Mcafee Network Threat Behavior Analysis 9.1.x Product Guide 11-28-2021
Mcafee Network Threat Behavior Analysis 9.1.x Product Guide 11-28-2021
Overview
The McAfee NTBA Appliance is a feature-rich, non-intrusive solution for monitoring network traffic by analyzing flow information
flowing through network in real time. The NTBA Appliance complements the IPS capabilities in a scenario where Network Security
Platform IPS Sensors and NTBA Appliances are installed and managed through the McAfee® Network Security Manager
(Manager).
Real-time monitoring of network reduces the time needed to solve network-related problems and helps in identifying threats.
Questions as to why our network is slow, which application has the maximum download impact, are easily answered in a
network that is monitored by the NTBA Appliance.
The NTBA Appliance gathers flow information from across users, applications, endpoints, network devices, and stores them in an
embedded database. You can see real-time data and a moving profile of applications, endpoints, zones, and interface traffic. The
NTBA Appliance provides a graphic configurable real-time view of the network traffic.
Threat-related events such as endpoint scans, port scans, worm attacks, new service / application, new endpoint, suspicious
connection, DoS, P2P, and spambots can be tracked based on user-defined policies. All this information is coalesced in the Attack
Log of the Manager that can be drilled down for detailed information.
The NTBA Appliance does effective malware monitoring by detecting unauthorized reconnaissance scanning of any infected
laptops in the system that can spread worm traffic. It also detects unauthorized applications, rogue web servers, and peer-to-
peer applications.
Terminologies
Familiarity with NTBA and flow terminology is important for working with NTBA.
Flow
Flow is defined as a set of IP packets passing an observation point in the network during a certain time interval. All packets
belonging to a particular flow have a set of common properties. Each property is defined as the result of applying a function to
the following values:
• One or more packet header fields (for example, destination IP address), transport header fields (for example, destination port
number), or application header fields (for example, Real Time Protocol (RTP) header fields)
• One or more characteristics of the packet itself (for example, number of Multi-Protocol Label Switching (MPLS) labels)
• One or more of fields derived from packet treatment (for example, next hop IP address and the output interface)
Note: Throughout this document, flow is used to refer to both NetFlow, J-Flow, and IPFIX.
J-Flow
J-Flow is a Juniper Networks proprietary flow monitoring implementation. Juniper devices generate summarized flow records for
sampled packets. J-Flow records are compliant with the NetFlow format.
Currently, NTBA supports J-Flow v5 and v9.
NetFlow
NetFlow is a flow type developed by Cisco and has two components: flow generator and flow collector. Currently, NTBA supports
NetFlow v5 and v9.
NetFlows from Palo Alto are also supported.
Flow exporter
Flow exporters are network devices such as routers and Sensors configured to export flow to the flow collector.
Flow collector
Flow collector is a device that receives the data pushed from one or more flow exporters.
The collector stores the information coming from the flow exporters and provides the administrator with reporting and analysis
through a graphical user interface.
As the flow collector creates its archive of traffic details, a graphical user interface uses this data to provide the network
administrator with details such as, top talkers on a link, who they are communicating with, what protocol/application they are
using, and how long the connections last.
This information can then be used for capacity planning, usage control, security, and incident resolution.
The NTBA Appliance acts as a flow collector and provides reporting as well as analysis through the Manager.
Aggregator
An aggregator is an NTBA Appliance that aggregates flow data from other NTBA Appliances in a multi-NTBA Appliance set up.
Central Collector
It is possible to install more that one NTBA Appliance in a network when such multiple NTBA Appliance installations are called for
due to the geographical spread and flow volume of the network. In a multiple NTBA Appliance scenario, one of the NTBA
Appliances can be designated as the central collector. In such a scenario, the central collector acts as the aggregator.
The designated central collector consolidates flow information from all other NTBA Appliances to provide a network-wide view.
De-duplication
De-duplication is the process of eliminating redundant flow data.
De-duplication can be enabled or disabled for the NTBA Appliance in the Manager.
Checking for duplicate flows is done only if de-duplication is enabled. Redundant flows are dropped if de-duplication is enabled.
NTBA zones
A zone is a concept of segregating the traffic either logically based on IP Addresses (CIDR zones), or physically based on exporter
interfaces (interface zones). Zones represent groups of endpoint whose traffic should be analyzed collectively for anomalous
behavior.
You can group the network into various logical and physical zones. You can create zones according to specific network
monitoring requirements.
For example, you can create a zone based on a particular LAN, a server zone, or a functional zone like HR or Finance for a group
of endpoints with similar functions.
You can monitor traffic and security threats for individual zones. You can create different policies for each zone and monitor
them exclusively.
NTBA components
The NTBA Appliance captures flow from network devices such as routers and Sensors and analyzes them. The processed data is
then forwarded to the Manager for monitoring.
The NTBA Appliance also enforces policies that can be configured through the Manager.
The NTBA Appliance has single/dual quad core processor for the low-end and high-end appliance respectively.
A RAID 0 configuration for Linux and RAID 10 (mirrored disks) for the database with hardware controller is used to set up the
disks for the device.
High-level visibility
The NTBA Appliance is about high-level visibility into the behavior of your network.
The NTBA Appliance provides a visibility umbrella over network infrastructure, firewalls, IPS, applications, and database.
The NTBA Appliance uses a combination of deterministic (based on past occurrences), and non-deterministic mechanisms to
analyze flow information generated by the network infrastructure or packet capture devices.
The NTBA Appliance provides network-wide visibility to understand how systems are used, who uses them (endpoint IP address),
how they connect, depend on each other, as also the ports and protocols they connect over.
The NTBA Appliance provides protection from threats that other security systems cannot identify, such as insider attacks,
unauthorized servers or services, and zero-day attacks.
The NTBA Appliance makes the network transparent to the Administrator. This eases regulatory compliance because network
behavior that did or did not occur becomes unambiguous.
Misuse detection
The NTBA Appliance catches hard-to-detect insider misuse, detects potentially harmful behavior, and helps an organization
contain them before they spread. As a decision-support system, the NTBA helps organizations address the impact of various
attacks and behaviors on their network.
Passive discovery
NTBA makes passive discovery of network assets and the nature of network communications. This is used to monitor network
traffic.
Real-time picture
The NTBA Appliance also identifies policies and regulatory violations in real time.
The NTBA Appliance tracks all network connectivity and assembles a picture in real time of how data flows. This can be used to
plan security, to debug problems as also to keep applications up and running from an end user perspective.
User
Client Server Protocol Port configurable? Description Communication
NTBA Exporter UDP 161 Yes Query SNMP (v3) UDP, (Md5,
SHA1, AES, DES)
Flow processing
Recommended Recommended Maximum rate (flows per Maximum
SKU RAM CPU Exporters Maximum Hosts second) Zones
Note: Whenever the user configuration of resources does not meet the recommended values as mentioned in the resource limit
matrix, an error event is raised.
Flow processing
Maximum rate (flows per Maximum
SKU RAM CPU Exporters Maximum Hosts second) zones
Note: High performance Virtual NTBA Appliance configurations are applicable only from Virtual NTBA sensor software version
9.1.3.54.
Average throughput from exporter Number of flows per second in NTBA Appliance
1 Gbps ~5,000
3 Gbps ~15,000
To determine how many flows are received by IPS Sensors configured as exporters:
• View the consolidated Sensor TCP/UDP flow utilization status under Devices → <Admin Domain Name> → Devices → <Device Name> →
Troubleshooting → Traffic Throughput.
Files Description
Download documentation
Download the product documentation for the NTBA Appliance.
Task
1. At the front of the rack, position one of the mounting rails so that its mounting bracket aligns with the required rack holes. Clip
the rail into the rack.
2. At the back of the rack, pull the back mounting-bracket (extending the mounting rail) so that it aligns with the required rack
holes.
3. Clip the rail to the rack and secure it.
4. Repeat these steps to secure the second mounting rail to the rack.
5. Make sure that the mounting rails are at the same level on each side of the rack.
Note: Make sure that you follow the safety warnings. When identifying where you want the NTBA Appliance to go in the rack,
remember that you should always load the rack from the bottom up. If you are installing multiple NTBA Appliances, start with
the lowest available position first.
Item Description
1 Power supply 1
2 Power supply 2
7 Video connector
8 Console port
Item Description
6 Video connector
Item Description
1 Power supply 1
2 Power supply 2
7 Video connector
8 Console port
Hardware specifications
These are the hardware specifications for T-1200 and T-600.
Hardware specifications
Form factor 2U 1U
Environmental requirements
These are the system level operating and non-operating environmental limits.
Parameter Limits
Environment
Operating Temperature +10°C to +35°C with the maximum rate of change not to
exceed 10°C per hour
Acoustic noise Sound power: 7.0 BA in an idle state at typical office ambient
temperature. (23 +/- 2°C)
Shock, packaged Non-palletized free fall in height 18 inches (≥40 lbs to <80 lbs)
Name Setting
Number of Bits 8
Parity None
Stop Bits 1
Note: The procedure for cabling the console port of NTBA Appliance T-1200 and T-600 is similar.
Task
1. The Add Device Wizard window is displayed after the Manager Initialization Wizard is completed.
Important: McAfee recommend to first add an Appliance to the Manager.
Select Devices → <Admin Domain Name> → Global → Add Device Wizard.
The Preparation page is displayed.
2. Click Next.
The Add New Device page is displayed.
3. Enter the device name.
The name must begin with a letter and can contain alphanumeric characters, hyphens, underscores and periods. The length
of the name is not configurable.
4. Select the Device Type as NTBA Appliance.
5. Enter the Shared Secret (repeat at Confirm Shared Secret).
The device name and shared secret are case-sensitive. The Device Name and Shared Secret must also be entered on the device
command line interface (CLI) during physical installation and initialization. If not, the Appliance will not be able to register itself
with the Manager.
The shared secret must be a minimum of 8 characters in length: the length of the shared secret is not configurable. The shared secret
cannot start with an exclamation mark or have any spaces. The characters that can be used while creating a shared secret are
as follows:
◦ 26 alpha: upper and lower case (a,b,c,...z and A, B, C,...Z)
◦ 10 digits: 0 1 2 3 4 5 6 7 8 9
◦ 32 symbols: ~ ` ! @ # $ % ^ & * ( ) _ + - = [ ] { } \ | ; : " ' , . <? /
6. For a NTBA Appliance, the Updating mode is set to Online.
7. [Optional] Enter the Contact Information and Location.
8. Click Next.
The Trust Establishment page is displayed.
9. Follow the instructions on the page to complete the command line interface (CLI) setup and click Check Trust.
Using the command line interface (CLI), enter the necessary information for the Appliance identification and communication
as described in the McAfee Network Security Platform Installation Guide.
Attention: If you set up the NTBA Appliance first, after the Manager addition, you need to return to the Appliance to reset the
shared secret key and begin Appliance-to-Manager communication.
10. Click Next.
Note: The Next button is enabled once the trust between the Appliance and the Manager is established.
The Port Settings page is displayed. By default, the collection ports are disabled.
11. Enable the ports and modify settings. Click Save and then Next.
Name Setting
Number of Bits 8
Parity None
Stop Bits 1
Verification process
You can check the NTBA Appliance is configuration as follows:
• At the NTBA Appliance console type status.
The status information of the NTBA Appliance is displayed. This includes information on whether the NTBA Appliance is
initialized and its health status.
2. Select the latest software listed under Software Available for Download and click Download.
The Download Status window is displayed.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Maintenance → Deploy Device Software.
The Deploy Device Software page is displayed.
2. Select the latest software listed under Software Ready for Installation and click Upgrade.
The Download Status page is displayed.
3. Click Close Window once the download is complete.
Verify materials
Make sure that you have all the necessary documents and hardware to set up your Virtual NTBA Appliance.
Configuration User needs to create and configure VM Pre-installed NTBA Appliance software
options like CPU, memory, network that includes the recommended
interfaces, and hard disk configuration
Readiness Create and configure VMs, install NTBA, Deploy an OVA image
and reboot the appliance
Tip: McAfee strongly recommends to deploy OVA images on virtual machines as it is simpler and faster than ISO image
deployment.
Task
1. Go to the McAfee product downloads page at http://www.mcafee.com/us/downloads/downloads.aspx.
2. Enter your grant ID to view the latest downloads available.
3. Download the Virtual NTBA Appliance software (.iso file or .ova file) depending on the Virtual NTBA Appliance you want to
install and save it on your local drive.
T-VM ntbasensorImage.T-VM_opt.ova
T-100VM ntbasensorImage.T-100VM_opt.ova
T-200VM ntbasensorImage.T-200VM_opt.ova
4. Copy the Virtual NTBA Appliance software (.iso file or .ova file) to the ESX server datastore (either at datastore1 or datastore2
under /vmfs/volumes) using SSH from the server hosting the iso/ova release image. This is used for booting and installing the
Virtual NTBA Appliance.
Go to/vmfs/volumes/datastore1 and issue:
◦ For ISO: scp <user name>@<ip>:/<path>/imagename.iso.
Example: scp [email protected]:/home/ntbasensorImage_opt.iso.
◦ For OVA: scp <user name>@<ip>:/<path>/imagename.ova.
Example for T-VM: scp [email protected]:/home/ntbasensorImage.T-VM_opt.ova.
Task
1. Go to the McAfee ServicePortal at http://mysupport.mcafee.com and click Knowledge Center.
2. Enter a product name, select a version, then click Search to display a list of documents.
3. Download the McAfee Network Security Platform NTBA Administration Guide and Release Notes.
9. Click Next.
10. Preview the summary and click Finish.
11. Repeat steps 3 through 10 to add collection ports. Type the network label as Collection Port (see port vmnic5 in the
following figure)
The Network Configuration page is displayed.
Task
1. In the VMware vSphere Client, select File → Deploy OVF Template.
The Deploy OVF Template window is displayed.
2. Browse to the location where the OVA images are placed, and select a file depending on the virtual Appliance you want to
install. In this example, OVA image for T-VM is selected.
3. Click Next.
The OVF Template Details are displayed.
4. Click Next. In the Name and Location page, specify the name and location for the deployed template. By default, the OVA file is
displayed.
5. Type the name for the virtual machine. The name can contain up to 80 characters. In this example, the virtual machine is
named as My-NTBA. Click Next.
6. In the Resource Pool page, select where you want to deploy this template. In this example, it is named as My Resource Pool.
Click Next.
7. In the Disk Format page, select the disk format as thick or thin provisioning depending on the amount of the physical disk
storage left. McAfee recommends the default option, which is thick provisioning. Click Next.
Note: When deploying a virtual instance using an OVA image, the hard disk storage capacity is set to a maximum of 350 GB.
For a storage capacity of beyond 350 GB, you must use an ISO image.
8. On the Network Mapping page, map NTBA Collection source network to a collection port configured earlier while setting the network
port mapping on the ESX server. Similarly, map NTBA Management source network. Click Next.
9. On the Ready to Complete page, check the options you have selected. Click Finish to deploy the settings.
10. Verify that you have created one management port, four collection ports, and two hard disks as shown.
Note: Select the Power on after deployment checkbox if you want the virtual machine to be powered on once the deployment is
complete.
11. [Optional] With Virtual NTBA Appliance software version 9.1.3.54, you can configure the number of virtual sockets, number of
cores per socket, and the memory to match your desired flow processing rate. Select CPUs from the list of hardware devices.
Then, select Number of virtual socket and Number of cores per socket so that the total cores configured match the recommended CPUs.
See Resource limit matrix for more information.
12. [Optional] Select Memory from the list of hardware devices. Depending on the virtual Appliance you want to install, specify the
memory size.
Note: By default, the Virtual NTBA Appliance software version 9.1.3.54 is installed with a configuration of 16 GB Memory and 4
CPUs.
Important: Virtual NTBA Appliance must be shut down before attempting any configuration changes. After updating the
configuration settings, power on the NTBA Appliance for the updated settings to take effect.
13. Once the deployment is successful, click Close.
14. Type Y to proceed with the setup and configure NTBA IP address, device name, device IP address, device default gateway, Manager IP address,
TFTP server IP address.
Note: At this time, do not give the set sensor sharedsecretkey CLI command.
15. This completes creation of the virtual instance using the NTBA OVA image. Skip the next section Create a virtual instance using
ISO image and proceed to the section Configuring Virtual NTBA Appliance using Manager.
You can opt to add a serial port for troubleshooting purposes. However this is optional.
a. Turn off the Virtual NTBA Appliance.
b. [Optional] Right-click the new virtual machine and select Edit Settings to view the properties.
c. [Optional] Once the installation is complete, add a serial port.
Task
1. In the VMware vSphere Client, go to the Getting Started tab, and click Create a new virtual machine link.
3. Click Next.
4. Select the Create a new virtual disk option.
5. Click Next.
6. Specify the disk size as 250 GB. This is to store the Virtual NTBA Appliance software.
7. Select the Specify a datastore or datastore cluster option.
8. Click Next.
9. Select any SCSI virtual device node.
10. Click Next.
11. Click Finish.
12. Repeat these steps to add another hard disk of 250 GB or above. This will be used to store the NTBA database.
Configure memory
Task
1. In the VMware vSphere Client, go to the Virtual Machine Properties window, and select Memory from the list of hardware devices.
Task
1. In the VMware vSphere Client, go to the Virtual Machine Properties window, select Floppy drive from the list of hardware devices.
2. Click Remove.
3. Click OK.
Results
Repeat the steps to remove other unwanted hardware devices from the list.
Task
1. In the VMware vSphere Client, go to the Configuration tab on the VMWare ESX wizard.
2. From the Software list, select Security Profile.
3. In the Firewall section, click Properties.
4. In the Firewall Properties window, select the SSH Server checkbox under Secure Shell.
5. Click Options.
6. In Startup Policy, select the Start and stop with host option.
7. Click Start.
8. Click OK.
9. In the Firewall Properties window, select the SSH Client checkbox.
10. Click OK.
4. Type NTBA login as admin and Password as admin123 to log on to the Virtual NTBA Appliance.
5. Run the installntba command to start the Virtual NTBA Appliance installation.
Attention: You will be prompted to reboot the Virtual NTBA Appliance, but do not reboot. Reboot must happen only at Step 9.
A detailed error message will be displayed if the command fails.
6. Once the installation is complete, select the Virtual NTBA Appliance under the ESX server. Right-click the Virtual NTBA
Appliance and select Edit Setting.
The Virtual Machine Properties window appears.
7. Select CD/DVD drive and deselect the Connect at power on checkbox under Device Status.
A Virtual Machine Message window appears.
8. Click Yes.
9. From the NTBA console, type the reboot command.
The Virtual NTBA Appliance installation is complete when you see the NTBA login prompt.
Note: This might take several minutes to complete.
10. Type Y to proceed with the setup and configure NTBA IP address, device name, device IP address, device default gateway, Manager IP address,
TFTP server IP address.
Note: At this time, do not give the set sensor sharedsecretkey CLI command.
Task
1. Log on to the Network Security Manager.
2. Add the Virtual NTBA Appliance to the Manager using the Add Device Wizard.
3. If you have not already configured the NTBA interfaces (to which the flow records are addressed) in the Add Device Wizard, specify
the IP address and network mask for the NTBA Virtual Appliance collection port by selecting Devices → <Admin Domain Name> →
Devices → <NTBA Appliance> → Setup → Collection Settings.
4. Verify that the collection ports are up by selecting Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → Physical
Ports. Check that the ESX server's physical port that is mapped to the collection port is up. If the connection is down, you will
see a red cross mark as shown in the figure.
5. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Exporters → Exporters and click Edit.
Note: Configure the Sensor for L7 data export by selecting Devices → <Admin Domain Name> → Devices → <IPS/vIPS Sensor> → Setup →
Advanced → L7 Data Collection.
6. Under IPS Monitoring Port to be Used to Export Traffic :
a. Select the designated port for exporting flows.
b. Provide the port IP address to be used in the IPS monitoring port.
c. Provide the network mask.
d. Provide the default gateway. If the IPS exporting port and the NTBA collection port are directly connected, then provide the
default gateway as Flow Collection IP Address.
When the IPS interfaces are deployed inline, NTBA automatically inherits the direction from IPS. For example, If the IPS
interface is set to inbound the direction in NTBA will be set to internal. For span, the direction must be configured manually.
Only after making this change, the Save operation is allowed.
Note: You can mark interfaces as either external or internal only for the IPS interfaces that are non-inline.
7. Select the monitoring ports of IPS, which you wish to monitor, and click Save.
The saved settings are displayed.
8. If you would like the traffic to go through the collection port, you must configure static route. Select Devices → <Admin Domain
Name> → Devices → <NTBA Appliance> → Setup → Routing.
9. [Optional] To add a router or IPS Sensor as an exporter, select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> →
Exporters → Exporters and click New.
The Add Exporter page is displayed.
10. To create zones:
◦ If your deployment uses a CIDR network, then create CIDRs and associate them to internal or external zones.
The Virtual NTBA Appliance appears in the Manager as shown.
11. Perform a configuration update by selecting Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Deploy Pending Changes.
12. Check the NetFlow processing: On the command line, enter show nfcstats. Check the output to verify if the packets are being
processed correctly by the Virtual NTBA Appliance.
13. To make sure that NTBA monitors display information received from McAfee® Global Threat Intelligence™ , complete the
following steps:
a. Enable Global Threat Intelligence integration by selecting Manager → <Admin Domain Name> → Integration → GTI.
b. Configure DNS settings by selecting Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → Name Resolution.
c. Verify whether Global Threat Intelligence is enabled by default by selecting Devices → <Admin Domain Name> → Global → NTBA
Device Settings → Zone Settings → GTI IP Reputation.
d. Perform a configuration update by selecting Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Deploy Pending
Changes.
14. Verify/monitor your network traffic by selecting Devices → <Admin Domain Name> → Devices → <Device Name> → Troubleshooting → Traffic
Throughput.
Task
1. Connect to the ESX server using the VMware vSphere Client.
2. Click the Virtual Machines tab.
3. If the Virtual NTBA Appliancethat you want to delete is running, turn it off.
a. Select the Virtual NTBA Appliance.
b. From the menu bar, select Inventory → Virtual Machine → Power → Power Off.
c. Click Yes to confirm.
4. Delete the Virtual NTBA Appliance.
a. Select the Virtual NTBA Appliance.
b. From the menu bar, select Inventory → Virtual Machine → Delete from Disk.
A confirmation window appears.
5. Click Yes.
Results
The Virtual NTBA Appliance is deleted.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → Collection Settings.
The Collection Settings page is displayed.
2. Select the Inherit Settings checkbox if you want to use global settings.
Global settings are set at Devices → <Admin Domain Name> → Global → NTBA Device Settings → Device Settings → Setup → Collection Settings.
All other settings are disabled if this checkbox is selected. Deselect this checkbox to set NTBA Appliance device specific
settings.
3. Select the Discard Duplicate Flow Records checkbox to discard duplicate flow records.
Note: If Discard Duplicate Flow Records is enabled, the NTBA Appliance can detect if one or more exporters are sending flow records
belonging to the same traffic. This prevents duplication.
4. Click Save.
Note: To isolate and protect your management traffic, McAfee strongly recommends using a separate, dedicated
management subnet to interconnect the NTBA Appliance and the Manager. If the management and collection ports of the
NTBA Appliance are in the same subnet, flow information might be sent to the management port instead of the collection
port.
Column Description
Link Specifies the status of the collection port. The available status
are:
• Up
• Down
• Disabled
Virtual Adapter
Speed Specifies the speed and duplex of the port. The following are
the available options for speed:
• Auto-negotiate
• 1 Gbps(full)
• 100 Mbps(full)
• 100 Mbps(half)
• 10 Mbps(full)
• 10 Mbps(half)
Operation • Mode —
• Fail-Open Kit —
• Placement —
Response Port
Task
1. In the Collection Ports tab, double-click on the row of a collection port.
The Collection Port Details window is displayed.
1. Click the row of the collection port that you want to disable.
Note: To disable multiple collection ports, press the Shift key and click the multiple collection ports that you want to disable.
2. Click Disable. The collection ports are disabled.
Color Description
Red Port is enabled, but not operating due to some failure. Check
system faults.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → Physical Ports.
2. Click the Management Port tab. The following information is displayed.
Option Definition
Hypervisor Server
Note: You will not be able to modify any settings in this page. The settings can be modified only from the device CLI.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Exporters → Exporters.
The Exporters page is displayed.
2. Click New. From the Exporter Type, select Router. By default, IPS Sensor is selected.
Task
1. From the Exporters list, select the exporter you have added and click Edit.
The Properties page is displayed.
2. From Traffic to be Forwarded to NTBA, select Forward to NTBA for sending traffic from a router interface. Select the direction as External
for outbound traffic and Internal for inbound traffic.
3. Click Save.
The selected interfaces are displayed on the Properties page.
Task
1. Select Devices → <Admin Domain Name> → Devices → <IPS/vIPS Sensor> → Setup → Advanced → L7 Data Collection.
The L7 Data Collection page is displayed.
2. Select Customize against the protocol that you want to customize and select the required Enabled? checkboxes.
3. Click Save.
Task
1. Select Devices → <Admin Domain Name> → Devices → <IPS Sensor> → Setup → NTBA Integration.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Exporters.
Note: You can also edit the exporter by clicking Properties under the exporter you want to edit.
2. Select the exporter, and click Edit.
The Properties page is displayed.
Note: If the exporter is a Sensor, then you can only edit the description of the Sensor.
3. Make edits and click Save.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → Routing → New.
The Add a Static Route page is displayed.
2. Select an appliance port from the drop-down list. Check the port status.
Tip: When you select a port, Port Status displays whether the port is Up, Down, or Disabled. For disabled ports, static routes can't be
defined.
Tip: Go to Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → Physical Ports to assign an IP address to an
appliance port. If the port is assigned an IP address 0.0.0.0, the static route might not be able to reach the port.
Tip: You can select and delete multiple static routes from the list.
6. Select the route and click Edit or Delete to make changes.
Task
1. Select Devices → <Admin Domain Name> → Devices → <IPS Sensor> → Setup → NTBA Integration.
Note: On this page, SPAN ports are depicted with IPS Placement as N/A. Select from the NTBA Direction drop-down list to mark
these ports as internal or external for span traffic.
2. From the NTBA Direction drop-down list, select External to mark the interface as external or Internal to mark the interface as internal
only for SPAN ports.
Tip: To set NTBA direction for in-line ports, navigate to Devices → <Admin Domain Name> → Devices → <IPS Sensor> → Setup → Physical
Ports, and define placement inside or outside the network.
Note: For a router exporter, you can select the NTBA Direction as Internal or External from Devices → <Admin Domain Name> → Devices →
<NTBA Appliance> → Exporters → <Exporter> → Properties page.
3. Click Save.
Note: The current zone assignment for the interface is shown in brackets against Name. On changing the direction (to internal
or external), the interface is automatically moved to the corresponding default zone.
Important: If you want to add an exporter to another NTBA Appliance, you must first delete the existing exporter. To do so,
go toDevices → <Admin Domain Name> → Devices → <NTBA Appliance> → Exporters → Exporters. Select an exporter and click Delete.
Define zones
A zone is a concept of segregating network traffic either logically based on IP Addresses (CIDR zones) or physically based on
exporter interfaces (Interface zones).
Zones represent groups of endpoints whose traffic should be analyzed collectively for anomalous behavior. You can group the
network into various logical and physical zones. You can create zones according to specific network monitoring requirements.
For example, you can create a zone based on a particular LAN, a server zone, or a functional zone like HR or Finance for a group
of endpoints with similar functions. You can create different policies for each zone and monitor them exclusively.
Zone creation - rationale
Zone creation involves creating zone elements within the inside and outside zone configuration options in the Manager.
The reason for providing the option to mark zone elements as inside or outside is to provide greater flexibility in applying
policies, and for better capacity planning. (NTBA Appliance T-600 and T-1200 have capacities to monitor 200,000 endpoints and
400,000 endpoints, respectively. Information in excess of these capacities is dropped.)
All zone elements within the inside zone are monitored through the NTBA monitors in the Manager. You can apply different
policies for each zone to monitor threats.
Zone element types
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Zones → Inside Zones → Summary.
The Summary page for inside zones is displayed.
Summary page
2. Click New. Enter a name and description for the inside zone.
3. From Zone Elements, select Type as CIDR.
4. In CIDR, enter the CIDR address.
5. Click Add to create an inside CIDR zone. The zone element is displayed.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Zones → Inside Zones → Default Inside Zone → Protection Profile.
The Protection Profile page is displayed.
2. From the NTBA Policy drop-down list, select the policy that you want to apply.
3. Click Save.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Zones → Outside Zones → Summary.
The Summary page for outside zones is displayed.
2. Click New. Enter a name and description for the outside zone.
3. From Zone Elements, select Type as CIDR.
4. In CIDR, enter the CIDR address.
5. Click Add to create an outside CIDR zone. The zone element is displayed.
6. From Zone Elements, select Type as Interface. The Exporter and Interfaces options are displayed.
7. From Exporters, select one of the network devices configured as exporters.
8. From Interfaces, select the interfaces. (Hold down the CTRL key for multiple selections.)
9. Click Add and then Save to create an outside interface zone.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Zones → Outside Zones → Default Outside Zone → Protection Profile.
1. Select Manager → <Admin Domain Name> → Updating → Automatic Updating → Signature Sets. The Signature Sets page is displayed.
2. From the Automatic Signature Set Deployment options set the schedule for deploying signature updates:
◦ For Deploy in Real Time, select Yes (This option pushes signature sets update to all Sensors and NTBA Appliances immediately
after it is downloaded to the Manager). By default, No is the default option.
◦ For Deploy at Scheduled Interval, select Yes to schedule for automatic deployment of signature sets.
◦ In Schedule, set the frequency by which you want the Manager to check for a newly downloaded signature set. The choices
are:
◦ Frequently — Several times a day during a specified period at interval indicated in the Recur every option
◦ Daily — Once a day
◦ Weekly — Once a week
◦ Select the Start Time, End Time, and Recur every options to specify intervals. Based on Schedule frequency, these fields allow you to
select options.
3. Click Save.
On-demand deployment
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Deploy Pending Changes.
The Deploy Pending Changes page is displayed.
2. View the update information. If changes have been made, the Configuration & Signature Set column is checked by default.
3. Click Update.
A pop-up window displays configuration download status.
Task
1. Select Devices → <Admin Domain Name> → Global → Deploy Pending Changes.
The Deploy Pending Changes page is displayed.
To deploy the changes to a specific device, go to Devices → <Admin Domain Name> → Devices → <Device Name> → Deploy Pending Changes.
2. Click Update.
The Manager processes these updates in three stages — Queued, Deploying, Completed — and displays the current stage in the
Status Column.
Configuration update
Completed Shows that all the configuration changes have been updated
for the devices.
3. Click Offline Update Files to view and export the deployment changes file to offline Sensors. The changes can then be deployed to
the Sensors manually using the CLI command window.
4. Click Refresh to refresh the page and the status of the deployment.
5. Click Clear Status to clear the status column in the UI.
Note: Clearing the status does not cancel the deployment. The update process will be running in the background.
Task
1. Select Manager → <Admin Domain Name> → Setup → Network Threat Behavior Analysis → Central Collector.
The Central Collector page is displayed.
2. From the drop-down list, select a central collector.
3. Click Save.
Note: Once you upgrade NTBA or Sensor to 8.2, the exception objects are migrated and new ignore rules are created.
Option Definitions
Field Description
Search Type your search criteria in the field to find the ignore rule
with the matching elements.
Last Updated Time — Specifies the time when the ignore was last updated.
By — Displays the user who modified the rule.
Task
1. Select Policy → Network Threat Behavior Analysis → NTBA Ignore Rules.
The NTBA Ignore Rules page is displayed.
2. Click Add.
The Rule Details panel is displayed.
Rule Details
Task
1. Select Policy → Network Threat Behavior Analysis → NTBA Ignore Rules.
2. Select the ignore rule you want to clone and click Copy.
You can use Search to quickly find an ignore rule.
3. Make any changes and click Save.
Task
1. Select Policy → Network Threat Behavior Analysis → NTBA Ignore Rules.
The NTBA Ignore Rules page is displayed.
2. Select the ignore rule you want to delete and click Delete.
3. Confirm to delete the object.
Note: Only objects that are not assigned to any attack can be deleted.
Task
1. Select Policy → Network Threat Behavior Analysis → NTBA Ignore Rules.
The NTBA Ignore Rules page is displayed.
2. Click Save as CSV to export into an excel sheet.
You can also export the ignore rules from Policy → <Admin Domain Name> → Network Threat Behavior Analysis → Policy Export → NTBA Ignore
Rules.
Note: If you attempt exporting policies using Internet Explorer 10 in combination with Windows Server 2008/2012, the
Manager will generate the “Export of custom policy error”. To avoid this, go to Control Panel → Add or Remove Programs → Add/ Remove
Windows Components, the Windows Components Wizard window opens, select the Internet Explorer Enhanced Security Configuration and disable
it. For more information on the fault, see the McAfee Network Security Platform Product Guide.
Task
1. Select Policy → <Admin Domain Name> → Network Threat Behavior Analysis → Policy Import → NTBA Ignore Rules.
The Import page is displayed.
2. Select Append to the existing set of rules checkbox if you want to add the imported ignore rules to the existing set.
3. Click Browse to select a file.
Task
1. Select Analysis → <Admin Domain Name> → Attack Log.
2. Select the alert for which you want to create the Ignore Rule, and click Other Actions.
3. Select Create Exception and click the Add Ignore Rule option.
The Add Ignore Rule panel appears.
4. Specify your options in the corresponding fields.
Field Description
Modified Displays the last modified user, date and time for the Ignore
Rule. The field is blank when creating the rule for the first
time.
Owner Domain The name of the admin domain under which the Ignore
Rules are added.
Editable here The status Yes indicates that the Ignore Rule is owned by the
current admin domain. The status No indicates that the
Ignore Rule is not owned by the current admin domain.
Task
1. Select Manager → <Admin Domain Name> → Setup → Notification → IPS Events/NTBA Events → SNMP.
The SNMP tab is displayed where Enable SNMP Notification option and the configured SNMP Servers list is displayed.
2. Select Yes against Enable SNMP Notification and click Save.
3. Click New.
The SNMP page is displayed.
Field Description
Admin Domains Specify whether this applies to the child domains as well.
SNMP Version The version of SNMP running on your target SNMP server.
Version options are 1, 2c, Both 1 and 2c, and 3.
Send Notification If By attack for Sensor and the attack definition has this
notification option explicitly enabled for IPS — Forwards
attacks that match customized policy notification settings,
which you must set when editing attack responses within
the Policy Editor.
By Alert Filter for Sensor and the following notification filter is
matched for NTBA — Sends notification for all, or based on
the severity of alerts:
◦ Severity Informational above — Includes all alerts.
◦ Severity Low and above — Includes low, medium, and high
severity alerts.
◦ Severity Medium and above — Includes both medium, and high
severity alerts.
◦ Severity High — Includes only high severity alerts.
Authoritative Engine ID (Hex Values) The authoritative (security) engine ID used for SNMP version
3 REQUEST messages by primary Manager.
The hex value of the Authoritative Engine ID should have
only even pairs (For example, you can have hex value of 4
pairs like 00-1B-3F-2C).
Note: MAC address can also be used as Authoritative Engine
ID.
Authoritative Peer Engine ID (Hex Values): The authoritative (security) engine ID used for SNMP version
Note: The Authoritative Peer Engine ID field is available while 3 REQUEST messages by secondary Manager.
configuring SNMP version 3 only after successful creation Note: The Authoritative (security) engine ID for any Manager
of an MDR pair. is unique. At any point of time, the Authoritative Engine ID of the
Manager is static irrespective of Manager status in case of
an MDR pair. That is, when MDR switchover occurs, the
authoritative engine ID of the Manager will not change with
the status of the Manager. Hence, the alerts generated from
the Primary and Secondary Manager will have their
respective authoritative engine ID's.
Note: After successful deletion of an MDR pair, the
Authoritative Engine ID's are retained by the respective
Managers.
Authentication Level This specifies the authentication level and has the following
categories:
◦ No Authorization, No Privileges — Uses User name match for
authentication.
◦ Authorization, No Privileges — Provides authentication based on
the MD5 or SHA algorithms.
◦ Authorization and Privileges — Provides authentication based
on the MD5 or SHA algorithms. It also provides encryption
in addition to authentication based on the DES or AES
standards.
Customize Community
The following fields appear only when Authorization, No Privileges is selected as Authentication Level:
The following fields appear only when Authorization and Privileges is selected as Authentication Level:
Encryption Type The privacy protocol (AES or DES) used for encrypting SNMP
version 3 messages.
Privacy Password The privacy pass phrase used for encrypting SNMP version 3
messages.
5. Click Save.
The SNMP server is added to the SNMP Servers page.
Note: Do not use a broadcast IP address (that is, 255.255.255.255) as the target SNMP server for forwarding alerts.
Task
1. Select Manager → <Admin Domain Name> → Setup → Notification → IPS/NTBA Events → SNMP.
The SNMP tab with the Enable SNMP Notification option and the SNMP Servers list is displayed.
2. Select the configured SNMP server instance from the SNMP Servers list.
3. Configure the following:
a. To edit the settings, click Edit, modify the fields as required, and click Apply.
b. To delete the settings, click Delete and click OK to confirm deletion.
Task
1. Select Manager → <Admin Domain Name> → Setup → Notification → NTBA Events → Syslog.
The Syslog page is displayed.
2. Configure the following fields:
Syslog page
Field Description
Server Name or IP Address Enter the name or IP address (IPv4 or IPv6) of the Syslog
server where the alerts will be sent. You can configure
multiple Syslog servers separated by a semicolon.
Note: You can configure a maximum of eight Syslog servers.
UDP Port Port on the target syslog server that is authorized to receive
syslog messages.
Severity Mapping You can map each severity (Informational, Low, Medium, or
High) to one of these standard syslog severities:
◦ Emergency — System is unusable
◦ Alert — Action must be taken immediately
◦ Critical — Critical conditions
◦ Error — Error conditions
◦ Warning — Warning conditions
◦ Notice — Normal but significant condition
◦ Informational — Informational messages
◦ Debug — Debug-level messages
Send Notification If The attack definition has this notification option explicitly enabled — Send
notification for attacks that match customized policy
notification settings, which you must set when editing attack
responses within the policy editor.
The following notification filter is matched — Send notification based
on following filters:
◦ Allow All — Notifies for all discovered attacks.
◦ Block All — Blocks notification.
◦ Severity Informational and above — Includes all alerts.
◦ Severity Low and above — Includes low, medium, and high
severity alerts.
◦ Severity Medium and above — Includes both medium and high
severity alerts.
3. Click Save.
Note: You must click Save before you can customize the message format to be sent to your syslog server. Customization
option is available only if notification is enabled against Enable Syslog Notification.
4. Select your Message Preference to customize the format of the message to be sent to your syslog server.
Field Description
System Default The default message is a quick summary of an alert with two
fields for easy recognition: Attack Name and Attack Severity. A
default message reads:
Attack $IV_ATTACK_NAME$ ($IV_ATTACK_SEVERITY$).
Task
1. Select Manager → <Admin Domain Name> → Setup → Notification → IPS/NTBA Events → E-mail.
The E-Mail and Recipient List information is displayed under the E-mail tab.
Field Description
Enable E-mail Notification Select Yes to enable alert notification through email.
Send Notification If The attack definition has this notification option explicitly enabled — Send
notification for attacks that match customized policy
notification settings, which you must set when editing attack
responses within the policy editor.
The following notification filter is matched — Send notification based
on the following filters:
◦ Severity Informational and above — Includes all alerts.
◦ Severity Low and above — Includes low, medium, and high
severity alerts.
◦ Severity Medium and above — Includes both medium and high
severity alerts
◦ Severity High — Includes only high severity alerts.
The table below explains the functional interdependency of
the two options.
Suppression Time Type a Suppression Time for the notification. The suppression
time is the duration (minutes and seconds) to wait after an
alert notification has been sent before sending another alert
notification. The default and minimum value is 10 minutes
and 0 seconds. Suppression time is useful to avoid sending
excessive notifications when there is heavy attack traffic.
Message Body The message body is a preset response sent with the
notification with information pertaining to the alert.
System Default — The system default message provides the
notified admin with the most basic attack details so that an
immediate response can be made. Details include the attack
name, time detected, attack type, severity, the Sensor
Task
1. Select Manager → <Admin Domain Name> → Setup → Notification → IPS/NTBA Events → Script.
The Script page is displayed.
2. Specify the options in the corresponding fields.
Enable Script Execution Select Yes to enable alert notification through an executed
script.
Send Notification If The attack definition has this notification option explicitly enabled — send
notification for attacks that match customized policy
notification settings, which you must set when editing attack
responses within the policy editor.
The following notification filter is matched:
◦ Severity Informational and above — Includes all alerts
◦ Severity Low and above — Includes low, medium, and high
severity alerts
◦ Severity Medium and above — Includes both medium and high
severity alerts
◦ Severity High — Includes only high severity alerts
Suppression Time Enter a Suppression Time for the notification. The suppression
time is the amount of time (minutes and seconds) to wait
after an alert has been generated before sending the
notification. This will prevent alerts being sent through
notification in the event an alert has been acknowledged or
deleted through the Attack Log page within the suppression
time. The default and minimum value is 10 minutes and 0
seconds.
3. Click Edit.
The Script Contents page is displayed.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → Advanced → Alert Suppression.
The Alert Suppression page is displayed.
Task
1. Select Manager → Setup → Notification → NTBA Quarantine Events.
The Syslog page is displayed.
Syslog page
Field Description
Server Name or IP Address Enter the Endpoint IP address or the Endpoint name of the syslog
server where alerts will be sent.
For Endpoint IP address, you can enter either IPv4 or IPv6
address.
UDP Port Port on the target syslog server that is authorized to receive
syslog messages.
Severity Mapping You can map each severity (Informational, Low, Medium, or
High) to one of the standard syslog severities listed below:
◦ Emergency - System is unusable
◦ Alert - Action must be taken immediately
◦ Critical - Critical conditions
◦ Error - Error conditions
◦ Warning - Warning conditions
◦ Notice - Normal but significant condition
◦ Informational - Informational messages
◦ Debug - Debug-level messages
3. Click Save.
Note: You must click Save before you can customize the message format to be sent to your syslog server. The Customization
option is available only if notification is enabled against Enable Syslog Notification.
4. Select a Message Preference to customize the format of the message to be sent to your syslog server.
Field Description
System default The default message is a summary of an alert with two fields
for easy recognition: Attack Name and Attack Severity. A default
message reads: Attack $IV_ATTACK_NAME$
($IV_ATTACK_SEVERITY$).
Task
1. Select Manager → Setup → Notification → NTBA Quarantine Events.
2. In Message Preference, select the Customized option and click Edit.
The Customize Message page is displayed.
3. Type a message and select (click) the parameters for the desired alert identification format. You can type custom text in the
Message field. You can also click the Content-Specific Variables to move them to the Message field.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → Flow Exclusions.
Note: You can also add exclusions at the root node. This is explained in the following section.
The Flow Exclusions page is displayed.
2. Click New page.
Note: By default, the Inherit CIDR Exclusion List checkbox is selected. The New button is enabled on deselecting this checkbox.
3. Provide the IP address and the gateway port of the endpoint you want to exclude.
4. From the drop-down list, select Exclude all flow data or Exclude only L7 flow data.
5. Click Add and click Save.
6. Click Edit or Delete to make updates to the existing exclusion.
Task
1. Select Devices → <Admin Domain Name> → Global → NTBA Device Settings → Device Settings → Setup → Flow Exclusions.
The Flow Exclusions page is displayed.
2. If you want the child nodes to inherit the exclusion list, select the Inherit CIDR Exclusion list from GTI Participation Page checkbox.
3. Click Save.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Deploy Pending Changes.
The Deploy Pending Changes page is displayed.
2. Select the Configuration & Signature Set checkbox for the device and click Update.
A pop-up window displays that the download is in progress.
3. When the download completes, click Close Window.
Configure services
Services map ports to protocols for reporting and policy configuration display purposes. You can view default services and define
custom ones thorough the Services page.
Task
1. Select Manager → <Admin Domain Name> → Setup → Network Threat Behavior Analysis → Services.
The Services page with the defaults services already listed is displayed.
2. Click New.
The New Service page is displayed.
Task
1. Select Devices → <Admin Domain Name> → Global → NTBA Device Settings → Device Settings → Setup → Exporter Access.
The Exporter Access page is displayed.
The following fields are enabled/disabled according to the selection in Security Level.
Encryption Protocol The privacy protocol (DES or AES) used for encrypting
SNMP version 3 messages.
Note: Applicable when Authentication and Privacy (AuthPriv) and is
selected as Security Level.
Encryption Key Encryption key used for the selected privacy protocol.
Note: Applicable whenAuthentication and Privacy (AuthPriv) is
selected as Security Level.
◦ Type a string against Read Only Community String (Applicable when SNMP Version 2c is selected).
◦ Enter the SNMP Polling Interval in minutes.
3. Enter the User Name, Password, and the Write Password for the SSH Parameters.
4. Click Save.
Task
1. In the Manager, click Policy and then select the required Domain.
2. Select Network Threat Behavior Analysis → Communication Rules.
The Communication Rules page is displayed.
Field Description
Effective time Specifies the time from when the communication rule is
applicable.
Last Updated Time — Specifies the time when the rule was last updated.
By — Specifies the name of the user who last updated the
rule.
The communication rules page does not display all the rule objects that are created as shown below.
In the above example, you can see that the Risk/Address field displays only three rules when there are four created in the
communication rule. The four rules can be seen in the Rule Details panel. When, you save the communication rule, only those 3
rules that are displayed in the page gets saved.
You can use the following options to customize your view in the right panel.
Task
1. Click Policy and then select the specific Child domain.
2. Select Network Threat Behavior Analysis → Communiction Rules.
The Communication Rules page or the child domain is displayed.
1. Click the down arrow and select the order you want the rules to appear.
2. Select the option Sort Ascending or Sort Descending as per your sorting requirement.
The column, based on which the communication rules list are sorted is indicated in the column header by an up arrow icon for
ascending order and down arrow icon for descending order.
Task
1. Select Policy → Network Threat Behavior Analysis → Communication Rules.
The Communication Rules page is displayed.
2. Click .
The Rule Details panel is displayed.
Field Description
Owner Domain The name of the admin domain under which the
communication rule is added.
Editable here Yes indicates that the communication rule is owned by the
current admin domain.
No indicates that the communication rule is not owned by
the current admin domain.
Source Risk/Address Select the risk type from the Risk drop-down list. The
following are the available options:
◦ Any — Endpoints with any risk severity.
◦ High Risk Endpoints — Endpoints with high risk severity
◦ Medium+ Risk Endpoints — Endpoints having risk severity as
medium and high.
◦ Unverified+ Risk Endpoints — Endpoints with unverified risk
severity.
You can select the option to either risk or the IP address
From the Address drop down-list, select a rule object. Click
Destination Risk/Address Select the risk type from the Risk drop-down list. The
following are the available options:
◦ Any — Endpoints with any risk severity.
◦ High Risk Endpoints — Endpoints with high risk severity
◦ Medium+ Risk Endpoints — Endpoints having risk severity as
medium and high.
◦ Unverified+ Risk Endpoints — Endpoints with unverified risk
severity.
From the Address drop down-list, select a rule object.
Effective Time Configure the effective time for the communication rule .
1. From the Available drop-down list, select a rule object.
URLs Select the risk level of URLs that are applicable for the
communication rule. The following are the available options:
◦ Any
◦ High Risk URLs
◦ Medium+ Risk URLs
◦ Unverified+ Risk URLs
To add a new URL, type the URL in the URL text field, and
click Add.
Note: Ensure that you do not type the domain name
prefixed with the protocol (http://). Instead, type only the
domain name. Example : www.google.com.
Files Type the file name that is applicable for the communication
Appliance Actions Select a quarantine action and the severity level of the alert.
In the Quarantine drop-down list, select any of the following
options:
◦ Quarantine Destination
◦ Quarantine Source
◦ Quarantine Source and Destination
Manager Actions
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → Name Resolution.
The Name Resolution page is displayed.
Note: By default, the Inherit Settings? checkbox is selected. Deselect the checkbox to enable the fields in the Name Resolution
section.
2. Configure the following:
◦ Select the Enable Name Resolution? checkbox to enable it (Do not select this checkbox if you want to disable this feature).
◦ Specify the IP addresses for Primary DNS Server and Secondary DNS Server.
◦ Specify the Refresh Interval in hours.
3. Click Test Connection to check the DNS connection with primary DNS server.
4. Click Save.
Minimal Risk — Indicates this is a legitimate source or destination of content/traffic. McAfee GTI defines the reputation of
private addresses that are not seen on the public internet also to be minimal risk.
Unverified — Indicates that this appears to be a legitimate source or destination of content/traffic, but also displays certain
properties suggesting that further inspection is necessary.
Medium Risk — Indicates that this source/destination shows behavior believed to be suspicious and content/traffic to or from it
requires special scrutiny.
High Risk — Indicates that this source/destination does or will send/host potentially malicious content/traffic and we believe it
presents a serious risk.
In the context of NTBA, McAfee GTI provides reputation and country of origin information. Endpoint communication rules can
use that information as matching criteria. For example, you can generate an alert in the Attack Log if the source of a connection
is from a specific country or is known to be malicious.
Task
1. Select Devices → <Admin Domain Name> → Global → NTBA Device Settings → Zone Settings → IP Reputation.
The IP Reputation page is displayed.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Zones → Outside Zones → Default Outside Zone → IP Reputation.
The IP Reputation page is displayed.
IP Reputation page
2. By default, the Inherit Settings? checkbox is selected. Keep it selected to inherit the settings from the Global node. Deselect this
checkbox to configure Global Threat Intelligence IP Reputation settings at the zone name level.
Task
1. Select Manager → <Admin Domain Name> → Setup → Network Threat Behavior Analysis → Miscellaneous.
The Miscellaneous configuration page is displayed.
Miscellaneous page
Scan categories
Active device profiling is performed based on these scan needs:
• Scheduled scan — You can schedule to scan a set of endpoints or all endpoints in the inside zones. The IP addresses can be
sent from the Manager too. Example: Daily, Weekly.
• Internal scan — If no scheduled scans are defined, NTBA triggers a scan on its own endpoints as per its own schedule.
You can also exclude a list of IP addresses, CIDR zones, or ports that you do not wish to scan.
Task
1. If you are installing the Manager using the Add Device Wizard, the option to enable active device profiling appears on the last
screen.
-OR-
Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → Active Device Profiling.
The Active Device Profiling page is displayed.
2. Select the Enable Active Device Profiling? checkbox.
Note: The Enable Active Device Profiling? checkbox will be enabled per the NTBA Appliance. By default, it is disabled. On enabling
the checkbox, the previous configuration, if any, is displayed. This allows you to temporarily disable the option without losing
the original settings.
By enabling this checkbox, the scanning feature is enabled. This will start the scanning service. Various scan configurations can
also be enabled. The status of the device profiler service can be verified by using the service status DeviceProfiler CLI
command.
3. Use this section to exclude the following from being profiled and to bypass specific TCP/UDP ports normally used by the
scanner during the profiling process:
◦ Available Zones: By default, only inside zones are profiled. Use the arrow key to move it to the excluded list.
◦ CIDR Blocks: Type and click (+) to add a CIDR block to the excluded list.
◦ TCP/UDP Ports: Type and click (+) to add a TCP/UDP port block to the excluded list. By default, NTBA scans the ports 1, 7, 9,13,
21-23, 25-26, 37, 53, 79-81, 88, 106,110-113, 119, 135, 139, 143-145, 179, 199, 389, 427, 443-445, 465, 513-515, 543, 544, 548,
554, 587, 631, 646, 873, 990, 993, 995,1025-1029, 1110, 1433, 1720, 1723, 1755, 1900, 2000, 2001, 2049, 2121, 2717, 3000,
3128, 3306, 3389, 3986, 4899, 5000, 5009, 5051, 5060, 5101, 5190, 5357, 5432, 5631, 5666, 5800, 5900, 6000, 6001, 6646,
7070, 8000, 8008, 8009, 8080, 8081, 8443, 8888, 9100, 9999, 10000, 32768, 49152-49157, and 62078.
Caution: Be extremely cautious while configuring the internal and external zones. A configuration error might lead to external
endpoints being unintentionally scanned and could be considered an attack by an external organization.
4. In the Advanced section, you can set:
a. Profiling Frequency: To scan when needed or scheduled.
◦ Profile as needed: This option is for internal scan. The NTBA Appliance will decide when to scan.
◦ Profile as scheduled: This option lets you schedule the scan as you need it. Make sure you set the time based on GMT time
zone.
Note: To minimize scanning traffic, configure the schedule during off-peak hours.
b. Profile Expiration (days): Signifies the rescan time. For example, if the expiration date is set as 2 days, then the asset, if it has
been scanned before, will be scanned again only after the expiration date. After expiration, a device is profiled anew. By
default, the expiration is set as 2 days.
5. Click Save.
Note: Scanning/scan results might be filtered if devices such as IPS Sensor or Firewall are configured between the NTBA
Appliance and the endpoint to be scanned.
For more information on active device profiling, see Active device profiling
2. From the Update Interval drop-down list, select the update interval in the range of 2-24 hours. The default interval is set to 2
hours. This allows for the next automatic download signature set for download.
Tip: The lower panel displays the active version and latest available version of each component. For latest version, the icon is
green. If a newer version is available, the icon is red.
Tip: NTBA Appliances will continue to receive automatic updates for which configuring Name Resolution in the Manager is a
prerequisite.
3. Click Save.
Results
You have now set up updates for all devices that run Gateway Anti-Malware in the domain or device.
2. Type the Proxy Server Name or IP Address. This can be either IPv4 or IPv6 address.
3. Type the Proxy Port of your proxy server.
4. Type User Name and Password.
5. Provide the appropriate URL. You may test to ensure that the connection works by entering a Test URL and clicking Test
Connection.
6. Click Save to save your settings.
7. For your changes to be effective, make sure to restart the Gateway Anti-Malware service by using the below command:
service restart AntiMalwareService
8. To view the status of your Gateway Anti-Malware service, use the below command:
service status AntiMalwareService
When the Manager or the device makes a successful connection, it displays a message indicating that the proxy server settings
are valid.
Configuring policies
The NTBA Appliance polices are rule based monitoring and control tools.
The NTBA policies consist of anomaly policies that contain attack definitions for anomalies in TCP, UDP, and ICMP traffic and also
contain attack definitions for worms and callback activities.
The NTBA policies are assigned per zone and can be assigned to specific NTBA Appliances.
Option Definition
Ownership and Visibility Owner Domain Indicates the admin domain to which an NTBA
policy belongs.
Editable here Indicates whether you can edit or delete an NTBA
policy from the current admin domain. You can edit but not
delete the pre-defined NTBA policy. You can edit or delete a
user-defined NTBA policy only from the admin domain from
which it was created.Yes indicates that the NTBA policy
belongs to the current admin domain. If it is No, you cannot
edit the NTBA policy because it is defined at a parent admin
domain.
Last Updated Time Displays the time when the NTBA policy was last updated
By Displays the user who modified the NTBA policy.
New Click New to create an NTBA policy. The Properties and Attack
Definitions tabs are explained in the sections that follow.
Copy Select an NTBA policy and click Copy to copy it. This is helpful
especially if you want to use a non-editable NTBA policy with
slight changes.
Edit Select any of the listed NTBA policy and click Edit to edit or
view the details.
Properties tab
Viewing options
For a consolidated view of a group of the attack definitions, click on the column header of the field (Example : Attack Type) by which
it should be grouped and click Group by this field.
Note: To remove the display of attack definitions by groups unselect the Show in groups check-box option from the column header.
The Show in Groups option is enabled only if the Groups by this field option is selected.
You can search for an attack based on the criteria typed in the text field of the Search option. By typing the first few characters in
the Search text field, the attacks matching the typed characters are displayed on the page. By clicking the Clear All Filters button, the
filter is removed and all the attacks are displayed on the page.
Task
1. Select Policy → Network Threat Behavior Analysis → NTBA Policies.
The NTBA Policies page is displayed.
2. Click New.
The New Policy window opens with the Properties tab selected.
3. Update the following fields.
Option Definition
Name Enter a unique name to easily identify the policy. The name
should contain only letters, numerals, spaces, commas,
hyphens and underscores.
Note: The name field should not be left blank and no special
character should be entered while typing the name
Description Describe the policy for other users to identify its purpose.
Editable here The status Yes indicates that the policy is owned by the
current admin domain.
Prompt for assignment after save If you clear this option you can save the policy now and
assign it to a zone later. If you select this option, the
Assignments window opens automatically when you save the
policy and you can assign the policy to the required zone.
4. Click Next.
The Attack Definitions tab is displayed.
Attack Definitions
Option Definition
Attack Type Displays the category of attack. The attack categories are:
◦ Behavior
◦ Anamoly
◦ Threshold
◦ Reconnaissance
◦ Worm Attack
Prompt for assignment after save If you clear this option you can save the policy now and
assign it to the zone later. If you select this option, the
Assignments window opens automatically when you save the
policy and you can assign the policy to the required zone.
5. In the Attack Definitions tab, double-click on the row of the attack that you want to configure and update the settings. The attack
details are displayed on the right panel displaying the settings under the Settings tab. More details on configuring attack
details are given in the following section.
6. Click Save to save the NTBA policy.
Task
1. On the Attack Definitions tab, double-click on the row of the attack that you want to configure and update the settings. The attack
details are displayed on the right panel displaying the settings under the Settings tab.
Option Definition
Appliance actions
Alert Suppression Timer This field is displayed only configuring appliance response
for attacks of type Reconnaissance attacks. Select the
severity level of the attack:
◦ Inherit
◦ Set explicitly
Note: If you select the option Set explicitly, specify the
seconds in the number field.
Manager actions
Fields in the Capture Packets and Manager actions sections are displayed only when alerting (Alert field option) is enabled or
inherited.
Task
1. On the Attack Definitions tab, double-click on the row of the attack that you want to view the attack description.
2. Click the Description tab in the right panel.
Description tab
Results
The tab displays the description of the attack. The following details are also displayed:
• BTP
• RfSB
Comments section
To display the comments from the parent admin domain, select the checkbox Show Comments from Parent Admin Domains.
To make the comments to be displayed in the child admin domain, select the check-box Make Comment Available to Child Admin Domains.
Task
1. Click the Policy tab.
2. From the Domain drop-down list, select the domain you want to work in.
3. Select Network Threat Behavior Anaysis → NTBA Policies. The NTBA policies page is displayed.
4. In the Assignments column, click the Assignments value for the policy that you want to assign.
The Assignments page is displayed.
Option definitions
Option Definition
Search To filter the list of available zones, enter a string that is part
of the Available Zones.
Available Zones Lists the zones of the appliance in the admin domain. The
zones to which you have already assigned this NTBA policy
are displayed under Selected Zones.
Selected Zones Lists the zones to which you have assigned the selected
NTBA policy.
• Behavior attack
You can inherit these settings or set them explicitly. You can choose to quarantine NTBA attack packets of this attack type when
detected, customize severity, and Manager actions.
Task
1. Select Policy → Network Threat Behavior Analysis → NTBA Policies.
The NTBA Policies page is displayed.
2. Double-click on Master NTBA Attack Repository row. The Attack Definitions tab is displayed.
3. In the Attack Definitions tab, double-click on the row of the attack that you want to configure and update the settings. The attack
details are displayed on the right panel displaying the settings under the Settings tab.
Option Definition
Appliance actions
Alert Suppression Timer This field is displayed only configuring appliance response
for attacks of type Reconnaissance attacks. Select the
severity level of the attack:
◦ Inherit
◦ Set explicitly
Note: If you select the option Set explicitly, specify the
seconds in the number field.
Manager actions
Fields in the Capture Packets and Manager actions sections are displayed only when alerting (Alert field option) is enabled or
inherited.
Note: The panel also displays the name Multiple Attacks Selected. It ensures that you have selected multiple attacks to be edited at
the same time.
Configure the settings for the selected attacks and click Save to save the changes.
For further details, refer McAfee Network Security Platform Product Guide.
Task
1. Select Manager → <Admin Domain Name> → Setup → Admin Domains.
The Admin Domains page is displayed.
2. Click New.
The Add a Child Admin Domain page is displayed.
6. Click Close.
7. Click Finish.
The Admin Domains page now lists the newly created child admin domain.
Note: The default NTBA and worm policies selected while configuring the new child admin domain are listed under Policy →
<Admin Domain Name>/<Child Admin Domain Name> → Network Threat Behavior Analysis → NTBA Policies and Policy → <Admin Domain Name>/<Child
Admin Domain Name> → Network Threat Behavior Analysis → Worm Policies.
Task
1. Select Policy → Network Threat Behavior Analysis → Policy Export → NTBA Policies.
The Export NTBA and Worm Policies page is displayed.
Task
1. Select Policy → Network Threat Behavior Analysis → Policy Import → NTBA Policies.
The Import NTBA and Worm Policies page is displayed.
2. Click Browse to search your system for an exported policy file.
Note: Select the Skip duplicate file definitions checkbox if you want to skip duplicate file definitions.
3. Click Save to download the file to the Manager.
Note: Visibility rules apply to imported policies. For any custom (created or cloned) policy you import, if you deselect the Visible
to Child Admin Domains checkbox in the Add an NTBA Policy page during creation, the imported policy will only be visible in the parent
admin domain.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → Protection Profile .
The Protection Profile page is displayed.
2. Select the NTBA policy to be applied from the NTBA Policy drop-down list.
3. Select the worm policy to be applied from the Worm Policy drop-down list.
4. Click Save.
1. Consolidates conversations with attack information like 5-tuple, URLs, files, and programs involved in the connection for a
target or attacker.
2. Collects the accessed URLs, files, executables, and connections for the specified time interval based on suspicious activity
indicators. By default, these details are collected 60 minutes before and after an event occurred.
3. Checks if the endpoint is an attacker or target.
4. Collects data based on conditions that match the suspicious activity indicators.
Once the context-aware data is collected, NTBA stores this in the database for the configured period. By default, forensic data is
stored for 30 days. You can configure the collection settings from Devices → Devices → <NTBA device> → Setup → Collection Settings.
The Manager enables you to configure the forensics collection settings, and retrieves the context-aware data from NTBA when
you want to perform forensic analysis on a specific endpoint or attack.
The forensic data is stored as part of the virtual disk of NTBA. By default, the netflow data uses 60% and forensic data uses 40%
of the disk space. By enabling export of Layer 7, the entire payload is not exported. Only fields related to http, netbios, ftp,smtp,
file hash and attack ID are exported. In http application, specific fields of http (like URI, host) are exported. Netflow monitoring is
not made in real time as the statistics of the particular flow is sent every minute. If you upgrade from a pre-8.2 version to version
9.1, these default settings get applied during migration. You can modify these limits using the command set dbdisksize.
The RAID 10 layer is the first layer, followed by ext3 file system, and MariaDB layer is the container for the netflow, forensic, and
configuration databases.
You can modify the forensic database pruning settings from the Devices → Devices → <NTBA Device> → Maintenance → Database Pruning
page. For more details, see Prune the database.
When you analyze an endpoint on the Network Forensics page, the Manager queries all the NTBAs and displays data from the
NTBA that is mapped to the endpoint. On the Analysis → Network Forensics page, the displayed network forensic data is only from a
single NTBA.
Note: If an IP address is mapped to more than one NTBA, the Network Forensics page has Data Source drop-down list to view
network forensics data for NTBA mapped to an endpoint. The drop-down can be used to query the other NTBAs for forensic
information.
Note: By default, if you directly navigate to the Network Forensics page to analyze an endpoint, the current date and time and
analysis window of ± 60 minutes is displayed. If you perform forensics from other Manager UI paths for an endpoint, by default,
the time of event occurrence and analysis window of ± 10 minutes is displayed.
Destination matches attacker in another attack A target endpoint was involved in another attack or traffic
from/to this endpoint.
Source matches attacker in another attack An attacker endpoint was involved in another attack or traffic
from/to this endpoint.
Suspicious endpoint risk Endpoint made a connection to another endpoint with GTI
risk level of Medium Risk or High Risk.
Unverified endpoint risk Endpoint made a connection to another endpoint with GTI
risk level of Unverified.
Executable used in another attack Executable, for example, chrome.exe was involved in another
attack or traffic from/to this endpoint.
Suspicious executable malware confidence Endpoint accessed an executable that has malware
confidence level above Medium.
New executable Endpoint accessed a new executable that has not been
previously seen in the last x* days.
*x refers to the number of days defined on the Devices | NTBA
Device Settings | Device Settings | Setup | Collection Settings page.
URL used in another attack Endpoint accessed a URL that was involved in another attack
or traffic from/to this endpoint.
Suspicious URL risk Endpoint accessed a URL with GTI risk level of Medium Risk or
High Risk.
Unverified URL risk Endpoint accessed a URL with GTI risk level of Unverified Risk.
File used in another attack Endpoint accessed a file that is involved in another attack or
traffic from/to this endpoint.
Suspicious file malware confidence Endpoint accessed a file with suspicious malware confidence
of Medium or High.
Unverified file malware confidence Endpoint accessed a file with suspicious malware confidence
of Unknown.
New service detected A new service was installed on an endpoint that has not been
previously seen in the last x* days.
*x refers to the number of days defined on the Devices → NTBA
Device Settings → Device Settings → Setup → Collection Settings page.
Task
1. At the Global level, select Devices → Global → NTBA Device Settings → Device Settings → Setup → Collection Settings.
Tip: At a device level, you can navigate to Devices → Devices → <NTBA Appliance> → Setup → Collection Settings. If you want to inherit
the global level collection settings, select Use Global Settings.
2. Enter the listening port and select Discard Duplicate Flow Records if you do not wish duplicate records. By default, the UDP port is
set to 9996.
3. In the Network Forensics area, specify the following:
Item Description
Collect Network Forensics Data Select this checkbox to collect network forensics data. By
default, this checkbox is selected.
Applicable Attacks Select Any, IPS Attacks Only or NTBA Attacks Only. By default, this is
set to Any.
Collect Data Before the Attack For Select the time for which you wish to collect data before a
security event. By default, this is set to 10 minutes. The time
range is 1-60 minutes.
Collect Data After the Attack For Select the time for which you wish to collect data after a
security event. By default, this is set to 10 minutes. The time
range is 1-60 minutes.
Executable is 'New' if Not Seen in Previous Collect executable details if the executable is new in the
network. By default, this is set to 30 days. The day range is
3-90 days.
Service is 'New' if Not Seen in Previous Collect service details if the service is new in the network. By
default, this is set to 30 days. The day range is 3-90 days.
4. Click Save.
Tip: If no forensic data is displayed, execute the show forensic-db details command to check if the network forensics
feature is enabled or not. By default, this feature is enabled. You can use the set dbdisksize and show l7dcapstats
commands to set the percentage of disk size for the forensic data and view layer 7 captured data details.
The following table shows the information displayed on the Network Forensics page.
Item Description
Filter Criteria Panel
Enter IP address Enter the IP address of the endpoint whose network activities
you wish to analyze.
Event occurrence time Select the time at which the event occurred. The event can be
an attack, alert, or policy violation.
Analysis window Select the time period in which you wish to track an
endpoint's activities in the network. This includes activities
performed by an endpoint before and after a security event.
Task
1. In the Enter IP address field, enter an IP address for which you wish to view the suspicious flows and activity. Example: 1.1.1.9.
2. Select the date and time. Use the ± time to view endpoint behavior before and after an attack.
3. Click Analyze.
4. In the top panel, view Summary for endpoint details and connections made to and from an endpoint.
Summary Panel
Connections from endpoint Specifies the client connections from an endpoint that
include the TCP and UDP services and ports.
◦ Connections — The number of connections made from an
endpoint.
◦ Applications — The applications accessed from an endpoint.
◦ Endpoint Executables — The executables accessed.
◦ TCP Services — The tcp services used by an endpoint.
◦ UDP Services — The UDP services accessed by an endpoint.
5. In the lower panel, view Suspicious Flows for details like suspicious activity, applications, attack name, and files and URLs
accessed.
◦ From the flows, select the indicator to view specific activity-based flows. Example: blocked executable.
◦ View suspicious flows that have blocked executables involved in the attack.
Item Description
Suspicious Flows Panel
Suspicious activity indicators View indicators that map to an event like an alert or attack.
◦ Destination matches attacker in another attack
IP Address Specify an IP address and use Search to view flows for this
address.
Time Displays the date and time when the suspicious flow for an
event occurred.
Tip: You can sort the flows view based on time.
Suspicious Activity Displays the indicator that specifies the suspicious activity
performed like an URL accessed that was involved in
another attack, blocked executable accessed and others.
Source Specifies the source from which the flow was initiated for an
endpoint. Details include endpoint and ports used.
File/URL Accessed Specifies file or URL access details for a specific endpoint.
Task
1. Go to Analysis → Threat Explorer.
Attacker IP details
5. In the top panel, view Summary for attacker or target details and connections made.
6. In the lower panel, view Suspicious Flows for details like suspicious activity, applications, attack name, and files and URLs
accessed.
7. Click Save as CSV to export suspicious flows for analysis.
Results
Based on the suspicious flows and activity performed by an IP address, you can either block traffic initiated from this endpoint or
take any other action.
Task
1. Go to Analysis → <Admin Domain Name> → Attack Log.
2. Select an alert that you wish to drill-down and investigate. Click Other Actions.
For example, an event displays the NTBA communication alert category and is initiated from a source IP 176.104.168.2. You
now want to see if this IP address has been involved in suspicious activities in the network.
3. Select Perform Network Forensics and click the IP address for which you want to check.
4. On the Network Forensics page, view Summary for source or destination IP details.
Note: The IP address and time are automatically set to the time of occurrence as displayed in the Attack Log page. You can
select the time for which you wish to see activities performed by this IP address before and after an alert was raised.
5. View Suspicious Flows for details like suspicious activity, applications, attack name, and files and URLs accessed. You can view
events that happened before and after an attack occurred.
6. Click Back to return to the Attack Log page. Decide if the IP address traffic needs to be blocked or take any other corrective
measures.
Task
1. Go to Analysis → High-Risk Endpoints.
2. Select a high-risk endpoint that you wish to investigate.
3. View details in the lower panel for this endpoint like exploits, infections, and callbacks involved.
4. From the Endpoint Information tab, select Network Forensics.
5. On the Network Forensics page, view Suspicious Flows for source attacker or target endpoint.
6. Click Save as CSV to export suspicious flows for analysis.
Task
1. Go to Analysis → <Admin Domain Name> → Callback Activity.
2. Select a callback activity that you wish to investigate.
3. View details in the lower panel for this activity like zombies and events.
4. Select a zombie IP address that you want to investigate and view event details.
5. Click the Network Forensics to conduct the forensics analysis on the source and destination IP address.
6. On the Network Forensics page, view Suspicious Flows for target or attacker endpoints.
7. Click Save as CSV to export suspicious flows for analysis.
Response actions
With context-aware data in hand, administrators can view events and activity that happened before and after an attack. This
helps them analyze attacker or endpoint behavior in the network and take corrective measures or configured response action.
Note: Alternatively, you can go to Analysis → High-Risk Endpoints to view high-risk endpoints whose activities you want to track.
To analyze, click the endpoint bar that navigates to the High-Risk Endpoints page.
View details in the lower panel for this endpoint like exploits, infections, and callbacks involved. You can view more details on the
Endpoint Information and Endpoint Security Events tab. If you wish to see activities from this endpoint in a specific time window , go to
Endpoint Risk → Exploits tab, select an attack, right-click Take Action, and perform attacker or target endpoint forensics. The Network
Forensics page is displayed.
Note: Similarly, you can go to Infections and Callbacks tab and perform target or attacker forensics that have this endpoint involved.
Alternatively, you can go to Endpoint Information → Network Forensics and analyze behavior of an endpoint in the network.
Check and analyze suspicious flows and activity by this endpoint and decide if the endpoint is safe for your network.
Overview
Most enterprises today face a challenge in understanding executables running on the network. With malware increasing at a
rampant pace, it has become imperative for networks to understand executables sending traffic on the network. Malware can
exploit the network and endpoint's inability to coordinate information/policies. Some malware can name themselves as standard
executables and make standard application connections on the network. Such malware cannot be easily detected by looking at
just the endpoint processes or monitoring the network traffic flows in isolation.
Combining information at the endpoints with information in the network can provide security administrators deeper visibility
into your enterprise. McAfee Network Security Platform, along with Endpoint Intelligence Agent, provides security administrators
insight into what executables are running at endpoints that are linked to the network traffic. You can also view malware status
and details for non-executables like doc and pdf files. The administrator can then quickly investigate any unusual executable
behavior, classify executables and files running on the network as malicious or safe, and take response actions.
McAfee® Endpoint Intelligence Agent (McAfee EIA) (McAfee EIA) is an endpoint solution that provides executable and file
information to the NTBA Appliance. It delivers real-time and dynamically analyzed detection results.
When McAfee EIA is installed on an endpoint, it monitors the system for execution of all executables irrespective of whether it is
making outgoing connections. This helps you to even monitor data files like word and pdf documents. When a connection
attempt is made by an executable, McAfee EIA sends the executable information to the NTBA over an encrypted channel. Using
dynamic analysis, if EIA detects malicious data files, it sends the artifacts to NTBA over a separate channel. It also sends dynamic
analysis information in metadata. This gives enough time for the NTBA Appliance to process the executable and artifact
information and make it available at policy-decision points before the connection request packet is received.
With this solution, you can view all executables and files used on the endpoint. It also provides the number of endpoints using
each executable. All executables and files are classified as known good (allowed), known bad (blocked), or unclassified. For the
unclassified executables, the solution provides further malware confidence.
The executable information contains:
• 5-tuple information such as source IP address, destination IP address, source port, destination port, and protocol
• Executable name, full path, and hash of the executable that generated the connection
• User and operating system information associated with the executable
• Details such as MD5 hash value, product version, malware confidence, malware name, certificate signer, malware indicators,
and classification details.
The file information includes a detailed trace report or artifacts in JSON format. You can view details such as file version and
certificates. When network traffic is generated, based on the reputation of the executable file, you can allow or block them.
Architecture
McAfee EIA resides on the endpoint where it collects details about the executables that initiate traffic. When integration with
McAfee EIA is enabled, McAfee EIA sends the executable information to the NTBA Appliance, which uses it to enhance its analysis,
such as determining which endpoints are infected or are at risk of infection.
Architecture diagram
• ePO Server: The ePO server installs and configures the McAfee® Agent and McAfee EIA settings on the managed hosts. The
server is used to exchange the certificates that will be used to authenticate and secure McAfee EIA communication with the
NTBA Appliance.
• McAfee EIA : These are endpoints that have the McAfee EIA installed on them. They provide the executable information about
all executables to the NTBA Appliance. Based on dynamic analysis, if data files like doc and pdf are malicious, EIA provides file
information like malware name and artifacts to NTBA.
• NTBA Appliance: The McAfee EIA connects to the NTBA Appliance and sends the executable information to the NTBA
Appliance. The IPS Sensor/router, if configured, sends NetFlows to the NTBA Appliance. The NTBA Appliance also responds to
the Manager queries for monitors/dashboards data and also for endpoint intelligence information for existing NTBA and IPS
alerts.
• IPS Sensors/Routers: The NetFlow data that come from the IPS Sensor is correlated with the executable information coming
from the McAfee EIA. For the NTBA Appliance to receive NetFlows, you must configure the IPS Sensor/router as an exporter
(optional).
• McAfee Global Threat Intelligence: McAfee EIA gets the GTI information via the NTBA Appliance and computes the malware
confidence for an executable along with its own malware indicators.
• Manager: The Manager maintains the allowed and blocked hashes that can be leveraged by all devices configured on the
Manager for reporting and blocking purposes. The Manager pushes all the imported hashes to all the available NTBA
Appliances and the IPS Sensors.
Task
1. Set up McAfee Agent with ePolicy Orchestrator: Deploy McAfee Agent extension and McAfee Agentpackage to the ePolicy
Orchestrator server. Skip this step if you have deployed McAfee Agent version 4.8 or higher.
2. Set up McAfee EIA with ePolicy Orchestrator: Deploy the Endpoint Intelligence Management extension and McAfee EIA
package to the ePolicy Orchestrator server. Assign policy to managed systems for McAfee EIA to communicate with the NTBA
Appliance.
3. Enable EIA integration on the Manager: Establish connections between the NTBA appliance and the managed host systems
with the McAfee EIA by enabling EIA integration at the Global level or the Device level on the Manager. The Auto-Classification Settings
are available only at the Global level.
Note: Maximum endpoint connections supported on the NTBA Appliance is 12000.
4. Work with allow and block lists: You can either enable the auto-classification settings or manually change the executable
classification. The manually classified values of the executable hashes are added to the allowed/blocked hashes that the
administrator maintains.
5. Configure NTBA policies for McAfee EIA alerts: There are seven attack definitions for the NTBA policies. Based on which of
the alerts you want to see, you can configure policies to raise only those EIA alerts.
6. View executables running on endpoints: You can view all the executables running on your internal endpoints that have
made network calls on the Endpoint Executables page. The top n endpoint executables are displayed in the Top Endpoint Executables
monitor on the Home Dashboard page.
7. Analyze executable behavior: Even with auto-classification settings enabled, there might be instances where the executable
classification is not justified with its behavior. In such cases, you might want to investigate these executables and accordingly
change the executable classification as allowed or blocked so they appear with the modified value the next time. The changes
are updated to the allowed and blocked hashes maintained by the Manager. You can also generate reports to see more details
on the top 10 endpoint executables and endpoint executable connections.
Note: Quarantine of endpoints is not supported.
Task
1. In a web browser, go to www.mcafee.com/us/downloads.
2. Enter your grant number, then go to the appropriate product and version.
3. Download the McAfee Agent extension, MA-WIN x.y.z Build <abcd> Package <#y> (ENU-LICENSED-RELEASE), and the agent packages to
the system containing the McAfee ePO server.
For more information, see the specific version of McAfee Agent Product Guide.
3. At the top of the Extensions pane on the left side of the Extensions page, click Install Extension.
4. Browse to the MA-WIN x.y.z Build <abcd> Package <#y> (ENU-LICENSED-RELEASE) file you downloaded from the McAfee downloads
page.
5. Click Open to select the file, then click OK to proceed with the selection.
6. Click OK to install the extension.
Task
1. From the ePolicy Orchestrator console, click .
2. Select Software → Master Repository.
5. Click Next.
6. Click Save.
The package is added to the Master Repository.
Task
1. In a web browser, go to www.mcafee.com/us/downloads.
2. Enter your grant number, then go to the appropriate product and version.
3. Download the Endpoint Intelligence Management extension file, eim_epo_extension_<version>.zip.
4. Download the Endpoint Intelligence Agent file, eia_epo_deploy_<version>.zip.
Task
1. From the ePolicy Orchestrator console, select Menu → Software → Extensions.
2. At the bottom of the Extensions pane on the left side of the Extensions page, click Install Extension.
3. Browse to the eim_epo_extension_<version>.zip file you downloaded from the McAfee downloads page.
4. Click Open to select the file, then click OK to proceed with the selection.
5. Click OK to install the extension.
Task
1. From the ePolicy Orchestrator console, select Menu → Software → Master Repository.
Uploading package
4. Click Next.
5. Click Save.
The package is added to the Master Repository.
Task
1. From the ePolicy Orchestrator console, click
2. Select Client Task → Client Task Catalog.
3. Click New Task.
4. From the Task Types list, select Product Deployment.
Task
1. From the ePolicy Orchestrator console, select Policy Catalog:
a. Select Product as Endpoint Intelligence Agent <version>.
b. Select Category as EIA Settings.
For more information, see the Endpoint Intelligence Agent Product Guide.
Task
1. Select Devices → <Admin Domain Name> → Global → NTBA Device Settings → Device Settings → Setup → EIA Integration.
The EIA Integration page is displayed.
Note: The settings done at the parent admin domain level are inherited by default by its child domains.
2. Select the Enable EIA Integration checkbox to enable the feature.
Field descriptions
Field Description
Agent Connection Settings The NTBA Listening Port is the port on which the NTBA
Appliance listens for incoming connections from endpoints
running McAfee EIA. It is pre-populated with the value used
by default by the agents. You can edit this field by specifying
a port number between 0 and 65535.
At a device level, click View Agent Connectivity to verify EIA
connectivity with the configured NTBA device.
ePO Settings This section defines the parameters used to connect with
the ePO server and exchange the certificates used to
authenticate and secure agent communication with the
NTBA Appliance.
◦ ePO Server IP Address: Displays the IP address of the ePO
server
◦ ePO Server Port: This field is pre-populated with the value
used by default by the ePO server. You can edit this field
by specifying a port number between 0 and 65535.
◦ ePO User Name: Type the user name to log on to the ePO
console
Note: ePO user must enable the Allow Download of Certificates
present in the Endpoint Intelligence category of user
permissions.
◦ ePO Password: Type the password to log on to the ePO
console
◦ Open ePO Console: Click to configure the ePO settings from
here
Update ePO Certificate Click this button if there have been changes in the certificate
on the ePO side to automatically update all NTBA Appliances
in the admin domain node (and devices in the child admin
node that are inheriting them).
To check if McAfee EIA service is running on the NTBA Appliance, run the show endpointintelligence summary CLI command.
Note: ePO user must have the option 'Allow Download of Certificates' enabled in the Endpoint Intelligence category of user
permissions.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Setup → EIA Integration.
The EIA Integration page is displayed.
Note: If the Inherit Settings checkbox is selected (default), then the settings from the Global level for the selected admin domain
will be inherited by the device.
2. Deselect the Inherit Settings checkbox and select the Enable EIA Integration checkbox to configure settings for a particular device.
3. Follow the procedure as explained in Enable McAfee EIA integration globally to configure McAfee EIA at the device level.
Executable classification
Note: A new executable is not known to McAfee GTI and an administrator cannot classify it until its behavior is analyzed. For the
second occurrence, GTI discovers and computes reputation for an unclassified executable, and accordingly the NTBA
classification may vary.
Task
1. Select Policy → <Admin Domain Node> → Intrusion Prevention → Exceptions → File Hash Exceptions.
The Allowed and Blocked Hashes tabs are displayed.
Note: You can also go to the File Hash Exceptions page by clicking the Manage allow and block lists link from the Malware Files page or the
Endpoint Executables page.
2. Depending on the type of hashes you want to import, select the Allowed Hashes or the Blocked Hashes tab.
Tip: View Comment for auto-allowed and auto-blocked executables and decide to import the hashes.
3. Click Import.
The Import page is displayed.
4. Browse to the location of the file and click Import. The list is populated.
Note: By default, the list is sorted in the ascending order of the file name. To sort it according to your choice, you can click any
of the column name and select an option from the drop-down list.
5. You can append to the existing list by clicking the Append option, which is selected by default.
Note: For information about how to use the Replace option, see the Section, Remove or replace hashes from allow and block lists.
6. Use the Search option to locate an entry by the file hash, file name, or classifier.
7. You can consider adding a description in the Comment field as to why a file hash was allowed or blocked.
Note: The Comment field allows up to 250 characters.
Task
1. Select Policy → <Admin Domain Node> → Intrusion Prevention → Exceptions → File Hash Exceptions.
The Allowed and Blocked Hashes tabs are displayed.
Note: You can also go to the File Hash Exceptions page by clicking the Manage allow and block lists link from the Malware Files page or the
Endpoint Executables page.
Exporting Hashes
Task
1. Select an entry that you want to move. To select multiple entries, hold the SHIFT key while selecting.
2. From the Take Action drop-down list, select Move selected hashes to allow list or Move all hashes to allow list.
The selected entry is moved to the corresponding list that you have chosen. A message that the action is successful is
displayed on top of the page.
Task
1. Select an entry that you want to remove. To select multiple entries, hold the SHIFT key while selecting.
2. From the Take Action drop-down list, select Remove selected hashes (reset as Unclassified) or Remove all hashes (reset as Unclassified).
The selected entry is no longer be displayed on this page.
3. You can use the Replace option to put back the removed entry or to overwrite the old entries with new ones. A confirmation
message will be displayed.
4. Click OK to continue.
The old list is replaced with the new list.
EXECUTABLE: Unclassified This alert is raised when the No Raised once per executable
executable detected by executable is not classified by from the NTBA Appliance
Endpoint Intelligence Agent the administrator or is not
engine auto-classified.
EXECUTABLE: Blocked This alert is raised when the Yes Raised per executable per
executable detected by executable is marked as endpoint
Endpoint Intelligence Agent blocked by the administrator
engine or when the executable is
auto-classified based on GTI
Block List.
MALWARE: Very High- This alert is raised when the No Raised per non-executable file
confidence malware file malware confidence of the file such as doc or pdf file per
detected by Endpoint detected by McAfee EIA is very endpoint
Intelligence Agent engine high and the file is not
allowed.
Depending on which of the attack definitions are enabled in the NTBA policies, alerts are generated for the matching traffic.
The malware attacks can be viewed in the Top Malware Files monitor on the Manager Dashboard page, and the Top Attack Executables
table in the Threat Explorer.
Alert throttling
Run set endpointintelligence alertinterval CLI command to configure the time interval as to when the alert should be
raised again. By default, it is 7 days. It can be configured between 0 and 30 days. Configure it as zero to disable alert throttling.
Whenever a given executable property changes (malware confidence or classification), the alert generation interval is reset for
that executable.
Note: Filter functionality is not supported for Endpoint Intelligence Agent alerts.
Item Description
2 Executable panel
3 Details panel
Malware Confidence • Any Malware Confidence — Displays all High+ Malware Confidence
executables irrespective of their
malware confidence
• High+ Malware Confidence — Displays
executables with high and very high
malware confidence
Devices Displays the list of NTBA Appliances that Displays device names in the
have McAfee EIA services running on alphabetical order.
them
Attack Log
Upon double-clicking any executable hash you navigate to the Attack Log page. You can analyze and view alerts related to the
selected hash.
The date and time filter used in the Endpoint Executables page is persisted upon navigating to attack log. To close the attack log, click
Back or the X icon.
Manage Allow and Block lists
The Manage Allow and Block lists is a link to the File Hash Exceptions page.
Option Definitions
First Seen Displays when the executable was first reported by McAfee
EIA to the NTBA Appliance for the selected timeframe.
Last Seen Displays when the executable was last reported by McAfee
EIA to the NTBA Appliance.
Click any row to see additional information of the executable hash in the Details panel. The Details panel consists of:
EIA Details
This tab displays the executable or file information. This includes:
• Properties — Displays the malware confidence for the executable along with malware indicators that helped determine the
reputation.
Binary Name Displays the binary name and the type, whether process or
library.
Product Name Displays the product name for the executable or file.
Malware Summary
File Certificate Displays the certificate signer and status for the file
certificate, for example, Microsoft Corporation.
GTI Reputation Displays the file reputation received from GTI. Valid values
are Very Low, Low, Medium, High, Very High, and Unknown.
File Execution Summary Displays a summary of the tasks performed when a program
was executed. Examples: connects to the internet, changes
proxy settings, adds host file entries.
• File Execution Results — Shows some of the methods and engines that were used to compute the executable reputation.
Endpoints
This tab displays the list of endpoints running the executable during the selected timeframe.
Endpoints information
Field Description
User Displays the user name who invoked the executable or the
DLL. The user name can include system users and local users.
The Search field allows you to search by IP address, host name, operating system, or user columns.
Double-click the IP address to view alerts related to the IP address in the Attack Log. The alerts are filtered based on the IP
address selected. To close Attack Log, click Back or the X icon.
Applications
This tab displays the list of applications that have been invoked by the executable during the selected timeframe.
Field Description
Category Displays the category that the application falls under. For
example, HTTP falls under the Infrastructure Services
category.
The Search field allows you to search by application name, risk, or category.
Double-click the application to view alerts related to the application in the Attack Log. The alerts are filtered based on the
application selected. To close Attack Log, click Back or the X icon.
Task
1. Click Dashboard on the Home page to view the Top Endpoint Executables monitor.
a. Select Attacks to view executables that have generated most attacks.
-OR-
Select Endpoints (default) to view executables that have made most connections. The Device drop-down list is shown when you
select Endpoints. This list shows all NTBA Appliances configured that have McAfee EIA services running on them sorted in
alphabetical order.
b. Click DAP.exe in the Top Endpoint Executables monitor to go the Endpoint Executables page.
Note: Hover the mouse on the bar graph to see the executable name, number of attacks/endpoints, executable hash
name, classification type, and malware confidence level.
The executable, DAP.exe, shows high malware confidence but the classification type is shown as Unclassified.
2. The Endpoint Executables page provides network visibility on how many endpoints are running the executables, how many
connections were made, and the events that it triggered. It also displays the malware indicators used to compute the malware
confidence of the executable.
a. Click the Hash link, IP Address link, Application link, Attack link, Attacker IP Address link, or Target IP Address link in the
Details panel to go to the Threat Explorer page.
Note: In some cases, alert count is shown even for allowed executables such as Mozilla Firefox. If bad or malicious sites were
accessed and files downloaded using Mozilla Firefox, there could be executables generating alerts that result in increase of the
attack count.
3. Click View Attacks in the Threat Explorer page to go to the Malware Files page to view the malware confidence alerts, how the malware
confidence was computed by the individual malware engines, and overall malware confidence of the executable was
computed. This page also allows an in-depth analysis of the malware detected in your network.
Note: You can also go to the Malware Files page from the Endpoint Executables page.
Note: For alerts triggered by McAfee EIA, the bottom panel displays the Direction and Protocol as unknown, Attacker Country and
Target Country as blank, and Result as inconclusive.
4. Select Analysis → Network Forensics to further analyze the endpoint behavior on your network.
a. Enter the IP address of the endpoint for the selected date and time and click Analyze.
The Network Forensics page is displayed with summary, conversation, and event information.
Note: All the executables invoked on the endpoint are displayed in the Client connections panel.
b. Scroll to the Top 10 Conversations panel to see the connections made using this IP address.
Scenario Solution
NTBA-EIA integration with IPS Sensor The NTBA Appliance, the IPS Sensor, and McAfee EIA should
be configured in such a way that traffic from endpoints
passing through IPS, same endpoints must be configured to
send executable information to the NTBA Appliance.
NTBA-EIA integration without netflows coming to NTBA The solution will work. Applications associated with the
executables will not be shown. Events will not have
executable information. The Network Forensics page will be
blank.
NTBA-EIA integration in a setup with IPS Sensor and multiple The Endpoint Executables page displays information per NTBA
NTBA Appliances appliance. The block lists and allow lists maintained by the
Manager are pushed to all NTBA Appliances with EIA
integration enabled. McAfee recommends that you distribute
EIA agents across various NTBAs depending on the maximum
limit of endpoints supported by connected NTBA models.
Note: When more than one NTBA is configured to get
executable information from endpoints and if an NTBA is not
connected to IPS Sensor, the Endpoint Executables → Applications
displays no applications. Sensor generated alerts do not
display executable information.
NTBA-EIA integration in a setup with endpoints distributed The NTBA Appliance must be deployed closer to the specific
across geo-locations geo to be monitored in order to reduce data exchange across
WAN links. The number of endpoints at a particular geo-
location should be used as a factor to decide the location at
which the NTBA Appliance is to be deployed. For more
information, refer to the NTBA-EIA sizing recommendations.
NTBA-EIA integration in a setup with multiple ePO servers If there are multiple ePOs managing different parts of the
network and all endpoints need to communicate to a NTBA
appliance on the network, this can be achieved by using third-
party CA in ePO to provide the CA certificates. This way, all
endpoints will receive certificates from the same CA.
Best practices
The auto-classification settings for allow list executables (based on GTI reputation or signed by a trusted authority) are enabled
by default. Auto-classification for block list executables based on GTI reputation and dynamic analysis are disabled by default.
McAfee recommends that you keep all auto-classification settings as enabled unless you want to investigate every executable
manually.
For all executables, the malware confidence displayed on the Manager is a best effort based on malware indicators associated
with each executable.
If time permits:
• Once the solution is deployed, learn the executables used in the network to create a baseline computer profile, investigate, and
classify as allowed all the approved executables for your enterprise.
• Every time new patches are deployed, use the endpoint baseline generator to create an updated hash list and import into the
Manager.
• Investigate each executable that displays malware confidence as low or very low. For example, use the malware indicators,
alerts generated, and network forensics.
• Integrate with McAfee Advanced Threat Defense to leverage its sandboxing capabilities.
• Enable the Gateway Anti-Malware Engine running on NTBA as an additional engine for inspection of malware.
• Look at the number of endpoints using an executable, and the type of applications, events associated with the executable.
• If the number of endpoints is high, then it is unlikely that it is a bot.
• Analyze the results from all of these, and then make the final decision to allow list or block list an executable.
If you have time constraints, investigate executables that have malware confidence displayed as medium and above.
T-600 12,000
T-1200 12,000
T-VM 8,000
T-100VM 8,000
T-200VM 10,000
Troubleshooting
This section addresses some of the issues that might be encountered while working with McAfee EIA.
Connectivity issues
This section covers the scenarios and solutions for connectivity issues.
Critical faults
Critical faults are the highest severity faults and generally indicate a serious issue. See the Action column for potential
troubleshooting tips.
Endpoint Intelligence Service is down Endpoint Intelligence Service has not Please make sure that the ePO server is
started as the ePO is not reachable. up and running and is reachable to
NTBA.
Endpoint Intelligence Service has not Make sure that the ePO server supports
started as the ePO extension does not ePO Auto Signing functionality (Change
support auto-signing service. on Name confirmation).
Endpoint Intelligence Service has not Please provide valid ePO Server
started because of authentication error credentials.
connecting to the ePO server.
Endpoint Intelligence Service has not ePO server responded error, please look
started because of internal error from at the ePO logs.
the ePO server.
Endpoint Intelligence Service has not Please look at the ePO server and NTBA
started because of unexpected errors. logs for the error. Please try again.
Endpoint Intelligence Service has not Certificate invalid, please retry saving
started because of corrupt certificate. again.
Endpoint Intelligence Service has not This port is already in use; please
started because the configured port for configure an unused port.
Endpoint Intelligence Service is already
in use.
This query returns the list of Top Executables from the NTBA Appliance.
Note: Firewall port 443 (port is for McAfee GTI queries) and port 80 (port for McAfee GTI database download) should be open for
McAfee GTI information to be displayed in the NTBA monitors.
NTBA Appliance does endpoint look-up through NetBIOS or DNS. Hence, this type of network traffic emanating from NTBA is
normal.
For more information on configuring McAfee GTI integration in the Manager, see McAfee Network Security Platform Integration
Guide.
Monitoring networks
Monitoring of networks is a complex process. The process involves monitoring of network components consisting of network
devices and the traffic that flows through such devices.
Monitoring of network devices is essential as it has a direct impact on decisions regarding optimal use of network resources, and
tailored allocation of available bandwidth.
The ability to monitor network traffic in real time provides the inputs needed to take critical decisions that address the economic
and security concerns of an enterprise. This is more so when the network is spread across different geographical locations with
distributed applications.
McAfee® Network Threat Behavior Analysis (NTBA) Appliance effectively addresses these concerns and provides several options
of network monitoring that can be tailored by an enterprise to suit its requirements.
NTBA Monitors
The Dashboard page displays the following NTBA security monitors:
• Top Applications (NTBA)
• Top Destinations
• Top Files
• Top Sources
• Top URLs
• To Endpoint Executables
If multiple NTBA devices are configured, select the NTBA device for which you want to view the data from the first drop-down list.
The following options are available in the monitor's second drop-down list to view the top applications based on zones.
• All Zones - top applications based on all zones.
• Default Inside Zone - top applications based on inside zones.
• Default Outside Zone - top applications based on outside zones.
The following options are available in the monitor's third drop-down list to view the top applications based on risk levels.
• Any Risk - top applications with any risk level.
• High Risk - top applications with high risk level.
• Medium+Risk - top applications with medium and above risk level.
• Unverified Risk - top applications with risks that are not verified.
The fourth drop-down list are available in the monitor to view the top applications based on Bytes or Connections.
Clicking on a bar in the monitor, you will be redirected to the Threat Explorer page where more details on the application are
displayed.
Top Destinations
If multiple NTBA devices are configured, select the NTBA device for which you want to view the data from the first drop-down list.
The following options are available in the monitor's second drop-down list to view the destination IP addresses based on zones.
• All Zones - top destination IP addresses based on all zones.
• Default Inside Zone - top destination IP addresses based on inside zones.
• Default Outside Zone - top destination IP addressess based on outside zones.
The third drop-down list are available in the monitor to view the destination IP addresses based on Bytes or Connections.
Clicking on a bar in the monitor, you will be redirected to the Threat Explorer page where more details on the destination IP
address are displayed.
Top Files
The Top Files monitor enables you to view the files that are most used in the network based on bytes or connections.
Top Files
If multiple NTBA devices are configured, select the NTBA device for which you want to view the data from the first drop-down list.
The following options are available in the monitor's second drop-down list to view the files that are most used in the network
based on zones.
• All Zones - top files based on all zones.
• Default Inside Zone - top files based on inside zones.
• Default Outside Zone - top files based on outside zones.
Top Sources
The Top Sources monitor enables you to view the top source IP addresses identified in the network based on bytes or
connections.
Top Sources
If multiple NTBA devices are configured, select the NTBA device for which you want to view the data from the first drop-down list.
The following options are available in the monitor's second drop-down list to view the source IP addresses based on zones.
• All Zones - top source IP addresses based on all zones.
• Default Inside Zone - top source IP addresses based on inside zones.
• Default Outside Zone - top source IP addresses based on outside zones.
The third drop-down list are available in the monitor to view the source IP addresses based on Bytes or Connections.
Clicking on a bar in the monitor, you will be redirected to the Threat Explorer page where more details on the source IP address
are displayed.
Top URLs
The Top URLs monitor enables you to view the most accessed URLs in the network based on bytes or connections.
If there are multiple NTBA devices that are configured, select the NTBA device for which you want to view the data from the first
drop-down list.
The following options are available in the monitor's second drop-down list to view the top URLs based on zones.
• All Zones - top URLs based on all zones.
• Default Inside Zone - top URLs based on inside zones.
• Default Outside Zone - top URLs based on outside zones.
The following options are available in the monitor's third drop-down list to view the top URLs based on risk levels.
• Any Risk - URLs with any risk level.
• High Risk - URLs with high risk level.
• Medium+Risk - URLs with medium and above risk level.
• Unverified Risk - URLs with risks that are not verified.
Clicking on a bar in the monitor, you will be redirected to the Threat Explorer page where more details on the URL are displayed.
Task
1. Select Devices → Devices → <NTBA Appliance> → Troubleshooting → Traffic Throughput.
The Traffic Throughput page is displayed. By default Device is selected.
2. Select Device to generate a bar graph showing the total bytes observed in each direction for the last hour.
3. Select Zones to display the throughput for each zone in each direction with the time when the last packet was seen on that
zone.
You can use the Search field to search by a particular zone of the device.
4. Select Exporters to display the combination of exporter and interface, its line speed, and the utilization percentage in each
direction.
You can use the Search field to search by a particular zone of the device.
You can double-click an attack listed in the Attack Log to view the page in the <Attack Name> panel on the right hand side.
The alerts detail for a Volume DoS Anomaly Alert reflects the sample rate distribution at the time of raising the alert.
In the following illustration, the packet rate observed at the time that the alert was raised was 12.43 packets/sec.
Note: Quarantine option is also supported for Threshold-based anomaly attacks for endpoints.
The Alerts Detail for a Volume DoS threshold alert lists the details of the alert.
In the following illustration, the Alert Details page shows that the set threshold value and the observed value.
Note: Policies that contain set values for anomaly attacks and threshold attacks need to be applied to an NTBA Appliance and
NTBA zones for alerts to be raised in the Attack Log.
Configuration reports
The Configuration reports display information specific to an admin domain or NTBA Appliance with reference to the time at which
the report is generated. The output choices are HTML, PDF, Save as CSV and Save as HTML.
Task
1. Click the Manager tab.
2. Select <Admin Domain Name> → Reporting → Configuration Reports → Device Summary.
3. Select the Output Format.
4. Click Submit.
The field descriptions in this report are as follows:
Summary
◦ Device model — Provides the Sensor models configured
◦ Count — Displays a summarized count of the similar Sensor models
Sensor Name (IPS, Virtual IPS, NTBA, Virtual NTBA)
Name Displays the name of the Sensor. IPS, Virtual IPS, NTBA, Virtual NTBA
Model Displays the Sensor model number. IPS, Virtual IPS, NTBA, Virtual NTBA
Serial Number Displays the serial number specified on IPS, NTBA, Virtual NTBA
the physical Sensor.
Software Version Displays the current software version IPS, Virtual IPS, NTBA, Virtual NTBA
configured on the Sensor.
Contact Information Displays the contact information IPS, Virtual IPS, NTBA, Virtual NTBA
provided by the user at the time of
configuration of the Sensor.
Location Displays the geographical location IPS, Virtual IPS, NTBA, Virtual NTBA
provided by the user at the time of
configuration of the Sensor.
Signature Version Displays the current signature version IPS, Virtual IPS
configured on the Sensor.
Gateway Anti-Malware DAT Version Displays the current version of the IPS (NS Series), Virtual IPS, NTBA, Virtual
Gateway Anti-Malware DAT file. NTBA
Gateway Anti-Malware Engine Version Displays the current version of the IPS (NS Series), Virtual IPS, NTBA, Virtual
Gateway Anti-Malware Engine. NTBA
Anti-Virus DAT Version Displays the current version of the Anti- IPS (NS Series), Virtual IPS, NTBA, Virtual
Virus DAT file. NTBA
Anti-Malware Engine Version Displays the current version of the Anti- IPS (NS Series), Virtual IPS, NTBA, Virtual
Malware Engine. NTBA
IP Address Connected to the Manager Displays the IP address used by the IPS, Virtual IPS, NTBA, Virtual NTBA
Sensor to connect with the Manager.
Subnet Mask Displays the subnet mask IP address. IPS, Virtual IPS
Default Gateway Displays the IP address of the default IPS, Virtual IPS
gateway.
Up Time Displays the time period from when the IPS, Virtual IPS, NTBA, Virtual NTBA
Sensor started running.
Last Reboot Displays the date and time of the IPS, Virtual IPS, NTBA, Virtual NTBA
previous reboot.
Last Signature Set Update Displays the date and time of the IPS, Virtual IPS, NTBA, Virtual NTBA
previous signature set update.
Task
1. Select Manager → <Admin Domain Name> → Reporting → Configuration Reports.
The Configuration Reports page is displayed.
2. Click the NTBA Appliance link.
The NTBA Appliance report page with the configuration options is displayed.
Task
1. Select Manager → <Admin Domain Name> → Reporting → Configuration Reports.
The Configuration Reports page is displayed.
2. Click NTBA Configuration Summary link.
The NTBA Configuration Summary report page with the configuration options is displayed.
Field Description
Access Count Displays the number of times the URLs were accessed.
URL Reputation Displays the reputation score (risk factor) of the URLs.
Field Description
URL Reputation Displays the reputation score (risk factor) of the URLs.
URL Category Displays the category of the URLs, for example, Business,
Games, Search Engine.
Access Count Displays the number of times the URLs were accessed.
Field Description
URL Count Displays the number of times the URLs were accessed.
URL Category For each category, the following data will be displayed:
• URL - Displays all the URLs accessed.
• URL Reputation - Displays the reputation score (risk factor)
of the URLs.
• Country- Displays the country the URLs originates from.
Field Description
Executable Displays the file hash, name, and version of the executable
First Seen Displays when the executable was first reported by the
endpoint to the NTBA Appliance
Last Seen Displays when the executable was last reported by the
endpoint to the NTBA Appliance
Field Description
Endpoint Executable Details Displays the file hash, name, version, malware confidence,
classification of the executable, time when the executable was
first seen and last seen as reported by the endpoint to the
NTBA Appliance, the number of endpoints running the
executables, the events triggered by the executable, and the
number of connections made by the endpoint, and
comments.
Properties for Executable Displays the binary type, classifier, and classified details
Malware Indicators for Executable Displays the methods that were used to compute the
executable reputation
Libraries Invoked by Executable Displays the all the libraries (DLLs) invoked by the executable
Endpoints that have run Executable Displays information of the endpoints that have run the
executable
Field Description
Access Count Displays the number of times the files were accessed.
Field Description
Last Seen Displays when the endpoints were last seen on the network.
ETF Displays the threat factor value of the endpoints. See also,
Endpoint Threat Factor.
Field Description
Last Activity Time Displays the last activity time of the endpoints.
ETF Displays the threat factor value of the endpoints. See also,
Endpoint Threat Factor.
Field Description
ETF Displays the threat factor value of the endpoints. See also,
Endpoint Threat Factor.
Field Description
Field Description
ETF Displays the threat factor value of the endpoints. See also,
Endpoint Threat Factor.
Field Description
App Name Displays the application names, for example, HTTP, Gmail,
eDonkey.
Field Description
Service Name Displays the service names, for example, ftp (tcp), dns (udp).
ETF Displays the threat factor value of the endpoints. See also,
Endpoint Threat Factor.
Field Description
Service Name Displays the service names, for example, ftp (tcp), dns (udp).
Field Description
Field Description
Field Description
Service Displays the service names, for example, ftp (tcp), dns (udp).
Task
1. On the Manager home page, click Analysis.
2. Select Event Reporting → Next Generation Reports.
3. From the Saved Reports list, select a Next Generation default report and click Duplicate.
4. Select a Next Generation default report and click Duplicate.
The Duplicate Next Generation Report page is displayed.
5. Enter the name and description (mandatory fields), then click OK.
The duplicate report is displayed in the Saved Reports section.
6. Click Edit to change the parameters.
The Data Source page is displayed.
7. Select a row in the left pane to view the Data Fields options.
8. Click Save.
9. On the Save Query page, enter a name and description for the query.
10. Click Next.
The Select Recipients page is displayed.
11. Click New to add a recipient.
12. Click Finish to complete the process.
Task
1. On the Manager home page, click Analysis.
2. Select Event Reporting → Next Generation Reports.
3. Click New.
4. Select a data source for the report. Data source represent the database tables the report information is retrieved from.
5. Click New.
6. Select how the report is displayed: table, bar chart, or pie chart.
The Display Options page is displayed.
7. Select the columns that you want to include in the report by selecting rows in the left pane.
8. Select a row in the left pane to view the data filter options.
You can enhance the filter options for the fields selected in step 4 from the Data Filter options. Use the + and - options to add or
delete conditions.
3. Click Run.
The Run Report page is displayed.
4. Select the Date options. [Query for the day or between two dates, or for the specified period (number of months or weeks or
days or hours.)]
5. Select the Report Format. (HTML or PDF Portrait or PDF LandscapeSave as CSV or Save as HTML.)
6. Click Run.
For HTML and PDF options, the report is displayed in the Manager. For Save as CSV and Save as HTML, use the File Download option
to save the report.
Task
1. Select a Next Generation default report and click Duplicate.
2. Enter the Name and Description (mandatory fields) and click OK.
3. The duplicate report is displayed under Next Generation Saved Reports section.
4. Click Edit to change the parameters.
5. Select a row in the left panel to view the Data Fields options.
Note: The admin domain selected in the left pane has no impact on the reports generated. The admin domain data filter
selected is explicitly to filter the reports that are generated.
6. Click Save As to save the change made.
7. In the Save Report page, you need to enter a Name and Description for the Query.
You can also select the following options in the Save Report:
◦ Automate Report Generation
◦ Report Frequency
◦ Events to Display
◦ Report Format
8. Select Next. Select Recipients page is displayed.
9. Click New to add a recipient through the Add Recipient dialog.
10. Click Finish to completes the process and Next Generation main page is displayed.
Maintenance
You can maintain your NTBA appliance by keeping the software and signatures up-to-date, archiving data and maintaining the
database, and preparing for disaster recovery.
Task
1. Select Manager → <Admin Domain Name> → Updating → Download Device Software.
The Download Device Software page is displayed showing the software available for download.
There are two tables on this page.
◦ Software Available for Download — Current software versions available on the update server.
◦ Software on the Manager — The software versions that have been downloaded to the Manager.
2. Select the required software update from the Software Available for Download column of the Model: <Sensor Name> table.
Note: Click a version listed in the Software Available for Download column to view details of the software update.
3. Click Download to download the software updates.
Note: The following options are available for Sensor—Update all Sensors under the Sensors node, update a single Sensor.
What to do next
Use the Deploy Device Software option to deploy these software updates. For more information, see the McAfee Network Security
Platform Installation Guide.
Task
1. Select Manager → <Admin Domain Name> → Updating → Download Signature Sets.
The Download Signature Sets page is displayed.
2. View the Active Manager Signature Set: Version n.
This is the version that is currently available for your Sensors or NTBA Appliances to download. This signature set is kept in a
queue for download to your Sensors or NTBA Appliances. You can only have one version in the queue for download.
3. Select the signature update you want from Signature Sets Available for Download.
You can click a version number to view update details.
Note: If you have downloaded the latest version, a default message reads, No new signature sets available. The Manager has the most
recent signature set.
Note: Click view all to display all the signature updates available on the update server.
4. Click Download.
A status window opens to verify signature download progress. The Download button only appears when there is a new version
to download.
Note: Fore more information on Signature Set, see the Signature Set.
Task
1. Select Manager → Updating → Automatic Updating → Signature Sets.
The Signature Sets page is displayed.
1. As soon as signature updates are downloaded to the Manager from the update server (real-time).
2. By a set schedule.
Note: Setting both real-time and schedule options enables the system to check update availability for cases where the real-time
updating might have missed an update.
Note: If you are going to use automated updating, McAfee recommends a scheduled time rather than real time for signature
updating in case slower performance is experienced during signature file download. You can schedule a time when you know
your network sees a lesser amount of traffic.
Task
1. Select Manager → Updating → Automatic Updating → Signature Sets.
The Signature Sets page is displayed.
Task
1. Select Manager → Updating → Manual Import.
The Manual Import page is displayed.
2. Click Browse to locate the Sensor or NTBA Appliance software or signature set file or enter the absolute path of the file.
3. Click Import.
Task
1. Click Devices → <Admin Domain Name> → Devices → <Device Name> → Maintenance → Deploy Device Software.
The Deploy Device Software page is displayed.
In case of Sensors in fail-over pair, select a Sensor under the fail-over pair name node, and then select Upgrade.
Note: <Device Name> refers to name of the Sensor or NTBA Appliance.
2. Select the required version from the Software Ready for Installation section.
Note: The Software Ready for Installation section lists the applicable versions of software that you downloaded from the update
server (Manager → Updating → Download Device Software).
3. Click Upgrade.
When a device is being updated, it continues to function using the software that was present earlier.
4. After the update is complete, restart the Sensor or NTBA Appliance.
If the device that you updated is a Sensor in a fail-over pair (not applicable to NTBA Appliance), then update the other Sensor
in the pair also to the same version. Note that both the Sensors of a fail-over pair need to be of the same software version.
Task
1. Select Devices → <Admin Domain Name> → Devices → <Device_Name> → Maintenance → Reboot.
The Reboot page appears.
2. Click Reboot Now.
a. To perform a hitless reboot, clear the Full Reboot checkbox, then click Reboot Now.
3. Click OK to confirm reboot.
Task
1. Select Devices → <Admin Domain Name> → Devices → <Device Name> → Maintenance → Shut Down.
The Shut Down page is displayed.
2. Click Shut Down Now.
Note: The <Device Name> could be a Sensor or an NTBA Appliance.
Task
1. Select Devices → <Admin Domain Name> → Devices → <Device Name> → Troubleshooting → Diagnostics Trace.
Note: The <Device Name> could refer to a Sensor or an NTBA Appliance.
The Diagnostics Trace page is displayed.
Task
1. Select Devices → <Admin Domain Name> → Devices → <Device Name> → Maintenance → Import Configuration.
Note: The <Device Name> could refer to either a Sensor or an NTBA Appliance.
The Import Configuration page is displayed.
2. Click Choose File to locate your saved Sensor configuration.
3. Click Save.
4. Upon completion of import, reboot the NTBA Appliance.
5. Run an NTBA Appliance report to verify settings.
Task
1. Select Devices → <Admin Domain Name> → Devices → <NTBA Appliance> → Maintenance → Export Configuration.
The Export Configuration page is displayed.
2. Click Export and save the file.
Caution: Although this feature outputs an XML file, this file is NOT intended for reading or editing. Any manipulation of this
file besides regular copying from/to different media might result in failure during import.
Note: If you have applied global settings, then the Use Global Settings? checkbox will be selected. Deselect the checkbox to tune
the database at the NTBA Appliance level.
2. Do the following:
◦ Select the Inherit Settings? checkbox to enable database tuning.
◦ Select the day of the week from the drop-down list against Run Every.
3. Select the start time from the hour and minutes drop-down list against Start Time.
4. Click Save.
The default threshold settings are adequate to ensure proper pruning of the database and to ensure optimum memory usage.
The default threshold settings are therefore recommended. You can change the default settings based on the volume of traffic in
your network.
Task
1. Select Devices → Device → <NTBA Device> → Maintenance → Database Pruning. The Database Pruning page is displayed.
2. In the Total Disk Space section, the used and available disk space for flows is displayed. Click Show Disk Usage to view the latest
details.
3. Deselect the Inherit Settings? checkbox to prune the database for the NTBA device.
Fields Description
Specify the disk space capacity level at which each fault type is generated From the drop-down list, configure the disk space capacity
for the following faults:
◦ Informational Fault — By default, these faults are generated
when the disk capacity is 60%.
◦ Warning Fault — By default, these faults are generated when
the disk capacity is 70%.
◦ Critical Fault — By default, these faults are generated when
the disk capacity is 80%.
For each fault, you can set the disk capacity to in the range
of 50-100% like 55%, 60%, 65% and so on in increments of 5.
If you do not want to generate any of these alerts, Select
Disabled from the drop-down list.
Specify the maximum age for each storage type Type the maximum time the data can be stored for the
following storage types:
◦ 1-Hour Summary Data: The number of maximum hours to
store 1-Hour summary data.
◦ 6-Hour Summary Data: The number of maximum hours to
store 6-Hour summary data.
◦ 12-Hour Summary Data: The number of maximum hours to
store 12-Hour summary data.
◦ 1-Day Summary Data: The number of maximum days to store
1-day summary data.
◦ 2-Day Summary Data: The number of maximum days to store
2-day summary data.
◦ 7-Day Summary Data: The number of maximum days to store
7-day summary data.
◦ 14-Day Summary Data: The number of maximum days to store
14-day summary data.
◦ Network Forensics Data: The number of maximum days to
store network forensics data.
System events are raised when the database capacity reaches the set values.
5. Click Save.
Task
1. Select Manager → <Admin Domain Name> → Maintenance → Data Archiving → IPS → Archive Now (Manager → Maintenance → Alerts → Archiving →
NTBA → Archive Now for the NTBA Appliance).
The Archive Now page is displayed.
You can click an archived file listed in the Existing Archives page to view the details in the Archived File Info page.
4. Optionally, select an archived file in the Existing Archives page and click Export to download that file from the Manager to your
client.
Note: You can import an exported file it into another Manager, such as a test Manager.
Task
1. Select Manager → <Admin Domain Name> → Maintenance → Data Archiving → IPS → Automated Archival.
The Automated Archival page is displayed.
2. Select Yes against Enable Automatic Downloading to turn on the scheduling process.
3. Select values for any of the following against Frequency:
◦ Daily
◦ Weekly — (select the day of the week)
◦ Monthly
◦ Start Time — Hours: Minutes (24 hour clock)
4. Click Save. Every time the process runs, finished archival is saved to: <Network Security Manager install directory>
\alertarchival.
5. Optional:
◦ Click Refresh to reset the settings to those last applied. This is helpful when you started to make changes but forgot what the
last settings were.
◦ Click View Scheduler Detail to see the present settings for all scheduled processes. (Including backups, database maintenance,
and file maintenance actions.)
Export an archive
The Export Archives action enables you to export an archive from the Manager to your client, or to a location reachable by your
client. You can take the exported archival and import (that is, restore) it into another Manager, such as a test Manager.
Task
1. Select Manager → <Admin Domain Name> → Maintenance → Data Archiving → IPS → Export Archives.
The Export Archives page is displayed.
Task
1. Select Manager → <Admin Domain Name> → Maintenance → Data Archiving → IPS → Restore Archives.
2. Scroll down the page to the list of Existing Archives.
Restore an archive
The Restore action enables you to restore an archived alerts and packet logs file to the Manager. When restoring an archival to a
target Manager, the archive must be copied to a directory on the target Manager or a network directory that Manager can
access. The Restore feature also enables you to filter through the alerts in the archival.
Task
1. Select Manager → <Admin Domain Name> → Maintenance → Data Archiving → IPS → Restore Archives.
The Restore page with Restore Archives option and Existing Archives list is displayed.
commands
Displays all CLI commands supported for the current user role.
This command has no parameters.
Syntax:
commands
Applicable to:
M-series and NS-series, and NTBA Appliances.
deinstall
Clears the Manager-Sensor trust data (the certificate and the shared key value). Every time you delete a Sensor from the
Manager, you must issue this command on the Sensor to clear the established trust relationship before reconfiguring the
Sensor.
This command has no parameters.
Syntax:
deinstall
On executing the command, the following messages are displayed:
Initiating to deinstall and will remove trust with the configured Manager.
Closed communication channels with Network Security Manager.
Stopping all services.
Removing anomaly profiles.
Resetting the Endpoint Intelligence Agent related configurations.
Executable classifications are removed.
deletemgrsecintf
Clears the IP address of a Manager's secondary NIC.
This command has no parameters.
Syntax:
deletemgrsecintf
On executing the command, the following messages are displayed:
Please enter Y to confirm: y
Managers secondary intf IPaddr doesn't exist.
Deleting managers secondary interface had some Warnings/Errors.
Applicable to:
M-series and NS-series, and NTBA Appliances.
deletesignatures
Deletes signatures on the Sensor and reboots the Sensor. When you execute this command, the signatures are deleted and then
the Sensor is restarted automatically. Before executing the command, you are prompted whether both the tasks should be
performed.
This command has no parameters.
Syntax:
deletesignatures
On executing the command, the following messages are displayed:
Delete the signatures and reboot the sensor ?
Please enter Y to confirm: y
deleting the signatures and rebooting the sensor
signatures deleted
exit
Exits the CLI.
This command has no parameters.
Syntax:
exit
Applicable to:
M-series and NS-series, and NTBA Appliances.
factorydefaults
Wipes all settings, certificates, and signatures, from the Sensor, clearing it to blank settings. This command does not appear
when you type ? or commands, nor does the auto-complete function apply to this command. You must type the command in full
to execute it.
This command has no parameters.
Note: You are warned that the operation will clear the Sensor and you must confirm the action. The warning occurs since the
Sensor returns to its clean, pre-configured state, thus losing all current configuration settings.
help
Provides a description of the interactive help system.
This command has no parameters.
Syntax:
help
Sample Output:
intruShell@john> help or ntbaSensor@vNTBA> help
If nothing matches, the help list will be empty and you must backup until entering a '?' shows the available
options.
Two styles of help are provided:
1. Full help is available when you are ready to enter a command argument (e.g. 'set ?') and describes each
possible argument.
2. Partial help is provided when an abbreviated argument is entered and you want to know what arguments match
the input (e.g. 'set em?'.)
Applicable to:
M-series and NS-series, and NTBA Appliances.
host-vlan
Enables or disables host-vlan.
Syntax:
host-vlan <enable | disable>
Parameter Description
Applicable to:
M-series and NS-series, and NTBA Appliances.
loadimage
This command is used to install or upgrade the NTBA software on a physical or virtual NTBA Appliance.
Syntax:
loadimage <image path>
Sample Output:
nslookup
Displays nslookup query result for the given host-name.
Syntax:
nslookup WORD
Where WORD stands for the host name for which the nslookup query result must be displayed.
Sample Output:
ntbaSensor@vNTBA> nslookup google.com
Server: 10.213.154.101
Address 1: 10.213.154.101
Name: google.com
Address 1: 74.125.227.166 dfw06s32-in-f6.1e100.net
Address 2: 74.125.227.168 dfw06s32-in-f8.1e100.net
Address 3: 74.125.227.160 dfw06s32-in-f0.1e100.net
Address 4: 74.125.227.174 dfw06s32-in-f14.1e100.net
Address 5: 74.125.227.165 dfw06s32-in-f5.1e100.net
Address 6: 74.125.227.161 dfw06s32-in-f1.1e100.net
Address 7: 74.125.227.167 dfw06s32-in-f7.1e100.net
Address 8: 74.125.227.162 dfw06s32-in-f2.1e100.net
Address 9: 74.125.227.169 dfw06s32-in-f9.1e100.net
Address 10: 74.125.227.164 dfw06s32-in-f4.1e100.net
Address 11: 74.125.227.163 dfw06s32-in-f3.1e100.net
Address 12: 2607:f8b0:4000:804::1003 dfw06s32-in-x03.1e100.net
passwd
Changes the logon password for the Sensor. It prompts for the old password and then prompts for a new password. A password
must contain at least eight characters and can consist of any alphanumeric character or symbol.
This command has no parameters.
Syntax:
passwd
Sample Output:
ntbaSensor@vNTBA> passwd
Please enter old password:xxxxxxxx
Please enter new password:
ping
Pings a network host. You can specify either the IPv4 or IPv6 address here. This command pings the Sensor and returns a
response with the following values:
Value Description
time taken the average time taken by the Sensor to respond to the ping
packet loss number of packets lost during the execution of the command
rtt min/avg/max minimum, average and maximum time taken for a round trip
in a ping cycle
Syntax:
ping <A.B.C.D><A:B:C:D:E:F:G:H> -c <1-100>
Parameter Description
Sample Output:
• For Sensor, the output is as shown:
intruShell@NSP4050> ping 172.16.100.100
PING 172.16.100.100 with 32[60] bytes of data
40 bytes from host 172.16.100.100: icmp_seq=1 ttl=64 time taken 0.30 msec
--- 172.16.100.100 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0.30ms
rtt min/avg/max = 0.30/0.30/0.30 msec
• For an NTBA Appliance the output is as shown:
Example:
The following command pings a 128 bit address written as an octet of four hexadecimal numbers.
ping 2001:0db8:8a2e:0000:0000:0000:0000:0111
Applicable to:
M-series and NS-series, and NTBA Appliances.
quit
Exits the command line interface.
This command has no parameters.
Syntax:
quit
Applicable to:
M-series and NS-series, and NTBA Appliances.
reboot
Reboots the device. You must confirm that you want to reboot the device. If hitless reboot is currently available for the device,
then you are prompted to enter 'h' for hitless and 'y' for a full reboot. Use the status command to know if the hitless reboot
option is currently available for the device.
Note: In case of a full reboot, all the processes of a device are restarted. So, there is a break in the device's function until it comes
up again. In case of hitless reboot, only the required processes are restarted. For more information on hitless reboot, see McAfee
Network Security Platform Product Guide.
Syntax:
reboot
On executing the command the following messages are displayed:
• For Sensor, the output is as shown:
intruShell@john> reboot
Please enter Y to confirm: y
rebooting the Sensor...
Broadcast message from root (Fri Mar 29 05:45:14 2014):
The system is going down for reboot NOW!
• For an NTBA Appliance, the output is as shown:
ntbaSensor@vNTBA> reboot
Please enter Y to confirm: y
rebooting the NTBA Appliance ...
Applicable to:
M-series and NS-series, and NTBA Appliances.
resetconfig
This command is used to reset the NTBA configuration to the factory default values. This command can be used to clear all the
user defined configurations and to reset to default values.
Syntax:
resetconfig
This command will reset the configurations related to host finger printing, database pruning, anti-malware settings, proxy
settings, and de-duplication. This command will also remove the anomaly profiles and signature files configurations. The
command will break the Manager trust and after successful completion of the command will request user to re-establish trust
with the Manager. This command will not remove the exporter and interface details from the configuration.
On executing the command, the following messages are displayed:
Are you sure you want to reset the NTBA appliance configuration?
WARNING: All existing configuration will be lost and reset to defaults.
Please enter Y to confirm: y
If you enter Y, you will see:
Step 1 of 4: Checking if database migration is in progress
Database migration is not in progress. Continue with resetconfig.
Step 2 of 4: Removing trust with Network Security Manager
Step 3 of 4: Resetting NTBA configurations
Stopping all services
The configuration for the NTBA database is reset to default.
The configuration for NTBA services is reset to default.
Anomaly profile data is removed.
Signature files are removed.
Anti-Malware cache and DAT files are removed.
Miscellaneous configuration files are removed.
Executable classifications are removed.
Endpoint Intelligence Agent certificate files are removed.
Allowlist and blocklist sync information is reset to default.
ePolicy Orchestrator credentials are removed.
Step 4 of 4: Restarting all services
Configuration for NTBA appliance is reset to defaults.
IMPORTANT: Re-establish trust with Network Security Manager after the services are up. Go to the Manager console
and update configuration for the NTBA appliance so that the system can function.
Errors while running resetconfig
The following errors might occur while you reset the NTBA configuration:
Step 1 of 4: Checking if database migration is in progress
Database migration is not in progress. Continue with resetconfig.
Step 2 of 4: Removing trust with Network Security Manager
Network Security Manager trust is not removed. After resetconfig, run deinstall and re-establish the trust.
Step 3 of 4: Resetting NTBA configurations
resetpasswd
Changes the log in password for the NTBA Appliance. You can use this command only by inserting CD.
Syntax:
resetpasswd
On executing the command, the following messages are displayed:
Are you sure you want to reset admin password to default?
Please enter Y to confirm.
scan
Scans the IP address and provides information about host name, operating system, services running, device type, and MAC
address.
Syntax:
scan ip <ip_address>
Sample Output:
ntbaSensor@vNTBA> scan ip 192.168.1.5
Starting Nmap 6.25 ( http://nmap.org ) at 2014-03-28 06:57 UTC
Nmap scan report for 10.213.171.222
Host is up (0.000025s latency).
Not shown: 995 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.0 (protocol 2.0)
111/tcp open rpcbind 2-4 (RPC #100000)
443/tcp open ssl/https?
9876/tcp open sd?
1 service unrecognized despite returning data. If you know the service/version, please submit the following
fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port443-TCP:V=6.25%T=SSL%I=7%D=3/28%Time=53351D6F%P=x86_64-unknown-linu
SF:x-gnu%r(GetRequest,6F,"HTTP/1\.0\x20501\x20Not\x20Implemented\r\nConten
SF:t-Length:\x2033\r\nContent-Type:\x20text/plain\r\n\r\nDownload\x20hook\
SF:x20is\x20not\x20implemented\.")%r(FourOhFourRequest,6F,"HTTP/1\.0\x2050
SF:1\x20Not\x20Implemented\r\nContent-Length:\x2033\r\nContent-Type:\x20te
SF:xt/plain\r\n\r\nDownload\x20hook\x20is\x20not\x20implemented\.");
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=6.25%E=4%D=3/28%OT=22%CT=1%CU=35842%PV=Y%DS=0%DC=L%G=Y%TM=53351DF
OS:7%P=x86_64-unknown-linux-gnu)SEQ(SP=CF%GCD=1%ISR=D0%TI=Z%CI=Z%II=I%TS=A)
OS:OPS(O1=M400CST11NWA%O2=M400CST11NWA%O3=M400CNNT11NWA%O4=M400CST11NWA%O5=
OS:M400CST11NWA%O6=M400CST11)WIN(W1=8000%W2=8000%W3=8000%W4=8000%W5=8000%W6
OS:=8000)ECN(R=Y%DF=Y%T=40%W=8018%O=M400CNNSNWA%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=
OS:O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=Y%DF=Y%T=40%W=8000%S=O%A=S+%F=AS%O=M400C
OS:ST11NWA%RD=0%Q=)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%
OS:T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD
OS:=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL
OS:=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
Network Distance: 0 hops
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 149.18 seconds
service restart
Restarts all services or the specified service. To get the list of all services, run the service list command.
This command has all and <service_name> as parameters
Syntax:
service restart all
service restart <service_name>
Sample Output:
ntbaSensor@vNTBA> service restart all
Service command execution in progress. Please check status using "service status <service-name>" or status
command after some time.
service start
Starts all services or the specified service. To get the list of all services, run the service list command.
This command has all and <service_name> as parameters
Syntax:
service start all
service start <service_name>
For example, if the service user display name is NetflowProcessor, the command is service start NetflowProcessor.
Sample Output:
ntbaSensor@NTBA_210> service start NetflowProcessor
Service command execution in progress. Please check status using "service status <service-name>" or status
command after some time.
service status
Shows the status of all services or the specific service. To get the list of all services, run the service list command.
This command has all and <service_name> as parameters
service stop
Stops all services or the specified service. To get the list of all services, run the service list command.
This command has all and <service_name> as parameters
Syntax:
service stop all
service stop <service_name>
For example, if the service user display name is NetflowProcessor, the command is service stop NetflowProcessor.
Sample Output:
ntbaSensor@NTBA_210> service stop NetflowProcessor
Service command execution in progress. Please check status using "service status <service-name>" or status
command after some time.
Parameter Description
where <0 - 1440> is an integer between 0 (never) and 1440 (24 hours).
Example:
set console timeout 60
Default Value:
15 (15 minutes)
Applicable to:
M-series and NS-series Sensors and NTBA Appliances.
set dbdisksize
Specifies the percentage of disk size that can be allocated for netflow and forensic database. The percentage limits are 20-80%.
Syntax:
set dbdisksize netflow <20 |80>
set dbdisksize forensic <20 |80>
Sample Output:
ntbaSensor@vNTBA> set dbdisksize netflow 60
Setting database disk size...
Database disk size is set. Restarting netflow service...
ntbaSensor@vNTBA> set dbdisksize forensic 40
Setting database disk size...
Database disk size is set. Restarting forensic service...
set flow-fw
Forwards a copy of the NetFlow information from the NTBA Appliance to a third party device.
Syntax:
set flow-fw <ip> <A.B.C.D port> <1-65535>
Parameter Description
Parameter Description
Example:
set htf delta-period 180
Tip: Run the show htf CLI command to check if the change has taken effect.
Parameter Description
Example:
set htf max-deltas 100
Parameter Description
Default Value:
Parameter Description
Default Value:
Default port number is 8501.
Applicable to:
M-series and NS-series, and NTBA Appliances.
set manager ip
Specifies the IPv4 or IPv6 address of the Manager server's primary interface.
Syntax:
set manager ip <A.B.C.D |A:B:C:D:E:F:G:H>
Parameter Description
Example:
set manager ip 192.34.2.8
Or
set manager ip 2001:0db8:8a2e:0000:0000:0000:0000:0111
Note: If one or more four-digit group(s) is 0000, the zeros may be omitted and replaced with two colons (::)
Applicable to:
Parameter Description
Example:
set manager secondary ip 192.34.2.8
Or
set manager secondary ip 2001:0db8:8a2e:0000:0000:0000:0000:0111
Note: If one or more four-digit group(s) is 0000, the zeros may be omitted and replaced with two colons (::)
Applicable to:
M-series and NS-series, and NTBA Appliances.
<10|100> sets the speed on the ethernet management port. The speed
value can be either 10 or 100 Mbps. To set the speed to 1000
Mbps, use the set mgmtport auto command.
<half|full> sets the duplex setting on the ethernet management port. Set
the value half for half duplex and full for full duplex.
Note: The NS9500 and NS7500 Sensor models do not support this command. The speed of the management port in these
Sensors is set to auto by default.
Default Value:
By default, the management port is set to auto (auto-negotiate).
Applicable to:
NS-series Sensors except NS9500 and NS7500
Parameter Description
Sample Output:
• For Sensor, the output is as shown:
intruShell@john> set sensor gateway 10.213.174.201
sensor gateway = 10.213.174.201
• For an NTBA Appliance, the output is as shown:
ntbaSensor@vNTBA> set sensor gateway 192.34.2.8
sensor gateway = 192.34.2.8
Example:
set sensor gateway 192.34.2.8
Applicable to:
M-series and NS-series, and NTBA Appliances.
set sensor ip
Specifies the Sensor's IPv4 address and subnet mask. Changing the Sensor IP requires a Sensor reboot for the changes to take
effect. See the reboot command for instructions on how to reboot the Sensor.
Syntax:
set sensor ip <A.B.C.D E.F.G.H>
Sample Output:
• For Sensor, the output is as shown:
intruShell@john> set sensor ip 10.213.168.169 255.255.255.0
Sensor IP is already set, new IP will take effect after a reboot
sensor ipv4 = 10.213.168.169, sensor subnet mask = 255.255.255.0
• For an NTBA Appliance, the output is as shown:
ntbaSensor@NTBA_210> set sensor ip 10.213.171.210 255.255.255.0
Sensor IP is already set, new IP will take effect after a reboot
sensor ipv4 = 10.213.171.210, sensor subnet mask = 255.255.255.0
Example:
set sensor ip 192.34.2.8 255.255.0.0
Applicable to:
M-series and NS-series, and NTBA Appliances.
Parameter Description
Sample Output:
On executing the command, the following messages are displayed
• When Sensor is installed:
sensor is already installed, please do a deinstall before changing this parameter
• When Sensor is deinstalled:
◦ intruShell@john> set sensor name admin
sensor name = admin
◦ ntbaSensor@NTBA_210>set sensor name vNTBA
sensor name = vNTBA
Example:
set sensor name SanJose_Sensor1
Applicable to:
M-series and NS-series, and NTBA Appliances.
set store-url-type
This command is used to set the configuration to full capture information from the URL.
Example: For domain: http://abc.com, for full-url: http://abc.com/image.html.
Syntax:
set store-url-type <domain-name | full-url>
Parameter Description
domain-name capture only the domain name information from the URL
Note: When the NTBA Appliance is configured to store full URL (set store-url-type full-url), the performance might drop by 25-30
percent.
Parameter Description
Sample Output:
• For Sensor, the output is as shown:
intruShell@john> set tftpserver ip 192.34.5.12
TFTP Server IP = 192.34.5.12
• For an NTBA Appliance, the output is as shown:
ntbaSensor@vNTBA> set tftpserver ip 192.34.2.54
TFTP Server IP = 192.34.2.54
Example:
set tftpserver ip 192.34.2.54
Or
set tftpserver ip 2001:0db8:8a2e:0000:0000:0000:0000:0111
Note: If one or more four-digit group(s) is 0000, the zeros may be omitted and replaced with two colons (::).
Applicable to:
M-series and NS-series, and NTBA Appliances.
setup
This command is used to setup Sensor parameters. You are required to run this command when you newly set up your Sensor or
after resetting the Sensor by using the factory defaults command.
This command has no parameters.
Syntax:
setup
When you enter this command, you are prompted to enter the following:
• Current password
• New password
• Sensor name
• IP Type (IPV4=1 or IPV6=2 or BOTH=3)
Note: The IP Type command is applicable only for IPS. It is not applicable for NTBA.
• Sensor IP(IPv4 or IPv6 address or BOTH)
• Sensor subnet mask (IP address)
• Manager primary IP (IPv4 or IPv6 address or BOTH)
• Manager secondary IP (IPv4 or IPv6 address or BOTH)
show
Shows all the current configuration settings on the Sensor like model, installed software version, IP address and Manager details.
This command has no parameters.
Syntax:
show
Information displayed by the show command includes:
[Sensor Info]
• Date
• System Uptime
• System Type
• Software Version
• MGMT Ethernet Port
• System serial number (displays the primary, secondary and master/system serial numbers separately in case of NS9300)
[Sensor Network Config]
• IP Address
• Netmask
• Default Gateway
• Default TFTP server
Applicable to:
M-series and NS-series, and NTBA Appliances.
show aggstats
Displays aggregator statistics.
Syntax:
show aggstats
Sample Output:
ntbaSensor@vNTBA> show aggstats
[Aggregation module stats]
aggregator - mode : 1
aggregator - running flag : 1
aggregator - stop flag : 0
aggregator - thread stage : 11
aggregator - number of peers : 2
aggregator - peer component nodes :
1.0.0.0
10.213.173.174
aggregator - thread start timestamp : Mon Sep 30 14:54:58 2013
aggregator - latest packet processing timestamp : Tue Oct 1 10:27:32 2013
show anomaly
Displays statistics of host-level and zone-level anomaly profiles created.
Syntax:
show anomaly
Sample Output:
ntbaSensor@vNTBA> show anomaly
[anomaly info]
[zone anomaly status:]
[0] Zone id: 112, mode: DETECTION
[1] Zone id: 113, mode: DETECTION
[2] Zone id: 109, mode: DETECTION
Engine will be initialized whenever IPS service is coming up. Anti-Malware Engine Initializing
If engine fails to initialize NTBA failed to initialize Anti-Malware Engine because Anti-
Malware signatures are not available. Please try \"download
antimalware updates\" command.
NTBA failed to initialize the downloaded anti-malware NTBA failed to initialize the downloaded Anti-Malware
signatures signatures
The following table lists the different statuses that can be displayed by Last Update Status and the corresponding Last Update
Status Details depending on the action:
Copying Downloaded Files to Slot Failed Copying Downloaded Files to Slot Failed
Removing Old Dats from the slot Removing Old Dats the slot
Removing Old Dats from the slot Failed Removing Old Dats from the slot Failed
show cachestats
Displays cache statistics information for NetFlow processor.
Syntax:
show cachestats
Sample Output:
ntbaSensor@vNTBA> show cachestats
[Cache Stats Info for NetflowProcessor]
Cache Name : nf_conversation_cache
Node Size : 920
Max Nodes : 2000000
Current Allocs : 2074
Total Allocs : 403094
Total Frees : 401020
Failed Allocs : 0
Max Allocs : 2854
Cache Name : netflow_data_cache
Node Size : 1856
Max Nodes : 600000
Current Allocs : 17302
Total Allocs : 1966740
Total Frees : 1949438
Failed Allocs : 0
Max Allocs : 17303
Cache Name : netflow_src_cache
Node Size : 80
Max Nodes : 5000000
Current Allocs : 2972
Total Allocs : 555853
Total Frees : 552881
Failed Allocs : 0
Max Allocs : 3901
Cache Name : netflow_pkt_cache
Node Size : 1552
Max Nodes : 524288
Current Allocs : 0
Total Allocs : 1060375
show dbstats
Displays statistics of the database such as its status, disk size, total records and so on.
Syntax:
show dbstats
Sample Output:
ntbaSensor@vNTBA> show dbstats
[Database information]
Database status : Up
Database uptime : 7 days 19 hrs 37 min 25 secs
Total records inserted into database : 0
Average records per second : 0
Average data log files per second : 0
Database growth rate: 2%
Netflow database disk ratio: 30%
Forensic database disk ratio: 70%
Netflow database disk size : 75594.02M
Forensic database disk size : 176386.05M
Netflow database size: 147.3G
Forensic database size: 6.9M
show disk-usage
Displays disk usage per partition for all disk drives. This is equivalent to the df-h command in Linux.
Syntax:
show disk-usage
Sample Output:
Field Values
show exporters
This command displays exporter details like IP address, type, and interface count.
Syntax:
show exporters
Sample Output:
ntbaSensor@NTBA_210> show exporters
[Exporter details]
-------------------
Exporter name : M-2850-254
Exporter type : IPS sensor
Exporter IP : 10.1.1.10
Packets received : 210706
Last packet received time: 2014-11-04 12:48:41
Flow data records : 421412
Template records : 4458
Interface count : 2
show flowforwardinfo
Displays flow forwarding configurations.
Syntax:
show flowforwardinfo
Sample Output:
ntbaSensor@vNTBA> show flowforwardinfo
[flow forward Info]
Flow forward IP : 1.1.1.8
Flow forward Port : 2565
Flow forwarding mode : BLIND
show host-vlan
Shows the status of host-vlan whether it is enabled or disabled.
This command has no parameters.
Syntax:
show host-vlan
Sample Output:
ntbaSensor@vNTBA> show host_vlan
[HOST VLAN settings]
HOST VLAN : enabled
Applicable to:
M-series and NS-series, and NTBA Appliances.
show intfport
Shows the status of the specified Sensor port. Note that specifying a non-existent port results in an error. Ensure to capitalize the
character when typing the command. For example, 1a will be seen as an invalid command.
Syntax:
show intfport <port>
Parameter Description
Applicable to: M-series, NS-series, Virtual IPS Sensors, and NTBA Appliances. The command does not apply to Virtual Security
System instances; use the show ingress-egress stat command instead.
show l7dcapstats
Displays statistics for Layer 7 captured data.
Syntax:
show l7dcapstats
Sample Output:
show mem-usage
This command displays the system memory usage details of the device.
This command has no parameters.
Syntax:
show mem-usage
The show mem-usage command also gives the average percentage usage (Avg.) and the maximum percentage usage (Max.) of
these entities on all the processing elements.
The L7Dcap counter descriptions are as follows:
• Avg. Used L7 Dcap flows across all PEs — Average percentage of L7Dcap flows used from the value configured in the
Manager across all the Processing Engines in the Sensor
• Max. Used L7 Dcap flows on a single PE — Percentage of L7Dcap flows used from the maximum value that a single
Processing Engine manages
Sample Output:
• For Sensors, the output is as shown
Avg. Used TCP and UDP Flows across all PEs : 0%
Max. Used TCP and UDP Flows on a single PE : 0%
Avg. Used Fragmented IP Flows across all PEs : 0%
Max. Used Fragmented IP Flows on a single PE : 0%
Avg. Used ICMP Flows across all PEs : 0%
Max. Used ICMP Flows on a single PE : 0%
Avg. Used SSL Flows across all PEs : 0%
Max. Used SSL Flows on a single PE : 0%
Avg. Used Fragment Reassembly Buffers across all PEs : 0%
Max. Used Fragment Reassembly Buffers on a single PE : 0%
Avg. Used Packet Buffers across all PEs : 0%
Max. Used Packet Buffers on a single PE : 0%
Avg. Used Attack Marker Nodes across all PEs : 0%
Max. Used Attack Marker Nodes on a single PE : 0%
Avg. Used Shell Marker Nodes across all PEs : 0%
Max. Used Shell Marker Nodes on a single PE : 0%
Avg. Used L7 Dcap flows across all PEs : 0%
Max. Used L7 Dcap flows on a single PE : 0%
Applicable to:
NS-series Sensors
Applicable to:
M-series and NS-series, and NTBA Appliances.
show netstat
This command displays the management port netstat output.
This command has no parameters.
Syntax:
show netstat
Sample Output:
• For Sensor, the output is as shown
Applicable to:
M-series and NS-series, and NTBA Appliances.
show nfcstats
Displays the flow collector statistics. Check the output to verify if the packets are being processed correctly by NTBA.
Syntax:
show nfcstats
Sample Output:
ntbaSensor@vNTBA> show nfcstats
[Netflow-Collector Statistics]
-------------------------------
Total packets received : 1047496
Total flow data records received : 2291170
Total v10 flow data records : 20000
Total v9 flow data records : 2091170
Total v5 flow data records : 0
IPS flow data records : 2091170
Total Templates : 2467
V10 Templates : 2000
IPS templates : 467
Total TCP conversations : 240259
Total UDP conversations : 86656
Total ICMP conversations : 74702
Total L7 URL count : 20842
Total L7 FILE count : 12
Internal Hosts : 823
[Netflow Processing Stats]
show route
This command is used to show routes configured in the NTBA Appliance using Manager interface.
Syntax:
show route
Sample Output:
ntbaSensor@vNTBA> show route
network 10.10.210.0 netmask 255.255.255.0 gateway 192.168.0.251 port 1
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
10.213.173.0 0.0.0.0 255.255.255.0 U 0 0 0 mgmt
10.10.210.0 0.0.0.0 255.255.255.0 U 0 0 0 4
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 mgmt
22.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 2
0.0.0.0 10.213.173.252 0.0.0.0 UG 0 0 0 mgmt
show store-url-type
This command displays the current settings of the URL. The setting can be either ONLY-DOMAIN or FULL-URL.
Syntax:
show store-url-type
Sample Output:
ntbaSensor@vNTBA> show store-url-type
[store url type]
Url Store Type : ONLY-DOMAIN
status
Shows Sensor system status, such as System Health, Manager communication, signature set details, total number of alerts
detected, and total number of alerts sent to the Manager.
This command has no parameters.
Syntax:
status
Sample Output:
For Sensor, the output is as shown:
intruShell@john> status
[Sensor]
System Initialized : yes
System Health Status : good
Layer 2 Status : normal (IDS/IPS)
Installation Status : complete
IPv6 Status : Parse and Detect Attacks
Reboot Status : Not Required
Guest Portal Status : up
Hitless Reboot : Not-Available
Last Reboot reason : reboot issued from CLI
[Signature Status]
Present : yes
Version : 8.6.0.6
Power up signature : good
Geo Location database : Present
DAT file : Present
Version : 318.0
[Manager Communications]
Trust Established : yes (RSA 1024-bit or 2048-bit)
Alert Channel : up
Log Channel : up
Authentication Channel : up
Last Error : None
Alerts Sent : 961
Logs Sent : 974
tcpdump sec
Displays tcpdump capture for specified duration in seconds; optionally, tcpdump arguments can be placed after second duration
value.
Syntax:
tcpdump sec <1-30> WORD WORD …
Sample Output:
ntbaSensor@vNTBA> tcpdump sec 5
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
Examples:
tcpdump sec 5
tcpdump sec 5 -i eth4 dst host A.B.C.D
Applicable to:
NTBA Appliances only.
traceupload
Uploads an encoded diagnostic trace file to the configured TFTP server, from which you can send it to the McAfee Technical
Support for diagnosing a problem with the Sensor. A trace upload facility is also available in the Manager interface.
Syntax:
traceupload WORD
where WORD stands for the file name to which the trace must be written.
Note the following:
unknown-interfaces-flows
Flows from an unknown interfaces to NTBA Appliance. The unknown interfaces are only from known exporters.
Syntax:
unknown-interfaces-flows <accept> | <reject> | <status>
Parameter Description
Note: If SNMP is not configured, NTBA cannot discover interfaces and does not accept any flows from a router unless this
command is set to accept. You also need to configure proper CIDR ranges in inside and outside zones. If not configured, all
endpoints are treated as inside by NTBA.
Sample Output:
• For Sensor, the output is as shown:
intruShell@john> unknown-interfaces-flows accept
Accepted
• For an NTBA Appliance, the output is as shown:
ntbaSensor@vNTBA> unknown-interfaces-flows accept
ntbaSensor@vNTBA> unknown-interfaces-flows status
interface status: Reject
Applicable to:
Only NTBA Appliances
Parameter Description
Sample Output:
• For Sensor, the output is as shown:
intruShell@john> watchdog status
watchdog = off
• For an NTBA Appliance, the output is as shown:
ntbaSensor@vNTBA> watchdog status
watchdog = on
Applicable to:
M-series and NS-series, and NTBA Appliances.
Troubleshooting
This chapter addresses some of the issues that might be encountered while handling and setting up the NTBA Appliance.
Caution: Repairs to the NTBA Appliance may be done only by certified technicians under the guidance of McAfee support
personnel. The information given here is only for customer awareness purposes. Damage due to servicing that is not authorized
is not covered by any liability.
1. Connect the System restore USB flash drive to the NTBA appliance and power on the appliance.
2. After the McAfee logo is displayed, press F6 and under boot options, select the USB drive.
3. At the logon prompt, log on to the NTBA Appliance using the default user name admin and password admin123.
Note: You can type help or ? to access instructions on using the built-in command syntax help.
4. At the prompt, type installntba. This will take some time.
5. At the prompt, type reboot to bring up the NTBA appliance. Remove the USB flash drive.
6. At the logon prompt, log on to the NTBA Appliance using the default user name admin and password admin123.
Item Description
1 Link indicator
2 Activity indicator
Indicator Description
Link and activity indicators are off. The NIC is not connected to the network.
Link indicator is green. The NIC is connected to a valid network link at 1000 Mbps.
Link indicator is amber. The NIC is connected to a valid network link at 10/100 Mbps.
Activity indicator is green and blinking. Network data is being sent or received.
The Fault Type displays Gateway Anti-Malware signature download failure and the reasons can be:
• Incorrect proxy credentials — To resolve this issue, configure correct credentials.
• Update server is not reachable — To resolve this issue, check the network connection.
3. Check using the show netstat command if the NTBA Appliance is listening on port 8505.
[root@NTBA /nba]# netstat
Active Internet connections (w/o servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 172.16.233.156:56837 8.18.25.6:https ESTABLISHED
tcp 0 0 172.16.233.156:ssh 172.16.233.191:ltp ESTABLISHED
tcp 0 0 172.16.233.156:8505 172.16.233.66:56329 ESTABLISHED
Database issues
Run the show dbstats CLI command to show the current step for migration.
If the migration takes more than an hour, do not restart the appliance. Depending on your environment and settings, migration
might take shorter or longer period to complete.
To check if migration is complete, check system activity by running the status CLI command.
Note: Restarting the appliance is not required after migration.
Task
1. Select Devices → <Admin Domain Name> → Devices → <Device Name> → Troubleshooting → Diagnostics Trace.
Note: The <Device Name> could refer to a Sensor or an NTBA Appliance.
The Diagnostics Trace page is displayed.
1. Insert the NTBA USB recovery key in one of the available USB ports.
2. Restart the system.
3. Press F6 to boot from the USB key.
4. log on as admin in the NTBA Appliance console (password - admin123
5. Execute:installntba. If you wish to re-install NTBA without re-installing the database, execute: installntbaskipdb.
6. Execute: reboot
7. Remove the NTBA USB recovery key from the port.
Task
1. Insert the NTBA recovery disk in the DVD drive.
2. Restart the system.
3. Log on as admin in the NTBA Appliance console (password - admin123).
4. Run installntba.
If you want to re-install NTBA without re-installing the database, run installntbaskipdb.
5. Run reboot.
6. Remove the NTBA recovery disk from the DVD drive.
Task
1. Insert the NTBA recovery disk in the DVD drive.
Note: The default recovery disk shipped with NTBA Appliance is of version 7.1.x. It can be used to reset the admin password
on 7.1 and higher versions of NTBA Appliance software.
2. Restart the system.
3. Log on as admin in the NTBA Appliance console (password - admin123).
4. Run resetpasswd.
5. Run reboot.
Issue Checklist
Command Description
show intfport (1|2|3|4) Displays the statistics of the monitoring interface ports.
McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries.
Other marks and brands may be claimed as the property of others.