SlideShare a Scribd company logo
Firepower Module
• The ASA Firepower module supplies next-generation firewall
services, including Next-Generation Intrusion Prevention System
(NGIPS), Application Visibility and Control (AVC), URL filtering, and
Advanced Malware Protection (AMP).You can use the module in
single or multiple context mode, and in routed or transparent mode.
• The module is also known as ASA SFR.
• Although the module has a basic command line interface (CLI) for
initial configuration and troubleshooting, you configure the security
policy on the device using a separate application, Firesight
Management Center, which can be hosted on a separate Firesight
Management Center appliance or as a virtual appliance running on a
VMware server. (Firesight Management Center is also known as
Defense Center.)
• For ASA Firepower running on ASA 5506-X devices, you can
optionally configure the device using ASDM rather than Firesight
Management Center
• In inline mode, traffic goes through the firewall checks before being
forwarded to the ASA Firepower module. When you identify traffic for
ASA Firepower inspection on the ASA, traffic flows through the ASA and
the module as follows:
• 1. Traffic enters the ASA.
• 2. Incoming VPN traffic is decrypted.
• 3. Firewall policies are applied.
• 4. Traffic is sent to the ASA Firepower module.
• 5. The ASA Firepower module applies its security policy to the traffic,
and takes appropriate actions.
• 6. Valid traffic is sent back to the ASA; the ASA Firepower module might
block some traffic according to its security policy, and that traffic is not
passed on.
• 7. Outgoing VPN traffic is encrypted.
• 8. Traffic exits the ASA.
• This mode sends a duplicate stream of traffic to the ASA
Firepower module for monitoring purposes only. The
module applies the security policy to the traffic and lets
you know what it would have done if it were operating in
inline mode; for example, traffic might be marked “would
have dropped” in events. You can use this information for
traffic analysis and to help you decide if inline mode is
desirable.
• ASA Firepower module as a pure Intrusion Detection System
(IDS), where there is no impact on the traffic at all, we can
configure a traffic forwarding interface. A traffic forwarding
interface sends all received traffic directly to the ASA
Firepower module without any ASA processing.
• The module applies the security policy to the traffic and lets
you know what it would have done if it were operating in inline
mode; for example, traffic might be marked “would have
dropped” in events. You can use this information for traffic
analysis and to help you decide if inline mode is desirable.
• Traffic in this setup is never forwarded: neither the module nor
the ASA sends the traffic on to its ultimate destination. You
must operate the ASA in single context and transparent modes
to use this configuration
• 1. Enter the CLI of the ASA.
• If any other module is installed, 1st uninstall it like below.
• hostname# sw-module module ips shutdown hostname# sw-module module ips
uninstall hostname# reload
• Then install the SFR initial image from the below command.
• hostname# sw-module module sfr recover configure image disk0:file_path
hostname# sw-module module sfr recover configure image disk0:asasfr-5500x-
boot-5.3.1-58.img (if not there in the ASA by default, install from the Cisco site
and upload to the ASA in disk0)
• 2. Load the image using:
• hostname# sw-module module sfr recover boot
• Once that is done, Session to the image to get the Sourcefire command line
(login in with user admin and password Admin123)
• hostname# session sfr console
• Type setup and configure the basic settings and then install the system package
of Sourcefire using.
• system install tftp://IP-addr/asasfr-sys-5.3.1-44.pkg
• (Download the package and keep it ready to be uploaded from the tftp or the ftp
or the http)
•
• 3. Once done, session to the Sourcefire within ASA console using
session sfr in the ASA command line. Login with the user admin
and password Sourcefire. Complete the system configuration.
• Specify the Firesight management IP address (installation process
below) using the following command. Note you need the IP address
and the key. You will need this later when you add this to the
Firesight management.
Configure manager add <ip address> <KEY>
• At this point, all future steps are done within the Firesight
management.
• 4. Now you need to build the Firesight management. You will need to
download Virtual Firesight / Defense center for VMWare, which will
be a .tar.gz files. Have to unzip the .gz followed by untaring it. You
should end up with a .vmdk file. Deploy the .OVF file in ESXI and set
basic network configuration.
• Once the OVA is deployed, open the console and login with admin
and Sourcefire and give the below command to set the IP and the
gateway and then access from the browser.
• sudo /usr/local/sf/bin/configure-network
• 5. The ASA with Sourcefire has 4 license offerings to be
installed under System->Licenses.
• Go to System Licenses Add new License
• Take the license key from here and put it on the cisco
license portal and generate it on your given PAK and
then apply it.
• 6. At this point, you should be able to add the Firepower
services from the ASA. Go in the management GUI to
Devices->Device Management, click the Add button
and select Add Device. You will be asked to give the IP
address of the Sourcefire IP inside the ASA and the key
you made up for the Registration Key spot. You can
check which licenses you want to apply assuming you
loaded some in prior to this and click add.
Cisco ASA Firepower
• 7. There are other steps to setting up FireSIGHT such as
building access control policies, enabling network
discovery to see what’s on the network and so on
(discovery found under Policies-> Network Discovery
then adding a rule to specify the entire network). Before
doing that, you should go back to your ASA and configure
traffic to redirect through the firepower component of the
ASA.
• NOTE: Without redirecting traffic through Sourcefire,
the ASA will just act as a firewall meaning traffic will
not be seen by the Sourcefire software inside.
• 8. Access ASDM and select Configuration > Firewall >
Service Policy Rules. Next select Add > Add Service Policy
Rule. Click Next. The Add Service Policy Rule Wizard –
Traffic Classification Criteria dialog box appears. Provide the
basic info and on the next page select the ASA Firepower
Inspection tab. check the Enable ASA Firepower for this
traffic flow check box. Select if you want to permit traffic if
Sourcefire fails. Click finish.
• Alternatively you can use the below commands from the ASA
CLI to redirect the specific or all the traffic to the DC.
• Class-map global-class
• Match any
• policy-map global_policy
• Class global-class
• sfr fail-open
• A. Download link for the SFR user agent: Link
• 1. Download the User Agent setup file (Sourcefire_User_Agent_2.2-
9_Setup.zip) from the Support Site.
• 2. Copy the setup file to the Windows computer where you want to install the
agent and unpack the file. The agent requires 3 MB free on the hard drive for
installation. Cisco recommends you allocate 4 GB on the hard drive for the
agent local database.
• 3. Open the setup executable file (Sourcefire_User_Agent_2.2-
9_Setup.exe).
• 4. If you do not have both Microsoft .NET Framework Version 4.0 Client
Profile and SQL CE Version 3.5 installed on the Windows computer where
you install the agent, you are prompted to download the appropriate files.
Download and install the files.
• 5. Follow the prompts in the wizard to install the agent.
• You can install an agent on any Microsoft Windows Vista, Microsoft Windows
7, Microsoft Windows 8, and Microsoft Windows Server 2003, Microsoft
Windows Server 2008, or Microsoft Windows Server 2012 computer with
TCP/IP access to the Microsoft Active Directory servers you want to monitor.
You can also install on an Active Directory server running one of the
supported operating systems.
• B. After the user agent is installed on your AD
perform the below steps for the UA to receive the
data and send to DC.
• 1. To verify the Active Directory server is logging
login data:
• a. On the Active Directory server, select Start > All
Programs > Administrative Tools > Event Viewer.
• b. Select Windows Logs > Security. If logging is
enabled, the Security log displays.
• c. If logging is disabled, see
http://technet.microsoft.com/en-
us/library/cc779487(v=ws.10).aspx for information on
enabling security logging.
• 2. To allow the agent to communicate with the Active
Directory server:
• a) Enable the Remote Administration firewall rule on the Active
Directory server. You have the following options:
• b) If the Active Directory server is running Windows Server
2003, see
• http://technet.microsoft.com/en-
us/library/cc738900%28v=ws.10%29.aspx for more
information.
• c) If the Active Directory server is running Windows Server
2008 or Windows Server 2012, see
• http://msdn.microsoft.com/en-
us/library/aa822854%28VS.85%29.aspx for more information.
• 3. To grant the agent permission to retrieve login
data:
• a) Enable RPC on the Active Directory server for the
user. You have the following options: • If the Active
Directory server is running Windows Server 2008 R2 or
Windows Server 2012, and the user is not a member of
the Administrators group, grant the user DCOM remote
access, remote launch, and activation permissions. See
http://msdn.microsoft.com/en-us/library/Aa393266.aspx
for more information.
• b) If the Active Directory server is running any other
supported version of Microsoft Windows, RPC is already
enabled.
• 4. To grant the agent permission to retrieve logoff data:
• a) Grant the created user Administrator privileges to ensure the user
can log into all workstations that authenticate against the Active
Directory server.
• 5. To grant the agent permission to access the security logs:
• a) Grant the created user full permissions to the WMI Root/CIMV2
namespace on the Active Directory server. See
http://technet.microsoft.com/en-
us/library/cc787533%28v=WS.10%29.aspx for more information.
• 6. Enable the below said option.
• a. Windows Settings > Security Settings > Local Policy Configuration
> Audit Policy > Audit Logon/Logoff > Success
• b. Windows Settings > Security Settings > Advanced Audit Policy
Configuration > Audit Policy > Audit Logon/Logoff > Success
• Note: After all the changes- Update the group policy.
• 1. Open the UA window.
• 2. Go to AD servers and add your AD. If the UA is
installed in the AD then give localhost as the IP
otherwise give the real IP address of the AD and login
details.
• 3. On the Sourcefire DC Tab add the DC IP.
• 4. Tick show debug and log messages option and
save.
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower
Cisco ASA Firepower

More Related Content

PDF
Putting Firepower Into The Next Generation Firewall
PPTX
F5 - BigIP ASM introduction
PDF
PaloAlto Enterprise Security Solution
PDF
Duo Security
PDF
Meraki Overview
PPTX
Cisco Web and Email Security Overview
PPTX
Ccna security v2 instructor_ppt_ch11
PPTX
LTM essentials
Putting Firepower Into The Next Generation Firewall
F5 - BigIP ASM introduction
PaloAlto Enterprise Security Solution
Duo Security
Meraki Overview
Cisco Web and Email Security Overview
Ccna security v2 instructor_ppt_ch11
LTM essentials

What's hot (20)

PDF
Presentation cisco iron port email & web security
PPTX
SOC Architecture Workshop - Part 1
PPTX
SOAR and SIEM.pptx
PPTX
Check Point Solutions Portfolio- Detailed
PDF
Palo alto networks product overview
PDF
Cisco Live Brksec 3032 - NGFW Clustering
PPTX
Network Monitoring Basics
PDF
Cyber Threat Intelligence
PPTX
Cisco Identity Services Engine (ISE)
PPTX
Zero Trust Network Access
PDF
ACI MultiPod Config Guide
PPTX
Microsoft Defender for Endpoint
PDF
The Current ICS Threat Landscape
PDF
ClearPass Overview
PPT
Linux Operating System Vulnerabilities
PDF
MITRE ATT&CK Framework
PDF
Identity Services Engine Overview and Update
PPTX
QRadar, ArcSight and Splunk
PDF
Firepower ngfw internet
PDF
Cisco Meraki- Simplifying IT
Presentation cisco iron port email & web security
SOC Architecture Workshop - Part 1
SOAR and SIEM.pptx
Check Point Solutions Portfolio- Detailed
Palo alto networks product overview
Cisco Live Brksec 3032 - NGFW Clustering
Network Monitoring Basics
Cyber Threat Intelligence
Cisco Identity Services Engine (ISE)
Zero Trust Network Access
ACI MultiPod Config Guide
Microsoft Defender for Endpoint
The Current ICS Threat Landscape
ClearPass Overview
Linux Operating System Vulnerabilities
MITRE ATT&CK Framework
Identity Services Engine Overview and Update
QRadar, ArcSight and Splunk
Firepower ngfw internet
Cisco Meraki- Simplifying IT
Ad

Similar to Cisco ASA Firepower (20)

PPTX
Building Up Network Security: Intrusion Prevention and Sourcefire
PPTX
Basic Cisco ASA 5506-x Configuration (Firepower)
PDF
Putting firepower into the next generation firewall
PDF
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
PDF
ASA Firepower NGFW Update and Deployment Scenarios
PPTX
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
DOC
Deploying cisco asa firewall features
PDF
Cisco Next Generation Firewall with Firepower
PPT
Miben nyújt többet a Cisco ASA + FirePOWER Services?
PPTX
Cisco asa fire power services
PDF
Putting Firepower into the Next Generation Firewall
PDF
Cisco.350-701.v2021-12-14.q124.pdf
PPTX
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
PDF
Brkcrt 2214
PDF
Scalar Security Roadshow - Toronto Presentation
PPTX
012 2 ccna sv2-instructor_ppt_ch9
PDF
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
PDF
fire-power-asa.pdf
DOCX
Is this guide for you cisco firepower threat defense for the asa 5506-x series
PPTX
Ccna sv2 instructor_ppt_ch9
Building Up Network Security: Intrusion Prevention and Sourcefire
Basic Cisco ASA 5506-x Configuration (Firepower)
Putting firepower into the next generation firewall
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
ASA Firepower NGFW Update and Deployment Scenarios
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Deploying cisco asa firewall features
Cisco Next Generation Firewall with Firepower
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Cisco asa fire power services
Putting Firepower into the Next Generation Firewall
Cisco.350-701.v2021-12-14.q124.pdf
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
Brkcrt 2214
Scalar Security Roadshow - Toronto Presentation
012 2 ccna sv2-instructor_ppt_ch9
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
fire-power-asa.pdf
Is this guide for you cisco firepower threat defense for the asa 5506-x series
Ccna sv2 instructor_ppt_ch9
Ad

Recently uploaded (20)

PDF
Omni-Path Integration Expertise Offered by Nor-Tech
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PDF
Newfamily of error-correcting codes based on genetic algorithms
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
CroxyProxy Instagram Access id login.pptx
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PDF
DevOps & Developer Experience Summer BBQ
PDF
Advanced IT Governance
PDF
SAP855240_ALP - Defining the Global Template PUBLIC.pdf
Omni-Path Integration Expertise Offered by Nor-Tech
Chapter 3 Spatial Domain Image Processing.pdf
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
Newfamily of error-correcting codes based on genetic algorithms
GamePlan Trading System Review: Professional Trader's Honest Take
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
CroxyProxy Instagram Access id login.pptx
madgavkar20181017ppt McKinsey Presentation.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
DevOps & Developer Experience Summer BBQ
Advanced IT Governance
SAP855240_ALP - Defining the Global Template PUBLIC.pdf

Cisco ASA Firepower

  • 2. • The ASA Firepower module supplies next-generation firewall services, including Next-Generation Intrusion Prevention System (NGIPS), Application Visibility and Control (AVC), URL filtering, and Advanced Malware Protection (AMP).You can use the module in single or multiple context mode, and in routed or transparent mode. • The module is also known as ASA SFR. • Although the module has a basic command line interface (CLI) for initial configuration and troubleshooting, you configure the security policy on the device using a separate application, Firesight Management Center, which can be hosted on a separate Firesight Management Center appliance or as a virtual appliance running on a VMware server. (Firesight Management Center is also known as Defense Center.) • For ASA Firepower running on ASA 5506-X devices, you can optionally configure the device using ASDM rather than Firesight Management Center
  • 3. • In inline mode, traffic goes through the firewall checks before being forwarded to the ASA Firepower module. When you identify traffic for ASA Firepower inspection on the ASA, traffic flows through the ASA and the module as follows: • 1. Traffic enters the ASA. • 2. Incoming VPN traffic is decrypted. • 3. Firewall policies are applied. • 4. Traffic is sent to the ASA Firepower module. • 5. The ASA Firepower module applies its security policy to the traffic, and takes appropriate actions. • 6. Valid traffic is sent back to the ASA; the ASA Firepower module might block some traffic according to its security policy, and that traffic is not passed on. • 7. Outgoing VPN traffic is encrypted. • 8. Traffic exits the ASA.
  • 4. • This mode sends a duplicate stream of traffic to the ASA Firepower module for monitoring purposes only. The module applies the security policy to the traffic and lets you know what it would have done if it were operating in inline mode; for example, traffic might be marked “would have dropped” in events. You can use this information for traffic analysis and to help you decide if inline mode is desirable.
  • 5. • ASA Firepower module as a pure Intrusion Detection System (IDS), where there is no impact on the traffic at all, we can configure a traffic forwarding interface. A traffic forwarding interface sends all received traffic directly to the ASA Firepower module without any ASA processing. • The module applies the security policy to the traffic and lets you know what it would have done if it were operating in inline mode; for example, traffic might be marked “would have dropped” in events. You can use this information for traffic analysis and to help you decide if inline mode is desirable. • Traffic in this setup is never forwarded: neither the module nor the ASA sends the traffic on to its ultimate destination. You must operate the ASA in single context and transparent modes to use this configuration
  • 6. • 1. Enter the CLI of the ASA. • If any other module is installed, 1st uninstall it like below. • hostname# sw-module module ips shutdown hostname# sw-module module ips uninstall hostname# reload • Then install the SFR initial image from the below command. • hostname# sw-module module sfr recover configure image disk0:file_path hostname# sw-module module sfr recover configure image disk0:asasfr-5500x- boot-5.3.1-58.img (if not there in the ASA by default, install from the Cisco site and upload to the ASA in disk0) • 2. Load the image using: • hostname# sw-module module sfr recover boot • Once that is done, Session to the image to get the Sourcefire command line (login in with user admin and password Admin123) • hostname# session sfr console • Type setup and configure the basic settings and then install the system package of Sourcefire using. • system install tftp://IP-addr/asasfr-sys-5.3.1-44.pkg • (Download the package and keep it ready to be uploaded from the tftp or the ftp or the http)
  • 7. • • 3. Once done, session to the Sourcefire within ASA console using session sfr in the ASA command line. Login with the user admin and password Sourcefire. Complete the system configuration. • Specify the Firesight management IP address (installation process below) using the following command. Note you need the IP address and the key. You will need this later when you add this to the Firesight management. Configure manager add <ip address> <KEY> • At this point, all future steps are done within the Firesight management. • 4. Now you need to build the Firesight management. You will need to download Virtual Firesight / Defense center for VMWare, which will be a .tar.gz files. Have to unzip the .gz followed by untaring it. You should end up with a .vmdk file. Deploy the .OVF file in ESXI and set basic network configuration. • Once the OVA is deployed, open the console and login with admin and Sourcefire and give the below command to set the IP and the gateway and then access from the browser. • sudo /usr/local/sf/bin/configure-network
  • 8. • 5. The ASA with Sourcefire has 4 license offerings to be installed under System->Licenses. • Go to System Licenses Add new License • Take the license key from here and put it on the cisco license portal and generate it on your given PAK and then apply it. • 6. At this point, you should be able to add the Firepower services from the ASA. Go in the management GUI to Devices->Device Management, click the Add button and select Add Device. You will be asked to give the IP address of the Sourcefire IP inside the ASA and the key you made up for the Registration Key spot. You can check which licenses you want to apply assuming you loaded some in prior to this and click add.
  • 10. • 7. There are other steps to setting up FireSIGHT such as building access control policies, enabling network discovery to see what’s on the network and so on (discovery found under Policies-> Network Discovery then adding a rule to specify the entire network). Before doing that, you should go back to your ASA and configure traffic to redirect through the firepower component of the ASA. • NOTE: Without redirecting traffic through Sourcefire, the ASA will just act as a firewall meaning traffic will not be seen by the Sourcefire software inside.
  • 11. • 8. Access ASDM and select Configuration > Firewall > Service Policy Rules. Next select Add > Add Service Policy Rule. Click Next. The Add Service Policy Rule Wizard – Traffic Classification Criteria dialog box appears. Provide the basic info and on the next page select the ASA Firepower Inspection tab. check the Enable ASA Firepower for this traffic flow check box. Select if you want to permit traffic if Sourcefire fails. Click finish. • Alternatively you can use the below commands from the ASA CLI to redirect the specific or all the traffic to the DC. • Class-map global-class • Match any • policy-map global_policy • Class global-class • sfr fail-open
  • 12. • A. Download link for the SFR user agent: Link • 1. Download the User Agent setup file (Sourcefire_User_Agent_2.2- 9_Setup.zip) from the Support Site. • 2. Copy the setup file to the Windows computer where you want to install the agent and unpack the file. The agent requires 3 MB free on the hard drive for installation. Cisco recommends you allocate 4 GB on the hard drive for the agent local database. • 3. Open the setup executable file (Sourcefire_User_Agent_2.2- 9_Setup.exe). • 4. If you do not have both Microsoft .NET Framework Version 4.0 Client Profile and SQL CE Version 3.5 installed on the Windows computer where you install the agent, you are prompted to download the appropriate files. Download and install the files. • 5. Follow the prompts in the wizard to install the agent. • You can install an agent on any Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, and Microsoft Windows Server 2003, Microsoft Windows Server 2008, or Microsoft Windows Server 2012 computer with TCP/IP access to the Microsoft Active Directory servers you want to monitor. You can also install on an Active Directory server running one of the supported operating systems.
  • 13. • B. After the user agent is installed on your AD perform the below steps for the UA to receive the data and send to DC. • 1. To verify the Active Directory server is logging login data: • a. On the Active Directory server, select Start > All Programs > Administrative Tools > Event Viewer. • b. Select Windows Logs > Security. If logging is enabled, the Security log displays. • c. If logging is disabled, see http://technet.microsoft.com/en- us/library/cc779487(v=ws.10).aspx for information on enabling security logging.
  • 14. • 2. To allow the agent to communicate with the Active Directory server: • a) Enable the Remote Administration firewall rule on the Active Directory server. You have the following options: • b) If the Active Directory server is running Windows Server 2003, see • http://technet.microsoft.com/en- us/library/cc738900%28v=ws.10%29.aspx for more information. • c) If the Active Directory server is running Windows Server 2008 or Windows Server 2012, see • http://msdn.microsoft.com/en- us/library/aa822854%28VS.85%29.aspx for more information.
  • 15. • 3. To grant the agent permission to retrieve login data: • a) Enable RPC on the Active Directory server for the user. You have the following options: • If the Active Directory server is running Windows Server 2008 R2 or Windows Server 2012, and the user is not a member of the Administrators group, grant the user DCOM remote access, remote launch, and activation permissions. See http://msdn.microsoft.com/en-us/library/Aa393266.aspx for more information. • b) If the Active Directory server is running any other supported version of Microsoft Windows, RPC is already enabled.
  • 16. • 4. To grant the agent permission to retrieve logoff data: • a) Grant the created user Administrator privileges to ensure the user can log into all workstations that authenticate against the Active Directory server. • 5. To grant the agent permission to access the security logs: • a) Grant the created user full permissions to the WMI Root/CIMV2 namespace on the Active Directory server. See http://technet.microsoft.com/en- us/library/cc787533%28v=WS.10%29.aspx for more information. • 6. Enable the below said option. • a. Windows Settings > Security Settings > Local Policy Configuration > Audit Policy > Audit Logon/Logoff > Success • b. Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policy > Audit Logon/Logoff > Success • Note: After all the changes- Update the group policy.
  • 17. • 1. Open the UA window.
  • 18. • 2. Go to AD servers and add your AD. If the UA is installed in the AD then give localhost as the IP otherwise give the real IP address of the AD and login details.
  • 19. • 3. On the Sourcefire DC Tab add the DC IP.
  • 20. • 4. Tick show debug and log messages option and save.