Mcafee Enterprise Security Manager 11.1.x Product Guide 7-6-2022
Mcafee Enterprise Security Manager 11.1.x Product Guide 7-6-2022
Product overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Key features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
How it works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
What to do first. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Identify initial settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Request credentials for rule updates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Check for rule updates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Personalize your McAfee ESM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Apply predefined content packs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Collecting data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
How data collection works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Define data collection settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Configure event forwarding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Set up event forwarding filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Event forwarding formats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Forwarding events with Standard Event Format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Get events and flows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
How aggregation works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Change event or flow aggregation settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Add exceptions to event aggregation settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Change aggregation settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
View event aggregation exceptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Enriching data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
How data enrichment works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Configure data enrichment sources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Enrich Hadoop HBase events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Enrich events with Hadoop Pig. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Enrich Windows events with Active Directory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Normalizing data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
How normalization works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Create string normalization files to import. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Manage string normalization files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Parsing data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
How advanced syslog parser works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Mapping syslog severity and action. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Syslog relay support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
How Advanced Syslog Parser (ASP) rules work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Add custom Advanced Syslog Parser rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Define order for ASP and filter rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Add time formats to Advanced Syslog Parser (ASP) rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Import log samples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Correlating data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
How correlation works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Add risk correlation score. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Add a risk correlation manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Add a correlation manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Select the data type for correlation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
How historical correlation works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Enable historical correlation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
View historical correlation events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
How correlation rules work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
How correlation data sources work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Set up correlation rules to compare event fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Configure custom correlation rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Override correlation rule component. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Conflicts when importing correlation rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Add parameters to a correlation rule or component. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Identify what triggered correlation rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
View source events for correlation event. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Finding threats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
How the dashboard works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Description of view components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Open dashboard views. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Bind dashboard widgets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Add custom dashboard views. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Configure McAfee ESM views. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
View event time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
View session details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Look around events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
View IP address event details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Flow views. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
How filters work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
How string filters work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Fields that support contains and regex. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Filter dashboard views. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Filter by normalized IDs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Filter by Compliance ID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Filter views. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
View streaming events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
View IP address event details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
How custom types work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Create custom types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
How queries work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Manage queries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
How comparing values works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Compare graph values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Set up stacked distribution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
How log search works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Search log data quickly. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Perform an enhanced event log search. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Define log search jobs and integrity checks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Using regex to query ELM data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Use SFTP to retrieve logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
How McAfee Active Response searches work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Search using McAfee Active Response. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
View McAfee Active Response search results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Add McAfee Active Response data enrichment sources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
How cyber threat works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Access threat details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Set up cyber threat feed for domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Set up cyber threat management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
IOC STIX XML file upload errors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Product overview
Overview
As the foundation of the McAfee Security Information Event Management (SIEM) solution, McAfee® Enterprise Security Manager
(McAfee ESM) gives you real-time visibility to all activity on your systems, networks, database, and applications.
• McAfee® Event Receiver — Collects, parses, and normalizes large amounts of raw security data (required).
• McAfee Data Streaming Bus — Facilitates device interconnection and provides a streaming data platform for external
integrations (required for distributed McAfee ESM and data sharing with 3rd-party applications).
• McAfee® Enterprise Log Manager — Stores raw logs for compliance purposes (recommended).
• McAfee Enterprise Log Search — Searches raw logs quickly for forensic purposes (optional).
• McAfee® Advanced Correlation Engine (McAfee® ACE) — Correlates parsed data to identify trends and suspicious activity
(recommended).
• McAfee® Application Data Monitor — Monitors unencrypted Layer 7 session data to identify suspicious activity at the
application and protocol level (optional).
• McAfee® Database Event Monitor — Monitors and tracks database transactions to identify suspicious activity happening
in the database communication on the network (optional).
Key features
McAfee ESM delivers performance, actionable intelligence, and solution integration at the speed and scale required for security
organizations. You can quickly prioritize, investigate, and respond to hidden threats and meet compliance requirements.
How it works
Evolving security challenges require open, collaborative approaches to detect threats, reduce risk, and ensure compliance.
McAfee® Enterprise Security Manager (McAfee ESM) integrates with other McAfee products to resolve threats quickly without
overloading resources.
What to do first
Identify initial settings
The first time you log on to McAfee ESM, you can identify initial settings that affect how McAfee ESM works for you and your
organization (such as whether to enable FIPS mode).
Task
1. Open a web browser on your client computer and go to the IP address that you set when you configured the network
interface.
2. Type the default user name and password, then select the system language.
3. Click Log on and read the End User License Agreement. Then click Accept.
4. Change your user name and password, then click OK.
Note
When using IPMI, do not use these special characters in your password: `~!@#$%^&*()[]\{}|;':"<>
Important
Enable FIPS mode ONLY when required because once enabled, you CANNOT undo it.
If FIPS mode is required, enable it the first time you log on to the system so that future operations with McAfee devices
are in FIPS mode.
6. Follow the instructions to get your user name and password, which are needed for access to rule updates.
7. Perform initial McAfee ESM configuration:
a. Select the language to be used for system logs.
b. Select the time zone where this is and the date format to be used with this account, then click Next.
c. Define the settings using the ESM Configuration wizard pages.
8. Click OK.
9. When you complete your work session, log off using one of these methods:
• If no pages are open, click Sign out from the drop-down list in the top-right corner of the page.
• If pages are open, close the browser.
Task
• McAfee grant ID
• Account name
• Address
• Contact name
• Contact email address
2. When you receive your customer ID and password from McAfee, do one of the following:
• From the dashboard, click and select System Properties | System Information | Rules Update.
• From the system navigation tree, click and select System Information | Rules Update.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Rules Update.
4. Select one of these options:
• Auto check interval to set up the system to check for updates automatically with the frequency you select.
• Check Now to check for updates now.
• Manual Update to update the rules from a local file.
5. Click OK.
Task
1. From the dashboard, click and select System Properties → Custom Settings.
• To add custom text (such as company security policies) to your logon screen, enter text in the box at the top of the
page and select the Include text on login screen checkbox.
Note
• Select whether to refresh the System Tree automatically (every five minutes) and whether to refresh the System
Tree on update.
• To change URL links for any system devices, click Device Links.
• To configure Remedy email server settings, click Remedy.
• To set the starting month for quarterly reports and views, select the month from the drop-down list.
2. From the dashboard, click and select System Properties | ESM Management. Click System Locale and specify the
language for event logs, such as the health monitor log and device log.
3. On the McAfee ESM console, click Options → Views. Change the default view to any predefined or custom McAfee ESM
view.
4. From the dashboard, click and select System Properties | Login Security. Define how long current McAfee ESM
sessions remain open without activity .In UI Timeout Value, select the number of minutes that must pass without activity,
then click OK.
Note
5. Define how to organize devices on your system navigation tree by using custom display types.
Note
If the device is part of a display tree, the system creates a duplicate device node. You can then delete the duplicate
on the System Tree.
d. If you delete an existing group (by clicking ), the system deletes the group and devices from the custom display but
not from the system.
• System Management
• User Administration
Caution
If you have customized content pack elements, the update process might overwrite the customized elements.
Task
1. Go to the McAfee Connect Catalog. Browse the available content packs and download the one you want.
3. On the system navigation tree, select McAfee ESM, then click the Properties icon .
4. Click Content Packs.
5. Click Browse.
6. Browse the list and select the content pack you want.
Note
Clicking a name or description shows the details for that content pack. Clicking the checkbox selects the content pack
for installation.
7. Click Install.
8. Complete any post-installation steps listed in the details of the content pack.
When in FIPS mode, McAfee ESM includes User, Power User, Key & Certificate Admin, and Audit Admin. When not in FIPS
mode, McAfee ESM includes System Administrator and General User.
• Users — Names of users, the number of sessions that each user has open currently, and the groups to which they
belong.
• Groups — Names of groups and the permission assigned to each group.
Note
Group Permissions
When you set up groups, set permissions that apply to all members of the group.
If you Limit access of this group on the Privileges page of Add Group (System Properties → Add Group ), access to these
features is limited.
• Actions toolbar — Users can't access device management, multi-device management, or Event Streaming Viewer.
• Alarms — The users in the group have no access to alarm management recipients, files, or templates. They can't create,
edit, remove, enable, or disable alarms.
• Asset Manager and Policy Editor — Users can't access these features.
• Case Management — Users can access all features except Organization.
• ELM — Users can perform enhanced McAfee Enterprise Log Manager searches but can't save them or access McAfee
Enterprise Log Manager device properties.
• Filters — Users can't access String Normalization, Active Directory, Assets, Asset Groups, or Tags filter tabs.
• Reports — Users can only run a report that emails the output to them.
• System Properties — Users can access only Reports and Watchlists.
• Watchlists — Users can't add a dynamic watchlist.
• Zones — Users can view only zones they have access to in their list of zones.
Add users
Add users to the system so that they can access McAfee ESM, its devices, policies, and associated permission. Once added, you
can edit or remove user settings.
Task
1. On the system navigation tree, select System Properties → Users and Groups.
2. Enter your password, then click OK.
3. In the Users section, click Add.
4. Enter a user name. If you are using Common Access Card (CAC) credentials, enter the user's 10-digit EDI-PI as a user name.
5. (Optional) Enter an alias if you do not want the user name to be visible. If you are using CAC credentials, this can be the user
name.
6. Enter a unique password for the account, and confirm it, then click OK.
7. (FIPS mode only) Select a role for this user; options include:
• User — You cannot add users to a group with Power User permission.
• Power User — These users are system administrators for all Unified Capabilities Approved Products List (UCAPL)
purposes, but they might not have all system administration permissions.
Note
Any users assigned to groups with the following permissions must have the Power User role (required).
• System Management
• User Administration
• Policy Administration
• Add/Delete Policies
• Custom Rules and Variables
• Global Blacklisting
• Key & Certificate Admin — This role is required to perform any key management functions. A user with this role
can't be added to a group with Power User permission.
• Audit Admin — This role is required to configure the logs. A user with this role can't be added to a group with
Power User permission.
8. (not in FIPS mode) Select if you want the user to have administrator permission. The system administrator can grant
permission to general users by creating access groups and assigning users to these groups. The system administrator is the
only user who has access to all areas of the system, including the users and groups area.
9. Disable users you want to block from accessing their McAfee ESM account.
10. Add the user's text message (SMS) address and email address (optional unless the user receives report or alarm
notifications.
11. Identify groups in which the user is a member. The user inherits the group's permission.
12. Click OK, then type your password again.
Results
Task
3. Select Views and select default views for the specific user:
• Choose to refresh views automatically and indicate how often to refresh the view.
Note
Setting the minimum refresh time to less than 10 minutes for multiple users can impact McAfee ESM performance.
• Select the default system view, Event Summarize view, and Flow Summarize view.
Task
1. On the system navigation tree, select System Properties → Users and Groups.
2. In the Users table, highlight the user name, then click Edit.
3. Select or deselect Disable account, then click OK.
Results
The icon next to the user name on Users and Groups reflects the status of the account.
Task
• If the Not Required status appears, the device is set up for global user authentication.
• If the No Credentials status appears, the device is set up to require individual user authentication.
• To change the user authentication setting, go to the McAfee ePO device Properties, click Connect, and change the
setting in the Require User Authentication field.
Task
Note
1. User permissions take precedence over group permissions. For example, if a user has only Read access to resources,
but their group has Modify access, the user can only Read selected items.
On the system navigation tree, click System Properties → Users and Groups, then type your password.
2. Select group permissions. Only the item's creator can change permissions for read-only custom items.
• (Views only) - Users in the group inherit settings from the parent folder (default).
• (Reports and watchlists only) - Users in the group inherit change settings (default).
• Indicate the group's access settings:Read only, Modify, or neither. If you don't select Read only or Modify, the
group has deny rights. If you select Modify, the system selects Read only automatically.
Note
A pseudo group called Default appears for master or administrative users. Groups created in the future get this
privilege.
• Indicate individual user access settings: Read only, Modify, or neither. If you don't select Read only or Modify, the
user has deny rights. If you select Modify, the system selects Read only automatically.
Important
User settings take precedence over group settings. For example, if a user has only Read access to resources, but
their group has Modify access, the user can only Read selected items.
• If a user is not on the group list, the system uses the group settings for that user.
• If a user is on the group list but doesn't have Read or Modify checked, that user has explicit deny rights to
that resource.
Note
If an event forwarding destination does not belong to an access group, it has access to all devices.
• Limit when this group can access McAfee ESM. Users receive visual notification that their session is going to time
out 15, 5, and 1 minute before the time expires.
• Select the reports, views, and watchlists this group can view, change, or share with other users and groups. You can
also set the filters the group can view and change.
Note
If you select more than one view, watchlist, or report, a checkbox in the Read or Modify column indicates a conflict. You
can't save and close the page until you resolve the conflict. To resolve the setting for all selected items, click the
checkbox.
Task
1. On the system navigation tree, select the system, then click the Properties icon .
2. Click Users and Groups, then type the system password.
3. Add users to existing groups or create a group.
4. Click Privileges, then select Limit access of this group.
Most permissions are disabled.
5. Specify the group's permissions.
6. Click each tab and define the rest of the settings for the group.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click Login Security.
3. On the Standard tab, set the options:
• Specify how many consecutive unsuccessful logons are allowed in a single session. A zero value (0) allows unlimited
logon attempts.
When the number of allowed failed attempts is reached in a specific period, the system locks the targeted account.
The system administrator must unlock the account.
Attention
• Specify the time period to allow for successive failed logon attempts, between zero (0) and 1440 minutes.
When the number of allowed failed attempts is reached in a specific period, the system locks the targeted account.
The account remains locked for the time you set or until the system administrator unlocks the account.
• Specify the period to lock an account if it auto-locks due to failed logons. Maximum value is 1440 minutes; 0 means
you cannot auto-unlock. After that time elapses, the system unlocks the account automatically. This setting does not
affect accounts that have been locked manually. Administrators can unlock the account at any time.
Note
The system always auto-unlocks the master user logon. If you set this period to zero (0), the system temporarily
locks the master user logon for five (5) minutes.
• Specify the period that must pass without activity before the logon screen appears. A value of zero (0) means there
is no limit.
• Specify how many days of inactivity can pass before the system locks the account, between zero (0) and 365 days.
Entering zero disables the feature. The lockout lasts until an administrator unlocks the account.
• Set the number of active sessions a single user can have open at one time. Maximum is 10; zero (0) disables the
restriction.
• Select whether to populate the user name field with the last successful user logon.
• Select if you want to set up a list of allowed or blocked IP addresses that can access your system.
4. Click OK or Apply.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click Login Security.
3. On the Passwords tab, set the options:
• 15 characters long
• 2 numbers
• 2 punctuation marks or symbols
• 2 lowercase letters
• 2 uppercase letters
• Cannot include 4 or more consecutive repeating characters
• Specify how often users must change their passwords (0–365 days). If you enter zero (0), the password doesn't
expire.
• Select how many days before passwords expire to remind users to change passwords (30-1).
• Select how long after a user's password expires a user can still log on before the system locks the account. Then,
only an administrator can unlock the account.
• Select how many times a user can log on in the specified grace period before the system locks the account. Then,
only an administrator can unlock the account.
• Designate whether to store password history and how many user passwords to store (between 0–100 passwords).
The system checks existing password history when users change passwords.
• If set to zero (0), the system does not store password history.
• If the password is not unique, an error appears and the system does not update the password.
• If the password is unique, the system changes it and adds a history entry.
• If the storage limit is reached, the system deletes the oldest password.
• Restrict how often users can change their passwords in a given period. For example, if you select 12, users cannot
change their passwords more than once in 12 hours.
Note
If you must comply with FIPS regulations, do NOT use this RADIUS authentication. RADIUS is not FIPS-compliant.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click Login Security.
3. Select the RADIUS tab, then specify characteristics for your RADIUS server: IP address, server port, and shared secret (such
as password). A secondary server is optional. Then click OK or Apply.
Note
When you enable the RADIUS server, all users except the system administrator authenticate with the RADIUS server. If
you disable authentication, users set up for RADIUS authentication cannot access McAfee ESM.
ActivClient is the only supported CAC middleware on Windows. To use CAC authentication on McAfee ESM from Windows using
Internet Explorer, you must install ActivClient on the client computer. Once installed, the system uses ActivClient to manage CAC
credentials instead of the native Smart Card manager in Windows. Work with your system administrator to ensure that
ActivClient has been installed in your environment.
When relying on CAC validation for application authenticity, the system security depends on the security of the Certificate
Authority (CA). If the CA is compromised, CAC-enabled logons are also compromised. To set up CAC logon, upload the CA root
certificates, enable CAC logon, and enable a CAC user by setting the user name to the card holder's Fully Qualified Distinguished
Name (FQDN). Card holders can then access McAfee ESM in CAC-enabled browsers without being prompted for a user name or
password.
Note
McAfee ESM supports Gem alto and the Oberthur ID One card readers.
Task
3. On the system navigation tree, select McAfee ESM, then click the Properties icon .
4. Click Login Security, then select the CAC tab.
5. Select the CAC mode:
• OFF — This is the default setting. CAC logon is disabled so users have to log on using the McAfee ESM logon prompt
• OPTIONAL — CAC authentication is available, but if the user does not provide a certificate, the McAfee ESM logon
prompt appears as if CAC mode were off.
• REQUIRED — Only CAC-enabled logons can access the system. The logon prompt is never shown. Enter a security
PIN in Required Mode Security PIN (IPv4) (PIN entered on LCD panel to switch CAC mode to OPTIONAL if users are
locked out of the system). The LCD panel recognizes PIN in IPv4 format (10.0.0.0).
Note
Certificates and certificate authorities expire, so REQUIRED mode could potentially lock all users out of the McAfee ESM.
A fail-safe button is on the LCD panel on the front of the McAfee ESM, which switches CAC mode back to OPTIONAL.
6. Upload the CA root certificates chain. You can view the certificate file or download it to a location you select.
7. Certificate revocation lists (CRL) identify which revoked certificates. Manually upload a .zip file with CRL files. Upload the list
of certificates that have been revoked or download them to a location you select.
8. Set up an automatic retrieval schedule by typing the URL address and the frequency with which McAfee ESM polls for
revocation file updates.
9. Enable each CAC user.
a. On System Properties, click Users and Groups, then enter the system password.
b. In the Users table, highlight the name of the user, then click Edit.
c. Replace the name in the Username field with the FQDN.
d. (Optional) Enter the user name in the User Alias field.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click Login Security.
3. Click the Active Directory tab, then select Enable Active Directory Authentication.
4. Click Add to set up the Active Directory connection. Then, click OK.
5. Select if you want to use this domain as the default. Type the domain name.
Note
When logging on to the system, use this domain name as the user name. If you log on using your user name, the system
uses the domain designated as the default.
• Select if this is the address for the administration server. If not, deselect it.
Note
One of the addresses you enter must identify the host where the administrator server runs.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click Login Security.
3. Click the LDAP tab.
4. Enable LDAP authentication.
Note
When enabled, all users, except the system administrator, must authenticate with the LDAP server. If LDAP is disabled,
users set up for LDAP authentication can't access the system.
Collecting data
How data collection works
McAfee Event Receivers enable you to collect and normalize event and flow data into a single manageable view across multiple
vendors.
Events and flows have source and destination IP addresses, ports, Media Access Control (MAC) addresses, a protocol, and a first
and last time.
• Because flows do not indicate anomalous or malicious traffic, they are more common than events.
• Events are associated with rule signature (SigID); flows are not.
• Flows are not associated with event actions, such as alerts, drops, and rejects.
• Flows have unique data, such as source and destination bytes, and source and destination packets.
Note
Source bytes and packets indicate the number of bytes and packets transmitted by the source of the flow. Destination
bytes and packets indicate the number of bytes and packets transmitted by the destination of the flow.
• Flows have direction: Inbound flows originate from outside of the HOME_NET. Outbound flows originate from inside the
HOME_NET.
Use dashboard views to see events and flows generated by the system. Logs are listed on the System Log or Device Log
accessed from the Properties page for the system or each device.
You can select to check for events, flows, and logs automatically or you can check for them manually. The rate at which you check
for them depends on your system's level of activity and how often you want to receive status updates. You can also specify which
devices check for each type of information and set inactivity threshold settings for devices managed by McAfee ESM.
Task
2. On the system navigation tree, select the device, then click the Properties icon .
• McAfee Application Data Monitor and McAfee Event Receiver devices collect events, flows, and logs.
• McAfee ACE and McAfee Database Event Monitor devices collect events and logs.
• McAfee Enterprise Log Manager and McAfee Enterprise Log Search devices collect logs.
Click Logs.
• If McAfee ESM automatically downloads rules from the rules server, select to roll out downloaded rules
automatically to the device.
• Select to check for events, flows, or logs automatically or check now by clicking Get.
• Schedule a daily time when McAfee ESM pulls data from each device and when each device sends data to the
McAfee Enterprise Log Manager. Schedule a time that avoids using the network at peak times, leaving the bandwidth
available for other applications.
Caution
Scheduling event, flow, and log data collection can result in data loss and delay data delivery.
• Choose to add events that match vulnerability assessment source data, become a vulnerability event, and generate
an alert on the local McAfee ESM. The Policy Editor properties are the same for each of these events and can't be
changed (for example, severity is always 100).
• See the last time the system retrieved the device's events or flows, whether the process was successful, and the
number of events or flows retrieved.
• See the date and time of the last event, string, or flow record retrieved. Changing this value allows you to set the
date and time from which you want to retrieve events, strings, or flows. For example, if you enter November 13, 20xx
at 10:30 a.m. in the Last Downloaded Event Record field, click Apply, then click Get Events, McAfee ESM retrieves
events on this device from that time to date.
• Define device inactivity thresholds so that the system notifies you when those devices don't receive events or flows
for the specified period. If the threshold you set is reached, a yellow health status flag appears next to the device node
on the system navigation tree.
• Define whether to store the geolocation and ASN data for each device. McAfee ESM collects source and destination
geolocation and ASN data to identify the physical locations of threats.
Note
Geolocation provides the geographic location of computers connected to the Internet. Autonomous System
Number (ASN) is a number assigned to an autonomous system that uniquely identifies each network on the
Internet.
Note
The number of event forwarding destinations in use, with the rate and number of events that McAfee ESM retrieves can
affect overall McAfee ESM performance.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Event Forwarding and configure the destination to forward event data to a syslog or SNMP server.
Choose between the UDP or TCP transport protocols. UDP is the protocol standard syslog is based on. Packets sent via
syslog over TCP are formatted exactly like their UDP counterparts including facility, severity, and message. The only
exception being a new line character (ASCII character code 10) appended to the end of the message.
Unlike UDP, which is a connectionless protocol, a TCP connection must be established between McAfee ESM and the
server listening for the forwarded events. If a connection can't be established or is dropped, McAfee ESM tracks the
last event successfully forwarded. Then tries to re-establish the connection. When re-established, McAfee ESM picks
up the forwarding event where it left off.
If you select UDP, you cannot select SSH or TLS in the Mode field.
• Select the time format for the header of syslog event forwarding. If you select Legacy, the format is GMT. If you
select Standard, you can select a time zone to use when sending event forwarding logs.
• If your policy copies a packet, select the Send Packet option to forward packet information (if available) at the end
of the syslog message in Base 64 encoding.
• Select the security mode for the message. If you select SSH, fill in the remaining information. If you choose to use
syslog over TCP (protocol), select to make the TCP connection using SSH or TLS. As syslog is an unencrypted protocol,
using SSH or TLS prevents other parties from examining event forwarding messages. If you are in FIPS mode, you can
forward log data using TLS.
• Type the local relay port to use on the McAfee ESM side of the SSH connection.
• Type the port that the SSH server listens to on the other side of the SSH connection.
• Type the SSH user name to establish the SSH connection.
• Type the public DSA authentication key which is used for SSH authentication and is added to the authorized_keys
file or equivalent on the system running the SSH server.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Event Forwarding.
4. Click Add, then click Event Filters.
5. Fill in the filter fields:
Format Contents
Syslog time (seconds since the epoch), status flag, user name, log category name (blank for 8.2.0, populated for
(Audit 8.3.0+), device group name, device name, log message.
Logs)
Syslog Current date and time, McAfee ESM IP address, CEF version 0, vendor = McAfee, product = McAfee ESM
(Common model from /etc/McAfee Nitro/ipsmodel, version = McAfee ESM version from /etc/buildstamp, sig id, sig
Event message, severity (0 to 10), name/value pairs, deviceTranslatedAddress
Format)
When setting up event forwarding with SEF from one McAfee ESM to another McAfee ESM, complete the following steps:
1. From the McAfee ESM that is forwarding the events, export data sources, custom types, and custom rules.
2. On the McAfee ESM with the receiver you are forwarding events to, import the data sources, custom types, and custom
rules that you exported.
3. On the McAfee ESM receiving the events from another McAfee ESM, add an McAfee ESM data source.
4. On the sending McAfee ESM, add the event forwarding destination as follows:
• On the system navigation tree, select McAfee ESM, then click the Properties icon .
• Click Event Forwarding, then click Add.
• On the Add Event Forwarding Destination page, select syslog (Standard Event Format) in the Format field, then
complete the remaining fields with the information for the McAfee ESM you are forwarding to, and click OK.
Using aggregation uses disk space on both the device and McAfee ESM more efficiently because it eliminates the need to store
each packet. This feature applies only to rules that have aggregation enabled in the Policy Editor.
For example, if the same event occurred 30 times in the first 10 minutes after noon:
• First time = 12:00 for the time of the event's first instance
• Last time = 12:10 for the time of the event's last instance
• Total = 30
You can change the default event or flow aggregation settings for the device as a whole. For events, you can add exceptions to
the device's settings for individual rules.
Aggregation retrieves records based on the events, flows, and logs retrieval setting. If it is set for automatic retrieval, the device
compresses a record only until the first time McAfee ESM pulls it. If it is set for manual retrieval, a record compresses up to 24
hours or until a new record is pulled manually, whichever comes first. If the compression time reaches the 24-hour limit, a new
record is pulled and compression begins on that new record.
You must have Policy Administrator and Device Management or Policy Administrator and Custom Rules permissions to
change these settings.
Note
Event aggregation is available only for ADM devices and receivers, and flow aggregation for receivers.
Task
2. On the system navigation tree, select the device, then click the Properties icon .
3. Click Event Aggregation or Flow Aggregation.
4. Define the settings, then click OK.
Task
1. On the views pane, select an event generated by the rule you want to add an exception for.
Important
The fields you select in Field 2 and Field 3 must be different types or an error results. When you select these field types,
the description for each aggregation level changes to reflect the selections you made. The time limits for each level
depend on the event aggregation setting you defined for the device.
Results
The Status column shows the status of the update as the changes are rolled out.
Task
1. In the Rule Types pane of the Policy Editor, select the type of rule.
2. Select the rule for which you want to change aggregation settings.
3. Click Operations on the toolbar and select Modify Aggregation Settings.
4. Select the field types you want to aggregate from the Field 2 and Field 3 drop-down lists.
Note
The fields you select must be different types or an error results. The descriptions for level 1, level 2, and level 3
aggregation changes based on your selections.
The Aggregation Exceptions Rollout page shows the status of the devices affected by this change. All devices that
are out of date are checked.
b. If needed, deselect the checkmark from the devices you do not want to apply the changes to.
c. Click OK to roll out the changes.
The Status column reflects the status of the update as the changes are rolled out.
Task
2. On the system navigation tree, select the device, then click the Properties icon .
3. Click Event Aggregation, then click View at the bottom of the screen.
4. Make the needed changes, then click Close.
Enriching data
How data enrichment works
Enrich events sent by the upstream data source with context not in the original event, such as an email address, phone number,
or host location information. This enriched data becomes part of the parsed event and is stored with the event just like the
original fields.
Set up data enrichment sources by defining how to connect to the database and access one or two table columns in that
database. Then define which devices receive the data and how to enrich that data, both events and flows.
You can also edit or remove data enrichment sources, and run a query. Events that trigger on McAfee ESM are not enriched. Data
acquisition takes place on McAfee ESM, not on the devices.
A connector to the relational data source in Hadoop HBase uses the key-value pairs from the source for enrichment. The identity
mapping in HBase can be pulled to a Receiver regularly to enrich events.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click Data Enrichment → Add.
Tabs and fields on the Data Enrichment Wizard vary based on the enrichment type you select.
3. On the Main tab, identify the source information.
4. Source tab:
• CIFS, NFS, FTP, SFTP, and SCP source types can only use external files for enrichment. The other source types require
you to write a query for a database or regular expression.
• Each entry must be on a separate line.
• The file you pull for data enrichment must be formatted as LookupValue=EnrichmentValue. Single-column
enrichment needs only lookup value entries. For two-column enrichment, separate lookup values from enrichment
values with an equals symbol (=).
10.5.2.3=New York
10.5.2.4=Houston
• Default authentication is None. If you select Basic, enter user name and password for the website if it requires you
to log on.
• For https websites, select Ignore Invalid Certificates to ignore invalid SSL certificates.
• Type the Apache Hadoop Job Tracker Host address or IP address (not required). If blank, the system uses the Node
Name Host.
• Type the port where the Job Tracker Host listens (not required). If blank, the system uses the Node Name Host.
• Default Method is GET. If you select POST, the post content or argument that might be required to navigate to the
webpage with the content that you want to search on.
• Select the directory for the files.
• Type the Apache Hadoop Node Name Host address or IP address. Do not include protocol.
• Type the port where the Node Name Host listens (not required). If blank, the system uses the Node Name Host.
• Type the database path. If you select FTP in the Type field, the path is relative to your home directory. To specify an
absolute path on the FTP server, insert an extra forward slash (/) at the beginning of the path. For example, //var/
local/path.
• Identify who can access the database. For LDAP, enter a fully qualified domain name with no spaces. For example,
uid=bob,ou=Users,dc=example,dc=com or [email protected].
5. Parsing tab:
• When you select HTTP/HTTPS as the source type, view the first 200 lines of the HTML source code for the URL
entered in the URL field on the Source tab. It is only a preview of the website, but is enough for you to write a regular
expression to match on.
A Run Now or scheduled update of the data enrichment source includes all matches from your regular expression
search. This feature supports RE2 syntax regular expressions, such as (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}).
• Typically, an Internet site has header code that you are not interested in searching. Specify how many lines from the
top of the site you want to skip so that the search doesn't include header data.
• Type what separates values you are interested in. This field has a default of \n, which indicates that a new line is the
delimiter. The other most common delimiter is a comma.
• Type a regular expression that removes any unwanted values from the results of your regular expression search.
• (Required) Type the logic used to find a match and extract the values from the site. The most common use cases are
to create an expression that matches on a list of known malicious IP addresses or MD5 sums listed on a site. If you
provided two match groups in your regular expression, you can map the results of each regex match to Lookup Value
or Enrichment Value.
• Use a Lookup Value or Enrichment Value.
• Use Lookup Value for events collected from McAfee ESM where you want to add more values. It maps to the
Lookup Field on the Destination tab.
• Use Enrichment Value for values that are enriched or inserted into the source events that match on the
lookup value. It maps to the Enrichment Field on the Destination tab.
6. On the Query tab, set up the query for Hadoop HBase (REST), Hive, LDAP, MSSQL, MySQL, Oracle, or PIG types.
7. On the Scoring tab, set the score for each value that is returned on a single column query. Select the source and target field
you want to score on, then click Run Query. Show the returned values and the numeric stepper that you can use to set the
risk score for that value.
8. On the Destination tab, identify the devices and the rule for field mapping for the devices that this data enrichment source
populates.
9. Click Finish, then click Write.
10. Select the devices you want to enrich and create the field-mapping rule for those devices. Then click OK.
Note
If you select Use Static Value, you must enter the enrichment value.
Task
1. On the system navigation tree, select System Properties, then click Data Enrichment.
2. On the Data Enrichment Wizard, fill in the fields on the Main tab, then click the Source tab.
3. In the Type field, select Hadoop HBase (REST), then type the host name, port, and name of the table.
4. On the Query tab, fill in the lookup column and query information:
a. Format Lookup Column as columnFamily:columnName
b. Populate the query with a scanner filter, where the values are Base64 encoded. For example:
<Scanner batch="1024">
<filter>
{
"type": "SingleColumnValueFilter",
"op": "EQUAL",
"family": " ZW1wbG95ZWVJbmZv",
"qualifier": "dXNlcm5hbWU=",
"latestVersion": true,
"comparator": {
"type": "BinaryComparator",
"value": "c2NhcGVnb2F0"
}
}
</filter>
</Scanner>
Task
3. On the Main tab, fill in the fields, then click the Source tab. In the Type field, select Hadoop Pig and fill in: Namenode host,
Namenode port, Jobtracker host, and Jobtracker port.
Note
Jobtracker information is not required. If Jobtracker information is blank, NodeName host and port are used as the
default.
4. On the Query tab, select the Basic mode and fill in the following information:
a. In Type, select text file and enter the file path in the Source field (for example, /user/default/file.csv). Or, select
Hive DB and enter an HCatalog table (for example, sample_07).
b. In Columns, indicate how to enrich the column data.
For example, if the text file contains employee information with columns for SSN, name, gender, address, and phone
number, enter the following text in the Columns field: emp_Name:2, emp_phone:5. For Hive DB, use the column names
in the HCatalog table.
c. In Filter, you can use any Apache Pig built-in expression to filter data. See Apache Pig documentation.
d. If you defined column values above, you can group and aggregate that column data. Source and Column information
is required. Other fields can be blank. Using aggregation functions require that you specify groups.
5. On the Query tab, select the Advanced mode and enter an Apache Pig script.
6. On the Scoring tab, set the score for each value returned from the single column query.
7. On the Destination tab, select the devices to which you want to apply enrichment.
Task
c. In Query, enter (objectClass=person) to return a list of all objects in Active Directory classified as a person.
d. Test the query, which returns a maximum of five values, regardless of the number of actual entries.
8. Click Next or the Destination tab.
a. Click Add.
b. Select your Microsoft Windows data source.
c. In the Lookup Field, select the Source User field.
This field is the value that exists in the event, which is used as the index for the lookup.
d. Select the Enrichment Field, where the enrichment value is written in the form User_Nickname or Contact_Name.
9. Click Finish to save.
10. After writing the enrichment settings to the devices, click Run Now to retrieve the enrichment values from the data source
until the Daily Trigger Time value occurs.
The Full Name is written into the Contact_name field.
Normalizing data
How normalization works
Rule names can vary by vendors, making it hard to gather event information. McAfee ESM continuously compiles a list of
normalized rule IDs that enable you to organize event information. Use normalized event IDs to view query results in pie charts,
bar charts, and lists or filter dashboard views.
Normalization IDs
Use normalized IDs to:
A mask (/5 for a first-level folder at the end of the ID) means McAfee ESM filters events by the selected subfolder IDs.
Note
String normalization
Use string normalization to:
For example, the John Doe user name string, define a string normalization file where the primary string is John Doe with the
following aliases:
• DoeJohn
• JDoe
• [email protected]
• JohnD
You can then create a query with John Doe as a user nickname and filter by string normalization.
The resulting view displays all events associated with John Doe and his aliases, enabling you to check for logon inconsistencies
where source IPs match but user names do not.
Task
Task
1. On the Filters pane, click the Launch string normalization manager icon .
2. Perform any of the available actions, then click Close.
Parsing data
How advanced syslog parser works
Advanced Syslog Parser (ASP) parses data from syslog messages based on user-defined rules. Define rules to instruct the ASP
how to recognize messages and where event data resides in the messages, such as Signature IDs, IP addresses, ports, user
names, and actions.
Use ASP for syslog devices not identified or when the source-specific pParser doesn't correctly interpret messages or fully
interpret data points related to received events. You can also use ASP to sort complex log sources, such as Linux and UNIX
servers. You must write rules tailored to your Linux or UNIX environment.
Add ASP data sources to the Receiver by selecting Syslog as the vendor. Once you have done this, follow the device
manufacturer's directions to configure your syslog device to send syslog data to the IP address for the Receiver.
When you add an ASP source, you must apply a policy before it collects event data. If you enable Generic Syslog Support, you
can apply a policy without rules and begin generically collecting event data.
Caution
Some data sources (including Linux and UNIX servers) can produce large amounts of non-uniform data that results in the
Receiver not properly grouping the similar event occurrence together. This results in an appearance of a large range of
different events when, in actuality, the same event is simply repeating, but with varying syslog data sent to the Receiver.
ACTION Protocol Src_ip Src_port -> Dst_ip Dst_port (keyword: option; keyword: option;...;)
Note
When concatenating literal values with a PCRE subcapture in versions 9.0.0 and later, put literals in quotes individually if they
contain spaces or other characters and leave the PCRE subcapture references unquoted.
Rule Header
The rule header contains the Alert action and the any any any format. The rule is:
Action
Option of what to do with the event when a match occurs:
Protocol If the event defines a protocol, filter the effective match based on the protocol.
Src/Dst IP If the event defines a source or destination IP address, filter the effective match based on
that address.
Src/Dst Port If the event defines a source or destination port, filter the effective match based on that
port.
Rule Body The rule body contains most the match criteria and defines how the data must be parsed
and logged into the database. Elements of the Rule Body are defined in keyword-option
pairs. Some keywords have no following option.
msg (Required) The message to associate with this rule. This is the string displayed in the
McAfee ESM Thin Client for reporting purposes unless overridden with a pcre/setparm
detected message (see below). The first work of the msg is the category name followed
by actual message (msg: "category rule message").
content (Optional — one or more) The content keyword is a non-wildcard text qualifier to pre-filter
Events as they pass through the rule set, which can also contain spaces (for example,
content: "search 1"; content "something else")
procname On many UNIX and Linux systems, the process name (and process ID) is part of a
standardized syslog message header. The procname keyword can be used to filter Event
matches for the Rule. Used to exclude or filter Event matches where two processes on a
Linux or UNIX server might have similar or the same message text.
adsid The data source ID to use. This value overrides the Default Rule Assignment in the data
source editor.
sid Signature ID of the Rule. This is the match ID used in the McAfee ESM Thin Client unless
overridden with a pcre/setparm detected sid.
severity Value between 1 (least severe) and 100 (most severe) assigned to events matching the
rule.
pcre The PCRE keyword is a Perl Compatible Regular Expression match against incoming
events. The PCRE is quote delimited and all occurrences of "/" is treated as a normal
character. Content in parentheses isheld for the use of the setparm keyword. You can
change the PCRE keyword by nocase, nomatch, raw and setparm keywords.
nocase Causes the PCRE content to be matched whether the case matches or not.
raw Compare the PCRE to the entire syslog message including header data (Facility, daemon,
date, host/IP, process name, and process ID). Normally the header is not used in the
PCRE match.
setparm Can occur more than once. Each set of parentheses in the PCRE is assigned a number in
order of occurrence. Those numbers can be assigned to data tags (for example:
setparm:username=1). This takes the captured text in the first set of parentheses and
assigns it to the user name data tag. Recognized tags are listed in the table below.
Tag Description
* msg This captured parameter overrides the matched rule's message or name.
* action This captured parameter indicates what action the third-party device took.
* protocol
* src_ip This replaces the syslog source's IP address which is the default source IP address of an event.
* src_port
Tag Description
* dst_ip
* dst_port
* src_mac
* dst_mac
* dst_mac
* genid This is used to change the sid as stored in the database, used for non-McAfee snort matches in snort
preprocessors.
* domain
* hostname
* application
* action map Allows you to map specific actions of your product to the McAfee actions. The action map is case
sensitive. Example: alert any any any -> any any (msg:"OpenSSH Accepted Password";
content:"Accepted password for "; action_map:Accepted=8, Blocked=3; pcre:"(Accepted)\s+password
\s+for\s+(\S+)\s+from\s+(\d+\.\d+\.\d+\.\d+)\s+port\s+(\d+)"; setparm:action=1; sid:31; rev:1;)). See
Severity and Action Map for details.
* severity map Allows you to map specific severities of your product to the McAfee severity. Like the action map, the
severity map is case sensitive. Example: alert any any any -> any any (msg:"OpenSSH Accepted
Tag Description
* var
This is another way to use setparms. The beneficial use is the use of creating one value from multiple
captures of multiple PCREs. You can create more than one PCRE that captures only a small portion of
your string rather than one large PCRE with multiple captures. Here's an example of capturing a user
name, domain, and creating an email address to store in the objectname field.
• Syntax = var:field=${PCRE:Capture}
• PCRE = not the actual PCRE but the number of the pcre. If your rule has two PCRE's, you would
have a PCRE of 1 or 2.
• Capture = not the actual capture but the number (first, second or third capture [1,2,3])
• Sample Message: A man named Jim works for McAfee.
• PCRE: (Jim).*?(McAfee)
• Rule: alert any any any -> any any (msg:"Var User Jim"; content:"Jim"; pcre:"(Jim)"; pcre:"(McAfee)";
var:src_username=${1:1}; var:domain=${2:1}; var:objectname=${1:1}@${2:1}.com raw;
classtype:unknown; adsid:190; sev:25; sid:610061000; rev:1; normID:1209008128; gensys:T;)
• Mapped Source User: Jim
• Mapped Domain: McAfee
• Mapped objectname: [email protected]
* event_action This tag is used to set a default action. You can't use event_action and action_map in the same rule.
For example, if you had an event for a Successful Login you could use the event_action tag and
default the action to success (for example, event_action:8;).
* firsttime_fmt Used to set the first time of the event. See list of formats.
* lasttime_fmt Used to set the last time of the event. See list of formats. You can use this with a setparm or a var
(var:firsttime="${1:1}" or setparm:lasttime="1"). For example:
Tag Description
alert any any any -> any any (msg:"SSH Login Attempt"; content:"content";
firsttime_fmt:"%Y-%m-%dT%H:%M:%S.%f"; lasttime_fmt:"%Y-%m-%dT%H:%M:%S.%f"
pcre:"PCRE goes here; raw; setparm:firsttime=1; setparm:lasttime=1; adsid:190; rev:1;)
%Y - %d - %m %H : %M : %S
%m - %d - %Y %H : %M : %S
%b %d %Y %H : %M : %S
%b %d %Y %H - %M - %S
%b %d %H : %M : %S %Y
%b %d %H - %M - %S %Y
%b %d %H : %M : %S
%b %d %H - %M - %S
%Y %H : %M : %S
%Y %H - %M - %S
%m - %d - %Y
%H : %M : %S
%H - %M - %S
Tag Description
%Y is 4-digit year
%d is date (1–31)
%H is hours (1–24)
%M is minutes (0–60)
%S is seconds (0–60)
This is an example of a rule that identifies a password based on OpenSSH logon and pulls from the event’s source IP address,
source port, and user name:
alert any any any -> any any (msg:"OpenSSH Accepted Password";content:"Accepted password for ";pcre:"Accepted\s
+password\s+for\s+(\S+)\s+from\s+(\d+\.\d+\.\d+\.\d+)\s+port\s+(\d
+)";setparm:username=1;setparm:src_ip=2;setparm:src_port=3;sid:31;rev:1;)
• severity_map — Severity displays as a value between 1 (least severe) and 100 (most severe) assigned to events matching
the rule. The device sending the message might show severity as a number 1–10, or as text (high, medium, low). When this
happens, it can't be captured as the severity so a mapping must be created. For example, here is a message coming from
McAfee IntruShield that shows severity in text form.
Rule syntax using severity mapping would look like this (severity mapping is in bold for emphasis only):
alert any any any -> any any (msg:"McAfee Traffic"; content:"syslogalertforwarder";
severity_map:High=99,Medium=55,Low=10; pcre:"(SyslogAlertForwarder)\x3a\s+Attack\s+([^\x27]+)\x27([^\x28]+)
\x28"; raw; setparm:application=1; setparm:msg=2; setparm:severity=3; adsid:190; rev:1;)
severity_map : High=99,Medium=55,Low=10. This maps the text to a number in the format we can use.
setparm : severity=3. This says to take the third capture and set it equal to the severity. All setparm modifiers work this way.
• action_map — Used just like severity. Action represents the action the third-party device took. The goal with action is to
create a mapping that is useful to the end user. For example, here is a failed logon message from OpenSSH.
Dec 6 10:27:03 nina sshd[24259]: Failed password for root from 10.0.12.20 port 49547 ssh2
alert any any any -> any any (msg:"SSH Login Attempt"; content:"sshd"; action_map:Failed=9,Accepted=8;
pcre:"sshd\x5b\d+\x5d\x3a\s+((Failed|Accepted)\s+password)\s+for\s+((invalid|illegal)\s+user\s+)?(\S+)\s
+from\s+(\S+)(\s+(\S+)\s+port\s+(\d+))?"; raw; setparm:msg=1; setparm:action=2; setparm:username=5;
setparm:src_ip=6; adsid:190; rev:1;)
The action (Failed) is mapped to a number. This number represents the different actions we can use in our system. Below
is the full list of usable action types.
• 0 = null
• 1 = pass
• 2 = reject
• 3 = drop
• 4 = sdrop
• 5 = alert
• 6 = default
• 7 = error
• 8 = success
• 9 = failure
• 10 = emergency
• 11 = critical
• 12 = warning
• 13 = informational
• 14 = debug
• 15 = health
• 16 = add
• 17 = change
• 18 = remove
• 19 = start
• 20 = stop
• 21 = noticed
• 22 = trusted
• 23 = untrusted
• 24 = false positive
• 25 = alert-reject
• 26 = alert-drop
• 27 = alert-sdrop
• 28 = restart
• 29 = block
• 30 = clean
• 31 = clean-fail
• 32 = continue
• 33 = infected
• 34 = move
• 35 = move-fail
• 36 = quarantine
• 37 = quarantine-fail
• 38 = remove-fail
• 39 = denied
In this example, Failed is mapped from the syslog message to 9, which the system reports as Failure.
Alert any any any -> any any (msg:”Login Attempt”; content:”sshd”; action_map or severity_map (if you need
it); pcre:”your regular expression goes here”; raw; setparm:data_tag_goes_here; adsid:190; rev:1;)
You must add a single syslog relay data source to accept the stream of data and additional data sources. This allows the Receiver
to split up the stream of data into the originating data sources. Sylog-ng and Splunk are supported. This diagram describes this
scenario:
Using this scenario as an example, you must set up the syslog relay data source (5) to receive the stream of data from the syslog
relay (4), selecting syslog in the Syslog relay field. Once the syslog relay data source is set up, add the data sources for the
individual devices (6, 7, and 8), selecting None in the Syslog relay field, because this device is not a syslog relay server.
Note
The header on the syslog must be configured to look like the following example: 1 <123> 345 Oct 7 12:12:12 2012 mcafee.com
httpd[123]
where
:= a colon (optional)
Note
The host name and data fields can appear in either order. An IPv6 address can be enclosed in brackets [ ].
ASP uses rules to identify where data resides in message-specific events, such as signature IDs, IP addresses, ports, user names,
and actions.
When the system receives an ASP log, it compares the time format in the log with the format specified in the ASP rule. If the time
format doesn't match, the system doesn't process the log.
To increase the likelihood of matching time formats, add multiple custom time formats.
With Policy Administrator rights, you can define the order for running ASP rules.
Note
The first regular expression determines if a message is parsed, so write the first rule to look for a pattern that is present in all
message you want the rule to parse. Additional regular expressions can be written to capture values from the messages and
map them to custom types in the McAfee ESM. Subsequent regular expressions do not determine the rule match, and are used
for parsing only.
While it is possible to test regular expression results on a few log lines in the McAfee ESM console itself, we recommend using a
graphical tool. There are many free web-based tools that can be used in addition to standalone installable tools. Optionally,
another useful tool would be a text editor that supports regular expression searches. Any tools used to test regular expressions
need to support pcre expressions.
Important
Ensure regular expressions are written to maximize efficiency. Poorly written expressions can adversely affect parsing
performance.
• Thoroughly understanding the value that a log can provide to your organization.
•
Ensuring that captured values align with the intended use of the specific custom type fields.
• Avoiding indexing fields that contain unique and random or high cardinality data (such as URLs).
•
Ensuring that rules mapping event messages directly from the log do not map unique, random, or high cardinality strings as
messages. McAfee ESM creates a data source rule for each unique event message, and numerous unique strings can
reduce McAfee ESM performance.
• Categorizing events by adding a normalized category to the rule. Data source rules, generated by parsing rules, inherit
the normalization assigned to the main parsing rule. If the main parsing rule is left normalized to "Uncategorized," then the
parsed events are also normalized as "Uncategorized," making a search for "Uncategorized" events to find unparsed events
inaccurate.
Note
If you have an advanced knowledge of ASP syntax, you can add ASP rule text directly without defining the settings on each
tab.
Task
• Type a unique, descriptive name for the rule, which appears in the McAfee ESM views when the rule matches a log
(unless the message is mapped directly from the log text in the rule).
• Assign tags to the rule to help find and group rule sets created for a given device or application in the policy editor.
Any tags added to a rule, causes McAfee ESM to automatically include the rule in any policy that has enabled the given
tagged rule set.
• Select the default normalized ID, which views, correlation rules, and reports can use as a filter.
• Enter a default severity value that the system can assign to log messages without severity values. The default is 25,
valid values are 1–100 (1 is the lowest severity).
• Group parsing rules by supported products, separating the events from other data sources and allowing the event
to be reported for a specific product.
4. Parsing tab:
• Select a process name (which is similar to the content string filter, but only applies to the process name found in
the SYSLOG header). Syslog header formats vary widely, so use content strings when possible.
• If a fixed string is always going to be found in the log, add it as a content string. The content strings of an ASP rule
identify each log. To speed up rule execution, include at least one content string in each ASP rule. This serves as a pre-
filter for optimization - only logs that match the given content strings are considered for matching and parsing by the
regular expressions. The log must contain all defined content strings.
Ensure there is at least one value in the content field section. Content strings are at least three characters long and be
as unique as possible for the specific event. Include enough content matches to uniquely identify the log. Using one or
more content fields in the ASP rule can improve the matching and parsing process on the McAfee Event Receiver.
For example, if the log entry is in this format:<180>Jan 1 00:00:00 testhost ftpd[4325]: FTP LOGIN FROM test.org
[192.168.1.1], anonymous, add content fields for ftpd and FTP LOGIN FROM.
• The first regular expression determines if the ASP rule matches the log. The system uses additional expressions to
capture values from the log.
• Use named captures to identify capture groups. The label used for the named capture can consist of letters,
numbers, and underscore characters but cannot begin with a number or include a space. The regular expression
syntax for a named capture is: (?P<NAME>regular expression capture). For example, a named capture where host
name is the name assigned to the capture group would be: Host\x3d(?P<hostname>\S+). When using named captures
the Policy Editor displays the capture name instead of the capture number, in the right side of the Parsing tab.
• Paste a sample log entry to be parsed. The system highlights parts of the log that match your regular expressions in
blue.
• ASP can pre-process certain logging formats to simplify the mapping of data. The following formats are available:
• Generic - (Default) used if the log does not match the other available formats.
• CEF - (Common Event Format) - eliminates the need to create a regular expression for each capture, and allow
the data to be mapped using the CEF key names found in the log.
• JSON - Similar to CEF, eliminates the need to create a regular expression for each capture, and allow data to
be mapped using the JSON key names found in the log
• XML - Basic, Simple, or Positional - allows ASP to parse logs that are in XML format and assign parsed data.
The XML format choice depends on the type of XML that is in the logs.
• XML — Basic: expects XML without any repeated elements.
• XML — Simple: Expects XML with either a single node with attributes, or a single set of non-repeated
elements without nesting.
• XML — Positional: Expects XML that can have multiple nodes with attributes and multiple repeated
elements with nesting.
• Key/Value — display what the regular expressions parse from the log samples. Key displays two numbers,
separated by a colon. The first number indicates the used regular expression, and the second number indicates the
capture group in that regular expression. If a captured value is the fourth capture in the third regular expression
defined, the key would display 3:4.
• The parser uses the content string (instead of a regular expression) for matching. Regular expressions are used only
to parse messages.
• If the log contains upper- or lowercase letters, write the expression in the same case then use the Case Insensitive
option, enabling case insensitivity for all regular expressions defined in the parsing rule.
• Date/timestamp of a log message can be parsed using the Time Format variables. McAfee ESM recognizes many
standard date/timestamps automatically, but there can be unrecognized formats or ones that display differently. This
section allows formatting the time to show up in the proper format when parsed.
• Use Action Mapping option if there is an action found in the log to be mapped to an available McAfee ESM.
• Severity mapping maps values in the log to a severity from 1–100. For example, a vendor might define their severity
as either Low, Medium, or High in their logs. With the Severity Map section, the severity value can map Low as 25,
Medium as 50, and High as 75.
7. Click Finish.
8. In the Policy Editor window, select the new rule.
9. Click disabled, then select enabled.
10. Click the Rollout icon in the upper right corner of the window.
11. If prompted to save the rule, click Yes.
12. In the Rollout window, click OK.
Task
Note
Unordered Rules represent the rules in the left, which are those that are in default order.
4. Use the arrows to reorder the rules, then click OK to save the changes.
Task
Note
First Time and Last Time see the first and last time the event is generated. Added Custom Type time fields also
appear.
Task
Correlating data
How correlation works
McAfee® Advanced Correlation Engine (McAfee® ACE) identifies and scores threat events in real time, using both rule- and risk-
based logic.
Identify what you value (users or groups, applications, specific servers, or subnets) and McAfee ACE alerts you if the asset is
threatened. Audit trails and historical replays support forensics, compliance, and rule tuning.
• Real-time mode — analyzes events as they are collected for immediate threat and risk detection.
• Historical mode — replays available data collected through either or both correlation engines for historical threat and
risk detection. When McAfee ACE discovers new zero-day attacks, it determines whether your organization was exposed to
that attack in the past, for subzero day threat detection.
McAfee ACE devices supplement the existing event correlation capabilities for McAfee ESM by providing two dedicated
correlation engines. Configure each McAfee ACE device with its own policy, connection, event and log retrieval settings, and risk
managers.
• Risk correlation — generates a risk score using rule-less correlation. Rule-based correlation only detects known threat
patterns, requiring constant signature tuning and updates to be effective. Rule-less correlation replaces detection
signatures with a one-time configuration: Identify what is important to your business (such as a particular service or
application, a group of users, or specific types of data). Risk correlation then tracks all activity related to those items,
building a dynamic risk score that raises or lowers based on real-time activity.
When a risk score exceeds a certain threshold, McAfee ACE generates an event and alerts you to growing threat conditions.
Or, the traditional rule-based correlation engine can use the event as a condition of a larger incident. McAfee ACE maintains
a complete audit trail of risk scores for full analysis and investigation of threat conditions over time.
• Rule-based correlation — detects threats using traditional rule-based event correlation to analyze collected information
in real time. McAfee ACE correlates all logs, events, and network flows with contextual information, such as identity, roles,
vulnerabilities, and more—to detect patterns indicative of a larger threat.
McAfee Event Receivers support network-wide, rule-based correlation. McAfee ACE complements this capability with a
dedicated processing resource that correlates larger volumes of data, either supplementing existing correlation reports or
off-loading them completely.
Configure each McAfee ACE device with its own policy, connection, event and log retrieval settings, and risk managers.
Task
1. On the system navigation tree, select ACE Properties, then click Risk Correlation Scoring.
2. Click Add to fill in the requested information:
• Make sure that an McAfee Enterprise Log Manager device exists on McAfee ESM.
• Make sure that storage pools exist on the McAfee Enterprise Log Manager.
• Make sure zones exist.
Task
2. On the system navigation tree, select the McAfee ACE, then click the Properties icon .
3. Click Risk Correlation Management.
4. Click Add.
5. On the Main tab, enter the manager name and enable it.
• Indicate whether to use event or flow data. To use flow data, you must go to ACE Properties → ACE Configuration
→ Data and select Flow Data.
• Select Logging to save the logs on the McAfee Enterprise Log Manager. Identify the storage pool on the McAfee
Enterprise Log Manager where you want the system to save the logs.
• If you want the data to be assigned to a zone, select it from the drop-down list.
• (Rule Correlation only) - Select the amount of time that the rule correlation allows for events to be out of order.
For example, if you set up 60 minutes, the system can use an event that is 59 minutes late.
6. On the Fields tab, select the fields that this manager uses to correlate events (maximum of 5 per manager).
Note
Risk updates, when below 100 percent critical, report their criticality in terms of what you have defined as FYI,
Minor, Warning, Major, and Critical (see Thresholds tab). For example, if your concept of FYI = 50% of the critical
value when the risk = 50% of critical, the severity = 20 rather than 50.
• Select if you don't want a field to be used to determine uniqueness. Avoid correlating against multiple high
cardinality fields due to high memory requirements.
Note
The number of risk lines generated depends on the number of unique combinations of all correlated fields.
7. On the Thresholds tab, set the score thresholds for an event to trigger for each criticality level. Set the rate for the score to
decay. Default - for every 120 seconds that a score is in a bucket, it decays by 10 percent until it reaches a score of 5. The
bucket for the unique field values is then deleted.
8. On the Filters tab, use logic elements and components to set up filters.
9. Click Finish, then click Write to write the managers to the device.
Task
Task
1. On the system navigation tree, select ACE Properties, then click ACE Configuration.
2. Click Data, then select Event Data, Flow Data, or both.
3. Click OK.
When the system discovers a new vulnerability, check your historical events and logs to determine whether your organization
was exploited in the past. Replay historical events using the Risk Correlation rule-less correlation engine and the standard rule-
based event correlation engine.
• Correlation was not set up during the time certain events triggered; correlating those events can reveal valuable
information.
• Set up new correlation based on past triggered events and test the new correlation to confirm results.
Task
1. On the system navigation tree, select ACE Properties, the click Historical.
2. Click Add, fill in the information requested, then click OK.
3. Select Enable Historical Correlation, then click Apply.
Real-time correlation is discontinued until you disable historical correlation.
4. Select the filters you want to run, then click Run Now.
Task
1. On the system navigation tree, select ACE Properties, then click Events and Logs → Get Events.
The events that resulted from running the historical correlation are downloaded to McAfee ESM.
2. Close ACE Properties.
3. To view the data:
a. On the system navigation tree, select the Advanced Correlation Engine (ACE) device on which you just ran historical
correlation.
b. On the time period drop-down list, select the period you specified when setting up the run.
Correlation rules are separate and distinct from firewalls or standard rules with attributes that specify its behavior. Each McAfee
Event Receiver gets a set of correlation rules from an McAfee ESM (deployed correlation rule set), which is composed of zero or
more correlation rules set with user-defined parameter values. McAfee ESM includes a base set of correlation rules, which the
rule update server updates.
Note
The rules on the rule update server include default values. When you update the base correlation engine rule set, customize
these default values so they properly represent your network. If you deploy these rules without changing the default values,
they can generate false positives or false negatives.
When you configure a data source, you enable correlation. Only one correlation data source can be configured per McAfee Event
Receiver, in a fashion similar to configuring syslog or OPSEC. Once you configure the correlation data source, you can edit the
base correlation rule set to create the deployed correlation rule set using the Correlation Rule Editor. You can enable or disable
each correlation rule and set the value of each rule's user definable parameters. You can also create custom rules and add
correlation components to correlation rules.
Data interpreted by correlation policy rules, which you can create and change, represents a suspicious pattern.
When adding a correlation data source, select McAfee as the vendor and Correlation Engine as the model.
Enabling the correlation data source allows McAfee ESM to send alerts to the receiver correlation engine.
Task
5. Click the Default Value Editor icon , type the value and click Add, then select the field on the Fields tab and click Add.
Numeric fields support the following operators: greater than (>), less than (<), greater than or equal to (>=), and less than or
equal to (<=).
Task
Note
Because an event generated by this rule could indicate that an unauthorized person has accessed the system, an
appropriate severity setting is 80.
4. Select the normalization ID, which could be Authentication or Authentication → Login, then drag and drop the AND logic
element.
Note
Select AND because there are two types of actions that need to occur (logon tries first, then a successful logon).
Note
Since there are two actions that require time windows, the 10-minute period must be divided between the two. For this
example, five minutes is the period for each action. Once the unsuccessful attempts have occurred in five minutes, the
system begins to listen for a successful logon from the same source IP address in the next 5 minutes.
8. In the Group by field, click the icon, move the Source IP option from the left to the right, indicating that all actions must
come from the same source IP address, then click OK.
9. Define the logic for this rule or component:
• Specify a filter to identify events (in this case, multiple failed logon attempts against a Windows system):
◦ • Drag and drop the Filter icon and drop it on the AND logic element.
◦ • On the Filter Fields Component page, click Add.
◦ • Select Normalization Rule → In, then select:
◦ • Normalization
◦ • Authentication
◦ • Login
◦ • Host Login
◦ • Multiple failed login attempts against a Windows host
◦ • Click OK .
• Set the number of times the logon failure needs to occur and the period in which they must occur:
◦ • Drag and drop the AND logic element to the Filter bar.
Note
The AND element is used because there are 5 separate attempts that must occur. The element allows you to
set the number of times and the length of time that they must occur.
◦ • Click the Menu icon for the AND element you just added, then click Edit.
◦ • In the Threshold field, enter 5 and remove other values that are present.
◦ • Set the Time Window field to 5.
◦ • Click OK.
• Define the second filter type that needs to occur, which is the successful logon:
◦ • Drag and drop the Filter icon to the bottom prong of the first AND logic element's bracket.
◦ • On the Match Component page, click Add.
◦ • In the fields, select Normalization Rule → In, then select:
◦ • Normalization
◦ • Authentication
◦ • Login
◦ • Host Login
For example, if you set the Group by field in a correlation rule to source IP address, you can override a component of the rule to
use the destination IP address. This means that all events have the same source IP address except the events that match the
overridden component. Those events have the same destination IP address as the source IP address of the other events.
Override rule components to look for a single event going from a particular destination followed by another event that originates
from that destination.
Task
You might encounter import errors if you import a file with referenced rule items that don't exist on the importing system. For
example, if rule 1 references variable $abc, and no variable is defined on the importing system that is named $abc, this condition
flags the rule as in conflict.
To avoid conflicts, create the needed referenced items (manually or through import where applicable) or change the correlation
rule and rule references.
Immediately after the import the system lists which rules are in conflict (flagged with an exclamation point !) or which failed. You
can view and change the rule conflict details from this list.
Task
Note
List and Range values can't be used at the same time. A list value cannot include a range (1–6, 8, 10, 13). The correct
way to write it is 1, 2, 3, 4, 5, 6, 8, 10, 13.
4. To select the default value for the parameter, click the Default Value Editor icon .
5. If you do not want the parameter to be externally visible, deselect Externally Visible. The parameter is local to the scope of
the rule.
6. Type a description of this parameter, which appears in the Description text box on the Rule Parameter page when the
parameter is highlighted.
7. Click OK, then click Close.
Details are always gathered at the time of request. But for rules that use dynamic watchlists or other values that might change
often, set the rule to get details immediately after triggering. This reduces the chance that details are unavailable.
Task
Task
1. On the system navigation tree, expand the Receiver, then click Correlation Engine.
2. On the view list, click Event Views, then select Event Analysis.
3. On the Event Analysis view, click the plus sign (+) in the first column next to the correlation event.
Note
A plus sign appears only if the correlation event has source events.
Finding threats
How the dashboard works
The McAfee ESM dashboard is a visual tool that represents data in a form that enables you to find possible threats quickly.
Once you learn what makes up the McAfee ESM dashboard, you can build interactive views to investigate potential threats
unique to your organization.
The McAfee ESM dashboard can contain multiple views and interactive tabs that allow you to move between your views quickly.
You can use predefined views or build your own unique views with widgets and filters.
1. Populate your McAfee ESM dashboard workspace with predefined views or your own custom views.
2. Navigate between views quickly using tabs. Use tabs to explore potential threat across multiple views while still retaining
the historical context that has initiated the investigation in a separate tab.
3. Use the filter ribbon to find what you're looking for in query results using real-time functionality. Autocomplete returns
results as you build the filter query.
4. Build multiple dashboard views that enable you to pivot, explore, investigate, and respond to potential threats.
5. Represent and drill-down to specific data quickly using interactive, visual widgets.
6. Investigate open cases without leaving the dashboard, giving you quick access to critical case details.
7. Respond to unacknowledged, triggered alarms and system notifications.
Component Description
Control Dial
Shows the data at a glance. It is dynamic, and can be linked to other components in the
console. It updates as you interact with McAfee ESM.
Each dial includes a baseline indicator ( ). Gradients around the outer edge of the dial
turn red above the baseline indicator. Optionally, the entire dial can change color to
represent anomalous behavior: turning yellow when within a certain threshold of a baseline,
or red when that threshold is exceeded.
The Rate option allows you to adjust the rate of the data that you are viewing. For example,
if you are looking at Current Day and Total Events and change the rate to hour, you see the
number of events per hour for the given day. This option is disabled if the query you are
viewing is already averaged, such as Average Severity or Average Bytes.
Source and
Displays the overview activity for event or flow IP addresses. The event option allows you to
Destination
specify IP addresses and view all attacks performed on the specified IP addresses, and view
Graph
all attacks that the specified IP addresses performed on others. The flow option allows you
to specify IP addresses and view the IP addresses that have connected to them, and view the
connections the IP addresses made.
This graph includes an open field at the bottom of the component that allows you to view
the source and destination events or flows for a specific IP address. Type the address in the
field or select one that you used previously, then click the Refresh icon .
Pie Chart
Displays the queried information in a pie graph. It is useful when you have fewer categories
to view (for example, a protocol or action query).
Table
Displays the query information in several columns. This component is useful to show event
and flow data at its finest granularity.
Bar Chart
Displays the queried information in a bar graph, allowing you to compare the size of each
result in a given time range.
Component Description
List
Displays the selected query data in a list format. This component is useful when you want to
view a more detailed list of items in a smaller space.
Distribution
Shows a distribution of events and flows over a period. You can set intervals to look at
specific time slices to shape the data.
Note Area
A blank component that is used for text-based notes. It allows you to write notes that are
related to the current view.
Count Displays the total events, assets, vulnerabilities, or flows queried for a specific view.
Title
Allows you to create a title or heading for your view. It can be placed anywhere on your view.
Geolocation
Shows the destination and source location of alerts and flows on a geolocation map. Options
Map
on this component allow you to switch between selecting city, state, country, and world
areas; zoom in and out; and select locations using the Ctrl and Shift keys.
Filter List
Displays a list of users and groups in your Active Directory. When you add the Filter List
component, you can bind other components from the Source User or Destination User
filter fields on the Query Wizard and selecting Bind to Active Directory List. You can also
view event and flow data associated with the Active Directory by clicking the menu icon.
Task
1. On the dashboard, click Add View and click the slide-out arrow next to one of the following options.
Task
1. Open or create a dashboard view with the widgets that you want to bind.
Note
The icon appears on bound widgets. Hovering over the icon reveals what data the widget is bound to.
6. Click Save again to save your change to the dashboard view and exit the Edit mode.
Task
Note
The query source you choose determines which visualization options you can choose for the widget.
c. Select the widget's visualization option. Options include: tables, bar charts, pie charts, list charts, gauges, and
interactive donut charts.
d. Select whether to bind the widget to data in another widget.
3. Click Create. Once the widget appears on your dashboard, you can change its size and placement.
4. To change the widget once it appears on the dashboard view, click . The options on the submenu vary depending on the
widget and its corresponding data. Options might include: Settings, Visualization, Details, Actions, Drilldown,
Filter On, and Delete.
5. Click Save.
Task
Note
5. Select the users or groups who can access and change selected views.
6. Import view files into McAfee ESM. Export custom views to share them with another McAfee ESM or keep the file as backup.
Note
Task
1. On the McAfee ESM console, add an events table view that includes the Device Time field.
a. On the View pane toolbar, click the Create New View icon .
b. Click and drag the Table component, then click Next.
c. Click Fields.
d. Click Device Time in the list on the left, and move it to the list on the right.
e. On the Fields page, click OK, then click Finish.
f. On the View Editing Toolbar, click Save As, type the name for the view, then click OK.
g. Close the View Editing Toolbar.
The view is added to the drop-down list of views.
2. View the Device Time in one of these ways.
Note
If you send an event to remedy, the device time for that event is lost.
• View the Device Time column in the event table of the view you added.
• Click the View Data Details icon at the bottom of the table.
• Click the Advanced Details tab, then view the Device Time field.
To have a session ID, an event must reside in a session. A session is the result of a connection between a source and destination.
Events that are internal to the device or McAfee ESM do not have session IDs.
Task
1. On the view drop-down list, select the view that has the session you need to view.
2. Select the event, click the menu icon on the component title bar, then select Event Drilldown → Events.
3. Click the event, click the Advanced Details tab, then click the View session data icon next to the Session ID field.
Results
Task
1. On McAfee ESM, click the views list, then select Event Views → Event Analysis.
2. Click an event, click the menu icon , then click Look Around.
3. Select the number of minutes before and after the time of the event that you want the system to search for a match.
4. Click Select filter, select the field that you want the search to match on, then type the value.
The results are displayed on the Look Around Results view.
Note
If you leave this view, then want to return to it later, click Event Analysis → Last Look Around.
Task
1. On the McAfee ESM console, select a view that includes a table component such as Event Views → Event Analysis.
2. Click an IP address, click on any component that has an IP address, then click IP Address Details.
Flow views
A flow is a record of a connection made through the device. When flow analysis is enabled, data is recorded about each flow, or
connection.
Flows have source and destination IP addresses, ports, Mac addresses, a protocol, and a first and last time (indicating duration
between the start and finish of the connection).
Because flows are not an indication of anomalous or malicious traffic, there are more flows than events. A flow is not associated
with a rule signature (SigID) like an event. Flows are not associated with event actions such as Alert, Drop, and Reject.
Certain data is unique to flows, including source and destination bytes and source and destination packets. Source bytes and
packets indicate the number of bytes and packets transmitted by the flow's source. The destination bytes and packets indicate
the number of bytes and packets transmitted by the flow's destination. Flows have direction: an inbound flow is defined as a flow
that originates from outside the HOME_NET. An outbound flow originates from inside the HOME_NET.
To view flow data, you must enable your system to log flow data. You can then view flows on the Flow Analysis view.
When you first log on to McAfee ESM, the default filters pane includes the Source User, Destination User, Source IP, and
Destination IP filter fields.
An orange funnel icon appears in the upper-right corner of the view pane indicates that filters are applied to the view. Click the
orange icon to clear filters and execute the query again.
Anywhere you have comma-separated filter values such as variables, global filters, local filters, normalized strings, or report
filters, you must use quotes if they are not part of a watchlist. If the value is Smith,John, you must type "Smith,John". If there are
quotes in the value, you must enclose the quotes in quotes. If the value is Smith,"Boy"John, you must enter it as
"Smith,""Boy""John".
Note
Use the contains and regex filters in any text or string field. The case insensitivity icon next to filter field names denotes text
fields. Other fields that allow the contains filter do not have that icon.
Syntax Examples
Syntax for contains is contains(somevalue) and for regex is regex(someregularexpression).
To make the filters case insensitive, click or include the /i regular expression notation, as in regex(/somevalue/i). The search
results return values that contain somevalue, regardless of case.
The NOT and icons apply to contains and regex values. To show the values in the search results without a value, enter the
value and click the icon. If you want the results to show one value or another, enter the values and click .
Example #2 — An OR search
Result: Returns strings in the field that contain admin or NGCP. The regex OR requires the extra set of
parentheses to function.
A dollar sign:
Non-indexed fields: $
With regex, if you try to use the $ without scaling it, the result set returns empty. PCRE escape sequence is a better search
method to use.
A percent sign:
Non-indexed fields: %
A backslash:
Non-indexed fields: \
Non-indexed fields: \\
Note
If you do not use the HEX value or the slash with regex, the Invalid Regular Expression (ER5-0015) error can occur.
Results: Returns any string that starts with ad, such as administrator and address.
regex(nitroguard\x28[3-4]\x29[com|info}+)
(3)www(10)nitroguard(3)com(0)
(3)www(10)nitroguard(4)info(0)
(3)www(10)nitroguard(3)gov(0)
(3)www(10)nitroguard(3)edu(0)
(3)www(10)nitroguard(7)oddball(0)
Results: This regular expression picks out a specific string. In this case, its nitroguard, a 3- or 4-digit primary
domain, and com or info. This regex matches the first 2 expressions but not the others. These are
examples to show how regex can be used with the feature.
Caveats
• To avoid higher overhead and slower query performance, use regex with values with a minimum of three characters.
• This filter can't be used in correlation rules or alarms. The only exception is that it can be used in correlation rules with
name/value custom types.
• Using contains or regex with NOT can cause higher overhead and slower query performance.
• Familiarity with bloom filters is recommended.
Cc HTTP_Req_Host Signature ID
DNS_Name NTP_Server_Mode To
File_Operation Referrer
File_Operation_Succeeded Registry_Key
Task
• Click the Filter bar and add the relevant field and values.
Note
You can only use the AND operator in the Filter bar.
• To build complex filters using both AND and OR operators, click Advanced Search.
• To specify a time frame for the view, click the clock icon on the filter ribbon then select the time frame. If you want
to query archived partitions, use the legacy Flash interface to set a Custom Time.
• To apply predefined filter sets to the view, click the Filter Sets drop-down arrow in the top right corner of the
dashboard.
Note
For details about how to create a filter set, click on the Managing Filter Sets window.
Results
The view refreshes to display only the records matching the values you entered.
Task
1. On the McAfee ESM console, create a view or add filters to the view.
To create a view, click Filters on the second page of the Query Wizard.
To add filters to a view, select the view to which you want to add them. The Filters pane is on the right of the screen.
Results
Filter by Compliance ID
Unified Compliance Framework (UCF) is an organization that maps the specifics of each regulation to harmonized control IDs. As
regulations change, these IDs are updated and pushed to McAfee ESM.
Task
1. To add UCF filters, click the filter icon next to the Compliance ID field and select compliance values to use as filters. Then,
Filter views
Filters help you view details about selected items on a view. If you enter filters and refresh the view, the data in the view reflects
the filters you added.
Task
1. On the McAfee ESM console, select the view you want to filter.
2. In the Filter pane, filter your view in one of the following ways:
• Type the filter information in the appropriate field. For example, to filter the view to see only the data that has a
source IP address of 161.122.15.13, type the IP address in the Source IP field.
• Type a contains or regex filter.
• Click the Display filter list icon next to the field and select the variables or watchlists to filter on.
•
On the view, select the data you want to use as the filter, then click the field on the Filter pane. If the field is blank, it is
auto-populated with the data you selected.
Note
For Average Severity, use a colon (:) to enter a range. For example, 60:80 is a severity range of 60–80.
Note
Results
McAfee ESM refreshes the view. An orange filter icon appears in the upper-right corner of the view pane, indicating that the data
in the view is a result of filters. If you click the icon, the system removes the filters and the view shows all data.
Task
1. On the system navigation tree, select the device you need to view, then click the View Streaming Events icon in the
actions toolbar.
2. Click Start to begin streaming and Stop to stop it.
3. Select any of the available actions on the viewer.
4. Click Close.
Task
1. On the McAfee ESM console, select a view that includes a table component such as Event Views → Event Analysis.
2. Click an IP address, click on any component that has an IP address, then click IP Address Details.
When setting up queries for a view, you can use predefined custom types to filter the queries. If no data exists for a specific
custom type, the query returns without results. To avoid results like this, select the user field (Custom Field 1 through 10 in the
Event Field column of the table) that returns the results that you need instead of using a custom type.
For example, to include source user data in query results, select Source User as a query field. That field acts as a filter and, if the
information contains no source user data, the query returns no results. But, if you select User Field 7 (the user field for source
user), that field appears as a column in the table of results and doesn't filter the data. If source user data exists, it appears in this
column. If no data exists for this field, the User Field 7 column is blank but other columns are populated.
For example, a log (100300.351) contains three fields (100, 300.35, 1). The custom subtype allows you to specify what each of
these fields is (integer, decimal, Boolean). For example:
Note
Subtypes can include a maximum of 8 bytes (64 bits) of data. Space Usage displays the number of bytes and bits used. When
data exceeds the maximum space, this field indicates, in red, that the space has been exceeded, for example: Space Usage: 9
of 8 bytes, 72 of 64 bits.
If you select the Name/Value Group data type, you can add a custom type that includes a specified group of name/value pairs.
You can then filter views and queries by these named pairs, and use them in Internal Event Match alarms.
Characteristics include:
• Use contains(<regular expression>) syntax or type a value into the non-indexed random string or hashed string fields,
then filter custom types.
• Use regex() syntax.
• With contains(), if you put a comma-separated filter into a non-indexed custom type field (Tom,John,Steve), the system
performs a regular expression. The comma and asterisk or a period and asterisk act as a bar (|) in a contains or non-
indexed random string or hashed string field. If you type a character such as an asterisk (*), it is replaced with a period
followed by the asterisk (.*).
• An invalid regular expression or a missing closing or opening parenthesis can cause bad regular expression errors.
• You can only use a single regex() or contains() in non-indexed and indexed string, random string, and hashed string
custom type filter fields.
• Signature ID field accepts contains(<on part or all of a rule message>) and regex(<on part of a rule message>).
• A common search filter for contains is a single value, not a single value with a .* before and after.
• Single values
• Multiple values separated by commas, which are converted into a regular expression
• A contains statement with a * that acts like .*
• Advanced regular expressions, where you can use the regex() syntax
If you have administrator privileges, you see predefined custom types on System Properties → Custom Types.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Custom Types.
4. Click Add:
• Number of Subtypes — Select the number of subtypes that you want to add to the table.
• Name column — Click each subtype, then type a name.
• Data Type column — Click each subtype, then select the data type for each subtype.
Note
If you select Boolean, validation ensures that they appear in groups of 8 subtypes.
• Length column — If you selected Integer or Unsigned Integer in the Data Type column, select the data
length in bytes. An integer's length must be 1, 2, 4, or 8.
• Manage Indexing — If you selected Accumulator Value in the Data Type field, click to enable indexes for
each accumulator field.
• If you select the Name/Value Group data type, add the value pairs names in the text field.
When adding or editing a view or report, define the query settings for each component by selecting the query type, the query,
the fields to include, and the filters to use. Select the data you want gathered by the component. You can also edit or remove
queries, and copy an existing query to use as a template to set up a new query.
Manage queries
McAfee ESM comes with predefined queries that gather data for reports or views. You can edit some of the settings on these
queries and you can add and remove custom queries.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click Reports, then add or edit the report to access the Query Wizard.
3. On the Query Wizard, copy an existing query to use it as a template for new queries. You can also edit or delete custom
queries.
4. Click Finish.
In this way, two values can be compared to easily show the relationships, for example, between total events and average severity.
This feature provides valuable data comparisons over time, at a glance. This feature is also useful for saving screen real-estate
when building large views, by combining results onto a single distribution graph.
The comparison is limited to the same type as the selected query. For example, if an event query is selected, you can compare
with the fields from the event table only, not the flow or assets and vulnerabilities table.
When you apply the query parameters to the distribution chart, it runs its query as normal. If the comparison field is enabled, a
secondary query is run for the data at the same time. The distribution component displays the data for both data sets on the
same graph, but uses two separate vertical axes. If you change the chart type, both sets of data continue to display.
Task
1. Select the Create new view icon or the Edit current view icon .
2. Click the Distribution icon , then drag and drop it on the view to open the Query Wizard.
3. Select the query type and the query, then click Next.
4. Click Compare, then select the field that you want to compare to the query you selected.
5. Click OK, then click Finish.
6. Move the component to the correct location on the view, then:
When adding components to views or reports, choose how to stack the distribution. When you access the view, you can change
the settings, set the interval, and set the chart type and details.
Note
Task
1. Drag and drop the Distribution component on views or reports, then select the query type.
Note
Stacking is unavailable for Collection Rate or Average (for example, Avg Severity Per Alert or Avg Duration Per Flow)
distribution queries.
2. On the second page of the Query Wizard, click Stacking, then select the options.
3. Click OK on the Stacking Options page and Finish on the Query Wizard.
4. Change settings and set interval and chart type by clicking the Chart Options icon .
This view provides real-time information about the amount of data that must be searched, allowing you to limit the query to
minimize the number of files to be searched.
• Results Time Distribution graph — Displays the estimates and results based on a time distribution. The bottom axis
changes depending on what is selected in the time frame drop-down list.
• Data Source Results graph — Displays the estimates and results per data source based on the data sources of the
devices selected on the system navigation tree.
• Device Type Results graph — Displays the estimates and results per device type based on the devices selected on the
system navigation tree.
The system populates these graphs before the search begins and updates the graphs as results are found. You can select one or
more bars on the Data Source Results or Device Type Results graphs, or highlight a section of the Results Time Distribution
graph.
Click Apply Filters to narrow the search once the results have started coming in. This allows you to drill down to the search
results, and to limit the amount of data that needs to be searched. When the search is finished, these graphs display the actual
results.
Task
Note
The system ignores the following words:but, be, with, such, then, for, no, with, not, are, and, their, if, this, on, into, a, or,
there, in, that, they, was, is, it, an, the, as, at, these, by, to, of.
Task
1. On the view pane, select Enhanced ELM search from the drop-down list.
2. If there is more than one McAfee Enterprise Log Manager device on the system, select the devices to search from the drop-
down list next to the text field.
3. Type a normal text search or regular expression in the text field.
4. If you want a time frame other than Current Day, select it on the drop-down list.
5. On the system navigation tree, select the devices that you want to search.
6. If needed, select one or more of these options:
7. Click Search.
8. Copy, download, or save search results.
9. To view saved searches, click ELM Properties → Data.
Task
1. From the system navigation tree, select the McAfee Enterprise Log Manager, then click .
2. Select Data.
• On the Search Logs and Files tab, configure the search parameters.
• On the Integrity Check tab, configure the check parameters.
3. Click Search.
Note
Running complex searches over long time spans can cause the search process to stop working. Consider breaking these
searches into smaller time spans.
The bloom regex optimizer performs pre-tuning to provide optimal searches, but you can obtain even better performance from
your queries by keeping a few things in mind.
• You can only use mandatory parts of the regular expression for bloom filtering. The bloom filter only uses substrings in
the regular expression that exist in every matching string. The one exception is that you can use a one-level deep OR
grouping such as(seth|matt|scott|steve).
• You can't use mandatory parts of a regular expression that are shorter than four characters. For example, seth.*grover
uses seth and grover with the bloom, but tom.*wilson only uses wilson because tom is too short.
• OR groupings that contain non-constant substrings or a substring that is too-short can't be used. For example, (start|
\w\d+|ending) can't be used because the middle item in the OR list is not a constant that can be searched for in the
bloom. As another example, (seth|tom|steve) can't be used because tom is too short; but(seth|matt|steve) can be used.
The optimizer process for the database runs the regex-to-bloom query. That optimizer deconstructs the regex and finds the
mandatory constant substrings.
\|\|(626|629|4725|4722)\|\|.*\|\|(bbphk)\|\|
The only part that the bloom uses from this expression is bbphk. This change reduces the search set from over a million files
down to 20,000.
(\|\|626\|\||\|\|629\|\||\|\|4725\|\||\|\|4722\|\|).*\|\|bbphk\|\|
In this example, the \|\| has been moved from before and after the first group to the front and back of each element in the
group, which does two things:
In addition, the parentheses around bbphk have been removed as they were not needed and indicated to the bloom filter that
this is a new subgroup. Performing these types of manual adjustments to the regular expression can effectively reduce the
search even further to only about 2,000 files.
Note
Running complex searches over long time spans can cause the search process to stop working. Consider breaking searches
for long periods into smaller time spans.
Task
1. Open an SFTP client such as WinSCP 5.11, Filezilla, CoreFTP LE, or FireFTP.
2. Connect to the McAfee Enterprise Log Manager using its IP address and the configured SFTP port.
Note
The date indicates when the system inserted the log to the McAfee Enterprise Log Manager.
The files are presented in two ways: 1) by data source then data and 2) by date then data source.
3. Select the logs and transfer them. Specific steps to accomplish this vary based on the SFTP client you are using.
Important
If McAfee Active Response is installed as an extension on McAfee ePO devices added to McAfee ESM, you can use McAfee Active
Response to search from the McAfee ESM. The search generates a list of current endpoint data, allowing you to:
Note
Searching with McAfee Active Response uses McAfee® Data Exchange Layer (DXL).
• High availability (HA) receivers do not support McAfee® Data Exchange Layer (DXL).
• Date formats from a McAfee Active Response search are returned as 2018-11-05T23:10:14.263Z and not converted to
the McAfee ESM date format.
• When you append McAfee Active Response data to a watchlist, the system does not validate the data, which means you
might add data to a watchlist that doesn't match its type.
Task
a. From the McAfee ESM dashboard, click and select System Properties.
b. On the system navigation tree, select the device, then click the Properties icon .
c. Click McAfee ePO Properties, then click Connection.
d. Select Enable DXL and specify an Agent Wake-up Port (default is 8081).
2. On the McAfee ESM dashboard, select a view with a table widget, such as Event Analysis.
Note
Search types are grayed out if the table doesn't have the appropriate fields for the search.
• File details of the source and destination IP address, such as the operating system and name
• User details
• Source IP address process details for what established the connection
• Destination IP address process details for what established the connection
• Anyone connected to the same source or destination IP address
Task
• Create a new static watchlist or append to an existing watchlist, using the values from the selected column.
Note
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Data Enrichment, then click Add.
4. Complete the requested information on the Main tab.
5. On the Source tab, select McAfee Active Response in the Type field, then fill in the requested information.
6. Complete the information on the remaining tabs, then click Finish.
Results
The source is added and the data you specified is enriched with the McAfee Active Response data.
Note
The McAfee Active Response type is not listed if the McAfee ESM fails to pull the McAfee Active Response collectors over DXL.
Cyber threat management enables you to set up automatic feeds that generate watchlists, alarms, and reports, giving you
visibility to actionable data. For example, you can set up a feed that automatically adds suspicious IP addresses to watchlists to
monitor future traffic. That feed can generate and send reports indicating past activity. Use Event Workflow views → Cyber
Threat Indicators views to drill down quickly to specific events and activity in your environment.
Fully qualified domain name, Host Name, Host, Destination_Hostname, External_Hostname, Domain, Web_Domain
Domain Name
IPv4, IPv6 IPAddress, Source IP, Destination IP, Attacker_IP, Grid_Master_IP, Device_IP,
Victim_IP
Subject Subject
URL URL
Verify that you have the Cyber Threat User permission, which allows you to view the results of your organization's cyber threat
feeds.
Task
6. Drill down to threat details using the Description, Details, Source Events, and Source Flows tabs.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Select Cyber threat feeds → Add, then create a feed.
3. On the Watchlist tab, click Create New Watchlist, and add two watchlists:
4. In the Indicator Type field, select IPv4, then select CyberThreatIP in the Watchlist field.
5. In the next Indicator Type field, select Fully Qualified Domain Name, then select CyberThreatDomain in the Watchlist
field.
6. Complete the cyber threat feed setup, then click Finish.
Task
Note
Supported sources include McAfee Advanced Threat Defense and MITRE Threat Information Exchange (TAXII).
5. On the Frequency tab, identify how often the feed pulls the IOC files (pull frequency). Available pull frequencies include:
every x minutes, daily, hourly, weekly, or monthly. Specify the daily trigger time.
6. On the Watchlist tab, select which property or field in an IOC file to append to an existing watchlist. You can add watchlists
for any supported property or field.
If the watchlist you need does not yet exist, click Create New Watchlist.
7. On the Backtrace tab, identify which events (default) and flows to analyze, matching data to analyze, and how far back to
analyze data against this feed.
a. Choose to analyze events, flows, or both.
b. Indicate how far back (in days) to analyze the events and flows.
c. Specify actions to take if the backtrace finds a data match.
d. For alarms, select an assignee and severity.
8. Return to the Main tab, then select Enabled to activate this feed.
9. Click Finish.
Results
If there is a problem with the upload, you receive one of these errors.
ER328 — Invalid The file format is • Make sure that the uploaded file is a STIX file. The engine
STIX format incorrect. supports STIX version 1.1.
• Read the STIX documentation to verify that the schema is valid.
ER329 — No The uploaded STIX file If a specific indicator needs to be processed, contact Support so that
supported IOCs doesn't contain indicators it can be normalized.
found that are normalized for
McAfee ESM.
Responding to threats
How alarms work
Alarms drive actions in response to specific threat events. You can define conditions that trigger alarms and what happens when
alarms trigger.
Build alarms
Before you can build and respond to alarms, ensure that your environment contains the following building blocks:
Building too many or too few alarms that trigger frequently can create distracting noise. The best approach is to build alarms
that escalate events that are critical to your organization.
• Viewing triggered alarms — The Alarms pane on the dashboard lists the total number of alarms by severity.
High 66–100
Medium 33–65
Low 1–32
• Acknowledging triggered alarms — The system removes acknowledged alarms from the Alarms pane on the
dashboard, but acknowledged alarms remain on the Triggered Alarms view.
• Deleting triggered alarms — The system removes triggered alarms from the Alarms pane and the Triggered Alarms
view.
Note
If you use visual alerts and do not close, acknowledge, delete a triggered alarm, the visual alert closes after 30 seconds. Audio
alerts play until you close, acknowledge, or delete the triggered alarm or click the audio icon to stop the alert.
Refine and tune your alarms as you learn what works best for your organization.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Alarms.
4. To disable or enable alarm monitoring for the entire system, click the Settings tab, then click Disable or Enable.
Note
5. To disable or enable individual alarms, click the Alarms tab. The Status column indicates whether alarms are enabled or
disabled.
6. Click OK.
Create alarms
Create an alarm so that it triggers when your defined conditions are met.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Alarms, then click Add.
4. Click the Summary tab to define the general alarm settings.
Condition Description
Check Rate Select how often the system checks for this condition.
Deviation Specify a percentage threshold to check above baseline and a different percentage below baseline.
Event Rate • Event Count — Enter the number of events that must occur before McAfee ESM triggers the
alarm.
• Filters icon — Select the values to filter the data.
• Time Frame — Select in what interval the number of selected events must occur before
McAfee ESM triggers the alarm.
• Offset — Select how long to offset so the alarm does not include the sharp increase at the end
created by aggregation. For example, if McAfee ESM pulls events every five minutes, the last one
minute of the events retrieved contain the aggregated events. Offset the time period by that
amount so the last one minute is not included in the data measurement. Otherwise, McAfee ESM
includes the values in the aggregated data in the event count, causing a false positive.
Field Match a. Drag and drop the AND or OR icon to set up the logic for the alarm's condition.
b. Drag and drop the Match Component icon onto the logic element, then complete the Add
Filter Field page.
Condition Description
c. Limit the number of notifications you receive by setting the Maximum Condition Trigger
Frequency. Each trigger only contains the first source event that matches the trigger
condition, not the events that occurred in the trigger frequency period. New events that match
the trigger condition do not cause the alarm to trigger again until after the maximum trigger
frequency period. For example, if you set the frequency to 10 minutes and an alarm triggers
five times in a 10-minute period, McAfee ESM sends a single notice with 5 alarms.
Note: If you set the interval to zero, every event that matches a condition triggers an
alarm. For high frequency alarms, a zero interval can produce many alarms.
Health Select the types of device status changes. For example, if you select only Critical, you are not
Monitor notified if there is a health monitor status change at the Warning level.
Status
Internal • Trigger when value does not match — Select to trigger the alarm when the value doesn't
Event Match match your setting.
• Use Watchlist — Select if a watchlist contains the values for this alarm.
Note: For alarms that trigger when a health monitor event is generated.
• Value(s) — Type the specific values of the type selected in Field (limited to 1,000 characters).
For example, for Source IP, enter the actual source IP addresses that trigger this alarm.
Maximum Select the amount of time to allow between each condition to prevent a flood of notifications.
Condition
Trigger
Frequency
Threshold Event Delta condition type only — Select the maximum allowed delta for the analyzed events before
the alarm triggers.
Condition Description
Type Select the alarm type, which determines the fields you must fill in.
Action Description
Auto- Acknowledge the alarm automatically, right after it triggers. As a result, the alarm doesn't
acknowledge appear on the Alarms pane but the system adds it to the Triggered Alarms view.
Alarm
Visual alert Generate an alarm notification on the bottom right of the console. To include an audio
notification, click Configure --> Play Sound, then select an audio file.
Create case Create a case for the selected person or group. Click Configure to identify the case owner and
to select which fields to include in the case summary.
Update Change watchlists by adding or removing values based on the information contained in up to 10
watchlist alarm-triggering events. Click Configure and select which field from the triggering event to
append to or remove from the selected watchlist. When these settings change a watchlist, the
Actions tab on the Triggered Alarm view shows the change.
Note: This action requires Internal Event Match as the condition type.
Action Description
Note: Using the following characters in alarm names might cause issues when sending
text messages: comma (,), quotation marks ("), parenthesis ( ), forward or backward slash (/
\), semicolon (;), question mark (?), at symbol (@), brackets ([ ]), more than and less than
signs (< >), and equal sign (=).
Generate Generate a report, view, or query. Click Configure, then select a report on the Report
reports Configuration page or click Add to design a new report.
Note: If you plan to email a report as an attachment, check with your mail administrator
to determine the maximum size for attachments. Large email attachments can prevent a
report from being sent.
Execute remote Execute a remote command on any device that accepts SSH connections, except McAfee devices
command on the McAfee ESM. Click Configure to select the command type and profile; time zone and
date format; and the host, port, user name password, and command string for the SSH
connection.
Note: If the alarm condition is Internal Event Match, you can track specific events. Click
Send to Remedy Send up to 10 events to Remedy per triggered alarm. Click Configure to set up the information
required to communicate with Remedy: from and to data, prefix, keyword, and user ID (EUID).
When events are sent to Remedy, McAfee ESM adds Sent events to Remedy to the Actions tab
on the Triggered Alarm view. This action requires Internal Event Match as the condition type.
Assign Tag with Apply McAfee ePolicy Orchestrator tags to the IP addresses that trigger this alarm. Click
ePO Configure and select the following information:
Action Description
Note: This action requires Internal Event Match as the condition type.
Blacklist Select which IP addresses to blacklist when an alarm triggers. Click Configure and select the
following information:
• Field — Select the type of IP address to blacklist. IP address blacklists both source and
destination IP addresses.
• Device — Select the device where you want the IP addresses blacklisted. Global adds the
device to the Global Blacklist.
• Duration — Select how long to blacklist the IP addresses.
Note: This action requires Internal Event Match as the condition type.
Custom alarm Customize the fields that are included in the summary of a Field Match or Internal Event
summary Match alarm.
8. On the Escalation tab, identify how to escalate the alarm when it is unacknowledged in a certain time.
Escalation Description
Escalate after Enter the time when you want the alarm to be escalated.
Escalated assignee Select the person or group to receive the escalated notification.
Escalated severity Select the severity for the alarm when escalated.
Visual alert Select whether the notification is a visual alert. Click Play sound, then select a file if you
want a sound to accompany the visual notification.
Send message Select whether to send the assignee a message. Click Add recipient, select the type of
message, then select the recipient.
Escalation Description
Generate reports Select whether to generate a report. Click Configure to select the report.
Execute remote Select whether to execute a script on any device that accepts SSH connections. Click
command Configure, then fill in the host, port, user name, password, and command string.
Copy alarms
Use existing alarms as templates for new alarms, by copying and saving it with a different name.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Alarms.
4. Select an enabled alarm, then click Copy.
The Alarm Name page displays the name of the current alarm followed by _copy.
Note
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Alarms.
4. Click the Settings tab, then click Templates. You can add, change, and delete custom templates, and copy existing
templates.
Note
• Text messages - limit to 140 characters. The system sends text messages as email to phones; phone carriers
then convert to text messages.
• Syslog messages - limit the message body to fewer than 950 bytes. McAfee ESM cannot send syslog messages
that exceed 950 bytes.
• Select Field Match for data source-driven alarms that run on the McAfee Event Receiver not McAfee ESM.
• Select Internal Event Match for alarms that run on McAfee ESM and force queries to run every time the
alarm frequency expires.
Verify that you have administrator privileges or belong to an access group with alarm management privileges.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click the Alarms → Settings tab.
4. Configure recipient information.
• SNMP recipients:
• Send each report line as is — The data from the report line is sent as is in a single variable binding. The
system constructs the data binding OIDs by concatenating the Enterprise OID, the specific trap type, and an
auto-incrementing number beginning with the number 1.
• Parse results and use these binding OIDs — The system parses the report line and sends each field in
a separate data binding.
• If you select this option, click Add and type the binding OID value.
• If you do not specify variable OIDs for all data fields in the report, McAfee ESM increments from the last
OID specified in the list.
• Syslog recipients: enter each recipient's host IP address, port, facility, and message severity.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click the Alarms → Settings tab.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Alarms.
4. Click the Settings tab, then click Templates.
5. On the Template Management page, click Add, then enter the information requested.
6. In the Message Body section, place your cursor where you want to insert the tags, then click the Insert Field icon , and
select Source Event Block.
7. Place your cursor inside the tags, click the Insert Field icon again, then select the information you want to include when the
correlation alarm triggers.
Results
The following example shows what an alarm message template looks like when you insert fields for an event's source IP address,
destination IP address, and severity:
[$REPEAT_START]
Correlation SigID: [$Signature ID]
Correlated Last Time: [$Last Time]
[$SOURCE_EVENTS_START]
Source Event Details:
Host: [$%HostID]
Command: [$%CommandID]
Application: [$%AppID]
Packet: [$Packet Data]
[$SOURCE_EVENTS_END]
[$REPEAT_END]
Note
If a correlated event does not trigger the alarm, the message does not include the data.
Logic elements
When you add a McAfee Application Data Monitor device, database, and correlation rule or component, use Expression Logic or
Correlation Logic to build the rule's framework.
Element Description
AND
Functions the same as a logical operator in a computer language. Everything that is grouped under this
logical element must be true for the condition to be true. Use this option if you want all conditions
under this logical element to be met before a rule is triggered.
OR
Functions the same as a logical operator in a computer language. Only one condition grouped under
this element has to be true for this condition to be true. Use this element if you want only one condition
to be met before the rule is triggered.
SET
For correlation rules or components, SET allows you to define conditions and select how many
conditions must be true to trigger the rule. For example, if two conditions out of three in the set must
be met before the rule is triggered, the set reads 2 of 3.
Each of these elements has a menu with at least two of these options:
Note
This doesn't apply to the root element (the first one in the hierarchy). If you remove the root element, all children are
also removed.
• Remove logical element and all of its children — You can delete the selected element and all its children from the
hierarchy.
When you set up the rule's logic, you must add components to define the conditions for the rule. For correlation rules, you can
also add parameters to control the behavior of the rule or component when it executes.
Task
1. Create an Internal Event Match alarm matching on Signature ID for specific triggers:
• When multiple failed logons for the same user reach an adjustable threshold, set the value to 306-36.
• When a user account is locked due to reaching the no activity threshold, set the value to 306-35.
• If a user tries to log on to the system after reaching the number of allowed concurrent sessions, set the value to
306-37.
• When a system file integrity check fails, set the value to 306-50085.
• When common access card (CAC) or web server certificates are about to expire set the value to 306-50081,
306-50082, 306-50083, or 306-50084.
Note
The alarm triggers 60 days before the certificate expires, then on a weekly basis. You cannot change the number of
days.
2. Configure an SNMP trap so that the alarm sends a trap to the NMS when it detects that the system is no longer operating in
an approved or secure state.
a. Create an alarm matching on any condition, then go to Actions tab → Send Message.
b. Click Add Recipients → SNMP, select the recipient, then click OK.
c. Click Send Message → Configure → Templates → Add.
d. In the Type field, select SNMP Template, enter the text for the message, then click OK.
e. On the Template Management page, select the new template, then click OK.
f. Complete the remaining alarm settings.
3. Configure a syslog message so that the alarm sends a syslog message to NMS when it detects that the system is no longer
operating in an approved or secure state.
a. Create an alarm matching on any condition, go to the Actions tab → Send Message.
b. Click Add Recipients → Syslog, select the recipient, then click OK.
c. In the Send Message field, click Configure → Templates → Add.
d. In the Type field, select Syslog Template, enter the text for the message, then click OK.
e. On the Template Management page, select the new template, then click OK.
f. Complete the remaining alarm settings.
4. Configure an SNMP trap so that the alarm notifies the appropriate Network Operations Center (NOC) in 30 seconds if a
security log fails to record required events.
a. Go to System Properties → SNMP Configuration → SNMP Traps or device Properties → device Configuration →
SNMP.
b. Select the security log failure trap, then configure one or more profiles for the traps to be sent to, then click Apply.
McAfee ESM sends SNMP traps to the SNMP profile recipient with the message Failed to write to the security
log.
5. Configure an SNMP trap so that the alarm notifies when the audit functions (such as the database, cpservice, IPSDBServer)
start or shut down, access SNMP traps or SNMP Settings, and select Database Up/Down Traps. Configure one or more
profiles for the traps to be sent to, and click Apply.
6. Trigger an alarm when an administrative session exists for each of the defined administrative roles.
a. Create an Internal Event Match alarm matching on Signature ID.
b. Enter the values 306–38 for Audit Administrator, 306–39 for Crypto-Administrator, and 306–40 for Power User. You can
also set up separate alarms.
Verify that you have administrator privileges or belong to an access group with alarm management privileges.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Alarms.
4. Click Add, type the alarm name and select the assignee, then click the Condition tab.
5. In the Type field, select Field Match, then set up the conditions for the alarm.
a. Drag and drop the AND or OR to set up the logic for the alarm's condition.
b. Drag and drop the Match Component icon onto the logic element, then complete the Add Filter Field page.
c. In the Maximum Condition Trigger Frequency field, select the amount of time to allow between each condition to
prevent a flood of notifications. Each trigger only contains the first source event that matches the trigger condition,
not the events that occurred in the trigger frequency period. New events that match the trigger condition do not cause
the alarm to trigger again until after the maximum trigger frequency period.
Note
If you set the interval to zero, every event that matches a condition triggers an alarm. For high frequency alarms, a zero
interval can produce many alarms.
6. Click Next and select the devices to be monitored for this alarm. This alarm type supports Receivers, local Receiver-
Enterprise Log Managers (ELMs), Receiver/ELM combos, ACEs, and Application Data Monitors (ADMs).
7. Click the Actions and Escalation tabs to define the settings.
8. Click Finish.
Results
Note
If the alarm fails to write out to the device, an out-of-sync flag appears next to the device in the system navigation tree. Click
the flag, then click Sync Alarms.
Verify that you have administrator privileges or belong to an access group with alarm management privileges.
Task
a. On the system navigation tree, click . Then select a view that displays the health monitor event
(Event Analysis or Default Summary).
Signature
Rule name ID Description Type Device Severity
A RAID error has 306-50054 RAID errors encountered. Hardware All High
occurred Monitor
Account disabled due to 306-35 User account disabled, due Software McAfee Medium
inactivity to inactivity. Monitor ESM
Account disabled due to 306-36 User account disabled, due Software McAfee High
max logon failures to maximum logon failures. Monitor ESM
Advanced Syslog Parser 306-50029 ASP parser stopped or Software Receiver Medium
collector state change started. Monitor
alert
ADM distiller process 306-50066 ADM PDF/DOC text Software ADM Medium
extraction engine stopped Monitor
or started.
Archive process state 306-50051 Receiver archiving process Software ADM/REC/DBM Medium
change alert stopped or started. Monitor
Audit administrator user 306-38 UCAPL event, audit Software McAfee Low
logon administrator logon. Monitor ESM
Signature
Rule name ID Description Type Device Severity
Blue Martini parser alert 306-50071 Blue Martini parser stopped Software Receiver Medium
or started. Monitor
Bypass NIC state alert 306-50001 NIC entered or exited Software IPA/ADM Medium
bypass status. Monitor
CAC cert has expired 306-50082 McAfee ESM CAC certificate Software McAfee High
expired. Monitor ESM
CAC cert expires soon 306-50081 McAfee ESM CAC certificate Software McAfee Medium
expires soon. Monitor ESM
Case status added/ 306-73 Case status changed. Software McAfee Low
modified/deleted Monitor ESM
Data allocation 306-7 McAfee ESM data allocation Software McAfee High
configuration change settings changed. Monitor ESM
Data partitions free disk 306-50005 Free space on each partition Software All Medium
space alert is low (for example, hada_hd Monitor
has 10% free space).
Signature
Rule name ID Description Type Device Severity
Data retention 306-6 McAfee ESM data retention Software McAfee High
configuration change configuration changed. Monitor ESM
Database detection 306-50036 DBM auto detection service Software All Medium
services state alert stopped or started. Monitor
Deep packet inspector 306-50008 Deep packet inspection Software All Medium
state change alert engine on ADM stopped or Monitor
started.
Deleted events 306-74 User deleted McAfee ESM Software McAfee Low
events. Monitor ESM
Deleted flows 306-75 User deleted McAfee ESM Software McAfee Low
flows. Monitor ESM
Device add 306-18 New device added to the Software McAfee Low
system. Monitor ESM
Device delete 306-19 Existing device deleted from Software McAfee Low
the system. Monitor ESM
Disk drive failure alert 306-50018 Checks and verifies integrity Hardware All High
of all hard disks (internal or Monitor
DAS).
ELM archive process 306-50045 ELM compressing engine Software ADM/REC/DBM Medium
state change alert stopped or started. Monitor
ELM EDS FTP 306-50074 ELM SFTP program stopped Software ELM Medium
or started. Monitor
ELM file process 306-50065 ELM reinsertion engine Software ELM Medium
stopped or started. Monitor
Signature
Rule name ID Description Type Device Severity
ELM mount point state 306-50053 ELM remote storage (CIFS, Software ELM Medium
change alert NFS, ISCSI, SAN) stopped or Monitor
started.
ELM query engine state 306-50046 ELM Jobs process – ELM Software ELM Medium
change alert jobs, such as ELM queries Monitor
and inserts, stopped or
started.
ELM redundant storage 306-50063 ELM Mirror stopped or Software ELM Medium
started. Monitor
ELM system database 306-50044 ELM database stopped or Software ELM High
error started. Monitor
Email collector state 306-50040 Cisco MARS collector Software Receiver Medium
change alert stopped or started. Monitor
EPO tags applied 306-28 McAfee ePO tags applied. Software McAfee Low
Monitor ESM
McAfee ESM reboot 306-32 McAfee ESM rebooted. Software McAfee Medium
Monitor ESM
Signature
Rule name ID Description Type Device Severity
McAfee ESM shutdown 306-33 McAfee ESM shut down. Software McAfee Medium
Monitor ESM
Failed logon due to 306-37 User failed to log on Software McAfee High
maximum concurrent because the maximum Monitor ESM
sessions reached concurrent sessions were
reached.
Failed to format SAN 306-50057 SAN on ELM failed to Hardware McAfee High
device format; user must retry. Monitor ESM
Failed user logon 306-31 User failed to log on. Software McAfee Medium
Monitor ESM
File deleted 306-50 Any file that can be added Software McAfee Low
or removed Monitor ESM
Filter process state 306-50050 Filter program on the device Software Receiver Medium
change alert stopped or started (filter Monitor
rules).
Firewall alert aggregator 306-50009 Firewall aggregator on the Software ADM Medium
state change alert ADM stopped or started. Monitor
Signature
Rule name ID Description Type Device Severity
Get VA data failure 306-52 McAfee ESM failed to obtain Software McAfee Medium
VA data. Monitor ESM
Get VA data success 306-51 McAfee ESM obtained VA Software McAfee Low
data. Monitor ESM
Health monitor internal 306-50027 Health monitor process Software All Medium
alert stopped or started. Monitor
HTTP collector state 306-50039 HTTP collector stopped or Software Receiver Medium
change alert started. Monitor
IPFIX collector state 306-50055 IPFIX (flow) collector Software Receiver Medium
change alert stopped or started. Monitor
Key and certificate 306-39 UCAPL event, Crypto Software McAfee Low
administrator user administrator logon. Monitor ESM
logon
Log partitions free disk 306-50004 Log partition (/var) is low on Software All Medium
space alert free space. Monitor
McAfee ePO collector 306-50069 McAfee ePO collector Software Receiver Medium
alert stopped or started. Monitor
Signature
Rule name ID Description Type Device Severity
McAfee Event Format 306-50031 McAfee Event Format Software Receiver Medium
state change alert collector stopped or started. Monitor
McAfee SIEM device 306-26 McAfee ESM cannot Software McAfee High
communication failure communicate with another Monitor ESM
device.
MS-SQL retriever state 306-50035 Microsoft SQL collector Software Receiver Medium
change alert stopped or started (any data Monitor
source for Microsoft SQL).
Multi-event log alert 306-50062 jEMAIL collector stopped or Software Receiver Medium
started. Monitor
MVM scan initiated 306-27 MVM scan started. Software McAfee Low
Monitor ESM
NetFlow collector state 306-50024 NetFlow (flow) collector Software Receiver Medium
change alert stopped or started. Monitor
New user account 306-13 New user added to the Software McAfee Low
system. Monitor ESM
NFS/CIFS collector state 306-50048 Remote mount for NFS or Software Receiver Medium
change alert CIFS stopped or started. Monitor
NitroFlow collector state 306-50026 NitroFlow (flows on device) Software Receiver Medium
change alert stopped or started. Monitor
Signature
Rule name ID Description Type Device Severity
NSM add/edit Blacklist 306-29 NSM Blacklist entry added Software McAfee Low
or edited. Monitor ESM
NSM delete Blacklist 306-30 NSM Blacklist entry deleted. Software McAfee Low
Monitor ESM
OPSEC retriever state 306-50034 OPSEC (Check Point) Software Receiver Medium
change alert collector stopped or started. Monitor
Oracle IDM collector 306-50072 Oracle IDM collector Software Receiver Medium
alert stopped or started. Monitor
Policy add 306-15 Policy added to the system. Software McAfee Low
Monitor ESM
Policy delete 306-17 Policy deleted from the Software McAfee Low
system. Monitor ESM
Signature
Rule name ID Description Type Device Severity
Remote NFS mount 306-50020 NFS ELM mount stopped or Software ELM Medium
point state change alert started. Monitor
Remote SMB/CIFS share 306-50019 Remote SMB/CIFS mount Software Receiver Medium
state change alert point stopped or started. Monitor
Risk Correlation state 306-50061 Risk Correlation engine Software ACE Medium
change alert stopped or started. Monitor
Root partitions free disk 307-50002 Free space on the root Software All Medium
space alert partitions is low. Monitor
Rule add 306-20 Rule added to the system, Software McAfee Low
such as ASP, filter, or Monitor ESM
correlation.
Rule delete 306-22 Rule deleted from the Software McAfee Low
system. Monitor ESM
Rule change 306-21 Rule changed in the system. Software McAfee Low
Monitor ESM
Rule update failure 306-9 McAfee ESM rule update Software McAfee Medium
failed. Monitor ESM
SDEE retriever state 306-50033 SDEE collector stopped or Software Receiver Medium
change alert started. Monitor
sFlow collector state 306-50025 sFlow (flow) collector Software Receiver Medium
change alert stopped or started. Monitor
Signature
Rule name ID Description Type Device Severity
SNMP collector state 306-50023 SNMP collector stopped or Software Receiver Medium
change alert started. Monitor
SQL collector state 306-50038 SQL collector (old NFX) Software Receiver Medium
change alert stopped or started. Monitor
Syslog Collector state 306-50037 Syslog collector stopped or Software Receiver Medium
change alert started. Monitor
System integrity check 306-50085 Non-ISO foreign program or Software All High
failure process running on the Monitor
system is flagged.
System logger state 306-50014 System logging process Software All Medium
change alert stopped or started. Monitor
Task (query) closed 306-54 Task manager task closed. Software McAfee Low
Monitor ESM
Text log parser state 306-50052 Text parser process stopped Software Receiver Medium
change alert or started. Monitor
User account change 306-14 User account changed. Software McAfee Low
Monitor ESM
User device failed logon 306-50079 SSH user failed to log on. Software McAfee Low
Monitor ESM
Signature
Rule name ID Description Type Device Severity
User device logon 306-50017 Not used in system. Software McAfee Low
Monitor ESM
User device logout 306-50078 SSH user logged out. Software McAfee Low
Monitor ESM
User logout 306-12 User logged out of the Software McAfee Low
system. Monitor ESM
Web Server cert has 306-50084 ESM web server certificate Software McAfee High
expired expired. Monitor ESM
Web Server cert will 306-50083 ESM web server certificate Software McAfee Medium
expire soon expires soon. Monitor ESM
Websense collector alert 306-50067 Websense collector stopped Software Receiver Medium
or started. Monitor
WMI Event Log collector 306-50030 WMI collector stopped or Software Receiver Medium
state change alert started. Monitor
Task
2. On the system navigation tree toolbar, click the Policy Editor icon .
3. Select the type of rule in the Rule Types pane.
4. Select one or more rules in the rules display area.
Verify that you have administrator privileges or belong to an access group with alarm management privileges.
• Prepare the SNMP trap Receiver (only required if you don't have an SNMP trap Receiver).
Task
1. Create an SNMP profile to tell McAfee ESM where to send the SNMP traps.
b. On the system navigation tree, select McAfee ESM, then click the Properties icon .
c. Click Profile Management, then click Add.
d. Select SNMP Trap as the Profile Type.
e. Fill in the remaining fields, then click Apply.
2. Configure SNMP on McAfee ESM.
a. On System Properties → SNMP Configuration, click the SNMP Traps tab.
b. Select the port, select the types of traps to send, then select the profile you added in Step 1.
c. Click Apply.
3. Define an alarm with SNMP Trap as an action.
Verify that you have administrator privileges or belong to an access group with alarm management privileges.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Alarms.
4. Click Add, enter the requested data on the Summary tab, then click the Condition tab.
5. In the Type field, select Internal Event Match.
6. In the Field field, select Signature ID, then type 306-50086 in the Value(s) field.
7. Enter the remaining information as needed for each tab, then click Finish.
Results
• Incorrect time zones are set for McAfee ESM or data sources.
• McAfee ESM has been on for a long time and the timing slips out of sync.
• McAfee ESM isn't connected to the Internet.
• Events are out of sync when it comes into the McAfee Event Receiver.
Note
When out-of-sync data sources generate events, a red flag appears next to its McAfee Event Receiver on the system
navigation tree.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Set up alarms when out-of-sync data sources generate events:
a. Click Alarms → Add, type the information requested on the Summary tab, then click the Condition tab.
b. Select Event Delta in the Type field.
c. Select how often McAfee ESM checks for out-of-sync data sources.
d. Select the time difference that must exist for the alarm to trigger.
e. Complete the information in the remaining tabs.
4. View, edit, or export the out-of-sync data sources:
a. On the system navigation tree, click the McAfee Event Receiver, then click the Properties icon.
b. Click Receiver Management → Time Delta.
Respond to notifications
Respond to triggered alarms from the dashboard. You can also view system notifications.
Task
The system removes acknowledged alarms from the Notifications panel. You can still view the alarms on the
Triggered Alarms view.
• Assign alarms by clicking . Then, select the appropriate alarm and click Assignee to choose a specific person to
respond to the alarm.
• Create a case for the alarm by clicking . Then, select the appropriate alarm and click Create Case.
• Edit the triggered alarm settings by clicking the appropriate alarm. Click to change the settings.
• View details about triggered alarms by clicking . Then, do one of the following:
• To see what event triggered the alarm, click the Triggering Event tab. To view the description, double-click the
event.
• To see what condition triggered the alarm, click the Condition tab.
• To see what actions occurred as a result of the triggered alarm, click the Action tab.
• Verify that you have administrator rights or belong to an access group with alarm management permission.
• Verify with your administrator whether your console is set up to display the Alarms log pane.
Task
1. Access triggered alarms from one of the following McAfee ESM locations:
• To view the Alarms pane on the console, click and select Alarms.
2. To view alarm details, click . You can view triggering events, conditions that triggered the events, actions that occurred as
a result of the alarm, and McAfee ePO tags assigned to the event.
Note
If a single event does not meet the alarm conditions, the Triggering Event tab might not appear.
Note
The system removes acknowledged alarms from the Alarms pane but the alarms remain on the Triggered Alarms
view.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Alarms.
4. Click the Settings tab.
5. To view the alarm reports waiting to run, click View. McAfee ESM runs a maximum of five reports concurrently.
6. To stop a specific report from running, select it and click Cancel. The remaining reports move up the queue.
Note
If you are an administrator or master user, this list includes all reports waiting to run on McAfee ESM, allowing you to
cancel any of them.
7. Click Files to select whether to download, upload, remove, or refresh any report on the list.
8. Click Close.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Alarms, then click Add or Edit.
4. On the Condition tab, select the Field Match or Internal Event Match type.
5. Click the Actions tab, Create case, then Configure. Then select the fields to include in the case summary.
6. Click Customize triggered alarm summary, click , then select the fields to include in the summary for the triggered
alarm.
7. Type the information requested to create alarms, then click Finish.
In dashboard views, create cases based on events that you want to investigate.
You can add contextual details and events to the case notes and track the investigative work. When resolved, close the case and
build alarms that apply the information uncovered in this case.
Add cases
Track actions taken in response to events.
Make sure that you have administrator privileges or belong to an access group with case management privileges.
Task
• From the dashboard, click , click Case Management, then click the Add Case icon .
• From the dashboard, select an event, click the menu icon , then click Actions → Create a new case.
Task
1. To view open cases from the dashboard, click and select Investigation Panel.
A summary of open cases appears on the left side of the dashboard.
2. Use the drop-down arrow to expand the case you want to investigate. Do one of the following:
• To change the case details (severity, assignee, values, or notes) from the dashboard, click Edit. Make your changes
and click Save.
• To view the case details, click View in Case Management.
Change cases
You can change case details or close cases. Changes are recorded in the case notes. Closed cases no longer appear on the Cases
pane, but do display on the Case Management list with a Closed status.
Task
• To select a cased assigned to you, select it on the Cases pane, then click the Edit Case icon .
• To select a case not assigned to you, click the Open Case Management icon and select relevant case. Then, the
Edit Case icon .
• Click the Assign Events to a Case or Remedy icon and select Add events to a case.
• Click the Menu icon , highlight Actions, then click Add events to a case.
• To set a default case status, click Add or Edit then click Default and choose the default status.
• Select cases you want to appear in the Cases pane on the dashboard.
View cases
Manage all cases, whether they are currently open or closed.
Verify that you have administrator privileges or belong to an access group with case management privilege.
Task
• 1–20 = green
• 21–40 = blue
• 41–60 = yellow
• 61–80 = brown
• 81–100 = red
Email cases
Set up the system to send an email message automatically to the case assignee, every time a case is added or reassigned. You
can also email a case notification manually, and include case notes and event details.
Task
b. Click .
c. Select Send an email when a case is assigned, then click Close.
2. Email a case manually.
a. On the Cases pane, select the case you want to email, then click .
b. On Case Details, click Email Case, then fill in the From and To fields.
c. Select whether you want to include the notes and attach a CSV file of the event details.
d. Type any notes you want to include in the email message, then click Send.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Reports → Add.
4. Complete sections 1, 2, and 3.
5. In section 4, select Query CSV.
6. In section 5, select the case management report to run:
• Case Management Summary — Includes case ID numbers, the severity assigned to the cases, their status, the
users they are assigned to, the organizations where they are assigned (if any), the date and time that the cases were
added, the date and time that the cases were updated (if they have been), and the case summaries.
• Case Management Details — Includes all information in the Case Management Summary report and the ID
numbers of the events linked to the cases and the information included in the notes sections of the cases.
• Case Time to Resolution — Shows the length of time that it took between status changes (for example, the
differential between the Open time stamp and Closed time stamp). By default, it lists the cases with a status of Closed
by Case ID number and severity, organization, Created date, last update, summary, and time difference.
• Cases per Assignee — Includes the number of cases assigned to a user or group.
• Cases per Organization — Includes the number of cases per organization.
• Cases per Status — Includes the number of cases per status type.
Results
• Static watchlists contain values (imported or entered manually) that don't change over time.
• Dynamic watchlists contain values that change automatically, through queries, regular expressions, or string search
criteria.
• Alarms can trigger any time events match values in the watchlist.
• Correlation rules can use the watchlist condition to either trigger or prevent the rule from triggering.
Configure watchlists
Create watchlists with static or dynamic values that trigger alarms or correlation rules or filter views or reports.
Using GTI Malicious IPs and GTI Suspicious IPs values in watchlists requires a McAfee GTI license.
Task
Note
Both static and dynamic watchlists are limited to a maximum number of 1,000,000 values. The system can display up to
1,000 imported values and indicates that not all imported values are displayed.
You can set when static values expire (between 1 hour - 365 days). Each value is time stamped and expires when the
specified duration is reached, unless it refreshes. When that duration passes, the system deletes the watchlist value.
Watchlist values can refresh if an alarm triggers and adds those values to the watchlist.
• Dynamic watchlists contain values that change automatically, through queries, regular expressions, or string search
criteria.
• You can specify when to update dynamic values automatically. The system queries the source (using the data
given) and refreshes the values at the specified time.
• Select the source to populate dynamic values. Source fields vary depending on which type you select.
• Static watchlists:
Note
Using McAfee GTI watchlists requires a McAfee GTI license. Downloading lists can take several hours and
requires an Internet connection (they cannot be downloaded offline).
• Dynamic watchlists are populated with values returned by the regular expression you write. Enter a regular
expression or search criteria for strings found in events or rule messages, which contain the rule's short
descriptions. Searches are case sensitive by default. To perform a case-insensitive search, surround search
strings or regular expression with forward slashes followed by i, such as /Exploit/i.
• Strings — The watchlist contains a list of string-type-custom-type strings (compiled from Events) that
match the regular expression.
• Rule names — The watchlist contains a list of McAfee ESM rule names that match the regular
expression.
• HTTP/HTTPS — Use this dynamic watchlist to pull threat or Indicators of Compromise (IOC) feeds from the
Internet. You can preview the data through the HTTP request, and filter the data using regular expressions.
Preview the first 200 lines of the website source code, which you can use to write a regular expression search. A
Run Now or scheduled update of the watchlist includes all matches from your regular expression search.
Note
This option supports RE2 syntax regular expressions, such as (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}) to match on
an IP address.
• Authentication — Select Basic if the website requires a user name and password to log on. Default
setting is None.
• Ignore Invalid Certificates — To search a website with an https URL, select this option to ignore invalid
SSL certificates.
• Method — To search a website that requires a post content or argument, select POST. Default setting is
GET.
• Specify how many header lines of code to skip in your website search.
• Type the character the website uses to separate values. This default is \n, which indicates that a new line
is the delimiter. The other most common delimiter is a comma (,).
• Type a regular expression that removes unwanted values from the results of your regular expression
search.
• (Required) Type the logic used to find a match and extract the values from the site. Use this to create an
expression that matches on a list of known malicious IP addresses or MD5 sums listed on a site.
• McAfee Active Response — populates dynamic watchlist values with data you specify.
Note
If McAfee ESM fails to pull McAfee Active Response collectors over DXL, the McAfee Active Response type is
not listed.
• Collector — Select the collector that you want to use to pull data.
• Value — Select the column of retrieved data that you want to include in the watchlist.
• Or or And — If you have two or more filters, select whether to apply all filters to the data (using And) or
to apply either of the filters (using Or).
• Filters — Select the filters to apply to the search.
• Add Filter — You can select a maximum of 5 filters.
Note
5. Expand Values.
• Select a type that assigns the search results to a field type. This choice allows the system to use the watchlist to
filter views and reports or to trigger alarms and correlation rules. You can change this setting on existing watchlists.
If the watchlist has less than 25,000 values, McAfee ESM validates that the old and new types are compatible and
returns an error if they aren't.
If the watchlist has more than 25,000 values, you must validate compatibility.
Note
If this is a dynamic watchlist and you select String as the source, the application does not filter the search by the
type you select. Instead, the search returns all matching strings.
• For a dynamic watchlist, the values table fills with values every time a search runs. If the watchlist has more than
25,000 values, the Values field states that there are more values than can be displayed.
• User name identifies who can access the database. For LDAP, the user name must be a fully qualified domain
name without spaces, such as:
uid=bob,ou=Users,dc=example,dc=com
or
Import/Export watchlists
Share static watchlist values with multiple McAfee ESM devices in your organization by importing and exporting the watchlists.
Verify that you have administrator privileges or belong to an access group with watchlist privileges.
Without these privileges, you cannot edit, export, or remove private watchlists or watchlists that contain strings or rules
names.
• You must have a McAfee GTI license to export watchlists that contain GTI Malicious IPs and GTI Suspicious IPs values.
Task
Note
b. Browse to the location where you want to export the watchlist file.
c. Click Confirm.
4. Import a watchlist.
a. Select Import.
b. Browse to the location of the watchlist file you want to import.
c. Click Confirm.
Task
Note
If you do not have administrator privileges, you can only assign watchlists to yourself and to groups in which you are a
member.
• To allow the user or group to use the watchlist as a filter or trigger condition, click Read.
• To allow the user or group to change the watchlist, click Write.
Note
Task
1. In the Rule Types pane of the Policy Editor, select the rule type, then select the rules that you want to have on this
watchlist.
2. Click Operations, then select the Create new watchlist option.
Note
A user with administrator privileges can assign a watchlist to anyone or any group on the system. If you do not have
administrator privileges, you can only assign watchlists to yourself and groups you are a member of.
• To import a file of values in new-line-separated values format, click Import, then select the file.
• To add individual values, type one value per line in the Values box.
Note
6. After configuring watchlists, you can append rule values to specific watchlists.
a. Select the rules you want to append to the watchlist.
b. Click Operations → Append to watchlist.
c. Select the watchlist to append the rules and click OK.
7. To receive an alarm when a generated event contains any of the values on this watchlist, click Create Alarm.
8. Click OK.
Verify that you have administrator privileges or belong to an access group with alarm management privileges.
Verify that you have administrator privileges or belong to an access group with watchlist privileges.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click Alarms, then add an alarm.
3. On the Condition tab, find the Internal Event Match → Use Watchlist option and select if a watchlist contains the values
for this alarm.
4. On the Actions tab, identify what happens to the watchlist you set as an alarm condition. You can append (add) or remove
values in that watchlist.
Note
This action requires that you identify a watchlist using the Internal Event Match condition type.
Verify that you belong to an access group with view management or view data permissions.
Verify that you have administrator privileges or belong to an access group with watchlist privileges.
Task
Respond to notifications
Respond to triggered alarms from the dashboard. You can also view system notifications.
Task
The system removes acknowledged alarms from the Notifications panel. You can still view the alarms on the
Triggered Alarms view.
• Assign alarms by clicking . Then, select the appropriate alarm and click Assignee to choose a specific person to
respond to the alarm.
• Create a case for the alarm by clicking . Then, select the appropriate alarm and click Create Case.
• Edit the triggered alarm settings by clicking the appropriate alarm. Click to change the settings.
• View details about triggered alarms by clicking . Then, do one of the following:
• To see what event triggered the alarm, click the Triggering Event tab. To view the description, double-click the
event.
• To see what condition triggered the alarm, click the Condition tab.
• To see what actions occurred as a result of the triggered alarm, click the Action tab.
Details are always gathered at the time of request. But for rules that use dynamic watchlists or other values that might change
often, set the rule to get details immediately after triggering. This reduces the chance that details are unavailable.
Task
You can set up a blacklist for individual network devices on McAfee ESM. A global blacklist only allows permanent blacklist
entries. To set up temporary entries, use the network device Blacklist option.
Each network device can use the global blacklist. The feature is disabled on all devices until you enable it.
• Blocked Sources — Matches against the source IP address of traffic passing through the device.
• Blocked Destinations — Matches against the destination IP address of traffic passing through the device.
• Exclusions — Provides immunity from being automatically added to either of the blacklists. You can add critical IP
addresses (for example, DNS and other servers or system administrators' workstations) to the exclusions, ensuring that
they are never automatically blacklisted regardless of the events they might generate.
Note
You can configure entries in both Blocked Sources and Blocked Destinations to narrow the effect of the blacklist to a
specific destination port.
• You can configure blocked source and destination entries to blacklist on all ports, or a specific port.
• Configure entries with a masked range of IP addresses with the port set to any (0) and the duration must be permanent.
• After typing an IP address or host name, the button next to that control says either Resolve or Lookup based on the
value entered. If it says Resolve, clicking it resolves the entered host name, populates the IP Address field with that
information, and moves the host name to the Description field. Otherwise, clicking Lookup performs a lookup on the IP
address and populates the Description field with the results of that lookup.
Tip
Some websites use more than one IP address, or have IP addresses that are not always the same. Don't rely on this tool
to ensure blocking of websites.
Task
1. On the system navigation tree, select System Properties, then click Global Blacklist.
2. Select the Blocked Sources, Blocked Destinations, or Exclusions tab, then manage blacklist entries.
• For Exclusions, manage the list of IP addresses that should never be blacklisted automatically, such as DNS and
other servers, or the system administrator's workstation.
• Default is zero (0), which allows any port. Type a port number if you want to narrow the effect of the blacklist to a
specific destination port.
Task
1. On the system navigation tree, select NSM Properties, click Blacklist, then select a sensor.
2. To apply the global blacklist entries to this sensor, select Include Global Blacklist.
If duplicate IP addresses exist, the global blacklist address overwrites the McAfee Network Security Manager address.
Important
Once you select this option, you can only delete items manually.
Results
This condition occurs if you remove the entry, but do not initiate the removal on McAfee ESM. You can add this entry to or delete
it from the blacklist.
Task
1. On the system navigation tree, select NSM Properties, then click Blacklist.
2. Select the removed entry on the list of blacklist entries, then click Add or Delete.
3. Click Apply or OK.
You can back up system settings for policies, SSH, network, and SNMP files to either a local or remote location.
Note
When you add devices to McAfee ESM, the system automatically enables backups for settings to occur every 7 days. You can
change the frequency and timing of automatic backups for settings or complete a manual backup at any time.
Note
You must configure and enable automatic data backup, which includes specifying NFS location details.
For FIPS mode, backups ensure that you can re-establish communication between McAfee ESM devices.
Backups are only compatible with the current version of McAfee ESM. You can't restore a previous version on an updated McAfee
ESM device.
Note
Do not rename backup files because the system can only restore backups of files that match system-generated names.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click File Maintenance.
3. Select a file type and highlight its corresponding file.
Note
To ensure that you selected the right file, click Details to review information about the file.
Primarily, you can use it if a failure requires McAfee ESM replacement. If the communication information is not exported before
the failure, communication with the device can't be re-established. This method exports and imports the .prk file.
The private key for the primary McAfee ESM is used by the secondary McAfee ESM to establish communication with the device
initially. Once communication is established, the secondary McAfee ESM copies its public key to the device's authorized keys
table. The secondary McAfee ESM then erases the private key for the primary McAfee ESM, and initiates communication with its
own public or private key pair.
Task
Note
After the expiration date passes, the person who imports the key is unable to communicate with the device until
another key is exported with a future expiration date. If you select Never Expire, the key never expires if imported
into another McAfee ESM.
e. Click OK, then select the location to save the .prk file created by the McAfee ESM.
f. Log off from the primary McAfee ESM.
2. Add a device to the secondary McAfee ESM and import the .prk file.
a. On the system navigation tree of the secondary device, select the system or group level node to which you want to
add the device.
b. From the actions toolbar, click Add Device.
c. Select the type of device that you want to add, then click Next.
d. Enter a name for the device that is unique in this group, then click Next.
e. Enter the target IP address of the device. Enter the FIPS communication port, then click Next.
f. Click Import Key, browse to the previously exported .prk file, then click Upload.
g. Type the password specified when this key was initially exported.
h. Log off from the secondary McAfee ESM.
Back up data
Back up your data (event, flow, log, and packet and string map tables) regularly to ensure that you can restore information if you
encounter a data loss.
• You cannot restore data from a backup of a previous McAfee ESM version. Backups are only compatible with the current
version of McAfee ESM.
• To allow larger backup files, use ext4 as your NFS server file system.
When you trigger a new backup (either manually or automatically), the system backs up only the data generated since the last
backup.
Note
If no previous backup exists, the system completes a full backup of your data.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. To schedule an automatic backup, select Database → Data Backup.
• Determine how often to back up data (maximum interval - two weeks). You can also set the time of day for the
backup.
Note
• Identify the remote location where you want to save the data.
Note
Do not rename backup files because the system can only restore backups of files that match system-generated names.
You cannot back up (automatic or manual) or restore data if another backup or restore is already in progress.
Restore data
If you encounter a data loss, you can restore event, flow, and log data from a previous data backup. You can also restore packet
and string table data.
• The system can only restore backups of files that match system-generated names.
• You cannot restore data from a backup of a previous McAfee ESM version. Backups are only compatible with the current
version of McAfee ESM.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Select Database → Restore Backup.
3. Specify a date range (start and end date) for the data you want to restore.
4. Identify the remote location where the backup file resides (such as, IP address, remote mount point, path, and logon
credentials).
5. Test the connection to ensure that the system can access the remote backup location.
6. Click OK.
Note
You cannot back up (automatic or manual) or restore data if another backup or restore is already in progress.
Back up settings
Back up configuration settings for policies, SSH, network, and SNMP files regularly to ensure that you can restore McAfee ESM if
you encounter a system failure.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click the ESM Management → Maintenance tab.
3. Click Settings Backup.
• Determine how often to back up settings (frequency and number of days). You can also set the time of day for the
backup.
Note
By default, McAfee ESM automatically backs up your McAfee ESM settings every 7 days. The default backup
location resides on the McAfee ESM device. To prevent oversized backup files, configure daily backups.
• Indicate where to save the backup settings: either the local McAfee ESM or a remote location.
Restore settings
If you encounter a system failure, you can restore McAfee ESM from a previous settings backup.
Backups are only compatible with the current version of the device. You can't restore from a backup of a previous version on an
updated McAfee ESM device.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click ESM Management → Maintenance → Restore Backup.
3. Select the type of restore you need to perform.
4. Select the file you want to restore or enter the information for the remote location, then click OK.
Results
Restoring a backup can take a long time, based on the size of the backup file. McAfee ESM is offline until the system completes
the full restore. During this time, McAfee ESM tries to reconnect every 5 minutes.
Task
2. On the system navigation tree, select the ELM, then click the Properties icon .
Task
1. On the system navigation tree, click the device, then click the Properties icon .
2. Click the Configuration option for the device, click Restore Config, then click Yes.
Receivers collect and normalize event and flow data into a single manageable solution, providing a single view across multiple
vendors.
High availability receivers (Receiver-HA) can be used in primary and secondary mode, acting as backups for each other. The
secondary receiver (B) monitors the primary receiver (A) continuously and new configuration or policy information is sent to both
devices. When receiver B determines that receiver A has failed, it disconnects receiver A's data source NIC from the network and
takes over as the primary. It remains primary until you manually restore receiver A as primary.
Port 135 must be opened on the system with the SMB share to enable an SMB connection.
McAfee ESM supports the following types of storage: Server Message Block/Common Internet File System (SMB/CIFS), Network
File System (NFS), and Syslog Forwarding.
SMB/CIFS and NFS store, in the form of data files, a backup of all raw data sent to the receiver by data sources that use the email,
estream, http, SNMP, SQL, syslog, and remote agent protocols. The system sends these data files to the archive every 5 minutes.
Syslog Forwarding sends raw data for syslog protocols as a continuous stream of combined syslogs to the device. Syslog
forwarding supports only UDP packets. The receiver can forward to only one type of storage at a time; you can configure all three
types, but only one type can be enabled to archive data.
Note
This feature doesn't support NetFlow, sflow, and IPFIX data source types.
Task
2. On the system navigation tree, select the device, then click the Properties icon .
• SMB/CIFS
• NFS
• Syslog Forwarding
Caution
If you are required to comply with FIPS regulations, do not use this feature. High availability Receivers are not FIPS-compliant.
Task
1. On the system navigation tree, select the receiver that is the primary high availability device, then click the Properties icon
.
2. Click Receiver Configuration, then click Interface.
3. Click the HA Receiver tab, then select Setup High Availability.
4. Fill in the information requested, then click OK.
Results
The process that keys the second receiver updates the database, applies globals.conf, and syncs the two receivers.
Ensure that McAfee ESM uses IPv6, manually or automatically (System Properties → Network settings).
Make sure you have the shared IP address, which the network administrator creates.
Task
3. Select the newly added device on the system navigation tree, then click Receiver Properties → Receiver Configuration →
Interface.
4. In the IPv6 Mode field, select Manual (the only supported mode for high availability).
5. Click Setup next to the number 1 interface, type the shared IP address in the IPv6 field, then click OK.
This address is assigned to the shared interface during high availability setup. If this isn't done, high availability doesn't fail
over properly.
6. On Receiver Properties, click Connection, enter the shared IPv6 address in Target IP Address/Name, then click OK.
7. Continue with the HA setup process.
Receivers can have multiple asset sources. If two asset discovery sources find the same asset, the discovery method with the
highest priority adds the asset it discovered to the table. If two discovery sources have the same priority, the last one that
discovers the asset takes priority over the first.
Task
1. On the system navigation tree, select Receiver Properties, then click Asset Sources.
2. Click Add, then configure the asset.
a. Select Enabled to enable the automatic retrieval functionality. If the checkbox is not selected, you can still retrieve
data from the asset source manually by clicking Retrieve. If it is selected, the system retrieves the data at the interval
specified in the Retrieve Data field.
b. Select the Type of asset source.
The remaining fields vary based on the type you select.
c. Type a Name for this asset source.
d. (Optional) Select a zone for this asset source.
e. Select the priority that you want this asset source to have if it discovers an asset at the same time as vulnerability
assessment or network discovery. The options are 1–5, 1 being the highest.
f. Type the IP address and port for your asset source.
g. Select if you want to use the TLS encryption protocol (for Active Directory) or SSL (for Altiris).
h. Type the User Name and Password required to access the asset.
i. Type the proper name for the domain controller (for example, dc=McAfee,dc=com).
j. (Altiris only) If you want to enable the proxy server, select Enable, and enter the proxy IP address, port, and
credentials.
k. If you want to retrieve data automatically, select how often to retrieve.
l. To test the connection, click Connect.
3. Click OK, then click Write on Asset Sources.
Task
1. Click the Get Events and Flows icon on the actions toolbar to pull events or flows.
3. On the system navigation tree, select the receiver, then click the Properties icon .
4. On the Receiver Properties page, click Data Sources → Auto Learn.
5. On the Auto Learn page, click Configure.
6. On the Auto Add Rule Editor page, ensure that Enable auto creation of data sources.
7. Click Add, then select the auto add rules you want the receiver to use to create data sources automatically.
8. To apply selected rules to the existing auto learned data, click Run Now.
The firewall on the Receiver opens for the time you designate, so the system can learn a set of unknown IP addresses. You can
then add to the system as data sources.
Note
Updating McAfee ESM deletes auto-learning results. Run auto-learning after updating to collect auto-learning results again.
Task
2. On the system navigation tree, select the Receiver, then click the Properties icon .
3. On the Receiver Properties page, click Data Sources → Auto Learn.
4. Configure the auto-learning settings.
a. Select the length of time you want auto-learning to occur in the appropriate hours field, then click Enable.
Note
When using auto-learning for MEF, you can't add data sources that are auto-learned using a host ID.
When the time expires, the system disables auto-learning and populates the table with found IP addresses.
b. Click Disable to stop auto learning.
5. Add auto-learned IP addresses as data sources.
a. Select IP addresses of the same type as those you want to add, then click Add.
b. On the Auto-Learned Sources page, select one of the options.
• If the selected IP addresses do not have an associated name, the system asks whether to add a prefix to the
selected addresses.
• If you click No, the IP addresses are used as the names for these data sources.
• If you click Yes, enter a prefix name and click OK. The names of these data sources include both the
name you added and the IP address.
• If the selected IP addresses have names, the system adds data sources to the list.
• Client match on type - If an existing data source matches the selected IP address, the system adds
items to the data source as match-by-type client data sources. If a data source matching the selected IP
address doesn't exist, one is created. The remaining items are added to it as match-by-type client data
sources.
• Client match on IP - Allows you to select the data source to which you want to add this IP address as a
client. Matching data sources are listed. If there aren't any, the only option available is None - create new
data source. Select the data source you want to add this IP address to as a client, then click OK.
6. To change the name of a data source, click Edit Name. Use a maximum of 50 characters and make sure the name has not
already been assigned to a data source on the list.
7. To change the type of the selected IP address, click Change Type. Change the type if the type suggested by the system is
wrong. Viewing the packet can help you determine the correct type.
• Make sure that the receiver for this data source is listed on the system navigation tree.
• Make sure that the data source was configured as described in the Data Source Configuration Reference.
Task
2. On the system navigation tree, select the Receiver, then click the Properties icon .
3. On the Receiver Properties page, click Data Sources.
A table lists existing data sources (including child and client data sources) and identifies how the data source processes
data.
Note
If SNMP Trap is selected, the data source accepts standard SNMP traps from any manageable network device with the
capability of sending SNMP traps. When McAfee ESM receives these traps, it generates an event for the data source. To
send or receive SNMP traps via IPv6, formulate the IPv6 address as an IPv4 conversion address.
b. Enter a Data Source Vendor and Data Source Model. These determine what information you enter for the data
source. Advanced syslog parser (ASP) data sources that generate data without UTF-8 encoding, select Generic as the
vendor and Advanced Syslog Parser as the model.
c. Select a Data Format to set the parsing method.
d. Select a Data Retrieval method.
Results
The data sources appear under the receiver on the navigation tree.
Cisco has defined some extensions to the SDEE standard, calling it the CIDEE standard. The McAfee Event Receiver can act as an
SDEE client requesting CIDEE data generated by Cisco intrusion prevention systems.
SDEE uses the pull model, which means the McAfee Event Receiver periodically contacts the SDEE provider and requests events
generated since the time of the last event was requested. Each time the McAfee Event Receiver requests events from the SDEE
provider, the system processes and stores those events into the McAfee Event Receiver event database, ready McAfee ESM
retrieval.
Add SDEE providers to Receivers as data sources by selecting Cisco as the vendor and iOS IPS (SDEE) as the data source model.
The McAfee Event Receiver extracts the following from SDEE/CIDEE events:
If the SDEE signature ID is 2000 and the CIDEE subsignature ID is 123, the McAfee ESM event ID would be 2000123.
• VLan
• Severity
• Event description
• Packet contents (if available).
When the McAfee Event Receiver connects to the SDEE provider for the first time, the system uses the current date and time as a
starting point for requesting events. Future connections request all events since the last successful pull.
Task
1. On the system navigation tree, select Receiver Properties for the primary Receiver, then click Receiver Configuration →
Interface → HA Receiver.
2. Verify that the correct IP address is in the Secondary Management IP field.
3. Click Reinitialize Secondary.
Task
Note
Both Receivers restart after a timeout of 5 minutes, returning the MAC addresses to their original values.
• On the system navigation tree, clickReceiver Properties, then click Receiver Configuration → Interface.
• Deselect Setup High Availability, then click OK.
• Click Yes on the warning page, then click Close.
Note
If a collector (including the McAfee ePO device) is associated with a Receiver-HA and the Receiver-HA fails over, the collector
can't communicate with the Receiver-HA until the switches between the two associates the new MAC address of the failed-
over Receiver to the shared IP address. This can take a few minutes or a few days, depending on the current network
configuration.
Task
1. On the system navigation tree, select the Receiver-HA device, then click the Properties icon .
2. Select High Availability → Fail-Over.
• McAfee ESM instructs the secondary Receiver to start using the shared data source IP address and collecting data.
• The secondary Receiver issues a Cluster Resource Manager (CRM) command to switch the shared IP address and
MAC, and starts the collectors.
• McAfee ESM pulls all alert and flow data from the primary Receiver.
• McAfee ESM selects the secondary Receiver as the primary and selects the primary Receiver as the secondary.
Task
1. On the system navigation tree, select Receiver Properties for the high availability receiver, then click Receiver
Configuration → Interface.
2. Click the HA Receiver tab, then verify that Setup High Availability is selected.
3. Verify that the IP addresses are correct, then click Reinitialize Secondary.
If a high availability receiver goes down for any reason, the writing of data sources, global settings, aggregation settings, and
others appears to fail and an SSH error appears. The settings roll out to the receiver that is still functioning, but an error
appears because it can't sync with the receiver that is down. Policy, but, does not roll out.
4. Do one of the following:
• Wait to roll out policy until a secondary receiver is available and synced.
• Remove the Receiver from HA mode, which causes two to five minutes of down time for the HA cluster during
which no events are gathered.
Task
1. On the system navigation tree, select the Receiver, then click the Properties icon .
2. Click the Receiver Management → View Statistics → Throughput tab.
3. View the statistics.
If incoming rates exceed the output rate by 15 percent, the system flags that row as either critical (in the last 24 hours) or as
a warning (in the last hour).
4. Filter the data source by selecting the All, Critical, or Warning options.
5. Select the unit of measure to display the metrics: by number of kilobytes (KBs) or number of records.
6. To refresh the data automatically every 10 seconds, select the Auto Refresh checkbox.
7. Sort data by clicking the relevant column title.
Note
The Records Behind column indicates the number of events collected but not yet parsed.
Task
2. On the system navigation tree, select the device, then click the Properties icon .
3. Assign an IP or sync devices.
• Click <device> Configuration, click ELM IP, and enter a new IP.
• If the device or the ELM has been replaced, click Sync Device. Syncing the ELM re-establishes the SSH
communication between the two devices, using the key for the new device with the previous settings.
Important
Devices do not send events to the McAfee Enterprise Log Manager until after their aggregation time periods have expired.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Configuration → Logging.
• Enable logging.
• Select the storage pool for the log data on the McAfee Enterprise Log Manager.
• If you haven't selected the McAfee Enterprise Log Manager for the log data, confirm that you want to do this.
Note
• If you have more than one McAfee Enterprise Log Manager device, identify which one to use for the log data.
• Select the IP address to communicate with the McAfee Enterprise Log Manager.
Task
1. On the system navigation tree, select System Properties, then click ESM Management.
2. Click Manage logs then select the event types you want to log.
Task
1. On the system navigation tree, click the ELM, then click the Properties icon .
2. On the ELM Properties page, click ELM Redundancy, then click Enable.
3. Type the IP address and password for the standby ELM, then click OK.
4. On the ELM Properties page, click Storage Pools, and verify that the Active tab is selected.
5. Add storage devices to the active ELM.
6. Click the Standby tab, then add storage devices that have enough combined space to match the storage on the active ELM.
7. Add one or more storage pools to each ELM.
Results
The configuration on both ELMs is now synchronized and the standby ELM maintains the synchronization of data between both
devices.
Option Definition
Enable Click, then add standby ELM data to activate ELM redundancy.
Switch ELMs Click to switch the ELMs so the standby ELM becomes the primary ELM. The system associates all
logging devices to it. Logging and configuration actions are locked during the switch-over process.
Suspend Click to suspend communication with the standby ELM if it is experiencing problems. All
communication stops and error notifications for redundancy are masked. When you bring the
standby ELM back up, click Return to Service.
Status Click to view details about the state of data synchronization between the active and standby ELM.
Option Definition
Return to service Click to return a repaired or replaced standby ELM to service. If the system brings the ELM back up
and detects no changes to the configuration files, redundancy continues as before. If the system
does detect differences, the redundancy process continues for the storage pools without problems,
and you are informed that one or more pools are out of configuration. Fix these pools manually.
If you replace or reconfigure the standby ELM, the system detects it and prompts you to rekey it. The
active ELM then syncs all configuration files to the standby ELM and the redundancy process
continues as before.
Task
1. On the system navigation tree, select the ELM, then click the Properties icon .
2. Click ELM Configuration → Migrate DB.
3. Set the space allocated to the management database.
Note
This is not a limit; it sets the amount of disk space reserved for the management database. The management database
uses space beyond this setting as needed as long as disk space is available.
4. To run the management database on an external device, select a Data Storage Device.
Note
The initial setup of an external device might take a long time depending on the database size.
Caution
Setting the compression ratio higher than the default (14:1) may result in data loss.
Task
1. On the system navigation tree, select ELM Properties, then click ELM Configuration → Compression.
2. Select the ELM compression level, then click OK.
Task
1. On the system navigation tree, select ePO Properties → Device Management, then click Enable.
2. Complete the configuration.
a. Click Manage ELM Logging to configure the default logging pool for the selected device. This option is only available if
you have anMcAfee Enterprise Log Manager (ELM) on McAfee ESM.
b. Assign the McAfee ePO to a Zone .
c. Click Manual refresh device to refresh the list of applications from your McAfee ePO device and build a client data
source for each application.
d. To enable McAfee Risk Advisor data acquisition, click Enable MRA.
e. Assign a Priority to data from this device. When multiple devices report the same data, priority determines which
data is kept.
f. To automatically refresh the list of applications from your McAfee ePO device, select the frequency from the Schedule
application refresh drop-down list.
3. Click OK.
Task
2. On the system navigation tree, select the device, then click the Properties icon .
3. Click <device> Management.
4. Select an option.
• Click View Log to see system messages, then click Download Entire File to download the data.
• Click View Statistics to see device performance statistics such as Ethernet interface, ifconfig, and iptables filter.
• Click Device Data to download a .tgz file that contains device status data.
Task
a. On the system navigation tree, select McAfee ESM, then click the Properties icon .
b. On System Properties, click System Log.
c. Set a time range and select whether to include archived partitions, then click View.
On the System Log page, you can refine your data selections or export the data to a plain text file.
3. View device logs.
a. On the system navigation tree, select the device, then click the Properties icon .
b. Click Device Log.
c. Set a time range and select whether to include archived partitions, then click View.
On the Device Log page, you can refine your data selections or export the data to a plain text file.
Task
a. On the actions toolbar, click , then select McAfee Enterprise Log Search. Click Next.
b. Enter a unique Device Name, then click Next.
c. Enter the target IP address or URL, target SSH port number, and Network Time Protocol (NTP) settings for the device.
Click Next.
d. Enter a password for this device, then click Next.
3. Set up storage.
Note
Retaining uncompressed data speeds the ELS search capabilities. But, it requires additional storage space, such as hard
drives or network storage.
Note
To search ELS log data, you must have at least one retention policy. The system sets the first retention policy created as
the default. If only one policy exists, you can change it but you cannot delete it. The ELS cannot accept data older than
six months before when you create the first retention policy.
Note
The system stores duration in days. You can set up a duration in years (365 days), quarters (90 days), or months
(30 days).
a. Select the data source device (such as a McAfee Event Receiver) and click .
b. Click Data Sources.
c. In the Logging column, choose the relevant checkbox to display the Log Data Options screen.
d. Select the retention policy you want to associate with this data source and click OK.
Task
2. On the system navigation tree, select the Receiver, then click the Properties icon .
3. Select Data Routing.
4. Check the Enable Data Routing option and click OK.
5. On the McAfee Event Receiver Properties page, select Data Sources.
6. Choose Data Routing for the data sources you want to send public, raw data to the Data Streaming Bus.
7. Configure Message Forwarding rules to include the above data sources.
Task
1. From the McAfee ESM dashboard, click and select Data Streaming Bus.
2. Click +Add.
Note
3. Right-click on the device and select Settings to add or change the device information (such as description, key
management, network interface, connection, and management).
4. Connect the Data Streaming Bus to other McAfee ESM devices.
a. Select the Data Streaming Bus.
b. Click Connect Device to see available McAfee ESM devices.
c. Select a device and click Save.
Note
Filter the device list by typing search terms in the search box.
• Configure a Data Streaming Bus device (required to share public data with third-party applications).
• Configure a McAfee Enterprise Log Search device or enable data routing for data sources on a McAfee Event Receiver.
Note
If you do not have an Enterprise Log Search device, you must enable data routing.
Task
1. From the McAfee ESM dashboard, click and select Message Forwarding.
2. Add or change rules.
Note
3. Generate and download a new authentication certificate for the rule (if needed).
Note
• ELS Raw Log — indicates the system retrieves raw data from the McAfee Enterprise Log Search device.
• Data Routing — indicates that data routing is enabled for data sources on the McAfee Event Receiver connected to
the Data Streaming Bus.
Note
If you do not have a McAfee Enterprise Log Search device, you must use this source adapter.
5. Include the authentication certificate and public names in your Apache Kafka® code to access the public data on the Data
Streaming Bus or on the McAfee Enterprise Log Search device.
Note
When McAfee Application Data Monitor detects a violation, it preserves all details of that application session for use in incident
response and forensics or for compliance audit requirements. At the same time, McAfee Application Data Monitor provides
visibility into threats that masquerade as legitimate applications.
McAfee Application Data Monitor can detect when sensitive information is transmitted inside email attachments, instant
messages, file transfers, HTTP posts, or other applications. Customize McAfee Application Data Monitor detection capabilities by
defining your own dictionaries of sensitive and confidential information. McAfee Application Data Monitor can then detect these
sensitive data types, alert appropriate personnel, and log the transgression to maintain an audit trail.
McAfee Application Data Monitor monitors, decodes, and detects anomalies in the following application protocols:
McAfee Application Data Monitor accepts rule expressions and tests them against monitored traffic, inserting records into the
database event table for each triggered rule. It stores the packet that triggered the rule in the event table's packet field. It also
adds application level metadata to the dbsession and the database query tables for every triggered rule. It stores a text
representation of the protocol stack in the query table's packet field.
McAfee Application Data Monitor can generate the following types of event:
• Metadata - McAfee Application Data Monitor generates one metadata event for each network transaction, with details
such as addresses, protocol, file type, file name. McAfee Application Data Monitor places the metadata events in the query
table and groups the events through the session table. For example, if one FTP session transfers three files, McAfee
Application Data Monitor groups them together.
• Protocol anomaly - Protocol anomalies are hard-coded into the protocol modules and include events, such as a
Transmission Control Protocol (TCP) packet being too short to contain a valid header and a Simple Mail Transfer Protocol
(SMTP) server returning an invalid response code. Protocol anomaly events are rare; McAfee Application Data Monitor
places them in the event table.
• Rule trigger - Rule expressions generate rule trigger events, detecting anomalies in the metadata generated by the
Internet Communications Engine (ICE). These events might include anomalies such as protocols used outside of normal
hours or an SMTP server unexpectedly talking FTP. Rule trigger events are rare; McAfee Application Data Monitor places
them in the event table.
The event table contains one record for each detected protocol anomaly or rule trigger event. The event records link to the
session and query tables through the sessionid, where more detail about the network transfers (metadata events) that triggered
the event is available. Each event also links to the packet table where the raw packet data for the packet that triggered the event
is available.
The session table contains one record for each group of related network transfers (such as, a group of FTP file transfers on the
same session). The session records link to the query table through the sessionid where more details about the individual
network transfers (metadata events) are found. In addition, if a transfer in the session causes a protocol anomaly or triggers a
rule, there is a link to the event table.
The query table contains one record for each metadata event (content transfers that take place on the network). The query
records link to the session table with the sessionid. If the network transfer represented by the record triggers a protocol anomaly
or rule, there is a link to the event table. There is also a link to the packet table using the text field where a textual representation
of the full protocol or content stack is found.
The default time zone is set to GMT but the McAfee Application Data Monitor code expects the device to be set to your time
zone. Set the time zone to your time zone so that rules use your time trigger not the GMT time zone.
Task
1. On the system navigation tree, select ADM Properties, then click ADM Configuration.
2. Click Time Zone, then select your time zone.
3. Click OK.
Task
1. On the system navigation tree, select ADM Properties, then click ADM Configuration.
By default, passwords do not display.
2. Click Passwords, select Enable password logging, then click OK.
Note
Place rules that will match the most packets first in the order. This reduces the average number of times a packet is parsed
and therefor reduces CPU usage.
Task
2. On the system navigation tree, select the device, then click the Properties icon .
Note
There can be up to 4 McAfee Application Data Monitor interface filters. Each filter can only be applied to one McAfee
Application Data Monitor virtual device at a time.
You can compare string terms with string and Regex literals to test their content but they can also be compared with numbers to
test their length. You can only compare numeric, IP address, and MAC address terms with the same type of literal value. The only
exception is that everything can be treated as a Boolean to test for its existence. Some terms can have multiple values, for
example the following rule would trigger for PDF files inside .zip files: type = = application/zip && type = = application/pdf.
Operators
Literals
Literal Example
MAC aa:bb:cc:dd:ee:ff
Number
= =, ! =, >, > =, <, < =
IPv4 = =, ! =
MAC = =, ! =
Bool = =, ! =
Compare against true/false, also supports implied comparison with true, for example
the following tests whether the email.bcc term occurs: email.bcc
Regex grammar
Basic operators
Alternation (or)
|
Zero or more
*
One or more
+
Zero or one
?
Grouping (a | b)
()
Any Character
.
Escape Character
\
Escapes
Digit [0–9]
\d
Non-Digit [^0-9]
\D
Escape (0x1B)
\e
White Space
\s
Tab (0x09)
\t
Word [A-Za-z0-9_]
\w
Not Word
\W
Hex Representation
\x00
Octal Representation
\0000
Escapes
Start of line
^
S End of line
Note: The start of line and end of line anchors (^ and $) don't work for objcontent.
All letters
[:alpha:]
ASCII Characters
[:ascii:]
Control characters
[:cntrl:]
Digits
[:digit:]
Visible characters
[:graph:]
Lowercase letters
[:lower:]
Uppercase characters
[:upper:]
Word characters
[:word:]
Hexadecimal Digit
[:xdigit:]
In addition, there are two extra literal types: regular expressions and lists. A term of a specific type can only be compared against
a literal of the same type or a list of literals of the same type (or a list of lists of ...).
• A string term can be compared against a numeric literal to test its length. The following rule triggers if a password is
fewer than eight characters long (password is a string term): Password < 8
• A string term can be compared against a regular expression. The following rule triggers if a password only contains
lowercase letters: Password == /^[a-z]+$/
• All terms can be tested against Boolean literals to test whether they occur at all. The following rule triggers if an email
has a CC address (email.cc is a string term): email.cc == true
IP addresses • IP address literals are written in standard dotted-quad notation, they are not enclosed in quotes:
192.168.1.1
• IP addresses can have a mask written in standard CIDR notation, there must not be any white space
between the address and the mask: 192.168.1.0/24
• IP addresses can also have masks written out in long form: 192.168.1.0/255.255.255.0
MAC •
addresses
MAC address literals are written using standard notation, as with IP addresses, they are not enclosed in
quotes: aa:bb:cc:dd:ee:ff
Numbers • All numbers in McAfee Application Data Monitor rules are 32-bit integers. They can be written in
decimal: 1234
• They can be written in hexadecimal: 0xabcd
• They can be written in octal: 0777
• They can have a multiplier appended to multiply by 1024 (K), 1048576 (M) or 1073741824 (G): 10M
Note: All email address and URL terms are normalized before matching so it is not needed to take
account of things like comments in email addresses.
Regular • Regular expression literals use the same notation as languages like JavaScript and Perl, enclosing the
expressions regular expression in forward slashes: /[a-z]+/
• Follow regular expressions with standard modifier flags, though "i" is the only one currently
recognized (case-insensitive): /[a-z]+/i
•
Use the POSIX Extended syntax for regular expression literals. Currently Perl extensions work for all
terms except the content term but this might change in future versions.
•
When comparing a term against a regular expression, the regular expression matches any substring in
the term unless anchor operators are applied in the regular expression. The following rule triggers if an
email is seen with an address of “[email protected]”: email.from == /@somewhere.com/
Lists •
List literals consist of one or more literals enclosed in square brackets and separated by commas: [1, 2,
3, 4, 5]
•
Lists might contain any kind of literal, including other lists: [192.168.1.1, [10.0.0.0/8, 172.16.128.0/24]]
•
Lists must only contain one literal, it's not valid to mix strings and numbers, strings and regular
expressions, IP addresses and MAC addresses.
•
When a list is used with any relational operator other than not-equal (!=), then the expression is true if
the term matches any literal in the list. The following rule triggers if the source IP address matches any
of the IP addresses in the list: Srcip == [192.168.1.1, 192.168.1.2, 192.168.1.3]
•
When used with the not-equal (!=) operator, the expression is true if the term doesn't match all literals in
the list. The following rule triggers if the source IP address is not 192.168.1.1 or 192.168.1.2: Srcip !=
[192.168.1.1, 192.168.1.2]
•
Lists might also be used with the other relational operators, though it doesn't make much sense. The
following rule triggers if the object size is greater than 100 or if the object size is greater than 200:
objectsize > [100, 200]
•
For Common Properties and Common Anomalies, the parameter-type value you can enter for each one is shown in parentheses
after the metric reference.
Common Properties
Object Content (String) The content of an object (text inside a document, email message, chat message).
Content matching is not available for binary data. Binary objects can, but, be
detected using Object Type (objtype)
Object Type (Number) Specifies the type of the content as determined by McAfee Application Data Monitor
(Office Documents, Messages, Videos, Audio, Images, Archives, Executables)
Object Size (Number) Size of the object. Numeric multipliers K, M, G can be added after the number (10K,
10M, 10G)
Object Source IP address The source IP address of the content. IP address can be specified as 192.168.1.1,
(Number) 192.168.1.0/24, 192.168.1.0/255.255.255.0
Object Destination IP address The destination IP address of the content. IP address can be specified as,
(Number) 192.168.1.1, 192.168.1.0/24, 192.168.1.0/255.255.255.0
Object Source Port (Number) The source TCP/UDP port of the content
Object Destination Port (Number) The destination TCP/UDP port of the content
Object Destination IPv6 Address The destination IPv6 address of the content
(Number)
Object Source MAC Address (Mac The source MAC address of the content (aa:bb:cc:dd:ee:ff)
name)
Object Destination MAC Address The destination MAC address of the content (aa:bb:cc:dd:ee:ff)
(Mac name)
Flow Source IP address (IPv4) Source IP address of the flow. IP address can be specified as 192.168.1.1,
192.168.1.0/24, 192.168.1.0/255.255.255.0
Flow Destination IP address (IPv4) Destination IP address of the flow. IP address can be specified as 192.168.1.1,
192.168.1.0/24, 192.168.1.0/255.255.255.0
Flow Source MAC Address (Mac Source MAC address of the flow
name)
Day of Week (Number) The day of the week. Valid values are 1–7; 1 is Monday.
Hour of Day (Number) The hour of the day set to GMT. Valid values are 0–23.
Declared Content Type (String) Type of the content as specified by the server. In theory, Object Type (objtype) is
always the actual type and Declared Content-type (content-type) is not trustworthy
because it can be spoofed by the server/application.
Common Anomalies
Protocol-specific properties
In addition to providing properties that are common across most protocols, McAfee Application Data Monitor also provides
protocol-specific properties that can be used with McAfee Application Data Monitor rules.
* Detection only
** No decryption, captures X.509 certificates and encrypted data
*** Via RFC822 module
Display Name
Display Name Display Name Display Name
File Name
File Name File Name File Name
Host Name
Host Name Host Name Host Name
URL
Referrer
URL
Display Name Display Name Display Name Display Name Display Name
Host Name Host Name Host Name Host Name Host Name
Protocol anomalies
Beyond the common properties and protocol-specific properties, McAfee® Application Data Monitor also detects hundreds of
anomalies in low-level, transport, and application protocols. All protocol anomaly properties are of type Boolean and are
available in the Expression Component page when you are adding a McAfee® Application Data Monitor rule.
IP address
Term Description
TCP
Term Description
Term Description
tcp.segment-outsidewindow TCP packet is outside the window (TCP module's small window, not real window).
tcp.urgent-nonzero-withouturg- flag TCP urgent field is non-zero but URG flag isn't set.
DNS
Term Description
McAfee Application Data Monitor dictionaries allow you to specify a file's keys quickly instead of having to write an individual rule
for each word. For example, set up a rule to select email with specific words, compile a dictionary with naughty words, and
import that dictionary. You can create a rule like the following to check for emails with content that includes a word in the
dictionary:
When writing rules with the McAfee Application Data Monitor rule editor, you can select the dictionary you want the rule to
reference.
Note
1. Setting up and saving a dictionary that lists the keys and, when needed, the values.
2. Managing the dictionary on the McAfee ESM.
3. Assigning the dictionary to a rule.
Keys can be IPv4, MAC, number, regular expression, and string. Value types are Boolean, IPv4, IPv6, MAC, number, and string. A
value is optional and defaults to Boolean true if not present.
Values in a single or double column dictionary must be one of the supported McAfee Application Data Monitor types: String,
Regular Expression, Number, IPv4, IPv6, or MAC. McAfee Application Data Monitor dictionaries must follow these formatting
guidelines:
127.0.0.1
1/2 of all
• Lists (multiple values separated by commas enclosed in brackets) are not allowed in dictionaries.
• A column can only consist of a single supported McAfee Application Data Monitor type. This means that different types
(string, regex, IPv4) cannot be mixed and matched in a single McAfee Application Data Monitor dictionary file.
• They can contain comments. All lines starting with the pound character (#) are considered a comment in an McAfee
Application Data Monitor dictionary.
• Names can only consist of alphanumeric characters and underscores, and be of a total length less than or equal to 20
characters.
• Lists are not supported in them.
• They must be edited or created outside of McAfee ESM with a text editor of your choice. They can be imported or
exported from McAfee ESM to facilitate changing or creating McAfee Application Data Monitor dictionaries.
Import the McAfee Application Data Monitor dictionary to the McAfee ESM.
Task
“cialis”
“Viagra”
“viagra”
“adult web”
“Adult web”
/fund[^a-z0-9]{1,3}transaction/i
/fund[^a-z0-9]{1,3}transfer[^a-z0-9]{1,3}[0–9,.]+/i
"feddedb607468465f9428a59eb5ee22a"
"ff3cb87742f9b56dfdb9a49b31c1743c"
"ff45e471aa68c9e2b6d62a82bbb6a82a"
"ff669082faf0b5b976cec8027833791c"
"ff7025e261bd09250346bc9efdfc6c7c"
192.168.2.0/24
192.168.3.0/255.255.255.0
192.168.4.32/27
192.168.5.144/255.255.255.240
“Viagra” “pharmaceutical”
“viagra” “pharmaceutical”
/fund[^a-z0-9]{1,3}transaction/i “sox”
/fund[^a-z0-9]{1,3}transfer[^a-z0-9]{1,3}[0–9,.]+/i “sox”
"feddedb607468465f9428a59eb5ee22a" “Virus”
"ff3cb87742f9b56dfdb9a49b31c1743c" “Malware”
"ff45e471aa68c9e2b6d62a82bbb6a82a" “Adware”
"ff669082faf0b5b976cec8027833791c" “trojan”
"ff7025e261bd09250346bc9efdfc6c7c" “Virus”
192.168.3.0/255.255.255.0 “LAN”
192.168.4.32/27 “DMZ”
Task
1. On the Policy Editor, click Tools, then select ADM Dictionary Manager.
Manage ADM Dictionaries lists default dictionaries (botnet, foullanguage, icd9_desc, and spamlist) and any dictionaries
that were imported to the system.
2. Perform any of the available actions, then click Close.
Note
When you delete a dictionary, any attempt to roll out a rule set with rules that reference this dictionary fails to compile.
If this dictionary is assigned to a rule, either rewrite the rule so it does not see the dictionary, or do not continue with
the deletion. If there is a discrepancy between what you selected in the Key Type and Value Type fields and what the
file contains, the system indicates invalid data.
McAfee Database Event Monitor enables you to manage, edit, and adjust database monitoring rules from the same interface that
provides analysis and reporting. You can easily adjust specific database monitoring profiles (which rules are enforced, what
transactions are logged), reducing false-positives and improving security overall.
McAfee Database Event Monitor non-intrusively audits the interactions of your users and applications with your databases by
monitoring network packets similar to intrusion detection systems. To ensure that you can monitor all database server activity
over the network, coordinate your initial McAfee Database Event Monitor deployment with your networking, security,
compliance, and database teams.
Your network teams use span ports on switches, network taps, or hubs to replicate database traffic. This process allows you to
listen to or monitor the traffic on your database servers and create an Audit Log.
Windows (all versions) Microsoft SQL Server¹ MSSQL 7, 2000, 2005, 2008, 2012
Windows, UNIX/Linux (all versions) Oracle² Oracle 8.x, 9.x, 10 g, 11 g (c), 11 g R2³
Vertica 5.1.1-0
1. Packet decryption support for Microsoft SQL Server is available in version 8.3.0 and later.
2. Packet decryption support for Oracle is available in version 8.4.0 and later.
3. Oracle 11 g is available in version 8.3.0 and later.
• Both 32-bit and 64-bit versions of operating systems and database platforms are supported.
• MySQL is supported on Windows 32-bit platforms only.
• Packet decryption is supported for MSSQL and Oracle.
Task
1. On the system navigation tree, select DEM Properties, then click DEM Configuration.
2. Click License → Update License, then paste the information sent to you by McAfee in the field.
3. Click OK.
The system updates the license and informs you when it's done.
4. Roll out the policy to the McAfee Database Event Monitor.
Task
1. On the system navigation tree, select DEM Properties, then click DEM Configuration.
2. When the McAfee Database Event Monitor device and its configuration files are out of sync, click Sync Files to write the
configuration files to the device.
3. Configure Advanced settings:
• Set the level of log detail sent from the agent to the manager: Information, Warn, and Debug.
Important
If you select Debug, the information is detailed and can consume a great deal of disk space.
• Change default agent registry and service ports used to communicate with the agent.
• Select whether to encrypt information sent from the agent to the manager. This log decrypts when it's received.
• Enter the Kerberos server IP address to retrieve user names from Kerberos protocol analysis for database
authentication using Windows-Integrated Security.
Note
You can specify multiple IP addresses, Port, and VLAN settings with the following format: IP;PORT;VLAN;IP;PORT
(for example, 10.0.0.1;88;11,10.0.0.2;88;12). IPv6 supports the same format.
• To provide better performance, increase the buffer size to process database events.
• Select where the system retrieves events. If you select File, the system reads the file on the local device and parses
those events. If you select EDB, the system collects events from the database.
• McAfee Firewall packet capture — Provides a faster way to parse database data.
• Transaction tracking — Tracks database transactions and auto reconcile changes.
• User identity tracking — Tracks user's identities when they aren't being propagated to the database because
generic user names are being used to access the database.
• Sensitive data masking — Prevents unauthorized viewing of sensitive data by replacing the sensitive information
with a generic user-defined string, called the mask.
• Local host auditing — Audits local hosts to track unknown access paths into the database and send events in real
time.
• Query parsing — Performs query inspections.
• First result row capture — Allows you to view the first result row of a query when you retrieve a packet for an event
and a Select Statement's severity has been set to less than 95.
• Bind variable support — Reuses the Oracle bind variable over and over without incurring the overhead of reparsing
the command each time it's executed.
5. Click Apply.
McAfee Database Event Monitor comes with the following default actions and operations:
• none
• ignore
• discard
• scripts
• reset
If you select Script as the operation, an alias name (SCRIPT ALIAS) is required, selecting the actual script (SCRIPT NAME) that must
be executed when the criticality event occurs. The script is passed two environment variables, ALERT_EVENT and ALERT_REASON.
ALERT_EVENT contains a colon-separated list of metrics. McAfee Database Event Monitor provides a sample bash script /home/
auditprobe/conf/sample/process_alerts.bash to show how the criticality action can be captured in a script.
Task
1. On the system navigation tree, click the Policy Editor icon , then click Tools → DEM Action Manager.
DEM existing actions appear in order of priority.
Note
You can't change the priority order of default actions. The default operation for a custom action is None.
2. Click Add, then enter a name and description for this action.
You can't delete a custom action once it's added.
3. Click OK.
Task
1. On the system navigation tree, click the Policy Editor icon , then click Tools → DEM Action Manager.
2. Click the custom action to change and do one of the following:
• To change the priority order, click the up or down arrows until it is in the correct position.
• To change the name or description, click Edit.
Task
1. On the system navigation tree, select DEM Properties, then click Action Management.
2. Highlight the action, then click Edit.
Note
You can't delete a custom action or change the priority order of default actions.
• None — Do nothing
• Ignore — Keep the event in the database, but don't display it
• Discard — Remove the event from the database or do not display
• Script — Execute a defined script
Note
If no scripts appear on the drop-down list, click Script Name to select a script file.
• Reset — Attempt to break the database connection by sending TCP RST packets to the client and server
4. Click OK.
Application
The name that identifies the database type to which the MSSQL, Oracle, DB2, Sybase,
Name
rule applies. MySQL, Informix, PIServer,
InterSystems Cache
Client PID Process ID assigned by the operating system to the client MSSQL, DB2, Sybase, MySQL
process.
Command Name Name of the MySQL command. MSSQL, Oracle, DB2, Sybase,
Informix
Command Type
Type of MySQL command: DDL, DML, Show or Replication. MSSQL, Oracle, DB2, Sybase,
MySQL, Informix, PostgreSQL,
Teradata, PIServer, InterSystems
Cache
Network Time
Time taken to send the result set back to the client MSSQL, Oracle, DB2, Sybase,
(response_time - server_response_time). MySQL, Informix, PostgreSQL,
NT Domain Name Windows domain name from which user logged in. MSSQL
Object Name
MSSQL, Oracle, DB2, Sybase,
MySQL, Informix
Password
MSSQL, Oracle, DB2, Sybase,
MySQL, Informix, PostgreSQL,
InterSystems Cache
Password Length
MSSQL, Oracle, DB2, Sybase,
MySQL, Informix, PostgreSQL,
InterSystems Cache
Query Number
A unique number assigned to each query by the MSSQL, Oracle, DB2, Sybase,
AuditProbe monitoring agent starting with zero for the first MySQL, PostgreSQL, Teradata,
query and incrementing by one. PIServer, InterSystems Cache
Response
MSSQL, Oracle, DB2, Sybase,
Content
MySQL, Informix
Return Rows Number of rows in the return result set. MSSQL, Oracle, DB2, Sybase,
MySQL, Informix, PostgreSQL,
Security DB2
The security mechanism that is used to validate the user's
Mechanism
identity (for example, User ID and password).
Server Name
This is the name of the server. The host name is assigned MSSQL, Oracle, DB2, Sybase,
as the server name by default. Informix, PIServer, InterSystems
Cache
Server Response
Initial response from the database server to the client MSSQL, Oracle, DB2, Sybase,
Time
query. MySQL, Informix, PostgreSQL,
Teradata, PIServer, InterSystems
Cache
Severity Code
DB2
Create McAfee® Database Event Monitor rules using logical and regular expressions for pattern matching to monitor database
or application messages with virtually no false positives. The normalized data (metrics) vary for each application because some
application protocols and messages are richer than others. Craft filter expressions carefully, not only the syntax but also by
making sure that the system supports the metric.
McAfee® Database Event Monitor contains the default rules (listed below).
Default compliance rules monitor significant database events such as logon/logoff, DBA-type activity such as DDL changes,
suspicious activity, and database attacks typically required to achieve compliance requirements. Enable or disable each default
rule and set the value of each rule's user-definable parameters.
Database
Default rules for each supported database type and common regulations, such as SOX, PCI, HIPAA, and
FISMA.
Enable or disable the default rules and set user-definable parameters for each rule.
Application protocols and messages vary, which means normalized data (metrics) can vary for each
application.
Rules can include both Logical and Regular Expression operators. A Rule Expression can be applied
against one or more metrics available for the application.
Data access
Rules that rack unknown access paths into the database and send alerts in real time.
Create data access rules to track common violations in database environments, such as application
developers accessing production systems using application logon IDs.
Discovery
Rules that identify an exception list of database servers, of the types supported by McAfee ESM, that are
on the network but are not being monitored.
Discovery rules allow security administrators to discover new database servers added to the environment
and illegal listener ports opened to access data from databases. Discovery rules are out-of-box rules,
which you cannot add or edit. When you enable the discovery option on database servers, the system
uses these rules to search for database servers that are on the network, but are not listed under the
McAfee® Database Event Monitor device.
Transaction
Rules that track database transactions and auto-reconcile changes.
tracking
For example, use these rules to automate tracking and reconciling database changes with authorized
work orders in your change ticketing system.
For example:
The DBA executes the start tag stored procedure (spChangeControlStart in this example) in the database
performing the work before actually beginning the authorized work. Transaction tracking allows the DBA
to include up to 3 optional string parameters as arguments to the tag in the correct sequence:
1. ID
2. Name or DBA Initials
3. Comment
When the system observes the execution of the spChangeControlStart procedure, it logs both the
transaction and parameters (ID, Name, Comment) as special information.
Once the work completes, the DBA executes the end tag stored procedure (spChangeControlEnd) and
optionally includes one ID parameter, which must be the same as the ID in the begin tag. When the
system observes the end tag (and ID), it can associate all activity between the start tag (which has the
same ID) and end tag as a special transaction. You can report by transactions and search by ID, which
could be the change control number.
Use transaction tracking to log start and end of a trade execution or begin and commit statements to
report by transactions instead of queries.
Task
1. In the Rule Types pane on the Policy Editor, select DEM → Data Access.
2. Do one of the following:
Expression: ((4\d{3})|(5[1–5]\d{2})|(6011))-?\d{4}-?\d{4}-?\d{4}|3[4,7]\d{13}
Substring Index: \0
Expression: (\d\d\d-\d\d)-\d\d\d\d
Substring Index: \1
Expression: create\s+user\s+(\w+)\s+identified\s+by\s+(\w+)
Substring Index: \2
Task
1. On the system navigation tree, select DEM Properties, then click Sensitive Data Masks.
2. Select an option, then enter the requested information.
Note
Options are added based on the number of braces ( ) used in the expression. If you have one set of braces, your
options are \0 and \1. If you select \0, the whole string is replaced with the mask. If you select \1, only the strings
are replaced by the mask.
• Type the masking pattern that must appear in place of the original value.
3. Click OK, then click Write to add the settings to the DEM.
When you add a DEM device, the system adds defined identifier rules to the McAfee ESM database.
Expression: select\s+username=(\w+)
Application: Oracle
Substring Index: \1
Application: MSSQL
Substring Index: \2
Note
Advanced user correlation is possible by correlating the DEM, application, web server, system, and identity and access
management logons to McAfee ESM.
Task
1. On the system navigation tree, select DEM Properties, then click Identifier Management.
Note
The REGEX operator implements the PCRE library for pattern matching using the same semantics as Perl 5. The
general syntax is: <"metric name"> REGEX <"pattern">.
Note
Options are added based on the number of braces () used in the expression. If you have one set of braces, your
options are: \0 and \1.
3. Click OK, then click Write to write the settings to the DEM.
McAfee Database Event Monitor currently supports the following database servers and versions.
Windows (all versions) Microsoft SQL Server¹ MSSQL 7, 2000, 2005, 2008, 2012
Vertica 5.1.1-0
1. Packet decryption support for Microsoft SQL Server is available in versions 8.3.0 and later.
2. Packet decryption support for Oracle is available in versions 8.4.0 and later.
3. Oracle 11 g is available in version 8.3.0 and later.
4. Informix support is available in versions 8.4.0 and later.
Note
• Both 32-bit and 64-bit versions of operating system and database platforms are supported.
• MySQL is supported on Windows 32-bit platforms only.
• Packet decryption is supported for MSSQL and Oracle.
Task
1. On the system navigation tree, select DEM Properties, then click Database Servers.
2. Select any of the available options.
• Select if you want the McAfee Database Event Monitor to process data for this database server. If disabled, the
system saves the configuration settings on the McAfee ESM for later use.
• Select a storage pool if you want the data received sent to the McAfee Enterprise Log Manager.
• Select the database server's assigned zone.
• Select the database type. The remaining fields vary, based on what you select in this field.
Note
The McAfee Database Event Monitor implements PI JDBC Driver to connect to the PI System. PI SQL Data Access
Server (DAS) serves as a gateway between PI JDBC Driver and PI OLEDB. It provides secure network communication
(https) to PI JDBC and executes queries as a PI OLEDB consumer (client).
Note
If you selected PIServer in the Database Type field, this field is DAS Datasource Name, which is the name of the
PIServer accessed by the Data Access Server (DAS) gateway. It must be exactly as specified in the DAS
configuration. It can be the same as the DAS host name if the DAS server is installed on the same host as the
PIServer.
• Type the URL address where you can view database server information. If the URL address you entered includes the
• Port Redirection must be specified when you are monitoring an Oracle server running on a Windows
platform.
• Server Uses Named Pipes must be selected if the database server uses the Named Pipes SMB protocol. The
default pipe name for MSSQL is \\.\pipe\sql\query and the default port is 445.
• Dynamic Ports must be selected if the database server has TCP Dynamic Ports enabled. Enter a port number
for the database server or DAS in the Port field. The port is the service port of the database server where it is
listening for connections. Common default port numbers are: 1433 for Microsoft SQL Server (MSSQL), 1521 for
Oracle, 3306 for MySQL, 5461 for Data Access Server (DAS), and 50000 for DB2/UDB.
Note
McAfee ESM accepts only RSA certificates of .pem file format without a password.
• Type the user name for PI DAS logon. Because PI DAS is installed on Windows, it uses Windows-integrated security.
The user name must be specified as domain\login.
3. Click OK.
Task
1. On the system navigation tree, select DEM Properties, then click Database Servers → Enable.
2. Click OK to close DEM Properties .
3. To view the notifications, click the DEM device on the system navigation tree, then select Event Views → Event Analysis.
4. To add the server to your system, select the Event Analysis view, then click the Menu icon and select Add Server.
You must associate McAfee ePO with the McAfee Event Receiver because the events are pulled from the McAfee Event Receiver,
not McAfee ePO.
Note
You must have read permissions on the master database and McAfee ePO database to use McAfee ePO.
If the McAfee ePO device has a McAfee® Threat Intelligence Exchange (TIE) server, the system adds it automatically when you
add the McAfee ePO device to McAfee ESM.
Task
• If you only have one McAfee ePO device or data source on the system and selected a source IP address or
destination IP address, McAfee ePO starts.
• If you have multiple McAfee ePO devices or data sources on the system, select the one you want to access and
McAfee ePO starts.
Task
1. On the system navigation tree, select ePO Properties, then click Tagging.
2. Complete the requested information, then click Assign.
• Type a host name or IP address (supports comma-delimited list), then select one or more tags on the Tags list.
• Select to wake up the application to apply the tags immediately.
• Click Assign to apply the selected tags to the IP address.
• Single global account — If you belong to a group that has access to a McAfee ePO device, you can use these features
after entering the global credentials.
• Separate account for each device per user — You need privileges to view the device in the device tree.
When you use actions or tags, use the selected method of authentication. The system prompts you for valid credentials, which
you must save for future communication with the device.
1. Verify that Require user authentication is selected when adding the McAfee ePO device to McAfee ESM or when you set
up its connection settings.
2. Enter your credentials.
The database query results in an IP versus reputation score list, and constant values for the low reputation and high reputation
values are provided. The system merges all McAfee ePO and McAfee Risk Advisor; duplicate IPs receive the highest score. The
system sends the merged list, with low and high values, to any McAfee Advanced Correlation Engine (ACE) devices used for
scoring SrcIP and DstIP fields.
When you add McAfee ePO, the system prompts whether you want to configure McAfee Risk Advisor data. If you click Yes, the
system creates and rolls out a data enrichment source and two ACE scoring rules (if applicable). If you want to use the scoring
rules, you must create a risk correlation manager.
When you add a McAfee ePO device to McAfee ESM, the system automatically detects if a Threat Intelligence Exchange server is
connected to the device. If it is, McAfee ESM starts listening in on the DXL and logging events.
Note
When the system detects aThreat Intelligence Exchange server, they system adds Threat Intelligence Exchange watchlists, data
enrichment, and correlation rules automatically and enables Threat Intelligence Exchange alarms. You receive a visual
notification, which includes a link to a summary of changes. The system also notifies you if the Threat Intelligence Exchange
server is added to the McAfee ePO server after the device is added to McAfee ESM.
Once Threat Intelligence Exchange generates events, you can view their execution history and select the actions to take on the
malicious data.
Correlation rules
The system optimizes correlation rules for Threat Intelligence Exchange data. They generate events that you can search and sort
through.
• Threat Intelligence Exchange — McAfee GTI reputation changed from clean to dirty
• Threat Intelligence Exchange — Malicious file (SHA-1) found on increasing number of hosts
• Threat Intelligence Exchange — Malicious file name found on increasing number of hosts
• Threat Intelligence Exchange — Multiple malicious files found on single host
• Threat Intelligence Exchange — Threat Intelligence Exchange reputation changed from clean to dirty
• Threat Intelligence Exchange — Increase in malicious files found across all hosts
Alarms
McAfee ESM has two alarms that might trigger when the system detects important Threat Intelligence Exchange events.
• TIE bad file threshold exceeded triggers from the correlation rule TIE - Malicious file (SHA-1) found on increasing
number of hosts.
• TIE unknown file executed triggers from a specific Threat Intelligence Exchange event and adds information to the TIE
data source IPs watchlist.
Watchlist
The TIE data source IPs watchlist maintains a list of systems that have triggered the TIE unknown file executed alarm. It is a
static watchlist without expiration.
• Create a watchlist.
• Append the information to a watchlist.
• Create an alarm.
• Add the information to a blacklist.
• Export the information to a .csv file.
Task
1. On the system navigation tree, click the McAfee ePolicy Orchestrator device.
2. On the views drop-down list, select Event Views → Event Analysis, then click the event.
Compare traffic patterns against rule sets. For example, set up virtual devices to look at web traffic ports and set up
policoes where you can enable or disable different rules.
• Reporting. Using it in this manner is like having an automatic filter set up.
• Monitor multiple paths of traffic at once. By using a virtual device, you can have separate policies for each path of traffic
and sort different traffic into different policies.
The number of virtual devices that you can add to an McAfee Application Data Monitor varies by the model.
For a packet to match a selection rule, all filter criteria defined by that rule must be matched. If the packet’s information matches
all filter criteria for a single selection rule, the virtual device that contains the matching selection rule processes it. Otherwise, it is
passed on to the next virtual device in order. The McAfee Application Data Monitor itself then processes it, as a default, if no
selection rules are matched on any virtual devices.
• The system sorts all packets for a single connection based only on the first packet in the connection. If the first packet in
a connection matches a selection rule for the third virtual device in the list, all subsequent packets in that connection go to
the third virtual device. This happens even if the packets match a virtual device that is higher in the list.
• The system sorts invalid packets (a packet that is not setting up a connection or part of an established connection) to the
base device. For example, you have a virtual device that looks for packets with a source or destination port of 80. When an
invalid packet comes through with a port of 80, the system sorts it to the base device instead of the virtual device that looks
for port 80 traffic. So, you see events in the base device that look like they should have gone to a virtual device.
The order that the system lists selection rules matters, because the first time a packet matches a rule, the system automatically
routes that packet to that virtual device for processing. For example, you add 4 selection rules and the fourth one in order is the
filter that triggers most often. This means each packet must pass over the other filters for this virtual device before getting to the
most commonly triggered selection rule. To enhance the efficiency of the processing, make the most commonly triggered filter
first in order, instead of last.
Verify that your McAfee Application Data Monitor devices support virtual devices.
Task
1. On the system navigation tree, select a McAfee Application Data Monitor device, then click the Properties icon .
2. Click Virtual Devices → Add.
3. Enter the information requested, then click OK:
• Name the virtual device and enter the URL address where you can view this virtual device's information, if you have
one set up. Click the Variables icon if you need to add a variable to the address.
• Enable the device.
• If an ELM exists on your system and you want log data received by this virtual device on the ELM, select the storage
pool.
• If zones exist, select the zone for this device.
• Define and determine the order of selection rules for the device.
McAfee ESM sends alarm notifications using the SNMP v1 protocol. SNMP uses User Datagram Protocol (UDP) as the transport
protocol for passing data between managers and agents.
In an SNMP setup, agents, such as McAfee ESM, forward events to SNMP servers (referred to as Network Management Station
[NMS]), using packets of data known as traps. Other agents in the network can receive event reports the same way they receive
notifications. Due to size limitations of SNMP trap packets, McAfee ESM sends each report line in a separate trap.
Syslog can also send CSV reports generated by McAfee ESM. Syslog sends query CSV reports one line per syslog message, with
the data of each line of the query results arranged in comma-separated fields.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Email Settings:
Task
1. On the system navigation tree, select System Properties, then click Email Settings.
2. Click Configure Recipients, then select the tab you want to add them to.
3. Click Add, then add the requested information.
4. Click OK.
Task
1. On the system navigation tree, click the system, then click the Properties icon .
2. Click Email Settings, then click Configure Recipients → Email Groups.
3. Click Add, Edit, or Remove to manage the list of recipients groups.
4. Provide the information requested, then click OK.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Custom Settings → Remedy.
4. Enter Remedy information: host name, port number, whether to use TLS as the encryption protocol, Remedy credentials,
and email addresses for Remedy senders and recipients.
Management interface
Alternately, network administrators can configure a management interfaces with IP addresses for communication between
McAfee ESM and the device. These device features require the use of a management interface:
Devices equipped with at least one management interface gives the device an IP address. With an IP address, McAfee ESM can
access devices directly without directing communication toward another target IP address or host name.
Important
Do not attach the management network interface to a public network because it's visible to the public network and its
security could be compromised.
To disable NIC bonding, change the IP address of one of the interfaces so that it no longer matches the other. The system then
automatically disables bonded NIC mode.
Task
1. On the system navigation tree, select a device, then click the Properties icon .
2. Click the device's Configuration → Interface option.
• Set bypass NIC so that the device passes all traffic, even if it is malicious. Devices in IDS mode do not have bypass
capabilities, so their status is Normal Operation.
• (Optional) Select to collect flows for traffic sent to and from the device.
• If you have ELM SFTP Access user permission, you can view and download McAfee Enterprise Log Manager log files
stored for the devices. If you have Device Management permission, you can change the port to access these files in
the ELM EDS SFTP field.
Note
Use this setting with one of the following FTP clients: WinSCP 5.11, Filezilla, CoreFTP LE, or FireFTP. Do not use
these ports: 1, 22, 111, 161, 695, 1333, 1334, 10617, or 13666.
• Type IP addresses, owned by your organization (HOME_NET), that determine the direction of the flow traffic that the
device collects.
• Select the interfaces to be used and enter the IP addresses for the IPv4 or IPv6 type. If you enter an IPv4 address,
add the netmask address as well. If you enter an IPv6 address, include the netmask in the address or you receive an
error.
• To allow the device to be used from multiple networks (limited to MGT 1 <primary interface> and MGT 2 <first
drop-down interface> only), add more interfaces.
• To activate NIC bonding, select Management in the first field, then type the same IP address and netmask as
the main NIC (first line on this dialog box).
• Off — IPv6 mode is not enabled. The IPv6 fields are disabled.
• Auto — IPv6 mode is enabled. Each host determines its address from the contents of received user
advertisements. It uses the IEEE EUI-64 standard to define the network ID part of the address. The IPv6 fields are
disabled.
• Manual — IPv6 mode is enabled. The IPv6 fields are enabled.
• Select the port through which the system allows access between McAfee ESM and the devices.
Note
All changes are pushed to the device and take effect immediately. Upon applying changes, the device reinitializes,
causing all current sessions to be lost.
4. Define the advanced network settings for the selected device (fields vary based on the selected device).
• To manage McAfee ESM devices remotely through an IPMI card when an IPMI NIC is plugged into a switch, add the
IPMI settings.
Task
1. On the system navigation tree, select a device, click the Properties icon , then click device Configuration.
2. In the Interfaces section of the Network tab, click Setup, then click Advanced.
3. Click Add VLAN, enter the information requested, then click OK.
Caution
If you are using a redundant McAfee Enterprise Log Manager, redundancy stops working if the IP address of the
redundant device is changed.
• IPv4 is selected by default. If you have IPv6, set Network Settings to Manual or Auto. The IPv6 option is enabled.
• Identify the VLAN IP address.
• Identify the IPv4 netmask (disabled if the IP address is in IPv6 format).
4. Select the VLAN where you want to add the alias, then click Add Alias.
Note
The system prepopulates VLAN with the number of the VLAN this alias is being added to. If it is the Untagged
VLAN, this number is 0.
5. Click OK.
Task
1. On the system navigation tree, select a device, then click the Properties icon .
2. Click Configuration → Interfaces.
3. Next to the Static Routes table, click Add.
4. Enter the information, then click OK.
Task
2. On the system navigation tree, select the device, then click the Properties icon .
3. Click Clustering.
4. Select a shard and click the Settings tab.
5. Main tab:
Note
McAfee ESM and devices use a FIPS capable version of SSH. SSH clients OpenSSH, Putty, dropbear, Cygwin ssh,
WinSCP, and TeraTerm have been tested and are known to work. For Putty, go to http://
www.chiark.greenend.org.uk/~sgtatham/putty/download.html.
• If you have enabled SSH connections, the systems listed can communicate through the SSH port. Deleting a system
ID from the list disables communication.
• IPv6 Settings:
6. On the Advanced tab, set up Internet Control Message Protocol (ICMP) messages and the Intelligent Platform Management
Interface (IPMI)
• ICMP Messages
• IPMI Settings- Set the IPMI card to manage McAfee ESM devices if you have an IPMI NIC plugged into a switch.
7. If your network uses a proxy server, set up the connection to your McAfee ESM on the Proxy tab.
• On devices, if you have an interface that is using an IPv6 address, you can select IPv6. If not, IPv4 is selected.
• Specify information required to connect to the proxy server: IP address, port, user name, and password.
• Select basic authentication checking.
8. On the Traffic tab, configure the maximum data output value for a network and mask to control the rate at which
outbound traffic is sent.
9. On the Static Routes tab, configure static routes: IPv4 or IPv6 traffic, network IP address, network mask, and gateway IP
address.
A static route specifies how to reach a host or network not available through the default gateway. When you add a static
route, the change is pushed to the McAfee ESM and immediately takes effect when you click Apply. Upon applying changes,
McAfee ESM reinitializes itself, causing all current sessions to be lost.
Caution
Task
1. On the system navigation tree, select the system, then click the Properties icon .
2. Click Network Settings, then click the Traffic tab.
3. To add controls for a device, click Add, enter the network address and mask, set the rate in kilobits (KB), megabits
(megabyte), or gigabits (GB), then select the rate per second for sending traffic, then click OK.
Note
If you set the mask to zero (0), all data sent is controlled.
4. Click Apply.
• Plug the IPMI Network interface controller (NIC) into a switch so that it is available to IPMI software.
• Access an IPMI-based Kernel-based Virtual Machine (KVM).
• Set the IPMI password for the default user.
• Access IPMI commands like turn on and power status.
• Reset the IPMI card.
• Perform a warm and cold reset.
Task
1. On the system navigation tree, select the system or any of the devices, then click the System Properties icon .
2. Access the Network Settings Advanced tab.
3. Select Enable IPMI Settings, then type the VLAN, IP address, netmask, and gateway for the IPMI.
Note
If Enable IPMI Settings is grayed out on device BIOS, you must update the system BIOS. SSH to the device and open
the /etc/areca/system_bios_update/Contents-README.txt file.
Note
When upgrading your device, a message might recommend that you change the password or rekey the device to
configure the IPMI.
Caution
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Network Settings, then select the Traffic tab.
The table lists the existing controls.
4. Add controls for a device.
a. Click Add.
b. Set the network address, mask, and throughput rate.
Note
If you set the mask to zero (0), all data sent is controlled.
When you view event data, you can show the host names associated with the IP addresses in the event by clicking the Show host
If existing events are not tagged with a host name, the system searches the host table on McAfee ESM and tags the IP addresses
with their host names. If the IP addresses don't appear on the host table, the system performs a Domain Name System (DNS)
lookup to locate the host names. The search results then show up in the view and are added to the host table.
On the host table, this data is selected as Auto Learned and expires after the time designated in the Entries expire after field
located below the host table on System Properties → Hosts. If the data has expired, another DNS lookup is performed the next
time you select Show host names on a view.
The host table lists auto-learned and added host names and their IP addresses. You can add information to the host table
manually by entering an IP address and host name individually or by importing a tab-delimited list of IP addresses and host
names. The more data you enter in this manner, the less time is spent on DNS lookups. If you enter a host name manually, it
doesn't expire, but you can edit or remove it.
Task
1. On the system navigation tree, select System Properties, then click Hosts.
2. Select an option and enter the information requested.
• When adding a host, you can enter a host name up to 100 characters long and IP addresses in valid IPv4 or IPv6
notation including a mask.
• Change or delete existing host names.
• When setting up information for an internal network, you can look up the host name for an IP address.
• Import a tab-delimited list of IP addresses and host names.
• Set the amount of time you want auto-learned host names to remain in the table. If you don't want them to expire,
select zero (0) in all fields.
Each record in the file must be listed on a separate line, with the IP address first in IPv4 or IPv6 notation. For example:
102.54.94.97 rhino.acme.com
08c8:e6ff:0100::02ff x.acme.com
Task
1. On the system navigation tree, select System Properties, then click Hosts → Import.
2. Browse to the text file, then click Upload. If the file contains IP addresses that are currently on the host table with a
different host name, the Duplicates page lists the records that are duplicates.
• To change the host name on the table to the one in the text file, select it in the Use column, then click OK.
• To keep the existing host data, don't select the checkbox, then click OK.
Note
Data that is entered manually does not expire. The system adds the new host data to the host table. The Auto
Learned column for this data says No.
When you set up McAfee ESM to deploy in the cloud, the system enables DHCP enabled automatically and assigns an IP address.
When not in the cloud, you can enable and disable DHCP services on McAfee ESM, non-HA Receiver, ACE, and ELM if you have
Device Management privileges. This helps if you need to reset the IP addresses for your network.
Note
Task
1. On the system navigation tree, select the device, then click the Properties icon .
2. Do one of the following:
• For McAfee ESM, click Network Settings, then click the Main tab.
• For a device, select the device's Configuration option, click Interfaces, then click the Network tab.
For devices other than Receivers, you must restart the McAfee ESM server.
4. Click Add VLAN, type the VLAN number, then select DHCP.
5. Click OK then click Apply.
For devices other than Receivers, you must restart the McAfee ESM server.
To pull Layer 7 information from the NSM, you can delay when the event is pulled so that Layer 7 data is included. This delay
applies to all NSM events, not only the ones with associated Layer 7 data.
You can set this delay when performing three different actions related to the NSM:
• Raise an event's severity based on the endpoint's known vulnerability to that event.
• Set the system to automatically learn assets and their attributes (operating system and services detected).
• Create and manipulate the membership of user-defined asset groups.
• Access summary and drill-down information of the network assets.
• Change Policy Editor configuration, such as turn on MySQL signatures if an asset is discovered running MySQL.
Note
If you create a view that includes the total number of vulnerabilities, count, or dial component, you might see an inflated
count of vulnerabilities. This is because the McAfee Threat Intelligence Services (MTIS) feed is adding threats based on the
original vulnerability that the VA source reported.
McAfee maintains rules that map McAfee sigIDs to VINs to references to a Common Vulnerabilities and Exposure (CVE) ID,
BugTraq ID, Open Source Vulnerability Database (OSVDB) ID, or Secunia ID. These vendors report CVE and BugTraq IDs in their
vulnerabilities.
Changing these settings doesn't affect the device itself. It only affects the way the device communicates with McAfee ESM.
Task
1. On the system navigation tree, select MVM Properties, then click Connection.
2. Fill in the information requested, then click OK.
Option Definition
Associated Receiver Select the Receiver associated with this McAfee Vulnerability Manager. To view
the details about this Receiver, click the link.
Enter the database login Type the parameters as requested. Domain is optional.
parameters below
Enter the website UI Type the web credentials. The firewall on the database and web application must
credentials below allow ports for McAfee ESM to connect.
Upload MVM server certificate Enter the McAfee Vulnerability Manager credentials, then click Upload to
and enter passphrase navigate to the .zip file.
Task
1. On the server that is running Foundstone Certificate Manager, run Foundstone Certificate Manager.exe.
2. Click the Create SSL Certificates tab.
3. In the Host Address field, type the host name or IP address for the system hosting the web interface for McAfee
Vulnerability Manager, then click Resolve.
4. Click Create Certificate using Common Name to generate the passphrase and a .zip file.
5. Upload the .zip file and copy the passphrase that was generated.
Task
1. On the system navigation tree, select MVM Properties, then click Scans.
2. Click New Scan.
3. Click OK.
Task
1. On the system navigation tree, select a DEM or Receiver device, then click the Properties icon .
2. Click Vulnerability Assessment → Add.
3. In the VA source type field, select eEye REM.
4. Click Use System Profile.
5. Click Add, then select Vulnerability Assessment in the Profile Type field.
6. In the Profile Agent field, select the SNMP version for this profile.
The fields on the page are activated based on the version selected.
7. Fill in the requested information, then click OK.
Note
Configure VA sources
To communicate with vulnerability assessment (VA) sources, add them to the system, add communication parameters for the VA
vendor, schedule parameters for how often data is retrieved, and change severity calculations.
Task
1. On the system navigation tree, select a McAfee Event Receiver or McAfee Database Event Monitor, then click the Properties
icon .
2. Click Vulnerability Assessment.
• Type the Frontline client ID number. Digital Defense Frontline requires Client ID.
• On FusionVM, the name of the company that must be scanned. If you leave company name blank, the system scans
all companies to which the user belongs. Separate multiple company names with commas.
• (Qualys QualysGuard) Select the method to retrieve the VA data. HTTP/HTTPS is the default. Options include: SCP,
FTP, NFS, CIFS, and Manual upload.
Note
A Qualys QualysGuard log file manual upload has a file size limit of 2 GB.
• Type the domain of the Windows system (optional, unless your domain controller or server exists in a domain).
• Identify the directory where exported scan files reside.
• Identify the exported scan file format (XML, NBE).
• Identify the location where Saint was installed on the server. The installation directory for a Saint appliance scanner
is
/usr/local/sm/
• Identify IP addresses:
• eEye REM — IP address of the eEye server that sends trap information
• eEye Retina — IP address of the client holding exported scan files (.rtd)
• Nessus, OpenVAS, LanGuard, and Rapid7 Metasploit Pro — IP address of the client holding exported scan files
• NGS — IP address of the system storing the Squirrel reports
• Rapid7, Lumension, nCircle, and Saint — IP address of the respective server
• Identify the method used to retrieve exported scan files (SCP, FTP, NFS, or CIFS mount). LanGuard always uses
CIFS.
• If you select nfs in the Method field, the system adds Mount Directory fields. Enter the mount directory set when
you configured nfs.
• Identify passwords:
• Nessus, OpenVAS, LanGuard, and Rapid7 Metasploit Pro — The password of SCP or FTP.
• NGS — The password for the SCP and FTP methods.
• Qualys and FusionVM — The password for the Qualys Front Office or FusionVM user name.
• Rapid7 Nexpose, Lumension, nCircle, and Saint — The password to use when connecting to the web server.
• Digital Defense Frontline — The web interface password.
• Identify the port Rapid7 Nexpose, Lumension, nCircle, or Saint web server are listening on. The default for Rapid7
Nexpose is 3780, for Lumension is 205, for nCircle is 443, and for Saint is 22.
• Identify the name of a particular project or workspace, or leave it blank to grab all projects or work spaces.
• Identify the proxy IP address, user name, password for the proxy user name, and the port on which the HTTP proxy
is listening.
• Type the URL of the Qualys or FusionVM server to query.
• Identify the remote path and share name for CIFS method Nessus, OpenVAS, eEye Retina, Metasploit Pro,
LanGuard, and NGS.
You can use back or forward slashes in the path name (for example,
Program Files\CIFS\va
or
/Program Files/CIFS/va)
• Indicate the frequency to retrieve VA data from the McAfee Event Receiver or McAfee Database Event Monitor:
• Daily — Select the time you want the data retrieved each day.
• Weekly — Select the day of the week and the time on that day you want the data retrieved.
• Monthly — Select the day of the month and the time on that day that you want the data retrieved.
If you do not want the data retrieved at a preset time, select Disabled.
Note
eEye REM does not support data retrieval from the source so the data must be retrieved from the McAfee Event
Receiver or McAfee Database Event Monitor.
Note
SNMP authentication and privacy fields become active based on the security level you select. Make sure that your
REM Events Server configuration matches your selection.
• Nessus, OpenVAS, and Rapid7 Metasploit Pro — User name of SCP or FTP
• NGS — User name for the SCP and FTP methods
• Qualys or FusionVM — Front Office or FusionVM user name with which to authenticate
• Rapid7 Nexpose, Lumension, nCircle, and Saint — User name when connecting to the web server
• Digital Defense Frontline — Web interface user name
Note
If you have both NBE and XML files, specify if you want NBE or XML files in this field (for example, *.NBE or *.XML).
If you only use an asterisk (*), you get an error.
Retrieve VA data
You can retrieve scheduled or immediate vulnerability assessment (VA) data from a data source. eEye REM data retrieval cannot
be immediate; it must be scheduled.
Task
2. On the system navigation tree, select the DEM or the Receiver, then click the Properties icon .
3. Click Vulnerability Assessment.
4. Select the VA source, then select one of these options:
• To retrieve immediately, click Retrieve. The job runs in the background and you are informed if the retrieval is
successful.
• To schedule retrieval, click Edit. Select the frequency then choose to write the changes to the device.
5. Click OK.
6. If you cannot retrieve VA data, check the following:
Data in the directory was already retrieved, so the data isn't current.
Qualys, FusionVM, and
Rapid7 Nexpose
Nessus
If you wrote over an existing Nessus file when you uploaded a new Nessus file to your FTP
site, the date of the file remains the same; so, when you perform a VA retrieval, no data is
returned because it's perceived as old data. To avoid this situation, either delete the old
Nessus file off the FTP site before uploading the new one, or use a different name for the
file you upload.
7. To view the data, click the Asset Manager icon , then select the Vulnerability Assessment tab.
SNMPv3 is supported with NoAuthNoPriv, AuthNoPriv, and AuthPriv options, using MD5 or Secure Hash Algorithm (SHA) for
authentication and Data Encryption Standard (DES) or Advanced Encryption Standard (AES) for encryption. MD5 and DES are not
available in FIPS compliance mode.
SNMP requests can be made to McAfee ESM for McAfee ESM and McAfee Event Receiver, health information. SNMPv3 traps can
be sent to McAfee ESM to add to the blacklist of one or more of its managed devices. You can also configure all devices to send
link traps and boot traps to destinations of your choosing.
• Alerts — McAfee ESM can generate and send alert traps using Event Forwarding. A McAfee Event Receiver can receive
alert traps by configuring a McAfee SNMP data source.
• Flows — A McAfee Event Receiver can receive flow traps by configuring an SNMP data source.
• McAfee ESM Health Requests —McAfee ESM can receive and respond to health requests for itself and the devices it
manages.
• Blacklist — McAfee ESM can receive traps defining entries for blacklists and quarantine lists, which it then applies to the
devices that it manages.
The McAfee MIB also defines textual conventions (enumerated types) for values including:
The following tables show the meaning of McAfee ESM and McAfee Event Receiver OIDs.
Percent
1.3.6.1.4.1.23128.1.3.1.1 4 Percentage combined instantaneous CPU load
MB
1.3.6.1.4.1.23128.1.3.1.2 3518 Total RAM
MB
1.3.6.1.4.1.23128.1.3.1.3 25 Available RAM
MB
1.3.6.1.4.1.23128.1.3.1.4 1468006 Total HDD space partitioned for McAfee ESM
database
MB
1.3.6.1.4.1.23128.1.3.1.5 1363148 Free HDD space available for McAfee ESM
database
seconds since
1.3.6.1.4.1.23128.1.3.1.6 1283888714 Current system time on the McAfee ESM
1970-1-1
00:00:0.0 (GMT)
2689599744
1.3.6.1.4.1.23128.1.3.3.2 .x McAfee ESM unique identifier of the
Receiver
1
1.3.6.1.4.1.23128.1.3.3.3.x Indicates that communication with the
McAfee Event Receiver is available (1)
or not available (0)
OK
1.3.6.1.4.1.23128.1.3.3.4.x Indicates the status of the McAfee
Event Receiver
percent 2
1.3.6.1.4.1.23128.1.3.3.5.x Percentage combined instantaneous
CPU load
7.1.3 20070518091421a
1.3.6.1.4.1.23128.1.3.3.11.x Receiver version and build stamp
alerts per
1.3.6.1.4.1.23128.1.3.3.14.x 1 Alert rate (per minute) for last 10
minute
minutes
Note: x = Device ID. To access a list of device IDs, go to System Properties | SNMP Configuration, then click View
Device IDs.
Events, flows, and blacklist entries are sent using SNMP traps or inform requests. An alert trap sent from McAfee ESM configured
to do Event Forwarding might look something like this:
1.3.6.1.4.1.23128.1.1.4 2 Device ID
1.3.6.1.4.1.23128.1.1.11 17 Protocol
1.3.6.1.4.1.23128.1.1.12 0 VLAN
1.3.6.1.4.1.23128.1.1.21 1 Severity
1.3.6.1.4.1.23128.1.1.26 Application
1.3.6.1.4.1.23128.1.1.27 Domain
1.3.6.1.4.1.23128.1.1.28 Host
1.3.6.1.4.1.23128.1.1.31 Command
1.3.6.1.4.1.23128.1.1.32 Object
• Authentication Failure
• Cold Start
• EGP Neighbor Loss
• Link Down
• Link Up and Warm Start
Note
To send SNMP traps through IPv6, you must formulate the IPv6 address as an IPv4 conversion address. For example,
converting 10.0.2.84 to IPv6 looks like:
2001:470:B:654:0:0:10.0.2.84 or 2001:470:B:654::A000:0254
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click SNMP Configuration.
4. SNMP Requests tab:
• For SNMP version 1 and version 2 traffic, set the community string.
• For SNMP version 3 traffic, select the security level, authentication protocol, and privacy protocol.
• Show the IP addresses that the device allows or considers trusted. You can add new addresses and edit or remove
existing ones. The IP address can include a mask.
Note
• View the McAfee MIB, which defines the object identifiers (OIDs) for each object or characteristic of interest.
• Set the port where the cold/warm trap traffic, blacklist entry, and link up/link down traffic passes.
• Send Link Up and Link Down traps. If you select this feature and are using multiple interfaces, you are notified when
an interface goes down and when it comes back up.
Note
Cold/warm trap traffic is automatically allowed. A cold start trap is generated when there is a hard shut-down or
hard reset. A warm start trap is generated when you reboot the system.
• Send an SNMP trap when the database (cpservice, IPSDBServer) goes up or down.
• Send an SNMP trap when a log is not written to the log table.
• Set the system profile names where you want the notifications sent. The table shows all available SNMP trap
profiles on the system.
Verify that you have administrator privileges or belong to an access group with alarm management privileges.
• Prepare the SNMP trap Receiver (required if you don't already have an SNMP trap Receiver).
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click SNMP Configuration, then click the SNMP Traps tab.
4. In Trap Port, type 162, then select General Hardware Failure, and click Edit Profiles.
5. Click Add, then enter the requested information like this:
Note
Remember what you type in the Port and Community Name fields.
Results
When a power supply fails, an SNMP trap is sent and a health status flag appears next to the device on the system navigation
tree.
Note
If you set up SNMP on a high availability (HA) McAfee Event Receiver, the traps for the primary McAfee Event Receiver go out
through the shared IP address. So, when you set up the listeners, set one up for the shared IP address.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click SNMP Configuration.
4. SNMP Requests tab:
• For SNMP version 1 and version 2 traffic, set the community string.
• For SNMP version 3 traffic, select the security level, authentication protocol, and privacy protocol.
• Show the IP addresses that the device allows or considers trusted. You can add new addresses and edit or remove
existing ones. The IP address can include a mask.
Note
• View the McAfee MIB, which defines the object identifiers (OIDs) for each object or characteristic of interest.
• Set the port where the cold/warm trap traffic, blacklist entry, and link up/link down traffic passes.
• Send Link Up and Link Down traps. If you select this feature and are using multiple interfaces, you are notified when
an interface goes down and when it comes back up.
Note
Cold/warm trap traffic is automatically allowed. A cold start trap is generated when there is a hard shut-down or
hard reset. A warm start trap is generated when you reboot the system.
• Send an SNMP trap when the database (cpservice, IPSDBServer) goes up or down.
• Send an SNMP trap when a log is not written to the log table.
• Set the system profile names where you want the notifications sent. The table shows all available SNMP trap
profiles on the system.
The objects and notifications defined in this MIB are used to send requests:
• To a McAfee ESM requesting health status information for the McAfee ESM itself or for Receiver devices
• To a device to request its health status information.
Task
1. On the system navigation tree, select the device, then click the Properties icon .
2. Select the SNMP Requests tab, then click View MIB.
Configure devices
Complete the following steps only for a complex McAfee ESM installation with multiple devices. Do not complete this task for a
simple McAfee ESM installation using a combination of devices.
Task
2. Click .
3. Select the type of device you are adding, then click Next.
4. In the Device Name field, enter a unique name in this group. These characters: ! @ # $ % ^ & * ) ( ] [ } { : ; " ' > < > , / ? ` ~ + =
\ and | are invalid in device names.
5. Click Next.
6. Provide the information requested:
• For McAfee ePO devices — Select a receiver, type the credentials required to log on to the web interface, then click
Next. To use for communicating with the database, type the settings.
Note
Select Require user authentication to limit access to those users who have the user name and password for the
device.
• For all other devices — Type the target IP address or URL for the device.
7. Select whether to use Network Time Protocol (NTP) settings on the device, then click Next.
8. Enter a password for this device, then click Next.
Results
McAfee ESM tests device communication and reports on the status of the connection.
The terms and file extensions listed here might be useful as you follow these processes.
Terminology
• Device key — Defines the management rights that McAfee ESM has for a device, and is not used for crypto.
• Public key — The ESM public SSH communication key, which is stored in the authorized keys table of a device.
• Private key — The ESM private SSH communication key, which is used by the SSH executable on an ESM to establish the
SSH connection with a device.
• Primary ESM — The ESM device that was originally used to register the device.
• Secondary ESM — The additional ESM device that communicates with the device.
The primary ESM device is used to import the secondary ESM device exported .puk file and send the secondary ESM public key to
the peripheral device, thus allowing both ESM devices to communicate with the device.
Task
Task
2. On the system navigation tree, select the device, then click the Properties icon .
3. Click Name and Description to change the name, system name, URL, and description, or view the Device ID number.
Task
3. On the system navigation tree, select the device, then click the Properties icon .
Device-specific information appears:
• Device identification number. To reactivate your system, McAfee Support uses this number to send you the correct
file.
• Device serial and model numbers
• Software version and build number currently running on the device
• Date and time the device was last opened or refreshed
• Sync the clock on this device to the clock on McAfee ESM
• Assigned device Zones
• Current policy state on this device
• Process status on the device and the FIPS status after running a FIPS self-test (if your device is running in FIPS
mode)
4. To view device performance statistics, logs, and network interface statistics, click <device> Management → View
Statistics.
Task
1. On the system navigation tree, select System Properties, then click ESM Management.
2. On the Key Management tab, click Certificate.
• Install certificate, key, and optional chain files, if you have them. The system prompts you to upload the .crt file,
then the .key file, and finally the chain files.
• Generate and install a self-signed security certificate for McAfee ESM.
• Click Generate, enter the information in Manage Certificate, then click OK.
• Click Generate.
• Click Generate, enter the information in Manage Certificate, then click OK.
• Download the .zip file that holds a .crt and a .key file.
• Extract the .crt file, then send it to the certificate authority.
3. Click Close.
Task
1. On the system navigation tree, select System Properties, then click ESM Management.
2. On the Key Management tab, click Regenerate SSH.
3. Click Yes.
Results
When the system regenerates a new key, it replaces the old key pair on all devices managed by McAfee ESM.
Task
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click Custom Settings → Device Links.
4. On the Custom Device Links page, select the device, then click Edit.
5. Enter a URL (maximum of 512 characters).
6. If the URL includes the address of a third-party application and you need to append variables to the URL, click where you
want the variable inserted, then click the variable icon and select the variable.
7. Access the information page by clicking the Launch Device URL icon at the bottom of the Event Analysis and Flow
Analysis views of a device.
Note
Changing connection settings affects only the way McAfee ESM communicates with the devices.
Task
2. On the system navigation tree, select the device, then click the Properties icon .
3. Click Connection.
a. InTarget IP Address/Name, type the IP address or host name that McAfee ESM uses to communicate with the device.
b. Set the Target Port used to communicate (default is 22).
c. To stop SSH communication with the device, select Mark this device as disabled.
The icon for this device on the system navigation tree indicates it is disabled.
d. To check communication between the device and McAfee ESM, click Status.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Click <device label> Configuration → Sync Device.
Task
2. On the system navigation tree, select the device, then click the Properties icon .
3. Select <device> Information.
4. Click Start, Stop, Reboot, or Refresh.
Task
1. On the system tree, select the device, then click the Properties icon .
Note
2. Click Custom Settings, then deselect Automatic refresh of the System Tree.
Results
You can refresh the system tree manually by clicking the Refresh Devices icon on the system tree actions toolbar.
Task
1. From the McAfee ESM dashboard, click and select System Properties. Then click Profile Management.
2. On the System Profiles tab, define the profile. Fields vary based on which Profile Type you select.
3. On the Remote Command tab, define a profile to execute for views or alarms. The scripts can reference variables from the
queries or event.
Note
Use remote command settings to execute commands on devices that accept SSH connections, exceptMcAfee ESM
devices.
Task
Mask IP addresses
Mask IP addresses for event data sent out in event forwarding or to a primary McAfee ESM.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click ESM Management → ESM Hierarchy.
3. To mask data, select Obfuscate for McAfee ESM devices.
4. Select the fields that you want to mask.
5. Select settings on your Local Network.
• To ensure obfuscation occurs the same way each time, enter a seed in the Seed value field, or click Generate to
generate a random seed. This is useful if you obfuscate IP addresses across multiple McAfee ESM devices and want to
keep the values synchronized.
• Select to hide IP addresses inside and outside your local network. This extends to IP address custom types such as
IPv4 and IPv6 addresses.
• Enter a list of the IP addresses or subnets included in your Local Network, separated by commas (maximum of
2,000 characters).
If your Local Network is longer than 2,000 characters, consolidate multiple subnets into a shorter Local Network using
Classless Inter-Domain Routing (CIDR) notation.
Results
Once this is set up, if a primary McAfee ESM requests a packet from a secondary McAfee ESM, the system masks the data you
selected.
Task
Task
1. On the system navigation tree, select the device, then click the Properties icon .
2. Click ESM Management, click the Maintenance tab, then click Task Manager.
3. You can do the following tasks:
• Close report, view, watchlist, execute and export, alarm, and external API queries on the system. You cannot close
system queries.
• By default, the list refreshes automatically every 5 seconds. If you select a query and the list auto-refreshes, it
remains selected but refreshes the details. Completed queries do not appear on the list.
• Select and copy the data in the Query Details area.
• Sort the table columns.
• identifies queries you can close.
Task
1. On the system navigation tree, select System Properties and ensure System Information is selected.
2. Click System Clock (GMT) to:
• Set the system clock to Greenwich mean time (GMT) instead of synchronizing to NTP servers.
• Use NTP servers to synchronize the system's time instead of using the system clock.
• Add the IP addresses for NTP servers; you can add up to 10 servers.
Note
NTP server addresses on McAfee Application Data Monitor or DBM devices must be IP addresses.
• Type the authentication key and key ID for each NTP server.
• Click to view the status of the NTP servers on the list. If you change the list of servers, click OK to save the changes
and close the page. Then reopen the page before clicking Status.
Task
1. On the system navigation tree, select System Properties or device Properties, then click Sync in the Sync Device Clock
field.
2. Click Refresh to update the data on System Information or device Information.
Task
1. On the system navigation tree, select a device, then click the Properties icon .
2. Click Configuration → NTP.
• Indicate whether to use NTP servers to synchronize the device's time instead of using the system clock.
• View the default NTP servers and any that have been added to the device.
• Add IP addresses for NTP servers that you want to add to the device by clicking in this column. You can add up to 10
servers.
Note
• Type the authentication key and key ID for each NTP server (contact your network administrator if you do not know
them).
• View the NTP servers status. If you change the list of servers, save changes by clicking OK, close the page, then
open the page again before clicking Status.
3. Click OK.
Note
Task
• Reachable column:
• Authentication column:
• Condition column (Condition corresponds to the mark in the NTP Server column):
The message is formatted using a common prefix composed of fields delimited by a bar (|) character. The prefix is mandatory
and all specified fields must be present. Additional fields are specified in the extension. The format is:
The extension part of the message is a placeholder for additional fields. Following are definitions for the prefix fields:
Event consumers use this information to determine what the fields represent. Currently only version 0 (zero) is established
in the above format.
• Device Vendor, Device Product, and Device Version — Strings that uniquely identify the type of sending device
No 2 products can use the same device-vendor and device-product pair. Event producers ensure that they assign unique
name pairs.
Each signature or rule that detects certain activity has a unique deviceEventClassId assigned. This is a requirement helps
correlation engines deal with the events.
Events can contain any number of key-value pairs in any order, separated by spaces. If a field contains a space, such as a
file name, this is okay and can be logged on exactly that manner. For example: fileName=c:\Program Files\ArcSight is a
valid token.
If you use NetWitness, configure your device to send the CEF to the Receiver. By default, the CEF format when using NetWitness
looks as follows:
Managing assets
How the Asset Manager works
The Asset Manager provides a centralized location that allows you to discover, manually create, and import assets.
An asset is any device with an IP address added to McAfee ESM. The Asset Manager enables you to manage the assets on your
network.
You can create a group to contain one or more assets. You can perform the following operations on the entire group:
Note
This change is not persistent. If you add an asset to a changed group, the asset doesn't inherit the previous settings
automatically.
Asset groups allow you to categorize assets in ways that are unavailable with asset tagging. For example, if you want to create an
asset group for each building on your campus. The asset consists of an IP address and a collection of tags. The tags describe the
operating system the asset is running and a collection of services for which the asset is responsible.
If the system sets up the tags, they are updated each time the asset is retrieved if they have changed. If the user sets up the tags,
the system does not update the tag when the asset is retrieved, even if they have changed. If you add or edit the tags of an asset
but you want the system to update them when the asset is retrieved, click Reset. You must complete this action each time you
change the tag settings.
Configuration management is part of standard compliance regulations such as PCI, HIPPA, and SOX. It allows you to monitor any
changes that might be made to the configuration of your routers and switches, thus preventing system vulnerabilities. On the
McAfee ESM, the configuration management feature enables you to:
Asset Manager
When you add an asset to your Asset Manager, you assign a criticality level that represents how critical the asset is to your
operation. For example, if you have one computer managing your enterprise setup and it doesn't have a backup, its criticality is
high. If you have two computers managing your setup, each with a backup, the criticality level is considerably lower.
You can select whether to use or ignore an asset in risk calculation for your enterprise on the Edit menu of the Asset tab.
Threat Management
The Threat Management tab on the Asset Manager shows a list of known threats, their severity, the vendor, and whether they
are used when calculating risk. You can enable or disable specific threats so that they are or are not used to calculate risk. You
can also view the details for the threats on the list. These details include recommendations for dealing with the threat and
countermeasures you can use.
Predefined views
Predefined views summarize and display asset, threat, and risk data:
• Asset threat summary — Displays the top assets by risk score and threat levels, and threat levels by risk.
• Recent threat summary — Displays recent threats by vendor, risk, asset, and available protection products.
• Vulnerability summary — Displays vulnerabilities by threats and assets.
Custom views
Use the Query Wizard to set up custom views that display the data you need.
• On the Dial Control and Count components, you can display the average enterprise risk score and the total enterprise
risk score.
• On the Pie Chart, Bar Chart, and List components, you can display the assets at risk, product threat protection, threat
by asset, threat by risk, and threat by vendor.
• On the Table component, you can display assets, most recent threats, top assets by risk score, and top threats by risk
score.
Configure assets
Assets are network devices with IP addresses. You can create assets, change their tags, create asset groups, add asset sources,
and assign an asset to an asset group. You can also manipulate the assets learned from vulnerability assessment vendors.
Task
• IP address or address/mask
• Zone — Users must have permission for the zone to access assets in that zone.
• Criticality — Identify how critical this asset is to your enterprise: 1 = lowest criticality, 100 = highest criticality.
The system uses criticality and severity of a threat to calculate the overall event severity to your enterprise.
Note
Always use the assigned asset criticality and greatest criticality value when computing event severity. When you
calculate the overall severity, the system adds that severity to the Calculate field.
You can define a filter group based on the existence of one or more asset tags. The tags that are set do not define the
exclusive set of tags an asset must have. The asset can have other tags and still be a member of the filter group.
• Optional information — MAC address, globally unique identifier (GUID), operating system
Format the asset data in the .csv file as follows: Hostname, IPAddress, Mask, ZoneName, UsrSeverity, UseCalcSeverity,
TagCount, TagGroupName:TagName
Task
To retrieve assets on Altiris, you must have Asset Manager permissions on the Altiris Management Console.
Active Directory doesn't typically store IP address information. The system uses DNS to query for the address once it gets the
name from Active Directory. If Active Directory can't find the computer address, the address isn't added to the Assets table. For
this reason, the DNS server on the system needs to contain the DNS information for Active Directory computers.
If you add IP addresses to Active Directory, change the networkAddress attribute on your computer objects so the system uses
those IP addresses instead of querying DNS.
Task
1. Click the Asset Manager icon, then click the Asset Sources tab.
The Asset Sources tree shows the McAfee ESM devices and Receivers on the system, and their current asset sources.
Note
McAfee ESM can have one asset source; McAfee Event Receivers can have multiple asset sources.
• Select whether to enable automatic retrieval. Identify the automatic retrieval interval. You can still retrieve data
manually by clicking Asset Sources → Retrieve.
• Indicate the asset source type: Active Directory or Altiris.
• Identify the asset source name, zone, IP address, and port.
• Select the priority you want this asset source to have if it discovers an asset at the same time as Vulnerability
Assessment.
• Select if you want to use an encryption protocol for the data.
• Type the user name and password required to access the asset source.
• For Active Directory, type the distinguished name of the object where you want the search for assets to begin
(dc=McAfee,dc=com).
• For Altiris, type the IP address, the port it is listening on, the name of the proxy user, and the password for the
proxy server.
• To retrieve the data automatically, select the frequency.
Task
Task
Option Definition
Client ID Type the Frontline client ID number. This field is required for Digital Defense Frontline.
Company Name On FusionVM, the name of the company that must be scanned. If this field is left blank, all
companies that the user belongs to are scanned. If you enter more than 1 company,
separate the names with a comma.
Option Definition
Data Retrieval (Qualys QualysGuard) Select the method to retrieve the VA data. HTTP/HTTPS is the
default. The other options are SCP, FTP, NFS, CIFS, and Manual upload.
Note: A Qualys QualysGuard log file manual upload has a file size limit of 2 GB.
Domain Type the domain of the Windows box (optional, unless your domain controller or server
exists in a domain).
Exported scan file The directory where exported scan files reside.
directory
Exported scan file The exported scan file format (XML, NBE).
format
Install directory The location where Saint was installed on the server. The installation directory for a Saint
appliance scanner is /usr/local/sm/.
IP Address • eEye REM: The IP address of the eEye server that is sending trap information.
• eEye Retina: The IP address of the client holding exported scan files (.rtd).
• McAfee® Vulnerability Manager: The IP address of the server on which it is installed.
• Nessus, OpenVAS, LanGuard, and Rapid7 Metasploit Pro: The IP address of the client
holding exported scan files.
• NGS: The IP address of the system that is storing the Squirrel reports.
• Rapid7, Lumension, nCircle, and Saint: The IP address of the respective server.
Mount Directory If you select nfs in the Method field, the Mount Directory fields are added. Enter the
mount directory set when you configured nfs.
Method The method to use to retrieve the exported scan files (SCP, FTP, NFS, or CIFS mount).
LanGuard always uses CIFS.
Password • McAfee® Vulnerability Manager: If using Windows authentication mode for SQL Server,
the password of the Windows box. If not, the password of the SQL Server.
• Nessus, OpenVAS, LanGuard, and Rapid7 Metasploit Pro: The password of SCP or FTP.
• NGS: The password for the SCP and FTP methods.
Option Definition
• Qualys and FusionVM: The password for the Qualys Front Office or FusionVM user
name.
• Rapid7 Nexpose, Lumension, nCircle, and Saint: The password to use when connecting
to the web server.
• Digital Defense Frontline: The web interface password.
Port Port Rapid7 Nexpose, Lumension, nCircle, McAfee® Vulnerability Manager, or Saint web
server are listening on. The default for Rapid7 Nexpose is 3780, for Lumension is 205, for
nCircle is 443, for McAfee® Vulnerability Manager is 1433, and for Saint is 22.
Project/Workspace Name of a particular project or workspace, or leave it blank to grab all projects or work
Name spaces.
Schedule Receiver or Indicate the frequency with which you want the VA data to be retrieved from the Receiver
DEM data retrieval or DEM:
Option Definition
Note: eEye REM does not support data retrieval from the source so the data must
be retrieved from the Receiver or DEM.
Schedule VA data Indicate the frequency with which you want the VA data to be retrieved from the VA source.
retrieval
Session Saint: The session data is gathered from. To include all sessions, type All.
SNMP If you select authNoPriv or authPriv in the SNMP security level field, this field is active.
authentication Enter the password for the authentication protocol selected in the SNMP authentication
password protocol field.
SNMP If you select authNoPriv or authPriv in the SNMP security level field, this field is active.
authentication Select the type of protocol for this source: MD5 or SHA1 (SHA1 and SHA see the same
protocol protocol type). Make sure that your REM Events Server configuration matches your
selection.
SNMP Community SNMP community set when you configured the REM Events Server.
SNMP privacy If you select authPriv in the SNMP security level field, this field is active. Enter the
password password for the DES or AES privacy protocol. In FIPS mode, AES is the only option
available.
SNMP privacy If you select authPriv in the SNMP security level field, this field is active and you can
protocol select either DES or AES. In FIPS mode, AES is the only option available.
SNMP authentication and privacy fields become active based on the security level you
select. Make sure that your REM Events Server configuration matches your selection.
Option Definition
SNMP version Version of SNMP for the source. The SNMP fields are activated based on the version
selected.
SNMPv3 Engine ID (Optional) SNMPv3 Engine ID of the trap sender, if an SNMPv3 profile is used.
Sudo password (Optional) Type the password that is required to access the Saint installation directory.
Time out This field allows you to use the default time-out value for a source or provide a specific
time-out value. This is useful if you have much VA data from a vendor and the default time-
out setting is not allowing you to return all or any of the data. You can increase the time-out
value to allow more VA data retrieval time. If you provide a value, it is used for all
communications.
Token (Optional) Authentication token that can be set in the Metasploit Global Settings.
Use HTTP Proxy If you select to use the HTTP proxy, the Proxy IP Address, Proxy Port, Proxy Username,
and Proxy Password fields become active.
Use Passive mode If you select ftp in the Method field, this field becomes active. Select when to use passive
mode.
Use sudo Select this option if you have access to the Saint installation directory and want to use this
access.
Use System Profile Select whether to use a previously defined profile. If you select this option, all SNMP fields
(eEye REM) are deactivated. When you select one of the existing system profiles, the fields are
populated with the information in the profile selected.
User name
Type the user name for McAfee® Vulnerability Manager. If you are using Windows
authentication mode for the SQL Server, enter the user name of the Windows box. If not, it
is the user name of the SQL Server.
• Nessus, OpenVAS, and Rapid7 Metasploit Pro: The user name of SCP or FTP.
• NGS: The user name for the SCP and FTP methods.
• Qualys or FusionVM: The Front Office or FusionVM user name with which to
authenticate.
Option Definition
• Rapid7 Nexpose, Lumension, nCircle, and Saint: The user name to use when
connecting to the web server.
• Digital Defense Frontline: The web interface user name.
Wildcard expression
A wildcard expression used to describe the name of exported scan files. The wildcard
expression can use an asterisk (*) or question mark (?) with the standard definition of
"wildcard" in a file name.
If you have both NBE and XML files, you must specify if you want NBE or XML files in this
field (for example, *.NBE or *.XML). If you only use an asterisk (*), you get an error.
Configure zones
Use zones to organize devices, data sources, and the events they generate into related groupings by geographic location and IP
address.
For example, if you have offices on the East Coast and the West Coast and you want the events generated by each office to be
grouped, add two zones. Then, assign the devices whose events must be grouped to each of the zones. To group the events from
each office by specific IP addresses, add subzones to each of the zones.
Task
• Type a name.
• Select if you want the zone to be the default for events generated by devices assigned to this zone.
• To use geolocation to define the zone boundaries, click the Filter icon, then select the location you want included in
this zone.
• To use ASN to define the zone boundaries, enter the network identifier on the Internet for this zone.
Task
• Export zone definition file - includes settings for zones and their corresponding subzones
• Export device to zone assignment file - includes devices and zones assigned to those devices
Export a file of zone settings from one McAfee ESM so that it can be imported to another McAfee ESM.
Task
• An import zone definition file contains 8 columns: Command, Zone Name, Parent Name, Geo Location, ASN,
Default, IPStart, and IPStop.
• An import device to zone assignment file contains 3 columns: Command, Device Name, and Zone Name.
2. Enter commands in the Command column to specify the action to be taken for each line when it is imported.
Note
To change a subzone range, remove the existing range, then add the range with the changes. You can't edit the
subzone range directly.
• remove — Delete the zone matching this line from the McAfee ESM.
• Import zone definition file - includes settings for zones and their corresponding subzones
• Import device to zone assignment file - includes devices and zones assigned to those devices
7. Click OK, then locate the file to be imported and click Upload.
Task
1. Configure McAfee ePO with McAfee Policy Auditor to audit your system assets (endpoints).
2. Benchmarks contain rules that determine whether assets meet required configurations. McAfee Policy Auditor defines
which benchmarks and frequency to use to audit assets.
3. The McAfee Event Receiver pulls audit results from McAfee ePO.
4. The McAfee Event Receiver shares audit data with McAfee ESM.
5. The McAfee ESM Scorecard shows:
Note
Trend lines appear only if at least two data points exist, which is about two weeks of data.
Task
Note
When selecting Scorecard data, consider the volume of data and its effect on performance. Benchmarks contain
sets of rules and display one data point for multiple rules. Rules can display large amounts of data.
• To calculate trends over time, choose a period between 1 week and 12 months.
Note
Use short periods to identify highly volatile trends. Use longer periods to identify deviations from standard
benchmarks.
Note
• To toggle between text view and graph view, click either the hash or bar chart icon.
• To drill down to a specific rule or asset, click the arrow next to the group name.
• To view data for a particular rule, group, or asset, select it.
Note
Data for only the selected rule, group, or asset appears in the bound table.
Task
Note
Task
3. Click .
Task
3. Click Export.
4. Format the CSV file to reflect your reporting needs.
Policy templates and device policy settings can inherit values from their parents. Inheritance allows device policy settings to be
infinitely configurable while maintaining a level of simplicity and ease-of use. Each policy when created adds an entry to the
Policy Tree.
Tip
When operating in FIPS mode, do not update rules through the rule server. Instead, update them manually.
Icon Description
Policy
Out-of-sync device
Staged device
Up-to-date device
The McAfee rule server maintains all rules, variables, and preprocessors with predefined values or usages. The Default Policy
inherits its values and settings from these McAfee-maintained settings, and is the ancestor of all other policies. Settings for all
other policies and devices inherit their values from the Default Policy by default.
Rule types listed in the Policy Editor vary based by the selected device in the system navigation tree. The system displays the
policy hierarchy for the selected device. You can filter rules to view only those rules that meet your criteria. Or tag rules to define
their functions.
Manage policies
Manage the policies on the system by taking actions on the Policy Tree.
Task
2. On the McAfee ESM console, click the Policy Editor icon , then click the Policy Tree icon .
3. Use the Policy Tree to:
Note
Note
Copied policy settings are applied to replaced policies, but the name remains the same.
Note
If importing multiple policies, the first policy overwrites the selected policy and the system inserts subsequent
policies as children of the current node, leaving their hierarchical relationship intact. This option doesn't change
the name of the selected policy.
• Export policies
Note
• Due to the possible dependency of custom rules on custom variables, you cannot export custom rules
without also exporting the custom variables.
• Policy hierarchy is flattened, which means the system compresses settings into one level of policy, with the
most immediate policy's settings taking precedence on an item by item basis. For example, if you select a
device, the system exports both policies above the selected policy. To export a parent policy, you must select
its child. Also, policy settings have precedence over the parent policy settings when the file is compressed
down into one level of policy.
Task
Important
Use variables to make rules behave in specific ways, which might vary from device to device. McAfee ESM has many pre-set
variables, but also allows you to add custom variables. When adding a rule, these variables appear as options in the drop-down
list for the field type selected in the Type field on the New Variable page.
Each variable has a default value; set some values that correspond to the specific environment of each device. Variable names
cannot contain spaces; Use an underscore ( _ ) to represent spaces. To maximize device effectiveness, set the HOME_NET variable
to the home network being protected by the specific device.
This table shows a list of common variables and their default values.
HTTP_PORTS Web server ports: 80 or 80:90 for a range 80 Any port except the
between 80 and 90 HTTP_PORTS
You can change system variables and add, change, or delete custom variables.
Assign types to custom variables to filter rules for reporting. Types determine the field in which the variables are available when
adding or changing a rule. Variable types are global, and changes appear on all policy levels.
Manage variables
When you select the variable rule type on the Policy Editor, you can take several actions to manage both custom and predefined
variables.
Task
Note
When the variable type is set to something other than No Type Selected and committed, you can't change the
value.
• Import variables by selecting File, then click Import → Variables. Click Import, then browse and upload the file.
Note
The import file must be a .txt file with the following information in this format: VariableName;VariableValue;
CategoryName (optional); Description (optional). If one field is missing, a semicolon must be in place to act as a
place holder.
4. In the rules display pane, select the category, then click New.
5. Select Variable, then define the requested settings.
Task
To detect and alert on TCP protocol anomalies, add detect_anomalies after policy first.
To check for TCP session hijacking, add detect_anomalies check_session_hijacking after policy first.
• McAfee Application Data Monitor rules -detect malicious traffic patterns by detecting anomalies in application and
transport protocols.
• Advanced Syslog Parser (ASP) rules - identify where data resides in message-specific events, such as signature IDs, IP
addresses, ports, user names, and actions.
• Correlation rules - interpret patterns in correlated data.
• Data source rules - detect issues with data source information sent to receivers.
• McAfee Database Event Monitor rules - monitor database events, such as logon/logoff, DBA-type activity, suspicious
activity, and database attacks that are typically required to achieve compliance requirements.
• McAfee ESM rules - generate compliance or auditing reports related to McAfee ESM events.
• Filter rules - allow you to specify what action to take on McAfee Event Receiver data.
• Transaction tracking rules - track database transactions and auto-reconcile changes, such as log start and end of a trade
execution or begin and commit statements to report by transactions instead of queries.
• Windows events rules - generate events that are related to Windows.
Icon Description
Indicates broken inheritance chain at this level. Inheritance turned off at this point.
Note: The current rule usage is used when the inheritance chain is broken.
Indicates broken inheritance chain at this level. Items below this point do not inherit any further up the chain.
Indicates a custom value; set the value to something other than the default.
The ICE Engine is a software library and collection of protocol and content plug-in modules that can identify and extract content
from raw network traffic in real time. It can fully reassemble and decode application level content, transforming cryptic network
packet streams into easily readable content as if it were being read from a local file.
The ICE engine can identify protocols and content types automatically without relying on fixed TCP port numbers or file
extensions. ICE engine does not rely on signatures to perform analysis and decoding, instead its modules implement full parsers
for each protocol or content type, which results in accurate identification and decoding of content and allows content to be
identified and extracted even when that content is compressed or otherwise encoded. So, doesn’t pass over the network in clear
text.
As a result of this highly accurate identification and decoding, the ICE engine offers a uniquely deep view of network traffic. For
example, the ICE engine could receive a PDF document stream that traversed the network inside a .zip file, as a BASE-64 encoded
attachment to an SMTP email from a SOCKS proxy server.
This application and document-awareness allow McAfee Application Data Monitor to provide invaluable security context. It can
detect threats not easily detected by traditional IDS or IPS, such as:
McAfee Application Data Monitor detects malicious traffic patterns by detecting anomalies in application and transport protocols
(for example, an RPC connection is malformed or TCP destination port is 0).
• Low-level network protocols — TCP/IP, UDP, RTP, RPC, SOCKS, DNS, and others
• Email — MAPI, NNTP, POP3, SMTP, Microsoft Exchange
• Chat — MSN, AIM/Oscar, Yahoo, Jabber, IRC
• Webmail — such as AOL Webmail, Hotmail, Yahoo! Mail, Gmail, Facebook email
• P2P — Gnutella, bitTorrent
• Shell — SSH (detection only), Telnet
• Instant messaging — AOL,ICQ, Jabber, MSN, SIP, and Yahoo
• File transfer protocols — FTP, HTTP, SMB, and SSL
• Compression and extraction protocols — BASE64, GZIP, MIME, TAR, ZIP, and others
• Archive files — RAR Archives, ZIP, BZIP, GZIP, Binhex, and UU-encoded archives
• Installation packages — Linux packages, InstallShield cabinets, Microsoft cabinets
• Image files — GIFs, JPEGs, PNGs, TIFFs, AutoCAD, Photoshop, Bitmaps, Visio, Digital RAW, and Windows icons
• Audio files — WAV, MIDI, RealAudio, Dolby Digital AC-3, MP3, MP4, MOD, RealAudio, SHOUTCast, and more
• Video files — AVI, Flash, QuickTime, Real Media, MPEG-4, Vivo, Digital Video (DV), Motion JPEG, and more
• Other applications and files — Databases, spreadsheets, faxes, web applications, fonts, executable files, Microsoft Office
applications, games, and even software development tools
• Other protocols — Network printer, shell access, VoIP, and peer-to-peer
Key concepts
•
Object — individual item of content. An email is an object but also an object container since it has a message body (or two)
and attachments. An HTML page is an object which might contain additional objects such as images. A .zip file and each file
in the .zip file are all objects. McAfee Application Data Monitor unpacks the container and treats each object inside as its
own object.
Transaction — a wrapper around the transfer of an object (content). A transaction contains at least one object; but, if that
object is a container, like a .zip file, the single transaction might contain several objects.
• Flow — the TCP or UDP network connection. A flow might contain many transactions.
Task
• Identify the rule name, description (that appears in the Policy Editor), a severity setting, and rule type.
• Select the alert action the rule triggers.
• Change the default normalized ID.
• Select tags that define the categories to which the rule belongs.
• To set rule logic, drag and drop the wanted logical elements and components.
• To select if a specific number of values must occur in a specific field before the component triggers, click .
• Monitored field — Select the field that the values must occur in.
• Select to have the component trigger only if matches do not occur in the time specified in the Time Window field at
the gate level.
• Select to customize the grouping of the events in a correlation rule. If you have a rule that groups by a specific field,
you can override one of its components to match on a field that you specify on the Configure Group By overrides
page. Click Configure to set the override field.
• Equal to =
• Not equal to !=
• Greater than >
• Greater than equal to >=
• Less than equal to <=
• Less than <
• EQ - Equal to
• BT - Between
• GE - Greater than equal to
• GT - Greater than
• LE - Less than equal to
• LT - Less than
• NB - Not between
• NE - Not equal to
• NGT - Not greater than
• NLE - Not less than
• REGEXP - Regular expression
• Select whether the rule triggers when any of the values match the defined pattern, or only if all values match the
pattern.
• Filter by selected variables:
• If the variables icon is next to the field, click it and select the variables.
• If there is no icon, type the value following the instructions in the Valid Input field.
• View hints for the values that you can enter in the Value field.
Task
1. On the rule editor, drag and drop a logic element in the Expression Logic or Correlation Logic area.
2. Click the Menu icon for the element you want to edit, then click Edit.
3. Change the settings, then click OK.
You can compare string terms with string and Regex literals to test their content but they can also be compared with numbers to
test their length. You can only compare numeric, IP address, and MAC address terms with the same type of literal value. The only
exception is that everything can be treated as a Boolean to test for its existence. Some terms can have multiple values, for
example the following rule would trigger for PDF files inside .zip files: type = = application/zip && type = = application/pdf.
Operators
Literals
Literal Example
MAC aa:bb:cc:dd:ee:ff
Number
= =, ! =, >, > =, <, < =
IPv4 = =, ! =
MAC = =, ! =
Bool = =, ! =
Compare against true/false, also supports implied comparison with true, for example
the following tests whether the email.bcc term occurs: email.bcc
Regex grammar
Basic operators
Alternation (or)
|
Zero or more
*
One or more
+
Zero or one
?
Grouping (a | b)
()
Any Character
.
Basic operators
Escape Character
\
Escapes
Digit [0–9]
\d
Non-Digit [^0-9]
\D
Escape (0x1B)
\e
White Space
\s
Tab (0x09)
\t
Word [A-Za-z0-9_]
\w
Not Word
\W
Escapes
Hex Representation
\x00
Octal Representation
\0000
Start of line
^
S End of line
Note: The start of line and end of line anchors (^ and $) don't work for objcontent.
All letters
[:alpha:]
ASCII Characters
[:ascii:]
Control characters
[:cntrl:]
Digits
[:digit:]
Visible characters
[:graph:]
Lowercase letters
[:lower:]
Uppercase characters
[:upper:]
Word characters
[:word:]
Hexadecimal Digit
[:xdigit:]
“cialis”
“Viagra”
“viagra”
“adult web”
“Adult web”
/fund[^a-z0-9]{1,3}transaction/i
/fund[^a-z0-9]{1,3}transfer[^a-z0-9]{1,3}[0–9,.]+/i
"feddedb607468465f9428a59eb5ee22a"
"ff3cb87742f9b56dfdb9a49b31c1743c"
"ff45e471aa68c9e2b6d62a82bbb6a82a"
"ff669082faf0b5b976cec8027833791c"
"ff7025e261bd09250346bc9efdfc6c7c"
192.168.2.0/24
192.168.3.0/255.255.255.0
192.168.4.32/27
192.168.5.144/255.255.255.240
“Viagra” “pharmaceutical”
“viagra” “pharmaceutical”
/fund[^a-z0-9]{1,3}transaction/i “sox”
/fund[^a-z0-9]{1,3}transfer[^a-z0-9]{1,3}[0–9,.]+/i “sox”
"feddedb607468465f9428a59eb5ee22a" “Virus”
"ff3cb87742f9b56dfdb9a49b31c1743c" “Malware”
"ff45e471aa68c9e2b6d62a82bbb6a82a" “Adware”
"ff669082faf0b5b976cec8027833791c" “trojan”
"ff7025e261bd09250346bc9efdfc6c7c" “Virus”
192.168.3.0/255.255.255.0 “LAN”
192.168.4.32/27 “DMZ”
In addition, there are two extra literal types: regular expressions and lists. A term of a specific type can only be compared against
a literal of the same type or a list of literals of the same type (or a list of lists of ...).
• A string term can be compared against a numeric literal to test its length. The following rule triggers if a password is
fewer than eight characters long (password is a string term): Password < 8
• A string term can be compared against a regular expression. The following rule triggers if a password only contains
lowercase letters: Password == /^[a-z]+$/
• All terms can be tested against Boolean literals to test whether they occur at all. The following rule triggers if an email
has a CC address (email.cc is a string term): email.cc == true
IP addresses • IP address literals are written in standard dotted-quad notation, they are not enclosed in quotes:
192.168.1.1
• IP addresses can have a mask written in standard CIDR notation, there must not be any white space
between the address and the mask: 192.168.1.0/24
• IP addresses can also have masks written out in long form: 192.168.1.0/255.255.255.0
MAC •
addresses
MAC address literals are written using standard notation, as with IP addresses, they are not enclosed in
quotes: aa:bb:cc:dd:ee:ff
Numbers • All numbers in McAfee Application Data Monitor rules are 32-bit integers. They can be written in
decimal: 1234
• They can be written in hexadecimal: 0xabcd
• They can be written in octal: 0777
• They can have a multiplier appended to multiply by 1024 (K), 1048576 (M) or 1073741824 (G): 10M
Note: All email address and URL terms are normalized before matching so it is not needed to take
account of things like comments in email addresses.
Regular • Regular expression literals use the same notation as languages like JavaScript and Perl, enclosing the
expressions regular expression in forward slashes: /[a-z]+/
• Follow regular expressions with standard modifier flags, though "i" is the only one currently
recognized (case-insensitive): /[a-z]+/i
•
Use the POSIX Extended syntax for regular expression literals. Currently Perl extensions work for all
terms except the content term but this might change in future versions.
•
When comparing a term against a regular expression, the regular expression matches any substring in
the term unless anchor operators are applied in the regular expression. The following rule triggers if an
email is seen with an address of “[email protected]”: email.from == /@somewhere.com/
Lists •
List literals consist of one or more literals enclosed in square brackets and separated by commas: [1, 2,
3, 4, 5]
•
Lists might contain any kind of literal, including other lists: [192.168.1.1, [10.0.0.0/8, 172.16.128.0/24]]
•
Lists must only contain one literal, it's not valid to mix strings and numbers, strings and regular
expressions, IP addresses and MAC addresses.
•
When a list is used with any relational operator other than not-equal (!=), then the expression is true if
the term matches any literal in the list. The following rule triggers if the source IP address matches any
of the IP addresses in the list: Srcip == [192.168.1.1, 192.168.1.2, 192.168.1.3]
•
When used with the not-equal (!=) operator, the expression is true if the term doesn't match all literals in
the list. The following rule triggers if the source IP address is not 192.168.1.1 or 192.168.1.2: Srcip !=
[192.168.1.1, 192.168.1.2]
•
Lists might also be used with the other relational operators, though it doesn't make much sense. The
following rule triggers if the object size is greater than 100 or if the object size is greater than 200:
objectsize > [100, 200]
•
For Common Properties and Common Anomalies, the parameter-type value you can enter for each one is shown in parentheses
after the metric reference.
Common Properties
Object Content (String) The content of an object (text inside a document, email message, chat message).
Content matching is not available for binary data. Binary objects can, but, be
detected using Object Type (objtype)
Object Type (Number) Specifies the type of the content as determined by McAfee Application Data Monitor
(Office Documents, Messages, Videos, Audio, Images, Archives, Executables)
Object Size (Number) Size of the object. Numeric multipliers K, M, G can be added after the number (10K,
10M, 10G)
Object Source IP address The source IP address of the content. IP address can be specified as 192.168.1.1,
(Number) 192.168.1.0/24, 192.168.1.0/255.255.255.0
Object Destination IP address The destination IP address of the content. IP address can be specified as,
(Number) 192.168.1.1, 192.168.1.0/24, 192.168.1.0/255.255.255.0
Object Source Port (Number) The source TCP/UDP port of the content
Object Destination Port (Number) The destination TCP/UDP port of the content
Object Destination IPv6 Address The destination IPv6 address of the content
(Number)
Object Source MAC Address (Mac The source MAC address of the content (aa:bb:cc:dd:ee:ff)
name)
Object Destination MAC Address The destination MAC address of the content (aa:bb:cc:dd:ee:ff)
(Mac name)
Flow Source IP address (IPv4) Source IP address of the flow. IP address can be specified as 192.168.1.1,
192.168.1.0/24, 192.168.1.0/255.255.255.0
Flow Destination IP address (IPv4) Destination IP address of the flow. IP address can be specified as 192.168.1.1,
192.168.1.0/24, 192.168.1.0/255.255.255.0
Flow Source MAC Address (Mac Source MAC address of the flow
name)
Day of Week (Number) The day of the week. Valid values are 1–7; 1 is Monday.
Hour of Day (Number) The hour of the day set to GMT. Valid values are 0–23.
Declared Content Type (String) Type of the content as specified by the server. In theory, Object Type (objtype) is
always the actual type and Declared Content-type (content-type) is not trustworthy
because it can be spoofed by the server/application.
Common Anomalies
Protocol-specific properties
In addition to providing properties that are common across most protocols, McAfee Application Data Monitor also provides
protocol-specific properties that can be used with McAfee Application Data Monitor rules.
* Detection only
** No decryption, captures X.509 certificates and encrypted data
*** Via RFC822 module
Display Name
Display Name Display Name Display Name
File Name
File Name File Name File Name
Host Name
Host Name Host Name Host Name
URL
Referrer
URL
Display Name Display Name Display Name Display Name Display Name
Host Name Host Name Host Name Host Name Host Name
Protocol anomalies
Beyond the common properties and protocol-specific properties, McAfee® Application Data Monitor also detects hundreds of
anomalies in low-level, transport, and application protocols. All protocol anomaly properties are of type Boolean and are
available in the Expression Component page when you are adding a McAfee® Application Data Monitor rule.
IP address
Term Description
Term Description
TCP
Term Description
tcp.segment-outsidewindow TCP packet is outside the window (TCP module's small window, not real window).
tcp.urgent-nonzero-withouturg- flag TCP urgent field is non-zero but URG flag isn't set.
DNS
Term Description
Term Description
The McAfee Event Receiver auto learns data source rules as it processes the information sent to it by the data sources that are
associated with the McAfee Event Receiver.
The Data Source option in the Rule Types pane is only visible when you select a policy, data source, Advanced Syslog Parser,
or McAfee Event Receiver in the system navigation tree. The description area at the bottom of the page gives detailed
information about the selected rule. All rules have a severity setting that dictates the priority associated with a rule, which
impacts how the alerts generated for these rules are shown for reporting purposes.
Task
1. On the McAfee ESM console, click the Policy Editor icon , then select Receiver → Data Source in the Rule Types pane.
2. Click in the Subtype column for the rule you want to change, then select the new action.
• Select enable to populate the event subtype with the default action, alert.
• Select disable, if you don't want to collect events for the corresponding rule.
• Select any other action to populate the event subtype with that action.
Task
2. On the Filters/Tagging pane, click the Advanced bar at the bottom of the pane.
3. On the Origin drop-down list, select user-defined, then click the Run Query icon .
4. Select the rule you want to change or delete, click Edit, then select Modify or Delete Auto Learned Rules.
• If you selected Modify, change the name, description, or normalized ID, then click OK.
• If you selected Delete Auto Learned Rules, select the correct option, then click OK.
Filter rules
Filter rules allow you to specify the action to take when data that you define is received by the Receiver.
Data order
Filter rules are written to the Receiver in this data order:
Rule order
If you have Policy Administrator rights, you can define the order that you want the Filter rules to run in. These rules then run in
the most effective order to generate the data you need.
Task
5. Select if you want the rule to be written without PCRE or content strings. If you select this option, the system performs the
specified actions on all received data.
6. Select if you want to add a case insensitive modifier so the system matches PCRE content regardless of the case.
7. Select the actions that are taken when the data received matches the PCRE and content strings, or on all data received if
Match All is selected. You can select as many of these actions as needed.
8. Enable rules by selecting them in the Action column, then click enabled.
Task
3. Click OK.
They are data source rules for Windows events and are separated from the data source rule type because they are a common
use case. McAfee defines these rules; you can't add, change, or delete them, but you can change their property settings.
Task
Note
Changing Oversubscription Mode affects the primary and secondary devices (virtual devices). For this change to take
effect, you must change the mode on the primary device.
Task
Manage rules
ADM, DEM, Deep Packet Inspection, Advanced Syslog Parser, and Correlation rules can be viewed, copied, and pasted.
Custom rules of these types can be modified or deleted. Standard rules can be modified, but must be saved as a new custom
rule.
Task
1. In the Rule Types pane of the Policy Editor, select the type of rule that you want to work with.
2. To view custom rules:
a. Select the Filter tab in the Filters/Tagging pane.
b. At the bottom of the pane, click the Advanced bar.
c. If you want to view a Generic - Advanced Syslog Parser rule, clear the Device Type ID field.
d. In the Origin field, select user defined, then click Run Query .
3. To copy and paste a rule:
a. Select a predefined or custom rule.
b. Select Edit → Copy, then select Edit → Paste.
The rule you copied is added to the list of existing rules, with the same name and settings.
Note
For ASP and Filter Rules, the rule order is copied as part of the copy process.
c. Check that the ordering of the new rule will not adversely affect data parsing (Operations → Order ASP Rules) or
(Operations → Order Filter Rules).
d. To change the name, select Edit → Modify.
4. To modify a rule:
a. Highlight the rule you want to view, then select Edit → Modify.
b. Change the settings, then click OK. If it's a custom rule, it's saved with the changes. If it is a standard rule, you are
prompted to save the changes as a new custom rule. Click Yes.
Note
If you did not change the name of the rule, it is saved with the same name and a different sigID.
c. You can change the name by selecting the rule, then selecting Edit → Modify.
Import rules
Import a set of rules from one McAfee ESM to another.
Task
1. In the Rule Types pane of the Policy Editor, click the type of policy or rules you are importing.
2. Click File → Import, then select Rules.
Note
3. Click Import Rules, then browse to the file you want to import and select Upload.
4. On the Import Rules page, select the action to take if rules being imported have the same ID as existing rules.
5. Click OK to import the rules, resolving the conflicts as indicated.
Import variables
Import a file of variables and change their type. If there are conflicts, the system renames a new variable automatically.
Task
Export rules
Export custom rules or all rules in a policy so that you can then import them to anotherMcAfee ESM.
Task
1. In the Rule Types pane of the Policy Editor, click the type of rules you are exporting.
2. Access a list of the custom rules of the type you selected:
a. In the Filter/Tagging pane, select the Filter tab.
b. Click the Advanced bar at the bottom of the pane.
c. On the Origin drop-down list, select user defined.
3. Select the rules you want to export, then click File → Export → Rules.
4. On the Export Rules page, select the format to use when exporting the rules.
5. On the Download page, click Yes, select the location, then click Save.
Note
If you open the csv file using Microsoft Excel, some of the UTF-8 characters might be corrupted. To correct this, open the
Text Import Wizard in Excel and select Delimited and Comma.
Task
1. In the Rule Types pane of the Policy Editor, select the type of rule you want to filter.
2. Select the Filter tab in the Filters/Tagging pane.
3. Do any of the following:
• Filter with multiple tags by selecting categories or tags, then click the Run Query icon .
• Select more than one category or tag, then click the or icon, then click the Run Query icon.
Note
You cannot use the or icon to filter fields affected by inheritance (Action, Severity, Blacklist, Aggregation, and
Copy Packet).
• Type the tag's name in the Type here to search for a tag field, then select the one you need from the list of
options.
• List the rules by the time they were created by clicking the Sort on Time icon on the toolbar, then click the Run
Query icon.
• List the rules in alphabetical order by clicking the Sort on Name icon on the toolbar, then click the Run Query
icon.
• Deselect the filtering by clicking the orange filter icon on the rules display pane title bar .
• Deselect the filter tags by clicking the Clear All icon on the toolbar. The tags are deselected but the list of rules
remains filtered.
• Filter by signature ID by clicking the Advanced bar at the bottom of the Filter pane. Then, type the signature ID,
then click the Run Query icon.
• Filter by name or description. In the Advanced pane, enter the name or description. For the results, regardless of
case, click the case-insensitive icon .
• Filter by device type, normalized ID, or action. In the Advanced pane, click the Filter icon . On the Filter
Variables page, select the variable.
• Compare the differences in the policy-based settings for a rule type and its immediate primary. In the Advanced
pane, select View Exceptions, then click the Run Query icon.
• Filter by severity, blacklist, aggregation, copy packet, origin, and rule status by selecting the filter from the drop-
down list in each of these fields.
• View only custom rules by selecting user-defined in the Origin field in the Advanced pane, then click the Run
Query icon.
• View rules created in a specific time period by clicking the calendar icon next to the Time field on the Advanced
pane. On the Custom Time page, select the start and stop time, click OK, then click the Run Query icon.
Task
1. In the Rule Types pane of the Policy Editor, select the type of rule you want to view.
2. Select a rule in the rule display pane.
3. Click Operations, then select Browse Reference.
4. To view the summary of a signature, click the links in the Signatures section of the screen.
Set up overrides for the actions taken when the retrieves rules from the server.
Task
Task
1. In the Rule Types pane of the Policy Editor, select the type of rule you want to deselect.
2. Do one of the following:
• Deselect all rule status markings by clicking Operations, then select Clear Updated Rule Status. Click All.
• To deselect selected rules, click the Advanced bar in the Filters/Tagging pane. In the Rule Status field, select
Updated, New, or Updated/New to indicate the type of marking you want to deselect. Click the Run Query icon .
Select the rules to be deselected, then click Operation → Clear Updated Rule Status → Selected.
Task
1. On the system navigation tree, select a device (such as a receiver, ADM, or DEM).
2. Click the Policy Editor icon in the actions toolbar, then click Tools → Compare Rule Files.
Note
If both resulting files are less than about 15.5 MB, they appear in the Compare Rules Files table. If either of the files is
larger, the system prompts you to download both files.
3. On the Compare Rules Files page, make the selections, then click Compare.
• Applied — Shows the policy that was rolled out to the device.
• Current — Shows what is real time, but is not rolled out to the device.
• Rollback — Shows what the policy would be if you were to roll it back to the previous working policy.
• Staged — Shows the policy that will be applied in the future.
• View the results of the comparison. Differences between the files are color coded as follows:
• Blue — Same line exists in both files but the settings have been changed.
• Red — A line exists in the left file but does not exist in the right file.
• Green — A line exists in the right file but not the left.
Task
Note
Task
1. In the Rule Types pane of the Policy Editor, select the type of rule you want to tag.
2. Click the Tags tab in the Filters/Tagging pane.
3. Do any of the following:
• To add tag categories, click the New Category Tag icon and naming the category. The system creates a base tag
for the new category.
• To add tags to a category, select it, then click the New Tag icon and name the tag.
To use this tag in event severity calculations, select Use tag for event severity calculation, then click OK.
• To change a category or tag, select it, then click the Edit Tag icon .
• To delete a custom tag, select it, then click the Remove Tag icon .
Task
Severity weights
Event severity is calculated based on the severity weight given to assets, tags, rules, and vulnerabilities.
Each of the four severities is weighted in the final calculation. This final calculation is the sum of each of the four severities
multiplied by their respective weights. The sum of the settings must equal 100. When you change one setting, some or all other
settings are affected.
Severity types
Severity
type Descriptions
Asset An asset is an IP address, optionally in a zone. The system determines an event's asset severity as
follows:
1. The system compares the event's destination IP address and destination zone against all assets. If
it finds a match, the system uses this asset severity for this event.
2. If the system finds no destination IP address and destination zone match, the system compares the
event's source IP address and source zone against all assets. If it finds a match, the system uses the
asset severity for this event.
3. If the system finds no matches, the asset severity is 0.
Tag
The system calculates tag severity using both McAfee and user-defined tags. For a tag to be used in the
severity calculation, it must be set for both the rule and asset of the event. If the rule or asset does not
have any tags defined or if there were no asset matches, the tag severity is 0. To calculate the tag
severity, the system multiplies the number of matching rule and asset tags by 10. The tag severity is
limited to 100.
Severity
type Descriptions
Rule
The rule severity is the severity set for the event when it was created. It is based on the event's rule
severity, as set in the Policy Editor, and any data enrichment configured for the event's collector.
Vulnerability
If VA SVE information is available for an event's asset and rule, the system uses the highest severity of all
matching asset and rule VA SVEs for the vulnerability severity. Otherwise, the system uses 0.
Task
• Drag and drop the markers. The Assets, Tags, Rules, and Vulnerability fields reflect these settings.
• For VA vendor-provided severity or VA vendor-provided PCI severity, select how the system calculates
vulnerability severity on incoming data. If you select both, the system uses the greater of the two values when
calculating the severity value.
Task
1. On the Policy Editor, click the View Policy Change History icon .
2. View or export a log, then click Close.
Task
Results
After each device completes the rollout, the policy status indicates a successful rollout. If the rollout command is unsuccessful, a
page lists failed commands.
Task
Predefined reports
The predefined reports are divided into these categories:
• Compliance
• Executive
• McAfee® Application Data Monitor
• McAfee® Database Activity Monitoring (McAfee DAM)
• McAfee® Database Event Monitor
• McAfee® Event Reporter
User-defined reports
When creating reports, design the layout by selecting the orientation, size, font, margins, and header and footer. You can also
include components, setting them up to display relevant data.
The system saves all layouts, which can be used for multiple reports. When adding reports, you can design new layouts, use
existing ones as is, or use existing reports as templates for new reports. You can also remove report layouts.
Configure reports
Determine how you want McAfee ESM reports to work for your organization by configuring report layouts and settings.
Task
• Conditions
• Time zone
• Date format
• Layouts
• Views
• Filters
• Queries
Task
Results
The layout is saved and can be used as is for other reports or as a template that you can edit.
Task
1. From the McAfee ESM dashboard, click and select System Properties.
2. Click Reports → Add and complete sections 1–4.
3. In section 5, design a new report layout or edit an existing layout.
4. Drag and drop the Image icon on the body section of the layout.
5. Upload a new image or select an existing image.
6. Click OK to add the image to the report layout.
Task
1. From the McAfee ESM dashboard, click and select System Properties. Then click Custom Settings.
2. Select Include image in exported PDF from Views or printed reports.
3. Click OK.
Task
1. On the system navigation tree, select System Properties, then click Reports.
2. Click Conditions, then enter the information requested.
3. Click OK to save the settings.
Task
1. On the system navigation tree, select the system, then click the Properties icon .
2. Click Reports, then click Add and fill in the requested information in sections 1 through 4.
3. In section 5, click Add, then drag-and-drop a Table, Bar Chart, or Pie Chart component and complete the Query Wizard.
4. In the Query section of the Properties pane on the Report Layout editor, select Resolve IPs to Hostnames.
Results
In addition to appearing in the report, you can view the results of the DNS lookup on the Hosts table (System Properties →
Hosts).
Task
1. From the McAfee ESM dashboard, click and select System Properties. Then click Custom Settings.
2. In the Specify which month should be used field, select the month.
3. Click Apply to save the setting.
Task
2. On the system navigation tree, select McAfee ESM, then click the Properties icon .
3. Select System Information then click View Reports.
4. To view or export a list of devices, select the Device Type Count tab.or Event Time report.
5. To compare the time of day on the device clocks, select the Event Time tab.
A flag on
this type
of node... Opens...
System or The Device Status Alerts Summary page, which is a summary of the status alerts for the devices
group associated with the system or group. It can display these status alerts:
• Drive Space — A hard drive is full or running low on space. Could include the hard drive on the McAfee
ESM, redundant McAfee ESM, or remote mount point.
• Critical — The device is not working properly.
• Warning — Something on the device is not functioning properly.
• Informational — The device is working properly but the device status level changed.
• Out of Sync — The virtual device, data source, or database server settings on the McAfee ESM are out
of sync with what is actually on the device.
• Rolled over — The log table for this device ran out of space so it has rolled over. This means that the
new logs are writing over the old logs.
• Inactive — The device has not generated events or flows in the inactivity threshold time period.
• Unknown — McAfee ESM could not connect to the device.
Drive space, Rolled over, and Informational flags can be resolved by checking the boxes next to the flags
and clicking Clear Selected or Clear All.
Device The Device Status Alerts page, which has buttons that take you to locations for resolving the problem. It
might include these buttons:
• Log — The System Log (for Local McAfee ESM) or Device Log page shows a summary of all actions that
have taken place on the system or device.
• Virtual Devices, Data Sources, VA Sources, or Database Servers — Lists the devices of this type on
the system, allowing you to check for problems.
• Inactive — The Inactivity Threshold page shows the threshold setting for all devices. This flag
indicates that the device has not generated an event in the interval specified.
McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other
marks and brands may be claimed as the property of others.