ESM AdminGuide 5.5
ESM AdminGuide 5.5
Contact Information
Revision History
General ......................................................................................................................161
Scheduled Rules Take too Long or Time Out ..............................................................162
Query and Trend Performance Tuning .............................................................................164
Persistent Database Hints .......................................................................................164
server.defaults.properties Entries for Trends ..............................................................164
Troubleshooting Checklist after Restarting the Manager ...............................................165
Disable these Trends on High Throughput Systems .....................................................165
How do you know when a trend is caught up? ............................................................166
How long does it take a trend to catch up? ................................................................166
Enhancing the Performance Globally for all Database Queries .......................................166
Unable to Execute Query: ORA-01555 ......................................................................167
SmartConnectors .........................................................................................................167
Overview ....................................................................................................................191
Notification Velocity templates .......................................................................................191
Commonly used elements in Email.vm and Informative.vm files ...................................191
The #if statement ............................................................................................192
Contents of Email.vm and Informative.vm .................................................................192
Using Email.vm and Informative.vm Template Files ....................................................193
Understanding the Customization Process ..................................................................193
Customizing the template files .................................................................................194
Sample Output ......................................................................................................195
This chapter describes the various tasks that you can perform to effectively manage
installation or perform additional configuration and maintenance operations for ESM
components.
Starting Components
Unless ESM is configured to run as a service, you run the Manager, Console, and
SmartConnectors using the Start menu. For Unix systems, you need to start the Manager
from a command or console window, or set up the Manager as a daemon. The remainder
of this section provides more information about command line options you can use to start
up, shut down, configure, or reconfigure ESM components. In addition, it provides
information about setting up the Manager as a daemon (on Unix platforms) or as a service
(on Windows), if you didn’t originally configure the Manager that way.
When it starts, the Manager displays a stream of messages in the command window or
terminal box to reflect its status. The command window displays the word “Ready” when
the Manager has started successfully. When you start the Manager as a service, to monitor
whether it has successfully loaded, view the server.std.log file, located in
<ARCSIGHT_HOME>\logs\default on Windows. On Unix systems, use the command:
cd ARCSIGHT_HOME;tail -f logs/default/server.std.log
On Windows systems, you can use a “tail” equivalent tool to run the same command, such
as those available from http://www.cygwin.com, which provides Unix environments and
tools for Windows.
The process executor is used, by default, on all Unix platforms. The Manager scripts ensure
that the Process Executor runs as a daemon before the Manager is started. This has some
implications with regards to troubleshooting Manager startup and runtime problems. The
Manager, if configured to use the Process Executor, does not start unless it detects the
presence of a running Process Executor. The Process Executor runs within its own
watchdog, in the same fashion as the Manager, so if the process stops for any reason, it
restarts automatically. The process executor is transparent to users regarding the way that
the Manager is started or stopped.
The stdout and stderr of the executed process are written into the following two files:
<ARCSIGHT_HOME>/tmp/[commandfile-name].stdout
<ARCSIGHT_HOME>/tmp/[commandfile-name].stderr
./arcsight console
restarted, for example—a dialog box appears in the ArcSight Console stating that your
connection to the Manager has been lost. Wait for the Manager to finish restarting, if
applicable. Click Retry to re-establish a connection to the Manager or click Relogin.
./arcsight agents
To start the service for a connector container run the following command as user
root:
/sbin/service arcsight_services start connector_<N>
...where <N> is the number of the container whose service you want to start.
arcsight managersvc –i
arcsight managersvc64 -i
1 Right-click the My Computer icon, and select Manage. The Computer Management
window appears.
2 Within the Computer Management window, expand the Services and Applications
folder.
3 Click Services.
4 Right-click the Manager service name and select Start to begin the service or Stop
to end the service
Within a Windows command prompt, type in the following command from the
<ARCSIGHT_HOME>\bin directory:
arcsight managersvc –r
arcsight managersvc64 -r
Check to ensure that the service was removed. If it was not, reboot the Windows system to
completely remove the service.
Doing an uninstall should automatically remove the service too. For the Manager service to
start automatically at system boot the option for it must be selected in the Manager setup.
Web) to reflect the installation directory and other settings. In addition, the
/etc/init.d/arcsight_* scripts are hooked into the Unix startup procedure, making
the Manager or Web start and shut down in lock step with the host OS.
To set up the Manager or ArcSight Web as a Unix daemon, open a terminal box on
<ARCSIGHT_HOME>/bin and run the appropriate wizard:
./arcsight managersetup
./arcsight websetup
Once everything is configured properly, test your configuration setup the next time you
start the Manager using /etc/init.d/arcsight_manager (or arcsight_web).
Make sure to start the Manager this way at least once before relying on it to start correctly
during system boot or startup.
It can place a large and constant load on the CPU of the machine.
It can slow the system down, because frequent scanning can impede writes to disk.
Therefore, we recommend that you exclude the following directories (and any
subdirectories under them) in <ARCSIGHT_HOME> from the virus scan list:
caches/server
logs
system
tmp
user, but include the user/agent/lib directory in the scan
archive
AUP Updater: This task runs in the manager and pushes to connectors any updated AUP
packages it might have.
Dependent Resource Validator: This task runs validations on resources in the system
and disables the ones that have problems.
Event Partition Statistics Updator: This task updates statistics on the partitioned event
tables, acting on today's partition.
Partition Archiver: This task archives event partitions based on your retention policy.
Partition Compressor: This task compresses event partitions based on your retention
policy.
Partition Manager: This task creates/drops partitions based on your retention policy.
Resource Search Index Updater: This task updates the resource search index.
Sortable Fields Updater: This task keeps sortable event fields in sync, based on the
current indices in the database.
Table Stats Updator: This task updates statistics on the non-partitioned schema tables,
which includes the resource tables.
You can configure the ArcSight Web server so that ArcSight Web displays a customized logo
or other image.
auth.login.banner=config/loginbanner.txt
This property configures the Manager to send the text from the file
<ARCSIGHT_HOME>/config/loginbanner.txt whenever a user runs the ArcSight
Console or ArcSight Web. (Changes to the properties file take effect the next time the
Manager is started.)
1 Create a custom logo image in .gif or .png format (such as MyLogo.gif). The image
should be approximately 138 x 39 pixels.
2 On the ArcSight Web server machine, copy this custom logo image file to the
<ARCSIGHT_HOME>/webapp/images directory.
loginLogoImg = <demo-logo-login.png>
4 Replace 'demo-logo-login.png' with your custom logo image file name. For example,
loginLogoImg=MyLogo.gif
6 Restart the ArcSight Web server and log into the ArcSight Web console.
You should see this newly added custom Web logo image in ArcSight Web console
Login Window.
When you uninstall ArcSight Web, style.properties and your custom logo image
files are deleted. Make sure to save these files so that you can use them when
you reinstall ArcSight Web.
This chapter describes the various tasks that you can perform to manage the component
configuration. The following topics are covered in this chapter:
servletcontainer.jetty311.encrypted.port=8443
Blank lines in this file are ignored as well as lines that start with a pound sign ( # ). Lines
that start with a pound sign are used for comments.
The second file, is the user properties file, such as server.properties. It can contain
any properties from the defaults properties file, but the property values in this file override
those in the defaults file. Thus, it contains settings that are specific to a particular
installation. Typically, the user properties file for a component is created and modified
automatically when you configure the component using its configuration wizard.
Because the user properties file contains settings you specify to suit your environment, it is
never replaced by an upgrade. If an upgrade, such as a service pack or a version update,
changes any properties, it does so in the defaults file.
config/console.defaults. config/console.properties
ArcSight Console
properties
Configuration
You can edit the properties using any simple text editor, such as Notepad, on Windows.
Make sure you use one that does not add any characters such as formatting codes.
If you configured the Console and SmartConnectors using default settings in the
configuration wizard, a user properties file is not created automatically for that component.
If you need to override a setting on such a component, use a text editor to create this file
in the directory specified in the above table.
When you edit a property on a component, you must restart the component for the new
values to take effect except for the dynamic Manager properties listed in the next section.
If you change a communication port, be sure to change both sides of the connection. For
example, if you configure a Manager to listen to a different port than 8443, be sure to
configure all the Manager’s clients (Consoles, SmartConnectors, ArcSight Web, and so on)
to use the new port as well.
ICMP none
ArcSight Console to Target communication (ping tool)
TCP 8443
Management Console and ArcSight Console to Manager
communication
UDP/TCP 53
ArcSight Console to DNS Server communication
(nslookup tool)
UDP/TCP 43
ArcSight Console to Whois Server communication (whois
tool)
Dynamic Properties
When you change the following properties in the server.properties file on the
Manager, you do not need to restart the Manager for the changes to take effect:
auth.auto.reenable.time
auth.enforce.single.sessions.console
auth.enforce.single.sessions.web
auth.failed.max
auth.password.age
auth.password.age.exclude
auth.password.different.min
auth.password.length.max
auth.password.length.min
auth.password.letters.max
auth.password.letters.min
auth.password.maxconsecutive
auth.password.maxoldsubstring
auth.password.numbers.max
auth.password.numbers.min
auth.password.others.max
auth.password.others.min
auth.password.regex.match
auth.password.regex.reject
auth.password.unique
auth.password.userid.allowed
auth.password.whitespace.max
auth.password.whitespace.min
external.export.interval
process.execute.direct
servletcontainer.jetty311.log
servletcontainer.jetty311.socket.https.expirationwarn.days
ssl.debug
web.accept.ips
whine.notify.emails
xmlrpc.accept.ips
After you make the change, you use the manager-reload-config command to load
those changes to the Manager. Every time the manager-reload-config command is
successful, a copy of the server.properties file it loaded is placed in
<ARCSIGHT_HOME>/config/history for backup purposes. The server.properties
file in <ARCSIGHT_HOME>/config/history is suffixed with a timestamp and does not
overwrite the existing versions, as described in the following example.
Example
Manager M1 starts successfully for the first time on September 26, 2012, at 2:45 p.m. A
backup copy of its server.properties file is written to
<ARCSIGHT_HOME>/config/history with this timestamp:
server.properties.2012_09_26_14_45_27_718
On September 27, 2010, the M1 administrator adds the following property to the
server.properties file:
notification.aggregation.max_notifications=150
When the administrator runs the manager-reload-config command at 1:05 p.m. the
same day, it runs successfully because this property can be loaded dynamically.
server.properties.2012_09_26_14_45_27_718
server.properties.2012_09_27_01_05_40_615
notification.aggregation.time_window=2d
As this property can be also loaded dynamically, similar to the previous change, once the
updated server.properties is loaded in M1’s memory, a backup copy of the
server.properties file is written to <ARCSIGHT_HOME>/config/history with
appropriate timestamp.
server.properties.2012_09_26_14_45_27_718
server.properties.2012_09_27_01_05_40_615
server.properties.2012_09_28_03_25_45_312
The updated server.properties file is not loaded into M1’s memory, however,
changes made to it are not reverted.
M1 continues to use the properties that were loaded on September 29th.
No backup copy is made. The <ARCSIGHT_HOME>/config/history directory
continues to contain the same three backup files:
server.properties.2012_09_26_14_45_27_718
server.properties.2012_09_27_01_05_40_615
server.properties.2012_09_28_03_25_45_312
The changes made on September 30th are not effective until M1 is restarted.
1 Change the property in the server.properties file and save the file.
3 Run this command in <ARCSIGHT_HOME>/bin to load the new values for the
properties you changed:
arcsight manager-reload-config
If this command fails with a warning, it indicates that you are changing properties that
require a Manager restart before those changes can take effect. When you get such a
warning none of the property changes, including the ones that can be reloaded without
restarting the Manager, are applied. You can do one of the following in this situation:
Revert changes to properties that cannot be loaded without restarting the Manager
and rerun the manager-reload-config command.
Force an update of all properties using the –as option, as follows:
arcsight manager-reload-config -as
When you use the -as option, the properties that can be changed without restarting the
Manager take effect immediately. The properties that require a Manager restart are
updated in the server.properties but are not effective until the Manager is restarted.
/arcsight-dm
/plugins/com.arcsight.dm.plugins.tomcatServer_1.0.0/conf/ser
ver.xml
/config/proxy.rule.xml
/config/rewriteProxy.rule.xml
Make sure to replace the references to port 9090 with an unused port number.
This operation is performed during the Manager installation. As a result, only the owner of
the file (which must be the user that runs the Manager) may read or write to the file. For
all other users, access to the file is denied.
You can also protect the server.properties file on Windows systems with
an NTFS file system using Microsoft Windows Access Control Lists (ACLs).
patterns.transactionbase.max=12500
patterns.maxSupporterCost=100000
patterns.maxUniqueEvents=25000
You can edit the properties file using a regular text editor. After changing any of these
values, restart the manager for them to take effect.
1 On the system where the Manager is installed, copy the package (.zip file) to the
<ARCSIGHT_HOME> directory (the directory that contains the Manager installation).
./arcsight deploylicense
This wizard replaces the license currently installed with the one included in the file. The
Manager detects the new license automatically.
2 From the Manager’s bin directory, run the following command to open the sample
properties file:
./arcsight deploylicense -g
3 Copy and paste the text generated by the command above into a text file.
LicenseChoice=1
LicenseFile.filename=<name_of_the_license_zip_file>
replaceLicenseQuestion =yes
<ARCSIGHT_HOME>/logs/default/
Various Manager utilities write logging information to different sets of log files. Each of
those sets can consist of multiple files.
The number and size of the log files are configurable, a typical setting is 10 files with 10
megabytes each. When a log file reaches a maximum size, it is copied over to a different
location. Depending on your system load, you may have to change the default settings. To
make changes to the logging configuration, change the log channel parameters. The
default log channel is called file.
For the main Manager log file, called server.log, the following server.properties
settings are used:
log.channel.file.property.maxsize=10MB
log.channel.file.property.maxbackupindex=10
The first setting affects the size of each individual log file; the second setting affects the
number of log files created. The log file currently in use is always the log file with no
number appended to the name. The log file with the largest number in its extension is
always the oldest log file. All of the log files are written to the
<ARCSIGHT_HOME>/logs/default directory.
The Manager and its related tools write the following log files:
Description
server.std.log* All output that the Manager prints on the console (if run in
command line mode)
server.pulse.log* The Manager writes a line to this set of logs every ten
seconds. Used to detect service interruptions.
You can run this utility as a wizard directly from the Console interface (GUI) in addition
to the command-line interface of each component.
Optionally, gather diagnostic information such as session wait times, thread dumps,
and database alert logs about your ESM system, which helps HP Customer Support
analyze performance issues on your ESM components.
You can also use the arcdt command to run specific diagnostic utilities
from the Manager command line. For more information, see Appendix A‚
Administrative Commands‚ on page 115.
When you run this utility from the Console, Manager, or Web, you can gather logs and
diagnostic information for all components of the system.
You can be connected as any valid user on an ESM component to collect its local logs;
however, you must have administrator access to collect logs from other components.
For example, if you are connected as user ‘joe’ to the Console, you can collect its logs.
But if you need to collect logs for the Manager and the database, you must connect to
the Console as the administrator.
SmartConnectors must be running version 4037 or later to remotely (using a Console
or the Manager) collect logs from them.
You can only collect local logs on SmartConnectors or the ArcSight Database. The
Send Logs utility only collects logs for the component on which you run it.
You can run the Send Logs utility on a component that is down. That is, if the
Database is down, you can still collect its logs using this utility.
If the Manager is down, you can only collect its local logs. However, if you need to
collect the database logs as well, use the arcdt command on the Manager. For more
information, see Appendix A‚ Administrative Commands‚ on page 115.
All log files for a component are gathered and compressed. That is, you cannot select
a subset of log files that the utility should process.
The Send Logs utility generates a compressed file on your local system that you can
send to Customer Support by e-mail, if they request it.
You can review the compressed file to ensure that only a desired and appropriate
amount of information is sent to support.
You can remove or sanitize information such as IP addresses, host names, and e-mail
addresses from the log files before compressing them. The options are:
Send log as generated
This option, the default, does not remove any information from the logs files.
To gather logs and diagnostic information for all or a selected set of components, do one of
the following:
The above action starts the Send Logs wizard. In the wizard screens, perform these steps:
The Send Logs wizard remembers most of the choices you make when you
run it for the first time. Therefore, for subsequent runs, if you choose to use
the previous settings, you do not need to re-enter them.
1 Decide whether you want the wizard to gather logs only from the component on which
you are running it or from all components.
If you select Use current settings to gather logs. logs for all components are
gathered thus: If this is the first sendlogs is run after installation, then all the logs are
gathered. If this is not the first sendlogs is run, then it uses the same setting as the
previous run.
If you selected Change/Review settings before gathering logs., you get the
option to select the components for which you want logs gathered.
Select whether you want only the local (the component from where you ran the Send
Logs utility) logs selected or you want logs from other components collected too.
If you selected Local logs only, you are prompted to either choose a time range or
include all time ranges.
If you selected Choose a specific time range, you are prompted to enter a start
time and end time - a time range for which the wizard gathers the logs.
a Select the components and the time range for which you want to gather logs. In
addition, select whether you want to run the diagnostic utilities to gather
additional information for those components. (The options below might be labeled
differently for different versions of this product. For example “CORR-Engine” is
“Database” in ESM with Oracle.)
If you choose to specify the diagnostic utilities to run, you are prompted to select
the utilities from a list in a later screen. The diagnostic utilities you can select are
described in Appendix A‚ arcdt‚ on page 119.
c If you chose to select the diagnostic utilities you want to run earlier in this wizard,
select them in the next screen.
2 Select whether you want to sanitize the logs before collecting them. For more
information about sanitizing options, see “Guidelines for using the Send Logs utility”
on page 26.
If you chose one of the first two options, go to Step 3 on page 32.
The Send Logs utility uses this number to name the compressed file it creates. Use the
incident number that Customer Support gave you when you reported the issue for
which you are sending the logs. Doing so helps Customer Support relate the
compressed file to your incident.
In case you do not have an incident number at this time, you can continue by entering
a meaningful name for the compressed file to be created. Once you obtain the incident
number from Customer Support, you can rename the file with the incident number you
received.
Most of the values you entered during the first run of the Send Logs
wizard are retained. The next time you run this wizard, you need to enter
only a few settings.
SSL enables the Manager (referred to as a “server”) to authenticate to its clients and
communicate information over an encrypted channel, thus providing the following benefits:
By default, clients submit a valid user name and password to authenticate with the server;
however, these clients can be configured to use SSL client authentication.
Note that SSL is not used between the Manager and the ArcSight Database.
Terminology
These terms are used in describing and configuring SSL:
Certificate
A certificate contains the public key, identifying information about the machine such as
machine name, and the authority that signs the certificate. SSL certificates are defined
in the ISO X.509 standard.
Key pair
A key pair is a combination of a private key and the public key that encrypts and
decrypts information. A machine shares only its public key with other machines; the
private key is never shared. The public and private keys are used to set up an SSL
session. For details, see “How SSL Works” on page 44.
The Manager is an SSL server, while SmartConnectors, Console, and browsers are SSL
clients. ArcSight Web is an SSL client to the Manager and an SSL server to the web
browsers that connect to it.
Keystore
A keystore is an encrypted repository on the SSL server that holds the SSL certificate
and the server’s private key. The following table lists the ESM component, the name of
the keystore on that component, and its location.
keystore File
Log File Location of keystore
Name[2]
[1] When client-side authentication is used, a keystore exists on both the server and
the client.
[2] Make sure you do not change the keystore file name.
Truststore
When an issuer issues a certificate to the server, it signs the certificate with its private
key. When the server presents this certificate to the client, the client uses the issuer’s
public key from the certificate in its truststore to verify the signature. If the signature
matches, the client accepts the certificate. For more details, see how SSL handshake
occurs in “How SSL Works” on page 44.
The following table lists the ESM component, the name of the truststore on that
component, and its location.
[1] The utilities that exist on the Manager machine such as archive are treated as
clients of the Manager. The cacerts file on the Manager is used for authenticating the
Manager to these clients.
[3] When client-side authentication is used, ArcSight Web contains two truststores—
cacerts for connections to the Manager and webtruststore for connections to browsers.
Alias
Truststore password
The *.defaults.properties file contains the default truststore password for each
ESM component (changeit). The password is in clear text and typically, you do not
need to change it. To change or obfuscate it, use the changepassword utility, as
described in Appendix A‚ Administrative Commands‚ on page 115. The following table
lists the property name where the obfuscated truststore passwords are stored.
Keystore password
Use a keystore password to encrypt the keystore file and use a truststore password to
encrypt a truststore file. Without this password, you cannot open these files.
The default is password for the Manager and ArcSight Web, and changeit for the
ArcSight Console’s client keystore. The default password for the key pair for any
component is the same as for the component’s keystore.
You specify a keystore password when creating a key pair, which is discussed in later
sections of this chapter. The password is obfuscated and stored in the ESM
component’s *.properties file. The following table lists the property file and the
property name where the keystore password is stored for each component. The
following table lists the property name where the obfuscated keystore passwords are
stored.
Cacerts password
The default password for cacerts ischangeit.
Cipher suite
A set of authentication, encryption, and data integrity algorithms used for securely
exchanging data between an SSL server and a client.
TLS_RSA_WITH_AES_128_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
SSL_RSA_WITH_RC4_128_MD5
SSL_RSA_WITH_RC4_128_SHA
Other supported cipher suites are:
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
SSL_RSA_WITH_DES_CBC_SHA
SSL_DHE_RSA_WITH_DES_CBC_SHA
SSL_DHE_DSS_WITH_DES_CBC_SHA
SSL_RSA_EXPORT_WITH_RC4_40_MD5
SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
SSL_RSA_WITH_NULL_MD5
SSL_RSA_WITH_NULL_SHA
SSL_DH_anon_WITH_RC4_128_MD5
TLS_DH_anon_WITH_AES_128_CBC_SHA
SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
SSL_DH_anon_WITH_DES_CBC_SHA
SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
Although in most cases you do not need to change cipher suites, you can configure
them in the properties file for an ESM component:
Manager—config/server.properties
ArcSight Web—config/webserver.properties
Clients—config/client.properties
Connectors—user/agent/agent.properties
Cipher suites are set as a comma-delimited list in the ssl.cipher.suites property.
During the SSL handshake, the client provides this list as the cipher suites that it can
accept, in descending order of preference. The server compares the list with its own
set of acceptable cipher suites, picks one to use based on its order of preference, and
communicates it to the client.
./arcsight keytoolgui
On SmartConnectors, use:
./arcsight keytoolgui
3 Enter the password for the keystore when prompted. For the default password see
“Keystore password” on page 37.
5 Select Private Key and Certificates radio button and click OK.
6 Enter the password for the key pair when prompted. For the default password see
“Keystore password” on page 37.
7 Enter a new password for the exported key pair file, then confirm it and click OK.
8 Navigate to the location on your machine to where you want to export the key pair.
9 Enter a name for the key pair with a .pfx extension in the Filename text box and click
Export. You see an Export Successful message.
10 Click OK.
./arcsight keytoolgui
3 Enter the keystore password when prompted. For the default password see “Keystore
password” on page 37.
4 Select Tools->Import Key Pair and navigate to the location of the key pair file,
select it and click Choose.
5 Enter the password for the key pair file when prompted and click OK. For the default
password see “Keystore password” on page 37.
8 Enter a new password for the key pair file to be imported, confirm it, and click OK. You
see a message saying Key Pair Import Successful.
9 Click OK.
10 Select File->Save keystore to save the changes to the keystore and exit the
keytoolgui.
./arcsight keytoolgui
3 Enter the truststore password when prompted. For the default password see
“Truststore password” on page 36.
e Make sure to select Head Certificate as Export Type and DER Encoded as the
Export Format in the following dialog and click OK:
f Navigate to the location where you want to export the certificate, and enter a
name for the certificate with a .cer extension and click Export.
5 If the component into which you want to import this certificate resides on a different
machine than the machine from which you exported the certificate (the current
machine), copy this certificate to the to the other machine.
./arcsight keytoolgui
4 Enter the password for the truststore when prompted. For the default password see
“Truststore password” on page 36.
6 Click Import.
10 Enter an alias for the Trusted Certificate you just imported and click OK.
Typically, the alias Name is same as the fully qualified host name.
./arcsight keytoolgui
./arcsight keytoolgui
3 Click Tools->Generate Key Pair and fill in the fields in the General Certificate dialog
and click OK.
4 Enter an alias for the newly created key pair and click OK.
./arcsight keytoolgui
3 Enter the truststore password when prompted. For the default password see
“Truststore password” on page 36.
4 Double-click the certificate whose details you want to view. Details include valid date
range, and other information about the certificate.
keytool
The keytool utility is the command-line version of keytoolgui that you can use to
manipulate the keystores and truststores directly. Use the keytool utility on UNIX
environments without X11 or whenever a command-line option is more suitable.
Use keytool -help for a complete list of all command options and their arguments.
managerkeys—Manager keystore
managercerts—Manager truststore
webkeys—Web keystore
webcerts—Web truststore
ldapkeys—Manager LDAP Client keystore
ldapcerts—Manager LDAP Client truststore
clientkeys—Client keystore
clientcerts—Client truststore
The following is an example for creating a 2048-bit, RSA key-pair with the mykey alias that
expires in 10 years (3650 days).
The following is an example for exporting the above key-pair as a "self-signed" RFC-1421
compliant ASCII certificate.
You can also SCP your keystore file to a computer where the ArcSight Console is installed
and use keytoolgui to make changes before uploading back to the remote server.
tempca
The tempca utility enables you to manage the SSL certificate in many ways. To see a
complete list of parameters available for this utility, enter this in <ARCSIGHT_HOME>/bin:
./arcsight tempca
On SmartConnectors, use:
Removing the Demo certificate from the list of trusted certificates, if applicable:
./arcsight tempca -rc
The hostname is identical to the one with which the client initiated communication.
The certificate issuer is in the list of trusted certificate authorities in the client’s
truststore (<ARCSIGHT_HOME>/jre/lib/security/cacerts) and the client is
able to verify the signature on the certificate by using the CA’s public key from the
certificate in its truststore.
The current time on the client machine is within the validity range specified in the
certificate to ensure that the certificate is valid.
If the certificate is validated, the client generates a random session key, encrypts it using
the server’s public key, and sends it to the server. The server decrypts the session key
using its private key. This session key is used to encrypt and decrypt data exchanged
between the server and the client from this point forward.
The following figure illustrates the handshake that occurs between the client and Manager.
With client-side authentication, the server requests the client’s certificate when it sends its
certificate to the client. The client sends its certificate along with the encrypted session key.
SSL certificates
To replace an expired certificate, delete the expired certificate from the truststore, cacerts,
first and then import the new certificate into cacerts. Since the common name (CN) for the
new certificate is identical to the CN in the old certificate, you are not permitted have both
the expired and the new certificate in the cacerts.
To delete a certificate from the truststore, start the keytoolgui and navigate to the
certificate, right-click on the certificate, and select Delete.
Use the keytoolgui to import the new certificate into the truststore or cacerts.
Types
You can use three types of SSL certificates:
CA-signed
You can create your own self-signed certificates. A self-signed certificate is signed using the
private key from the certificate itself. Configure clients to trust each self-signed certificate
you create.
ESM includes a built-in “demo” Certificate Authority that can issue a temporary demo
certificate during the Manager installation or when running the managersetup command.
This CA is provided only to enable you to complete installation in the absence of a signed
certificate. However, HP does not recommend using a certificate issued by this CA in
production environments. If your Manager was installed with a Demo certificate, configure
your clients to accept this certificate.
If you have three SSL servers that use self-signed certificates, configure your clients to
accept certificates from all of them (the three servers are three unique issuers). If you add
a new server, configure clients again. However, if these servers use a CA-signed certificate,
configure the clients once to accept the certificate. If the number of Managers grows in the
future, you do not need to do any additional configuration on the clients.
For the nssdb, nssdb.client, and webnssdb, usethe runcertutil command to view certificate
information. See “runcertutil” on page 150, for more information.
For the Manager certificate you can also use tempca -i command.
1 On the Manager:
./arcsight managersetup
b In the Manager Configuration Wizard, select Demo key pair in the screen that
prompts you to select the certificate type.
2 On SmartConnectors:
runagentsetup
3 On a Console:
consolesetup
webserversetup
b In the Web Configuration Wizard, select Demo key pair in the screen that
prompts you to select the certificate type.
5 On web browsers connecting to ArcSight Web, you do not need to set anything;
however, the browsers display a security dialog every time they connect. To stop a
browser from displaying this dialog:
./arcsight managersetup
c Enter information about the SSL certificate, as shown in this example. Click Next.
d Enter the SSL keystore password for the certificate. Click Next.
The self-signed certificate does not take effect until the Manager
is restarted later in this procedure.
This step overwrites your existing cacerts with the new one that contains
the information about the Trusted Certificate Authority (CA) that signed
your self-signed certificate. However, the new cacerts file does not take
effect until the client is restarted later in this procedure.
3 Make sure to copy the Manager’s certificate to each machine from which clients
connect to the Manager.
Make sure you have imported the Manager’s certificate to all existing
clients before proceeding further. Otherwise, after you perform the next
steps, only clients with the new Manager’s certificate can connect to the
Manager.
5 Restart the Manager process so that the Manager can start using the self-signed
certificate.
8 On the ArcSight Web server, perform the steps listed in section “Setting up SSL Client
Authentication on ArcSight Web” on page 65.
9 On the ArcSight Console, perform the steps listed in section “Setting up SSL Client-Side
Authentication on ArcSight Console” on page 58.
To prevent a certificate file from overwriting another when you copy multiple
certificate files with the same name to the same location, rename each certificate file
as you copy. For example, copy the certificate file from ManagerA and rename it to
SelfSigned_MgrA.cer.
3 On that client, use the keytoolgui utility to import certificates into the truststore
(cacerts):
./arcsight keytoolgui
iv Enter an alias for the Trusted Certificate you just imported and click OK.
Typically, the alias Name is same as the fully qualified host name.
vii Repeat Steps i through vi for all self-signed certificates you copied.
5 Restart the Manager service so that the Manager can start using the self-signed
certificate.
7 When installing a new client, copy the cacerts file from any client you updated earlier
in this procedure.
1 On the Manager machine, run this command to launch the keytoolgui utility in
<ARCSIGHT_HOME>/bin:
./arcsight keytoolgui
4 Click Tools->Generate Key Pair to create the key pair. This can take some time.
5 Enter key pair information such as the length of time for its validity (in days). Click OK.
For Common Name (CN), enter the fully qualified domain name of the Manager.
Ensure that DNS servers, used by the clients connecting to this host, can resolve this
host name.
For Email(E), provide a valid e-mail address as the CAs typically send an e-mail to this
address to renew the certificate.
When you click OK it asks you for a new password. Use the password of your existing
keystore to save this keystore. Also, the Manager may fail to start if the password of
the Key pair does not match the password of the keystore, which is encrypted in
server.properties. If you do not remember the password, run the Manager setup
Wizard and change the password of your existing keystore before you proceed. You
reuse this file after receiving the reply from the CA.
6 Specify an alias name of mykey for referring to the new key pair.
7 Click File->Save as and save the keystore with a name such as keystore.request.
For ArcSight Web, save the file with a name such as webkeystore.request.
1 In the keytoolgui utility, right-click the mykey alias name and select Generate CSR
to create a Certificate Signing Request.
After verifying the information you send, the CA electronically signs the certificate
using its private key and replies with a certification response that contains the signed
certificate.
2 Repeat the following procedure on all the machines where the Manager is installed:
d Click Tools >Import Trusted Certificate, and pick the rootca.cer file.
f Click OK to finish.
• If the CA root certificate has a chain, follow the same procedure to import
all intermediate CA certificates into the Truststore.
• Update the CA root certificate on other ESM components, as well.
- Repeat step 2 on one of Consoles.
- Copy the updated cacerts to any Logger or Connector Appliance, and
other PCs that have installed Consoles, Connectors, or ArcSight Web.
• Restart all services after the new cacerts is copied.
The SSL certificate you receive from the Certificate Authority must be a 128-bit X.509
Version 3 certificate. The type of certificate is the same one that is used for common web
servers. The signed certificate must be returned by the CA in base64 encoded format. It
looks similar to this:
-----BEGIN CERTIFICATE-----
MIICjTCCAfagAwIBAgIDWnWvMA0GCSqGSIb3DQEBBAUAMIGHMQswCQYDVQQGEwJaQT
EiMCAGA1UECBMZRk9SIFRFU1RJTkcgUFVSUE9TRVMgT05MWTEdMBsGA1UEChMUVGhh
d3RlIENlcnRpZmljYXRpb24xFzAVBgNVBAsTDlRFU1QgVEVTVCBURVNUMRwwGgYDVQ
QDExNUaGF3dGUgVGVzdCBDQSBSb290MB4XDTAyMDkyNzIzMzI0MVoXDTAyMTAxODIZ
MzI0MVowaDELMAkGA1UEBhMCrVMxDTALBgNVBAgTBGJsYWgxDTALBgNVBAcTBGJsYW
gxDTALBgNVBAoTBGJsYWgxDTALBgNVBAsTBGJsYWgxHTAbBgNVBAMTFHppZXIuc3Yu
YXJjc2lnaHQuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCZRGnVfQwG1b
+BgABd/p8UhsaNov5AjaagAoBmouJCwgW2vwN4JViC
CSBkDpiqVF7K11Sx4ZVSXX4+VQ6k4gT5G0kDNvQeN05wWkzEMygMB+ZBnYqPA/XtWR
ZtjxvH
MoqS+JEqHruiMLITC6q0reUB/txby6+S9zNo/fUG1pkIcQIDAQABoyUwIzATBgNVHS
UEDDAKBggrBgEFBQcDATAMBgNVHRMBAg8EAjAAMA0GCSqGSIb3DQEBBAUAA4GBAFY3
7E60+P4b3zTLnaG7EVM57GtkED6PwCIilB6ixjvNL4MNGRubPa8kyaZp5fEDoNUPQV
QxnpABjzTalRfYgjNFJ6ltI6ZKjBO5kim9UBeCnKiNNzhIyDyFwbHXOPB/JaLIV+jG
ugYNS7hf/ay0BXKlfueO07EgjhhB/mQFs2JB
-----END CERTIFICATE-----
Before proceeding, make sure the name of the issuer that signed your certificate exists as
a Trusted CA in cacerts. (Use keytoolgui to check your cacerts.)
1 If the returned file has the .CER or .CRT file extension, save it to the
<ARCSIGHT_HOME>/config/jetty directory and skip to step 4.
2 Using any text editor, copy and paste the text string to a file. Include the line "-----
BEGIN CERTIFICATE-----" and line "-----END CERTIFICATE-----", and make sure there
are no extra spaces before or after the string.
./arcsight keytoolgui
6 Right-click the key pair you created at the beginning of the process and named mykey.
If the CA reply file contains a chain of certificates, the keytoolgui utility tries to
match the reply’s root CA to an existing Trusted Certificate in your cacerts truststore. If
this operation fails, the Certificate Details dialog appears for manual verification.
Acknowledge the certificate by clicking OK and answering Yes to the subsequent
challenge. Answer No if the certificate is not trustworthy for some reason.
After the key pair you generated has been updated to reflect the content of the CA
reply, the keystore named keystore.request contains both the private key and the
signed certificate (in the alias mykey).
9 Select File > Save. The keystore is now ready for use by the Manager or ArcSight
Web.
If, for any reason, the new keystore does not work properly, you can revert back to the
demo keystore by replacing keystore.old with the new keystore.
11 Copy <ARCSIGHT_HOME>/config/jetty/keystore.request to
<ARCSIGHT_HOME>/config/jetty/keystore.
12 For successful reconfiguration and Manager startup, enter the keystore passwords into
the appropriate properties file.
Enter the password into the webserver.properties file for ArcSight Web using the
following command (all on one line):
arcsight changepassword
-f <ARCSIGHT_HOME>/config/webserver.properties
-p server.privatekey.password
Enter the password into the server.properties file for the Manager using the
following command (all on one line):
arcsight changepassword
-f <ARCSIGHT_HOME>/config/server.properties
-p server.privatekey.password
After entering this command the system displays the previous password as asterisks
and asks you to enter and then confirm your new password. These commands enter
the password into the properties file in an encrypted format.
13 If your Manager clients trust the CA that signed your server certificate, go to “Restart
the Manager” on page 56.
a Obtain a root certificate from the CA that signed your server certificate and copy it
to your client machine.
b For one client, use the keytoolgui utility to import the certificate into the
truststore (cacerts):
./arcsight keytoolgui
iii Select the store named cacerts. Use the default password to open cacerts.
For the default password see “Cacerts password” on page 37.
vi Enter an alias for the Trusted Certificate you just imported and click OK.
vii Right-click the alias ca in the truststore and choose Delete from the menu.
14 If your ArcSight Web browser clients trust the CA that signed your ArcSight Web
certificate, go to Restart the Manager.
a Obtain a root certificate from the CA that signed your ArcSight Web certificate.
b Import the certificate into your web browser. See your browser’s documentation
for details.
The Manager may fail to start if the password of the Key pair does not match the
password of the keystore, which is encrypted in server.properties. If you do not
remember the keystore password, run the Manager setup wizard and change the
password of your existing keystore.
The output shows which CA issuer signed the SSL CA-signed certificate, certificate
type, status of a validation of the certificate, and so on.
For ArcSight Web, use the webserversetup utility after the certificate is updated to
confirm the certificate is valid, as follows:
./arcsight webserversetup
For SmartConnectors, run the tempca script using the following command:
To delete a certificate from the truststore or cacerts, start the keytoolgui and navigate
to the certificate, right-click on the certificate, and select Delete.
2 Replace the certificate by importing the new certificate into truststore/cacerts as the
case may be. Use the keytoolgui to import the new certificate into the truststore or
cacerts. See “Using a Demo Certificate” on page 46, “Using a Self-Signed Certificate”
on page 47, or “Using a CA-Signed SSL Certificate” on page 51 section (depending on
the type of certificate you are importing) for steps on how to import the certificate.
Since the common name (CN) for the new certificate is identical to the CN in the old
certificate, you are not permitted to have both the expired as well as the new certificate co-
exist in the truststore, cacerts.
When client-side authentication is used, the SSL clients contain a keystore and the SSL
server contains a truststore.
Before you enable client-side authentication, make sure that you log in to the
Console and create a new user or modify an existing user such that you set
the user’s external_id to the one specified in the certificate created on the
Console. The external id should be set to the users name set as the CN
(Common Name) setting when creating the certificate.
1 On each Console, generate a key pair. For CA-signed certificate follow the steps in
section “Create a Key Pair for a CA-Signed Certificate” on page 52.:
./arcsight keytoolgui
b Open File->New keystore. This opens the New keystore Type dialog.
d Click Tools->Generate Key Pair and fill in the fields in the following dialog:
The Common Name field in the following screen should be the external ID of
the user logging in to the Manager that this console connects to.
e Enter an alias for the key pair in the following dialog and click OK:
If you plan to install the Console, Manager, and Web on the same machine,
make sure that this alias is unique. Also, do not use the machine name or IP
address for the alias. ArcSight Web and Console cannot have identical CNs
when installed on the same machine as the Manager.
When you install ArcSight Web, set the CN of the ArcSight Web’s key pair you
generate to the name or IP address of the machine on which you are installing
it. Hence, if both Web and Console are on the same machine, and if you use
the machine name or IP address for the CN for both the Web and the Console,
then ArcSight Web gives you an error when configuring.
f Enter a password for the keystore and confirm it and click OK.
a In the keytoolgui right-click the key pair you just generated and select Export.
b Make sure to select Head Certificate as Export Type and DER Encoded as the
Export Format in the following dialog and click OK:
e If your Console is on a different machine than the Manager, copy this certificate to
the Manager’s machine.
3 If you are using self-signed certificate skip this step and continue with step 4.
b Enter keystore.client (name for the keystore) in the File Name text box and
click Save.
ssl.keystore.password=<set-this-to-password-set-when-you-saved-
the-keystore>
ssl.keystore.path=config/keystore.client
ssl.client.auth=true
If your Manager trusts the CA that signed your Console’s certificates, go to the next
step. Otherwise perform these steps to update the Manager’s truststore.
c Enter password when prompted for the password and click OK.
e Navigate to the Console’s certificate that you exported earlier and click Import.
8 Export the Console’s private key. If you use ArcSight Web, you are required to import
the Console’s private key into the Web browser you use with ArcSight Web.
d Select Private Key and Certificates as Export Type and PKCS#12 as the
Export Format if not already selected and click OK.
e Enter the password that you had set for the Console’s keystore when prompted
and click OK.
f Enter a new password for the keystore and confirm the password and click OK.
g Enter a name for the Console’s private key with a .pfx extension and click Export.
h You receive a message saying Export Successful. Click OK and exit the keytoolgui.
9 Exit keytoolgui.
1 Generate a key pair on ArcSight Web. For CA-signed certificate follow the steps in
section “Create a Key Pair for a CA-Signed Certificate” on page 52
./arcsight keytoolgui
b Open File->New keystore. This opens the New keystore Type dialog.
d Click Tools->Generate Key Pair and fill in the fields in the following dialog:
Make sure to use the machine name or IP address on which ArcSight Web is
installed for the CN name.
a In the keytoolgui right-click the key pair you just generated and select Export
Key pair.
b Make sure to select Head Certificate as Export Type and DER Encoded as the
Export Format in the following dialog and click OK:
e If your ArcSight Web is on a different machine than the Manager, copy this
certificate to the Manager’s machine.
4 If you are using self-signed certificate skip this step and continue with step 5.
Import the signed certificate response in the Web’s keystore. Follow the steps in
section “Import the CA Root Certificate” on page 53.
Use the changepassword tool to set an encrypted keystore password in the
client.properties file:
arcsight changepassword -f config/client.properties -p
ssl.keystore.password
ssl.keystore.password=<password-set-when-you-saved-the-
keystore>
ssl.keystore.path=config/jetty/webkeystore
If your Manager trusts the CA that signed your client’s certificates, go to the next step.
Otherwise perform these steps to update the Manager’s truststore.
c Enter the password when prompted and click OK. For the default password see
“Keystore password” on page 37.
e Navigate to the Web’s certificate that you exported earlier and click Import.
c Enter the password when prompted. For the default password see “Keystore
password” on page 37.
f Click OK in the next message box prompting you that “Could not establish a trust
path for the certificate...”
h Click Yes when prompted whether you want to accept the certificate as trusted.
k Click OK.
8 Import the following into the web browser that you use with ArcSight Web:
1 Create a new client keystore in the ArcSight Database’s (for Partition Archiver) or the
SmartConnector’s /config directory.
a Start the keytoolgui from the client’s bin directory by running the following:
On SmartConnector:
On Partition Archiver:
arcsight keytoolgui
b Go to File->New keystore.
d Save the keystore by clicking File->Save keystore As, navigate to the config
directory, enter keystore.client in the File Name box and click Save.
b In the Generate Certificate dialog enter the details requested and click OK.
e You see the following message after the key pair is created. Click OK.
You should now see a key pair with the alias you set for it in the keystore.
3 Create a client SSL configuration text file in the config directory and name it
client.properties for partition archiver or in the user/agent directory and
name it agent.properties for a connector. The contents of this file (whether client
or agent) should be as follows:
auth.null=true
ssl.client.auth=true
cac.login.on=false
ssl.keystore.path=config/keystore.client
ssl.keystore.password=<client.keystore_password>
Make sure that this password is identical to the password that you set for
/config/keystore.client when creating it.
4 Export the client’s (Partition Archiver or Connector) certificate using keytoolgui. See
section “Using Keytoolgui to Export a Certificate” on page 40 for details.
5 Import the CA’s certificate of the client’s certificate (in case you are using CA-signed
certificate) or the client’s certificate itself (in case you are using a self-signed
certificate) into the Manager’s truststore, /config/jetty/truststore. see section
“Using Keytoolgui to Import a Certificate” on page 41 for details.
2 Follow the instructions in “Verifying SSL Certificate Use” on page 73 to ensure that a
self-signed certificate is in use.
1 Follow the steps described in “Using a CA-Signed SSL Certificate” on page 51.
2 Follow the instructions in “Verifying SSL Certificate Use” on page 73 to ensure that CA-
signed certificate is in use.
1 Follow the steps described in “Using a CA-Signed SSL Certificate” on page 51.
2 Follow the instructions in “Verifying SSL Certificate Use” on page 73 to ensure that a
CA-signed certificate is in use.
./arcsight tempca –i
If the value is “yes,” the demo certificate is still in use. Follow these steps to stop using
the demo certificate:
2 Verify that the Certificate Authority that signed your certificate is listed in the output.
For a self-signed certificate, the Trusted CA is the name of the machine on which you
created the certificate
SSL Client
truststore C:\arcsight\Console\current\jre\lib\security\cacerts
Type JKS
Demo CA trusted no
Trusted CA DigiCert Assured ID Root CA
[digicertassuredidrootca]
Trusted CA TC TrustCenter Class 2 CA II
[trustcenterclass2caii] .
.
.
Demo CA
keystore C:\arcsight\Console\current\config\keystore.tempca
Exiting...
The Manager and ArcSight Web accept login calls with empty passwords and use the
Subject CN (Common Name) from the user’s certificate to identify the user.
Before you enable client-side authentication, make sure that you log in to the
Console and create a new user or modify an existing user such that you set
the user’s external_id to the one specified in the certificate created on the
Console. The external id should be set to the users name set as the CN
(Common Name) setting when creating the certificate.
You must enable SSL client authentication as described in the previous section to use
digitally-signed user certificates for user authentication.
To configure the Manager or ArcSight Web to use user certificates, do the following:
1 On the Console, make sure that External ID field in the User Editor for every user is set
to a value that matches the CN in their user certificate.
When you start the Console, the user name and password fields are grayed out. Simply
select the Manager to which you want to connect and click OK to log in.
After adding the CRL file, it takes approximately a minute for the Manager to get
updated.
Run the ArcSight Console Configuration Wizard by entering the following command in a
command window in the <ARCSIGHT_HOME>/bin directory:
./arcsight consolesetup
To run the ArcSight Console Setup program without the graphical user interface, type:
./arcsight managersetup
The arcsight managersetup command opens the Manager Configuration Wizard, but
you can also run the Manager Setup program silently by typing:
The Manager Configuration Wizard appears to help you re-configure the Manager. The
managersetup wizard is covered in “Running the Manager Configuration Wizard” on
page 95.
To change advanced configuration settings (port numbers, database settings, log location,
and so on) after the initial installation, change the server.properties file. ArcSight’s
default settings are listed in the server.defaults.properties file. You can override
these default settings by adding the applicable lines from
server.defaults.properties to the server.properties file. These files are
located in <ARCSIGHT_HOME>/config.
the ArcSight SmartConnectors and ArcSight Consoles must use the same HTTP or HTTPS
port numbers the Manager is currently using.
The Manager uses a single port (by default, 8443) that any firewalls between the Manager,
ArcSight Console, and any ArcSight SmartConnectors must allow communication through.
Port 8443 is the default port used when initially installing ArcSight, however, you can
change this default port number using the Manager Configuration Wizard. For more
information, refer to the ESM Installation and Configuration Guide.
The ArcSight Web default session timeout can be changed in this file in ArcSight Web’s
<ARCSIGHT_HOME>/config/jetty/webserver.xml file.
<session-config>
<session-timeout>15</session-timeout>
</session-config>
The value specified, in this case 15, is the session timeout in minutes. Simply change this
number to the session timeout desired and save the file.
Password Length
The simplest one is a minimum and, optionally, a maximum length of the password. The
following keys in server.properties affect this:
auth.password.length.min=6
auth.password.length.max=20
By default, the minimum length for passwords is six characters and the maximum length is
20 characters and can contain numbers and/or letters.
Configuring the above properties to a value of -1 sets the password length to unlimited
characters.
auth.password.userid.allowed=false
When this key is set to false (the default), a user cannot include their user name as part of
the password.
A user password contains "non-English" characters (in the upper range of the
character set: values above 127)
This is not an issue if you log in from the web-based Management Console or ArcSight
Web.
For passwords that are in the ASCII range (values up to 127), the character set for the
ArcSight Console does not matter.
By default, the minimum length for passwords is six characters and the maximum length is
20 characters and can contain numbers and/or letters.
The following properties control the distribution of characters allowed in new passwords:
auth.password.letters.min=-1
auth.password.letters.max=-1
auth.password.numbers.min=-1
auth.password.numbers.max=-1
auth.password.whitespace.min=0
auth.password.whitespace.max=0
auth.password.others.min=-1
auth.password.others.max=-1
The *.min settings can be used to enforce that each new password contains a minimum
number of characters of the specified type. The *.max settings can be used to limit the
number of characters of the given type that new passwords can contain. Letters are all
letters from A-Z, upper and lowercase, numbers are 0-9; “whitespace” includes spaces,
etc.; “others” are all other characters, including special characters such as #$%@!.
Additionally, the following server.properties key lets you restrict the number of
consecutive same characters allowed.
auth.password.maxconsecutive=3
For example, the default setting of 3 would allow "adam999", but not "adam9999" as a
password.
Furthermore, the following server.properties key enables you to specify the length of
a substring that is allowed from the old password in the new password.
auth.password.maxoldsubstring=-1
For example, if the value is set to 3 and the old password is “secret”, neither “secretive”
nor “cretin” is allowed as a new password.
auth.password.regex.match=
auth.password.regex.reject=
For more information on creating an expression for this property, see http://www.regular-
expressions.info/. The following are a few examples of regular expressions and a
description of what they mean.
auth.password.regex.match= /^\\D.*\\D$/
Only passwords that do not start or end with a digit are accepted.
auth.password.regex.match= ^(?=.*[A-Z].*[A-Z])(?=.*[a-z].*[a-
z])(?=.*[0-9].*[0-9])(?=.*[^a-zA-Z0-9].*[^a-zA-Z0-9]).{10,}$
Only passwords that contain at least 10 characters with the following breakdown are
accepted:
Password Uniqueness
In some environments, it is also desirable that no two users use the same password. To
enable a check that ensures this, the following server.properties key can be used:
auth.password.unique=false
If set to true, the Manager checks all other passwords to make sure nobody is already
using the same password.
This feature may not be appropriate for some environments as it allows valid
users of the system to guess other user’s passwords.
auth.password.age=60
When this setting is used, however, some problems arise for user accounts that are used
for automated log in, such as the user accounts used for Manager Forwarding Connectors.
These user accounts can be excluded from password expiration using the following key in
server.properties:
auth.password.age.exclude=username1,username2
This value is a comma-separated list of user names. The passwords of these users never
expire.
The Manager can also keep a history of a user’s passwords to make sure that passwords
are not reused. The number of last passwords to keep is specified using the following key
in server.properties:
auth.password.different.min=1
By default, this key is set to check only the last password (value = 1). You can change this
key to keep up to last 20 passwords.
auth.failed.max=3
Change this to the desired number or to -1 if you do not wish user accounts to be
disabled, regardless of the number of failed log in attempts.
Once a user account has been disabled, the Manager can be configured to automatically
re-enable it after a certain period of time. This reduces administrative overhead, while
effectively preventing brute force attacks. This mechanism is controlled by the following
key in server.properties:
auth.auto.reenable.time=10
This value specifies the time, in minutes, after which user accounts are automatically re-
enabled after they were disabled due to an excessive number of incorrect log ins. Set the
property key to -1 to specify that user accounts can only be re-enabled manually.
auth.user.account.age=<days>
Change <days> to the number of days of inactivity allowed before the account is disabled.
If the only remaining administrator user account is disabled, a command line tool can be
run on the system where the Manager is installed to re-enable user accounts. First, ensure
that the the Manager is running. Then, from the command line, run the following
command:
where username is the name of the user you want to re-enable. After this procedure, the
user can log in again, using the unchanged password.
The domain field sets feature is separately licensed, and requires some additional
configuration on both the Manager and relevant SmartConnectors. See Chapter 14‚ Domain
Field Sets‚ on page 463 in the ArcSight Console User’s Guide for details on this feature.
The following properties related to Domain Field Sets are configurable in the
server.properties file on the Manager:
domain.event.relevance.percentage
Use this property to set the percentage of additional data fields in an event that must
match the pre-defined domain fields in order for the event to be tied to the domain.
Each event that the connector sends to the Manager can be identified as belonging to
a particular pre-configured domain. For events that contain additional data, the fields
in the additional data are matched with the fields that are defined for a domain. ESM
determines whether the event should be tied to a domain based on the percentage of
additional data fields that match the domain fields.
domain.ad.keywords.csv
You can specify which Additional Data field names to exclude when processing
additional data in an event. You can specify the field names to exclude by setting them
in this property. Separate field names with a comma. For example, to exclude integer
and date, set domain.ad.keywords.csv=Integer,Date.
turbo.enabled=false
Turbo mode works by eliminating certain fields to speed throughput. That includes
domain fields. Turbo mode is enabled by default during installation, even if you have
licensed the Domains feature, so be sure to turn it off.
domain.off=false
This property might already be set to false by default in the
server.defaults.properties file when you have a Domains license. If you have
to change it, do so in the server.properties file.
If both turbo mode and Domains are turned on, the server.std.log file continuously
produces “fatal exception” messages with instructions to turn off one or the other.
If the profile of events in your network causes asset auto creation feature to create assets
in your network model inefficiently, you can modify the asset auto creation default settings
in the user configuration file, server.properties.
For more about working with properties files, see the topic “Managing and Changing
Properties File Settings”
scanner-event.dynamiczone.asset.nonidentifiable.create=false
You can configure ESM to create the asset as long as it has either an IP address or a host
name. In server.properties, change scanner-
event.dynamiczone.asset.nonidentifiable.create from false to true. ESM
discards conflicts between an IP address and host name (similar IP address, but different
host name and/or MAC address).
mac=0123456789AB
mac=null
To preserve the previous asset rather than delete it when a scan finds a new asset with
similar information, you can configure ESM to rename the previous asset. In
server.properties, change scanner-
event.dynamiczone.asset.ipconflict.preserve from false to true.
You can reconfigure this naming scheme. For example, if you want the asset name for an
asset in a static zone to appear this way in the ArcSight Console:
myhost_1.1.1.1
$destinationAddress - $!destinationHostName
to
$!destinationHostName_$destinationAddress
By default, all ArcSight SmartConnectors have compression enabled. To turn it off, add the
following line to the <ARCSIGHT_HOME>/user/agent/agent.properties file:
compression.enabled = false
ArcSight SmartConnectors determine whether the Manager they are sending events to
supports compression.
ArcSight SmartConnectors can be configured to send more or less event data, on a per-
SmartConnector basis, and the Manager can be set to read and maintain more or less
event data, independent of the SmartConnector setting. Some events require more data
than others. For example, operating system syslogs often capture a considerable amount
of environmental data that may or may not be relevant to a particular security event.
Firewalls, on the other hand, typically report only basic information.
Turbo Modes
When Turbo Mode is not specified (mode 3, Complete), all event data arriving at the
SmartConnector, including additional data, is maintained. (Versions of ArcSight prior to 3.2
ran in Turbo Mode 3.) Turbo Mode 2, Faster, eliminates the additional custom or vendor-
specific data, which is not required in many situations. Turbo Mode 1, Fastest, eliminates all
but a core set of event attributes, in order to achieve the best throughput. Because the
event data is smaller, it requires less storage space and provides the best performance. It is
ideal for simpler devices such as firewalls.
The Manager processes event data using its own Turbo Mode setting. If SmartConnectors
report more event data than the Manager needs, the Manager ignores the extra fields. On
the other hand, if the Manager is set to a higher Turbo Mode than a SmartConnector, the
Manager maintains fields that are not filled by event data. Both situations are normal in
real-world scenarios, because the Manager configuration reflects the requirements of a
diverse set of SmartConnectors.
Event data transfer modes are numbered (1 for Fastest, 2 for Faster, 3 for Complete), and
possible Manager-SmartConnector configurations are therefore:
2-3 Default: Manager does not process additional data sent by SmartConnector
3-2 Manager maintains additional data, but SmartConnector does not send it
*When the SmartConnector sends minimal data (Turbo Mode 1), the Manager can infer
some additional data, creating a 2-1.5 or a 3-1.5 situation.
2 Set domain.off=false.
Turbo mode is enabled by default during installation, even if you have licensed the
Domains feature. If you want to use turbo mode and not the Domains feature:
If both turbo mode and Domains are turned on, the server.std.log file continuously
produces “fatal exception” messages with instructions to turn off one or the other.
Free space in Oracle tablespaces: This check sends an e-mail message if the free space in
any of the Oracle tablespaces falls below a specified threshold.
Database failure: This check sends an e-mail message if the connection to the database is
lost or if the Manager detects a fatal, unrecoverable situation in the database, such as lack
of disk space.
If a critical condition occurs, the Manager stops accepting incoming events from ArcSight
SmartConnectors and, in some cases, also stops Console sessions. A message is printed to
server.std.log and server.log and sent to a list of administrators via e-mail. The message
contains a URL you can use to reactivate the Manager after the problem has been
addressed. In many cases, however, the Manager can detect that the problem has been
resolved and resumes normal operations automatically.
For more information about database checks performed to monitor configuration and
runtime attributes of your database, see Appendix C‚ Monitoring Database Attributes‚ on
page 177.
databaseinfo.oracle.freespace.percentage.threshold=5
You can also explicitly exclude certain tablespaces from the check in
server.properties. By default, the system tablespace is excluded:
databaseinfo.oracle.freespace.exclude.tablespaces=SYSTEM
Setting the Manager to send SNMP v3 traps is not FIPS compliant. This is
because SNMP v3 uses the MD5 algorithm. However, SNMPv1 and v2 are
compliant.
snmp.trapsender.enabled=true
Set this property to true in order to enable the SNMP trap sender.
snmp.trapsender.uri=
The system uses the filter specified by the URI (it should all be on one line) to decide
whether or not an event is forwarded. There is no need to change the URI to another filter.
These contents are locked and are overwritten when the contents are upgraded to the next
version. By default, the "SNMP Trap Sender" filter logic is Matches Filter (Correlated
Events)—that is, only rules-generated events are forwarded.
snmp.destination.host=
snmp.destination.port=162
The host name and the port of the SNMP listener that wants to receive the traps.
snmp.read.community=public
snmp.write.community=public
The SNMP community strings needed for the traps to make it through to the receiver. The
read community is reserved for future use, however, the write community must match the
community of the receiving host. This depends on your deployment environment and your
receiving device. Please consult your receiving device's documentation to find out which
community string to use.
snmp.version=1
snmp.fields=\
event.eventId,\
event.name,\
event.eventCategory,\
event.eventType,\
event.baseEventCount,\
event.arcsightCategory,\
event.arcsightSeverity,\
event.protocol,\
event.sourceAddress,\
event.targetAddress
These event attributes should be included in the trap. The syntax follows the
SmartConnector SDK as described in the FlexConnector Developer’s Guide. All the ArcSight
fields can be sent. The identifiers are case sensitive, do not contain spaces and must be
capitalized except for the first character. For example:
Service service
ArcSight SNMP
INTEGER INTEGER32
Address IP ADDRESS
BYTE INTEGER
snmp.fields=event.eventName,additionaldata.myvalue
This sends the Event Name field and the value of myvalue in the additional data list part
of the SNMP trap. Only the String data type is supported for additional data, therefore all
additional data values are sent as OCTET STRING.
Asset Aging
The age of an asset is defined as the number of days since it was last scanned or modified.
So, for example, if an asset was last modified 29 hours ago, the age of the asset is taken as
1 day and the remaining time (5 hours, in our example) is ignored in the calculation of the
asset’s age. You can use asset aging to reduce asset confidence level as the time since the
last scan increases.
For example, to add the groups MyAssets and DontTouchThis (both under All Assets) add
the following to the server.properties file:
#-----------------------------
# Asset aging
#-----------------------------
# Defines how many days can pass before a scanned asset is defined
as old
# after this time the asset will be disabled
# Default value: disabled
asset.aging.daysbeforedisable = -1
To Delete an Asset
To delete the asset instead of disabling it, you have to set the property
asset.aging.task.operation to delete in server.properties file:
asset.aging.task.operation = delete
<ModelConfidence>
<Sum MaxValue="10" Weight="10">
<!-- If target Asset is unknown, clamp modelConfidence to 0 -
->
<HasValue FIELD="targetAssetId" Value="-10" Negated="Yes" />
<HasValue FIELD="targetAssetId" Value="4" Negated="NO" />
<!-- Give 4 points each for whether the target asset has been
scanned for open ports and vulnerabilities -->
<!-- This values can be amortized by the age of the asset -->
<!-- that means that the value will reduce constantly over
time as the asset age -->
<!-- ie if you set the value to be 120 on the day the assets
are created they receive the four points, by day 60
they'll receive 2 points and by day 120 they'll receive 0
points -->
<IsScannedForOpenPorts Value="4" Negated="NO"
AmortizeScan="-1" />
<IsScannedForVulnerabilities Value="4" Negated="NO"
AmortizeScan="-1" />
</Sum>
</ModelConfidence>
For this example, the value is modified as follows:
Asset Age
AmortizeScan Value
(in days)
0 4
60 2
120 0
240 0
Configuring Actors
Configuring the Actors feature requires a one-time setup procedure and minimal
maintenance if authentication systems are added, modified, or removed from your
network. This setup procedure maps the user authentication systems you use in your
network environment and the account IDs for each user on those systems.
1 Install the Actor Model Import connector appropriate for your IDM. For
complete instructions about how to install the connector, see the relevant
SmartConnector installation and configuration guide, such as the SmartConnector
Configuration Guide for Microsoft Active Directory Actor Model. Once installed, the
connector polls the IDM and imports the user data into the Actor model.
This dashboard is populated by the following query viewer, which looks for events with
a value in the Authenticator field: /All Query Viewers/ArcSight
Administration/ESM/Configuration Changes/Actor/Actor
Authenticators
The example below shows the value of the Attributes field for an active directory
system configured as Active Directory:<domain>.com. Use this exact value,
including punctuation, spaces, and capitalization, to populate the account
authenticators mapping table described in the next step.
a In the Navigator panel, go to Lists > Active Lists. Right-click the active list
/All Active Lists/ArcSight System/Actor Data Support/Account
Authenticators and select Show Entries.
b In the Account Authenticator Details tab in the Viewer screen, click the add icon
( ).
c For each account authenticator data store, enter the following data:
Column Description
Device Vendor The vendor that supplies the authentication data store,
such as Microsoft.
Column Description
When you are finished, the Account Authenticators table should look something like
this:
Default
Server Property
Setting Comments
Name
[units]
dbconmanager.provider.oracle.pool.maxcheckout
For instructions about how to run the managersetup utility, see the Administrator’s
Guide.
4 Re-start the Manager.
For details about starting and stopping the Manager, see “Basic Administration Tasks” in the
Administrator’s Guide
For details about working with the server.properties file, see “Managing and
Changing Properties File Settings” in the Administrator’s Guide.
Best practice: Log out and log back in again for permission changes to take
effect
As a best practice whenever an admin changes another user’s permissions,
the other user should log out and log back in again. This ensures that the new
permissions are registered with the Manager, and the user can see the
changes.
For details about how to assign permissions to user groups, see “Granting or Removing
Resource Permissions” on page 626.
For instructions about how to use the export_system_tables command-line utility, see
the Administrator’s Guide.
You can change some configuration parameters by running the managersetup program
at any time after you have installed and configured your system.
Verify that the Manager has stopped by running the following command (as user arcsight):
/sbin/service arcsight_services status all
1 Select whether you are using Default of FIPS mode. For information on FIPS, see
Appendix F‚ Configuration Changes Related to FIPS‚ on page 197
2 To change the hostname or IP address for your Manager host, enter the new one here.
The Manager host name that you enter in this dialog appears on the Manager
certificate. If you change the host name, be sure to regenerate the Manager’s
certificate in Step 5 on page 97. We recommend that you do not change the Manager
Port number.
3 If you would like to replace your license file with a new one, select Replace current
license file. otherwise accept the default option of Keep the current license file.
If you selected Replace the current license file. you are prompted to either enter
its location or navigate to the new license file.
4 Select the Java Heap memory size from the dropdown menu.
The Java Heap memory size is the amount of memory that ESM allocates for its heap.
(Besides the heap memory, the Manager also uses some additional system memory.)
5 The Manager controls SSL certificate type for communications with the Console, so the
wizard prompts you to select the type of SSL certificate that the Manager is using. If
you changed the Manager host name in Step 2 on page 96, select Replace with new
Self-Signed key pair, otherwise select Do not change anything.
If you selected Replace with new Self-Signed key pair, you are prompted to enter
the password for the SSL key store and then details about the new SSL certificate to
be issued.
8 Select the method for authenticating the users. See “Authentication Details” on
page 101 for more details on each of these options.
9 Accept the default and click Next or configure a different email server for notification.
10 Select Do not enter URL for ArcSight Web and click Next.
12 The Manager can automatically create an asset when it receives an event with a new
sensor or device information. By default, assets are automatically created. If you want
to disable this feature, select Disable Sensor Asset Creation.
You have completed the Manager setup program. You can now start the Manager by
running the following as user arcsight:
Authentication Details
The authentication options enable you to select the type of authentication to use when
logging into the Manager.
• In order to use PKCS#11 authentication, you must select one of the SSL
based authentication methods.
• If you plan to use PKCS #11 token with ArcSight Web, make sure to select
Password Based or SSL Client Based Authentication.
• PKCS#11 authentication is not supported with Radius, LDAP and Active
Directory authentication methods.
See the appendix “Using the PKCS#11 Token‚” in the ESM Installation and
Configuration Guide, for details on using a PKCS #11 token such as the
Common Access Card (CAC).
By default, the system uses its own, built-in authentication, but you can specify third party,
external authentication mechanisms, such as RADIUS Authentication, Microsoft Active
Directory, LDAP, or a custom JAAS plug-in configuration.
Once you select an external authentication mechanism, all user accounts, including the
admin account, are authenticated through it.
To restrict information users can access, set up Access Control Lists (ACLs) on the
Manager.
If you configure the Manager using Password Based and SSL Client Based
Authentication or SSL Client Only Authentication, be aware that ArcSight
Web does not support these modes. So:
• If you plan to use ArcSight Web, you will need to configure your Manager to
use Password Based Authentication or Password Based or SSL
Client Based Authentication as your authentication method.
• If you plan to use PKCS#11 authentication with ArcSight Web, be sure to
select Password Based or SSL Client Based Authentication only.
Built-In Authentication
This is the default authentication when you do not specify a third party external
authentication method.
Parameter Description
RADIUS Server Port Specify the port on which the RADIUS server is running.
RADIUS Shared Secret Specify the RADIUS shared secret string used to verify the
authenticity and integrity of the messages exchanged
between the Manager and the RADIUS server.
Parameter Description
Enable SSL Whether the Active Directory Server is using SSL. The
default is True (SSL enabled on the AD server).
No further SSL configuration is required for the AD
server.
Whether you selected SSL earlier for communications
with the Console is irrelevant. Certificate type is set on
the AD server side, not the manager.
Active Directory Port Specify the port to use for the Active Directory Server.
If the AD server is using SSL (Enable SSL=true), use
port 636. If SSL is not enabled on the AD server, use
port 389.
Specify the user name used to log in to the Manager and the External ID name to which it
is mapped on the AD server.
Configuring AD SSL
If you are using SSL between the Manager and your authentication server, you must ensure
that the server’s certificate is trusted in the Manager’s trust store
<ARCSIGHT_HOME>/jre/lib/security/cacerts, whether the authentication server
is using self-signed or CA certificates. For CA certificates, if the Certificate Authority (CA)
that signed your server’s certificate is already listed in cacerts, you do not need to do
anything. Otherwise, obtain a root certificate from the CA and import it in your Manager’s
cacerts using the keytoolgui utility. For more information on importing certificates, see
Understanding SSL Authentication in the Administrator’s Guide.
Parameter Description
LDAP Server Host Specify the host name of the LDAP Server.
Enable SSL Whether the LDAP Server is using SSL. The default is True (SSL
enabled on the LDAP server).
No further SSL configuration is required for the LDAP server.
Whether you selected SSL earlier for communications with the
Console is irrelevant. Certificate type is set on the LDAP server
side, not the manager.
LDAP Server Port Specify the port to use for the LDAP Server. If the LDAP server is
using SSL (Enable SSL=true), use port 636. If SSL is not enabled
on the LDAP server, use port 389.
Specify any user who exists in LDAP to test the server connection.
Enter a valid Distinguished Name (DN) of a user (and that user’s password) that exists on
the LDAP server; for example, CN=John Doe, OU= Engineering, O=YourCompany. This
information is used to establish a connection to the LDAP server to test the validity of the
information you entered in the previous panel.
LDAP groups are not supported. Therefore, you cannot allow or restrict
logging into the Manager based on LDAP groups.
If you configure your Manager to use LDAP authentication, ensure that you
create users on the Manager with their Distinguished Name (DN) information
in the external ID field. For example, CN=John Doe, OU= Engineering,
O=YourCompany.
Specify the user name used to log in to the Manager and the External ID name to which it
is mapped on the LDAP server.
This chapter describes the different tasks that you can perform in order to effectively
manage and maintain the ArcSight Database. The topics covered in this chapter include:
To enhance database security and lessen your risk and vulnerability, if you did
not use the ArcSight DB Installer to create and configure the ArcSight
Database, it is highly recommended that you change the default passwords for
the SYS and SYSTEM Oracle user accounts and lock the three accounts
DBSNMP, TRACESVR, and OUTLN. In addition, you should delete the following
automatically-created Oracle user accounts: ADAMS, BLAKE, CLARK, JONES,
and SCOTT. These accounts may have been generated by the Oracle installer.
An instance created using an ArcSight template uses a binary version of the initialization
parameter file when the database starts up. The binary version (also known as SPFILE) is,
by default, on UNIX:
$ORACLE_HOME/dbs/spfile$ORACLE_SID.ora
and, on Windows:
%ORACLE_HOME%\database\SPFILE%ORACLE_SID%.ORA
The ArcSight Installer also generates a text version of the initialization parameter file (also
known as PFILE), which is, by default, on UNIX:
$ORACLE_HOME/admin/$ORACLE_SID/pfile/ini.ora
and, on Windows:
%ORACLE_HOME%\..\admin\pfile\%ORACLE_SID%.ora
When making changes to dynamic parameters, the binary initiation parameter file is
updated automatically. However, Oracle does not synchronize the text version with the
binary version automatically. Log in as SYS (use the command, arcdbutil sql and type
in / as sysdba when prompted for the user name) and run the following command to
update the text version:
STARTUP PFILE='InitParamFilePath';
If you have the full Oracle license, you can run the sql / as sysdba command directly
instead of using arcdbutil.
Without following these procedures, changes to either version are lost when the database
is re-started.
databaseinfo.freespace.warning.threshold=5
This example reflects the default setting, which sends an alert when the amount of free
space in any of the ArcSight tablespaces for data or indexes falls to 5% or below.
To override the default threshold, copy this line from the read-only file
server.defaults.properties to server.properties and change the threshold
value.
Oracle database passwords must start with a letter followed by letters, digits, ‘_’, ‘#’, or ‘$.’
If you change the password for the ArcSight Database user, reconfigure the Manager and
Partition Archiver to use the new password.
To reconfigure the Manager password, run the Manager Configuration Wizard by typing the
following command in a command window on the Manager host in
<ARCSIGHT_HOME>\bin:
arcsight managersetup
If you change the password for the ArcSight Database user, run the command
arcsight database pc to update the password so that Partition Archiver can continue
to log in.
Every week a cold Backup should be done by bringing down Oracle. This can be done at
the primary site or the remote site. If done on the primary site then irrespective of the
database size, the database has to be down for a maximum of 10 minutes before it is
started up if the Veritas database edition for Oracle is used.
Veritas’s Quick IO provides this functionality by taking a cold backup of the Oracle database
and mounting a read-only file system (Viz., /snap) which has only the changes to the
original database files. So even if the database is very large, it needs to be down only for a
short time before it is brought up.
applied during the backup process by generating a lot of redo log files. An Oracle hot
backup should be done every day on the primary or target system.
Exporting Data
Along with these two backup methods, you should perform a full database export to
/dev/null, not as a substitute backup strategy but to guarantee that no blocks in the
database are corrupt. This is suggested since export is the only method to guarantee full
table scans of all the objects in the Oracle database.
Database events in initarcsight.ora can be set, but they signal corruption only when
such blocks are actually being accessed. Scheduling of these jobs is the job of the
Administrator on site. Jobs to be scheduled are:
The process of recovering the ArcSight Database is no different than recovering any other
Oracle database. However, if you require assistance, you can contact your Customer
Support representative for advice and implementation strategies. If you are using your own
Oracle software license, contact Oracle.
If database backup is not required or DataGuard is not being used, you can speed up the
compression process by enabling the NOLOGGING option for Partition Compressor.
To enable the NOLOGGING option for Partition Compressor, add the following line to the
config\server.properties file:
partition.compress.exchange.table.logging=false
Partition logs
All log entries including the ones for the database partition utilities are written to the
server.log file on the Manager. In addition, the partition entries are duplicated to one of
the following log files on the Manager:
Entries in a duplicate log file are specific to a partition utility and are based on the log filters
defined in <ARCSIGHT_HOME>\config\server.defaults.properties file for that
utility. These duplicate files enable you to easily browse the relevant information about a
partition utility. Additionally, these files are attached in e-mail notifications sent from the
partition management utilities.
Additional Partition Archiver logs are available on the ArcSight Database machine. These
logs are more detailed than the ones available on the Manager and are duplicated to
<ARCSIGHT_HOME>\logs\partitionarchiver.log file on the database machine.
Unlike the duplicated Manager log files, this file is not sent in e-mail notifications.
For information about incomplete logs, see the Database section of the Troubleshooting
chapter in this guide.
Some administrator tasks necessary to manage ESM are performed in the ArcSight
Console. The details for performing such tasks are documented in the ArcSight Console
online help and also in the ArcSight Console User’s Guide. This chapter points you to the
location where these tasks are documented in that guide.
Chapter 24‚ Modeling the Network‚ • “Modeling the Network” on page 715
on page 715
• “Working with Assets, Locations, Zones,
Networks, Vulnerabilities, and Categories”
on page 737
• “Managing Customers” on page 750
ArcSight Commands
Alphabetical ArcSight Commands List
To run an ArcSight command script on a component, open a command window and switch
to the <ARCSIGHT_HOME> directory. The arcsight commands run using the file
arcsight.bat (on Windows) or arcsight.sh (on Unix) in <ARCSIGHT_HOME>\bin.
The general syntax is as follows:
In general, commands that accept a path, accept either a path that is absolute or relative
to <ARCSIGHT_HOME>. Running the command from <ARCSIGHT_HOME> and prefixing
it with bin\ enables you to use the shell’s capabilities in looking for relative paths.
Not all parameters are required. For example, username and password may be a
parameter for certain commands, such as the Manager and Package commands, but the
username and password are only required if the command is being run from a host that
does not also host the Manager.
ACLReportGen
A tool for generating a report on ACLs either at the group level or at
Description the user level. By default, the generated report is placed in the
/opt/arcsight/manager/ACLReports directory.
Applies to Manager
Optional:
-config <config> The primary configuration file
(config/server.defaults.properties)
-h
agent logfu
Description Graphical SmartConnector log file analyzer
Applies to SmartConnectors
To run logfu:
Examples
arcsight agent logfu –a
agent tempca
Inspect and manage temporary certificates for a SmartConnector
Description
host machine
Applies to SmartConnectors
To run:
Examples
arcsight agent tempca
agentcommand
Description Send a command to SmartConnectors
Applies to SmartConnectors
agents
Run all installed ArcSight SmartConnectors on this host as a
Description
standalone application.
Applies to SmartConnectors
Syntax agents
Parameters None
agentsvc
Description Install ArcSight SmartConnector or Partition Archiver as a service.
agenttempca
Description See the agent tempca command
Applies to SmartConnectors
agentup
Get the current state of a SmartConnector. Returns 0 if the
Description
SmartConnector is running and reachable. Returns 1 if not
Applies to SmartConnectors
Syntax agentup
Parameters None
arcdbutil
A utility that enables you to launch database utilities for operations
Description such as import, export, sql interface, backup, restore, and other
database commands
Applies to Database
arcdt
A utility that enables you run diagnostic utilities such as database alert
logs, session wait times, and thread dumps about your system, which
Description
helps Customer Support analyze performance issues on your
components
Applies to Manager
To retrieve the last 20 lines of database alert log from your database
machine and save it to a file called 20110720_dblog, run this
Examples command:
arcsight arcdt db-alertlog -ln 20 -o 20110720_dblog
archive
Import or export resources (users, rules, and so on) to or from one or
more XML files.
Description Note: Generally, there is no need to use this command. The Packages
feature in the ArcSight Console is more robust and easier to use for
managing resources.
-source <sourcefile> The source file. This is used for all commands
that use the -f to specify an output file and
use a separate file as the input.
You can use the archive command line tool to import and export resources. It is useful
for managing configuration information, for example, importing asset information collected
from throughout your enterprise. You can also use this tool to archive resources so you can
restore it after installing new versions of this system.
The archive command automatically creates the archive files you specify, saving resource
objects in XML format. This documentation does not provide details on the structure of
archive files and the XML schema used to store resource objects for re-import into the
system. Generally it is easier to use packages.
This command displays a resource in the archive menu list of resources only if the user
running the utility has top-level access to the resource. Access is different for each mode.
Remote Mode
In remote mode, you can import or export from either a Manager or ArcSight Console
installation and can perform archive operations while the Manager is running.
The cacerts file on the Manager host must trust the Manager's certificate. You
may have to update cacerts if you are using demo certificates by running:
arcsight tempca –ac
You do not need to run the above command if you run the archive command
from the Console.
When you run the archive utility in the remote mode, it runs as the user specified in the
command line. However, even users with the highest privilege level (administrator) do not
have top level access to , for example, the user resource ('All users'). Thus, the User
resource does not show up in the list of resources. You can export users with the -uri
option, but if you want to use the -u option, use the Standalone mode.
To export user resources, you can use the -uri option and specify a user resource to which
you have direct access. For example:
Standalone Mode
In standalone mode, from the computer where the Manager is installed, you can connect
directly to the ArcSight Database to import or export resource information, however, the
Manager must be shut down before you perform archive operations.
Do not run the archive tool in standalone mode against a database currently in
use by a Manager as it is possible to corrupt the database.
When you run the archive utility in standalone mode, it runs as Root user. This is a special
system user which has top level access to all resources including the User resource (which
is 'All Users'), so, for example, User Resource shows up in the list of resources.
The basic syntax for the archive command in standalone mode is the following:
Both remote and standalone archive commands support the same optional
arguments.
Note that the standalone mode only works from the archive command found in the
Manager installation, and does not work remotely. For example:
This command logs into the Manager then displays a list of Resources available for
archiving.
The archive command displays a list of options that let you choose which resource
or group within the resource type that you want to archive.
After making your selection, you are prompted whether you want to add more
resources to the archive.
5 You can continue adding additional resources to the archive list. When you’ve finished,
answer no to the prompt
After it is finished writing the archive file, you are returned to the command prompt.
Before performing the import operation, you are prompted for a password to log in to the
Manager.
For exporting:
Before performing the import operation, you are prompted for a password to log in to the
Manager and use a series of text menus to pick which Resources are archived.
You can specify multiple URI resources with the URI parameter keyword by
separating each resource with a space character, or you can repeat the URI
keyword with each resource entry.
archivefilter
Use the command to change the contents of the archive. The
Description archivefilter command takes a source archive xml file as input,
applies the filter specified and writes the output to the target file.
Applies to Manager
archivewizard
Description Archive wizard
Applies to Manager
Syntax archivewizard
Parameters None
To run:
Examples
arcsight archivewizard
bleep
Unsupported stress test command to supply a Manager with security
events from replay files (see replayfilegen). Replay files
containing more than 30,000 events require a lot of memory on the
bleep host.
Do not run bleep on the Manager host. Install the Manager on the
Description bleep host and cancel the configuration wizard when it asks for the
Manager’s host name.
Run arcsight tempca –ac on the bleep host if the Manager under
test is using a demo certificate.
Create the file config/bleep.properties using the descriptions in
bleep.defaults.properties.
Applies to Manager
To run:
Examples
arcsight bleep
bleepsetup
Description Wizard to help create the bleep.properties file
Applies to Manager
Syntax bleepsetup
To run:
Examples
arcsight bleepsetup
changepassword
Command to change obfuscated passwords in properties files. The
Description
utility prompts for the new password at the command line
Applies to Manager
To run:
Examples
arcsight changepassword
checklist
ArcSight Environment Check. Used internally by the installer to see
if you have the correct JRE and supported OS and are connected to a
Description supported Database.
This can run from the Connector, Database, or Manager.
console
Applies to Console
-debug
-i
-imageeditor
-p <password> Password
-redirect
-relogin
-slideshow
-theme
consolesetup
Applies to Console
database pc
Description Partition configuration command
Applies to Database
Syntax database pc
database pm
Description Partition management command
Syntax database pm
database xts
Extend the ArcSight Database Tablespaces. (This is a convenience
Description tool; If you have the full Oracle license, you can optionally use
Enterprise Manager or SQL*Plus.)
Applies to Database
Parameters None
It is better to run this command locally on the machine that hosts the database. If you run
it remotely, the wizard does not allow you to browse the remote directlory and it cannot
validate diskspace availability before it expands the tablespace. If you run it locally it does
both.
databasesetup
Runs the ArcSight Database installer. This installer is documented in
Description the “Installing ArcSight Database” chapter of the ESM Installation
and Configuration Guide.
Applies to Database
Syntax databasesetup
Parameters None
dbcheck
Gathering information and statistics about the current ArcSight
Description
Database instance, such as the data to index size ratio
Applies to Database
Syntax dbcheck
Parameters None
dbview-generator
Utility that generates database views based on the fields of a
fieldset. Field sets are named subsets chosen from the available
Description attributes of an event. To create a new field set or to see the existing
ones, go to the Active Channels resource tree and click the Field
Sets tab
deploylicense
Install a new ArcSight license file. The Manager may be running; it
Description
detects the new license file automatically
Applies to Manager
downloadcertificate
Description Wizard for importing certificates
Applies to Manager
Syntax downloadcertificate
To run:
Examples
arcsight downloadcertificate
dropSLPartitions
Description Command for dropping old Session List partitions
Applies to Database
Syntax dropSLPartitions
To run:
Examples
arcsight dropSLPartitions
exceptions
Description Search for logged exceptions in ArcSight log files
-r Exclude errors.
To run:
Example arcsight exceptions
/opt/home/arcsight/manager/logs/default/server.log*
export_system_tables
Command to export your database tables. Upon successful
completion the utility generates two files: a temporary parameter
Description
file and the actual database dump file, arcsight.dmp, which is
placed in the Manager’s <ARCSIGHT_HOME>/tmp .
Applies to Manager
export_system_tables
Syntax
<DBusername>/<DBpassword>@<Oracle_instance_name>
To run:
arcsight export_system_tables
<username>/<password>@<DBname>
Note:
When running the export_system_tables command, you may see a
Examples warning message in your command prompt or shell console window
saying “Exporting questionable statistics”. You can safely
ignore this warning. This warning occurs when you export the table
data with its related optimizer statistics and Oracle cannot verify the
validity of these statistics.
Trend resources are exported, but not trend data from running
them. After you import, re-run the trends to generate new data.
flexagentwizard
Description Wizard-like command to generate simple ArcSight FlexConnectors
Applies to SmartConnectors
Syntax flexagentwizard
Parameters None
To run:
Examples
arcsight flexagentwizard
groupconflictingassets
Tool that groups asset resources with common attribute values.
Description Group Conflicting Attribute Assets Tool. Assets can have conflicting
IP addresses or host names within a zone
Applies to Manager
Syntax groupconflictingassets
-p <password> Password
-h Help
To run:
Examples
arcsight groupconflictingassets
idefensesetup
Description Wizard to configure iDefense appliance information on the Manager
Applies to Manager
Syntax idefensesetup
-h Help
import_system_tables
Command to import database tables. The file you import from must
be the one that export_system_tables utility created. This utility looks
Description
for the dump file, arcsight_dump_system_tables.sql, in the
database’s <ARCSIGHT_HOME>.
To run:
arcsight import_system_tables <old_user> <new_user>
<password> <TNSname> <dump_file_path> <dump_file_name>
Examples
Note:
Trend resources are exported, but not trend data from running them.
After you import, re-run the trends to generate new data.
keytool
Description Runs Java Runtime Environment keytool utility to manage key stores
keytoolgui
Graphical user interface command for manipulating key stores and
Description
certificates
Syntax keytoolgui
Parameters None
To run:
Examples
arcsight keytoolgui
kickbleep
Description Runs a simple, standardized test using the bleep utility
Applies to Manager
Syntax kickbleep
To run:
Examples
arcsight kickbleep
listsubjectdns
Description Display subject distinguished names (DN) from a key store
Syntax listsubjectdns
logfu
Description Graphical tool for analyzing log files.
-t <timestamp> To time
manager
Description Runs the Manager in command line mode (not as a service)
Applies to Manager
Syntax manager
Parameters None
managerinventory
Description Display configuration information about the installed Manager
Applies to Manager
Syntax managerinventory
-p <password> Password
To run:
Examples
arcsight managerinventory
manager-no-wrapper
Run the Manager without automatic restart in case of fatal errors.
Description
(See manager for parameters.)
Applies to Manager
Syntax manager-no-wrapper
Parameters None
manager-reload-config
Load the server.defaults.properties and server.properties
Description
files on the Manager
Applies to Manager
To reload config:
arcsight manager-reload-config
Examples To view the differences between the properties the Manager is
currently using and the properties that this command loads:
arcsight manager-reload-config -diff
managersetup
Description Run the Manager Configuration Wizard
Applies to Manager
To run:
Examples
arcsight managersetup
managerstop
Description Stop the Manager whether it is in service or command line mode
Applies to Manager
Syntax managerstop
Parameters None
managersvc
Start, stop, install, or uninstall the Manager as a service.
Description Note: The start option does not work on Windows. To start Manager
as a service on Windows, follow instructions in Chapter 1‚ Basic
Administration Tasks‚ on page 9.
Applies to Manager
Parameters None
managerthreaddump
Description Script to dump the Manager's current threads
Applies to Manager
Syntax managerthreaddump
Parameters None
To run:
Examples
arcsight managerthreaddump
managerup
Get the current state of the Manager. Returns 0 if the Manager is
Description
running and reachable. Returns 1 if not
Applies to Manager
Syntax managerup
Parameters None
monitor
Description Tool used in conjunction with Network Management Systems
Applies to Manager
Syntax monitor
-p <pwd> Password
To run:
Examples
arcsight monitor
netio
Description Primitive network throughput measurement utility
Applies to Manager
Syntax netio
-s Server mode
To run:
Examples
arcsight netio
package
Import or export resources (users, rules, and so on) to or from one
or more XML files.
Description Use this command instead of the archive command.
Note: Some functionality for this command are available from the
GUI only.
portinfo
Script used by the portinfo tool of the Console. Displays common
Description
port usage information for a given port
Applies to Console
To run:
Examples
arcsight portinfo
querytuner
A troubleshooting tool that generates explain plans for all queries, and
helps evaluate whether hints may improve the performance of some
queries. This tool pulls explain plans for all the queries used by reports
and trends and looks for ones that can execute inefficiently without
database hints.
Description
All findings are logged in the file Manager's
<ARCSIGHT_HOME>/logs/query-tuner.log.
Run this tool from the Manager’s bin directory either in a standalone
mode (without the Manager running) or you can run it while the
Manager is running.
reenableuser
Description Re-enable a disabled user account
Applies to Manager
refcheck
Description Resource reference checker
Applies to Manager
Syntax refcheck
Parameters None
To run:
Examples
arcsight refcheck
regex
Description Graphical tool for regex-based FlexConnectors
Applies to SmartConnectors
Syntax regex
Parameters None
To run:
Examples
arcsight regex
replayfilegen
Wizard for creating security event data files (“replay files”) that can
be run against a Manager for testing, analysis, or demonstration
Description purposes.
Note: This is a client side command only and should executed from
the Console’s ARCSIGHT_HOME/bin directory.
Applies to Console
resetpwd
Wizard to reset a user’s password and optionally notify the user of
Description
the new password by e-mail
Applies to Manager
Syntax resetpwd
resvalidate
Utility for checking whether there are any invalid resources in the
database. The utility generates two reports called validationReport
Description (with .xml and .html extensions) that are written to the directory
from which you run the resvalidate command. Make sure you stop
the Manager before you run this command.
Syntax resvalidate
ruledesc
Rule description tool to fetch rules information. (Used by HPOVO.)
Description
Tool to monitor managed objects in the Manager
Applies to Manager
-p <pwd> Password
To run:
Examples
arcsight ruledesc
runcertutil
A wrapper launcher for the nss certutil tool used for managing
certificates and key pairs. For more details on the certutil tool, you
can vist the ‘NSS Security Tools’ page on the Mozilla website.
Description
Note: If you do not see any error or warning messages after
runcertutil has run, it is an indication that the command
completed successfully.
Applies to N/A
-r Encoding type
-x Self signed
To run:
Examples
arcsight runcertutil
runmodutil
A wrapper launcher for the modutil nss cryptographic module utility.
Description For more details on the certutil tool, you can vist the ‘NSS Security
Tools’ page on the Mozilla website.
Applies to N/A
To run:
Examples
arcsight runmodutil
runpk12util
The pk12util allows you to export certificates and keys from your
database and import them into nssdb. This is a wrapper launcher for
Description the pk12util nss tool.
For more details on the certutil tool, you can vist the ‘NSS Security
Tools’ page on the Mozilla website.
Applies to N/A
To run:
Examples
arcsight runpk12util
script
Description Run a Python script
Applies to Manager
searchindex
Utility that creates or updates the search index for resources.
If you provide the credentials for the Manager, it automatically
associates with the newly created or updated index. However, if you
do not specify any credentials, you have to manually configure the
Manager to use the updated index.
Description
Note: Supporting 50,000 actors requires a minimum of 2 GB heap
size for this service. The value of the heap size needs to be modified
in <ARCSIGHT_HOME>/bin/scripts/searchindex.bat and
<ARCSIGHT_HOME>/bin/scripts/searchindex.sh files. The default
value in these files is set to 1028m.
Applies to Manager
To run:
Examples
arcsight searchindex –a <action>
sendlogs
Wizard to sanitize and save ArcSight log files so that you can send
Description them to customer support for analysis, if they instruct you to do so.
(Note: it does not actually send the log files anywhere.)
Syntax sendlogs
tee
Displays the output of a program and simultaneously writes that
Description
output to a file
Applies to Manager
Syntax -f <filename>
To run:
Examples
arcsight tempca -i | arcsight tee sslinfo.txt
tempca
Description Inspect and manage demo certificates
Applies to Console
Syntax tempca
To run:
Examples
arcsight tempca
testdbconnection
Description Test whether the database is up and running
threaddumps
Utility to extract and reformat thread dumps from the specified
Description
Manager log file
Applies to Manager
To run:
Examples
arcsight threaddumps
tproc
Description Standalone Velocity template processor
Applies to Manager
Syntax tproc
-Dname=value Defines
-v Verbose mode
To run:
Examples
arcsight tproc
uninstallservice
Description Wizard to uninstall service
Syntax uninstallservice
To run:
Examples
arcsight uninstallservice
webserver
Description Start the ArcSight Web server
Syntax webserver
webserver-no-wrapper
Description Start the ArcSight Web server without automatic restart
Syntax webserver-no-wrapper
webserversetup
Description See runwebsetup and websetup
webserversvc
Description Start, stop, restart, or install the ArcSight Web server as a service
webserversvc [parameters]
Syntax You can use the single letter parameters shown in brackets instead
of entering the whole word on Windows only
websetup
Description Run the ArcSight Web Configuration Wizard
Syntax websetup
Parameters None
whois
Description Script used by the whois command of the console
Applies to Console
To run:
Examples
arcsight whois
The following information may help solve problems that occur while operating the ArcSight
system. In some cases, the solution can be found here or in specific ArcSight
documentation, but Customer Support is available if you need it.
If you intend to have Customer Support guide you through a diagnostic process, please
prepare to provide specific symptoms and configuration information. If you intend to do
the initial diagnostic steps yourself, proceed through the following checklist systematically,
trying each applicable item and noting the results for reference.
General
Report is empty or missing information.
Check that the user running the report has inspect (read) permission for the data being
reported.
This option must be set up on the Manager to expose it in the Console report parameters
list. The steps are as follows:
3 On the ArcSight Console, open the report that you want to run in a separate process in
the Report Editor, and click the Parameters tab. Set the parameter Generate
Report In Separate Process to true.
4 Run the report. The report should run like a normal report, but it does not consume
the resources of the Manager VM.
Use this parameter only if you experience a Manager crash when running
large reports such as the ones that contain tables with more than
500,000 rows and 4 or 5 columns per row.
rules.replay.run.parallel=true
You can also set the number of threads to use, as follows (the default if you do not use this
property is four threads):
3 On the ArcSight Console, open the report that you want to contain the full scan hint in
the Report Editor, and click the Parameters tab. Set the parameter Query with Full
Scan Hint to true.
To work around the issue of mangled fonts, ArcSight recommends that you:
1 Install a localized Adobe Reader 8.0 depending on the language of your platform on
your Manager machine. This version of the Adobe Reader installs the opentype fonts
by default.
[2009-12-03 14:31:33,890][WARN
][default.com.arcsight.notification.NotifierBase][send] Unable to
and
notifications.incoming.enable=true
Check server.properties file to find which SMTP server is associated with the
Manager. Make sure that the SMTP server is up and running.
Review the Notification resource and confirm the e-mail address and other
configuration settings.
This is the amount of time that a trend query is allowed to run, in seconds, before the
SQL statement times out and the trend query fails. If absent or 0, no time-based
timeout is applied.
trends.query.timeout.percent=50
This is the amount of time that a trend query is allowed to run, as a percentage of the
query interval for interval trends, before the SQL statement times out and the trend
query fails. If absent or 0, no percentage-based timeout is applied.
If both timeouts are specified, the system uses the smaller of the two.
trends.query.failures.deactivation.threshold=3
If this many consecutive “accumulate” (not refresh) runs fail for any reason, the
system automatically disables the trend. The check is always performed after any
accumulate query run fails. Once the threshold is reached, any remaining queries to be
executed by this task are skipped. If this setting is absent or 0, the checking
mechanism is turned off.
If a trend or query is stopped because of any of the above reasons, an audit event
reflects this.
Using the Trend Data Viewer from within the Trends resource tree, you can see at
most 2000 rows of data. (Select a trend in the resource tree, right-click, and choose
Data Viewer.) Sort the trend timestamp column so that the timestamps show newest
to oldest and observe when the newest value indicates it has caught up.
Using the Refresh... button in the Trend Editor, set the start time as far back as
needed (days or weeks) to see any entries and click Refresh to see which runs show
up as available to be refreshed. Only the most recent ones should show first. Note that
you should not actually refresh any runs, but only use this technique to see what has
been run.
For a trend that queries an entire day and runs once a day, this would allow for more than
a month’s worth of data to be queried. The data must be present on the system, however,
or the query returns no results (but it does not fail).
% arcdbutil sql
SQL> @<ARCSIGHT_HOME>\utilities\database\oracle\common\sql\
SetDynamicSampling.sql
In addition to Dynamic Sampling, you can update the IO transfer speed in the database
which helps in query performance. If you do not update the IO transfer speed, Oracle
defaults to a very low IO transfer speed estimate that adversely affects the query execution
plan. Run the following command (while logged in as sysdba):
SQL> @ARCSIGHT_HOME\utilities\database\oracle\common\sql\
GatherSystemStats.sql
This script should also be run every time you make any storage hardware changes that
affects IO transfer speeds.
If this occurs, enlarge the ARC_UNDO tablespace incrementally until you get satisfactory
results.
SmartConnectors
My device is not one of the listed SmartConnectors.
ArcSight offers an optional feature called the FlexConnector Development Kit which may
enable you to create a custom SmartConnector for your device.
ArcSight Console
Can’t log in with any Console.
Check that the Manager is up and running. If the Manager is not running, start it.
If the Manager is running, but you still can’t log in, suspect any recent network changes,
such as the installation of a firewall that affects communication with the Manager host.
“Couldn't connect to manager - improper authorization setup between client and manager.”
If so, it’s likely that the manager has been reconfigured in such a way that it now has a
new certificate. Especially if the Console asked you to accept a new certificate when you
started it. To fix this, find and delete the certificate that the Console was using before, and
then manually import another certificate from the Manager.
1 Go to Tools->Internet Options.
6 Click Reset button. You receive a warning asking you whether you want to change the
security setting of the zone. Click Yes.
9 Go back to the Console and try to restart ArcSight Web from within the Console by
clicking File->Launch ArcSight Web.
Manager
Can’t start Manager.
The Manager provides information on the command console which may suggest a solution
to the problem. Additional information is written to
<ARCSIGHT_HOME>/logs/default/server.std.log.
arcsight testdbconnection
For example, the following error indicates that a connection cannot be established with the
underlying Oracle DBMS:
[ERROR][default.com.arcsight.common.persist.oracle.OracleDatabaseI
nfoBroker][getDatabaseInfo]
This indicates that the Oracle TNS Listener is running but the actual ArcSight Database
service is not reachable.
Disable page file size optimization. Perform the following steps to disable page file size
optimization on Windows 2000 Manager hosts:
1 Right-click My Computer and select Properties from the menu. Select the
Advanced tab.
4 Click Set.
5 Click OK.
persist.securityevent.stcache.GeoDescriptor=50000
persist.securityevent.stcache.AgentDescriptor=500
persist.securityevent.stcache.DeviceDescriptor=50000
persist.securityevent.stcache.CategoryDescriptor=3000
persist.securityevent.stcache.LabelsDescriptor=2000
persist.securityevent.stcache.ResourceRef=20000
If you continue to see the error message after this change, one or more SmartConnectors
may be configured incorrectly. Contact HP Customer Support.
ArcSight Web
Some content, particularly dashboards, is not visible.
Install the latest Adobe Flash plug-in to your browser. Visit the Adobe web site to download
this free plug-in.
If the Manager is running, but you still can’t log in, suspect any recent network changes,
such as the installation of a firewall that affects communication between the ArcSight Web
server and the Manager host.
If you can log in to the ArcSight Console but not ArcSight Web, focus on any recent
network changes and any configuration changes to your browser.
Make sure that the version number of ArcSight Web matches that of the Manager. If the
version numbers do not match, log in is disabled.
Examine the ArcSight Web log file for specific error messages. If the message is not clear,
contact HP Customer Support.
Database
Partition Archiver can’t connect to Manager.
Check the Partition Archiver log for errors. The log file is found in the logs directory:
<ARCSIGHT_HOME>/logs/default/agent.out.wrapper.log
An SSL Handshake exception in the log indicates a problem with the Manager’s certificate.
From the SmartConnector’s install directory, run the following command to establish a valid
certificate:
SSL
Cannot connect to the SSL server: IO Exception in the
server logs
Causes:
The SSL server may not be running.
Causes:
You may be specifying Fully Qualified Domain Name (FQDN) when only hostname is
expected or the other way around.
You may be specifying IP address when hostname is expected.
Resolutions:
Type exactly what the server reports on startup in server.std.log (“Accepting
connections at http://...”)
For Network Address Translation (NAT) or multi-homed deployments, use hosts file to
point client to correct IP.
Resolution:
Import issuer’s certificate (chain) into the trust store.
Resolution:
Import the latest issuer’s certificate (chain) into the trust store.
Resolution:
Make sure the password of the new key store matches the old key store. If you do not
remember the current key store’s password, run the Manager Configuration Wizard on the
Manager (ArcSight Web Configuration Wizard on the Web) to set the password of the
current key store to match the new key store’s password.
Certificate is invalid
Cause:
The timestamp on the client machine might be out of the bounds of the validity range
specified on the certificate.
Resolution:
Make sure that the current time on the client machine is within the validity range on the
certificate. To check the certificate’s valid date range see “Viewing Certificate Details” on
page 43.
This chapter provides information about in-built checks that monitor database attributes
and generate warning or error messages, as appropriate. This appendix is divided into the
following sections:
Each check task is scheduled to run at a predefined interval and compare the current
system state with a predefined threshold, both of which can be changed to suit your needs.
The server.defaults.properties defines the interval and threshold for each task.
You can override these values in the server.properties file on the Manager. That is,
do not edit the server.defaults.properties file. Copy the entry to the
server.properties file and then change the setting.
Message text
The following is an example of the error or warning e-mail message that is sent:
Error - PartitionManagerCheckTaskTracker
-- DESCRIPTION ---------------------------------------------------
Check the Partition Manager logs for errors and fix the problem
before proceeding.
Fix the root cause of the error reported. If the event flow is
stopped, use the
The following is an example of the notification message that is displayed on the Console:
To disable a database check task, specify the name of the check task as the value for the
whine.check.exclude property in the server.properties file on the Manager.
whine.check.exclude=PartitionManagerCheckTask
whine.check.exclude=PartitionManagerCheckTask,
PartitionCompressorCheckTask
Logfu is an ArcSight utility that analyzes log files. It is indispensable for troubleshooting
problems that would otherwise require poring over text logs. Logfu generates an HTML
report (logfu.html) and, especially in SmartConnector mode, includes a powerful
graphic view of time-based log data. Logfu pinpoints the time of the problem and often the
cause as well.
Logfu has two windows: the interactive Chart and the Plot/Event window.
Running Logfu
Logfu finds log files in the current directory. The –a or –m switches tell it which file names
to look for. The –m switch tells it to look for all three Manager logs—server.std.log,
server.log, and server.status.log—for example.
3 Right-click in the grid and select Show Plot/Event Window from the context menu.
The initial display is always an empty grid. Loading very large log files can take a few
minutes (a 100MB log might take 5 or 10 minutes). Once log files are scanned, the
information gleaned from them is cached (in files named data.*), which speeds up loading
the second time. If something about the log changes, however, you must manually delete
the cache files to force logfu to reprocess the log.
Right-click the grid and choose Show Plot/Event Window from the context menu.
Select what to show on the grid from the Plot/Event Window that appears.
The tree of possible things to display is divided into Plot—attributes that can be plotted
over time, like events per second—and Event—one-time things, like exceptions, which are
shown as vertical lines. Check as many things as you want to show.
Because SmartConnectors can talk to multiple Managers and each can be configured to use
multiple threads for events, the Plot hierarchy includes nodes for each SmartConnector and
each Manager. Within the SmartConnector, threads are named E0, E1, and so on. Each
SmartConnector has one heartbeat thread (H0) as well. Different types of SmartConnector
(firewall log SmartConnector, IDS SNMP SmartConnector, and so on) have different
attributes to be plotted.
The interactive Chart uses sliders to change the view. Hovering over a data point displays
detailed information.
There are two horizontal sliders—one at the top of the grid, one underneath. The slider at
the top indicates the time scale. Drag it to the right to zoom in, or widen the distance
between time intervals (vertical lines). The slider at the bottom changes the interval
between lines—anywhere from 1 second at the far left to 1 day at the far right. The time
shown in the grid is listed below the bottom slider:
Click anywhere in the grid area and drag a green rectangle to zoom in, changing both the
vertical and horizontal scales at once. Hold the Ctrl key as you drag to pan the window in
the vertical or horizontal direction, and hold both the Shift and Ctrl keys as you drag to
constrain the pan to either vertical or horizontal movement. When you are panning, only
sampled data is shown, but when you stop moving, the complete data fills in. (You can
change this by unchecking Enable reduced data point rendering in Preferences.)
Hover the mouse over a data point to see detailed information in a “tooltip” window, as
shown in the figure, above..
For each attribute being plotted, a colored, vertical slider appears on the right of the grid.
This slider adjusts the vertical (value) scale of the thing being plotted.
By default, data points are connected by lines. When data is missing, these lines can be
misleading. To turn off lines, uncheck Connect dots in Preferences.
Once you have specified attributes of interest, scaled the values, centered and zoomed the
display to show exactly the information of concern, select Save as JPG on the menu to
create a snapshot of the grid display that you can print or e-mail. The size of the output
image is the same as the grid window, so maximize the window to create a highly detailed
snapshot, or reduce the window size to create a thumbnail.
Example
Perhaps a particular SmartConnector starts by sending 10 events per second (EPS) to the
Manager, but soon is sending 100, then 500, then 1000 EPS before dropping back down to
10. Logfu lets you plot the SmartConnector’s EPS over time—the result is something like a
mountain peak.
When you plot the Manager’s receipt of these events, you might see that it keeps up with
the SmartConnector until 450 EPS or so. You notice that the Manager continues consuming
450 EPS even as the SmartConnector’s EPS falls off. This is because the Manager is
consuming events that were automatically cached.
By plotting the estimated cache size, you can see the whole story—the SmartConnector
experienced a peak event volume and the cache stepped in to make sure that the Manager
didn’t lose events, even when it couldn’t physically keep up with the SmartConnector.
Use the vertical sliders on the right to give each attribute a different scale to keep the peak
EPS from the SmartConnector from obscuring the plot of the Manager’s EPS.
Troubleshooting
Another real-world example involved a Check Point SmartConnector that was mysteriously
down for almost seven days. Logfu plotted the event stream from the SmartConnector and
it was clearly flat during the seven days, pinpointing the outage as well as the time that the
event flow resumed. By overlaying Check Point Log Rotation events on the grid, it became
clear that the event outage started with a Log Rotation and that event flow resumed
coincident with a Log Rotation.
Further investigation revealed what had happened—the first Check Point Log Rotation
failed due to lack of disk space, which shut down event flow from the device. When the
disk space problem had been resolved, the customer completed the Log Rotation and
event flow resumed.
If the Manager suddenly stops seeing events from a SmartConnector Logfu helps
determine whether the SmartConnector is getting events from the device. Another
common complaint is that not all events are getting through. Logfu has a plot attribute
called ‘ZFilter’—zone filter—that indicates how many raw device events are being filtered by
the SmartConnector. Events processed (the number of events sent by the device) minus
ZFilter should equal Sent (the number of events sent to the Manager). A sample HTML
report is shown below.
Menu
Menu Item Description
Bring To Front
Send to Back
Zoom out
Preferences Check:
Connect dots – draw lines between data
points
Enable fast rendering
Enable reduced data point rendering
Events Processed
Events/Sec (Since Last Check) Events per second in last minute (unless check
time is configured to a different interval)
Max Rate
timefactor
Memory Usage
Events
com.arcsight.agent.transport.
TransportException
com.arcsight.common.agent.
ServerConnectionException
java.net.SocketException
Intervals
1 second
5 seconds
10 seconds
30 seconds
1 minute
5 minutes
10 minutes
30 minutes
1 hour
6 hours
12 hours
1 day
This appendix describes how to modify Velocity templates to customize e-mail messages
you receive from the ArcSight notification system.
Overview
ArcSight supports the use of Velocity templates that are a means of specifying dynamic
input to the underlying Java code.
You can apply Velocity templates in a number of places in ArcSight. For a complete list of
Velocity template applications in ArcSight, see the Console online Help.
This section describes one such application—E-mail Notification Messages—in detail. You
can use Velocity templates on your Manager to create custom e-mail messages to suit your
needs.
#if ($introspector.getValue($event,
ArcSight_Meta_Tag).intValue()Comparative_Operator Compared_Value)
ArcSight_Meta_Tag is a string when using the #if statement for string comparison (for
example, displayProduct) and is an integer for the #if statement for integer comparison
(for example, severity).
For a complete listing of ArcSight meta tags, see the Token Mappings topic in ArcSight
FlexConnector Guide.
#parse ("Informative.vm")
${field.fieldDisplayName}: $introspector.getDisplayValue($event,
$field)
#end
#end
For example, if you want to see complete details for an event—Threat Details, Source
Details, Target Details, and any other information—generated by all Snort devices in your
network, create a secondary template file called Snort.vm in
<ARCSIGHT_HOME>/config/notification, on your Manager, with the following lines:
Threat Details
Event: $introspector.getDisplayValue($event,"name")
Description:
$introspector.getDisplayValue($event,"message")
Severity:
$introspector.getDisplayValue($event,"severity")
------------------------------------------------------------------
Source Details
Source Address:
$introspector.getDisplayValue($event,"attackerAddress")
Source Port:
$introspector.getDisplayValue($event,"sourcePort")
------------------------------------------------------------------
Target Details
Target Address:
$introspector.getDisplayValue($event,"targetAddress")
------------------------------------------------------------------
Transport Protocol:
$introspector.getDisplayValue($event,"transportProtocol")
Template:
/home/arcsight/arcsight/Manager/config/notifications/Snort.vm
------------------------------------------------------------------
Once you have created the secondary templates, you can edit the Email.vm template to
insert conditions that call those templates.
#parse("Snort.vm")
#else
#parse("Informative.vm")
#end
3 Edit Email.vm to insert the conditions, as shown in the example in the previous
section.
4 Save Email.vm.
Sample Output
If you use the Snort.vm template and modify Email.vm as explained in the previous
section, here is the output these templates generate:
Threat Details
Severity: 2
------------------------------------------------------------------
Source Details
Source Port: 0
------------------------------------------------------------------
Target Details
------------------------------------------------------------------
Template:
/home/arcsight/arcsight/Manager/config/notifications/Snort.vm
------------------------------------------------------------------
How to Respond
https://mymanager.mycompany.com:9443/arcsight/app?service=page/NotifyHome
This appendix provides information about and instructions for configuring ESM to support
Federal Information Processing Standard (FIPS) 140-2 and some other configuration
changes you can make while in FIPS mode.
FIPS is a standard published by the National Institute of Standards and Technology (NIST)
and is used to accredit cryptographic modules in software components. A cryptographic
module is either hardware or software or a combination that is used to implement
cryptographic logic. The US Federal government requires that all IT products dealing with
Sensitive, but Unclassified (SBU) information meet the FIPS standard.
To be compliant with FIPS 140-2, all components, including Connectors and Logger, if
present, must be configured in FIPS mode. Connectors and Logger setup are covered
in their documentation.
For information about supported platforms and specifics about FIPS mode architecture
for all ESM products, contact ArcSight Customer Support.
TLS is based on SSL 3.0, for a better understanding of how SSL works. Read the
section “Understanding SSL Authentication” on page 33.
runcertutil - is a certificate and key management tool used to view and generate
key pairs and certificate signing requests (CSR) and import and export public
certificates from key pairs.
runmodutil - is the NSS module configuration tool. It is used to enable or disable the
FIPS module and change key store passwords.
runpk12util - is an import and export tool for PKCS #12 format key pairs (.pfx
files).
See Appendix A‚ Administrative Commands‚ on page 115 for details on the above command
line tools. You can also refer to the ‘NSS Security Tools’ page on the Mozilla website for
more details on any of the above NSS tools (search for them as certutil, modutil, or
pk12util).
For online help on any command, enter the following command from a
component’s \bin directory:
./arcsight <command_name> -H
FIPS Encryption
A cypher suite is a set of authentication, encryption, and data integrity algorithms used for
securely exchanging data between an SSL server and a client. The following cipher suites
are enabled by default in FIPS:
TLS_RSA_WITH_AES_128_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
The following cypher suites are enabled for FIPS Suite B:
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
The Connector user password is used by a connector appliance to authenticate to the
connector before being able to manage the connectors. if the default password is changed,
then a SHA-256 hash of the password is saved on the connector’s local file system for
authenticating the connector user.
Passwords (and sometimes user names as well) for accessing event information in third
party devices like databases, sensors, and so on, are obfuscated using 3DES encryption
and saved on the connector’s local file system.
Digests in HTTP posting of events to ESM as well as digests used in field obfuscation use
SHA-256 in FIPS mode.
Event Integrity Algorithms use SHA-256, SHA-1, and SHA-512 in FIPS mode.
1 Buy or obtain a keypair from a Certificate Authority (CA). When putting in server data
for your new server certificate, verify that the Subject Common Name (CN) matches
the Fully qualified hostname (FQDN) or IP address of your server.
2 From your manager, Generate a Certificate Signing Request (CSR). Send the CSR to a
Certificate Authority and retrieve the new keypair from the CA.
After acquiring your new CA Signed Keypair, import it into the nssdb using the
runpkcs12util utility.
For all clients connecting to the server that uses the CA signed certificates, import the CA’s
root certificate. It will be used to validate the certificate from the server.
The instructions in this section for converting from the default self-signed certificates to a
CA signed certificate assume that the Manager is already running in FIPS mode.
3 Delete any previously imported/generated Manager certificate or key pair. (Make sure
you know the common name (CN) it uses before you delete it, because the new
certificate needs to use the same CN.)
5 When you get to the first configuration screen shown below, leave the wizard running
and open a command prompt window.
1 Generate a key pair on the Manager by running the following from the Manager’s
/bin directory:
2 Generate a key pair on the Manager by running the following from the Manager’s
/bin directory:
For Suite B:
When prompted for a password, enter the default. The default is described in “NSS
database password” on page 37.
Enter random keyboard strokes when prompted, to generate the random seed used to
generate your key.
Enter the NSS DB password when prompted. The default is described in “NSS
database password” on page 37. You should see something similar to <0> rsa
<key> in the output of the command.
4 Generate a certificate signing request (CSR) by running the following from the
Manager’s /bin directory:
L=<City_where_the_organization_is_located>,
ST=<State_where_organization_is_located>, C=<Country>" -a -o
<absolute_path_to_filename.csr> -d
<ARCSIGHT_HOME>/config/jetty/nssdb
If you do not specify the absolute path to where the .csr file should go, the
path specified for the output file will be relative to <ARCSIGHT_HOME> .
Enter the password for the NSS DB when prompted. The default is described in “NSS
database password” on page 37.
Enter random keyboard strokes when prompted to generate the random seed to
generate your key.
5 Go back to the installation wizard screen and choose No, do not upgrade. This is a
new manager setup to create a new, clean installation and click Next.
Select the Run manager in FIPS mode radio button and click Next.
7 The configuration wizard asks you to confirm that you have set up the NSS DB. Click
Yes.
8 Acknowledge that once you select the FIPS mode, you cannot revert to the default
mode. Click Yes.
9 Follow the prompts in the next few wizard screens to complete the Manager
installation. Refer to “Installing ArcSight Manager” chapter in the ArcSight ESM
Installation and Configuration Guide for details on any screen.
The Certificate Authority sends you a key pair consisting of a private key and a public
certificate sighed by the CA.
11 After you receive the signed certificate from the CA, import it into the Manager’s NSS
DB by running these commands from the Manager’s /bin directory:
Make sure that you have copied the Manager’s certificate to the machine on
which you install ArcSight Web.
Delete any previously imported/generated Manager certificate or key pair.
(Make sure you know the common name (CN) it uses before you delete it,
because the new certificate needs to use the same CN.)
./arcsight runcertutil -D -n mykey -d
<ARCSIGHT_HOME>/config/jetty/webnssdb
To authenticate the Manager, ArcSight Web’s NSS DB should contain the CA’s root
certificate. At the same time, since the Web acts as a server to the web browsers that
connect to it, you should have a key pair and a certificate containing ArcSight Web’s public
key in the Web’s NSS DB. This allows ArcSight Web to authenticate iteself to the web
browsers.
You import the CA’s root certificate into ArcSight Web’s webnssdb. To obtain a CA-signed
certificate for ArcSight Web, generate a key pair on ArcSight Web, generate a CSR on
ArcSight Web, and send the CSR to the CA. Lastly, after you receive the signed certificate
from the CA, import it into the webnssdb.
2 When you get to the first configuration screen shown below, leave the wizard running
and open a command prompt window.
3 Import the CA’s root certificateinto the webnssdb by running the following from
ArcSight Web’s \bin directory. (For the -t option, make sure the you specify
“CT,C,C” exactly as shown.)
This is required in order for ArcSight Web to be able to authenticate the Manager.
For Suite B:
Enter the password for webnssdb when prompted. The default is described in “NSS
database password” on page 37.
Enter random keyboard strokes when prompted, to generate the random seed used to
generate your key.
5 Verify that the key pair got created by entering the following command:
After entering the password, you should see something similar to <0> rsa <key> in
the output of the command.
6 Generate a CSR in the webnssdb which you have to send to the CA to obtain a CA-
signed certificate for ArcSight Web:
This generates a CSR file that is placed in the location you had specified in the -o
option in the command.
7 Go back to the wizard screen. Select No, I do not want to transfer the settings
and click Next.
8 Select Run web in FIPS mode in the following screen and click Next:
9 The following prompt asks you whether you configured your webnssdb. Click Yes.
Click Yes.
11 When you get to the following screen, make sure that the Webserver Host name
exactly matches the host name that you had entered for the webserver when installing
the Manager. For example, if you had entered an IP address for the webserver in the
Manager setup, make sure to enter the IP address in this screen too.
12 Follow the prompts in the next few wizard screens and complete the wizard.
The Certificate Authority sends you a key pair consisting of a private key and a public
certificate sighed by the CA.
14 After you receive ArcSight Web’s signed certificate from the CA, import it into ArcSight
Web’s webnssdb by running:
The web browsers that connect to the webserver use ArcSight Web’s certificate to
authenticate the webserver.
15 Start ArcSight Web by running the following from its /bin directory as user arcsight:
Make sure that you have copied the CA root certificate to the machine on
which install the ArcSight Console.
1 Import the root certificate from the Certificate Authority (CA) used to sign the
managers certificate by running:
For the -t option, be sure to use CT,C,C permission flags only and in the
order shown above.
2 Start the Console. You should see a message saying that the Console is starting in
FIPS mode.
This section explains how to generate a key pair in a component’s NSS DB. A component
that has to authenticate itself is required to have a key pair on it. For example, during
server-side authentication, since the server needs to authenticate itself to a client, the
server should have a key pair in its NSS DB and send its certificate which contains the
server’s public key to the client requesting it. The same is true for client-side authentication
where a key pair has to exist on the client. For self-signed certificate, the certificate gets
generated when generating a key pair.
On the Manager
1 Run the following command from the Manager’s <ARCSIGHT_HOME>/bin directory to
generate a key pair:
• Make sure to use mykey as the alias name for the key pair as shown
in the example.
• The -m serial number should be unique within nssdb
• The hostname is the short name or fully qualified domain name
depending upon how your Manager name was set up when you
installed the Manager.
• Using -v to set the validity period of your certificate is optional. Using
-v is optional. If you choose to use it, see “Setting the Expiration
Date of a Certificate” on page 215 for details. To dee the validity
period of an existing certificate, see “Viewing Certificate Details” on
page 43.
In the above command, the hostname is the name of the machine on which your
Manager is installed and -v is the validity period of the certificate.
This generates a key pair and certificate with the alias mykey which is valid for 6
months from the current date and time in the Manager’s nssdb.
2 Enter the password for NSS DB when prompted. The default is described in “NSS
database password” on page 37.
3 Enter random keyboard strokes when prompted, to generate the random seed used to
generate your key.
On ArcSight Web
To create a key pair on the Web server:
The -m serial number (2345) must be unique within webnssdb. That is, it must
be different than the one for the Manager’s key pair.
hostname is the name of the machine on which ArcSight Web is installed.
Using -v is optional. If you choose to use it, see “Setting the Expiration Date of a
Certificate” on page 215 for details.
2 Enter the password for webnssdb. The default is described in “NSS database
password” on page 37.
3 Enter random keyboard strokes when prompted, to generate the random seed used to
generate your key.
When you import or generate a key pair into NSS DB, if there is a
existing key pair/certificate with the same CN as the one you create, the
runcertutil utility uses the existing alias for the newly created key pair
and ignores the alias you supplied in the runcertutil command line.
Exporting Certificates
This section explains how to export a certificate from a component’s NSS DB. During an
SSL handshake, for server side authentication, you need to have the server’s certificate in
the NSS DB of both the server and the client. Export the server’s certificate from the
server’s NSS DB in order to import it into the client that wishes to connect to the server.
Likewise, for client side authentication, you need to have the client’s certificate in the NSS
DB of both the client and the server. Export the client’s certificate from the client’s NSS DB
in order to import it into the server to which the client connects.
For example:
This exports the Manager’s certificate into a file called ManagerCert.cer and places it in
your /home/arcsight/arcsight/Manager directory. The alias for this file is mykey.
If you do not specify the absolute path for the .cer file, it is placed in the
Manager’s <ARCSIGHT_HOME> directory.
If you do not specify the absolute path for the .cer file, it gets placed in the
Console’s <ARCSIGHT_HOME> folder.
If you do not specify the absolute path for the .cer file, it gets placed in the
Web’s <ARCSIGHT_HOME> folder.
On the Manager
If you use a CA-signed certificate, import the Manager’s CA-signed certificate into the
Manager’s nssdb. In addition, if you set up client side authentication, import the client’s
certificate into the Manager’s nssdb. Import a certificate into the Manager’s nssdb by
running:
For the -t option, be sure to use CT,C,C permissions flags only and in the same order that it
is shown above.
If you are importing the Console’s certificate to set up client-side authentication, make sure
that you do NOT use the alias mykey for the Console’s certificate when importing it into the
Manager’s nssdb because the nssdb already has the Manager’s certificate with the alias
mykey in it. All aliases in the nssdb should be unique.
On the Console
Import the Manager’s certificate into the Console that connects to the Manager. To import a
certificate into the Console’s nssdb.client:
For the -t option, be sure to use CT,C,C permissions flags only and in the same order that
it is shown above.
On ArcSight Web
To import the Manager’s certificate into ArcSight Web’s webnssdb:
For the -t option, be sure to use CT,C,C permissions flags only and in the same order that
it is shown above.
1 Export the key pair using a tool, such as keytoolgui, and be sure to export the key
pair with the name you gave it. An alias is required in order to import the key pair into
NSS DB.
2 Import the .pfx file into NSS DB using the runpk12util tool. Make sure that the alias
of the key pair being imported does not match the alias of a pre-existing key pair in
the component’s NSS DB. If the key pair being imported has an alias that matches a
pre-existing key pair, the key pair fails to import citing an error:
On the Manager:
On the Web:
On the Console:
On Manager:
On Web:
./arcsight runcertutil -L -d
<ARCSIGHT_HOME>/config/jetty/webnssdb
You should see the alias of the imported key pair in the output.
The ArcSight ESM Installation and Configuration Guide walks you through the steps for
installing ESM with server-side authentication.
The client side authentication takes place after the initial handshake (after the Manager
has authenticated itself to the Console). The Manager then requests the Console for its
(Console’s) certificate. The Console in turn sends its certificate to the Manager. The
Manager has to be configured to accept the Console’s certificate. In other words, the
Console’s certificate must exist in the Manager's nssdb prior to the Manager authenticating
the Console. With this high level overview in mind, here are the steps you need to perform
to set up client-side authentication.
2 Generate a key pair in the Console’s nssdb.client. Follow the steps in “Generating
a Key Pair in a Component’s NSS DB” on page 207 (“On the Console” subsection). This
automatically generates a self-signed certificate on the Console’s NSS DB.
Alternatively, you can use an existing key pair which you have to import into the
Console’s NSS DB. See “Importing an Existing Key Pair into the NSS DB” on page 211
for details.
3 Export the Console’s certificate. See the section “Exporting Certificates” on page 209
(“From the Console” subsection) for detailed instructions.
5 Import the Console’s certificate into the Manager’s nssdb. See the section “Importing
a Certificate into the NSS DB” on page 210 (“On the Manager” subsection) for details.
Make sure that you do NOT use the alias mykey for the certificate when
importing it into the Manager’s nssdb because the nssdb already has the
Manager’s certificate with the alias mykey in it. All aliases in the nssdb must be
unique.
2 Generate a key pair on the Console. See the “Generating a Key Pair in a Component’s
NSS DB” on page 207 for details.
3 Generate a CSR on the Console by running the following from the Console’s \bin
directory:
If you do not specify the absolute path to where you want the .csr file to
be placed, the .csr file gets placed in the Console’s <ARCSIGHT_HOME>.
4 Send the CSR file to your CA and obtain a signed certificate from your CA.
5 Import the CA-signed certificate into the Console’s nssdb.client. See “Importing a
Certificate into the NSS DB” on page 210 (subsection “On the Console”) for details.
7 Import the Console’s CA-signed certificate into the Manager’s nssdb. See “Importing a
Certificate into the NSS DB” on page 210 (subsection “On the Manager”) for details.
1 Disable the FIPS mode in NSS DB by running the following from the component’s /bin
directory:
3 Change the token’s password by running the following from the component’s /bin
directory:
4 Enter the old password and a new password and confirm it when prompted.
On the Manager:
Change
server.privatekey.password.encrypted=<encrypted_password>
to
server.privatekey.password=<new_unencrypted_password>
On the Console:
Located in <ARCSIGHT_HOME>\current\config\console.properties
Change
console.privatekey.password.encrypted=<encrypted_password>
to
console.privatekey.password=<new_unencrypted_password>
On the Web:
Located in <ARCSIGHT_HOME>/config/webserver.properties.
Change
webserver.privatekey.password.encrypted=<encrypted_password>
to
webserver.privatekey.password=<new_unencrypted_password>
Manager:
./arcsight managersetup
Console:
arcsight consolesetup
Web:
./arcsight webserversetup
and accept all the defaults in the wizard. This is required in order to obfuscate the
password that you had entered in plain text.
You should see the alias of the certificate you just imported or the alias for the key pair you
generated.
You specify the validity of the certificate with the -v <number_of_months> option. The
value that you provide with -v calculates the number of months that the certificate is valid
starting from the current time. You can use the -w <offset_months> along with -v to
set the beginning time for the validity. The -w <offset_months> if used, calculates the
start time of the certificate validity and the offset is calcualted from the current system
time. If you do not use the -w option, the current time is used as the start time for the
certificate validity. See the subsection, “runcertutil” in Appendix A‚ Administrative
Commands‚ on page 115 for details on the -v and -w options.
2 Delete the expired certificate from the server’s NSS DB. See “Deleting a Certificate
from NSS DB” on page 215 for details.
Since the common name (CN) for the new certificate is identical to the CN in the old
certificate, you are not permitted to have both the expired as well as the new
certificate co-exist in the NSS DB.
3 In case of CA-signed certificate, replace the certificate by importing the new certificate
into the server’s NSS DB.
In case of self-signed certificate, you have to generate a key pair on the server. See
“Generating a Key Pair in a Component’s NSS DB” on page 207 for details on how to
do this. Generating the key pair automatically generates the certificate.
4 On every client that connects to the server, make sure to delete the old expired server
certificate from the client’s NSS DB and import the server’s newly generated certificate.
a Delete the expired certificate from the Manager’s nssdb. See “Deleting a
Certificate from NSS DB” on page 215
c Export the newly generated certificate from the Manager. See “Exporting
Certificates” on page 209
d Delete the expired Manager’s certificate from the Console’s and Web’s NSS DB.
e Generate a new keypair in the Web’s nssdb which effectively generates a new
certificate on the Web. See “Generating a Key Pair in a Component’s NSS DB” on
page 207
f Import the Manager’s new certificate into the Console’s and Web’s NSS DB. See
“Importing a Certificate into the NSS DB” on page 210
After adding the CRL file, it takes about a minute for the Manager to get updated.
When configured to use Suite B mode, ESM supports Suite B Transitional profile. There are
2 level of security defined in Suite B mode:
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
Suite B 128-bit security level, providing protection from classified up to secret
information
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
Suite B 192-bit security level, providing protection from classified up to top secret
information
The Manager’s key pair and certificate get generated and stored in its nssdb. The
Manager’s public key is embedded in its certificate, thereby linking the Manager’s identity
to its public key.
If you want to set the expiry date of the certificate, you have to do so when
generating the key pair. Once you have generated the key pair, you cannot change
the expiry date on the certificate.
• Make sure to use “mykey” (without quotes) as the alias name for
the key pair as shown in the example.
• The -m serial number should be unique within nssdb
• The hostname is the short name or fully qualified domain name
depending upon how your Manager name was set up when you
installed the Manager.
• Using -v to set the validity period of your certificate is optional. If
you do not use this option, the certificate is valid for 3 months by
default. If you choose to use it, see “Setting the Expiration Date of
a Certificate” on page 215 section in the Administrator’s Guide for
details.
• The -q defines the PQG value with which an ECDSA certificate is
generated.
Entered the password, when prompted. The default is described in “NSS database
password” on page 37.
Enter random keyboard strokes when prompted to generate the random seed
used to generate your key.
This generates a key pair and certificate with the alias mykey which is valid for 6
months from the current date and time in the Manager’s nssdb.
b To check whether the key pair has been successfully created in the nssdb, run
the following from the Manager’s <ARCSIGHT_HOME>/bin directory:
./arcsight runcertutil -L -d
<ARCSIGHT_HOME>/config/jetty/nssdb
The -o specifies the absolute path to where you want to place the
exported Manager’s certificate. If you do not specify the absolute path
the file is exported to your <ARCSIGHT_HOME> directory by default.
For the -t option, be sure to use CT,C,C permissions flags only and in the same order that
it is shown above.
To convert an existing default mode installation to FIPS mode, on each component, you
have to migrate the existing certificates and key pairs from the component’s cacerts and
keystore to the component’s NSSDB. The following sub-sections provide you step-by-step
instructions on how to do so for each component.
Manager
To convert an existing Manager from default mode to FIPS mode:
2 Stop the Manager if it is running. in the command prompt window for the running
manager, click CTR-C to initiate shutdown. When it asks “Terminate batch job (Y/N)?”
click Y.
a Start the keytoolgui by running the following from the Manager’s /bin directory:
./arcsight keytoolgui
c When prompted, enter the password that you set for the keystore. For the
default, see “Keystore password” on page 37.
e Select Private Key and Certificates radio button and click OK.
f Enter the password for the key pair when prompted and click OK.
g Enter the new password for the keypair being exported and click OK.
h Navigate to the location on your machine to where you want to export the key
pair.
i Enter mykey.pfx as the name for the key pair (make sure to use a .pfx
extension) in the Filename textbox and click Export.
4 Export the Manager’s certificate from the Manager’s truststore located in the
Manager’s /jre/lib/security/cacerts using the keytoolgui.
a Start the keytoolgui by running the following from the Manager’s /bin directory if
it is not already running:
./arcsight keytoolgui
c Enter a password that you had set for the keystore when prompted. For the
default, see “Keystore password” on page 37.
d Right-click the Manager’s certificate and select Export. If the Manager uses a CA-
signed certificate, export the CA’s root certificate instead.
f Navigate to the location on your machine to where you want to export the
certificate.
g Enter a name for the certificate with a .cer extension in the Filename textbox and
click Export.
5 Import the Manager’s key pair that you had exported in Step 3 on page 219 into the
Manager’s nssdb. To do so, run the following command from the Manager’s bin
directory:
Enter the password for the Manager’s nssdb when prompted. The default is described
in “NSS database password” on page 37.
Enter the password for the .pfx key pair file that you are importing. This is the
password that you set in substep g, of Step 3, in this procedure.
6 Run the following command from your Manager’s bin directory to verify that the key
pair is imported correctly. The alias of the key pair imported in the nssdb is mykey.
7 Run the Manager setup program from the Manager’s /bin directory:
./arcsight managersetup
8 Import the Manager’s certificate that you had exported in Step 4 on page 219 into the
Manager’s /config/jetty/nssdb. Run the following command from the
Manager’s bin directory to import the certificate into the Manager’s nssdb:
For the -t option, be sure to use CT,C,C protocols only and in the same
order that it is shown above.
10 Follow the prompts in the next few screens until the wizard informs you that you have
successfully configured the Manager. Refer to the chapter, “Installing ArcSight
Manager” on page 83 if you need more information on any wizard screen.
12 If you had upgraded your Manager from v4.0 SP1 or earlier version, you will also be
required to reset all user passwords by running the following command from the
Manager’s /bin directory:
ArcSight Console
For ArcSight Console on 64-bit Linux 6.1, install the 32-bit zlib package to make sure that
you do not encounter errors when enabling and disabline FIPS mode using runmodutil.
To convert an existing ArcSight Console from default mode to FIPS mode, migrate the
Manager’s certificates from the Console’s
<ARCSIGHT_HOME>\current\jre\lib\security\cacerts into the Console’s
nssdb.client as described in the procedure below:
2 Export the existing Manager certificate. To export the Manager’s certificate, run the
following command from the Manager’s <ARCSIGHT_HOME>/bin directory:
If you do not specify the -o absolute path option, the file is exported to
your <ARCSIGHT_HOME> directory by default.
4 If you have client-side authentication configured, export the Console’s key pair and
certificate from the Console’s
<ARCSIGHT_HOME>\current\config\keystore.client> using keytoolgui.
Make sure to export the key pair in .pfx format.
./arcsight keytoolgui
c When prompted, enter the password that you set for the keystore. For the default
password, see “Keystore password” on page 37.
e Select Private Key and Certificates radio button and click OK.
f Enter the password for the key pair when prompted and click OK. The default
should be the same as the keystore.
g Navigate to the location on your machine to where you want to export the key
pair.
h Enter mykey.pfx as the name for the key pair (make sure to use a .pfx
extension) in the Filename textbox and click Export.
5 Import the key pair you just exported into the Console by running the following
command fron the ArcSight Console’s \bin directory:
6 Run the Console’s setup program by running the following from the Console’s \bin
directory:
arcsight consolesetup
9 It asks you to confirm that you have configured the NSS DB. Click Yes. You see
another message telling you that you cannot convert back to default mode. Click Yes.
10 Follow the prompts in the next few screens until the wizard informs you that you have
successfully configured the Console. Refer to the ESM Installation and Configuration
Guide, if you need more information on the wizard for installing the ArcSight Console.
When you start the Console, you should see a message in the /logs/console.log
file telling you that the Console has started in FIPS mode.
11 Set your browser to use FIPS. See “Configure Your Browser for FIPS” on page 224.
ArcSight Web
To convert an existing ArcSight Web running in default mode to run in FIPS mode, you
have to migrate ArcSight Web’s key pair, certificate, and the Manager’s certificate from
ArcSight Web’s keystore and truststore into its webnssdb as described in the procedure
below. ArcSight Web’s certificates and key pairs are stored in the webkeystore while the
Manager’s certificates are stored in ArcSight Web’s cacerts.
1 Stop ArcSight Web if it is running. Use this comand run as user arcsight:
a Start the keytoolgui by running the following from ArcSight Web’s //bin
directory:
./arcsight keytoolgui
c When prompted, enter the password that you set for the keystore. IFor the
default password, see “Keystore password” on page 37.
e Select Private Key and Certificates radio button and click OK.
f Enter the password for the key pair when prompted and click OK
g Navigate to the location on your machine to where you want to export the key
pair.
h Enter mykey.pfx as the name for the key pair (make sure to use a .pfx
extension) in the Filename textbox and click Export.
3 Export the Manager’s certificate from the Manager’s truststore located in the
Manager’s <ARCSIGHT_HOME>manager/jre/lib/security/cacerts using the
keytoolgui.
a Start the keytoolgui by running the following from the Manager’s /bin directory if
it is not already running:
./arcsight keytoolgui
c Enter a password that you had set for the keystore when prompted. For the
default password, see “Keystore password” on page 37.
d Right-click the Manager’s certificate and select Export. If the Manager uses a CA-
signed certificate, export the CA’s root certificate instead.
f Navigate to the location on your machine to where you want to export the
certificate.
g Enter a name for the certificate with a .cer extension in the Filename textbox and
click Export.
4 Import ArcSight Web’s key pair which you exported in Step 2 into its
<ARCSIGHT_HOME>/config/jetty/webnssdb by running the following
command from its /bin directory:
arcsight runcertutil -L -d
<ARCSIGHT_HOME>/config/jetty/webnssdb
This command lists the contents of the webnssdb. Make sure that mykey is listed in
the output.
6 Import the Manager’s certificate which you exported in Step 3a into its
/config/jetty/webnssdb by running the following command from its /bin
directory:
For the -t option, be sure to use CT,C,C permissions flags only and in the
same order that it is shown above.
7 Run ArcSight Web’s setup program by running the following from ArcSight Web’s \bin
directory:
./arcsight webserversetup
9 Follow the prompts in the next few screens until the wizard informs you that you have
successfully configured ArcSight Web.
6 Click the Security Devices button to open the Device Manager dialog where you will
enable FIPS in Firefox’s NSS internal PKCS #11 module.
9 Select NSS Internal PKCS #11 Module and click Enable FIPS button.
10 Click OK to close the Device Manager window and click OK to close the Preferences
window.
11 You must disable all non-FIPS TLS cipher suites. In the location box of the Firefox
browser, enter about:config and press Enter.
12 In the message that follows, click the I’ll be careful, I promise button.
14 Compare the true/false value for each preference listed on the page that follows with
the preference Value in the screenshot below and make sure that the true/false value
match the ones shown in the screenshot below. If any preference value does not
match, double click its value to toggle it.
c Quit the browser and restart it; then connect to the webserver.
Partition Archiver
To convert an existing Partition Archiver running in default mode to run in FIPS mode, you
must import the Manager’s certificate and in case the Manager uses a CA-signed certificate,
the root certificate of the CA into the Partition Archiver’s nssdb.client. To do so:
1 Export the Manager's certificate by running the following command from the
Manager's <ARCSIGHT_HOME>/bin directory:
In case, the Manager uses a CA-signed certificate, make sure to export the CA's root
certificate from the Manager.
2 Import Manager's certificate (and the CA's root certificate in case of CA-signed
certificate) into the Database's usr/agent/nssdb.client by running the following
command from the Database's bin directory:
./arcsight agentsetup
and follow the prompts on the screen to set up Partition Archiver in FIPS mode. Be
sure to select the FIPS mode option when prompted for the mode in which to install.
Symbols C
#if statement 192 CA-signed certificate 46, 51
import 53
obtaining 52
A certificate
access control list (ACL) 102 certificate authority 199
ACLReportGen command 116 expiration 215
Active Directory, setting up authentication for 102 export 209
actors import 210
configuring 90 in FIPS 199
agent logfu command 116 migrating type-to-type 72
agent tempca command 117 revocation list (CRL) 216
agentcommand command 117 self-signed vs. CA-signed 46
agentsvc command 118 signing request 199
agenttempca command 118 view contents 209, 215
agentup command 118 changepassword command 129
anti-virus scan impact 13 character set in passwords 77
arcdbutil command 118 checklist command 129
arcdt command 119 Cipher suite
archive default mode 37
task syntax 125 cipher suites 37
archive command 120 client keystore 105
archivefilter command 126 command help 198
archivewizard command 127 commands
ArcSight Console ACLReportGen 116
adjust memory 23 agent logfu 116
FIPS setup 207 agent tempca 117
session timeout 76 agentcommand 117
ArcSight Express Appliance agentsvc 118
configuring 95 agenttempca 118
ArcSight Web agentup 118
session timeout 76 arcdbutil 118
authentication 101 arcdt 119
Active Directory 102 archive 120
built-in 102 archivefilter 126
client-side 212 archivewizard 127
custom JAAS plug-in configuration 104 bleep 128
external 101 bleepsetup 128
LDAP 104 changepassword 129
password-based 102 checklist 129
PKCS#11 101 console 129
RADIUS 102 consolesetup 130
server-side 212 database pc 130
SSL client-only 105 database pm 131
using certificates 74 database xts 132
databasesetup 132
dbcheck 132
B dbview-generator 133
bleep command 128 deploylicense 133
bleepsetup command 128
downloadcertificate 133
built-in authentication 102
dropslpartitions 134
J P
JAAS plug-in authentication 104 package command 144
partitions
compression speed 110
K logs 111
key pair, importing 211 password-based authentication 102
keytool command 138 passwords
detailed usage 43 and character sets 77
keytoolgui command 138 check with regular expressions 78
in SSL configuration 38 guidelines 76
kickbleep command 138 obfuscation 198
set expiration 79
PKCS#11 authentication 101
L port, Manager, changing 75
LDAP
portinfo
setting up authentication for 104 command 145
license
properties file
file import 24
change dynamically for Manager 21
listsubjectdns command 139 editing 18
logfu
format 17
command 139
secure 22
data attributes 188
Example 186
example 124 Q
intervals 189 querytuner command 146
menu 188
login
custom message 14 R
restricting failures 79 RADIUS
logs setting up authentication for 102
gathering 26 reenableuser command 147
refcheck command 148
regex command 148
M replayfilegen command 148
Manager resetpwd command 149
change ports 75 resources
change properties dynamically 21 import from archive 125
decoupled process execution 10 resvalidate command 149
FIPS setup 199 revocation list, certificate 216
Password Configuration 76 ruledesc command 150
reconfigure 75 runcertutil 198
reconnect 10 runcertutil command 150
remove service on Windows 12 runmodutil command 152
manager command 140 runpk12util command 152
managerinventory command 140
manager-no-wrapper command 140
manager-reload-config command 141 S
managersetup command 141 script command 153
managerstop command 142 searchindex command 153
managersvc command 142 self-signed certificate 46
managerthreaddump command 142 send logs
managerup command 142 utility 26
memory, adjust 23 sendlogs
monitor command 143 command 154
SmartConnectors
event compression 84
N start 11
netio command 143 SNMP trap, send events as 87
Network Security Services (NSS) 198 SSL
notification velocity templates 191 client-only authentication 105
configuring 103, 104
SSL authentication
O CA-signed certificate 51
Oracle
certificate 45
password reset 109 configuration tools 38