Symantec Security Expressions Server manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97

Ir a la página of

Buen manual de instrucciones

Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones Symantec Security Expressions Server. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica Symantec Security Expressions Server o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.

¿Qué es un manual de instrucciones?

El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual Symantec Security Expressions Server se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.

Desafortunadamente pocos usuarios destinan su tiempo a leer manuales Symantec Security Expressions Server, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.

Entonces, ¿qué debe contener el manual de instrucciones perfecto?

Sobre todo, un manual de instrucciones Symantec Security Expressions Server debe contener:
- información acerca de las especificaciones técnicas del dispositivo Symantec Security Expressions Server
- nombre de fabricante y año de fabricación del dispositivo Symantec Security Expressions Server
- condiciones de uso, configuración y mantenimiento del dispositivo Symantec Security Expressions Server
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas

¿Por qué no leemos los manuales de instrucciones?

Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de Symantec Security Expressions Server no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de Symantec Security Expressions Server y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico Symantec en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de Symantec Security Expressions Server, como se suele hacer teniendo una versión en papel.

¿Por qué vale la pena leer los manuales de instrucciones?

Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo Symantec Security Expressions Server, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.

Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual Symantec Security Expressions Server. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.

Índice de manuales de instrucciones

  • Página 1

    SecurityExpressions Server User Guide[...]

  • Página 2

    [...]

  • Página 3

    iii Table Of Contents Contacti ng Us .................................................................................................................. .... 1 Technical Support .............................................................................................................. .. 3 Contacting Tec hnical Su pport ..........................[...]

  • Página 4

    SecurityExpressions Server User Guide iv Policy File Librar y ............................................................................................................ 18 Library Synchr onization ................................................................................................ 18 About Policy Files ................................[...]

  • Página 5

    Table Of Contents v Device Type Scopes ..................................................................................................... 39 IP Range Scopes ......................................................................................................... 39 Machine List Scop es.............................................................[...]

  • Página 6

    SecurityExpressions Server User Guide vi Adding Po licies ............................................................................................................ 57 Editing Po licies ............................................................................................................ 58 Deleting Po licies ...............................[...]

  • Página 7

    Table Of Contents vii Adding a New Audit Resu lts Report Profil e ..................................................................... 81 Editing Audit Report Results Pr ofile s .............................................................................. 83 Deleting Audit Report Results Pr ofile s ................................................[...]

  • Página 8

    [...]

  • Página 9

    1 Contacting Us Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 USA http://www.symantec.com Technical Support[...]

  • Página 10

    [...]

  • Página 11

    3 Technical Support Symantec Technical Support maintains support cent er s globally. Technical Support’s primary role is to respond to specific queries about product fe atures and functi onality. The Technical Support group also creates content for our onlin e Know ledge Base. The Te chnica l Support group works collaboratively with the other fun[...]

  • Página 12

    [...]

  • Página 13

    5 Other Products SecurityExpressions Console This product enables you to quickly and effective ly loc k down Windows system s using guidelines similar to ones established by Microsoft, NSA, SANS, and other s. Use it to verify the security settings on local and rem ote systems across your enterprise. See how well your systems are protected by comp a[...]

  • Página 14

    [...]

  • Página 15

    7 Overview About SecurityExpressions Audit & Compliance Server SecurityExpressions Audit & Complianc e Server is a Web-based application that runs on a server with Microsoft IIS and an ASP.NE T infrastructure installed. From a Web brow ser on any computer, you can securely perform most audi t and compliance functions, such as audit scheduli[...]

  • Página 16

    [...]

  • Página 17

    9 Self-Service Audit What is Self-Service Auditing? Self-service auditing lets anyone audit just th eir local Windows computer. Typically, a person performing self-service audits is not a Security Expressions user, but must have administrator privileges on the computer they're auditing. A design ated Web p age gives self-service auditors acces[...]

  • Página 18

    SecurityExpressions Server User Guide 10 check your system again st several policy files during one audit. If the administrator of this product created an Audit-on-Connect scope th at contains your system, you may u se this method to start an audit on your sy stem. Audit results are automatically record ed for review and reporting. If the administr[...]

  • Página 19

    11 Configure Servers About Server Configuration Before you can audit syste ms using the server a pplication, you must configure server settings. From fundamental settings such as database c onne ction and policy-file-library synchronizati on to specific settings that drive scheduled and Audit-on-C onnect, the Settings tab provides a central locatio[...]

  • Página 20

    SecurityExpressions Server User Guide 12 Viewing Audit Results SecurityExpressions genera tes audit results throug h th e following kinds of audits. To view results from each kind of audit, a user need s rights to view results from key configurable items (m achine lists, policies, and scopes) involved in the audit. The configurable items to which a[...]

  • Página 21

    Configure Servers 13 We recommend you don’t use SQL Server's master datab ase as the SecurityExpressions database. To establish a valid database connection: 1. In the Database Type drop-down list, select the manu facturer of the database software you use. 2. In the Database Server Name box, type the name of the computer containing the databa[...]

  • Página 22

    SecurityExpressions Server User Guide 14 If the system on which you installed the serv er software is not running Windows 2000 Server, skip this procedure. 1. On the Windows 2000 server, open Control Panel and double-click Administrative Tools and then Internet Information Services to open the IIS Administrative Panel. 2. In the Web Site folder, ri[...]

  • Página 23

    Configure Servers 15 Once you create a credential store, you can't modify i t. To create a credential stor e: 1. In the Application Setup page, click Add New . 2. In the New Credential Store User Name box, type a user name for logging in to this credential store. 3. Optional: In the New Credential Store User Fu ll Name box, type a descriptive [...]

  • Página 24

    SecurityExpressions Server User Guide 16 Session Duration Session duration is a time-out period that sets the m aximum number of minutes for a Web session. The session lasts until this time passes or a d ifferent Browser accesses the server. When t he sess ion exp ires, local s ession infor matio n, incl uding a uthen ticat ion, is lost. Many setti[...]

  • Página 25

    Configure Servers 17 Item Rights The Item Rights option s, found on the Page Access page, let you list which Windows User Groups are allowed to do the following: Edit Private Items Allow others to modify items that are norm ally exclusive to the user who created them, such as My Machine Lists and scheduled tasks. Miscellaneous Target Usually, the V[...]

  • Página 26

    SecurityExpressions Server User Guide 18 When you schedule an audit, you can specify which computer s to audit by selecting machine lists created on the My Machine Lists page and machine lists created in the console ap plication (global machine lists). You can grant or restrict access to My Machin e Lists and the results from audits using them with[...]

  • Página 27

    Configure Servers 19 To check for frequent policy file updates, you may ch oose to Check for policy file updates during a specific time period (days, minutes, hours). If updates exist, they will be downloaded for the SecurityExpressi ons Audit & Compliance Server to use. Check Now updates the policy files immediately. 3. Click Update to store t[...]

  • Página 28

    SecurityExpressions Server User Guide 20 (weighted total of OK results ÷ (weighted total of OK rules + weighted total of Not OK rules)) × 100 Example An audit contains four rules: • 1 High Priority • 1 Medium Priority • 1 Low Priority • 1 no priority or impact, and no Weight key exists The weight values are: • High:1.5 • Medium:1.0 ?[...]

  • Página 29

    Configure Servers 21 3. Agent - Uses the audit age nt to remotely execute scripts and progr ams. Before auditing, make sure to install the agent on the remote computer or check the Automatically install Agent if requir ed in order to execute scripts and programs remotely box. Automatically install Agent if required to execute scripts and programs r[...]

  • Página 30

    SecurityExpressions Server User Guide 22 Database Cleanup The database stores da ta about audits, as well as console and server events. You might decide that it is unnecessary to use database space to retain this data per m anently . The Database Cleanup settings allow you to automatically delete data from the database on a schedule. You can also u[...]

  • Página 31

    Configure Servers 23 target for every week, month, ye ar, or overall. If you select Yearly, for example, the databa se will retain the l ast audit performed on every policy file and on every target audited for every year you've audited using this database. Because cleanups occur nigh tly, th e last audit saved during the current year could pot[...]

  • Página 32

    SecurityExpressions Server User Guide 24 Clean Now Click this button to perform an unschedu led cleanup on audit data. Then click Delete to confirm the action or Cancel to cancel it. Self-Service Audit Agreement An organization may require the acceptance of corporate agr eement text before allowing an audit. Your organization can customize an agr e[...]

  • Página 33

    Configure Servers 25 Select this check box to enable SecurityExpressi ons' Web-services layer. To learn more abou t the Web-services layer, see SecurityExpressions Web Services API guide , included in your installation package. Allow Remediation Select this check box to allow Web-services re mediati on functions to apply fixes to computers aud[...]

  • Página 34

    [...]

  • Página 35

    27 Audit-On-Connect What is Audit-on-Connect? Audit-on-Connect is an opt i onal fe ature of Secu rityExpressions A udit & Compliance Server that is sold separately. It enables you to audit systems as they connect to the netw ork rather than on a fixed schedule. This allows you to audit system s that might not be regularly or predictably connect[...]

  • Página 36

    SecurityExpressions Server User Guide 28 scope or scheduled task . Description Optional statement about the policy. Policy File Name of the policy file (.sif), from the policy file library or a customized policy file. Last Updated Date and time the policy file was last saved to the database. Configure Some policy files, such as the NSA Guidelines f[...]

  • Página 37

    Audit-On-Connect 29 to control how often a system gets audi ted — as long as a posture result remains v ali d, the software won't attempt to audit a system if it connects t o the n etwork again. Instead, it returns a posture result of Pass. Cache Fail For (Audit-On-Connect Only) Specify how long posture results remain valid when the system f[...]

  • Página 38

    SecurityExpressions Server User Guide 30 policy. This establishes which users can access thi s policy and its audit results due to their rol e. If a Windows User Group isn't on the l ocal computer, you'll need to enter the group in domaingroupname format. • In the Use Policy field, enter the Windows groups who should be able to modify [...]

  • Página 39

    Audit-On-Connect 31 6. Check the Policy is kept up to date with Policy File Library box if you want to regularly update the SIF files in this policy using the policy file library avail able on line. This option is available onl y if the server can access a Policy File Library. 7. If you want the policy to be available to use in audits, check th e M[...]

  • Página 40

    SecurityExpressions Server User Guide 32 1. The name for the new rule must be .CONFIGURE. 2. The check type can be blank, or you can type CONFIGURE. 3. In the Parameters tab, the Config parameter is set to .CONFIGURE (Config=.CONFIGURE). When you set the Config key, the WizParams tab appears. On this tab you can type text using the Wiz Params synta[...]

  • Página 41

    Audit-On-Connect 33 and modify the .CONFIGURE rule. When you create a new Policy and select an associated polic y file, the server application determines if a .CON FIGURE rule exi sts and displays prompts for modifications. This rule may require synchronizat ion between the datab ase and the policy file. To synchronize the database and the new file[...]

  • Página 42

    SecurityExpressions Server User Guide 34 All scope types except Expr ession c an accept as many values as you wa nt to enter, listing one value per line. Scope t y pe Expre ssion only accepts one expre ssion. 6. Indicate if the network link speed of the syst ems in this sc ope are Unspecified, Slow or Fast. If all systems in the scope use a fast co[...]

  • Página 43

    Audit-On-Connect 35 Device Connect Notifications - Sends selected notific ati ons when a device is detected in this Scope, regardless of audit po sture. This value m ay be blank. Pass Notifications - Sends selected notifi cation s if the audit's group posture result is Pass. Fail Notifications - Sends selected notifications if the audit's[...]

  • Página 44

    SecurityExpressions Server User Guide 36 • notifications • Windows Group access Credential Precedence: If your organization uses the console application and someone delegated one or more database ma chine lists to the server application , and if one of the systems identified in this scop e is also listed in one of those database machine lists, [...]

  • Página 45

    Audit-On-Connect 37 blank. Pass Notifications Notificat ions to run when the Group Posture of an audit in this scope is PASS. This v alue may be blank. Fail Notifications Notificatio ns to run when the Group Posture of an audit in this Scope is FAIL. This value may be bl ank. Error Notifications Notificat ions to run when the Group Posture of an au[...]

  • Página 46

    SecurityExpressions Server User Guide 38 Supported Functions Function Argument Description iprange a valid IP range Returns TRUE if the target computer is a member of the IP range. domain a windows domain in Netbios or DNS format Returns TRUE if the target computer is a member of the windows domain. machinelist a database machine list created using[...]

  • Página 47

    Audit-On-Connect 39 Audits can detect systems on the ne twork usin g the following methods: DHCP, EVENTLOG, NAC, self-service (for self-service audits). A system matches this scope if the conn ection monitor used to connect to it matc hes th e value entered. Device Type Scopes Lets you indicate a kind of syst em to audi t. Choices are Windo ws, UNI[...]

  • Página 48

    SecurityExpressions Server User Guide 40 Creating New Command Notifications To create a new command notification: 1. Click Add New . 2. Provide a Notification Name , a customized name of the notification to appear in the table. 3. Select Command as the Type . 4. Type the Command to run, which may be a URL. Include the command Arguments. You can pas[...]

  • Página 49

    Audit-On-Connect 41 To edit a Notification, click the Edit hyperlink on the Notifications table to select the row to edit. Make the necessary modification s and cl ick Update . To Edit an email notification, ma ke the necessary m odifications to: • Notification Name • To – person receiving the notification . This address appears as the Value [...]

  • Página 50

    SecurityExpressions Server User Guide 42 To create a new command notification: 1. Click Add New in the Notifications page. 2. Provide a Notification Name, a customized na me of the notification to appear in the table. 3. Select Command as the Type. 4. Type the Command to run, which may be a URL. Include the command Arguments. You can pass variables[...]

  • Página 51

    Audit-On-Connect 43 A Subject or Message may contain text such as "L ate st SecurityExpressions audit locat ed at %RESULTLINK%." Exceptions Exceptions Exceptions prevent certain syst ems from ever getti ng audited, even if they fall wi thin a scope. When a system connect s to the network, the server soft ware checks all scopes to see if t[...]

  • Página 52

    SecurityExpressions Server User Guide 44 To edit Exceptions: 1. Click the Edit hyperlink on the Exceptions table to select the row to edit. 2. Modify the Exception parameters ( Type , Value , Expiration Date , Group Posture Result ) 3. Click Update . Deleting Exceptions To delete an Exception: 1. Click the Edit hyperlink on the Exceptions table to [...]

  • Página 53

    Audit-On-Connect 45 Specify and confirm a password. SecurityExpressi ons Audit & Compliance Server generates an encrypted password that you must add the to t he configuration files for each of the Connection Monitors. Include the encrypted password in the [Options] section of the configuration file wi th the Password option. Settings for DHCP P[...]

  • Página 54

    SecurityExpressions Server User Guide 46 Password = AES: cb789817f8d99c7e5a1e5beb8510bf71 Once you enable the connection monitor , it can be processed at any time. Connection Monitor Configuration File Connection Monitors use a text file named dmconfig.txt that resides in the same directory as the Connection Monitor (Program FilesAltirisSecuri t[...]

  • Página 55

    Audit-On-Connect 47 Comma-Separated List of Servers Includes the names of the audit servers . A comma separates each server n ame. Options The Options section of the configuration file contains any settings needed to control the Connection Monitors, such as en abling logging an d identifying the location and name of the log file. Port The port you [...]

  • Página 56

    SecurityExpressions Server User Guide 48 Active Directory (Active Directory Connection Monitor only) Set the Active Directory (event log) monitoring options. IncludeAllDomainControllers Retrieves names of all Domain Contr ollers on the Domain system where the m onitor resides and monitors the event logs of all Domain C ontrollers. One (1) is the de[...]

  • Página 57

    Audit-On-Connect 49 DistributionMethod=Round Robin Comment=Home office ip addresses [IP_RANGE_2] IPRange=10.0.2.0:254 AuditServers=server3,server1,server2 DistributionMethod=First Available Comment=California office ip's [Default] IPRange=Default AuditServers=server1,server2 DistributionMethod=Round Robin Comment=Catch anything not explicitly [...]

  • Página 58

    SecurityExpressions Server User Guide 50 Enabling slow link detection might extend processing time. Trace Route Information Trace route is a TCP/IP utility that allows the user to determine the route th at packets are taking to a particular host. Your notifications can includ e a tr ace route if you select thi s optional setting, Make trace route i[...]

  • Página 59

    Audit-On-Connect 51 A managed system is a system on the network that the server sof tware can connect to and audit using the appropriate credentials. It i s a target system or potential target system. Initial Token Sends the posture token you sel ect to ACS if a system receives a posture result of Fail. Both Managed and Unmanaged Network Access Dev[...]

  • Página 60

    SecurityExpressions Server User Guide 52 A read-only line that reminds you to configure ACS so that NAD red irects users who try to connect to the network from quarantined syst ems to the URL listed. Redirection Web Page Behavior Select the information and resources th e redirection Web page should provide to users on quarantined systems if URL red[...]

  • Página 61

    Audit-On-Connect 53 To trace Audit on Connect activity: 1. Determine when the suspect activity will start and how long it will take to finish. 2. When the suspect activity is about to b egin, type the hours and minutes you expect the activity to take in the Run AOC Trace for fields and cl ick Start Trace . If you type 0 hours and 0 minutes, the tra[...]

  • Página 62

    [...]

  • Página 63

    55 Audit-On-Schedule What is Audit-on-Schedule? Audit-on-Schedule is an auditing method that au dits a group of systems at scheduled interval s. You create a scheduled task that audits all system s in a machine list based on a policy. When the audit is finished, the task can send notification s indicating the audit is done and where to view audit r[...]

  • Página 64

    SecurityExpressions Server User Guide 56 Description Optional statement about the policy. Policy File Name of the policy file (.sif), from the policy file library or a customized policy file. Last Updated Date and time the policy file was last saved to the database. Configure Some policy files, such as the NSA Guidelines for Wind ows XP and Windows[...]

  • Página 65

    Audit-On-Schedule 57 posture result remains v ali d, the software won't attempt to audit a system if it connects t o the n etwork again. Instead, it returns a posture result of Pass. Cache Fail For (Audit-On-Connect Only) Specify how long posture results remain valid when the system fails an audit based on this policy . This is a way to contro[...]

  • Página 66

    SecurityExpressions Server User Guide 58 a Windows User Group isn't on the l ocal computer, you'll need to enter the group in domaingroupname format. • In the Use Policy field, enter the Windows groups who should be able to modify the policy. • In the Remediate field, enter the Windows group s who should be able to remediate audit re[...]

  • Página 67

    Audit-On-Schedule 59 This option is available onl y if the server can access a Policy File Library. 7. If you want the policy to be available to use in audits, check th e Make this policy active box. Clear the check box to make the policy unavailab le t o use in audits without deleting the policy. 8. If you want to policy to be available to use in [...]

  • Página 68

    SecurityExpressions Server User Guide 60 3. In the Parameters tab, the Config parameter is set to .CONFIGURE (Config=.CONFIGURE). When you set the Config key, the WizParams tab appears. On this tab you can type text using the Wiz Params syntax that control s the available text, input options, and parameters to modify in the Wizar d . 4. View the Wi[...]

  • Página 69

    Audit-On-Schedule 61 modifications. This rule may require synchronizat ion between the datab ase and the policy file. To synchronize the database and the new file, save the policy file in the datab ase with a new name with new parameters for the .CONFIGURE rule, if previously saved in the database. Notifications Notifications You can opt to receive[...]

  • Página 70

    SecurityExpressions Server User Guide 62 The group posture result i s %GROUPPOSTURER ESULT%. Click here for the report: %RESUL TLIN K% 5. Select Attach trace route information for Audit-on-Connect for the message body to include the trace route. The message body alwa y s includes a link to the report for the audit that caused this notification. 6. [...]

  • Página 71

    Audit-On-Schedule 63 folder. 5. Click Add New . Creating New Email Notifications To create a new email notification: 1. Click Add New . 2. Provide a Notification Name, a customized na me of the notification to appear in the table. 3. Select Email as the Type. 4. Complete the following email informatio n: To – person receiving the notification . T[...]

  • Página 72

    SecurityExpressions Server User Guide 64 The following three variables will only return a value i f statistics are available: %COUNTPROBLEMS% - number of error s encountered during the audit %COUNTRULES% - number of rules used to audit th e machine list %SCORE% - the overall score resulting from the audi t The following four variables will only ret[...]

  • Página 73

    Audit-On-Schedule 65 Windows Group Use A cce ss Windows User Groups who can use this machine list. Windows Group Resul ts Access Windows User Groups who can view results from audits using this machine list. Adding Machine Lists To create a machine list: 1. Click the Audit-On-Schedule tab and then the My Machine Lists link. 2. Click the Add button t[...]

  • Página 74

    SecurityExpressions Server User Guide 66 Make sure you type the system n ames or IP addresses correctly. If you did not type a system's name or address correctly or somehow entered an invalid syst em, the audit skips the system and moves on to the next system in th e list. 5. Set Windows Group Acces s . Enter Windows gr oups, separated by a co[...]

  • Página 75

    Audit-On-Schedule 67 The Scheduled Tasks table contains the following information: Column Description Run Now/Stop/Initializing Click this button to start or st op the task in this row. This column also displays "Initial izing" when a task is in the middle of a process. Edit Click this link to edit the task in this row. Delete Click this [...]

  • Página 76

    SecurityExpressions Server User Guide 68 Policies page. Only the policies to which you have Use acce ss rights appear for sel ection . Access rights for individual policies are set in the Windows Group Access options on the Policies page. If you can't find a policy you need t o use, ask the policy 's creator to add you to one of the Windo[...]

  • Página 77

    Audit-On-Schedule 69 Run Once – The scheduled task execu tes once on this day and does not repeat. In the calendar, choose the date on which you want to run the task. Run Weekly – The task executes once every week on the day(s) you select. C heck the days of the week on which you want to r un the task. Run Monthly – The task executes only dur[...]

  • Página 78

    SecurityExpressions Server User Guide 70 restart would take. B. If you want to set a time limit on how long the ta sk can attempt reaudits, type the number of hours you want to allot for reaudi ts in the Attempt re-audit for this many hours after initial audit box. A reaudit cycle could go on indefinitely if a system i s off or never connects. Sett[...]

  • Página 79

    Audit-On-Schedule 71 15. If you want to use specific credential s to access all systems whenever this audit task runs, type those credenti als in the Login box. If you do not want to specify credential s, skip to step 18. 16. In the Password box, type the password of the credential s you specified in the previous step. 17. If you want to make sure [...]

  • Página 80

    SecurityExpressions Server User Guide 72 Only the machine lists to which you have Use ac cess rights appear for selection . Access rights are set in the Windows Group Access opti ons on the My Machine Lists page and the ML Access page (global ma chine lists). If you can't find a machine you need t o use, ask the machine list's creat or or[...]

  • Página 81

    Audit-On-Schedule 73 If you selected Not Scheduled in the previous step , th ese options don't appear. Notifications 9. If you want to send notifications when this sch eduled task executes, selec t one or more notifications from the Notifications list or the Console Notifications list. The Notifications list con tains the notifications created[...]

  • Página 82

    SecurityExpressions Server User Guide 74 A reaudit cycle could go on indefinitely if a system i s off or never connects. Limiting the number of times the task can attempt t o re audit systems keeps the reaudit cycl e from continuing indefinitely. Both steps B and C provide end points to th e reaudit cycle. You may use on e method or the other, or b[...]

  • Página 83

    Audit-On-Schedule 75 In the Edit Task field, enter the Windows grou ps who should be able to modify the task. In the Run Task field, enter the Wind ows groups who should be able to use the t ask to perform audits. To grant all users access, type Everyone . To restrict all users, type None . 19. Click the Update button to create this scheduled task [...]

  • Página 84

    [...]

  • Página 85

    77 View Audit-On-Connect Activity Browse Audit-On-Connect Activity Audit-On-Connect activity reports show Audit-On-Connect conn ection events as they were logg ed over time. Use these reports to trouble shoot and optimize Audit-on-Connect conf igurations. SecurityExpressions Audit & Compliance Serv er dynamically gener ates reports based on pre[...]

  • Página 86

    SecurityExpressions Server User Guide 78 2. Select one or more Detection Methods . The detec tion method identifies the Connection Monitor types. 3. Define filters that cause only certain events th at meet your criteria to display in the report. Click the links and set the criteria. You may set as many kinds of filters as you like. The report'[...]

  • Página 87

    View Audit-On-Connect Activity 79 2. When you delete a report p rofile, you remove it from the database. A warning appears to remind you that you are about to this particular rep ort profile from the database. Cancel the action or delete the rec ord. Audit-On-Connect Error Log Report The Audit-On-Connect Error Log Report displays th e errors for ea[...]

  • Página 88

    [...]

  • Página 89

    81 View Audit Results Browse Audit Results This page shows audit results in the f or m of report s. It features results from al most all kinds of auditing methods, including: • Audit-on-Schedule • Audit-on-Connect • self-service audits based on multiple policy files and Audit-on-Conn ect sc opes • audits performed on any consoles connected [...]

  • Página 90

    SecurityExpressions Server User Guide 82 • Data Grid - Generates a highly interactive HTML report with lots of opportuni ties to drill down. Click the links and set the criteria. Y ou m ay set as many kinds of filters as you like. The report's contents are based on a combination of all filters you set. To learn more about the available filte[...]

  • Página 91

    View Audit Results 83 • Open or closed range beginning on a specific day - Includes in the report a r ange of connection activity starting on a sp ecific date. You may specify an end for the date range or let the report display all activity available after the starting date. • Relative range from the current date - Incl udes in th e report a ra[...]

  • Página 92

    [...]

  • Página 93

    85 Glossary # .CONFIGURE: Some policy files, such as the NSA Guidelines for Windows XP and Windows 2000, contains special rule named .CONFIGU RE. The .CONFIGURE r ule allows you to configure your policy files and set global parameters f or policy files at run time. A Active Directory Connection Monitor: Connection monitor for Active Directory domai[...]

  • Página 94

    SecurityExpressions Server User Guide 86 P policy: A Security Policy is a set of objectives, ru les of behaviour for users and administrators, and requirements for system configurati on and management th at collectively are designed to ensure Securit y of compute r systems in an organization. Priority: Importance of applying the rule. Priority may [...]

  • Página 95

    87 Index . .CONFIGURE............................... 31, 59, 66 .sif .................................................. 27, 55 A access and user ro les .................. 11, 16, 17 Active ................................................... 36 Active Directory Connection Monitor ........ 44 adding polic ies ................................. 29, 57 [...]

  • Página 96

    SecurityExpressions Server User Guide 88 H https ..................................................... 13 I IIS ........................................................ 13 IP addres s ............................ 33, 44, 45, 48 IP range ..................................... 36, 39, 48 L license key ............................................ 15 Li[...]

  • Página 97

    Index 89 rule weig hts........................................... 19 run-time policy variable .................... 31, 59 S scheduled audi ts ......................... 55, 66, 81 scheduled audi ts log ............................... 83 Scheduled tasks viewing .............................................. 71 Scheduled ta sks .................... 27[...]