regular expressions, which can override or repair the event parsing patterns defined
by a device support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
97
5. Click Save.
6. On the Admin tab, click Deploy Changes.
Related
Documentation
Configuring the Juniper Security Binary Log Collector Protocol on page 90.
Configuring the IBM Tivoli Endpoint Manager SOAP Protocol on page 100.
Description
Protocol Configuration
Type an IPv4 address or host name to identify the log source that created the events.
vCloud URL
Type the URL configured on the VMware vCloud appliance to access the REST API.
The URL must match the address that is configured as the VCD public REST API base URL on the
vCloud Server.
For example, https://1.1.1.1.
User Name
Type the user name that is required to remotely access the vCloud Server.
For example, console/user@organization.
To configure a read-only account to use with the vCloud Director protocol, administrators can
create a user in the organization with console Access Only permission.
Password
98
Confirm the password that is required to remotely access the vCloud Server.
Description
Polling Interval
Type a polling interval, which is the amount of time between queries to the vCloud Server for new
events.
The default polling interval is 10 seconds.
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
99
Description
From the list box, select the use condition for the log source extension. The options include:
Groups
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Related
Documentation
Configuring the Juniper Security Binary Log Collector Protocol on page 90.
Configuring the IBM Tivoli Endpoint Manager SOAP Protocol on page 100.
Description
100
Table 35: IBM Tivoli Endpoint Manager SOAP Protocol Parameters (continued)
Parameter
Description
Protocol Configuration
Type the IP address or host name of the network device forwarding encrypted syslog.
Use HTTPS
Select this check box to connect to your IBM Tivoli Endpoint Manager with HTTPS.
If a certificate is required to connect with HTTPS, administrators must copy any certificates that
are required to the following directory: /opt/qradar/conf/ trusted_certificates.
Certificates with the following file extensions: .crt, .cert, or.der are supported.
Administrators must copy certificates to the trusted certificates directory before the log source is
saved and deployed.
SOAP Port
Type the port number used to connect to the IBM Tivoli Endpoint Manager using the SOAP API.
By default, port 80 is the port number for communicating with IBM Tivoli Endpoint Manager.
If administrators use HTTPS, the port field must be updated appropriately.
Most configurations use port 443 for HTTPS communications.
Username
Password
Confirm Password
Enabled
Credibility
Select the credibility of the log source. The range is 0 (lowest) - 10 (highest). The default credibility
is 5.
Credibility is a representation of the integrity or validity of events that are created by a log source.
The credibility value that is assigned to a log source can increase or decrease based on incoming
events or adjusted as a response to user created event rules. The credibility of events from log
sources contributes to the calculation of the offense magnitude and can increase or decrease the
magnitude value of an offense.
Select the target for the log source. When a log source actively collects events from a remote
source, this field defines which appliance polls for the events.
The target event collector enables administrators to poll and process events on the target event
collector, instead of the console appliance. Distributing event across target event collectors can
improve performance in distributed deployments.
101
Table 35: IBM Tivoli Endpoint Manager SOAP Protocol Parameters (continued)
Parameter
Description
Coalescing Events
Select this check box to enable the log source to coalesce (bundle) events.
Coalescing events increase the event count when the same event occurs multiple times within a
short time interval. Coalesced events provide administrators a way to view and determine the
frequency with which a single event type occurs on the Log Activity tab.
When this check box is clear, events are viewed individually and events are not bundled.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select this check box to enable the log source to store the payload information from an event.
New and automatically discovered log sources inherit the value of this check box from the System
Settings configuration on the Admin tab. Administrators can use this check box to override the
default behavior of the system settings for an individual log source.
Select the language of the events that are generated by the log source.
The log source language helps the system parse events from external appliances or operating
systems that can create events in multiple languages.
Optional. Select the name of the extension to apply to the log source.
This parameter is available after a log source extension is uploaded. Log source extensions are
XML files that contain regular expressions, which can override or repair the event parsing of a device
support module (DSM).
Groups
From the list box, select the use condition for the log source extension. The options include:
Parsing enhancementSelect this option when most fields parse correctly for your log source.
Parsing overrideSelect this option when the log source is unable to correctly parse events.
Administrators should copy certificates to the trusted certificates directory before the
log source is saved and deployed.
5. Click Save.
6. On the Admin tab, click Deploy Changes.
102
Related
Documentation
Configuring the Juniper Security Binary Log Collector Protocol on page 90.
103
104
CHAPTER 3
105
The log source list refreshes to show log sources associated to the group.
Related
Documentation
The log sources are reassigned to the group selected by the administrator.
Related
Documentation
106
The log source list refreshes with a list of log sources based on the group you selected.
Related
Documentation
The log source list refreshes to show log sources associated to the group.
Related
Documentation
107
108
5. Click Remove.
6. Click OK.
109
110
CHAPTER 4
111
Related
Documentation
112
CHAPTER 5
Log sources that properly parse the event. Events that a properly parse by the system
are assigned to the proper log source type and categorized correctly. In this case, no
intervention or extension is required.
2. Log sources that parse events, but include Unknown events. Unknown events are log
source events where the log source type is identified, but the payload information
cannot be understood by the DSM. The system is unable to determine an event
identifier from the available information to properly categorize the event. In this case,
the event can be mapped to a category from the Log Activity tab or a log source
extension can be written to repair the event parsing for unknown events.
113
3. Log sources that cannot identify the log source type and mark the event as a Stored
event. Stored events require administrators to update their DSM files or write a log
source extension to properly parse the event. After the event parses, the administrator
can then map the events in the Log Activity tab.
Before a log source extension is added, the administrator must create the extension
document. The extension document is an XML document that can be created with any
common word processing or text editing application. Multiple extension documents can
be created, uploaded, and associated to various log source types. The format of the
extension document must conform to a standard XML schema document (XSD). To
develop an extension document, knowledge of and experience with XML coding is required.
Related
Documentation
Description
Extension Name
Description
The description for the log source extension. The description must not exceed 255 characters.
Enabled
A value of True indicates that the extension is enabled and the parsing patterns are active for
the log source. False indicates that the log source extension is currently disabled.
The log source extension applies parsing from the extension XML file to all Log Source Types
listed in this column. This includes auto discovered log sources that match the Log Source Type
specified.
A value of None indicates that the extension is uploaded, but not associated to a log source.
114
Related
Documentation
Option
Description
Parsing Enhancement
Select this option when the device support module (DSM) correctly parses most fields for the
log source.
The incorrectly parsed field values are enhanced with the new XML values. This is the default
setting.
Parsing Override
Select this option when the device support module (DSM) is unable to parse correctly.
The log source extension completely overrides the failed parsing by the DSM and substitutes
the parsing with the new XML values.
115
7. From the Log Source Types list, select one of the following options:
Option
Description
Available
Select this option when the device support module (DSM) correctly parses most fields for the log
source.
The incorrectly parsed field values are enhanced with the new XML values. This is the default setting.
Select log sources to add or remove from the extension parsing. Administrators can add or remove
extensions from a log source.
When a log source extension is Set to default for a log source, this indicates that any new log sources
of the same Log Source Type use the assigned log source extension. This includes auto discovered
log sources.
proper extension file is uploaded. The extension file is evaluated against the XSD for
errors when the file is uploaded.
10. Click Save.
If the extension file does not contain any errors, the new log source extension is created
and enabled. It is possible to upload a log source extension without applying the extension
to a log source. Any change to the status of an extension is applied immediately and
managed hosts or consoles enforce the new event parsing parameters in the log source
extension.
On the Log Activity tab, the parsing patterns for events should be verified to ensure that
the parsing is applied correctly to your events. If the log source categorizes events as
Stored, then this indicates that the parsing pattern in the log source extension requires
adjustment. The administrator can review the extension file against log source events
to locate any event parsing issues.
Related
Documentation
116
Administrators can review or replace the extension before they save the changes.
7. Click Save.
The new log source extension is created and enabled. It is possible to upload a log source
extension without applying the extension to a log source. Any change to the status of an
extension is applied immediately to the log source and managed hosts or consoles
enforce the new event parsing parameters in the log source extension.
On the Log Activity tab, the parsing patterns for events should be verified to ensure that
the parsing is applied correctly to your events. If the log source categorizes events as
Stored, then this indicates that the parsing pattern in the log source extension requires
adjustment. The administrator can review the extension file against log source events
to locate any event parsing issues.
Related
Documentation
117
Option
Description
Parsing Enhancement
Select this option when the device support module (DSM) correctly parses most fields for the
log source.
The incorrectly parsed field values are enhanced with the new XML values. This is the default
setting.
Parsing Override
Select this option when the device support module (DSM) is unable to parse correctly.
The log source extension completely overrides the failed parsing by the DSM and substitutes
the parsing with the new XML values.
8. From the Log Source Types list, select one of the following options:
Option
Description
Available
Select this option when the device support module (DSM) correctly parses most fields for the log
source.
The incorrectly parsed field values are enhanced with the new XML values. This is the default setting.
Select log sources to add or remove from the extension parsing. Administrators can add or remove
extensions from a log source.
When a log source extension is Set to default for a log source, this indicates that any new log sources
of the same Log Source Type use the assigned log source extension. This includes auto discovered
log sources.
proper extension file is uploaded. The extension file is evaluated against the XSD for
errors when the file is uploaded.
11. Click Save.
If the extension file does not contain any errors, the log source extension is copied to
another log source and enabled. Any change to the status of an extension is applied
immediately and managed hosts or consoles enforce the new event parsing parameters
in the log source extension.
On the Log Activity tab, the parsing patterns for events should be verified to ensure that
the parsing is applied correctly to your events. If the log source categorizes events as
Stored, then this indicates that the parsing pattern in the log source extension requires
adjustment. The administrator can review the extension file against log source events
to locate any event parsing issues.
118
Related
Documentation
to delete.
4. Click Enable/Disable.
The status column is updated with the current status of the log source extension. Any
change to the status of an extension is applied immediately to the log source and
managed hosts or consoles enforce the new event parsing parameters in the log source
extension.
Related
Documentation
119
to delete.
4. Click Delete.
5. Click Yes to confirm the deletion of the extension.
New events are written to disk based on the default patterns of the device support module
(DSM) or another extension that might be applied to the log source.
Related
Documentation
120
PART 2
Index
121
122
T
technical support
contacting JTAC.................................................................x
Index
Symbols
#, comments in configuration statements.....................ix
( ), in syntax descriptions.......................................................ix
< >, in syntax descriptions...................................................viii
[ ], in configuration statements...........................................ix
{ }, in configuration statements..........................................ix
| (pipe), in syntax descriptions............................................ix
B
braces, in configuration statements..................................ix
brackets
angle, in syntax descriptions......................................viii
square, in configuration statements.........................ix
C
comments, in configuration statements.........................ix
conventions
text and syntax................................................................viii
curly braces, in configuration statements.......................ix
customer support......................................................................x
contacting JTAC.................................................................x
D
documentation
comments on....................................................................ix
F
font conventions.....................................................................viii
M
manuals
comments on....................................................................ix
P
parentheses, in syntax descriptions..................................ix
S
support, technical See technical support
syntax conventions................................................................viii
123