SymantecメーカーSecurity Expressions Serverの使用説明書/サービス説明書
ページ先へ移動 of 97
SecurityExpressions Server User Guide.
.
iii Table Of Contents Contacti ng Us .................................................................................................................. .... 1 Technical Support ..........................................................................
SecurityExpressions Server User Guide iv Policy File Librar y ............................................................................................................ 18 Library Synchr onization ....................................................
Table Of Contents v Device Type Scopes ..................................................................................................... 39 IP Range Scopes ...........................................................................................
SecurityExpressions Server User Guide vi Adding Po licies ............................................................................................................ 57 Editing Po licies ...............................................................
Table Of Contents vii Adding a New Audit Resu lts Report Profil e ..................................................................... 81 Editing Audit Report Results Pr ofile s ........................................................................
.
1 Contacting Us Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 USA http://www.symantec.com Technical Support.
.
3 Technical Support Symantec Technical Support maintains support cent er s globally. Technical Support’s primary role is to respond to specific queries about product fe atures and functi onality. The Technical Support group also creates content for our onlin e Know ledge Base.
.
5 Other Products SecurityExpressions Console This product enables you to quickly and effective ly loc k down Windows system s using guidelines similar to ones established by Microsoft, NSA, SANS, and other s. Use it to verify the security settings on local and rem ote systems across your enterprise.
.
7 Overview About SecurityExpressions Audit & Compliance Server SecurityExpressions Audit & Complianc e Server is a Web-based application that runs on a server with Microsoft IIS and an ASP.
.
9 Self-Service Audit What is Self-Service Auditing? Self-service auditing lets anyone audit just th eir local Windows computer. Typically, a person performing self-service audits is not a Security Expressions user, but must have administrator privileges on the computer they're auditing.
SecurityExpressions Server User Guide 10 check your system again st several policy files during one audit. If the administrator of this product created an Audit-on-Connect scope th at contains your system, you may u se this method to start an audit on your sy stem.
11 Configure Servers About Server Configuration Before you can audit syste ms using the server a pplication, you must configure server settings. From fundamental settings such as database c onne ction.
SecurityExpressions Server User Guide 12 Viewing Audit Results SecurityExpressions genera tes audit results throug h th e following kinds of audits. To view results from each kind of audit, a user need s rights to view results from key configurable items (m achine lists, policies, and scopes) involved in the audit.
Configure Servers 13 We recommend you don’t use SQL Server's master datab ase as the SecurityExpressions database. To establish a valid database connection: 1. In the Database Type drop-down list, select the manu facturer of the database software you use.
SecurityExpressions Server User Guide 14 If the system on which you installed the serv er software is not running Windows 2000 Server, skip this procedure. 1. On the Windows 2000 server, open Control Panel and double-click Administrative Tools and then Internet Information Services to open the IIS Administrative Panel.
Configure Servers 15 Once you create a credential store, you can't modify i t. To create a credential stor e: 1. In the Application Setup page, click Add New . 2. In the New Credential Store User Name box, type a user name for logging in to this credential store.
SecurityExpressions Server User Guide 16 Session Duration Session duration is a time-out period that sets the m aximum number of minutes for a Web session. The session lasts until this time passes or a d ifferent Browser accesses the server. When t he sess ion exp ires, local s ession infor matio n, incl uding a uthen ticat ion, is lost.
Configure Servers 17 Item Rights The Item Rights option s, found on the Page Access page, let you list which Windows User Groups are allowed to do the following: Edit Private Items Allow others to modify items that are norm ally exclusive to the user who created them, such as My Machine Lists and scheduled tasks.
SecurityExpressions Server User Guide 18 When you schedule an audit, you can specify which computer s to audit by selecting machine lists created on the My Machine Lists page and machine lists created in the console ap plication (global machine lists).
Configure Servers 19 To check for frequent policy file updates, you may ch oose to Check for policy file updates during a specific time period (days, minutes, hours). If updates exist, they will be downloaded for the SecurityExpressi ons Audit & Compliance Server to use.
SecurityExpressions Server User Guide 20 (weighted total of OK results ÷ (weighted total of OK rules + weighted total of Not OK rules)) × 100 Example An audit contains four rules: • 1 High Priority • 1 Medium Priority • 1 Low Priority • 1 no priority or impact, and no Weight key exists The weight values are: • High:1.
Configure Servers 21 3. Agent - Uses the audit age nt to remotely execute scripts and progr ams. Before auditing, make sure to install the agent on the remote computer or check the Automatically install Agent if requir ed in order to execute scripts and programs remotely box.
SecurityExpressions Server User Guide 22 Database Cleanup The database stores da ta about audits, as well as console and server events. You might decide that it is unnecessary to use database space to retain this data per m anently . The Database Cleanup settings allow you to automatically delete data from the database on a schedule.
Configure Servers 23 target for every week, month, ye ar, or overall. If you select Yearly, for example, the databa se will retain the l ast audit performed on every policy file and on every target audited for every year you've audited using this database.
SecurityExpressions Server User Guide 24 Clean Now Click this button to perform an unschedu led cleanup on audit data. Then click Delete to confirm the action or Cancel to cancel it. Self-Service Audit Agreement An organization may require the acceptance of corporate agr eement text before allowing an audit.
Configure Servers 25 Select this check box to enable SecurityExpressi ons' Web-services layer. To learn more abou t the Web-services layer, see SecurityExpressions Web Services API guide , included in your installation package.
.
27 Audit-On-Connect What is Audit-on-Connect? Audit-on-Connect is an opt i onal fe ature of Secu rityExpressions A udit & Compliance Server that is sold separately. It enables you to audit systems as they connect to the netw ork rather than on a fixed schedule.
SecurityExpressions Server User Guide 28 scope or scheduled task . Description Optional statement about the policy. Policy File Name of the policy file (.sif), from the policy file library or a customized policy file. Last Updated Date and time the policy file was last saved to the database.
Audit-On-Connect 29 to control how often a system gets audi ted — as long as a posture result remains v ali d, the software won't attempt to audit a system if it connects t o the n etwork again.
SecurityExpressions Server User Guide 30 policy. This establishes which users can access thi s policy and its audit results due to their rol e. If a Windows User Group isn't on the l ocal computer, you'll need to enter the group in domaingroupname format.
Audit-On-Connect 31 6. Check the Policy is kept up to date with Policy File Library box if you want to regularly update the SIF files in this policy using the policy file library avail able on line. This option is available onl y if the server can access a Policy File Library.
SecurityExpressions Server User Guide 32 1. The name for the new rule must be .CONFIGURE. 2. The check type can be blank, or you can type CONFIGURE. 3. In the Parameters tab, the Config parameter is set to .CONFIGURE (Config=.CONFIGURE). When you set the Config key, the WizParams tab appears.
Audit-On-Connect 33 and modify the .CONFIGURE rule. When you create a new Policy and select an associated polic y file, the server application determines if a .CON FIGURE rule exi sts and displays prompts for modifications. This rule may require synchronizat ion between the datab ase and the policy file.
SecurityExpressions Server User Guide 34 All scope types except Expr ession c an accept as many values as you wa nt to enter, listing one value per line. Scope t y pe Expre ssion only accepts one expre ssion. 6. Indicate if the network link speed of the syst ems in this sc ope are Unspecified, Slow or Fast.
Audit-On-Connect 35 Device Connect Notifications - Sends selected notific ati ons when a device is detected in this Scope, regardless of audit po sture. This value m ay be blank. Pass Notifications - Sends selected notifi cation s if the audit's group posture result is Pass.
SecurityExpressions Server User Guide 36 • notifications • Windows Group access Credential Precedence: If your organization uses the console application and someone delegated one or more database .
Audit-On-Connect 37 blank. Pass Notifications Notificat ions to run when the Group Posture of an audit in this scope is PASS. This v alue may be blank. Fail Notifications Notificatio ns to run when the Group Posture of an audit in this Scope is FAIL. This value may be bl ank.
SecurityExpressions Server User Guide 38 Supported Functions Function Argument Description iprange a valid IP range Returns TRUE if the target computer is a member of the IP range. domain a windows domain in Netbios or DNS format Returns TRUE if the target computer is a member of the windows domain.
Audit-On-Connect 39 Audits can detect systems on the ne twork usin g the following methods: DHCP, EVENTLOG, NAC, self-service (for self-service audits). A system matches this scope if the conn ection monitor used to connect to it matc hes th e value entered.
SecurityExpressions Server User Guide 40 Creating New Command Notifications To create a new command notification: 1. Click Add New . 2. Provide a Notification Name , a customized name of the notification to appear in the table. 3. Select Command as the Type .
Audit-On-Connect 41 To edit a Notification, click the Edit hyperlink on the Notifications table to select the row to edit. Make the necessary modification s and cl ick Update . To Edit an email notification, ma ke the necessary m odifications to: • Notification Name • To – person receiving the notification .
SecurityExpressions Server User Guide 42 To create a new command notification: 1. Click Add New in the Notifications page. 2. Provide a Notification Name, a customized na me of the notification to appear in the table. 3. Select Command as the Type. 4.
Audit-On-Connect 43 A Subject or Message may contain text such as "L ate st SecurityExpressions audit locat ed at %RESULTLINK%." Exceptions Exceptions Exceptions prevent certain syst ems from ever getti ng audited, even if they fall wi thin a scope.
SecurityExpressions Server User Guide 44 To edit Exceptions: 1. Click the Edit hyperlink on the Exceptions table to select the row to edit. 2. Modify the Exception parameters ( Type , Value , Expiration Date , Group Posture Result ) 3. Click Update . Deleting Exceptions To delete an Exception: 1.
Audit-On-Connect 45 Specify and confirm a password. SecurityExpressi ons Audit & Compliance Server generates an encrypted password that you must add the to t he configuration files for each of the Connection Monitors. Include the encrypted password in the [Options] section of the configuration file wi th the Password option.
SecurityExpressions Server User Guide 46 Password = AES: cb789817f8d99c7e5a1e5beb8510bf71 Once you enable the connection monitor , it can be processed at any time. Connection Monitor Configuration File Connection Monitors use a text file named dmconfig.
Audit-On-Connect 47 Comma-Separated List of Servers Includes the names of the audit servers . A comma separates each server n ame. Options The Options section of the configuration file contains any settings needed to control the Connection Monitors, such as en abling logging an d identifying the location and name of the log file.
SecurityExpressions Server User Guide 48 Active Directory (Active Directory Connection Monitor only) Set the Active Directory (event log) monitoring options. IncludeAllDomainControllers Retrieves names of all Domain Contr ollers on the Domain system where the m onitor resides and monitors the event logs of all Domain C ontrollers.
Audit-On-Connect 49 DistributionMethod=Round Robin Comment=Home office ip addresses [IP_RANGE_2] IPRange=10.0.2.0:254 AuditServers=server3,server1,server2 DistributionMethod=First Available Comment=Ca.
SecurityExpressions Server User Guide 50 Enabling slow link detection might extend processing time. Trace Route Information Trace route is a TCP/IP utility that allows the user to determine the route th at packets are taking to a particular host.
Audit-On-Connect 51 A managed system is a system on the network that the server sof tware can connect to and audit using the appropriate credentials. It i s a target system or potential target system. Initial Token Sends the posture token you sel ect to ACS if a system receives a posture result of Fail.
SecurityExpressions Server User Guide 52 A read-only line that reminds you to configure ACS so that NAD red irects users who try to connect to the network from quarantined syst ems to the URL listed.
Audit-On-Connect 53 To trace Audit on Connect activity: 1. Determine when the suspect activity will start and how long it will take to finish. 2. When the suspect activity is about to b egin, type the hours and minutes you expect the activity to take in the Run AOC Trace for fields and cl ick Start Trace .
.
55 Audit-On-Schedule What is Audit-on-Schedule? Audit-on-Schedule is an auditing method that au dits a group of systems at scheduled interval s. You create a scheduled task that audits all system s in a machine list based on a policy.
SecurityExpressions Server User Guide 56 Description Optional statement about the policy. Policy File Name of the policy file (.sif), from the policy file library or a customized policy file. Last Updated Date and time the policy file was last saved to the database.
Audit-On-Schedule 57 posture result remains v ali d, the software won't attempt to audit a system if it connects t o the n etwork again. Instead, it returns a posture result of Pass. Cache Fail For (Audit-On-Connect Only) Specify how long posture results remain valid when the system fails an audit based on this policy .
SecurityExpressions Server User Guide 58 a Windows User Group isn't on the l ocal computer, you'll need to enter the group in domaingroupname format. • In the Use Policy field, enter the Windows groups who should be able to modify the policy.
Audit-On-Schedule 59 This option is available onl y if the server can access a Policy File Library. 7. If you want the policy to be available to use in audits, check th e Make this policy active box. Clear the check box to make the policy unavailab le t o use in audits without deleting the policy.
SecurityExpressions Server User Guide 60 3. In the Parameters tab, the Config parameter is set to .CONFIGURE (Config=.CONFIGURE). When you set the Config key, the WizParams tab appears. On this tab you can type text using the Wiz Params syntax that control s the available text, input options, and parameters to modify in the Wizar d .
Audit-On-Schedule 61 modifications. This rule may require synchronizat ion between the datab ase and the policy file. To synchronize the database and the new file, save the policy file in the datab ase with a new name with new parameters for the .CONFIGURE rule, if previously saved in the database.
SecurityExpressions Server User Guide 62 The group posture result i s %GROUPPOSTURER ESULT%. Click here for the report: %RESUL TLIN K% 5. Select Attach trace route information for Audit-on-Connect for the message body to include the trace route. The message body alwa y s includes a link to the report for the audit that caused this notification.
Audit-On-Schedule 63 folder. 5. Click Add New . Creating New Email Notifications To create a new email notification: 1. Click Add New . 2. Provide a Notification Name, a customized na me of the notification to appear in the table. 3. Select Email as the Type.
SecurityExpressions Server User Guide 64 The following three variables will only return a value i f statistics are available: %COUNTPROBLEMS% - number of error s encountered during the audit %COUNTRUL.
Audit-On-Schedule 65 Windows Group Use A cce ss Windows User Groups who can use this machine list. Windows Group Resul ts Access Windows User Groups who can view results from audits using this machine list. Adding Machine Lists To create a machine list: 1.
SecurityExpressions Server User Guide 66 Make sure you type the system n ames or IP addresses correctly. If you did not type a system's name or address correctly or somehow entered an invalid syst em, the audit skips the system and moves on to the next system in th e list.
Audit-On-Schedule 67 The Scheduled Tasks table contains the following information: Column Description Run Now/Stop/Initializing Click this button to start or st op the task in this row. This column also displays "Initial izing" when a task is in the middle of a process.
SecurityExpressions Server User Guide 68 Policies page. Only the policies to which you have Use acce ss rights appear for sel ection . Access rights for individual policies are set in the Windows Group Access options on the Policies page.
Audit-On-Schedule 69 Run Once – The scheduled task execu tes once on this day and does not repeat. In the calendar, choose the date on which you want to run the task. Run Weekly – The task executes once every week on the day(s) you select. C heck the days of the week on which you want to r un the task.
SecurityExpressions Server User Guide 70 restart would take. B. If you want to set a time limit on how long the ta sk can attempt reaudits, type the number of hours you want to allot for reaudi ts in the Attempt re-audit for this many hours after initial audit box.
Audit-On-Schedule 71 15. If you want to use specific credential s to access all systems whenever this audit task runs, type those credenti als in the Login box. If you do not want to specify credential s, skip to step 18. 16. In the Password box, type the password of the credential s you specified in the previous step.
SecurityExpressions Server User Guide 72 Only the machine lists to which you have Use ac cess rights appear for selection . Access rights are set in the Windows Group Access opti ons on the My Machine Lists page and the ML Access page (global ma chine lists).
Audit-On-Schedule 73 If you selected Not Scheduled in the previous step , th ese options don't appear. Notifications 9. If you want to send notifications when this sch eduled task executes, selec t one or more notifications from the Notifications list or the Console Notifications list.
SecurityExpressions Server User Guide 74 A reaudit cycle could go on indefinitely if a system i s off or never connects. Limiting the number of times the task can attempt t o re audit systems keeps the reaudit cycl e from continuing indefinitely. Both steps B and C provide end points to th e reaudit cycle.
Audit-On-Schedule 75 In the Edit Task field, enter the Windows grou ps who should be able to modify the task. In the Run Task field, enter the Wind ows groups who should be able to use the t ask to perform audits. To grant all users access, type Everyone .
.
77 View Audit-On-Connect Activity Browse Audit-On-Connect Activity Audit-On-Connect activity reports show Audit-On-Connect conn ection events as they were logg ed over time. Use these reports to trouble shoot and optimize Audit-on-Connect conf igurations.
SecurityExpressions Server User Guide 78 2. Select one or more Detection Methods . The detec tion method identifies the Connection Monitor types. 3. Define filters that cause only certain events th at meet your criteria to display in the report. Click the links and set the criteria.
View Audit-On-Connect Activity 79 2. When you delete a report p rofile, you remove it from the database. A warning appears to remind you that you are about to this particular rep ort profile from the database.
.
81 View Audit Results Browse Audit Results This page shows audit results in the f or m of report s. It features results from al most all kinds of auditing methods, including: • Audit-on-Schedule •.
SecurityExpressions Server User Guide 82 • Data Grid - Generates a highly interactive HTML report with lots of opportuni ties to drill down. Click the links and set the criteria. Y ou m ay set as many kinds of filters as you like. The report's contents are based on a combination of all filters you set.
View Audit Results 83 • Open or closed range beginning on a specific day - Includes in the report a r ange of connection activity starting on a sp ecific date. You may specify an end for the date range or let the report display all activity available after the starting date.
.
85 Glossary # .CONFIGURE: Some policy files, such as the NSA Guidelines for Windows XP and Windows 2000, contains special rule named .CONFIGU RE. The .CONFIGURE r ule allows you to configure your policy files and set global parameters f or policy files at run time.
SecurityExpressions Server User Guide 86 P policy: A Security Policy is a set of objectives, ru les of behaviour for users and administrators, and requirements for system configurati on and management th at collectively are designed to ensure Securit y of compute r systems in an organization.
87 Index . .CONFIGURE............................... 31, 59, 66 .sif .................................................. 27, 55 A access and user ro les .................. 11, 16, 17 Active ................................................... 36 Active Directory Connection Monitor .
SecurityExpressions Server User Guide 88 H https ..................................................... 13 I IIS ........................................................ 13 IP addres s ............................ 33, 44, 45, 48 IP range ..............
Index 89 rule weig hts........................................... 19 run-time policy variable .................... 31, 59 S scheduled audi ts ......................... 55, 66, 81 scheduled audi ts log ............................... 83 Scheduled tasks viewing .
デバイスSymantec Security Expressions Serverの購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Symantec Security Expressions Serverをまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはSymantec Security Expressions Serverの技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Symantec Security Expressions Serverの取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Symantec Security Expressions Serverで得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Symantec Security Expressions Serverを既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はSymantec Security Expressions Serverの不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Symantec Security Expressions Serverに関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちSymantec Security Expressions Serverデバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。