RSA Security Analytics ESA Configuration Guide
RSA Security Analytics ESA Configuration Guide
Trademarks
RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC
Corporation in the United States and/or other countries. All other trademarks used herein are the
property of their respective owners. For a list of EMC trademarks, go to
www.emc.com/legal/emc-corporation-trademarks.htm.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are
furnished under license, and may be used and copied only in accordance with the terms of such
license and with the inclusion of the copyright notice below. This software and the
documentation, and any copies thereof, may not be provided or otherwise made available to any
other person.
No title to or ownership of the software or documentation or any intellectual property rights
thereto is hereby transferred. Any unauthorized use or reproduction of this software and the
documentation may be subject to civil and/or criminal liability. This software is subject to
change without notice and should not be construed as a commitment by EMC.
Third-Party Licenses
This product may include software developed by parties other than RSA. The text of the license
agreements applicable to third-party software in this product may be viewed in the
thirdpartylicenses.pdf file.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an
applicable software license. EMC believes the information in this publication is accurate as of
its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC
CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND
SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Contents
Additional Procedures 16
Change Default Storage Passwords 16
Previous ESA Storage Password 17
Dependencies 17
Database Privileges 17
Change MongoDB Password for admin Account 18
Change ESA Storage Password 19
References 43
Services Config View Advanced Tab 43
Features 44
4
Event Stream Analysis Configuration Guide
5
Event Stream Analysis Configuration Guide
Prerequisites
Make sure that you:
l Install the Event Stream Analysis service in your network environment.
Procedure
Note: You can configure ESA using an SSL port (50030) only. There is no option to configure
a Non-SSL port.
Tasks Reference
1. You can discover, update or add the host on which Refer to "Step 1 : Add or Update a
the ESA service is installed. (Optional) If ESA is not Host" in the "Host and Services
set up, you need to add Event Stream Analysis as a
Getting Started Guide". Refer
core service and add the Event Stream
to Step 1. Add Event Stream Analysis
Analysis service to the host.
Service.
2. Apply license to the Event Stream Analysis service. Refer to "View Current Enti-
tlements" in the "Licensing Guide."
3. Add the Concentrator as data source to the Event Refer to Step 2. Add a Data Source
Stream Analysis service. to an ESA Service
5. Download Event Stream Analysis content using Refer to "Live Search View" in the
Live. "Live Resource Managment
Guide".
Tasks Reference
Result
The Event Stream Analysis service is configured and you can now add ESA Rules for event
processing and alerting. For information on adding ESA Rules, see "Add Rules to the Rule
Library" in the "Alerting Using ESA Guide."
Prerequisites
Ensure that you have installed an ESA service and added the host in Security Analytics. For
more information, see "Step 1: Add or Update a Host" in the "Host and Services Getting Started
Guide."
Procedure
To add the Event Stream Analysis service:
1. In the Security Analytics menu, select Administration > Services.
The services view is displayed.
Field Description
Host Select the host on which you want to install the ESA service.
Note: ESA can be configured using the SSL port 50030 only. You cannot
configure a Non-SSL port.
Entitle Select if you want to apply the entitlements currently configured to this
Service service.
Note: While adding the service, Security Analytics sends ICMP packets to the service to
verify if the hostname/ip address entered is valid for successful test connection.
Note: If the test is unsuccessful, edit the service information and retry.
Prerequisites
You must have one or more Concentrators configured in Security Analytics.
You must perform the following steps to add a data source:
l Add an Available Data Source
Procedures
Note: You can add a Log Decoder as a data source for ESA but RSA recommends you add a
Concentrator to take advantage of undivided aggregation as the Decoder may have other
processes aggregating from it.
3. Click .
5. Click Save.
Procedures
To access the Advanced view and configure advanced settings for an ESA service:
1. In the Security Analytics menu, select Administration > Services.
The Services view is displayed.
4. Select the Advanced tab.
The Advanced view is displayed.
In the Alert Engine section, you specify values to preserve events for rules that choose multiple
events.
Note: After you upgrade to 10.5, the Debug Rules option if enabled previously will be
disabled. You will need to enable this option after upgrade.
2. If you want alerts to be sent to Message Bus and Incident Management, select the Forward
Alerts On Message Bus option.
4. Click Apply to save the changes and put them into effect immediately.
Note: For more information on the parameters in the Alert Engine section, see Alert Engine
Settings in ESA Advanced View.
In the Event Stream Engine section, you specify details to improve performance.
The following figure shows the Event Stream Engine section.
2. Click Apply to save the changes and put them into effect immediately.
Note: For more information on the parameters in the Event Stream Engine section, see Event
Stream Engine Settings in ESA Advanced View.
Prerequisites
You must be running multiple ESAs and a Context Hub.
Procedure
Configure ESA to connect to the Context Hub on another ESA.
1. Note the IP address of the ESA that is running the context hub service.
2. From Administration > Services, select the ESA service that is not running the Context Hub
and then > View > Explore.
3. In the left hand panel, navigate to Service > ContextHub, then select
contextHubTransport.
4. Edit the Host field to point to the Domain name or IP address of the ESA that is running the
Context Hub service.
Result
The ESA connects to the Context Hub on another ESA service.
Additional Procedures
This topic is a collection of individual procedures, which an Administrator may perform at any
time and they are not required to complete the initial setup of ESA. These procedures are
presented in alphabetical order.
Use this section when you are looking for instructions to perform a specific task after the initial
setup of ESA.
l Change Default Storage Passwords
l Incident Management
l Data Science
The database in each module has an account to control access and each Security Analytics
service account has a default password.
To strengthen security, RSA recommends that you change default passwords. Some
organizations do not allow default passwords. In those cases, the procedures in this topic would
be required.
This topic explains how to change the default storage password for the database account in each
module.
Additional Procedures 16
Event Stream Analysis Configuration Guide
Dependencies
MongoDB has a master admin account that has privileges over the database accounts for
the ESA, IM and Data Science services.
Note: You must change the admin account password first. You can change passwords for the
services in any sequence.
ESA is a requirement for Incident Management and Data Science. The configuration for each
module points to the host that runs the ESA service. Databases for ESA, Incident Management
and Data Science are located on the host that runs the ESA service.
Database Privileges
The following figure shows the privileges assigned to each account during the installation or
upgrade process.
17 Additional Procedures
Event Stream Analysis Configuration Guide
Note: You must change the MondoDB admin account password first. You must enter it before
you can change the passwords for ESA, Incident Management and Data Science.
Prerequisites
Procedure
Additional Procedures 18
Event Stream Analysis Configuration Guide
Now you can change the password for the ESA, Incident Management and Data Science
services.
Prerequisites
Procedures
b. Log on as root.
3. Type the following command to change the ESA account password. The default pasword is
esa.
db.changeUserPassword(‘esa’,’<new_password>’)
19 Additional Procedures
Event Stream Analysis Configuration Guide
4. In the Explore view on the left, select Alert > Storage > configuration.
5. In the right panel, type the database account password in the ConnectionPassword field.
Note: The password for the database and for the Security Analytics service
configuration must be the same.
Additional Procedures 20
Event Stream Analysis Configuration Guide
If you do not see content in the Summary tab, revise the service password to match the
MongoDB password.
Prerequisites
Procedures
b. Log on as root.
3. Type the following command to change the Incident Management account password. The
default password is im.
db.changeUserPassword(‘im’,’{new_password}’)
21 Additional Procedures
Event Stream Analysis Configuration Guide
3. Select the Incident Management service, then > View > Explore.
5. In the right panel, type the database account password in the Password field.
Note: The password for the database and for the Security Analytics service
configuration must be the same.
6. Restart the Incident Management service to accept the password change and force the
session to start using the new password.
Additional Procedures 22
Event Stream Analysis Configuration Guide
If you do not see content in the Alerts tab, revise the service password to match the
MongoDB password.
Prerequisites
Procedures
b. Log on as root.
23 Additional Procedures
Event Stream Analysis Configuration Guide
Note: The password for the database and for the Security Analytics service
configuration must be the same.
6. To validate the new passwords match, execute a Report in Reporting Engine that
uses Warehouse Analytics.
Additional Procedures 24
Event Stream Analysis Configuration Guide
l When the memory threshold is exceeded, all trial rules running on the ESA are automatically
disabled.
l MemoryThresholdforTrialRules
For more information, see "Work with Trial Rules" in the "Alerting Using ESA Guide".
Prerequisites
A role with administrative privileges must be assigned to you.
25 Additional Procedures
Event Stream Analysis Configuration Guide
Procedure
1. Log on to Security Analytics as admin.
Additional Procedures 26
Event Stream Analysis Configuration Guide
l By database size
l By alert age
Configuration Parameters
The configuration parameters are as follows:
Parameter Description
27 Additional Procedures
Event Stream Analysis Configuration Guide
Parameter Description
Prerequisites
You must have Administrator permissions.
Procedure
1. Log on to Security Analytics as admin.
Additional Procedures 28
Event Stream Analysis Configuration Guide
5. In the Enabled field, select true to turn on the alert retention feature.
l By database size and alert age. If you configure both of these parameters, whichever rule
deletes the greater number of days is used.
7. Schedule
Use the schedule parameter to tell the ESA how frequently to run the alert maintenance job
(i.e. how frequently to check the database and apply the deletion rules). Use the syntax for a
Cron schedule job. For more information on Cron scheduling,
29 Additional Procedures
Event Stream Analysis Configuration Guide
see http://www.cronmaker.com.
Example
The maintenance status can also be monitored in the /opt/rsa/esa/logs/esa.log file on the ESA
service, which will display messages similar to the example below.
2015-03-12 09:46:48,197 [Carlos@65dd6c04-56] INFO
com.rsa.netwitness.carlos.config.ConfigurationMXBean -
MongoStorageMaintenance changed by admin
2015-03-12 09:46:51,121 [scheduler_Worker-1] INFO
com.rsa.netwitness.core.alert.dispatch.SQLStorageMaintenance -
Starting the scheduled database maintenance
job with policy {keepAlertForDays=30, maxDiskUsageInMb=5120}
2015-03-12 09:46:51,122 [Carlos@3801f0b3-58] INFO
com.rsa.netwitness.core.alert.dispatch.SQLStorageMaintenance -
Scheduled a database maintenance job with
policy {keepAlertForDays=30, maxDiskUsageInMb=5120} to run at 2/28/15
2:00 AM
2015-03-12 09:46:51,129 [Carlos@3801f0b3-58] INFO
com.rsa.netwitness.carlos.config.ConfigurationMXBean -
MongoStorageMaintenance changed by admin
2015-03-12 09:46:51,133 [scheduler_Worker-1] INFO
com.rsa.netwitness.core.alert.dispatch.SQLStorageMaintenance -
Finished the database maintenance job,
deleted 0 partitions, next run scheduled at 3/14/15 2:00 AM
Additional Procedures 30
Event Stream Analysis Configuration Guide
A memory pool is a customized implementation of virtual memory for events held by rules in
ESA. This helps in scaling the capability of rules by an order of magnitude. When you want to
create rules that cover a large time span or which are very complex, you may want to use a
memory pool to handle memory more efficiently. When you use a memory pool, instead of
holding all of the events in memory, they can be written to disk. This is helpful because when a
rule exists that is complex or extends over a long time frame, a large number of events must be
held in memory.
You can configure memory pool to run in non-batch mode or batch mode:
l Non-batch mode. In non-batch mode, events are written to disk as they enter the memory
pool. To configure non-batch mode, set the MapPoolBatchWriteSize attribute to 1. Non-
batch mode provides a more stable solution because each event is landed and fetched
separately without creating memory spikes.
l Batch mode. In batch mode, events are grouped into batches and then written to disk. To
configure batch mode, set the batch size attribute MapPoolBatchWriteSize to a value
greater than 1. Batch mode gives better performance since the disk activity for landing events
to disk are optimized.
Note: Any changes to these settings will require you to restart the ESA. When ESA restarts,
if any events are currently being held by the memory pool, they will be discarded upon restart.
Caution: While this feature can be very helpful in managing memory, it can impact the event
processing rate of the ESA. Performance can be affected from 10 to 30 percent, depending on
your rules and configuration settings.
Workflow
The following diagram shows the data flow using the memory pool for batch mode:
31 Additional Procedures
Event Stream Analysis Configuration Guide
1. Events are added to the memory pool and references to the events are stored in the memory
pool.
2. The events are then batched to be sent to disk (in non-batch mode, this step is skipped).
3. Once the batch has met the threshold, the events are written to disk (in non-batch mode no
threshold is required).
4. When the EPL requires an event that was written to disk, the event is sent to the cache and
used in the EPL rule.
Procedure
Complete the following steps to configure an ESA memory pool.
1. From Administration > Services, select your ESA service and then > View >
Explore.
Additional Procedures 32
Event Stream Analysis Configuration Guide
MapPoolEnable Enable or dis- The default value is false. Set the value to true
able the to enable the memory pool. Requires a restart
memory pool. when you enable or disable memory pool.
33 Additional Procedures
Event Stream Analysis Configuration Guide
Note: The effectiveness of this feature depends on your environment. If you write rules that
require frequent access of events over a period of time, this feature may degrade performance
with no or minimal improvement in scalability.
Note: Memory pool files get deleted when all the events held in the pool file are no longer
referenced by an EPL.
Additional Procedures 34
Event Stream Analysis Configuration Guide
Result
For a simple EPL rule, ESA typically improves memory approximately 8 to 9 times.
Caution: Although this feature increases accuracy, it impacts performance. The default
configuration of the ESA ensures that data is constantly streaming, but because Capture Time
Ordering uses a buffer, it takes longer to process events. This is especially true if the ESA
must pause for any length of time to wait for the buffer to fill. There are several parameters
you can configure (see below) to handle this situation; however, there may still be
performance impact.
35 Additional Procedures
Event Stream Analysis Configuration Guide
2. After Concentrator processing, events are buffered and ordered. The buffer size is
calculated via two parameters MaxEPSExpectedPerSource (the maximum volume of traffic
(EPS) you expect per source for the ESA to receive) times TimeOrderHoldWindow( the
amount of time to allow for events to arrive from all sources).
Prerequisites
Two or more Concentrators must be configured as a data source in ESA.
When the StreamEnabled parameter is set to true, it is important that all the machines running
Core Services should be in NTP Sync.
Procedures
The following procedures tell you how to enable and configure Capture Time Ordering.
Additional Procedures 36
Event Stream Analysis Configuration Guide
1. In the Security Analytics menu, select Administration > Services. Select your ESA service
and then > View > Explore.
4. Set the TimeOrdered attribute to true. This enables the buffered events to be ordered by
the time stamp from the Concentrator.
When you work with Capture Time Ordering, you need to configure several other parameters to
ensure performance. The following table shows parameters and their function. Configuring these
parameters requires knowledge of your traffic volume and rate.
Note: If you do not know your traffic volume or latency, consult with your Professional
Services representative before configuring this feature.
37 Additional Procedures
Event Stream Analysis Configuration Guide
Troubleshooting Tips
Using this feature, it is possible to encounter a situation where events become backlogged. To
fix this issue, you can perform one of the following options.
1. In the Security Analytics menu, select Administration > Services. Select your ESA service
and then > View > Explore.
2. Go to Workflow > Source > nextgenAggregationSource.
3. Set the StreamEnabled attribute to false.
Additional Procedures 38
Event Stream Analysis Configuration Guide
Position tracking allows ESA to track where it stopped processing events if the ESA stops or is
shut down. Position tracking is enabled by default with Capture Time Ordering. If you disable
position tracking, this allows ESA to skip the backlogged events. For example, if the ESA goes
down at 7:00 a.m., and you restart it at 11:00 a.m. with position tracking disabled, the ESA will
start processing events that occurred at 10:55 a.m. With position tracking enabled, the ESA will
start processing events at the point at which it stopped.
1. In the Security Analytics menu, select Administration > Services. Select your ESA service
and then > View > Explore.
2. Go to Workflow > Source > nextgenAggregationSource.
3. Set the PositionTrackingEnabled attribute to false.
If you disable Position Tracking, you will lose the backlogged data, but going forward, events
will be ordered by capture time.
Start ESA Service
Before you start:
l Make sure that MongoDB is running.
l If the MongoDB service is not running, use the following command to start the MongoDB
service:
service tokumx start
39 Additional Procedures
Event Stream Analysis Configuration Guide
Additional Procedures 40
Event Stream Analysis Configuration Guide
l Operation:Example:DELETE/CREATE/UPDATE RULE
l Epl Module Identifier: unique identifier for the rule. Example: 56e1f2adbee8290008241296
l Rule Enabled: Displays if the rule is enabled or not. Example: Rule Enabled: true
l Trial Rule: Displays if the rule is configured as a trial rule or not. Example: Trial Rule: false
Note: When a rule is disabled, two logs are generated for the same rule. First a ‘Delete
Rule’ [Rule enabled attribute = true] audit log is created, followed by a ‘Create Rule’ [Rule
enabled attribute =false] audit log.
41 Additional Procedures
Event Stream Analysis Configuration Guide
Verify MongoDB Version
To verify the MongoDB version:
1. Use ssh to connect to the ESA service and log in as the root user.
Additional Procedures 42
Event Stream Analysis Configuration Guide
References
This topic is a collection of references, which describe the user interface for ESA in Security
Analytics. These topics are presented in alphabetical order.
Use this section when you are looking for descriptions of the entitlements user interface and
definitions of the features of the user interface.
See the following sections for details:
l Services Config View Advanced Tab
43 References
Event Stream Analysis Configuration Guide
Features
The following are the sections in the Advanced view:
l Alert Engine
In the Alert Engine section, you specify values to preserve events for rules that choose multiple
events.
The following figure shows the Alert Engine section.
The following table lists the parameters in the Alert Engine section and their descriptions.
Parameter Description
Max Con- For rules that choose multiple events, this configuration value decides how
stituent many of the associated events are preserved. For example, if a rule fires an
Events alert with 200 associated events and this parameter is set to 100, only the first
100 are preserved by ESA, the rest are dropped. The default value is 100.
Forward To forward ESA alerts for Incident Management, you must select this option.
Alerts On The ESA alerts generated will be sent to the Message Bus and subsequently to
Message Incident Management. This option is selected by default. You may want to
Bus ensure that the Incident Management service is running.
References 44
Event Stream Analysis Configuration Guide
The following table lists the parameter in the Event Stream Engine section and its description.
Parameter Description
Max Pattern Certain rules require ESPER to maintain subexpressions in memory before
Subexpressions deciding to fire them or not. These subexpressions consume memory and if
left unchecked may cause the service to go down with memory exhaustion.
This parameter is a safety measure that keeps such memory hogging rules
under check. If a rule exceeds the specified number of subexpressions, its
processing is delayed. The default value is 0 which means this setting is dis-
abled. You must set a value if there are service stability issues.
45 References
Event Stream Analysis Configuration Guide
Features
The following are the sections in the Data Source tab:
l Toolbar
Toolbar
Parameter Description
Edits a data source. You must have the username and password credentials for
the service in order to make changes.
References 46
Event Stream Analysis Configuration Guide
Parameter Description
In the Data Source grid, all data sources which have been added to the ESA service are
displayed. The following table describes the parameters in the Data Source grid.
Parameter Description
47 References