security.ucdavis.edu

38
Tripwire Enterprise Tripwire Enterprise Server Network Nodes, Server Network Nodes, Reports, and Reports, and Dashboards Dashboards Vincent Fox and Doreen Vincent Fox and Doreen Meyer Meyer UC Davis, Information and UC Davis, Information and Educational Technology Educational Technology August 9, 2006 August 9, 2006

Transcript of security.ucdavis.edu

Page 1: security.ucdavis.edu

Tripwire Enterprise Tripwire Enterprise Server Network Nodes, Server Network Nodes, Reports, and Reports, and DashboardsDashboards

Vincent Fox and Doreen Vincent Fox and Doreen MeyerMeyer

UC Davis, Information and UC Davis, Information and Educational TechnologyEducational Technology

August 9, 2006August 9, 2006

Page 2: security.ucdavis.edu

Network Device NodeNetwork Device Node

A network device node can be A network device node can be any router, switch, firewall, load any router, switch, firewall, load balancer, or unix-compliant balancer, or unix-compliant systemsystem

Page 3: security.ucdavis.edu

Adding a Network Adding a Network Device NodeDevice Node

Page 4: security.ucdavis.edu

Adding a Network Adding a Network Device NodeDevice Node

Page 5: security.ucdavis.edu

Adding a Network Adding a Network Device NodeDevice Node

Page 6: security.ucdavis.edu

Adding a Network Adding a Network Device NodeDevice Node

Page 7: security.ucdavis.edu

Adding a Network Adding a Network Device NodeDevice Node

Page 8: security.ucdavis.edu

Adding a Network Adding a Network Device NodeDevice Node

Page 9: security.ucdavis.edu

Adding a Network Adding a Network Device NodeDevice Node

Page 10: security.ucdavis.edu

““Network Device” Network Device” RulesRules See User Guide p. 79See User Guide p. 79 Configuration File Rules – check Configuration File Rules – check

ONLY config files of many ONLY config files of many common hardware devices.common hardware devices.

COVR – Command Output COVR – Command Output Validation Rules. Useful to check Validation Rules. Useful to check any runtime aspect of a device.any runtime aspect of a device.

Example: netstat -nrExample: netstat -nr

Page 11: security.ucdavis.edu

DemoDemo

Vincent demo of network device Vincent demo of network device rules applied against a NetScreen rules applied against a NetScreen firewall and a UNIX system.firewall and a UNIX system.

Page 12: security.ucdavis.edu

ReportsReports

Use reports to identify trends and Use reports to identify trends and problem areas.problem areas.

Page 13: security.ucdavis.edu

Report ManagerReport Manager

Page 14: security.ucdavis.edu

Report GroupsReport Groups

Page 15: security.ucdavis.edu

Report Group Report Group PermissionPermission Any user can create a report. System report group: check box User report group: do not check

box System report group: user must

have ‘Manage System Reports’ permission

Page 16: security.ucdavis.edu

New Report New Report

Page 17: security.ucdavis.edu

Report TypesReport Types

Change process Change process compliancecompliance

Change rateChange rate Change varianceChange variance Change windowChange window Changed Changed

elementselements Frequently Frequently

changed nodeschanged nodes

Changes by node Changes by node or groupor group

Changes by Changes by severityseverity

Detailed changesDetailed changes Device inventoryDevice inventory ElementsElements Frequently Frequently

changed elementschanged elements

Page 18: security.ucdavis.edu

Report TypesReport Types

Last node check Last node check statusstatus

Missing elementsMissing elements Monitoring policyMonitoring policy Nodes with Nodes with

changeschanges Reference node Reference node

variancevariance

System access System access controlcontrol

System logSystem log Unchanged Unchanged

elementselements User rulesUser rules

Page 19: security.ucdavis.edu

Change Variance Change Variance ReportReport

Page 20: security.ucdavis.edu

Report CriteriaReport Criteria

ActionsActions Change typesChange types ChartsCharts Compare nodesCompare nodes Current versionsCurrent versions ElementsElements FrequencyFrequency GeneralGeneral LinksLinks MessageMessage Message filterMessage filter

Message filterMessage filter NodeNode PackagesPackages Reference NodeReference Node RolesRoles RulesRules Severity ratingsSeverity ratings SortingSorting TasksTasks Time rangeTime range UsersUsers User namesUser names

Page 21: security.ucdavis.edu

Change Variance Change Variance CriteriaCriteria

Page 22: security.ucdavis.edu

Change Variance Change Variance CriteriaCriteria

Page 23: security.ucdavis.edu

Change Variance Change Variance CriteriaCriteria

Page 24: security.ucdavis.edu

Change Variance Change Variance CriteriaCriteria

Page 25: security.ucdavis.edu

Change Variance Change Variance CriteriaCriteria

Page 26: security.ucdavis.edu

Changes by SeverityChanges by Severity

Page 27: security.ucdavis.edu

Changes by Severity Changes by Severity CriteriaCriteria

Page 28: security.ucdavis.edu

Creating a Report TaskCreating a Report Task

Page 29: security.ucdavis.edu

Creating a Report TaskCreating a Report Task

Page 30: security.ucdavis.edu

Creating a Report TaskCreating a Report Task

Page 31: security.ucdavis.edu

Creating a Report TaskCreating a Report Task

Page 32: security.ucdavis.edu

DashboardsDashboards

Use Dashboards to monitor reports.Use Dashboards to monitor reports.

Page 33: security.ucdavis.edu

Creating a New Creating a New DashboardDashboard

Page 34: security.ucdavis.edu

Creating a New Creating a New DashboardDashboard

Page 35: security.ucdavis.edu

Creating a New Creating a New DashboardDashboard

Page 36: security.ucdavis.edu

Creating a New Creating a New DashboardDashboard

Page 37: security.ucdavis.edu

QuestionsQuestions

QuestionsQuestions Ongoing discussion formatOngoing discussion format EvaluationEvaluation

Page 38: security.ucdavis.edu

ContactsContacts

[email protected]@ucdavis.edu - class - class mailing listmailing list

Vincent Fox - Vincent Fox - [email protected]@ucdavis.edu Doreen Meyer - Doreen Meyer -

[email protected]@ucdavis.edu Bob Ono - Bob Ono - [email protected]@ucdavis.edu Paul Singh - [email protected] Singh - [email protected] Software - [email protected] - [email protected]