Standard Content Guide: Network Monitoring
Standard Content Guide: Network Monitoring
Network Monitoring
Product Version
Description
06/28/2012
Contact Information
Phone
http://support.openview.hp.com
https://protect724.arcsight.com
Contents
Chapter 1: Network Monitoring Overview ........................................................................... 5
What is Standard Content? ............................................................................................... 5
Standard Content Packages .............................................................................................. 6
Network Monitoring Content ............................................................................................. 7
Supported Devices .................................................................................................... 7
Calculating Bytes In and Bytes Out .............................................................................. 8
Chapter 2: Installation and Configuration ......................................................................... 11
Installing the Network Monitoring Package ........................................................................ 11
Configuring Network Monitoring Content ........................................................................... 12
Configuring the SmartConnector to Aggregate Events .................................................. 12
Modeling the Network .............................................................................................. 13
Categorizing Assets ................................................................................................. 13
Enabling Rules ........................................................................................................ 14
Configuring Filters ................................................................................................... 14
Ensuring Filters Capture Relevant Data ...................................................................... 16
Configuring Notification Destinations .......................................................................... 17
Configuring Notifications and Cases ........................................................................... 17
Scheduling Reports ................................................................................................. 17
Configuring Trends .................................................................................................. 17
Chapter 3: Network Monitoring Content ............................................................................ 19
Bandwidth Usage .......................................................................................................... 20
Devices ................................................................................................................. 20
Resources .............................................................................................................. 20
Device Activity ............................................................................................................. 27
Devices ................................................................................................................. 27
Resources .............................................................................................................. 27
Hosts and Protocols ....................................................................................................... 34
Devices ................................................................................................................. 34
Configuration ......................................................................................................... 34
Resources .............................................................................................................. 34
SANS Top 5 Reports ...................................................................................................... 40
Devices ................................................................................................................. 40
Confidential
Resources .............................................................................................................. 40
Traffic Overview ............................................................................................................ 46
Devices ................................................................................................................. 46
Resources .............................................................................................................. 46
Appendix A: Upgrading Standard Content ......................................................................... 59
Preparing Existing Content for Upgrade ............................................................................ 59
Configurations Preserved During Upgrade ................................................................... 59
Configurations that Require Restoration After Upgrade ................................................. 59
Backing Up Existing Resources Before Upgrade ........................................................... 60
Performing the Upgrade ................................................................................................. 60
Checking and Restoring Content After Upgrade ................................................................. 60
Verifying and Reapplying Configurations ..................................................................... 61
Verifying Customized Content ................................................................................... 61
Fixing Invalid Resources .......................................................................................... 61
Index ...................................................................................................................................................... 63
Confidential
Chapter 1
Confidential
ArcSight System content is installed automatically with the Manager and consists of
resources required for basic security processing functions, such as threat escalation
and priority calculations, as well as basic throughput channels required for
out-of-the-box functionality.
security scenarios. Dependencies between these resources and the packages they
support are managed by the Package resource.
Anti-Virus content is a set of filters, reports, and report queries used by ArcSight
Foundations, such as Configuration Monitoring and Intrusion Monitoring.
Global Variables are a set of variables used to create other resources and to
provide event-based fields that cover common event information, asset, host, and
user information, and commonly used timestamp formats. The Global Variables
are used by ArcSight Administration and certain ArcSight Foundations.
Network filters are a set of filters required by ArcSight Administration and certain
ArcSight Foundations, such as Intrusion Monitoring and Network Monitoring.
Figure 1-1
The ArcSight System and ArcSight Administration packages at the base provide
content required for basic ArcSight functionality. The common packages in the center contain
shared resources that support ArcSight Administration and the ArcSight Foundation packages.
The packages shown on top are ArcSight Foundations that address common network security
and management scenarios.
Depending on the options you install, you will see the ArcSight System resources, the
ArcSight Administration resources, and some or all of the other package content.
The ArcSight Express package is present in ESM installations, but is not
installed by default. The package offers an alternate view of the Foundation
resources. You can install or uninstall the ArcSight Express package without
impact to the system.
Confidential
When creating your own packages, you can explicitly include or exclude system
resources in the package. Exercise caution if you delete packages that might
have system resources; for example, zones. Make sure the system resources
either belong to a locked group or are themselves locked. For more information
about packages, refer to the ArcSight Console Users Guide.
Supported Devices
The Network Monitoring content is built around feeds from the ArcSight SmartConnector
that collects events from Qosient Argus, which is a real-time flow monitor. It monitors all
network transactions seen in a data network traffic stream. For more information about
Qosient Argus, see http://www.qosient.com/argus/.
The Argus device detects a transaction from point A to point B and stores the information
in the following Argus-specific fields:
Confidential
Description
lasttime
srcaddr
source IP address
dstaddr
destination IP address
sport
dport
bytes
srcbytes
dstbytes
The ArcSight Argus SmartConnector maps this information to the correct fields in the ArcSight event schema, for example:
Argus event field
srcaddr
Attacker Address
dstaddr
Target Address
srcbytes
Bytes in
dstbytes
Bytes out
Figure 1-1
ArcSight variables ensure that Argus byte counts for bytes in and bytes out
correspond with the network notion of inbound traffic and outbound traffic.
To make sure that the byte counts for Argus bytes in and bytes out correspond with
your network's notion of outbound traffic and inbound traffic, ArcSight has constructed a
system of variables and filters that translate Argus bytes in and bytes out to traffic
inbound to and outbound from your network.
The ArcSight IncomingBytes and OutgoingBytes variables take the Argus byte count
of activity on the way out of the protected network and counts it as outbound traffic, and
Confidential
activity coming into the protected network as inbound traffic. In the A-to-B case, it considers the byte count for Argus bytes in to be outbound traffic and considers the byte count
for Argus bytes out to be inbound traffic. The A-to-C case matches: bytes in are counted
as inbound traffic, and bytes out are counted as outbound traffic.
In the example, if you add the total bytes out from the network's perspective (after the values have been normalized by the ArcSight variables), you add the byte counts for the two
red arrows, in this case, 8 + 3, or 11. And the byte total for the inbound traffic is the sum
of the two blue arrows: 4 + 5, or 9.
Confidential
Confidential
Chapter 2
In the Navigator panel Package view, navigate to the package you want to install.
When the installation is complete, review the summary report and click OK.
The package resources are fully installed to the ArcSight database, the resources are
fully enabled and operational, and available in the Navigator panel resource tree.
In the Navigator Panel Package view, navigate to the package you want to uninstall.
Confidential
To delete a package and remove it from the Console and the database:
1
In the Navigator Panel Package view, navigate to the package you want to delete.
Target port
Attacker IP
Target IP
Bytes in
3331
80
1.1.1.1
2.2.2.2
Confidential
Attacker port
Target port
Attacker IP
Target IP
Bytes in
3332
80
1.1.1.1
2.2.2.2
3333
80
1.1.1.1
2.2.2.2
15
3334
80
1.1.1.1
2.2.2.2
NULL
80
1.1.1.1
2.2.2.2
29
This reduces the number of individual events that the system has to process, which
improves performance and efficiency.
The Argus administrator can perform this aggregation on the Argus device
itself using a RAGATOR script and a configuration file that specifies the fields
you want to aggregate, those you want to nullify, and those you want to sum.
Categorizing Assets
After you have populated your network model with assets, apply the standard asset
categories to activate most of the standard content that uses these categories.
Categorize all assets (or the zones to which the assets belong) that are internal to the
network with the /All Asset Categories/Site Asset Categories/
Address Spaces/Protected category.
Internal Assets are assets inside the company network. Assets that are not categorized
as internal to the network are considered to be external. Make sure that you also
categorize assets that have public addresses but are controlled by the organization
(such as web servers) as Protected.
Assets with a private IP address (such as 192.168.0.0) are considered
Protected by the system, even if they are not categorized as such.
Categorize all assets that are considered critical to protect (including assets that host
proprietary content, financial data, cardholder data, top secret data, or perform
functions critical to basic operations) with the /All Asset Categories/System
Asset Categories/Criticality/High or Very High category.
The asset categories most essential to basic event processing are those used by the
Priority Formula to calculate the criticality of an event. Asset criticality is one of the
four factors used by the Priority Formula to generate an overall event priority rating.
For more about the Priority Formula and how it leverages these asset categories to
help assign priorities to events, refer to the ArcSight Console Users Guide or the ESM
101 guide.
Confidential
If you have created your own asset categories that are relevant to the top traffic
dashboards, you can add those asset categories to the corresponding filter in All
Filters/ArcSight Foundation/Network Monitoring/Application
Filters).
Asset categories can be assigned to assets, zones, asset groups, or zone groups. If
assigned to a group, all resources under that group inherit the categories.
You can assign asset categories individually using the Asset editor or in a batch using the
Network Modeling wizard. For information about how to assign asset categories using the
Console tools, refer to the ArcSight Console Users Guide or the online Help.
Enabling Rules
ESM rules trigger only if they are deployed in the Real-Time Rules group and are
enabled. All of the Network Monitoring rules are deployed by default in the Real-Time
Rules group and are also enabled.
To disable a rule:
1
In the Navigator panel, go to Rules and navigate to the Real-time Rules group.
Configuring Filters
If you use only Argus, you do not need to perform this procedure.
The events that trigger the Network Monitoring content are controlled by the filters in the
Connector Filters group (\All Filters\ArcSight Foundation\Network
Monitoring\Connector Filters).
If you use a real-time flow monitoring device other than Argus, that device must also
report Attacker, Target, Ports, Bytes in and Bytes out. You can then configure the
SmartConnector filters to operate on events from that device.
If you have multiple network reporting devices, verify that any overlapping
address spaces are defined through their own ArcSight network.
This procedure creates a new filter based on the Qosient Argus filter for each reporting
device relevant to your network environment.
1
Copy the Qosient Argus filter: click and drag the filter into the same group; when
prompted Do you want to make a copy of this resource? select Yes.
Modify the copy to reflect your network monitoring device and vendor.
a
Open the copy in the Inspect/Edit panel. On the Attributes tab, rename the copy
to indicate the name of your network reporting device; for example, Cisco
NetFlow.
Confidential
On the Filter tab in the Event conditions window, double-click the condition
Device Product = Argus [ignore case]. Delete Argus and type in the
name of your device as your device reports it to the ArcSight SmartConnector; for
example, NetFlow. Click OK.
Repeat Step a through Step c for each of your network monitoring devices.
Confidential
Modify the Network Traffic Reporting Devices filter to point to the filter(s) you created
in Step 2.
a
Open the Network Traffic Reporting Devices filter in the Inspect/Edit panel.
On the Filter tab in the Event conditions window, select event1 and click the OR
operator ( ).
Select the OR operator and select Paste from the Edit menu.
Repeat Step 3 for each network monitoring filter you want to add. If you do not
have Argus, you can remove the Qosient Argus filter from the OR statement
(select it and press the Delete key).
Generate or identify the required events and verify that they are being processed by
viewing them in an active channel or query viewer.
Navigate to the appropriate filter, right-click the filter and choose Create Channel
with Filter. If you see the events of interest in the newly created channel, the filter is
functioning properly.
If you do not see the events of interest:
a
Verify that the configuration of the active channel is suitable for the events in
question. For example, ensure that the event time is within the start and end time
of the channel.
Modify the filter condition to capture the events of interest. After applying the
change, repeat Step 2 to verify that the modified filter captures the required
events.
Confidential
Scheduling Reports
You can run reports on demand, automatically on a regular schedule, or both. By default,
reports are not scheduled to run automatically.
Evaluate the reports that come with Network Monitoring, and schedule the reports that are
of interest to your organization and business objectives. For instructions about how to
schedule reports, refer to the ArcSight Console Users Guide or the ESM online Help.
Configuring Trends
Trends are a type of resource that can gather data over longer periods of time, which can
be leveraged for reports. Trends streamline data gathering to the specific pieces of data
you want to track over a long range, and breaks the data gathering up into periodic
updates. For long-range queries, such as end-of-month summaries, trends greatly reduce
the burden on system resources. Trends can also provide a snapshot of which devices
report on the network over a series of days.
Network Monitoring content includes several trends, which are disabled by default. These
disabled trends are scheduled to run on an alternating schedule between the hours of
midnight and 7:00 a.m., when network traffic is usually less busy than during peak daytime
business hours. These schedules can be customized to suit your needs using the Trend
scheduler in the ArcSight Console.
Confidential
To enable a trend, go to the Navigator panel, right-click the trend you want to enable and
select Enable Trend.
To enable a disabled trend, you must first change the default start date in
the Trend editor.
If the start date is not changed, the trend takes the default start date
(derived from when the trend was first installed), and backfills the data from
that time. For example, if you enable the trend six months after the first
install, these trends try to get all the data for the last six months, which
might cause performance problems, overwhelm system resources, or cause
the trend to fail if that event data is not available.
For more information about trends, refer to the the ArcSight Console Users Guide or the
ESM online Help.
Confidential
Chapter 3
Purpose
Confidential
Bandwidth Usage
The Bandwidth Usage resources provide information about bandwidth utilization.
Devices
The following device types can supply events that apply to the Bandwidth Usage resource
group:
Qosient Argus and network devices such as routers, firewalls, and VPNs
Resources
The following table lists all the resources in this resource group and any dependant
resources.
Table 3-1
Resource
Description
Type
URI
Monitor Resources
Argus Events
Active
Channel
ArcSight
Foundation/Network
Monitoring/
Inbound
Bandwidth
Dashboard
ArcSight
Foundation/Network
Monitoring/Bandwidth
Usage/
Current
Bandwidth
Dashboard
ArcSight
Foundation/Network
Monitoring/Bandwidth
Usage/
Outbound
Bandwidth
Dashboard
ArcSight
Foundation/Network
Monitoring/Bandwidth
Usage/
Top Bandwidth
Hosts
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/ Cross-Device/
Confidential
Resource
Description
Type
URI
Bandwidth
Utilization Last Hour
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/
Bandwidth
Usage by
Protocol
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/ Cross-Device/
Bandwidth
Usage by Hour
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/ Cross-Device/
Bandwidth
Utilization Business
Hours
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/
Bandwidth
Utilization Last 24 Hours
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/
Library Resources
Protected
Asset
Category
Site Asset
Categories/Address Spaces
Outbound
Bandwidth Last Minute
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Bandwidth
Usage/Current Bandwidth/
Outbound
Bandwidth Last Hour
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Bandwidth
Usage/Outbound Bandwidth/
Confidential
Resource
Description
Type
URI
Inbound
Bandwidth Last Minute
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Bandwidth
Usage/Current Bandwidth/
Inbound
Bandwidth Last 10
Minutes
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Bandwidth
Usage/Inbound Bandwidth/
Outbound
Bandwidth Last 10
Minutes
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Bandwidth
Usage/Outbound Bandwidth/
Inbound
Bandwidth Last Hour
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Bandwidth
Usage/Inbound Bandwidth/
Argus
Field Set
ArcSight
Foundation/Network
Monitoring/
Network
Events
Filter
ArcSight
Foundation/Common/Device
Class Filters/
VPN Events
Filter
ArcSight
Foundation/Common/Device
Class Filters/
External
Source
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
Application
Protocol is
NULL
Filter
ArcSight
Foundation/Common/Conditio
nal Variable
Filters/Protocol/
Outbound
Events
Filter
ArcSight
Foundation/Common/Network
Filters/Location Filters/
Internal
Source
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
All Events
Filter
ArcSight System/Core
Internal Target
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
Confidential
Resource
Description
Type
URI
Inbound and
Outbound
Traffic
Filter
ArcSight
Foundation/Network
Monitoring/Network Traffic
Filters/
Qosient Argus
Filter
ArcSight
Foundation/Network
Monitoring/Connector
Filters/
Outbound
Traffic
Filter
ArcSight
Foundation/Network
Monitoring/Network Traffic
Filters/
Inbound
Events
Filter
ArcSight
Foundation/Common/Network
Filters/Location Filters/
External
Target
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
Firewall
Events
Filter
ArcSight
Foundation/Common/Device
Class Filters/
Bandwidth to
or from
External
Systems
Filter
ArcSight
Foundation/Network
Monitoring/Network Traffic
Filters/
Inbound
Traffic
Filter
ArcSight
Foundation/Network
Monitoring/Network Traffic
Filters/
Network
Traffic
Reporting
Devices
Filter
ArcSight
Foundation/Network
Monitoring/Connector
Filters/
Bandwidth
Usage by
Protocol
Focused
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Firewall/
Confidential
Resource
Description
Type
URI
Bandwidth
Usage per
Hour
Focused
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Firewall/
Bandwidth
Usage by
Protocol
Focused
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Firewall/
Bandwidth
Usage by
Protocol
Focused
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Firewall/
Top Bandwidth
Hosts
Focused
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Firewall/
Bandwidth
Usage per
Hour
Focused
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Firewall/
Top Bandwidth
Hosts
Focused
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Firewall/
Top Bandwidth
Hosts
Focused
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Firewall/
Confidential
Resource
Description
Type
URI
Bandwidth
Usage per
Hour
Focused
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Firewall/
Top Bandwidth
Hosts
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/
Bandwidth
Utilization - By
Minute
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/
Overall Traffic
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Event Queries/
Bandwidth
Usage by
Protocol
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/
Average
Bandwidth
Utilization Business
Hours
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Trend Queries/
Confidential
Resource
Description
Type
URI
Bandwidth
Usage per
Hour
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/
Bandwidth
Utilization - By
Hour
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/
Overall Traffic
Trend
ArcSight
Foundation/Network
Monitoring/
Confidential
Device Activity
The Device Activity resources provide information about firewall, network, and VPN
connection activity.
Devices
The following device types can supply events that apply to the Device Activity resource
group:
Resources
The following table lists all the resources in the Device Activity resource group and any
dependant resources.
Table 3-2
Resource
Description
Type
URI
Monitor Resources
Firewall
Connection
Overview
Dashboard
ArcSight
Foundation/Network
Monitoring/Device
Activity/
VPN
Connection
Statistics
Dashboard
ArcSight
Foundation/Network
Monitoring/Device
Activity/
Network
Status
Overview
Dashboard
ArcSight
Foundation/Network
Monitoring/Device
Activity/
Connections
Denied by
Address
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Connections
Denied by
Hour
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Confidential
Resource
Description
Type
URI
Device
Interface
Down
Notifications
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/Network/
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Device
Interface
Status
Messages
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/Network/
Top VPN
Access by User
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
VPN
Connection
Failures
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Authentication
Errors
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Top VPN
Events
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Device Events
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/Network/
Connections
Accepted by
Address
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Device Errors
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/Network/
Confidential
Resource
Description
Type
URI
VPN
Connection
Attempts
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Device Critical
Events
Report
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/Network/
Library Resources
Protected
Asset
Category
Site Asset
Categories/Address Spaces
Last 10
Interface
Status
Messages
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/Network Status
Overview/
Top 10 Hosts
With Denied
Outbound
Connections
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/Firewall
Connection Overview/
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/VPN Connection
Statistics/
Last 10 Critical
Network
Events
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/Network Status
Overview/
Top 10 Hosts
With Denied
Inbound
Connections
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/Firewall
Connection Overview/
Devices with
High Error
Rates
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/Network Status
Overview/
Last 10
Interface
Down
Messages
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/Network Status
Overview/
Confidential
Resource
Description
Type
URI
Top 10 Denied
Ports
(Outbound)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/Firewall
Connection Overview/
Top VPN
Servers with
Denied
Connections
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/VPN Connection
Statistics/
Top VPN
Servers with
Authentication
Errors
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/VPN Connection
Statistics/
Top 10 Denied
Ports
(Inbound)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/Firewall
Connection Overview/
Top VPN
Servers with
Successful
Connections
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Device
Activity/VPN Connection
Statistics/
Denied
Outbound
Connections
Filter
ArcSight
Foundation/Network
Monitoring/Device
Activity/Firewall/
Target User ID
is NULL
Filter
ArcSight
Foundation/Common/Conditio
nal Variable Filters/User/
External
Source
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
Failed VPN
Connection
Events
Filter
ArcSight
Foundation/Network
Monitoring/Device
Activity/VPN/
Outbound
Events
Filter
ArcSight
Foundation/Common/Network
Filters/Location Filters/
Denied
Inbound
Connections
Filter
ArcSight
Foundation/Network
Monitoring/Device
Activity/Firewall/
Internal
Source
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
Confidential
Resource
Description
Type
URI
Internal Target
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
All Events
Filter
ArcSight System/Core
Critical
Network
Events
Filter
ArcSight
Foundation/Network
Monitoring/Device
Activity/Network/
Network
Device
Interface
Status Events
Filter
ArcSight
Foundation/Network
Monitoring/Device
Activity/Network/
Inbound
Events
Filter
ArcSight
Foundation/Common/Network
Filters/Location Filters/
External
Target
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
Successful
VPN
Connection
Events
Filter
ArcSight
Foundation/Network
Monitoring/Device
Activity/VPN/
Target User
Name is NULL
Filter
ArcSight
Foundation/Common/Conditio
nal Variable Filters/User/
Network Error
Events
Filter
ArcSight
Foundation/Network
Monitoring/Device
Activity/Network/
VPN
Authentication
Errors
Filter
ArcSight
Foundation/Network
Monitoring/Device
Activity/VPN/
Network
Device
Interface
Down
Messages
Filter
ArcSight
Foundation/Network
Monitoring/Device
Activity/Network/
Connections
Accepted by
Address
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/Connections
Accepted by Address/
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Confidential
Resource
Description
Type
URI
Device
Interface
Down
Notifications
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/Network/
Device Errors
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/Network/
VPN
Connection
Attempts
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Top
Connections
Denied by
Address
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/Connections
Denied by Address/
Authentication
Errors
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Device Events
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/Network/
VPN
Connection
Failures
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Device Critical
Events
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/Network/
Top VPN
Events
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Confidential
Resource
Description
Type
URI
Top VPN
Accesses by
User
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Top
Connections
Accepted by
Address
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/Connections
Accepted by Address/
Connections
Denied by
Address
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/Connections
Denied by Address/
Device
Interface
Status
Messages
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/Network/
Connections
Denied by
Hour
Query
ArcSight
Foundation/Network
Monitoring/Details/Device
Activity/VPN/
Confidential
Devices
The following device types can supply events that apply to the Hosts and Protocols
resource group:
Qosient Argus and network devices such as routers, firewalls, and VPNs
Configuration
The Hosts and Protocols resource group requires the following configuration for your
environment.
To activate content that references email and web servers, categorize your email
servers with the Email asset category, and your web servers with the Web Server
asset category.
Resources
The following table lists all the resources in the Hosts and Protocols resource group and
any dependant resources.
Table 3-3
Resource
Description
Type
URI
Monitor Resources
Top Traffic to
Mail Server
Dashboard
ArcSight
Foundation/Network
Monitoring/General/
Traffic Moving
Average
Dashboard
ArcSight
Foundation/Network
Monitoring/General/
Confidential
Resource
Description
Type
URI
Top Traffic to
Web Server
Dashboard
ArcSight
Foundation/Network
Monitoring/General/
Attacker
Details by
Protocol
Report
ArcSight
Foundation/Network
Monitoring/Details/By
Protocol/
Detailed Traffic
by Protocol
Report
ArcSight
Foundation/Network
Monitoring/Details/By
Protocol/
Protocol
Details by
Host
Report
ArcSight
Foundation/Network
Monitoring/Details/By
Host/
Detailed Traffic
by Host
Report
ArcSight
Foundation/Network
Monitoring/Details/By
Host/
Target Details
by Host
Report
ArcSight
Foundation/Network
Monitoring/Details/By
Host/
Target Details
by Protocol
Report
ArcSight
Foundation/Network
Monitoring/Details/By
Protocol/
Confidential
Resource
Description
Type
URI
Library Resources
Email
Asset
Category
Site Asset
Categories/Application/Typ
e
Protected
Asset
Category
Site Asset
Categories/Address Spaces
Web Server
Asset
Category
Site Asset
Categories/Application/Typ
e
Top Traffic
from Internal
to Mail Server
(Request)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Top
Traffic to Mail Server/
Traffic Moving
Average (TCP)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Traffic
Moving Average/
Top Traffic
from Internal
to Web Server
(Request)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Top
Traffic to Web Server/
Top Traffic
from Internal
to Web Server
(Response)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Top
Traffic to Web Server/
Top Traffic
from External
to Web Server
(Request)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Top
Traffic to Web Server/
Traffic Moving
Average (SYN)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Traffic
Moving Average/
Top Traffic
from External
to Mail Server
(Response)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Top
Traffic to Mail Server/
Top Traffic
from Internal
to Mail Server
(Response)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Top
Traffic to Mail Server/
Confidential
Resource
Description
Type
URI
Top Traffic
from External
to Mail Server
(Request)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Top
Traffic to Mail Server/
Traffic Moving
Average
(ICMP)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Traffic
Moving Average/
Top Traffic
from External
to Web Server
(Response)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Top
Traffic to Web Server/
Traffic Moving
Average (UDP)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/General/Traffic
Moving Average/
SYN Traffic
Filter
ArcSight
Foundation/Network
Monitoring/Moving Average
Filters/
Internal to
Internal Traffic
Filter
ArcSight
Foundation/Network
Monitoring/Network Traffic
Filters/
Application
Protocol is
NULL
Filter
ArcSight
Foundation/Common/Conditio
nal Variable
Filters/Protocol/
External
Source
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
External to
Web Server
Filter
ArcSight
Foundation/Network
Monitoring/Application
Filters/Web Server/
UDP Traffic
Filter
ArcSight
Foundation/Network
Monitoring/Moving Average
Filters/
TCP Traffic
Filter
ArcSight
Foundation/Network
Monitoring/Moving Average
Filters/
Internal
Source
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
Confidential
Resource
Description
Type
URI
Internal to
Web Server
Filter
ArcSight
Foundation/Network
Monitoring/Application
Filters/Web Server/
Internal Target
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
External to
Mail Server
Filter
ArcSight
Foundation/Network
Monitoring/Application
Filters/Mail Server/
Internal to
Mail Server
Filter
ArcSight
Foundation/Network
Monitoring/Application
Filters/Mail Server/
Qosient Argus
Filter
ArcSight
Foundation/Network
Monitoring/Connector
Filters/
Internal to
Internal
Events
Filter
ArcSight
Foundation/Common/Network
Filters/Location Filters/
Inbound
Events
Filter
ArcSight
Foundation/Common/Network
Filters/Location Filters/
Network
Traffic
Reporting
Devices
Filter
ArcSight
Foundation/Network
Monitoring/Connector
Filters/
Inbound
Traffic
Filter
ArcSight
Foundation/Network
Monitoring/Network Traffic
Filters/
ICMP Traffic
Filter
ArcSight
Foundation/Network
Monitoring/Moving Average
Filters/
Query
ArcSight
Foundation/Network
Monitoring/Details/By
Protocol/
Confidential
Resource
Description
Type
URI
Attacker
Details by
Protocol
Query
ArcSight
Foundation/Network
Monitoring/Details/By
Protocol/
Top Attackers
by Protocol
Query
ArcSight
Foundation/Network
Monitoring/Details/By
Protocol/
Target Details
by Protocol
Query
ArcSight
Foundation/Network
Monitoring/Details/By
Protocol/
Protocol
Details by
Host
Query
ArcSight
Foundation/Network
Monitoring/Details/By
Host/
Top Protocols
by Host
Query
ArcSight
Foundation/Network
Monitoring/Details/By
Host/
Top Targets by
Protocol
Query
ArcSight
Foundation/Network
Monitoring/Details/By
Protocol/
Target Details
by Host
Query
ArcSight
Foundation/Network
Monitoring/Details/By
Host/
Top Targets by
Host
Query
ArcSight
Foundation/Network
Monitoring/Details/By
Host/
Confidential
Devices
The following device types can supply events that apply to the SANS Top 5 Reports
resource group:
Resources
The following table lists all the resources in the SANS Top 5 Reports resource group and
any dependant resources.
Table 3-4
Resource
Description
Type
URI
Monitor Resources
Top Alerts
from IDS and
IPS
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/
Top 10
Vulnerable
Systems Today
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/4 - Systems Most
Vulnerable to Attack/
Top 5 IDS
Signatures per
Day
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/
Top 5 Users
with Failed
Logins - Today
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/
Total Number
of Vulnerable
Systems Yearly
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/4 - Systems Most
Vulnerable to Attack/Trend
Reports/
Confidential
Resource
Description
Type
URI
Total Number
of Vulnerable
Systems Monthly
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/4 - Systems Most
Vulnerable to Attack/Trend
Reports/
Top 5 IDS
Signature
Destinations
per Day
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/
Top 5 IDS
Signature
Sources per
Day
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/
Number of
Failed Logins Weekly
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/Trend
Reports/
Vulnerability
Scanner Logs by Host
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/4 - Systems Most
Vulnerable to Attack/
Top 10 Talkers
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/
Number of
Failed Logins Daily
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/Trend
Reports/
Top 5 Users
with Failed
Logins Weekly
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/Trend
Reports/
Confidential
Resource
Description
Type
URI
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/
Vulnerability
Scanner Logs by
Vulnerability
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/4 - Systems Most
Vulnerable to Attack/
Top 5 Users
with Failed
Logins - Daily
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/Trend
Reports/
Number of
Failed Logins Today
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/
Top 10
Vulnerable
Systems Weekly
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/4 - Systems Most
Vulnerable to Attack/Trend
Reports/
Library Resources
IDS -IPS
Events
Filter
ArcSight
Foundation/Intrusion
Monitoring/Attack
Monitoring/
Attack Events
Filter
ArcSight
Foundation/Intrusion
Monitoring/Attack
Monitoring/
Scanner
Events
Filter
ArcSight
Foundation/Intrusion
Monitoring/Vulnerability
View/
All Events
Filter
ArcSight System/Core
Confidential
Resource
Description
Type
URI
Top 5 IDS
Signatures per
Day (SnortSnort)
Focused
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/Focused
Reports/
Top 5
Signatures per
Day (CISCOCiscoSecureID
S)
Focused
Report
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/Focused
Reports/
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/Top
Users with Failed
Logins/Event Queries/
Failed Logins
per Hour
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/Number
of Failed Logins/Event
Queries/
Top 10 Targets
Query
ArcSight
Foundation/Intrusion
Monitoring/Detail/Attack
Monitoring/Targets/Top and
Bottom 10/
Failed Logins
per Hour
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/Number
of Failed Logins/Event
Queries/
Confidential
Resource
Description
Type
URI
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/Top
Users with Failed
Logins/Trend Queries/
Top IDS
Signatures by
IDS Product
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/Top 5 IDS
Signatures per Day/
Top Vulnerable
Systems per
Week
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/4 - Systems Most
Vulnerable to Attack/Top
Vulnerable Systems/Trend
Queries/
Top IDS
Signature
Sources per
Day
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/Top 5 IDS
Signature Sources per Day/
Top 10 Talkers
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/Top 10
Talkers/
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/Top
Alerts from IDS/
Number of
Vulnerabilities
per Asset
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/4 - Systems Most
Vulnerable to Attack/Top
Vulnerable Systems/Asset
Queries/
Confidential
Resource
Description
Type
URI
Top IDS
Signature
Destinations
per Day
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/Top 5 IDS
Signature Destinations per
Day/
Number of
Vulnerabilities
per Week
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/4 - Systems Most
Vulnerable to Attack/Total
Number of Vulnerable
Systems/Trend Queries/
Failed Logins
per Day
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/Number
of Failed Logins/Trend
Queries/
Vulnerability
Scanner Logs
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/4 - Systems Most
Vulnerable to
Attack/Vulnerability
Scanner Logs - by Host/
Query
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/Top
Users with Failed
Logins/Event Queries/
Trend
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/
Number of
Vulnerabilities
per Asset
Trend
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/4 - Systems Most
Vulnerable to Attack/
Failed Logins
per Hour
Trend
ArcSight
Foundation/Intrusion
Monitoring/SANS Top 5
Reports/1 - Attempts to
Gain Access Through
Existing Accounts/
Confidential
Traffic Overview
The Traffic Overview resources provide an overview of network traffic.
Devices
The following device types can supply events that apply to the Traffic Overview resource
group:
Qosient Argus and network devices such as routers, firewalls, and VPNs
Resources
The following table lists all the resources in the Traffic Overview resource group and any
dependant resources.
Table 3-5
Resource
Description
Type
URI
Monitor Resources
Top Inbound
Traffic by Host
Dashboard
ArcSight
Foundation/Network
Monitoring/Inbound
Traffic/
Top Outbound
Traffic by
Application
Protocol
Dashboard
ArcSight
Foundation/Network
Monitoring/Outbound
Traffic/
Outbound
Traffic Moving
Average
Dashboard
ArcSight
Foundation/Network
Monitoring/Outbound
Traffic/
Inbound
Traffic Moving
Average
Dashboard
ArcSight
Foundation/Network
Monitoring/Inbound
Traffic/
Confidential
Resource
Description
Type
URI
Top Inbound
Traffic by
Application
Protocol
Dashboard
ArcSight
Foundation/Network
Monitoring/Inbound
Traffic/
Top Outbound
Traffic by Host
Dashboard
ArcSight
Foundation/Network
Monitoring/Outbound
Traffic/
Traffic
Statistics
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/
Outbound
Traffic by
Protocol Weekly
Summary
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/Summaries/
Daily Traffic
Summary
Report
ArcSight
Foundation/Network
Monitoring/Executive
Summaries/
Inbound
Traffic - Top
Protocols
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound Traffic/
Quarterly
Traffic
Summary
Report
ArcSight
Foundation/Network
Monitoring/Executive
Summaries/
Weekly Traffic
Summary
Report
ArcSight
Foundation/Network
Monitoring/Executive
Summaries/
Outbound
Traffic Weekly
Summary
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/Summaries/
Confidential
Resource
Description
Type
URI
Outbound
Traffic - Daily
Summary
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/Summaries/
Inbound
Traffic - Daily
Summary
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound
Traffic/Summaries/
Traffic
Snapshot
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/
Inbound
Traffic Weekly
Summary
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound
Traffic/Summaries/
Inbound
Traffic - Top
Source Hosts
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound Traffic/
Outbound
Traffic - Top
Source Hosts
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/
Outbound
Traffic - Top
Protocols
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/
Inbound
Traffic by
Protocol Weekly
Summary
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound
Traffic/Summaries/
Monthly Traffic
Summary
Report
ArcSight
Foundation/Network
Monitoring/Executive
Summaries/
Rule
ArcSight
Foundation/Network
Monitoring/
Confidential
Resource
Description
Type
URI
High Number
of Denied
Connections
for A Source
Host
Rule
ArcSight
Foundation/Network
Monitoring/
ICMP Traffic
Spike
Rule
ArcSight
Foundation/Network
Monitoring/
High Number
of Connections
Rule
ArcSight
Foundation/Network
Monitoring/
High Number
of Denied
Inbound
Connections
Rule
ArcSight
Foundation/Network
Monitoring/
SYN Traffic
Spike
Rule
ArcSight
Foundation/Network
Monitoring/
UDP Traffic
Spike
Rule
ArcSight
Foundation/Network
Monitoring/
Library Resources
Event-based
Rule
Exclusions
Active List
ArcSight System/Tuning
Protected
Asset
Category
Site Asset
Categories/Address Spaces
Confidential
Resource
Description
Type
URI
Outbound
Traffic Moving
Average
(Response)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Outbound
Traffic/Outbound Traffic
Moving Average/
Top Outbound
Traffic by
Application
Protocol
(Request)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Outbound
Traffic/Top Outbound
Traffic by Application
Protocol/
Top Inbound
Traffic by Host
(Request)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Inbound
Traffic/Top Inbound
Traffic by Host/
Top Outbound
Traffic by
Application
Protocol
(Response)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Outbound
Traffic/Top Outbound
Traffic by Application
Protocol/
Top Outbound
Traffic by Host
(Request)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Outbound
Traffic/Top Outbound
Traffic by Host/
Confidential
Resource
Description
Type
URI
Top Inbound
Traffic by
Application
Protocol
(Request)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Inbound
Traffic/Top Inbound
Traffic by Application
Protocol/
Top Inbound
Traffic by Host
(Response)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Inbound
Traffic/Top Inbound
Traffic by Host/
Top Inbound
Traffic by
Application
Protocol
(Response)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Inbound
Traffic/Top Inbound
Traffic by Application
Protocol/
Inbound
Traffic Moving
Average
(Response)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Inbound
Traffic/Inbound Traffic
Moving Average/
Top Outbound
Traffic by Host
(Response)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Outbound
Traffic/Top Outbound
Traffic by Host/
Confidential
Resource
Description
Type
URI
Inbound
Traffic Moving
Average
(Request)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Inbound
Traffic/Inbound Traffic
Moving Average/
Outbound
Traffic Moving
Average
(Request)
Data
Monitor
ArcSight
Foundation/Network
Monitoring/Outbound
Traffic/Outbound Traffic
Moving Average/
Target Port is
NULL
Filter
ArcSight
Foundation/Common/Conditio
nal Variable Filters/Host/
Application
Protocol is
NULL
Filter
ArcSight
Foundation/Common/Conditio
nal Variable
Filters/Protocol/
External
Source
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
Qosient Argus
Filter
ArcSight
Foundation/Network
Monitoring/Connector
Filters/
Outbound
Traffic
Filter
ArcSight
Foundation/Network
Monitoring/Network Traffic
Filters/
External
Target
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
Outbound
Events
Filter
ArcSight
Foundation/Common/Network
Filters/Location Filters/
Inbound
Events
Filter
ArcSight
Foundation/Common/Network
Filters/Location Filters/
Confidential
Resource
Description
Type
URI
Internal
Source
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
Internal Target
Filter
ArcSight
Foundation/Common/Network
Filters/Boundary Filters/
Inbound
Traffic
Filter
ArcSight
Foundation/Network
Monitoring/Network Traffic
Filters/
Network
Traffic
Reporting
Devices
Filter
ArcSight
Foundation/Network
Monitoring/Connector
Filters/
Inbound http
Traffic Weekly
Summary
Focused
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound
Traffic/Summaries/Focused
Reports/
Outbound http
Traffic Weekly
Summary
Focused
Report
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/Summaries/Focused
Reports/
Top Protocols
Query
ArcSight
Foundation/Network
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/Protocol
Distribution Report/
Outbound
Traffic by
Source Host
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/
Outbound
Traffic by
Transport
Protocol
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/
Confidential
Resource
Description
Type
URI
Inbound
Traffic - Hourly
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound
Traffic/Trend Queries/
Outbound
Traffic by
Application
Protocol Daily
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/Trend Queries/
Inbound
Traffic by
Transport
Protocol
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound Traffic/
Inbound
Traffic by
Application
Protocol
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound Traffic/
Outbound
Traffic - Daily
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/Trend Queries/
Inbound
Traffic by
Application
Protocol Daily
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound
Traffic/Trend Queries/
Overall Traffic
- By Day
Query
ArcSight
Foundation/Network
Monitoring/Executive
Summaries/Trend Queries/
Confidential
Resource
Description
Type
URI
Top Attackers
Query
ArcSight
Foundation/Network
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/Top 10
Talkers/
Outbound
Traffic
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/Event Queries/
Top Targets
Query
ArcSight
Foundation/Network
Monitoring/SANS Top 5
Reports/5 - Suspicious or
Unauthorized Network
Traffic Patterns/Top
Target IPs/
Inbound
Traffic
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound
Traffic/Event Queries/
Overall Traffic
- By Month
Query
ArcSight
Foundation/Network
Monitoring/Executive
Summaries/Trend Queries/
Inbound
Traffic - Daily
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound
Traffic/Trend Queries/
Inbound
Traffic by
Source Host
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Inbound Traffic/
Confidential
Resource
Description
Type
URI
Firewall
Bandwidth
Usage by Hour
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Traffic
Statistics/
Bandwidth
Usage by
Firewall
Address
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Traffic
Statistics/
Firewall
Bandwith
Usage per
Hour
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Traffic
Statistics/
Overall Traffic
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Bandwidth
Utilization/Event Queries/
Outbound
Traffic - Hourly
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/Trend Queries/
Overall Traffic
- By Hour
Query
ArcSight
Foundation/Network
Monitoring/Executive
Summaries/Trend Queries/
Outbound
Traffic by
Application
Protocol
Query
ArcSight
Foundation/Network
Monitoring/Operational
Summaries/Outbound
Traffic/
Confidential
Resource
Description
Type
URI
Outbound
Traffic by
Application
Protocol
Trend
ArcSight
Foundation/Network
Monitoring/
Inbound
Traffic by
Application
Protocol
Trend
ArcSight
Foundation/Network
Monitoring/
Overall Traffic
Trend
ArcSight
Foundation/Network
Monitoring/
Confidential
Confidential
Appendix A
Custom zones
SmartConnectors
Report schedules
Cases
Confidential
Any standard content resource that you have modified, including active lists
Any custom content or special modifications not already described in this document
(including customizations performed by ArcSight Professional Services)
To help the process of reconfiguring resources that require restoration after upgrade, back
up the resources you identify in Configurations that Require Restoration After Upgrade on
page 59 and export them in a package. After upgrade, you can re-import the package and
use the existing resources as a reference for restoring the configurations to the upgraded
environment.
For each resource type (filter, rule, active list), create a new group under your personal
group. Provide a name that identifies the contents.
Copy the resources into the new group. Repeat this process for every resource type
you want to back up.
Select the resources you want to back up and drag them into the backup folder
you created in Step 1. In the Drag & Drop Options dialog box, select Copy.
In the Navigator panel Packages tab, right-click your group name and select New
Package. In the Packages editor in the Inspect/Edit panel, name the package to
identify the contents.
Copy and paste configurations from the old resources to the new
Instead of overwriting the new resources with backup copies of the old ones,
copy and paste configurations from the old resources one by one into the new
ones. This procedure ensures that you preserve your configurations without
overwriting any improvements provided in the upgrade.
60
Confidential
Verify that your configured resources listed in the section Configurations Preserved
During Upgrade on page 59 retained their configurations as expected.
One resource at a time, copy and paste the configurations preserved in the
package of copied resources into the new resources installed with the upgrade.
Copying your configurations one resource at a time instead of overwriting the new
resources with the old ensures that you retain your configurations without
overwriting any improvements provided with the upgraded content.
Trigger events. Send events that you know trigger the content through the system
using the Replay with Rules feature. For more about this feature, refer to the ArcSight
Console Users Guide or the ESM online Help.
Check Live Events. Check the Live or All Events active channel to verify if the
correlation event is triggered. Check that the data monitors you created are returning
the expected output based on the test events you send through.
Verify notification destinations. Verify that notifications are sent to the recipients
in your notification destinations as expected.
Verify active lists. Check that any active lists you have created to support your
content are gathering the replay with rules data as expected.
Repair any invalid resources. During the upgrade process, the resource validator
identifies any resources that are rendered invalid (conditions that no longer work)
during the upgrade. Find invalid resources and fix their conditions as appropriate. For
more about invalid resources, see Fixing Invalid Resources, below.
Confidential
Active channels
Filters
Data Monitors
Rules
Zones
It is possible that during upgrade, the condition statement for a resource you created or
modified becomes invalid. For example, if the schema of an ArcSight-supplied active list
changes from one release to another and a resource you created reads entries from this
list, the condition statement in the created resource no longer matches the schema of the
active list, and the logic is invalid.
When the installer performs the resource validation check and finds an invalid resource, it
identifies why the resource is invalid in the report it generates at the end of the upgrade.
The upgrade installer also lets you choose to save the reason the resource is invalid in the
database (Persist conflicts to the database=TRUE). If you choose this option, the
upgrade installer:
Saves the reason the resource is found to be invalid in the database so you can
generate a list of invalid resources that you can use later to repair the problems
manually.
Disables the resource so it does not try to evaluate live events in its invalid state.
If you choose not to save the reasons the resource is invalid in the database (Persist
conflicts to the database=FALSE), the resources remain enabled, which means they try
to evaluate the event stream in their invalid state.
If you choose not to persist conflicts to the database and disable invalid
resources, the Manager might throw exceptions when the invalid resources
try to evaluate live events.
62
Confidential
Index
A
active channels
Argus Events 20
active lists
Event-based Rule Exclusions 49
general configuration 17
All Events filter 22, 31, 42
Application Protocol is NULL filter 22, 37, 52
ArcSight Administration
overview 5
ArcSight Foundations overview 5
ArcSight System
overview 5
Argus Events active channel 20
Argus field set 22
asset categories
Email 36
Protected 21, 29, 36, 49
Web Server 36
Attack Events filter 42
Attacker Details by Protocol query 39
Attacker Details by Protocol report 35
Authentication Errors query 32
Authentication Errors report 28
Average Bandwidth Utilization - Business Hours query 25
B
Bandwidth
Bandwidth
Bandwidth
Bandwidth
Bandwidth
Bandwidth
Bandwidth
Bandwidth
Bandwidth
Bandwidth
Bandwidth
Bandwidth
Bandwidth
Bandwidth
C
configuration
active lists 17
Connections Accepted by Address query 31
Connections Accepted by Address report 28
Connections Denied by Address query 33
Connections Denied by Address report 27
Confidential
D
Daily Traffic Summary report 47
dashboards
Current Bandwidth 20
Firewall Connection Overview 27
Inbound Bandwidth 20
Inbound Traffic Moving Average 46
Network Status Overview 27
Outbound Bandwidth 20
Outbound Traffic Moving Average 46
Top Inbound Traffic by Application Protocol 47
Top Inbound Traffic by Host 46
Top Outbound Traffic by Application Protocol 46
Top Outbound Traffic by Host 47
Top Traffic to Mail Server 34
Top Traffic to Web Server 35
Traffic Moving Average 34
VPN Connection Statistics 27
data monitors
Devices with High Error Rates 29
Inbound Bandwidth - Last 10 Minutes 22
Inbound Bandwidth - Last Hour 22
Inbound Bandwidth - Last Minute 22
Inbound Traffic Moving Average (Request) 52
Inbound Traffic Moving Average (Response) 51
Last 10 Critical Network Events 29
Last 10 Interface Down Messages 29
Last 10 Interface Status Messages 29
Outbound Bandwidth - Last 10 Minutes 22
Outbound Bandwidth - Last Hour 21
Outbound Bandwidth - Last Minute 21
Outbound Traffic Moving Average (Request) 52
Outbound Traffic Moving Average (Response) 50
Top 10 Denied Ports (Inbound) 30
Top 10 Denied Ports (Outbound) 30
Top 10 Hosts With Denied Inbound Connections 29
Top 10 Hosts With Denied Outbound Connections
29
Top Inbound Traffic by Application Protocol (Request) 51
Top Inbound Traffic by Application Protocol (Response) 51
Top Inbound Traffic by Host (Request) 50
Top Inbound Traffic by Host (Response) 51
Top Outbound Traffic by Application Protocol (Re-
Index
quest) 50
Top Outbound Traffic by Application Protocol (Response) 50
Top Outbound Traffic by Host (Request) 50
Top Outbound Traffic by Host (Response) 51
Top Traffic from External to Mail Server (Request)
37
Top Traffic from External to Mail Server (Response)
36
Top Traffic from External to Web Server (Request)
36
Top Traffic from External to Web Server (Response)
37
Top Traffic from Internal to Mail Server (Request)
36
Top Traffic from Internal to Mail Server (Response)
36
Top Traffic from Internal to Web Server (Request)
36
Top Traffic from Internal to Web Server (Response)
36
Top VPN Servers with Authentication Errors 30
Top VPN Servers with Denied Connections 30
Top VPN Servers with Successful Connections 30
Top VPN Users with Authentication Errors 29
Traffic Moving Average (ICMP) 37
Traffic Moving Average (SYN) 36
Traffic Moving Average (TCP) 36
Traffic Moving Average (UDP) 37
Denied Inbound Connections filter 30
Denied Outbound Connections filter 30
Detailed Traffic by Host report 35
Detailed Traffic by Protocol report 35
Device Activity reource group 27
Device Critical Events query 32
Device Critical Events report 29
Device Errors query 32
Device Errors report 28
Device Events query 32
Device Events report 28
Device Interface Down Notifications query 32
Device Interface Down Notifications report 28
Device Interface Status Messages query 33
Device Interface Status Messages report 28
Devices with High Error Rates data monitor 29
E
Email asset category 36
Event-based Rule Exclusions active list 49
External Source filter 22, 30, 37, 52
External Target filter 23, 31, 52
External to Mail Server filter 38
External to Web Server filter 37
F
Failed Logins per Day query 45
Failed Logins per Hour query 43
Failed Logins per Hour trend 45
Failed VPN Connection Events filter 30
field sets
Argus 22
filters
64
H
High Number of Connections rule 49
High Number of Denied Connections for A Source Host
rule 49
High Number of Denied Inbound Connections rule 49
Hosts and Protocols reource group 34
Confidential
Index
L
Last 10 Critical Network Events data monitor 29
Last 10 Interface Down Messages data monitor 29
Last 10 Interface Status Messages data monitor 29
M
Monthly Traffic Summary report 48
N
Network Device Interface Down Messages filter 31
Network Device Interface Status Events filter 31
Network Error Events filter 31
Network Events filter 22
Network Monitoring Foundation
Supported Devices 7
Network Status Overview dashboard 27
Network Traffic Reporting Devices filter 23, 38, 53
Number of Failed Logins - Daily report 41
Number of Failed Logins - Today report 42
Number of Failed Logins - Weekly report 41
Number of Vulnerabilities per Asset query 44
Number of Vulnerabilities per Asset trend 45
Number of Vulnerabilities per Week query 45
Confidential
P
packages
deleting 12
installing 11
uninstalling 11
Protected asset category 21, 29, 36, 49
Protocol Details by Host query 39
Protocol Details by Host report 35
Index
Authentication Errors 28
Bandwidth Usage by Hour 21
Bandwidth Usage by Protocol 21
Bandwidth Utilization - Business Hours 21
Bandwidth Utilization - Last 24 Hours 21
Bandwidth Utilization - Last Hour 21
Connections Accepted by Address 28
Connections Denied by Address 27
Connections Denied by Hour 27
Daily Traffic Summary 47
Detailed Traffic by Host 35
Detailed Traffic by Protocol 35
Device Critical Events 29
Device Errors 28
Device Events 28
Device Interface Down Notifications 28
Device Interface Status Messages 28
Inbound Traffic - Daily Summary 48
Inbound Traffic - Top Protocols 47
Inbound Traffic - Top Source Hosts 48
Inbound Traffic - Weekly Summary 48
Inbound Traffic by Protocol - Weekly Summary 48
Monthly Traffic Summary 48
Number of Failed Logins - Daily 41
Number of Failed Logins - Today 42
Number of Failed Logins - Weekly 41
Outbound Traffic - Daily Summary 48
Outbound Traffic - Top Protocols 48
Outbound Traffic - Top Source Hosts 48
Outbound Traffic - Weekly Summary 47
Outbound Traffic by Protocol - Weekly Summary 47
Protocol Details by Host 35
Quarterly Traffic Summary 47
Target Details by Host 35
Target Details by Protocol 35
Top 10 Talkers 41
Top 10 Vulnerable Systems - Today 40
Top 10 Vulnerable Systems - Weekly 42
Top 5 IDS Signature Destinations per Day 41
Top 5 IDS Signature Sources per Day 41
Top 5 IDS Signatures per Day 40
Top 5 Users with Failed Logins - Daily 42
Top 5 Users with Failed Logins - Today 40
Top 5 Users with Failed Logins - Weekly 41
Top Alerts from IDS and IPS 40
Top Bandwidth Hosts 20
Top Target IPs 42
Top VPN Access by User 28
Top VPN Event Destinations 28
Top VPN Event Sources 28
Top VPN Events 28
Total Number of Vulnerable Systems - Monthly 41
Total Number of Vulnerable Systems - Yearly 40
Traffic Snapshot 48
Traffic Statistics 47
VPN Connection Attempts 29
VPN Connection Failures 28
Vulnerability Scanner Logs - by Host 41
Vulnerability Scanner Logs - by Vulnerability 42
Weekly Traffic Summary 47
R
reource group
Bandwidth Usage 20
Device Activity 27
Hosts and Protocols 34
SANS Top 5 Reports 40
Traffic Overview 46
reports
Attacker Details by Protocol 35
66
rules
High Number of Connections 49
High Number of Denied Connections for A Source
Host 49
High Number of Denied Inbound Connections 49
Confidential
Index
S
SANS Top 5 Reports reource group 40
Scanner Events filter 42
shared libraries 5
Successful VPN Connection Events filter 31
SYN Traffic filter 37
SYN Traffic Spike rule 49
T
Target Details by Host query 39
Target Details by Host report 35
Target Details by Protocol query 39
Target Details by Protocol report 35
Target Port is NULL filter 52
Target User ID is NULL filter 30
Target User Name is NULL filter 31
TCP Traffic filter 37
TCP Traffic Spike rule 48
Top 10 Denied Ports (Inbound) data monitor 30
Top 10 Denied Ports (Outbound) data monitor 30
Top 10 Hosts With Denied Inbound Connections data
monitor 29
Top 10 Hosts With Denied Outbound Connections data
monitor 29
Top 10 Talkers query 44
Top 10 Talkers report 41
Top 10 Targets query 43
Top 10 Vulnerable Systems - Today report 40
Top 10 Vulnerable Systems - Weekly report 42
Top 5 IDS Signature Destinations per Day report 41
Top 5 IDS Signature Sources per Day report 41
Top 5 IDS Signatures per Day (Snort-Snort) focused report 43
Top 5 IDS Signatures per Day report 40
Top 5 Signatures per Day (CISCO-CiscoSecureIDS) focused report 43
Top 5 Users with Failed Logins - Daily report 42
Top 5 Users with Failed Logins - Today report 40
Top 5 Users with Failed Logins - Weekly report 41
Top Alerts from IDS and IPS report 40
Top Attackers by Protocol query 39
Top Attackers query 55
Top Attacker-Target Pairs by Protocol query 38
Top Bandwidth Hosts focused report 24
Top Bandwidth Hosts query 25
Top Bandwidth Hosts report 20
Top Connections Accepted by Address query 33
Top Connections Denied by Address query 32
Top IDS and IPS Alerts query 44
Top IDS Signature Destinations per Day query 45
Top IDS Signature Sources per Day query 44
Top IDS Signatures by IDS Product query 44
Top Inbound Traffic by Application Protocol (Request)
data monitor 51
Top Inbound Traffic by Application Protocol (Response)
data monitor 51
Top Inbound Traffic by Application Protocol dashboard
47
Confidential
Index
U
UDP Traffic filter 37
UDP Traffic Spike rule 49
upgrade
invalid resources 61
preparing for upgrade 59
restoring content 60
verify customer content 61
68
V
VPN Authentication Errors filter 31
VPN Connection Attempts query 32
VPN Connection Attempts report 29
VPN Connection Failures query 32
VPN Connection Failures report 28
VPN Connection Statistics dashboard 27
VPN Events filter 22
Vulnerability Scanner Logs - by Host report 41
Vulnerability Scanner Logs - by Vulnerability report 42
Vulnerability Scanner Logs query 45
W
Web Server asset category 36
Weekly Traffic Summary report 47
Confidential