NetWitness Respond Configuration Guide for 11.1
NetWitness Respond Configuration Guide for 11.1
Guide
for Version 11.1
Copyright © 1994-2018 Dell Inc. or its subsidiaries. All Rights Reserved.
Contact Information
RSA Link at https://community.rsa.com contains a knowledgebase that answers common
questions and provides solutions to known problems, product documentation, community
discussions, and case management.
Trademarks
For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa.
License Agreement
This software and the associated documentation are proprietary and confidential to Dell, are
furnished under license, and may be used and copied only in accordance with the terms of such
license and with the inclusion of the copyright notice below. This software and the
documentation, and any copies thereof, may not be provided or otherwise made available to any
other person.
No title to or ownership of the software or documentation or any intellectual property rights
thereto is hereby transferred. Any unauthorized use or reproduction of this software and the
documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment
by Dell.
Third-Party Licenses
This product may include software developed by parties other than RSA. The text of the license
agreements applicable to third-party software in this product may be viewed on the product
documentation page on RSA Link. By using this product, a user of this product agrees to be fully
bound by terms of the license agreements.
Distribution
Dell believes the information in this publication is accurate as of its publication date. The
information is subject to change without notice.
September 2018
Contents
Result 45
Obfuscate Private Data 46
Prerequisites 46
Procedure 46
Manage Incidents in NetWitness SecOps Manager 48
Prerequisites 48
Procedure 48
Set Counter for Matched Alerts and Incidents 50
Configure a Database for the Respond Server Service 52
Prerequisites 52
Procedure 52
4
NetWitness Respond Configuration
Topics
l NetWitness Respond Configuration Overview
Note: NetWitness Respond requires an ESA primary server that contains the MongoDb.
Alerts, Incidents, and Task records are persisted into this MongoDb by the Respond Server.
You have to configure various sources from which the alerts are collected and aggregated by the
Respond Server service.
Topics
l Step 1. Configure Alert Sources to Display Alerts in Respond View
Prerequisites
Ensure that:
l The Respond Server service is installed and running on NetWitness Suite.
l NetWitness Endpoint is installed and running. This is necessary only if you want to configure
NetWitness Endpoint as an alert source in the Respond view.
1. Go to ADMIN > Services, select a Reporting Engine service, and then select
> View > Config.
The Services Config view is displayed with the Reporting Engine General tab open.
Note: RSA supports NetWitness Endpoint versions 4.3.0.4, 4.3.0.5, or later for NetWitness
Respond integration. For more detailed information, see the "RSA NetWitness Suite
Integration" topic in the NetWitness Endpoint User Guide.
The diagram below represents the flow of NetWitness Endpoint alerts to the NetWitness Suite
Respond Server service and its display in the RESPOND > Alerts view.
2. From the components listed, select Incident Message Broker and click + to add a new IM
broker.
b. Server Hostname/IP address: Enter the Host DNS or IP address of the IM broker
(NetWitness Server).
4. Click Save.
Note: In NetWitness Suite 11.0, the virtual host is “/rsa/system”. For version 10.6.x and
below, the virtual host is “/rsa/sa”.
8. To set up SSL for Respond Alerts, perform the following steps on the NetWitness Endpoint
primary console server to set the SSL communications:
a. Export the NetWitness Endpoint CA certificate to .CER format (Base-64 encoded X.509)
from the personal certificate store of the local computer (without selecting the private
key).
b. Generate a client certificate for NetWitness Endpoint using the NetWitness Endpoint CA
certificate. (You MUST set the CN name to ecat.)
makecert -pe -n "CN=ecat" -len 2048 -ss my -sr LocalMachine -a
sha1 -sky exchange -eku 1.3.6.1.5.5.7.3.2 -in "NWECA" -is MY -ir
LocalMachine -sp "Microsoft RSA SChannel Cryptographic Provider" -
cy end -sy 12 client.cer
Note: In the above code sample, if you upgraded to Endpoint version 4.3 from a
previous version and did not generate new certificates, you should substitute "EcatCA"
for "NWECA".
c. Make a note of the thumbprint of the client certificate generated in step b. Enter the
thumbprint value of the client certificate in the
IMBrokerClientCertificateThumbprint section of the ConsoleServer.Exe.Config file as
shown.
<add key="IMBrokerClientCertificateThumbprint"
value="896df0efacf0c976d955d5300ba0073383c83abc"/>
9. On the NetWitness Server, copy the NetWitness Endpoint CA certificate file in .CER format
into the import folder:
/etc/pki/nw/trust/import
10. Issue the following command to initiate the necessary Chef run:
orchestration-cli-client --update-admin-node
This appends all of those certificates into the truststore.
l Malware Analysts: Malware Analysts have access to investigations and malware events.
l Operators: Operators have access to configurations, but not Investigation, ESA, Alerting,
Reporting and NetWitness Respond.
l SOC_Managers: The SOC Managers have the same access as Analysts plus additional
permissions to handle incidents and configure NetWitness Respond.
l Administrators: the Administrator has full system access to NetWitness Suite and has all
permissions by default.
The NetWitness Respond default permissions are shown in the following tables. You need to
assign user permissions from both the Incidents and Respond-server tabs, which are the
Permissions tab names in the ADMIN > Security view Add or Edit Roles dialogs. You may
want to add additional user permissions for Alerting, Context Hub, Investigate, Investigate-
server, and Reports.
Caution: It is very important that you assign equivalent user permissions from BOTH the
Respond-server tab AND the Incidents tab.
Users who configure Respond notification settings also need permissions in the Integration-
server tab.
Respond-server
server.alertrule.manage
server.configuration.manage
* Data Privacy Officers and Respond Administrators have the respond-server.* permission,
which gives them all of the Respond-server permissions.
Incidents
The Respond Administrator has all of the Respond-server and Incidents permissions.
Integration-server
(The Integration-server permissions are available in NetWitness Suite version 11.1 and later.)
Users who configure Respond Notifications also need Integration-server permissions. The
following table lists the Respond Notification setting permissions in the Integration-server tab
assigned to each role.
server.notification.read
(The Respond notification setting permissions are available in NetWitness Suite version 11.1 and
later.)
Note: If you are updating from NetWitness Suite version 11.0 to 11.1, you will need to add
additional permissions to your existing built-in NetWitness Suite user roles. For all upgrades to
11.1, you will need to add additional permissions to custom roles.
The following permissions are required for Respond Administrators, Data Privacy Officers, and
SOC Managers to access Respond Notification Settings (CONFIGURE > Respond
Notifications).
Incidents tab:
l Configure Incident Management Integration
Respond-server tab:
l respond-server.notification.manage
l respond-server.notification.read
Integration-server tab:
l integration-server.notification.read
l integration-server.notification.manage
The following figure shows the Incidents permissions for the default Analysts role:
For more information, see "Role Permissions" and "Manage Users with Roles and Permissions"
in the System Security and User Management guide.
l Clone rules
The User Behavior default incident rule is available in NetWtitness Suite 11.1 and later. It
captures network user behavior and uses deployed RSA Live ESA Rules to create incidents
from alerts. You can select and deploy the RSA Live ESA Rules that you want to monitor. For
more information, see Deploy the RSA Live ESA Rules.
Some predefined (default) incident rules changed slightly in 11.1. To verify your existing default
incident rules with the 11.1 default incident rules, see Set Up and Verify Default Incident Rules.
2. Click the link in the Name column for the rule that you want to enable.
The Incident Rule Details view is displayed for the selected rule.
3. Adjust the parameters and conditions of your rule as required. For details about various
parameters that can be set as criteria for an incident rule, see Incident Rule Details View.
3. Enter the parameters and conditions of your rule. All rules need to have at least one
condition. For details about various parameters that can be set as criteria for an incident rule,
see Incident Rule Details View.
4. If you are ready to enable your rule, in the Basic Settings section, select Enabled.
5. Click Save.
The rule appears in the Incidents Rules list. If you selected Enabled, the rule will be enabled
and it starts creating incidents depending on the incoming alerts that are matched as per the
criteria selected.
To change the order of the rules, use the drag pads ( ) in front of the rules to move them up
and down in the list.
The rule order determines which rule takes effect if the criteria for multiple rules match the
same alert. If two rules match an alert, only the rule with the highest priority is evaluated.
2. Select the rule that you would like to copy and click Clone.
3. Adjust the parameters and conditions of your rule as required. All rules need to have at least
one condition.
4. If you are ready to enable your rule, in the Basic Settings section, select Enabled.
1. Go to CONFIGURE > Incident Rules and click the link in the Name column for the rule
that you want to update.
The Incident Rule Details view is displayed.
2. Adjust the parameters and conditions of your rule as required. All rules need to have at least
one condition.
3. If you are ready to enable your rule, in the Basic Settings section, select Enabled.
l For details on the parameter and field descriptions in the Incident Rules List view,
see Incident Rules List View.
To verify your existing default incident rules with the 11.1 default incident rules, look at the
default incident rule tables following these procedures.
l Adjust and enable the User Behavior default rule (or create it if you do not have it)
2. In the Resource Types field, select Event Steam Analysis Rule and click Search.
3. In the Matching Resources list, select the ESA Rules from the following User Behavior
table that you are interested in monitoring and deploy them (click Deploy).
4. Go to CONFIGURE > ESA Rules > Rules tab, and in the Rule Library Filter drop-down
list, select RSA Live ESA Rule.
5. To add a new Deployment, in the drop-down list near DEPLOYMENTS, click Add.
a. In the ESA Service section, add and then select your ESA service.
b. In the ESA Rules section, click and in the Deploy ESA Rules dialog, select the ESA
Rules that you selected from the User Behavior table, and then click Save.
The selected ESA rules are listed with a status of Added.
6. Select the ESA rules that you added from the previous step, and click Deploy Now.
The status of the selected ESA rules changes to Deployed.
Adjust and Enable the User Behavior Default Rule (or Create it if you do not have it)
If you have the User Behavior default rule, you can adjust it for your environment and enable it.
If you do not have the User Behavior default rule, you can create it manually.
2. Click Create Rule and in the Incident Rule Details view, create the User Behavior default
incident rule using the values in the User Behavior table following this procedure. Values not
listed in the table should be set for your business requirements. For details about various
parameters that can be set as criteria for an incident rule, see Incident Rule Details View.
The following figure shows a portion of the User Behavior default rule details. Notice that
3. If you are ready to enable your rule, in the Basic Settings section, select Enabled.
4. Click Save.
The rule appears in the Incidents Rules list. If you selected Enabled, the rule will be enabled
and it starts creating incidents depending on the incoming alerts that are matched as per the
rule criteria.
5. Verify the order of your incident rules. For more information, see Verify the Order of your
Incident Rules .
User Behavior
The following table shows the values for the User Behavior default incident rule.
Condition Condition
Field Value
Field Operator
Condition Condition
Field Value
Field Operator
Condition Condition
Field Value
Field Operator
Name
Name
Time 1 Hour
Window
2. Click the link in the Name field of a default incident rule to view the Incident Rule Details
view. Set up or verify the default incident rule using the values in the default incident rules
tables in this topic. Values not listed in the tables should be set for your business
requirements. For details about various parameters that can be set as criteria for an incident
rule, see Incident Rule Details View.
3. When you are ready to enable your rule, in the Basic Settings section, select Enabled.
4. Click Save.
5. Verify the order of your incident rules. For more information, see Verify the Order of your
Incident Rules .
The following table shows the values for the Command & Control Communication By Domain
default incident rule.
Condition Condition
Field Value
Field Operator
Condition Condition
Field Value
Field Operator
Time 7 Days
Window
The following table shows the values for the High Risk Alerts: Malware Analysis default
incident rule.
Condition Condition
Field Value
Field Operator
Condition Condition
Field Value
Field Operator
Time 1 Hour
Window
The following table shows the values for the High Risk Alerts: NetWitness Endpoint default
incident rule.
Condition Condition
Field Value
Field Operator
Time 1 Hour
Window
Condition Condition
Field Value
Field Operator
The following table shows the values for the High Risk Alerts: Reporting Engine default incident
rule.
Condition Condition
Field Value
Field Operator
Time 1 Hour
Window
The following table shows the values for the High Risk Alerts: ESA default incident rule.
Condition Condition
Field Value
Field Operator
Condition Condition
Field Value
Field Operator
Time 1 Hour
Window
The following table shows the values for the IP Watch List: Activity Detected default incident
rule.
Condition Condition
Field Value
Field Operator
Condition Condition
Field Value
Field Operator
Time 4 Hours
Window
Title ${ruleName}
The following table shows the values for the User Watch List: Activity Detected default
incident rule.
Condition Condition
Field Value
Field Operator
Condition Condition
Field Value
Field Operator
Time 4 Hours
Window
Title ${ruleName}
The following table shows the values for the Suspicious Activity Detected: Windows Worm
Propagation default incident rule.
Condition Condition
Field Value
Field Operator
Name
Time 1 Hour
Window
Title ${ruleName}
The following table shows the values for the Suspicious Activity Detected: Reconnaissance
default incident rule.
Condition Condition
Field Value
Field Operator
Name
Time 4 Hours
Window
Title ${ruleName}
The following table shows the values for the Monitoring Failure: Device Not Reporting default
incident rule.
Condition Condition
Field Value
Field Operator
Time 2 Hours
Window
Title ${ruleName}
The following table shows the values for the Web Threat Detection default incident rule.
Condition Condition
Field Value
Field Operator
Condition Condition
Field Value
Field Operator
Time 1 Hour
Window
2. In the Email Server section, select the email server from the drop-down list that will send
out email notifications when the notification settings are enabled.
If there is no email server configured, you will not see an email server listed in the drop-
down list. You have to configure an email server before you can continue with this
procedure. To configure an email server, click the Email Server Settings link. For more
information, click the help icon or refer to the System Configuration Guide.
3. In the SOC Manager Email Addresses section, add the email addresses of the SOC
Managers that you want to receive email notifications. To add an SOC Manager email
address to the list, type it in the field that shows Enter an email address to add and click
Add. To remove an SOC Manager email address from the list, click next to the email
address to be removed.
4. In the Notification Types section, select who should receive an email notification when an
incident is created and when an incident is updated.
l Send to SOC Manager: An email is sent to all of the addresses listed in the SOC
Manager Email Addresses list.
Note: If user email address information is updated in the ADMIN > Security > Users tab, it
can take up to two minutes for the new email changes to take effect. Any incident creation or
incident update email notifications sent during this time will go to the old email address.
Migration Considerations
Notification Settings do not migrate from NetWitness Suite version 10.6.x to 11.1. The Incident
Management Notification Settings in 10.6.x are different from the Respond notification settings
available in 11.1. You will need to manually update the Respond Notification Settings in version
11.1.
Notification Servers from 10.6.x will not display in the Email Server drop-down list. The email
servers settings must be added to the Global Notification Servers (ADMIN > System > Global
Notifications > Server tab).
Custom Incident Management notification templates cannot be migrated to 11.1. No custom
templates are supported in 11.1.
When the retention period expires, the following data is permanently deleted:
l Alerts
l Incidents
l Tasks
l Journal entries
Logs track retention and manual deletion so you can see what has been deleted. You can view
Respond Server logs in the following locations:
l Respond Server Service log: /var/log/netwitness/respond-server/respond-server.log
The data retention period that you set here does not apply to Archer or other third-party SOC
tools. Alerts and incidents from other systems must be deleted separately.
Prerequisites
The Administrator role must be assigned to you.
Procedure
1. Go to ADMIN > Services , select the Respond Server service, and then select >
View > Explore.
3. In the enabled field, select true to delete incidents and alerts older than the retention period.
The scheduler runs every 24 hours at 23:00.
You will see a notice that the configuration was successfully updated.
4. In the retention-period field, type the number of days to retain incidents and alerts. For
example, type 30 DAYS, 60 DAYS, 90 DAYS, 120 DAYS, 365 DAYS, or any number of
days.
You will see a notice that the configuration was successfully updated.
Result
Within 24 hours after the retention period ends, the scheduler permanently deletes all alerts and
incidents older than the specified period from NetWitness Respond. Journal entries and tasks
associated with the deleted incidents are also deleted.
l When a meta key is configured to display a hashed value, all security roles see only the
hashed value in the Incidents module.
l You use hashed values the same way you use actual values. For example, when you use a
hashed value in rule criteria the results are the same as if you used the actual value.
This topic explains how to obfuscate private data in NetWitness Respond. Refer to the "Data
Privacy Management Overview" topic in the Data Privacy Management Guide for additional
information about data privacy.
In NetWitness Respond, the mapping file for data obfuscation is data_privacy_map.js. In it you
type an obfuscated meta key name and map it to the actual meta key name.
The following example shows the mappings to obfuscate data for two meta keys, ip.src and
user.dst:
'ip.src.hash' : 'ip.src',
'user.dst.hash' : 'user.dst'
You determine the naming convention for obfuscated meta key names. For example, ip.src.hash
could be ip.src.private or ip.src.bin. You must choose one naming convention and use it
consistently on all hosts.
Prerequisites
l DPO role must specify which meta keys require data obfuscation.
Procedure
3. Repeat step 2 for every meta key that should display a hashed value.
4. Use the same naming convention as in step 2 and use it consistently on all hosts.
Note: Existing alerts still display sensitive data. This procedure is not retroactive.
For more detailed integration information, see the RSA Archer Integration Guide.
Prerequisites
l NetWitness SecOps Manager 1.3.1.2 (NetWitness Suite11.0 will only work with NetWitness
SecOps Manager 1.3.1.2.)
Procedure
Follow this procedure to configure Respond Server service settings to manage incidents in
NetWitness SecOps Manager.
1. Go to ADMIN > Services, select the Respond Server service, and then select >
Config > Explore.
l Matched Alerts column displays the number of matched alerts for the rule.
By default, these values reset to zero every 7 days. Depending on how long you want the counts
to continue, you can change the default number of days.
Note: When the counter resets to zero, only the numbers in the three columns change to
zero. No alerts or incidents get deleted.
1. Go to ADMIN > Services, select the Respond Server service and then select > View
> Explore.
3. In the right panel, type the number of days in the counter-reset-interval-days field.
4. Restart the Respond Server service for the new setting to take effect. To do this, go to
ADMIN > Services, select the Respond Server service, and then select > Restart.
Prerequisites
Ensure that:
l You have installed a host on which you want to run the Respond Server service. Refer to
"Step 1: Deploy a Host" in the Hosts and Services Getting Started Guide for the procedure to
add a host.
Procedure
2. In the Services panel, select the Respond Server service and then select > View >
Explore.
l password: The password used for the deployment of the ESA primary server (password
for deploy_admin user).
l servers: The hostname or IP address of the ESA primary server to act as the database
host for NetWitness Respond application data, such as alerts, incidents, and tasks.
l password: The password used for the deployment of the NetWitness Server (password
for deploy_admin user).
l servers: The hostname or IP address of the NetWitness Server to act as the database
host for NetWitness Respond control data, such as incident rules and categories.
7. Restart the Respond Server service. To do this, go to ADMIN > Services, select the
Respond Server service, and then select > Restart.
Note: Restarting the Respond Server service is required for the database configuration to be
complete.
Configure View
The Configure view enables you to configure NetWitness Respond functionality.
You can configure incident rules to automate the Respond workflow for automatically creating
incidents. You can also configure notification settings to send emails when incidents are created
or updated.
Topics
l Incident Rules List View
Note: The information in this topic applies to RSA NetWitness® Suite Version 11.1 and later.
Analyst, Content Expert, Create or edit an incident Step 3. Enable and Create Incident
Related Topics
l Incident Rule Details View
The Incident Rules List view consists of a list and series of buttons.
The following table describes the columns in the Incident Rules list.
Column Description
Enables you to change the priority order of the rules. Use the drag pad ( ) in
front of a rule to move it up and down in the list.
Select Enables you to select a rule in order to take an action, such as Clone or Delete.
Order Shows the order in which the rule is placed. The rule order determines which
rule takes effect if the criteria for multiple rules match the same alert. If two
rules match an alert, only the rule with the highest priority is evaluated.
enabled.
Name Displays the name of the rule with a hyperlink. If you click the link, it opens the
Rule Details view, where you can edit the rule.
Last Displays the time when an alert was successfully matched with the rule. This
Matched value is reset once a week.
Matched Displays the number of matched alerts. This value is reset once a week.
Alerts To change the setting, see Set Counter for Matched Alerts and Incidents.
Incidents Displays the number of incidents created by the rule. This value is reset once a
week. To change the setting, see the Set Counter for Matched Alerts and Incidents.
The following table shows the operations that can be performed on the Incident Rules list.
Action Description
Note: The information in this topic applies to RSA NetWitness® Suite Version 11.1 and later.
Analyst, Content Expert, Enable, create, or edit an Step 3. Enable and Create Incident
Analyst, Content Expert, Set up and use the User Set Up and Verify Default
Related Topics
l Incident Rules List View
l To edit a rule, go to CONFIGURE > Incident Rules and click the link in the Name column
for the rule that you want to update.
The Incident Rule Details view is displayed. The following figure shows the Incident Rule
Details view in Rule Builder query mode.
In the Match Conditions section, if you select Advanced query mode, a field to enter
advanced queries is available as shown in the following figure.
The following table describes the options available when creating or editing incident rules.
MATCH QUERY Rule Builder: Select the Rule Builder option if you want to build a
CONDI- MODE query with various conditions that can be grouped. You can also
TIONS* have nested groups of conditions.
In the Match Conditions, you can set the value to All of these, Any
of these, or None of these. Depending on what you select, the
criteria types specified in the Conditions and Group of conditions
are matched to group the alerts.
For example, if you set the match condition to All of these, alerts
that match the criteria mentioned in the Conditions and Group
Conditions are grouped into one incident.
l Add a Condition to be matched by clicking the Add Condition
button.
Advanced: Select the Advanced query option if you want to use the
advanced query builder. You can add a specific condition that needs
to be matched as per the matching option selected.
For example, you can type the criteria builder format {"$and":
[{"alert.severity" : {"$gt":4}}]} to group alerts that have severity
greater than 4.
For advanced syntax, refer to
http://docs.mongodb.org/manual/reference/operator/query/ or
http://docs.mongodb.org/manual/reference/method/db.collection.fin
d/
AC- CHOOSE Group into an Incident: If enabled, the alerts that match the
TION* criteria set are grouped into an alert.
THE
Suppress the Alert: If enabled, the alerts that match the criteria
ACTION
are suppressed.
TAKEN IF
THE RULE
MATCHES
THE
ALERT
GROUP- GROUP The criteria to group the alerts as per the specified alert fields. You
ING BY* can use a maximum of two fields to group the alerts. You cannot
OP- group alerts with fields that do not have values.
TIONS Grouping on an alert field means that all matching alerts containing
the same meta key value for that field are grouped together in the
same incident. (See the following Group By Meta Key Mappings
table.)
INCI- TITLE* Title of the incident. You can provide placeholders based on the
DENT attributes you grouped. Placeholders are optional. If you do not use
OP- placeholders, all Incidents created by the rule will have the same
TIONS title.
For example, if you grouped them according to the source, you can
name the resulting Incident as Alerts for ${groupByValue1}, and
the incident for all alerts from NetWitness Endpoint would be
named Alerts for NetWitness Endpoint.
PRIORITY Average of Risk Score across all of the Alerts: Takes the
average of the risk scores across all the alerts to set the priority of
the incident created.
Highest Risk Score available across all of the Alerts: Takes the
highest score available across all the alerts to set the priority of the
incident created.
Number of Alerts in the time window: Takes the count of the
number of alerts in the time window selected to set the priority of
the incident created.
l High: 50
l Medium: 20
l Low: 1
For example, with the Critical priority set to 90, incidents with a
risk score of 90 or higher will be assigned a Critical priority for this
rule.
Domain alert.groupby_domain
Filename alert.groupby_filename
Severity alert.severity
Source alert.source
Note: The information in this topic applies to RSA NetWitness® Suite Version 11.1 and later.
Related Topics
l Incident Rules List View
Setting Description
Email Shows the Email server that will send the email notifications.
Server
Email If the Email server that you would like to use for notifications is not listed in the
Server Email Server drop-down list, you can configure the email server settings. Click
Settings the Email Server Settings link to go to ADMIN > SYSTEM > Global
Notifications. For instructions, refer to the System Configuration Guide.
SOC Lists the SOC Manager email addresses that will receive email notifications
Manager when you select Send to SOC Manager in the Notification Types section. You
Email can add and remove email addresses as needed.
Addresses
Setting Description
Notification Shows who should receive an email notification when an incident is created.
Types - l Send to Assignee: When an incident is created, an email is sent to the
Incident Analyst assigned to the incident.
Created l Send to SOC Manager: When an incident is created, an email is sent to all
of the addresses listed in the SOC Manager Email Addresses list.
Notification Shows who should receive an email notification when an incident is created.
Types -
l Send to Assignee: When an incident is updated, an email is sent to the
Incident
Updated Analyst assigned to the incident.
Note: If user email address information is updated in the ADMIN > Security > Users tab, it
can take up to two minutes for the new email changes to take effect. Any incident creation or
incident update email notifications sent during this time will go to the old email address.
Note: This topic applies to NetWitness Suite version 11.0 and earlier.
Analyst, Content Expert, Create an aggregation rule. Step 3. Enable and Create
Related Topics
Aggregation Rules
To access the Aggregation Rules tab, go to CONFIGURE > Incident Rules > Aggregation
Rules tab.
The following table describes the columns in the Aggregation Rules list.
Column Description
Select Enables you to select a rule in order to take an action, such as Clone or Delete.
Order Shows the order in which the rule is placed. The rule order determines which
rule takes effect if the criteria for multiple rules match the same alert. If two
rules match an alert, only the rule with the highest priority is evaluated.
Last Displays the time when an alert was successfully matched with the rule. This
Matched value is reset once a week.
Column Description
Matched Displays the number of matched alerts. This value is reset once a week.
Alerts To change the setting, see Set Counter for Matched Alerts and Incidents.
Incidents Displays the number of incidents created by the rule. This value is reset once a
week. To change the setting, see the Set Counter for Matched Alerts and Incidents.
The following table shows the operations that can be performed in the Aggregation Rules tab.
Option Description
Note: This topic applies to NetWitness Suite version 11.0 and earlier.
Analyst, Content Expert, Create an aggregation rule. Step 3. Enable and Create
Related Topics
l Aggregation Rules Tab
New Rule
To access the New Rule tab view:
1. Go to CONFIGURE > Incident Rules > Aggregation Rules tab.
2. Click .
The following table describes the options available when creating customized aggregation rules.
Field Description
Description A description for the rule to give an idea about what alerts get aggregated.
Field Description
Match Query Builder - Select if you want to build a query with various conditions that
can be grouped. You can also have nested groups of conditions.
Conditions*
Match Conditions - You can set the value to All of these, Any of these, or
None of these. Depending on what you select, the criteria types specified in the
Conditions and Group of conditions are matched to group the alerts.
For example, if you set the match condition to All of these, alerts that match the
criteria mentioned in the Conditions and Group Conditions are grouped into one
incident.
You can include multiple Conditions and Groups of Conditions that can be
matched as per criteria set and group the incoming alerts into incidents.
Advanced - Select if you want to add an advanced query builder. You can add a
specific condition that needs to be matched as per the matching option selected.
For example: you can type the criteria builder format {"$and":
[{"alert.severity" : {"$gt":4}}]} to group alerts that have severity greater than
4.
For advanced syntax, refer to
http://docs.mongodb.org/manual/reference/operator/query/
or http://docs.mongodb.org/manual/reference/method/db.collection.find/
Action Group into an Incident - If enabled, the alerts that match the criteria set are
grouped into an alert.
Suppress the Alert - If enabled, the alerts that match the criteria are
suppressed.
Grouping Group By: The criteria to group the alerts as per the specified category. You
can use a maximum of two attributes to group the alerts. You can group the
Options*
alerts with one or two attributes. You can no longer group alerts with attributes
that do not have values (empty attributes).
Grouping on an attribute means that all matching Alerts containing the same
value for that attribute are grouped together in the same incident.
Time Window: The time range specified to group alerts.
For example if the time window is set to 1 hour, all alerts that match the criteria
set in Group By field and that arrive within an hour of each other are grouped
into an incident.
Field Description
Incident Title - (Optional) Title of the incident. You can provide placeholders based on
the attributes you grouped. Placeholders are optional. If you do not use
Options
placeholders, all Incidents created by the rule will have the same title.
For example, if you grouped them according to the source, you can name the
resulting Incident as Alerts for ${groupByValue1}, and the incident for all
alerts from NetWitness Endpoint would be named Alerts for NetWitness
Endpoint.
Assignee - (Optional) Name of the assignee to whom the incident is assigned to.
Priority Average of Risk Score across all of the Alerts - Takes the average of the risk
scores across all the alerts to set the priority of the incident created.
Highest Risk Score available across all of the Alerts - Takes the highest score
available across all the alerts to set the priority of the incident created.
Number of Alerts in the time window - Takes the count of the number of
alerts in the time window selected to set the priority of the incident created.
Critical, High, Medium, and Low - Specify the incident priority threshold of
the matched incidents. The defaults are:
l Critical: 90
l High: 50
l Medium: 20
l Low: 1
For example, with the Critical priority set to 90, incidents with a risk score of 90
or higher will be assigned a Critical priority for this rule.
You can change these defaults by manually changing the priorities or by moving
the slider under Move slider to adjust scale.